Featured IT News

AustCyber’s Canberra Cyber Security Innovation Node launched

23 September 2019 in Security

AustCyber’s Canberra Cyber Security Innovation Node has been jointly launched by the Federal Minister for industry science and technology Karen…

ACM forms global technology policy council

23 September 2019 in Strategy

The global Association for Computing Machinery (ACM) has formed a new Technology Policy Council designed to coordinate the agenda for…

Workday and the evolution of ERP

22 September 2019 in Enterprise Cloud

ERP has come a long way since it was flavour of the decade in the 1990s. Enterprise Resource Planning was…

Viettel, Nokia team up on Vietnam’s first 5G broadcast

20 September 2019 in Business Telecommunications

Vietnam’s largest mobile network operator Viettel and Nokia have broadcast the first end-to-end 5G network in Ho Chi Minh City…

Kyckr completes $5.2 million capital raise via share placement

20 September 2019 in Listed Tech

Australian-listed technology regulation company Kyckr has completed a $5.2 million capital raising led by investor and founder and CEO of…

ACMA acts against telco Infinity Telecom over industry rules breach

20 September 2019 in Telecoms & NBN

The Australian Communications and Media Authority (ACMA) has taken action against Sydney-based telco Infinity Telecom for breaching industry rules requiring…

Sites hit by card-skimming being re-used for malicious activity

20 September 2019 in Security

Sites that have been decommissioned due to attacks by the card-skimming attack group Magecart are being hijacked and re-used for…

Traffic, transport infrastructure get green light for NBN connection

19 September 2019 in Telecoms & NBN

Operators of traffic signals, automatic teller machines and a range of other specialised devices can now connect to select services…

Regulatory ‘certainty’ a must to attract Asian investors to Australia: Huawei chairman

19 September 2019 in Business Telecommunications

Huawei Australia chairman John Lord says that Australia cannot turn its back on Asia’s fast growing technological innovation, but warned…

Simjacker – Australians are safe

19 September 2019 in Security

All three Australian telcos have confirmed that Simjacker cannot hurt their customers.

US sues Snowden over not getting book vetted by CIA, NSA

18 September 2019 in Government Tech Policy

The US Government has filed a case against whistleblower Edward Snowden for publishing a book without first submitting it to…

Oracle sets sights on cloud domination

18 September 2019 in Enterprise Cloud

Global enterprise database and application provider, Oracle, has unleashed its vision to build the autonomous cloud, signalling an underlying ambition…

Ericsson China 'smart' factory now operational

18 September 2019 in Manufacturing Technology

Swedish tech giant Ericsson says it has completed a 500 million kroner (US $51.5 million) transformation of its “smart” manufacturing…

Online spending on digital, physical goods forecast to pass US$6 trillion by 2024

18 September 2019 in Market

The total global transaction value of online payments for digital and physical goods will exceed US$6 trillion by 2024 –…

5G ‘unlikely’ significant threat to NBN Co business, privatisation talk 'premature': minister

17 September 2019 in Business Telecommunications

The minister responsible for delivery of the national broadband network says the introduction of 5G services in Australia is unlikely…

NBN price cuts for wholesale NBN services good news for ‘budget conscious’ households, says minister

17 September 2019 in Telecoms & NBN

NBN Co’s flagging of proposed lower wholesaler pricing for some broadband network entry level product bundles is good news for…

Ola integrates Apple Pay in rideshare platform for Australia, NZ

17 September 2019 in Market

Rideshare platform Ola has integrated Apple Pay as a payment method in Australia and New Zealand in what it says…

NBN Co proposes discounts to broadband network wholesale prices

17 September 2019 in Telecoms & NBN

Australia's national broadband network builder and operator NBN Co is proposing to introduce significant discounts and extra capacity inclusions across…

Breaking IT News

30iGala - Remembering Internet history: Peter Coroneos video interviews Alex Zaharov-Reutt

20 September 2019 in Development

In a role reversal, the organiser of the 30th Anniversary of the Internet Gala Dinner on October 31, Peter Coroneos,…

ARENA allocates $460.5k to Alliance for Energy Productivity

20 September 2019 in Energy

The Australian Renewable Energy Agency (ARENA) has allocated $460,500 in funding to the Australian Alliance for Energy Productivity (A2EP) to…

ownCloud, Securosys enable encryption through hardware security modules

20 September 2019 in Cloud

Open-source file syncing and sharing software company ownCloud has tied up with Swiss IT security vendor Securosys SA to offer…

Barracuda launches MSP business in Australia, NZ

20 September 2019 in Strategy

Cloud security and data protection solutions vendor Barracuda Networks has launched its managed service provider (MSP) business into Australia and…

New group using Windows malware to attack Saudi targets: claim

20 September 2019 in Security

A hitherto unknown group that has been dubbed Tortoiseshell is using both customised and common Windows malware to target IT…

Switkowski reappointed as chair of NBN Co

19 September 2019 in People Moves

Telecommunications executive Dr Ziggy Switkowski has been reappointed for another three years as Chair of NBN Co, the builders and…

Your employer may neglect training, but you can't: analyst

19 September 2019 in Education

IT workers need to develop cloud-related skills — on their own time if necessary — if they are to remain…

Windows ransomware WannaCry still spreading, but the kick has gone

19 September 2019 in Security

The infamous ransomware WannaCry, which burst on to the world stage in May 2017, is still very much alive and…

Bloomberg reporter who wrote Supermicro supply chain yarn promoted

19 September 2019 in Security

The American news agency Bloomberg has promoted one of the two journalists who wrote a story last year claiming that…

Pure Storage moves up and down market

19 September 2019 in Storage & Cloud Storage

New products from Pure Storage variously address customers' diverse requirements for higher performance and lower cost storage.

OPPO unveils new wired, wireless charging technologies

19 September 2019 in Mobility

Smartphone maker OPPO claims its next generation of flash charge technologies — 65W SuperVOOC Fast Charge 2.0 and 30W Wireless…

Tableau 2019.3 explains itself

18 September 2019 in Business Software

New features in the 2019.3 release of the Tableau analytics software include the ability to explain the value of a…

Equinix extends Oracle Cloud Infrastructure global reach, spanning five continents

18 September 2019 in Deals

Global interconnection and data centre provider, Equinix, today announced its role in enabling enterprises across five continents to privately connect…

Automation Anywhere appoints industry veteran as first chief strategy officer

18 September 2019 in People Moves

Robotic process automation (RPA) company Automation Anywhere has appointed industry veteran Stephen DeWitt as its first chief strategy officer.

Non-cash payments market boom, but banks ‘reluctant’ to embrace open banking

18 September 2019 in Market

The global transaction volume of non-cash payments is growing rapidly, including in Australia, with non-cash transactions booming and competition flourishing,…

Huawei donates funds to Deaf Australia

18 September 2019 in Strategy

Huawei Australia is donating over $34,000 to Deaf Australia following its partnership with the charity and the Canberra Raiders in…

Swinburne gains Adobe Creative Campus status

18 September 2019 in Education

Swinburne University of Technology has become the first university in Australia to achieve Adobe Creative Campus status as part of…

VIDEO INTERVIEW: Zebra execs talk blockchain, automation, AR/VR and more at APPFORUM 2019

18 September 2019 in Enterprise Solutions

At Zebra's AppForum events around the world, the company shares how its customers are, and can, gain an "intelligent edge…

Stallman quits FSF, MIT over comments on sexual assault

18 September 2019 in Open Source

The founder of the free software movement, Richard Stallman, has resigned both from his position at the Massachusetts Institute of…

Woman held over alleged ID fraud after AFP, ASIC investigation

18 September 2019 in Security

A Melbourne woman aged 21 has been arrested in connection with a fraud and identity theft syndicate which allegedly stole…

Satellite operator Kleos signs first South American contract

18 September 2019 in Space

Australian-listed space technology operator Kleos Space has signed its first South American order, with an order by a Brazillian-based integrator.


Popular News



Subscribe to Newsletter

*  Enter the security code shown:



Recent Comments

Wednesday, 25 October 2017 23:03

Using big data in the fight against slavery


What can one person do to combat the evils of human trafficking? Can we, as technology professionals, use our skills to effect good in the world? The answer is yes, says the Global Emancipation Network.

This may be the most important story I've written. In The Wired CIO, I speak of the wonders of technology for business excellence, and the need for today's IT leader to transform business. Yet, not all is so well in the world. Human trafficking exists for forced labour and sexual purposes. Trafficking is a big business model and enslaves and holds captive real, live human beings. It can only be described as evil.

The Global Emancipation Network, or GEN, is a non-profit organisation committed to the fight against traffickers, leveraging big data to unite international partners and law enforcement in this fight. It's no hyperbole to speak of trafficking as "big business"; it brings in roughly US$150 billion annually, according to the International Labour Organisation. Around 21 million women, children and men are trafficked annually, but fewer than 50,000 of these victims are identified and rescued.

Human traffickers in developed countries such as the United States and Australia are keeping up with technology to increase their revenue and stay one step ahead of law enforcement. They use the marvels of the Internet to find and groom victims, to transport them, and to advertise their services. Yet, this same technology can be used against them.

Here's where GEN comes in, making use of big data tools and analytics from Splunk via its charitable arm Splunk4Good and its Splunk Pledge which last year committed $US100 million over 10 years for research, education and non-profits. Splunk Pledge has in its first year already distributed millions of dollars in licenses and trained thousands in the use and administration of Splunk.

GEN was founded by Sherrie Caltagirone, who told iTWire the threat intelligence and security community is a small one. Caltagirone knew Monzy Merza, Splunk's Head of Security Research, who was working with Splunk Pledge's Corey Marshall to identify the right partner for Splunk's non-profit commitment. "Not just a partner, but the right partner," Caltagirone says, "someone doing something tangible."

Thus, GEN signed up with Splunk Pledge for education credits, expertise and licensing. "We hit the ground running," Caltagirone says. "We brainstormed, flew out to Seattle and put the plan together."

GEN describes itself as the global clearing house for trafficking intelligence, and its mission as facilitating communication and technology-sharing initiatives between anti-trafficking organisations.

Specifically, GEN collects data from the open Web, the deep and dark Webs, and anywhere it thinks trafficking is happening in all its many forms. The organisation looks to find patterns in the data - perhaps the same phone number appearing at the same time in different places, or maybe where a dark web screen name is used on public Internet social sites. All of this effort works towards GEN's mission – to identify and rescue every victim, to identify and stop every trafficker.

Much of this data may be seen as disparate or useless in isolation, but by correlating all this information together through big data analytics GEN is able to identify human trafficking activity and rings and to work with law enforcement in real time to act fast in tracking them down.

As well as its software, Splunk brings its smarts and its people. Merza has applied his learnings from cybersecurity practices — whether using machine data to detect ransomware or other anomalous activities — to get crafty to identify these traffickers and make this data usable to non-data scientists, like police and detectives. Data analytics are used to find correlations in advertisements and phone number origins. GEN’s Splunk system is connected to the law enforcers’ text message systems so they can be alerted in real time.

"The other thing that's really important to GEN," Caltagirone says, "is people can use their skills for good. People have their day job but then can use their skills for human impact. Not just with trafficking, but to other non-profits.

"People in the tech sector with cyber-threat backgrounds or web developers and coders can help us at any time. We have tonnes of projects. I love watching the light bulb click when people can apply the same skills they use during the day to a different problem. Really, it's the same methodology to hunt traffickers as it is to hunt hackers."

"We believe everyone has the responsibility and the ability to end human trafficking."

Caltagirone's background has been in legislation, drafting anti-trafficking laws, and sought to identify metrics to measure impact. It struck her there was no easy way to measure success. These ideas percolated with her and she realised sharing data made the most sense, leading to the creation of GEN.

It's no easy task. Countries around the globe have a wide range of attitudes towards trafficking. Some will do anything to tackle the problem while others are closed. Additionally, the European Union mandates any personally identified European information must be hosted in that region.

Despite obstacles and compliance overheads, GEN remains undeterred in its mission. "Sharing data helps find the victims and find the traffickers. The more I share this, the more the walls come down," Caltagirone says.

"The number of victims ranges from 20 million to 46 million," she says. "There's no hard data to back any figure up, and there is no repeatable methodology. Every single report that comes out identifies the magnitude of the report, but can't say with authority if there are more men or more women, or more labour or sex trafficking."

In fact, in this arena, the only number which can be taken as credible is the 9,000 convictions recorded each year.

Historically, data sharing problems and technology limitations have hindered collaboration and precision in reporting, so Caltagirone sought to launch GEN akin to a technology startup, seeking to measure success from the beginning.

"Using these methods coupled with Splunk we have brought about world change already," Caltagirone says. "We just completed an investigation that identified 167 users in a small area. This is now in the hands of law enforcement."

In this domain, a "user" is someone who is engaged in trafficking activities. "One example is an escort review forum, a place where people buying sex can review providers. Each user has an account. Our goal is to find the traffickers, seeking attribution, names, addresses and other information, enriching it with public records. We can find the same user handle in the open web," she says.

Trafficking and exploitation of people is not confined to remote, far-flung third-world countries. "Australia has a trafficking problem," Caltagirone told iTWire. "It is a transit and destination country, and sex tourism takes place from Australian nationals to South East Asia."

"Trafficking is going on under law enforcement eyes. Corruption is a big issue we face from the ground up."

GEN carefully vets those to whom it gives platform access. "We spend a lot of time in conversation with law-enforcement. We have four different levels of access – the investigator's portal is the most secure. People who share data can choose who they share with and which fields to share. We vet individuals and agencies while information owners can control and share the data with who they wish. The insider threat is real."

You can reach GEN via the Web, Twitter, or Facebook. GEN gratefully receives donations of funds and time.

Splunk4Good has also reached US Veterans through the Wounded Warrior Project.

“Splunk is helping Wounded Warrior Project place veterans on the path to cutting-edge careers by equipping them with tangible and marketable skillsets,” said Lt. Gen. (Ret.) Mike Linnington, chief executive, WWP.  “We are excited to partner with Splunk through our Warriors to Work initiative because careers requiring analytics and cyber security skills are in high demand, and there are thousands of available opportunities available globally. Partners like Splunk help us to better connect, serve and empower wounded warriors every day.”

The Splunk Pledge was announced at Splunk .conf2016, providing free Splunk Enterprise licenses, e-learning and support to any non-profit organisation in the world.

“I am deeply proud of Splunk Pledge as we work with the community around us to drive awareness and delivery of education and access to information. Among many successes, Splunk Pledge has already helped nonprofits use analytics to combat human trafficking, optimize solar power in transportation and accelerate humanitarian and disaster response,” said Doug Merritt, president and chief executive, Splunk.

“Data analytics through Splunk enables businesses to grow and succeed, and now Splunk is enabling individuals, diverse communities, nonprofits and educational institutions around the world to similarly succeed. Splunk, together with our partners, is using machine data to change the world.”


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



iTWire can help you promote your company, services, and products.


Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.