[House Hearing, 116 Congress]
[From the U.S. Government Publishing Office]



 
                         THE ROLE OF TECHNOLOGY
                  IN COUNTERING TRAFFICKING IN PERSONS

=======================================================================

                             JOINT HEARING

                               BEFORE THE

                     SUBCOMMITTEE ON INVESTIGATIONS
                             AND OVERSIGHT
                SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY

                                 OF THE

                      COMMITTEE ON SCIENCE, SPACE,
                             AND TECHNOLOGY
                        HOUSE OF REPRESENTATIVES

                     ONE HUNDRED SIXTEENTH CONGRESS

                             SECOND SESSION

                               __________

                             JULY 28, 2020

                               __________

                           Serial No. 116-78                       

                               __________

 Printed for the use of the Committee on Science, Space, and Technology
 
 
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] 
 
 


       Available via the World Wide Web: http://science.house.gov
       
       
       
                           ______                       


             U.S. GOVERNMENT PUBLISHING OFFICE 
40-870 PDF           WASHINGTON : 2021        
       
       

              COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY

             HON. EDDIE BERNICE JOHNSON, Texas, Chairwoman
ZOE LOFGREN, California              FRANK D. LUCAS, Oklahoma, 
DANIEL LIPINSKI, Illinois                Ranking Member
SUZANNE BONAMICI, Oregon             MO BROOKS, Alabama
AMI BERA, California,                BILL POSEY, Florida
    Vice Chair                       RANDY WEBER, Texas
LIZZIE FLETCHER, Texas               BRIAN BABIN, Texas
HALEY STEVENS, Michigan              ANDY BIGGS, Arizona
KENDRA HORN, Oklahoma                ROGER MARSHALL, Kansas
MIKIE SHERRILL, New Jersey           RALPH NORMAN, South Carolina
BRAD SHERMAN, California             MICHAEL CLOUD, Texas
STEVE COHEN, Tennessee               TROY BALDERSON, Ohio
JERRY McNERNEY, California           PETE OLSON, Texas
ED PERLMUTTER, Colorado              ANTHONY GONZALEZ, Ohio
PAUL TONKO, New York                 MICHAEL WALTZ, Florida
BILL FOSTER, Illinois                JIM BAIRD, Indiana
DON BEYER, Virginia                  FRANCIS ROONEY, Florida
CHARLIE CRIST, Florida               GREGORY F. MURPHY, North Carolina
SEAN CASTEN, Illinois                MIKE GARCIA, California
BEN McADAMS, Utah                    THOMAS P. TIFFANY, Wisconsin
JENNIFER WEXTON, Virginia
CONOR LAMB, Pennsylvania
                                 ------                                

              Subcommittee on Investigations and Oversight

                  HON. BILL FOSTER, Illinois, Chairman
SUZANNE BONAMICI, Oregon             RALPH NORMAN, South Carolina, 
STEVE COHEN, Tennessee                   Ranking Member
DON BEYER, Virginia                  ANDY BIGGS, Arizona
JENNIFER WEXTON, Virginia            MICHAEL WALTZ, Florida
                                 ------                                

                Subcommittee on Research and Technology

                HON. HALEY STEVENS, Michigan, Chairwoman
DANIEL LIPINSKI, Illinois            JIM BAIRD, Indiana, Ranking Member
MIKIE SHERRILL, New Jersey           ROGER MARSHALL, Kansas
BRAD SHERMAN, California             TROY BALDERSON, Ohio
PAUL TONKO, New York                 ANTHONY GONZALEZ, Ohio
BEN McADAMS, Utah                    THOMAS P. TIFFANY, Wisconsin
STEVE COHEN, Tennessee
BILL FOSTER, Illinois

                         C  O  N  T  E  N  T  S

                             July 28, 2020

                                                                   Page

Hearing Charter..................................................     2

                           Opening Statements

Statement by Representative Bill Foster, Chairman, Subcommittee 
  on Investigations and Oversight, Committee on Science, Space, 
  and Technology, U.S. House of Representatives..................     9
    Written Statement............................................    10

Statement by Representative Ralph Norman, Ranking Member, 
  Subcommittee on Investigations and Oversight, Committee on 
  Science, Space, and Technology, U.S. House of Representatives..    11
    Written Statement............................................    12

Statement by Representative Haley Stevens, Chairwoman, 
  Subcommittee on Research and Technology, Committee on Science, 
  Space, and Technology, U.S. House of Representatives...........    12
    Written Statement............................................    13

Statement by Representative Jim Baird, Ranking Member, 
  Subcommittee on Research and Technology, Committee on Science, 
  Space, and Technology, U.S. House of Representatives...........    14
    Written Statement............................................    15

Written statement by Representative Eddie Bernice Johnson, 
  Chairwoman, Committee on Science, Space, and Technology, U.S. 
  House of Representatives.......................................    15

Written statement by Representative Frank D. Lucas, Ranking 
  Member, Committee on Science, Space, and Technology, U.S. House 
  of Representatives.............................................    16

                               Witnesses:

Ms. Anjana Rajan, Chief Technology Officer, Polaris
    Oral Statement...............................................    17
    Written Statement............................................    19

Mr. Matthew Daggett, Technical Staff, Humanitarian Assistance and 
  Disaster Relief Systems Group, Lincoln Laboratory, 
  Massachusetts Institute of Technology
    Oral Statement...............................................    26
    Written Statement............................................    28

Ms. Emily Kennedy, President and Co-Founder, Marinus Analytics
    Oral Statement...............................................    46
    Written Statement............................................    48

Ms. Hannah Darnton, Associate Director of Ethics, Technology, and 
  Human Rights, Business for Social Responsibility
    Oral Statement...............................................    52
    Written Statement............................................    55

Discussion.......................................................    75

             Appendix I: Answers to Post-Hearing Questions

Ms. Anjana Rajan, Chief Technology Officer, Polaris..............    96

            Appendix II: Additional Material for the Record

Statement submitted by Kayse Lee Maass, Ph.D., Assistant 
  Professor of Industrial Engineering & Director of the 
  Operations Research and Social Justice Laboratory, Northeastern 
  University.....................................................   100


                         THE ROLE OF TECHNOLOGY

                  IN COUNTERING TRAFFICKING IN PERSONS

                              ----------                              


                         TUESDAY, JULY 28, 2020

                  House of Representatives,
                     Subcommittee on Investigations
                                     and Oversight,
                        joint with the Subcommittee
                        on Research and Technology,
               Committee on Science, Space, and Technology,
                                                   Washington, D.C.

     The Subcommittees met, pursuant to notice, at 10:09 a.m., 
via Webex, Hon. Bill Foster [Chairman of the Subcommittee on 
Investigations and Oversight] presiding.

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

     Chairman Foster.  And, without objection, the Chair is 
authorized to declare a recess at any time.
     But before I deliver my opening remarks, I want to note 
the unusual circumstances under which we're meeting today. 
Pursuant to House Resolution 965, today, the Subcommittee is 
meeting virtually. Both of them are meeting virtually. And I 
want to announce a couple of reminders to the Members about the 
conduct of this remote hearing. First, Members should keep 
their video feed on for as long as they are present in the 
hearing. Members are responsible for muting and unmuting their 
own microphones, so please keep your microphones muted or 
unmuted, as appropriate.
     Finally, if Members have documents that they wish to 
submit for the record, please email them to the Committee 
Clerk, whose email address was circulated prior to the hearing.
     And so with that, good morning, and welcome to today's 
remote hearing entitled ``The Role of Technology in Countering 
Trafficking in Persons.'' This is a joint Subcommittee hearing 
between the Investigations and Oversight Subcommittee and the 
Research and Technology Subcommittee, and I'm so pleased to 
welcome Chairwoman Stevens and Ranking Member Norman and 
Representative Baird, as well as our colleagues.
     Representative Baird and I represent the entire supply of 
Ph.D. scientists in the U.S. Congress, which is a fact I seldom 
miss an opportunity to point out to this Committee. But I am 
also the son of a civil rights lawyer. My father wrote much of 
the enforcement language behind the Civil Rights Act of 1964. 
My dad knew Martin Luther King, Ralph Abernathy, and many of 
the early heroes of the civil rights movement, and Dad had 
dinner at the kitchen table with Myrlie and Medgar Evers just 6 
weeks before Medgar Evers was shot down in his driveway.
     John Lewis, who we're all mourning this week, used to sit 
with me between votes in the House and where John would tell me 
more about all of the stories of the early civil rights 
movement that I'd grown up listening to from my father.
     My dad was also a scientist, but he stepped away from his 
career in science because he saw civil rights as the great 
moral challenge of his generation. Certainly, stopping human 
trafficking and modern-day slavery is one of the great moral 
challenges of today, and we must bring every tool that we have 
to that fight.
     So, as we prepare to mark the annual World Day Against 
Trafficking in Persons on July 30, I can think of no better 
time to shine a light on the tragic persistence of human 
trafficking and explore the new technologies that will assist 
our efforts to defeat this scourge once and for all.
     Trafficking in persons is a complex problem in the United 
States and around the world. We need to develop better tools to 
disrupt criminal networks, to bring the perpetrators to 
justice, and to support the victims of human trafficking. This 
hearing is an opportunity to learn about new research and novel 
technologies and to consider how America can better integrate 
these assets into the fight against human trafficking.
     And let's be clear. Technology is frequently misused to 
facilitate human trafficking in persons. It provides new 
opportunities for traffickers to target potential victims, 
conduct anonymous and illicit financial transactions, and 
expand their criminal markets. Yet despite its obvious 
challenges, technology is also an important asset for those 
involved in combatting trafficking in persons. Its positive use 
can aid investigations, enhance prosecutions, raise awareness, 
provide services to victims, and shed new light on how 
trafficking networks operate.
     With this in mind, our ability to counter trafficking in 
persons largely depends on how we harness this technology in 
our efforts. We know there's a lot of good work happening to 
combat human trafficking, but there also seems to be a lot of 
opportunity to elevate the role of Federal research and 
development (R&D) in increasing collaboration between the 
agencies.
     The National Science Foundation (NSF), the National 
Institute of Standards and Technology, the Department of 
Homeland Security's Science and Technology Directorate, the 
Department of Transportation's R&D programs, and others can all 
contribute to the goals of prevention and disruption of this 
crime. And we have at our disposal a wide range of tools that 
could be used to support antitrafficking efforts, including 
artificial intelligence (AI) and machine learning. For example, 
AI can help make predictions, recommendations, and decisions to 
identify financial transactions that may be indicative of human 
trafficking networks.
     I'm looking forward to hearing from today's panel of 
witnesses because they bring real-world experience to the 
table, and can recommend ways that we on the Science Committee 
can support efforts to meet challenges with cutting-edge 
technology. This hearing is a great opportunity to think 
outside the box when it comes to research and technology that 
can address many of the causes and consequences of human 
trafficking.
     The more obvious examples are technologies that can aid 
law enforcement in identifying potential perpetrators and 
victims. But beyond that, there are analysis tools that can 
comb through the dark web for illicit transactions; blockchain 
analytics that can help companies and the government track 
their supply chains and identify vulnerabilities that increase 
the risk of human trafficking; and there's an acute need for 
social science research to assess the medical, emotional, and 
material needs of victims and ensure that they are connected to 
the resources that can help them as they reenter society.
     So thank you to all our witnesses for appearing today and 
for the work that you do. Your expertise is invaluable as we 
consider how the Science Committee's oversight and legislative 
powers can help in the fight against human trafficking.
     [The prepared statement of Chairman Foster follows:]

    Good morning, and welcome to today's remote hearing 
entitled ``The Role of Technology in Countering Trafficking in 
Persons.'' This is a joint Subcommittee hearing between the 
Investigations and Oversight Subcommittee and the Research and 
Technology Subcommittee, and I'm so pleased to welcome 
Chairwoman Stevens and Ranking Members Norman and Baird, as 
well as all of our colleagues. As we prepare to mark the annual 
World Day Against Trafficking in Persons on July 30, I can 
think of no better time to shine a light on the tragic 
persistence of human trafficking and explore the new 
technologies that will assist our efforts to defeat this 
scourge once and for all. Trafficking in persons is a complex 
problem, in the United States and around the world. We need to 
develop better tools to disrupt criminal networks, bring the 
perpetrators to justice, and support the victims of human 
trafficking. This hearing is an opportunity to learn about new 
research and novel technologies, and to consider how America 
can better integrate those assets into the fight against human 
trafficking.
    Let's be clear--technology is frequently misused to 
facilitate trafficking in persons. It provides new 
opportunities for traffickers to target potential victims, 
conduct anonymous and illicit financial transactions, and 
expand their criminal markets. Yet despite its obvious 
challenges, technology is also an important asset for those 
involved in combatting trafficking in persons. Its positive use 
can aid investigations, enhance prosecutions, raise awareness, 
provide services to victims, and shed new light on how 
trafficking networks operate. With this in mind, our ability to 
counter trafficking in persons largely depends on how we 
harness technology in our efforts.
    We know that there is a lot of good work happening to 
combat human trafficking, but there also seems to be a lot of 
opportunity to elevate the role of the Federal research and 
development enterprise and increase collaboration between the 
agencies. The National Science Foundation, the National 
Institute of Standards and Technology, the Department of 
Homeland Security's Science and Technology Directorate, the 
Department of Transportation R&D programs, and others can all 
contribute to the goals of prevention and disruption of this 
crime.
    We have at our disposal a wide range of tools that could be 
used to support anti-trafficking efforts, including through 
artificial intelligence and machine learning. For example, AI 
can help make predictions, recommendations, or decisions to 
identify financial transactions that may be indicative of human 
trafficking networks. I'm looking forward to hearing from 
today's panel of witnesses because they bring real-world 
experience to the table, and can recommend ways that we on the 
Science Committee can support efforts to meet challenges with 
cutting-edge technology.
    This hearing is a great opportunity to think outside the 
box when it comes to research and technology that can address 
the many causes and consequences of human trafficking. The more 
obvious examples are technologies that can aid law enforcement 
in identifying potential perpetrators and victims. Beyond that, 
there are analysis tools that can comb through the dark web for 
illicit transactions; blockchain can help companies track their 
supply chains and identify vulnerabilities that increase the 
risk of human trafficking; and there's an acute need for social 
science research to assess the medical, emotional, and material 
needs of victims and ensure they are connected to resources 
that can help them as they reenter society.
    Thank you to our witnesses for appearing today. Your 
expertise will be invaluable as we consider how the Science 
Committee's oversight and legislative powers can help in the 
fight against human trafficking.

     Chairman Foster.  And the Chair now recognizes Ranking 
Member Norman for an opening statement.
     Mr. Norman.  Thank you, Chairman Foster, and Chairwoman 
Stevens. And I want to thank our witnesses for taking the time 
to participate in this joint Subcommittee hearing on this sad 
but real issue, problem that we have going on in America. I'm 
looking forward to learning more from our expert witnesses 
about how technology is being leveraged to combat human 
trafficking and what tools are needed to tackle it.
     Human trafficking is a heinous crime that unfortunately 
impacts all countries. Experts estimate that there are 
approximately 25 million victims of human trafficking around 
the world, many at very young ages, generates roughly $150 
billion in illegal profits annually for criminal organizations, 
terrorists, and rogue nations.
     The internet makes it easy for traffickers to exploit 
victims online and abuse technology to advance their criminal 
enterprises. On the other hand, technology can also be used for 
prevention, prosecution, and the protection of victims and the 
survivors.
     The United States is leading the charge to eradicate human 
trafficking. The Trump Administration has made it a priority to 
confront human trafficking head on using available resources to 
end this horrendous crime once and for all. In 2018, President 
Trump became the first sitting President to attend a meeting of 
the President's Interagency Task Force to Monitor and Combat 
Trafficking in Persons since it was created in 2000. The 
President's recent Executive Order on Combating Human 
Trafficking and Online Child Exploitation in the United States 
establishes a comprehensive and coordinated response to 
preventing and countering human trafficking on United States 
soil.
     It is imperative that we do not turn a blind eye to human 
trafficking in our own communities and work together to address 
and end this crime for good. I again want to thank the 
witnesses for taking the time to share your expertise with us 
today. I yield back the balance of my time.
     [The prepared statement of Mr. Norman follows:]

    Thank you, Chairman Foster, and Chairwoman Stevens. And 
thank you to our witnesses for your participation today in this 
joint subcommittee hearing.
    I am looking forward to learning from our expert witnesses 
about how technology is being leveraged to combat human 
trafficking and what tools are needed to tackle it.
    Human trafficking is a heinous crime that unfortunately 
impacts all countries. Experts estimate that there are 
approximately 25 million victims of human trafficking around 
the world, generating roughly $150 billion in illegal profits 
annually for criminal organizations, terrorists, and rogue 
nations.
    The Internet makes it easy for traffickers to exploit 
victims online and abuse technology to advance their criminal 
enterprises. On the other hand, technology can also be used for 
prevention, prosecution, and the protection of victims and 
survivors.
    The United States is leading the charge to eradicate human 
trafficking. The Trump Administration has made it a priority to 
confront human trafficking head on using available resources to 
end this horrendous crime once and for all. In 2018, President 
Trump became the first sitting president to attend a meeting of 
the President's Interagency Task Force to Monitor and Combat 
Trafficking in Persons since it was created in 2000.
    The President's recent Executive Order on Combating Human 
Trafficking and Online Child Exploitation in the United States 
establishes a comprehensive and coordinated response to 
preventing and countering human trafficking on U.S. soil.
    It is imperative that we do not turn a blind eye to human 
trafficking in our own communities and work together to address 
and end this crime for good. I again want to thank the 
witnesses for taking the time to share your expertise with us 
today. I yield back the balance of my time.

     Chairman Foster.  Thank you. And the Chair now recognizes 
Chairwoman Stevens for an opening statement.
     Ms. Stevens.  Well, good morning and let me say we are all 
ears as we examine the role of science and technology (S&T) in 
combatting human trafficking. I am very eager to hear the 
testimony and responses to our questions from this very 
distinguished panel, particularly as we reflect on World Day 
Against Trafficking in Persons later this week.
     The perpetrators of human trafficking exploit the most 
vulnerable for profit. They often charm or befriend victims, 
mostly the young and those in desperate circumstances, by 
offering a place to live, money, or attention. Then they use 
force, fraud, and coercion to strip them of their freedom. In 
my home State of Michigan, we have had the 11th highest call 
volume in the National Human Trafficking Hotline. I have 
personally attended many symposiums and dialogs on this issue 
in my home district. Particularly in Oakland County, the Human 
Trafficking Task Force serves as a resource for victims and 
their advocates and parents, professionals, and others. 
National and international antitrafficking efforts have helped 
rescue countless survivors of sexual exploitation and forced 
labor.
     Unfortunately, trafficking statistics are increasing 
despite these efforts for the past 20 years. And COVID-19 has 
only rededicated these illicit activities toward more cyber-
enabled exploitation, especially the sexual exploitation of 
minors. This is a $150 billion enterprise in part because it is 
low risk and high reward for the perpetrators. We simply lack 
the tools to disrupt human trafficking at scale, which is what 
we are here today to discuss, explore, and try to solve.
     However, increased and focused investments in science, 
technology, and collaboration enable us to achieve significant 
progress in our antitrafficking efforts. We do not have 
standardized and interoperable data sets to understand and 
measure the prevalence of human trafficking and not having 
identifiable metrics for measuring effectiveness of 
interventions. But increased collaboration among organizations 
collecting various types of data and tools such as machine 
learning can help us overcome these challenges.
     I'm calling today on our National Science Foundation, the 
Department of Transportation, the National Institute of 
Standards and Technology, all agencies that fall under our 
jurisdiction on the Research and Technology Subcommittee to 
utilize their resources, to develop tracking, standards, detect 
patterns, and develop data analytics to combat the existence of 
human trafficking at a national and global level.
     We have a lot of work to do, and I am very proud to be 
here with all of you today on this topic. Let's get something 
done. Thank you, Mr. Chairman. I yield back.
     [The prepared statement of Ms. Stevens follows:]

    Good morning and welcome to this hearing to examine the 
role of science and technology in combatting human trafficking. 
I look forward to hearing testimony from our distinguished 
panel of witnesses on this critical issue, especially as we 
prepare to reflect on World Day Against Trafficking in Persons 
later this week.
    The perpetrators of this crime exploit the most vulnerable 
for profit. They often charm or befriend victims, mostly the 
young and those in desperate circumstances, by offering a place 
to live, money or attention. Then they use force, fraud, and 
coercion to strip them of their freedom. In my home state of 
Michigan, we have the 11th highest call volume to the National 
Human Trafficking Hotline. In my own district, the Oakland 
County Human Trafficking Task Force serves as a resource for 
victims and their advocates and parents, professionals, and 
others.
    National and international anti-trafficking efforts have 
helped rescue many survivors of sexual exploitation and forced 
labor. Unfortunately, trafficking statistics are increasing 
despite these efforts for the past 20 years. And COVID-19 has 
only re-directed these illicit activities toward more cyber-
enabled exploitation, especially the sexual exploitation of 
minors. This is a $150 billion enterprise in part because it is 
low risk and high reward for the perpetrators. We simply lack 
the tools to disrupt human trafficking at scale.
    However, increased and focused investments in science, 
technology, and collaboration may enable us to achieve 
significant progress in our anti-trafficking efforts. We do not 
have standardized and interoperable data sets to understand and 
measure the prevalence of human trafficking and not having 
identifiable metrics for measuring effectiveness of 
interventions. But increased collaboration among organizations 
collecting various types of data and tools such as machine 
learning can help us overcome these challenges. I am calling on 
the National Science Foundation, the Department of 
Transportation, the National Institute of Standards and 
Technology and other federal research agencies to utilize their 
resources to develop tracking, standards, detect patterns, and 
develop data analytics to combat the existence of human 
trafficking at a national and a global level.
    We have a lot of work to do and I look forward to today's 
discussion.
    Thank you and I yield back.

     Chairman Foster.  Well, thank you. And the Chair will now 
recognize Ranking Member Baird for an opening statement.
     Mr. Baird.  Well, thank you, Chairman Foster and 
Chairwoman Stevens, for convening this hearing to examine the 
role of science and technology in disrupting this horrendous 
trade of human trafficking. It's good to see my colleague 
Ranking Member Norman, and I do want to thank all the witnesses 
for being here today and sharing their expertise. Many of my 
remarks, Mr. Chairman, are going to be very similar to some of 
those that have already been made, but I think that kind of 
demonstrates how significant this problem is and how important 
it is that we utilize all of our experience and the experience 
of the witnesses here today to try to counteract this problem.
     You know, and someone already mentioned there's 25 million 
people worldwide are exploited and subjected to forced labor 
through human trafficking every year. To say human trafficking 
is a monumental challenge, I think, would be an understatement. 
It's a challenge that requires a global response. It requires 
international coordination and engagement between government, 
industry, non-profit organizations, and academia. We have such 
a capability in our world today to move internationally and 
move these kinds of situations internationally, and so I do 
think it takes the international coordination and engagement.
     As they've already been mentioned, this is the 20th 
anniversary of the signing of the United Nation's Trafficking 
in Persons Protocol and the enactment of the United States 
Trafficking Victims Protection Act. And over these 20 years, 
public awareness of human traffic has grown substantially. 
Reporting and detection of trafficking is also up globally. 
This anniversary is the opportunity to recognize the progress 
that has been made, but it's also a chance for us to take a 
look at the future to examine and accelerate the new tools to 
prevent, combat, and end human trafficking over the next 20 
years.
     It's amazing to me when we think about the advancements in 
technology in the last 20 years, these last two decades, so 
being able to utilize that technology, it has been an 
enhancement for traffickers. It makes it easier for them, but 
it also may serve as a tremendous tool for us to have 
counterefforts to prevent this kind of thing from taking place.
     Today, we see NGOs (non-governmental organizations) and 
governments and industry using technology to protect victims, 
to stop the traffickers, and prevent trafficking by identifying 
and dismantling the systems that allow them to operate. We're 
lucky to have the experts in these fields with us today as our 
witnesses.
     I would like to applaud the work of the Trump 
Administration in strengthening the Federal responsiveness to 
human trafficking and encouraging increased collaboration from 
government, industry, and law enforcement.
     Lastly, I would be remiss if I did not mention how the 
COVID-19 pandemic has magnified the need for all stakeholders 
to work together in this fight. We know persons who are 
targeted by traffickers tend to be the most vulnerable. 
Isolation and the closure of critical services caused by the 
pandemic means the number of vulnerable people susceptible to 
exploitation by traffickers is rapidly growing.
     So I look forward to hearing from our witnesses today on 
how their organizations are utilizing research and technology 
to stem this tide and strengthen efforts to combat human 
trafficking. Thank you all for taking your time to be here with 
us this morning, and I yield back the balance of my time.
     [The prepared statement of Mr. Baird follows:]

    Thank you, Chairman Foster and Chairwoman Stevens, for 
convening today's hearing to examine the role of science and 
technology in disrupting the horrendous trade of human 
trafficking.
    Nearly 25 million people worldwide are exploited and 
subjected to forced labor through human trafficking every year. 
To say human trafficking is a monumental challenge would be an 
understatement. It is a challenge that requires a global 
response. It requires international coordination and engagement 
between government, industry, non-profit organizations, and 
academia.
    This year is the 20th anniversary of the signing of the 
United Nation's Trafficking in Persons Protocol and the 
enactment of the United States Trafficking Victims Protection 
Act. Over the last 20 years, public awareness of human 
trafficking has grown substantially. Reporting and detection of 
trafficking is also up globally. This anniversary is an 
opportunity to recognize the progress that's been made. But it 
is also a chance for us to look to the future to examine and 
accelerate new tools to prevent, combat, and end human 
trafficking over the next 20 years.
    Technology will play a critical role in combatting human 
trafficking in the future. Although technology can be a tool in 
the hands of the trafficker, it can also be a key tool in our 
efforts to combat trafficking. Today, we see NGOs, governments 
and industry using technology to protect victims, stop 
traffickers, and prevent trafficking by identifying and 
dismantling the systems that allow them to operate. We are 
lucky to have experts in these fields with us today as our 
witnesses.
    I would also like to applaud the work of the Trump 
Administration in strengthening the Federal responsiveness to 
human trafficking and encouraging increased collaboration from 
government, industry, and law enforcement.
    Lastly, I would be remiss if I did not mention how the 
COVID-19 pandemic has magnified the need for all stakeholders 
to work together in this fight. We know persons who are 
targeted by traffickers tend to be the most vulnerable. 
Isolation and the closure of critical services caused by the 
pandemic means the number of vulnerable people susceptible to 
exploitation by traffickers is rapidly growing.
    I look forward to hearing from our witnesses today on how 
their organizations are utilizing research and technology to 
stem this tide and strengthen efforts to combat human 
trafficking. Thank you all for taking your time to be here with 
us this morning and I yield back the balance of my time.

     Chairman Foster.  Thank you. And if there are any Members 
who wish to submit additional opening statements, your 
statements will be added to the record at this point.
     [The prepared statement of Chairwoman Johnson follows:]

    I want to thank Chairman Foster and Chairwoman Stevens for 
holding this important hearing, and I want to thank our 
witnesses for joining us here today. As many of you know, July 
30th is the U.N. World Day Against Trafficking in Persons. It 
is thus very timely for the Science, Space, and Technology 
Committee to convene a hearing to discuss how research and 
technology can be leveraged to help address the horrific 
problem of human trafficking.
    The Federal government can and should do more to invest in 
research and technology to deal with the many facets of the 
causes and consequences of human trafficking. Earlier this 
year, the Dallas Area Rapid Transit system received funding to 
help identify and adopt specific measures to address human 
trafficking. In order to ensure such money is being used to 
implement science driven, effective approaches to reducing 
trafficking, we must invest in the promising work being done by 
scientists across the country. From analyzing illicit online 
activity, to identifying potential victims and perpetrators of 
human trafficking, to understanding and addressing the needs of 
victims as they reenter society, the research community has 
much to contribute to this important fight.
    As we battle a worldwide pandemic, we must not forget about 
the perennial problem of human trafficking, which touches every 
country and every state. I look forward to hearing from our 
witnesses about how this Committee and this Congress can 
support the research community's important work.
    Thank you, I yield back.

     [The prepared statement of Mr. Lucas follows:]

    Human trafficking is a global problem, causing untold 
suffering and pain. And while it often remains an unseen 
problem, the truth is that it is far more widespread and 
destructive than it may seem.
    Emerging and evolving technologies can help us fight this 
plague, though. One of the reasons I enjoy serving on the 
Science Committee is our ability to focus on solutions to some 
of the greatest challenges we face.
    Trafficking in people is a complex problem and fighting it 
requires work on many fronts, from deterrence to detection and 
from enforcement to survivor support. The encouraging news is 
that advances in technology give us new tools at every step of 
this process.
    Using AI to perform big data analysis can help us identify 
patterns of trafficking-a task far too time-consuming for human 
agents to perform. AI tools can comb through websites to find 
advertisements for trafficked people. Photo recognition 
software can help agents identify where victims are being held 
by analyzing photos for similarities to known locations. 
Similarly, facial recognition software can identify 
similarities between photos of trafficked people and missing 
person notices. Because of machine learning, the more these 
tools are used, the better they become.
    This is just a small sampling of technological 
interventions we can employ to fight trafficking, and our 
witnesses will share many more today.
    The President's Interagency Task Force to Monitor and 
Combat Trafficking in Persons is committed to ending human 
trafficking and supporting survivors of this modern-day 
slavery.
    As Members of the Science Committee, we can help focus and 
enhance the technological tools available to the federal 
government in this effort.
    This is one more area in which investing in basic research 
can produce exceptional dividends. Strategic investment in the 
fundamental knowledge needed to advance technologies like AI 
and big data analysis will pay off in discoveries and 
innovations that law enforcement, private industry, and non-
governmental organizations can use to coordinate and improve 
their efforts to fight trafficking in persons.
    It's one of thousands of applications that will benefit 
from technological advancements, and it is one more reason I've 
proposed doubling our national investment in basic research in 
the Securing American Leadership in Science and Technology Act.
    I hope that our Committee can work together to support the 
technology needed to end human trafficking.

     Chairman Foster.  At this time, I'd like to introduce our 
witnesses. Our first witness is Ms. Anjana Rajan. Ms. Rajan is 
the Chief Technology Officer of Polaris, an NGO that uses data-
driven strategies to disrupt and prevent human trafficking and 
modern slavery. Prior to her role at Polaris, Ms. Rajan was the 
former Chief Technology Officer of Callisto, a nonprofit that 
builds cryptographically advanced technology to combat sexual 
assault and a Tech Policy Fellow at the Aspen Institute.
     After Ms. Rajan is Mr. Matthew Daggett. Mr. Daggett is a 
member of the Technical Staff of the Humanitarian Assistance 
and Disaster Relief Systems Group at the Massachusetts 
Institute of Technology's (MIT'S) Lincoln Laboratory, where 
he's worked since 2005. Mr. Daggett's current research focuses 
on developing analytic technologies and systems for the study 
of dark and illicit social networks such as human trafficking 
operations.
     Our third witness is Ms. Emily Kennedy. Ms. Kennedy is the 
President and Co-Founder of Marinus Analytics, which was 
founded in 2014. Ms. Kennedy has led Marinus Analytics national 
and international social impact efforts, product deployment, 
and partnerships expansion. Marinus Analytics is a semifinalist 
in the global IBM Watson AI XPRIZE competition.
     Our final witness is Ms. Hannah Darnton. Ms. Darnton is an 
Associate Director of Ethics, Technology, and Human Rights at 
Business for Social Responsibility. Ms. Darnton focuses on the 
intersection of human rights and new disruptive technology and 
leads the Tech Against Trafficking Collaborative Initiative. 
Prior to her position at Business for Social Responsibility, 
Ms. Darnton worked with the Skoll Foundation.
     And, as our witnesses should know, you will each have 5 
minutes for your spoken testimony. Your entire written 
testimony will be included in the record of the hearing. And 
when you've all completed your spoken testimony, we will begin 
with questions. Each Member will have 5 minutes to question the 
panel.
     And we will now start with Ms. Rajan. You are recognized 
for 5 minutes.

                 TESTIMONY OF MS. ANJANA RAJAN,

                CHIEF TECHNOLOGY OFFICER, POLARIS

     Ms. Rajan.  Thank you, Chairman Foster, Ranking Member 
Norman, Chairwoman Stevens, Ranking Member Baird, and Members 
of the Subcommittees, for having me here today. My name is 
Anjana Rajan, and I'm the Chief Technology Officer of Polaris.
     Polaris's mission is to eradicate human trafficking and 
restore freedom to survivors. We do this in two main ways. 
First, we provide immediate response to victims and survivors 
of human trafficking through our technical operation of the 
National Human Trafficking Hotline. Second, we take the 13 
years of data and insight from the hotline to make long-term 
systems change. We tackle the underlying systems that enable 
sex and labor trafficking, and we work with financial 
institutions to make trafficking less profitable and higher 
risk. Survivors' perspectives inform all of our work.
     At its core, human trafficking is the business of 
exploiting people for profit. It is a $150-billion-a-year 
criminal industry with 25 million victims worldwide. Fighting 
human trafficking must focus on the broader systems that make 
people vulnerable to sex and labor trafficking, and technology 
should be part of an overall strategy to drive change at the 
systems level.
     Human trafficking is about people with power exploiting 
and controlling vulnerable people for their own profit. 
Survivors tell us that restoring their sense of control, 
including choosing when law enforcement intervenes, is 
paramount to their healing. Technology should not only enable 
law enforcement to identify traffickers, it should also be used 
to put power back in the hands of victims and survivors.
     To pass meaningful and effective legislation, it is 
imperative for legislators to fully understand how these 
technologies work. One of the technologies that has recently 
been discussed in this space is encryption. Since my background 
and expertise are in applying cryptography to human rights and 
national security issues, I would like to focus my testimony on 
the importance of encryption in fighting human trafficking.
     In the public debate around encryption, we often only see 
two sides represented, one side that says we should identify 
and apprehend perpetrators at all costs even if that means we 
break encryption to do it, and the other side that says we 
should protect encryption at all costs even if that means 
victims and survivors get hurt. This is a false dichotomy. 
There is a third way that can optimize for both virtues because 
encryption protects victims and survivors. In fact, we can hold 
perpetrators and the platforms that enable them accountable for 
their abuse and exploitation using advanced cryptography, but 
doing so will require innovative thinking and an accurate 
understanding of how these technologies work.
     The threats victims and survivors face are very dangerous, 
uniquely complex, and highly dynamic. They face prolonged 
control and manipulation from traffickers and organized crime 
networks. They face physical, psychological, and sexual 
violence. They face intimidation from conspiracy theorists who 
weaponize disinformation about human trafficking. They may even 
face threats from law enforcement agencies who arrest them 
instead of helping them find freedom.
     To honor the exploratory nature of this Committee hearing, 
I am proposing three possible ideas on how encryption could be 
used help fight human trafficking and support victims and 
survivors.
     First, victims and survivors need safe trauma-informed 
reporting channels. Cryptographic reporting escrows are 
examples of systems where they can learn about their options 
and have the power to take action that is best for them. The 
underlying technology pinning these escrows is called secure 
multiparty computation.
     Second, human trafficking is inherently a commercial 
enterprise. Financial system intervention in human trafficking 
has the potential to increase the risk for traffickers and 
reduce a community's vulnerability to trafficking. Homomorphic 
encryption could allow human trafficking researchers to run 
analytical functions directly on a financial institution's 
encrypted data without ever seeing the sensitive plaintext.
     And third, since human traffickers have eagerly adopted 
the use of cryptocurrencies, law enforcement could leverage the 
fact that these transactions are permanently stored on a public 
decentralized blockchain ledger. With known wallet addresses 
and their corresponding public transactions, law enforcement 
agencies can build an open source data set of human trafficking 
buyers and sellers and ultimately map out the entire network of 
a human trafficking ring.
     In conclusion, human trafficking is a complex problem that 
requires nuanced solutions. It is the result of social, policy, 
and market failures. Technology at its best can help rebalance 
power. However, it is not a panacea. The unchecked use of 
advanced technologies have the potential to suppress freedom 
rather than restore freedom to survivors. We need to design and 
deploy technology with the best interest of victims and 
survivors at the center.
     Thank you for the opportunity to testify. I'm happy to 
answer any questions you may have. Thank you.
     [The prepared statement of Ms. Rajan follows:]
     
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]     
        
     Chairman Foster.  Thank you. And next is Mr. Daggett.

                TESTIMONY OF MR. MATTHEW DAGGETT,

            TECHNICAL STAFF, HUMANITARIAN ASSISTANCE

               AND DISASTER RELIEF SYSTEMS GROUP,

                      LINCOLN LABORATORY,

              MASSACHUSETTS INSTITUTE OF TECHNOLOGY

     Mr. Daggett.  Good morning, Chairman Stevens, Ranking 
Member Baird, Chairman Foster, Ranking Member Norman, and 
Members of the Subcommittee. Thank you for the honor and the 
privilege of joining you today to represent the Massachusetts 
Institute of Technology's Lincoln Laboratory and discuss with 
you some of our research and recommendations toward improving 
the role of technology in countering human trafficking.
     MIT Lincoln Laboratory researches and develops a broad 
array of advanced technologies to meet critical U.S. Government 
national security needs. One of our core areas of research 
involves developing technologies for global humanitarian 
assistance and disaster relief, and as part of that initiative, 
we are building novel technologies and systems to counter human 
trafficking. In that role, we're leveraging advances in data 
science, machine learning, and related fields to develop 
enhanced digital evidence analysis capabilities and 
collaborations with Federal and State agencies to reduce the 
time and human-intensive nature of trafficking investigations 
and prosecutions. We also developed a human trafficking 
technology roadmap for the Federal Government consisting of 
targeted findings and recommendations sequenced into a 
prioritized and phased implementation strategy.
     I hope that my testimony today will provide a unique 
perspective on the challenges and opportunities of current 
research and technology for combating human trafficking, and 
the following recommendations, which are detailed in my written 
testimony, may help inform actionable policy initiatives.
     First, the most urgent need for applying technology to 
counter human trafficking is substantially increasing Federal 
funding for research and development, R&D efforts. Today, 
several agencies fund primarily academic research and studies, 
and more funding is greatly needed for prototyping and 
development of new technology. Comparatively, Federal R&D 
budgets that counter other types of illicit and organized crime 
such as narcotics smuggling and counterterrorism are several 
times greater than those for human trafficking. This scarcity 
of funding in size and in frequency limits the establishment of 
a community of engineers, scientists, and technologists who 
understand the human trafficking domain and can become 
practitioners in developing needed solutions.
     Second, we need to establish an interagency R&D entity 
specifically for human trafficking and fundamentally rethink 
how we approach R&D initiatives. Today, point solutions are 
solicited, funded, and developed within individual agencies and 
are often not coordinated across interagency operations and 
result in more limited impacts than if developed in concert 
with other initiatives as part of a broader research strategy 
and vision. And an interagency structure specifically for R&D 
that is focused on and empowered to take risks could 
revolutionize the funding, development, operationalization of 
technology, while improving collaboration and reducing 
duplication of effort.
     Third, we must enhance our R&D agility in technology 
transition. Often, technology is not fully informed by and 
developed in concert with the operations they seek to impact 
and fail to be adopted by practitioners once mature. Agencies 
should adopt a user-centered paradigm where operators are joint 
stakeholders at every stage of the R&D process. User-centered 
methods enable technology to adapt to the mission much more 
quickly and the mission to evolve with continual advances in 
the technology resulting in increased agility, improved 
adoption, and enhanced operations. Additionally, we must 
transition capabilities to our State and local partners, as 
those agencies need new technology the most and have 
significant opportunities for impact.
     Fourth, we need to cross-leverage government technology 
delivered within one mission that has a direct impact--
application or could be modified for a different mission area. 
For example, Department of Defense capabilities to characterize 
and interdict terrorist networks have strong corollaries to 
human trafficking networks. To increase opportunities for 
cross-leverage, the government could establish and elicit a 
network technology working group to create a conduit for shared 
research and technical capabilities across agencies.
     Fifth, we need to measure--develop measures of 
effectiveness and assess our impacts. A key component of a 
coordinated R&D strategy is a process to measure progress 
against an objective. And while Federal and State agencies 
track performance statistics such as individuals prosecuted or 
victims provided with a service, no measure of merit exists to 
assess the effectiveness of the collective government response 
to human trafficking. In order to frame such numbers, we need 
national levels of models of vulnerability, prevalence, and 
demand estimation. Measures of performance and effectiveness 
need to be developed alongside research initiatives so that 
they can impact these investments, and the resultant 
capabilities can assist.
     Six, we need to address the existing technology gaps 
today, including developing capabilities to automate time-
consuming analytical tasks and reduce workloads for 
investigators and prosecutors; enhancing financial 
telecommunication and forensics device evidence analysis; 
establishing repositories of tools, evidence templates, and 
trafficking signatures to be shared among organizations; 
improving the standardization, completeness, and consistency of 
trafficking data collection; and establishing incentive 
mechanisms to greater enable data-sharing.
     Human trafficking is a challenging and pervasive problem 
that necessitates broad action and bold ideas. Thoughtfully 
designed technology can empower the collective human 
trafficking community to disrupt these illicit operations. 
Increased R&D holds the potential to make a tremendous impact 
by accelerating justice and hastening the healing of victims.
     I want to thank you for your interest in this pressing 
issue and for the opportunity to speak with you today. Thank 
you.
     [The prepared statement of Mr. Daggett follows:]
     
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]     
    
     Chairman Foster.  Thank you. And next is Ms. Kennedy, now 
recognized for 5 minutes.

                 TESTIMONY OF MS. EMILY KENNEDY,

           PRESIDENT AND CO-FOUNDER, MARINUS ANALYTICS

     Ms. Kennedy.  Chairman Foster, Chairwoman Stevens, Ranking 
Members Norman and Baird, and Members of the Subcommittees, 
thank you for the opportunity to appear before you today to 
discuss the role of artificial intelligence in fighting human 
trafficking. My name is Emily Kennedy, and I am President and 
Co-Founder of Marinus Analytics.
     Sex trafficking is rape for profit, and it's one of the 
most egregious crimes of our time. I first encountered human 
trafficking when traveling through Eastern Europe as a 
teenager, and I knew that I had to spend my life doing 
something about it.
     What started as my student project in Carnegie Mellon 
University robotics resulted in a tool that has helped identify 
an estimated 6,800 victims of sex trafficking just in the last 
2 years. My company Marinus Analytics develops AI for social 
impact. Our flagship software Traffic Jam is an AI-based 
investigative tool used by law enforcement across the United 
States, Canada, and the U.K. to identify sex trafficking 
victims and dismantle organized criminal networks. It's also 
used by nonprofits like the National Center for Missing and 
Exploited Children (NCMEC), which uses Traffic Jam to process 
the approximately 10,000 child sex trafficking reports they 
receive every year.
     Traffic Jam looks at data across publicly available online 
classified ads like the ones as notorious as Backpage.com where 
their victims are advertised. We see millions of data points 
weekly here in the United States. This activity is far too 
extensive for investigators to process manually, and it makes 
it easier for traffickers to stay hidden in the data.
     Traffic Jam leverages AI to find patterns that aid in 
victim recovery and help reveal massive organized criminal 
networks. For example, the tool can identify trafficking rings 
operating across cities and States and help prioritize leads 
for critical resource planning.
     Traffic Jam helps narrow the scope of relevant information 
to an amount that is manually digestible. It brings to light 
the most potentially actionable leads for an investigation, and 
it often cuts down investigative time from months to days for a 
fraction of the cost of a full-time equivalent.
     In addition to helping find missing kids, we also identify 
organized crime groups exploiting dozens or even hundreds of 
victims. As a result of one of the leads that we generated, an 
organized crime ring was indicted in early 2019 for trafficking 
Chinese foreign nationals for sex in 12 U.S. cities and 
Toronto. The sting operation successfully took down nearly 500 
website domains and computer systems that logged more than 
30,000 customer phone numbers.
     The COVID-19 pandemic has increased the economic risk for 
already-vulnerable persons to fall into human trafficking. We 
saw at most about a 20 percent drop in activity over the first 
half of this year, and activity has since grown back to near 
normal levels. This could suggest new entrants into this space 
despite increased physical risks, and it could also suggest an 
increased reliance on digital forms of commercial sex.
     Traffic Jam provides reports that highlight recent 
potentially vulnerable entrants into commercial sex during the 
lockdown, and by pairing this with victim-centered training, we 
help promote safeguarding during the pandemic.
     There are also frequent upheavals in the online space. 
When Backpage.com was shut down, illicit activity rapidly 
shifted to a variety of smaller websites. But within 6 months, 
we saw the total activity on these websites surpass the volume 
on Backpage in the month before the shutdown. Many 
investigators had cases whose online presence went cold when 
they couldn't easily go to Backpage to find new activity, but 
we were able to quickly help them navigate this new 
environment.
     And recently, we have seen new challenges in a flood of 
phishing and cyber fraud online. Money made from these schemes, 
in addition to money laundering of sex trafficking proceeds 
often fund organized crime. More research and development are 
needed here to identify and combat the funding channels 
sustaining organized crime groups.
     All of this would not have been possible without the 
support of the National Science Foundation, who believed in our 
mission of AI for social good. The NSF bridges the crucial gap 
between scientific research and operational impacts. We 
participated in the NSF I-Corps program before receiving 
funding and found it invaluable. The I-Corps program meets a 
crucial need for commercialization of university research 
because it provides a training ground before entrepreneurs 
launch.
     The funding we received through the NSF SBIR (Small 
Business Innovation Research) has also been crucial to our 
success. SBIR focuses on high-risk, high-reward research, which 
is important because criminals move so fast online that 
innovation is needed to keep pace. Now that we have grown from 
a startup to a small business, we would encourage you to help 
NSF and the SBIR program provide more exposure to potential 
Federal Government customer relationships and reduce 
procurement challenges for up-and-coming businesses who serve 
the public sector. We also encourage continued authorization of 
funding for NSF to do this work because it is driving the 
ingenuity that we need to solve these serious, worldwide 
problems.
     I look forward to your questions. Thank you.
     [The prepared statement of Ms. Kennedy follows:]
     
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]     
      
     Chairman Foster.  Well, at this point we will begin our 
first round of questions. The Chair will now recognize himself 
for 5 minutes.
     And, first, we have to thank Ms. Rajan for her shout out 
for homomorphic cryptographic systems. This, I think, is our 
second Subcommittee that I've chaired that has actually dealt 
with this issue, which is the solution--the potential solution 
for a large number of problems we face trying to strike the 
right balance between privacy and detection of criminal 
activities.
     And so although the problem of human trafficking is 
certainly not a new one, there are modern technologies, you 
know, things like online marketplaces and so on----
     Voice.  Chairman Foster----
     Mr. Weber.  Hey, Bill----
     Voice [continuing]. I think we may have another witness.
     Chairman Foster.  Whoops. Oh, I am terribly sorry. OK. 
Thank--you know, I--all right. My apologies. And so I will now 
recognize Ms. Darnton for 5 minutes, and my apologies.

                TESTIMONY OF MS. HANNAH DARNTON,

           ASSOCIATE DIRECTOR OF ETHICS, TECHNOLOGY,

      AND HUMAN RIGHTS, BUSINESS FOR SOCIAL RESPONSIBILITY

     Ms. Darnton.  Not a problem. Thank you so much. Good 
morning, Chairman Foster, Chairman Stevens, Ranking Members 
Baird and Lucas, and Members of the Subcommittee. And thank you 
so much for having me here today.
     I am Hannah Darnton from Tech Against Trafficking, and 
Tech Against Trafficking is a coalition of technology 
companies, including Amazon, AT&T, BT, Microsoft, and 
Salesforce.org that are collaborating with global experts to 
help eradicate human trafficking using technology. Launched in 
2018, the goal of Tech Against Trafficking is to work with 
civil society, law enforcement, academia, and survivors to 
identify and support technology solutions that disrupt and 
reduce human trafficking that prevent and identify crimes and 
that provide remedy mechanisms for victims and survivors.
     To inform the development of Tech Against Trafficking's 
long-term strategy, our first step was actually to map the 
landscape of existing technology tools being used to combat 
human trafficking. Together with partners, we've actually 
identified over 305 antitrafficking technology tools across a 
range of geographies, target users, and focus areas. The tools 
range from simple mobile apps informing vulnerable communities 
and individuals at risk of labor exploitation to more advanced 
technologies such as satellite imagery and geospatial mapping 
tools being used to track down fishing vessels engaged in 
illegal activity. We also identify tools using facial 
recognition and blockchain, big data analysis, and 
visualization.
     Beyond individual organizations, technology presents a 
massive opportunity for the broader antitrafficking field. 
Technology can help disparate actors connect across 
geographies, share data to facilitate the identification and 
victims of traffickers--victims and traffickers, and improve 
case management and survivor care, as well as raising awareness 
in at-risk communities.
     However, as was stated earlier by earlier panelists, the 
antitrafficking ecosystem is largely siloed. In collaboration 
and engagement between organizations, deploying these 
technologies is minimal. Efforts are often duplicated, and 
opportunities for new solutions are missed due to lack of 
information about similar initiatives, the lack of shared or 
compatible data, nominal technical infrastructure and 
expertise, and a dearth of sustained funding and support.
     As an example, our mapping identified approximately 70 
unique technology tools developed for the purpose of victim or 
trafficker identification. Our goal at Tech Against Trafficking 
is to help support the work of individual organizations looking 
to more effectively utilize and deploy technology to advance in 
skill their work by simultaneously creating the connective 
tissue to bring together organizations and technology tools 
operating across antitrafficking sectors and lead them to 
systems-level change.
     To this end, in 2019 we launched the Tech Against 
Trafficking accelerator program. This accelerator advances and 
scales the work of selected organizations deploying promising 
technology solutions by providing resources and support from 
our member companies while building an ecosystem of actors that 
will provide ongoing support for the participating 
organization.
     For the inaugural Accelerator, the Tech Against 
Trafficking members and advisors worked with the Counter 
Trafficking Data Collaborative, CTDC, an initiative of the 
International Organization for Migration, to explore and 
promote best practices around data anonymization, privacy, and 
security, and I'm happy to provide more information on this if 
needed.
     Beyond the Accelerator, we've published findings from our 
landscape analysis in an interactive map on the Tech Against 
Trafficking website and partnered closely with the OSCE, the 
Organization for Security and Cooperation in Europe, to put out 
a seminal publication in June on the use of technology to fight 
trafficking in human beings. While I'd recommend reading the 
full paper to glean insights from the research, we do have a 
number of specific points that we'd like to highlight for 
government actors looking to support technology in the field.
     The first is the need for ongoing technical support. 
Technology often acts as a multiplier effect in terms of 
organizational impact, but many of the civil society 
organizations, nonprofits developing and deploying these tools 
have limited capacity, resources, and personnel, which creates 
barriers and challenges to taking on and maintaining effective 
technology and scaling it. The maintenance of such tools is 
particularly important. Organizations often receive funding to 
use or develop technology. However, without that ongoing 
resource and support, they often have difficulties keeping the 
technology up-to-date and operational, iterating it and 
customizing it to become more effective, and it severely 
inhibits the usage, utility, and impact of such a tool. The 
government can play an enabling role here by building the 
capabilities and relationships between stakeholders that 
facilitate the effective use of these technologies.
     Furthermore, we'd like to see active engagement and 
participation of those closest to the issues. Those who are 
funding, developing, and implementing technology-based 
solutions should ensure the active engagement and participation 
of vulnerable populations and target groups through the design, 
development, and deployment of solutions. We also want to make 
sure these technologies are fit-for-purpose, addressing the 
problems at hand, that we're looking at the limitations of what 
technology can do. They can't substitute for the range of other 
factors needed to effectively combat trafficking, and that we 
consider the easy solutions.
     So a range of tech solutions are needed in this space, 
many actually, WhatsApp, Facebook Messenger, dedicated SMS 
(short message service) channels allow multiple avenues to 
communicate with victims seeking assistance, and these simple 
solutions can provide straightforward ways for victims to 
communicate in real-time with service providers or personal 
support networks. And the organizations are looking for simple 
tech solutions or focus on the underlying infrastructure that 
would allow them to use technology effectively.
     And finally, and perhaps most importantly, we'd like to 
look at due diligence of these solutions. The provision of such 
technologies must be accompanied with training not only for the 
direct use of tools but for their ethical use with respect of 
human rights and data protection. Due diligence should be 
conducted on all technologies deployed by government, law 
enforcement, and service providers to identify, avoid, address, 
and mitigate potential adverse human rights impacts that may 
arise from the use of these technologies in accordance with the 
U.N. Guiding Principles on Business and Human Rights. I'll stop 
there.
     [The prepared statement of Ms. Darnton follows:]
     
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]     
     
     Chairman Foster.  Well, thank you. And my apologies again 
for making a mistake in the order. I will try to limit myself 
to a little less than the 5 minutes that I normally take here.
     And maybe I'll just sort of cut to the chase of one of the 
things. A number of the Members here wrestle with the issue of 
the tradeoff of privacy in payments versus--you know, versus 
the need for law enforcement to actually see what's going on. 
And we wrestle with that in Financial Services, as well as the 
Science Committee.
     And so I guess if all the witnesses here could comment on 
whether you think that eventually we're simply not going to be 
able to allow anonymous cryptographic payment tools that are 
truly anonymous or whether we're going to have to be in a 
situation where you can go to a trusted court system, 
demonstrate probable cause, and unmask the participants in a 
digital payment transaction. How do all of you individually, 
collectively, see that tradeoff, and what--the endpoint we're 
going to have to go to there? Yes, just pick it up. I'll pick 
on someone or--Ms. Rajan, I bet you've thought about this.
     Ms. Rajan.  Sure. I think you bring up a great point about 
the use of cryptocurrency in human trafficking. Like in many 
criminal enterprises, human traffickers have adopted the use of 
cryptocurrencies to finance their operations. And 
cryptocurrencies are appealing for many reasons. First, the 
decentralized nature means there's no central authority that 
can shut down or freeze funds. And second, it provides a 
certain level of anonymity because you can create a Bitcoin 
address and receive tokens without needing to provide a valid 
name or address.
     According to a company called Chainalysis, which is a tech 
company that analyzes blockchain data, there was nearly $1 
million worth of Bitcoin and Ethereum payments in 2019 for 
child sexual abuse material.
     This isn't unique to human trafficking. We've seen this in 
domestic terrorism and extremism. In fact, the House Committee 
on Financial Services had a hearing earlier this year about the 
financing of domestic terrorism and extremism, and one of the 
recommendations presented at the hearing was that 
cryptocurrency providers should ban extremist organizations 
with the intention of cutting off their financial supply. And 
one could argue that it would--you can make a similar 
recommendation for human trafficking.
     But there is a lot of limitations to that recommendation. 
First, I think it would--some cryptocurrency advocates would 
argue that it really violates the intended value proposition of 
a decentralized currency, and private-sector stakeholders are 
very likely to push back on this regulation. Second, it merely 
treats the symptom, not the root cause. Bad actors will 
continue to find new and illicit ways to finance their 
operations. But, most importantly, eliminating access misses 
the very significant opportunity to leverage the technology's 
properties to solve the primary problem of dismantling human 
trafficking networks altogether.
     As I mentioned earlier, the unique properties of 
blockchain technology actually allow us to fight against human 
trafficking. Even though cryptocurrencies are anonymous, part 
of what drives the consensus around the legitimacy of the 
currency is that the transactions are permanently stored on a 
very public, decentralized immutable ledger, so, again, if law 
enforcement can uncover the Bitcoin wallet addresses, you can 
actually map the whole network of a human trafficking ring and 
ultimately dismantle a human trafficking crime network.
     Chairman Foster.  Yes, that is true, and we have to speak, 
I guess, carefully because we can have very interesting 
classified briefings on the extent to which Bitcoin is truly 
anonymous. But the--there are next-generation cryptographic 
currencies that will be much closer to truly anonymous. And so 
the question is will we ultimately have to ban these as an 
essential part of preventing things like money laundering? 
Just, you know, what do you think the endpoint of that 
discussion is? You know, if you were in charge, anyone of our 
witnesses here, that if you were in charge of making a 
decision, should we ultimately have to ban truly anonymous, you 
know, value transactions? Or not? It's a tough one. All right. 
Matthew, I'll pick on you.
     Mr. Daggett.  OK. I'll try and take a stab at that. One of 
the things I would like for--to keep in mind is thinking about, 
you know, measures and counters. So when there was pressure put 
on Backpage to--for the credit card providers to stop accepting 
credit card payments, some of that moved to Bitcoin. The same 
thing when Backpage was taken down, you know, the--some of that 
activity scattered away from one large site to many smaller 
different sites.
     So thinking about when you apply this Darwinian pressure 
to any one facet of this problem, you need to be thinking about 
what do you think that the next--you know, the primary and 
secondary effects are going to be from a policy initiative or 
some type of, you know, enforcement action.
     The other thing to keep in mind is that because of the 
democratization of technology and how a low barrier to entry it 
is to get into this crime, you know, the saying used to be the 
cost of a Backpage ad and a burner cell phone and you 
essentially have a trafficking operation. There is still 
tremendous money being moved around in all cash, laundered 
through gift cards, as well as using, you know, money remitters 
for some of the more international ones, so it's----
     Chairman Foster.  OK.
     Mr. Daggett [continuing]. Important to kind of--they won't 
be the most sophisticated actors. There will be a range of 
different actors.
     Chairman Foster.  OK. Thank you. And I will now recognize 
Ranking Member Norman for 5 minutes.
     Mr. Norman.  Thank you, Chairman Foster.
     This is for Ms. Darnton. Ms. Darnton, the exploitation of 
children is huge in my district. With COVID-19, schools not 
being in session, the FBI (Federal Bureau of Investigation) has 
issued a warning about the closings. What measures are we 
taking to protect the children from sexual exportation when 
many times the parents are working and are just not there?
     Ms. Darnton.  Thank you so much for the question. I think 
we've done a fair amount of analysis on the effects and impacts 
on human trafficking due to COVID-19. We have seen indications 
of a rise in online sexual exploitation of children. As you 
mentioned, the FBI has warned that the school closings have led 
to additional cases of exploitations. And, similarly, 
traffickers living with their victims, they expand to new forms 
of abuse, including online live-streamed exploitation of 
current victims.
     We have not looked into all of the different ways in which 
this can be combated to date, so Tech Against Trafficking 
really focuses on how the tech industry as a whole can come and 
leverage its support and use of this technology, and I think 
that this is something that still needs to be explored. But I 
am unable to speak to the specifics of individual member 
companies who I think are tackling this on an individual level.
     Mr. Norman.  OK. And I guess, Ms. Darnton, the other 
issues you highlighted, the importance of safe data-sharing to 
take a look at the practices that are put into effect, you 
identify the challenges of protecting the privacy of 
trafficking victim data. Can you tell us how technology is 
being leveraged to establish the privacy-preserving data 
methods and instilling confidence in victims to come forward 
because many of these victims just will not come forward from 
what I'm told because of the stigma that they're branded with 
for life.
     Ms. Darnton.  Yes, happy to expand on that. So we actually 
worked on data privacy-preserving mechanisms in our first 
Accelerator program last year with the Countertrafficking Data 
Cooperative out of Iowa. And one of the important areas that we 
see is that really the case data on individual victims of 
trafficking, we need to be able to share it and publish such 
data, but this publication and sharing poses risks to the 
victims represented within the data sets, so we're looking at 
kind of data at a larger scale. And this includes the privacy 
risk of individuals, as you mentioned, being identified within 
the data, as well as the safety risk associated with 
traffickers identifying victims within the data and retaliating 
against the victims, their friends, families, or their 
community.
     So despite these risks, it's crucial to develop safe forms 
of data-sharing that allow for evidence-based policy and 
practice. Without access to data on the prevalence and nature 
of trafficking in different contexts and over time, it's 
difficult to make decisions about how and where to allocate 
resources for maximum impact. So data-sharing agreements may 
sometimes be possible between frontline organizations or an 
individual victim perhaps that capture data on the victim's 
trafficking and the government, law enforcement, and civil 
society organization that need to access and analyze such data.
     However, it is typically not possible to complete such 
agreements at the speed and scale needed for comprehensive and 
current overview of the problem. There's always going to be the 
data gap between prospective providers and consumers of 
sensitive data unless we can create a scalable data-sharing 
solution with guaranteed privacy protection.
     So through our research, one of our member's research team 
worked with the U.N. Migration Agency to develop a new form of 
data anonymization and analysis directly targeting the needs of 
the counter trafficking community so that the primary risk is 
that traffickers will identify victims in published data based 
on identifying combinations of attributes like age, gender, 
citizenship, as well as recruitment, trafficking, and control.
     The solution asserts that only common attribute 
combinations appear in published data sets and therefore cannot 
be linked to the individual or even small groups of 
individuals. This is achieved through combined use of synthetic 
data, precomputed statistics, and interactive visual 
inferences--interfaces rather, enabling exploratory analysis 
and accurate reporting without exposing any data on actual 
identifiable individuals.
     So we've actually published a paper that shows the new 
mechanisms and ways to do this, and we're happy to go into 
further detail.
     Mr. Norman.  Well, thank you so much. I want to thank all 
of our witnesses today for taking time. This is a sad yet it's 
a real problem all over this country. I yield back.
     Chairman Foster.  Thank you. And I will now recognize 
Chair Stevens for 5 minutes.
     Ms. Stevens.  Thank you, Chairman Foster.
     Emily, how did you get involved with combating human 
trafficking? I'm reviewing your bio and looking at your story 
and particularly you're an example of technology transfer if 
you think about it. You were at the university level, and you 
basically spun out this enterprise utilizing some of the best 
applications and technology, just to speak bluntly about it. 
But how did your work lead you to this field? And what promise 
and opportunity do you see in utilizing these technology 
applications to combating human trafficking?
     Ms. Kennedy.  Absolutely. Thank you for the question. So 
my story personally of getting into this is a very windy story. 
I, unlike most of the other people on the witness panel, do not 
have a technology background. I--as I mentioned in my 
testimony--encountered what I was told was human trafficking in 
Eastern Europe when I was 16, and it honestly just kind of 
burned it into my brain that this kind of thing existed.
     And so I knew, you know, going into high school and then 
college that I wanted to focus my career on it, but I didn't 
know what that would be. I had kind of assumed law school. I 
was studying the humanities, and it was really due to the--
first, the interdisciplinary nature of Carnegie Mellon that I 
started to--it was around the time that Backpage became the 
most popular website. And I was looking at sex trafficking 
online, and there wasn't a lot of study around it and decided I 
wanted to focus my senior honors thesis on how can we use 
online data to fight human trafficking.
     And so I basically took that to my humanities advisor, who 
then referred me to an advisor in the Robotics Institute 
because he said you're going to need some technology behind 
this. And back then I didn't know what machine learning was. I 
didn't know much about AI and was kind of thrown into the deep 
end of how it might be able to solve some of these problems. 
And so at the same time I connected with local law enforcement, 
as well as Pittsburgh FBI at the time and started to learn the 
challenges that they were having on the enforcement side and 
trying to identify victims.
     So I kind of have always been a connector between the 
technology people who have the tech that can solve problems and 
the people on the ground who need it. And as I refer to my 
testimony regarding NSF, I have too often seen that gap where 
there is awesome technology and research, there's amazing 
technology being published or it's in a lab, but my question 
was always how do we get this on the ground, you know, making a 
difference. So that has really been a big mission of mine.
     And I think there's a lot more opportunities to kind of 
speed up that process to get technology out of research and 
into the hands of people who can use it.
     Ms. Stevens.  And, Anjana, who--could you give us--with 
your work at Polaris, could you give us--and thank you for 
that, Emily. That was very lovely and such a--we're going to 
thank your linguistics professor. That's really just--we'll 
connect more on that offline. But I wanted to get Anjana in 
here as well just with some concrete examples and an 
understanding of human trafficking in the United States so that 
we can best understand when we talk about data sets and the use 
of technology applications and how complex this is, what is 
the--if you know this, Anjana, what's the average age of an 
individual in the United States who is human trafficked? What's 
the profile? And what is the size of the human trafficking 
groups that are in the United States? And are they sometimes 
run by foreign operators that are infiltrating our country or 
are they homegrown operations? And I could ask another 
question, but I'm going to stop there.
     Ms. Rajan.  Thanks for the question. I think the most 
important thing to recognize is that trafficking is not a 
monolith. At Polaris, we cover all forms of trafficking, 
including sex and labor. A few years ago we put out a report 
looking at the topology of the types of human trafficking, and 
in our research we learned that there were over 25 types of 
human trafficking and that they came in different forms of how 
force, fraud, and coercion were applied to victims, the 
demographic of victims themselves, and how they were recruited. 
And I can certainly send you that report after the hearing if 
you'd like to see more information.
     Ms. Stevens.  Great. Well, thank you. Mr. Chair, I'm out 
of time, OK. I'm going to do some questions for the record 
because there's a lot here. This has been amazing. Thank you 
all. Thank you for all--the testimonies have just been 
fabulous. Thank you guys. I'm yielding back.
     Chairman Foster.  If Members--I'd just say if Members are 
interested in hanging around for a second round of questioning, 
we'll evaluate that toward the end of the first round of 
whether that's a feasible possibility.
     I now recognize Ranking Member Baird for 5 minutes.
     Mr. Baird.  Thank you, Mr. Chairman.
     Ms. Kennedy, in your testimony you mentioned that your 
company has received support from the National Science 
Foundation both through the participation in I-Corps and the 
SBIR award. Can you tell us a little bit more about how the NSF 
has both helped advance your Traffic Jam software, as well as 
support your mission of AI for social good? And can you 
describe how invaluable it is for NSF to continue to support 
work like yours in the counteracting of human trafficking? Ms. 
Kennedy?
     Ms. Kennedy.  Absolutely. Yes, thank you for the question. 
So we received the SBIR phase I, phase II, and phase IIB, about 
$1.4 million in funding total. A little note I like to mention 
is that we actually did not receive it the first time we 
applied. It was good vetting on their part, and they gave us 
feedback on how to improve and we got it the second time, so it 
taught us not to give up.
     And it was amazing to help especially the I-Corps program, 
to help us learn as university researchers about customer 
discovery, commercialization of technology because myself, 
along with pretty much everyone else in my cohort, had been 
deep in research but had no idea about how to run a business, 
start a business, you know, understand the market, things like 
that. And it's a very different mindset from the researcher 
mindset. So I learned so much from the other students in the 
program. And, like I said, it was really invaluable to our 
success, not just the funding but also the training that came 
along with it.
     So we were funded for the first couple awards to focus on 
de-obfuscation of sex trafficking on the public web, so 
basically finding patterns in the structured data where the 
criminals were trying to remain anonymous and kind of pulling 
out those patterns.
     And then for phase II we're now expanding into the human 
services space, and so this involves mining unstructured data 
for insights from thousands of pages of social worker case 
notes to help them measure trends and progress, provide 
proactive insights, and generally, you know, in the context of 
this conversation, help them intervene and prevent children 
from falling into exploitation in the first place.
     So we are really, really happy and honored to be involved 
with the NSF SBIR program. It's been game-changing for our 
company, and I think it allowed us that opportunity to learn 
how to commercialize research and also do the kind of high-
risk, high-reward research and development that was needed in 
order to put out these tools. It's very difficult, particularly 
for socially impact-focused companies to have that research 
funding that they need to get off the ground because often 
that's needed before you can actually produce a product. So the 
SBIR program was very, very helpful for us, and we're honored 
to be involved.
     Mr. Baird.  Thank you very much. Well said. Mr. Chairman, 
I can't see the clock. How much time do I have left?
     Chairman Foster.  One minute and a half.
     Mr. Baird.  A minute and a half. So here's my question for 
the other three witnesses, and we've got a minute and a half, 
so that's 90 seconds, right? OK. Many times the things that 
we're responsible for in these two Committees involves basic 
research. Sometimes it's the areas that industry can't justify 
getting involved in but we can put some dollars there to do 
some of this basic research.
     So my question to the other three members is what areas of 
basic research do you think would provide the most impact on 
expanding the use of emerging technologies to counter human 
trafficking? So I used about 20 seconds of that I'm assuming, 
so we've got about a minute left for the three of you.
     Ms. Darnton.  I'd like to take a first response. I'll keep 
it brief. But something that Matthew mentioned earlier was 
measuring the impact of the use of these technology tools. And 
I think that there's a lot of research needed. So often, the 
tools themselves, the deployment of technology is seen as the 
solution, but really it's contributing to part of the solution. 
It's not a solution in of itself. We still have to track what's 
happening, how it's supporting the field, and what additional 
support is needed, and I think that there could be a lot of 
research around that impact of technology.
     Mr. Baird.  Dr. Daggett?
     Mr. Daggett.  Well, I would agree with that. I do think, 
you know, grappling with the scope of the scale of the problem 
and understanding, you know, how we are actually making inroads 
against it is critical, and that's something that does happen 
at the basic level. And I also think there's a fair amount that 
is also needed to come at the next phase of research and more 
at the advanced level for some of the other science and 
technology directorates.
     Mr. Baird.  So, Mr. Chairman, have I got time for Ms. 
Darnton?
     Chairman Foster.  Yes, we'll--yes, briefly, very briefly.
     Mr. Baird.  Ms. Darnton?
     Ms. Darnton.  Oh, sorry, I was the first one.
     Chairman Foster.  Yes.
     Mr. Baird.  Oh, Rajan, I'm sorry.
     Ms. Rajan.  Sure, no problem. Yes, I think if we're going 
to think about funding and technology and development for this 
phase, I think there are four key principles we should keep in 
mind. I think, first, we need to ensure that the technologies 
are serving the overarching goal of ending trafficking. I think 
we most importantly need to center the needs and experiences of 
victims and survivors. We need to enable the correlated scaling 
up technologies that are evidenced-based. And then, finally, 
any support for new technology should be in addition to 
continued funding for key services to prevent trafficking and 
support victims and survivors.
     Mr. Baird.  I thank all of you very much, and I yield 
back.
     Chairman Foster.  Thank you. And we'll now recognize 
Representative Lipinski for 5 minutes.
     Mr. Lipinski.  Thank you, Mr. Chairman. And before I start 
on my questions, I just want to say, Ms. Kennedy, for the last 
eight and half years, as the Members of this Committee know, 
I've spent a lot of time talking about I-Corps and the 
importance of I-Corps, and you just did an excellent job there, 
your testimony about the benefits of I-Corps, and I'm very glad 
that it has been helpful to you and to your company.
     I want to thank the Chairmen, Chairman Foster and also 
Chairwoman Stevens, for holding this hearing today. I think 
this is an issue that most people have no idea what a huge 
problem this is. They may hear about it, but they probably 
don't understand the scope of it.
     And I was really struck--I remember I was listening to the 
radio a couple years ago, and I heard a statement, and I 
looked--I'm not sure if it came from Andrew Forrest, but I know 
that Andrew Forrest, who is the founder of the Walk Free 
Foundation, has stated, ``We now have the largest number of 
slaves on earth that we've ever had in human history.'' And 
that really struck me, that this is going on, and there's so 
little that most people know about it.
     So I thank all of you for the work that you are doing.
     There's a lot of recommendations that we have heard from 
all of you, and I sit here and I wonder, you know, maybe this 
really should be an answer that--a question for us on the 
Members of the Committee, but I want to look to our witnesses, 
you know, why have we not done more about this problem from 
your perspective? You come to us with what we can do better, 
what the government can do better. Do you have a sense of why 
more has not been done? You know, specifically, this is about 
technology but on technology and other things that we can do to 
help combat human trafficking. So let's start with Ms. Rajan. I 
just--any ideas that you have.
     Ms. Rajan.  I think, again, the most salient point here is 
that human trafficking is a systems problem and requires us to 
understand the data. I think a fact that's not well-known is 
that victims of human trafficking are the most likely party to 
be criminalized when prosecuting these cases. I think we need 
to really zoom out and think about what is a more systems-
driven approach to solving these problems.
     When we think about the criminal justice side of it, I 
think many law enforcement entities don't regularly pursue 
financial investigations on human trafficking cases and thus 
fail to penalize the most profitable traffickers. So I think 
one way we can really shift--restore balance--the balance of 
power back to survivors is looking to seek support, enable and 
pursue human trafficking-related prosecutions that disrupt the 
profitable, large, organized sex and labor trafficking 
enterprises because, one, I think the main thing here is that 
the financial crimes approach human trafficking can actually 
just put the pressure off of victims because they are not 
relied on to cooperate in these cases, which can be very 
traumatizing. And so I think there's--again, looking at one of 
the ways that we think about all of the things that not just 
result in trafficking but what are the conditions that actually 
drive survivors and victims into positions of being exploited 
in the first place?
     Mr. Lipinski.  Thank you. Mr. Daggett?
     Mr. Daggett.  Well, first, I'd like to agree with all that 
was just said. I think that it's, you know, right to the point.
     That said, I do agree that we need a coordinated Federal 
strategy to really go after those high-impact quick wins first 
and then start to do the longer-term foundational funding and 
things that are going to take many years of effort year-to-year 
to get real solutions to.
     I think, you know, in those regards it's just a--it's 
critical that we have both to go with the strategy, the 
increased level of funding and prioritization that shows when 
we take on initiatives across the different, you know, science 
and S&T organizations, where those pieces of the puzzle fit in 
the overall broader strategy. So I totally agree it is a 
systems problem. We have to think about it systematically and 
analyze it systematically.
     Mr. Lipinski.  Ms. Kennedy?
     Ms. Kennedy.  To add to what's already been said, I think 
there's also just generally a public kind of lack of 
understanding around AI. And, again, I'm saying this as a 
generally non-technical person who can communicate about these 
things, either thinking that AI is too advanced or not advanced 
enough, maybe more advanced than it really is, so I think just 
general understanding and education around what's really 
possible would be help.
     And then to add to what Anjana said, I agree about going 
after the largest financially benefiting groups in this, and 
that's what our recent deployment in Traffic Jam earlier this 
year through a graph data base helps do. It actually pulls out 
largest groups in the data. And we're currently looking for 
Federal partners who want to pick up those investigations and 
prosecute them. And, you know, the technology also does help 
take the pressure off of victims like Anjana said, which is 
really important because we don't want the burden--full burden 
of proof of a case to be on the victim. And this is where the 
online evidence can really help.
     Mr. Lipinski.  Thanks. And, Ms. Darnton?
     Ms. Darnton.  Yes. First, I'd just say I agree with all of 
the other panelists, and I'd say there seems to be thus far a 
need for enhanced collaboration. Right now, we're seeing a lot 
of highly distributed funding and lack of coordination. And I 
think to solve this problem we really need to bring in 
academia, consumers, companies, law enforcement, government, 
and create a space where everyone can work together rather than 
in a siloed approach.
     There's no silver bullet to human trafficking, and so we 
need to increase the support for the infrastructure that will 
allow for technologies, especially innovative technologies, to 
be successful. And a lot of that groundwork needs to be built 
before they can actually be further used and developed.
     I'd also say that simultaneously we need to address the 
key drivers of vulnerability, so a lack of economic 
opportunity, a lack of access to education can often drive 
people into situations of exploitation, and we need to think 
through how we can solve those while simultaneously looking at 
creative and new ways to deploy tech.
     Mr. Lipinski.  Thank you very much. Thank you, Mr. 
Chairman. I yield back.
     Chairman Foster.  Thank you. And Ranking Member Lucas will 
now be recognized for 5 minutes.
     Mr. Lucas.  Thank you, Mr. Chairman. And I would say that 
not only the oral testimony today but the written testimony 
submitted by all of our panelists is very compelling.
     And I'd like to focus for a moment, Ms. Rajan, on your 
written testimony. You make it very clear that trafficking is 
an inherently commercial enterprise, that financial 
intervention in human trafficking has the potential to increase 
the risk for traffickers, reduce the profit, and reduce the 
vulnerability to trafficking within particular communities.
     Then you describe how Polaris has partnered with PayPal to 
create the first financial intelligence unit housed within an 
antitrafficking organization. I'd like to get your thoughts on 
how that partnership has worked between Polaris and PayPal. Is 
it working as you envisioned? And, if so, is it an effort that 
could be scaled to more broadly impact the financial side of 
illicit trafficking?
     Ms. Rajan.  Thank you so much for your question. The work 
we're doing at PayPal is very cutting-edge because we're the 
first antitrafficking organization to house a financial 
intelligence unit in-house. And this work is actually quite 
nascent. And because I lead our technology group, I'd love to 
connect you with our Director who actually runs that program.
     But I think you're touching upon a broader question, just 
how can we scale these technologies in the fight against human 
trafficking? And I think one of the key problems that we're 
seeing is there are organizations that have deep subject matter 
expertise on human trafficking, and then there are tech 
companies with deep knowledge expertise on how the technologies 
work. And there are very few that are able to do both. And 
Polaris is unique in the sense that we do have our team that 
does understand deeply how human trafficking works. We have 
technologists and engineers and data scientists who understand 
the technology and, most importantly, we have survivors at our 
organization who understand what survivors and victims actually 
need. But that requires funding, and that requires investment 
to be able to bring these two disciplines together.
     And I think it's really important and I just wanted to 
agree with what my fellow panelists have been saying, that what 
we've been seeing in this movement is just really an 
understanding of the problem, and now we need to continue to 
fund the creation of solutions, which requires support from the 
public and private sector.
     Mr. Lucas.  Absolutely. Ms. Kennedy, in your written 
testimony you stated more research and development funds are 
needed to identify and combat illicit funding channels that 
sustain organized crime groups. Where could this funding come 
from, and what types of research and development should we be 
looking into? And is there space for technology to be developed 
to help detect and disrupt? That's a very open-ended question--
--
     Ms. Kennedy.  Absolutely.
     Mr. Lucas [continuing]. But your insights are broad.
     Ms. Kennedy.  Sure. Thank you for the question. So I can 
tell you a little bit about the types of cyber fraud that we're 
seeing, which I think is just one slice of what some of the 
other panelists are probably also seeing. So when we're looking 
at these online classified ads, we're seeing a recent increase 
in fraudulent postings, so this is, for example, where someone 
might copy and paste the same ad selling commercial sex 
across--and it's posted across every single city in the 
country, and it's posted at the same exact time on the same 
exact day. Now, that's likely not a real group that's offering, 
you know, typical services, and it may not even be a 
trafficking group that actually has a group of victims that 
they are exploiting. This is an example, we believe, of 
automated phishing and cyber fraud. So the idea is that 
potential buyers might contact that ad, give their payment 
information, and then someone on the other end will take the 
money and provide no services.
     And the thing about this and why we think it matters is 
that it's automatable, and therefore, it's scalable. So these 
groups can actually take in a large amount of financial proceed 
at a large scale and, like I said, post it all across the 
country. And so we currently have the ability to pretty much 
tell the difference between quote/unquote real human activity 
and this kind of automated cyber fraud activity.
     And as far as next steps, we're currently looking into 
Federal partners, probably State prosecutors perhaps, who want 
to turn these leads into full-scale investigations because 
obviously that's not what we do.
     And then I think as far as what research is needed, I 
think there's just more research needed to understand the 
problem so that we can prevent it because obviously right now 
we're talking about a reactive response. So I think there's 
more research to be done around the prevention side.
     Mr. Lucas.  Absolutely. Thank you very much. And Mr. 
Chairman, my time is expired, and I yield back nothing.
     Chairman Foster.  Thank you. Representative McAdams, 
you're recognized for 5 minutes.
     Mr. McAdams.  Well, thank you, Mr. Chair, and I appreciate 
our Committee's attention to this really pressing issue of 
human trafficking, particularly the horrible new ways that 
perpetrators have found to target and to exploit children 
online.
     I'm sure that most of the panelists here are familiar with 
The New York Times series that began reporting last year on the 
surge in online child sex abuse and materials, the first time 
that many in the general public I think became aware of the 
scope of this issue. And The Times reported that in 2018 there 
were a record 45 million reports of online child sex abuse 
materials to the National Center for Missing and Exploited 
Children. NCMEC reported that in 2019 reports to the cyber tip 
line surged to 69.1 million. The FBI reported also earlier this 
year that COVID-19 school closures and stay-at-home orders 
increased risk factors for child exploitation, kids spending 
more time on devices, kids not spending time with mandatory 
reporting adults like teachers or school nurses, and kids 
seeking connection and validation on social media. And, you 
know, parents can and should do what they're able to do to 
instill safe online practices in their kids, but that's not 
foolproof against sophisticated exploiters who are out there.
     And with this increasing screen time, I as a lawmaker but 
also as a father of four young children, I want to be sure that 
we do everything to understand the issues that are facing our 
kids and empower law enforcement with technology and the data 
that they need to stop abuse.
     So my question I guess first for Ms. Kennedy, traffickers 
and abusers use social media to identify, to recruit, and groom 
victims for exploitation, particularly young children. How are 
companies and artificial intelligence technologies such as 
Marinus Analytics and Traffic Jam disrupting this practice on 
social media? And also I guess related, what challenges do 
technologies, companies, and law enforcement face with the 
broader use of end-to-end encryption in messaging apps and 
others?
     Ms. Kennedy.  Sure. Thank you for the question. So just to 
clarify, my company, we're not so much experts in child sexual 
abuse material or child porn, but I think that--and probably 
Ms. Rajan could speak to this more--that the increased use of 
encryption is challenging because we're seeing recently much of 
this--and not just the child sexual abuse material but also on 
our end of expertise, the sex trafficking material move onto 
the deep and dark web, so deep of course being behind pay walls 
or logins, and then the dark web being the dark web.
     And so I think this is a challenge because if we can't see 
where this, you know, either abuse or recruiting is happening, 
how can we actually combat it or prevent it? So I think there's 
a lot more research needed in those areas, and I'll probably 
defer to the other panelists as well to answer your question.
     Mr. McAdams.  Yes, maybe, Ms. Rajan, do you want to add 
anything there?
     Ms. Rajan.  Sure, thank you, Congressman, for the 
question.
     As I mentioned, we cover all forms of sex--of trafficking, 
including sex and labor, and I do want to acknowledge some of 
our partners in the field at the National Center for Missing 
and Exploited Children who work specifically on this issue but 
also a company called Thorn that really focuses on how 
technology can be applied here. And I think they'd be fantastic 
partners to reach out to about this specific issue.
     I want to take a moment and address the question around 
social media because at Polaris we do have a lot of data on how 
social media is both used to exploit victims and survivors but 
also how it could help. Over--in 2019 we saw that 847 likely 
victims of trafficking reported to the trafficking hotline that 
they were actually recruited into the sex or labor trafficking 
situation using online platforms, just dating sites, social 
media, and online chat rooms. And once they were in the 
trafficking situation, social media is actually used as a means 
of control. In fact, in one study that we conducted with 
survivors, Polaris found that 34 percent of respondents 
indicated that their traffickers restricted their social media 
use.
     But having said all that, I think social media can also 
play a really important role in providing support and access to 
services. In that same survey, 19 percent of survivors stated 
that social media played a role in their exit, so certain 
features of social media can be particularly critical for 
survivors such as disappearing messages, location discovery, 
and as well as selecting subgroups and follower groups. I think 
social media companies can actually do a lot to help in the 
fight against human trafficking in terms of promoting resources 
like the human trafficking hotline. And I think Congress can 
play a huge role in incentivizing social media companies to 
take action, including through oversight.
     Mr. McAdams.  Thank you. In just my closing seconds I want 
to also mention legislation that I'm working on with 
Congressman Anthony Gonzalez, who I see on this call right now, 
to look at financial patterns and movement of money and how we 
might be able to identify patterns in illicit trafficking 
activities through examination of financial networks as well. 
So thank you, and I yield back.
     Chairman Foster.  Thank you. And the Chair will now 
recognize Representative Balderson for 5 minutes.
     Mr. Balderson.  Thank you, Chairman Foster and Chairman 
Stevens, for holding this hearing.
     And my first question is for the whole panel. Anybody can 
jump in. Ohio has ranked as high as fifth across all States in 
human trafficking cases. This is an issue that we deal with 
every day in Ohio, and I'm committed to working with my 
colleagues to eradicate this despicable criminal behavior and 
help victims regain their freedom.
     We already know that many victims are trafficked through 
our Nation's airports. As a Member of the T&I (Transportation 
and Infrastructure) Subcommittee on Aviation and the Science 
Subcommittee on Research and Technology, I want to know more 
about this problematic intersection between trafficking in 
persons and air travel. What more can we do to help catch 
traffickers misusing our Nation's air transportation system to 
move victims? And anyone may jump in that can answer that 
question on the panel.
     Ms. Darnton.  I'm happy to start. This is Hannah Darnton. 
I think that one of the key things that we've seen through 
groups such as The Code and others is training for individuals 
working within--throughout the transportation industry, so 
being able to identify cases of human trafficking, of child 
exploitation is key to being able to flag them for further 
support and use of that data.
     So I think looking at how we could provide overarching 
training within these industries would be key, and ensuring 
that it's specific to the types of transportation so that the 
employees that may be seeing these instances would be able to 
actually address them and call the relevant authorities.
     Mr. Balderson.  Thank you, Hannah. Would anybody else like 
to add anything?
     Ms. Rajan.  I think you're hitting on a really important 
point, which is how do we educate corporate partners on what to 
look for and the warning signs. I want to acknowledge one of my 
colleagues at Polaris who spends time actually doing corporate 
trainings on human trafficking 101. And this, again, is 
something that really is important to explain to folks how 
human trafficking looks like, what it doesn't look like, and 
what are ways that they can contribute to solving this problem 
with us.
     Mr. Balderson.  Thank you. My follow-up question would be 
with law enforcement so close and onsite, are there any 
technologies your groups are working on that could be used to 
identify victims of human trafficking and help them while they 
are being transported via air? OK. Go ahead.
     Mr. Daggett.  I'll take a go at that. You know, there's--
when you have travelers, you know, coming through the air 
system, there are, you know, key details that we know about 
individuals. There's probably, you know, information that could 
be correlated to learn a little bit more about those 
individuals. You know, we know there are strong indicators of 
people being associated with, say, like the foster care system 
and other types of things. So there probably could be some red 
flags that are done as, you know, a part of that type of 
investigation.
     I think in general one of the challenges is is there's a 
gap between, you know, a lot of the tools that exist in 
technology that works on the open internet, and then once you 
get inside a government or a law enforcement or an 
investigative context when there's, you know, dramatically 
different data streams and data bases that don't talk to one 
another, and we've talked a little bit about information-
sharing, but with our inability to correlate between those, we 
miss connecting some of the dots.
     Mr. Balderson.  OK. Thank you very much. Mr. Chairman, I 
can't see my time, but I will yield back my remaining time. 
Thank you.
     Chairman Foster.  You have one and half minutes if you're 
interested.
     Mr. Balderson.  Well, I do have one more question dealing 
with flight attendants. For anybody, again, is there any 
training out there for flight attendants and other airline 
personnel who might have, you know, more prolonged interaction 
with potential victims?
     Ms. Rajan.  I'll comment on this. I think, again, one of 
the main points we believe at Polaris is that survivors and 
victims know what's best for them. And I think one of the most 
important things that folks can do is guide them to the 
National Human Trafficking Hotline where they can actually 
speak to hotline advocates who can help them navigate what the 
best option for them is and recognizing that there is not just 
one path to justice or to freedom and that we really need to 
think about this in a survivor-centered and victim-centered 
way.
     Mr. Balderson.  Thank you very much for your response. 
Madam--excuse me, Mr. Chairman, I yield back my remaining time. 
Thank you.
     Chairman Foster.  Thank you. And we'll now recognize 
Representative Gonzalez for 5 minutes.
     Mr. Gonzalez.  Thank you, Mr. Chairman. And thank you, 
everybody, for your participation in this incredibly important 
hearing. This has actually been one of the few things that 
well, on this Committee it's not unusual for bipartisan work, 
but this is one area where I think we have done a good job. 
Obviously, there's much more to do, and I look forward to 
continuing to work with my colleagues on this issue.
     Ms. Rajan, I want to start with you. You talked about how 
encryption can protect survivors. And I think that maybe runs 
counterintuitive to my own instincts, but I thought it was 
compelling. And in particular you talked about it in the 
crypto-space and how law enforcement can sort of map out an 
entire ring of traffickers. My question is in the traditional 
crypto-space, so the Bitcoin world, can we identify the 
traffickers? I know we can map it, but can we actually go in 
and say, OK, here's who's doing this and then law enforcement 
can go in and physically intercede?
     Ms. Rajan.  Thank you, Congressman, for the question. 
You're absolutely right. This has been a puzzling debate for me 
because I think the argument has been posed as an either/or on 
how cryptography can actually help or harm survivors.
     To go into the Bitcoin example, I think the--again, the 
important piece to recognize is because it's a currency that 
requires a way to legitimize it, these transactions are public. 
And while your wallet ID may be private, as some--in some 
situations I need to share that with you so that you can 
transfer me money. And because human trafficking is ultimately 
driven by profit, it is in the incentive of a trafficker to 
share that wallet ID.
     And so, again, I want to acknowledge folks at the company 
Chainalysis that really are experts on this particular problem 
on how can you actually create an open data set and using this 
open source intelligence to really map out a suspect or a high-
profile predator or illicit business that has been using 
cryptocurrency to facilitate these transactions. And I really--
I can send you some of the work that they've done that really 
actually shows how they've actually dismantled crime networks 
using this technology.
     Mr. Gonzalez.  Yes, that would be really interesting. I 
would love it if you could submit that.
     And then I guess a follow-up, would it be easier, harder, 
or indifferent to the law enforcement element of this if the 
cryptocurrency were a central bank cryptocurrency? So, you 
know, if the Fed got into this verses Bitcoin, or is it 
indifferent in your eyes?
     Ms. Rajan.  I think that is a great example around our 
financial intelligence unit work at Polaris and one of the 
examples that I've written in my testimony around homomorphic 
encryption which, again, poses a separate question, which is 
how do we protect the privacy of banks and their customers and 
just citizens in general? And so I think regardless of whether 
it's centralized or not, these financial transactions are 
really important pieces of the criminal aspect of it because 
that is where essentially the evidence lies. It's in the 
transaction itself. And so I think really focusing on those 
pieces and trying to hold the perpetrators who are profiting 
off of this, rather than focusing on how we can criminalize the 
survivor and victim, is paramount for us in this fight. And I 
think it's really critical to understand how anti-money 
laundering systems work and the technologies that can do this 
in a really safe and private way.
     Mr. Gonzalez.  Great. And then shifting to Mr. Daggett, so 
you describe how, you know, the ``data are currently time-and 
human-intensive to analyze with limited purpose-built 
technology to assist, leading to missed connections and lost 
opportunities for interdiction and justice.'' I just read that 
from your written testimony. With respect to the existing tech 
suite that's available, what is the most extensive value add? 
Is it it cuts down the amount of time, or is it it connects 
dots that currently are being looked at in a manual way? Just 
sort of run me through how specifically the purpose-built 
technology that can assist here.
     Mr. Daggett.  Sure. You know, one great example is, you 
know, picking up on your last question about, you know, 
cryptocurrency and whether it should be, you know, centralized, 
you know, the lifeblood of an investigation and a prosecution 
is the ability to compel records--business records. The 
challenge there is that those records from all the different, 
you know, businesses and agencies come back in a multitude of 
different formats, and some of these can be scanned documents 
that are not searchable. Other ones can be large voluminous 
amounts of financial or telecommunication transactions, and so 
you have a lack of tooling to be able to read that data and 
analyze it. You also have a lack of training on individuals who 
are dealing with that, and then a lack of knowledge management 
in terms of figuring out what does an organization know and how 
do they connect those dots and how do they put them together?
     I think it's one of the reasons you see that, particularly 
on State and Federal investigations, these investigations take 
multiple years to complete because it is so labor-intensive to 
work with the data because of its heterogeneity and 
[inaudible]. So there's a lot of capabilities that have been 
built in other sectors that could be tailored to some of these 
specific data and these specific connections that would really 
make a difference for investigators and prosecutors.
     Mr. Gonzalez.  Great. Thank you for that. Mr. Chairman, 
great hearing. Thank you for convening this. And I yield back.
     Chairman Foster.  Thank you. And, Representative Weber 
will be recognized for 5 minutes.
     Mr. Weber.  Thank you, Mr. Chairman. Great hearing, I 
agree, and I'm going to start with, is it Anjana Rajan?
     Ms. Rajan.  It's pronounced Anjana Rajan.
     Mr. Weber.  OK. Thank you for that. When I was in the 
Texas legislature back in 2009 to 2012 I guess that's before I 
got demoted to Congress. We had House Bill 4009, which did a 
lot to help recognize human trafficking and to teach and train 
our law enforcement agencies exactly what to look for that all 
of these victims, especially the young girls weren't 
necessarily guilty of wanting to be, you know, prostitutes if 
you will.
     So we realize Texas, you probably know this working with 
Polaris, has 25 percent of the Nation's human trafficking in 
the country. We're very focused on that, a lot that needs to be 
done. What Ranking Member Lucas said is incredibly correct. 
Your testimony is very compelling. You make a lot of good 
points in it. I've got probably 20 minutes worth of questions, 
Bill, so excuse me for that.
     But one of the questions I have, and I've used that number 
888-373-7888 I can't tell you how many times. It's easy to 
remember, a good number. You talked about the national traffic 
hotline. Are you able to track the data on where they got that 
number? That's a specific question for you first.
     Ms. Rajan.  It sounds like you're asking do we know how 
people are referred to the hotline.
     Mr. Weber.  Correct.
     Ms. Rajan.  Yes, I think part of what we want to make sure 
is that we build technologies that are ubiquitous and easy to 
access. You know, I think part of what is really important when 
designing technologies for survivors is oftentimes--and I'm 
guilty of this myself as an engineer--overengineering rather 
than really thinking about what survivors want. I think it's 
really important to always start with user-centered design and 
really ask yourself what--where are survivors or users 
accessing this information, and where can they get it?
     I would love to refer you to our Director of the National 
Human Trafficking Hotline who can give you a lot more detail on 
the types of data we capture on the hotline particularly, but I 
think you're bringing up a great point, which is how do we make 
sure that the tools and services we create actually get used by 
the people in need.
     Mr. Weber.  Well, that's exactly correct. In your 
testimony you make the statement that it is common for 
survivors to choose to connect with a service provider for 
wraparound before deciding if they're going to go to law 
enforcement, which we understand that because one of our things 
on House Bill 4009 was to train and put together a coalition of 
NGOs, nongovernment organizations, providers if you will, and 
law enforcement for training that said just because you pick up 
a young girl or young boy, too, doesn't always mean they're 
willfully there. In fact, we train them how to look for things.
     You said in your testimony that the national began 
operating in 2007. 9,943 situations of trafficking have been 
shared with a hotline directly. How recent is that data? You 
don't say how recent it is. 9,943, you say it began in 2007, 
but how recent is that number?
     Ms. Rajan.  So that statistic that I referenced in my 
testimony is a cumulative look at the data that we have since 
we've operated the National Human Trafficking Hotline. And I 
think the fact that you're--sorry, go ahead.
     Mr. Weber.  OK. Well, thank you for that. And I'm getting 
a little short on my time. You also talk about cryptographic 
reporting, and then you go through four systems, threshold 
based, zero trust, human legal, firewall, multiple calibrated 
options. And under the human legal firewall you make the 
statement the record is unlocked by a person who can establish 
privilege and block this information. Who decides who that 
person is?
     Ms. Rajan.  That's a great question. So in my testimony I 
reference a type of system that can help vulnerable 
communities. And while the system doesn't exist yet for human 
trafficking, I have seen--I have built systems in my past work 
for victims of sexual assault. I think the main point that we 
wanted to address was when a person is coming forward with 
vulnerable information about their sexual assault or their 
exploitation, there are many risks. The threat model is 
incredibly complex. And when you can create the technical 
systems that understand the broader system of why survivors 
need to get--access information before they come forward, you 
can really think through what that looks like.
     Now, this obviously has to be applied very carefully in 
each situation, whether it's in the sexual assault space or 
combating domestic terrorism or looking at human trafficking, 
but, again, this was a hypothetical suggestion of how this 
might be applied similarly in human trafficking.
     Mr. Weber.  Well, thank you for that. And quickly, Bill, 
before I yield back, that's a good point because we don't want 
to give any ammunition to those who say this is a violation of 
privacy. We want to be as safe and succinct as we can to 
protect [inaudible]. And, Mr. Chairman, thank you, and I yield 
back.
     Chairman Foster.  Thank you. And, Representative Beyer 
will now be recognized for 5 minutes.
     Mr. Beyer.  Mr. Chairman, thank you very much.
     You know, one of the areas of acute interest to me is 
ethical AI and facial recognition technology. So earlier this 
year, I introduced the Stop Biometric Surveillance by Law 
Enforcement Act, which would prohibit Federal agencies from 
using police body cams with biometric data collection 
capabilities, including facial recognition. It would prevent 
States and localities from purchasing body cams with these 
capabilities using Federal dollars.
     This bill introduction came after Amazon and other tech 
companies created temporary moratoria on police use of their 
facial recognition software because there are so many false 
positives. And this is giving the Congress time to regulate 
where needed.
     But the moratorium had two exceptions, one of which was 
Marinus Analytics to use the service to help rescue human 
trafficking victims. So, Ms. Kennedy, in your testimony you 
talked about developing AI for social impact. Have you 
incorporated ethical considerations of facial recognition 
technology into your platform also?
     Ms. Kennedy.  Sure. Great question. So, you know, I think 
there's important--it's important that we think really 
carefully about not just facial recognition but all different 
types of AI and how they're used by our society, right? And 
we've talked about false dichotomies recently, and I think 
there's a similar one with facial recognition where when we 
talk about it in the public space, I feel like it's kind of--
there's two extremes that are usually talked about. One is a 
total ban of all those technologies, and the other extreme is 
total unregulated use.
     And I think that there is a really important middle ground 
for their use, particularly in intervention against--in violent 
crimes against women and children, which we're talking about 
today. But I think it's important that our lawmakers do put 
important legislative guardrails around the use so that we're 
not on either of those two extremes.
     And obviously this is an ongoing conversation, but I think 
it's really important, you know, whether it's barriers to use 
or scripts, trainings, and punishment for misuse of technology 
or maybe a mix of both, but I think those are some of the 
things that we should consider.
     Mr. Beyer.  Great. And thank you for helping us point out 
the need for balance between a total banning and complete un-
regulation. And we've been in the unregulated, so we're moving 
back in the right direction I think. And obviously, it's 
different from--to protect the victims than it is for picking 
up people in an airport.
     Ms. Kennedy.  Absolutely.
     Mr. Beyer.  Yes. So, Ms. Rajan, first of all, I'm very 
impressed that you're a triathlete and you have your jersey on 
the wall behind you. But you talked about the unique properties 
of blockchain technologies and this whole notion that if you 
can know the wallet addresses, you can build the data set, you 
can literally decompose or deconstruct the entire criminal 
network. What does Congress need to do to make that happen?
     Ms. Rajan.  Thank you, Congressman. I think they need to 
understand how the technology works. I think it's one of these 
examples of tech policy being a really important part of how we 
think about other policy issues. And so I think when we look at 
some of the debate that's happening on how we should regulate 
or not regulate cryptocurrency, again, I keep coming back to 
this false dichotomy, which is we are missing the power of how 
we can actually serve this mission when we understand how these 
technologies are used.
     And so my--I think that what's really fantastic about 
hearings like this and Committees like yours is that we're 
taking the time to help legislators understand the real detail 
and implication of these technologies and how they can be best 
used.
     Mr. Beyer.  And, you know, if not now, if you can tell 
people like Chairman Foster and me what legislation we should 
write or what appropriations amendment we should do to help 
move that forward, that would be really exciting. I've been to 
Davos many times in the last couple of years. Every time, every 
storefront along the main street of Davos is about blockchain, 
and so finding ways to use that in a constructive way would be 
terrific.
     And then are you at all concerned about the current 
discussion on amending Section 230 of the Communications 
Decency Act and what risk that would pose to encryption 
mechanisms? Would that help or hurt the fight against human 
trafficking?
     Ms. Rajan.  We could probably chat about this for hours, 
and I'd be happy to chat with you offline and kind of give you 
a more thoughtful answer on how we can think about this and 
other pieces of legislation.
     Mr. Beyer.  OK. Thanks. Well, we'll seek for that offline 
opportunity to talk about it because it is complicated, but 
it's important. And with that, Mr. Chairman, I yield back.
     Chairman Foster.  Well, thank you. And before we bring the 
hearing to a close, I wanted to thank our witnesses for 
testifying before the Committee today. I'm just checking to 
make sure I'm not in fact muted.
     The record will remain open for 2 weeks for additional 
statements from the Members and for any additional questions 
the Committee may ask of the witnesses.
     The witnesses are now excused, and the hearing is now 
adjourned.
     [Whereupon, at 11:53 a.m., the Subcommittees were 
adjourned.]

                               Appendix I

                              ----------                              


                   Answers to Post-Hearing Questions




                   Answers to Post-Hearing Questions
Responses by Ms. Anjana Rajan

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

                              Appendix II

                              ----------                              


                   Additional Material for the Record




             Statement submitted by Kayse Lee Maass, Ph.D.
             
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]