Technology use by sex traffickers fuels debate between privacy and security

>