preview

Thesis Statement On Human Trafficking

Decent Essays

Introduction
Human trafficking is illegal trading in people for various forms of modern-day slavery such as forced labor and commercial sexual exploitation (Lee, 2007, p. 56). Thesis statement: technological transformation plays a crucial role in the facilitation of processes and practices that surround human trafficking. In particular, networking technologies such as the internet, social media, and mobile phones have served to increase the incidence of human trafficking. This paper looks into the ways in which various forms of technology facilitate different aspects of the human trafficking network such as recruitment, transit of victims, control of victims, advertisement of services, selling of services, and money transfer. It relies on literature …show more content…

Mendel and Sharapov (2014, p. 12 – 14) demonstrate this point by pointing out that social media platforms such as Facebook are favorite platforms for traffickers to identify potential victims. Traffickers use social media to identify individuals who are emotionally or psychologically vulnerable to coercion. Social media also exposes individuals whose low socioeconomic status provides the traffickers with a suitable avenue to lure and entice them (Mendel & Sharapov 2014, p. 14). Social media avail traffickers with a suitable platform for befriending and grooming potential victims for extended periods without arousing any suspicion regarding their true intentions (Sarkar 2015 58 – …show more content…

Lantonero (2011, 16) underlines this point by pointing out that technology has shifted the advertising and selling process from the streets to the digital domain. Advertisers use genuine online services to advertise their victims. For example, they may disguise the act as an escort service. They often use pseudonyms and code words to avoid attracting the attention of authorities. For example, they may refer to their victim as an expensive teddy bear. Clients learn these code words from various online forums (Lantonero, 2011, p. 16 – 17). Perpetrators also commonly conduct their online activities on the hidden internet, where they make use of advanced encryption technologies to evade digital forensic tools that police use to track their activities (Zagorianou, 2015

Get Access