The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
instances of harassment as extremely upsetting, while 20 percent reported extremely upsettingsolicitations, and 23 percent of youth felt extremely upset when exposed to sexual material. Theauthors found that young people at risk for unwanted solicitation, harassment, and exposure tosexual content on the Internet tend to be troubled, older adolescents who use the Internetfrequently and engage in high-risk online behavior. However, they also found that half of theyouth reporting unwanted solicitation, harassment, or exposure to sexual materials were nottroubled, high-rate Internet users or frequent online risk takers.Mitchell, Kimberly J., David Finkelhor, and Janis Wolak. “The Exposure of Youth to UnwantedSexual Material on the Internet: A National Survey of Risk, Impact, and Prevention.” Youth andSociety 34, no. 3 (March 2003): 330–58.Analyzing data from the First Youth Internet Safety Survey (2000), which the Crimes AgainstChildren Research Center at the University of New Hampshire designed to determine theincidence of and risk factors for youth exposure to sexual material on the Internet, theresearchers sought to identify a subset of unwanted exposure described as very or extremelydistressing. Twenty-four percent of the 1,500 youth surveyed in this nationally representativesample reported feeling very or extremely upset about exposure to sexually explicit material, 21percent reported feeling very or extremely embarrassed, and 19 percent reported experiencing atleast one stress symptom related to the episode. Youth reporting symptoms of stress said thatthey had stayed away from the Internet after the incident, could not stop thinking about theepisode, felt jumpy or irritable, or had lost interest in their usual pursuits. In 43 percent of theepisodes, the youth had not disclosed their exposure to anybody. Those that did report it usuallytold a parent, friend, or sibling. When the youth or their family reported the incident to anauthority, they most frequently told a teacher or school official or the Internet service provider,but they had never reported the incident to police.The authors of the study discussed the survey’s flaws, such as the lack of standardized, validatedprocedures for collecting data on children exposed to sexual material on the Internet. Theyconclude that the study indicates the urgent need to collect further evidence to inform publicpolicy aimed at protecting youth from unsought exposure to sexually explicit material on theInternet.U. S. General Accounting Office. “File-Sharing Programs: Peer-to-Peer Networks ProvideReady Access to Child Pornography.” Report to the Chairman and Ranking Minority Member,Committee on Government Reform, House of Representatives, no. GAO–03–351, Washington,DC, 2003.The U.S. General Accounting Office (GAO) produced this report in response to a request fromthe House Committee on Government Reform that GAO investigate the ease of access to childpornography on peer-to-peer networks; the risk of inadvertent exposure of juvenile users of peerto-peernetworks to pornography (including child pornography); and the extent of federal lawenforcement resources for combating child pornography on peer-to-peer networks. Agents at theCustoms Cyber-Smuggling Center performed searches, and GAO performed analyses based onkeywords and file names only, finding that child pornography is easily found and downloadedfrom peer-to-peer networks. Depending on the keywords used, child pornography comprisedF-18
etween 42 and 44 percent of pornographic images found in a search of KaZaA (a popular peerto-peer,file-sharing program). The results were consistent with the observations of the NationalCenter for Missing & Exploited Children. Agents classified nearly half of the imagesdownloaded from keyword searches using celebrity names and cartoon characters aspornography, indicating that youth face a significant risk of inadvertent exposure to pornographywhile using networks like KaZaA. GAO also analyzed data on the allocation of resources at fouragencies, as well as resources that the National Center for Missing & Exploited Children hadallocated to combat child pornography. GAO found that these agencies had not devotedsignificant resources to combating child exploitation and child pornography in 2003. GAO wasunable to quantify the resources dedicated to child pornography investigations involving peer-topeernetworks.Thornburgh, Dick, and Herbert S. Lin, eds. Youth, Pornography and the Internet. Washington,DC: National Academy Press, 2002.This 450-page volume (including a bibliography and an index) is the product of a 1998 mandateof the U.S. Congress charging the National Research Council (NRC) to carry out a study ofpornography on the Internet. In response, the NRC Computer Science and TelecommunicationsBoard and the NRC Board on Children, Youth, and Families formed a committee to conduct thestudy. The committee members comprised a diverse group of people with expertise inconstitutional law, law enforcement, libraries and library science, developmental and socialpsychology, information technologies, ethics, and education. Chapters in this volume coverrelevant technologies, such as filtering, age verification software, and anonymizers; the adultonline entertainment industry and its practices related to minors; legal and regulatory issues,particularly issues related to the First Amendment, to federal and state laws and regulatoryefforts, and to law enforcement; children’s exposure to sexually explicit material on the Internet;research concerning the effects on individuals of exposure to sexually explicit material; publicdebate concerning the effects of such exposure; and legal and regulatory tools for protectingchildren from obscene material on the Internet.Jenkins, Philip. Beyond Tolerance: Child Pornography on the Internet. New York: New YorkUniversity Press, 2001.Over the course of nine chapters, Jenkins, a professor of history and religion who has writtenextensively about public perceptions of social problems, examines the issue of Internetregulation through the lens of child pornography. In the unique case of child pornography,Jenkins concludes that the government should impose some form of regulation aimed atdrastically reducing the presence of child pornography on the Internet. However, heacknowledges the persistent difficulty of determining what law or laws might successfullyachieve this end. Jenkins advocates the transformation of present law enforcement tactics andpriorities to meet the goal of controlling child pornography. He explores society’s views of childpornography and examines the new form of technology-driven social organization, which heconsiders responsible for perpetuating the problem of online child pornography.In his discussion of the social context of online pornography, Jenkins provides an overview ofthe history of child pornography on the Internet and explains how the business of online childF-19
- Page 181 and 182: Federal Bureau of Investigation (FB
- Page 183 and 184: scientific survey process, but rath
- Page 185 and 186: • 42 percent of respondents repor
- Page 187 and 188: The Effect of the Lack of Internet
- Page 189 and 190: • 44 percent of respondents repor
- Page 191 and 192: • 24 percent of respondents repor
- Page 193 and 194: ONLINE ENTICEMENTExtent of Online E
- Page 195 and 196: • 37 percent of respondents repor
- Page 197 and 198: • 8 percent of respondents report
- Page 199 and 200: SEX TOURISMNature and ExtentAmong N
- Page 201 and 202: • 50 percent of respondents repor
- Page 203 and 204: Average Federal and State Sentences
- Page 205 and 206: SOURCESNumerous federal, state, and
- Page 207 and 208: Federal Bureau of Investigation (FB
- Page 209 and 210: Southern Texas Utah VermontVirginia
- Page 211 and 212: APPENDIX EDEPARTMENT-FUNDED RESEARC
- Page 213 and 214: victimization. The project has four
- Page 215 and 216: APPENDIX FSYNTHESIS OF MAJOR STUDIE
- Page 217 and 218: 17 that among the participants who
- Page 219 and 220: authors, extrapolating survey data,
- Page 221 and 222: officials can gain greater awarenes
- Page 223 and 224: Moessner, Chris. “Cyberbullying.
- Page 225 and 226: The authors of this chapter in a bo
- Page 227 and 228: Wells, Melissa, David Finkelhor, Ja
- Page 229 and 230: The article reports the results of
- Page 231: system ۛincluding perspectives of
- Page 235 and 236: Reporting the demographic, psycholo
- Page 237 and 238: predator with a victim took place i
- Page 239 and 240: 1 Tinker v. Des Moines Independent
- Page 241 and 242: conducted between September 1999 an
- Page 243 and 244: with each grade level, with the per
- Page 245 and 246: Understanding Online Child Pornogra
- Page 247 and 248: focusing on violent (including sexu
- Page 249 and 250: their offending than did Internet o
- Page 251 and 252: trafficking, rape and sexual assaul
- Page 253 and 254: States Postal Inspection Service, 8
- Page 255 and 256: Getting to Grips with Sexual Groomi
- Page 257 and 258: Child Seduction and Self-Representa
- Page 259 and 260: Annotated Bibliography: Child Explo
- Page 261 and 262: Abstract The author discusses teach
- Page 263 and 264: implications for nursing practice i
- Page 265 and 266: providers assisting child victims,
- Page 267 and 268: Problematic Internet Experiences: P
- Page 269 and 270: Online Requests for Sexual Pictures
- Page 271 and 272: Sheldon Kennedy and a Canadian Trag
- Page 273 and 274: people involved in prostitution and
- Page 275 and 276: debates about child labour, exploit
- Page 277 and 278: Abstract The article presents the v
- Page 279 and 280: dealing with sexual offenses agains
instances of harassment as extremely upsetting, while 20 percent reported extremely upsettingsolicitations, <strong>and</strong> 23 percent of youth felt extremely upset when exposed to sexual material. <strong>The</strong>authors found that young people at risk <strong>for</strong> unwanted solicitation, harassment, <strong>and</strong> exposure tosexual content on the Internet tend to be troubled, older adolescents who use the Internetfrequently <strong>and</strong> engage in high-risk online behavior. However, they also found that half of theyouth reporting unwanted solicitation, harassment, or exposure to sexual materials were nottroubled, high-rate Internet users or frequent online risk takers.Mitchell, Kimberly J., David Finkelhor, <strong>and</strong> Janis Wolak. “<strong>The</strong> Exposure of Youth to UnwantedSexual Material on the Internet: A <strong>National</strong> Survey of Risk, Impact, <strong>and</strong> <strong>Prevention</strong>.” Youth <strong>and</strong>Society 34, no. 3 (March 2003): 330–58.Analyzing data from the First Youth Internet Safety Survey (2000), which the Crimes Against<strong>Child</strong>ren Research Center at the University of New Hampshire designed to determine theincidence of <strong>and</strong> risk factors <strong>for</strong> youth exposure to sexual material on the Internet, theresearchers sought to identify a subset of unwanted exposure described as very or extremelydistressing. Twenty-four percent of the 1,500 youth surveyed in this nationally representativesample reported feeling very or extremely upset about exposure to sexually explicit material, 21percent reported feeling very or extremely embarrassed, <strong>and</strong> 19 percent reported experiencing atleast one stress symptom related to the episode. Youth reporting symptoms of stress said thatthey had stayed away from the Internet after the incident, could not stop thinking about theepisode, felt jumpy or irritable, or had lost interest in their usual pursuits. In 43 percent of theepisodes, the youth had not disclosed their exposure to anybody. Those that did report it usuallytold a parent, friend, or sibling. When the youth or their family reported the incident to anauthority, they most frequently told a teacher or school official or the Internet service provider,but they had never reported the incident to police.<strong>The</strong> authors of the study discussed the survey’s flaws, such as the lack of st<strong>and</strong>ardized, validatedprocedures <strong>for</strong> collecting data on children exposed to sexual material on the Internet. <strong>The</strong>yconclude that the study indicates the urgent need to collect further evidence to in<strong>for</strong>m publicpolicy aimed at protecting youth from unsought exposure to sexually explicit material on theInternet.U. S. General Accounting Office. “File-Sharing Programs: Peer-to-Peer Networks ProvideReady Access to <strong>Child</strong> Pornography.” Report to the Chairman <strong>and</strong> Ranking Minority Member,Committee on Government Re<strong>for</strong>m, House of Representatives, no. GAO–03–351, Washington,DC, 2003.<strong>The</strong> U.S. General Accounting Office (GAO) produced this report in response to a request fromthe House Committee on Government Re<strong>for</strong>m that GAO investigate the ease of access to childpornography on peer-to-peer networks; the risk of inadvertent exposure of juvenile users of peerto-peernetworks to pornography (including child pornography); <strong>and</strong> the extent of federal lawen<strong>for</strong>cement resources <strong>for</strong> combating child pornography on peer-to-peer networks. Agents at theCustoms Cyber-Smuggling Center per<strong>for</strong>med searches, <strong>and</strong> GAO per<strong>for</strong>med analyses based onkeywords <strong>and</strong> file names only, finding that child pornography is easily found <strong>and</strong> downloadedfrom peer-to-peer networks. Depending on the keywords used, child pornography comprisedF-18