The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
10. Assessment of leveraging State and local funds.In addition to bi-annual federal grants to support the work of the ICAC Task Forces 89 , most TaskForces also receive cash or in-kind support from State and local authorities. The State and localfunds are leveraged through the federal support for the ICAC program. Data from a sample ofICAC Task Forces reflecting leveraged State and local funds are shown in the Table below,along with the average annual OJJDP funding awarded to the ICAC Task Forces during each ofthe three fiscal years. These data are reported over three fiscal years, FY 2006, 2007 and 2008.Average Total and Percentage of Leveraged Local and State Funds to ICAC Task Forces(N=19)Fiscal YearFunding SourceAverage Local ContributionOJJDP Average AwardAverage Annual Operational Cost2006$ 488,526$ 424,993$ 915,5252007$ 604,107$ 458,333$ 1,064,4472008$ 665,877$ 462,873$ 1,130,758Percent of ICAC Operations53%Supported with Leveraged State andLocal FundsSource: Reports from ICAC Task Forces and OJJDP56%58%OJJDP is taking steps to collect annual data on State and local funds from all Task Forces. Thesedata will be available in 2011.C. Other Federal Agencies’ Efforts1. Department of Homeland Security’s EffortsThe Department of Homeland Security (DHS) leverages resources within federal, state, and localgovernments, coordinating the transition of multiple agencies and programs into a single,integrated agency. More than 87,000 different governmental jurisdictions at the federal, state,and local level have homeland security responsibilities. The comprehensive national strategyseeks to develop a complementary system connecting all levels of government withoutduplicating effort.Created in March 2003, Immigration and Customs Enforcement (ICE) is the largest investigativebranch of the Department of Homeland Security. The agency combines the law enforcementarms of the former Immigration and Naturalization Service (INS) and the former U.S. CustomsService to more effectively enforce our immigration and customs laws and to protect the UnitedStates against terrorist attacks. In the fight against child exploitation and human trafficking, ICE89 In 2009 OJJDP changed the ICAC Task Force budget cycle from 24 months to 12 months to more efficientlycomply with the provision of the PROTECT Act.81
has developed highly successful initiatives that focus on identifying, investigating, and arrestingchild predators and sexual offenders, as well as attacking the infrastructure that supportssmuggling and trafficking organizations and the assets that are derived from these criminalactivities. This might include seizing currency, property, weapons, and vehicles.ICE plays a significant role in combating the sexual exploitation of children. ICE accomplishesthis mission through the Office of Investigations (OI), the Office of International Affairs (OIA),the Office of Intelligence, and the Office of Detention and Removal (DRO).During FY 2010, the Federal Law Enforcement Training Center (FLETC) led a team of subjectmatter experts from various DHS components to develop computer/web based training (CBT) forFederal, state, local and tribal law enforcement officers to increase awareness of indicators ofhuman trafficking. There are four video training scenarios, one of which addresses trafficking ofminors who are sexually exploited. This interactive, web-based training also includes resourceinformation from ICEa. Office of Investigationsi. Cyber Crimes Center (C3) Child Exploitation SectionInitiated in 1997, the Cyber Crimes Center (C3) Child Exploitation Section (CES) investigateslarge-scale producers and distributors of child pornography as well as individuals who travel inforeign commerce for the purpose of engaging in sex with minors. The CES employs the latesttechnology to collect evidence and track the activities of individuals and organized groups whosexually exploit children through the use of websites, chat rooms, newsgroups and peer-to-peertrading. The CES also conducts clandestine operations throughout the world to identify andapprehend violators. The CES assists the field offices and routinely coordinates majorinvestigations. The CES works closely with law enforcement agencies from around the worldbecause the exploitation of children is a matter of global importance. The CES manages theentire ICE Child Exploitation Program to include: Operation Predator.Operation Predator is a program designed to identify, investigate, and as appropriate,administratively remove child predators through the efforts of four principal entities of ICE: theOffice of Investigations, the Office of International Affairs, the Office of Detention andRemoval, and the Federal Protective Service. Officially launched by ICE on July 9, 2003,Operation Predator combines immigration investigative and administrative initiatives that targetforeign nationals, undocumented aliens, and previously deported criminal aliens involved inchild exploitation crimes and investigate the importation and exportation of images associatedwith child exploitation. Operation Predator works in partnership with the Justice’s Project SafeChildhood, a comprehensive program to integrate the efforts of federal, state, and local lawenforcement, non-government organizations, industry, and communities to counter the issue ofchild exploitation. ICE, through Operation Predator, maintains relationships with the NationalCenter for Missing & Exploited Children, the Federal Bureau of Investigation (FBI), U.S. PostalInspection Service, U.S. Secret Service, the Department of Justice, and the Internet CrimesAgainst Children Task Forces. ICE focuses on the international, trans-border dimension of childexploitation and integrates this enforcement with the national and local efforts of other law82
- Page 37 and 38: 1. Online enticement complaints are
- Page 39 and 40: elationship. After the child has ga
- Page 41 and 42: Influenced and Corrupt Organization
- Page 43 and 44: D. Child Sex TourismChild sex touri
- Page 45 and 46: Exploitation of Children Today (PRO
- Page 47 and 48: A task force model often is employe
- Page 49 and 50: The United States Attorney’s offi
- Page 51 and 52: FBI and CEOS, in conjunction with N
- Page 53 and 54: The effects of child sex tourism re
- Page 55 and 56: 352 investigations and 162 charged
- Page 57 and 58: • CEOS worked closely with NDIC i
- Page 59 and 60: • Alameda County, CA, Children's
- Page 61 and 62: • Additional data have been submi
- Page 63 and 64: postsentence persons and civilly co
- Page 65 and 66: B. A Review of the Internet Crimes
- Page 67 and 68: • Providing training and technica
- Page 69 and 70: Table 1 : ICAC Task Force Agencies
- Page 71 and 72: State Task Force Agency Number of T
- Page 73 and 74: State Agency FY 2009 FY 2009 FY 200
- Page 75 and 76: State Agency FY2008#AZCACACACACACOC
- Page 77 and 78: Number of Criminal Referrals to Uni
- Page 79 and 80: d. Number of local prosecutions and
- Page 81 and 82: State Agency FY 2008# of Cases Refe
- Page 83 and 84: State Agency FY 2008 Jan.-June 2009
- Page 85 and 86: 8. Number and type of ICAC Task For
- Page 87: ICAC Undercover Chat 4 Regional 9.2
- Page 91 and 92: field offices, both domestic and fo
- Page 93 and 94: 2. Department of Defense’s Effort
- Page 95 and 96: of a mail circular. Since the progr
- Page 97 and 98: • The Street Outreach Program fun
- Page 99 and 100: the Defense Computer Forensic Labor
- Page 101 and 102: • Distributes photographs and des
- Page 103 and 104: iii. Enough Is EnoughEnough Is Enou
- Page 105 and 106: 1. Overarching Efforts to Coordinat
- Page 107 and 108: combine resources and expertise on
- Page 109 and 110: United States has submitted annual
- Page 111 and 112: CEOS has worked with foreign law en
- Page 113 and 114: . Department of Homeland Security
- Page 115 and 116: Finally, G/TIP has worked extensive
- Page 117 and 118: F. Review of Internet Safety Progra
- Page 119 and 120: the accessibility, cost, and effect
- Page 121 and 122: activity by predators searching for
- Page 123 and 124: 3. Federal Trade Commission and Dep
- Page 125 and 126: Funder: • U.S. Department of Agri
- Page 127 and 128: Delivery: • Online games; printab
- Page 129 and 130: TABLE 1: FEDERALLY FUNDED INTERNET
- Page 131 and 132: Program/Product NameandContactInfor
- Page 133 and 134: TABLE 2: SAMPLE OF PRIVATE NONPROFI
- Page 135 and 136: Program/Product NameProducerFor Kid
- Page 137 and 138: TABLE 1: PARTICIPANT EVALUATIONS OF
10. Assessment of leveraging State <strong>and</strong> local funds.In addition to bi-annual federal grants to support the work of the ICAC Task Forces 89 , most TaskForces also receive cash or in-kind support from State <strong>and</strong> local authorities. <strong>The</strong> State <strong>and</strong> localfunds are leveraged through the federal support <strong>for</strong> the ICAC program. Data from a sample ofICAC Task Forces reflecting leveraged State <strong>and</strong> local funds are shown in the Table below,along with the average annual OJJDP funding awarded to the ICAC Task Forces during each ofthe three fiscal years. <strong>The</strong>se data are reported over three fiscal years, FY 2006, 2007 <strong>and</strong> 2008.Average Total <strong>and</strong> Percentage of Leveraged Local <strong>and</strong> State Funds to ICAC Task Forces(N=19)Fiscal YearFunding SourceAverage Local ContributionOJJDP Average AwardAverage Annual Operational Cost2006$ 488,526$ 424,993$ 915,5252007$ 604,107$ 458,333$ 1,064,4472008$ 665,877$ 462,873$ 1,130,758Percent of ICAC Operations53%Supported with Leveraged State <strong>and</strong>Local FundsSource: Reports from ICAC Task Forces <strong>and</strong> OJJDP56%58%OJJDP is taking steps to collect annual data on State <strong>and</strong> local funds from all Task Forces. <strong>The</strong>sedata will be available in 2011.C. Other Federal Agencies’ Ef<strong>for</strong>ts1. Department of Homel<strong>and</strong> Security’s Ef<strong>for</strong>ts<strong>The</strong> Department of Homel<strong>and</strong> Security (DHS) leverages resources within federal, state, <strong>and</strong> localgovernments, coordinating the transition of multiple agencies <strong>and</strong> programs into a single,integrated agency. More than 87,000 different governmental jurisdictions at the federal, state,<strong>and</strong> local level have homel<strong>and</strong> security responsibilities. <strong>The</strong> comprehensive national strategyseeks to develop a complementary system connecting all levels of government withoutduplicating ef<strong>for</strong>t.Created in March 2003, Immigration <strong>and</strong> Customs En<strong>for</strong>cement (ICE) is the largest investigativebranch of the Department of Homel<strong>and</strong> Security. <strong>The</strong> agency combines the law en<strong>for</strong>cementarms of the <strong>for</strong>mer Immigration <strong>and</strong> Naturalization Service (INS) <strong>and</strong> the <strong>for</strong>mer U.S. CustomsService to more effectively en<strong>for</strong>ce our immigration <strong>and</strong> customs laws <strong>and</strong> to protect the UnitedStates against terrorist attacks. In the fight against child exploitation <strong>and</strong> human trafficking, ICE89 In 2009 OJJDP changed the ICAC Task Force budget cycle from 24 months to 12 months to more efficientlycomply with the provision of the PROTECT Act.81