Technology and the Internet - both cybercrime tools - are harnessed by the sophisticated end of the trafficker spectrum (Latonero, Wex and Dank, 2015; Latonero, 2012; Latonero, 2011). They can use ...
and monitor victims' whereabouts and control their activities (Latonero 2011; Latonero 2012; Latonero, Wex, and Dank, 2015; Maras, 2016; Europol, 2017; Maras, 2017; see Module 14 of the E4J University ...