Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 3:37 am

Results for child pornography

99 results found

Author: Williams, Linda M.

Title: Pathways into and out of commercial sexual victimization of children: Understanding and responding to sexually exploited teens

Summary: For the past two years the University of Massachusetts Lowell and Fair Fund, Inc., along with partners in Boston, MA and Washington, D.C., USA, have been conducting an in-depth, field-based study of Commercial Sexual Exploitation of Children (CSEC) taking a life course perspective in examining the lives of female and male victims with a focus on prostituted teens. The Pathways Project examines pathways into and out of commercial sexual exploitation of children (CSEC) via prostitution and to provide useful information to practice and policy communities. The goal of the research was to understand the victims' perspectives; to identify the factors (individual, family, peer, school, and community contexts) associated with the commencement of CSEC; to identify factors that surround its maintenance and escalation; and to identify factors that impede or empower exiting from or overcoming exploitative situations. Our research included primarily qualitative methods with a focus on integrating researchers and grassroots organizers into the design, data collection, data analysis and dissemination. In the Boston metropolitan area and in Washington, DC, we interviewed 61 adolescents (aged 14-19) who experienced sexual violence via teen prostitution or who were runaways at risk for such commercial sexual exploitation. Commercial Sexual Exploitation of Children (CSEC) is a crime that has only recently received significant attention in the United States and around the globe. While the U.S. Department of Justice estimates that the number of children (those under the age of 18) currently involved in prostitution, child pornography, and trafficking may be anywhere between 100,000 and three million (Friedman, 2005) we find that knowledge of CSEC and our public response to the problem is still evolving. Federal legislation (Trafficking Victims Protection Act - TVPA 2000 and revised in 2008), funding and task force activity continues to bring the domestic sex trafficking of children into focus in the U.S. This includes attention to traffickers who coerce children and youth to enter the commercial sex "industry" through the use of a variety of recruitment and control mechanisms and who engage the children in exploitation in strip clubs, street-based prostitution, escort services, and brothels. There is evidence from the field that domestic sex traffickers target vulnerable youth, such as runaway and homeless youth, and it is often reported that the average age of entry into prostitution in the U.S. is as a 12- to 13-year-old victim of commercial sexual exploitation. A variety of state laws address these crimes under statutes that often are located in several different sections of the criminal code or in statutes directed at juveniles or families. Statutes may criminalize the behavior of those who procure children for sex acts (commonly referred to as "pimps"), those "customers" who engage in or solicit sex acts with a minor (some of these individuals are referred to as "johns"), those who are involved in the production or the possession of pornography with a minor, and those who benefit from such commerce. But state laws also focus on the behavior of the children and their families and may lead to juveniles being prosecuted for prostitution related offenses, adjudication as delinquent or a determination that they are a person/ child in need of supervision.

Details: Lowell, MA: University of Massachusetts Lowell, 2009. 73p.

Source: Accessed April 25, 2018 at: https://traffickingresourcecenter.org/sites/default/files/Williams%20Pathways%20Final%20Report%202006-MU-FX-0060%2010-31-09L.pdf

Year: 2009

Country: United States

URL: https://traffickingresourcecenter.org/sites/default/files/Williams%20Pathways%20Final%20Report%202006-MU-FX-0060%2010-31-09L.pdf

Shelf Number: 117143

Keywords:
Child Pornography
Child Prostitution
Child Sexual Exploitation
Child Trafficking
Sex Offenses
Victimization

Author: United States Sentencing Commission

Title: The History of the Child Pornography Guidelines

Summary: This report provides a history of the child pornography guidelines as established by the United States Sentencing Guidelines Commission. The child pornography guidelines have existed since their initial promulgation in 1987, and they have been substantively amended nine times. These revisions were prompted by, among other things, statutory changes, the United States Sentencing Commission's independent analysis, and public comment. This report is the first step in an ongoing examination of the child pornography guidelines.

Details: Washington, DC: U.S. Sentencing Commission, 2009

Source:

Year: 2009

Country: United States

URL:

Shelf Number: 117331

Keywords:
Child Pornography
Sentencing

Author: International Tribunal for Children's Rights

Title: International Dimensions of the Sexual Exploitation of Children: Global Report

Summary: The sexual abuse and exploitation committed on children by adults surpass all national boundaries. These abuses thus become the responsibility of more than one state, they become, in effect, an international problem. Some of the most common examples of these international dimensions of sexual exploitation of children include child sex tourism, cross-border trafficking of children for sexual purposes, child pornography and most recently the use of the Internet as a new channel for the proliferation of these forms of abuse and exploitation. This report presents an analysis and compilation of the recommendations produced by the first cycle of interventions of the International Tribunal for Children's Rights in France, Brazil and Sri Lanka. The recommendations cover a wide array of measures aimed at better protecting children from sexual exploitation and ensuring that their abusers are properly prosecuted and convicted, all over the world.

Details: Montreal: International Bureau for Children's Rights, 1999. 116p.

Source:

Year: 1999

Country: International

URL:

Shelf Number: 102426

Keywords:
Child Maltreatment
Child Pornography
Child Protection
Child Sex Tourism
Child Sexual Abuse
Human Trafficking
Sex Offenders

Author: Gragg, Frances

Title: New York Prevalence Study of Commercially Exploited Children: Final Report

Summary: The New York State Legislature required the New York State Office of Children and Family Services (OCFS) to develop a comprehensive study that: (1) estimates the prevalence of sexually exploited children within New York State, (2) identifies the unique needs of sexually exploited children, (3) specifies the types of programs and services that best meet such needs, and (4) evaluates the capacity of the current children's service system to meet the needs of commercially sexually exploited children (CSEC). Under contract with OCFS, Westat designed and conducted a prospective survey to estimate the prevalence of these children in the current service system and to specify available and needed services. The Safe Harbour bill of 2006 defined "sexually exploited children" as: people under the age of 18 who may be subject to sexual exploitation because they have engaged or agreed or offered to engage in sexual conduct with another person in return for a fee, traded sex for food, clothing or a place to stay, stripped, been filmed or photographed performing or engaging in sexual acts or loitered for the purpose of engaging in a prostitution offense as defined in section 240.37 of the penal law.∗ Westat developed two mail surveys, two qualitative interview protocols, and a focus group protocol to facilitate the collection of data. The mail surveys were sent to 159 agencies in four New York City (NYC) boroughs-Bronx, Brooklyn, Manhattan, and Queens-and seven Upstate counties-Chautauqua, Erie, Oneida, Onondaga, Schenectady, Warren, and Washington. These counties represented a purposive sample drawn to represent variations in population under 18 and geography, high rates of prostitution arrests and high rates of child sexual abuse reports, and the presence of agencies likely to serve as sentinels of CSEC. Agencies sampled within these counties included county and municipal law enforcement, probation departments, detention centers, OCFS female juvenile justice facilities, child advocacy centers (CACs), runaway shelters and transitional independent living programs, congregate care facilities, rape crisis centers, and youth-serving agencies. The data on prevalence of CSEC were collected through prospective mail questionnaires covering children identified as commercially sexually exploited from July 15 through September 15, 2006. Ninety-seven of the agencies returned the mail surveys, for a response rate of 81.0 percent Upstate and 45.2 percent in NYC. Data were weighted to give annual estimates of the prevalence of CSEC identified by service agencies for the two geographic areas-NYC and the seven Upstate counties. In addition, 20 non-police agencies-the NYC Administration for Children's Services (ACS), the seven Departments of Social Services (DSS) responsible for the Upstate counties covered by the mail survey, and 12 other service agencies- participated in qualitative interviews. Finally, three focus groups were conducted with CSEC in NYC. On an annual basis, the number of CSEC identified in NYC is estimated at over five times the number for the seven Upstate counties (2,253 identified in NYC versus 399 Upstate). The estimate of 399 CSEC for the Upstate counties is not a statewide estimate, but applies only to the seven counties sampled for the study. Demographically, there are noteworthy variations between CSEC in NYC and the sampled counties Upstate. CSEC in NYC were predominantly female (85 percent), Black/African American (67 percent), and 16 to 17 years old (59 percent). Just four percent (n=82 girls) were age 13 or under. NYC had the only children who identified as transgender (n=31), and the majority of children identifying as gay, lesbian, bisexual, and questioning. Nearly one fifth of the NYC children were Hispanic/Latino. Upstate, male children were a significant minority (22 percent). Upstate children were also younger; only 36 percent were 16 to 17 years old and 28 percent (n=63 girls and 50 boys) were 13 or younger. Only two percent identified themselves as gay, lesbian, bisexual, or questioning, and none were transgender. The largest racial group Upstate was white (47 percent). Ten percent were Hispanic/Latino. Consistent with other research, the data analysis revealed that the overwhelming majority of CSEC (at least 85 percent), regardless of geographic area, had prior child welfare involvement-typically in the form of child abuse and neglect allegations/investigations (69 percent of the NYC CSEC and 54 percent of those Upstate) and/or a foster care placement (75 percent of the NYC CSEC and 49 percent Upstate). A substantial proportion (over half of the NYC CSEC and 44 percent of those Upstate) had a prior juvenile justice placement, although secure placements were more common among the NYC children. About half of both groups had prior episodes of commercial sexual exploitation.

Details: Rensselaer, NY: New York State Office of Children and Family Services, 2007. 97p.

Source: Internet Resource: Accessed April 25, 2018 at: http://www.ocfs.state.ny.us/main/reports/csec-2007.pdf

Year: 2007

Country: United States

URL: http://www.ocfs.state.ny.us/main/reports/csec-2007.pdf

Shelf Number: 117112

Keywords:
Child Pornography
Child Prostitution (New York State)
Child Sexual Abuse (New York State)
Child Sexual Exploitation
Sex Crimes (New York State)
Sexually Abused Children (New York State)

Author: Jacomy, Severine

Title: Risks and Realities of Child Trafficking and Exploitation in Central Asia

Summary: This study explores three hypotheses regarding the issue of child trafficking in the Central Asia area: 1) More child trafficking occurs in Central Asia than is currently acknowledged; 2) Child trafficking is closely linked to other societal issues; and 3) Current systems fail to adequately prevent and respond to child trafficking.

Details: Geneva: UNICEF Regional Office for CEE/CIS, 2009. 97p.

Source: Internet Resource

Year: 2009

Country: Asia

URL:

Shelf Number: 118669

Keywords:
Child Pornography
Child Prostitution
Child Sex Trafficking (Asia)
Child Trafficking
Human Trafficking

Author: ECPAT International

Title: Upholding the Right of Children to Live Free from Commercial Sexual Exploitation: Interventions and Recommendations

Summary: The commercial sexual exploitation of children is a transnational issue that affects children across Asia and one that needs to be addressed in the regional and international context. A key requirement is well-coordinated, consistent and strong laws, within countries and across jurisdictions. Children are trafficked across borders and coerced into prostitution; child sex tourists travel to different locations to exploit children; and rapid growth in Internet use and other information and communication technologies allows child pornography to be distributed across borders. Many countries have inadequate legislation to address the problem. This report looks at the legal environment in the Asia Region and outlines the steps a country can take to fulfill its obligations towards children.

Details: Bangkok: ECPAT International, 2007. 61p.

Source: Internet Resource

Year: 2007

Country: Asia

URL:

Shelf Number: 119250

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Trafficking
Children, Crimes Against
Human Trafficking
Sex Trafficking

Author: United Nations Children's Fund, Innocenti Research Centre

Title: South Asia in Action: Preventing and Responding to Child Trafficking: Analysis of Anti-Trafficking Initiatives in the Region

Summary: This report presents an analysis of anti-trafficking initiatives related to children in the South Asian countries of Afghanistan, Bangaladesh, Bhutan, India, Maldives, Nepal, Pakistan and Sri Lanka. South Asian children continue to be trafficked for multiple forms of sexual exploitation – including prostitution, sex tourism, child pornography, paedophilia - and labour exploitation in agriculture, factories, domestic servitude and begging, forced marriage, adoption, military recruitment and debt release. The report includes several examples of laws and policies that could be enacted to prevent children from being trafficked and to protect children once they have been trafficked.

Details: Florence, Italy: UNICEF Innocenti Research Centre, 2009. 70p.

Source: Internet Resource; Accessed August 8, 2010 at http://www.unicef-irc.org/publications/pdf/ii_ct_southasia_analysis.pdf

Year: 2009

Country: Asia

URL: http://www.unicef-irc.org/publications/pdf/ii_ct_southasia_analysis.pdf

Shelf Number: 117638

Keywords:
Child Labor
Child Pornography
Child Prostitution
Child Trafficking
Forced Marriage
Human Trafficking
Sex Tourism

Author: U.S. Department of Justice

Title: The National Strategy for Child Prevention and Interdiction: A Report to Congress

Summary: "The sexual abuse and exploitation of children rob the victims of their childhood, irrevocably interfering with their emotional and psychological development. Ensuring that all children come of age without being disturbed by sexual trauma or exploitation is more than a criminal justice issue, it is a societal issue. Despite efforts to date, the threat of child sexual exploitation remains very real, whether it takes place in the home, on the street, over the Internet, or in a foreign land. Because the sexual abuse and exploitation of children strikes at the very foundation of our society, it will take our entire society to combat this affront to the public welfare. Therefore, this National Strategy lays out a comprehensive response to protect the right of children to be free from sexual abuse and to protect society from the cost imposed by this crime. In the broadest terms, the goal of this National Strategy is to prevent child sexual exploitation from occurring in the first place, in order to protect every child’s opportunity and right to have a childhood that is free from sexual abuse, trauma, and exploitation so that they can become the adults they were meant to be. This Strategy will accomplish that goal by efficiently leveraging assets across the federal government in a coordinated manner. All entities with a stake in the fight against child exploitation—from federal agencies and investigators and prosecutors, to social service providers, educators, medical professionals, academics, non-governmental organizations, and members of industry, as well as parents, caregivers, and the threatened children themselves—are called upon to do their part to prevent these crimes, care for the victims, and rehabilitate the offenders."

Details: Washington, DC: U.S. Department of Justice, 2010. 280p.

Source: Internet Resource; Accessed August 10, 2010 at http://www.projectsafechildhood.gov/docs/natstrategyreport.pdf

Year: 2010

Country: United States

URL: http://www.projectsafechildhood.gov/docs/natstrategyreport.pdf

Shelf Number: 119589

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Internet Safety

Author: ECPAT International

Title: Regional Overview on Child Sexual Abuse Images through the Use of Information and Communication Technologies in Belarus, Moldova, Russia and Ukraine

Summary: "In the framework of consolidating knowledge on commercial sexual exploitation of children (CSEC) in the CIS region, and in order to guide ECPAT’s strategies and priority actions for the protection of children, ECPAT International collaborated with its affiliate members in Belarus, Moldova, Russia and Ukraine to document evidence on the sexual exploitation of children through the use of ICTs in the region, especially the production and distribution of child sexual abuse images. This regional report, based on literature reviews and detailed case analyses, explores the risks for children to be increasingly sexually exploited in relation to the development of ICTs in the region."

Details: Bangkok, Thailand: ECPAT International, 2008. 100p.

Source: Internet Resource; Accessed August 13, 2010 at http://lastradainternational.org/lsidocs/Regional_Overview.pdf

Year: 2008

Country: Europe

URL: http://lastradainternational.org/lsidocs/Regional_Overview.pdf

Shelf Number: 119590

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Internet Pornography
Organized Crime

Author: ECPAT International

Title: Guide for National Planning: To Prevent, Stop and Redress Violations of Commercial Sexual Exploitation of Children

Summary: Commercial sexual exploitation of children – often referred to as CSEC – is prevalent throughout the world. It consists of criminal practices that demean and threaten the physical and psychological integrity of children. Commercial sexual exploitation of children is manifested primarily through child prostitution and child sex tourism, child pornography, and the trafficking of children for sexual purposes, as well as through such channels as child marriage, domestic servitude and bonded labour. With the increasing ease of travel, new information technologies and rising migration and displacement, a concerted global effort is necessary to ensure that all children are protected, regardless of their geographic or economic circumstance. Where they are comprehensive, National Plans of Action remain the best instrument to be used against Commercial Sexual Exploitation of Children. They provide a national vision for combating CSEC issues and ensure that the care and protection of children remains a national priority over a lasting period of time, constantly reviewed and improved through adequate monitoring and supported with appropriate resources. A National Plan enables civil society to identify what should be done, what is being done and what can be done for children; it challenges governments to tangibly live up to the international commitments they have made to protect the rights of children everywhere. This Methodological Guide is designed to work as a tool for countries that intend to develop National Plans of Action against Commercial Sexual Exploitation of Children. Specifically this guide provides: Information on setting up the stage to prepare for the drafting of an effective NPA through detailed background research and specific data collection; Description of the key partners to be involved in the National Plan of Action development to ensure its effective implementation; A methodology for the formulation of a National Plan of Action to combat the Commercial Sexual Exploitation of Children; Practical recommendations based on the experiences of countries that have developed National Plans of Action; and Examples of strategic national frameworks for eradicating the sexual exploitation of children around the world.

Details: Bangkok, Thailand: ECPAT International, 2009. 73p.

Source: Internet Resource: Accessed September 1, 2010 at: http://www.ecpat.net/EI/Publications/Global_Action/NPA_GUIDE_Layout.pdf

Year: 2009

Country: International

URL: http://www.ecpat.net/EI/Publications/Global_Action/NPA_GUIDE_Layout.pdf

Shelf Number: 119720

Keywords:
Child Labor
Child Pornography
Child Prostitution
Child Sex Tourism
Child Trafficking

Author: Omand, David

Title: Omand Review: Independent Serious Further Offence Review: The Case of Jon Venables

Summary: Following the conviction of Jon Venables on 23 July this year for possessing and distributing indecent images of children, the Lord Chancellor and Secretary of State for Justice commissioned Sir David Omand GCB to undertake an independent review into the management of Jon Venables, from his release from local authority detention in June 2001 until his recall to custody on 24 February in 2010. This reviews examines the supervision of Jon Venables who was accused in the murder of James Bulger.

Details: London: Sir David Omand GCB, 2010. 115p.

Source: Internet Resource: http://www.justice.gov.uk/publications/docs/omand-review-web.pdf

Year: 2010

Country: United Kingdom

URL: http://www.justice.gov.uk/publications/docs/omand-review-web.pdf

Shelf Number: 120371

Keywords:
Child Pornography
Offender Supervision
Probation

Author: U.S. Government Accountability Office

Title: Combating Child Pornography: Steps Are Needed to Ensure That Tips to Law Enforcement Are Useful and Forensic Examinations Are Cost Effective

Summary: The Department of Justice (DOJ) reports that online child pornography crime has increased. DOJ funds the National Center for Missing and Exploited Children (NCMEC), which maintains the CyberTipline to receive child pornography tips. The Providing Resources, Officers, and Technology To Eradicate Cyber Threats to Our Children Act of 2008 (the Act) contains provisions to facilitate these investigations and create a national strategy to prevent, among other things, child pornography. The Act directed GAO to report on actions to minimize duplication and enhance federal expenditures to address this crime. This report examines (1) the extent to which NCMEC determines the usefulness of tips; (2) mechanisms to help law enforcement coordination (i.e., deconfliction); and (3) the extent to which agencies are addressing factors that federal law enforcement reports may inhibit investigations. GAO analyzed the Act and spoke to law enforcement officials who investigate these crimes, selected to reflect geographic range, among other things. Although these interviews cannot be generalized, they provided insight into investigations. NCMEC takes steps to obtain feedback from law enforcement on the usefulness of CyberTipline reports; however, it does not systematically collect information on how useful individual reports are for initiating and advancing investigations or about information gaps that limit reports' usefulness. For instance, NCMEC solicits feedback via e-mail or in person quarterly from federal law enforcement liaisons at NCMEC about the overall usefulness of CyberTipline reports. However, according to many law enforcement officials GAO contacted, information in a CyberTipline report may not contain an image of apparent child pornography or may contain old data. NCMEC officials said that they are interested in obtaining additional feedback to enhance the usefulness of its reports and could explore additional methods to gather such information, such as creating a systematic process for obtaining feedback from federal law enforcement. Enhancing its processes for collecting feedback on the usefulness of CyberTipline reports could help NCMEC ensure that reports are as useful as possible to law enforcement. Existing deconfliction mechanisms generally prevent pursuit of the same suspects but are fragmented; DOJ is in the early stages of developing a system to address this fragmentation. Many law enforcement officials GAO contacted reported using various nonautomated (e.g., task forces) and automated (e.g., investigative systems) mechanisms to avoid duplication of effort in investigations. But these officials reported that there is not a single automated system that provides comprehensive case information and deconfliction, which can contribute to difficulties coordinating investigations. As mandated in the Act, DOJ is developing a national system to, among other things, provide law enforcement with a single deconfliction tool. Specifically, DOJ is conducting a needs assessment--which it plans to complete in 12 to 24 months--to use as a basis for system development. However, because DOJ is waiting on the results of the needs assessment to begin system development, it may be several years before the system is operational. Backlogs in the forensic analysis of digital evidence can delay or hinder online child pornography investigations; assessing the costs and benefits of taking extra steps to ensure the integrity of forensic analysis could help determine if there are efficiencies that could reduce backlogs. Forensic analysis of digital evidence consists of the review of information from digital media, such as hard drives, and can prove online child pornography crime. Several factors may contribute to backlogs in forensic analysis, including the steps federal law enforcement agencies believe enhance the integrity of analysis, such as making exact copies of digital evidence to discourage tampering. The FBI takes additional steps it believes enhance integrity, such as separating the forensic examination from the investigation. However, some federal officials and prosecutors GAO spoke with differed on the need for such steps. According to DOJ, the national strategy's working group is in a good position to address backlog issues and having this group assess the costs and benefits of steps taken to ensure the integrity of forensic analysis could help it determine potential efficiencies that could reduce backlogs. GAO recommends that NCMEC enhance its processes to collect feedback to improve tips and that DOJ assess the costs and benefits of steps agencies take to ensure the integrity of forensic analysis. NCMEC and DOJ generally concurred with our recommendations and discussed actions to address them.

Details: Washington, DC: U.S.Government Accountability Office, 2011. 77p.

Source: Internet Resource: GAO-11-334: Accessed April 2, 2011 at: http://www.gao.gov/new.items/d11334.pdf

Year: 2011

Country: United States

URL: http://www.gao.gov/new.items/d11334.pdf

Shelf Number: 121221

Keywords:
Child Abuse
Child Pornography
Child Protection
Computer Crimes
Criminal Investigations
Cybercrimes
Internet
Sex Offenses

Author: Lanning, Kenneth V.

Title: Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children. 5th ed.

Summary: The sexual victimization of children involves varied and diverse dynamics. It can range from one-on-one intrafamilial abuse to multioffender/multivictim extrafamilial sex rings and from nonfamily abduction of toddlers to prostitution of teenagers. Sexual victimization of children can run the gamut of “normal” sexual acts from fondling to intercourse. The victimization can also include deviant sexual behavior involving more unusual conduct (e.g., urination, defecation, playing dead) that often goes unrecognized, including by statutes, as possibly being sexual in nature. There are, therefore, no step-by-step, rigid investigative standards that are applicable to every case or circumstance. Investigative approaches and procedures have to be adjusted based on the dynamics of the case. Larger law-enforcement agencies tend to have more specialized investigative units that investigate the different types of cases. One unit might investigate intrafamilial, child-abuse cases; another might investigate missing-, abducted-, or murdered-children cases; and another might investigate extrafamilial, sexual-exploitation cases. Offenders, however, sometimes cross these investigative categories. For example a father might produce and distribute child pornography images of his own child or might molest other children in addition to his own. Investigators have to be trained and prepared to address these diverse realities. This discussion will focus primarily on the behavioral aspects of the sexual exploitation of children perpetrated by adult offenders who have an acquaintance relationship (i.e., not strangers or family members) with their child victims. Some of the information, however, could have application to acquaintance juvenile offenders and other types of child-molestation cases. Although some legal and technical aspects involved in these cases will be discussed, those are not my areas of expertise. The law and emerging technology can change rapidly and significantly in a short time. Experts in those areas should be consulted before applying this information, but underlying human behavior tends to remain the same. The concept of the acquaintance molester and other related terms will be defined and insight will be provided into the behavioral patterns of offenders and victims in such cases. For purposes of this publication, investigation is defined as any objective, fact-finding process. This certainly includes the work of law enforcement and prosecutors, but may also sometimes include the work of other professionals such as social workers, forensic mental-health or medical personnel, and youth-serving organizations. One major goal of this publication is to increase objectivity and professionalism in these investigations. This is the fifth edition of this publication.

Details: Alexandria, VA: National Center for Missing & Exploited Children, 2010. 212p.

Source: Internet Resource: accessed July 28, 2011 at: http://www.missingkids.com/en_US/publications/NC70.pdf

Year: 2010

Country: United States

URL: http://www.missingkids.com/en_US/publications/NC70.pdf

Shelf Number: 122223

Keywords:
Child Molestation
Child Pornography
Child Sexual Abuse
Criminal Investigation
Missing Children
Missing Persons (U.S.)
Sex Offenders
Sex Offenses

Author: Europol

Title: Child Sexual Exploitation: Fact Sheet 2011

Summary: In 2010, the European Commission adopted a proposal for a new Directive on combating sexual abuse, the sexual exploitation of children and child pornography, following up on a previous proposal tabled in 2009, with the aim of replacing the Framework Decision 2004/68/JHA. The new Directive, if approved, will follow the Lanzarote (Spain), October 20071 Council of Europe “Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse” and is going to cover actions on the following different aspects: •Criminal law: criminalisation of serious forms of child sexual abuse and exploitation currently not covered by EU legislation, with Articles 3 and 4 aiming at punishing the intentional conduct of recruiting or coercing a child into prostitution or into pornographic performances or profiting from or otherwise exploiting a child for such purposes, and establishing provisions that punish all the offences related to child pornography which already fall under the Europol mandate as listed in the Council Decision establishing the Europol Police Office, applicable from 1 January 2010. •Developments in the IT environment: new forms of sexual abuse and exploitation facilitated by the use of the Internet would be criminalised (e.g. grooming or viewing child abusive material (CAM) without downloading the files). •Criminal investigation and initiation of proceedings: a number of provisions would be introduced to assist with investigating offences and the bringing about of charges, in the absence of reporting by the child victim. •Offences committed abroad: rules on jurisdiction would be amended to ensure that child sexual abusers or exploiters from the EU face prosecution, including if they commit their crimes in a non-EU country. •Protection of victims: new provisions would ensure that abused children have easy access to legal remedies and do not suffer as a result of participating in criminal proceedings. •Prevention of offences: special programmes should be accessible for offenders to prevent them from committing new offences. National mechanisms to block access to websites with child pornography, which are most often located outside the EU, should be put in place under the supervision of judicial services or the police.

Details: The Hague: Europol, 2011. 13p.

Source: Internet Resource: Accessed August 24, 2011 at: http://polis.osce.org/library/f/3902/3234/EU-EU-RPT-3902-EN-Child%20Sexual%20Exploitation%202011%20Fact%20Sheet.pdf

Year: 2011

Country: Europe

URL: http://polis.osce.org/library/f/3902/3234/EU-EU-RPT-3902-EN-Child%20Sexual%20Exploitation%202011%20Fact%20Sheet.pdf

Shelf Number: 122477

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse (Europe)
Child Sexual Exploitation

Author: ECPAT UK

Title: On the Safe Side: Principles for the Safe Accommodation of Child Victims of Trafficking

Summary: This report details 10 principles for the safe accommodation of child victims of trafficking.It is a vital resource for those providing accommodation for child victims of trafficking and acts as a clear, easily accessible guide to safe accommodation that is aimed to reduce the number of child victims of trafficking going missing from local authority care. It brings together a wealth of research so that practitioners are able to successfully meet the required standards of safe accommodation, while taking into account the complex needs of a child victim of trafficking, putting the child at the heart of the model.

Details: London: ECPAT UK, 2011. 52p.

Source: Internet Resource: Accessed March 2, 2012 at: http://www.ecpat.org.uk/sites/default/files/on_the_safe_side.pdf

Year: 2011

Country: United Kingdom

URL: http://www.ecpat.org.uk/sites/default/files/on_the_safe_side.pdf

Shelf Number: 124346

Keywords:
Child Pornography
Child Prostitution
Child Sexual Exploitation
Child Trafficking (U.K.)
Victims of Trafficking

Author: Rogers, Audrey

Title: From Peer-To-Peer Networks to Cloud Computing: How Technology is Redefining Child Pornography Laws

Summary: Child pornography circulating in cyberspace has ballooned into the millions. To punish this flood, the law must accurately delineate culpable conduct. Technology such as peer-to-peer networks has erased the divisions among traders of child pornography, and, therefore, the differentials in punishment have lost their underpinnings. The current sentencing controversy surrounding child pornographers is merely the tip of the iceberg of the larger need to revamp the offenses themselves. This paper provides a framework for a normative critique of the offenses and their sentences. It suggests the law could better reflect technology by comporting with a refined harm rationale that rests on the fundamental injury to the victim’s dignity and privacy. Drawing on comparisons to diverse laws such as the Geneva Convention’s ban on photographs of prisoners of war, this paper states all traders in child pornography violate the rights of the children depicted and therefore inflict harm, albeit at different levels. Accordingly, the paper proposes three categories: producers, traders, and seekers of child pornography with base sentences varying accordingly. Starting at the same base level, the Sentencing Commission could then propose enhancements or departures to distinguish among the traders and their individual culpability.

Details: Social Science Research Network, 2012. 41p.

Source: Working Paper Series: Internet Resource: Accessed March 9, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2006664&

Year: 2012

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2006664&

Shelf Number: 124403

Keywords:
Child Pornography
Cybercrimes
Internet Crimes
Sentencing
Sentencing Reform

Author: Smith, Linda A.

Title: Domestic Minor Sex Trafficking: Child Sex Slavery in Arizona

Summary: Domestic minor sex trafficking (DMST) is the commercial sexual exploitation of United States citizen or lawful permanent resident (LPR) children through prostitution, pornography or sexual performance for monetary or other compensation i.e. shelter, food, drugs, etc. Experts estimate 100,000 U.S. citizen/ LPR minors are used in prostitution every year in the U.S., making DMST the single most under-reported, under-identified, and most severe form of commercial sexual exploitation children are facing today.1 The Trafficking Victims Protection Act (TVPA) of 2000, and subsequent reauthorizations, has defined all minors involved in commercial sex acts as victims of trafficking, including minors who are U.S. citizens or lawful permanent residents. However, the reality is that many domestic minor sex trafficking victims are detained in the criminal justice system under charges of prostitution instead of receiving the services they need and to which they are statutorily entitled. Shared Hope International has researched the identification and proper response to domestic minor sex trafficking victims in Arizona. The Rapid Assessment Methodology and Tool: Domestic Minor Sex Trafficking in the United States was developed by Shared Hope International, funded by the Department of Justice (DOJ), and implemented in Arizona by Taryn Mastrean and Samantha Healy Vardaman, J.D., both of Shared Hope International. This assessment includes information collected from July to September 2010 through a comprehensive survey of existing research and the completion of 64 interviews with representatives from 36 organizations and agencies that interact with or advocate for victims of domestic minor sex trafficking. Best practices are noted throughout the report, as well as the gaps and challenges that are present while working with this difficult population of victims. A motivated group of individuals, organizations, and agencies in Arizona are wrestling with the task of identifying and responding to domestic minor sex trafficking victims. Nonetheless, most victims remain hidden and those who are identified or self-disclose their involvement in prostitution are often placed in the juvenile justice system rather than treated as victims. This results in the failure to access available services for the restoration of victims. The goal of this assessment is to provide Arizona first responders and community members with information to advocate for improvements in the identification and proper response to DMST victims. This assessment will be provided to all stakeholders to inform the identification of victims and to help bring them services offered in accordance with the TVPA and its reauthorizations. This research offers qualitative data on the DMST issue in Arizona; additional research to quantify the scope of the problem would support upcoming action in Arizona. Phoenix is a state and national leader on domestic minor sex trafficking. Professionals in other municipalities within Arizona expressed great desire to implement the same response measures that have proven successful in Phoenix; however, financial support is more difficult to obtain for these smaller cities and counties. Inadequate funding and limited resources have restricted responders and service providers from implementing proper identification, investigation, prosecution, service response, and aftercare for victims of trafficking. Dedicated actors around the state illustrate that Arizona has the elements necessary to grow as a national leader on the issue of domestic minor sex trafficking through continued collaboration and advocacy despite adverse economic conditions.

Details: Vancouver, WA: Shared Hope International, 2010. 92p.

Source: Internet Resource: Accessed July 10, 2012 at: http://www.sharedhope.org/Portals/0/Documents/ArizonaRA.pdf

Year: 2010

Country: United States

URL: http://www.sharedhope.org/Portals/0/Documents/ArizonaRA.pdf

Shelf Number: 125526

Keywords:
Child Pornography
Child Prostitution
Child Sex Trafficking (Arizona)
Child Sexual Exploitation

Author: Dawson, Catherine J.

Title: Perspectives on the Capacity of the Canadian Police System to Respond to "Child Pornography" on the Internet

Summary: The Internet, its affordability, accessibility, and anonymity provide new venues where child exploitation crimes have increased. An exponential rise in the exchange of images of sexual abuse, commonly referred to as ‘child pornography’, has occurred. The purpose of this major paper was to explore this phenomenon within an international context, and assess the capacity of Canadian law enforcement (national and municipal) to respond. In order to do so a survey was sent to police departments across Canada, to have officers identify the challenges they faced in responding to images of child abuse on the Internet, and to solicit officers’ general opinions on this issue. The research resulted in five key findings that implied that existing capacity gaps were rooted in a lack of applied or ratified international agreements and commitments, a failure of system interoperability, a lack of effective private-public partnerships, and the weaknesses in current Canadian legislation, particular to mandated reporting of suspicious content (which is now under review). Finally, a lack of appropriate, accessible support and training for police was identified. Informed by the research, the author makes several recommendations.

Details: Abbotsford, B.C. : University of the Fraser Valley, 2009. 107p.

Source: Internet Resource: Master's Essay: Accessed July 30, 2012 at: http://www.ufv.ca/Assets/BC+Centres+(CRIM)/Safe+Schools/Research+Papers/Dawson_-_Responding_to_Internet_Child_Pornography.pdf

Year: 2009

Country: Canada

URL: http://www.ufv.ca/Assets/BC+Centres+(CRIM)/Safe+Schools/Research+Papers/Dawson_-_Responding_to_Internet_Child_Pornography.pdf

Shelf Number: 125798

Keywords:
Child Pornography
Child Sexual Exploitation
Computer Crimes
Internet Crimes (Canada)
Policing the Internet

Author: Cox, Lisa

Title: Global Monitoring Status of Action Against Commercial Sexual Exploitation of Children: Canada. 2nd Edition

Summary: While childa prostitution is present throughout Canada, it is most visible in larger urban centres, such as Montreal, Toronto and Vancouver, where small organised crime groups often control prostitution rings involving children. It is estimated that the average age of children entering prostitution in Canada is 13 to 18. Despite this problem, there are extremely limited services to support sexually exploited children. Experts in the field note that the single biggest challenge is securing safe housing for these child victims, as organisations providing shelter and focused services struggle to find funding to provide the full array of services needed. Several distinct groups of children are at particular risk of becoming involved in the sex trade in Canada. Those vulnerable groups include runaways, unwanted children, youth living independently, and children using Internet communications to solicit clients for sex. These children generally lack supervision and are developmentally unprepared to deal with the dangers associated with the sex trade. Canada is a source, transit, and destination country for children subjected to trafficking in persons. Across the country Canadian women and girls, particularly from Aboriginal communities, and foreign women and children, primarily from Asia and Eastern Europe, have been identified as victims of sex trafficking and commercial sexual exploitation. Victims of sex trafficking have been identified from the following countries: China, Hong Kong, Fiji, Taiwan, South Korea, the Philippines, Romania, Ukraine and Moldova. It is reported that Asian victims are found primarily in Vancouver and Western Canada while victims from Eastern Europe are primarily sent to Toronto, Montreal and Eastern Canada. Authorities also report Canadian lawmakers continue to grapple with the pressures and complexities of new technologies that increase the availability of child pornography. In the past several years, investigators in Canada have reported an increase in the number of videos available that depict child sexual abuse, as well as an increase in the size of personal collections that organised crime units are often involved and that many of the victims, especially ones from South Korea, were “in-transit” to the United States.

Details: Bangkok: ECPAT International, 2012. 62p.

Source: Internet Resource: Accessed October 3, 2012 at: http://www.ecpat.net/EI/Pdf/A4A_II/A4A_V2_AM_CANADA.pdf

Year: 2012

Country: Canada

URL: http://www.ecpat.net/EI/Pdf/A4A_II/A4A_V2_AM_CANADA.pdf

Shelf Number: 126551

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation (Canada)
Child Trafficking
Human Trafficking
Organized Crime

Author: Canada. Parliament. Standing Senate Committee on Human Rights

Title: The Sexual Exploitation of Children in Canada: the Need for National Action

Summary: The exploitation of children through prostitution, child pornography, the luring of children over the Internet and any sexual abuse of a child are all forms of sexual exploitation. The common thread that runs through these crimes is that a child‘s inherent human dignity has been violated for the sexual gratification of adults. Whether these adults are referred to as sexual predators, sex offenders, or child abusers, they are taking advantage of Canada‘s most vulnerable members, its children, and abusing the trust that children place in adults to protect them and to help them identify what is in their best interest. The Standing Senate Committee on Human Rights (the committee) began its study in 2009 of ―the issue of the sexual exploitation of children in Canada, with a particular emphasis on understanding the scope and prevalence of the problem of the sexual exploitation of children across the country and in particularly affected communities.‖ It had previously drawn attention to the pressing need for action by the Government of Canada in response to the commercial sexual exploitation of children in its 2007 report, Children: The Silenced Citizens, Effective Implementation of Canada’s International Obligations with Respect to the Rights of Children. Over the course of the present study, the committee learned from witnesses that the sexual exploitation of children is all too prevalent and that much more needs to be done to provide appropriate help to children who find themselves in these situations. The committee heard from many Canadians who are working to reduce the incidence of sexual exploitation in Canada and to assist those children who have been sexually exploited. These witnesses have a wealth of experience, creative initiative and commitment to contribute and we applaud their dedication. It became clear from their testimony, however, that many organisations across Canada do not have the funding, resources and support necessary to allow them to share experiences among themselves and to build upon each others‘ strengths. Witnesses also emphasized that there is currently a limited understanding of the scope and extent of sexual exploitation in Canada, of the challenges facing children in this regard, of the root causes that make some children more vulnerable to abuse, and of the various methods being used to lure children into exploitive situations. This lack of knowledge only serves to help the perpetrators who sexually exploit children. In this report, the committee provides its recommendations for how the federal government can develop well-informed policies, programs and services to help children avoid, escape or heal from the harms of sexual exploitation. Immediate action is also needed to ensure that an adequate and consistent level of services is available across the country to all Canadian children. By supporting the work of government agencies and non-government organisations through the national gathering of appropriate data and research, performing the appropriate analyses, and thereby leading the way to the development of better programs, the Government of Canada can lay the foundation for rebuilding children‘s trust that Canada can truly help them.

Details: Ottawa: Canadian Parliament, 2011. 101p.

Source: Internet Resource: Accessed October 5, 2012 at: http://www.parl.gc.ca/Content/SEN/Committee/411/ridr/rep/rep03nov11-e.pdf

Year: 2011

Country: Canada

URL: http://www.parl.gc.ca/Content/SEN/Committee/411/ridr/rep/rep03nov11-e.pdf

Shelf Number: 126560

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation (Canada)

Author: Rimer, Jonah

Title: Literature Review - Responding to Child & Youth Victims of Sexual Exploitation on the Internet

Summary: The sexual exploitation of children on the internet is a pertinent issue that has emerged to the forefront of society since the mainstream popularization of the internet in the mid 1990’s. Sexual exploitation on the internet is a concept encompassing three major forms of maltreatment against children: child pornography; child luring/unwanted sexual solicitation; and child prostitution/child sex tourism. When discussing these forms of abuse, as well as online sexual exploitation in general, there are many facets that must be taken into consideration. These include definitional issues of each form of abuse; characteristics of offenders and victims; the treatment of offenders; issues within law and law enforcement; advances in technology used by victims, perpetrators, and those combating online abuse; discoveries in scientific research that may increase the understanding of online abusers; an exploration of prevention efforts; a discussion of the relationship between child pornography, pedophilia, and contact offenses; and victim issues and responding to the needs of victims. These will be the significant themes and perspectives explored to summarize the key literature on the subject of the exploitation of children and youth on the internet.

Details: Toronto: Boost Child Abuse Prevention & Intervention, 2007. 128p.

Source: Internet Resource: Prepared for the “Responding to Child & Youth Victims of Sexual Exploitation on
the Internet” Training Seminar. September 24th to 27th, 2007. Blue Mountain
Resort, Collingwood, Ontario, Canada; Accessed October 9, 2012 at: http://www.boostforkids.org/LinkClick.aspx?fileticket=9o%2BhPW9lg6s%3D&tabid=166

Year: 2007

Country: International

URL: http://www.boostforkids.org/LinkClick.aspx?fileticket=9o%2BhPW9lg6s%3D&tabid=166

Shelf Number: 126663

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Exploitation
Computer Crimes
Internet Crimes

Author: Koleva, Desislava

Title: Comprehensive Response to Child Pornography: Thematic Study on the System for Prevention of Online Sexual Abuse and Exploitation of Children in Bulgaria

Summary: This study set out to explore the existing system and practices in Bulgaria and Eastern Europe for prevention and fighting child pornography. In the course of work the authors identified the need to provide an overview of the subject of online sexual exploitation and abuse of children and not just its manifestation in child pornography production and distribution. The Comprehensive Response to Child Pornography project is implemented by Save the Children Norway SEE Regional Office in cooperation with the Office of the State Coordinator for Anti-trafficking in Human Beings and Illegal Immigration in Bosnia and Herzegovina which invested financial and human resources in addressing this problem. The project is also financially supported by OAK Foundation. This study was conducted by the Centre for Inclusive Education which is partnering Save the Children in the first phase of the project with the main task to provide an overview of the situation in Bulgaria and identify and recommend good practices. The overarching goal of this study is to present a comprehensive perspective to the problem of sexual exploitation and abuse of children in cyberspace by outlining the main aspects and consequences of this crime, analyzing what has been achieved and what else can be done to improve the coordination of the fragmented approach taken so far. The specific objectives of the study were as following: - to study the existing system, procedures and capacities for prevention and fighting online sexual abuse and exploitation of children through child pornography in Bulgaria; - to understand and, if possible, suggest recommendations for addressing the challenges and improving the system; - to identify good practices that can be adopted and transferred by civil society organizations and public authorities in BiH. Why focusing on child pornography? The partners in this project have recognized that crimes against children are changing because of the advance in technology, particularly the Internet and information and communication technologies (ICTs). For the past decade most efforts have been focused on anti-child trafficking systems while also touching on other often accompanying manifestations of child sexual exploitation. Child trafficking for sexual purposes and prostitution are undoubtedly priority areas for prevention work in SEE countries. However, the spread of online sexual exploitation, including child pornography, through the advancement of ICTs which has been so far not in the spot light, should also be addressed as a priority in child protection policies. This research focuses on online sexual exploitation of children in its manifestation through child pornography materials but discusses also other ensuing aspects and dangers of the use of such materials in ‘grooming’ or enticing children over the Internet for sexually-oriented interactions that often spill over from cyberspace into real life. It attempts to present a more comprehensive picture of the harms involved in the exposure or involvement of children with child pornography. It argues that child pornography is not less harmful than physical violation. Child pornography is a fundamental abuse, not just a by-product of physical sexual abuse. Recent studies suggest that the use of children to make pornography ‘adds value’ to a commercial sexual exchange and assists in facilitating a child’s submission into other forms of commercial sex or sexual abuse. Early desktop study of official documents and research of secondary sources revealed a lack of up-todate data and scarce analysis materials regarding the situation and existing practices with regards to online sexual exploitation of children in Bulgaria. Despite these limitations, sufficient information was gathered to provide a broad overview of the situation in the country. The field research and round table discussion proved to be invaluable for analysis. They also served as a measure for validating information as different actors offered their perspective based on their practice. While the recommendations and main findings of this study are aimed primarily at Bulgarian and BiH civil society actors and decision makers, they will also be disseminated to relevant stakeholders and the broader public in order to achieve involvement and support of society in the fight against this form of child abuse.

Details: Oslo: Centre for Exclusive Education & Save the Children Norway, 2009. 49p.

Source: Internet Resource: Accessed october 11, 2012 at: http://resourcecentre.savethechildren.se/content/library/documents/comprehensive-response-child-pornography-thematic-study-system-prevention-

Year: 2009

Country: Bulgaria

URL: http://resourcecentre.savethechildren.se/content/library/documents/comprehensive-response-child-pornography-thematic-study-system-prevention-

Shelf Number: 126679

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation (Bulgaria)
Computer Crimes
Internet Crimes

Author: Lynch, Darlene C.

Title: Addressing the “Demand” Side of Commercial Sexual Exploitation of Children: Review of Federal and State Laws for Prosecuting Offenders

Summary: Hundreds of children are commercially sexually exploited through prostitution in Georgia every month.i Atlanta is a hub for this activity and has been identified by federal law enforcement officials as one of the fourteen U.S. cities with the highest rates of child prostitution.ii However, the problem is not confined to the Atlanta area; children are being commercially sexually exploited throughout the state.iii Commercially sexually exploiting children through prostitution violates a number of federal and state criminal statutes related to sex trafficking, pimping, and pandering.iv However, these crimes rarely occur in isolation. Often, the exploitation of children is part of a broader criminal enterprise such as a street gang or human trafficking ring.v Whether or not such an enterprise is involved, exploited children may be kidnapped, beaten, raped, threatened, or provided drugs to ensure compliance.vi Efforts to identify, arrest, and prosecute those who commercially sexually exploit children will be more effective and produce longer sentences if they take into account this broad range of related criminal activity. There are some limitations. When a single act, such as the sexual assault of a child, gives rise to more than one offense, the constitutional prohibition against double jeopardy may prevent multiple convictions.vii A defendant cannot, for example, be convicted of a greater offense and a lesser included offense at the same time.viii On the other hand, he may be convicted of multiple offenses when those offenses differ slightly, with each requiring proof of a fact that the other does not.ix For example, he may be convicted of rape and statutory rape based on the same sexual act, because rape requires proof of force which statutory rape does not, and statutory rape requires proof of the victim’s age which rape does not.x Additionally, when an act is a crime under two separate jurisdictions’ laws – for example when the act is both a federal and a state crime – it does not violate double jeopardy to prosecute the offender under both systems.xi Thus, a defendant can be convicted under Georgia’s sex trafficking lawxii and under the federal sex trafficking lawxiii for the exact same act without violating the defendant’s constitutional rights. Further, when the defendant commits a series of separate acts during the exploitation of a child, double jeopardy rules do not prevent him from being charged, convicted and punished for a range of offenses based on the different types of conduct that occurred.xiv Finally, in Georgia, certain offenses, such as sex trafficking, kidnapping and possession of firearm during a felony, are always treated as separate offenses, and the defendant may be convicted of these crimes regardless of any related convictions.xv This report provides a comprehensive list of Georgia and federal criminal laws that are commonly violated during the commercial sexual exploitation of children (“CSEC”). It includes a detailed chart explaining how different types of crimes relate to CSEC, outlining the elements of each crime and the associated penalties, and providing citations to the criminal statutes and any relevant case law interpreting those statutes. Finally, it analyzes the existing state statutes to identify opportunities to amend Georgia law to better deter those who would exploit children and punish those who have.

Details: Atlanta, GA: Barton Child Law and Policy Clinic Emory University School of Law, 2010. 80p.

Source: Internet Resource: Accessed October 15, 2012 at: http://children.georgia.gov/sites/children.georgia.gov/files/imported/vgn/images/portal/cit_1210/45/16/158888649GOFCDemandProject.pdf

Year: 2010

Country: United States

URL: http://children.georgia.gov/sites/children.georgia.gov/files/imported/vgn/images/portal/cit_1210/45/16/158888649GOFCDemandProject.pdf

Shelf Number: 126734

Keywords:
Child Molestation
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation (U.S.)
Commercial Sexual Exploitation of Children
Sex Offenses, Prosecution

Author: Victoria Parliament. Law Reform Committee

Title: Inquiry into Sexting

Summary: During the course of the Inquiry the Committee received 60 written submissions and convened public hearings with 45 witnesses. The Committee also met with key individuals and organisations during overseas consultations. The report is the culmination of all of the evidence presented to the Committee. The report contains 14 recommendations that the Committee believes will protect people from the harms caused by non-consensual sexting. The report also recognises that some sexting between young people should not be treated as child pornography, and recommends that new defences to child pornography offences be introduced to Victorian legislation.

Details: Melbourne: Victorian Government Printer, 2013. 252p.

Source: Internet Resource: Parliamentary Paper
No. 230, Session 2010-2013: Accessed June 1, 2013 at: http://www.parliament.vic.gov.au/images/stories/committees/lawrefrom/isexting/LRC_Sexting_Final_Report.pdf

Year: 2013

Country: Australia

URL: http://www.parliament.vic.gov.au/images/stories/committees/lawrefrom/isexting/LRC_Sexting_Final_Report.pdf

Shelf Number: 128900

Keywords:
Child Pornography
Computer Crimes
Internet Crimes
Sex Crimes
Sexting (Australia)

Author: Banerjee, Paramita

Title: Where Have All the Flowers Gone? An Evidence-Based Research Into Sex Trafficking of Girls

Summary: Is human trafficking an issue of crime or development? Most would argue – both. Domestic and international legal instruments define it as a trans-national organised crime, in recognition of the complex criminal nexus that is involved in profiteering from it. Many argue that defining trafficking as a crime alone is a blinkered approach, whereby the context of victims of trafficking, context of socio-economic and political forces that creates vulnerability for victims are ignored, reparation is substituted by prosecution alone. And therefore, rather than welfare, policing has become the centre-stage of action. The focus on the developmental context and responsive welfare measures has taken a backseat. This research draws its learnings from the implementation of an anti-trafficking case management programme – the objectives of which are to identify cases of children disconnected from their families and assist families to recover traces of their missing children. This programme shows that if the assistance begins from the source areas/ victims’ homes, then victims are often recovered even before they are sold off into brothels; traffickers in the source areas (first procurers) can be arrested and evidence from destination points can be used to strengthen the case against the first procurers. And this has a significant impact on prevention – because the crime gets visibilised to the community at large. But, project implementation experiences also showed that survivors’ contexts (family, community and the context of rural India at large) were desperate and gloomy. And there is very little attention paid to this context – so, even after all the ‘assistance’ of recovering prostituted girls and women, the context they were returning to raises serious questions in the wisdom of survivors returning to situations of deprivation and abuse. And therefore, it seemed necessary to learn, from these experiences, more closely, more in detail, on what is not working, what interventions seem to create dents in the system and could be scaled up and learn, from the researchers’ perspectives, what are the questions that are to be asked for its answers to be found. This research, in its present form, should be useful for development practitioners at national and international levels, researchers and academics and policy makers and influencers. In particular, this research should influence welfare policies targeting the poor in India, adolescents and children in particular, with a bias towards girls and women.

Details: West Bengal, India: Sanjog, 2010. 84p.

Source: Internet Resource: Accessed July 13, 2013 at: http://lastradainternational.org/lsidocs/where%20have%20all%20the%20flowers%20gone.pdf

Year: 2010

Country: India

URL: http://lastradainternational.org/lsidocs/where%20have%20all%20the%20flowers%20gone.pdf

Shelf Number: 129395

Keywords:
Child Pornography
Child Prostitution
Child Sex Trafficking
Human Trafficking

Author: Great Britain. House of Commons. Culture, Media and Sport Committee

Title: Online Safety. Sixth Report of Session 2013-14

Summary: The internet has revolutionised communications and information sharing. It provides an ever increasingly important platform for creativity and economic growth. Online social media services are providing new ways of interacting and keeping in touch. Online communications enable expressions of human behaviour both positive and negative; sometimes downright criminal. Our inquiry has focused on three disparate aspects of online content and behaviour, all of which are of widespread concern: illegal content, especially images of child abuse; harmful adult content being made freely available to children; bullying and harassment on social media. Both the publication and possession of child abuse images are rightly illegal. While these offences are bad enough, it must not be forgotten that such images represent crime scenes, often of the most horrific kind. There is a clear need to ensure that the police have adequate resources to track down and arrest online paedophiles in sufficient numbers to act as a meaningful deterrent to others. If necessary, additional funding should be provided to recruit and train a sufficiently large number of police officers adequate to the task. The Child Exploitation and Online Protection (CEOP) Command, now part of the new National Crime Agency, has a well-deserved reputation as a lead body in tackling child abuse. It has been increasingly effective not least because it is not solely a criminal justice organisation: its education and social care work has also been very important in increasing public understanding of the problem of child abuse and in offering means of countering abusers. All three elements of its mission - education, social care and criminal justice - need to be actively pursued and publicised. The Internet Watch Foundation, too, has played a crucial role in removing and blocking child abuse images online. We very much welcome their new commitment to embark on proactive searching for online child abuse images. The sooner these can be found and removed, the better. However, we are concerned that the additional staff resources being allocated to this task could prove woefully insufficient to achieve substantial progress towards what must be an important intermediate goal: the eradication of child abuse images from the open internet. Tracing paedophiles who share images on peer-to-peer networks and the so-called hidden internet continues to challenge both the police and the internet service providers; it is a challenge that, by working together, they must overcome. Legal adult pornography is widely consumed. This includes explicit "hard core" material that attracts an R18 certificate from the British Board of Film Classification. Parents and carers clearly have a key role, not to mention interest, in preventing harmful material of this kind becoming available to children. However, they should have access to more information and help where and when they need it. In the off-line world, it is the newsagent, not the parent, who voluntarily places some adult magazines on a top shelf out of reach of children. It is the local authority, not the parent, which administers the licensing of sex shops selling R18 pornography to which children may not be admitted. Some level of analogous protection ought to be provided in relation to online material. At the moment, little is. Legal adult sites could restrict access by children in a number of ways. In general a robust age verification process should be in place; as part of this, sites could use a combination of the following: requiring payment by a credit card linked to an adult; shielding the content behind a warning page; attaching metadata to the website to make it easier for filters to operate and for search engines not to return the material when operating in a safe search mode. Filters may not be failsafe, but they continue to improve and are an important way of protecting children from harmful content. We very much welcome the introduction of whole home filtering solutions that prompt account holders with a choice to apply them. The main internet service providers should have contacted all their customers by the end of the year to offer this valuable service. We want to see all other ISPs following suit. Publishing adult pornography in a way that makes it readily available to children is likely to be an offence under the Obscene Publications Act 1959. We do not believe the police should be deterred from bringing to book publishers of adult pornography who make little attempt to shield children from their product. While acknowledging that the enforcement of obscenity legislation is fraught with difficulty, not least in the context of the internet, we believe there is scope for greater enforcement in this area to provide some deterrent effect. There may also be scope for blocking particularly harmful adult websites that make no serious attempt to hinder access by children. As part of its existing media literacy duties, Ofcom has an important role in monitoring internet content and advising the public on online safety. However, we are anxious to avoid suggesting a significant extension of formal content regulation of the internet . Among the unintended consequences this could have would be a stifling of the free flow of ideas that lies at the heart of internet communication. Rather, more needs to be done to signpost the advice and educational resources available to both parents and teachers. This is all the more pressing given the growing use of social media and its misuse by some - both adults and children. Today, one in five 12-16 year-olds think being bullied online is part of life. Social media providers should offer a range of prominently displayed options for, and routes to, reporting harmful content and communications. They should act on these reports expeditiously, keeping the complainant and-where appropriate-the subject of the complaints informed of outcomes and actions. Given that Facebook and Twitter are aware of the extent to which their services are accessed by younger children, thanks to age verification processes that are at best flimsy, we expect them to pay greater attention to factoring this into the services provided, the content allowed and the access to both. The same applies to other social media companies in a similar position. Some of the worst online bullies and trolls are being brought to book in the courts. Much of the abuse and bullying that takes place online is covered by existing laws, but these need to be clarified with guidance updated for the online space. Young people especially are distinguishing less and less between their lives on the internet and in the real world. Bullying that takes place in the playground can merge seamlessly with bullying on smart phones and tablets. Sometimes this ends with the tragedy of teenage suicide. It is just one reminder that staying safe off-line includes staying safe online too.

Details: London: The Stationery Office, Limited, 2014. 166p.

Source: Internet Resource: http://www.publications.parliament.uk/pa/cm201314/cmselect/cmcumeds/729/729.pdf

Year: 2014

Country: United Kingdom

URL: http://www.publications.parliament.uk/pa/cm201314/cmselect/cmcumeds/729/729.pdf

Shelf Number: 132037

Keywords:
Bullying
Child Abuse
Child Pornography
Child Protection
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Online Communications
Online Security
Online Victimization
Pedophilia
Pornography

Author: Dank, Meredith

Title: Estimating the Size and Structure of the Underground Commercial Sex Economy in Eight Major US Cities

Summary: In 2010, the National Institute of Justice funded the Urban Institute's Justice Policy Center to measure the size and structure of the underground commercial sex economy in eight major US cities. The goals of this study were to: (1) derive a more rigorous estimate of the underground commercial sex economy (UCSE) in eight major US cities and (2) provide an understanding of the structure of this underground economy. To date, no reliable data exist to provide national or state policymakers with a verifiable and detailed understanding of underground commercial sex trade networks or the ways in which these networks interact with one another on the local, state, or interstate level. In addition, there is no information regarding the relationship between the UCSE and the local commercial sex trade or commercial sex activity conducted over the Internet. This study aimed to close the gap in our understanding about the nature and extent of these activities. Research Questions The study was guided by four main research questions: 1. How large is the underground commercial sex economy in eight major US cities? 2. To what extent are the underground commercial sex, drug, and weapons economies interconnected in the eight major US cities? 3. How do the ties between traffickers within the underground commercial sex economy impact the transportation of sex trafficking victims? 4. What are the network characteristics of the traffickers that operate within the underground commercial sex economy? Methodology The study employed a multi-method approach, using both qualitative and quantitative data, and data were collected in the following eight cities: San Diego, Seattle, Dallas, Denver, Washington, DC, Kansas City, Atlanta, and Miami. -- Existing datasets documenting the market changes for illegal drugs and weapons were analyzed to measure changes in these markets and estimate the overall size of these markets. This was done by measuring changes in a series of "proxy" variables, which we assumed to be proportional to underlying activity. Thus, official national datasets that measured some sort of drug and gun activities over a period of time were collected to measure these changes. Qualitative data was collected through interviews with 119 stakeholders and 142 convicted offenders, including local and federal law enforcement officers, prosecutors, pimps/sex traffickers, sex workers, and child pornographers. Stakeholders and offenders were interviewed about the structure of the UCSE, the profits generated through the UCSE, networking within the UCSE, and changes in the UCSE over time. Underground Commercial Sex Economy Key Findings "Sex sells" does little to explain the multi-million-dollar profits generated by the underground commercial sex economy. From high-end escort services to high school "sneaker pimps," the sex trade leaves no demographic unrepresented and circuits almost every major US city. What we know about the underground commercial sex economy is likely just the tip of the iceberg, but our study attempts to unveil its size and structure while documenting the experiences of offenders and law enforcement. Our study focused on eight US cities- Atlanta, Dallas, Denver, Kansas City, Miami, Seattle, San Diego, and Washington, DC. Across cities, the 2007 underground sex economy's worth was estimated between $39.9 and $290 million. While almost all types of commercial sex venues -- massage parlors, brothels, escort services, and street- and internet-based prostitution -- existed in each city, regional and demographic differences influenced their markets. Pimps and traffickers interviewed for the study took home between $5,000 and $32,833 a week. These actors form a notoriously difficult population to reach because of the criminal nature of their work. Our study presents data from interviews with 73 individuals charged and convicted for crimes including compelling prostitution, human trafficking and engaging in a business relationship with sex workers. Pimps claimed inaccuracy in media portrayals. Most pimps believed that the media portrayals exaggerated violence. Some even saw the term "pimp" as derogatory, despite admitting to occasional use of physical abuse for punishment. Although pimps may have underreported the use of physical violence, they did cite frequent use of psychological coercion to maintain control over their employees. Pimps manipulate women into sex work. From discouraging "having sex for free" to feigning romantic interest, pimps used a variety of tactics to recruit and retain employees. Some even credited their entry into pimping with a natural capacity for manipulation. Rarely, however, were pimps the sole influence for an individual's entry into the sex trade. Women, family, and friends facilitate entry into sex work. Female sex workers sometimes solicited protection from friends and acquaintances, eventually asking them to act as pimps. Some pimps and sex workers had family members or friends who exposed them to the sex trade at a young age, normalizing their decision to participate. Their involvement in the underground commercial sex economy, then extends the network of those co-engaged in the market even further. Unexpected parties benefit from the commercial sex economy. Pimps, brothels, and escort services often employed drivers, secretaries, nannies, and other non-sex workers to keep operations running smoothly. Hotel managers and law enforcement agents sometimes helped offenders evade prosecution in exchange for money or services. Law enforcement in one city reported that erotic Asian massage parlors would purchase the names of licensed acupuncturists to fake legitimacy. Even feuding gang members occasionally joined forces in the sex trade, prioritizing profit over turf wars. The most valuable network in the underground sex economy, however, may be the Internet. The Internet is changing the limitations of the trade. Prostitution is decreasing on the street, but thriving online. Pimps and sex workers advertise on social media and sites like Craigslist.com and Backpage.com to attract customers and new employees, and to gauge business opportunities in other cities. An increasing online presence makes it both easier for law enforcement to track activity in the underground sex economy and for an offender to promote and provide access to the trade. Child pornography is escalating. Explicit content of younger victims is becoming increasingly available and graphic. Online child pornography communities frequently trade content for free and reinforce behavior. Offenders often consider their participation a "victimless crime." The underground sex economy is perceived as low risk. Pimps, traffickers, and child pornography offenders believed that their crimes were low-risk despite some fears of prosecution. Those who got caught for child pornography generally had low technological know-how, and multiple pimp offenders expressed that "no one actually gets locked up for pimping," despite their own incarcerations. Policy and practice changes can help combat trafficking and prostitution. -- Cross-train drug, sex, and weapons trade investigators to better understand circuits and overlaps. -- Continue using federal and local partnerships to disrupt travel circuits and identify pimps. -- Offer law enforcement trainings for both victim and offender interview techniques, including identifying signs of psychological manipulation. -- Increase awareness among school officials and the general public about the realities of sex trafficking to deter victimization and entry. -- Consistently enforce the laws for offenders to diminish low-risk perception. -- Impose more fines for ad host websites.

Details: Washington, DC: Urban Institute, 2014. 348p.

Source: Internet Resource: Accessed June 14, 2014 at: http://www.urban.org/UploadedPDF/413047-Underground-Commercial-Sex-Economy.pdf

Year: 2014

Country: United States

URL: http://www.urban.org/UploadedPDF/413047-Underground-Commercial-Sex-Economy.pdf

Shelf Number: 132450

Keywords:
Child Pornography
Human Trafficking
Prostitution (U.S.)
Sex Trafficking
Sex Workers
Underground Economy

Author: Boxall, Hayley

Title: Historical review of sexual offence and child sexual abuse legislation in Australia: 1788-2013

Summary: The report provides an overview of the socio-political factors and events that have influenced the development of Australia's child sexual abuse legislation from 1788-2013. Key developments in relevant legislation during this period which are discussed in detail in the report include: the decriminalisation of homosexual acts between consenting males the removal of gendered language from legislation to enable the law to deal with matters involving male victims, female offenders and same sex offences broadening the definition of sexual intercourse introduction of specific legislation relating to child pornography introduction of mandatory reporting laws.

Details: Canberra: Australian Institute of Criminology, 2014. 108p.

Source: Internet Resource: AIC Special Report: Accessed September 4, 2014 at: http://www.aic.gov.au/media_library/publications/special/007/Historical-review-sexual-offence-child-sexual-abuse.pdf

Year: 2014

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/special/007/Historical-review-sexual-offence-child-sexual-abuse.pdf

Shelf Number: 133178

Keywords:
Child Pornography
Child Sexual Abuse
Criminal Law Reform
Sex Offenders
Sexual Violence

Author: Boxall, Hayley

Title: Brief review of contemporary sexual offence and child sexual abuse legislation in Australia

Summary: The following report provides a brief overview of the offences that an individual who sexually abuses a child in an institutional setting may be charged with at the end of 2013. Information provided for each of the identified offences includes: the location of the offence in the respective state or territory's legislation; the age of the victim (where relevant); - aggravating factors - for the purpose of this review, restricted to factors relating to: the age of the child; - the relationship between the offender and victim; and - whether the victim has an intellectual impairment, physical disability or mental illness; the maximum penalty. The offences included in this review have been divided into a six sections: contact sexual offences where the child is below the legal age of consent (16, 17 or 18 years old depending on the jurisdiction and nature of the sexual act); contact sexual offences where the child is above the legal age of consent; contact sexual offences where the age of the victim is not specified; non-contact sexual offences; child pornography offences (production); and offences for which institutions and/or their representatives that were aware of child sexual abuse may be charged. Only offences relating to individuals located within Australia are included in this review. Further, while there are other defences that may be used to refute charges brought under sexual offence or child sexual abuse legislation (for example, honest and reasonable belief that a person was over a certain age and similarity in age between the victim and offender), the only defence that is considered in this report is consent.

Details: Canberra: Australian Institute of Criminology, 2014. 66p.

Source: Internet Resource: AIC Special Report: Accessed September 15, 2014 at: http://www.aic.gov.au/media_library/publications/special/006/Brief-review-sex-abuse-legislation.pdf

Year: 2014

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/special/006/Brief-review-sex-abuse-legislation.pdf

Shelf Number: 133327

Keywords:
Child Pornography
Child Sexual Abuse
Criminal Defense
Criminal Law Reform
Sex Offenders
Sexual Violence

Author: Pritchard, Jeremy

Title: Child exploitation material in the context of institutional child sexual abuse

Summary: Child exploitation material (CEM) in the context of institutional child sexual abuse - University of Tasmania - This report provides a review of literature on child exploitation material (CEM) in the context of institutional child sexual abuse Compared to other areas of crime research, CEM research is relatively new and the current research base is limited. - There is no evidence to support a direct causal link between viewing CEM and committing contact offences, however, a significant percentage of CEM offenders appear to have committed contact offences. - The CEM market is experiencing unprecedented growth, particularly with the combined advent of the internet and cheap digital cameras. - Very little research has examined CEM in workplace contexts. - There is very limited evidence about the effectiveness of strategies to prevent CEM offences in institutions. Potential strategies include: - IT filters to block websites - protocols governing the use of computers, cameras, mobile phones etc. - monitoring staff internet use - workplace codes of conduct including Internet Use Policies.

Details: Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse, 2014. 37p.

Source: Internet Resource: Accessed February 3, 2015 at: http://www.childabuseroyalcommission.gov.au/documents/edited-report-final-version-cem-prichard-spiranovi.pdf

Year: 2014

Country: Australia

URL: http://www.childabuseroyalcommission.gov.au/documents/edited-report-final-version-cem-prichard-spiranovi.pdf

Shelf Number: 134519

Keywords:
Child Pornography
Child Sexual Abuse (Australia)
Child Sexual Exploitation
Internet Crimes

Author: Rape Crisis Network Ireland

Title: Hearing child survivors of sexual violence: Towards a national response

Summary: As children are among the most vulnerable in society, through their dependence on adults and limited access to resources they are often incapable or face considerable difficulty communicating needs and having those needs met. This report seeks to identify those needs more clearly in relation to sexual violence and provide information about child sexual violence learned from child survivors who access services. This information can be used by adults and statutory actors to respond to and support vulnerable children. Globally, 7% of boys and 14% of girls under the age of 18 are subjected to forced sexual intercourse and other forms of violence involving touch (Pinheiro, 2006). In Ireland, the SAVI report revealed that 30% of women and 24% of men experienced some form of sexual abuse before the age of 17 (McGee et.al. 2002). Despite this vulnerability to multiple forms of abuse and violence, children are often disadvantaged in seeking support and redress for sexual crimes. Research in Ireland and internationally has identified that children subjected to sexual violence often do not disclose the abuse to anyone or delay disclosure until decades after the abuse has ended (McGee et.al. 2002; McElvany, 2008). Furthermore, even when children do disclose incidents of sexual violence, services may be inadequate or inaccessible. The CARI Foundation has stated that, "services for children affected by sexual abuse across the country are patchy and inadequate and much less developed than those for adults who were abused in their childhood" (2011). An important factor in the coherence and development of services is that the "the lack of comprehensive research and disaggregated data concerning sexual violence makes it difficult to clearly define the problem" (Moreno, 2010). The RCNI statistical database seeks to address this gap through the provision of high quality data on child survivors of sexual abuse. This information not only defines the problem but is essential in developing strategies and solutions to support survivors and reduce the risk of sexual violence against children. In this RCNI report, data relating to survivors under the age of 18 utilising RCC and CARI services in 2012 are examined. RCCs usually provide services to survivors from the age of 14, while CARI provides services to all children. The report presents previously unexamined data from these centres and includes information about the 192 child survivors, accounting for 220 incidents of sexual violence against children, who accessed services from CARI or an RCC in 2012. Child survivors represent a small subset of the total number of survivors of child sexual abuse that access services from RCCs or CARI. As incidents of sexual violence are often disclosed years later, certain types of incidents, perpetrators, and survivors may be omitted from the child survivor sample that are evident within a larger sample that includes adult survivors of child sexual abuse. In order to address this, and to reveal significant disparities between child service users and all service users who experienced incidences of child sexual violence, the child survivor sample is compared to the general sample of survivors of child sexual violence. Where significant differences exist, they are discussed within the report.

Details: Galway: Rape Crisis Network Ireland, 2013. 44p.

Source: Internet Resource: Accessed February 26, 2015 at: http://www.rcni.ie/wp-content/uploads/Hearing-Child-Survivors-of-Sexual-Violence-2013.pdf

Year: 2013

Country: Ireland

URL: http://www.rcni.ie/wp-content/uploads/Hearing-Child-Survivors-of-Sexual-Violence-2013.pdf

Shelf Number: 134683

Keywords:
Child Pornography
Child Sexual Abuse (Ireland)
Child Sexual Exploitation
Child Sexual Violence

Author: U.S. Department of Justice, Office of the Inspector General, Evaluation and Inspections Division

Title: The Handling of Sexual Harassment and Misconduct Allegations by the Department's Law Enforcement Components

Summary: The Office of the Inspector General (OIG) conducted this review to assess how the Department of Justice's (Department) four law enforcement components respond to sexual misconduct and harassment allegations made against their employees. This review examined the nature, frequency, reporting, investigation, and adjudication of such allegations in the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF); the Drug Enforcement Administration (DEA); the Federal Bureau of Investigation (FBI); and the United States Marshals Service (USMS). The findings in today's report include: - Component supervisors did not always report allegations of sexual harassment and misconduct to their respective internal affairs offices as required by component policies. In several instances, these supervisors were not disciplined for their failure to report. Additionally, at the FBI and USMS, the internal affairs offices chose not to investigate some allegations of sexual harassment and misconduct despite significant evidence that misconduct had occurred, and DEA's internal affairs office did not always fully investigate allegations of sexual misconduct related to prostitution. - At ATF, DEA, and USMS, we found a lack of coordination between the internal affairs offices and security personnel. As a result, security departments at these components were sometimes unaware of allegations that may impact an employee's eligibility to hold a security clearance and access classified information. In contrast, we found that the FBI's internal affairs office alerts the FBI security department to any such misconduct allegations it receives. - All of the components we reviewed either did not have adequate offense tables or did not properly use their offense tables for charging employees with sexual harassment and sexual misconduct offenses. The offense tables at ATF, DEA, and USMS did not contain adequate language to address the solicitation of prostitutes in jurisdictions where the conduct is legal or tolerated. The FBI offense table contains such a category, but we found instances where general offense categories were applied instead of the specific category. - All four components have weaknesses in detecting the transmission of sexually explicit text messages and images by employees. Although the FBI archives and proactively monitors its employees' text messages, there are limitations to its ability to use this information, and misconduct investigators at ATF, DEA, and USMS cannot easily obtain such text message evidence. These issues may hamper the components' ability to conduct misconduct investigations, fulfill their discovery obligations, and deter misconduct. Finally, today's report notes that the OIG's ability to conduct this review was significantly impacted and unnecessarily delayed by repeated difficulties we had in obtaining relevant information from both the FBI and DEA. Specifically, the FBI and DEA initially refused to provide the OIG with unredacted information which the OIG was entitled to receive under the Inspector General Act. When they finally did provide the information without extensive redactions, we found that it still was incomplete. We were also concerned by an apparent decision by DEA to withhold information regarding a particular open misconduct case despite the fact that the OIG was authorized to receive the information. Because of these difficulties, we cannot be completely confident that the FBI and DEA provided us with all information relevant to this review. Our report reflects the findings and conclusions we reached based on the information made available to us. The report makes eight recommendations to improve the law enforcement components' disciplinary and security processes relating to allegations of sexual misconduct and harassment. The DOJ and the four components reviewed concurred with all of the recommendations.

Details: Washington, DC: U.S. Department of Justice, 2015. 139p.

Source: Internet Resource: Accessed April 2, 2015 at: http://www.justice.gov/oig/reports/2015/e1504.pdf

Year: 2015

Country: United States

URL: http://www.justice.gov/oig/reports/2015/e1504.pdf

Shelf Number: 135145

Keywords:
Child Pornography
Law Enforcement Investigations
Military (U.S.)
Prostitution
Rape
Sexting
Sexual Abuse
Sexual Harassment
Sexual Misconduct

Author: Internet Watch Foundation

Title: Emerging Patterns and Trends Report #1. Youth-Produced Sexual Content

Summary: This Paper introduces the key findings of a quantitative study of youth-produced sexual content online ('the Study'). The Study took place over a three month period between September and November 2014 and used a combination of proactively sourced content from search engines, historic IWF data and leads from public reports to locate "youth-produced sexual content" depicting "young people". Where the content was assessed as meeting these criteria the content was analysed in accordance with IWF's standard procedures for actioning child sexual abuse content, capturing data about each image/video including image category, site type, commerciality, hosting location, device used to create the content and the assessed age and gender of the individuals depicted. During the course of the Study, 3,803 images and videos were assessed as meeting the research criteria. The key findings of the Study were as follows: - 17.5% of content depicted children aged 15 years or younger. - 85.9% of content depicting children aged 15 or younger was created using a webcam. - 93.1% of the content depicting children aged 15 or younger featured girls. - 46.9% of content depicting children aged 15 years or younger was Category A or B5 compared to 27.6% of content in the 16-20 years age range. - 89.9% of the total images and videos assessed as part of the Study had been harvested from the original upload location and were being redistributed on third party websites. The Study was carried out by Internet Watch Foundation (IWF) in partnership with Microsoft and was initially designed to expand upon an earlier study carried out by IWF in 2012 which provided a snapshot of the availability of self-generated sexual content featuring young people online and the extent to which control over that content is lost once it has appeared online. However, on analysis of the data it became apparent that the scope of the 2012 study and the definition of "self-generated sexual content" as used therein was inadequate in describing the observed trends. This was particularly the case in relation to methods of creation of the content and age of many of the individuals depicted. What emerged from the data in this Study is an increasing trend for the distribution of sexually explicit content produced by younger children using laptop webcams which, due to the nature of the technology used, they are aware is being shared with at least one other party. To reflect this finding, we instead propose a new definition of "youth-produced sexual content" as: "Nude or semi-nude images or videos produced by a young person of themselves engaging in erotic or sexual activity and intentionally shared by any electronic means."

Details: Cambridge, UK: Internet Watch Foundation, 2015. 25p.

Source: Internet Resource: Accessed April 2, 2015 at: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content.pdf

Year: 2015

Country: United Kingdom

URL: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content.pdf

Shelf Number: 135150

Keywords:
Child Pornography
Computer Crimes
Internet Crimes
Internet Pornography
Sex Crimes
Sexting

Author: SPIRTO Self-Produced Images - Risk Taking Online

Title: Self-Produced Images - Risk Taking Online (SPIRTO): Quantitative analysis of identified children data

Summary: This project aims to build an evidence base of the risks for adolescents posed by the increased usage of technology, in particular, mobile or hand-held devices. The focus of the project was on the risks related to the new possibilities to generate sexual content, and understanding of the different contexts behind the creation of these images and the consequences for the young people involved.

Details: s.l.: SPIRTO, 2014. 19p.

Source: Internet Resource: Accessed April 2, 2015 at: http://www.spirto.health.ed.ac.uk/download/website_files/SPIRTO_Report_Quantative_Analysis_April2014.pdf

Year: 2014

Country: United Kingdom

URL: http://www.spirto.health.ed.ac.uk/download/website_files/SPIRTO_Report_Quantative_Analysis_April2014.pdf

Shelf Number: 135151

Keywords:
Child Pornography
Child Sexual Exploitation
Computer Crimes
Sex Offenses
Sexting (U.K.)

Author: Marshall, Kathleen

Title: Child Sexual Exploitation in Northern Ireland: Report of the Independent Inquiry

Summary: In September 2013, a Ministerial Summit was held on the theme of child sexual exploitation (CSE) in Northern Ireland. The Police Service of Northern Ireland (PSNI) referred to Operation Owl, an investigation of allegations of CSE in Northern Ireland, which had resulted in a number of adults being interviewed and some being arrested. Two weeks later, the then Minister for Health, Social Services and Public Safety, Edwin Poots, announced three actions to address this issue: an ongoing PSNI investigation focusing on 22 children and young people; a thematic review of these cases by the Safeguarding Board for Northern Ireland (SBNI); and an independent, expert-led inquiry into CSE in Northern Ireland, to be commissioned by the Minister for Health, Social Services and Public Safety and the Minister of Justice. The Minister for Education agreed that the Education and Training Inspectorate (ETI) would enjoin the Inquiry in relation to schools and the effectiveness of the statutory curriculum with respect to CSE. The Inquiry was to focus on both children and young people living at home in the community and those living in care. The Terms of Reference of the Inquiry were to: - Seek to establish the nature of child sexual exploitation (CSE) in Northern Ireland and a measure of the extent to which it occurs. - Examine the effectiveness of current cross sectoral child safeguarding and protection arrangements and measures to prevent and tackle CSE. - Make recommendations on the future actions required to prevent and tackle CSE and who should be responsible for these actions. - Report the findings of the Inquiry within one year of its commencement. In addition, the Inquiry should: - Consider specific safeguarding and protection issues for looked after children, taking into account the ongoing thematic review by the Safeguarding Board for Northern Ireland (SBNI). - Seek the views of children and young people in Northern Ireland and other key stakeholders. - Engage with parents to identify the issues they are facing and seek their views on what needs to be done to help them keep their children safe from the risk of CSE.

Details: Belfast: Criminal Justice Inspection Northern Ireland, 2014. 196p.

Source: Internet Resource: Accessed April 7, 2015 at: http://www.dhsspsni.gov.uk/csereport181114.pdf

Year: 2014

Country: United Kingdom

URL: http://www.dhsspsni.gov.uk/csereport181114.pdf

Shelf Number: 135170

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse (Northern Ireland)
Child Sexual Exploitation

Author: Walsh, Wendy A.

Title: Sexting: When are State Prosecutors Deciding to Prosecute? The Third National Juvenile Online Victimization Study

Summary: The majority of state prosecutors (62%) in the sample that had worked on technology facilitated crimes against children had handled a sexting case involving juveniles, and 36% of prosecutors in the sample reported that they had ever filed charges in these cases. When charges were filed, the majority charged child pornography production felonies and 16% of prosecutors had sexting cases that resulted in the defendant being sentenced to sex offender registration. Research needs to continue to help prosecutors develop tools and strategies to deal with these complex crimes.

Details: Durham, NH: Crime Against Children Research Center, 2013. 4p.

Source: Internet Resource: Accessed May 20, 2015 at: http://www.unh.edu/ccrc/pdf/CV294_Walsh_Sexting%20&%20prosecution_2-6-13.pdf

Year: 2013

Country: United States

URL: http://www.unh.edu/ccrc/pdf/CV294_Walsh_Sexting%20&%20prosecution_2-6-13.pdf

Shelf Number: 135733

Keywords:
Child Pornography
Child Sexual Abuse
Online Victimization
Prosecution
Sex Offenders
Sexting

Author: Walker, Kate

Title: Ending the Commercial Sexual Exploitation of Children: A call for multi-system collaboration in California

Summary: Within the United States, California has emerged as a magnet for commercial sexual exploitation ("CSE") of children ("CSEC"). The FBI has determined that three of the nation's thirteen High Intensity Child Prostitution areas are located in California: the San Francisco, Los Angeles, and San Diego metropolitan areas. Child sex trafficking, child pornography, and child sex tourism are all forms of CSEC. Frequently, victims are exploited through more than one form of abuse, and they cycle through the stages of exploitation many times before they are able to leave their exploitative relationships. To address this problem, California must develop a comprehensive and collaborative response to ensure CSE victims are identified and receive the services they need to overcome trauma and live healthy, productive lives. The children who fall prey to exploiters are frequently those with prior involvement with the child welfare system, such as through child abuse report investigations and placement in foster care. Other victims should have received Child Welfare services and protections but never gained access to the system, and are instead treated like criminals and funneled into the juvenile justice system.

Details: Sacramento: California Child Welfare Council, 2013. 100.

Source: Internet Resource: Accessed June 2, 2015 at: http://www.chhs.ca.gov/CWCDOC/Ending%20CSEC%20-%20A%20Call%20for%20Multi-System%20Collaboration%20in%20CA%20-%20February%202013.pdf

Year: 2013

Country: United States

URL: http://www.chhs.ca.gov/CWCDOC/Ending%20CSEC%20-%20A%20Call%20for%20Multi-System%20Collaboration%20in%20CA%20-%20February%202013.pdf

Shelf Number: 130001

Keywords:
Child Pornography
Child Prostitution
Child Sex Trafficking
Child Sexual Abuse
Child Sexual Exploitation
Child Welfare
Human Trafficking

Author: Great Britain. Her Majesty's Inspectorate of Constabulary

Title: Online and on the edge: Real risks in a virtual world. An inspection into how forces deal with the online sexual exploitation of children

Summary: Taking, possessing and distributing indecent images of children or grooming them online, can result in the commission of serious crimes against the most vulnerable. These crimes are not necessarily confined to the online world. There is a risk that perpetrators are also committing sexual offences against children in person or may do so in the future. This report sets out the findings from fieldwork in Devon and Cornwall, Kent, Lancashire, North Wales, Northumbria and Staffordshire where HMIC inspectors reviewed a total of 124 cases selected at random, and conducted interviews with police officers and staff. Although we did not inspect every force, we anticipate that our findings and recommendations will be relevant in whole, or in part, for all police forces throughout England and Wales. The first part of this report sets the scene, looking at the reasons and background to why children are sexually exploited online. The second part sets out our findings on the police service's efforts to tackle online child sexual exploitation. Although this report does not specifically focus on the police's use of technology when dealing with this type of offending, in our annual assessment of policing in England and Wales, published in November 2014, we stressed the need for the police service to refresh and improve its capabilities on a regular basis. The police will need to make a major leap forward in capability to keep pace with the crime threat, and this is particularly true of crimes against children facilitated by online activity. In 2012, HMIC carried out fieldwork as part of an inspection on how police forces performed in their work to prevent online child sexual exploitation - facilitated and enabled by the internet. This fieldwork identified opportunities to undertake coordinated law enforcement activity to apprehend offenders across England and Wales. As a result, operation Notarise was established as a large scale police operation between the National Crime Agency and the police service. So far 745 people have been arrested, 900 premises searched, and nearly 10,000 devices capable of storing indecent images of children have been seized. Over 500 children have been identified and safeguarded as a result of this activity. From time to time, in the course of our inspection work, we come across live police operations. We do not make public any material that might compromise current operations or pending criminal trials.

Details: London: HMIC, 2015. 78p.

Source: Internet Resource: Accessed August 3, 2015 at: http://www.justiceinspectorates.gov.uk/hmic/wp-content/uploads/online-and-on-the-edge.pdf

Year: 2015

Country: United Kingdom

URL: http://www.justiceinspectorates.gov.uk/hmic/wp-content/uploads/online-and-on-the-edge.pdf

Shelf Number: 136301

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Internet Crimes
Online Victimization

Author: Ohlsen, Sarah

Title: Commercial Sexual Exploitation of Children: A Status Report for our Jurisdiction

Summary: Multnomah County Sheriff's Office (MCSO) actively works to identify and maintain a list of individuals who are suspected of trafficking within our community. As of October 13, 2014, there have been 421 individuals identified. MCSO has continuously improved their efforts at identification. They also have developed strong partnerships with other law enforcement agencies, probation officers, and prosecutors, and that collaboration may lead to information that leads to better identification. Overall, an increase in identification may simply mean we know more of the trafficking population each year.

Details: Portland, OR: Multnomah County, 2015. 27p.

Source: Internet Resource: Accessed August 5, 2015 at: https://multco.us/file/38173/download

Year: 2015

Country: United States

URL: https://multco.us/file/38173/download

Shelf Number: 136312

Keywords:
Child Pornography
Child Prostitution
Child Sex Abuse
Child Sexual Exploitation
Child Trafficking

Author: Child Exploitation and Online Protection Center (U.K.)

Title: Threat Assessment of Child Sexual Exploitation and Abuse

Summary: 1. Last year the Child Exploitation and Online Protection (CEOP) Centre published its first annual Threat Assessment of Child Sexual Exploitation and Abuse (TACSEA), which examined current and emerging threats posed to children in the United Kingdom from sexual exploitation and sexual abuse. 2. The 2013 TACSEA builds on and updates last year's document and, in line with CEOP's founding ethos that every child matters...everywhere, also examines the threat to children abroad from UK nationals. The purpose of the assessment is to enable CEOP to set its strategic priorities for the year ahead by describing the nature and extent of the threat landscape and how we assess it will change during the year. This will ensure that in a time of austerity across the public sector, CEOP resources are deployed where the threat to children is the greatest. It also provides a picture for partners to consider in their strategies and resource deployment. 3. CEOP's mission, as set out in its three year strategy, is to work with others to protect children from sexual abuse and exploitation. It is recognised, however, that many other agencies in the UK have responsibility for tackling the spectrum of child sexual abuse particularly where it occurs in the home or within the family. Whilst acknowledging the wider context of child sexual exploitation and abuse this assessment focuses on those areas, both online and offline, where CEOP can add value and where no other agency has an appreciable footprint. 4. The TACSEA is an intelligence product, the purpose of which is to enhance understanding of a particular threat area. As an exception reporting tool it highlights only significant changes to that threat during the reporting period and it should therefore be read in conjunction with the 2012 TACSEA. The assessment sets out what is currently known about the threats to children and highlights those areas where understanding is less well developed. 5. This assessment signals the start of the second year of a three year strategy in which CEOP undertakes to assess where and how children are most at risk from sexual exploitation and abuse, to communicate this widely and to develop programmes to mitigate threats. It is likely that CEOP will conduct an additional threat assessment in the autumn of 2013 to inform the setting of national priorities. 6. In October 2013, CEOP will become a command of the National Crime Agency (NCA). The NCA will be the centrepiece of the reformed policing landscape and will spearhead the national crime fighting response to serious, organised and complex crime. Within the NCA, CEOP will further develop its strategic approach to prevent child sexual exploitation and abuse, to protect children and young people who are at risk of victimisation and to pursue offenders who target children in the UK or overseas.

Details: London: CEOP, 2013. 24p.

Source: Internet Resource: Accessed August 6, 2015 at: http://ceop.police.uk/Documents/ceopdocs/CEOP_TACSEA2013_240613%20FINAL.pdf

Year: 2013

Country: United Kingdom

URL: http://ceop.police.uk/Documents/ceopdocs/CEOP_TACSEA2013_240613%20FINAL.pdf

Shelf Number: 131373

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Online Victimization

Author: ECPAT International

Title: The Commercial Sexual Exploitation of Children in the Commonwealth of Independent States: Developments, progress, challenges and recommended strategies for civil society

Summary: The Commonwealth of Independent States (CIS) is a loose association of nine states formed after the break-up of the Soviet Union in 1991. The resulting political, economic and social upheaval led to progress in some areas, such as poverty reduction. But not all children benefit equally: rural-urban disparities have resulted in the marginalisation of - and often discrimination against - some groups of children, such as Roma and other ethnic minorities, left-behind children of migrant workers and the internally displaced. Combined with consumerism, the rapid expansion of cyber-technology, increased tourism and migration and persistent gender discrimination, these inequalities create a favourable environment for Commercial Sexual Exploitation of Children (CSEC) in the region. Throughout the region poverty leads parents to push their children to earn money; criminals take advantage by recruiting and exploiting children in the sex trade. Offenders run minimal risk of punishment due to widespread lack of awareness of CSEC and easily corrupted officials. Other push factors for CSEC include sexualisation of children in the media, pervasive child abuse in homes and low levels of education. HIV infection rates are rising rapidly in the CIS, especially among young people. Despite increasing concern over CSEC, governments in CIS countries have generally made only limited efforts to address this serious violation of children's rights. Civil society groups such as ECPAT often fill the void, taking responsibility for prevention and protection efforts. In this context, a "Regional Consultation on Action to Stop the Commercial Sexual Exploitation of Children in CIS & Eastern Europe" was held in Sofia, Bulgaria on 25-27 May, 2014, bringing together child rights experts, representatives of regional organisations, young people and leaders of ECPAT member organisations. Participants formulated and agreed upon the list of priority actions to advance child protection from sexual exploitation in Eastern Europe and CIS countries elaborated in this Overview.

Details: Bangkok, Thailand: ECPAT International, 2014. 76p.

Source: Internet Resource: Accessed November 24, 2015 at: http://www.ecpat.net/sites/default/files/Regional%20CSEC%20Overview_CIS%20(English).pdf

Year: 2014

Country: International

URL: http://www.ecpat.net/sites/default/files/Regional%20CSEC%20Overview_CIS%20(English).pdf

Shelf Number: 137323

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sex Trafficking
Child Sexual Exploitation

Author: Research in Practice

Title: Working Effectively to Address Child Sexual Exploitation: An evidence scope

Summary: This evidence scope draws on knowledge from research, practitioner expertise and young people's experience to identify the barriers to dealing with CSE, and the approaches and interventions that can make a difference to young people. The scope, accompanied by an executive summary, examines different models of CSE, how risks and needs are identified and assessed, and what interventions appear to be most promising. It offers six key principles for service design and practice development, highlighting the importance of young-person-centred practice and participatory approaches, considering what might be most effective in terms of early help and education, as well as focusing on the critical issue of how to ensure multi-agency working, and what support the workforce needs.

Details: Dartington Hall, Totnes, UK: Research in Practice, 2015. 107p., app.

Source: Internet Resource: Accessed February 17, 2016 at: https://www.rip.org.uk/resources/publications/evidence-scopes/working-effectively-to-address-child-sexual-exploitation-evidence-scope-2015/

Year: 2015

Country: United Kingdom

URL: https://www.rip.org.uk/resources/publications/evidence-scopes/working-effectively-to-address-child-sexual-exploitation-evidence-scope-2015/

Shelf Number: 137873

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Sex Offenders

Author: Greater London Authority

Title: Confronting Child Sexual Exploitation in London

Summary: Child sexual exploitation (CSE) is not new, but recent high profile investigations and criminal trials have raised awareness of the possible widespread nature of these offences and the gravity of their impact. Professor Alexis Jay's report, the Independent Inquiry into child sexual exploitation in Rotherham (the Jay Report), and cases such as those in Rochdale, Oxford and Derby, have uncovered the previously hidden scale and organised nature of much CSE. Our investigation examines London's approach to safeguarding children in the light of the lessons that can be learned from tackling CSE in Rotherham. There is an expectation that the local response to CSE is led by Local Safeguarding Children Boards (LSCBs). LSCBs have a statutory duty to bring agencies together to safeguard and promote the welfare of children. They have a range of functions and play a key role in developing local safeguarding children policy and procedures and scrutinising local arrangements - including CSE. The multi-agency London Safeguarding Children Board provides strategic advice and support to London's 32 LSCBs. Its membership is made up of representatives from London boroughs, police, health, probation and independent, voluntary and community agencies in London. We would welcome assurance from London's Directors of Children's Services, the lead professionals responsible for the provision of children's services in London, the London Safeguarding Children Board and LSCBs that all London boroughs have robust mechanisms in place to protect London's children and young people from CSE. No one knows the true scale of CSE. The Jay Report made a conservative estimate that approximately 1,400 children were sexually exploited in Rotherham over the 16 year inquiry period. The Met anticipates it will receive between 1,800 and 2,000 referrals a year. From January 2014 to October 2014, the Met reported 1,612 referrals of CSE, including 265 positive interventions and 55 detections. High profile cases of CSE have raised concerns about how the police and other services work together to respond to CSE. The Jay Report documented a number of ways the police and partner agencies failed to prevent abuse or prioritise dealing with CSE in Rotherham and the Serious Case Review into CSE in Oxfordshire reported multiple missed opportunities by agencies to act rigorously. Rotherham had many policies and plans to tackle CSE. However, inspection reports describe how children's social care was typically understaffed, overstretched and struggling to cope with demand. Thresholds for action were identified as very high and there were significant weaknesses in scrutiny and challenge within Rotherham's governance system. Professionals ignored warnings about the scale of CSE and failed to recognise and believe victims and young people at risk of CSE. Similarly, the Serious Case Review in Oxfordshire found that it took agencies too long to recognise CSE, used language that blamed the victims, and a lack of understanding led to insufficient inquiry. Many London boroughs have made significant developments in their response to CSE over the past few years. Policies and procedures have been developed, multi-agency groups have been established, and investment in training increased. The Met has shown positive progress in developing its approach to CSE. In February 2014, the Met launched The London Child Sexual Exploitation Protocol. The protocol sets out the procedures for the Met and partner agencies for safeguarding and protecting children from sexual exploitation. Our report, Keeping London's children safe welcomed the protocol and recommended the Met should review the evidence and impact of the CSE Protocol on reporting and identifying CSE in London, and the level of resource dedicated to tackling CSE. The Met told us it has scheduled a review of the Pan-London CSE Protocol to start in January 2015 and will also publish a good practice guide. CSE is not a MOPAC 7 priority.6 We were told that as borough police are not measured on CSE it becomes less of a "priority" in some areas. This is a concern. MOPAC is establishing a performance monitoring framework for crimes that fall out of the MOPAC - However, while the Met has made progress in recording CSE data, MOPAC is yet to establish its performance monitoring framework. MOPAC must set out a clear performance monitoring framework for holding the Met to account on its safeguarding children duties, including CSE, as a matter of urgency. National guidance requires local areas to have appropriate policies and procedures in place to tackle CSE. We found that CSE is a strategic priority for London boroughs and the challenge is to ensure boroughs work together to deliver a system that can effectively implement strategies, plans and protocols to tackle CSE and safeguard children across the whole of London. Strategies, policies and procedures need to be robustly monitored and regularly reviewed to ensure effectiveness. While Rotherham had good inter-agency CSE policies and procedures, members of the Safeguarding Board rarely checked whether they were being implemented or effective. Strong leadership and full commitment from partner agencies is essential. We ask that LSCBs have robust governance mechanisms in place to ensure effective monitoring, oversight and regular review of the local response to CSE. This should include well-defined links with other safeguarding children strategies and robust reporting structures between the LSCB and the Community Safety Partnership and Children's Board. Agencies must work together to tackle CSE. While we are encouraged by local arrangements and the progress made by the police, local authorities and other partners that have come together to tackle CSE, partnership working is one area where further work is required.

Details: London: Greater London Authority, 2015. 37p.

Source: Internet Resource: Accessed February 18, 2016 at: https://www.london.gov.uk/sites/default/files/gla_migrate_files_destination/Confronting%20CSE%20in%20London%20-%20final.pdf

Year: 2015

Country: United Kingdom

URL: https://www.london.gov.uk/sites/default/files/gla_migrate_files_destination/Confronting%20CSE%20in%20London%20-%20final.pdf

Shelf Number: 137878

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Child Welfare
Interagency Cooperation

Author: Lee, Murray

Title: Sexting among young people: Perceptions and practices

Summary: The rapid development and adoption of online digital technologies has had a profound effect on the way young people conduct their social relationships. The emergence of sexting, or the distribution of sexually explicit photos and videos, has gained widespread attention and raised moral concerns. However, there remains little policy-relevant research on the prevalence of sexting and its impact on young people. This study provides a valuable contribution to the evidence base. In a survey of over 2,000 respondents, almost half reported having sent a sexual picture or video of themselves to another party, while two-thirds had received a sexual image. Sexting was prevalent among all age groups, with 13 to 15 year olds particularly likely to receive sexual images. Sexting was prominent among homosexual and bisexual respondents. Most sexting occurred between partners in committed relationships. The study found very little evidence of peer pressure or coercion to engage in sexting. Rather, young people reported engaging in the practice as a consensual and enjoyable part of their intimate relationships. The paper considers the implications of this for legal and policy responses to sexting.

Details: Canberra: Australian Institute of Criminology, 2015. 9p.

Source: Internet Resource: Trends & issues in crime and criminal justice no. 508: Accessed March 2, 2016 at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi508.pdf

Year: 2015

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi508.pdf

Shelf Number: 138009

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual exploitation
Online Communications
Sexting
Social Media

Author: Mitchell, Kimberly J.

Title: Youth Involvement in Sexting: Findings from the Youth Internet Safety Studies

Summary: Several concerns have fueled the considerable attention to the problem of "youth sexting" among the media, parents, professionals, educators and law enforcement. (Sexting generally refers to sending sexual images and sometimes sexual texts via cell phone and other electronic devices.) One is that youth may be creating illegal child pornography, exposing them to possibly serious legal sanctions. Another is that youth may be jeopardizing futures by putting compromising, ineradicable images online that could be available to potential employers, academic institutions and family members. These concerns have been abetted by frequently cited statistics about the supposed widespread teen involvement in sexting. The most common reference has been to a National Campaign to Prevent Teen and Unplanned Pregnancy study showing that 20% of teens had sent or posted nude or semi-nude pictures of themselves. However, this research as well as other often cited studies have flaws that compromise their findings. For example, the National Campaign study, used an Internet panel rather than a true population sample and included 18 and 19 year olds, and not just minors. Moreover, none of these studies has made distinctions that allow a careful assessment of the problem from a policy perspective. Studies have asked respondents about "nude or semi-nude", "nearly nude" or "sexually suggestive" images that might, in fact, be no more revealing than what someone might see at a beach. In some studies, sexting was defined to include text messages that could contain no images. And many studies did not distinguish between taking and sending an image of oneself as opposed to receiving or disseminating an image of another youth. For policy purposes, it is important to look at whether images are created or simply received and whether images might qualify as child pornography, but such information is not currently available.

Details: Durham, NH: University of New Hampshire, Crimes Against Children Research Center, 2014. 8p.

Source: Internet Resource: Accessed March 12, 2016 at: http://www.unh.edu/ccrc/pdf/Sexting%204%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Year: 2014

Country: United States

URL: http://www.unh.edu/ccrc/pdf/Sexting%204%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Shelf Number: 138184

Keywords:
Child Pornography
Internet Communications
Internet Safety
Sexting
Social Networks

Author: Mitchell, Kimberly J.

Title: Trends in Unwanted Sexual Solicitations: Findings from the Youth Internet Safety Studies

Summary: There has been considerable and growing concern voiced by schools, parents and the public about what youth experience while using the Internet and other electronic technologies. The last decade saw significant and rapid changes in youth online activity: Internet use has now expanded to encompass almost all youth. Moreover, the nature of youth Internet use changed during this time with an increase in the use of cell‐ and smart‐phones, and the migration of adolescent social activity to social networking sites. However, this rapid expansion in technology use has occurred during a period of time in which child victimization has declined significantly. In 1999 and 2000, the first Youth Internet Safety Survey (YISS‐1) was conducted to address concerns about adults using the Internet to sexually solicit youth, young people encountering sexual material online and youth being threatened and harassed through the Internet. While YISS‐1 found that many youth who used the Internet encountered such episodes, most of these incidents were relatively mild and not very disturbing to youth. However, some were serious and distressing. We conducted the second Youth Internet Safety Survey (YISS‐2) in 2005 to reassess the extent to which young Internet users were encountering problems five years later, gauge whether the incidence and characteristics of these episodes had changed, explore new areas of interest, review emerging technologies, ascertain the effect those technologies have on the issue, and assess threats to youth. Compared to YISS‐1, the results of YISS‐2 showed that a smaller proportion of youth had received unwanted online sexual solicitations and a smaller proportion had interacted online with strangers. However, larger proportions of youth reported being exposed to pornography they did not want to see and were being harassed online. In 2010, the third Youth Internet Safety Survey (YISS‐3) was conducted to continue to track existing trends in the number and types of threats youth encounter using technology; assess risks of new behaviors and activities, including youth creating and distributing explicit images of themselves and/or peers; assess benefits and utilization of safety programs and technologies; and identify activities and behaviors most closely associated with risk. This document reviews key findings from YISS‐3.

Details: Durham, NH: University of New Hampshire, Crimes Against Children Research Center, 2014. 10p.

Source: Internet Resource: Accessed March 12, 2016 at: http://www.unh.edu/ccrc/pdf/Sexual%20Solicitation%201%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Year: 2014

Country: United States

URL: http://www.unh.edu/ccrc/pdf/Sexual%20Solicitation%201%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Shelf Number: 138185

Keywords:
Child Pornography
Child Sexual Exploitation
Internet Communications
Internet Safety
Online Communications
Sexting
Social Media
Social Networks

Author: Atella, Julie

Title: Safe Harbor: First Year Evaluation Report

Summary: In 2013, the state of Minnesota made the largest state investment in the provision of services for sexually exploited youth nationwide, funding a portion of the No Wrong Door framework. The MDH uses the following working definition of Minor Commercial Sexual Exploitation (MCSE) to inform its work in this area: MCSE occurs when someone under the age of 18 engages in commercial sexual activity. A commercial sexual activity occurs when anything of value or a promise of anything of value (e.g., money, drugs, food, shelter, rent, or higher status in a gang or group) is given to a person by any means in exchange for any type of sexual activity. A third party may or may not be involved. The No Wrong Door model also outlined eight values and philosophies that should inform its implementation: - Since commercial sexually exploited children and youth may not self-identify, it is essential that those who come into contact with children and youth be trained to identify sexual exploitation and know where to refer for services. - Youth who are commercial sexually exploited are victims of a crime. - Victims should not feel afraid, trapped, or isolated. - Services must be trauma-informed and responsive to individual needs (gender-responsive, culturally competent, age-appropriate, and supportive for gay, lesbian, bisexual, transgender, and questioning youth). - Services must be available across the state. - Youth have a right to privacy and self-determination. - Services must be based in positive youth development. - Sexual exploitation can be prevented. The No Wrong Door framework itself was based on the following assumptions, which are meant to guide the framework's implementation. First, whenever possible, existing programs should be used to provide services to victims and service providers must be fully funded to work with victims (including homeless, domestic violence, and sexual assault service providers). Second, when possible, peer and survivor frameworks and supports should be made available to sexually exploited youth. Third, services should be multidisciplinary and coordinated, including law enforcement and service providers working together to identify and serve victims and prosecute traffickers and purchasers. Fourth, holding commercial sexually exploited youth victims in detention is undesirable and should only be accessed for safety purposes if all other safety measures have failed. Lastly, providers working with victims must be screened for criminal offenses to help ensure youth are safe and must have proper experience and training to effectively establish healthy, positive relationships with youth.

Details: St. Paul, MN: Wilder Research, 2015. 46p.

Source: Internet Resource: Accessed March 22, 2016 at: https://www.wilder.org/Wilder-Research/Publications/Studies/Safe%20Harbor/Safe%20Harbor%20First%20Year%20Evaluation%202015.pdf

Year: 2015

Country: United States

URL: https://www.wilder.org/Wilder-Research/Publications/Studies/Safe%20Harbor/Safe%20Harbor%20First%20Year%20Evaluation%202015.pdf

Shelf Number: 138382

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation
Victim Services

Author: Boxall, Hayley

Title: Brief review of contemporary sexual offence and child sexual abuse legislation in Australia: 2015 update

Summary: In 2013, the Australian Institute of Criminology (AIC) was contracted by the Royal Commission into Institutional Responses to Child Sexual Abuse (the Commission) to undertake a review of sexual offence legislation in Australia, particularly as it related to children. This review (Boxall, 2014) contained detailed information about all legislation that had been enacted as at 31 December 2013. Since the initial report was published, a number of states and territories have revised or updated legislation pertaining to sexual offences in Australia. Therefore, in October 2015, the Commission contracted the AIC to update the previous review to encompass all legislation enacted as at 31 December 2015. Any legislative changes made after this date are not included in this review. Key changes that have occurred since 31 December 2013 include; Victoria: changes have been made to the definition of sexual penetration (Crimes Act 1958); inclusion of additional offences including 'failure by a person in authority to protect child from sexual offence' and 'failure to disclose sexual offence committed against child under the age of 16 years' (Crimes Act 1958); New South Wales: Crimes Act 1900 was amended to increase the penalty for 'sexual intercourse - child under 10' from 25 years to life imprisonment; and Australian Capital Territory: Crimes Act 1900 was amended to change the terminology from 'child pornography' to 'child exploitation material' This report provides a brief overview of the offences that an individual who sexually abuses a child in an institutional setting may be charged with at the end of 2015. Information provided for each of the identified offences includes: the location of the offence in the respective state or territory's legislation; the age of the victim (where relevant); aggravating factors - for the purpose of this review, restricted to factors relating to: the age of the child; the relationship between the offender and victim; whether the victim has an intellectual impairment, physical disability or mental illness; and the maximum penalty. The offences included in this review have been divided into a six sections: contact sexual offences where the child is below the legal age of consent (16, 17 or 18 years old depending on the jurisdiction and nature of the sexual act); contact sexual offences where the child is above the legal age of consent; contact sexual offences where the age of the victim is not specified; non-contact sexual offences; child pornography offences (production); and offences for which institutions and/or their representatives that were aware of child sexual abuse may be charged. Consistent with the previous report, only offences related to individuals located within Australia are included in this review.

Details: Sydney: Australian Institute of Criminology, 2016. 72p.

Source: Internet Resource: AIC Special Report: Accessed March 30, 2016 at: http://aic.gov.au/media_library/publications/special/010/Brief-review-sex-abuse-legislation-2015.pdf

Year: 2016

Country: Australia

URL: http://aic.gov.au/media_library/publications/special/010/Brief-review-sex-abuse-legislation-2015.pdf

Shelf Number: 138474

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation

Author: Drew, John

Title: An Independent Review of South Yorkshire Police's Handling of Child Sexual Exploitation 1997-2016

Summary: The review was announced in March 2015 by the South Yorkshire Police and Crime Commissioner, Dr Alan Billings, following the publication of reports by Professor Alexis Jay and Louise Casey that highlighted the scale of child sexual exploitation in Rotherham, and a BBC report that alleged child sexual exploitation in Sheffield had been ignored by South Yorkshire Police. All this severely damaged public confidence in the Force. The review has been commissioned to look at how the Force has handled reports of child sexual exploitation across the whole of South Yorkshire to ensure that everything that can be reasonably known about the past is known and that matters are now being dealt with in a very different manner. Led by Professor Drew, the report will establish whether South Yorkshire Police has understood and acted upon the findings of reports and inspections into matters of child sexual exploitation. It will also look at whether the Force's response to safeguarding children and young people has been adequate across all districts - Barnsley, Doncaster, Rotherham and Sheffield. In setting out the Terms of Reference, Dr Billings has considered the scope of other ongoing investigations and inspections by the National Crime Agency (NCA), the Independent Police Complaints Commission (IPCC) and Her Majesty's Inspectorate of Constabulary (HMIC) to avoid unnecessary duplication as well as the ongoing criminal investigations by South Yorkshire Police and pending prosecutions the Crown Prosecution Service. The review launched on 30 September, following a period of scoping, and will last for 3 months. A report will be presented to the South Yorkshire Police and Crime Commissioner and will be made public early in 2016.

Details: The Author: 2016. 107p.

Source: Internet Resource: Accessed April 1, 2016 at: http://www.drewreview.uk/wp-content/uploads/2016/03/SYP030-Final-report.pdf

Year: 2016

Country: United Kingdom

URL: http://www.drewreview.uk/wp-content/uploads/2016/03/SYP030-Final-report.pdf

Shelf Number: 138523

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Police Effectiveness
Police Performance

Author: Casey, Louise

Title: Report of Inspection of Rotherham Metropolitan Borough Council

Summary: Rotherham Metropolitan Borough Council is not fit for purpose. It is failing in its legal obligation to secure continuous improvement in the way in which it exercises its functions. In particular, it is failing in its duties to protect vulnerable children and young people from harm. This inspection revealed past and present failures to accept, understand and combat the issue of Child Sexual Exploitation (CSE), resulting in a lack of support for victims and insufficient action against known perpetrators. The Council's culture is unhealthy: bullying, sexism, suppression and misplaced 'political correctness' have cemented its failures. The Council is currently incapable of tackling its weaknesses, without a sustained intervention. On 26th August 2014 Professor Alexis Jay published an Independent Inquiry into Child Sexual Exploitation in Rotherham. The report, commissioned by RMBC as a review of its own practices, concluded that over 1400 children had been sexually exploited in Rotherham between 1997 and 2013. The vast majority of the perpetrators were said to be 'Asian' men. In response, on 10th September 2014, the Secretary of State for Communities and Local Government appointed Louise Casey CB to carry out an inspection of Rotherham Metropolitan Borough Council (RMBC) under section 10 of the Local Government Act 1999. The inspection would assess the Council's compliance with the requirements of Part 1 of that Act, considering leadership and governance, scrutiny, services for children and young people, taxi and private hire licensing, and whether the council 'overs up' nformation. The inspection team reviewed approximately 7000 documents, looked in detail at case files and met with over 200 people, including current and former staff, council Members, partners, victims and parents. Our investigations revealed: - a council in denial about serious and on-going safeguarding failures - an archaic culture of sexism, bullying and discomfort around race - failure to address past weaknesses, in particular in Children's Social Care - weak and ineffective arrangements for taxi licensing which leave the public at risk - ineffective leadership and management, including political leadership - no shared vision, a partial management team and ineffective liaisons with partners The Council does not use inspection to learn and improve. Members are overly-reliant on officers and do not challenge tenaciously enough to ensure improvements. Meeting and action plans are numerous but unproductive, with a tendency towards inertia. Some Members have not set and modelled the high standards expected of those in public life. Historic concerns around conduct have not been effectively tackled. RMBC has a culture of suppressing bad news and ignoring difficult issues. This culture is deep-rooted; RMBC goes to some length to cover up information and to silence whistle-blowers. RMBC needs a fresh start.

Details: London: Department for Communities and Local Government, 2015. 157p.

Source: Internet Resource: Accessed April 1, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/401119/46966_Rotherham_Report_PRINT.pdf

Year: 2015

Country: United Kingdom

URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/401119/46966_Rotherham_Report_PRINT.pdf

Shelf Number: 138525

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation

Author: Pradhan, Uma

Title: Preparatory study for situational analysis of commercial sexual exploitation of children in Nepal : a preliminary report, January 2015

Summary: This report documents the key findings of the 'Preparatory Study for Situational Analysis of Commercial Sexual Exploitation of Children in Nepal'. This study aims to provide a preliminary insight on the current situation of CSEC in Nepal so as to provide the basis for the national-level research on 'Situational Analysis of Commercial Sexual Exploitation of Children in Nepal'. The study was conducted from November 2013 to February 2014. This report is organized into nine chapters. Chapter one sets the context for the current research. It presents the prevalence and policy context of CSEC in Nepal. In Chapter two, report highlights some of the conceptual issues around Commercial Sexual Exploitation of Children (CSEC). Chapter three and four discusses the methodology for the research and various challenges during the research process. Chapter five traces the journey of children to CSEC. In Chapter six, the report discusses 10 different manifestations of research. Chapter seven attempts to trace linkages between various manifestations of CSEC. In Chapter eight, the report presents the main themes emerging from the research. The final chapter lists some of the main stakeholders for action against CSEC in Nepal.

Details: Kathmandu : CWIN : ECPAT Luxembourg, [2015]. 95p.

Source: Internet Resource: Accessed April 12, 2016 at: http://ecpat.lu/sites/default/files/resources/Nepal_Preparatory_Study_CSEC.pdf

Year: 2014

Country: Nepal

URL: http://ecpat.lu/sites/default/files/resources/Nepal_Preparatory_Study_CSEC.pdf

Shelf Number: 138641

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation

Author: Astinova, Mihaela

Title: The Crime of Child Pornography: European Legislative and Police Cooperation Initiatives

Summary: Records of cases describing illegal contact with children have not been discovered and criticized just recently. Such cases have existed before. The process of development of child pornography has been traced back to 1960's when the crime started to be produced mainly in magazines and films. In 1970's child pornography was acknowledged as an unimaginable threat to children and was criminalized in some countries like England. Nowadays it is obvious that the illegal practices from the past have been developed and continued by transferring the old images along with the new ones to a digital bearer, uploaded and sent from one computer to another, from one country to another via the internet.2 Broadly, the crime of child pornography can be described as any records of sexual activity with children. Those can be photographs, video, written materials or sound files. However, sometimes photographs can be taken independently, and sometimes they can be extracted from video clips or movies. Notwithstanding, the graphic content of the pictures not always shows explicit sexual conduct with children and the collectors may avoid prosecution and conviction. This is dictated by the severity of the content and is further elaborated in the first chapter of the thesis. However, it is clear that production, possession of child pornography and its dissemination for commercial purposes all constitute child abuse and exploitation. In my opinion, however, criminalizing child pornography materials has a preventive function as well in case access to such materials provokes further child abuse and exploitation. It cannot be argued that child pornography has been considered a tremendous problem which nowadays is getting more and more difficult to track. Computers, internet, emails, external storage devices have facilitated the pornography makers to grow in number and hide effectively from the law enforcement agencies. Technology advancement and the proliferation of private computers have made it easy for the offenders to do criminal activities and still hide in the dark.3 Children need access to all new technologies by which to develop their abilities and knowledge. But taking into account the presence of innovative methods for exposure of personal information and data makes them open to injure and difficult to protect from being involved in an irreversible situation such as to become victims of child pornography. The purpose of the thesis is to give an answer to the central research question which is "in what ways do the new European legislation and international police cooperation help combat the proliferation, production and possession of child pornography". All the information and findings in this thesis are based on desk research, aiming to give answers to the following sub-questions in order to understand in detail the central research question: a) What is the current International and European legislation on child pornography? b) What new initiatives does the European Union take in order to facilitate the minimization of the crime and to support the legislative measures? c) What law enforcement mechanisms does the European Law Enforcement agency (Europol) has at its disposal in accordance to this particular crime? d) What operations against child pornography have been conducted? e) What is the outcome of the operations? f) What are the most common obstacles for the teams during joint operations against child pornography offenders and how were they handled?

Details: Tilburg, NETH: Tilburg University, 2013. 58p.

Source: Internet Resource: Thesis: Accessed April 25, 2016 at: http://arno.uvt.nl/show.cgi?fid=133077

Year: 2013

Country: Europe

URL: http://arno.uvt.nl/show.cgi?fid=133077

Shelf Number: 138805

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation

Author: Canada. Public Safety Canada

Title: 2013-2014 Evaluation of the National Strategy for the Protection of Children from Sexual Exploitation on the Internet

Summary: The National Strategy for the Protection of Children from Sexual Exploitation on the Internet (the National Strategy) is a horizontal initiative providing a comprehensive, coordinated approach to enhancing the protection of children on the Internet and pursuing those who use technology to prey on them. The evaluation covered the activities delivered under the National Strategy by Public Safety Canada, including: the Canadian Centre for Child Protection as a funding recipient for the management of the national tipline Cybertip.ca, the Royal Canadian Mounted Police (through NCECC-National Child Exploitation Coordination Centre, a national division of the Canadian Police Centre for Missing and Exploited Children/Behavioural Sciences Branch) and the Department of Justice. The evaluation included the Contribution Program to Combat Child Sexual Exploitation and Human Trafficking and its administration by Public Safety Canada. The scope of the evaluation covered the time period over the past five years (July 2008 to December 2013). There is a continued need to address the sexual exploitation of children on the Internet. Evidence shows increasing trends in the number of reported offences, the availability of material and the severity of these criminal acts. The increasing use of the Internet, mobile technologies and social media have facilitated the sexual exploitation of children. Concerns about child pornography have extended to the availability of material on peer-to-peer networks, the "dark Web" and through encrypted technologies. The problem extends well beyond Canada's borders. Law enforcement faces increasing challenges posed by transnational child sex offenders in addition to online child sexual exploitation offences in general. These types of international investigations are appropriately characterized as increasingly complex. The National Strategy remains relevant to ensure national collaboration and a consistent national approach, as well as cooperation with the international community. The evaluation points to a continued need for improved data collection, increased research efforts and enhanced information exchange at the national level in order to better understand the underpinnings and contributing factors surrounding online child sexual exploitation. There may be a need to revisit the current mandate as a number of areas of concern are expanding (e.g. transnational child sex offenders, self-peer exploitation or "sexting", cyberbullying, sextortion, sexualized child modelling) that were not originally envisioned by the National Strategy. Increased public reporting continues to put resourcing pressures on the law enforcement community. There is also evidence to indicate that there is still a need to increase knowledge and awareness about Internet child sexual exploitation and that the issue needs to be addressed through a multi-faceted approach (e.g. socially through education and prevention, and complemented by law enforcement efforts). The National Strategy aligns with federal priorities and the departmental mandates of the federal Strategy partners. The safety and security of children is central to the federal strategic priorities as reflected in numerous legislative initiatives, ministerial press releases, official documents and initiatives, and is consistent with the federal commitment made most recently in the 2013 Speech from the Throne. The National Strategy aligns with federal legislative roles and responsibilities of Strategy partners and the broad role of the federal government in the safety and security of Canadians. Investigations cross jurisdictions and require the collaboration and coordination of many stakeholders nationally and internationally. There is an opportunity for PS to provide greater leadership at the national level in areas of cooperation and in facilitating data collection, research and information sharing. The National Strategy also supports international commitments aimed at combating child sexual exploitation on the Internet. Evidence suggests that initiatives by other jurisdictions or non-profit organizations tend to complement the National Strategy. However, there may be opportunities for greater synergy and collaboration, especially between the federal government and provinces and territories in order to ensure that federal investments are targeted to areas of greatest need. In support of this, Strategy partners continue to develop partnerships with provinces, non-governmental organizations and private industry as well as participate in the Federal/Provincial/Territorial committees. From an enforcement perspective, the Strategy helps avoid duplication by providing a centralized coordinated approach and central point of contact for investigations that cross multiple jurisdictions nationally and internationally. Without a centralized coordinated approach, it was suggested that the system in Canada would be disparate. Despite the different organizations involved at various levels, efforts aimed at coordinating investigations internationally are seen as complementary rather than duplicative.

Details: Ottawa: Public Safety Canada, 2015. 67p.

Source: Internet Resource: 2015-05-27: Accessed July 25, 2016 at: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/vltn-prtctn-chldrn-2013-14/vltn-prtctn-chldrn-2013-14-eng.pdf

Year: 2015

Country: Canada

URL: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/vltn-prtctn-chldrn-2013-14/vltn-prtctn-chldrn-2013-14-eng.pdf

Shelf Number: 139843

Keywords:
Child Pornography
Child Protection
Child Sexual Exploitation
Internet Crimes
Online Victimization
Sexting

Author: Cameron, Genevieve

Title: Child Sexual Exploitation: A study of international comparisons

Summary: The issue of Child Sexual Exploitation (CSE) has been the focus of intense discussion, debate and intervention in the UK in recent years. At a summit in March 2015, the Prime Minister described CSE as a 'national threat', and announced that child sexual abuse will be given the same priority by the police as serious and organised crime. A number of high profile cases of CSE have all received national attention, with a series of inquiries, reports and research into what went wrong in local and national systems, how the abuse could have been prevented, and how victims could be better supported in future. This report presents a rapid desk review of international comparisons of CSE, aiming to explore: How is Child Sexual Exploitation defined in selected countries? To what extent is there consistency in the response of public agencies around the world? What can the UK learn from experience elsewhere?

Details: Nottingham, UK: Virtual Staff College, 2015.

Source: Internet Resource: Accessed August 6, 2016 at: http://www.virtualstaffcollege.co.uk/wp-content/uploads/CSE_main_final_publish_1.0.pdf

Year: 2015

Country: International

URL: http://www.virtualstaffcollege.co.uk/wp-content/uploads/CSE_main_final_publish_1.0.pdf

Shelf Number: 140024

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation

Author: Wittes, Benjamin

Title: Sextortion: Cybersecurity, teenagers, and remote sexual assault

Summary: This paper represents an effort to our knowledge the first to study in depth and across jurisdictions the problems of sextortion. In it, we look at the methods used by perpetrators and the prosecutorial tools authorities have used to bring offenders to justice. We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted. Our key findings include: - Sextortion is dramatically understudied. While it's an acknowledged problem both within law enforcement and among private advocates, no government agency publishes data on its prevalence; no private advocacy group does either. The subject lacks an academic literature. Aside from a few prosecutors and investigators who have devoted significant energy to the problem over time, and a few journalists who have written-often excellently- about individual cases, the problem has been largely ignored. - Yet sextortion is surprisingly common. We identified 78 cases that met our definition of the crime-and a larger number that contained significant elements of the crime but that, for one reason or another, did not fully satisfy our criteria. These cases were prosecuted in 29 states and territories of the United States and three foreign jurisdictions. - Sextortionists, like other perpetrators of sex crimes, tend to be prolific repeat players. Among the cases we studied, authorities identified at least 10 victims in 25 cases. In 13 cases, moreover, there were at least 20 identified victims. And in four cases, investigators identified more than 100 victims. The numbers get far worse if you consider prosecutorial estimates of the number of additional victims in each case, rather than the number of specifically identified victims. In 13 cases, prosecutors estimated that there were more than 100 victims; in two, prosecutors estimated that there had been "hundreds, if not thousands" of victims. - Sextortion perpetrators are, in the cases we have seen, uniformly male. Victims, by contrast, vary. Virtually all of the adult victims in these cases are female, and adult sextortion therefore appears to be a species of violence against women. On the other hand, most sextortion victims in this sample are children, and a sizable percentage of the child victims turn out to be boys. - There is no consistency in the prosecution of sextortion cases. Because no crime of sextortion exists, the cases proceed under a hodgepodge of state and federal laws. Some are prosecuted as child pornography cases. Some are prosecuted as hacking cases. Some are prosecuted as extortions. Some are prosecuted as stalkings. Conduct that seems remarkably similar to an outside observer produces actions under the most dimly-related of statutes. - These cases thus also produce wild, and in in our judgment indefensible, disparities in sentencing. Many sextortionists, particularly those who prey on minors, receive lengthy sen - tences under child pornography laws. On the other hand, others-like Mijangos-receive sentences dramatically lighter than they would get for multiple physical attacks on even a fraction of the number of people they are accused of victimizing. In our sample, one perpetrator received only three years in prison for victimizing up to 22 young boys. 36 Another received only 30 months for a case in which federal prosecutors identified 15 separate victims. 37 - Sentencing is particularly light in one of two key circumstances: (1) when all victims are adults and federal pros - ecutors thus do not have recourse to the child pornography statutes, or (2) in cases prosecuted at the state level. - Sextortion is brutal. This is not a matter of playful consensual sexting-a subject that has received ample attention from a shocked press. Sextortion, rather, is a form of sexual exploitation, coercion, and violence, often but not always of children. In many cases, the perpetrators seem to take pleasure in their victims' pleading and protes - tations that they are scared and underage. In multiple cases we have reviewed, victims contemplate, threaten, or even attempt suicide-sometimes to the apparent pleasure of their tormentors. 38 At least two cases involve either a father or stepfather tormenting children living in his house. 39 Some of the victims are very young. And the impacts on victims can be severe and likely lasting. Many cases result, after all, in images permanently on the Internet on multiple child pornography sites following extended periods of coercion. - Certain jurisdictions have seen a disproportionate number of sextortion cases. This almost certainly reflects devoted investigators and prosecutors in those locales, and not a higher incidence of the offense. Rather, our data suggest that sextortion is taking place anywhere social media penetration is ubiquitous. The paper proceeds in several distinct parts. We begin with a literature review of the limited existing scholarship and data on sextortion. We then outline our methodology for collecting and analyzing data for the present study. We then offer a working definition of sextortion. In the subsequent section, we provide a sketch of the aggregate sta - tistics revealed by our data concerning the scope of the sextortion problem, and we examine the statutes used and sentences delivered in federal and state sextortion cases. We then turn to detailing several specific case studies in sextortion. In our last empirical section, we look briefly at the victim impact of these crimes. Finally, we offer several recommendations for policymakers, law enforcement, parents, teachers, and victims.

Details: Washington, DC: Center for Technology Innovation, Brookings Institution, 2016. 47p.

Source: Internet Resource: Accessed September 3, 2016 at: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion1-1.pdf

Year: 2016

Country: United States

URL: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion1-1.pdf

Shelf Number: 140158

Keywords:
Child Pornography
Computer Crime
Cybersecurity
Online Victimization
Sex Crimes
Sexting
Sextortion

Author: Bochkor, N.P.

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. County-Specific Report: Ukraine

Summary: How did Ukraine appear in the list of countries where commercial sexual exploitation of children (CSEC) is common? It is difficult to answer, because the problem is hidden and its reasons are comprehensive. Ukraine does not have a chance to solve the problem before it is thoroughly studied. The study "Sexual exploitation of children in Ukraine: situation and counteraction" was conducted by the authors of International Women's Rights Center "La Strada-Ukraine". This work is a part of a global study on sexual exploitation of children in travel and tourism in 15 countries within the framework of the project initiated by ECPAT - Netherlands. The aim of the study is to analyze the current situation with sexual exploitation and violence against children, especially in tourism, pornography, prostitution, trafficking and early marriages, and also develop recommendations to improve it. The study used a variety of methods, such as statistical, sociological, comparative and legal study, empirical methods. One of the basic principles of the study is the respect to children's rights according to the requirements of the UN Convention on the Rights of the Child. Despite the fact that children at first sight often seem to provide sex-services voluntarily, the responsibility lies on the adult who exploits a child by engaging in sexual activities and violates child rights. Other important principles of the study are non-discrimination, equality, human rights approach, and child and youth participation. The research uses the following sources of information: content analysis of the web sites, analysis of legislation and administrative documents of state authorities, secondary analysis of information, desk-research of the related studies conducted in Ukraine. For example, data used for the content analysis consists of different texts obtained online by establishing specific searching parameters. The sample included texts that are topically related to combinations of the following key words: "Ukraine," "sex," "tourism," "women," "dating," "tour," "children," "girls." Furthermore, snowball sampling was used to obtain relevant texts; hypertext links provided access to related articles and comments. The vast majority of studied texts are in English. Publications and reports which were prepared in Ukraine during the last five years were analyzed. Among them - Annual Human Rights Report "Human rights in Ukraine" in 2009, 2010, 2011, 2012, 2013 prepared by nongovernmental organizations; researches conducted by different institutions on the request of UNICEF Ukraine; reports of the Ombudsman for Children under the President of Ukraine etc. Special attention was paid to the desk research of the materials and texts of sociological and criminological studies such as "Child sex tourism in Ukraine: attempt of situational analysis", "Where and how can be assisted victims of domestic abuse? Results of the monitoring of special institutions", "Legal Study to identify inconsistencies between Ukraine national legislation and provisions of the Optional Protocol on the Sale of Children, Child Prostitution and Child Pornography to the UN Convention on the Rights of the Child", publications of ECPAT International etc. The research uses findings of the following publications: "Scientific and practical comment to the Law of Ukraine on Combating Trafficking in Human Beings", "Correspondence of Ukrainian legislation to the provisions of the Council of Europe Convention on Action against Trafficking in Human Beings". Moreover, the research analyzes anti-trafficking legislation and experience of its implementation, as well as the legislation against sexual exploitation of children and experience of its practical implementation. Analysis also focused at activities against sexual exploitation of children and assistance to them initiated by civil society and international organizations. The study was conducted when Ukraine was facing the difficult times. Hostile aggression against Ukraine took place immediately after the Revolution of Dignity, and the East of the country is in the state of undeclared war actively supported by the Russian Federation. The deterioration of the social and economic status, activity of illegal armed groups, destroyed system of social protection in Donets and Luhansk oblasts, including protection of children, lead to the increasing problem with sexual exploitation of children. The survey among experts allows assuming that in current social and political situation CSEC might become more urgent, and estimating the impact of the military conflict and its consequences. At the end, there are some recommendations to legislation, activities of related state agencies and local authorities, international and civil society organizations.

Details: La Strada Ukraine, 2015. 40p.

Source: Internet Resource: Accessed September 15, 2016 at: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-UKRAINE.pdf

Year: 2015

Country: Ukraine

URL: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-UKRAINE.pdf

Shelf Number: 147885

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Sex Tourism

Author: International Childrens Center (ICC)

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. County-Specific Report: Turkey

Summary: Commercial sexual exploitation of children (CSEC) is one of the most heinous forms of child rights violations in in the world including in Turkey. While, in Turkey, national and local reports and studies mostly focus on sexual abuse of children, findings related to commercial sexual exploitation of children are extremely limited. There is almost no publication on this issue that contains evidence based information with the exception of few recent doctoral dissertations, reports by civil society organizations submitted to the UN Committee on the Rights of the Child under the Optional Protocol to the Convention on the Rights of the Child (CRC) on the Sale of Children, Child Prostitution and Pornography, a study conducted by the ECPAT International and Yeniden Saglik Association in 2006 and annual rights monitoring reports of the Human Rights Association. One reason for this scarcity is the fact that what CSEC consists of is not understood well and that the offence mostly takes the form of an underground activity committed by criminal enterprises difficult to spot. This report explores only one form of CSEC in Turkey as a contribution to a global study conducted by ECPAT International and its members all over the world

Details: Ankara, Turkey: ICC, 2015. 62p.

Source: Internet Resource: Accessed September 15, 2016 at: file:///C:/Users/pschultze/Downloads/3.-SECTT-TURKEY.pdf

Year: 2015

Country: Turkey

URL: file:///C:/Users/pschultze/Downloads/3.-SECTT-TURKEY.pdf

Shelf Number: 140303

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Sex Tourism

Author: Solian, Ahmad

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. County-Specific Report: Indonesia

Summary: GLOBAL STUDY ON SEXUAL EXPLOITATION OF CHILDREN IN TRAVEL AND TOURISM COUNTRY-SPECIFIC REPORT INDONESIA Indonesia is one of the world's major tourism destinations. It attracts millions of tourists every year from all over the world, including many local visitors. The high tourism rate in Indonesia is influenced by easy access to its nationwide tourist attractions, high volume of flights and cheap accommodation. The rising number of both local and foreign visitors has led to an increased demand for entertainment facilities, most notably in the sex trade. Research on child sex tourism in Indonesia conducted by ECPAT Indonesia found that, on the whole, Indonesia did not recognise or offer sex tourism in its popular destinations, although many manipulated the tourism industry to sexually exploit children.

Details: Jakarta, Indonesia: ECPAT Indonesia, 2016. 82p.

Source: Internet Resource: Accessed September 15, 2016 at: http://globalstudysectt.org/category/countries/Indonesia/

Year: 2016

Country: Indonesia

URL: http://globalstudysectt.org/category/countries/Indonesia/

Shelf Number: 140304

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Sex Tourism

Author: Maskhulia, Mariam

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. County-Specific Report: Georgia

Summary: The Public Health Foundation of Georgia (PHF) conducted a qualitative research on Commercial Sexual Exploitation of Children in Georgia (CSEC), which contributed to the Global Study on the Sexual Exploitation of Children in Travel and Tourism (SECTT) that ECPAT International is currently undertaking. Implementation of the research was possible in the frames of the project "Reducing Violence against Children, with special focus on sexual exploitation of children and child sex tourism", which is carried out by PHF in partnership with Defence for Children - ECPAT Nederland. The research aimed at exploring the situation of children who are victims or at-risk of commercial sexual exploitation, social context in which such exploitations take place and what are the legal protections put in place to address the problem. Toward this end, twophase interventions were implemented. The first phase covered the desk-review process. In the second phase in-depth interviews with practitioners and decisionmakers, who work for and with children, were carried out and focus-group discussions were also held. The research found out that very little attention is given to CSEC, except the trafficking where extensive measures have been put in place both on legal and victims' protection levels. However, other manifestations of CSEC, such as child prostitution, child pornography and exploitation of children in travel and tourism have not yet deserved sufficient attention. This is a very first attempt to examine the CSEC nature in Georgia. Given research provides a general overview of the problem in Georgia and gathers opinions from child protection experts. It is believed that this report will serve as a pushing factor for further relevant and immediate actions to be undertaken in this direction towards going more into depth of the problem and setting up meaningful and feasible actions that will be carried out by responsible agencies in coordination. Unfortunately, children's protection from various manifestations of commercial sexual exploitation and sexual abuse is weak in much of the world despite the universal ratification of the CRC. Often, a harmonized legal framework is not accompanied by necessary EXECUTIVE SUMMARY changes to ensure implementation of effective policies, public awareness raising/prevention programs, professional training, services and practice. The nature of programmatic responses to child protection focus more on intervention than prevention, addressing the symptoms rather than improving the underlying systems that have failed to protect children. Taking into account the long-term consequences of commercial sexual exploitation of children, one could estimate why this issue is of current importance and why we should contribute to the protection of children from all its manifestations. Bearing in mind the gravity of CSEC crimes and its impact on children globally, the Committee on the Rights of the Child elaborated a separate Optional Protocol on the Sale of Children, Child Prostitution and Child Pornography (hereinafter "OPSC" or "Optional Protocol"). Also comprehensive regional instrument was enacted to protect children from all forms of sexual abuse and exploitation, namely Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse (hereinafter "Lanzarote Convention"). There are number of measures and action plans developed on the global level, which call on states to undertake specific measures towards combating CSEC, particularly: The Stockholm Declaration and Agenda for Action, Yokohama and Rio World Congresses and call for global commitment. All children are at risk of violence, but the Global Survey confirms that today, as in 2006, the most vulnerable children are those at greatest risk of violence: those with disabilities, those who migrate, those who are confined to institutions, and those whose poverty and social exclusion expose them to deprivation, neglect and, at times, to the inherent dangers of life on the streets. The major problem of CSEC is its hidden nature. Nonreporting is the greatest challenge, which triggers numerous problems for the victims and their future life and unfortunately these life-long problems cannot be evaluated to understand the actual devastation of individual's lives across the universe. Georgian society is also facing the problem of non-reporting. The majority of the pull and push factors to CSEC unfortunately exist in Georgia thus provides ground to believe that the issue is more severe than it seems in reality. The ground for prioritizing CSEC exists in Georgia; however a political will is necessary to integrate this problem into the mainstream of relevant child protection and welfare policies and appropriate action plans. Unfortunately, no information is available on the situation of children from the separatist regions of South Ossetia and Abkhazia. What is known that rule of law and social protection of local population is quite weak, which raises sufficient doubt that children from these regions are likely to be affected by all forms of violence and exploitation. Summary of key findings: - There is a lack of evidence-based information on CSEC in Georgia, thus making it extremely difficult to provide substantial analysis of the issue; - The biggest challenge and the utmost need is that CSEC is not acknowledged as a problem in Georgia and efforts are directed towards combating trafficking in persons, while all other manifestations of CSEC are not sufficiently addressed; - There are some measures against sexual violence but under the boarder context of violence against children and specific measures for sexual abuse or CSEC are very limited or do not exist at all; - Child professionals in Georgia do not have special knowledge how to address the needs of children who are engaged in prostitution and services, social benefits and support programs offered by the Government or NGOs cannot 'compete' with lifestyle pursued by these children; - The average age of child's engagement in prostitution is 14-15 years and unplanned pregnancy among these children is common; - Professionals who work with children come into contact with children engaged in prostitution indirectly, i.e. interact with children who live or work on the streets in terms of fulfilling their basic needs, and not because of their engagement in prostitution; - Professionals necessitate knowledge not only in how to identify children affected by various forms of CSEC, but how to work with those who are already engaged in prostitution, are victim of child pornography, etc. This is a request of the professionals who see child prostitution as a problem, but do not have specialised knowledge and skills on the issue; - Preventive measures "not enough" and reporting mechanisms inadequate for responding CSEC needs; - There is a problem with the enforcement of CSEC-specific legislation and practice does not properly ensure rights of child to protection and rehabilitation.

Details: Tbilisi, Georgia: Public Health Foundation of Georgia (PHF), 2015. 64.

Source: Internet Resource: Accessed September 15, 2016 at: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-GEORGIA.pdf

Year: 2015

Country: Georgia

URL: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-GEORGIA.pdf

Shelf Number: 147887

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Sex Tourism

Author: Pruneda, Olalla

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. County-Specific Report: China

Summary: China is home to 274 million children, the second largest child population in the world. Over the past three decades, the country has experienced remarkable progress in poverty alleviation and living standards, including the realisation of universal access to primary education and a drastic reduction in child mortality. However, growing regional disparities and migration are having a great impact on the lives of more than 100 million Chinese children today. Of them, 36 million have migrated to the cities with their parents with no right to education or health care services in the urban areas where they live. Meanwhile, nearly 70 million of them have become the so-called "left-behind children", in the care of relatives in their home villages. Away from the protection of their parents or unable to register as legal residents of China's cities, they are the most vulnerable children in China today, running the risk of being trafficked, sexually exploited or dragged into other forms of forced labour. With 14 per cent of the world's children, the "high prevalence of sexual exploitation and abuse against children, including rape" in China is an issue of paramount importance for all concerned with children's wellbeing. In the midst of China's outstanding economic growth and the resulting deep social transformations, a new trend is emerging which places new challenges for the protection of children. It is the growth of China's domestic tourism market and the country's consolidation as the fastest-growing tourism source market on a global scale. EXECUTIVE SUMMARY Today nearly one in ten tourists in the world is Chinese. All forecasts suggest that the growing trend will continue over the next few years and "will surely continue to change the map of world tourism", in the words of the United Nations World Tourism Organization (UNWTO) Secretary-General, Taleb Rifai. Chinese travellers are the biggest spenders globally since 2012. Neighbouring countries and regions are expected to remain as the preferred destinations for Chinese tourists in the coming years, with Hong Kong, Macau, South Korea, Thailand and Taiwan leading the way at present. Within China, domestic travel spending (90.9 per cent) is far more important than foreign visitor spending (9.1 per cent). Furthermore, the economic weight of the domestic tourism and travel sector keeps growing, generating 9.3 per cent of its GDP and employing 64.4 million Chinese in 2013.9 Tourism development is mostly taking place in ethnic minority regions such as Yunnan, Sichuan and Tibet, drawing on the folklorisation of these groups by representing them as an 'exotic' other. In the light of this ethnic tourism trend, the local population of ethnic minority areas appear to pin their hopes of further economic development on the increasing arrival of urban Han Chinese. The conflation of these trends with growing regional disparities, which are leading hundreds of millions to move to China's cities and industrial areas in search of a better job, create an unprecedented challenge to ensure the protection of children's rights. In addition, a traditional preference for sons has resulted in a skewed sex ratio of 118 boys born for every 100 girls as of 2014. As a result of this preference and the in 2015 abolished one-child policy, Chinas population appears to be "aging and increasingly male". This seems to suggest that the demand for prostitution and forced marriages will most likely keep increasing over the coming decades. With the country's economic growth, its entertainment industry has developed rapidly on the more developed eastern coast of the country as well as in tourist spots across the country. China's business culture involves frequenting entertainment venues as a necessary step in building trust among business partners. The presence of teenagers in entertainment venues where sex services are offered to tourists and travellers seems a recurrent problem as Chinese society sees an erosion of the family values rooted in the Confucian tradition. However, we still have very limited data on the magnitude and features of this growing problem in China. Further research is needed to better understand who are the children most adversely affected, who are the offenders and how they operate, as well as what else can be done to enhance the protection of children's rights. In early 2015, important steps are being taken to remove the stigmatising "soliciting underage prostitution" crime to replace it for statutory rape. However, the Criminal Law still makes no specific reference to the crime of facilitating the prostitution of boys under 18 or girls between 14 and 18 years of age. This report aims to shed new light on the heinous crime of sexual exploitation of children in travel and tourism in China and by Chinese travellers abroad by reviewing research conducted to date by academics, governments, international organisations and NGOs. It hopes to help identify the gaps of what we know about this phenomenon at present in order to encourage further research and improve existing laws and policies to better protect children and ensure their recovery and reintegration. It is our shared responsibility.

Details: Bangkok: ECPAT International, 2015. 46p.

Source: Internet Resource: Accessed September 15, 2016 at: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-CHINA.pdf

Year: 2015

Country: China

URL: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-CHINA.pdf

Shelf Number: 147888

Keywords:
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Sex Tourism

Author: ECPAT Brazil

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. County-Specific Report: Brazil

Summary: People who have suffered from the enduring societal scourge of sexual exploitation of children (SEC) have urgently and tirelessly campaigned alongside advocates to eradicate SEC and the sexual exploitation of children in travel and tourism (SECTT) while never forgetting the devastating impact the phenomenon reaps upon nations, communities, families and the children themselves. In Brazil, modern-day slavery and child labour are rampant. Many have raised concerns as to the effects of mega sports events on the commercial sexual exploitation of children (CSEC) in a country already facing such challenges. As is well-known, Brazil was home to the FIFA World Cup in 2014 and is about to be host to the Rio de Janeiro Olympic Games this year. With the surging number of tourists and travellers - tourism in Brazil tripled in June 2014, when the World Cup took place -, members of civil society organisations feared that more children would be at a greater risk in certain areas of the country. Despite acknowledging that perhaps no increase in CSEC was registered, improvements in this area have not been achieved either . Furthermore, the development and expansion of the internet has facilitated travel while granting anonymity to a growing number of sexual exploitation networks, enabling them to develop new ways to escape identification by existing protection systems.

Details: Rio de Janeiro: ECPAT Brazil, 2015. 60p.

Source: Internet Resource: Accessed September 15, 2016 at: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-BRAZIL.pdf

Year: 2015

Country: Brazil

URL: http://globalstudysectt.org/wp-content/uploads/2016/08/3.-SECTT-BRAZIL.pdf

Shelf Number: 140307

Keywords:
Child Labor
Child Pornography
Child Prostitution
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Sex Tourism

Author: Wittes, Benjamin

Title: Closing the sextortion sentencing gap: A legislative proposal

Summary: On the surface, at least, the sextortion case of Joseph Simone seems far more egregious than does that of Joshua Blankenship. Simone was a wrestling coach at a prestigious preparatory high school in Providence, Rhode Island. He was charged with sextorting "numerous" minor males; prosecutors estimated that he had exploited at least 22 young boys through a social media manipulation scheme, pretending to be a young girl when soliciting initial nude images, and then threatening to release those initial images on Facebook if the boys did not perform more sex acts. Blankenship also ran a social media manipulation scheme - but in this instance, against a single minor female in Maryland, convincing her that she had broken the law herself by sending out a nude photo, and demanding more images in exchange for not telling the police. But Blankenship was sentenced in federal court, whereas Simone faced trial in state court in Rhode Island, specifically in the Providence Superior Court. The result? The man with at least 22 victims was sentenced to one year in prison and two more in home confinement. By contrast, Blankenship, who had only one victim, received 12 years in prison after pleading guilty to federal child exploitation charges. What sort of sentence does conduct like Simone's get a man in federal court? Another sextortionist, William T. Koch, was convicted in a federal court in Ohio on charges that he too extorted 20 minor males, with one victim as young as 11-years-old. Koch was sentenced to 20 years in prison on federal charges of extortion, exploitation of a minor, and receipt and distribution of child pornography. Sextortionists dont get to decide which jurisdiction prosecutes them. They do, however, get to choose their victims. And it matters a great deal which ones they choose. Mark Reynolds was sentenced to 14 years in prison on one federal charge of possession of child pornography for sextorting one minor female using a social media manipulation scheme. Contrast that with Adam Paul Savader, who sextorted between 15 and 45 adult women and received a paltry sentence of two-and-a-half years in federal prison. Savader was convicted on charges of interstate extortion and stalking. Reynolds received eleven-and-a-half years more in prison than did Savader, even though Savader potentially had up to 44 more victims. Federal law seems to care a great deal more about children than it does about adult women.

Details: Washington, DC: Center for Technology Innovation, Brookings Institution, 2016. 18p.

Source: Internet Resource: Accessed September 17, 2016 at: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion2.pdf

Year: 2016

Country: United States

URL: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion2.pdf

Shelf Number: 147931

Keywords:
Child Pornography
Computer Crime
Cybersecurity
Online Victimization
Sex Crimes
Sexting
Sextortion
Sexual Violence

Author: Dwyer, R. Gregg

Title: Protecting Children Online: Using Research-Based Algorithms to Prioritize Law Enforcement Internet Investigation

Summary: here is increasing public and professional concern about Internet sexual offending, as reflected in increasing law enforcement cases and clinical referrals. While all instances of Internet offending against minors require intervention, the number of cases and the overarching goal of protecting children require law enforcement to prioritize cases. This project used data from 20 Internet Crimes Against Children task forces across the United States -- offender characteristics, crime characteristics, and online behavior -- to develop empirically-based recommendations to assist law enforcement in prioritizing: (1) cases involving production of child pornography over possession/distribution; (2) cases involving online luring for the purpose of meeting the minor to commit sexual offenses, over luring restricted to online behavior such as sexual chat or exchanging pornographic images; and (3) cases involving offenders who have committed contact sexual offenses against children over cases involving offenders with no known history. The research builds on a previous OJJDP-funded project by increasing the number of task forces and thereby sample size in order to develop practical recommendations, and adding a new component - a geographical analysis of cases - that will assist decision makers in the allocation of training and resources across the United States in order to combat online sexual exploitation and abuse of children.

Details: Charleston, SC: Medical University of South Carolina, 2016. 54p.

Source: Internet Resource: Accessed October 8, 2016 at: https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250154.pdf

Year: 2016

Country: United States

URL: https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250154.pdf

Shelf Number: 145106

Keywords:
Child Abuse and Neglect
Child Pornography
Child Protection
Child Sexual Exploitation
Online Victimization

Author: Jutte, Sonja

Title: Online Child Sexual Abuse Images: Doing More to Tackle Demand and Supply

Summary: The production and consumption of child abuse images online is creating a social emergency. Digital technology is making it ever easier for this abuse to proliferate, damaging the many children involved in this vile trade. But by each of us playing a part, and taking collective responsibility to keep our children safe, we can find solutions. Behind each and every child sexual abuse image, abuse has occurred in the "real" world. These children are victims every time their image is viewed, and worse still, the knowledge that the image or film can be repeatedly viewed, and may never be removed, causes on-going trauma that they are forced to live with. And, to further heighten the seriousness of this abuse, we know there have been cases where the viewing of child abuse images escalates into abuse in real life. This is an issue of considerable importance to the NSPCC. The challenge we are faced with is sizeable. There are many praiseworthy endeavours, and much valuable work already happening to try to keep our children safer online. It is almost universally agreed that this material is illegal and wrong. But more must and can be done. Better understanding of the scale, nature and urgency of the challenge is vital. Ensuring that everyone - industry, government, law enforcement and charities like the NSPCC - plays their part is crucial. And a greater public understanding of the problem and its effects on children is also needed. In this report, the NSPCC explores new evidence about size of the problem and presents real, tangible solutions to reduce both the supply of and demand for these images. Children must have the right to easily remove sexual images of themselves that are shared online. More treatment and support services are needed to stop potential perpetrators in their tracks. Most importantly we must continue to seek new preventive solutions to stop these crimes from happening in the first place. This report sheds light on where we should focus our collective effort.

Details: London: NSPCC, 2016. 440.

Source: Internet Resource: Accessed December 9, 2016 at: https://www.nspcc.org.uk/globalassets/documents/research-reports/online-child-sexual-abuse-images.pdf

Year: 2016

Country: United Kingdom

URL: https://www.nspcc.org.uk/globalassets/documents/research-reports/online-child-sexual-abuse-images.pdf

Shelf Number: 145578

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Internet Crimes
Online Victimization
Social Media

Author: Ghani, Nusrat

Title: Now I know it was wrong: Report of the parliamentary inquiry into support and sanctions for children who display harmful sexual behaviour

Summary: In recent times, the UK has woken up to the scale of child sexual exploitation, and the urgent need to keep our children safe from this horrific crime. Back in 2014, Barnardo’s supported a Parliamentary Inquiry chaired by Sarah Champion MP (Labour, Rotherham), which made a number of key recommendations, and the Government has since provided welcome leadership in this area, including through the Child Sexual Exploitation Summit on 3 March 2015, chaired by the Prime Minister. However, despite significant progress, far more needs to be done. Victims must be supported, perpetrators must be brought to justice, and crucially, there is a growing consensus that attention and resource must be directed towards prevention as well as response. Chief Constable Simon Bailey – the police chief with key national responsibility for this area – has confirmed that, in 2015, police forces in England and Wales spent £1bn investigating allegations of child abuse. This clearly underlines the economic case for prevention, but it also supports the moral case – by the time the police are involved, abuse has already occurred. We know that there is a strong link between children displaying harmful sexual behaviour at a young age going on to become perpetrators of abuse in adulthood, including child sexual exploitation. Equally, children who sexually abuse other children have often already suffered abuse and trauma themselves. In other cases, children make mistakes as they start to understand their sexuality and experiment with it. These children are unlikely to pose further risk to the public, given appropriate support, but unnecessarily criminalising or stigmatising them as a 'sex offender' at such a young age makes it more likely that they will struggle to regain a normal life, and increases their propensity to reoffend. Whilst in the most serious cases a criminal justice response is inevitable, all children in this situation must receive the high-quality therapeutic support they need to address the underlying causes of their behaviour, prevent them from causing further harm to themselves or others, and enable them to achieve positive outcomes in adulthood. Whilst harmful sexual behaviour includes very serious abuse, which can constitute a sexual offence, it also includes much more mainstream behaviours. 'Sexting, or sharing sexual images online, has become ubiquitous for the social media generation, and while it is not always harmful, it can carry significant risks for young people: once shared images can end up in the hands (or on the smartphones) of a whole school or adults seeking to groom children online. Significantly too, it is illegal, potentially resulting in criminal sanctions and a criminal record, which could severely undermine a child’s life chances.

Details: Barkingside, Ilford, UK: Barnardo's, 2016. 63p.

Source: Internet Resource: Accessed December 9, 2016 at: https://www.barnardos.org.uk/now_i_know_it_was_wrong.pdf

Year: 2016

Country: United Kingdom

URL: https://www.barnardos.org.uk/now_i_know_it_was_wrong.pdf

Shelf Number: 140373

Keywords:
Child Grooming
Child Pornography
Child Sexual Exploitation
Juvenile Sex Offenders
Online Victimization
Sexting
Social Media

Author: Krone, Tony

Title: Trajectories in online child sexual exploitation offending in Australia

Summary: Although the full extent and nature of the sexual exploitation of children is only beginning to be recognised, it is a problem of global significance that requires strong and effective responses. The extent to which the viewing of child exploitation material (CEM) is linked to involvement in producing such material, sharing it and using it to groom and then assault children is a key concern. Most such material is held online, and it is important to understand how offenders use the internet to access CEM and to groom children for sexual exploitation. This exploratory study examines data relating to a sample of offenders convicted of online child sexual exploitation offences under Australian Commonwealth law, to determine how online forms of child sexual exploitation and offline child sexual exploitation, or contact offending, are related. The majority of offenders in this study appeared to commit only online offences, although in a minority of cases there was a connection between exploitative material, grooming and contact offending. This study is an important early step in improving our understanding of offenders and points to the need for further assessment of the nature of online child sexual exploitation and its relationship to other forms of sexual and violent offences.

Details: Canberra: Australian Institute of Criminology, 2017. 13p.

Source: Internet Resource: Trends & issues in crime and criminal justice no. 524: Accessed February 1, 2017 at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi524.pdf

Year: 2017

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi524.pdf

Shelf Number: 145098

Keywords:
Child Pornography
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Online Victimization
Sex Offenders

Author: International Centre for Missing & Exploited Chidlren

Title: Child Pornography: Model Legislation & Global Review. 7th edition

Summary: Since this report was first released by the International Centre for Missing & Exploited Children (ICMEC) in April 2006, ICMEC has continued to update its research into the child pornography legislation currently in place in the nations of the world to gain a better understanding of existing legislation and to gauge where the issue stands on national political agendas.1 In particular, we are looking to see if national legislation: (1) exists with specific regard to child pornography; (2) provides a definition of child pornography; (3) criminalizes computer‐facilitated offenses; (4) criminalizes the knowing possession of child pornography, regardless of the intent to distribute; and (5) requires Internet Service Providers (ISPs) to report suspected child pornography to law enforcement or to some other mandated agency. In the summer of 2009, ICMEC conducted a thorough update of our research on existing child pornography legislation, expanding our review beyond the 187 Interpol member countries to include 196 countries. Our work included independent research as well as direct contact with Embassies in Washington, D.C. to ensure the accuracy of the report. A new review of the 196 countries began in the Spring of 2011. The process remained much the same; reviewing the existing legislation of each country in search of laws specifically focused on child pornography offenses and verifying the information through the Embassies in Washington, D.C., U.N. Permanent Missions in New York, and in‐country law enforcement contacts. However, the 7th edition report also contains several new sections including expanded information on online grooming, information on the new EU Directive on combating the sexual abuse and sexual exploitation of children and child pornography, a review of data retention and preservation policies, and a discussion of implementation. Results The 1st edition, published in 2006, returned shocking results: -- only 27 had legislation sufficient to combat child pornography offenses (5 countries met all of the criteria set forth above and 22 countries met all but the last criteria, pertaining to ISP reporting); and -- 95 Countries had no legislation at all that specifically addresses child pornography. Of the remaining 62 Countries that did have legislation specifically addressing child pornography:-- 54 Countries did not define child pornography in national legislation;-- 27 Countries did not provide for computer‐facilitated offenses; and-- 41 Countries did not criminalize possession of child pornography, regardless of the intent to distribute. The 6th edition, published in late 2010, revealed progress. Of the 196 countries reviewed:-- 45 Countries had legislation sufficient to combat child pornography offenses (8 countries met all of the criteria set forth above and 37 countries met all but the last criteria, pertaining to ISP reporting); and-- 89 Countries still had no legislation at all that specifically addresses child pornography. Of the remaining 62 countries that did have legislation specifically addressing child pornography:-- 52 did not define child pornography in national legislation;-- 18 did not provide for computer‐facilitated offenses; and-- 33 did not criminalize the knowing possession of child pornography, regardless of the intent to distribute. Forward movement continues to be visible in this edition, though much remains to be done. Our updated research shows that of the 196 countries reviewed:-- 69 Countries have legislation sufficient to combat child pornography offenses (11 countries met all of the criteria set forth above and 58 countries meet all but the last criteria, pertaining to ISP reporting); and-- 53 Countries still have no legislation at all that specifically addresses child pornography. Of the remaining 74 countries that do have legislation specifically addressing child pornography:-- 60 do not define child pornography in national legislation;-- 21 do not provide for computer‐facilitated offenses; and-- 47 do not criminalize the knowing possession of child pornography, regardless of the intent to distribute.

Details: Alexandria, VA: The Centre, 2012. 52p.

Source: Internet Resource: Accessed May 16, 2017 at: http://www.icmec.org/wp-content/uploads/2015/10/7th-Edition-EN.pdf

Year: 2012

Country: International

URL: http://www.icmec.org/wp-content/uploads/2015/10/7th-Edition-EN.pdf

Shelf Number: 131374

Keywords:
Child Pornography
Child Sexual Exploitation
Children, Crimes Against
Internet Crimes
Online Grooming
Organized Crime
Sex Crimes
Sex Offenders

Author: Krone, Tony

Title: Online Child Sexual Exploitation Offenders: A Study of Australian Law Enforcement Data

Summary: Children are among the most vulnerable members of our society and need our nurture, care and protection, yet too many children around the world experience some form of child abuse. The exploitation of children for sexual purposes, in which children are used as commodities for the sexual pleasure of adults, is particularly heinous. Child sexual exploitation (CSE) is a global problem that demands strong and effective responses. The full extent and nature of the problem, both historically and currently, is only now beginning to be recognised. The reality of child sexual exploitation within families, in institutions and elsewhere must be confronted. Evidence tells us that intrafamilial sexual exploitation of children has been, and remains, a major problem. The reality - of exploitation by offenders who are known to their child victims - runs counter to the perceived danger presented by strangers. The focus on the danger presented by strangers appears to have been part of a collective denial of the reality of exploitation committed by those entrusted with the care of children. A key concern for those working to address this problem is to determine how the viewing of child exploitation material (CEM) is linked to involvement in the production and sharing of such material, or its use in the grooming of children for sexual purposes or the commission of further sexual assaults on children. Most CEM is held online; it is therefore important to understand how offenders inhabit and use the internet to groom children for sexual purposes. This exploratory study examines data related to a sample of offenders convicted of online child sexual exploitation offences under Australian Commonwealth law, to determine the relationship between offline or contact offences and online CSE offending. In this sample, most CEM offenders appeared to commit only online offences, although there did appear to be a connection between CEM, grooming and contact offending in a minority of cases. This study is an important early step in improving our understanding of Commonwealth online CSE offenders. It points to the need to further assess the nature of online CSE and its relationship to other forms of sexual and violent offences.

Details: Canberra: Criminology Research advisory Council, 2017. 78p.

Source: Internet Resource: Accessed June 2, 2017 at: http://crg.aic.gov.au/reports/1617/58-1213-FinalReport.pdf

Year: 2017

Country: Australia

URL: http://crg.aic.gov.au/reports/1617/58-1213-FinalReport.pdf

Shelf Number: 145903

Keywords:
Child Pornography
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Online Grooming
Online Victimization
Sex Offenders

Author: Queensland Sentencing Advisory Council

Title: Classification of child exploitation material for sentencing purposes: final report

Summary: The Attorney-General and Minister for Justice Yvette D'Ath asked the Queensland Sentencing Advisory Council (the council) to review the classification of child exploitation material (CEM) for sentencing purposes and determine whether any improvements can be made. The review comprised significant consultation across Queensland's criminal justice system involved with detecting, prosecuting and sentencing CEM offences. In addition, the council consulted with key agencies from Queensland's legal community and victim advocates, as well as community members, content experts and relevant agencies in other Australian and international jurisdictions. This broad consultation revealed Queensland is well respected for its professionalism in CEM investigation at national and international levels. Consequently, the council was determined to ensure any system used for classification of CEM in Queensland supports and builds on this reputation. Administrative data collected by criminal justice agencies was analysed to gain an appreciation of the Queensland context of CEM offending and offenders. This report provides the outcomes of this analysis. The report is structured in six chapters, initially introducing the current approach to classifying CEM in Queensland, outlining what is known about CEM offending and CEM offenders, and comparing Queensland's approach to other jurisdictions. The review culminates by proposing a new approach for classifying CEM for sentencing purposes, referred to as the Q-CEM Package. Mechanisms designed to support and evaluate the Q-CEM Package, and Queensland's readiness to continue to meet the many challenges associated with this evolving crime type, are also proposed. Key findings CEM is not a victimless crime. These offences harm real children and the repeated circulation of CEM depicting this abuse continues their victimisation. Victims of CEM report lifelong impacts as a result of the abuse and re-victimisation via sharing of the material. It is difficult to permanently or fully remove images from circulation. Delays are associated with CEM cases. The council's research confirmed anecdotal evidence that delays were associated with the criminal justice response to CEM. The delays are most prevalent between charging an offender and proceeding to a committal hearing. During this period, police undertake typically complex forensic processes and classify detected CEM. CEM is an international crime with a local footprint. CEM is a technology-enabled crime and, as such, will continue to evolve and expand in line with the exponential growth and global interconnectivity of technology. Queensland child victims and Queensland offenders require a suitable response from state and Commonwealth criminal justice agencies. National and international cooperation is essential. All Australian state and territory jurisdictions are seeking a platform to support cooperation at national and international levels. A common platform promotes harmonised classification language to respond to the international dimension of these crimes. Common platforms are designed to address time and welfare burdens on criminal justice agencies by sharing data about CEM encountered in other jurisdictions. They enhance victim identification efforts by enabling a stronger focus on new material. Data analysis, research and a commitment to practice evaluation are important. Identifying how this crime type is shifting remains a critical issue for Queensland. Keeping pace will build on the state's reputation for innovation, and reflects the commitment this state has to protecting Queensland children and families. Queensland needs a system that balances the requirements of all criminal justice agencies. Classification for sentencing must balance the demands on law enforcement to identify victims and offenders with the mechanisms required to prosecute and sentence offenders. The QCEM Package is specifically designed to address these critical functions of a system responsible for removing children from harm and bringing offenders to account. Queensland needs to adopt an enhanced approach to sexting and promoting prevention of CEM offending. Establishing mechanisms to provide support to families, schools and other organisations that can raise awareness among young people about how to remain safe online is essential. There is also a role to encourage offenders and potential offenders into treatment for their sexual interest in children.

Details: Brisbane: The Council, 2017. 150p.

Source: Internet Resource: Accessed July 31, 2017 at: http://www.sentencingcouncil.qld.gov.au/__data/assets/pdf_file/0017/531503/cem-final-report-july-2017.pdf

Year: 2017

Country: Australia

URL: http://www.sentencingcouncil.qld.gov.au/__data/assets/pdf_file/0017/531503/cem-final-report-july-2017.pdf

Shelf Number: 146623

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Online Victimization
Sentencing
Sex Offenders

Author: Adams, William

Title: Federal Prosecution of Commercial Sexual Exploitation of Children Cases, 2004-2013

Summary: This report examines commercial sexual exploitation of children (CSEC) cases prosecuted in the federal criminal justice system between 2004 and 2013. CSEC offenses include child pornography production, child pornography possession, and child sex trafficking. The report describes persons investigated by federal law enforcement and referred to U.S. attorneys, and cases prosecuted, adjudicated, and sentenced in U.S. district court for CSEC offenses, including the disposition of CSEC matters concluded by U.S. attorneys, reasons matters were declined for prosecution, pretrial release rates, demographic characteristics of suspects charged with CSEC offenses, and key case outcomes, such as rates of conviction and length of prison sentences imposed. Findings are based on data from BJS's Federal Justice Statistics Program, with source data provided by the Executive Office for U.S. Attorneys, Administrative Office of the U.S. Courts, and the U.S. Sentencing Commission. Highlights: From 2004 to 2013, a total of 37,105 suspects were investigated and referred to U.S. attorneys for commercial sexual exploitation of children (CSEC) offenses. The FBI was the lead investigative agency in 45% of CSEC matters investigated and referred to U.S. attorneys from 2004 to 2013. Nearly all defendants convicted of CSEC offenses from 2004 to 2013 were sentenced to federal prison (98%). The mean prison sentence imposed on CSEC defendants in 2013 was 11.6 years. Six in 10 suspects in CSEC matters investigated and referred to U.S. attorneys from 2004 to 2013 were prosecuted in U.S. district court.

Details: Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2017. 11p.

Source: Internet Resource: Accessed October 13, 2017 at; https://www.bjs.gov/content/pub/pdf/fpcsecc0413.pdf

Year: 2017

Country: United States

URL: https://www.bjs.gov/content/pub/pdf/fpcsecc0413.pdf

Shelf Number: 147672

Keywords:
Child Pornography
Child Sex Trafficking
Child Sexual Abuse
Child Sexual Exploitation

Author: Hales, Gavin

Title: A 'Sexting' Surge or a Conceptual Muddle? The challenges of analogue law and ambiguous crime recording

Summary: 'Sexting' - the sending and receiving by children and young people of 'youth produced sexual imagery'1 - has emerged as a growing phenomenon in recent years, facilitated by the advent of near universal smart phone ownership.2 While it may often take place within the confines of consensual sexual relationships, in some cases 'sexting' has been associated with bullying, threats or exploitation, with significant consequences for the subjects of the images, particularly where those images are widely circulated without their consent. At times the police have been called on to act, whether by victims or for example their parents or schools. The response of police forces and the wider criminal justice system has periodically been called into question with allegations that children have been unduly criminalised, particularly following publicity given to individual cases (eg BBC, 2015). The National Police Chiefs' Council (NPCC) recently published new data on the nature of 'sexting' by children (under 18), as recorded by police forces in England and Wales, under the headline 'Police dealing with rising number [of] 'sexting' cases involving children' (NPCC, 2017). They reported that there has been a 'surge in children sharing or possessing sexual images of themselves or others' with recorded offences more than doubling in three years; that girls are recorded as victims three times as often as boys; and that girls and boys are equally likely to be recorded as suspects or perpetrators. This paper discusses whether a meaningful line can be drawn from the NPCC data to the nature and underlying social issues associated with 'sexting', including who is involved, how 'sexting' is changing over time, and how the police service is responding. In addressing those questions this paper identifies a conceptual muddle at the intersection of four factors that will be examined in some detail: - Antiquated law that did not anticipate digital technology, including children taking and distributing indecent images of themselves. - Complex and ambiguous police crime recording and counting rules and practices. - Attempts to avoid unnecessarily 'criminalising' children. - Crime data published with limited detail and without caveats. It concludes by asking if the law on 'indecent images of children' needs updating with some specific exemptions for children, to reflect the world as it is today and avoid logically counterproductive consequences, including the risk that children may be deterred from reporting victimisation.

Details: London: Police Foundations, 2018. 12p.

Source: Internet Resource: Perspectives on Policing: Paper 4: Accessed February 2, 2018 at: http://www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/perspectives_on_policing_sexting_FINAL.pdf

Year: 2018

Country: United Kingdom

URL: http://www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/perspectives_on_policing_sexting_FINAL.pdf

Shelf Number: 148976

Keywords:
Child Pornography
Child Sexual Exploitation
Internet Crimes
Sex Crimes
Sexting
Social Media

Author: Allnock, Debbie

Title: Evidence-based models of policing to protect children from sexual exploitation

Summary: Key Messages  CSA was named as a national threat in England and Wales in March 2015.  CSE, particularly online CSE, is now mentioned in the strategic policing requirement.  Policing activity to respond to CSE has accelerated in recent years.  Inspections have found evidence of good practice and improvements to policing of CSE, but have also documented on-going challenges facing the police.  Inspections show that police forces are not using their disruption powers to full effect and research shows that information sharing between police and local authorities can be a major barrier to safeguarding children from CSE.  Information on the number of CSE convictions is not readily available: police do not receive intelligence about all CSE-related crimes; many cases are never reported and there are inconsistent approaches to record keeping between and within forces. That said, published offence data for 2015/16 shows an increase in reporting of all sexual offence categories compared to 2014/15.  Published research about 'what works' in policing to obtain prosecutions is absent.  This is the first study of its kind to document the ways in which some police forces in England have structured their CSE responses.  This is also the first study of its kind to assess the features of CSE policing responses in relation to the outcomes for victims.  Despite this, understanding of the relationship between policing responses and prosecution outcomes remains elusive in light of problematic data recording within police and CPS systems.

Details: Luton, Bedfordshire, UK: University Of Bedfordshire, The International Centre: Researching Child Sexual Exploitation, Violence and Trafficking, 2017. 91p.

Source: Internet Resource: Accessed February 14, 2018 at: https://www.beds.ac.uk/__data/assets/pdf_file/0005/571145/Evidence-based-models-of-policing.pdf

Year: 2017

Country: United Kingdom

URL: https://www.beds.ac.uk/__data/assets/pdf_file/0005/571145/Evidence-based-models-of-policing.pdf

Shelf Number: 149149

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sexual abuse
Child Sexual Exploitation
Policing

Author: Perkins, Derek

Title: Interventions for perpetrators of online child sexual exploitation: a scoping review and gap analysis

Summary: Technology has become a primary medium for child sexual abuse and exploitation. Like offline behaviour, technology-facilitated abuse and exploitation can take many forms, such as the recording of the sexual assault of a child or communicating with a child via mobile devices. Online and offline spaces are not always clearly distinguishable: abuse and exploitation can start in one space and move to the other. In this report, we describe sexually abusive activities towards a child or young person as 'online child sexual abuse' (OCSA) - or, where there are gains beyond sexual gratification, 'online child sexual exploitation' (OCSE) - if they are carried out via technology. Various interventions for perpetrators of OCSA and OCSE are available, ranging from one-toone sessions to manualised treatment groups. Little is known about the effectiveness of existing interventions, and whether there are gaps in the current intervention response. To improve knowledge of treatment in these areas, this scoping review obtained information from three sources: - online searches - a literature review and enquiries to service providers in relation to existing interventions - an online survey of experts and stakeholders - in-depth interviews drawn from the survey participants. These yielded information about the different interventions currently provided for perpetrators of OCSA/E, their effectiveness (where known), gaps within current interventions, and forthcoming challenges in the field. Key messages from the research Lack of evaluation and research Law enforcement, offender management and child protection services have had to be responsive to the urgent and growing issue of OCSA/E, despite limited evidence on the underlying psychological models of OCSA/E behaviour. Responding to need has, understandably, outrun the collection of scientific evidence, and there has been a lack of systematic evaluation of interventions' effectiveness. Sense of being overwhelmed Whilst professionals involved in this area felt strongly about the positive impact of their work, they also communicated a sense of feeling overwhelmed with regard to the high numbers of OCSA/E perpetrators, the lack of funding available for their services, and the need for specific training for professionals involved in this area. Need to increase knowledge generation and exchange Professionals expressed a desire for enhanced knowledge generation and exchange, especially with regard to increasing the empirical knowledge base on the risks and needs presented by the perpetrators of OCSA/E, and the lack of professional tools to assist with decision-making regarding risk and treatment. Enhance existing intervention response Interventions for perpetrators of OCSA/E remain limited and are largely similar in their client focus, scope and funding approach. They predominantly focus on psychoeducation and addressing psychological markers of offending behaviour, are provided for adult males known to the criminal justice system, and are paid for by the client or as part of court-ordered or mandatory interventions. Early intervention focus The scoping review also identified a demand for a shift towards preventative approaches - to increase public awareness and targeted at young people through educational resources. Sex education, including internet safety and pornography use, was highlighted by professionals as needing to be an integral part of the school curriculum. Professionals also discussed the implications of providing interventions for OCSA/E perpetrators not known to the criminal justice system, and for non-offending individuals who may be concerned about their sexual interest. Characteristics of existing interventions Online offending has become a focus in interventions provided for people with a sexual conviction and their victims. This scoping review identified 48 services or agencies that contribute to interventions for OCSA/E offending by providing interventions themselves, commissioning or conducting relevant research, and providing knowledge exchange events for professionals. This included eight UK-based services that directly provide interventions for perpetrators of OCSA/E. Most interventions are focused on adult male perpetrators (predominantly those known to the criminal justice system), with limited support provided for adolescents, female perpetrators, or the perpetrator's support network such as family members or friends. The reviewed intervention services typically provide psychological assessments and individual or group treatment. A key difference between UK and some international providers is the ability of the latter to work with perpetrators without the requirement for statutory disclosure to the criminal justice system on matters that would require disclosure in the UK (for example in respect of specific information on past unprosecuted offences). Quality control in relation to the provided interventions is variable. The empirical research on which they are based is not always up to date or specific to the offender subgroup. Service evaluations mainly comprise qualitative feedback from service users rather than more multifaceted pre-post treatment assessments. Implications from the research The scoping review highlighted a number of areas for future development and professional practice: - Intervene earlier and more broadly. This includes offence-prevention strategies such as public education about the nature of OCSA/E and their legal classification, enhancing service provisions for nonoffending individuals attracted to children, and reducing access to sexually exploitative material of children and young people. - Enhance the treatment response for (known) offenders. This may include expanding the existing client target group, increasing accessibility of services and increasing staff support. It may also include staying up to date on emergent issues in the field, such as new opportunities for OCSA/E arising with novel technologies. - Generate and share knowledge. This may include OCSA/E-specific training for professionals working in the field, support for research engagement, and knowledge exchange and collaboration between professionals and partner agencies. A key research need is to conduct systematic intervention evaluations.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 54p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 5: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%205%20-%20Interventions%20for%20perpetrators%20of%20online%20CSE.pdf

Year: 2018

Country: International

URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%205%20-%20Interventions%20for%20perpetrators%20of%20online%20CSE.pdf

Shelf Number: 149208

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Intervention Programs
Sex Offender Treatment
Sex Offenders
Social Media

Author: Walker, Kate

Title: Characteristics and perspectives of adults who have sexually exploited children: Scoping research

Summary: There is a lack of information about individuals who perpetrate child sexual exploitation (CSE) offences. This report describes one of three research projects commissioned by the Centre of expertise on child sexual abuse to build an evidence base about this population. The projects' aims were to: ‣ investigate the characteristics of those who commit CSE ‣ identify the nature and dynamics of their behaviours, their motivations and the way they target and exploit their victims. The report will be of interest to frontline practitioners, service providers, commissioners of services, policy makers, researchers and academics. Method Notes from police intelligence briefings with 27 perpetrators of CSE were analysed, using content analysis to extract demographic information about CSE perpetrators. Additionally, interviews were undertaken with 18 adults who had sexually offended against children; using the current (2017) Government definition of CSE for England, these 18 adults were classified as either CSE perpetrators (n = 11) or Non-CSE perpetrators (n = 7). Inductive thematic analysis was used to analyse the interview data, to identify common themes that captured the characteristics and motivations of CSE perpetrators. Key findings and gaps in research knowledge ‣ There has been little research to date that has specifically examined the characteristics, context and motivations of CSE perpetrators. ‣ It is difficult to identify CSE perpetrators, since most sexual offences are not specific to CSE and individuals who have committed CSE offences have not been categorised as such in the criminal justice system process. This makes it difficult to conduct research with this group. ‣ Adults in this sample who had committed CSE offences had experienced dysfunctional lives. They evidenced individual internal characteristics, such as mental health problems, low self-esteem and antisocial attributes. ‣ Many excessively used adult pornography and/or images that depicted children. ‣ Negative external influences were also present in their relationships and environments. These included chaotic intimate relationships, poor relationships with family members and peers, and violence and abusive relationships at home and school. ‣ Individuals believed that their offending was associated with a culmination of all the dysfunctional and negative experiences in their lives, including both internal and external influences. ‣ Individuals justified and 'explained' their offending behaviours, which enabled them to continue to offend. ‣ Motivation for offending was described as sexual gratification in this exploratory sample. ‣ An ecological framework can be used to understand the complexity and interplay between the individual, relationships, social, cultural and environmental factors associated with CSE. ‣ There are gaps in research knowledge as to whether the factors identified as associated with CSE perpetration are variable risk markers or fixed risk markers and whether these are casual risk factors that could be targeted in interventions. ‣ Little is known about the role and relevance of protective factors which can potentially mitigate perpetration. Implications and recommendations This is a difficult group to research, as they are largely 'hidden' in criminal justice system processes. A complex range of factors are associated with the commission of CSE, which means that there is no simple way of preventing individuals from perpetrating this type of offending. However, the evidence is still limited and we do not have a clear picture of the range of factors that lead to CSE offending, particularly across the wide range of offences that meet the definition of CSE. More research is therefore needed: for example, with a larger, national sample of individuals who have sexually exploited children and a wider range of CSE offences than has been captured in this exploratory study

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 36p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 3: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%203%20-%20Characteristics%20and%20perspectives%20of%20adults%20who%20have%20sexually%20exploited%20children.pdf

Year: 2018

Country: International

URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%203%20-%20Characteristics%20and%20perspectives%20of%20adults%20who%20have%20sexually%20exploited%20children.pdf

Shelf Number: 149209

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Intervention Programs
Pornography
Sex Offender Treatment
Sex Offenders
Social Media

Author: Walker, Kate

Title: Characteristics and motivations of perpetrators of child sexual exploitation: A rapid evidence assessment of research

Summary: There is a lack of information about individuals who perpetrate child sexual exploitation (CSE) offences. This report describes one of three research projects to build an evidence base about this population. The project's aims were to: ‣ investigate the characteristics of those who commit CSE ‣ identify the nature and dynamics of their behaviours, their motivations and the way they target and exploit their victims. The report will be of interest to frontline practitioners, service providers, commissioners of services, policy makers, researchers and academics. Method A rapid review was conducted, finding 50 studies/reports where the offences met the definition of CSE and information could be extracted about perpetrators' characteristics, behaviours, motivations and methods of targeting/exploiting their victims. Key findings and gaps in research knowledge ‣ The majority of studies were conducted in the UK (19) and USA (18), with four conducted in Canada, three in New Zealand, two in France and one in each of Australia, Mexico, Germany and Sweden. It is important to note that some of these studies reviewed and/or combined the findings from a number of published studies, so each study's findings were not necessarily specific to its country of origin. ‣ The majority (37) of studies were of offenders who have committed exclusively online CSE offences, with only 10 examining non-online CSE offences and three covering both online and 'offline' offences; very limited knowledge was obtained regarding other types of CSE, such as CSE perpetrated within groups and gangs; offences such as human trafficking for, or resulting in, sexual exploitation; and the purchasing of sexual contact. This limits the extent to which the review's findings and observations can be generalised. ‣ Across the studies there were many methodological limitations such as inconsistencies in the definition of CSE, comparisons between groups of sexual offenders only (with a lack of other offender or non-offender control groups), lack of typical or normative data comparisons, and reliance on correlational data. These limit the potential to draw conclusions about causal influences. ‣ Perpetrators were generally identified as male, white and aged between 18 and 85 years (with the average age in individual studies ranging from 30 to 46 years); a high proportion were employed, with a large number of these in professional jobs. ‣ Mental health characteristics and psychological characteristics (personality traits) were examined only in relation to online CSE offences, and no research examined them in relation to other forms of CSE, e.g. CSE perpetrated in gangs or groups. ‣ In relation to online CSE, owing to methodological challenges and insufficient research it is impossible to isolate specific mental health or psychological characteristics that have a causal relationship with this type of offence. However, factors such as depression, anxiety, stress and suicidal ideation are most likely to be relevant. ‣ The evidence is weaker for psychological characteristics being associated with CSE; however, some attachment styles (e.g. not securely attached, fearful attachment) were associated with this group, and the formation of relationships appeared to be problematic. ‣ There was limited research that identified the motivations of CSE perpetrators; the studies that did so were generally those looking to develop typologies and categories of online offenders. The two key motivations found were sexual and financial. ‣ There was no research that specifically identified the way that perpetrators targeted/ exploited their victims, beyond explaining the context within which the exploitation occurred (i.e. online exploitation, gangs or trafficking/commercial dealings). It may be that such information could be located within the literature on victim-survivors, but including and analysing research on victim-survivors was beyond the scope of the current review. Implications and recommendations There is very little reliable information about the characteristics of individuals who perpetrate CSE offences, particularly those who do not commit offences in or using online environments. This significantly limits our ability to identify potential offenders and situations to target and design prevention strategies. More research is required to fully understand the characteristics and motivations of CSE perpetrators. That research will need to: ‣ have consistency and clarity regarding the definition of this type of offending and the different contexts within which it occurs ‣ use methodological research designs that allow differences and causal pathways to be reliably identified - for example, including appropriate non-offender control groups, longitudinal methods and large sample sizes (although this may be unrealistic, as studies are generally based on small, convicted samples by necessity)

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 40p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 2: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%202%20-%20Characteristics%20and%20motivations%20of%20perpetrators%20of%20CSE.pdf

Year: 2018

Country: International

URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%202%20-%20Characteristics%20and%20motivations%20of%20perpetrators%20of%20CSE.pdf

Shelf Number: 149210

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Intervention Programs
Pornography
Sex Offender Treatment
Sex Offenders
Social Media

Author: Hackett, Simon

Title: Young people who engage in child sexual exploitation behaviours: An exploratory study

Summary: Despite increasing awareness of child sexual exploitation (CSE) across the UK in recent years, there remain gaps in current knowledge and understanding - including in relation to young people who perpetrate acts of CSE. In contrast to the wider research base for harmful sexual behaviour (HSB) in childhood and adolescence, which has developed significantly in recent years, there is little in the literature specifically on the topic of young people who engage in sexually exploitative behaviours. This report describes one of three research projects commissioned by the Centre of expertise on child sexual abuse to build an evidence base about perpetrators of CSE. The project aimed to investigate: - the backgrounds of young people identifi ed for CSE concerns as perpetrators - the nature and range of their sexual behaviours - the range of victims targeted - other off ending behaviours displayed by the young people. Method Anonymised data was obtained from electronic records held by a police-led, multiagency initiative which focuses on CSE and on missing children. Consisting of 14 cases, the data are a convenience and non-probability sample which represent a significant minority of the cases becoming known to this 'CSE team' over a 24- month period where an alleged perpetrator was under the age of 18 at the point of their harmful or exploitative sexual behaviours. This study therefore drew only on existing secondary data already available to the CSE team; it was beyond the study's scope to conduct interviews with professionals involved in the cases, or with the young people and their families directly. The electronic records contained considerable and detailed information compiled by a wide range of agencies over a substantial period of time. Key fi ndings Because of the small sample size and the reliance on official case records which may be partial and limited, the following findings should be regarded as at best indicative. - All young people in the sample were male and white British. - Their current age ranged between 14 and 21 years old, with the overwhelming majority aged over 16; this is an older sample than many reported in the literature on HSB. Their age at the point when concerning sexual behaviours fi rst emerged ranged from 7 to 18 years old; in contrast to other demographic studies of young people with HSB, which have indicated substantial early-onset trajectories, only one case indicated a pattern of pre-adolescent sexual behaviour problems. - Experiences of adversity were found in the developmental histories of 10 of the 14 young people. The most commonly reported factor was domestic violence, followed by physical and sexual abuse and neglect. Previous studies of young people with HSB have reported higher rates of previous victimisation. - Twelve of the young people had longstanding non-sexual off ending histories: theft, burglary, criminal damage and general antisocial behaviours were extensive and pervasive. All the young people appear to fi t the 'generalist' category of HSB off ender, whose sexual off ending appears to be more directed towards peers as part of a broader catalogue of deviance and non-sexual off ending trajectories. - A model proposed by Ward and Siegert (2002) describes fi ve primary developmental pathways leading into sexually abusive behaviours. Many of the young people in the sample appear to fi t into the antisocial thinking pathway, where an underlying propensity towards general deviance and antisocial behaviour becomes sexualised during puberty. - In all cases, the concerns about young people's sexual behaviours related to a young person off ending alone or to pairs of young people whose behaviours appeared interlinked and inter-infl uenced. There were no 'gang-related' or larger group incidents of HSB or CSE. - Whilst all 14 young people had targeted female victims, only one was known to have sexually off ended against a male (in addition to multiple female victims). HSB towards teenage peers was preceded in only three cases by sexual abuse of prepubescent children. Previous research into young people's HSB has identifi ed signifi cant proportions of male victims and victims aged 10 or below. - The young people were typically involved in multiple and in some cases escalating harmful sexual behaviours: nine engaged in exploitative or harmful sexual behaviours online or using social media, accompanied in most cases by contact sexual exploitation or sexual abuse. There was not strong evidence of a clear progression from online to offl ine HSB: it was just as likely for offl ine HSB to precede online behaviours. Implications and recommendations The impression gained from this pilot study is of young people who engage in CSE behaviours as a generally very deviant group whose sexual and non-sexual behaviours are disinhibited, chaotic and non-boundaried. The small scale of this study, and the use of data from one team with a particular focus and operating model, limits the conclusions that can be drawn; nevertheless, the study's tentative findings should be investigated in more detail. In some of the cases examined, it was possible to see a progression from sexual assaults or sexually abusive behaviour without overt elements of exchange towards more 'CSEtype' behaviours over time. It may be that CSE-type behaviours in adolescence, much more so than more general HSB, are more strongly related to general deviance than a history of sexual victimisation; if so, this has significant implications for both intervention approaches and prevention activities. However, it was difficult to separate the young people's behaviours meaningfully and neatly into categories of CSE and HSB. Whilst all cases fitted widely used definitions of HSB, the extent to which they are accompanied by overt elements of exchange (as would fit the definition of CSE) was much less clear in many cases. The sexual behaviours of all the young people in the sample required disruption, management and intervention - but it is unclear whether that should be undertaken by a CSE team or an HSB team. This perhaps reflects the present inadequacy of using distinct sets of language and concepts (CSE and HSB) and service frameworks to respond to the problem of transgressive sexual behaviour in adolescence.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 24p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 1: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%201%20-%20Young%20people%20who%20engage%20in%20CSE%20behaviours.pdf

Year: 2018

Country: International

URL: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%201%20-%20Young%20people%20who%20engage%20in%20CSE%20behaviours.pdf

Shelf Number: 149211

Keywords:
Child Pornography
Child Sex Offenders
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Intervention Programs
Sex Offender Treatment
Sex Offenders

Author: Radford, Lorraine

Title: A review of international survey methodology on child sexual abuse and child sexual exploitation

Summary: This review was commissioned by the Centre of expertise on child sexual abuse to inform its work on improving data currently collected in England and Wales. Unlike previous reviews which have looked at findings on prevalence rates within and across different countries, this study looked at differences in self-report survey methodologies to research rates of victimisation and perpetration. The aims of the review were to: - identify methodologically different surveys undertaken in countries outside England and Wales that specifically focus on, or include, child sexual abuse (CSA) - identify questions used in surveys to assess the scale and nature of CSA - including any questions regarding child sexual exploitation (CSE), and those exploring abuse or grooming that takes place online - and comment on their relative effectiveness - explore the survey methods used, and identify what worked well in achieving a good response rate - explore the sampling strategies used, including any use of booster samples to reach underrepresented or identified vulnerable groups - identify questions, survey methods and sampling strategies used to explore potential and actual perpetration of CSA - discuss what identified good practice would be replicable in the UK context, and to what extent this would allow comparisons to be made across countries.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 66p.

Source: Internet Resource: Accessed February 22, 2018 at: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/

Year: 2018

Country: International

URL: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/

Shelf Number: 149212

Keywords:
Child Grooming
Child Pornography
Child Sex Offenders
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Sex Offender Treatment
Sex Offenders

Author: Kaur, Kam

Title: Local commissioning of services addressing child sexual abuse and exploitation in England

Summary: On behalf of the Centre of expertise on child sexual abuse, Cordis Bright undertook an independent review in spring 2017 of how child sexual abuse and exploitation (CSA/CSE) services were commissioned in five local areas in England. The review sought to clarify local approaches developed through local authorities, health and wellbeing boards, Offices of the Police and Crime Commissioners (OPCCs), NHS England and clinical commissioning groups (CCGs). It aimed to identify challenges, weaknesses and strengths in current local commissioning which might be of broader interest. Commissioners' views were also sought on the support they were looking for, including how the Centre of expertise might help. Following a review of the literature, Cordis Bright conducted interviews with 30 commissioners, commissioning partners, service providers and local practitioner experts across the five local areas. In view of the link with CSA/CSE, harmful sexual behaviour (HSB) was included in the review as it progressed. Limitations The review was a rapid research exercise informed by evidence from five sites. Whilst these sites provide a degree of diversity, the findings will not fully reflect experiences in all locations in England, and do not incorporate experiences in Wales. The findings reflect a point in time (spring 2017) and should be considered with reference to emerging developments which may influence change, such as the impending release by the NHS of its strategy on sexual abuse. The review focused on local commissioning and does not provide direct insight into centralised commissioning processes. However, some of its findings may be useful to decision-makers in that context. Findings The findings, drawn from the interviews, are summarised thematically here. A key caveat to the findings is the fact that the fieldwork was limited to five local authority areas in England. A theme underpinning many of the findings, and reported in all five areas, is the impact of the current economic climate on local service provision. Stakeholders reported that local commissioners' budgets are diminishing, as is the independently generated income of voluntary and community sector (VCS) service providers. Commissioning challenges Local commissioners were said to face a number of common challenges: - The high profile accorded to CSE by central government has been beneficial, but has not yet been extended to CSA and HSB. - Whilst CSE service commissioning practice appear well-developed, CSA and HSB services are not commissioned (or delivered in-house) with the same transparency and robustness. - The use of short-term contracts (usually lasting three years) limits VCS partnership/investment opportunities. - Good commissioning partnerships (with other commissioners or the VCS) will require a significant amount of investment to develop and maintain. - Cuts to commissioning teams limit the scope and quality of commissioning activity. - There needs to be more detail on CSA/CSE and HSB, including online elements of abuse, in local population needs assessments. - Health bodies and schools are not always seen by others as engaged as full partners in the commissioning of local CSA/CSE and HSB services. - There is no quality assurance framework to ensure that schools have appropriate safeguarding care pathways or commissioned CSA/CSE/HSB response services. - There is no consensus on good outcomes measurement - in particular focusing on 'distance travelled' for an individual (emotional wellbeing, improvement in relationship with family and friends, access to positive alternative activities and engagement in learning) - for CSA/CSE and HSB services. Stakeholders wanted: - CSA and HSB to be included in CSE commissioning governance, reported as usually being overseen by the Director of Children's Services and a local safeguarding children board (LSCB) subgroup - mental health trusts to have in place governance and partnership arrangements focusing on CSA/ CSE recovery - more focus from the OPCCs on children and young people, including funding for the vital role of sexual assault referral centres (SARCs) - all areas to have an explicit, integrated CSA, CSE and HSB strategy - national CSA/CSE and HSB commissioning guidance which minimises contract-monitoring activity. Gaps in commissioned services Local areas expressed concerns including the following: - There has been a significant reduction in prevention services for CSE and HSB. More investment is required from schools, public health budgets and CCGs. - There has not been any CSA prevention work. - There has been a significant reduction in school nursing services. Nurses have been a key contact for identification/disclosure of CSA/CSE. - Responding to online abuse needs to be included in local CSA/CSE and HSB services. - The regionalisation of the SARCs may be supported on medical grounds, but has increased travel time for children and young people. Additionally, more follow-up counselling support sessions funded through SARCs are needed. - There is a significant shortfall in follow-up or recovery services for children who have experienced CSA/CSE and/or HSB. Where budgets are not protected for existing services, the services risk losing the flexibility needed for victims to disclose and recover. - Transition from children's to adults' services is difficult for survivors of CSA and CSE. - The volume of HSB is growing, but services are reducing.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 56p.

Source: Internet Resource: Accessed February 22, 2018 at: https://www.csacentre.org.uk/research-publications/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-england/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-england/

Year: 2018

Country: United Kingdom

URL: https://www.csacentre.org.uk/research-publications/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-england/local-commissioning-of-services-addressing-child-sexual-abuse-and-exploitation-in-en

Shelf Number: 149216

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Intervention Programs
Sex Offender Treatment
Sex Offenders
Sexual Assault

Author: May-Chahal, Corinne

Title: Rapid Evidence Assessment: Rapid Evidence Assessment Characteristics And Vulnerabilities Of Victims Of Online Facilitated Child Sexual Abuse And Exploitation

Summary: This report considers the evidence about children's characteristics, vulnerabilities and resilience to online-facilitated child sexual abuse (CSA). Online-facilitated CSA refers to the process of establishing/building a relationship with a child either in person or using the Internet or other digital technologies to facilitate either online or offline sexual contact with that child. The report has been commissioned by the Inquiry into Child Sexual Abuse (IICSA or 'the Inquiry'). The aim of 'the Inquiry' is to investigate whether public bodies and other non-state institutions have taken seriously their responsibility to protect children from sexual abuse in England and Wales, and to make meaningful recommendations for change, to help ensure that children now and in the future are better protected from sexual abuse. The Inquiry has launched 13 investigations into a broad range of institutions. One of the investigations focuses on the institutional responses to child sexual abuse and exploitation facilitated by the Internet. This is referred to as the internet investigation. The internet investigation is exploring the nature and extent of the use of the internet and other digital communications technology to facilitate child sexual abuse. This report answers the primary question: what is known about the characteristics, vulnerabilities and on- and offline behaviour of victims of online-facilitated child sexual abuse and exploitation?

Details: Lancaster, UK: Lancaster University, 2018. 114p.

Source: Internet Resource: Accessed February 28, 2018 at: https://www.iicsa.org.uk/document/rapid-evidence-assessment-characteristics-and-vulnerabilities-victims-online-facilitated

Year: 2018

Country: International

URL: https://www.iicsa.org.uk/document/rapid-evidence-assessment-characteristics-and-vulnerabilities-victims-online-facilitated

Shelf Number: 149280

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Internet Crimes
Online Victimization
Social Media

Author: Wager, Nadia

Title: Rapid Evidence Assessment Quantifying The Extent Of Online-Facilitated Child Sexual Abuse

Summary: This rapid evidence assessment (REA) examines what is known about the scale of online-facilitated child sexual abuse (CSA). It was commissioned by the Independent Inquiry into Child Sexual Abuse (IICSA), which is investigating whether public bodies and other non-state institutions have taken seriously their duties to care for and protect children and young people from child sexual abuse and exploitation. This research informs IICSA's investigation into institutional responses to child sexual abuse and exploitation facilitated by the internet (referred to as the internet investigation). The specific objectives were:  to identify and appraise the measures currently available in England and Wales, and internationally, that could contribute to quantifying the scale of online CSA  to consider what each of these measures say about the scale of online CSA  to identify and appraise the range of data sources that are available for quantifying the scale of online CSA  to identify gaps in the existing literature. 3 A rapid evidence assessment is a structured way of searching for, assessing the appropriateness of, and synthesising a large body of evidence in a very short time frame. It is less rigorous than a full systematic review and therefore does not provide a fully comprehensive summary of the evidence base. This should be borne in mind when considering the findings. Additional challenges taken into account during the review of the 99 articles and reports covered were dealing with the breadth of definitions used, and the constant changes in technology.

Details: Huddersfield, UK: University of Huddersfield, Secure Societies Institute, 2018. 184p.

Source: Internet Resource: Accessed February 28, 2018 at: https://www.iicsa.org.uk/document/rapid-evidence-assessment-quantifying-extent-online-facilitated-child-sexual-abuse

Year: 2018

Country: United Kingdom

URL: https://www.iicsa.org.uk/document/rapid-evidence-assessment-quantifying-extent-online-facilitated-child-sexual-abuse

Shelf Number: 149281

Keywords:
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Internet Crimes
Online Victimization
Social Media

Author: Davidson, Julia

Title: Enhancing Police and Industry Practice: EU Child Online Safety Project

Summary: This report draws together the findings from the European Child Online Safety Project which was funded by the European Commission ISEC fund. The project was led by Professor Julia Davidson Middlesex University, UK with partners from University of Tilburg, Netherlands; University of Kore, Enna, Italy; Cyberpsychology Research Centre, Royal College of Surgeons; and the Geary Institute, University College Dublin, Ireland; and FDE Institute of Criminology, Mantova, Italy. The project sought to draw together the evidence base on online offender and victim behaviour including: - online grooming; - possession, collection and distribution of indecent child images; - Identification of policing and industry best practice in prevention. The project also sought to promote cooperation between law enforcement and industry in developing and disseminating good practice models in the area of online CSA. Through collaboration, this will ultimately assist practitioners and professionals: - To develop effective prevention techniques; - In early detection and deterrence; - With the provision of valid and recent research. The project had three primary and interdependent objectives: 1. Link project specific risk characteristics with other risk factors for grooming, like risk-taking and sexual orientation concerns; 2. Creation of victim typologies of cyber-grooming to assist with identification of vulnerable individuals and groups; 3. Development of 'Best Practice' guidelines for industry and law enforcement in the identification and prevention of online childhood sexual abuse.

Details: 168p.

Source: Internet Resource: Accessed March 8, 2018 at: https://www.mdx.ac.uk/__data/assets/pdf_file/0017/250163/ISEC-report-FINAL.pdf

Year: 2017

Country: Europe

URL: https://www.mdx.ac.uk/__data/assets/pdf_file/0017/250163/ISEC-report-FINAL.pdf

Shelf Number: 149405

Keywords:
Child Grooming
Child Pornography
Child Protection
Child Sexual Abuse
Online Victimization
Social Media

Author: Interpol

Title: Towards a Global Indicator on Unidentified Victims in Child Sexual Exploitation Material: Technical Report

Summary: This report presents the results of a two-part analysis of the multi-country data set contained in the International Child Sexual Exploitation (ICSE) Database housed at INTERPOL and of consultations with law enforcement personnel in relation to the identification of victims and offenders pictured in Child Sexual Abuse Material (CSAM) and Child Sexual Exploitation Material (CSEM) seized by law enforcement around the world. It forms one component of a larger programme of the ICSE Database enhancement activities financed by the European Union and carried out between 2016 and 2018 under the title International Child Sexual Exploitation (ICSE) database Connectivity and Awareness Raising Enhancements (I-CARE) Project. A ground-breaking cooperation between INTERPOL and ECPAT International, the study is broader in country coverage and possibly in other dimensions than any other previously analysed and publicly reported on. It responds to widespread recognition of the scarcity of reliable data and research on CSAM and CSEM to inform evidence-based policy and programmes to tackle the issue and protect children from online sexual exploitation and abuse across the world. It highlights the urgent need to develop representative international baselines of empirical data on the victimisation of children depicted in CSAM and CSEM, and to enhance the response by law enforcement agencies around the world to this problem. The analysis has been subject to a number of legal, institutional and ethical conditions, which have been duly and carefully considered, and which have been addressed in the exercise. Taken together, a comprehensive perspective on the overall database contents, and a mix of quantitative and qualitative findings from a selected sample of observations, has produced a broad range of findings, whose statistical validity has been confirmed by an expert reviewer. The study provides insight based on visual analysis of images and videos into the profile of unidentified child victims and their abusers, including age, gender, and type and severity of abuse, and further presents the results of analysis of case-related metadata for cases recorded as both identified and unidentified in the ICSE Database. It highlights the multi-faceted challenges presented to the law enforcement and child protection community by rapid evolutions in the means available for online child exploitation and abuse as a distinct subset of child sexual abuse and exploitation, and the increasingly complex role played by youth-produced sexual content in this landscape. Through analysis of confirmed and suspected locations of abuse as recorded in the ICSE Database, the study also considers the relationship between resource allocation for victim identification and rates of identification worldwide. The study acknowledges that there are qualitative limitations inherent in the multi-country and multi-user data set of the ICSE Database, but also highlights the unique nature of the data set resulting from this diverse user base. This in turn underlines the distinctive position and potential of the ICSE Database for further technological evolutions, country connections, and as a tool in victim identification efforts, and reinforces the usefulness the ICSE Database for further research and as focal point for future efforts to build a global indicator.

Details: Bangkok: ECPAT, 2018. 104p.

Source: Internet Resource: Accessed March 16, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/02/Technical-Report-TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL.pdf

Year: 2018

Country: International

URL: http://www.ecpat.org/wp-content/uploads/2018/02/Technical-Report-TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL.pdf

Shelf Number: 149496

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Online Victimization
Sex Trafficking

Author: ECPAT International

Title: Regional Overview: The Sexual Exploitation of Children in Southeast Asia

Summary: Southeast Asia has a booming economy and is undergoing impressive growth in a number of sectors. For example, the region has one of the world's fastest growing internet markets, currently with 260 million users and a projected 480 million users by 2020. Mobile connections account for 130% of the population. The continued growth of international arrivals in the region is largely due to increasing numbers of intra-regional and inter-regional tourists and travelers. According to data of the UNWTO, Thailand recorded the world's highest growth in international tourist receipts in 2016. Such developments should result in positive changes in the lives of children - and indeed, significant progress has been made on a number of child rights indicators in the region. Nevertheless there is a dark and disturbing downside to this growth. The proliferation of the internet and related communication technologies has significantly expanded opportunities for child sex offenders to plan their travel, to communicate anonymously with other child sex offenders, to access, produce and disseminate child sex abuse images, and to engage in online sexual encounters with children without them even having to leave their homes. As technology evolves, forms and modus operandi of exploitation also evolve. The rapid growth in travel and tourism increases the number of children vulnerable to sexual exploitation. In the pursuit of economic development, a number of Southeast Asian countries have allowed large-scale foreign investment in tourism and other sectors and the proliferation of Special Economic and Free Trade Zones. These positive economic developments often are accompanied by the building of casinos and entertainment venues including bars and brothels, which can be high-risk locales for children. This report highlights both the domestic and international dimension of the sexual exploitation of children. The vast majority of child sex offenders in Southeast Asia are nationals of the countries of the region, the victims primarily girls. Yet emerging evidence also suggests that a considerable numbers of boys are abused and that foreign child sex offenders are increasingly accessing children through voluntary or professional positions in schools, orphanages, and child care centres

Details: Bangkok: ECPAT, 2017.

Source: Internet Resource: Accessed March 16, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/02/Regional-Overview_Southeast-Asia.pdf

Year: 2017

Country: Asia

URL: http://www.ecpat.org/wp-content/uploads/2018/02/Regional-Overview_Southeast-Asia.pdf

Shelf Number: 149499

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation
Internet Crime
Online Victimization
Sex Tourism
Sex Trafficking

Author: ECPAT International

Title: Regional Overview: Combating The Sexual Exploitation of Children in South Asia: Evolving Trends, Existing Responses and Future Priorities

Summary: This report offers an overview of the sexual exploitation of children (SEC), including in its commercial forms (CSEC), as it emerges in the eight countries that form South Asia - Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan and Sri Lanka - and are members of SAARC, the South Asian Association for Regional Cooperation. A special focus is placed on three manifestations characterising the regional context, namely, online child sexual exploitation (OCSE), SEC in travel and tourism (SECTT) and SEC in child, early and forced marriage (CEFM). Research studies and regular data generation on issues relating to child sexual abuse and exploitation are scanty in the region because of the cultural sensitivity around the problem and lack of regular programme monitoring systems. This study seeks to offer an overview of the situation of children at risk or victims of SEC on the basis of existing evidence by - Exploring emerging socio-economic drivers compounding the problem; - Analysing the main manifestations of SEC in the specific regional context; - Reviewing the policy and legal responses that enable or, to the contrary, hinder child protection and safety, further calling attention to persisting gaps; and - Finally proposing a set of actions necessary to move forward in the fight against sexual violence against children in South Asia. In 2014, ECPAT had produced a similar document titled The Commercial Sexual Exploitation of Children in South Asia. Developments, Progress, Challenges and Recommended Strategies for Civil Society. The present situation analysis not only provides an update of the earlier study, but also a new perspective on the problem. It investigates the various issues relating to SEC from the point of view of a society taking a new development path and undergoing a phase of fast and profound transformation. The point of observation is that of a complex change encompassing substantial economic growth, rapid urbanisation and migration. Increased wealth and mobility, together with the fast penetration of information and communication technologies, are offering unprecedented opportunities to the young generations of South Asians and opening new windows on the rest of the world. The same transformations, however, also expose young people to the risks typically associated with modern living, lifestyles and worldviews. Section 1 of the report, the Introduction, seeks to sketch the backdrop against which SEC is occurring in South Asia as the new does not necessarily replace the old, but rather leads to a stratification of pre-existing and recent manifestations of sexual abuse, exploitation and violence. South Asia is a land of contrasts. As the region is poised to become, with the rest of Asia, the largest global market of the future, a sizeable portion of its population still lives in subsistence economies and traditional communities. The region ranks at the very top globally in a number of significant areas. Economically, South Asia is the fastest growing region worldwide; socially, it is leading the urbanisation of the planet (with the rest of Asia and Africa); and technologically, India alone is one of the three markets with the highest numbers of mobile accounts among young people in the South of the world. However, despite such impressive progress, globally the region still accounts for the largest concentration of people living in absolute poverty; displays some of the worst human development outcomes in areas such as healthcare, schooling and per capita expenditure or income; hosts the majority of modern slaves trapped in forced prostitution, forced marriage, forced labour and organ trafficking; is home to the largest number of child brides and child labourers; is responsible for the bulk of the out-of-school children (together with West Asia and sub-Saharan Africa); and, jointly with Sub-Saharan Africa, accounts for over three quarters of child deaths caused by climate change in recent decades. If history is any guide, the constantly growing size and speed of human and financial flows in the absence of adequate protection policies for vulnerable populations may lead to a hike in sexual violence against children in the future. Research activities in the realm of SEC will need to increasingly focus on such influential trends to analyse how systemic change may impact the safety and protection of children by transforming the root causes of child abuse. Within this backdrop, Section 2 analytically reviews several manifestations of SEC as these emerge in a number of settings such as - Information and communication technologies, whose penetration in South Asia has been growing at a substantially faster pace than other kinds of infrastructure and services necessary for human development, while also, in parallel, rapidly multiplying risks relating primarily to the creation and trade of child sexual abuse material by perpetrators displaying a sexual interest in children, and to sexual harassment and extortion of children online by perpetrators generally known to the victims; - Travel and tourism, in the context of rising trends in international tourist arrivals, matched with a steady increase in domestic travellers who can now reach out to children in novel settings such as homestays or childcare institutions; - Child, early and forced marriage (CEFM), which local cultures may view as a form of protection from sexual harassment for adolescent girls rather than as a condition that can expose girls and women to life-long systematic sexual violence; - Child trafficking still persisting in South Asian countries, despite efforts in this area having been more systematised and institutionalised than in others over time; - Sexual exploitation of children (SEC), continuing in the context of the traditional sex trade and now evolving in technology-facilitated forms; - Child labour, often unrecognised as a vast reservoir for sexual exploitation, but in fact being a major channel to SEC, especially in certain occupations, such as domestic labour, widespread across South Asia; and - Humanitarian crises, conflicts and environmental disasters, which dramatically exacerbate the pre-existing vulnerabilities of children and weaken the capacity of poor communities to protect their families. Section 3 reviews existing legal, policy and programme responses being implemented at local, national and regional levels to address SEC in the areas highlighted in the previous section, while also seeking to identify major gaps and challenges. All South Asian countries have ratified the UN Convention on the Rights of the Child and the Optional Protocol to the Convention on the sale of children, child prostitution and child pornography (OPSC), in addition to other important regional instruments (such as the SAARC Convention on Preventing and Combatting Trafficking in Women and Children for Prostitution, and the SAARC Convention on Regional Arrangements for the Promotion of Child Welfare in South Asia). However, the Palermo Protocol on Trafficking in Persons has been fully ratified by only Afghanistan, India, Maldives and Sri Lanka, while none of the SAARC countries has so far developed national legislation harmonised with the OPSC, specific laws addressing issues such as SECTT or OCSE, or substantive extraterritorial jurisdiction. Progressive policies have been designed in the areas of protection of children from sexual offences, trafficking, child labour and early marriage by most countries in the region, while initial attempts have been made to respond to online threats, mainly by setting up webbased portals aimed at spreading information on child trafficking, tracking down trafficked and missing children, and supporting confidential reporting. Lack of proper awareness, implementation and enforcement, however, emerges as the main challenge with regard to the implementation of policies and laws. In addition to efforts by governments, the growing South Asian private sector has also started contributing proactively, especially by adopting more stringent corporate social responsibility (CSR) guidelines. Its involvement in the realm of SEC, however, remains rather limited, especially with reference to the ICT and travel and tourism industries whose role in preventing harm by online and travelling child sex predators would be particularly relevant. Civil society organisations continue to play a key role in the fight against the various manifestations of SEC, although the scope of their interventions may be normally limited to the local level and not always receive adequate support or recognition by the government. Children's and young people's groups have become more active in combatting SEC, even though they need more opportunities to access sexuality education, enhance awareness about online and offline threats, and gain further agency. An important platform for coordination among the various partners involved is the South Asia Initiative to End Violence Against Children (SAIEVAC), a SAARC Apex body acting, since 2005, as an inter-governmental mechanism committed to promoting the rights and protection of children at the regional level. Especially relevant in the context of SEC has been the recent 4th SAIEVAC Ministerial Meeting, held from 9-11 May 2016 in New Delhi, which led to a joint commitment by SAARC Member States to frame a region-wide strategy with the aim of tackling the sexual of children, especially online, through trafficking, and in travel and tourism.

Details: Bangkok: ECPAT, 2017. 168p.

Source: Internet Resource: Accessed March 16, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/03/Regional-Overview_South-Asia.pdf

Year: 2017

Country: Asia

URL: http://www.ecpat.org/wp-content/uploads/2018/03/Regional-Overview_South-Asia.pdf

Shelf Number: 149500

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sex Tourism
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes

Author: Smahel, David, ed.

Title: The meaning of online problematic situations for children: Results of qualitative cross-cultural investigation in nine European countries

Summary: Young people are currently surrounded by digital technologies, and through these technologies they experience a variety of positive, but also negative, situations (Livingstone, Haddon, Gorzig, & Olafsson, 2011). The unique pan-European survey of EU Kids Online II (2009-11) offered insights into how often and what types of harm children experienced in the following online risks: cyberbullying, exposure to sexual materials, sexting (sexual communication), meeting online strangers, personal data problems, seeing dangerous websites, and excessive internet use. EU Kids Online II also studied how children cope with some of these risks, and the effectiveness of parental mediation strategies to reduce these risks. Although there are several pieces of research studying specific online risks from qualitative perspectives (i.e., Parris, Varjas, Meyers, & Cutts, 2012; Sleglova & Cerna, 2011; Vandebosch & van Cleemput, 2008), most of the current research on online problematic experiences is quantitative, and aimed at understanding the prevalence, definitions and measurement, and the associated psycho-social consequences. But as we know, perceptions of risk differ for children and researchers (Cohn, Macfarlane, Yanez, & Imai, 1995). What researchers describe as "risky" is sometimes perceived as normal and not negative among young people. Therefore, this report introduces research from the EU Kids Online III (2011-14) studies on risks and online problematic situations from children's perspectives. We ask what children perceive as problematic on the internet, and the meaning of online problematic situations according to children. To fulfil this goal, we proposed qualitative investigations, where we took a children-centred approach and asked what children perceived as problematic on the internet. Using this approach, children spontaneously reported many different online situations, from the harmful and unpleasant to the neutral, as well as positive experiences. For example, meeting an online stranger in offline settings was typically a risk from the researcher's perspective, but from the children's perspectives, it was mostly seen as an online opportunity. Children's experiences with meeting strangers varied from very pleasant to harmful feelings. We therefore decided to avoid the term "risks," where children experienced a broad scale of different situations, and instead used the term "online problematic situations" to describe any unpleasant, bothering, or harmful situations on the internet. We proposed the following definition of problematic online situations: "encompassing a broad range of possible online behaviours and experiences that, together or individually, result in a disruption of relationships, values, daily obligations, and or mental or physical well-being" (Mitchell, Sabina, Finkelhor, & Wells, 2009, p. 707). Such a definition of online problematic situations is broader than the previously used term of "online risk," which is defined as the probability of harm (Livingstone et al., 2011). In this report, both terms are used in different contexts. Research presented in this report is based on focus groups and interviews with 368 children from the following nine countries: Belgium, the Czech Republic, Greece, Italy, Malta, Portugal, Romania, Spain, and the United Kingdom (UK). Teams from the EU Kids Online network voluntarily joined this comparative research. Therefore, the selection of countries is not the selection of coordinators, but instead a group of voluntary, cooperating research teams with one coordinator (David Smahel). As explained in Chapter 3: Methodology, we involved children from many different social and cultural backgrounds, and recorded a large variability of different perspectives and meanings of online situations. Nevertheless, this report intentionally does not include a special section on cultural comparisons across countries, because producing a systematic analysis of cultural factors remains difficult in qualitative research with relatively small samples. Despite this consideration, across this report possible observations about country differences have been made, including ones that draw on a background knowledge of specific countries. The emphasis of this report was on pooling the data from the countries in order to describe the range of online problematic situations, and coping and awareness of them, along with various mediational strategies. We believe that this pooled sample has generated enough material to provide a relatively comprehensive picture of the meaning and experience of online problematic situations for children in Europe. Research questions To understand children's meanings of online problematic situations and risks, we proposed the following research questions, which we answer in the chapters that follow in this report: - What do children perceive as being potentially negative or problematic when using the internet? - What online problematic situations and risks are children aware of? - What are the consequences of online negative experiences? - How do/would they react to it (including emotional reaction, behavioural reaction, opinion change etc.)? - What do/would children do to avoid or prevent these online problematic experiences? - What is the context for children's perceptions of certain situations as negative? - In which circumstances are certain situations perceived as negative? In which circumstances are other situations perceived as neutral or even positive? - What coping strategies work best from children's perspectives? - How do children evaluate situations that adults consider problematic? - How are children's negative experiences mediated?

Details: London: EU Kids Online, London School of Economics and Political Science, 2014. 171p.

Source: Internet Resource: Accessed March 23, 2018 at: http://eprints.lse.ac.uk/56972/1/EU_Kids_Online_Report_Online_Problematic_Situations_for_Children_June2014.pdf

Year: 2014

Country: Europe

URL: http://eprints.lse.ac.uk/56972/1/EU_Kids_Online_Report_Online_Problematic_Situations_for_Children_June2014.pdf

Shelf Number: 149543

Keywords:
Child Pornography
Child Sexual Abuse
Online Victimization
Prosecution
Sex Offenders
Sexting
Social Media

Author: Haddon, Leslie

Title: The meaning of online problematic situations for children: The UK report

Summary: The present report looks specifically at the experiences of the UK children who took part in that wider European project. Interviews and focus groups were used to collect children's data. The interview schedule for the research was tested in all participating countries. In the UK pilot interviews were conducted in January 2013 with primary and secondary school boys (aged 9-10 and 11-13 respectively). The European pilots indicated that the interview schedule was generally sound although some alterations were made to it in the light of the pilot feedback. In the UK the main interviews took place between March and September 2013 in four schools - two primary and two secondary. This consisted of interviews with two boys and two girls from each age group (9‐10, 11‐13, 14‐16), and one boys' and one girls' focus group from each of the three age bands, each group consisting of five people. There was one extra interview with a boy aged 9‐10. This made a total of 13 interviews and six focus groups - 43 children aged 9-16 years old altogether. The interviews, conducted by the authors, were fully transcribed and analysed for the present report. Since the UK research was part of a wider European project it followed the same procedures as in the other participating countries. Each point discussed in the interview was summarised in a comment box, and all the comments from the interview were imported into an Excel file. Here they received a secondary level of coding so that for each point made by a child it was clear whether and what ICTs were involved, whether and what risks were involved, who was being discussed, whether the theme was about activities, communication, mediation of some kind, etc. The coding meant that it was possible to search the Excel sheets by various criteria, whether looking into specific risks, preventative measures, coping strategies or parental mediation Parallel to this, main points for translation that related to previous project‐wide discussions of the whole area were marked and collated. In the other countries these observations by children were translated into English to make them accessible to all the other researchers when collectively writing the pan‐European report. In the UK, they were simply collated in the original English. When conducting the analysis, these points for translation often became the basis for the main quotations in this report, either because they summarised certain issues (more succinctly than some of the other children), captured ambivalences or demonstrated a theme well. The points for translation were used in conjunction with searches of the Excel sheet. The latter aimed to capture overall tendencies within the sample, the range of experiences and diverse examples of the same theme. When children are cited but not directly quoted, the material often comes from this second strand of analysis involving an overview of the interview material on any particular topic. The whole procedure had the effect that some children are quoted more, often reflecting the fact that they are either more articulate, more reflective or have more of certain kinds of experience. However, the overall content and conclusions of this report fully reflect the range and diversity of opinions and experiences expressed by all children interviewed in the project.

Details: London: EU Kids Online, London School of Economics and Political Science, 2014. 41p.

Source: Internet Resource: Accessed march 23, 2018 at: http://eprints.lse.ac.uk/60514/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_EU%20Kids%20Online_EU%20Kids%20Online_Meaning%20of%20online%20problematic%20situations-UK%20report_2014.pdf

Year: 2014

Country: United Kingdom

URL: http://eprints.lse.ac.uk/60514/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_EU%20Kids%20Online_EU%20Kids%20Online_Meaning%20of%20online%20problematic%20situations-UK%20report_2014.pdf

Shelf Number: 149545

Keywords:
Child Pornography
Child Sexual Abuse
Online Victimization
Prosecution
Sex Offenders
Sexting
Social Media

Author: DeMarco, Jeffrey

Title: Behaviour and Characteristics of Perpetrators of Online-facilitated Child Sexual Abuse and Exploitation: A Rapid Evidence Assessment

Summary: - The Independent Inquiry into Child Sexual Abuse: The primary remit of the Independent Inquiry into Child Sexual Abuse (IICSA) is to explore how public bodies and other non-state institutions in England and Wales have handled their duty of care in protecting children from sexual abuse. One of the investigations focuses on the institutional responses to child sexual abuse (CSA) and exploitation facilitated by the internet. This is referred to as the Internet Investigation. - ICT and CSA: Evidence suggests that all perpetrators of online-facilitated CSA have broadly been using information and communication technology (ICT) to commit child abuse since the late 1980s. - Research aims and objectives: IICSA commissioned this rapid evidence assessment as part of its investigation into the internet and CSA. Its aim was to answer the question: 'What is known about the behaviour and characteristics of people who sexually abuse or exploit children, where such abuse is facilitated by the internet?' Research aims and objectives - In responding to the primary research question listed above, the rapid evidence assessment considered how perpetrators use specific technologies to offend and how the availability of these technologies influences perpetrators' behaviour, how perpetrators identify and target potential victims across forums, and what the key safeguarding challenges are for institutions raised by changing technologies and associated perpetrator behaviour. - The rapid evidence assessment also sought to identify evidence regarding emerging types of offences, including self-generated material in sexual solicitation, exploitation and abuse of children, sexual extortion, and offences in which self-generated sexual material shared freely online by children is identified and circulated by perpetrators with an interest in child sexual exploitation material. - Lastly, the rapid evidence assessment also aimed to capture information pertaining to children who perpetrate online-facilitated sexual abuse against peers, relationships between different types of offending, and pathways into offending. - The rapid evidence assessment was conducted in four stages: pilot, evidence selecting, evidence screening and evidence synthesising. - The findings from the above points are presented to best synthesise the information in responding to each one while considering the primary research question.

Details: London: NatCen Social Research, 2018. 85p.

Source: Internet Resource: Accessed March 23, 2018 at: https://www.iicsa.org.uk/document/rapid-evidence-assessment-behaviour-and-characteristics-perpetrators-online-facilitated

Year: 2018

Country: United Kingdom

URL: https://www.iicsa.org.uk/document/rapid-evidence-assessment-behaviour-and-characteristics-perpetrators-online-facilitated

Shelf Number: 149552

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Internet Crime
Online Victimization
Sex Offenders
Sexting

Author: WePROTECT Global Alliance

Title: Global Threat Assessment 2018: Working together to end sexual exploitation of children online

Summary: The Global Threat Assessment is the first of its type, both in terms of the broad stakeholder community that it draws from but also in its global vision to strengthen and further develop the international response to this growing and persistent threat. The report has been commissioned with the following aims: - raising international awareness of online child sexual exploitation (OCSE); - greater understanding of the threat and how it is evolving; - greater understanding of both the impact to victims and the wider societal impact of OCSE; - creating a baseline which can be used to monitor both the level of the threat and the positive impact that interventions are having on the offender population; - to provide evidence based examples to support members in making domestic and international decisions or investments. The WePROTECT Global Alliance to End Child Sexual Exploitation Online combines two major initiatives: the Global Alliance against Child Sexual Abuse Online, led by the US Department of Justice and the EU Commission, and WePROTECT, convened by the UK. This new, merged initiative has unprecedented reach, with 82 government members of the WePROTECT Global Alliance, along with major international organisations, 20 of the biggest names in the global technology industry, and 24 leading international and non-governmental organisations.

Details: s.l.: The Alliance, 2018. 36p.

Source: Internet Resource: Accessed April 28, 2018 at: http://www.africanchildinfo.net/index.php?option=com_sobi2&sobi2Task=sobi2Details&sobi2Id=1718&Itemid=142&lang=en

Year: 2018

Country: International

URL: http://www.africanchildinfo.net/index.php?option=com_sobi2&sobi2Task=sobi2Details&sobi2Id=1718&Itemid=142&lang=en

Shelf Number: 149945

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Online Victimization
Social Media

Author: Lee, Murray

Title: Sexting and Young People

Summary: Aim This project aimed to investigate the phenomenon of sexting by young people. This under-researched but emergent contemporary legal and social issue was examined through an inter-disciplinary and multi-method framework by asking the question: are the current legal and policy responses to sexting reflective of young peoples' perceptions and practices of sexting? As such, the research had three specific aims: 1. to document young people's perceptions and practices of sexting; 2. to analyse public and media discourse around sexting, and; 3. to examine existing legal frameworks and sanctions around sexting and develop recommendations for an appropriate and effective legislative policy response to the practice by young people. Method The project consisted of a three-stage research plan: 1. quantitative surveys and focus groups with young people regarding their views and experiences of sexting; 2. a media discourse analysis to capture the tenure of public discussion around sexting in Australia, and; 3. an analysis of existing laws and sanctions that apply to sexting in all states and territories in Australia. Results Our results indicate that a significant number of young people have engaged in the sending and receiving of sexually suggestive pictures (sexting). Indeed, 47% of young people surveyed reported engaging in such behaviour. However, both the types of activity and the frequency of the engagement varied dramatically amongst respondents. Furthermore, the vast majority of those who reported sending or receiving sexually suggestive images did so with only a small number of people and most commonly only with those they already had a romantic attachment. Focus group respondents indicated that they did not use the term sexting and saw it as an adult or media construct. Their knowledge about sexting relied heavily on media reports and high school curriculum. A range of motivations for sexting practices (both their own and their peers) were also identified, ranging from experimentation to peer pressure. Respondents tended to perceive that young people - particularly young women - feel pressure to exchange sexual images. On the other hand participants in sexting exchanges were much more likely to judge their behaviour positively, stressing the fun and flirtatious nature of sexting. Focus groups participants' also suggested the importance of an intersectional analysis (age, class and gender) in understanding and engaging with sexting practices, as well as the need to rethink criminal justice responses to sexting. The discourses that young people reported around sexting mirrored the findings of the media analysis, which showed that young peoples' sexting behaviours were an issue of growing concern in the Australian media. Sexting was framed in the media as a risky activity, with potentially far-reaching consequences for young people and their romantic and career prospects, not to mention the potential legal ramifications. Such media reporting has thus promoted a particular image of sexting as an activity that should be avoided by young people, and dealt with seriously by parents, educators, governments and the law. An analysis of the legal framework around sexting suggests that sexting has generally been framed as child pornography and that such offenses significantly outweigh young people's perceptions of the seriousness of most behaviours that might be defined as sexting. In Australian jurisdictions child pornography has a relatively broad definition, extended in recent decades in response to concerns that new technologies are fueling child pornography. In most jurisdictions there is little to legally hinder prosecution (aside from the general requirement of establishing sufficient understanding of wrongfulness on the part of 10 to 14 year olds (presumption of doli incapax), defenses to child pornography offenses for minors in certain situations in Tasmania and Victoria and the Attorney-General's permission being needed before prosecution of an under 18 year old can be commenced under the Commonwealth Criminal Code). It is therefore legally possible for young people to be prosecuted for child pornography offenses. Despite this it seems that prosecutions for child pornography offenses for sexting are rare in Australia and that discretion is widely used to divert young people from formal proceedings unless there are aggravating factors. Conclusion This project has found that the sending and receiving of sexually suggestive pictures by young people can have serious consequences. As well as the potential legal consequences for young people who take and/or circulate such images, there are a number of personal costs that young people engaging in this behaviour may face. These include the embarrassment or humiliation resulting from the dissemination of images, coercion through the threat of making an image public, the continuation of physical or psychologically abusive behaviours into the digital realm (cyberbullying), and the potential for such images to fall into the hands of pedophiles. More generally sexting can contribute to the reproduction of gendered power relations and double standards. Such negative consequences are reinforced by much of the media discourse on sexting. Nevertheless, the findings from this project suggest that such outcomes, as reported by young people themselves, are relatively rare. Indeed, the majority of young people, although certainly not all, who engage in sexting do so with a romantic partner in a climate of perceived mutual trust. Even though this trust might be thought of as fragile, the research shows it is not regularly broken. It should be noted that when such trust is broken and a third party is shown the image, it is more likely to occur in-person rather than through digital onsending - although of course this also happens.

Details: Canberra: Criminology Research Advisory Council, 2015. 86p.

Source: Internet Resource: Accessed April 30, 2018 at: http://crg.aic.gov.au/reports/1516/53-1112-FinalReport.pdf

Year: 2015

Country: Australia

URL: http://crg.aic.gov.au/reports/1516/53-1112-FinalReport.pdf

Shelf Number: 149968

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Online Communications
Sexting
Social Media

Author: Marsden, Hannah

Title: Journey to Justice: Prioritising the wellbeing of children involved in criminal justice processes relating to sexual exploitation and abuse

Summary: Barnardos supports children and young people through police investigations and prosecutions, yet there is little documentation of if and how this has helped young victims and witnesses, and in what ways. This evaluation was part of the Barnardos Voluntary Funding Strategy Research and Evaluation Plan on Child Sexual Exploitation (CSE). Helping young witnesses and victims through prosecutions also contributes to the long-term outcome within the organisations strategy on CSE: More sexually exploited children are supported to recover, with services, including those offered by Barnardos, improving and increasing to meet emerging and existing need. How the criminal justice system treats children and young people, and how this could be better, has historically been a key area of focus for Barnardos. For example, the Parliamentary inquiry (2014) into child sexual exploitation and trafficking in the UK, led by Barnardos, drew attention to many challenges and difficulties that the current system holds for young victims and witnesses. Barnardos specialist child sexual exploitation and abuse services are increasingly supporting young witnesses and victims through police investigations and trials. Helping children and young people with the challenges associated with going through an investigation or going to court has increasingly become part of a CSE practitioners role, and something that services offer alongside their core work. However, the support that is provided varies in its formality and scope depending on location and relationships with police and social care, warranting further learning and investigation. Wellbeing and support needs was one of six crucial themes identified by Beckett and In particular, it was argued, that more focus is needed on ensuring that victims and witnesses have access to advocacy, long-term and coordinated support by a single trusted individual and additional therapeutic support where desired by the child or young person. This study importantly added to the evidence base on experiences of children and young people through the criminal justice process, which has to date mostly highlighted how these experiences negatively affect victims. Less is known about what kind of support they wish to receive. Going through a police investigation and prosecution as a victim of exploitation or abuse is often described as inherently traumatic. This is because in addition to the trauma brought about by the experience of exploitation and abuse, through the process of a police investigation and trial, a child or young person must re-tell the experience, often multiple times, usually in an environment which is unfamiliar, intimidating and confusing to them. The process can be traumatic regardless of the outcome. A lot of evidence highlights how the justice system needs to change for young victims and witnesses in many ways, and thus this report provides a valuable insight into the needs and opinions of children and young people, their parents/carers, and police and practitioners who have been involved in police investigations and trials with Barnardos support. It is important that these voices are listened to when designing support for young witnesses and victim (those under 18 years of age). Work has been taking place within the criminal justice system to improve procedures and circumstances to suit very vulnerable young victims and witnesses. For example, in 2017 pre-recorded crossexamination will be rolled out in England and Wales, which is likely to change experiences significantly for witnesses and victims who would have previously been required to attend in person at court (either physically in court or through a live link room). Nevertheless there is still a lot to learn about what works for children and young people particularly in relation to receiving support from a single trusted individual and this report aims to contribute to filling this gap in knowledge.

Details: London: Barnardo's, 2017. 116p.

Source: Internet Resource: Accessed May 5, 2017 at: https://www.barnardos.org.uk/journey_to_justice_full_report.pdf

Year: 2017

Country: United Kingdom

URL: https://www.barnardos.org.uk/journey_to_justice_full_report.pdf

Shelf Number: 150088

Keywords:
Child Pornography
Child Prostitution
Child Protection
Child Sexual Abuse
Child Sexual Exploitation
Criminal Prosecutions
Police Investigations

Author: Internet Watch Foundation

Title: Trends in Online Child Sexual Exploitation: Examining the Distribution of Captures of Live-streamed Child Sexual Abuse

Summary: This Paper introduces the key findings of a study of the distribution of captures of live-streamed child sexual abuse which were publicly available online during 3 months in 2017 ("the Study"). The Study was carried out by Internet Watch Foundation (IWF) and funded by Microsoft. Over a three-month period between August and October 2017, images and videos meeting the research criteria were identified using a combination of leads from existing IWF data and techniques employed by IWF analysts to proactively locate child sexual abuse imagery being distributed online. The images and videos were then assessed in accordance with IWF's standard procedures for processing child sexual abuse imagery. Data captured in each instance included image category, site type, commerciality, hosting location, and the assessed age and gender of the individuals depicted. During the Study, 2,082 images and videos were assessed as meeting the research criteria. Key findings were: - 96% depicted children on their own, typically in a home setting such as their own bedroom. - 98% of imagery depicted children assessed as 13 years or younger. - 96% of the imagery featured girls. - 40% of the imagery was Category A or B. - 100% of the imagery had been harvested from the original upload location and was being redistributed on third party websites. - 4% of the imagery was captured from mobile-only streaming apps. - 73% of the imagery appeared on 16 dedicated forums with the purpose of advertising paid downloads of videos of webcam child sexual abuse. Key recommendations are: - Recognition of the need for awareness raising programs aimed at educating children and those in a parental role about the risks of live-streaming services; - Wider implementation of tools to tackle online distribution of child sexual abuse imagery by service providers; - Development of new services including video hashing technology to detect duplicate captures of live streamed child sexual abuse which have been redistributed online; - Recognition of legal loopholes facilitating distribution of child sexual abuse imagery and elaboration of policy proposals that can influence positive change. This paper sets out the limitations on the Study and makes recommendations for further research which can be undertaken to expand upon and clarify the findings. It is hoped that by raising awareness of this issue, a multi-agency approach can be taken to help protect children from the immediate and long-term effects of the distribution of permanent records of their sexual abuse.

Details: Cambridge, UK: IWF, 2018. 26p.

Source: Internet Resource: Accessed May 30, 2018 at: https://www.iwf.org.uk/sites/default/files/inline-files/Distribution%20of%20Captures%20of%20Live-streamed%20Child%20Sexual%20Abuse%20FINAL.pdf

Year: 2018

Country: United Kingdom

URL: https://www.iwf.org.uk/sites/default/files/inline-files/Distribution%20of%20Captures%20of%20Live-streamed%20Child%20Sexual%20Abuse%20FINAL.pdf

Shelf Number: 150409

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation
Internet Crimes
Sexting

Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Sexual Extortion and Nonconsensual Pornography

Summary: The rapid evolution of technology and the increasingly widespread use of the Internet, have changed the face of child sexual exploitation globally. Child sexual exploitation includes, but is not limited to: enticing, manipulating, or threatening a child into performing sexual acts in front of a webcam; grooming children online with the goal of sexually exploiting them; and distributing child sexual abuse material online.2 Sex offenders have become proficient in using technology to engage in child sexual abuse by utilizing the Internet as a vehicle to meet children in order to prepare them for sexual encounters, or even to target, manipulate, and lure them into sex trafficking. While the vulnerability of children to sexual predators is not new, the tools predators use and the language to describe various types of online child sexual abuse have changed remarkably. Two forms of online child sexual exploitation have emerged as pervasive threats to children's safety around the world: sexual extortion, commonly referred to as "sextortion," and nonconsensual pornography or nonconsensual sharing of intimate images, also often referred to as "revenge pornography."

Details: Alexandria, VA: The Centre, 2018.46p.

Source: Internet Resource: Accessed November 15, 2018 at: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Year: 2018

Country: International

URL: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Shelf Number: 153477

Keywords:
Child Grooming
Child Pornography
Child Protection
Child Sexual Exploitation
Online Child Sexual Abuse
Revenge Pornography
Sextortion
Social Media

Author: Kruisbergen, Edwin W.

Title: De digitalisering van georgansieerde criminaliteit

Summary: Justitiele verkenningen (Judicial explorations) is published six times a year by the Research and Documentation Centre of the Dutch Ministry of Security and Justice in cooperation with Boom juridisch. Each issue focuses on a central theme related to judicial policy. The section Summaries contains abstracts of the internationally most relevant articles of each issue. The central theme of this issue (no. 5, 2018) is The digitalization of organized crime. The effect of the internet on the structure of organized cybercrime. Findings from an international empirical study Geralda Odinot, Christianne de Poot and Maite Verhoeven Worldwide, the digitalization of society is proceeding rapidly and this brings new forms of crime. The threats arising from different types of cybercrime are real and constantly evolving, as the internet with its anonymity and borderless reach, provides new opportunities for criminal activities. This article describes some results from an international empirical study aimed to gather more insight on the link between cybercrime and organized crime as well as on the question whether cybercrime is organized. It shows how cybercriminals cooperate with each other and what this organization structure looks like. Criminal money flows and IT. On innovative modi operandi, old certainties, and new bottlenecks Edwin Kruisbergen, Rutger Leukfeldt, Edward Kleemans and Robby Roks In this article we analyze how organized crime offenders use IT to handle their money flows. How and to what extent do offenders use IT-facilitated possibilities, such as bitcoin, to launder their money? The empirical data consist of thirty large-scale police investigations. These thirty cases are part of the Organized Crime Monitor, an ongoing research project into the nature of organized crime in the Netherlands. One of the most striking findings is the fact that cash is still king - even for online drug dealers who get paid in digital currencies. Summaries 119 Organized child pornography networks on the Dark Web Madeleine van der Bruggen The emergence of Dark Web child pornography forums and their availability to large offender communities has enabled a professional form of child pornography distribution as well as an increased exchange of criminal and social capital. Offenders have access to a new platform in which strong ties and long-lasting relationships with co-offenders are formed. Moreover they could be classified as organized crime, because child pornography Dark Web forums are characterized by a hierarchical order, a clear role division and illegal power structures that regulate the illegal activities. The implications from a law enforcement as well as from scientific perspective are discussed. The non-human (f)actor in cybercrime. Cybercriminal networks seen from a cyborg crime perspective Wytske van der Wagen and Frank Bernaards Botnets, banking malware and other high-tech crimes are increasingly analyzed by criminological scholars. Their distributed and automated nature poses however various theoretical challenges. This article presents an alternative approach, denoted as the 'cyborg crime' perspective, which adopts a more hybrid view of networks and also assigns an active role to technology. The value of this approach is demonstrated by reflecting on findings from earlier empirical work that analyzes conversations between cybercriminals involved in botnets and related activities. The research shows that technological nodes can take an important position in the organizational structure of cybercriminal networks and do not merely have a functional role. Viewing technology as an actor within a criminal network might offer new criminological insights in both the composition of these networks and how to disrupt them. Out of the shadow. Opportunities for researchers in studying dark markets Thijmen Verburgh, Eefje Smits and Rolf van Wegberg In this article the authors present the lessons learned from previous research efforts into dark markets. First the important features of dark markets are discussed, i.e. anonymity and trust, as well as the question how data on dark markets can be collected. Next, the authors illustrate 120 Justitiele verkenningen, jrg. 44, nr. 5, 2018 how this data can be used to study the phenomenon of dark markets itself as well as the impact of police interventions on dark markets. Befriending a criminal suspect on Facebook. Undercover powers on the Internet Jan-Jaap Oerlemans This article investigates which online undercover investigative methods are applied in practice and how they fit in the Dutch legal framework. In particular, the three special investigative powers of a pseudo purchase, systematic information gathering and infiltration are examined. Investigative powers cannot be applied unilaterally (across state borders). When law enforcement officials cannot reasonably determine the location of the suspect, the online unilateral application of undercover investigative powers is allowed. However, there is still a risk that diplomatic tensions arise with the involved state. States should agree in treaties under which circumstances cross-border online undercover operations are allowed. New investigative powers and the right to privacy. An analysis of the Dutch Cybercrime III Act Bart Custers In 2018 the Dutch parliament accepted new cybercrime legislation (the Cybercrime III Act) that creates several new online criminal offences and gives law enforcement agencies new investigative powers on the Internet. This article describes the background of Dutch cybercrime legislation and the contents of the Cybercrime III Act. The newly introduced cybercrimes are discussed as well as the new investigative competences. Particularly the legitimacy and the necessity of the investigative power of the police to hack computer systems of suspects may significantly interfere with the right to privacy.

Details: The Hague: Netherlands Ministry of Justice, 2018. 120p.

Source: Internet Resource: Accessed January 24, 2019 at: https://www.researchgate.net/publication/325966795_Georganiseerde_criminaliteit_en_ICT_-_Rapportage_in_het_kader_van_de_vijfde_ronde_van_de_Monitor_Georganiseerde_Criminaliteit/related

Year: 2018

Country: Netherlands

URL: https://www.researchgate.net/publication/325966795_Georganiseerde_criminaliteit_en_ICT_-_Rapportage_in_het_kader_van_de_vijfde_ronde_van_de_Monitor_Georganiseerde_Criminaliteit/related

Shelf Number: 154396

Keywords:
Child Pornography
Cybercrime
Dark Networks
Internet Crimes
Organized Crime
Undercover Investigations

Author: Maxim, Donald

Title: Online Child Exploitation Material - Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children's eSafety Commissioner

Summary: This report by the ANU Cybercrime Observatory provides an overview of three important areas for Child Exploitation Material (CEM): - The relationship between online and offline offending; - Horizon scanning - identifying emerging areas of CEM development; and - Current regulatory, educational and collaborative approaches to combatting CEM Each section provides an overview of the issue and further analysis of other key areas identified during the research phase. At the conclusion of each section, a brief annotated bibliography is available to provide insight into which sources may be useful for further investigation. Information for this report was derived from many and varied sources including but not limited to government agencies (national and international), non-governmental organisations, academic articles, law enforcement agencies, blogs, tech websites, product sites, online news articles and surveys. While investigating each area, the research team worked within the scope of online CEM and aimed to provide a substantial overview for each section by addressing some of the key points or emerging trends. However during the research phase several areas that were not initially considered for the report were later identified as key areas of development for online CEM (e.g. Virtual Reality and Applications). Accordingly these topics were also included in the report. The relationship between online and offline sexual offending is highly controversial and complex. It is clear that research is lacking in this area and current research presents insufficient evidence for establishing a causal relationship between online and offline offending. Apart from addressing some of the methodological limitations of research in this area, this section of the report also addresses how the internet or technological advances (e.g. Virtual Reality) may assist in the desistance of offending or exacerbate motivations to commit real life offenses. The second section presents several emerging issues in online CEM and aims to provide a brief but comprehensive insight into how these areas are developing. The various topics include live streaming, applications, online gaming, user-generated content, Darknet, hacking, phishing, emerging technology and Virtual Reality (VR). Some of these concepts are quite traditional (e.g. user-generated content) however it is the development of 'cyber' and 'technology', which frames them as emerging issues. Other topics (e.g. live streaming or VR) present new, unique challenges to combatting online CEM. Some topics include snapshots of current cases such as the Pokemon Go trend, the Australian schools online pornography website, and interactive VR brothels and their implications for CEM. The final section discusses trends and effectiveness of current regulatory, educational, and collaborative approaches to CEM. Regulatory methods include ISP and social media regulation, parental control tools, and the potential for app regulation is also briefly mentioned. Key educational approaches include online safety guides and training courses. Collaborative prevention measures include hotlines, the National Centre for Missing and Exploited Children (NCMEC), Child Rescue Coalition, and the Virtual Global Taskforce (VGT). While these CEM prevention methods have made notable differences in detection and removal of CEM the effectiveness of education of the public, generation of reports, self-reporting, and tracking of child predators remains empirically untested. Technology is continually evolving and it is difficult to predict or evaluate emerging issues. The research team found it challenging to identify substantial information that can be verified by current research. This was particularly the case when analysing cutting edge or new technology as well as evaluating the effectiveness of current prevention approaches. This report aims to provide a reference point for further analysis and research on the topics addressed. Challenges associated with the cyber sphere and the 'Internet of Everything' do not remain static. The degree of facilitation (e.g. Virtual Private Networks, digital currency) and convergence associated with online CEM are continuously evolving in step with changes in technology. The rapid rate of change is the key challenge for the development of effective prevention strategies. This was demonstrated while our research was underway. Innovation, usually an adaptation of existing software or technology that was not initially present was later identified as a key developing area in online CEM (e.g. Virtual Reality and software applications). The Pokemon Go craze, which quickly attracted malware and grooming is a good example of the misuse of a popular apps. The velocity and variety of new and emerging risks with potential impact on online CEM will require, as a priority, the means to monitor these developments. The increase and rapid distribution of user-generated content is especially concerning. One aspect, consensually shared or 'stolen' sexualized images has given rise to 'sextortion', which can be propagated with the development of 'apps' that can inadvertently enhance and facilitate online CEM. Equally concerning are the implications of Virtual Reality (VR). VR in combination with teledildonics (or 'cyberdildonics' products designed to realise remote sex) enables potential offenders to live out any of their sexual fantasies. The VR trend may motivate offenders to seek on-line or off-line victims. The effects of VR on the conduct of pedophiles remain unclear. We don't know whether VR will placate desires or erode social inhibitions. However, VR is likely to encourage some criminals to enhance their experience by incorporating live streaming of child sex abuse with the tactile experiences promised by such technologies. The prevention of online CEM depends entirely on knowing present and emerging risks. Effective counter-measures include deep web surveillance of CEM innovators, and the development of early warning systems, for example, SNS 'swarm' warning flags.

Details: Canberra: Australian National University, Cybercrime Observatory, 2016. 105p.

Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644

Year: 2016

Country: International

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644

Shelf Number: 154957

Keywords:
Child Grooming
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Cybercrime
Internet Crimes
Online Victimization
Pornography
Sex Offending
Sextortion

Author: International Centre for Missing & Exploited Children

Title: Child Pornography: Model Legislation & Global Review. 9th ed.

Summary: As global accessibility to technology platforms and the Internet has increased, so too has children's online presence. According to UNICEF, one in three Internet users worldwide is a child. And while the digital world offers countless benefits and opportunities, it also vastly multiplies the risks to children. As ICMEC enters its 20th year, we still believe that protecting children is a global imperative. We recognize the continued need for ever stronger laws, policies, and mechanisms; increased coordination across sectors; and the value of sharing ideas, perspectives, and best practices to positively influence child protection responses. We also celebrate the progress of recent years as organizations and institutions around the world have come together in collaborative initiatives such as the WePROTECT Global Alliance, utilizing tools like the Model National Response and the World Health Organization's INSPIRE Strategies to fulfill the UN Sustainable Development Goals and enhance support for children on all fronts. We are particularly excited that adoption of our Model Legislation has been included as a key recommendation of the recent Child Dignity Alliance Technology Working Group Report. Twelve years ago, in an effort to better understand the global legislative landscape as it related to child sexual abuse material (then referred to as "child pornography"), ICMEC launched an initiative that some have called our "Rule of Law" project. We developed model legislation, after careful consideration and consultation, to increase global understanding and concern, and enable governments around the world to adopt and enact appropriate legislation necessary to combat this crime and better protect children. Since we first published the Model Legislation report in 2006, 150 countries have refined or implemented new legislation combating child sexual abuse material. We have seen tremendous progress during the 9th Edition review period, nearly the most we have seen to date. This does not, however, mean that there is nothing left to do - rather, this is the time to be diligent, to persist and push forward to help bring the remaining countries into the fold. As always, it is important to note that the legislative review accompanying our model legislation is not a scorecard or a scold, but an effort to assess the current state and awareness of the problem. Realizing the importance of taking into consideration varying cultural, religious, socio-economic, and political norms, our model legislation continues to resemble a menu of concepts that can be applied universally, as opposed to actual statutory language. With this latest edition, we continue our efforts to improve the legislative landscape and strengthen child protection efforts by introducing new and updated sections in the model law, incorporating additional international and regional legal instruments, and featuring new initiatives related to implementation.

Details: Alexandria, VA: The Centre, 2018. 68p.

Source: Internet Resource: Accessed march 18, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/CSAM-Model-Law-9th-Ed-FINAL-12-3-18.pdf

Year: 2018

Country: International

URL: https://www.icmec.org/wp-content/uploads/2018/12/CSAM-Model-Law-9th-Ed-FINAL-12-3-18.pdf

Shelf Number: 155029

Keywords:
Child Pornography
Child Sexual Exploitation
Children, Crimes Against
Internet Crimes
Online Grooming
Organized Crime
Sex Crimes
Sex Offenders

Author: National Society for the Prevention of Cruelty to Children (NSPCC)

Title: Harmful sexual behaviour framework: An evidence-informed framework for children and young people displaying harmful sexual behaviours. 2nd edition

Summary: Harmful sexual behaviour (HSB) is developmentally inappropriate sexual behaviour which is displayed by children and young people and which may be harmful or abusive (derived from Hackett, 2014). It may also be referred to as sexually harmful behaviour or sexualised behaviour. It can be displayed towards younger children, peers, older children or adults, and is harmful to the children and young people who display it, as well as the people it is directed towards. Technology assisted HSB (TA-HSB) is sexualised behaviour which children or young people engage in using the internet or technology such as mobile phones. As with 'offline' HSB, TA-HSB encompasses a range of behaviours including: viewing pornography (including extreme pornography or viewing indecent images of children) sexting This framework helps local areas develop and improve multi-agency responses to children displaying harmful sexual behaviour (HSB). It provides a coordinated, systematic and evidence-based approach to recognising and responding to the risks and needs of this vulnerable group. The framework helps commissioners, strategic leads and lead safeguarding professionals from any sector to improve their local area response to harmful sexual behaviour (HSB). To get the most out of the framework we advise a multi-agency approach involving: staff with a strategic role in coordinating child protection and local HSB responses from different agencies commissioners of local child protection and HSB services those with a wider safeguarding remit and audit responsibility. The framework is split into five domains that cover the essential elements of developing and delivering an integrated and effective HSB service for children, young people and their families: A continuum of responses to children and young people displaying HSB. Prevention, identification and early assessment. Effective assessment and referral pathways. Interventions. Workforce development. Each domain includes: a summary of the latest evidence to back up practice and local decision making an audit checklist to help assess your HSB offer and service response key principles to consider when improving HSB service delivery, with practical examples. You should repeat the audit every 6 to 12 months to help track progress and help you continuously develop and improve your services. The framework should be used alongside the National Institute for Health and Care Excellence (NICE) guidelines on harmful sexual behaviour among young people (NICE, 2016)

Details: London: NSPCC, 2019. 96p., app.

Source: Internet Resource: Accessed March 20, 2019 at: https://learning.nspcc.org.uk/research-resources/2019/harmful-sexual-behaviour-framework/

Year: 2019

Country: United Kingdom

URL: https://learning.nspcc.org.uk/research-resources/2019/harmful-sexual-behaviour-framework/

Shelf Number: 155061

Keywords:
Child Pornography
Child Sex Offenders
Internet
Sex Offenders
Sexting
Social Media
Young Adult Offenders

Author: Williams, Mike

Title: The NSPCC'S Protect and Respect Child Sexual Exploitation Programme: A Discussion of the Key Findings from Programme Implementation and Service Use

Summary: This report presents a discussion of the key findings from the evaluation of the NSPCC's Protect & Respect programme, which ran from June 2014 to November 2017. The Protect & Respect programme, provided support to children and young people affected by sexual exploitation, and included the following: - A group work service, where NSPCC practitioners did work with small groups of children and young people (numbering between 2 and 10) on a weekly basis over a period of one to two months. - Four different types of one-to-one service. One-to-one work involved an individual NSPCC practitioner doing work with a child or young person to support them on issues relating to exploitation. The four different services covered prevention, risk reduction, child protection and recovery. Work was sometimes done with carers and professionals who supported the child or young person. - The commissioning of research into child sexual exploitation. -- One piece of research, on the link between child sexual exploitation and neglect, was commissioned and completed during the evaluation period (Hanson, 2016). - An unpublished rapid evidence assessment was conducted on research on service delivery responses to child sexual exploitation published between 2006 and 2018 (Walker et al, 2019). In particular this report summarises and discusses: - The implementation of the Protect & Respect programme. - The findings from the group work service and the one-to-one service, which are detailed more fully in two separate accompanying reports (Williams, 2019a; 2019b). This introductory chapter sets the context to the report by: - Providing a note on the NSPCC's position on the use of child sexual exploitation films and the lessons that the NSPCC has learned over the course of the programme. - Providing a note on the NSPCC's position on children and young people's agency, the use of victim-blaming language and the lessons that the NSPCC has learned over the course of the programme. - Summarising recent policy developments in the area of sexual exploitation. - Looking at the evidence base for the effectiveness of professional responses and services in working on sexual exploitation. - Describing the NSPCC's recent involvement in working with sexual exploitation and the reasons for establishing the Protect & Respect programme. - Summarising the guidance provided to NSPCC managers and practitioners on providing the Protect & Respect programme. - Describing the evaluation methodology used. The description includes an account of how the focus of the evaluation changed over the course of the data collection period.

Details: London: NSPCC, 2019. 140p.

Source: Internet Resource: Accessed May 9, 2019 at: https://learning.nspcc.org.uk/media/1699/a-discussion-key-findings-from-programme-implementation-service-use.pdf

Year: 2019

Country: United Kingdom

URL: https://learning.nspcc.org.uk/media/1699/a-discussion-key-findings-from-programme-implementation-service-use.pdf

Shelf Number: 155708

Keywords:
child Abuse and Neglect
Child Grooming
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation

Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Technology-Facilitated Child Sex Trafficking

Summary: Trafficking of children for sexual purposes, or child sex trafficking2, is defined internationally as: the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. Exploitation shall include, at a minimum, the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery, servitude or the removal of organs. The Internet and related technologies are increasingly becoming the predominant mechanism by which children are lured, entrapped, and forced into modern-day enslavement for sexual purposes. While child sex trafficking is not a new crime, the use of technology to facilitate this crime is. As the Internet is highly unregulated and provides anonymity, accessibility, and global reach, the use of technology by traffickers will likely become even more prevalent. In general, traffickers are criminals "who enable or partake in the trade and exploitation of human beings." Online traffickers use information and communications technologies (ICTs) to seek out vulnerable children, recruit victims, and advertise/sell victims to offenders through social media, messaging applications, online ads, and peer-to-peer file sharing servers with the intent to exploit the victims for profit. Using the Internet and related technologies, traffickers may lure victims by posting false job advertisements, promising fame or money, expressing love or praise, or threatening harm or death to the victim and/or their family. Traffickers may use social media platforms to gain trust and build relationships by showing admiration or desire for the child, acting as a friend, and eventually employing tactics such as manipulation, coercion, and control to lure them away from their homes and loved ones. Child sex traffickers may be strangers, but they can also be family members, friends, guardians, or acquaintances.10 Nearly half of all identified cases of child trafficking begin with some family member involvement and the extent of family involvement in the trafficking of children is up to four times higher than in cases of adult trafficking. The high demand for children for sexual purposes has generated such high profits that many organized crime groups are turning away from other illicit activities to devote their resources to the trafficking of minors. Human trafficking appeals to criminal organizations as "it is becoming increasingly easy and inexpensive to procure, move and exploit vulnerable girls." Additionally, the relatively low risk of detection and prosecution of technology-facilitated child sex trafficking compared to the risk associated with traditional, "in-person" forms of trafficking makes online sex trafficking an attractive illegal activity in which to engage. One child can generate a profit of several thousand dollars a day for traffickers and can be abused and sold repeatedly, unlike other forms of illicit trade like drug trafficking. The International Labour Organization (ILO) estimates that "globally, two-thirds of the profits from forced labour are generated by forced sexual exploitation, amounting to an estimated US$99 billion per year." Approximately 5.5 million children under the age of 18 are forced into labor, and it is estimated that more than one million are victims of forced sexual exploitation. With the growth of Internet usage, a child's risk of being targeted increases; technology has lowered the bar of entry to the criminal world, which has had an expansive effect on the growth of modern slavery. Our challenge is that technology is taking slavery into a darker corner of the world where law enforcement techniques and capabilities are not as strong as they are offline." Strategies to address technology-facilitated child sex trafficking must address the misuse of ICTs to facilitate it and harness the potential of ICTs to combat it The world has seen an increase in international, regional, and national laws addressing cybercrime and human trafficking; however, international law is silent on several key issues - namely, the use of ICTs to: 1) recruit child sex trafficking victims; 2) advertise the sexual services of these victims; and 3) provide or receive payments or benefits from the sexual exploitation of children. To address these legal gaps, ideally international legislation should be enacted to include: - A uniform definition of technology-facilitated child sex trafficking; - Statutes punishing the use of ICTs to recruit child victims, advertise their sexual services, and send and receive payments for sexual exploitation of children; and - Requisite punishment. The Internet has global reach, which fuels the need for international legal cooperation to develop more stringent, overt laws to protect children from technology-facilitated child sex trafficking. While vast research exists regarding child sex trafficking broadly, this paper specifically focuses on: how and why technology is increasingly used to recruit, advertise, and send/receive payments for child sex trafficking; examining available international and regional legal instruments; reviewing a sampling of relevant national legislation; presenting model legislative language for consideration; and discussing the role of the technology and financial industries to deter traffickers from misusing their platforms to sexually exploit children. The report is further intended to support and promote the United Nations Sustainable Development Goals (SDGs), in particular SDG 16.220 on ending the abuse, exploitation, trafficking, and all forms of violence against and torture of children, and contribute to reaching the goals of the 2030 Agenda for Sustainable Development by demonstrating our organizational commitment, helping raise awareness of the issues, and promoting the rule of law at the national and international levels. Additionally, the report contributes to the Implementation and Enforcement of Laws strategy, the first of the seven INSPIRE strategies developed by the World Health Organization (WHO), in particular core indicators 3.1 through 3.6 (i.e., laws and policies, awareness of laws, review of legal and policy framework)22; and helps to implement the WePROTECT Global Alliance to End Child Sexual Exploitation Online Model National Response (MNR) - specifically capabilities 2 (Research, Analysis and Monitoring) and 3 (Legislation) under Policy and Governance23.

Details: Alexandria, VA: The Centre, 2018. 50p.

Source: Internet Resource: Accessed May 10, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Year: 2018

Country: International

URL: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Shelf Number: 155745

Keywords:
Child Grooming
Child Pornography
Child Prostitution
Child Protection
Child Sexual Exploitation
Child Trafficking
Forced Labor
Modern Slavery
Online Child Sexual Abuse
Revenge Pornography
Sextortion
Social Media

Author: Newman, Nick

Title: A Tangled Web: Rethinking the Approach to Online CSEA

Summary: Child sexual exploitation and abuse (CSEA) is a deeply emotive and troubling issue, and in recent years we've witnessed the worrying emergence of a much more insidious version of the threat. Online CSEA is changing the scope and scale of offending - with the internet increasing the exposure of victims and offering a safe haven for offenders to access imagery and stream live abuse on demand.

Details: London, UK: PA Consulting, 2018. 36p.

Source: Internet Resource: Accessed June 6, 2019 at: https://www.paconsulting.com/insights/2019/protecting-our-children/

Year: 2018

Country: International

URL: http://www2.paconsulting.com/TheTangledWeb.html?_ga=2.254335816.1953190354.1559851398-1800249135.1559851398

Shelf Number: 156203

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation and Abuse
Child Victims
On-line
Sex Offenders