Cyber Slavery Infrastructures: A Socio-Technical Study of Forced Criminality in Transnational Cybercrime
- URL: http://arxiv.org/abs/2510.12814v1
- Date: Wed, 08 Oct 2025 20:38:23 GMT
- Title: Cyber Slavery Infrastructures: A Socio-Technical Study of Forced Criminality in Transnational Cybercrime
- Authors: Gargi Sarkar, Sandeep Kumar Shukla,
- Abstract summary: The rise of cyber slavery," a technologically facilitated variant of forced criminality, signifies a concerning convergence of human trafficking and digital exploitation.<n>This study adopts a hybrid qualitative-computational methodology, combining a systematic narrative review with case-level metadata extracted from real-world cyber trafficking incidents.
- Score: 0.12744523252873352
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The rise of ``cyber slavery," a technologically facilitated variant of forced criminality, signifies a concerning convergence of human trafficking and digital exploitation. In Southeast Asia, trafficked individuals are increasingly coerced into engaging in cybercrimes, including online fraud and financial phishing, frequently facilitated by international organized criminal networks. This study adopts a hybrid qualitative-computational methodology, combining a systematic narrative review with case-level metadata extracted from real-world cyber trafficking incidents through collaboration with Indian law enforcement agencies. We introduce a five-tier victimization framework that outlines the sequential state transitions of cyber-slavery victims, ranging from initial financial deception to physical exploitation, culminating in systemic prosecution through trace-based misattribution. Furthermore, our findings indicate that a significant socio-technical risk of cyber slavery is its capacity to evolve from forced to voluntary digital criminality, as victims, initially compelled to engage in cyber-enabled crimes, may choose to persist in their involvement due to financial incentives and the perceived security provided by digital anonymity. This legal-technological gap hampers victim identification processes, imposing excessive pressure on law enforcement systems dependent on binary legal categorizations, which ultimately hinders the implementation of victim-centered investigative methods and increases the likelihood of prosecutorial misclassification, thus reinforcing the structural obstacles to addressing cyber slavery.
Related papers
- A Neuro-Symbolic Multi-Agent Approach to Legal-Cybersecurity Knowledge Integration [53.58687192914018]
This work provides a first step towards intelligent systems capable of navigating the increasingly intricate cyber-legal domain.<n>We demonstrate promising initial results on multilingual tasks.
arXiv Detail & Related papers (2025-10-27T15:46:02Z) - A comprehensive survey of cybercrimes in India over the last decade [0.0]
Digital transformation has spurred the rise of cybercrime, criminal activities perpetrated through networks or computer systems.<n>Cybercrimes range from financial fraud and phishing scams to identity theft and online harassment.<n>In recent years, India has experienced a significant surge in cybercrime incidents.
arXiv Detail & Related papers (2025-04-21T04:42:46Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Dynamic Fraud Detection: Integrating Reinforcement Learning into Graph Neural Networks [39.54354926067617]
Graph neural networks are a type of deep learning model that can utilize the interactive relationships within graph structures.
fraudulent activities only account for a very small part of transaction transfers.
fraudsters often disguise their behavior, which can have a negative impact on the final prediction results.
arXiv Detail & Related papers (2024-09-15T23:08:31Z) - A Smart City Infrastructure Ontology for Threats, Cybercrime, and Digital Forensic Investigation [2.2530496464901106]
Efforts have been made to assist digital forensic investigators (DFI) and law enforcement agencies (LEA) in their investigative efforts.<n>Forensic tool innovations and developments, such as the Unified Cyber Ontology (UCO) and Cyber-investigation Standard Expression (CASE), have been proposed to assist DFI and LEA.<n>To mitigate weaknesses in both and to ensure a safer cyber-physical environment for all, we propose the Smart City Ontological Expression (SCOPE)
arXiv Detail & Related papers (2024-08-04T13:20:01Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - The TikToking troll and weaponization of conscience: A systems perspective case study [0.0]
Weaponization of conscience is a tactic used by fraudsters to camouflage their activity, deceive their victims, and extend the effectiveness of their modi operandi.
This case study centers around a controversial TikToker, highlighting how the weaponization of conscience can be leveraged to manipulate multiple actors within a propagandist's target population.
arXiv Detail & Related papers (2024-04-14T21:05:40Z) - A Comprehensive Analytical Review on Cybercrime in West Africa [0.0]
West-Africa countries face significant cybercrime challenges, exacerbated by inadequate resources and a dearth of security experts.
This study pinpoints potential cybercrime prevention strategies, such as leveraging the Triage framework.
Our research findings highlight the urgency for policymakers and law enforcement agencies to devise more efficient prevention strategies.
arXiv Detail & Related papers (2024-01-07T23:36:43Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Towards Effective Cybercrime Intervention [1.179179628317559]
We propose to build a systematic framework through the lens of a cyber threat actor.
We explore the motivation factors behind the crimes and the crime stages of the threat actors.
We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.
arXiv Detail & Related papers (2022-11-17T13:40:53Z) - Spatial-Temporal Meta-path Guided Explainable Crime Prediction [40.03641583647572]
We present a Spatial-Temporal Metapath guided Explainable Crime prediction (STMEC) framework to capture dynamic patterns of crime behaviours.
We show the superiority of STMEC compared with other advancedtemporal models, especially in predicting felonies.
arXiv Detail & Related papers (2022-05-04T05:42:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.