SO IAL MEDIA & SEX TRAFFI KING PRO ESS - University Of Toledo

1y ago
7 Views
2 Downloads
1.02 MB
12 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Wade Mabry
Transcription

SOCIAL MEDIA & SEX TRAFFICKING PROCESSfrom connection and recruitment, to salesRyan Kunz, MSW, Meredith Baughman, BA, Rebecca Yarnell, MSW, Celia Williamson, PhD.1

Introduction & Study MethodsWith the increase in technology use, it is important to understand the landscape of trafficking online. The Research Subcommittee of theOhio Attorney General’s Human Trafficking Commission was asked to conduct a study to gain a better understanding of how social media is usedto connect, recruit, and sexually traffick youth. Therefore, researchers at University of Toledo in the Human Trafficking and Social Justice Institutedesigned and obtained university approval for this qualitative study.Researchers interviewed knowledgeable professionals from the Ohio Anti Human Trafficking Coalition Network, then used snowballsampling, asking participants if they knew any other knowledgeable professionals who might be willing to participate. In total, there were 16 indepth interviews conducted with participants that included knowledgeable members of law enforcement, judges, direct service providers,advocates, and researchers that had engaged victims that were trafficked online.Screening questions were used initially with participants to determine eligibility, and knowledge about social media as a means toconnect, recruit, and traffick youth. For those who were eligible, interviews were conducted over the phone and audio recorded using GoogleVoice or a traditional handheld recorder. Interviews lasted between 25 minutes to an hour. All participants were asked the same series ofquestions and asked to clarify or expand on some responses when necessary.Completed interviews were transcribed verbatim, and transcriptions were analyzed line-by-line. From this analysis, codes were identified,and codes were collapsed into themes.FindingsThe ProcessThere are innumerable websites and applications designed to build community and connect users to new people. Any site that allowsusers to connect to people with numerous motives and intentions is an inherently risky site. However, most experts agree, the vulnerability of theuser elevates risk. One professional reports, “It feels less about the app and more about the person’s vulnerabilities. I think when I get a friendrequest from a person I don’t know, it doesn’t even occur to me to start a relationship with someone that way, but I have a different background2

than many of these women. I think the risk is high because they are often looking for someone who can nurture them, care for them, and then sothey are extremely vulnerable” – Ohio Anti-Trafficking Professional, 2018.The Internet and social media allows traffickers to quickly connect with vulnerable youth. One professional explains, “These guys are justmaster manipulators at making these, figuring out these girls vulnerabilities and insecurities and making them feel unloved.They use the app towatch for people that are sending out signals of what is going on in their life, and kids put a lot of stuff out there. There is a point where this girlgoes from being out of sorts about her life at home.to fast forward six weeks and.she’s in Fort Wayne, Indiana doing commercial sex acts at theRed Roof Inn” – Ohio Anti-Trafficking Professional, 2018.Traffickers can form intense relationships, which for youth can be all encompassing. As relationships are built, traffickers groom the youthto trust them. One professional describes the process “These guys, they learn about the girls and pretend to understand them, and so these girls,who are feeling not understood and not loved and not beautiful. These guys are very good at sort of pretending that they are all of these things andthey really understand them and, ‘I know how you feel, you are beautiful’, and just filling the hole that these girls are feeling. I think they educatethemselves about the victim by the stuff the victim may have posted on Facebook over time. These guys are taking the time to study it. It givesthem power over the girls to be able to manipulate them” – Ohio Anti-Trafficking Professional, 2018.Additionally, technology offers traffickers ease in advertising multiple victims at one time. One professional explains, “Prior to onlineadvertising there was not the level of access to, you know, for lack of a better word, to goods. Online advertising increases access to goods and inthis case the goods are children being trafficked It is not extinguishing the human element of it, but it is certainly increasing the impact oftraffickers both in potential for sales and reaching buyers” – Ohio Anti-Trafficking Professional, 2018.This report serves to inform professionals, parents, and youth about the dangers of online predatory practices to connect, recruit, and sellyouth for sex. This report outlines themes which include access and the ability to connect to more vulnerable youth online, the ease of assessingvulnerabilities online, online grooming to form quicker relationships, the use of self-erasing technology and/or developing a second persona totraffick youth, and moving youth from online to in-person. Quotes from professionals presented are used to explain each theme. At the end of thisreport, we provide a sample list of social media sites, describe how they are used, and provide what parents and youth can do to educatethemselves and reduce online risk.3

Access and Ability to Connect to More Vulnerable Youth OnlineSocial media allows for many more immediate connections and faster engagement with vulnerable youth compared to inperson connections.“The guy was reaching out to a lot of girls all day long, one girl who is actually in ayouth home, she had access to the internet, and he connects with her on a socialmedia platform. He drives all the way up from Columbus to Toledo, picks her up ather foster home and drives her back down to Columbus, and then trafficks her here inColumbus. You know, 25, 30 years ago he would have never been able to connectwith her, but, because of social media that connection was immediately made in overa few hours He found out where she was and she told him, ‘yeah please come getme I want to get out of here’.” Ohio Anti-Trafficking Professional, 2018“You can potentially groom multiplevictims at one time rather than if you weretrying to meet with everybody; that wouldbe more difficult to meet 5 or 6 potentialvictims at once, but online you can begrooming a lot of different people at alltimes of day.” - Ohio Anti-TraffickingProfessional, 20184

Ease of Assessing Vulnerabilities OnlineSocial media allows traffickers to ascertain what a youth’s vulnerabilities are easier, whereas pre-social media, learning andunderstanding these vulnerabilities was a process that took more time.“I think social media itself tends to provide an easy access toidentified vulnerabilities whereas previously, traffickers mayhave had to slowly ascertain what those vulnerabilities wereover time. Now they can just go online, look for individualswho are showing any of the indicators they typically exploit-substance abuse, runaway activity, destabilization within thehome environment, sometimes you can even find posts onsocial media that indicate poly-abuse histories. So they canreally start targeting these things, and so on top of that theycan even add a narrative element. All of these things allowthem to really tailor the grooming aspect that they tend toengage in with youth.” – Ohio Anti-Trafficking Professional,2018“I think on most of those sites you can scroll back throughconversations that have been ongoing on the site page andactually read up a little bit on the individual you are seeingonline and once again use targeted phrasing to, you know,disarm and get around any type of barriers that might presson and target any vulnerabilities.” – Ohio Anti-TraffickingProfessional, 20185

Online GroomingTraffickers focus on meeting needs of vulnerable youth by understanding their vulnerabilities, then exploiting them by filling the voidand using that to transition the relationship into one of re/AllureDisappointmentCore Message from Youththat Exposes VulnerabilityI desire understanding. Theydon’t understand me.I’m not feeling loved.I’m not feeling beautiful. Iwant you to like my body andmy looks and think I’mdesirable.My life is not going well/notfulfilled.ConnectionI don’t have friends/familywho care/connect to.FreedomFearI want to be treated like anadult. I want myindependence. I want to takerisks.I’m scared.SuccessI want to be successful.ConfidenceI’m not confidentWhat it might look like Online“Nobody gets me”; “You don’t reallyknow me”“I am so sick of being single”; “I wish Ihad someone around for me”“OMG, I am so ugly”; “How do I look?”;“Check out my new pics.” “What do youthink?”Trafficker’s StrategicResponseI understand you.I love you.I think you’re beautiful. I’llencourage you to showyour body. Use your bodyTrafficker RepellentSome people dounderstand me.I am loved.I am beautiful and I havebeautiful elements tomy body, mind, andspirit.My life is alright.“My life sucks.” “Everyone in my life cango to hell.” “Is this all there is to life?”I’ll make your life better.“She’s not my true friend”; “If you’re notgoing to support me, unfriend me”; “Idon’t need you anymore”“My parents don’t trust me”; “I’m beingtreated like a kid”I’ll be your best friend.I have friends and familythat care about me.I’ll encourage you to takerisks. You are an adult.“I need to get out of here”; “Someonesave me”I’ll protect you.“I wish there was a way to make quickmoney”; “Need to step up my game andmake real money”“I don’t know what to do”; “Is thisright?”; “I don’t know who I am”I’ll make you successful.I talk to my family andfriends and negotiate mydesire for freedom andindependence.I talk to my family andfriends about my fearsand they support me.I am successful in my liferight now.Trust in me.I’m pretty confident andknow who I am.“I mean, it’s a common theme, they are looking for, and trying to prey on those that are vulnerable.[Youth are] saying,‘hey my life sucks,’ and ‘hey come see me.’ You know if they get a response they will try to latch onto that and try to getthem to work for them. I think especially young women with a little more confidence and smarts are not going to fall forthat.” – Ohio Anti-Trafficking Professional, 20186

Quicker RelationshipsSocial media helps to mask traditional cues that alert individuals to a potentially dangerous person and enables quickerrelationships.“You can develop this virtualrelationship very easily withouthaving to even leave your house orapartment. So if a trafficker canreplicate that 20 to 30 times a day,their chances of finding a victimthat will say, ‘Hey meet me at theMcDonald's’, ‘Hey do you want togo to a hotel party’, it just makes iteasier for them.” – Ohio AntiTrafficking Professional, 2018“What puts the youth at risk is putting allkinds of personal information out there,including pictures of themselves andexpressing ‘I’m mad at mom today. I’mgoing to run away from home.’ Traffickerslook for any of these vulnerabilities, andthen will reply ‘I want to be your friend andwe can talk about that and I’m sixteen justlike you,’ when they are really not and weknow people that this has happened to.” –Ohio Anti-Trafficking Professional, 20187

Self-Erasing Technology and/or Developing a Second PersonaSelf-erasing technology or second persona profiles allow for communication with traffickers to be hidden and avoidsuspicion from others.“.the individual was able tomigrate the conversation overto one of those [less familiarsocial media sites] by saying,‘you don't want your parents tofind out what we're talkingabout,’ and so they will use thatfear of repercussions as a wayto compel the youth, coerce theyouth, and utilize those tools[applications].” – Ohio AntiTrafficking Professional, 2018“Kids will create what they call finstagram accounts that arefake Instagram accounts that their parents aren't aware of.So they have a completely squeaky clean Instagram accountand then another alternative account, and a lot ofexploitation can happen there.” – Ohio Anti-TraffickingProfessional, 2018“.the mass IP self-erasing tech system , they can organizeand meet, and even if the phone is confiscated it can be verydifficult to recover that information and make your case.” –Ohio Anti-Trafficking Professional, 20188

Moving from Online to In PersonThe transition from messaging to meeting a trafficker in person is becoming less prevalent. As technology is playing a largerrole in trafficking, this allows some traffickers to be able to exploit youth without meeting face-to-face.In 2004, 85% of victims that met their traffickers online eventually met them in person. According to a new study by THORN (2018), 58%of traffickers who first met their victim online eventually convinced them to meet in person. While 58% of victims still eventually meettheir traffickers face-to-face, this is becoming less prevalent. Today, 42% of victims that initially met their trafficker online, never mettheir trafficker in person and were still trafficked. Study found at: l.com/wpcontent/uploads/2018/06/Thorn Survivor Insights 061118.pdf .9

Connection, Recruitment, and Sales“. grooming and recruiting and establishing that trust in that relationship.” – Ohio Anti-Trafficking Professional, 2018CommonlyUsed SitesLessCommonSitesProcessVIEW & COMMENT SITESFacebook, Instagram (post photosto their profile, can comment onother photos, receive privatemessages, and have a secondaccount that parents don’t knowabout called “finstagrams” or fakeinstagrams),Snapchat (picture messaging andposting publicly, disappears afterbeing opened, and privatemessage/picture/video sharingfunction)CONVERSATIONAL SITESTinder (dating app to chat with peopleyou match with, private message tocommunicate, meet & date),Blendr (dating app with private chat,GPS location to loosely locate othersWhatsapp (encrypted messaging appwhere service providers do not keepcopies of messages on their servers andonly the two people communicating canaccess those messages),KIK (messaging app that is notconnected to a phone number,messages are not saved on a server foraccess outside of the chat)YikYak (anonymous posting withYellow (dating/friends app for youthcomment section, GPS locationwith swipe function, “tinder for kids”),allowing others to identify where #1 Chat Avenue (chat room for kids withusers are within a certain radius), strangers in one large group, canWhisper (anonymous posting with message in a large group, or privatelyability to comment and privatemessage)message users anonymously)WEBCAM SITESChatroulette (webcam withstrangers individually, userscan rotate through multiplestrangers and web cam with aprivate chat box under thewebcam screen),Omegle (webcam withstrangers individually, userscan rotate through multiplestrangers and web cam with aprivate chat box under thewebcam screen)Potential traffickers may like,comment, ask to be friends, andgather information that they canthen use to recruit and groomyouth with.Fill vulnerabilities, build trust,and get them to share moreof their body in pictures.Move them from monitoredpage to less monitored page.Chatting with young person, possiblyafter gathering information on a view &comment site. Grooming can occur onthese messaging apps & sites,convincing someone to send a riskypicture and then using it to extort them.Monkey (webcam withstrangers for limited amountof seconds and youth need toadd users as friends forunlimited time, advertised toyouth specifically)ADVERTISING AND SALES SITESCityxguide (classifieds, escort site withadvertisement),Skipthegames (escort site withindividuals advertising services),Bedpage (new website after backpageshut down, classifieds, escort site withindividual advertisement of services),Seekingarrangement.com (dating,sugar daddy site, profile site similar todating profiles with messaging)Sugar-babies.com (sugar babiesadvertising site with profiles forjohns/sugar daddies to browse &message)Less common sites cannot beidentified as the landscape is rapidlychanging after the FOSTA/SESTAlegislation, “the whole scene went darkand now it's all scattered all over. it’sgonna take a while before another sitecomes back, but another site will comeback” – Ohio Police OfficerMove them from sharing to selling orselling pictures online of themselves.10

Barriers to TraffickersEducated ParentsParents who are educated can wage a worthy defense against potential recruitment and exploitation of their youth on online.Parents may read about various populations and less popular sites to learn more about how to protect their child. Parents thatwork to build healthy, open, and communicative relationships are more likely to have youth that share information aboutwhere they go and who they talk to online.Where to Learn t.au/articles/risktaking teenagers.htmlParents who Monitor/Block Questionable ActivityThe variations within developmental age for youth requires different strategies for different ages. The younger the youth, themore parents should monitor where youth may go on the internet and who is talking to them. The older the youth, the moreparents will need to educate and partner with the youth to practice safety.Where to Learn df/parental monitoring factsheet.pdfhttp://www.cyberpatrol.com/11

ren-infographic/FOSTA-SESTA BillThe intent of the law is to protect youth, however the law does not replace the diligence that parents need and thecautiousness that youth need to practice while online. Even though Backpage has been shut down, other sites are beingcreated and gaining traffic for example, Bedpage is a spin-off of Backpage.Where to Learn senate-bill/1693/summary/01Educated Youth that Practice SafetyParents and laws cannot do it alone. Youth need support and partnership of educated youth who see the potential dangers,and want to practice being safe online. This is the foundation that will allow for successful barriers to trafficker attempts.Where to learn ctsafely.org/contracts/12

Social media allows traffickers to ascertain what a youth's vulnerabilities are easier, whereas pre-social media, learning and understanding these vulnerabilities was a process that took more time. I think social media itself tends to provide an easy access to identified vulnerabilities whereas previously, traffickers may

Related Documents:

PSI AP Physics 1 Name_ Multiple Choice 1. Two&sound&sources&S 1∧&S p;Hz&and250&Hz.&Whenwe& esult&is:& (A) great&&&&&(C)&The&same&&&&&

Argilla Almond&David Arrivederci&ragazzi Malle&L. Artemis&Fowl ColferD. Ascoltail&mio&cuore Pitzorno&B. ASSASSINATION Sgardoli&G. Auschwitzero&il&numero&220545 AveyD. di&mare Salgari&E. Avventurain&Egitto Pederiali&G. Avventure&di&storie AA.&VV. Baby&sitter&blues Murail&Marie]Aude Bambini&di&farina FineAnna

The program, which was designed to push sales of Goodyear Aquatred tires, was targeted at sales associates and managers at 900 company-owned stores and service centers, which were divided into two equal groups of nearly identical performance. For every 12 tires they sold, one group received cash rewards and the other received

College"Physics" Student"Solutions"Manual" Chapter"6" " 50" " 728 rev s 728 rpm 1 min 60 s 2 rad 1 rev 76.2 rad s 1 rev 2 rad , π ω π " 6.2 CENTRIPETAL ACCELERATION 18." Verify&that ntrifuge&is&about 0.50&km/s,∧&Earth&in&its& orbit is&about p;linear&speed&of&a .

SEX LINKED INHERITANCE The characters for which genes are located on sex or ‘X’ chromosomes which occurs in different numbers in two sexes and the absence of its allele in the ‘Y’ chromosome are known as sex linked traits. Such genes are called sex linked genes and linkage of such genes is referred to as sex linkage.

Edexcel One90 High Holborn London WC1V 7BH September 2013 . ONLY in January 2014) IAL code January 2014 BIOLOGY 6BI01 No transitional code. Use the IAL code* WBI01 . Use the IAL code* WME01 6678 – Mechanics 2 No transitional code. Use the IAL code* WME02 6679

theJazz&Band”∧&answer& musical&questions.&Click&on&Band .

6" syl 4" syl 12" swgl @ 45 & 5' o.c. 12" swchl 6" swl r1-1 ma-d1-6a 4" syl 4" syl 2' 2' r3-5r r4-7 r&d 14.7' 13' cw open w11-15 w16-9p ma-d1-7d 12' 2' w4-3 moonwalks abb r&d r&d r&d r&d r&d r&d ret ret r&d r&d r&d r&d r&d 12' 24' r&d ma-d1-7a ma-d1-7b ret r&d r&d r5-1 r3-2 r&d r&r(b.o.) r6-1r r3-2 m4-5 m1-1 (i-195) m1-1 (i-495) m6-2l om1-1 .