Manage and orchestrate the entire Trust & Safety operation in one place - no coding required.
Take fast action on abuse. Our AI models contextually detect 14+ abuse areas - with unparalleled accuracy.
Watch our on-demand demo and see how ActiveOS and ActiveScore power Trust & Safety at scale.
The threat landscape is dynamic. Harness an intelligence-based approach to tackle the evolving risks to users on the web.
Don't wait for users to see abuse. Proactively detect it.
Prevent high-risk actors from striking again.
For a deep understanding of abuse
To catch the risks as they emerge
Disrupt the economy of abuse.
Mimic the bad actors - to stop them.
Online abuse has countless forms. Understand the types of risks Trust & Safety teams must keep users safe from on-platform.
Protect your most vulnerable users with a comprehensive set of child safety tools and services.
Stop online toxic & malicious activity in real time to keep your video streams and users safe from harm.
The world expects responsible use of AI. Implement adequate safeguards to your foundation model or AI application.
Implement the right AI-guardrails for your unique business needs, mitigate safety, privacy and security risks and stay in control of your data.
Our out-of-the-box solutions support platform transparency and compliance.
Keep up with T&S laws, from the Online Safety Bill to the Online Safety Act.
Over 70 elections will take place in 2024: don't let your platform be abused to harm election integrity.
Protect your brand integrity before the damage is done.
From privacy risks, to credential theft and malware, the cyber threats to users are continuously evolving.
Here's what you need to know.
To proactively mitigate the exploitative practice child marriage and its manifestation online, Trust & Safety teams must be equipped with an understanding of the sophisticated circumvention techniques and socio-religious keywords used to mask this violative activity in geographic regions where the practice of child marriage is prevalent.
This article is based on the research of Kavya Sharma, an ActiveFence Human Exploitation Researcher.
Child marriage is a fundamental violation of human rights and often involves the illegal act of human trafficking. While this harmful phenomenon has been covered by academics, international development agencies, and NGOs, little research has been conducted on how child marriage manifests online, and even fewer resources exist for Trust & Safety teams seeking to stop this dangerous activity.
This blog focuses on the digital markers of child marriage in the Middle East, where the practice persists: over 13% of women in the Middle East and North Africa are married before the age of 18, totaling more than 700 thousand child brides each year. Due to the prevalence of child marriage in the region, threat actors often conduct their digital operations in plain sight.
To proactively mitigate the exploitative practice of online child marriage, Trust & Safety teams must be equipped with an understanding of the sophisticated circumvention techniques and socio-religious keywords used to mask this violative activity. This article provides an overview of the nuanced child marriage threat landscape where cultural practices influence online harm.
Interested in learning more about the latest threats to child safety? Read our recently released report, Child Predator Abuse of Generative AI.
The international community has broadly accepted prohibitions on child marriage (Convention on the Rights of the Child, and the Convention on the Elimination of All Forms of Discrimination Against Women). In addition to these international treaties, jurisdictions throughout the Middle East have established regulatory frameworks which set forth a legal minimum marital age of consent. However, both parental consent and the occurrence of unrecorded marriages can act as important determinants to supersede these laws.
Click the map below for legal marital age requirements in selected countries, which references data from Girls Not Brides.
__________________________________________
To learn more about how to maintain a safe, secure, and compliant platform, visit our Compliance Hub.
Taking into consideration the regional legal landscape, its cultural application, and important exceptions, it is essential for Trust & Safety teams to understand how this dangerous activity manifests online.
Child marriages in the Middle East are arranged by third parties, either by families or intermediary organizations. Today, these organizations often emerge online as matchmaking service providers, which operate both nationally and transnationally. While most networks focus on child brides – marrying young girls with adult men – others specialize in facilitating marriage between minors, and fewer still provide child grooms. This mirrors known real-world patterns of child marriage.
Within these networks, we have identified similar online behavioral patterns and related key trends that hint at the true purpose of their services. Signifiers can include:
Coordinated child marriage networks abuse social media platforms to promote their operations. As part of their assumed online matchmaking agency identity, they sometimes emulate key features of major dating platforms: providing adult users with access to profiles from which to select minors for marriage.
These profiles display a minor’s photograph together with their biographical information. Such criteria can include nationality, religion, cultural heritage, and socioeconomic status. Profiles also contain the minor’s age and can feature qualities that the minor seeks in a marriage partner, e.g., “a kind, devout, and respectful man.”
Some matchmaking agencies operate openly on social media platforms. However, a network’s presence often extends well beyond social media. To effectively combat the novel abuse of online child marriage, Trust & Safety teams must therefore be aware of the presence of coordinated cross-platform activity.
For example, clients interested in making contact with the child marriage vendor are often directed from their social media account to an instant messaging account or a Telegram channel. These communication channels are promoted in video and image descriptions that offer illicit services. Though less commonly used, other threat actors may also direct traffic to a more established website that contains a contact form or email address.
A typical cross-platform child marriage operation
Increased attention from Trust & Safety teams and global human rights organizations towards child marriage has led threat actors to develop new circumvention techniques to avoid detection.
One tactic involves intentionally omitting the personal details of child brides, instead using variations of numbers to connote their age:
In order to circumvent content moderation, other operations utilize the “comments” section of posts to discuss or explicitly state a listed minor’s age.
Another tactic involves the use of innovative keywords, which are hard to detect without specialized knowledge:
Trust & Safety teams should be cognizant of language diversity in order to collate keywords across dialects and identify linguistic phrases that may double as relevant euphemisms. This is an important tactic for those arranging child marriages to avoid on-platform detection. The rate at which these keywords rapidly evolve not only makes it more challenging for Trust & Safety teams to detect, but moderation also becomes harder to sustain.
One frequently detected trend involves the promotion of keywords that exploit socio-religious Middle Eastern terms. These keywords are used in connection with both prostitution and child marriage.
One such keyword group involves the term “temporary marriage” – the practice of which was historically religiously sanctioned. These temporary marriages materialize without a written marriage contract for a limited length of time, ranging from hours to years. Threat actors engaged in online child marriage reference the practice of ‘temporary marriage’ in their online activity as a mechanism for evading content detection.
Principal Arabic-language keywords which translate to “temporary marriage” are utilized by threat actors in the Middle East to conduct online child marriage. These include:
نکاح المسيار (“nikkah misyar”) (“temporary marriage”). Traditionally derived from the Sunni Islamic tradition, the term was originally used to refer to non-binding “pleasure marriages,” often directed toward widows who were seeking a partner. It is also synonymous with a “traveler marriage,” which legitimized sexual or polygamous relations for nomads or men traveling for work. It is now employed by some threat actors to arrange child marriages.
The exploitative activity of child marriage is often masked by a diverse range of sophisticated circumvention techniques that propagate harm. These include socio-religious keywords, euphemisms, and phrases recognizable only to the trained eye. To mitigate these harms, Trust & Safety teams must take proactive measures to prevent the exploitation of minors.
In doing so, Trust & Safety teams should take the following actionable items:
ActiveFence’s specialized knowledge of the human exploitation threat landscape and advanced research capabilities can provide new insights into emerging trends related to child marriage, allowing platforms to take proactive measures to prevent the abuse from impacting their services and their users.
Click below to learn about our threat intelligence offering.
Learn 8 key insights from the Crimes Against Children Conference, where child safety experts discussed sextortion, the impact of generative AI, and more.
Read about the latest updates in ActiveOS and ActiveScore that improve granular PII detection and enhance protection against multiple threats.
Explore the alarming rise in online financial sextortion targeting minors - Discover the latest advanced detection methods, and strategies to combat this global threat.