“It’s well established that massage businesses may be used as covers for illegal operations that involve sex trafficking and labor trafficking,” says Margaret Tobey, a Ph.D. student at NC State and corresponding author of a paper on the work. “However, most massage businesses are legitimate. And it is difficult for law enforcement or other organizations to determine which businesses are legitimate and which are fronts for illegal activity.”
“Our goal was to create statistical tools that could help relevant authorities determine which businesses possess risk factors related to trafficking, so that they can determine which sites to focus their investigative efforts on,” says Maria Mayorga, co-author of the paper and a professor in NC State’s Edward P. Fitts Department of Industrial and Systems Engineering.
“We also wanted to ensure that the tools we developed are sufficiently user-friendly to be practical for both law enforcement and organizations that focus on helping victims of sex trafficking and labor trafficking,” Tobey says.
To develop the tools, the researchers first interviewed law enforcement, government officials, and experts from organizations that work with survivors of sex and labor trafficking. The interviews were focused on identifying variables associated with an increased likelihood that a massage business might be engaged in illegal activity. For example, businesses that catered almost exclusively to male clients were more likely to be associated with sex trafficking.
Once the researchers had identified a suite of relevant variables, they looked for publicly available sources of data related to those variables. For example, online customer review sites allowed researchers to estimate what proportion of a business’s clients were men. Other data sources included census data for the neighborhood where a business was located, geographical proximity to various other businesses and transportation hubs, and so on.
Ultimately, the researchers developed two computational models that provide users with probability scores on the likelihood that any given massage business is engaged in illegal activity.
“We trained and validated these models using data from Florida and Texas, because we were able to collect robust data sets from those states,” Tobey says. “We found each model had strengths that could appeal to different users depending on their goals.”
One model – called the risk score model – had fewer false positives, meaning if the model said a business was likely to be engaged in illegal activity, it was more likely to be correct. But this model was also more likely to list some illicit businesses as legitimate.
On the other hand, the second model – called a decision tree model – had fewer false negatives. In other words, if the decision tree model said a business was unlikely to be engaged in illegal activity, it was more likely to be correct. But it was also more likely to list legitimate business as suspicious.
“It’s a trade-off,” Tobey says. “If you have very limited resources, you probably want to use the risk score model, because you’re more likely to find businesses that are engaged in illegal activity. However, you’re also likely to miss some. If you have enough resources, you probably want to use the decision tree model, because you’re less likely to miss any illegal operation.
“Ultimately, both of these models can be used by relevant parties to prioritize which businesses merit investigation.”
The researchers are currently in the process of developing a user-friendly decision support tool that can be deployed to law enforcement and nonprofit organizations for use in aiding investigations of sex and human trafficking.
“We’re optimistic that this tool can empower trafficking victims, improve public safety and contribute to the development of evidence-based public policy that addresses these issues,” says Sherrie Caltagirone, co-author of the paper and executive director of Global Emancipation Network.
The paper, “Interpretable models for the automated detection of human trafficking in illicit massage businesses,” is published in the journal IISE Transactions. The paper was co-authored by Ruoting Li, a Ph.D. student at NC State; and Osman Özaltın, an associate professor in NC State’s Edward P. Fitts Department of Industrial and Systems Engineering.
The work was done with support from the National Science Foundation, under grant number 1936331.