ABSTRACT
In working to rescue victims of human trafficking, law enforcement officers face a host of challenges. Working in complex, layered organizational structures, they face challenges of collaboration and communication. Online information is central to every phase of a human-trafficking investigation. With terabytes of available data such as sex work ads, policing is increasingly a big-data research problem. In this study, we interview sixteen law enforcement officers working to rescue victims of human trafficking to try to understand their computational needs. We highlight three major areas where future work in human-computer interaction can help. First, combating human trafficking requires advances in information visualization of large, complex, geospatial data, as victims are frequently forcibly moved across jurisdictions. Second, the need for unified information databases raises critical research issues of usable security and privacy. Finally, the archaic nature of information systems available to law enforcement raises policy issues regarding resource allocation for software development.
- 2000. United States of America: Victims of Trafficking and Violence Protection Act of 2000. Public Law 106--386 {H.R. 3244}.Google Scholar
- Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage.Google Scholar
- Sarah Brayne. 2017. Big data surveillance: The case of policing. American Sociological Review 82, 5 (2017), 977--1008.Google ScholarCross Ref
- Tara Burns. 2018. The Deadly Consequences of the Anti-Sex Trafficking Law. The Crime Report (Jun 2018). https://thecrimereport.org/2018/ 06/04/the-deadly-consequences-of-the-anti-sex-trafficking-law/Google Scholar
- Caliber. 2007. Evaluation of Comprehensive Services for Victims of Human Trafficking: Key Findings and Lessons Learned. Technical Report. US Department of Justice.Google Scholar
- Janet BL Chan. 2001. The technological game: How information technology is transforming police practice. Criminal Justice 1, 2 (2001), 139--159.Google ScholarCross Ref
- Heather Clawson, Nicole Dutch, and Megan Cummings. 2006. Law enforcement response to human trafficking and the implications for victims: Current practices and lessons learned. Washington, DC: US Department of Justice, National Institute of Justice (2006).Google Scholar
- Meredith Dank, Bilal Khan, John Jay College, P Mitchell Downey, Ric Curtis, Samantha Lowry, Meagan Cahill, Samuel Bieler, Juan Pedroza, Doug Gilchrist-Scott, Aaron Horvath, Pamela Lachman, Shebani Rao, Leah Ouellet, Sarah Trager, Leila Collins, Aqsa Ashai, and Bill Adams. 2014. Estimating the Size and Structure of the Underground Commercial Sex Economy in Eight Major US Cities. Technical Report. The Urban Institute.Google Scholar
- Artur Dubrawski, Kyle Miller, Matthew Barnes, Benedikt Boecking, and Emily Kennedy. 2015. Leveraging publicly available data to discern patterns of human-trafficking activity. Journal of Human Trafficking 1, 1 (2015), 65--85.Google ScholarCross Ref
- Amy Farrell, Jack McDevitt, and Stephanie Fahy. 2008. Understanding and Improving Law Enforcement Responses to Human Trafficking. (2008).Google Scholar
- Luis Garicano and Paul Heaton. 2010. Information technology, organization, and productivity in the public sector: Evidence from police departments. Journal of Labor Economics 28, 1 (2010), 167--201.Google ScholarCross Ref
- Sadie Gurman. 2016. Across US, police officers abuse confidential databases. Associated Press (28 September 2016).Google Scholar
- Kathryn Herr and Gary L Anderson. 2014. The action research dissertation: A guide for students and faculty. Sage publications.Google Scholar
- John S Hollywood, John E Boon Jr, Richard Silberglitt, Brian G Chow, and Brian A Jackson. 2015. High-priority information technology needs for law enforcement. Rand Corporation. Google ScholarDigital Library
- John S Hollywood and Zev Winkelman. 2015. Improving InformationSharing Across Law Enforcement: Why Can't We Know? JSTOR.Google Scholar
- John S Hollywood, Dulani Woods, Sean E Goodison, Andrew Lauland, Lisa Wagner, Thomas J Wilson, and Brian A Jackson. 2017. Fostering Innovation in US Law Enforcement. Rand Corporation.Google Scholar
- John S Hollywood, Dulani Woods, Andrew Lauland, Brian A Jackson, and Richard Silberglitt. 2018. Addressing Emerging Trends to Support the Future of Criminal Justice. RAND Corporation.Google Scholar
- International Labor Office. 2012. Profits and Poverty: The Economics of Forced Labor. Technical Report.Google Scholar
- International Labour Office. 2017. Global Estimates of Modern Slavery: Forced Labour and Forced Marriage. http://www.ilo.org/global/ publications/books/WCMS_575479/lang--en/index.htmGoogle Scholar
- Brian A Jackson, Victoria Greenfield, Andrew R Morral, and John S Hollywood. 2014. Police department investments in information technology systems. (2014).Google Scholar
- Elizabeth E Joh. 2014. Policing by numbers: big data and the Fourth Amendment. Wash. L. Rev. 89 (2014), 35.Google Scholar
- Emily Kennedy. 2012. Predictive patterns of sex trafficking online. Master's thesis. Carengie Mellon University.Google Scholar
- Renata A Konrad, Andrew C Trapp, Timothy M Palmbach, and Jeffrey S Blom. 2017. Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications. European Journal of Operational Research 259, 2 (2017), 733--745.Google ScholarCross Ref
- Mark Latonero. 2011. Human trafficking online: The role of social networking sites and online classifieds. Available at SSRN 2045851 (2011).Google Scholar
- Mark Latonero, Jennifer Musto, Zhaleh Boyd, Ev Boyle, Amber Bissel, Kari Gibson, and Joanne Kim. 2012. The rise of mobile and the diffusion of technology-facilitated trafficking. University of Southern California, Center on Communication Leadership & Policy Los Angeles, CA.Google Scholar
- Mark Latonero, Bronwyn Wex, and Meredith Dank. 2015. Technology and Labor Trafficking in a Network Society: General Overview, Emerging Innovations, and Philippines Case Study. (2015).Google Scholar
- Zachary Lipton. 2016. The Mythos of Model Interpretability. In ICML Workshop on Human Interpretability in Machine Learning (WHI 2016). New York, NY, USA.Google Scholar
- Martin N Marshall. 1996. Sampling for qualitative research. Family practice 13, 6 (1996), 522--526.Google Scholar
- Maureen Q. McGough. 2013. Ending Modern-Day Slavery: Using Research to Inform U.S. Anti-Human Trafficking Efforts. National Institute of Justice Journal 271 (2013).Google Scholar
- Kimberly J Mitchell and Dana Boyd. 2014. Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement. (2014).Google Scholar
- Andrea J Nichols. 2016. Sex trafficking in the United States: Theory, Research, Policy, and Practice. Columbia University Press.Google Scholar
- Andrea J Nichols and Erin C Heil. 2015. Challenges to identifying and prosecuting sex trafficking cases in the Midwest United States. Feminist criminology 10, 1 (2015), 7--35.Google Scholar
- Samuel Nunn. 2001. Police information technology: Assessing the effects of computerization on urban police functions. Public Administration Review 61, 2 (2001), 221--234.Google ScholarCross Ref
- Polaris. 2015. Sex Trafficking in the U.S.: A Closer Look at U.S. Citizen Victims. Technical Report. Polaris.Google Scholar
- Rebecca S Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy. 2017. Backpage and bitcoin: Uncovering human traffickers. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1595--1604. Google ScholarDigital Library
- Felicity Gerry QC, Julia Muraszkiewicz, and Niovi Vavoula. 2016. The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns. Computer Law & Security Review 32, 2 (2016), 205--217.Google ScholarCross Ref
- Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. Why should i trust you?: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, 1135--1144. Google ScholarDigital Library
- Daniel Ribeiro Silva, Andrew Philpot, Abhishek Sundararajan, Nicole Marie Bryan, and Eduard Hovy. 2014. Data integration from open internet sources and network detection to combat underage sex trafficking. In Proceedings of the 15th Annual International Conference on Digital Government Research. ACM, 86--90. Google ScholarDigital Library
- Kevin Strom. 2017. Research on the impact of technology on policing strategy in the 21st century, final report.Google Scholar
- President's Interagency Task Force to Monitor and Combat Trafficking in Persons. 2013. Coordination, Collaboration, Capacity: Federal Strategic Action Plan on Services for Victims of Human Trafficking, 2013--2017. Technical Report.Google Scholar
- United Nations Office on Drugs and Crime. 2016. Global Report on Trafficking in Persons. Technical Report.Google Scholar
- US Department of Justice. 2017. National Strategy to Combat Human Trafficking. Technical Report.Google Scholar
- US Department of State. 2017. Trafficking in Persons Report. Technical Report.Google Scholar
- Nitya Verma and Lynn Dombrowski. 2018. Confronting Social Criticisms: Challenges when Adopting Data-Driven Policing Strategies. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 469. Google ScholarDigital Library
- Deborah G Wilson, William F Walsh, and Sherilyn Kleuber. 2006. Trafficking in human beings: Training and services among US law enforcement agencies. Police Practice and Research 7, 02 (2006), 149--160.Google ScholarCross Ref
- Jennifer Xu and Hsinchun Chen. 2005. Criminal network analysis and visualization. Commun. ACM 48, 6 (2005), 100--107. Google ScholarDigital Library
Index Terms
Understanding Law Enforcement Strategies and Needs for Combating Human Trafficking
Recommendations
Cryptography, Law Enforcement, and Mobile Communications
In this issue's installment of Crypto Corner, we review the handset-related methods law enforcement agencies can use to gather evidence during criminal investigations. This article's goal is twofold: explain how law enforcement agencies gather handset-...
A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment
As the Internet evolves and continues to become a compelling part of our everyday lives, individuals, communities and nations alike are becoming increasingly exposed to the growing threat of the cybercriminal. The aim of this paper is to widen the ...
The Law Enforcement in Cyberspace Criminal: Focusing on the Experience between Taiwan and the United States
MINES '11: Proceedings of the 2011 Third International Conference on Multimedia Information Networking and SecurityThis article is discussing the Cyberspace Crime from the point of view to law enforcement. From the observation of this article, it indicates that the trans-bordering and hard-to-trace are two prominent characteristics in the field of Cyberspace Crime ...
Comments