{"id":4013,"date":"2017-07-26T00:00:00","date_gmt":"2017-07-26T06:58:32","guid":{"rendered":"https:\/\/staging.voelkerrechtsblog.org\/articles\/on-cyber-trafficking-and-the-protection-of-its-victims\/"},"modified":"2020-12-09T13:16:39","modified_gmt":"2020-12-09T12:16:39","slug":"on-cyber-trafficking-and-the-protection-of-its-victims","status":"publish","type":"post","link":"https:\/\/voelkerrechtsblog.org\/de\/on-cyber-trafficking-and-the-protection-of-its-victims\/","title":{"rendered":"On \u2018cyber trafficking\u2019 and the protection of its victims"},"content":{"rendered":"<p style=\"text-align: justify;\">\u2018Cyber trafficking\u2019 has become a buzzword in scientific and policy discussions related to human trafficking. However, as has been noted <a href=\"http:\/\/blogs.bu.edu\/ggreiman\/files\/2013\/10\/ICIW2013JournalonInfoWarfareGREIMAN.pdf$\">elsewhere<\/a>, the term is far from being used in a uniform way. In her recent <a href=\"https:\/\/voelkerrechtsblog.org\/cyber-trafficking-an-interpretation-of-the-palermo-protocol-in-the-digital-era\/\">post<\/a>, Sabine Witting discusses the case of trafficking that is exclusively committed online. In my view, \u2018cyber trafficking\u2019 is a much more wide-spread phenomenon than what her article seems to imply, occurring within many cases of \u2018traditional\u2019 trafficking. In the following, I will clarify my understanding of \u2018cyber trafficking\u2019 and I will argue that the term itself has no independent legal value, because even the very extreme example used by Sabine Witting falls under the trafficking definition. I will then re-examine the current definition of human trafficking, arguing <em>contra<\/em> Witting that even actions which are performed exclusively online can fall within the definition of human trafficking as articulated in the Palermo Protocol. More importantly, in my view, the focus should rather lie on victim protection and how it can be adapted to this new modus operandi of traffickers, for example by the use of \u2018new\u2019 technologies for victim identification, protection and support.<\/p>\n<p><strong>What is \u2018cyber\u2019 trafficking?<\/strong><\/p>\n<p style=\"text-align: justify;\">The term \u2018cyber trafficking\u2019 is used in an inconsistent way throughout the literature. However, simply put, the prefix \u2018cyber\u2019 essentially denotes everything \u2018<a href=\"https:\/\/www.merriam-webster.com\/dictionary\/cyber\">relating to, or involving computers or computer networks (such as the Internet)<\/a>\u2019. Therefore, \u2018cyber trafficking\u2019 should essentially be understood as human trafficking that is committed with the help of computer networks. Since trafficking is a crime, \u2018cyber\u2019 trafficking is not only covered by the respective international anti-trafficking instruments such as the 2000 \u2018<a href=\"http:\/\/www.ohchr.org\/EN\/ProfessionalInterest\/Pages\/ProtocolTraffickingInPersons.aspx\">Palermo Protocol<\/a>\u2019 and the 2005 Council of Europe <a href=\"http:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/197\">Convention on Action against Trafficking in Human Beings<\/a>, but it also falls under the 2001 Council of Europe <a href=\"https:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/185\">Convention on Cybercrime<\/a>, the first international treaty on crimes committed via the internet.<\/p>\n<p style=\"text-align: justify;\">There are many ways human trafficking becomes \u2018cyber\u2019: Traffickers may use online chatrooms, social media, online employment agencies or forged immigration assistance websites to <em>recruit<\/em> potential victims. They might use online platforms (be they <a href=\"http:\/\/www.nytimes.com\/2010\/09\/05\/technology\/05craigs.html\">\u2018publicly\u2019 accessible<\/a> or in a darknet) to <em>offer the services<\/em> of their victims and connect them with clients and customers. These services range from forced prostitution, child pornography, mail-order brides, forced labour to the vending of babies or human organs. The <em>payment<\/em> for these services can also be made online with cryptocurrencies such as Bitcoin. Furthermore, traffickers might use Internet technology to <em>control <\/em>their victims, for example with cell phones or webcams.<\/p>\n<p style=\"text-align: justify;\">Each of the three cumulative elements of the trafficking definition can thus be committed in a \u2018cyber\u2019 way: the recruitment or the transportation and the offering of the victims (the <em>\u2018action\u2019<\/em> element), the use of coercion and threat, fraud and deception (the <em>\u2018means\u2019<\/em> element), and even the actual exploitation (the <em>\u2018purpose\u2019<\/em> element) can all take place with the help of the Internet. The best-known example of \u2018cyber\u2019 exploitation is the so-called cybersex industry in the Philippines, where <a href=\"http:\/\/www.dw.com\/en\/the-philippines-booming-cybersex-industry\/a-19026632\">children are allegedly forced to perform sexual acts in front of web cameras<\/a>, sometimes with the possibility for the \u2018consumers\u2019 to give directions.<\/p>\n<p style=\"text-align: justify;\">These examples indicate that the sharp distinction between \u2018cyber\u2019 trafficking and \u2018traditional (offline) trafficking\u2019 that Sabine Witting seems to imply in her article does not correspond to the reality of how human trafficking is performed nowadays. Indeed, most acts of trafficking are committed with the help of the Internet, therefore making \u2018cyber\u2019 trafficking a widespread phenomenon. In contrast, pure \u2018offline\u2019 trafficking seems to have become the exception.<\/p>\n<p style=\"text-align: justify;\">This observation naturally raises the question whether acts that are performed not only with the <em>help <\/em>of \u2018new technologies\u2019, but solely through them, can be considered to fall within the definition of human trafficking.<\/p>\n<p><strong>\u2018Cyber\u2019 exploitation, or: is there a requirement of movement?<\/strong><\/p>\n<p style=\"text-align: justify;\">This is why Sabine Witting, in her <a href=\"https:\/\/voelkerrechtsblog.org\/cyber-trafficking-an-interpretation-of-the-palermo-protocol-in-the-digital-era\/\">blog post<\/a>, raises a definitional question: Can a person who has been both recruited and exploited online be considered a victim of human trafficking under the definition of the Palermo Protocol, even though he or she never left the spot in front of the computer? As Witting rightly points out, the central question here is the one of <em>movement:<\/em> If, in order for the crime to meet the definition of trafficking, the victim must have (been) moved from one place to another, some cases of \u2018cyber\u2019 exploitation might not be qualified as trafficking, because the victim might have never moved out of his or her own house and was always only in front of the computer. Sabine Witting argues that movement, in the sense of geographical dislocation, is a necessary condition for the offense of human trafficking. This would mean that \u2018cyber\u2019 trafficking (or more precisely, the special example of exploitation in front of a computer) does not constitute trafficking. To fill this legal vacuum, Witting proposes to understand the element of movement as means of removing victims from their familiar environment. With this creative interpretation, controlling victims via the internet and using psychological methods to isolate them, might also be considered as removing them from their familiar environment and therefore there would have been \u2018movement\u2019.<\/p>\n<p style=\"text-align: justify;\">Besides the fact that the case cited (exploitation solely in front of the victim\u2019s own computer at home) is an extreme and somewhat constructed example, from a legal point, the assumption that movement is a <em>conditio sine qua non<\/em> has no basis in international law and doctrine. To support her argument, Witting argues that if a family offers her child to be sexually exploited at home, by welcoming clients to the house to sexually abuse the child, nobody would think of laying charges of human trafficking against the family, but rather charge them with child prostitution or similar offences<em>.<\/em> Wittings claim rests on shaky ground, especially because the mere fact that \u2018nobody would think of laying charges of human trafficking\u2019 is not a legal argument at all. Moreover, at least two additional legal arguments speak against her claim:<\/p>\n<ul style=\"text-align: justify;\">\n<li>First, from a grammatical perspective, the \u2018action element\u2019 of the Palermo definition does not even contain the word \u2018movement\u2019, but refers to \u2018recruitment, transportation, transfer, harbouring <em>or<\/em> receipt of persons\u2019.<\/li>\n<li>Second, the definition is drafted in alternative terms, clearly indicated by the word \u2018or\u2019. This has been supported by several international bodies such as the <a href=\"http:\/\/crime-in-crisis.com\/en\/wp-content\/uploads\/2017\/06\/74-SYKIOTOU-KOURAKIS-FS_Final_Draft_26.4.17.pdf\">OHCHR<\/a>, cited by Witting herself, or the <a href=\"https:\/\/rm.coe.int\/16800d3812\">drafters<\/a> of the European Convention against Trafficking, to name just a few. Also, <a href=\"http:\/\/www.cambridge.org\/ch\/academic\/subjects\/law\/human-rights\/human-trafficking-and-slavery-reconsidered-conceptual-limits-and-states-positive-obligations-european-law?format=HB&amp;isbn=9781107162280#EC8Dq37PWeVpCIhB.97\">legal doctrine<\/a> supports this interpretation.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Therefore, in a case like the one cited by Witting, the element of \u2018harbouring\u2019 would be fulfilled and therefore the act may be qualified as trafficking if the other elements of the definitions are met. This makes it clear that the term \u2018cyber trafficking\u2019 has no independent legal significance, because even this very extreme example falls under the \u2018traditional\u2019 definition of trafficking.<\/p>\n<p style=\"text-align: justify;\">Why is it nevertheless crucial to determine whether \u2018cyber\u2019 exploitation falls within the definition of human trafficking or not? The answer lies in the peculiarities of international anti-trafficking law, and the unprecedented level that international law affords to victims of human trafficking, but not to victims of cybercriminality. I will use the remaining paragraphs to draw attention to the very important question of victim protection under international law.<\/p>\n<p><strong>A unique level of victim protection in trafficking cases<\/strong><\/p>\n<p style=\"text-align: justify;\">Like no other international law enforcement instrument, international anti-trafficking law obliges States to take proactive measures in favour of (actual and potential) victims of human trafficking. For example, Article 6 of the Palermo Protocol requires States to provide assistance and protection to victims, which includes protection of privacy, identity and physical safety as well as measures to provide for the physical, psychological and social recovery of the victim, such as appropriate housing, counselling and information, medical, psychological and material assistance and employment, educational and training opportunities. There has been <a href=\"http:\/\/traffickingroundtable.org\/wp-content\/uploads\/2012\/07\/Human-Rights-and-the-New-UN-Protocols.pdf\">legitimate criticism<\/a> because of the vague wording of these provisions, however, these findings do not apply in the European context: The Council of Europe Convention on Action against Trafficking in Human Beings, which is also open for ratification by non-members states of the Council of Europe, explicitly pursues a victim-centred and human rights-based approach and frames the duties to protect and support victims in a much stronger language. The Convention contains duties to detect and identify victims as well as to grant them a \u2018recovery and reflection period\u2019, both being quite unique duties in comparison to other law enforcement instruments.<\/p>\n<p style=\"text-align: justify;\">Furthermore, the European Court of Human Rights has recognized vast positive obligations of States towards victims of human trafficking under Article 4 (prohibition of slavery and forced labour) of the <a href=\"http:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/005\">European Convention on Human Rights<\/a>. These obligations also serve as an inspiration for other monitoring bodies throughout the world. Most of them have also been recognised by the UN Human Rights Treaty Bodies. Positive obligations under Article 4 ECHR include: an obligation to penalize and prosecute trafficking effectively, an obligation to take operational measures to protect (potential) victims of trafficking, and a procedural obligation to investigate situations of potential trafficking. Furthermore, in recent judgements, the Court increasingly draws explicitly on the victim protection provisions of the Council of Europe Convention on Action against Trafficking such as the duty to identify victims (see case of <a href=\"http:\/\/hudoc.echr.coe.int\/eng?i=001-160218\">L.E. v Greece<\/a> and <a href=\"http:\/\/hudoc.echr.coe.int\/eng?i=001-170388\">J. and others v Austria<\/a>), the granting of a recovery and reflection period (see case of <a href=\"http:\/\/hudoc.echr.coe.int\/eng?i=001-172365\">Chowdury and others v Greece<\/a>) and the duty to support victims (see again case of <a href=\"http:\/\/hudoc.echr.coe.int\/eng?i=001-170388\">J. and others v Austria<\/a>), thereby recognising these duties as human rights obligations as well.<\/p>\n<p style=\"text-align: justify;\">In comparison to any other law enforcement instrument, the international anti-trafficking law makes (potential) victims of trafficking probably the victim group with the most extensive range of individual rights, at least in Europe. No other group of victims of a particular crime has such a broad range of rights, be it victims of <a href=\"http:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/210\">violence against women<\/a>, of <a href=\"http:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/201\">child sexual exploitation<\/a> or of <a href=\"https:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/185\">cybercrime<\/a>.<\/p>\n<p style=\"text-align: justify;\">If \u2018cyber trafficking\u2019 would \u2013 as a consequence of a restrictive interpretation of the definition \u2013 fall only under the European Cybercrime Convention, its victims would not receive any specific individual measure of protection or support and States would not be obliged to identify them as victims of cybercrime, and to grant them for example a recovery and reflection period or provide for adequate housing or legal counselling.<\/p>\n<p><strong>The need for victim-centred research<\/strong><\/p>\n<p style=\"text-align: justify;\">However, even though \u2018cyber\u2019 trafficking has increasingly become a topical issue in research on trafficking and cybercrime, there is a surprising lack of research about victim protection in \u2018cyber\u2019 trafficking cases. Indeed, to date, the research centres mainly on questions of law enforcement such as strategies to combat trafficking online or the use of digital evidence in court cases. Yet, victim protection is as important for the combat of human trafficking as is prosecution, not least because often the whole criminal case rests on the victims\u2019 testimonies and it is well known that victims do not tend to cooperate with the authorities if they are not adequately protected and supported. The need for empirical as well as legal research is therefore pressing: How can \u2018cyber\u2019 victims be detected and identified? How to protect and support these victims? Do they have other needs than victims of \u2018offline\u2019 trafficking? If the trafficking itself takes place online, is there a possibility for online victim protection as well? From a victim-centred, human rights-based view, these should be some of the guiding questions for future research.<\/p>\n<p>&nbsp;<\/p>\n<p><em><a href=\"https:\/\/www.unifr.ch\/ius\/euroinstitut_de\/ueber_uns\/team\/team_mitarbeitende?id=215992&amp;type=all\" target=\"_blank\" rel=\"noopener noreferrer\">Nula Frei<\/a> is a senior researcher and lecturer at the Institute of European Law at University of Fribourg. Her doctoral thesis, which will be published by Nomos Verlag by the end of 2017, focused on the protection of victims of trafficking in asylum procedures. <\/em><\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>Cite as: Nula Frei, &#8220;On \u2018cyber trafficking\u2019 and the protection of its victims&#8221;, <em>V\u00f6lkerrechtsblog<\/em>, 26\u00a0July\u00a02017, doi:\u00a0<a href=\"http:\/\/dx.doi.org\/10.17176\/20170731-180154\">10.17176\/20170731-180154<\/a>.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>\u2018Cyber trafficking\u2019 has become a buzzword in scientific and policy discussions related to human trafficking. However, as has been noted elsewhere, the term is far from being used in a uniform way. In her recent post, Sabine Witting discusses the case of trafficking that is exclusively committed online. In my view, \u2018cyber trafficking\u2019 is a [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6639],"tags":[],"authors":[4738],"article-categories":[6000],"doi":[],"class_list":["post-4013","post","type-post","status-publish","format-standard","hentry","category-uncategorized","authors-nula-frei","article-categories-article"],"acf":{"subline":""},"meta_box":{"doi":""},"_links":{"self":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/4013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/comments?post=4013"}],"version-history":[{"count":0,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/4013\/revisions"}],"wp:attachment":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/media?parent=4013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/categories?post=4013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/tags?post=4013"},{"taxonomy":"authors","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/authors?post=4013"},{"taxonomy":"article-categories","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/article-categories?post=4013"},{"taxonomy":"doi","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/doi?post=4013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}