Improve your detection and simplify moderation - in one AI-powered platform.
Stay ahead of novel risks and bad actors with proactive, on-demand insights.
Proactively stop safety gaps to produce safe, reliable, and compliant models.
Deploy generative AI in a safe and scalable way with active safety guardrails.
Online abuse has countless forms. Understand the types of risks Trust & Safety teams must keep users safe from on-platform.
Protect your most vulnerable users with a comprehensive set of child safety tools and services.
Our out-of-the-box solutions support platform transparency and compliance.
Keep up with T&S laws, from the Online Safety Bill to the Online Safety Act.
Over 70 elections will take place in 2024: don't let your platform be abused to harm election integrity.
Protect your brand integrity before the damage is done.
From privacy risks, to credential theft and malware, the cyber threats to users are continuously evolving.
Stay ahead of industry news in our exclusive T&S community.
To proactively mitigate the exploitative practice child marriage and its manifestation online, Trust & Safety teams must be equipped with an understanding of the sophisticated circumvention techniques and socio-religious keywords used to mask this violative activity in geographic regions where the practice of child marriage is prevalent.
This article is based on the research of Kavya Sharma, an ActiveFence Human Exploitation Researcher.
Child marriage is a fundamental violation of human rights and often involves the illegal act of human trafficking. While this harmful phenomenon has been covered by academics, international development agencies, and NGOs, little research has been conducted on how child marriage manifests online, and even fewer resources exist for Trust & Safety teams seeking to stop this dangerous activity.
This blog focuses on the digital markers of child marriage in the Middle East, where the practice persists: over 13% of women in the Middle East and North Africa are married before the age of 18, totaling more than 700 thousand child brides each year. Due to the prevalence of child marriage in the region, threat actors often conduct their digital operations in plain sight.
To proactively mitigate the exploitative practice of online child marriage, Trust & Safety teams must be equipped with an understanding of the sophisticated circumvention techniques and socio-religious keywords used to mask this violative activity. This article provides an overview of the nuanced child marriage threat landscape where cultural practices influence online harm.
Interested in learning more about the latest threats to child safety? Read our recently released report, Child Predator Abuse of Generative AI.
The international community has broadly accepted prohibitions on child marriage (Convention on the Rights of the Child, and the Convention on the Elimination of All Forms of Discrimination Against Women). In addition to these international treaties, jurisdictions throughout the Middle East have established regulatory frameworks which set forth a legal minimum marital age of consent. However, both parental consent and the occurrence of unrecorded marriages can act as important determinants to supersede these laws.
Click the map below for legal marital age requirements in selected countries, which references data from Girls Not Brides.
__________________________________________
To learn more about how to maintain a safe, secure, and compliant platform, visit our Compliance Hub.
Taking into consideration the regional legal landscape, its cultural application, and important exceptions, it is essential for Trust & Safety teams to understand how this dangerous activity manifests online.
Child marriages in the Middle East are arranged by third parties, either by families or intermediary organizations. Today, these organizations often emerge online as matchmaking service providers, which operate both nationally and transnationally. While most networks focus on child brides – marrying young girls with adult men – others specialize in facilitating marriage between minors, and fewer still provide child grooms. This mirrors known real-world patterns of child marriage.
Within these networks, we have identified similar online behavioral patterns and related key trends that hint at the true purpose of their services. Signifiers can include:
Coordinated child marriage networks abuse social media platforms to promote their operations. As part of their assumed online matchmaking agency identity, they sometimes emulate key features of major dating platforms: providing adult users with access to profiles from which to select minors for marriage.
These profiles display a minor’s photograph together with their biographical information. Such criteria can include nationality, religion, cultural heritage, and socioeconomic status. Profiles also contain the minor’s age and can feature qualities that the minor seeks in a marriage partner, e.g., “a kind, devout, and respectful man.”
Some matchmaking agencies operate openly on social media platforms. However, a network’s presence often extends well beyond social media. To effectively combat the novel abuse of online child marriage, Trust & Safety teams must therefore be aware of the presence of coordinated cross-platform activity.
For example, clients interested in making contact with the child marriage vendor are often directed from their social media account to an instant messaging account or a Telegram channel. These communication channels are promoted in video and image descriptions that offer illicit services. Though less commonly used, other threat actors may also direct traffic to a more established website that contains a contact form or email address.
A typical cross-platform child marriage operation
Increased attention from Trust & Safety teams and global human rights organizations towards child marriage has led threat actors to develop new circumvention techniques to avoid detection.
One tactic involves intentionally omitting the personal details of child brides, instead using variations of numbers to connote their age:
In order to circumvent content moderation, other operations utilize the “comments” section of posts to discuss or explicitly state a listed minor’s age.
Another tactic involves the use of innovative keywords, which are hard to detect without specialized knowledge:
Trust & Safety teams should be cognizant of language diversity in order to collate keywords across dialects and identify linguistic phrases that may double as relevant euphemisms. This is an important tactic for those arranging child marriages to avoid on-platform detection. The rate at which these keywords rapidly evolve not only makes it more challenging for Trust & Safety teams to detect, but moderation also becomes harder to sustain.
One frequently detected trend involves the promotion of keywords that exploit socio-religious Middle Eastern terms. These keywords are used in connection with both prostitution and child marriage.
One such keyword group involves the term “temporary marriage” – the practice of which was historically religiously sanctioned. These temporary marriages materialize without a written marriage contract for a limited length of time, ranging from hours to years. Threat actors engaged in online child marriage reference the practice of ‘temporary marriage’ in their online activity as a mechanism for evading content detection.
Principal Arabic-language keywords which translate to “temporary marriage” are utilized by threat actors in the Middle East to conduct online child marriage. These include:
نکاح المسيار (“nikkah misyar”) (“temporary marriage”). Traditionally derived from the Sunni Islamic tradition, the term was originally used to refer to non-binding “pleasure marriages,” often directed toward widows who were seeking a partner. It is also synonymous with a “traveler marriage,” which legitimized sexual or polygamous relations for nomads or men traveling for work. It is now employed by some threat actors to arrange child marriages.
The exploitative activity of child marriage is often masked by a diverse range of sophisticated circumvention techniques that propagate harm. These include socio-religious keywords, euphemisms, and phrases recognizable only to the trained eye. To mitigate these harms, Trust & Safety teams must take proactive measures to prevent the exploitation of minors.
In doing so, Trust & Safety teams should take the following actionable items:
ActiveFence’s specialized knowledge of the human exploitation threat landscape and advanced research capabilities can provide new insights into emerging trends related to child marriage, allowing platforms to take proactive measures to prevent the abuse from impacting their services and their users.
Click below to learn about our threat intelligence offering.
The decision to build or buy content moderation tools is a crucial one for many budding Trust and Safety teams. Learn about our five-point approach to this complex decision.
Recognized by Frost & Sullivan, ActiveFence addresses AI-generated content while enhancing Trust and Safety in the face of generative AI.
Building your own Trust and Safety tool? This blog breaks down for Trust and Safety teams the difference between building, buying, or using a hybrid approach.