sherrie caltagirone executive director · business saw ad bp never seen majestic asian spa japanese...

Post on 01-May-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

@GblEmancipation@SBCaltagirone

Sherrie CaltagironeExecutive Director

Agenda

2

Know Thine Enemy

Connecting Silos

Deciphering Crypto Language

Creating Behavioral Analytics

Incremental Innovation

Human Trafficking and Criminal Convergence

Human Trafficking and Criminal Convergence

What’s Trafficking?

“The recruitment, transportation, transfer, harboring,or receipt of persons by means of threat, force,abduction, fraud, deception or abuse of power andgiving or receiving payments or benefits to exertcontrol over another without their consent for thepurpose of exploitation.”

This Photo by Unknown Author is licensed under CC BY-SA

• Sex Trafficking• Forced Labor• Debt Bondage• Domestic

Servitude

• Child Soldiering• Mail-Order

Brides• Forced Begging• Child Sex

Tourism

Trafficking by the Numbers

Source: United States Dept of State - Trafficking in Persons Report 2019.

150billion worldwide

annually

____$ ____2nd

most profitable crime globally

____45.8

____11,096

prosecutions in 2018

____7,481

convictions in 2018

____

85,613victims identified in 2018

Know Thine Enemy

Cyber Kill

Chain

• “KILL CHAIN ANALYSIS IS A GUIDE FOR ANALYSTS TO UNDERSTAND WHAT INFORMATION IS, AND MAY BE, AVAILABLE FOR DEFENSIVE COURSES OF ACTION.” – LOCKHEED MARTIN

Human Trafficking Kill Chain

Strength of Action

Length of Impact

Impact Spectrum

Disrupt

Deny

Detect

Degrade

Deceive

Destroy

Connecting Silos

Non-Profits PublicGovernment

Government Agencies

International Organizations

Law Enforcement

Justice System

Legislators

Anti-Trafficking Organizations

Victim Services

Hotline Operators

Academics

Private Businesses

Internet Service Providers

Healthcare Providers

Counter-Trafficking StakeholdersWho Owns the Data?

Deciphering Crypto Language

sorta strange encounter back florida business wanted challenge adventure picking relatively unknown spa well shoulda stuck usual haunts floidabusiness saw ad bp never seen majestic asian spa japanese spa thought would check thinking might totally refreshing discovery brand spanking new spa mamasan taiwan said girl japanese im sure heard short conversation chinese guess possible girl japanese spoke chinese anyway girl utterly devoid english language english words heard "sorry sorry sorry" understanding word said even understand question "what name" repeated several times one time asked name drew diagram looked sorta like japanesechinese character much name sorry guys new game skills rough first thought knew nothing massage felt might training started hard massage total lack english understand wanted lighten never smiled kept going hard massage girl tits sensitive pussy sensitive right way kissing bbbj cfs yet seemed trying innocent best good job shes nearly ready prime time especially lack english idea girls would go back try different girl girl easily undressed good sign others may would good another monger try place report findings

26.30681:-80.09441#

mamasan

total lack English

“sorry sorry sorry”

monger

kissing bbbj

brand spanking newbp

girls

Monitoring Language

Drift

19

Creating Behavioral Analytics

Source: “Human Trafficking in Illicit Massage Businesses,” Polaris. 2019.

Identifying Patterns of Behavior

25

Suspicious Patterns

26

Incremental Innovation

Minerva______________________

Objective:

✓Automated human trafficking content classifier

✓Transparent risk classification✓ Scalable solution✓Rapidly identify risky

businesses, individuals, ads, and reviews

✓Assist partners mitigate risk and liability

Labels: • Dress• Main Color: White• Stripes• Stripes Color: Red

Labels:• Bag• Red

Labels:• Badge/Emblem• Animal• Squirrel• Text: Dean Close Squirrels• Text Color: Yellow

Labels:• Jumper• Main Color: Red

Labels:• Socks• Main Color:

White

Labels:• Bag• Red

Labels:• Shoes• Main Color:

Black

Apply: Hunting Hackers →Hunting Traffickers

31

Predict Your Risk Level

Use Algorithms to Extract Meaning

Plan for Adversary Action

Make Informed Policy

Apply Cyber Security Skills to Help GEN:

Scalable Data Collection

Cryptocurrency Tech and Financial Classifiers

NLP Tools

Advanced OCR Tools and Techniques

Image and Video Analysis

@GblEmancipation

Global Emancipation Network

www.globalemancipation.ngo

minerva.globalemancipation.ngo

top related