top of page

Human Trafficking and Exploitation

U.S. Resources

Outside U.S.

According to the International Labor Organization more than 4.8 million individuals are victims of human trafficking worldwide.   Criminals use social media such as Facebook, Twitter, Instagram, as well as dating apps like Tinder to find and groom vulnerable segments of the digital population.

While many instances of Human trafficking involve female victims and sexual exploitation, human trafficking is a problem that knows no gender.  Children and adults alike are often forced into extreme low wage labor or slave labor.  

 

Tools, Techniques, and Tactics:

  • Facebook;

  • Twitter;

  • Instagram;

  • Tinder;

  •  Vivastreet;

  • Adultwork;

  • Web Cam Pornography;

  • Pornographic Videos;

  • Cellphone Tracking;

  • GPS Tracking.

Anti-Terrorism and Anti-Hate

Both the events of 9/11 and the recent storming of the Nation's Capitol were planned largely online.  Per the FBI, domestic and foreign hate organizations have "extensive presence on the Internet through messaging platforms and online images, videos, and publications."  Online message boards and social media are tools used to radicalize members as well as plan attacks on civilians and the infrastructure upon which they rely.  

Tools, Techniques, and Tactics:

  • Parler;

  • Discord;

  • Telegram;

  • Gab;

  • MeWe;

  • Patriot.win;

  • Oath Keepers;

  • Q Anon;

  • Stormfront.org; and

  • redice.tv.

Computer Fraud, Crime, and Abuse 

Companies and government entities spend millions a year on cybersecurity, but very few resources exist for individuals who have been targeted by criminals.  Digital citizens are frequently the targets of financial fraud, account hijacking, malware, and ransomware that are often overwhelming to the average user.  

CivicSOC provides resources and collective advocacy to help digital citizens protect, respond, and recover from computer abuse and crime. 

 

Tools, Techniques, and Tactics:

  • Ransomware;

  • Spyware;

  • Phishing;

  • Account Scraping;

  • Account Hijacking; and

  • Financial Fraud.

bottom of page