The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
For FY 2008, ICAC Task Forces reported 34,829 documented complaints, 19 which include childpornography (manufacture, distribution, or possession), traveler, enticement, obscenity directedto minors, and child prostitution, resulting in 12,248 investigations. For the first six months of2009, Task Forces reported 18,331 documented complaints, resulting in 5,936 investigations.The Table below shows the number and types of documented complaints to ICAC Task Forces.Documented Complaints to ICAC Task Forces (N=59)ICAC Complaints Type FY 2008Number ofComplaintsJan. – June 2009Number ofComplaintsTravelerProactive1,197476Reactive411265EnticementProactive3,2571,240Reactive3,4482,370Obscenity Directed to MinorsProactive1,240479Reactive1,3821,073Child ProstitutionProactive8576Reactive260162ManufactureProactive224193Reactive799585ChildProactive9,9352,375DistributionPornographyReactive3,0072,367PossessionProactive3,2632,688Reactive6,3213,982TOTAL COMPLAINTS 34,829 18,331Source: Reports from ICAC Task Forcesb. The thriving market for child pornography promotes the fresh abuse ofchildren.Most indicators reviewed by NDIC for this Assessment point to a steady and significant increasein the volume of child pornography traded over the Internet, and they similarly suggest theexistence of a large and global market. This growing and thriving market for child pornographicimages is responsible for fresh child sexual abuse—because the high demand for childpornography drives some individuals to sexually abuse children and some to “commission” theabuse for profit or status.In one case, a predator victimized more than 150 children for profit by before he was arrested byU.S. Postal Inspectors. 20 In another case, the defendant was a “photographer” who traveled19 A complaint is defined as any information requiring review by law enforcement in order to determine furtherinvestigative merit. A complaint may come from a variety of sources, including: citizen call ins, CyberTiplinereports, referrals from other law enforcement agencies, or undercover activity and may not lead to an actualinvestigation.20See Appendix B, Operation Lost Innocence: U.S. v. Mariscal.17
throughout several European countries to arrange, witness, and film the sexual abuse ofapproximately 20 underage girls. The “photographer” then sold the abusive images worldwidethrough his commercial web site. The initial exposure was estimated to have reached more than3,000 active traders in approximately 28 countries. He also offered his customers the opportunityto make special requests for videos, purchase the child-sized lingerie used in some of the videos,and, in one case, the opportunity to travel to Europe to photograph the underage girls with him. 21Another investigation revealed that offenders would congregate with like-minded people on theInternet and sometimes encourage each other to act out their fantasies and share proof. InOperation Hamlet, offenders abused their own children and made them available to othermembers of the group for the same purpose. 22 Another case revealed that some childpornography offenders are driven to abuse children because providing new images to their onlinecommunities gives them “status.” 23 Some communities have restricted memberships, allowingentry only to those who contribute an image not already possessed by the group. In someinstances, fathers have abused their own children, not out of any apparent sexual attraction totheir children, but because they wanted to reap the benefits of producing and introducing a newchild pornographic image into the market and their children were easily accessible targets. 24In one highly publicized investigation, Federal Bureau of Investigation (FBI) agents intervieweda man who admitted molesting his daughter and videotaping the sometimes violent assaults. Thechild, who was 9-years-old when interviewed, said her father began assaulting her when she was5-years-old. She said he would assault her and immediately publish the assaults on the Internet.The man told agents that he began molesting his daughter because he needed "fresh" images toprovide others on the Internet before they would trade their own newest or least-circulatedimages with him. He described his desire for images he had not seen and said that, to get them,he was required to provide images others had not seen in trade.21See Appendix A, Operation Joint Hammer.22See Appendix A, Operation Hamlet. 23See Appendix C, Quayle et al. 24See Appendix C, Quayle (Fathers Victimizing Their Children.) 18
- Page 1: U.S. Department of Justice
- Page 5 and 6: 4. UNITED STATES ATTORNEY’S OFFIC
- Page 7 and 8: V. CONCLUSION .....................
- Page 9 and 10: amount of information, including: (
- Page 12 and 13: assisting state, local, tribal and
- Page 14 and 15: goals that can provide some measura
- Page 16 and 17: State and federal investigators and
- Page 18 and 19: a. Available indicators suggest chi
- Page 20 and 21: These two applications (Fairplay, R
- Page 22 and 23: The Figure below shows the number o
- Page 26 and 27: Some researchers suggest that viewi
- Page 28 and 29: interests in children and their des
- Page 31 and 32: could later bediscovered by lawenfo
- Page 33 and 34: domains are commercial purveyors of
- Page 35 and 36: • The offender communicates with
- Page 37 and 38: 1. Online enticement complaints are
- Page 39 and 40: elationship. After the child has ga
- Page 41 and 42: Influenced and Corrupt Organization
- Page 43 and 44: D. Child Sex TourismChild sex touri
- Page 45 and 46: Exploitation of Children Today (PRO
- Page 47 and 48: A task force model often is employe
- Page 49 and 50: The United States Attorney’s offi
- Page 51 and 52: FBI and CEOS, in conjunction with N
- Page 53 and 54: The effects of child sex tourism re
- Page 55 and 56: 352 investigations and 162 charged
- Page 57 and 58: • CEOS worked closely with NDIC i
- Page 59 and 60: • Alameda County, CA, Children's
- Page 61 and 62: • Additional data have been submi
- Page 63 and 64: postsentence persons and civilly co
- Page 65 and 66: B. A Review of the Internet Crimes
- Page 67 and 68: • Providing training and technica
- Page 69 and 70: Table 1 : ICAC Task Force Agencies
- Page 71 and 72: State Task Force Agency Number of T
- Page 73 and 74: State Agency FY 2009 FY 2009 FY 200
throughout several European countries to arrange, witness, <strong>and</strong> film the sexual abuse ofapproximately 20 underage girls. <strong>The</strong> “photographer” then sold the abusive images worldwidethrough his commercial web site. <strong>The</strong> initial exposure was estimated to have reached more than3,000 active traders in approximately 28 countries. He also offered his customers the opportunityto make special requests <strong>for</strong> videos, purchase the child-sized lingerie used in some of the videos,<strong>and</strong>, in one case, the opportunity to travel to Europe to photograph the underage girls with him. 21Another investigation revealed that offenders would congregate with like-minded people on theInternet <strong>and</strong> sometimes encourage each other to act out their fantasies <strong>and</strong> share proof. InOperation Hamlet, offenders abused their own children <strong>and</strong> made them available to othermembers of the group <strong>for</strong> the same purpose. 22 Another case revealed that some childpornography offenders are driven to abuse children because providing new images to their onlinecommunities gives them “status.” 23 Some communities have restricted memberships, allowingentry only to those who contribute an image not already possessed by the group. In someinstances, fathers have abused their own children, not out of any apparent sexual attraction totheir children, but because they wanted to reap the benefits of producing <strong>and</strong> introducing a newchild pornographic image into the market <strong>and</strong> their children were easily accessible targets. 24In one highly publicized investigation, Federal Bureau of Investigation (FBI) agents intervieweda man who admitted molesting his daughter <strong>and</strong> videotaping the sometimes violent assaults. <strong>The</strong>child, who was 9-years-old when interviewed, said her father began assaulting her when she was5-years-old. She said he would assault her <strong>and</strong> immediately publish the assaults on the Internet.<strong>The</strong> man told agents that he began molesting his daughter because he needed "fresh" images toprovide others on the Internet be<strong>for</strong>e they would trade their own newest or least-circulatedimages with him. He described his desire <strong>for</strong> images he had not seen <strong>and</strong> said that, to get them,he was required to provide images others had not seen in trade.21See Appendix A, Operation Joint Hammer.22See Appendix A, Operation Hamlet. 23See Appendix C, Quayle et al. 24See Appendix C, Quayle (Fathers Victimizing <strong>The</strong>ir <strong>Child</strong>ren.) 18