Unveiling the Subterranean Web using A Comprehensive Analysis of Digital Human Trafficking Networks and Covert Operations
DOI:
https://doi.org/10.61963/jkt.v2i1.84Keywords:
Covert Operations, Blockchain Analytics, Cryptocurrency Transactions, Digital Human TraffickingAbstract
This study dives into the hidden operations of virtual human trafficking networks, with an emphasis on the quantitative examination of bitcoin transaction volume. Our data reveal a modest financial scale with a wide variety of transaction amounts, emphasizing the resilience and diversity of traffickers' economic strategies. Cryptocurrencies, like Bitcoin, have emerged as key facilitators of unlawful activities, demanding joint efforts across the cybersecurity and regulatory enforcement sectors. Technological equipment, particularly blockchain analytics and transaction monitoring, are critical for tracing and understanding these transactions. Policymakers are urged to develop dynamic regulatory measures and promote public-private collaborations to find a compromise between privacy concerns and the transparency required in bitcoin transactions. The study adds significantly to our understanding of the monetary dynamics inside digital human trafficking networks, giving subtle insights that will inspire targeted interventions and adaptive solutions. Ongoing research, combining both qualitative and quantitative elements, is crucial for staying ahead of traffickers and developing effective interventions to protect vulnerable people. Our findings contribute to the greater discussion about combating digital human trafficking, underlining the importance of technical advancements, changing legislative frameworks, and collaborative activities.
References
Akcinaroglu, S., & Shi, M. (2023). Exploring the Impact of Cryptocurrency on Terrorism. Terrorism and Political Violence, 1-25. https://doi.org/10.1080/09546553.2023.2275057
Amble, J. C. (2012). Combating terrorism in the new media environment. Studies in Conflict & Terrorism, 35(5), 339-353. https://doi.org/10.1080/1057610X.2012.666819
Amedie, J. (2015). The impact of social media on society.
Andersson, D. (2020). A novel approach to calculate individuals’ carbon footprints using financial transaction data–App development and design. Journal of Cleaner Production, 256, 120396. https://doi.org/10.1016/j.jclepro.2020.120396
Asal, V. H., Rethemeyer, R. K., & Schoon, E. W. (2019). Crime, conflict, and the legitimacy trade-off: Explaining variation in insurgents’ participation in crime. The Journal of Politics, 81(2), 399-410. https://doi.org/10.1086/701492
Chachko, E. (2021). National Security by Platform. Stan. Tech. L. Rev., 25, 55.
Cooke, S. J., Bergman, J. N., Twardek, W. M., Piczak, M. L., Casselberry, G. A., Lutek, K., ... & Lennox, R. J. (2022). The movement ecology of fishes. Journal of Fish Biology, 101(4), 756-779.
Dawson, M., Omar, M., Abramson, J., Leonard, B., & Bessette, D. (2017). Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things. In Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (pp. 204-235). IGI Global. https://doi.org/10.4018/978-1-5225-0703-1.ch010
Dell, N. A., Maynard, B. R., Born, K. R., Wagner, E., Atkins, B., & House, W. (2019). Helping survivors of human trafficking: A systematic review of exit and postexit interventions. Trauma, Violence, & Abuse, 20(2), 183-196. https://doi.org/10.1177/1524838017692553
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239, 288.
DeStefano, A. (2007). The war on human trafficking: US policy assessed. Rutgers University Press.
Dougherty, D., & Dunne, D. D. (2012). Digital science and knowledge boundaries in complex innovation. Organization Science, 23(5), 1467-1484. https://doi.org/10.1287/orsc.1110.0700
Dupuis, D., & Gleason, K. (2020). Money laundering with cryptocurrency: open doors and the regulatory dialectic. Journal of Financial Crime, 28(1), 60-74. https://doi.org/10.1108/JFC-06-2020-0113
Emser, M. (2013). The politics of human trafficking in South Africa: a case study of the KwaZulu-Natal intersectoral task team and South African counter-trafficking governance (Doctoral dissertation).
Finnemore, M., & Hollis, D. B. (2016). Constructing norms for global cybersecurity. American Journal of International Law, 110(3), 425-479. https://doi.org/10.1017/S0002930000016894
Gelinas, L., Pierce, R., Winkler, S., Cohen, I. G., Lynch, H. F., & Bierer, B. E. (2017). Using social media as a research recruitment tool: ethical issues and recommendations. The American Journal of Bioethics, 17(3), 3-14. https://doi.org/10.1080/15265161.2016.1276644
Ghappour, A. (2017). Searching places unknown: Law enforcement jurisdiction on the dark web. Stan. L. Rev., 69, 1075.
Giddens, L., Petter, S., & Fullilove, M. H. (2023). Information technology as a resource to counter domestic sex trafficking in the United States. Information Systems Journal, 33(1), 8-33. https://doi.org/10.1111/isj.12339
Holland, N., Bolognesi, C., Kirsch-Volders, M., Bonassi, S., Zeiger, E., Knasmueller, S., & Fenech, M. (2008). The micronucleus assay in human buccal cells as a tool for biomonitoring DNA damage: the HUMN project perspective on current status and knowledge gaps. Mutation Research/Reviews in Mutation Research, 659(1-2), 93-108. https://doi.org/10.1016/j.mrrev.2008.03.007
Honar Pajooh, H., Rashid, M. A., Alam, F., & Demidenko, S. (2021). IoT Big Data provenance scheme using blockchain on Hadoop ecosystem. Journal of Big Data, 8, 1-26. https://doi.org/10.1186/s40537-021-00505-y
Janssen, M. A., Anderies, J. M., & Ostrom, E. (2007). Robustness of social-ecological systems to spatial and temporal variability. Society and Natural Resources, 20(4), 307-322. https://doi.org/10.1080/08941920601161320
Kim, T., Ochoa, J., Faika, T., Mantooth, H. A., Di, J., Li, Q., & Lee, Y. (2020). An overview of cyber-physical security of battery management systems and adoption of blockchain technology. IEEE Journal of Emerging and Selected Topics in Power Electronics, 10(1), 1270-1281. https://doi.org/10.1109/JESTPE.2020.2968490
Konrad, R. A., Maass, K. L., Dimas, G. L., & Trapp, A. C. (2023). Perspectives on how to conduct responsible anti-human trafficking research in operations and analytics. European Journal of Operational Research, 309(1), 319-329. https://doi.org/10.1016/j.ejor.2022.12.028
McGuinness, S. R. (2020). The Experiences of Opioid Sourcing Cryptomarket Users. University of Rochester.
Mendel, J., & Sharapov, K. (2016). Human trafficking and online networks: Policy, analysis, and ignorance. Antipode, 48(3), 665-684. https://doi.org/10.1111/anti.12213
Musto, J. (2019). The limits and possibilities of data-driven antitrafficking efforts. Ga. St. UL Rev., 36, 1147. https://doi.org/10.1111/jfb.15153
QC, F. G., Muraszkiewicz, J., & Vavoula, N. (2016). The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns. Computer Law & Security Review, 32(2), 205-217. https://doi.org/10.1016/j.clsr.2015.12.015
Ragnedda, M., & Muschert, G. W. (Eds.). (2017). Theorizing digital divides. Routledge.
Reddy, E., & Minnaar, A. (2018). Cryptocurrency: A tool and target for cybercrime. Acta Criminologica: African Journal of Criminology & Victimology, 31(3), 71-92. https://hdl.handle.net/10520/EJC-14d902942d
United Nations Office on Drugs and Crime. 2021. United Nations. 2004. United Nations Convention against Transnational Organized Crime and the Protocols thereto. Available at: https://www.unodc.org/documents/middleeastandnorthafrica/organised-crime/UNITED_NATIONS_CONVENTION_AGAINST_TRANSNATIONAL_ORGANIZED_CRIME_AND_THE_PROTOCOLS_THERETO.pdf [Accessed 1 December 2023]
UNODC, n.d. United Nations Convention against Transnational Organized Crime and the Protocols Thereto Available at: https://www.unodc.org/unodc/en/organized-crime/intro/UNTOC.html [Accessed 3 December 2023]
Upadhyay, A., Mukhuty, S., Kumar, V., & Kazancoglu, Y. (2021). Blockchain technology and the circular economy: Implications for sustainability and social responsibility. Journal of cleaner production, 293, 126130. https://doi.org/10.1016/j.jclepro.2021.126130
Warren, K. B. (2012). Troubling the victim/trafficker dichotomy in efforts to combat human trafficking: the unintended consequences of moralizing labor migration. Indiana Journal of global legal Studies, 19(1), 105-120. https://doi.org/10.2979/indjglolegstu.19.1.105
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Judikaltura

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Please find the rights and licenses in Register: Journal of Judikaltura. By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
Register's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Register permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Register on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
Copyright and other proprietary rights relating to the article, such as patent rights,
The right to use the substance of the article in own future works, including lectures and books,
The right to reproduce the article for own purposes,
The right to self-archive the article (please read out deposit policy),
The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Register: Jurnal Ilmiah Teknologi Sistem Informasi).
5. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Register will not be held liable for anything that may arise due to the author(s) internal dispute. Register will only communicate with the corresponding author.
6. Royalties
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that Register entitles the author(s) to no royalties or other fees.
7. Miscellaneous
Register will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Register's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.



