The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
State and federal investigators and prosecutors universally report seeing dramatic increases in thenumber of child pornography images traded on the Internet, the number of child pornographyoffenders, and the number of children victimized by child pornography. They also report anincrease in the sadistic and violent conduct depicted in child pornography images and that theyare encountering more young victims than before—particularly infants and toddlers. In addition,law enforcement officers and prosecutors interviewed for this Assessment universally reportconnections between child pornography offenses and sexual contact offenses against children.The Internet and advances in digital technology have provided fertile ground for offenders toobtain child pornography, share child pornography, produce child pornography, advertise childpornography, and sell child pornography. The Internet also has allowed offenders to form onlinecommunities with global membership not only to facilitate the trading and collection of theseimages, but also to facilitate contact (with each other and children) and to create supportnetworks among offenders. Rather than simply downloading or uploading images of childpornography to and from the Internet, offenders also use current technologies to talk about theirsexual interest in children, to trade comments about the abuse depicted in particular images—even as images are shared real-time—to validate each other’s behavior, to share experiences, andshare images of themselves abusing children as they do so.This Section provides an overview of the Threat Assessment findings as they relate to childpornography which include the following: (1) research that indicates child pornography poses adanger to both the victims and other children; (2) indicators that suggest a significant increase inthe proliferation of child pornography; (3) evidence that child pornographers are becoming moresophisticated in the production and distribution of materials; and (4) information that organizedcrime syndicates are involved in the child pornography trade. In addition, this Section outlinessome of the steps that law enforcement agencies are taking to identify the most dangerous childpornographers.1. Child pornography offenses present a real threat to children.The children whose abuse is captured in child pornography images suffer not just from thesexual abuse graphically memorialized in the images, but also from a separate victimization,knowing that the images of that abuse are accessible, usually on the Internet, and are traded byother offenders who receive sexual gratification from the children’s distress. According toacademic researchers, medical professionals, and child pornography victims themselves,knowing that all copies of child pornography images can never be retrieved compounds thevictimization. The shame suffered by the children is intensified by the fact that the sexual abusewas captured in images easily available for others to see and revictimizes the children by usingthose images for sexual gratification. Unlike children who suffer from abuse without theproduction of images of that abuse, these children struggle to find closure and may be moreprone to feelings of helplessness and lack of control, given that the images cannot be retrievedand are available for others to see in perpetuity. They experience anxiety as a result of theperpetual fear of humiliation that they will be recognized from the images. This harm is bestdescribed by the mother of a victim.9
A Mother’s Story of Child Pornography Victimization[M]y daughter was abused repeatedly to produce images for the purpose of being traded [and]shared over the [I]nternet. Without a market to receive and trade those images, without theencouragement of those who wanted to acquire the images, I truly believe this abuse would nothave occurred.All those who trade these images and thereby create the demand for lurid and violentdepictions of children are participants in the exploitation of my daughter. Each traded picturethat placed a value on inventiveness, novelty, or cruelty played a role in egging on the abuserto even more vile acts.The pictures of my daughter were ‘made for trade’— her abuser adapted to serve his market—whatever his audience was looking to acquire, that’s what happened to her ...Producer, distributor, and consumer-—everyone who participates in this evil exchange helpscreate a market, casting a vote for the next abuse. Regardless of whether they directly abusedchildren themselves, reveled in the images of suffering, or persuaded others to abuse childrenon their behalf (to provide images of the abuse) each participant has a responsibility for theeffects...[A] shadow... comes over her face if a stranger gives her an expected compliment. Thepictures are still out there...Now that she’s growing older and realizing the extent of the [I]nternet, she’s also beginning tograsp the darker side of the story— how many people see those same pictures as something toenjoy rather than abhor.We have no way of knowing how many pedophiles used the pictures of her being tortured anddegraded as an opportunity for personal gratification ...I can find no words to express the fury I feel at those who participate in this evil, or my scornfor any attempt to minimize responsibility by feeble claims that the crime was ‘victimless.’ Mydaughter is a real person. She was horribly victimized to provide this source of‘entertainment.” She is exploited anew each and every time an image of her suffering iscopied, traded, or sold. While the crime is clearly conscienceless, it is hardly ‘victimless.’I asked my daughter what she most wanted to ask of the judge. Her request: “Please, don’t letthem pretend no one’s getting hurt.”10
- Page 1: U.S. Department of Justice
- Page 5 and 6: 4. UNITED STATES ATTORNEY’S OFFIC
- Page 7 and 8: V. CONCLUSION .....................
- Page 9 and 10: amount of information, including: (
- Page 12 and 13: assisting state, local, tribal and
- Page 14 and 15: goals that can provide some measura
- Page 18 and 19: a. Available indicators suggest chi
- Page 20 and 21: These two applications (Fairplay, R
- Page 22 and 23: The Figure below shows the number o
- Page 24 and 25: For FY 2008, ICAC Task Forces repor
- Page 26 and 27: Some researchers suggest that viewi
- Page 28 and 29: interests in children and their des
- Page 31 and 32: could later bediscovered by lawenfo
- Page 33 and 34: domains are commercial purveyors of
- Page 35 and 36: • The offender communicates with
- Page 37 and 38: 1. Online enticement complaints are
- Page 39 and 40: elationship. After the child has ga
- Page 41 and 42: Influenced and Corrupt Organization
- Page 43 and 44: D. Child Sex TourismChild sex touri
- Page 45 and 46: Exploitation of Children Today (PRO
- Page 47 and 48: A task force model often is employe
- Page 49 and 50: The United States Attorney’s offi
- Page 51 and 52: FBI and CEOS, in conjunction with N
- Page 53 and 54: The effects of child sex tourism re
- Page 55 and 56: 352 investigations and 162 charged
- Page 57 and 58: • CEOS worked closely with NDIC i
- Page 59 and 60: • Alameda County, CA, Children's
- Page 61 and 62: • Additional data have been submi
- Page 63 and 64: postsentence persons and civilly co
- Page 65 and 66: B. A Review of the Internet Crimes
State <strong>and</strong> federal investigators <strong>and</strong> prosecutors universally report seeing dramatic increases in thenumber of child pornography images traded on the Internet, the number of child pornographyoffenders, <strong>and</strong> the number of children victimized by child pornography. <strong>The</strong>y also report anincrease in the sadistic <strong>and</strong> violent conduct depicted in child pornography images <strong>and</strong> that theyare encountering more young victims than be<strong>for</strong>e—particularly infants <strong>and</strong> toddlers. In addition,law en<strong>for</strong>cement officers <strong>and</strong> prosecutors interviewed <strong>for</strong> this Assessment universally reportconnections between child pornography offenses <strong>and</strong> sexual contact offenses against children.<strong>The</strong> Internet <strong>and</strong> advances in digital technology have provided fertile ground <strong>for</strong> offenders toobtain child pornography, share child pornography, produce child pornography, advertise childpornography, <strong>and</strong> sell child pornography. <strong>The</strong> Internet also has allowed offenders to <strong>for</strong>m onlinecommunities with global membership not only to facilitate the trading <strong>and</strong> collection of theseimages, but also to facilitate contact (with each other <strong>and</strong> children) <strong>and</strong> to create supportnetworks among offenders. Rather than simply downloading or uploading images of childpornography to <strong>and</strong> from the Internet, offenders also use current technologies to talk about theirsexual interest in children, to trade comments about the abuse depicted in particular images—even as images are shared real-time—to validate each other’s behavior, to share experiences, <strong>and</strong>share images of themselves abusing children as they do so.This Section provides an overview of the Threat Assessment findings as they relate to childpornography which include the following: (1) research that indicates child pornography poses adanger to both the victims <strong>and</strong> other children; (2) indicators that suggest a significant increase inthe proliferation of child pornography; (3) evidence that child pornographers are becoming moresophisticated in the production <strong>and</strong> distribution of materials; <strong>and</strong> (4) in<strong>for</strong>mation that organizedcrime syndicates are involved in the child pornography trade. In addition, this Section outlinessome of the steps that law en<strong>for</strong>cement agencies are taking to identify the most dangerous childpornographers.1. <strong>Child</strong> pornography offenses present a real threat to children.<strong>The</strong> children whose abuse is captured in child pornography images suffer not just from thesexual abuse graphically memorialized in the images, but also from a separate victimization,knowing that the images of that abuse are accessible, usually on the Internet, <strong>and</strong> are traded byother offenders who receive sexual gratification from the children’s distress. According toacademic researchers, medical professionals, <strong>and</strong> child pornography victims themselves,knowing that all copies of child pornography images can never be retrieved compounds thevictimization. <strong>The</strong> shame suffered by the children is intensified by the fact that the sexual abusewas captured in images easily available <strong>for</strong> others to see <strong>and</strong> revictimizes the children by usingthose images <strong>for</strong> sexual gratification. Unlike children who suffer from abuse without theproduction of images of that abuse, these children struggle to find closure <strong>and</strong> may be moreprone to feelings of helplessness <strong>and</strong> lack of control, given that the images cannot be retrieved<strong>and</strong> are available <strong>for</strong> others to see in perpetuity. <strong>The</strong>y experience anxiety as a result of theperpetual fear of humiliation that they will be recognized from the images. This harm is bestdescribed by the mother of a victim.9