When not detecting intelligence threats to oil rigs and dams, Sergio Caltagirone spends his spare time hunting a different kind of predator — traffickers trading in human beings, from war-torn Syria to sleepy US suburbs.
The Seattle-based computer scientist, who previously worked for the US Department of Defense, Microsoft and NASA, is one of a new breed of digital hacker sleuths who are saving lives by tracking down traffickers and rescuing victims on the Internet.
“It’s just like any other business in the world,” said Caltagirone, who set up the Global Emancipation Network (GEN) with his wife, Sherrie, two years ago to analyze data to help law enforcers counter human trafficking.
“If you know how to find it, you will see it almost everywhere — almost every major site has some component of trafficking in it,” said Caltagirone, whose day job is with the industrial cybersecurity firm Dragos.
Opinion is divided about the rise of hacker sleuths who deploy their cutting-edge knowledge, skills and experience to support governments that often lack the time, motivation and innovative tools to tap into criminal slavery networks.
Human trafficking is among the world’s largest international criminal industries, with about 25 million people trapped in forced labor estimated to generate illicit profits of US$150 billion a year — and one which is moving increasingly online.
The US-based National Center for Missing and Exploited Children last year said that almost three-quarters of suspected child trafficking reports it received from the public involved the sex advertising Web site Backpage.com.
Backpage — described by campaigners as the US’ largest online marketplace for child sex trafficking — was shut down in April and its founders were charged in a 93-count indictment, including knowingly facilitating prostitution.
However, the years of lobbying that preceded the crackdown showed how authorities with limited digital expertise struggle to stop criminals who use technology at every stage of their business, from recruiting via social media to tracking victims using webcams.
“You have to know exactly where to go,” said Sharon Nimirovski, chief executive of White Hat, an Israeli cybersecurity firm staffed by former military intelligence agents. “You have to go undercover and live the hacker cyberscene, know its structure and pretend to be someone you are not in order to retrieve the data that you are looking for.”
While the precise methods used by hacker activists are veiled in secrecy, Nimirovski said that his team has used false digital identities to infiltrate hidden cybercrime Web sites to gather information on pedophiles.
“Just like the police work in the physical world, ‘white hackers’ act in the digital dimension,” he said, adding that his white hat hackers — or hackers working for good — share the criminal evidence they unearth with authorities.
GEN, which is run by volunteers, collects text and images from the open and dark Web — a part of the Internet invisible to search engines and only reachable using specialized software — to look for patterns that could indicate trafficking.
Via its Minerva platform, it shares this suspicious online activity for free with law enforcement, researchers and anti-trafficking charities that often do not have the capabilities to trawl the online black market and message boards.
The software allows investigators to search through data from millions of — often hidden — Internet pages using keywords, usernames and telephone numbers to find out what other sites their suspects visit and who else they communicate with, GEN said.
Digital evidence gleaned from visa blacklists, bitcoin transactions and sexual advertisements could help to arrest traffickers by predicting where victims might go, via which routes and who is likely to buy or sell them, experts say.
“The earlier you move into the kill chain, the more effective your disruption becomes and the more people you ultimately save,” Caltagirone said.
One of the routes GEN is tracking closely is that of people moving to eastern Europe from Syrian refugee camps, often in the hope of finding lucrative jobs advertised on fake Web sites.
“Of course these victims are going to be very willing,” Caltagirone said, highlighting how technology has not only made it easier for migrants to reach Europe, but also enabled criminals to trick people into trafficking themselves and their families.
“This is where you’ll get parents who sold their children,” he said.
However, caution is required, as hackers might not have the training needed to collect evidence that is admissible in court, said former Northwest England chief prosecutor Nazir Afzal, a lawyer who has fought major cases involving sexual slavery and child abuse.
“If, in some [human trafficking] cases, hacking leads to the early detection of a big vulnerability, that’s fine, I suppose,” former Europol director Rob Wainwright said.
However, “we have to be very careful about encouraging online vigilantism,” he added. “We have to do things in the right way.”
Others said that private digital sleuths can play a vital role, particularly when working with the police.
“Law enforcement, in many countries, either lack the financial resources or human resources, or both, needed to perform cybercrime investigations efficiently and swiftly,” Chatham House cyber-research fellow Joyce Hakmeh said.
“Most, if not all, cybercrime investigations require public-private partnerships and getting the right experts on board,” she said in e-mailed comments, adding that ethical hackers working with the police can make an important contribution in cracking cases.
GEN is confident that hackers have a key role to play in combating trafficking and boosting prosecutions.
In 2016, such cases numbered about 9,000, US government data showed.
“We’re not here to save the world, but GEN is here to make people who are saving the world even better at doing it,” Caltagirone said.
As it has striven toward superiority in most measures of the Asian military balance, China is now ready to challenge the undersea balance of power, long dominated by the United States, a decisive advantage crucial to its ability to deter blockade and invasion of Taiwan by the People’s Liberation Army (PLA) of the Chinese Communist Party (CCP). America expended enormous treasure to develop the technology, logistics, training, and personnel to emerge victorious in the Cold War undersea struggle against the former Soviet Union, and to remain superior today; the US is not used to considering the People’s Liberation Army Navy (PLAN)
The annual summit of East Asia and other events around the ASEAN summit in October and November every year have become the most important gathering of leaders in the Indo-Pacific region. This year, as Laos is the chair of ASEAN, it was privileged to host all of the ministerial and summit meetings associated with ASEAN. Besides the main summit, this included the high-profile East Asia Summit, ASEAN summits with its dialogue partners and the ASEAN Plus Three Summit with China, Japan and South Korea. The events and what happens around them have changed over the past 15 years from a US-supported, ASEAN-led
Lately, China has been inviting Taiwanese influencers to travel to China’s Xinjiang region to make films, weaving a “beautiful Xinjiang” narrative as an antidote to the international community’s criticisms by creating a Potemkin village where nothing is awry. Such manipulations appear harmless — even compelling enough for people to go there — but peeling back the shiny veneer reveals something more insidious, something that is hard to ignore. These films are not only meant to promote tourism, but also harbor a deeper level of political intentions. Xinjiang — a region of China continuously listed in global human rights reports —
President William Lai’s (賴清德) first Double Ten National Day address had two strategic goals. For domestic affairs, the speech aimed to foster consensus on national identity, strengthen the country and unite the Taiwanese against a Chinese invasion. In terms of cross-strait relations, the speech aimed to mitigate tensions in the Taiwan Strait and promote the coexistence and prosperity of the People’s Republic of China (PRC) in China and the Republic of China (ROC). Lai is taking a different stance from previous Democratic Progressive Party (DPP) administrations on domestic political issues. During his speech, he said: “The PRC could not be the