Mobile Forensics & Human Trafficking

Because traffickers may move their victims in an effort to avoid detection, GPS and other location-based data can be valuable. This evidence may be on both victims’ and suspects’ mobile devices.


Human trafficking. Vice. Sexual and labor exploitation. No matter what you call it, the crimes and the people who commit them are among the worst of the worst—and most states, along with the federal government, have passed anti-trafficking laws. How does mobile forensics help investigators identify traffickers and rescue victims?

At the Crimes Against Children Conference last month, several thousand professionals from law enforcement, medical and mental health services, and advocacy centers converged on Dallas, Texas to learn the latest techniques in fighting child exploitation.

The crimes themselves can take many forms. Stalking, harassment and threats can be used against victims by pimps and pedophiles, as well as in dating and domestic violence. These perpetrators may also engage in sextortion, the manufacture of child pornography, and other forms of extreme degradation.

The professionals who come in contact with them can come from many walks, too. School resource officers, teachers and guidance counselors might encounter truant or runaway children who are working as prostitutes or in forced labor. Emergency room and pediatrician visits may bring victims in contact with medical and mental health professionals, who are mandated by law to report suspected crimes to police.

In turn, police need to know where and how to find evidence of these crimes. Physical evidence like bruising patterns, DNA and rape kits--among other signs and symptoms--paint only part of a picture. Very often in exploitation cases, mobile devices contain additional context. But to find it, police need to know what to look for.

Prostitution and human trafficking

A human trafficking network can be as small as a family or small street operation, have ties to large organized crime syndicates, or anywhere in between.

Pimps, labor traffickers and others communicate with both their victims and with one another via mobile device. Some of the communications--call logs, voicemails and text messages--may be business arrangements.

Others can show evidence of physical, sexual and emotional abuse and stalking, as well as drug abuse, all of which many pimps and traffickers use to intimidate and control their victims. Because traffickers may move their victims in an effort to avoid detection, GPS and other location-based data can be valuable. This evidence may be on both victims’ and suspects’ mobile devices.

Some of your evidence may be in another language. Be sure you have translators on hand if needed who can read the text messages or emails, and listen to the voicemail or other audio evidence.

Look to link data from multiple devices, whether among multiple victims or between victims and suspects. This can show important patterns, including trends in one-way communication and/or mutual links that may point to people in charge of the operation. Links that lead to more than one suspect can help police build conspiracy cases.

Child pornography and sextortion

Evidence of child sexual abuse may take many different forms, including video and still images; email, text and instant messages, both before, during and after the incident(s); GPS data, and so on. GPS data associated with images can be especially important. It can show that a victim and/or suspect was in a particular place at a particular time.

Even if GPS is not turned on, date and time stamps, along with other information contained within images’ EXIF data, can also be important. They can be correlated to other pieces of information on a mobile device, including communications, for a full timeline of events.

Again, look for links between multiple devices. Many child predators communicate with more than one victim, and sometimes with one another too. Their locations may coincide in multiple places at multiple times.

Cyberbullying and harassment

Multimedia text messaging (MMS), social media and images or video play key roles in these cases. Whether they are used in a larger human trafficking scheme, or occurred on their own--such as in the Steubenville, Ohio rape case, or bullying that is based in a single school--they can be vital in determining the case’s severity.

This content continues onto the next page...
301 Moved Permanently

Moved Permanently

The document has moved here.