Combating Child
Trafficking Challenge

This is some text inside of a div block.

Create a solution to help combat child trafficking or assist its victims, using artificial intelligence/machine learning, augmented reality, or anything else!

Challenge Start Date

March 28, 2020

Registration Deadline


Submission Deadline

March 29, 2020

Demo Day

March 29, 2020

Winners & Highlight video


Team Signal

1 hour mentoring session with C5 Accelerate

Jameelah Young, Cameron Peele, Dorian Peele
Student Prize Winner



Blue Compass is honored to partner again with George Mason University’s Schar School of Policy and Government -Terrorism, Transnational Crime and Corruption Center (TraCCC) on a second hackathon to combat human trafficking as a part of our #ExpeditionHacks series. Bring your collaborative energy and new ideas on March 28-29, 2020 to see what your team can hack together!
Why should we be inspired to do something? Human trafficking is a global enterprise, second only to drug trafficking as the most profitable criminal business. It disproportionately affects women and minors, exploiting lives through deception, coercion and fear. Experts report the proliferation of child sexual exploitation material– with a record 45 million images flagged last year alone- in online environments that grow increasingly difficult to police. At the same time forced labor, including sex trafficking, continues to affect an estimated 29.9 million individuals worldwide. This includes the United States. Trafficking hides in plain sight in communities across the United States; in homes, factories, farms and businesses. In many ways, technology has made it easier for perpetrators to operate. We want to ensure that the power of technology is leveraged to combat these atrocious crimes.

Create a solution to help combat child trafficking or assist its victims, using artificial intelligence/machine learning, augmented reality, or anything else!

Questions to consider might include:
Please note this event will be held 100% ONLINE. The event was previously scheduled to be held at the GMU – Arlington Campus at Van Metre’s (formerly Founder’s) Hall near the Virginia Square Metro Stop on the Orange Line, but due to concerns about the spread of COVID-19, George Mason University has closed its buildings.
It’s still early for us and so we’re still populating this page with sponsors and judges. In the meantime, register now to save your spot! And checkout the previous hackathon to combat human trafficking.


March 28, 2020

**Schedule is subject to change and will not be final **


9-10 AM – Teaming | Check in to WebEx

10-10:30 AM – Opening Ceremony and Keynote Presentation

  • Dr. Louise Shelley – Terrorism, Transnational Crime, and Corruption Center, GMU
  • Mike Barretta – Manager of Solution Architecture, Elastic
  • Jim Jones – Director, Criminal Investigations and Network Analysis Center
  • Evelyn Chumbow – Survivor Activist, U.S. Advisory Council on Human Trafficking

10:30 – 11:30 AM – The 4 P’s of Human Trafficking – Panel Discussion

  • Chrissy Duke – U.S. Director, Beauty For Ashes
  • Erin Fisher – Director of Community Engagement, Just Ask Trafficking Prevention
  • Jennifer Long – CEO, Aequitas

11:30 AM –  Teaming | Hacking Begins

12:30 – 1:30 PM – Human Trafficking Breakout Sessions

  • Federal Approach to Human Trafficking Investigations – Jason Kaplan, Special Agent, FBI Charlotte
  • Illicit Massage Businesses: A Community Problem – Rachel – Director of Technology, Northern Virginia Human Trafficking Initiative
  • Title TBD – Joe McGrath – Detective, Arlington Police Department
  • Following the Money to Combat Human Trafficking – Theresa Forbes -Policy Advisor, Department of Treasury
  • Leveraging Technology to Serve Survivors – Andrea Powell, Director of Survivor and Youth Engagement, UNITAS
  • How Traffickers Use Technology – Chrissy Duke – U.S. Director, Beauty for Ashes
  • Lessons Learned from DHS Research – Jennifer Foley, Acting Deputy Director, DHS Office of University Programs

1:30 – 2:30 PM – Technology Breakout Sessions

  • Image Recognition with Python – Michael Chestnut – Data Science Program Alum, Georgetown University
  • CANCELLED—Strategic Empathy and Human Centered Design – Greg Bernard – National Security Innovation Office, US Dept. of Defense
  • The Power of Location: Using Maps for Impact – Heather Scott- GIS Engineer, Mapbox
  • Search, Observe, and Protect Your Systems and Data with the Elastic Stack – Mike Barretta, Manager of Solution Architecture, Elastic
  • Automated OSINT Collection and Analysis for Human Trafficking Use Cases – Michael Ramirez, Solutions Engineer – Public Sector, Recorded Future
  • Accelerating Your Growth – Zach Beecher- COO + Daniel Dammann – Director, Strategic Advisory, C5 Accelerate

7 PM – Pitch Workshop

–– Hack Thru the Night ––

March 29, 2020

1:30-2 PM – Judge’s Briefing (JUDGES ONLY)

2 PM – Code Freeze/Hacking Ends! Watch the deadline closely!

3-4:00 PM – Demos Begin!

4-4:30 PM – Judge Deliberations

Speaker: Sanjay Subramanian – Partner, PwC

4:30 PM – Winners Announced

5 PM – End of Event

Sunday Afternoon Presentations
  • Each participant and/or participant team will present their product or solution to the group on Sunday afternoon.
  • Presentations will be 3 minutes long with 2 minutes of questions from judges. Representatives from sponsors will be the primary audience for the presentations.
  • No formal presentation is required. Demos of your product or solution will follow this general outline: introduce yourself/teammate, introduce your concept, identify what tools you used, explain (loosely) how you derived your solution and what problem you are solving.
  • Presentations require direct connect from your laptop to the projection system. USB sticks are permitted for presentation purposes.



Projects will be judged based on the following criteria:



Gold Sponsors



Tools, Data, & IP Rights

Participants are permitted to use any commercially known open source tools. Participants are also encouraged to use their own proprietary solutions to develop creative and efficient products. If you are representing a company, your company’s proprietary software assets are also allowed to be used with the appropriate permission from your organization. Please reference the Terms and Conditions to confirm that all IP rights remain with the participant and/or the organization they are representing.

All participants must agree to the Terms and Conditions listed.


If you have any inquiries about participating in this competition, please don’t hesitate to reach out to us at