Understanding the Nature of Human Trafficking: A Content Analysis Approach
A dissertation submitted to the Graduate School at the University of Cincinnati
in partial fulfillment of the requirements for the degree of
Doctorate of Philosophy (Ph.D.)
in the School of Criminal Justice of the College of Education, Criminal Justice, and Human Services
2018
by
Teresa C. Kulig
B.A., The University of Akron, 2009 M.A., Ball State University, 2012
Dissertation Committee Michael L. Benson, Ph.D. (Chair) Francis T. Cullen, Ph.D. Pamela Wilcox, Ph.D. Cheryl Lero Jonson, Ph.D. ABSTRACT
Although the exploitation of people has existed for centuries, human trafficking has only recently emerged as an offense that merits special legal intervention. This recognition is due, in part, to a growing movement that has labeled trafficking as a social problem that requires a collective response. Despite efforts to better understand and prevent these crimes, the clandestine nature of human trafficking makes it difficult to measure and draw a reliable portrait of offenders and their victims. In this respect, scientific research on this topic is limited. Thus, the purpose of this dissertation is to use an innovative method to expand knowledge about the nature of human trafficking in the United States.
The current dissertation applies content analysis methods to create a rich database that informs characteristics on victims, offenders, and offenses. To facilitate this goal, human trafficking incidents from 32 independent newspapers, located in 22 of the largest cities across the United States, were reviewed from January 1, 2000 to December 31, 2016. Identified cases that reported an arrest, conviction, or sentencing for a trafficking-related crime were then subjected to supplemental searches to gather all publicly available information on these events.
Seven domains were recorded and analyzed: (1) identifiers; (2) newspaper details; (3) locations of cases; (4) nature of the crime; (5) victim characteristics; (6) offender characteristics; and (7) trial characteristics and offender outcomes. Using these methods, 361 cases were identified and coded for the final analysis. There were 303 sex trafficking cases, 39 labor trafficking cases, and
19 sex-and-labor trafficking cases.
The analysis illuminated clear patterns regarding sex and labor trafficking offenses. In particular, sex trafficking cases tended to involve trafficking offenses without any smuggling component, domestic victims, and relatively few victims per case. Reports about sex traffickers
i suggested that they were in their early adulthood when they were first arrested for their crimes.
A majority of sex traffickers were also Black or Hispanic and U.S. citizens. The victims of sex trafficking were relatively young and often Hispanic. The duration of sex trafficking was approximately six months. Labor trafficking, however, tended to involve smuggling and trafficking offenses, foreign national victims, and a large number of victims per case. Labor traffickers were in their early 40s and were frequently Hispanic or Asian. Many traffickers were also foreign nationals. The victims of labor trafficking were commonly adults in their 20s and
Asian; they were often trafficked for more than two years.
Taken together, these findings revealed that trafficking offenses were characterized by unique patterns. The results were then contextualized within existing opportunity models
(lifestyle-routine activities theory and target congruence theory) to explain trafficking events.
Although both frameworks were informative, the target congruence perspective could be especially important when considering individual characteristics that traffickers target. These models also have implications for crime prevention. It is likely that a combination of situational crime prevention and other approaches (e.g., place-based efforts, specialty courts) can be used to prevent human trafficking by different actors and at different stages of exploitation.
ii
COPYRIGHT NOTICE © by Teresa C. Kulig
iii ACKNOWLEDGMENTS
This dissertation and the successful completion of the preceding milestones would not have been possible without the advice, encouragement, guidance, and support of many people. I am appreciative to everyone who has inspired and reinvigorated me throughout this journey. In particular, I would like to thank my mentor, Dr. Francis T. Cullen, for helping to make this dissertation a reality. I cannot adequately express my gratitude to you for the countless hours you spent encouraging me throughout this process. Your patience, understanding, insights, and humor have not gone unnoticed. Furthermore, I am grateful for the diverse opportunities and experiences that you helped to facilitate during my time at the University of Cincinnati. You have played an immeasurable role in helping to develop my skills and confidence for the next phase of my academic career. Thank you for always pushing me to be better, supporting me, and reminding me that, first and foremost, this field is a human enterprise.
I would also like to offer my sincerest thanks to my committee members—Dr. Michael L.
Benson, Dr. Pamela Wilcox, and Dr. Cheryl Lero Jonson. Your comments and suggestions significantly improved my dissertation and challenged me to think in critical ways. But I am especially grateful to have had the opportunity to work with each of you and to learn from your expertise while at the University of Cincinnati. Dr. Benson, thank you for supporting me and for encouraging me to strive for excellence in my area. Your passion for the field is infectious. Dr.
Wilcox, thank you for your patience, kindness, and meticulous feedback on projects. I feel fortunate to have worked with you and to have witnessed your methodical scholarly process. Dr.
Jonson, thank you for reassuring me that I could be successful and accomplish my goals. I have always been impressed by your unwavering support and generosity. Each of your unique
iv insights have helped to shape the way I view the field and inspired me to be a better scholar and person. I hope to model your same level of excellence in my own career.
I must also thank several other faculty and staff in the School of Criminal Justice that have been instrumental in shaping my academic experiences along my journey to earning my doctorate. First, I thank Dr. Christopher J. Sullivan for always leaving his door open and answering my many questions—even when he was busy. I am grateful to you for your support, patience, and encouragement during every milestone and all of the moments in between.
Second, I must thank Dr. Bonnie S. Fisher for sharing her passion for the field of victimology and her expertise. Your unique way of viewing research problems and your commitment to rigorous methodological standards have set a precedent that I hope to emulate. Third, I need to thank Dr. John Wooldredge for the many hours he has spent helping me with various statistics questions. I have always admired your depth of knowledge, but I have more so respected your selfless willingness to share that understanding with others. Fourth, I thank Dr. Ben Feldmeyer for his patience while teaching me to build and work with large, macro-level data. I have learned a great deal from you and hope to continue building upon that knowledge in the future. Fifth, I would like to thank Dr. John E. Eck for illuminating new ways to approach old problems. Your passion is evident in all aspects of your academic life and this enthusiasm has encouraged me to think critically and comprehensively. Sixth, I need to thank Dr. Valerie R. Anderson for sharing her expertise and continually motivating me as I pursued my goals. Seventh, I must thank
Shelley Paden and Randall Roberts for their advice and assistance when considering search techniques for this project. Finally, thanks to Jean Gary, Janice Miller, Erin Cochran, and John
Schwartz for all of their help, kindness, and support along the way.
v In addition to the faculty and staff, I have been fortunate to have met some wonderful people while completing my degree. I am especially thankful to have met and become friends with Roxy Kallsen during my first semester in the program. Thank you for all of those late-night study reviews, pep talks, and venting sessions that made completing our milestones a shared experience. I must also thank Hannah McManus for helping to keep me grounded—not an easy feat—and Jillian Shafer for showing me the error of my data management ways. I am also appreciative that I met and laughed with Brian Pack, Erica Fissel, Natalie Martinez, Lindsey
Mueller, Tim Nixon, SooHyun O, and Morgan Steele. I am grateful that all of you were there to commiserate on difficult days, provide insights and suggestions on projects, and offer support on a variety of issues. Thank you all for your part in making this entire journey a memorable and enjoyable experience!
I must also thank another set of friends who would regularly check in on my sanity and well-being during my graduate studies. Thank you to Erin, Kaleigh, Beth, Greg, Sara, and Brian for always looking out for me. I am sure you all were sick of hearing about my life “coding cases,” but you bore that burden with grace. I am eternally grateful that you supported me and persuaded me to take a break every once in a while. Thank you for always reminding me of the bigger picture and for helping to keep my priorities in perspective.
I would also like to thank my family for supporting me as I continued my education.
Thank you to my parents (John and Joan) for checking in on me to make sure I was still
“kicking,” my sisters (Julie and Christie) for always believing in me, and my brothers (Charles,
Michael, and Joe) for making me tough enough to withstand any challenge. I especially want to thank my brother Joe for all of his support and assistance when I doubted my ability to meet my own deadlines.
vi Finally, I want to thank my husband, Adam. You have been along for this journey for many years and have always supported my dreams. I cannot express what that means to me.
Even though you have been relegated to second place while I pursued my education, you have always understood that this status was temporary. Thank you for being willing to put up with solo meals, missed vacations, long phone calls, incalculable hours of writing and analysis, and many, many discussions about crime and victimization. You encouraged me to continue when I wanted to quit and reminded me to believe in myself. I truly believe that I would not have been able to accomplish all that I have without your love and support. You are a superstar. Thank you for not letting me give up on myself.
vii TABLE OF CONTENTS
ABSTRACT ...... i
ACKNOWLEDGMENTS...... iv
CHAPTER 1: UNDERSTANDING HUMAN TRAFFICKING: DEFINITIONS, DISCOVERY, AND RESEARCH ...... 1 Defining Human Trafficking ...... 4 Definitions ...... 4 Issues with Classification ...... 8 A Hidden Population ...... 9 State and Federal Legislation ...... 10 Local Responses to Trafficking ...... 14 Types of Trafficking...... 17 Sex Trafficking ...... 17 Labor Trafficking ...... 18 Debt Bondage...... 19 Organ Trafficking...... 20 What is Not Trafficking ...... 20 The Discovery of Human Trafficking...... 21 The Emergence of “Human Trafficking” ...... 22 The Social Construction of Human Trafficking ...... 28 Political Process Perspective ...... 29 Resource Mobilization Theory ...... 30 Collective Behavior ...... 30 Studying Human Trafficking...... 32 Quantitative Data ...... 33 Flawed Methods ...... 34 Trafficking Estimates Vary Widely ...... 36 Human Trafficking is a Serious Problem ...... 36 Some Forms of Trafficking Seem More Common ...... 37 Trafficking Varies by Location ...... 38 Qualitative Research ...... 39
viii Interactions Matter ...... 40 Vulnerability Increases Risk ...... 44 Consequences of Human Trafficking are Enormous ...... 45 Content Analyses ...... 48 The Nature of Trafficking Is Patterned ...... 66 Article Framing Matters ...... 68 Context is Important ...... 69 Summary ...... 70 Research Strategy ...... 70 Conclusion ...... 73
CHAPTER 2: METHODS: A CONTENT ANALYSIS OF HUMAN TRAFFICKING ...... 75 Database ...... 75 Time Frame ...... 76 Newspapers ...... 76 Search Terms ...... 80 Inclusion/Exclusion Criteria ...... 81 Coding Instrument ...... 82 Coding Categories ...... 83 Identifiers ...... 83 Newspaper Details...... 84 Location of Case ...... 84 Nature of the Crime ...... 84 Victim Characteristics ...... 84 Offender Characteristics ...... 85 Trial Characteristics and Offender Outcomes ...... 85 Coding Assumptions ...... 85 Decision Rules ...... 87 Sample Characteristics ...... 88 Data Analysis ...... 95 Conclusion ...... 96
ix CHAPTER 3: SEX TRAFFICKING ...... 97 The Nature of Sex Trafficking ...... 97 Identifying Sex Trafficking ...... 98 Overview of Victims and Offenders ...... 98 Characteristics of Sex Trafficking Cases ...... 101 Minor Versus Adult Status ...... 101 Smuggling of Victims ...... 101 Operation Dynamics ...... 105 Nationality of Victims ...... 106 Means of Exploitation ...... 106 Use of Drugs ...... 107 Presence of Events ...... 107 Use of Debts...... 107 Exploitation of Victims ...... 108 Clients Served Per Day ...... 108 Amount Sold ...... 110 Days Per Week ...... 110 Hours Per Day ...... 110 Traffickers and the Criminal Enterprise ...... 111 Becoming a Trafficker...... 111 Demographics ...... 111 Occupations ...... 113 Criminal and Gang Involvement ...... 115 Offender Roles in the Enterprise ...... 117 Being a Trafficker ...... 118 Advertising Victims ...... 120 Venue ...... 120 Controlling Victims ...... 124 Violence and Threats of Violence ...... 124 Substance Use ...... 128 Providing for Victims ...... 129 Psychological and Emotional Coercion ...... 129 Isolation and Confiscating Personal Items ...... 130
x Intimidation ...... 131 Punishments ...... 131 Exploiting Vulnerabilities...... 131 Use of Relationships...... 132 Victims and Vulnerabilities ...... 134 Characteristics of Victims ...... 134 Demographics ...... 134 Duration of Trafficking ...... 137 Victim Vulnerabilities ...... 138 Experiences While Trafficked ...... 139 Victim-Offender Relationship ...... 143 Strangers ...... 143 Known Persons ...... 143 Recruitment of Sex Trafficking Victims ...... 145 Who Recruited Victims ...... 146 Where Recruitment Occurred ...... 146 How Victims Were Recruited ...... 149 False Promises ...... 149 Provide for Victims ...... 152 Glamorize Sex Work ...... 152 Persuasion ...... 153 Force and Threats of Force ...... 153 Use of Drugs ...... 154 Bait and Switch ...... 154 Exploit Relationships...... 155 Discovery, Legal Sanctions, and Outcomes ...... 155 Police Discovery ...... 155 Proactive Discoveries ...... 155 Reactive Discoveries ...... 157 Case Outcomes...... 158 Final Outcomes ...... 158 Prosecution Level ...... 161 Charges and Bail/Bond ...... 161
xi Convictions ...... 163 Sentencing of Sex Traffickers...... 165 Sentencing...... 165 Restitution ...... 167 Remorse ...... 167 Status of Sex Trafficking Victims ...... 167 Supplemental Analysis ...... 168 Adult and Minor Victims...... 168 Male and Female Traffickers ...... 170 Conclusion ...... 173 Typical Trafficker ...... 173 Typical Victim ...... 174 Typical Case Outcome ...... 175 Summary ...... 175
CHAPTER 4: LABOR TRAFFICKING ...... 177 The Nature of Labor Trafficking ...... 178 Identifying Labor Trafficking ...... 178 Overview of Victims and Offenders ...... 181 Characteristics of Labor Trafficking Cases ...... 181 Minor Versus Adult Status ...... 183 Smuggling of Victims ...... 183 Operation Dynamics ...... 183 Nationality of Victims ...... 186 Means of Exploitation ...... 186 Use of Drugs ...... 187 Presence of Events ...... 187 Use of Debts...... 188 Exploitation of Victims ...... 188 Days Per Week ...... 190 Hours Per Day ...... 190 Traffickers and the Criminal Enterprise ...... 190 Becoming a Trafficker...... 191
xii Demographics ...... 191 Occupations ...... 194 Criminal and Gang Involvement ...... 195 Offender Roles in the Enterprise ...... 195 Being a Trafficker ...... 198 Advertising Victims ...... 198 Venue ...... 199 Controlling Victims ...... 202 Violence and Threats of Violence ...... 202 Isolation and Confiscating Personal Items ...... 205 Psychological and Emotional Coercion ...... 205 Punishments ...... 206 Exploiting Vulnerabilities...... 207 Intimidation ...... 207 Providing for Victims ...... 207 Use of Relationships...... 208 Victims and Vulnerabilities ...... 210 Characteristics of Victims ...... 210 Demographics ...... 210 Duration of Trafficking ...... 214 Experiences While Trafficked ...... 215 Victim-Offender Relationship ...... 216 Strangers ...... 216 Known Persons ...... 218 Recruitment of Labor Trafficking Victims ...... 219 Who Recruited Victims ...... 219 Where Recruitment Occurred ...... 219 How Victims Were Recruited ...... 221 False Promises ...... 221 Provide for Victims ...... 221 Exploit Relationships...... 223 Bait and Switch ...... 224 Force ...... 224
xiii Discovery, Legal Sanctions, and Outcomes ...... 225 Police Discovery ...... 225 Proactive Discoveries ...... 225 Reactive Discoveries ...... 227 Case Outcomes...... 228 Final Outcomes ...... 228 Prosecution Level ...... 231 Charges and Bail/Bond ...... 231 Convictions ...... 233 Sentencing of Labor Traffickers ...... 235 Sentencing...... 235 Restitution ...... 235 Remorse ...... 237 Status of Labor Trafficking Victims ...... 237 Addendum: Sex-and-Labor Trafficking ...... 239 Overview of Cases ...... 239 Traffickers ...... 241 Victims ...... 242 Summary ...... 243 Conclusion ...... 244 Typical Trafficker ...... 244 Typical Victim ...... 245 Typical Case Outcome ...... 245 Summary ...... 246
CHAPTER 5: CONCLUSION: AN OPPORTUNITY PERSPECTIVE ON HUMAN TRAFFICKING...... 247 Motivated Offenders ...... 252 Choosing Trafficking ...... 252 Learning the Trade ...... 253 Networking ...... 253 Callousness of Traffickers ...... 253 Lack of Fear of Being Detected ...... 254
xiv Age as an Asset ...... 255 Opportunity ...... 255 Attractive Targets ...... 256 Lack of Guardianship ...... 258 Summary ...... 259 Prevention ...... 260 Situational Crime Prevention ...... 260 Increase the Effort ...... 261 Increase the Risks ...... 261 Reduce the Rewards ...... 262 Reduce Provocations ...... 263 Remove Excuses ...... 263 Place-Based Efforts ...... 264 Deterrence ...... 265 Demand Reduction ...... 266 Specialty Courts and Training Opportunities ...... 267 Specialty Courts ...... 268 Training Opportunities ...... 268 Summary ...... 268 Future Research ...... 269 Conclusion ...... 271
REFERENCES ...... 273
APPENDIX A ...... 318
APPENDIX B ...... 319
APPENDIX C ...... 320
APPENDIX D ...... 321
xv LIST OF TABLES AND FIGURES
Figure 1.1. Ngram of Human Trafficking ...... 23 Table 1.1. Content Analyses on Human Trafficking ...... 50 Table 2.1. List of Newspapers in Current Study ...... 79 Table 2.2. Year of First Legal Action by Case ...... 90 Table 2.3. State of Offender Arrest and Trafficking by Case ...... 91 Table 2.4. Type of Trafficking by Case ...... 92 Table 2.5. Number of Trafficking Victims and Offenders by Case ...... 94 Table 3.1. Year of First Legal Action for Sex Trafficking by Case ...... 99 Table 3.2. State of Offender Arrest and Sex Trafficking by Case ...... 100 Table 3.3. Number of Sex Trafficking Victims and Offenders by Case ...... 102 Table 3.4. Characteristics of Sex Trafficking Events by Case ...... 103 Table 3.5. Details of Sex Trafficking Events by Case ...... 109 Table 3.6. Demographics and Characteristics of Sex Traffickers ...... 112 Table 3.7. Occupations of Sex Traffickers ...... 114 Table 3.8. Criminal Involvement of Sex Traffickers ...... 116 Table 3.9. Trafficker Roles in the Enterprise ...... 119 Table 3.10. Advertisements of Sex Trafficking Events by Case ...... 121 Figure 3.1. Number of Advertisement Methods by Case...... 122 Table 3.11. Sex Trafficking Venues by Case ...... 123 Figure 3.2. Number of Venues by Case ...... 125 Table 3.12. Methods Used to Control Sex Trafficking Victims by Case ...... 126 Figure 3.3. Number of Control Methods by Case ...... 133 Table 3.13. Demographics and Characteristics of Sex Trafficking Victims ...... 135 Table 3.14. Experiences of Sex Trafficking Victims ...... 141 Table 3.15. Relationships Between Victims and Traffickers ...... 144 Table 3.16. Who Recruited Sex Trafficking Victims ...... 147 Table 3.17. Where Did Recruitment of Sex Trafficking Victims Occur ...... 148 Table 3.18. How Did Sex Traffickers Recruit Victims...... 150 Table 3.19. Police Discovery of Sex Trafficking by Case ...... 156 Table 3.20. Case Outcomes for Sex Traffickers ...... 159
xvi Table 3.21. Example Sex Trafficking Convictions...... 164 Table 3.22. Sentencing of Sex Traffickers ...... 166 Table 3.23. Status of Sex Trafficking Victims ...... 169 Table 3.24. Selected Supplemental Analyses by Adult and Minor Victim Status ...... 171 Table 3.25. Selected Supplemental Analyses by Male and Female Offender Status ...... 172 Table 4.1. Year of First Legal Action for Labor Trafficking by Case ...... 179 Table 4.2. State of Offender Arrest and Labor Trafficking by Case ...... 180 Table 4.3. Number of Labor Trafficking Victims and Offenders by Case ...... 182 Table 4.4. Characteristics of Labor Trafficking Events by Case...... 184 Table 4.5. Details of Labor Trafficking Events by Case...... 189 Table 4.6. Demographics and Characteristics of Labor Traffickers ...... 192 Table 4.7. Occupations of Labor Traffickers ...... 196 Table 4.8. Trafficker Roles in the Enterprise ...... 197 Table 4.9. Labor Trafficking Venues by Case ...... 200 Figure 4.1. Number of Venues by Case ...... 201 Table 4.10. Methods Used to Control Labor Trafficking Victims by Case ...... 203 Figure 4.2. Number of Control Methods by Case ...... 209 Table 4.11. Demographics and Characteristics of Labor Trafficking Victims ...... 211 Table 4.12. Relationships Between Victims and Traffickers ...... 217 Table 4.13. Who Recruited Labor Trafficking Victims ...... 220 Table 4.14. How Did Labor Traffickers Recruit Victims ...... 222 Table 4.15. Police Discovery of Labor Trafficking by Case...... 226 Table 4.16. Case Outcomes for Labor Traffickers ...... 229 Table 4.17. Example Labor Trafficking Convictions ...... 234 Table 4.18. Sentencing of Labor Traffickers...... 236 Table 4.19. Status of Labor Trafficking Victims ...... 238 Table 5.1. Sex and Labor Trafficking Characteristics ...... 248
xvii Chapter 1
UNDERSTANDING HUMAN TRAFFICKING: DEFINITIONS, DISCOVERY, AND RESEARCH
Human trafficking encompasses the use of force, fraud, and/or coercion to exploit individuals most commonly through commercialized sex and involuntary labor (Victims of
Trafficking and Violence Protection Act of 2000). It is estimated that at any given time, as many as 20.9 million individuals are trafficked globally (International Labour Office [ILO], 2012) and that traffickers earn more than $150 billion in profits each year (ILO, 2014, p. 13). In the United
States alone, earnings from sex trafficking can fluctuate in the millions depending on the location
(Dank et al., 2014). Given the lucrative profits that trafficking offers, this disquieting practice is unlikely to disappear in the foreseeable future. Additionally, trafficking can impact diverse sectors of society; its victims can be minors or adults, foreign nationals or domestic citizens, live on any continent, and come from all socioeconomic and racial/ethnic backgrounds. Still, trafficking impacts most extensively the vulnerable among us—those who have little social support or education, have been previously exposed to physical or sexual violence, are homeless or runaways, come from an impoverished background, or who have mental health or substance abuse issues (Adepoju, 2005; Heil & Nichols, 2015; Kara, 2009; Lloyd, 2011; MacGibbon,
2011; Martin, Pierce, Gabilondo, & Tulpule, 2014; Rosenblatt & Murphey, 2014; Zimmerman,
Hossain, Yun, Roche, Morison, & Watts, 2006). Then-President Barack Obama (2012) specifically addressed some of these issues in his speech at the Clinton Global Initiative Annual
Meeting:
When a man, desperate for work, finds himself in a factory or on a fishing boat or in a field, working, toiling, for little or no pay, and beaten if he tries to escape—that is slavery. When a woman is locked in a sweatshop, or trapped in a home as a domestic servant, alone and abused and incapable of leaving—that’s slavery. When a little boy is
1 kidnapped, turned into a child soldier, forced to kill or be killed—that’s slavery. When a little girl is sold by her impoverished family—girls my daughters’ age—runs away from home, or is lured by the false promises of a better life, and then imprisoned in a brothel and tortured if she resists—that’s slavery. It is barbaric, and it is evil, and it has no place in a civilized world.
The vulnerabilities of victims paired with the underground nature of trafficking creates immense difficulties not only in rescuing victims, but also in preventing their victimization in the first place.
In this regard, government agencies have recently initiated efforts to collect data on incidents of human trafficking in the United States to understand more accurately the extent of the problem. Thus, starting in 2013, the Federal Bureau of Investigation (FBI; 2015) Uniform
Crime Reports (UCR) has initiated the gathering of official statistics related to human trafficking.
These data, however, are limited due to the low number of agencies submitting reports of incidents, the use of broad categories of trafficking, and the restricted details on those involved
(i.e., race, gender, age). An additional effort to obtain details on trafficking incidents has been undertaken by the Human Trafficking Reporting System (HTRS). The HTRS was established as a way to measure the performance of federally funded task forces that suspect trafficking incidents have occurred (Banks & Kyckelhahn, 2011; Kyckelhahn, Beck, & Cohen, 2009).
Through the HTRS, more specific details are captured regarding type of offense, agency involvement, demographics, and outcome (i.e., confirmed trafficking case or not). Still, this approach is problematic due to inconsistent updates by task forces and missing/limited data on victims, offenders, and the event itself. Lastly, in 2007, the National Human Trafficking
Resource Center (NHTRC)—later renamed the National Human Trafficking Hotline (NHTH) in
2016—was created as a unifying organization to which potential trafficking incidents can be
2 reported (Polaris Project, n.d.). Data are confined to information communicated to hotline specialists, which may not contain specific details about the event itself or its outcome.
Despite these advances, the shortcomings of the extant data-collection efforts means that a comprehensive data set on the details of trafficking incidents is not yet available. For a given trafficking event, only limited information is known about the characteristics of victims and offenders, the relationship between victims and offenders, how trafficking is discovered, how long a victim is controlled, the circumstances that led to trafficking, the settings in which trafficking occurs, geographic concentration of known trafficking cases, and the harms that victims experience. Nevertheless, prior investigations of difficult-to-study areas of crime (e.g., white-collar crime) have attempted to overcome the lack of publicly available data by conducting content analyses of reports of criminal incidents in newspapers. In essence, news stories are gleaned for relevant information that is then used to create what amounts to an incident report on each criminal event.
This dissertation is an attempt to expand knowledge about the nature of human