The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

State and federal investigators and prosecutors universally report seeing dramatic increases in thenumber of child pornography images traded on the Internet, the number of child pornographyoffenders, and the number of children victimized by child pornography. They also report anincrease in the sadistic and violent conduct depicted in child pornography images and that theyare encountering more young victims than before—particularly infants and toddlers. In addition,law enforcement officers and prosecutors interviewed for this Assessment universally reportconnections between child pornography offenses and sexual contact offenses against children.The Internet and advances in digital technology have provided fertile ground for offenders toobtain child pornography, share child pornography, produce child pornography, advertise childpornography, and sell child pornography. The Internet also has allowed offenders to form onlinecommunities with global membership not only to facilitate the trading and collection of theseimages, but also to facilitate contact (with each other and children) and to create supportnetworks among offenders. Rather than simply downloading or uploading images of childpornography to and from the Internet, offenders also use current technologies to talk about theirsexual interest in children, to trade comments about the abuse depicted in particular images—even as images are shared real-time—to validate each other’s behavior, to share experiences, andshare images of themselves abusing children as they do so.This Section provides an overview of the Threat Assessment findings as they relate to childpornography which include the following: (1) research that indicates child pornography poses adanger to both the victims and other children; (2) indicators that suggest a significant increase inthe proliferation of child pornography; (3) evidence that child pornographers are becoming moresophisticated in the production and distribution of materials; and (4) information that organizedcrime syndicates are involved in the child pornography trade. In addition, this Section outlinessome of the steps that law enforcement agencies are taking to identify the most dangerous childpornographers.1. Child pornography offenses present a real threat to children.The children whose abuse is captured in child pornography images suffer not just from thesexual abuse graphically memorialized in the images, but also from a separate victimization,knowing that the images of that abuse are accessible, usually on the Internet, and are traded byother offenders who receive sexual gratification from the children’s distress. According toacademic researchers, medical professionals, and child pornography victims themselves,knowing that all copies of child pornography images can never be retrieved compounds thevictimization. The shame suffered by the children is intensified by the fact that the sexual abusewas captured in images easily available for others to see and revictimizes the children by usingthose images for sexual gratification. Unlike children who suffer from abuse without theproduction of images of that abuse, these children struggle to find closure and may be moreprone to feelings of helplessness and lack of control, given that the images cannot be retrievedand are available for others to see in perpetuity. They experience anxiety as a result of theperpetual fear of humiliation that they will be recognized from the images. This harm is bestdescribed by the mother of a victim.9

A Mother’s Story of Child Pornography Victimization[M]y daughter was abused repeatedly to produce images for the purpose of being traded [and]shared over the [I]nternet. Without a market to receive and trade those images, without theencouragement of those who wanted to acquire the images, I truly believe this abuse would nothave occurred.All those who trade these images and thereby create the demand for lurid and violentdepictions of children are participants in the exploitation of my daughter. Each traded picturethat placed a value on inventiveness, novelty, or cruelty played a role in egging on the abuserto even more vile acts.The pictures of my daughter were ‘made for trade’— her abuser adapted to serve his market—whatever his audience was looking to acquire, that’s what happened to her ...Producer, distributor, and consumer-—everyone who participates in this evil exchange helpscreate a market, casting a vote for the next abuse. Regardless of whether they directly abusedchildren themselves, reveled in the images of suffering, or persuaded others to abuse childrenon their behalf (to provide images of the abuse) each participant has a responsibility for theeffects...[A] shadow... comes over her face if a stranger gives her an expected compliment. Thepictures are still out there...Now that she’s growing older and realizing the extent of the [I]nternet, she’s also beginning tograsp the darker side of the story— how many people see those same pictures as something toenjoy rather than abhor.We have no way of knowing how many pedophiles used the pictures of her being tortured anddegraded as an opportunity for personal gratification ...I can find no words to express the fury I feel at those who participate in this evil, or my scornfor any attempt to minimize responsibility by feeble claims that the crime was ‘victimless.’ Mydaughter is a real person. She was horribly victimized to provide this source of‘entertainment.” She is exploited anew each and every time an image of her suffering iscopied, traded, or sold. While the crime is clearly conscienceless, it is hardly ‘victimless.’I asked my daughter what she most wanted to ask of the judge. Her request: “Please, don’t letthem pretend no one’s getting hurt.”10

State <strong>and</strong> federal investigators <strong>and</strong> prosecutors universally report seeing dramatic increases in thenumber of child pornography images traded on the Internet, the number of child pornographyoffenders, <strong>and</strong> the number of children victimized by child pornography. <strong>The</strong>y also report anincrease in the sadistic <strong>and</strong> violent conduct depicted in child pornography images <strong>and</strong> that theyare encountering more young victims than be<strong>for</strong>e—particularly infants <strong>and</strong> toddlers. In addition,law en<strong>for</strong>cement officers <strong>and</strong> prosecutors interviewed <strong>for</strong> this Assessment universally reportconnections between child pornography offenses <strong>and</strong> sexual contact offenses against children.<strong>The</strong> Internet <strong>and</strong> advances in digital technology have provided fertile ground <strong>for</strong> offenders toobtain child pornography, share child pornography, produce child pornography, advertise childpornography, <strong>and</strong> sell child pornography. <strong>The</strong> Internet also has allowed offenders to <strong>for</strong>m onlinecommunities with global membership not only to facilitate the trading <strong>and</strong> collection of theseimages, but also to facilitate contact (with each other <strong>and</strong> children) <strong>and</strong> to create supportnetworks among offenders. Rather than simply downloading or uploading images of childpornography to <strong>and</strong> from the Internet, offenders also use current technologies to talk about theirsexual interest in children, to trade comments about the abuse depicted in particular images—even as images are shared real-time—to validate each other’s behavior, to share experiences, <strong>and</strong>share images of themselves abusing children as they do so.This Section provides an overview of the Threat Assessment findings as they relate to childpornography which include the following: (1) research that indicates child pornography poses adanger to both the victims <strong>and</strong> other children; (2) indicators that suggest a significant increase inthe proliferation of child pornography; (3) evidence that child pornographers are becoming moresophisticated in the production <strong>and</strong> distribution of materials; <strong>and</strong> (4) in<strong>for</strong>mation that organizedcrime syndicates are involved in the child pornography trade. In addition, this Section outlinessome of the steps that law en<strong>for</strong>cement agencies are taking to identify the most dangerous childpornographers.1. <strong>Child</strong> pornography offenses present a real threat to children.<strong>The</strong> children whose abuse is captured in child pornography images suffer not just from thesexual abuse graphically memorialized in the images, but also from a separate victimization,knowing that the images of that abuse are accessible, usually on the Internet, <strong>and</strong> are traded byother offenders who receive sexual gratification from the children’s distress. According toacademic researchers, medical professionals, <strong>and</strong> child pornography victims themselves,knowing that all copies of child pornography images can never be retrieved compounds thevictimization. <strong>The</strong> shame suffered by the children is intensified by the fact that the sexual abusewas captured in images easily available <strong>for</strong> others to see <strong>and</strong> revictimizes the children by usingthose images <strong>for</strong> sexual gratification. Unlike children who suffer from abuse without theproduction of images of that abuse, these children struggle to find closure <strong>and</strong> may be moreprone to feelings of helplessness <strong>and</strong> lack of control, given that the images cannot be retrieved<strong>and</strong> are available <strong>for</strong> others to see in perpetuity. <strong>The</strong>y experience anxiety as a result of theperpetual fear of humiliation that they will be recognized from the images. This harm is bestdescribed by the mother of a victim.9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!