Technology use by sex traffickers fuels privacy debate

Technology use by sex traffickers fuels privacy debate

by Joseph Anthony
107 views
Websites, chat rooms and virtual currency all are used by traffickers to hunt for child victims and sell them

Sex traffickers are growing more adept at using sophisticated technology to exploit people, especially tools to hide their identity and encrypt data, fanning an ongoing battle between online privacy and security, a conference heard on Tuesday.

Websites, chat rooms and virtual currency all are used by traffickers to hunt for child victims and sell them, said Kevin Gutfleish, a specialist in violent crimes against children at the Federal Bureau of Investigation (FBI).

Traffickers advertise online, track victims by cellphones and use encrypted messaging systems to communicate with accomplices, experts say, fuelling debate between human rights advocates who value protection against authorities concerned that encryption hampers law enforcement and enables criminals.

โ€œIt has in some cases very significantly adversely affected our ability to solve cases and to get justice for victims,โ€ Cyrus Vance, New York County District Attorney, told Trust Conference/America Forum, a one-day Thomson Reuters Foundation event on the fight against slavery and trafficking.

Tech giants Apple and Google have come under scrutiny after changing their operating systems in 2014 to encrypt usersโ€™ data by default which boosted privacy online but made it harder for law enforcement agencies to get information off smartphones.

Facebook-owned messaging system WhatsApp last year turned on end-to-end encryption that protects messages.

Due to such encryption, Vance said his investigators have more than 500 cells phones that contain potential evidence in criminal cases but are locked and inaccessible.

He called on Congress to pass legislation balancing the interests of security, privacy, law enforcement, crime victims and technology companies.

โ€œWe want our privacy, but we also want to make sure that where criminals are involved, thereโ€™s going to be a way to solve the crimes,โ€ he said.

But Human Rights Watch Executive Director Ken Roth said human rights groups value online privacy and encryption in protecting victims, and breaching that privacy wall would create a vulnerability that will be exploited by criminals.

โ€œYes, there are a handful of crimes that are going to be solved โ€ฆ but think about the crimes that are going to be committed,โ€ he told the Trust Conference/America Forum.

โ€œThere are reams of hackers out there, criminal and governmental,โ€ Roth said. โ€œAnd theyโ€™re going to win.โ€

The FBIโ€™s Gutfleish told the Thomson Reuters Foundation that traffickers are keeping up with technology โ€“ and exploiting it for their purposes.

โ€œTheyโ€™re not opposed to using whatโ€™s available to them,โ€ he said.

A survey of more than 1,000 law enforcement officers conducted for the Department of Justice last year found more than a third said the technical sophistication and expertise of sex traffickers had increased in the last five years, Gutfleish said.

In particular, they reported seeing an increase in the use of tools and services that protect identities such as proxy servers that can mask the source of communication and the FBI was keeping pace with this and also trying to benefit from this technology.

โ€œSex traffickers are readily taking advantage of those technologies that are available to them .. You have a lot to lose when youโ€™re exploiting children,โ€ he said.

You may also like

Leave a Comment

Chijos News is an independent online publication that provides readers with the latest breaking Nigerian news, world news, entertainment, sports, business, and many more.

@2024 – Chijosnews.com. All Rights Reserved.

-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00