Combating Trafficking in Persons training app

Training for combatting human trafficking goes mobile

The Defense Department’s Combating Trafficking in Persons (CTIP) Program Office makes sure that all combat commands and defense agencies have the tools to spot and stop human trafficking, the modern equivalent of slavery.

Until recently, training on how to recognize and fight human trafficking has been confined to desktop computers. But now, thanks to an effort from Joint Knowledge Online (JKO), the necessary training can be completed via a free mobile app for Apple and Android mobile phones and tablets. Upon course completion, the trainee’s records are sent to the JKO desktop system, and course completion certificates are stored and available from JKO desktop accounts.

With soldiers deployed around the world, DOD is a unique position to fight human trafficking.  Mobile apps can be invaluable for military or first responders because the information can be regularly updated, and responders have ready access to all the apps resources.

Stars and Stripes reported that the Commander of U.S. Forces in Korea recently issued a memo to service members serving there to be watchful for establishments that support human trafficking. Apparently several "juicy bars" around the Korean bases, which were allegedly involved in prostitution, were actually supporting human trafficking because the girls were brought over from the Philippines.

More information on the Combating Trafficking in Persons training app is available from the CTIP website. 

About the Author

John Breeden II is a freelance technology writer for GCN.

Featured

  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.