1. September 21, 2015
Using Technology to Counter Human Trafficking
Researchers: Sarah Godoy, MSW and Kathleen Baca, MaEd
Project Manager: Rebecca Sadwick
Faculty Advisor: John Villasenor, Ph.D.
Luskin Center for Innovation, University of California, Los Angeles
2. Google has tasked UCLA with suggesting
recommendations to combat human trafficking
Explore Human Trafficking Across the U.S.
Focus: Domestic-born sex trafficked and labor trafficked minors
Depict Geographic Manifestations of Trafficking
Focus: High-intense areas
Collect New Data
Focus: Gaps and Needs
Develop
Recommendations
Focus: Technology
Scope of Work Current Data Themes Recommendations Conclusions
3. Reviewing extant literature informs research gaps
Scope of Work Current Data Themes Recommendations Conclusion
Exploiter initiates
conversation with child
via social media
Exploiter sends minor new phone
to communicate
• Minor agrees to meet
her new “boyfriend” in
person
Minor is trapped
• Exploiter advertises
minor on
Backpage.com
Minor is sold for sex
4. To drive the final recommendations, the team collected
primary source data
Scope of Work Current Data Themes Recommendations Conclusion
• Across all sectors
• All areas of traffickingTraining
5. To drive the final recommendations, the team collected
primary source data
Scope of Work Current Data Themes Recommendations Conclusion
Collaborate
• Intersectional
• Cross-sectional
6. To drive the final recommendations, the team collected
primary source data
Scope of Work Current Data Themes Recommendations Conclusion
Current
Tech
• Lack of awareness
• Need to leverage
7. To drive the final recommendations, the team collected
primary source data
Scope of Work Current Data Themes Recommendations Conclusion
Collaborate
Current
Tech
Develop
Tech
• Intersectional
• Cross-sectional
• Lack of awareness
• Need to leverage
• Across all sectors
• All areas of traffickingTraining
• Invest in innovative
ideas
Themes
8. Researchers recommend using technology in the
following ways
Scope of Work Current Data Themes Recommendations Conclusion
National Database
Law EnforcementVictim
Emergency Help
Service Providers
Available Services
in real-time
9. Identified challenges to mitigate during implementation
● Financial concerns
● Policies and regulations
● Confidentiality
● Sensitive information
● Safety Issues
● Access
● Hacking
● Maintenance
Scope of Work Current Data Themes Recommendations Conclusion