Home / DoD / DARPA Develops Search Technologies to Locate Online Perpetrators of Human Trafficking Crimes

DARPA Develops Search Technologies to Locate Online Perpetrators of Human Trafficking Crimes

The Defense Advanced Research Projects Agency continues ongoing work on the development of next-generation search technologies designed to locate online perpetrators of slavery and human trafficking crimes, DoD News reported Wednesday.

Cheryl Pellerin writes Wade Shen, program manager in DARPA’s information innovation office, told DoD News in an interview that the Memex program, which has cost more than $67 million, was established in a push to aid law enforcement officers on investigations that look to hunt down human traffickers.

“Our goal is to understand the footprint of human trafficking in online spaces, whether that be the dark web or the open web,” said Shen.

“What we’re looking for … is online behavioral signals in the ads that occur in these spaces that help us detect whether or not a person is being trafficked.”

Shen noted that more than 33 agencies and a number of local law enforcement groups have used the Memex tools including investigators for the district attorney of New York which used the system to locate and prosecute perpetrators.

The DARPA program manager’s team looks to extend text-based exploitation programs for big data, used to analyze trends and associations related to human behavior and interactions, and create tools that can understand images and networks of people to pinpoint traffickers and behaviors associated with trafficking.

Check Also

Vice Adm. Matthew Kohler on Navy’s Current Information Warfare Approach

Vice Adm. Matthew Kohler, the top information warfare officer at the U.S. Navy, told C4ISRNET in an interview published Monday that the service considers information warfare as decisive both in daily operations and high-end kinetic fight. “In information warfare, while the rest of the warfare areas are involved in the high-end conflict [eventually], we consider the high-end conflict now. Constant contact with the enemy in terms of cybersecurity, being able to operate within the [electromagnetic spectrum], all of those. We consider ourselves in contact with the adversary now,” Kohler said. 

Leave a Reply

Your email address will not be published. Required fields are marked *