The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
B. Online EnticementOnline offenders use the Internet to entice and manipulate children into situations in which theybecome vulnerable to sexual exploitation, particularly child pornography, sexual contact, andabduction. From 2004 through 2008, ICAC task force officers processed 20,562 documentedonline enticement complaints, including 7,879 documented complaints of suspectedtravelers 51 —aggressive and dangerous online child predators who travel to the location of a childfor the purpose of establishing physical contact. 52From 2004 through 2008, ICAC task force officers processed 20,562documented online enticement complaints, including 7,879 documentedcomplaints of suspected travelers 1 —aggressive and dangerous online childpredators who travel to the location of a child for the purpose of establishingphysical contact.Online enticement can lead to offenders’ grooming victims to self-produce child pornography,which then becomes part of the child pornography market and forever harms the child. Recentcase examples have shown offenders using web cams to entice the minor to perform a sex act infront of the camera that he then records. Often, the offender will blackmail the minor intoengaging in these acts through threats to reveal a less explicit recorded image to friends andfamily. NCMEC data show that approximately 28 percent of identified child victims seen inchild pornography produced the images of themselves, whether by inducement or not, and thissegment of child pornography has been increasing. 53In addition, another possible consequence of online enticement is abduction. According toNational Incidence Studies on Missing, Abducted, Runaway and Throwaway Children, theprimary motive in non-family abductions is sexual. Since the inception of the Child AbductionRapid Deployment (CARD) teams in October 2005, the FBI has developed 10 CARD teams tocombat this risk by aiding state and local law enforcement in child abduction investigations. 64percent of non-family abduction deployments have resulted in the child victim being sexuallyvictimized by their abductor. Moreover, in 36 percent of non-family abductions, the child victimwas murdered by their abductor.51 For Department reporting purposes, a traveler investigation involves the transportation of at least one individualfor the purpose of sexual conduct with a minor.52 Travelers meet specific children for the purpose of engaging in illegal sexual conduct. Children who makecontact with such predators are at great risk of kidnapping, rape, torture, or murder. These predators may travelwithin a state or region, across the country, or even internationally to meet a potential victim. They also may arrangefor a victim to travel to meet them.53See Appendix D, NCMEC.29
1. Online enticement complaints are increasing, drawing more law enforcementresources into complex and time-consuming investigations.Children are increasingly targeted for sexual exploitation by individuals who monitor Internetforums for potential victims. From 2004 through 2008 there were sharp increases in the numberof online enticement incidents reported to the NCMEC CyberTipline 54 and the number ofdocumented enticement complaints processed by ICAC investigators. 55 However, there is noactual measurement of online enticement. NCMEC acknowledges that increased publicawareness has contributed to the increased number of incidents reported to the CyberTipline.Still, recent publicity has highlighted the fact that two prominent social networking sites had todelete the accounts of thousands of registered sex offenders using their sites.Investigating the rising number of online enticement complaints poses a relatively new strain onlaw enforcement resources because online enticement cases require specialized technical trainingfor investigators, coordination with Internet providers, and, often, the support of computerforensic examiners to recover digital evidence from computers and other electronic storagedevices. Depending on the technical ability of the offender and the complexity of the case, childsexual exploitation investigations involving computer forensic evidence may be resolved in afew days or take years. Officers pursuing individual online predator suspects may monitor asuspect’s Internet activity across several online forums, aliases, and communication devices.2. Online predators demonstrate great patience in manipulating children intovulnerable situations.Online predators gradually manipulate or “groom” children until they voluntarily provide sexualimages online or agree to meetpredators for sex. Grooming is the Video Game Chatpsychological process predators In January 2008, a 27-year-old Missouri man allegedlyalways have used to encourage traveled to California to meet a 15-year-old girl with thechildren to engage in sexual activity,intention of engaging in sex. He initially made contactwith the girl while playing video games on the Internetbut it is now being applied to onlineand developed the relationship by using social networkingenticement. 56 Grooming typicallysites, text messaging, and a cell phone he sent to her as abegins with the selection of a child birthday present. He was charged with using interstatewho exhibits desired behaviors or commerce to entice or coerce a minor to engage in sexualpsychological characteristics such as activity and traveling in interstate commerce to engage inlow self-esteem or family problems. illicit sexual activity.The victim frequently is shownincreasing levels of attention,Source: ICE, News Release, “Missouri Man Charged withaffection, empathy, and generosity. Traveling to California to Engage in Sex with Minor He Met onXbox LIVE,” February 6, 2009.Online predators often relate tochildren through mastering music,54 See Appendix D, Figure 4.55 See Appendix D, Figure 7.56 Enticement is the unlawful solicitation of a minor by any means for unlawful sexual conduct, according to the Department, Office of Juvenile Justice Programs. 30
- Page 1: U.S. Department of Justice
- Page 5 and 6: 4. UNITED STATES ATTORNEY’S OFFIC
- Page 7 and 8: V. CONCLUSION .....................
- Page 9 and 10: amount of information, including: (
- Page 12 and 13: assisting state, local, tribal and
- Page 14 and 15: goals that can provide some measura
- Page 16 and 17: State and federal investigators and
- Page 18 and 19: a. Available indicators suggest chi
- Page 20 and 21: These two applications (Fairplay, R
- Page 22 and 23: The Figure below shows the number o
- Page 24 and 25: For FY 2008, ICAC Task Forces repor
- Page 26 and 27: Some researchers suggest that viewi
- Page 28 and 29: interests in children and their des
- Page 31 and 32: could later bediscovered by lawenfo
- Page 33 and 34: domains are commercial purveyors of
- Page 35: • The offender communicates with
- Page 39 and 40: elationship. After the child has ga
- Page 41 and 42: Influenced and Corrupt Organization
- Page 43 and 44: D. Child Sex TourismChild sex touri
- Page 45 and 46: Exploitation of Children Today (PRO
- Page 47 and 48: A task force model often is employe
- Page 49 and 50: The United States Attorney’s offi
- Page 51 and 52: FBI and CEOS, in conjunction with N
- Page 53 and 54: The effects of child sex tourism re
- Page 55 and 56: 352 investigations and 162 charged
- Page 57 and 58: • CEOS worked closely with NDIC i
- Page 59 and 60: • Alameda County, CA, Children's
- Page 61 and 62: • Additional data have been submi
- Page 63 and 64: postsentence persons and civilly co
- Page 65 and 66: B. A Review of the Internet Crimes
- Page 67 and 68: • Providing training and technica
- Page 69 and 70: Table 1 : ICAC Task Force Agencies
- Page 71 and 72: State Task Force Agency Number of T
- Page 73 and 74: State Agency FY 2009 FY 2009 FY 200
- Page 75 and 76: State Agency FY2008#AZCACACACACACOC
- Page 77 and 78: Number of Criminal Referrals to Uni
- Page 79 and 80: d. Number of local prosecutions and
- Page 81 and 82: State Agency FY 2008# of Cases Refe
- Page 83 and 84: State Agency FY 2008 Jan.-June 2009
- Page 85 and 86: 8. Number and type of ICAC Task For
B. Online EnticementOnline offenders use the Internet to entice <strong>and</strong> manipulate children into situations in which theybecome vulnerable to sexual exploitation, particularly child pornography, sexual contact, <strong>and</strong>abduction. From 2004 through 2008, ICAC task <strong>for</strong>ce officers processed 20,562 documentedonline enticement complaints, including 7,879 documented complaints of suspectedtravelers 51 —aggressive <strong>and</strong> dangerous online child predators who travel to the location of a child<strong>for</strong> the purpose of establishing physical contact. 52From 2004 through 2008, ICAC task <strong>for</strong>ce officers processed 20,562documented online enticement complaints, including 7,879 documentedcomplaints of suspected travelers 1 —aggressive <strong>and</strong> dangerous online childpredators who travel to the location of a child <strong>for</strong> the purpose of establishingphysical contact.Online enticement can lead to offenders’ grooming victims to self-produce child pornography,which then becomes part of the child pornography market <strong>and</strong> <strong>for</strong>ever harms the child. Recentcase examples have shown offenders using web cams to entice the minor to per<strong>for</strong>m a sex act infront of the camera that he then records. Often, the offender will blackmail the minor intoengaging in these acts through threats to reveal a less explicit recorded image to friends <strong>and</strong>family. NCMEC data show that approximately 28 percent of identified child victims seen inchild pornography produced the images of themselves, whether by inducement or not, <strong>and</strong> thissegment of child pornography has been increasing. 53In addition, another possible consequence of online enticement is abduction. According to<strong>National</strong> Incidence Studies on Missing, Abducted, Runaway <strong>and</strong> Throwaway <strong>Child</strong>ren, theprimary motive in non-family abductions is sexual. Since the inception of the <strong>Child</strong> AbductionRapid Deployment (CARD) teams in October 2005, the FBI has developed 10 CARD teams tocombat this risk by aiding state <strong>and</strong> local law en<strong>for</strong>cement in child abduction investigations. 64percent of non-family abduction deployments have resulted in the child victim being sexuallyvictimized by their abductor. Moreover, in 36 percent of non-family abductions, the child victimwas murdered by their abductor.51 For Department reporting purposes, a traveler investigation involves the transportation of at least one individual<strong>for</strong> the purpose of sexual conduct with a minor.52 Travelers meet specific children <strong>for</strong> the purpose of engaging in illegal sexual conduct. <strong>Child</strong>ren who makecontact with such predators are at great risk of kidnapping, rape, torture, or murder. <strong>The</strong>se predators may travelwithin a state or region, across the country, or even internationally to meet a potential victim. <strong>The</strong>y also may arrange<strong>for</strong> a victim to travel to meet them.53See Appendix D, NCMEC.29