Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 12:45 am

Results for online child sexual abuse

2 results found

Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Sexual Extortion and Nonconsensual Pornography

Summary: The rapid evolution of technology and the increasingly widespread use of the Internet, have changed the face of child sexual exploitation globally. Child sexual exploitation includes, but is not limited to: enticing, manipulating, or threatening a child into performing sexual acts in front of a webcam; grooming children online with the goal of sexually exploiting them; and distributing child sexual abuse material online.2 Sex offenders have become proficient in using technology to engage in child sexual abuse by utilizing the Internet as a vehicle to meet children in order to prepare them for sexual encounters, or even to target, manipulate, and lure them into sex trafficking. While the vulnerability of children to sexual predators is not new, the tools predators use and the language to describe various types of online child sexual abuse have changed remarkably. Two forms of online child sexual exploitation have emerged as pervasive threats to children's safety around the world: sexual extortion, commonly referred to as "sextortion," and nonconsensual pornography or nonconsensual sharing of intimate images, also often referred to as "revenge pornography."

Details: Alexandria, VA: The Centre, 2018.46p.

Source: Internet Resource: Accessed November 15, 2018 at: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Year: 2018

Country: International

URL: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Shelf Number: 153477

Keywords:
Child Grooming
Child Pornography
Child Protection
Child Sexual Exploitation
Online Child Sexual Abuse
Revenge Pornography
Sextortion
Social Media

Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Technology-Facilitated Child Sex Trafficking

Summary: Trafficking of children for sexual purposes, or child sex trafficking2, is defined internationally as: the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. Exploitation shall include, at a minimum, the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery, servitude or the removal of organs. The Internet and related technologies are increasingly becoming the predominant mechanism by which children are lured, entrapped, and forced into modern-day enslavement for sexual purposes. While child sex trafficking is not a new crime, the use of technology to facilitate this crime is. As the Internet is highly unregulated and provides anonymity, accessibility, and global reach, the use of technology by traffickers will likely become even more prevalent. In general, traffickers are criminals "who enable or partake in the trade and exploitation of human beings." Online traffickers use information and communications technologies (ICTs) to seek out vulnerable children, recruit victims, and advertise/sell victims to offenders through social media, messaging applications, online ads, and peer-to-peer file sharing servers with the intent to exploit the victims for profit. Using the Internet and related technologies, traffickers may lure victims by posting false job advertisements, promising fame or money, expressing love or praise, or threatening harm or death to the victim and/or their family. Traffickers may use social media platforms to gain trust and build relationships by showing admiration or desire for the child, acting as a friend, and eventually employing tactics such as manipulation, coercion, and control to lure them away from their homes and loved ones. Child sex traffickers may be strangers, but they can also be family members, friends, guardians, or acquaintances.10 Nearly half of all identified cases of child trafficking begin with some family member involvement and the extent of family involvement in the trafficking of children is up to four times higher than in cases of adult trafficking. The high demand for children for sexual purposes has generated such high profits that many organized crime groups are turning away from other illicit activities to devote their resources to the trafficking of minors. Human trafficking appeals to criminal organizations as "it is becoming increasingly easy and inexpensive to procure, move and exploit vulnerable girls." Additionally, the relatively low risk of detection and prosecution of technology-facilitated child sex trafficking compared to the risk associated with traditional, "in-person" forms of trafficking makes online sex trafficking an attractive illegal activity in which to engage. One child can generate a profit of several thousand dollars a day for traffickers and can be abused and sold repeatedly, unlike other forms of illicit trade like drug trafficking. The International Labour Organization (ILO) estimates that "globally, two-thirds of the profits from forced labour are generated by forced sexual exploitation, amounting to an estimated US$99 billion per year." Approximately 5.5 million children under the age of 18 are forced into labor, and it is estimated that more than one million are victims of forced sexual exploitation. With the growth of Internet usage, a child's risk of being targeted increases; “technology has lowered the bar of entry to the criminal world, which has had an expansive effect on the growth of modern slavery. Our challenge is that technology is taking slavery into a darker corner of the world where law enforcement techniques and capabilities are not as strong as they are offline." Strategies to address technology-facilitated child sex trafficking must address the misuse of ICTs to facilitate it and harness the potential of ICTs to combat it The world has seen an increase in international, regional, and national laws addressing cybercrime and human trafficking; however, international law is silent on several key issues - namely, the use of ICTs to: 1) recruit child sex trafficking victims; 2) advertise the sexual services of these victims; and 3) provide or receive payments or benefits from the sexual exploitation of children. To address these legal gaps, ideally international legislation should be enacted to include: - A uniform definition of technology-facilitated child sex trafficking; - Statutes punishing the use of ICTs to recruit child victims, advertise their sexual services, and send and receive payments for sexual exploitation of children; and - Requisite punishment. The Internet has global reach, which fuels the need for international legal cooperation to develop more stringent, overt laws to protect children from technology-facilitated child sex trafficking. While vast research exists regarding child sex trafficking broadly, this paper specifically focuses on: how and why technology is increasingly used to recruit, advertise, and send/receive payments for child sex trafficking; examining available international and regional legal instruments; reviewing a sampling of relevant national legislation; presenting model legislative language for consideration; and discussing the role of the technology and financial industries to deter traffickers from misusing their platforms to sexually exploit children. The report is further intended to support and promote the United Nations Sustainable Development Goals (SDGs), in particular SDG 16.220 on ending the abuse, exploitation, trafficking, and all forms of violence against and torture of children, and contribute to reaching the goals of the 2030 Agenda for Sustainable Development by demonstrating our organizational commitment, helping raise awareness of the issues, and promoting the rule of law at the national and international levels. Additionally, the report contributes to the Implementation and Enforcement of Laws strategy, the first of the seven INSPIRE strategies developed by the World Health Organization (WHO), in particular core indicators 3.1 through 3.6 (i.e., laws and policies, awareness of laws, review of legal and policy framework)22; and helps to implement the WePROTECT Global Alliance to End Child Sexual Exploitation Online Model National Response (MNR) - specifically capabilities 2 (Research, Analysis and Monitoring) and 3 (Legislation) under Policy and Governance23.

Details: Alexandria, VA: The Centre, 2018. 50p.

Source: Internet Resource: Accessed May 10, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Year: 2018

Country: International

URL: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Shelf Number: 155745

Keywords:
Child Grooming
Child Pornography
Child Prostitution
Child Protection
Child Sexual Exploitation
Child Trafficking
Forced Labor
Modern Slavery
Online Child Sexual Abuse
Revenge Pornography
Sextortion
Social Media