The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

For FY 2008, ICAC Task Forces reported 34,829 documented complaints, 19 which include childpornography (manufacture, distribution, or possession), traveler, enticement, obscenity directedto minors, and child prostitution, resulting in 12,248 investigations. For the first six months of2009, Task Forces reported 18,331 documented complaints, resulting in 5,936 investigations.The Table below shows the number and types of documented complaints to ICAC Task Forces.Documented Complaints to ICAC Task Forces (N=59)ICAC Complaints Type FY 2008Number ofComplaintsJan. – June 2009Number ofComplaintsTravelerProactive1,197476Reactive411265EnticementProactive3,2571,240Reactive3,4482,370Obscenity Directed to MinorsProactive1,240479Reactive1,3821,073Child ProstitutionProactive8576Reactive260162ManufactureProactive224193Reactive799585ChildProactive9,9352,375DistributionPornographyReactive3,0072,367PossessionProactive3,2632,688Reactive6,3213,982TOTAL COMPLAINTS 34,829 18,331Source: Reports from ICAC Task Forcesb. The thriving market for child pornography promotes the fresh abuse ofchildren.Most indicators reviewed by NDIC for this Assessment point to a steady and significant increasein the volume of child pornography traded over the Internet, and they similarly suggest theexistence of a large and global market. This growing and thriving market for child pornographicimages is responsible for fresh child sexual abuse—because the high demand for childpornography drives some individuals to sexually abuse children and some to “commission” theabuse for profit or status.In one case, a predator victimized more than 150 children for profit by before he was arrested byU.S. Postal Inspectors. 20 In another case, the defendant was a “photographer” who traveled19 A complaint is defined as any information requiring review by law enforcement in order to determine furtherinvestigative merit. A complaint may come from a variety of sources, including: citizen call ins, CyberTiplinereports, referrals from other law enforcement agencies, or undercover activity and may not lead to an actualinvestigation.20See Appendix B, Operation Lost Innocence: U.S. v. Mariscal.17

throughout several European countries to arrange, witness, and film the sexual abuse ofapproximately 20 underage girls. The “photographer” then sold the abusive images worldwidethrough his commercial web site. The initial exposure was estimated to have reached more than3,000 active traders in approximately 28 countries. He also offered his customers the opportunityto make special requests for videos, purchase the child-sized lingerie used in some of the videos,and, in one case, the opportunity to travel to Europe to photograph the underage girls with him. 21Another investigation revealed that offenders would congregate with like-minded people on theInternet and sometimes encourage each other to act out their fantasies and share proof. InOperation Hamlet, offenders abused their own children and made them available to othermembers of the group for the same purpose. 22 Another case revealed that some childpornography offenders are driven to abuse children because providing new images to their onlinecommunities gives them “status.” 23 Some communities have restricted memberships, allowingentry only to those who contribute an image not already possessed by the group. In someinstances, fathers have abused their own children, not out of any apparent sexual attraction totheir children, but because they wanted to reap the benefits of producing and introducing a newchild pornographic image into the market and their children were easily accessible targets. 24In one highly publicized investigation, Federal Bureau of Investigation (FBI) agents intervieweda man who admitted molesting his daughter and videotaping the sometimes violent assaults. Thechild, who was 9-years-old when interviewed, said her father began assaulting her when she was5-years-old. She said he would assault her and immediately publish the assaults on the Internet.The man told agents that he began molesting his daughter because he needed "fresh" images toprovide others on the Internet before they would trade their own newest or least-circulatedimages with him. He described his desire for images he had not seen and said that, to get them,he was required to provide images others had not seen in trade.21See Appendix A, Operation Joint Hammer.22See Appendix A, Operation Hamlet. 23See Appendix C, Quayle et al. 24See Appendix C, Quayle (Fathers Victimizing Their Children.) 18

throughout several European countries to arrange, witness, <strong>and</strong> film the sexual abuse ofapproximately 20 underage girls. <strong>The</strong> “photographer” then sold the abusive images worldwidethrough his commercial web site. <strong>The</strong> initial exposure was estimated to have reached more than3,000 active traders in approximately 28 countries. He also offered his customers the opportunityto make special requests <strong>for</strong> videos, purchase the child-sized lingerie used in some of the videos,<strong>and</strong>, in one case, the opportunity to travel to Europe to photograph the underage girls with him. 21Another investigation revealed that offenders would congregate with like-minded people on theInternet <strong>and</strong> sometimes encourage each other to act out their fantasies <strong>and</strong> share proof. InOperation Hamlet, offenders abused their own children <strong>and</strong> made them available to othermembers of the group <strong>for</strong> the same purpose. 22 Another case revealed that some childpornography offenders are driven to abuse children because providing new images to their onlinecommunities gives them “status.” 23 Some communities have restricted memberships, allowingentry only to those who contribute an image not already possessed by the group. In someinstances, fathers have abused their own children, not out of any apparent sexual attraction totheir children, but because they wanted to reap the benefits of producing <strong>and</strong> introducing a newchild pornographic image into the market <strong>and</strong> their children were easily accessible targets. 24In one highly publicized investigation, Federal Bureau of Investigation (FBI) agents intervieweda man who admitted molesting his daughter <strong>and</strong> videotaping the sometimes violent assaults. <strong>The</strong>child, who was 9-years-old when interviewed, said her father began assaulting her when she was5-years-old. She said he would assault her <strong>and</strong> immediately publish the assaults on the Internet.<strong>The</strong> man told agents that he began molesting his daughter because he needed "fresh" images toprovide others on the Internet be<strong>for</strong>e they would trade their own newest or least-circulatedimages with him. He described his desire <strong>for</strong> images he had not seen <strong>and</strong> said that, to get them,he was required to provide images others had not seen in trade.21See Appendix A, Operation Joint Hammer.22See Appendix A, Operation Hamlet. 23See Appendix C, Quayle et al. 24See Appendix C, Quayle (Fathers Victimizing <strong>The</strong>ir <strong>Child</strong>ren.) 18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!