Maxim Dedushkov

February 16, 2021

At the moment, law enforcement is outnumbered and outgunned on the internet, but J{AI}NE DOE aims to change that.

Traffickers are increasingly recruiting and grooming victims online. In a survey of trafficking survivors, 55% of respondents who were trafficked in 2015 never met their trafficker face to face. This has only accelerated further in light of the current pandemic.

The Internet is a hospitable environment for traffickers as they can more easily scale their recruiting and grooming operations, law enforcement presence is minimal, and anonymity helps them avoid detection while abetting the deception of potential victims e.g. catfishing. This unfortunately emboldens traffickers as they recognize their relative safety online and lack of risk when conducting their recruiting and grooming operations online.

J{AI}NE DOE seeks to make the online environment more hostile for traffickers and serve as a deterrence by supporting cyber operations. Traditionally, running cyber operations requires a significant investment in time and effort from generating and maintaining active fake personas, engaging and monitoring suspected traffickers, to assembling a case against identified traffickers. AI assistants and ML tools can support cyber operators every step of the way.

J{AI}NE DOE supports cyber operations in four key ways:

1. Create: Cyber operators can generate and embed fake personas of potential victims based on specific parameters such as location, characteristics, etc. or by using templates before further customising any details.

2. Interact: Once deployed, the personas can support operators and/or engage directly in conversations with the individuals reaching out to these fake victim profiles.

3. Monitor: AI/ML trained on historical trafficker-victim conversations will flag interactions that fit trafficker behavior and upon reaching a threshold, the system triggers calls for human intervention for further analysis.

4. Analyse: The system supports analysis by surfacing potential cases and generating summaries of key interactions that indicate potential trafficking behaviors such as recruiting and grooming.

Download the presentation.


Harrison Tan

email | portfolio | instagram | linkedin | twitter

Grishma Bhanderi

Gmail | Portfolio | Instagram | Linkedin

Nick Grafakos

Mail | Portfolio | Instagram | Linkedin