How traffickers exploit vulnerability