TPC Journal V7, Issue 1-FULL ISSUE
46 The Professional Counselor | Volume 7, Issue 1 Definition, Terms and Processes of Sex Trafficking Despite the growing awareness of modern day slavery, the act of human trafficking is not a new phenomenon. In Imperial Rome, it has been estimated that between 30–40% of the Roman population was comprised of slaves trafficked from nearby countries such as Thrase, Gaul, Britain and Germany (Collingridge, 2006). In fact, during the height of the Roman Empire, wars were fought solely to procure more slaves (Cahill, 1995; Goldsworthy, 2006). Human trafficking was not limited to European countries. Beginning in 1619, both White and African slaves were taken from their countries and imported to Virginia to help construct the colonies (D. Davis, 2006; Jordan & Walsh, 2007). Human trafficking and modern day slavery are acts of social injustice that have historically exploited men, women and children. According to the Trafficking Victims Protection Act (U.S. Department of State, 2000), the act of human trafficking refers to the recruitment, harboring, transportation, provision or obtaining of a person for commercial sex through force, fraud or coercion, or in which the person induced to perform a sex act is under 18 years of age. Despite common misconceptions, for an act to be considered sex trafficking, forced movement across the state is not required (U.S. Department of State, 2000). Sex trafficking includes a wide variety of traditionally accepted forms of labor, including commercial sex, exotic dancing and pornography (Logan, Walker, & Hunt, 2009). The following sections address the three components of control associated with human trafficking, namely force, fraud and coercion . Specific strategies used by traffickers to obtain and maintain control also are described. Force As defined by the United States Department of Health and Human Services (2012), force pertains to the physical restraint or serious physical harm that traffickers use to obtain and maintain control. According to Chesnay (2013), methods of force are typically used to break down the victim’s spirit. Examples of force as a means of control include rape, physical violence, intimidation, physical confinement and restricted freedom (Williamson & Prior, 2009; Zimmerman et al., 2008). Traffickers may introduce an addiction to an illicit substance or use existing drug or alcohol addictions to force persons into exploitative circumstances (Raphael & Ashley, 2008; Raymond et al., 2002; Whitaker & Hinterlong, 2008; Williamson & Prior, 2009; Zimmerman, 2003). According to findings by Whitaker and Hinterlong (2008), victims’ resistance often leads to additional or more forceful control mechanisms used by traffickers. For example, traffickers may initially use physical or sexual violence and increase the severity (e.g., burning or torturing victims) when disobeyed. Additionally, Whitaker and Hinterlong discovered the presence of gendered patterns of control or the concept that different strategies are used when eliciting compliance from men and women (e.g., use of threats to community members and drug addiction in men, and threats to family relationships and references about the world being dangerous in women). It is important to note that not all trafficked persons experience physical suffering (Aradau, 2004; Belser, 2005). Fraud Fraud , or the use of false promises to lure persons into the human trafficking industry, is another method used by traffickers to control and exploit their victims (United States Department of Health and Human Services, 2012). Although fraud is typical in labor trafficking scenarios (e.g., women are offered appealing job opportunities overseas as a nanny or model and then forced into prostitution upon arrival), this tactic also is employed within sex trafficking scenarios (Belser, 2005; Whitaker & Hinterlong, 2008). Traffickers may recruit children from low-income families by promising parents that their children will be safer, better cared for and taught a useful skill or trade (Albanese, 2007;
Made with FlippingBook
RkJQdWJsaXNoZXIy NDU5MTM1