The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
PrioritiesThe Department is dedicated to decreasing child sexual exploitation in Indian Country. Towardthat end, the Department will continue its efforts to assess the scope of the problem and buildupon resources already being devoted to fighting this threat. A key partnership that must bedeveloped is between the Department and the Department of Education. The two should pursuedevelopment of prevention and education measures for schools in Indian Country. TheDepartment will also explore targeted grant funding for education, awareness and the promotionof reporting of child exploitation in Indian Country. The Department will also commit toassisting in the expanded training of first responders, investigators and prosecutors in IndianCountry. Further research into the scope of the problem will be necessary, and will be a priorityfor the Department.C. Programmatic GoalsIn addition to the priorities related to key areas examined by the Threat Assessment, theDepartment will pursue goals and priorities in the areas delineated below.1. Supporting and increasing outreach and education.The Department intends to continue to support and increase coordination with Internet Safetytraining programs. The Threat Assessment noted that children who are sexually assaulted aremost often victimized by those closest to them. Continued, and expanded, investment intoeducation, Internet Safety training, community-outreach, and public awareness must be a highpriority. As noted above, the Department has a robust set of programs relating to Internet Safetytraining and community outreach. A coordinated approach including the Department ofEducation will reach many more thousands of school children. Such coordination is alreadyunderway, and Department representatives have met with Department of Education personnel todiscuss programs in the future. In the next report to Congress, the Department anticipatesreporting on programs the two Departments will have implemented.2. Creating and disseminating a national database to aid in investigations.As described in the Threat Assessment, offenders are using advanced technology to avoiddetection, share strategies to abuse children, and to traffic in vile images of children. Lawenforcement, too, must have advanced tools to detect offenders. This include the creation of anational database to perform three critical functions: first, to allow federal, state, local, andinternational law enforcement to deconflict their cases with each other; second, to allow federal,state, and local law enforcement to engage in undercover operations from a portal facilitated orhosted by the database; and, third, to share information and intelligence, as well as conductanalysis, on dangerous offenders and future threats or trends. Especially as the level ofsophistication of offenders, and the newly-emerging threat of organized groups, rises, such atechnological tool is simply critical in the fight against the sexual exploitation of our children.The Department is currently working to develop this important tool. Many federal, state, andlocal agents currently utilize many different systems to conduct undercover operations,141
deconflict cases, and share information. However, a national system linking all those lawenforcement investigators, and approved international partners, will exponentially increase ourknowledge of the threats and our ability to track suspects, than ever before.3. Increasing prosecutions and prosecution training.The Department is committed to increasing the number of federal prosecutions of childexploitation crimes. This objective will be measurable each year and reported to Congress. TheDepartment intends to achieve this goal by continuing to pursue the increasing number ofinvestigations that are initiated by federal and state law enforcement officers. The moreinvestigations that are pursued, the more likely it is that the number of successful prosecutionswill result. Further, the Department plans to continue educating and training prosecutors todevelop expertise in prosecuting child exploitation cases.4. Continuing cooperation and increasing collaboration.This Report highlights the numerous agencies and entities engaged in the fight against childexploitation, increased cooperation between federal, state, and local law enforcement and nongovernmentorganizations will only strengthen the battle. To that end, cooperation between theDepartment and industry remains a high priority. Industry, like Internet Service Providers andsoftware makers, will be a valuable partner in the fight to protect our children from technologyfacilitatedchild exploitation. Another critical area of coordination with industry is in theretention of data that might be relevant to child exploitation investigations. The Department hasparticipated in an Online Safety and Technology Working Group led by the Department ofCommerce to discuss this issue, among others, with industry and other interested parties, and areport to Congress will be forthcoming from that group.As noted above, Americans who travel to abuse foreign children show the worst of America tothe rest of the world. The Department is committing resources to working with our internationalpartners to address this problem. Increased cooperation between allies is a critical underpinningto successfully curtailing what is known as “child sex tourism.” The Department’s partnershipwith the Department of Homeland Security to provide space and agents from their respective lawenforcement components to staff Interpol is a prime example of this country’s commitment tointernational cooperation.5. Supporting and reviewing of relevant research.In preparing this Report, a comprehensive review of the relevant research relating to childexploitation was conducted, and is reviewed at the end of this Report. As the Threat Assessmentnoted, there are troubling links between those who exploit children by collecting and trading intheir sexually abusive images and those who are hands-on abusers. One might assume, andresearch appears to confirm, that those with a sexual interest in children, whether manifested bygratification using the images of horrific sexual assault or by committing a sexual assault,represent a risk to our nation’s children. However, to better prioritize targets and assessindividual risk levels, research is need to answer many questions, such as: how high is the risk achild pornography trafficker will be a hands-on offender; does the collection and use of these142
- Page 97 and 98: • The Street Outreach Program fun
- Page 99 and 100: the Defense Computer Forensic Labor
- Page 101 and 102: • Distributes photographs and des
- Page 103 and 104: iii. Enough Is EnoughEnough Is Enou
- Page 105 and 106: 1. Overarching Efforts to Coordinat
- Page 107 and 108: combine resources and expertise on
- Page 109 and 110: United States has submitted annual
- Page 111 and 112: CEOS has worked with foreign law en
- Page 113 and 114: . Department of Homeland Security
- Page 115 and 116: Finally, G/TIP has worked extensive
- Page 117 and 118: F. Review of Internet Safety Progra
- Page 119 and 120: the accessibility, cost, and effect
- Page 121 and 122: activity by predators searching for
- Page 123 and 124: 3. Federal Trade Commission and Dep
- Page 125 and 126: Funder: • U.S. Department of Agri
- Page 127 and 128: Delivery: • Online games; printab
- Page 129 and 130: TABLE 1: FEDERALLY FUNDED INTERNET
- Page 131 and 132: Program/Product NameandContactInfor
- Page 133 and 134: TABLE 2: SAMPLE OF PRIVATE NONPROFI
- Page 135 and 136: Program/Product NameProducerFor Kid
- Page 137 and 138: TABLE 1: PARTICIPANT EVALUATIONS OF
- Page 139 and 140: FY 2011. The primary forensics resp
- Page 141 and 142: The DEU is the principal group resp
- Page 143 and 144: CD/DVDs. The CFS has the capability
- Page 145 and 146: First, the Department will continue
- Page 147: and the Innocence Lost task forces,
- Page 151 and 152: with the ICACs to help increase the
- Page 153 and 154: from Landslide’s business premise
- Page 155 and 156: victimized children worldwide, incl
- Page 157 and 158: association, was arrested after the
- Page 159 and 160: is transnational in scope; cooperat
- Page 161 and 162: Over the course of their communicat
- Page 163 and 164: An ICE investigation resulted in th
- Page 165 and 166: U.S. v. RichardsonICE PRESS RELEASE
- Page 167 and 168: APPENDIX C THREAT ASSESSMENT: ACADE
- Page 169 and 170: Selected Quotes from Appendix C of
- Page 171 and 172: * * * “Sheldon and Howitt (2007)
- Page 173 and 174: McCarthy, J. and Gaunt, N. (2004).
- Page 175 and 176: high-profile jobs. Some seemed isol
- Page 177 and 178: Trends 2008, http://www.iwf.org.uk/
- Page 179 and 180: Source: National Center for Missing
- Page 181 and 182: Federal Bureau of Investigation (FB
- Page 183 and 184: scientific survey process, but rath
- Page 185 and 186: • 42 percent of respondents repor
- Page 187 and 188: The Effect of the Lack of Internet
- Page 189 and 190: • 44 percent of respondents repor
- Page 191 and 192: • 24 percent of respondents repor
- Page 193 and 194: ONLINE ENTICEMENTExtent of Online E
- Page 195 and 196: • 37 percent of respondents repor
- Page 197 and 198: • 8 percent of respondents report
Priorities<strong>The</strong> Department is dedicated to decreasing child sexual exploitation in Indian Country. Towardthat end, the Department will continue its ef<strong>for</strong>ts to assess the scope of the problem <strong>and</strong> buildupon resources already being devoted to fighting this threat. A key partnership that must bedeveloped is between the Department <strong>and</strong> the Department of Education. <strong>The</strong> two should pursuedevelopment of prevention <strong>and</strong> education measures <strong>for</strong> schools in Indian Country. <strong>The</strong>Department will also explore targeted grant funding <strong>for</strong> education, awareness <strong>and</strong> the promotionof reporting of child exploitation in Indian Country. <strong>The</strong> Department will also commit toassisting in the exp<strong>and</strong>ed training of first responders, investigators <strong>and</strong> prosecutors in IndianCountry. Further research into the scope of the problem will be necessary, <strong>and</strong> will be a priority<strong>for</strong> the Department.C. Programmatic GoalsIn addition to the priorities related to key areas examined by the Threat Assessment, theDepartment will pursue goals <strong>and</strong> priorities in the areas delineated below.1. Supporting <strong>and</strong> increasing outreach <strong>and</strong> education.<strong>The</strong> Department intends to continue to support <strong>and</strong> increase coordination with Internet Safetytraining programs. <strong>The</strong> Threat Assessment noted that children who are sexually assaulted aremost often victimized by those closest to them. Continued, <strong>and</strong> exp<strong>and</strong>ed, investment intoeducation, Internet Safety training, community-outreach, <strong>and</strong> public awareness must be a highpriority. As noted above, the Department has a robust set of programs relating to Internet Safetytraining <strong>and</strong> community outreach. A coordinated approach including the Department ofEducation will reach many more thous<strong>and</strong>s of school children. Such coordination is alreadyunderway, <strong>and</strong> Department representatives have met with Department of Education personnel todiscuss programs in the future. In the next report to Congress, the Department anticipatesreporting on programs the two Departments will have implemented.2. Creating <strong>and</strong> disseminating a national database to aid in investigations.As described in the Threat Assessment, offenders are using advanced technology to avoiddetection, share strategies to abuse children, <strong>and</strong> to traffic in vile images of children. Lawen<strong>for</strong>cement, too, must have advanced tools to detect offenders. This include the creation of anational database to per<strong>for</strong>m three critical functions: first, to allow federal, state, local, <strong>and</strong>international law en<strong>for</strong>cement to deconflict their cases with each other; second, to allow federal,state, <strong>and</strong> local law en<strong>for</strong>cement to engage in undercover operations from a portal facilitated orhosted by the database; <strong>and</strong>, third, to share in<strong>for</strong>mation <strong>and</strong> intelligence, as well as conductanalysis, on dangerous offenders <strong>and</strong> future threats or trends. Especially as the level ofsophistication of offenders, <strong>and</strong> the newly-emerging threat of organized groups, rises, such atechnological tool is simply critical in the fight against the sexual exploitation of our children.<strong>The</strong> Department is currently working to develop this important tool. Many federal, state, <strong>and</strong>local agents currently utilize many different systems to conduct undercover operations,141