The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

a. Available indicators suggest child pornography is increasing.i. Indicators relating to the volume of child pornography.Experts interviewed for thisAssessment, most of whom have Between 2005 and 2009, the National Center forlongtime experience in this area of Missing & Exploited Children’s Child Victimlaw enforcement, concluded that the Identification Program has seen a 432% increase inmarket—in term of numbers of child pornography movies and files submitted foroffenders, images, and victims—has identification of the children depicted.been trending significantly upward.Approximately two-thirds of the child exploitation experts interviewed by NDIC for thisAssessment reported that child pornography either is growing exponentially or there has been anoverwhelming increase in the volume of child pornography images available. 9 For example,Cybertipline reports, sent by electronic service providers and the public to the National Centerfor Missing & Exploited Children (“NCMEC”), increased by 69% between 2005 and 2009.Additionally, NCMEC’s Child Victim Identification Program has seen a 432% increase in childpornography movies and files submitted for identification of the children depicted during thatsame time period. However, precisely quantifying the volume of the child pornography market isimpossible; the number of offenders accessing the images and videos and the quantity of imagesand videos being traded is unknown.Although documenting the precise quantity of child pornography is difficult, it is evident thattechnological advances have contributed significantly to the overall increase in the childpornography threat. Offenders can easily produce child sex abuse images using digitaltechnologies and distribute the images over the Internet. From 2005 through 2009, U.S.Attorneys prosecuted 8,352 child pornography cases, and in most instances, the offenders useddigital technologies and the Internet to produce, view, store, advertise, or distribute childpornography.Prior to the mid-1990s, Internet access and the availability of digital home recording devices(still, video, and web cameras) were very limited, thereby confining the production anddistribution of child pornography material to relatively few individuals. Today, the ease withwhich a person can move from viewing child pornography to producing and distributing childpornography is illustrated in numerous cases. 10 In addition, advances in computer memorystorage, the speed of downloading and uploading, and advances in file sharing technologiesmake it very easy to quickly transfer or receive large volumes of child sex abuse images.Numerous technologies are used by offenders—including P2P networks, Internet Relay Chat(IRC), newsgroups, bulletin boards, photo sharing sites, and social networking sites, amongothers. Experts posit, and common sense suggests, that the easy accessibility to this materialonline draws new offenders to the crime.As home digital recording and computer technology have improved and child pornographyproduction and sharing have increased, so too have the illicit images and videos typically stored9See Appendix D. 10See Appendix A, Operation Hamlet, and Appendix B, U.S. v. Witt. 11

y offenders. Increased home computer storage capacity has enabled many child pornographyoffenders to store huge collections of images (some containing 1 million) and numerous videofiles (often 1 hour in length). 11 For example, more than 15,000 stored videos were found onvarious media and the offender’s computer in Philadelphia in 2007. Holding vast libraries ofchild pornography material enables offenders to share more illicit images and videos of greatervariety than was possible in past years.ii. Research relating to the number of computers or computer users engagingin Peer-to-Peer file sharing of child pornography.The Act specifically directs the Department to evaluate data relating to the overall magnitude ofchild pornography trafficking including the number of computers with which offenders viewchild pornography or engage in peer-to-peer file sharing. 12 At this time, there is no method foridentifying every individual that views or facilitates the production or sharing of childpornography. Similarly, at this time, it is not possible to provide a definitive number ofcomputers or computer users engaged in peer-to-peer file sharing of child pornography becausethere is no surveillance mechanism to accomplish this task. However, law enforcement agenciesare taking steps to address this issue by employing a variety of investigative techniques that canidentify the number of unique Internet Protocol (IP) addresses linked to computers sharingknown files containing child pornographic material on particular networks. In addition, the lawenforcement agencies have begun to identify and catalog child pornography images. Byidentifying IP addresses and cataloging unique images, the law enforcement agencies can helpgauge the volume of child pornography that is being distributed online.Two programs currently used by law enforcement agencies to identify IP addresses and catalogimages include: Operation Fairplay, supported by the Wyoming Division of CriminalInvestigations and the Palm Beach County (FL) State’s Attorney Office and OperationRoundUp, developed by the University of Massachusetts under a grant from the NationalInstitute of Justice. Since Operation Fairplay’s inception in 2006 and Operation Roundup’sinception in late 2009, the two programs have identified over 20 million different IP addressesoffering child pornography files (pictures, videos) on a Peer-to-Peer file-sharing network.Further, the programs have identified thousand of unique images. For example, OperationFairplay has a “watch list” of 170,000 child pornography files. 13 Operation RoundUp currentlyhas a watch list of 120,000 child pornography files. In both of these tools, the files on the “watchlist” are those the developers (law enforcement officers) deem to represent some of the “worst”(movies and photographs of the most violent assaults, with the youngest victims) of the childpornography images they have seen. 1411See Appendix B, U.S. v. Merz. 12See the Act at Section 101(c)(16)(a-c). 13 These files are documented images of known child pornography14 Operation Fairplay includes data for FY 2008 and data for the period January through June 2009. The number ofunique IP addresses logged by law enforcement for Operation RoundUp includes data for a shorter period, becauseit is a new application only recently released for use by law enforcement.12

y offenders. Increased home computer storage capacity has enabled many child pornographyoffenders to store huge collections of images (some containing 1 million) <strong>and</strong> numerous videofiles (often 1 hour in length). 11 For example, more than 15,000 stored videos were found onvarious media <strong>and</strong> the offender’s computer in Philadelphia in 2007. Holding vast libraries ofchild pornography material enables offenders to share more illicit images <strong>and</strong> videos of greatervariety than was possible in past years.ii. Research relating to the number of computers or computer users engagingin Peer-to-Peer file sharing of child pornography.<strong>The</strong> Act specifically directs the Department to evaluate data relating to the overall magnitude ofchild pornography trafficking including the number of computers with which offenders viewchild pornography or engage in peer-to-peer file sharing. 12 At this time, there is no method <strong>for</strong>identifying every individual that views or facilitates the production or sharing of childpornography. Similarly, at this time, it is not possible to provide a definitive number ofcomputers or computer users engaged in peer-to-peer file sharing of child pornography becausethere is no surveillance mechanism to accomplish this task. However, law en<strong>for</strong>cement agenciesare taking steps to address this issue by employing a variety of investigative techniques that canidentify the number of unique Internet Protocol (IP) addresses linked to computers sharingknown files containing child pornographic material on particular networks. In addition, the lawen<strong>for</strong>cement agencies have begun to identify <strong>and</strong> catalog child pornography images. Byidentifying IP addresses <strong>and</strong> cataloging unique images, the law en<strong>for</strong>cement agencies can helpgauge the volume of child pornography that is being distributed online.Two programs currently used by law en<strong>for</strong>cement agencies to identify IP addresses <strong>and</strong> catalogimages include: Operation Fairplay, supported by the Wyoming Division of CriminalInvestigations <strong>and</strong> the Palm Beach County (FL) State’s Attorney Office <strong>and</strong> OperationRoundUp, developed by the University of Massachusetts under a grant from the <strong>National</strong>Institute of Justice. Since Operation Fairplay’s inception in 2006 <strong>and</strong> Operation Roundup’sinception in late 2009, the two programs have identified over 20 million different IP addressesoffering child pornography files (pictures, videos) on a Peer-to-Peer file-sharing network.Further, the programs have identified thous<strong>and</strong> of unique images. For example, OperationFairplay has a “watch list” of 170,000 child pornography files. 13 Operation RoundUp currentlyhas a watch list of 120,000 child pornography files. In both of these tools, the files on the “watchlist” are those the developers (law en<strong>for</strong>cement officers) deem to represent some of the “worst”(movies <strong>and</strong> photographs of the most violent assaults, with the youngest victims) of the childpornography images they have seen. 1411See Appendix B, U.S. v. Merz. 12See the Act at Section 101(c)(16)(a-c). 13 <strong>The</strong>se files are documented images of known child pornography14 Operation Fairplay includes data <strong>for</strong> FY 2008 <strong>and</strong> data <strong>for</strong> the period January through June 2009. <strong>The</strong> number ofunique IP addresses logged by law en<strong>for</strong>cement <strong>for</strong> Operation RoundUp includes data <strong>for</strong> a shorter period, becauseit is a new application only recently released <strong>for</strong> use by law en<strong>for</strong>cement.12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!