13.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Child</strong> Pornography and SexualExploitation of <strong>Child</strong>ren Onl<strong>in</strong>eDr. E<strong>the</strong>l QuayleLars LoofT<strong>in</strong>k PalmerSubmitted by ECPAT International


Table of ContentsAcknowledgments 3Executive Summary 71. Introduction 62. Adult perpetra<strong>to</strong>rs of abuse 92.1 <strong>Child</strong> pornography and abusive images 92.2 Virtual child pornography 172.3 The Internet sex offender, <strong>the</strong> Internet sex exploiter and harms facilitatedby <strong>the</strong> new technologies 212.4 Who are <strong>the</strong>se people? 272.5 Technologies used 312.6 The relationship between view<strong>in</strong>g and <strong>the</strong> commission of fur<strong>the</strong>rsexual offences aga<strong>in</strong>st children 363. <strong>Child</strong> victims of abuse via <strong>the</strong> new technologies 393.1 Identification of <strong>the</strong> child victim <strong>in</strong> abusive images 393.2 The impact of Internet-related sexual abuse 433.2.1 <strong>Child</strong>ren made <strong>the</strong> subjects of abuse images 453.2.2 Work<strong>in</strong>g with children abused through abusive images on <strong>the</strong> Internet 503.3 <strong>Child</strong>ren persuaded and coerced <strong>in</strong><strong>to</strong> offl<strong>in</strong>e encounters lead<strong>in</strong>g <strong>to</strong> sexual abuse 534. Young people’s behaviour onl<strong>in</strong>e 584.1 Access<strong>in</strong>g pornography onl<strong>in</strong>e 584.2 Internet affordance 624.3 Stay<strong>in</strong>g safe on <strong>the</strong> Internet 654.4 Explor<strong>in</strong>g new terri<strong>to</strong>ries vs. unsafe practices 704.5 Young people’s sexually problematic behaviours and <strong>the</strong> new technologies 724.5.1 Sexual solicitation 724.5.2 Young people access<strong>in</strong>g child abuse images 735. Cultural and geographical diversity and <strong>the</strong> connection betweenonl<strong>in</strong>e exploitation and o<strong>the</strong>r forms of sexual exploitation of children 765.1 Cultural and geographical diversity 765.2 Internet child pornography and <strong>the</strong> law 826. Prevention and education 926.1 Youth, agency and education 926.1.1 In<strong>format</strong>ion materials 926.1.2 Onl<strong>in</strong>e safety <strong>to</strong>ols 936.1.3 Helpl<strong>in</strong>es 946.1.4 Education packages for use <strong>in</strong> school sett<strong>in</strong>gs 94|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


6.1.5 Media co-operation 956.1.6 Evaluation of impact 956.2 The role of <strong>in</strong>dustry, <strong>the</strong> private sec<strong>to</strong>r and NGOs 966.2.1 INHOPE 966.2.2 IWF 976.2.3 IT <strong>in</strong>dustry response 1007. Recommendations 1037.1 Actions <strong>to</strong> be achieved <strong>in</strong> <strong>the</strong> immediate future 1037.2 Actions <strong>to</strong> be achieved by 2013 104Endnotes 105Bibliography 106Figures and Tables:Table 1: COPINE scale (Taylor et al., 2001) 14Table 2: Krone’s (2004) typology 24Table 3: Content of images acquired by offenders (Baartz, 2008) 30Table 4: Identified children reported <strong>to</strong> NCMEC by law enforcement agencies(Lee, 2008) 39Table 5: Disclosure of abuse through image production (Söderström, 2006) 47Figure 1: Cumulative distribution of files relat<strong>in</strong>g <strong>to</strong> age of child 33Figure 2: Ethnic groups <strong>in</strong> abuse images (Baartz, 2008) 41Figure 3: Ages of children <strong>in</strong> abuse images (Baartz, 2008) 42Figure 4: Ages of child victims on child abuse websites (IWF, 2007) 98Figure 5: Abuse image level for URLs 2004–6 (IWF, 2006) 98Figure 6: <strong>Child</strong> abuse doma<strong>in</strong>s by region (IWF, 2006) 99<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |


AcknowledgmentsThere are many people <strong>to</strong> thank for help<strong>in</strong>g us <strong>to</strong> prepare this paper: <strong>the</strong> ECPATInternational team; all who attended <strong>the</strong> Thematic Meet<strong>in</strong>g <strong>in</strong> Bangkok <strong>in</strong> August 2008and <strong>the</strong> regional meet<strong>in</strong>gs that <strong>to</strong>ok place throughout <strong>the</strong> world; Marta San<strong>to</strong>s Pais etal., Innocenti Research <strong>Centre</strong>; Danya Glaser, President of ISPCAN; Veronica Birga,OHCHR; Juan Miguel Petit, former Special Rapporteur on <strong>the</strong> sale of children, childprostitution and child pornography; Alisdair Gillespie, De Montfort University; DavidMiddle<strong>to</strong>n, <strong>Child</strong>safe Associates; Carl-Göran Sved<strong>in</strong>, L<strong>in</strong>köp<strong>in</strong>g University; JanisWolak, UNH; Anders Persson, Interpol; Terry Jones and Vic<strong>to</strong>ria Ba<strong>in</strong>es, CEOP, UK;Angela Carr, Crime and Misconduct Commission, Australia; Sarah Robertson, IWF;Sendr<strong>in</strong>e Constant, ECPAT Europe; John Carr, Consultant and Fox Interactive Media;Bengt Söderström, BUP Vasa, S<strong>to</strong>ckholm; Michelle Coll<strong>in</strong>s and Jennifer Lee, NCMEC;Julie Ba<strong>in</strong>bridge, FCACP; Hiromasa Nakai and Shoko Fujita, UNICEF Japan; JunkoMiyamo<strong>to</strong>, ECPAT Japan; Birgit Roth and Den<strong>to</strong>n Howard, INHOPE; Will Gardner,<strong>Child</strong>net; Janice Richardson; Kathar<strong>in</strong>e Bostick, Microsoft; <strong>the</strong> staff of <strong>Child</strong>hood Brasil;Hans van de Gl<strong>in</strong>d, IPEC; June Kane; L<strong>in</strong>da Jonsson, BUP Elefanten; Debbie Baartz,Intelligence Analyst with <strong>the</strong> Australian Federal Police; Sonia Liv<strong>in</strong>gs<strong>to</strong>ne, LSE; andBjörn Erik Ludvigsen, Norwegian Crim<strong>in</strong>al Police. There are many whose names are notmentioned here who have offered substantial help: thank you. Carmen Madriñán and <strong>the</strong>team at ECPAT International helped <strong>to</strong> make this an <strong>in</strong>terest<strong>in</strong>g, if challeng<strong>in</strong>g, exercise;and thanks also for <strong>the</strong> support of our long-suffer<strong>in</strong>g partners, Max, Doriana and Simon.|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Executive SummaryÜ This <strong>the</strong>matic paper on <strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>erecognises that s<strong>in</strong>ce 2001 <strong>the</strong>re have been many positive changes. Specifically:• More countries develop<strong>in</strong>g def<strong>in</strong>itions and laws related <strong>to</strong> child abuse through <strong>the</strong>new technologies.• A substantial advance <strong>in</strong> <strong>the</strong> capacity of law enforcement <strong>to</strong> respond both nationallyand <strong>in</strong>ternationally.• An <strong>in</strong>creas<strong>in</strong>g acknowledgment that tackl<strong>in</strong>g <strong>the</strong> problems requires a multi-agency,multi-sec<strong>to</strong>r approach.• An <strong>in</strong>crease <strong>in</strong> <strong>the</strong> number of hotl<strong>in</strong>es available for <strong>the</strong> report<strong>in</strong>g of illegal content<strong>to</strong> non-law-enforcement bodies.• Increased education, particularly of children, and <strong>in</strong>clusive of children.Ü However, unresolved challenges <strong>in</strong>clude:• The differentiation of <strong>the</strong> sexual abuse of children <strong>in</strong> onl<strong>in</strong>e sett<strong>in</strong>gs from sexualexploitation <strong>in</strong> <strong>the</strong> same environment.• The relationship between commercial and non-commercial sexual exploitationonl<strong>in</strong>e.• Lack of a critical understand<strong>in</strong>g of <strong>the</strong> harms posed by <strong>the</strong> new technologies.• Lack of tra<strong>in</strong><strong>in</strong>g, expertise and capacity <strong>to</strong> <strong>in</strong>vestigate crimes aga<strong>in</strong>st children, <strong>to</strong>protect <strong>the</strong>m from harm and assist <strong>the</strong>ir recovery.Ü The paper attempts <strong>to</strong> exam<strong>in</strong>e <strong>the</strong> changes that have taken place s<strong>in</strong>ce <strong>the</strong> SecondWorld Congress and <strong>in</strong> particular it moves away from exam<strong>in</strong><strong>in</strong>g harm solely <strong>in</strong> <strong>the</strong>context of <strong>the</strong> production and distribution of child pornography <strong>to</strong> consider <strong>the</strong> rangeof potential harms <strong>in</strong>flicted on children through <strong>the</strong> new technologies.Ü There has been a significant change <strong>in</strong> <strong>the</strong> term<strong>in</strong>ology used <strong>to</strong> describe sexualisedmaterials relat<strong>in</strong>g <strong>to</strong> children, and <strong>the</strong> term ‘abusive images’ is now widely used by thosewho advocate for children’s rights <strong>in</strong> relation <strong>to</strong> sexual abuse through pho<strong>to</strong>graphy.However, <strong>the</strong> paper acknowledges that <strong>in</strong> most jurisdictions <strong>the</strong> term ‘child pornography’is used, and that attempts <strong>to</strong> challenge this are thought by some <strong>to</strong> be both confus<strong>in</strong>gand not <strong>to</strong> adequately capture <strong>the</strong> complex nature of <strong>the</strong> material. Objective measures ofvictimisation with<strong>in</strong> <strong>the</strong> images are explored, but it is concluded that not all sexualiseddepictions of children are visual and that <strong>the</strong> term ‘abusive materials’ might both capturethis and lead <strong>to</strong> fur<strong>the</strong>r def<strong>in</strong>ition <strong>in</strong> <strong>in</strong>ternational law.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |1


Ü The challenge of virtual child pornography is considered <strong>in</strong> <strong>the</strong> light of <strong>in</strong>creas<strong>in</strong>gconcern about technical ease of production and potential sophistication of imageproduction. This is considered <strong>in</strong> <strong>the</strong> context of manga and <strong>the</strong> bid by some countries(for example <strong>the</strong> UK) <strong>to</strong> crim<strong>in</strong>alise <strong>the</strong> possession of non-pho<strong>to</strong>graphic depictionsof child sexual abuse (ie, car<strong>to</strong>ons). We argue that <strong>the</strong> crime of possession, mak<strong>in</strong>g ordistribution of child pornography, whe<strong>the</strong>r virtual or not, is a crime not only aga<strong>in</strong>st aparticular child, but aga<strong>in</strong>st all children.Ü The paper exam<strong>in</strong>es <strong>the</strong> potential harms posed <strong>to</strong> children by <strong>the</strong> new technologies andhow we might differentiate between sexual abuse, sexual exploitation and commercialsexual exploitation <strong>in</strong> <strong>the</strong> onl<strong>in</strong>e environment. We argue that <strong>the</strong> new media blur <strong>the</strong>boundaries between <strong>the</strong>se and provide a context that affords opportunities for both <strong>the</strong>abuse and <strong>the</strong> exploitation of children and by children. We consider what is known aboutadult offend<strong>in</strong>g activity onl<strong>in</strong>e and those who engage <strong>in</strong> it, and <strong>the</strong> technologies used.Some of <strong>the</strong>se have changed s<strong>in</strong>ce 2001 but o<strong>the</strong>rs, such as newsgroups, have not andstill provide a context for shar<strong>in</strong>g of <strong>in</strong><strong>format</strong>ion and ideas that promote <strong>the</strong> abuse andexploitation of children. The section concludes by exam<strong>in</strong><strong>in</strong>g <strong>the</strong>, at times, conflict<strong>in</strong>gresearch about <strong>the</strong> relationship between view<strong>in</strong>g abusive images and <strong>the</strong> commission offur<strong>the</strong>r offences aga<strong>in</strong>st children <strong>in</strong> both <strong>the</strong> onl<strong>in</strong>e and offl<strong>in</strong>e environments.Ü Our lack of knowledge about children who are victimised is explored, <strong>in</strong>itially <strong>in</strong> <strong>the</strong>context of <strong>the</strong> few children who are identified <strong>in</strong> images, but also <strong>in</strong> relation <strong>to</strong> <strong>the</strong>paucity of research on <strong>the</strong> impact of Internet related sexual abuse. Sweden is one of <strong>the</strong>few countries that has systematically exam<strong>in</strong>ed <strong>the</strong> disclosure process and <strong>the</strong> <strong>the</strong>rapeuticneeds of such children, and this research may <strong>in</strong>form future good practice. However, aswith work <strong>in</strong> Germany and <strong>in</strong> <strong>the</strong> UK, we do not know whe<strong>the</strong>r such approaches willtranslate <strong>in</strong><strong>to</strong> o<strong>the</strong>r <strong>the</strong>rapeutic contexts. It is also clear that <strong>in</strong> <strong>the</strong> majority of countriespractitioners do not explore such abuse and feel that <strong>the</strong>y do not have <strong>the</strong> skills <strong>to</strong> dealwith such problems. We also note that <strong>the</strong>re is marked lack of service provision for suchchildren.Ü The paper exam<strong>in</strong>es what we know about young people’s behaviour onl<strong>in</strong>e and how thismight expose <strong>the</strong>m <strong>to</strong> sexualised materials <strong>in</strong> a potentially harmful way. This highlightshow research has typically exam<strong>in</strong>ed exposure <strong>to</strong> pornography without differentiat<strong>in</strong>gbetween <strong>the</strong> different types of material that this might <strong>in</strong>clude and <strong>the</strong> different socialand familial contexts that might offer protection. We acknowledge <strong>the</strong> difficulties <strong>in</strong>this area <strong>in</strong> balanc<strong>in</strong>g <strong>the</strong> rights of <strong>the</strong> child <strong>to</strong> explore <strong>the</strong>ir sexuality and <strong>the</strong> right <strong>to</strong>be protected from that which might cause harm. This would seem <strong>to</strong> be of particular2|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


importance for children who are same-sex attracted. We also emphasise that creation ofnew technologies affords opportunities for young people <strong>to</strong> harm o<strong>the</strong>r youth, as wellas <strong>the</strong>mselves, and consider <strong>the</strong> tensions between stay<strong>in</strong>g safe onl<strong>in</strong>e and explor<strong>in</strong>g newterri<strong>to</strong>ries.Ü There are cultural and geographical differences, both <strong>in</strong> relation <strong>to</strong> constructions ofchildhood and appropriate or acceptable practices. This is a difficult challenge <strong>in</strong> relation<strong>to</strong> <strong>the</strong> new technologies and serves <strong>to</strong> highlight <strong>the</strong> need <strong>to</strong> understand <strong>the</strong> complexityof liv<strong>in</strong>g circumstances for many of <strong>the</strong> world’s children and <strong>the</strong> agency that we afford<strong>to</strong> older children <strong>in</strong> <strong>the</strong> choices that <strong>the</strong>y make.Ü S<strong>in</strong>ce <strong>the</strong> Second World Congress we have seen <strong>the</strong> development of four policy<strong>document</strong>s: <strong>the</strong> European Union’s Framework Decision on combat<strong>in</strong>g <strong>the</strong> sexualexploitation of children and child pornography (2004); <strong>the</strong> Council of Europe’s CybercrimeConvention (2001); <strong>the</strong> United Nation’s Optional Pro<strong>to</strong>col on <strong>the</strong> Convention on <strong>the</strong> Rightsof <strong>the</strong> <strong>Child</strong> on <strong>the</strong> sale of children, child prostitution and child pornography (2002), and <strong>the</strong>Council of Europe Convention on <strong>the</strong> Protection of children aga<strong>in</strong>st sexual exploitation andsexual abuse, which is yet <strong>to</strong> come <strong>in</strong><strong>to</strong> force. However, not all <strong>in</strong>struments necessarilydef<strong>in</strong>e <strong>the</strong> <strong>in</strong>tentional view<strong>in</strong>g of Internet child pornography as crim<strong>in</strong>al, and whilepossession is crim<strong>in</strong>alised this is sometimes subject <strong>to</strong> certa<strong>in</strong> limitations. There arestill unresolved issues about how child pornography should be judged , and ultimatelywhile <strong>the</strong> Optional Pro<strong>to</strong>col places duties on States <strong>to</strong> protect <strong>the</strong> rights and <strong>in</strong>terestsof child victims at all stages of <strong>the</strong> crim<strong>in</strong>al justice process, its central thrust is as an<strong>in</strong>strument of <strong>in</strong>ternational crim<strong>in</strong>alisation ra<strong>the</strong>r than a comprehensive package ofwelfare protection.Ü The paper acknowledges <strong>the</strong> considerable work that has been done <strong>in</strong> generat<strong>in</strong>g<strong>in</strong><strong>format</strong>ion and educational materials for young people, teachers and parents, alongwith <strong>the</strong> development of helpl<strong>in</strong>es. However, few <strong>in</strong><strong>format</strong>ion <strong>to</strong>ols or education <strong>to</strong>olshave been evaluated for <strong>the</strong>ir impact on <strong>the</strong> behaviour of <strong>the</strong> target groups. We mightconclude that <strong>in</strong> spite of considerable <strong>in</strong>vestment <strong>in</strong> this area, <strong>the</strong>re is little evidencethat such strategies <strong>in</strong>fluence behaviour, as opposed <strong>to</strong> attitudes or level of knowledge.Ü S<strong>in</strong>ce 2001 <strong>the</strong>re has been an <strong>in</strong>crease <strong>in</strong> <strong>the</strong> number of Association of InternetHotl<strong>in</strong>e Providers (INHOPE) hotl<strong>in</strong>es from 15 <strong>to</strong> 28, and <strong>in</strong> <strong>the</strong> last three monthsof 2006 <strong>the</strong>re were approximately 6400 reports per month made <strong>to</strong> law enforcementagencies. However, INHOPE hotl<strong>in</strong>es rarely received any structured feedback fromlaw enforcement agencies, and this is a cause for concern as it is difficult <strong>to</strong> understandhow <strong>the</strong> effectiveness of hotl<strong>in</strong>es can be evaluated without this. An example is also<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |3


given of <strong>the</strong> work of one hotl<strong>in</strong>e, <strong>the</strong> UK-based Internet Watch Foundation, which hasdeveloped a block<strong>in</strong>g list of URLs ascerta<strong>in</strong>ed <strong>to</strong> conta<strong>in</strong> child abuse content. This listis updated daily and has been used by law enforcement, associated hotl<strong>in</strong>es, Internetservice providers, mobile phone opera<strong>to</strong>rs, search providers and filter<strong>in</strong>g companies.Similar actions are be<strong>in</strong>g taken with<strong>in</strong> o<strong>the</strong>r countries. The Internet <strong>in</strong>dustry has alsoresponded <strong>in</strong> a positive way <strong>to</strong> educat<strong>in</strong>g users and provid<strong>in</strong>g <strong>to</strong>ols <strong>to</strong> enhance onl<strong>in</strong>esafety. There are still oppos<strong>in</strong>g viewpo<strong>in</strong>ts as <strong>to</strong> whe<strong>the</strong>r <strong>in</strong>dustry activity should bevoluntary or mandated, and <strong>the</strong>re is clearly a need for <strong>in</strong>dustry <strong>to</strong> share its <strong>in</strong><strong>format</strong>ion<strong>to</strong> facilitate <strong>the</strong> development of better research and outcomes for young people. Thepaper also acknowledges <strong>the</strong> welcome actions by <strong>the</strong> F<strong>in</strong>ancial Coalition Aga<strong>in</strong>st <strong>Child</strong>Pornography.Ü The paper concludes with six recommendations for actions <strong>to</strong> be taken with<strong>in</strong> <strong>the</strong> nextfive years. These are:Actions <strong>to</strong> be achieved <strong>in</strong> <strong>the</strong> immediate futureToge<strong>the</strong>r with all relevant stakeholders, <strong>in</strong>clud<strong>in</strong>g children and adolescents, each Stateshould:1. Effect an evaluation of national educational and <strong>in</strong><strong>format</strong>ion programmes <strong>to</strong> determ<strong>in</strong>e<strong>the</strong>ir impact on <strong>the</strong> behaviour of youth Internet users, and ensure that this <strong>in</strong><strong>format</strong>ionenters <strong>the</strong> public doma<strong>in</strong>, and addresses <strong>the</strong> deficiencies identified. As <strong>the</strong>y are citizens ofthis technologically mediated world, such evaluation should be supported by children’sparticipation, build<strong>in</strong>g on <strong>the</strong>ir expertise and good practices.2. Determ<strong>in</strong>e current provision and practices for children victimised through <strong>the</strong> newtechnologies and ensure that systems are <strong>in</strong> place, <strong>in</strong>volv<strong>in</strong>g both law enforcementand child protection, <strong>to</strong> allow for effective <strong>in</strong>vestigation, assessment, <strong>in</strong>tervention,support and follow-up. Build<strong>in</strong>g on <strong>the</strong> rights of <strong>the</strong> child, this should be based ondevelopmental needs and with reference <strong>to</strong> good practice. At a m<strong>in</strong>imum this wouldrequire <strong>the</strong> development of at least one adm<strong>in</strong>istrative hub with<strong>in</strong> each country thatwould draw upon national and local skills, resources and practices, and would providetra<strong>in</strong><strong>in</strong>g for dedicated child protection staff.3. Work at a national level with children and young people of different age groups <strong>to</strong>determ<strong>in</strong>e fac<strong>to</strong>rs that protect children <strong>in</strong> relation <strong>to</strong> <strong>the</strong> new technologies and whichpromote resilience.4|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Actions <strong>to</strong> be achieved by 2013Toge<strong>the</strong>r with all relevant stakeholders, each State should:1. Amend exist<strong>in</strong>g legislation <strong>to</strong> reflect objective, and <strong>in</strong>ternationally acceptable, measuresaga<strong>in</strong>st all sexually abusive and sexually exploitative behaviours and materials related<strong>to</strong> <strong>the</strong> new technologies (<strong>in</strong>clud<strong>in</strong>g virtual and car<strong>to</strong>on imagery and text), and makeobta<strong>in</strong><strong>in</strong>g for self or o<strong>the</strong>rs, <strong>in</strong>tentional view<strong>in</strong>g and possession, crim<strong>in</strong>al activities. Suchlegislation should also protect all victims of sexually abusive and sexually exploitativepractices and ensure that law enforcement and judicial processes adopt child sensitiveprocedures <strong>in</strong> accordance with <strong>the</strong> Guidel<strong>in</strong>es on Justice for <strong>Child</strong> Victims and Witnesses.This should <strong>in</strong>clude children and adolescents who have engaged <strong>in</strong> sexually abusivebehaviours <strong>to</strong>wards o<strong>the</strong>rs through <strong>the</strong> medium of <strong>the</strong> new technologies.2. Demonstrate <strong>in</strong>vestment <strong>in</strong> prioritis<strong>in</strong>g children by allocat<strong>in</strong>g <strong>in</strong>creased child protectionand law enforcement resources <strong>to</strong> <strong>the</strong> identification of children whose images arecirculat<strong>in</strong>g on <strong>the</strong> Internet and enable greater co-operation at national and <strong>in</strong>ternationallevels.3. Initiate a programme of research across States <strong>to</strong> address:a. <strong>in</strong>herent aspects of <strong>the</strong> new technologies that appear <strong>to</strong> <strong>in</strong>crease <strong>the</strong> likelihood ofsexually exploitative and sexually abusive practices <strong>to</strong>wards children <strong>in</strong> relation <strong>to</strong><strong>the</strong> new technologies;b. <strong>the</strong> impact of technological expansion on <strong>the</strong> demographic characteristics of childrensexually abused and sexually exploited through <strong>the</strong> new technologies;c. <strong>the</strong> impact, on <strong>the</strong> family and wider social networks, of <strong>in</strong>creas<strong>in</strong>g crim<strong>in</strong>alisation ofInternet related activityd. <strong>the</strong> role of <strong>the</strong> IT sec<strong>to</strong>r <strong>in</strong> <strong>the</strong> risk assessment and analysis of current and upcom<strong>in</strong>gproducts, <strong>in</strong> <strong>the</strong> use and adaptability of age-verification methods and onl<strong>in</strong>e accesssystems and <strong>in</strong> image detection systems.All States should set targets and <strong>in</strong>dica<strong>to</strong>rs of progress <strong>to</strong> determ<strong>in</strong>e <strong>the</strong> results of thisprogramme and report on <strong>the</strong>se by 2013.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |5


1. IntroductionThematic papers were presented at both <strong>the</strong> First and Second World Congresses that criticallyanalysed <strong>the</strong> subject of child pornography. While <strong>the</strong> World Congress website po<strong>in</strong>ts outthat <strong>the</strong> <strong>in</strong><strong>format</strong>ion conta<strong>in</strong>ed <strong>in</strong> <strong>the</strong> papers aris<strong>in</strong>g from <strong>the</strong> S<strong>to</strong>ckholm meet<strong>in</strong>g are now‘out-of-date’, a read<strong>in</strong>g of this first <strong>the</strong>matic paper address<strong>in</strong>g child pornography wouldsuggest that many of <strong>the</strong> concerns raised <strong>in</strong> 1996 are still pert<strong>in</strong>ent <strong>to</strong>day. Specifically, thatpaper acknowledged that <strong>the</strong>re were major challenges due <strong>to</strong> <strong>the</strong> lack of uniform def<strong>in</strong>itionsof what child pornography was; lack of data regard<strong>in</strong>g <strong>the</strong> production and distribution ofchild pornography <strong>in</strong> many parts of <strong>the</strong> world, particularly Africa and Lat<strong>in</strong> America;and shift<strong>in</strong>g global patterns of production and consumption of child pornography. This <strong>in</strong>part was l<strong>in</strong>ked <strong>to</strong> <strong>the</strong> rapid development of camera and computer technology, which wasprovid<strong>in</strong>g expand<strong>in</strong>g access and allow<strong>in</strong>g for <strong>the</strong> creation of digitally generated or modifiedimages. This first World Congress paper also was notable because it sought <strong>to</strong> identify someof <strong>the</strong> major centres of global production of child pornography and located specific typesof images <strong>to</strong> named countries. Victims were thought <strong>to</strong> be equally distributed betweengenders, but with more female children exploited <strong>in</strong> Japan; street children, poor children,juveniles from broken homes and disabled m<strong>in</strong>ors were vulnerable <strong>to</strong> exploitation; andthose exploit<strong>in</strong>g children were seen <strong>to</strong> be largely, but not exclusively, paedophiles. With<strong>in</strong>this paper is a lengthy discussion of <strong>the</strong> <strong>in</strong>troduction of computer technology, which <strong>to</strong>dayserves as a rem<strong>in</strong>der as <strong>to</strong> <strong>the</strong> rapid growth over <strong>the</strong> last 15 years of technologically enabledcommunication and <strong>the</strong> extended availability of <strong>the</strong> same. Many of <strong>the</strong> studies used by <strong>the</strong>first paper relied on data that pre-dated <strong>the</strong> Internet, both <strong>in</strong> terms of victims and also <strong>in</strong>relation <strong>to</strong> offenders.The second <strong>the</strong>matic paper, produced <strong>in</strong> 2001 for <strong>the</strong> Congress <strong>in</strong> Yokahama, notedthat <strong>the</strong> Internet was becom<strong>in</strong>g a highly pervasive technology and that it presented <strong>the</strong>entire community with a major new global challenge <strong>in</strong> <strong>the</strong> ongo<strong>in</strong>g fight aga<strong>in</strong>st childpornography. In particular, this second paper discussed <strong>the</strong> lack of specific legislation globallywhich explicitly outlaws child pornography; <strong>the</strong> damage <strong>to</strong> children where sexual abuse iscaptured via a pornographic image; <strong>the</strong> l<strong>in</strong>ks between child prostitution, child-sex <strong>to</strong>urismand child pornography; <strong>the</strong> role of <strong>the</strong> Internet act<strong>in</strong>g as a mechanism for <strong>the</strong> creation anddistribution of child pornography and also <strong>in</strong> offer<strong>in</strong>g opportunity for contact with children;and <strong>the</strong> growth of commercial child pornography and <strong>the</strong> blurr<strong>in</strong>g of dist<strong>in</strong>ctions betweencommercial and non-commercial availability. The paper also detailed <strong>the</strong> <strong>in</strong>creas<strong>in</strong>g use ofencryption software, mak<strong>in</strong>g detection more difficult, and highlighted <strong>the</strong> possibility that<strong>the</strong> Internet was generat<strong>in</strong>g a new class of users of child pornography and allow<strong>in</strong>g for<strong>the</strong> development of organised, technologically sophisticated r<strong>in</strong>gs of child sexual abusers.6|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Positive advances were also noted, particularly <strong>in</strong> relation <strong>to</strong> <strong>in</strong>creased <strong>in</strong>ternationalpolice co-operation, <strong>the</strong> development of dedicated law enforcement <strong>in</strong>itiatives, as well ascommunity-based <strong>in</strong>itiatives, such as hotl<strong>in</strong>es and <strong>in</strong>dustry-based codes of practice, alongwith public-awareness campaigns designed <strong>to</strong> alert children and parents about potentialonl<strong>in</strong>e dangers. A series of recommendations were made by this <strong>the</strong>matic paper whichrelated <strong>to</strong> specific targets for consolidation or change. These <strong>in</strong>cluded ano<strong>the</strong>r call for <strong>the</strong>harmonisation of def<strong>in</strong>itions and laws related <strong>to</strong> <strong>the</strong> problem, <strong>in</strong>clud<strong>in</strong>g issues relat<strong>in</strong>g <strong>to</strong>age of majority, and <strong>the</strong> need <strong>to</strong> develop expertise and resources with<strong>in</strong> law enforcementagencies and <strong>the</strong> establishment of standardised procedures, pro<strong>to</strong>cols and databases, alongwith multilateral and bilateral work<strong>in</strong>g relationships with<strong>in</strong> law enforcement. The judiciarywere identified as need<strong>in</strong>g <strong>to</strong> develop greater understand<strong>in</strong>g of technological crime, whichwould be reflected <strong>in</strong> sentenc<strong>in</strong>g policies and both <strong>in</strong>dustry, and law enforcement agencieswere called upon <strong>to</strong> work with <strong>the</strong> challenges of encryption, anonymity, identificationand removal of image availability. At a community level, recommendations were made <strong>to</strong><strong>in</strong>crease assistance <strong>to</strong> <strong>the</strong> development of hotl<strong>in</strong>es and <strong>to</strong> enable more effective educationabout stay<strong>in</strong>g safe onl<strong>in</strong>e. In addition, a challenge was made at a political level <strong>to</strong> ‘confrontand confound any argument which seeks <strong>to</strong> l<strong>in</strong>k <strong>the</strong> protection of children with attacks onfree speech’.As already noted, when <strong>the</strong> first paper was written <strong>the</strong>re was very little empirical datarelat<strong>in</strong>g <strong>to</strong> <strong>the</strong> new technologies that could <strong>in</strong>form our understand<strong>in</strong>g of <strong>the</strong> problemsposed, and while this had changed somewhat by 2001 <strong>the</strong> data that was drawn on relatedlargely <strong>to</strong> that obta<strong>in</strong>ed through police operations and anecdotal <strong>in</strong><strong>format</strong>ion, or casestudies, from several countries. In fact, one of <strong>the</strong> constra<strong>in</strong>ts noted <strong>in</strong> this paper related <strong>to</strong><strong>the</strong> absence of reliable data from many parts of <strong>the</strong> non-<strong>in</strong>dustrialised world, which madegeneralisations from exist<strong>in</strong>g published studies more difficult. As we will see, this situationhas not substantially changed and is a cause for considerable concern, as is <strong>the</strong> cont<strong>in</strong>uedpaucity of recovery programmes for children and young people abused and/or exploitedthrough <strong>the</strong> new technologies. However, <strong>the</strong>re have been some very positive changes, withmore countries develop<strong>in</strong>g def<strong>in</strong>itions and laws related <strong>to</strong> child abuse through <strong>the</strong> newtechnologies, a substantial advance <strong>in</strong> <strong>the</strong> capacity of law enforcement agencies <strong>to</strong> respondboth nationally and <strong>in</strong>ternationally, and an <strong>in</strong>creas<strong>in</strong>g acknowledgement that tackl<strong>in</strong>g<strong>the</strong>se problems requires a multi-agency, multi-sec<strong>to</strong>r approach. Few countries have,however, responded with more str<strong>in</strong>gent legislation <strong>in</strong> relation <strong>to</strong> <strong>the</strong> use of In<strong>format</strong>ionand communication technology (ICT) <strong>to</strong> exploit children sexually. There has also been an<strong>in</strong>crease <strong>in</strong> <strong>the</strong> number of countries that have hotl<strong>in</strong>es, which have received substantial<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |7


fund<strong>in</strong>g from both <strong>the</strong> European Commission and <strong>in</strong>dustry; and education, particularly ofchildren, has received considerable support. This has been reflected <strong>in</strong> <strong>the</strong> number of onl<strong>in</strong>eand offl<strong>in</strong>e materials available, produced by government and non-government agencies,which have drawn upon <strong>the</strong> resources of children <strong>the</strong>mselves.However, one issue that has still <strong>to</strong> be resolved is what differentiates <strong>the</strong> sexual abuse ofchildren <strong>in</strong> onl<strong>in</strong>e sett<strong>in</strong>gs from <strong>the</strong> sexual exploitation of children <strong>in</strong> <strong>the</strong> same environment.A fur<strong>the</strong>r challenge is <strong>the</strong> relationship between commercial and non-commercial sexualexploitation, where <strong>the</strong> abusive materials are <strong>the</strong>mselves a form of currency whichmoderate trad<strong>in</strong>g activity, ra<strong>the</strong>r than an exchange of monies. These are complex and, attimes, controversial issues which require our consideration.This paper will attempt <strong>to</strong> exam<strong>in</strong>e <strong>the</strong> changes that have taken place s<strong>in</strong>ce <strong>the</strong> SecondWorld Congress and will build on <strong>the</strong> previous <strong>the</strong>matic papers <strong>to</strong> allow for a critical analysisof <strong>the</strong> harms posed by <strong>the</strong> new technologies <strong>to</strong> enable a more differentiated understand<strong>in</strong>gof sexually abusive and exploitative practices <strong>to</strong>wards children. In particular, it will moveaway from exam<strong>in</strong><strong>in</strong>g harms solely <strong>in</strong> <strong>the</strong> context of <strong>the</strong> production and distribution ofchild pornography, <strong>to</strong> consider <strong>the</strong> range of potential harms <strong>in</strong>flicted on children and bychildren through <strong>the</strong> new technologies.8|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


2. Adult perpetra<strong>to</strong>rs of abuse2.1 <strong>Child</strong> pornography and abusive imagesOne of <strong>the</strong> most obvious changes s<strong>in</strong>ce <strong>the</strong> Second World Congress has related <strong>to</strong> <strong>the</strong>term<strong>in</strong>ology used <strong>to</strong> describe sexualised material (images, text and audio files) relat<strong>in</strong>g <strong>to</strong>children. Both of <strong>the</strong> earlier <strong>the</strong>matic papers referred consistently <strong>to</strong> child pornography,but, more recently, questions have been raised as <strong>to</strong> whe<strong>the</strong>r this term both reflects <strong>the</strong>content of what is produced and whe<strong>the</strong>r <strong>the</strong> term implicitly implies consensual activity(Taylor and Quayle, 2003). In fact as early as 2000 one dedicated police unit with<strong>in</strong> <strong>the</strong>UK was named <strong>the</strong> Greater Manchester Abusive Images Unit, <strong>in</strong> part a bid <strong>to</strong> reflect that<strong>the</strong> images exam<strong>in</strong>ed were forensic evidence of <strong>the</strong> sexual abuse of children. The term‘abusive images’ is now widely used by those who advocate for children’s rights <strong>in</strong> relation<strong>to</strong> sexual abuse through pho<strong>to</strong>graphy ( Jones and Skogrand, 2005), but this change is notstraightforward. The term ‘child pornography’ is consistently used <strong>in</strong> <strong>the</strong> majority of lawsand policy <strong>document</strong>s <strong>in</strong>ternationally (Akdeniz, 2008), and attempts <strong>to</strong> change term<strong>in</strong>ologyare thought by some <strong>to</strong> be both confus<strong>in</strong>g and <strong>to</strong> not adequately capture <strong>the</strong> complexnature of <strong>the</strong> material (Lann<strong>in</strong>g, 2008). This is worth fur<strong>the</strong>r consideration, as concernsabout <strong>the</strong> language used are not simply a question of semantics. Ra<strong>the</strong>r, <strong>the</strong> term used willhave implications for all stakeholders <strong>in</strong>volved <strong>in</strong> eradicat<strong>in</strong>g <strong>the</strong> cont<strong>in</strong>ued exploitation ofchildren via use of <strong>the</strong> new technologies.In relation <strong>to</strong> this we also see <strong>the</strong> terms ‘sexual abuse’ and ‘sexual exploitation’ usedsynonymously. While both may refer <strong>to</strong> <strong>the</strong> same crim<strong>in</strong>al act committed <strong>to</strong>wards a specificchild this will not always be <strong>the</strong> case. The exploiter of <strong>the</strong> child may be ano<strong>the</strong>r person.Mak<strong>in</strong>g a dist<strong>in</strong>ction between sexual abuse and sexual exploitation may also allow us <strong>to</strong>combat <strong>the</strong> demand side of <strong>the</strong> production, distribution and possession of child abusiveimages more effectively through crim<strong>in</strong>alis<strong>in</strong>g that which is not sexual abuse but <strong>the</strong> sexualexploitation of <strong>the</strong> abuse. This is an issue that has been <strong>the</strong> source of considerable debate.A recent publication by Asquith and Turner (2008) suggests that sexual exploitationencompasses various forms of sexual abuse <strong>in</strong>clud<strong>in</strong>g sexual exploitation, prostitution,child pornography and child marriage, and is used variously <strong>to</strong> mean any one or all of<strong>the</strong>se. In <strong>the</strong>ir study of <strong>the</strong> recovery and re<strong>in</strong>tegration of children from <strong>the</strong> effects ofsexual exploitation and related traffick<strong>in</strong>g Asquith and Turner (2008) noted that <strong>the</strong> terms‘sexual exploitation’ and ‘sexual abuse’ were used <strong>in</strong>terchangeably, even though choos<strong>in</strong>g‘exploitation’ over ‘abuse’ may suggest a lack of agency on <strong>the</strong> part of <strong>the</strong> victim. Article34 of <strong>the</strong> United Nations Convention on <strong>the</strong> Rights of <strong>the</strong> <strong>Child</strong> calls upon parties <strong>to</strong>,<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |9


“undertake <strong>to</strong> protect <strong>the</strong> child from all forms of sexual exploitation and sexual abuse”.This is fur<strong>the</strong>r confounded when we exam<strong>in</strong>e <strong>the</strong> term ‘commercial sexual exploitation’(<strong>the</strong> International Labour Organization’s Convention No. 182 on <strong>the</strong> Worst Forms of <strong>Child</strong>Labour treats commercial sexual exploitation and <strong>the</strong> abuse of children <strong>in</strong> pornographyas <strong>the</strong> worst forms of child labour). Kane (2006) def<strong>in</strong>es commercial sexual exploitationas <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> prostitution of children, traffick<strong>in</strong>g for sexual purposes, <strong>the</strong> production,sale distribution and use of child pornography, and child-sex <strong>to</strong>urism. She concludes that,“The key difference between sexual abuse and sexual exploitation of children is generallyconsidered <strong>to</strong> be <strong>the</strong> commercial transaction/motive. People who sexually abuse childrendo not normally make a profit from it… The people who sexually exploit children for profitare a very diverse group… It is clear that sexual abuse and sexual exploitation work <strong>in</strong>very different ways and <strong>in</strong>volve quite different motivations, modus operandi and profiles.Understand<strong>in</strong>g <strong>the</strong>se differences is a key <strong>to</strong> act<strong>in</strong>g <strong>to</strong> prevent abuse and exploitation” (p.11). This is an important dist<strong>in</strong>ction; however, <strong>in</strong> <strong>the</strong> context of <strong>the</strong> new technologies it canbecome much more difficult <strong>to</strong> differentiate between <strong>the</strong> activities, <strong>the</strong> motives underly<strong>in</strong>g<strong>the</strong>m, and <strong>the</strong> consequences for <strong>the</strong> child. As we will see, while abuse images are producedwith<strong>in</strong> a commercial sett<strong>in</strong>g (where <strong>the</strong> pho<strong>to</strong>grapher is not <strong>the</strong> agent of <strong>the</strong> abuse) manychildren are abused and pho<strong>to</strong>graphed with<strong>in</strong> domestic environments. These images <strong>in</strong> andof <strong>the</strong>mselves become a form of currency as, with<strong>in</strong> <strong>the</strong> onl<strong>in</strong>e community, <strong>the</strong>y buy statusand act as a commodity for exchange. Once circulat<strong>in</strong>g on <strong>the</strong> Internet <strong>the</strong>y may end upon a pay–<strong>to</strong>-view site, where money does change hands. This may also be <strong>the</strong> case where achild has been exploited through someone’s hav<strong>in</strong>g adventitiously taken pho<strong>to</strong>graphs, forexample on a beach or at a swimm<strong>in</strong>g pool. Here <strong>the</strong> child may never know that her/hisimages have been used ei<strong>the</strong>r commercially or simply as a means <strong>to</strong> procure fur<strong>the</strong>r images.What we see <strong>in</strong> <strong>the</strong> context of <strong>the</strong> new technologies is an overlap of sexually abusivepractices, sexual exploitation and commercial exploitation. The lack of differentiationbetween <strong>the</strong> terms has been acknowledged over <strong>the</strong> years. For example <strong>in</strong> <strong>the</strong> f<strong>in</strong>al reportfrom <strong>the</strong> Council of Europe <strong>Expert</strong> Group on Sexual Exploitation, acknowledgement ismade of <strong>the</strong> fact that <strong>the</strong> terms are used <strong>in</strong>terchangeably. We believe that it is important<strong>to</strong> attempt <strong>to</strong> differentiate between ‘sexual abuse’ and ‘sexual exploitation’ because it hassignificance not only for <strong>the</strong> impact on <strong>the</strong> child as is shown <strong>in</strong> Section 3, but also for<strong>the</strong> wider crim<strong>in</strong>al justice and child protection responses. In this paper <strong>the</strong> term ‘sexualexploitation’ refers <strong>to</strong> activities that may <strong>in</strong>clude sexual abuse of children but may also refer<strong>to</strong> activities where no such abuse has taken place but where <strong>the</strong> very nature of <strong>the</strong> activitiesviolates <strong>the</strong> very essence of childhood.The first <strong>in</strong>ternational def<strong>in</strong>ition of child pornography was that of <strong>the</strong> Optional Pro<strong>to</strong>col(OP) <strong>to</strong> <strong>the</strong> Convention on <strong>the</strong> Rights of <strong>the</strong> <strong>Child</strong> (CRC) on <strong>the</strong> sale of children, childprostitution and child pornography, which entered <strong>in</strong><strong>to</strong> force on 18 January 2002. Article10|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


2 (c) def<strong>in</strong>ed child pornography as, “any representation, by whatever means, of a childengaged <strong>in</strong> real or simulated explicit sexual activities or any representation of <strong>the</strong> sexualparts of a child primarily for sexual purposes”. This def<strong>in</strong>ition is not restricted <strong>to</strong> visualrepresentations, but, upon signature, some States have <strong>in</strong>dicated that <strong>the</strong>y would <strong>in</strong>terpret<strong>the</strong> def<strong>in</strong>ition as restricted <strong>to</strong> visual materials, aga<strong>in</strong> reflect<strong>in</strong>g a lack of consensus overwhat constitutes child pornography. As we will see, subsequent def<strong>in</strong>itions <strong>in</strong> <strong>in</strong>ternational<strong>in</strong>struments have followed <strong>the</strong> trend of def<strong>in</strong><strong>in</strong>g child pornography as limited <strong>to</strong> visualimages, and exclud<strong>in</strong>g o<strong>the</strong>r materials. The report of <strong>the</strong> Special Rapporteur (Petit, 2005)noted that a more comprehensive def<strong>in</strong>ition address<strong>in</strong>g computer-generated images wasconta<strong>in</strong>ed <strong>in</strong> <strong>the</strong> 2001 Council of Europe Convention on Cybercrime, “For <strong>the</strong> purpose ofparagraph 1 above, <strong>the</strong> term “child pornography” shall <strong>in</strong>clude pornographic material thatvisually depicts: (a) a m<strong>in</strong>or engaged <strong>in</strong> sexually explicit conduct; (b) a person appear<strong>in</strong>g<strong>to</strong> be a m<strong>in</strong>or engaged <strong>in</strong> sexually explicit conduct; (c) realistic images represent<strong>in</strong>g am<strong>in</strong>or engaged <strong>in</strong> sexually explicit conduct”. The explana<strong>to</strong>ry report on <strong>the</strong> Conventionon Cybercrime fur<strong>the</strong>r clarifies this def<strong>in</strong>ition by stat<strong>in</strong>g that “visual depiction <strong>in</strong>cludesdata s<strong>to</strong>red on a computer diskette or on o<strong>the</strong>r electronic means of s<strong>to</strong>rage, which arecapable of conversion <strong>in</strong><strong>to</strong> a visual image”. In addition, ‘sexually explicit conduct’ covers atleast real or simulated (a) sexual <strong>in</strong>tercourse, <strong>in</strong>clud<strong>in</strong>g genital-genital, oral-genital, analgenitalor oral-anal, between m<strong>in</strong>ors, or between an adult and a m<strong>in</strong>or, of <strong>the</strong> same oropposite sex; (b) bestiality; (c) masturbation; (d) sadistic or masochistic abuse <strong>in</strong> a sexualcontext; or (e) lascivious exhibition of <strong>the</strong> genitals or <strong>the</strong> pubic area of a m<strong>in</strong>or. Also, it isnot relevant whe<strong>the</strong>r <strong>the</strong> conduct depicted is real or simulated. A more recent def<strong>in</strong>itioncomes from <strong>the</strong> Council of Europe Convention on <strong>the</strong> Protection of <strong>Child</strong>ren aga<strong>in</strong>st SexualExploitation and Sexual Abuse, which was opened for sign<strong>in</strong>g <strong>in</strong> Oc<strong>to</strong>ber 2007. Article 20def<strong>in</strong>es child pornography as, “any material that visually depicts a child engaged <strong>in</strong> real orsimulated sexually explicit conduct or any depiction of a child’s sexual organs for primarilysexual purposes”. As can be seen, all of <strong>the</strong>se def<strong>in</strong>itions of child pornography relate <strong>to</strong>visual representations of children and focus on ei<strong>the</strong>r sexually explicit behaviour or <strong>the</strong>exhibition of a child’s genitals or geni<strong>to</strong>-anal area. These def<strong>in</strong>itions do not consider <strong>the</strong>large volume of sexualised material (both visual and text based) that is circulat<strong>in</strong>g via <strong>the</strong>new technologies.In an earlier publication, Lann<strong>in</strong>g (1992, pp. 24-26) <strong>in</strong>troduced an important dist<strong>in</strong>ctionbetween child pornography (“<strong>the</strong> sexually explicit reproduction of a child’s image”)and child erotica (“any material, relat<strong>in</strong>g <strong>to</strong> children, that serves a sexual purpose for agiven <strong>in</strong>dividual”). In <strong>the</strong> debate about language this dist<strong>in</strong>ction was an important one,and emphasised <strong>the</strong> potential sexual qualities of a wide range of pho<strong>to</strong>graphic and o<strong>the</strong>rmaterial, much of which will not depict <strong>the</strong> sexual abuse of a child. As suggested by Taylorand Quayle (2003) <strong>the</strong> operational implications for law enforcement agencies of that<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |11


dist<strong>in</strong>ction are significant, however, and can be seen <strong>in</strong> <strong>the</strong> way <strong>in</strong> which <strong>in</strong>vestigativeagencies frequently divide evidential material <strong>in</strong><strong>to</strong> three categories:• Indicative – material depict<strong>in</strong>g clo<strong>the</strong>d children, which suggests a sexual <strong>in</strong>terest <strong>in</strong>children;• Indecent – material depict<strong>in</strong>g naked children which suggests a sexual <strong>in</strong>terest <strong>in</strong>children;• Obscene – material that depicts children <strong>in</strong> explicit sexual acts.In a similar fashion, Tate (1990), commented on how <strong>the</strong> material ranged from, “posedpictures of naked and semi-naked children, through more explicit shots of <strong>the</strong>ir genitaliathumbed apart <strong>to</strong> still, film and video record<strong>in</strong>gs of oral, vag<strong>in</strong>al and anal sex” (pp. 203–217).As we will see, legal def<strong>in</strong>itions of child pornography have <strong>to</strong> be objective and expressed <strong>in</strong>terms that allow for <strong>the</strong> proper application of due process. However, it becomes apparentthat not all of <strong>the</strong> material that is currently circulat<strong>in</strong>g on <strong>the</strong> Internet would meet anylegal def<strong>in</strong>ition of child pornography, and <strong>the</strong> def<strong>in</strong>ition of such images as ‘abusive’ is alargely subjective one. Sved<strong>in</strong> and Back (1996) def<strong>in</strong>ed child pornography as, “a text oran image – i.e. pho<strong>to</strong>, slide, film, video or computer program – that is <strong>in</strong>tended <strong>to</strong> evoke asexual feel<strong>in</strong>g, fantasy or response <strong>in</strong> adults” (p. 9). However, express<strong>in</strong>g criteria <strong>in</strong> terms ofa capacity <strong>to</strong> generate fantasy may be problematic when objective def<strong>in</strong>itions are required,as <strong>the</strong> range of materials that might evoke fantasy <strong>in</strong>cludes pho<strong>to</strong>graphs that can be found<strong>in</strong> any family album or clo<strong>the</strong>s catalogue.If we look at <strong>the</strong> k<strong>in</strong>d of material found <strong>in</strong> <strong>the</strong> collections of offenders, <strong>the</strong> k<strong>in</strong>ds ofpictures that can be identified range from pictures of clo<strong>the</strong>d children, through nakednessand explicit erotic pos<strong>in</strong>g <strong>to</strong> pictures of a sexual assault of <strong>the</strong> child pho<strong>to</strong>graphed. Wecan make some objective sense of this by th<strong>in</strong>k<strong>in</strong>g of <strong>the</strong>m <strong>in</strong> terms of a cont<strong>in</strong>uum of<strong>in</strong>creased deliberate sexual victimisation (Taylor et al., 2001). This cont<strong>in</strong>uum rangesfrom everyday and perhaps accidental pictures <strong>in</strong>volv<strong>in</strong>g ei<strong>the</strong>r no overt erotic content, orm<strong>in</strong>imal content (such as show<strong>in</strong>g a child’s underwear) at one extreme, <strong>to</strong> pictures show<strong>in</strong>gactual rape and penetration of a child, or o<strong>the</strong>r gross acts of obscenity at <strong>the</strong> o<strong>the</strong>r. Tak<strong>in</strong>gthis perspective focuses attention not on just illegality as a significant quality of pictures,but on <strong>the</strong> preferred type of pictures selected by <strong>the</strong> collec<strong>to</strong>r, and <strong>the</strong> value and mean<strong>in</strong>gpictures have <strong>to</strong> collec<strong>to</strong>rs (Taylor and Quayle, 2003). The images <strong>the</strong>n are seen as not onlyreflect<strong>in</strong>g <strong>the</strong> ways <strong>in</strong> which children are victimised but also how such victimisation ismediated by <strong>the</strong> use <strong>to</strong> which <strong>the</strong> images are put. Such a perspective does not require that<strong>the</strong> picture depicts an actual assault on a child for it <strong>to</strong> be used <strong>in</strong> an abusive way.Outside of high-tech crime units, <strong>the</strong> majority of people work<strong>in</strong>g <strong>in</strong> <strong>the</strong> area of Interne<strong>to</strong>ffend<strong>in</strong>g will have never seen child pornographic images from <strong>the</strong> Internet (Quayle and12|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Taylor, 2002). In part, this relates <strong>to</strong> <strong>the</strong> legislation <strong>in</strong> many countries, which crim<strong>in</strong>alisespossession. However, this leaves a difficult situation where communication betweenprofessionals (for example <strong>the</strong> police, child protection workers and <strong>the</strong> judiciary) becomesproblematic, and highly subjective terms are used <strong>to</strong> describe <strong>the</strong> content of <strong>the</strong> imagesheld by an <strong>in</strong>dividual. Even when attempts are made <strong>to</strong> understand <strong>the</strong> content of <strong>the</strong>pictures <strong>in</strong> terms of what is happen<strong>in</strong>g <strong>to</strong> <strong>the</strong> people with<strong>in</strong> <strong>the</strong> images, frameworks areoften used that follow a generic model of sexual representations. An example of this can beseen from K<strong>in</strong>g (2008) <strong>in</strong> his discussion on <strong>the</strong> ethical issues relat<strong>in</strong>g <strong>to</strong> child pornography.His framework for analysis <strong>in</strong>cluded <strong>the</strong> follow<strong>in</strong>g:Rape-type material: A record of actual rape or o<strong>the</strong>r non-consensual sexual activity(<strong>in</strong>cluded <strong>in</strong> this category is material <strong>in</strong> which <strong>the</strong> subject is clearly coerced, even when noactual sexual activity occurs);Consensual-type material: A record of actual consensual sexual activity;Fake-type material: The representation of sexual activity by ac<strong>to</strong>rs, whe<strong>the</strong>r professionalor amateur;Nudity-type material: Images, etc, of naked people;P<strong>in</strong>-up-type material: Images of scantily-clad or suggestively-clad people.The use by K<strong>in</strong>g (2008) of <strong>the</strong> category ‘consensual-type material’ may be thought <strong>to</strong> beproblematic. While it would be wrong <strong>to</strong> dismiss <strong>the</strong> concept of ‘agency’ <strong>in</strong> relation <strong>to</strong> <strong>the</strong>production of images, when consider<strong>in</strong>g <strong>the</strong> impact on, and <strong>the</strong>rapeutic needs, of <strong>the</strong> child,this type of approach may contribute <strong>to</strong> what has been described as <strong>the</strong> enforced silence of<strong>the</strong>se children. Consent should never be regarded as <strong>in</strong>dicative of <strong>the</strong> harm and <strong>the</strong> crime.It might also be argued that at some levels discussion of <strong>the</strong> ethics of child pornographyis unnecessary: it is simply wrong. However, this l<strong>in</strong>ks with <strong>the</strong> larger discussion of <strong>the</strong>role of pornography <strong>in</strong> sexual offend<strong>in</strong>g which will be discussed later <strong>in</strong> this paper. With<strong>in</strong>this context, Bensimon (2007) has argued, “However, even though <strong>the</strong> viewer commitsno crime, <strong>the</strong> victims are very much alive. They have mouths and o<strong>the</strong>r orifices, but <strong>the</strong>yhave no voice. Pornography does not need whole human be<strong>in</strong>gs; all it needs are objectifiedbodies, and it is <strong>the</strong> very nature of objectification that gives pornography its strength andappeal, and virtually any k<strong>in</strong>d of demand can be met” (p. 105).In try<strong>in</strong>g <strong>to</strong> understand <strong>the</strong> ways <strong>in</strong> which children are victimised with<strong>in</strong> <strong>the</strong> images, <strong>the</strong>follow<strong>in</strong>g was an attempt <strong>to</strong> provide a typology (Taylor et al., 2001), based on an analysisof publicly available images obta<strong>in</strong>ed from newsgroups and websites.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |13


Table 1: COPINE scale (Taylor et al., 2001)Level 1: Indicative.Non-erotic and non-sexualized picturesshow<strong>in</strong>g children <strong>in</strong> <strong>the</strong>ir underwear,swimm<strong>in</strong>g costumes, etc. from ei<strong>the</strong>rcommercial sources or family albums;pictures of children play<strong>in</strong>g <strong>in</strong> normalsett<strong>in</strong>gs, <strong>in</strong> which <strong>the</strong> context or organizationof pictures by <strong>the</strong> collec<strong>to</strong>r <strong>in</strong>dicates<strong>in</strong>appropriateness.Level 2: Nudist.Pictures of naked or semi-naked children<strong>in</strong> appropriate nudist sett<strong>in</strong>gs, and fromlegitimate sources.Level 3: Erotica.Surreptitiously taken pho<strong>to</strong>graphs of children<strong>in</strong> play areas or o<strong>the</strong>r safe environmentsshow<strong>in</strong>g ei<strong>the</strong>r underwear or vary<strong>in</strong>g degreesof nakedness.Level 4: Pos<strong>in</strong>g.Deliberately posed pictures of childrenfully, partially clo<strong>the</strong>d or naked (where <strong>the</strong>amount, context and organization suggestsexual <strong>in</strong>terest).Level 5: Erotic Pos<strong>in</strong>g.Deliberately posed pictures of fully, partiallyclo<strong>the</strong>d or naked children <strong>in</strong> sexualized orprovocative poses.Level 6: Explicit Erotic Pos<strong>in</strong>g.Emphasiz<strong>in</strong>g genital areas where <strong>the</strong> child isei<strong>the</strong>r naked, partially or fully clo<strong>the</strong>d.14|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Level 7: Explicit Sexual Activity.Involves <strong>to</strong>uch<strong>in</strong>g, mutual and selfmasturbation,oral sex and <strong>in</strong>tercourse bychild, not <strong>in</strong>volv<strong>in</strong>g an adult.Level 8: Assault.Pictures of children be<strong>in</strong>g subject <strong>to</strong> a sexualassault, <strong>in</strong>volv<strong>in</strong>g digital <strong>to</strong>uch<strong>in</strong>g, <strong>in</strong>volv<strong>in</strong>gan adult.Level 9: Gross Assault.Grossly obscene pictures of sexual assault,<strong>in</strong>volv<strong>in</strong>g penetrative sex, masturbation ororal sex <strong>in</strong>volv<strong>in</strong>g an adult.Level 10: Sadistic/Bestiality.a. pictures show<strong>in</strong>g a child be<strong>in</strong>g tied, bound,beaten, whipped or o<strong>the</strong>rwise subject <strong>to</strong>someth<strong>in</strong>g that implies pa<strong>in</strong>; b. pictureswhere an animal is <strong>in</strong>volved <strong>in</strong> some form ofsexual behaviour with a child.In 2002, <strong>in</strong> England and Wales <strong>the</strong> Sentenc<strong>in</strong>g Advisory Panel (SAP) published its advice<strong>to</strong> <strong>the</strong> Court of Appeal on offences <strong>in</strong>volv<strong>in</strong>g child pornography. The SAP believed that<strong>the</strong> nature of <strong>the</strong> material should be <strong>the</strong> key fac<strong>to</strong>r <strong>in</strong> decid<strong>in</strong>g <strong>the</strong> level of sentence, andadapted <strong>the</strong> Combat<strong>in</strong>g Paedophile In<strong>format</strong>ion Networks <strong>in</strong> Europe (COPINE) scale(above) <strong>to</strong> five levels. SAP dropped levels 1 <strong>to</strong> 3 completely, argu<strong>in</strong>g that nakedness alonewas not <strong>in</strong>dicative of <strong>in</strong>decency. The proposed structure was <strong>the</strong>refore that COPINE levels5 <strong>to</strong> 6 constitute sentenc<strong>in</strong>g level 1, and that COPINE levels 7 onwards each constitute an<strong>in</strong>dividual sentenc<strong>in</strong>g stage (Gillespie, 2003). Technically <strong>the</strong> SAP suggested that COPINElevels 4 and 5 should be <strong>in</strong>cluded, but <strong>the</strong> Court of Appeal rejected this and stated itshould be level 5. However, <strong>the</strong>re have been English cases where ‘naturist’ images havebeen <strong>the</strong> subject of crim<strong>in</strong>al charges. The Court of Appeal rejected <strong>the</strong> suggestion that animage under COPINE level 5 could not be <strong>in</strong>decent (Gillespie, personal communication).These levels have been fur<strong>the</strong>r revised. It would appear that most jurisdictions (for example,Australia) rely on case law ra<strong>the</strong>r than objective measures or scales <strong>to</strong> categorise <strong>the</strong>seimages.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |15


The use of such an objective measure <strong>in</strong>creases <strong>the</strong> likelihood of consistency acrosssentenc<strong>in</strong>g without necessitat<strong>in</strong>g that all <strong>in</strong>volved should have had <strong>to</strong> view <strong>the</strong> images, andis <strong>in</strong>creas<strong>in</strong>gly be<strong>in</strong>g used <strong>in</strong> countries outside of England and Wales (Cooper, 2006). Thereis understandable concern that repeated view<strong>in</strong>g of images may be problematic for <strong>the</strong>well-be<strong>in</strong>g of professionals (largely but not exclusively police) who work <strong>in</strong> this area, but afur<strong>the</strong>r consideration relates <strong>to</strong> <strong>the</strong> repeated view<strong>in</strong>g of images and fur<strong>the</strong>r victimisation of<strong>the</strong> children depicted. As Adam (2002) has suggested, “Clearly <strong>the</strong> gaze is used <strong>to</strong> terribleeffect <strong>in</strong> Internet child pornography cases where <strong>the</strong> difficulty of f<strong>in</strong>ally remov<strong>in</strong>g all copiesof <strong>the</strong> images from computer networks means that o<strong>the</strong>rs may cont<strong>in</strong>ue <strong>to</strong> gaze upon<strong>the</strong> images long after <strong>the</strong> orig<strong>in</strong>al perpetra<strong>to</strong>r has been brought <strong>to</strong> justice” (p. 135). Onedifficulty, however, is that while <strong>the</strong> COPINE typology was created as an <strong>in</strong>dica<strong>to</strong>r of howchildren are victimised through Internet child pornography, it is <strong>in</strong>creas<strong>in</strong>gly be<strong>in</strong>g usedby <strong>the</strong> courts as an <strong>in</strong>dica<strong>to</strong>r of <strong>the</strong> seriousness of <strong>the</strong> offence, or even <strong>the</strong> dangerousness of<strong>the</strong> offender. The latter is problematic, <strong>in</strong> that <strong>the</strong>re is little evidence <strong>to</strong> <strong>in</strong>dicate whe<strong>the</strong>r,for example, view<strong>in</strong>g images of children sexually engaged with animals is more likely <strong>to</strong><strong>in</strong>crease <strong>the</strong> risk of a contact offence than view<strong>in</strong>g images of children who are clo<strong>the</strong>d(Quayle, 2008). However, Gillespie (personal communication) argues that <strong>the</strong> difficultymay lie <strong>in</strong> <strong>the</strong> way that <strong>the</strong> law is phrased, ra<strong>the</strong>r than <strong>the</strong> use of <strong>the</strong> scale, as <strong>the</strong> SAPsuggested that <strong>the</strong> pho<strong>to</strong>graphs are ‘worse’ as <strong>the</strong>y progress through <strong>the</strong> levels, because <strong>the</strong>yshow more graphic imagery, and thus <strong>the</strong> punishment should be more severe.The discussion is an important one as underp<strong>in</strong>n<strong>in</strong>g <strong>the</strong> proposed change of term<strong>in</strong>ologyis a belief that <strong>the</strong> creation, distribution and collection of such images causes harm.However, <strong>the</strong> abuse might not <strong>in</strong>volve direct harm aga<strong>in</strong>st a given child, for example wherea pho<strong>to</strong>graph is taken without <strong>the</strong> child’s or <strong>the</strong> carer’s knowledge, but that it contributes<strong>to</strong>wards harms that seek <strong>to</strong> make sexual objects of children, and that <strong>the</strong> very trade of suchimages creates a marketplace that values <strong>the</strong> fur<strong>the</strong>r creation of images. This is where <strong>the</strong>dist<strong>in</strong>ction between sexual abuse, on <strong>the</strong> one hand, and sexual exploitation, on <strong>the</strong> o<strong>the</strong>r,becomes important. The exploiter of <strong>the</strong> abuse suffered by <strong>the</strong> child will commit an offenceaga<strong>in</strong>st <strong>the</strong> child <strong>in</strong> <strong>the</strong> image whe<strong>the</strong>r or not <strong>the</strong> child is aware of <strong>the</strong> fact that s/he hasbeen pho<strong>to</strong>graphed. The legal framework where image possession is deemed an offenceand where view<strong>in</strong>g of an image is likewise seen as a crime builds on <strong>the</strong> crim<strong>in</strong>alisationnot only of contact sexual abuse but also of <strong>the</strong> cont<strong>in</strong>ued exploitation that follows. Oneconsiderable challenge posed by such a debate is, <strong>in</strong> <strong>the</strong> context of <strong>the</strong> huge volume oflegal but sexualised material relat<strong>in</strong>g <strong>to</strong> children on <strong>the</strong> Internet, is how we might def<strong>in</strong>e<strong>the</strong>se images, and whe<strong>the</strong>r we should be attempt<strong>in</strong>g <strong>to</strong> control <strong>the</strong>ir distribution. Clearlywe cannot legislate aga<strong>in</strong>st fantasy, but K<strong>in</strong>g (2008) has argued that, “It is not clear…that <strong>the</strong> consumer (or <strong>the</strong> rest of society) can always (or ever) be sure what category aparticular image falls <strong>in</strong><strong>to</strong>, how much harm <strong>to</strong> <strong>the</strong> subject it represents, for however happy16|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


and carefree <strong>the</strong> child seems <strong>to</strong> be, we cannot know what later effects she suffered (or,<strong>in</strong>deed, what she was subjected <strong>to</strong> after or as a result of that pho<strong>to</strong>graph). In fact it’sclear that some degree of harm is almost always done <strong>to</strong> <strong>the</strong> subject <strong>in</strong> <strong>the</strong> productionand distribution of child pornography of all k<strong>in</strong>ds…” (p. 332). K<strong>in</strong>g (2008) goes on <strong>to</strong>suggest that child pornography not only harms its immediate victims, <strong>the</strong> children whoseabuse is at its centre, but also harms o<strong>the</strong>r children through <strong>the</strong> actions and attitudes ofits consumers. Throughout this paper we will move <strong>in</strong>terchangeably between <strong>the</strong> terms‘child pornography’ and ‘abuse images’, as this reflects <strong>the</strong> current literature and legislation<strong>in</strong> this area. However, it is important <strong>to</strong> note that not all sexualised depictions of childrenare visual, and that <strong>the</strong> term ‘abusive materials’ might both capture this and lend itself <strong>to</strong>fur<strong>the</strong>r def<strong>in</strong>ition <strong>in</strong> <strong>in</strong>ternational law.This section emphasises <strong>the</strong> importance of attempt<strong>in</strong>g <strong>to</strong> dist<strong>in</strong>guish between sexualabuse and sexual exploitation <strong>in</strong> this technological context as it has significance no<strong>to</strong>nly for <strong>the</strong> impact on <strong>the</strong> child but also for <strong>the</strong> wider crim<strong>in</strong>al-justice and childprotectionresponses. We also note <strong>the</strong> use of <strong>the</strong> terms ‘child pornography’ and ‘childabuse images’ that is reflected <strong>in</strong> <strong>the</strong> current literature and legislation, and suggest thatnot all sexualised depictions of children are visual and that <strong>the</strong> term ‘abusive’ materials,when objectively def<strong>in</strong>ed, might both capture this and lend itself <strong>to</strong> fur<strong>the</strong>r def<strong>in</strong>ition<strong>in</strong> <strong>in</strong>ternational law.2.2 Virtual child pornographyOne fur<strong>the</strong>r forensic issue of concern relates <strong>to</strong> pseudo (digitally altered) images andvirtual child pornography. The Council of Europe’s Convention on <strong>the</strong> Protection of <strong>Child</strong>renaga<strong>in</strong>st Sexual Exploitation and Sexual Abuse, states that, “Each Party may reserve <strong>the</strong> rightnot <strong>to</strong> apply, <strong>in</strong> whole or <strong>in</strong> part, paragraph 1a. and e. <strong>to</strong> <strong>the</strong> production and possessionof pornographic material: consist<strong>in</strong>g exclusively of simulated representations or realisticimages of a non-existent child”. It appears that <strong>the</strong> issue of ‘virtual child pornography’ isleft largely unaddressed with<strong>in</strong> <strong>the</strong> <strong>in</strong>ternational framework, and <strong>the</strong>re is little consensusaround <strong>the</strong> necessity <strong>to</strong> make such materials crim<strong>in</strong>al. We will exam<strong>in</strong>e this <strong>in</strong> more detailwhen we consider Internet child pornography and <strong>the</strong> law.In relation <strong>to</strong> digitally altered images, Gillespie (2003) has raised important issues abouthow different an image has <strong>to</strong> be for it <strong>to</strong> constitute a pseudo-image, possession of which<strong>in</strong> England and Wales is likely <strong>to</strong> attract a lower sentence. In <strong>the</strong> US, <strong>the</strong> constitutionalityof virtual child pornography rema<strong>in</strong>s a critical issue. In Ashcroft v. Free Speech Coalition(2002) a majority of <strong>the</strong> Supreme Court struck down portions of <strong>the</strong> <strong>Child</strong> Pornography<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |17


Prevention Act of 1996, stat<strong>in</strong>g that virtual child pornography created without real oridentifiable m<strong>in</strong>ors was unconstitutionally overbroad (Quayle, 2008). The US Court statedthat, “Virtual child pornography is not ‘<strong>in</strong>tr<strong>in</strong>sically related’ <strong>to</strong> <strong>the</strong> sexual abuse of children.While <strong>the</strong> Government asserts that <strong>the</strong> images can lead <strong>to</strong> actual <strong>in</strong>stances of child abuse,<strong>the</strong> causal l<strong>in</strong>k is cont<strong>in</strong>gent and <strong>in</strong>direct. The harm does not necessarily follow from <strong>the</strong>speech, but depends upon some quantified potential for subsequent crim<strong>in</strong>al acts”. Itmight be thought that <strong>the</strong>se ‘pseudo-pho<strong>to</strong>graphs’ complicate our understand<strong>in</strong>g of <strong>the</strong>problem and challenge our understand<strong>in</strong>g of harm. Harm, however, need not always beharm <strong>to</strong>wards a specific child. This is where concerns about sexual exploitation arise. Mostlegislation aga<strong>in</strong>st <strong>the</strong> distribution and possession of child abuse images builds on <strong>the</strong>fact that even unaware victims somehow come <strong>to</strong> harm, much <strong>in</strong> <strong>the</strong> way described byK<strong>in</strong>g (2008), and <strong>the</strong> <strong>in</strong>creased number of abusive images <strong>in</strong> circulation may add <strong>to</strong> <strong>the</strong>likelihood that children are seen as possible objects of real abuse.In 2003, Taylor and Quayle wrote that, “Pseudo-pho<strong>to</strong>graphs are constructed pho<strong>to</strong>graphs,often very cleverly done with great technical sophistication, us<strong>in</strong>g digital reconstructiontechniques <strong>to</strong> create an image that is not a pho<strong>to</strong>graph of a real person, or of real events.Thus <strong>the</strong> head of a child might be placed on<strong>to</strong> <strong>the</strong> body of a woman, where <strong>the</strong> bodyfeatures are manipulated <strong>to</strong> make it appear <strong>to</strong> be that of a child (breast reduced <strong>in</strong> size orelim<strong>in</strong>ated, and pubic hair elim<strong>in</strong>ated)…”. However, while <strong>the</strong> production of such materialmight have been a technological challenge a few years ago, this would not be <strong>the</strong> case <strong>to</strong>day.With <strong>the</strong> advent of software packages such as Adobe Pho<strong>to</strong>shop, <strong>the</strong> majority of us wouldbe able <strong>to</strong> create quite complex digitally altered images. The prediction that as computeraidedanimation and 3D computer graphics become easier and more accessible <strong>the</strong>re willbe a growth <strong>in</strong> animated child pornography, wholly constructed as computer images, hasbecome a reality, although it is unclear what impact this might have on <strong>the</strong> availability ofsuch image distribution.One of <strong>the</strong> primary producers of such imagery is Japan where <strong>the</strong>re is a huge market <strong>in</strong>manga, and o<strong>the</strong>r forms of animation, that many believe are sexually exploitative. A report<strong>in</strong> <strong>the</strong> UK’s Guardian newspaper (Guardian, 2008) suggested that sexually explicit comicsaccount for a large proportion of Japan’s Yen 500 bn manga market, with many featur<strong>in</strong>gschoolgirls or childlike adults be<strong>in</strong>g raped or engaged <strong>in</strong> sadomasochism. However, <strong>the</strong>article suggested that manga belong<strong>in</strong>g <strong>to</strong> <strong>the</strong> popular ‘lolicon’ – Japanese slang for Lolitacomplex – genre are likely <strong>to</strong> escape <strong>the</strong> proposed ban <strong>in</strong> Japan on <strong>the</strong> possession of childpornography, “as MPs are concerned that outlaw<strong>in</strong>g <strong>the</strong>m could <strong>in</strong>fr<strong>in</strong>ge on freedom ofexpression and drive men who use <strong>the</strong>m as an outlet for <strong>the</strong>ir sexual urges <strong>to</strong> commitmore serious sexual offences”. In <strong>the</strong> f<strong>in</strong>al report of <strong>the</strong> Japanese National Police AgencyExternal <strong>Expert</strong>s Study Group on Protection of <strong>Child</strong>ren from Harmful Effects of Virtual18|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


2.3 The Internet sex offender, <strong>the</strong> Internet sex exploiter and harmsfacilitated by <strong>the</strong> new technologiesWe can th<strong>in</strong>k about <strong>the</strong> potential harms posed by <strong>the</strong> new technologies <strong>in</strong> a variety of ways.Some of <strong>the</strong>m clearly are identical <strong>to</strong> pre-Internet harms and are difficult <strong>to</strong> disentanglefrom o<strong>the</strong>r sexually abusive practices (Renold and Creigh<strong>to</strong>n, 2003). Abuse through <strong>the</strong>production and dissem<strong>in</strong>ation of images might fall with<strong>in</strong> this group, along with onl<strong>in</strong>esolicitation or groom<strong>in</strong>g. The exploitation of <strong>the</strong> material has however grown exponentiallydue <strong>to</strong> <strong>the</strong> propensities of <strong>the</strong> medium itself allow<strong>in</strong>g for numerous sexual abusers <strong>to</strong> turn<strong>in</strong><strong>to</strong> sexual exploiters. Exposure <strong>to</strong> materials that might facilitate harm <strong>to</strong> <strong>the</strong> child isalso not new, although we shall see that <strong>the</strong> Internet may have exacerbated this problem.However, exposure <strong>to</strong> a medium that may afford opportunity <strong>to</strong> harm both self and o<strong>the</strong>rsis somewhat different, and may need <strong>to</strong> be considered not only <strong>in</strong> terms of <strong>the</strong> currentposition but also by what might happen as technology, or its availability, changes. As wewill see, a lot of what we know about <strong>the</strong> harms posed by <strong>the</strong> new technologies is drawnfrom work on offenders, ra<strong>the</strong>r than victims, although this is someth<strong>in</strong>g that we will seek<strong>to</strong> address. The particular ways <strong>in</strong> which harm might arise from <strong>the</strong> possession of abusiveimages were summarised by <strong>the</strong> Supreme Court of Canada R v Sharpe (Clough, 2008):1. <strong>Child</strong> pornography promotes cognitive dis<strong>to</strong>rtions such that it may normalise sexualactivity with children <strong>in</strong> <strong>the</strong> m<strong>in</strong>d of <strong>the</strong> possessor, weaken<strong>in</strong>g <strong>in</strong>hibitions and potentiallylead<strong>in</strong>g <strong>to</strong> actual abuse.2. <strong>Child</strong> pornography fuels fantasies that <strong>in</strong>cite offenders.3. Prohibit<strong>in</strong>g <strong>the</strong> possession of child pornography assists law enforcement efforts <strong>to</strong>reduce <strong>the</strong> production, distribution and use that result <strong>in</strong> direct harm <strong>to</strong> children.4. There is ‘clear and uncontradicted’ evidence that child pornography is used for groom<strong>in</strong>gand seduc<strong>in</strong>g victims.5. To <strong>the</strong> extent that most child pornography is produced us<strong>in</strong>g real children, <strong>the</strong> viewer is<strong>in</strong> a sense an accessory after <strong>the</strong> fact <strong>to</strong> an act of child abuse by provid<strong>in</strong>g a market forit.However, <strong>the</strong> sexual abuse of a child is often, but not always, <strong>the</strong> prerequisite for <strong>the</strong>ensu<strong>in</strong>g sexual exploitation of <strong>the</strong> child through <strong>the</strong> production, distribution, <strong>download</strong><strong>in</strong>gand possession of materials that <strong>document</strong> <strong>the</strong> sexual abuse. Where images are taken of anunknow<strong>in</strong>g child, for example play<strong>in</strong>g naked on <strong>the</strong> beach, <strong>the</strong> exploitation may be <strong>the</strong>rewithout <strong>the</strong> abuse. The offender may be <strong>the</strong> same person that later will sexually exploit<strong>the</strong> child, thus fur<strong>the</strong>r ga<strong>in</strong><strong>in</strong>g from <strong>the</strong> <strong>in</strong>itial abuse. The exploitation may be commercialas <strong>the</strong> offender may sell <strong>the</strong> images of <strong>the</strong> <strong>in</strong>itial abuse. It may also be a non-commercialact of exploitation where <strong>the</strong> offender will share <strong>the</strong> images of his abuse with<strong>in</strong> a circle oflikem<strong>in</strong>ded <strong>in</strong>dividuals. He may do this s<strong>in</strong>ce he <strong>in</strong> turn will receive images from o<strong>the</strong>rs <strong>in</strong><strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |21


his network, or he may do this without any such exchange. As we will go on <strong>to</strong> discuss, sexualabuse of children <strong>in</strong> <strong>the</strong> onl<strong>in</strong>e sett<strong>in</strong>g should predom<strong>in</strong>antly be seen as connected <strong>to</strong> sexualexploitation but is not synonymous with commercial sexual exploitation. Images of sexualabuse of children sold onl<strong>in</strong>e are clearly commercial sexual exploitation, however, manyrecent f<strong>in</strong>d<strong>in</strong>gs seem <strong>to</strong> <strong>in</strong>dicate that <strong>the</strong> non-commercial side of child sexual exploitationonl<strong>in</strong>e is <strong>in</strong>creas<strong>in</strong>g. 4 When talk<strong>in</strong>g about <strong>the</strong> groom<strong>in</strong>g of children for offl<strong>in</strong>e meet<strong>in</strong>gs,<strong>the</strong> exploitation is obvious: <strong>the</strong> child’s position as younger and less experienced is exploitedfor <strong>the</strong> ga<strong>in</strong> of <strong>the</strong> offender through <strong>the</strong> coercion and <strong>the</strong> persuasion of <strong>the</strong> child. The sameis true for onl<strong>in</strong>e abusive practices where <strong>the</strong> direct onl<strong>in</strong>e sexual exploitation may be par<strong>to</strong>f a more concerted onl<strong>in</strong>e exploitation <strong>in</strong> which images or films may be sent on <strong>to</strong> o<strong>the</strong>rsor given <strong>to</strong> o<strong>the</strong>rs <strong>in</strong> a commercial transaction.If we start by th<strong>in</strong>k<strong>in</strong>g about <strong>the</strong> offend<strong>in</strong>g population, it is apparent that <strong>the</strong> term<strong>in</strong>ology mostcommonly used, but which fails <strong>to</strong> capture <strong>the</strong> differences between abuse and exploitation,is that of Internet sex offenders. Unlike o<strong>the</strong>r paraphilias, it is argued that Internet sexualoffenders cannot be easily diagnosed accord<strong>in</strong>g <strong>to</strong> criteria set out <strong>in</strong> categorical modelssuch as <strong>the</strong> Diagnostic and Statistical Manual of Mental Disorders (DSM) (AmericanPsychiatric Association, 2000), and we are largely limited by what people are observed <strong>to</strong>do <strong>in</strong> relation <strong>to</strong> <strong>the</strong> Internet. What is also clear is that <strong>the</strong> term ‘Internet sex offender’may at times be used <strong>to</strong> describe <strong>the</strong> Internet sex abuser and at o<strong>the</strong>r times an Internetsex exploiter. Most case his<strong>to</strong>ries <strong>in</strong> which <strong>the</strong> police manage <strong>to</strong> identify a child abusedand exploited by an offender sexually assault<strong>in</strong>g <strong>the</strong> child and tak<strong>in</strong>g pho<strong>to</strong>graphs of <strong>the</strong>abuse will encompass a sex offender who is both sexually abus<strong>in</strong>g and sexually exploit<strong>in</strong>ghis victim. Dist<strong>in</strong>guish<strong>in</strong>g between <strong>the</strong>se activities is important, and is reflected <strong>in</strong> <strong>the</strong>different forms that offend<strong>in</strong>g behaviours take, which <strong>in</strong>clude: <strong>download</strong><strong>in</strong>g illegal imagesfrom <strong>the</strong> Internet (which largely, but not exclusively relates <strong>to</strong> pictures of children and isthus a crime of sexual exploitation); trad<strong>in</strong>g or exchang<strong>in</strong>g such images with o<strong>the</strong>rs (whichis also exploitative); produc<strong>in</strong>g images through pho<strong>to</strong>graph<strong>in</strong>g children or modify<strong>in</strong>gexist<strong>in</strong>g images, and engag<strong>in</strong>g <strong>in</strong> what has variously been called groom<strong>in</strong>g, solicitation orseduction of children. The relationship between <strong>the</strong> producer of images and <strong>the</strong> child maybe sexually abusive (where <strong>the</strong> images are taken by <strong>the</strong> one abus<strong>in</strong>g <strong>the</strong> child), sexuallyexploitative (where production is by someone o<strong>the</strong>r than <strong>the</strong> person abus<strong>in</strong>g <strong>the</strong> child),or both. Hidden, or surreptitiously taken, images are clearly exploitative but not abusive,except where <strong>the</strong> camera is hidden by <strong>the</strong> abuser.As <strong>the</strong> law changes <strong>to</strong> try <strong>to</strong> keep pace with <strong>the</strong> opportunities that <strong>the</strong> Internet affordsfor offend<strong>in</strong>g activities, so do <strong>the</strong> def<strong>in</strong>itions of behaviours and content that constitutewhat is illegal. For example, <strong>in</strong> <strong>the</strong> UK <strong>the</strong> Sexual Offences Act 2003 created an offence that<strong>in</strong>cluded groom<strong>in</strong>g, <strong>the</strong> purpose of which was <strong>to</strong> identify prepara<strong>to</strong>ry behaviour that could22|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


e crim<strong>in</strong>alised before <strong>the</strong> offender had <strong>the</strong> opportunity <strong>to</strong> sexually abuse a child. Theoffence requires an offender <strong>to</strong> have met or communicated with a child on two or moreoccasions and subsequently <strong>to</strong> meet or travel <strong>to</strong> meet a child with <strong>the</strong> <strong>in</strong>tention <strong>in</strong> ei<strong>the</strong>rcase of hav<strong>in</strong>g sexual contact with a child (Gillespie, 2006). The legislation <strong>in</strong> part grew ou<strong>to</strong>f a series of high-profile cases where an adult had used <strong>the</strong> Internet <strong>to</strong> ‘groom’ children for‘offl<strong>in</strong>e abuse’. This legislation aims at limit<strong>in</strong>g <strong>the</strong> use of <strong>the</strong> Internet <strong>to</strong> exploit <strong>the</strong> child’s<strong>in</strong>ferior position and can thus <strong>in</strong> this respect be seen as an illustration of dist<strong>in</strong>guish<strong>in</strong>g<strong>the</strong> sexual exploitation from <strong>the</strong> sexual abuse, where <strong>the</strong> exploitation <strong>in</strong> <strong>the</strong>se cases is aprecursor <strong>to</strong> <strong>the</strong> sexual abuse.However, <strong>the</strong> harms posed by <strong>the</strong> new technologies do not only relate <strong>to</strong> adult use ofchild pornography or <strong>the</strong> solicitation of children. There is <strong>in</strong>creas<strong>in</strong>g anxiety about possibleharms posed by exposure <strong>to</strong> onl<strong>in</strong>e materials along with <strong>the</strong> opportunities that <strong>the</strong> newtechnologies offer <strong>to</strong> young people <strong>to</strong> generate content that might be deemed <strong>to</strong> be legally,or psychologically, problematic. As we explore <strong>the</strong>se issues, we need <strong>to</strong> be m<strong>in</strong>dful of <strong>the</strong> factthat we do not know how much we can generalise across various studies <strong>to</strong> o<strong>the</strong>r culturalor geographical contexts. It is also <strong>in</strong>evitable that when talk<strong>in</strong>g about abusive images ofchildren <strong>the</strong> discussion has a wider focus. In <strong>the</strong> context of ethical concerns about images,K<strong>in</strong>g (2008) has suggested that, “… we dist<strong>in</strong>guish between four possible foci: <strong>the</strong> subjectsof pornography… <strong>the</strong> producers… <strong>the</strong> consumers… and <strong>the</strong> product” (p. 327). A majorchallenge is how <strong>to</strong> judge <strong>the</strong> harm that onl<strong>in</strong>e sexual exploitation may cause <strong>to</strong> children,and how wide our def<strong>in</strong>ition of exploitative practices should be. A fur<strong>the</strong>r important issue,that has not been resolved s<strong>in</strong>ce <strong>the</strong> Second World Congress, relates <strong>to</strong> <strong>the</strong> difficultiesexperienced <strong>in</strong> keep<strong>in</strong>g <strong>the</strong> subjects, <strong>the</strong> children, at <strong>the</strong> forefront of <strong>the</strong> debate. This ismade more complex as we talk <strong>in</strong>terchangeably about a specific child victim, and <strong>the</strong> harmthat <strong>the</strong>y suffer, and about harm <strong>in</strong>flicted on children <strong>in</strong> general.There have been several attempts <strong>to</strong> generate a more differentiated view of <strong>the</strong> k<strong>in</strong>ds ofactivities engaged <strong>in</strong> on <strong>the</strong> Internet that are sexual <strong>in</strong> <strong>the</strong>ir orientation and which mightcause harm <strong>to</strong> children. These have been largely conceptualised as typologies of offend<strong>in</strong>gbehaviour, as <strong>the</strong>y describe not only <strong>the</strong> activities <strong>the</strong>mselves but suggest underly<strong>in</strong>gmotivations for offend<strong>in</strong>g. Several of <strong>the</strong>se typologies built on earlier work that predated<strong>the</strong> Internet, such as that by Hartman, Burgess and Lann<strong>in</strong>g (1984). Alexy et al. (2005)described a typology based on <strong>the</strong> dist<strong>in</strong>ction between those who use <strong>the</strong> Internet as away of fur<strong>the</strong>r<strong>in</strong>g contact offences aga<strong>in</strong>st children and those who use <strong>the</strong> Internet <strong>to</strong>access abusive images. These authors generated three types of offender: traders, travellersand trader-travellers. Traders were described as people who both collect and trade abusiveimages of children on <strong>the</strong> Internet and <strong>the</strong>refore provide a market for <strong>the</strong> fur<strong>the</strong>r abuseof children. Travellers were similar <strong>to</strong> those we have previously described as ‘groomers’, <strong>in</strong><strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |23


that <strong>the</strong>y use <strong>the</strong> Internet <strong>to</strong> ga<strong>in</strong> access <strong>to</strong> children whom <strong>the</strong>y coerce <strong>in</strong><strong>to</strong> meet<strong>in</strong>g <strong>the</strong>mfor sexual purposes. The third category, trader-travellers, are those who do both. However,as Beech, Elliot, Birgden and F<strong>in</strong>dlater (2008) have <strong>in</strong>dicated, “Although <strong>in</strong>tuitivelysimple and appeal<strong>in</strong>g, <strong>the</strong>re are also a number of problems with this system. A trader whotravels <strong>to</strong> commit contact offences with children solicited offl<strong>in</strong>e while simultaneouslyaccess<strong>in</strong>g abusive images would only be considered a trader. Conversely, an offender whouses <strong>the</strong> Internet <strong>to</strong> arrange sexual meet<strong>in</strong>gs with children and simultaneously collectsoffl<strong>in</strong>e ‘<strong>in</strong>dicative’ images or sexually abusive pseudo-images of children is only considereda traveller”. For <strong>the</strong> discussion on <strong>the</strong> offend<strong>in</strong>g behaviour that would fit <strong>in</strong><strong>to</strong> <strong>the</strong> categoryof sexual exploitation we can clearly see <strong>the</strong> trader as contribut<strong>in</strong>g <strong>to</strong> and fur<strong>the</strong>r<strong>in</strong>g <strong>the</strong>sexual abuse of children by committ<strong>in</strong>g crimes that would fall <strong>in</strong> <strong>the</strong> exploitation category,whereas <strong>the</strong> traveller and <strong>the</strong> trader-traveller would both be sexual abusers and sexualexploiters as <strong>the</strong>ir offences build on <strong>the</strong> one <strong>to</strong> fur<strong>the</strong>r <strong>the</strong> o<strong>the</strong>r. Krone (2004) generated amore comprehensive typology along a cont<strong>in</strong>uum of <strong>in</strong>creas<strong>in</strong>g seriousness of <strong>the</strong> offence.This <strong>in</strong>cluded offences that did not directly <strong>in</strong>volve a child <strong>to</strong> offences <strong>in</strong>volv<strong>in</strong>g directcontact with children, and from onl<strong>in</strong>e engagement <strong>to</strong> physical abuse. Krone’s (2004)typology generated n<strong>in</strong>e types of offender classes. These were:Table 2: Krone’s (2004) typologyBrowser: This is a person who may stumble across child pornography un<strong>in</strong>tentionally(for example via spam) but <strong>the</strong>n decide <strong>to</strong> keep it, ra<strong>the</strong>r than delete it.Private fantasy: Krone differentiates between a private fantasy (which is unlikely <strong>to</strong> beseen as illegal) and where <strong>the</strong>re is evidence of that fantasy through a permanent product,such as images or text. This is not necessarily shared with o<strong>the</strong>rs, but may come <strong>to</strong> lightaccidentally.Trawler: This is a person who uses little onl<strong>in</strong>e security and where <strong>the</strong>re is m<strong>in</strong>imalnetwork<strong>in</strong>g with o<strong>the</strong>rs. Krone (2004) used <strong>the</strong> earlier work of Taylor (1999) <strong>to</strong> expla<strong>in</strong>what might motivate such a person. The sexually omnivorous user is oriented <strong>to</strong> a rangeof sexually explicit material of which child pornography is simply a part but not <strong>the</strong>focus. The sexually curious user has experimented with child pornographic material buthas not pursued it. The libertarian is driven <strong>to</strong> assert a claim <strong>to</strong> be free <strong>to</strong> access whateverIn material a similar <strong>the</strong>y way, wish. Lann<strong>in</strong>g (2001) talked about ‘computer offenders’ who use this medium24|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Non-secure collec<strong>to</strong>r: This person purchases, <strong>download</strong>s or exchanges child pornographyfrom openly available sources on <strong>the</strong> Internet or <strong>in</strong> chatrooms that do not imposesecurity barriers, such as passwords, encryption or <strong>the</strong> requirement <strong>to</strong> trade a m<strong>in</strong>imumnumber of images. This is also associated with a higher degree of network<strong>in</strong>g activity.Secure collec<strong>to</strong>r: This person collects images with<strong>in</strong> a more secure framework, which may<strong>in</strong>clude <strong>the</strong> trad<strong>in</strong>g of images <strong>in</strong> order <strong>to</strong> jo<strong>in</strong> a network. Krone (2004) suggests thatwhat might motivate such an offender is <strong>the</strong> desire <strong>to</strong> collect a large number of images,and gives an example of a UK offender, Andrew Tatum, who “was jailed for five years forpossess<strong>in</strong>g 495,000 <strong>in</strong>decent images of children. An <strong>in</strong>dication of <strong>the</strong> obsessive natureof his collect<strong>in</strong>g is that <strong>the</strong> images upon which his conviction was based counted foronly about five per cent of his personal collection of more than 10 million pornographicimages (The Age 2004)”.Onl<strong>in</strong>e groomer: This is someone who has <strong>in</strong>itiated onl<strong>in</strong>e contact with a child with <strong>the</strong><strong>in</strong>tention of establish<strong>in</strong>g a sexual relationship <strong>in</strong>volv<strong>in</strong>g cyber sex or physical sex. In thiscase, images are often used <strong>to</strong> desensitize <strong>the</strong> child <strong>to</strong> sexual activity – ‘groom’ <strong>the</strong> child–- it is shown <strong>to</strong> <strong>the</strong> child <strong>to</strong> lower that child’s <strong>in</strong>hibitions concern<strong>in</strong>g sexual activities.Physical abuser: Physical abusers are actively <strong>in</strong>volved <strong>in</strong> <strong>the</strong> commission of contac<strong>to</strong>ffences aga<strong>in</strong>st children and use images <strong>to</strong> enhance or supplement <strong>the</strong>ir sexual needs.Krone (2004) suggests that <strong>the</strong> physical abuse may be recorded for <strong>the</strong> personal use of<strong>the</strong> abuser but is not <strong>in</strong>tended <strong>to</strong> be fur<strong>the</strong>r distributed.Producer: A producer is <strong>in</strong>volved <strong>in</strong> <strong>the</strong> physical abuse of children and records that abuse<strong>to</strong> distribute <strong>to</strong> o<strong>the</strong>rs.Distribu<strong>to</strong>r: The distribu<strong>to</strong>r of abusive images may or may not have a sexual <strong>in</strong>terest <strong>in</strong>children and may be motivated by <strong>the</strong> desire <strong>to</strong> sell it <strong>to</strong> o<strong>the</strong>rs.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |25


<strong>to</strong> sexually exploit and sexually abuse children. He suggested that <strong>the</strong>y fall <strong>in</strong><strong>to</strong> three broadcategories: situational, preferential and miscellaneous.Ü Situational offenders <strong>in</strong>clude:• Adolescents or impulsive or curious adults with a newly found access <strong>to</strong> a wide rangeof pornography or sexual opportunities.• Morally <strong>in</strong>discrim<strong>in</strong>ate people motivated by power or anger and who have a his<strong>to</strong>ryof varied violent offences.• Profiteer offenders who aim <strong>to</strong> profit from <strong>the</strong> lucrative child pornography marketby <strong>in</strong>volv<strong>in</strong>g children <strong>in</strong> sexual activity.Ü Preferential offenders <strong>in</strong>clude• Paedophile offenders who have a preference for children• Diverse offenders who have a variety of deviant sexual <strong>in</strong>terests, but not a strongsexual preference for children.• Latent offenders who typically have potentially illegal preferences but would offendwhen <strong>the</strong>ir <strong>in</strong>hibitions regard<strong>in</strong>g sexual <strong>in</strong>terest <strong>in</strong> children are weakened if <strong>the</strong>irarousal patterns are fuelled and validated by <strong>in</strong>teraction with onl<strong>in</strong>e computercommunication.Ü Miscellaneous offenders <strong>in</strong>clude:• Media reporters – <strong>in</strong>dividuals who erroneously believe <strong>the</strong>y can go onl<strong>in</strong>e and traffic<strong>in</strong> child pornography and arrange meet<strong>in</strong>gs with suspected offenders as part of anauthorized and valid news exposé.• Pranksters – <strong>in</strong>dividuals who dissem<strong>in</strong>ate false or <strong>in</strong>crim<strong>in</strong>at<strong>in</strong>g <strong>in</strong><strong>format</strong>ion <strong>to</strong>embarrass <strong>the</strong> targets of <strong>the</strong>ir “dirty tricks.”• Older “boyfriends” – <strong>in</strong>dividuals <strong>in</strong> <strong>the</strong>ir late teens or early twenties attempt<strong>in</strong>g <strong>to</strong>sexually <strong>in</strong>teract with adolescent girls or boys.• Overzealous civiliansBeech et al. (2008) have been critical of Lann<strong>in</strong>g’s (2001) typology <strong>in</strong> that while it isextensive and takes <strong>in</strong><strong>to</strong> account <strong>the</strong> many reasons for which an <strong>in</strong>dividual might decide<strong>to</strong> use <strong>the</strong> Internet for sexual purposes, some of <strong>the</strong>se types appear <strong>to</strong> overlap and arenot discrete categories. Even though Lann<strong>in</strong>g and Krone both refer <strong>to</strong> ‘sexual abusers’and ‘sexual exploiters’ <strong>the</strong>y make no specific dist<strong>in</strong>ction between <strong>the</strong> groups, whichsomewhat limits <strong>the</strong> usability of <strong>the</strong> proposed typologies. What would be more useful <strong>in</strong><strong>the</strong> move <strong>to</strong>wards legislat<strong>in</strong>g aga<strong>in</strong>st all forms of offend<strong>in</strong>g, both sexual abuse and sexualexploitation, would be descriptions of what motivates <strong>the</strong> sexual exploitation as such and,more specifically, sexual exploitation that is non-commercial. What is also obvious is thatLann<strong>in</strong>g’s typology tells us a lot about <strong>the</strong> motivation of people who offend, and how this<strong>in</strong><strong>format</strong>ion might be used evidentially by law enforcement, but tells us little about <strong>the</strong>offence from a victim’s perspective.26|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


This section exam<strong>in</strong>es <strong>the</strong> potential harms posed <strong>to</strong> children by <strong>the</strong> new technologies andhow we might differentiate between sexual abuse, sexual exploitation and commercialsexual exploitation <strong>in</strong> <strong>the</strong> onl<strong>in</strong>e environment. We argue that <strong>the</strong> new media blur <strong>the</strong>boundaries between <strong>the</strong>se and provide a context that affords opportunities for both <strong>the</strong>abuse and <strong>the</strong> exploitation of children and by children.2.4 Who are <strong>the</strong>se people?We have no idea of <strong>the</strong> numbers of people who offend on <strong>the</strong> Internet. We can exam<strong>in</strong>econviction rates, but <strong>the</strong>se reflect only <strong>the</strong> countries where possession and distribution ofchild pornography is both illegal and where <strong>the</strong>re are ei<strong>the</strong>r <strong>the</strong> resources or <strong>in</strong>cl<strong>in</strong>ation<strong>to</strong> act upon detection (Quayle, 2008). Wortley and Smallbone (2006) have suggested that,“At any one time <strong>the</strong>re are estimated <strong>to</strong> be more than one million pornographic imagesof children on <strong>the</strong> Internet, with 200 new images posted daily. One offender <strong>in</strong> <strong>the</strong> UKpossessed 450,000 child pornography images. It has been reported that a s<strong>in</strong>gle childpornography site received a million hits a month… It has been estimated that <strong>the</strong>re arebetween 50,000 and 100,000 pedophiles <strong>in</strong>volved <strong>in</strong> organized pornography r<strong>in</strong>gs around<strong>the</strong> world, and that one-third of <strong>the</strong>se operate from <strong>the</strong> United States” (p. 13). In <strong>the</strong> US,Wolak, Mitchell and F<strong>in</strong>kelhor (2003) reported that law enforcement made an estimated2,577 arrests dur<strong>in</strong>g a 12-month period (start<strong>in</strong>g July 1, 2000) for Internet sex crimes aga<strong>in</strong>stm<strong>in</strong>ors. These crimes were categorised <strong>in</strong><strong>to</strong> three mutually exclusive types: Internet crimesaga<strong>in</strong>st identified victims (39%); Internet solicitations <strong>to</strong> undercover law enforcement(25%), and possession, distribution or trad<strong>in</strong>g of child pornography with no identifiedvictim (36%). Two-thirds of offenders who committed any of <strong>the</strong> types of Internet sexcrimes aga<strong>in</strong>st m<strong>in</strong>ors possessed child pornography, with 83% of <strong>the</strong>se possess<strong>in</strong>g imagesof children between <strong>the</strong> ages of 6 and 12, and 80% hav<strong>in</strong>g images explicitly show<strong>in</strong>g sexualpenetration of m<strong>in</strong>ors.F<strong>in</strong>kelhor and Ormrod (2004) exam<strong>in</strong>ed child pornography patterns from <strong>the</strong> FBI’sNational Incident-Based Report<strong>in</strong>g System (NIBRS). The data from 1997–2000 on 2,469crime <strong>in</strong>cidents <strong>in</strong>volv<strong>in</strong>g pornography revealed that over <strong>the</strong>se three years pornographyoffences <strong>in</strong>creased by 68% and juvenile victim/child exploitation pornography offences<strong>in</strong>creased 200%. But at <strong>the</strong> time of this report, only a small m<strong>in</strong>ority of all pornographyoffences known <strong>to</strong> <strong>the</strong> police were coded as <strong>in</strong>volv<strong>in</strong>g a computer.However, <strong>the</strong>se statistics reflect only those who are caught. O<strong>the</strong>r data, such as that providedby one lead<strong>in</strong>g UK Internet Service Provider (ISP) suggested that <strong>in</strong> July 2004 it blocked<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |27


more than 20,000 attempts per day <strong>to</strong> access child pornography on <strong>the</strong> Internet. Morerecent data from Swedish and Norwegian block<strong>in</strong>g of access <strong>to</strong> known sites carry<strong>in</strong>g childabusive images reveal as many as 15,000–18,000 daily attempts <strong>in</strong> Norway. These figuresneed <strong>to</strong> be <strong>in</strong>terpreted with caution s<strong>in</strong>ce <strong>the</strong>y would also <strong>in</strong>clude hits by, for example, webcrawl<strong>in</strong>grobots which may result <strong>in</strong> a number of ‘false positives’, but <strong>the</strong>y do, however, saysometh<strong>in</strong>g of <strong>the</strong> number of attempts made <strong>in</strong> a country with a much smaller populationthan that of <strong>the</strong> UK. The attempts were easy <strong>to</strong> block because <strong>the</strong> material requested wasfrom known sources. More difficult is material that is produced with a perfectly valid reason,but which is used by o<strong>the</strong>rs <strong>in</strong> a way that is problematic. A good example of this is providedby Lehmann, Cohen, and Kim (2006) <strong>in</strong> relation <strong>to</strong> <strong>the</strong> detection and management ofpornography-seek<strong>in</strong>g <strong>in</strong> an onl<strong>in</strong>e cl<strong>in</strong>ical derma<strong>to</strong>logy atlas. Dur<strong>in</strong>g <strong>the</strong> study period,one third of <strong>the</strong> search queries related <strong>to</strong> ana<strong>to</strong>mical sites and over half specified children.From unpublished data from <strong>the</strong> CROGA Internet self help site for people experienc<strong>in</strong>gdifficulties <strong>in</strong> relation <strong>to</strong> child pornography, <strong>the</strong>re were 8,684 users of <strong>the</strong> site between June2004 and April 2006. Similarly, <strong>in</strong> <strong>the</strong> UK, statistics from S<strong>to</strong>p It Now! UK and Irelandsuggested that between 2002 and 2005, 45% of calls <strong>to</strong> its helpl<strong>in</strong>e were from peopleexperienc<strong>in</strong>g problems <strong>in</strong> relation <strong>to</strong> <strong>the</strong>ir own behaviour, a significant number of whomwere us<strong>in</strong>g, or feel<strong>in</strong>g a compulsion <strong>to</strong> use, <strong>the</strong> Internet (S<strong>to</strong>p It Now! UK and Ireland,2006). This pattern has cont<strong>in</strong>ued s<strong>in</strong>ce <strong>the</strong> publication of <strong>the</strong> report and, over <strong>the</strong> pastthree years, <strong>the</strong>re has been a proportionate <strong>in</strong>crease <strong>in</strong> people telephon<strong>in</strong>g about concernsregard<strong>in</strong>g <strong>the</strong>ir own or someone else’s behaviour onl<strong>in</strong>e.While this offend<strong>in</strong>g population is largely described as heterogeneous (Taylor and Quayle,2003), <strong>the</strong>re are some strik<strong>in</strong>g demographic consistencies between study samples. The mostnotable of <strong>the</strong>se relates <strong>to</strong> gender. Wolak et al. (2003, 2005), <strong>in</strong> <strong>the</strong>ir study of Internetcrimes aga<strong>in</strong>st m<strong>in</strong>ors, reported that 99% of <strong>the</strong>ir sample was male. This is similar <strong>to</strong> <strong>the</strong>f<strong>in</strong>d<strong>in</strong>gs of o<strong>the</strong>r studies (F<strong>in</strong>kelhor and Ormrod, 2004; Se<strong>to</strong> and Eke, 2005; Sullivan, 2005;Bates and Metcalf, 2007; Webb, Craissati and Keen, 2007; Baartz, 2008). From a differentperspective, Mitchell, Becker-Blease and F<strong>in</strong>kelhor (2005) conducted a national survey of1,504 US mental health practitioners on social and psychological problems associated with<strong>the</strong> Internet: 63% of <strong>the</strong>ir clients were male.Ethnicity appears <strong>to</strong> be ano<strong>the</strong>r common characteristic, with <strong>the</strong> majority of offendersbe<strong>in</strong>g white and westernised (Wolak et al., 2003, 2005; Carr, 2004; Sullivan, 2005; O’Brienand Webster, 2007). Webb et al. (2007) <strong>in</strong>dicated that <strong>the</strong>ir 90 Internet-related offenderswere predom<strong>in</strong>antly white; this appeared <strong>to</strong> be different from <strong>the</strong>ir child molester sample,which came from a more mixed ethnic group. The great majority of Australian Internet sexoffenders were identified as Caucasian (86%), with m<strong>in</strong>imal representation <strong>in</strong> <strong>the</strong> Asian,Mediterranean and Aborig<strong>in</strong>al ethnic groups (Baartz, 2008). This raises an <strong>in</strong>terest<strong>in</strong>g issue28|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


about sexually abusive practices and ethnicity, and whe<strong>the</strong>r <strong>the</strong>se offender characteristicsresult from socio-demographic patterns of Internet use, or whe<strong>the</strong>r <strong>the</strong>y reflect differences<strong>in</strong> ethnicity and pornography or abusive image use. Buzzell (2005) reported descriptivedata taken from <strong>the</strong> US General Social Survey from 1973 onwards. They identified threetechnological contexts (film, <strong>the</strong>atre or VCR and websites) <strong>to</strong> describe general pornographyuse and <strong>the</strong> demographics of people who use it. Website access <strong>to</strong> pornography waspredom<strong>in</strong>antly male and decl<strong>in</strong>ed with age, but, “More non-whites than whites have seenan X-rated film <strong>in</strong> a <strong>the</strong>atre or on a VCR compared <strong>to</strong> film or website access… Use ofwebsite pornography follows <strong>the</strong> same pattern except that its use is less likely <strong>to</strong> be reportedby non-white populations. Up <strong>to</strong> 20% of <strong>the</strong> non-white portion of <strong>the</strong> sample reports usepornography” (p. 41). It is unknown whe<strong>the</strong>r this is an example of <strong>the</strong> digital divide andwhe<strong>the</strong>r this might change <strong>in</strong> <strong>the</strong> future.A fur<strong>the</strong>r demographic variable of <strong>in</strong>terest relates <strong>to</strong> age, and here <strong>the</strong>re is less consensus.In Wolak et al.’s (2003) study, of <strong>the</strong> 2,577 arrests made for Internet sex crimes aga<strong>in</strong>stm<strong>in</strong>ors, 14% were aged 25 years or under, 45% between 26 and 39 years and 41% wereover 40 years. Wolak et al.’s (2005) analysis of those who had possessed child pornography<strong>in</strong>dicated that 45% were 40 or older. This is similar <strong>to</strong> o<strong>the</strong>r reported samples (Middle<strong>to</strong>n,Elliot, Mandeville-Norden and Beech, 2007; O’Brien and Webster, 2007; Webb et al.,2007; Baartz, 2008), although <strong>the</strong> age range <strong>in</strong> <strong>the</strong>se samples was quite wide. However, <strong>the</strong>data ga<strong>the</strong>red by <strong>the</strong> New Zealand Censorship Compliance Unit appeared very different(Sullivan, 2005). Of <strong>the</strong> 201 cases <strong>in</strong> its most recent analysis, <strong>the</strong> largest s<strong>in</strong>gle age groupwas between 15 and 19 years, which accounted for 24.32% of all offenders. Over half wereunder <strong>the</strong> age of 30 at <strong>the</strong> time of <strong>the</strong> <strong>in</strong>vestigation, with an age range of 14–67 years.O<strong>the</strong>r demographic fac<strong>to</strong>rs, such as occupation, level of education and experience <strong>in</strong>Internet use are equally mixed across populations. As would be expected given <strong>the</strong> agedistribution of <strong>the</strong> New Zealand sample, students were <strong>the</strong> largest occupational group,with two-thirds of <strong>the</strong>se study<strong>in</strong>g at tertiary level, of which 37.5% were study<strong>in</strong>g subjectsrelated <strong>to</strong> <strong>in</strong><strong>format</strong>ion technology. With<strong>in</strong> this sample, <strong>the</strong> second largest group was thosework<strong>in</strong>g <strong>in</strong> <strong>in</strong><strong>format</strong>ion technology. The Australian sample was typically employed <strong>in</strong>professional or adm<strong>in</strong>istrative roles (Baartz, 2008), employed a medium level of computercompetency and did not employ sophisticated technology or security measures. Wolak etal. (2005) <strong>in</strong>dicated that 73% of <strong>the</strong>ir population was <strong>in</strong> full-time employment, with <strong>the</strong>majority (82%) hav<strong>in</strong>g an <strong>in</strong>come greater than $20,000. Similarly, <strong>in</strong> O’Brien and Webster’s(2007) sample, just over a half had received third-level education and 75.5% were <strong>in</strong> fulltime occupation. Unlike <strong>the</strong> New Zealand group, this latter study <strong>in</strong>dicated that 92.6% hadnot received any formal tra<strong>in</strong><strong>in</strong>g <strong>in</strong> Internet use. Certa<strong>in</strong>ly, <strong>to</strong> date, only gender and ethnicgroup are common fac<strong>to</strong>rs across all populations.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |29


There are considerable difficulties <strong>in</strong> understand<strong>in</strong>g <strong>the</strong> relationship between <strong>the</strong> conten<strong>to</strong>f <strong>the</strong> images viewed, <strong>the</strong> experience for <strong>the</strong> child, <strong>the</strong> sexual <strong>in</strong>terest of <strong>the</strong> offender and<strong>the</strong> functions of <strong>the</strong> images <strong>the</strong>mselves. In part this is because <strong>the</strong>re is very little researchthat has focused on <strong>the</strong> content of <strong>the</strong> images collected by offenders. This is a significantproblem: as discussed above, we cannot understand whe<strong>the</strong>r <strong>the</strong> images <strong>the</strong>mselves mightbe an <strong>in</strong>dica<strong>to</strong>r of future risk. There is also a possibility that it helps us all turn our gazeaway from <strong>the</strong> images and <strong>the</strong> children who are victimised. Let us f<strong>in</strong>ish this section bybriefly exam<strong>in</strong><strong>in</strong>g just one of <strong>the</strong> few studies that has <strong>in</strong>cluded an analysis of <strong>the</strong>se images.Baartz’s (2008) study of Australian Internet sex offenders <strong>in</strong>dicated that three-quartersof <strong>the</strong>ir sample chose material that depicted children or young people nude or partiallynude with a display of <strong>the</strong>ir genitals, and explicit sexual acts. Table 3 fur<strong>the</strong>r exam<strong>in</strong>es <strong>the</strong>preferred content of images chosen by <strong>the</strong>se offenders:Table 3: Content of images acquired by offenders (Baartz, 2008)Activity Number PercentagePosed nudity or partial nudity with display of genitals. 38 76Explicitly sexual acts or actions. 38 76Naturalist nudity or partial nudity. 23 46Posed nudity or partial nudity without display of genitals. 22 44Incest or implied <strong>in</strong>cest. 16 32Explicitly harmful acts or actions (e.g. physical violence,<strong>to</strong>rture, bondage etc.).Dehumanis<strong>in</strong>g and degrad<strong>in</strong>g activities (e.g. use of ur<strong>in</strong>eand excrement, extreme close-ups etc.).Bestiality <strong>in</strong>volv<strong>in</strong>g children or <strong>in</strong> <strong>the</strong> presence ofchildren.13 269 189 1830|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Activity Number PercentagePhysical and/or verbal expression of fear and/or distress. 6 12O<strong>the</strong>r (e.g. car<strong>to</strong>ons). 1 2When we ask who engages <strong>in</strong> Internet sex offend<strong>in</strong>g through <strong>the</strong> sexual exploitation ofchildren by collect<strong>in</strong>g abusive images of children, we conclude that <strong>the</strong>y are largely male,white, of westernized appearance, and cover<strong>in</strong>g a wide range of ages. Some are highlycomputer literate while o<strong>the</strong>rs possess only basic skills. They take vary<strong>in</strong>g degrees of risk <strong>to</strong>both acquire and hold on<strong>to</strong> <strong>the</strong>se images. Some of <strong>the</strong>m have a his<strong>to</strong>ry of prior offend<strong>in</strong>g,while for o<strong>the</strong>rs this is <strong>the</strong> first open demonstration of sexual <strong>in</strong>terest <strong>in</strong> children, or <strong>the</strong>first time it has come <strong>to</strong> <strong>the</strong> attention of law enforcement agencies. What <strong>the</strong> study byBaartz (2008) forces us <strong>to</strong> conclude is that what <strong>the</strong>se people are seek<strong>in</strong>g <strong>to</strong> collect is notsimply pictures of children, but images that capture, at least <strong>in</strong> part, <strong>the</strong> exploitation, abuse,humiliation and degradation of children and <strong>the</strong>ir sexuality – all <strong>in</strong> <strong>the</strong> service of <strong>the</strong> sexualenjoyment of o<strong>the</strong>rs.Here we exam<strong>in</strong>e what is known about people who commit sexual offences aga<strong>in</strong>st childrenand are forced <strong>to</strong> conclude that current knowledge would <strong>in</strong>dicate that <strong>the</strong>y are largelywhite, westernised males who come from a variety of socio-demographic backgrounds,are more likely <strong>to</strong> be educated and are less likely <strong>to</strong> have a known offend<strong>in</strong>g his<strong>to</strong>ry.2.5 Technologies usedThe <strong>the</strong>matic paper on <strong>Child</strong> Pornography from <strong>the</strong> Second World Congress exam<strong>in</strong>ed<strong>the</strong> effects of <strong>the</strong> new technologies and identified <strong>the</strong> problems posed by <strong>the</strong> reduc<strong>in</strong>gcost of mak<strong>in</strong>g and s<strong>to</strong>r<strong>in</strong>g images, <strong>the</strong> <strong>in</strong>creas<strong>in</strong>g ability <strong>to</strong> create pseudo-pornographyand <strong>the</strong> emergence of commonly available encryption technologies. S<strong>in</strong>ce 2001 we haveseen considerable technological change, which <strong>in</strong>cludes higher bandwidth and highercompression techniques allow<strong>in</strong>g for <strong>in</strong>creased capacity <strong>to</strong> <strong>download</strong> both still and mov<strong>in</strong>gimages; more sophisticated ways <strong>to</strong> encrypt and anonymise data; better ways of hid<strong>in</strong>g dataover <strong>the</strong> Internet, such as s<strong>to</strong>r<strong>in</strong>g data on compromised mach<strong>in</strong>es, password-protected fileshar<strong>in</strong>gwebsites, email accounts and less reputable content providers hosted <strong>in</strong> countrieswith lax cybercrime legislation; as well as <strong>in</strong>creased use of <strong>in</strong><strong>format</strong>ion-hid<strong>in</strong>g <strong>to</strong>ols <strong>to</strong>fur<strong>the</strong>r impede <strong>the</strong> collection of evidence. Remote image s<strong>to</strong>rage is a popular way ofenabl<strong>in</strong>g Internet users <strong>to</strong> share pictures. These websites allow easy, free and unlimited and<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |31


anonymous post<strong>in</strong>g of pho<strong>to</strong>graphs. The Internet Watch Foundation (IWF) (IWF, 2006)<strong>in</strong>dicated that <strong>in</strong> 2006 pho<strong>to</strong>-album websites accounted for 10.5% of all URLs reported<strong>to</strong> law enforcement agencies and o<strong>the</strong>r hotl<strong>in</strong>es, apparently conta<strong>in</strong><strong>in</strong>g potentially illegalchild abuse images. The IWF also noted a trend whereby commercial websites s<strong>to</strong>re <strong>the</strong>image files on a remote website, some of which conta<strong>in</strong> collections of elements of animage which, when assembled make up <strong>the</strong> whole image. When a person clicks on <strong>the</strong>‘parent’ commercial website <strong>to</strong> <strong>download</strong> images, <strong>the</strong> site collects <strong>the</strong> relevant pieces fromseparately hosted image s<strong>to</strong>res and assembles <strong>the</strong>m. The IWF (2006) noted that, “Theseimage ‘jigsaw’ s<strong>to</strong>res might be able <strong>to</strong> evade removal and law enforcement <strong>in</strong>vestigation as<strong>the</strong> images may not constitute potentially illegal content <strong>in</strong> <strong>the</strong>ir pre-assembled state”.Choo, Smith and McCusker (2007) have also suggested we are also likely <strong>to</strong> see enhancedmethods of exploit<strong>in</strong>g wireless vulnerabilities, <strong>in</strong>clud<strong>in</strong>g drive-by subversion of wirelesshome routers through unauthorised access by mobile WiFi clients, mak<strong>in</strong>g it more difficult<strong>to</strong> identify <strong>the</strong> <strong>download</strong><strong>in</strong>g of abusive material. However, only home routers that are notprotected by access keys and network encryption are <strong>the</strong> ones most likely <strong>to</strong> be used <strong>in</strong> thisway. With <strong>the</strong> growth of WiMax (with much greater reach than WiFi) <strong>the</strong> same challengesfaced by private, unmoni<strong>to</strong>red and anonymous access is compounded. We have also seen an<strong>in</strong>creased use of botmalware that aims <strong>to</strong> avoid detection by anti-virus software and thatallow a child’s computer <strong>to</strong> be controlled. There are also new payment systems <strong>in</strong> whichInternet <strong>in</strong>ternational funds transfer <strong>in</strong>structions (IFTIs) and e-currencies cont<strong>in</strong>ue <strong>to</strong>grow (eg, prepaid cards and smartcards which avoid some of <strong>the</strong> traceability of traditionalcredit-card transactions). In addition live sexual abuse videos can be streamed <strong>to</strong> Internetchatrooms, with <strong>the</strong> actual perpetra<strong>to</strong>r respond<strong>in</strong>g <strong>in</strong> real time <strong>to</strong> commands from o<strong>the</strong>rparticipants who are able <strong>to</strong> see <strong>the</strong> images.S<strong>in</strong>ce <strong>the</strong> Second World Congress we have seen <strong>in</strong>creas<strong>in</strong>g use of distributed networks, suchas peer-<strong>to</strong>-peer (p2p), which facilitate file shar<strong>in</strong>g amongst users. Many studies show thata large amount of paedophile and harmful contents is distributed us<strong>in</strong>g p2p file exchangesystems, and that <strong>the</strong> volume of such exchanges is <strong>in</strong>creas<strong>in</strong>g (Taylor and Quayle, 2003;Waters, 2007). Mehta et al. (2002) exam<strong>in</strong>ed 507 video files retrieved from <strong>the</strong> Gnutellanetwork us<strong>in</strong>g key words that were likely <strong>to</strong> be l<strong>in</strong>ked <strong>to</strong> a search for pornographic material.Their data suggested that while <strong>the</strong> availability of obscene or illegal video files constituted arelatively small percentage of <strong>the</strong> overall set, <strong>the</strong> ease with which <strong>the</strong> material was accessedand <strong>the</strong> sheer volume of data flow<strong>in</strong>g through <strong>the</strong> network was seen as a cause for concern.Video files def<strong>in</strong>ed as paedophilic represented 3.7% of <strong>the</strong> sample, but as millions of fileswere exchanged this represented a sizeable number. These authors also moni<strong>to</strong>red a website(Gnutellameter) which captures data exchanged <strong>in</strong> Gnutella and provides summaries ofkey words most commonly entered by users. They suggested that, “<strong>the</strong> most commonly32|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


searched for files on Gnutella are ei<strong>the</strong>r copyright protected software, movies encoded<strong>in</strong> ‘divx’ <strong>format</strong>, and pornographic material, with a strong emphasis on both child andhebephilic (sexual attraction <strong>to</strong> pubescent adolescents) pornography”. In a similar ve<strong>in</strong>Grabowski (2003) had noted that <strong>in</strong> February 2003, Palisade Systems collected 22 millionrequests and searches conducted on Gnutella over a 3-week period and randomly selected40,000 of <strong>the</strong>se. They found that 42% of all requests moni<strong>to</strong>red were for adult or childpornography. The presence of such content, and its very easy access, make <strong>the</strong> currentsituation particularly worry<strong>in</strong>g for p2p users, <strong>in</strong> particular children. The MAPAP Projectlaunched a query of <strong>the</strong> key word ‘pthc’ (preteen hardcore) on June 10 2006 (MPAP, 2008).It obta<strong>in</strong>ed 48,488 file names conta<strong>in</strong><strong>in</strong>g this key word. Of <strong>the</strong>se, 16,913 conta<strong>in</strong>ed age<strong>in</strong><strong>format</strong>ion (age followed by a number). There were more than 10,000 files claim<strong>in</strong>gcontent with children 11 years and younger, 2500 with children 6 years and below andmore than 500 with children aged 2 years and below. The distribution can be seen <strong>in</strong> Figure1 below; <strong>the</strong>se correspond <strong>to</strong> 64%, 14% and 3.5% of <strong>the</strong> <strong>to</strong>tal. This clearly <strong>in</strong>dicates that <strong>the</strong>focus was on children aged between 10 and 12 years and some younger, although it was notpossible <strong>to</strong> validate whe<strong>the</strong>r files actually conta<strong>in</strong>ed illegal material.NumberAgeFigure 1. Cumulative distribution of files relat<strong>in</strong>g <strong>to</strong> age of child<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |33


Over <strong>the</strong> last few years we have also seen ready access <strong>to</strong> social network<strong>in</strong>g sites, whichdemonstrate <strong>the</strong> convergence of many aspects of computer mediated communication.Liv<strong>in</strong>gs<strong>to</strong>ne (2008) has remarked, “In terms of <strong>the</strong>ir affordances, social network<strong>in</strong>g sitesenable communication among ever-widen<strong>in</strong>g circles of contact, <strong>in</strong>vit<strong>in</strong>g convergenceamong <strong>the</strong> hi<strong>the</strong>r<strong>to</strong> separate activities of email, messag<strong>in</strong>g, website creation, diaries, pho<strong>to</strong>albums, and music or video upload<strong>in</strong>g and <strong>download</strong><strong>in</strong>g…” (p. 394). Along with this hascome an <strong>in</strong>creas<strong>in</strong>g anxiety that such convergence provides relatively easy access <strong>to</strong> a widerange of <strong>in</strong><strong>format</strong>ion about a young person, as well as afford<strong>in</strong>g <strong>the</strong> opportunity <strong>to</strong> createcontent that may be construed as problematic. While some researchers have construed thisas a ‘moral panic’ (eg, Cassell and Cramer, 2008) for which <strong>the</strong>re is little actual evidence,Brazil has seen a growth <strong>in</strong> <strong>the</strong> use of sites such as Orkut as a context for groom<strong>in</strong>g,diffusion and <strong>in</strong>terchange of pornographic material and as a means by which adults can be<strong>in</strong>timately <strong>in</strong> contact with children and adolescents (Gonçalves, on behalf of <strong>Child</strong>hoodBrasil, personal communication).However, it must not be assumed that as technology advances this means that ‘oldtechnology’ is simply abandoned. Newsgroups provide one example of ‘old technology’ thatis still used by many, <strong>in</strong>clud<strong>in</strong>g those with a sexual <strong>in</strong>terest <strong>in</strong> children. A recent study byO’Halloran (2008) can be used <strong>to</strong> illustrate this. Usenet is an example of a newsgroup andsimply stands for ‘user’s network’. It began <strong>in</strong> <strong>the</strong> early 1980s as a means of <strong>in</strong><strong>format</strong>ionand idea exchange for users and programmers of <strong>the</strong> UNIX operat<strong>in</strong>g system (Harmonand Boer<strong>in</strong>ger, 1997). At <strong>the</strong> time of writ<strong>in</strong>g, Harmon and Boer<strong>in</strong>ger (1997) reported <strong>the</strong>existence of over 15,000 newsgroups on Usenet. A more recent figure offered by Joyce andKraut (2006) puts <strong>the</strong> number of public groups at 190,000, which are made up annually of250 million messages from over 9 million unique users. Usenet, or <strong>the</strong> ‘newsgroups’ as it iscommonly referred <strong>to</strong>, is a Bullet<strong>in</strong> Board System (BBS) that allows users <strong>to</strong> post messagesthat can be read and responded <strong>to</strong> by anyone with access <strong>to</strong> <strong>the</strong> group. They are easilyaccessible, and newsgroups exist for such divergent <strong>to</strong>pics as support for baseball teams,magic, anarchism, shar<strong>in</strong>g recipes and alternative groups of a sexual nature. In 1999 Durk<strong>in</strong>and Bryant conducted a study analys<strong>in</strong>g <strong>the</strong> justifica<strong>to</strong>ry accounts offered by paedophilescommunicat<strong>in</strong>g on a Usenet group dedicated <strong>to</strong> <strong>the</strong> support of ‘boy lovers’ (Durk<strong>in</strong> andBryant 1999). The study sought <strong>to</strong> identify exculpa<strong>to</strong>ry and justifica<strong>to</strong>ry accounts of thosewith a sexual <strong>in</strong>terest <strong>in</strong> boys <strong>in</strong> order <strong>to</strong> supplement exist<strong>in</strong>g knowledge about paedophilia.The onl<strong>in</strong>e Usenet group ‘alt.support-boy.lovers’ was identified as a ready pool of peoplewho were not necessarily active as contact offenders, but who could offer <strong>in</strong>sights <strong>in</strong><strong>to</strong>how those with a sexual <strong>in</strong>terest <strong>in</strong> children accounted for <strong>the</strong>ir deviant sexual orientation.O’Halloran (2008) repeated <strong>the</strong> study with a sample made up of contribu<strong>to</strong>rs <strong>to</strong> <strong>the</strong> sameInternet support forum. The text of 23 contribu<strong>to</strong>rs with a self-identified sexual <strong>in</strong>terest<strong>in</strong> children was analysed. All of <strong>the</strong> contribu<strong>to</strong>rs had been members of <strong>the</strong> support forum34|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


for a m<strong>in</strong>imum of several months, with some hold<strong>in</strong>g membership for up <strong>to</strong> 10 years. Onsampl<strong>in</strong>g it was found that <strong>the</strong>re were 1570 subscribers <strong>to</strong> <strong>the</strong> group, and it was categorisedas a medium-level activity group.One of <strong>the</strong> most notable f<strong>in</strong>d<strong>in</strong>gs of this research was <strong>the</strong> <strong>in</strong>crease <strong>in</strong> activity on <strong>the</strong> supportforum s<strong>in</strong>ce Durk<strong>in</strong> and Bryant studied it <strong>in</strong> 1999. The number of members on <strong>the</strong> sitehad grown significantly, with a current active membership of over 1,500, attract<strong>in</strong>g over1300 new posts per month on average. These figures represent an almost tenfold <strong>in</strong>crease<strong>in</strong> <strong>the</strong> size and activity of <strong>the</strong> group, which <strong>in</strong> 1999 received between 150 and 200 uniqueposts per month. The <strong>in</strong>tensified use of <strong>the</strong> site raises questions as <strong>to</strong> why this growth hasoccurred, given that newsgroups are a relatively basic and outmoded medium for Internetcommunication. While <strong>the</strong> Usenet newsgroups were popular <strong>in</strong> <strong>the</strong> 1980s and 1990s, <strong>the</strong>irunattractive <strong>in</strong>terface and low signal-<strong>to</strong>-noise ratio had web users predict<strong>in</strong>g that <strong>the</strong>ywould be obsolete by <strong>the</strong> twenty-first century. Newsgroups, Non-s<strong>to</strong>p (2008) writes that<strong>in</strong>novations accompany<strong>in</strong>g <strong>the</strong> rise of Internet technologies should have challenged <strong>the</strong>existence of <strong>the</strong> newsgroups as a communication <strong>to</strong>ol, yet <strong>the</strong>ir popularity has rema<strong>in</strong>edsteady. They conclude that <strong>the</strong> reason why usage of <strong>the</strong> Newsgroups has not decl<strong>in</strong>ed isbecause <strong>the</strong> forums are mostly uncensored by hosts and thus groups can exist on any <strong>to</strong>picand host almost any type of content. Because of this, <strong>the</strong> success of <strong>the</strong> Usenet forums is<strong>the</strong> fact that <strong>the</strong>y fit <strong>the</strong> ideal of Internet communication <strong>in</strong> that <strong>the</strong>y are uncensored, peermoderatedspaces for shar<strong>in</strong>g <strong>in</strong><strong>format</strong>ion. Although <strong>the</strong> forum studied <strong>in</strong> this researchdoes not claim <strong>to</strong> host illegal child abuse imagery, O’Halloran (2008) suggested that <strong>the</strong>content of its discussions is objectionable <strong>to</strong> most of <strong>the</strong> general public and thus it couldexpect <strong>to</strong> be censored if located <strong>in</strong> a different medium on <strong>the</strong> Internet. Because Usenet ispeer-moderated, <strong>the</strong>re is no external <strong>in</strong>dividual <strong>to</strong> regulate its content so members are free<strong>to</strong> discuss whatever <strong>the</strong>y wish <strong>in</strong> relative privacy.The cont<strong>in</strong>ued proliferation of child abusive images through old and new channels follows<strong>the</strong> pattern that has emerged on <strong>the</strong> Internet, where demand for different items will besatisfied by <strong>the</strong> very existence of a world-wide audience. Demand for child abuse images isone where a local market, which pre-Internet was practically non-existent, functions due <strong>to</strong><strong>the</strong> very nature of <strong>the</strong> medium itself. In any s<strong>in</strong>gle community <strong>the</strong>re may be few <strong>in</strong>dividualsdriv<strong>in</strong>g <strong>the</strong> demand for a specific k<strong>in</strong>d of child abuse image, but on a global level, <strong>the</strong>rewill always be likem<strong>in</strong>ded <strong>in</strong>dividuals <strong>to</strong> connect with. In this way, <strong>the</strong> demand for childabuse images follows <strong>the</strong> ‘Long Tail-<strong>the</strong>ory’ (Anderson 2006). The costs of consumptionhave been lowered drastically by <strong>the</strong> democratisation of production. However, as Andersonemphasises, content production is only mean<strong>in</strong>gful if o<strong>the</strong>rs can enjoy it. The l<strong>in</strong>k betweensupply and demand is crucial <strong>in</strong> all Internet-based exchanges, and <strong>in</strong> <strong>the</strong> case of child abuseimages is facilitated by different ways of locat<strong>in</strong>g content.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |35


Here we consider what is known of <strong>the</strong> technologies used by offenders. Some of <strong>the</strong>se havechanged s<strong>in</strong>ce 2001 but o<strong>the</strong>rs, such as newsgroups, have not and still provide a context forshar<strong>in</strong>g of <strong>in</strong><strong>format</strong>ion and ideas that promote <strong>the</strong> abuse and exploitation of children.2.6 The relationship between view<strong>in</strong>g and <strong>the</strong> commission of fur<strong>the</strong>rsexual offences aga<strong>in</strong>st childrenThe need <strong>to</strong> understand <strong>the</strong> relationship between view<strong>in</strong>g illegal images and <strong>the</strong> risk offur<strong>the</strong>r offences aga<strong>in</strong>st children is driven not only by law enforcement, but also by childprotection agencies. Does hav<strong>in</strong>g a parent who has been access<strong>in</strong>g abusive images put <strong>the</strong>child or children with<strong>in</strong> <strong>the</strong> immediate household at risk? Should <strong>the</strong> parent or child beasked <strong>to</strong> leave <strong>the</strong> family home? Is <strong>the</strong> risk so low that <strong>to</strong> do so would fur<strong>the</strong>r traumatise andvictimise <strong>the</strong> very children we are seek<strong>in</strong>g <strong>to</strong> protect? Does <strong>the</strong> fact that <strong>the</strong> offender is alsopart of a distribution network <strong>in</strong>crease <strong>the</strong> risk <strong>to</strong> children <strong>in</strong> his immediate surround<strong>in</strong>gs?These are decisions that are made every day <strong>in</strong> relation <strong>to</strong> Internet sex offender cases andas yet <strong>the</strong>y are underp<strong>in</strong>ned by a paucity of empirical research. The follow<strong>in</strong>g is a briefattempt <strong>to</strong> look at some of <strong>the</strong> work <strong>in</strong> this area, keep<strong>in</strong>g at <strong>the</strong> centre of <strong>the</strong> concern abid <strong>to</strong> protect children ra<strong>the</strong>r than simply <strong>to</strong> apprehend <strong>the</strong> offender. Much of what weknow relates <strong>to</strong> police operations, case studies and unpublished anecdotal material. Anydifficulties <strong>in</strong> mak<strong>in</strong>g sense of this are compounded by <strong>the</strong> different k<strong>in</strong>ds of populationsstudied (eg, prison versus community), <strong>the</strong> time frame for <strong>the</strong> data collection (more recentaccounts would suggest a greater availability of illegal images of children, through forexample peer-<strong>to</strong>-peer networks), <strong>the</strong> ways <strong>in</strong> which <strong>the</strong> data are ga<strong>the</strong>red (telephone<strong>in</strong>terviews, self-report questionnaires, re-conviction rates) and <strong>the</strong> lack of longitud<strong>in</strong>aldata. As researchers we are also confounded by <strong>the</strong> fact that new technologies move on,and <strong>the</strong> arena for offend<strong>in</strong>g changes. A good example of this relates <strong>to</strong> <strong>the</strong> emergence of<strong>the</strong> mobile Internet.The risk of <strong>the</strong> commission of a contact offence aga<strong>in</strong>st a child is a question that is currentlypos<strong>in</strong>g immediate concerns for practitioners work<strong>in</strong>g <strong>in</strong> <strong>the</strong> area of risk assessment(Davidson (2007) provides an excellent review of risk assessment of Internet sex offenders).However, <strong>the</strong>re is very little <strong>to</strong> <strong>in</strong>form judgments about which Internet offenders may alsopose a risk <strong>to</strong> children with<strong>in</strong> an offl<strong>in</strong>e environment, and much of <strong>the</strong> research that hasexam<strong>in</strong>ed <strong>the</strong> relationship between view<strong>in</strong>g pornography and offend<strong>in</strong>g behaviour predates<strong>the</strong> Internet. Marshall (2000) had argued that <strong>the</strong>re is not a causal l<strong>in</strong>k between view<strong>in</strong>gpornography and sexually offend<strong>in</strong>g behaviour, but that it can accelerate psychologicalprocesses, enhanc<strong>in</strong>g <strong>the</strong> cognitive dis<strong>to</strong>rtions of offenders. We need also <strong>to</strong> differentiatebetween sexually exploitative behaviour versus sexual abusive behaviours and if possible36|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


develop a risk assessment that will look at possible differences between <strong>the</strong> two.F<strong>in</strong>kelhor and Ormrod (2004) found only a modest association of general pornographycrimes with child victimisation. However, Wolak, F<strong>in</strong>kelhor and Mitchell’s (2005) studyof child pornography possessors arrested <strong>in</strong> Internet related crimes <strong>in</strong>dicated that 40% of<strong>the</strong>ir sample were ‘dual offenders’ who sexually victimised children and possessed childpornography. Galbreath, Berl<strong>in</strong> and Sawyer’s (2002) data from 39 Internet offenders<strong>in</strong>dicated that 24% had attempted <strong>to</strong> meet a m<strong>in</strong>or for sex. In contrast, Baartz (2008)exam<strong>in</strong>ed <strong>the</strong> his<strong>to</strong>ries of Australian offenders approached by <strong>the</strong> Australian Federal Police(AFP) between 1 March 2005 and 31 December 2006 (50 <strong>in</strong> <strong>to</strong>tal). There was no evidencewith<strong>in</strong> this data set of <strong>the</strong> production of abusive images, but 14% were apprehended foronl<strong>in</strong>e groom<strong>in</strong>g; 80% of this sample had never been convicted of any type of crim<strong>in</strong>aloffence. A second method, us<strong>in</strong>g self-disclosed data, was demonstrated by Hernandez(2000), with a US sample of 62 offenders who were <strong>in</strong> prison for Internet-related sexualoffences. He found that prior <strong>to</strong> treatment, 42% were known <strong>to</strong> be contact offenders with a<strong>to</strong>tal of 55 victims. However, follow<strong>in</strong>g treatment, 76% reported previous contact offencesaga<strong>in</strong>st an additional 1,379 victims. In a subsequent analysis, Hernandez exam<strong>in</strong>ed onlythose offenders whose behaviour related <strong>to</strong> abuse images. Of <strong>the</strong>se 55 offenders, 80%reported previous contact offences. Hernandez (2006) went on <strong>to</strong> exam<strong>in</strong>e <strong>the</strong> data froma second group of 155 adult males convicted of offences relat<strong>in</strong>g <strong>to</strong> abusive images ofchildren, 24% of whom had known previous contact offences. After treatment, 85% of <strong>the</strong>offenders disclosed hav<strong>in</strong>g committed contact offences aga<strong>in</strong>st 1,702 victims. These studieshave not been published <strong>in</strong> peer-reviewed journals and although accepted for publicationby <strong>the</strong> Journal of Family Violence, permission was not given by <strong>the</strong> US Prison Service <strong>to</strong>release <strong>the</strong> data. While criticisms have been made about <strong>the</strong> methods of data collection, itis of concern that – at least <strong>in</strong> prison populations – <strong>the</strong>re may be an underestimate of <strong>the</strong>number of contact offences committed by those who <strong>download</strong> abusive images.As can be seen <strong>in</strong> relation <strong>to</strong> <strong>the</strong> research by Hernandez (2006), one of <strong>the</strong> difficulties <strong>in</strong>mak<strong>in</strong>g comparisons between studies relates <strong>to</strong> <strong>the</strong> populations <strong>the</strong>mselves. This is aptlyillustrated <strong>in</strong> a study by O’Brien and Webster (2007) that described <strong>the</strong> construction, andprelim<strong>in</strong>ary validation, of a measure of <strong>the</strong> attitudes and behaviours of convicted menwhose offences related <strong>to</strong> Internet child pornography (Internet Behaviours and AttitudesQuestionnaire – IBAQ). The pilot stage of <strong>the</strong> study <strong>in</strong>volved 40 men who were <strong>in</strong> prison,whereas Phase 2, <strong>the</strong> validation of an improved version of <strong>the</strong> scale, <strong>in</strong>cluded men who were<strong>in</strong> prison and those whose offence had warranted a community sentence. The data analysis<strong>in</strong>dicated clear demographic differences between <strong>the</strong> two samples. The men <strong>in</strong>cluded <strong>in</strong>Phase 1 were likely <strong>to</strong> be older, and more likely <strong>to</strong> have been arrested as part of a ‘r<strong>in</strong>g’,and were described as possibly a more ‘deviant group’ than those <strong>in</strong> Phase 2. It may be that<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |37


as <strong>the</strong> Internet has become more available <strong>to</strong> a larger group of people, and <strong>the</strong> ability <strong>to</strong>access child pornography has become easier, so we are more likely <strong>to</strong> see <strong>the</strong> convictionsof people who appear similar <strong>to</strong> <strong>the</strong> general population. A recent study by Middle<strong>to</strong>n (<strong>in</strong>press) of 72 Internet sex offenders found that, “It should also be noted that almost half of<strong>the</strong> coded sample could not be assigned <strong>to</strong> any of <strong>the</strong> five aetiological pathways outl<strong>in</strong>edby Ward and Siegert (2002). These <strong>in</strong>dividuals recorded no problems with <strong>in</strong>timacy ordeal<strong>in</strong>g with negative emotions, no dis<strong>to</strong>rtions <strong>in</strong> <strong>the</strong>ir sexual scripts, and no anti-socialcognitions, regard<strong>in</strong>g <strong>the</strong> appropriateness of sexual contact with children, and yet havebeen prosecuted for us<strong>in</strong>g <strong>the</strong> Internet <strong>to</strong> access abusive images of children. This appears <strong>to</strong>suggest that <strong>the</strong>re is a population of Internet offenders who do not share <strong>the</strong> psychologicalvulnerabilities typically displayed by sex offenders”. Middle<strong>to</strong>n (<strong>in</strong> press) concludes thatmore research is needed, “<strong>to</strong> develop offence specific assessment <strong>to</strong>ols and <strong>in</strong> analys<strong>in</strong>g<strong>the</strong> particular fac<strong>to</strong>rs that can lead an <strong>in</strong>dividual from seek<strong>in</strong>g <strong>to</strong> view <strong>in</strong>decent images ofchildren <strong>to</strong> mov<strong>in</strong>g <strong>in</strong><strong>to</strong> <strong>the</strong> commission of contact offences”.Se<strong>to</strong> et al. (2006) suggested that child pornography offend<strong>in</strong>g is a stronger diagnostic<strong>in</strong>dica<strong>to</strong>r of paedophilia than is sexual offend<strong>in</strong>g aga<strong>in</strong>st child victims. However, such aconclusion poses problems for us <strong>in</strong> how we make sense of <strong>the</strong> many thousands of peoplewho seem <strong>to</strong> be access<strong>in</strong>g abusive images of children every day. Those engaged <strong>in</strong> sexualexploitation through <strong>the</strong> production, distribution and possession of abuse images may notbe driven solely by <strong>the</strong>ir paedophilic <strong>in</strong>terest but by o<strong>the</strong>r motives: or do we conclude fromthis that our understand<strong>in</strong>g of <strong>the</strong> numbers of people who may be classified as paedophilesis a gross underestimate of <strong>the</strong> prevalence with<strong>in</strong> <strong>the</strong> general population? Ano<strong>the</strong>r possible,or at least partial, explanation for <strong>the</strong> results of this important study may lie <strong>in</strong> <strong>the</strong> natureof <strong>the</strong> stimuli <strong>the</strong>mselves, and that for men who have spent long periods <strong>download</strong><strong>in</strong>g andaccess<strong>in</strong>g child pornographic images and masturbat<strong>in</strong>g <strong>to</strong> ejaculation <strong>to</strong> <strong>the</strong>m, <strong>the</strong> visualstimuli <strong>the</strong>mselves are highly salient, and perhaps more so than for men who use privatefantasies or actual children as <strong>the</strong> focus of <strong>the</strong>ir arousal (Quayle, 2008). A more detaileddiscussion of <strong>the</strong> role of fantasy <strong>in</strong> both contact and Internet offenders can be found <strong>in</strong>Sheldon and Howitt (2008).The section concludes by exam<strong>in</strong><strong>in</strong>g <strong>the</strong>, at times, conflict<strong>in</strong>g research about <strong>the</strong>relationship between view<strong>in</strong>g abusive images and <strong>the</strong> commission of fur<strong>the</strong>r offencesaga<strong>in</strong>st children <strong>in</strong> both <strong>the</strong> onl<strong>in</strong>e and offl<strong>in</strong>e environments. There is a clear need forfur<strong>the</strong>r research <strong>to</strong> explore <strong>the</strong> <strong>in</strong>herent aspects of <strong>the</strong> new technologies that appear <strong>to</strong><strong>in</strong>crease <strong>the</strong> likelihood of sexually exploitative and sexually abusive practices <strong>to</strong>wardschildren <strong>in</strong> relation <strong>to</strong> <strong>the</strong> new technologies.38|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


3. <strong>Child</strong> victims of abuse via <strong>the</strong> new technologies3.1 Identification of <strong>the</strong> child victim <strong>in</strong> abusive imagesThe lack of knowledge about children be<strong>in</strong>g abused through pho<strong>to</strong>graphy is reflected <strong>in</strong><strong>the</strong> relatively small numbers who are ever identified. Where identification does take place,<strong>the</strong>re is little consistent empirical data, although <strong>the</strong> US’s National Center for Miss<strong>in</strong>gand Exploited <strong>Child</strong>ren (NCMEC) suggested that as of September 2008, 1660 childrenhad been identified through distributed and non-distributed images (73% female and27% male). Table 4 is <strong>the</strong> most complete data set of identified children available, but isbased only on what has been reported <strong>to</strong> NCMEC by law enforcement (Lee, 2008). Thenumbers for GENDER represent actual <strong>in</strong>dividual children, whereas <strong>the</strong> numbers forAGE CATEGORY represents <strong>the</strong> percentage of identified series. There can be more thanone child with<strong>in</strong> a series so, for example, a series that has four prepubescent boys willbe counted once, as <strong>the</strong> percentage represents <strong>the</strong> series, not children. The statistics forETHNICITY also represent series and <strong>in</strong>clude all <strong>the</strong> identified series <strong>in</strong> <strong>the</strong> NCMECsystem, as well as some o<strong>the</strong>r known child sexual abuse series that are currently be<strong>in</strong>g<strong>in</strong>vestigated.Table 4: Identified children reported <strong>to</strong> NCMEC by law enforcement agencies (Lee,2008)GENDER OF IDENTIFIED VICTIMSMale 450Female 1210AGE CATEGORY OF IDENTIFIED SERIESInfant/Toddler 6%Prepubescent 49%Pubescent 45%<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |39


ETHNICITY OF KNOWN SERIES (INCL. ALL IDENTIFIED ANDOF-INTEREST UNIDENTIFIED SERIES)Asian 16Biracial 0Black 23Hispanic 19O<strong>the</strong>r 5Unknown 0White 1186RELATIONSHIP OF OFFENDER TO IDENTIFIED CHILDParent 27.0%O<strong>the</strong>r Relative 9.9%Family Friend 23.0%Babysitter/Coach/Men<strong>to</strong>r 4.4%Guardian’s Significant O<strong>the</strong>r 3.5%Stranger 3.7%Onl<strong>in</strong>e 12.7%Self-produced 8.0%Prostitution 1.8%(Relationship Unknown or Not Reported <strong>to</strong> NCMEC) 6.0%It is unclear whe<strong>the</strong>r <strong>the</strong> differences between <strong>the</strong> number of female and male childrenidentified reflects <strong>the</strong> actual distribution of images currently circulat<strong>in</strong>g on <strong>the</strong> Internet.The reality is that we have little data that helps us make sense of this. Schuijer and Rossen(1992) analysed <strong>the</strong> content of ‘child pornography magaz<strong>in</strong>es and videos’ that had been<strong>in</strong> circulation prior <strong>to</strong> <strong>the</strong> change of law across a number of European countries. Theyacknowledged <strong>the</strong> methodological difficulties <strong>in</strong> do<strong>in</strong>g this, with <strong>the</strong> likelihood that somechildren may have been counted more than once simply due <strong>to</strong> difficulty <strong>in</strong> recognition orage change. They suggested that, “On <strong>the</strong> basis of <strong>the</strong> estimate of 1,065 published magaz<strong>in</strong>es,this implies almost 12,000 children have been associated with child pornography <strong>in</strong> someway or o<strong>the</strong>r. The films have not been counted, however, <strong>the</strong> number of children appear<strong>in</strong>g<strong>in</strong> <strong>the</strong> films is much smaller than <strong>in</strong> <strong>the</strong> magaz<strong>in</strong>es, usually no more than two per film, andfur<strong>the</strong>rmore <strong>the</strong> film ac<strong>to</strong>rs are often depicted <strong>in</strong> <strong>the</strong> magaz<strong>in</strong>es”. However, <strong>the</strong>y argued40|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


that a more conservative estimate would be 6,000 children, as <strong>the</strong> <strong>in</strong>itial count <strong>in</strong>cludedimages of children who were fully clo<strong>the</strong>d. The division of pho<strong>to</strong>graphs <strong>in</strong> <strong>the</strong> samplesuggested that 42% were pictures of boys, with more girls appear<strong>in</strong>g <strong>in</strong> extreme forms ofimages. Does this raise <strong>the</strong> possibility that <strong>in</strong> terms of <strong>in</strong>vestment by law enforcement, girls(and particularly younger children) are more likely <strong>to</strong> result <strong>in</strong> a successful identificationthan are boys? It may also be <strong>the</strong> case that <strong>the</strong>re are many more girls be<strong>in</strong>g abused throughpho<strong>to</strong>graphy than boys, but we have no evidence <strong>to</strong> support this.This raises important questions about possible gender issues <strong>in</strong> relation <strong>to</strong> identification.Outside <strong>the</strong> context of child abuse per se, Dennis (2008) completed an analysis of 166 recentarticles <strong>in</strong> social science journals that related <strong>to</strong> youth exploited through prostitution. Themajority of <strong>the</strong>se failed <strong>to</strong> acknowledge <strong>the</strong> existence of male sex workers at all. When<strong>the</strong>y were discussed <strong>the</strong>y were assigned more agency than female sex workers, and <strong>the</strong>chief danger ascribed <strong>to</strong> <strong>the</strong>m was HIV ra<strong>the</strong>r than violence, and <strong>the</strong> question of sexualorientation was always addressed. Dennis (2008) challenges <strong>the</strong> visibility of <strong>the</strong>se boys andmen say<strong>in</strong>g, <strong>in</strong> relation <strong>to</strong> <strong>the</strong> Internet, “Male sex workers… wait <strong>in</strong> Internet chat rooms formen whose profile conta<strong>in</strong>s <strong>the</strong> key word “generous”. They post advertisements as escorts,masseur or models, or openly as sex workers; one Internet direc<strong>to</strong>ry lists over 5000 <strong>in</strong><strong>the</strong> USA, searchable by physical attributes, services provided, and price” (p. 11). The datafrom Baartz (2008) describ<strong>in</strong>g <strong>the</strong> gender, ethnicity and age of <strong>the</strong> victims portrayed <strong>in</strong><strong>the</strong> images exam<strong>in</strong>ed by <strong>in</strong>vestiga<strong>to</strong>rs would also suggest that <strong>the</strong>y were mostly white,westernised females, aged between 8 and 12 years. Asian children were <strong>the</strong> next mostcommon ethnic group, and <strong>the</strong>re was a comparative absence of <strong>in</strong>digenous Australianchildren. In <strong>in</strong>stances where offenders were <strong>in</strong> possession of child exploitation materialdepict<strong>in</strong>g multiple victims, <strong>the</strong>se are recorded as <strong>in</strong>dividual occurrences. However, thiswould still suggest that over 40% of <strong>the</strong> victims were male children. Figures 2 and 3 givefur<strong>the</strong>r details.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |41


Outside of <strong>the</strong> data supplied by NCMEC and Interpol, however, at present we have <strong>to</strong>rely largely on anecdotal accounts from people work<strong>in</strong>g with current law enforcement databases, and this would suggest that <strong>the</strong> majority of new images are of white, westernised andAsian children, but <strong>the</strong>re has been no systematic analysis and collation of data. While s<strong>in</strong>ce2001 we have seen dramatic changes <strong>in</strong> access <strong>to</strong> <strong>the</strong> new technologies across <strong>the</strong> world,we have no empirical basel<strong>in</strong>e data <strong>to</strong> know if <strong>the</strong>re will be a correspond<strong>in</strong>g <strong>in</strong>crease <strong>in</strong>child pornography production and distribution. The paucity of demographic data, <strong>the</strong> lackof conceptual understand<strong>in</strong>g of <strong>the</strong> harms <strong>in</strong>flicted through pho<strong>to</strong>graphy and <strong>the</strong> fac<strong>to</strong>rsthat promote both vulnerability and resilience are issues that urgently need address<strong>in</strong>gthrough regional as well as <strong>in</strong>ternational co-operation. A recent agreement with CEOP(<strong>Child</strong> Exploitation and Onl<strong>in</strong>e Protection, UK) has <strong>in</strong>itiated research <strong>in</strong><strong>to</strong> recent seizuresof images, <strong>to</strong> help with our understand<strong>in</strong>g of <strong>the</strong> demographics of <strong>the</strong> children with<strong>in</strong><strong>the</strong> images and <strong>to</strong> provide a basel<strong>in</strong>e aga<strong>in</strong>st which change might be measured. This is apromis<strong>in</strong>g first step <strong>in</strong> a sadly neglected area.Identification of <strong>the</strong> victimised child <strong>in</strong> <strong>the</strong> image is a <strong>to</strong>p priority by police forces andby child advocacy groups alike, s<strong>in</strong>ce such identification will s<strong>to</strong>p ongo<strong>in</strong>g abuse andexploitation and will also decrease <strong>the</strong> likelihood that <strong>the</strong> abuser may abuse and exploi<strong>to</strong><strong>the</strong>r children <strong>in</strong> his vic<strong>in</strong>ity. Identification will also allow for <strong>the</strong> exploited child <strong>to</strong> receiveassistance. The fact is, however, that we do not know if identification of <strong>the</strong> child leads <strong>to</strong>assistance and rehabilitation. Access <strong>to</strong> such, sensitive <strong>to</strong> <strong>the</strong> cultural context of <strong>the</strong> child,seems sadly patchy.This section explores our lack of knowledge about children who are victimised, and drawsattention <strong>to</strong> how few children are identified <strong>in</strong> <strong>the</strong> images circulat<strong>in</strong>g on <strong>the</strong> Internet.While <strong>the</strong>re have been considerable changes <strong>in</strong> this area s<strong>in</strong>ce <strong>the</strong> Second World Congress,42|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


States need <strong>to</strong> demonstrate <strong>in</strong>vestment <strong>in</strong> prioritis<strong>in</strong>g children by allocat<strong>in</strong>g <strong>in</strong>creasedchild protection and law enforcement resources <strong>to</strong> <strong>the</strong> identification of such children andenable greater co-operation at national and <strong>in</strong>ternational levels.3.2 The impact of Internet-related sexual abuseHarms posed by <strong>the</strong> new technologies are both complex and diverse. They may <strong>in</strong>volveonly one activity or be multi-faceted. A study by Palmer (2004) carried out by Barnardos<strong>in</strong> 2003 attempted <strong>to</strong> identify <strong>the</strong> different ways <strong>in</strong> which children may be abused via <strong>the</strong>new technology. All Barnardos’ services <strong>in</strong> <strong>the</strong> UK (approximately 350 <strong>in</strong> number) werecontacted with a view <strong>to</strong> establish<strong>in</strong>g <strong>the</strong> extent that <strong>the</strong> abuse of children via <strong>the</strong> Internetand mobile phones was impact<strong>in</strong>g on <strong>the</strong> work of <strong>the</strong> organisationThe result of this survey was a report entitled Just One Click! (Palmer, 2004). The repor<strong>to</strong>utl<strong>in</strong>ed <strong>the</strong> differential ways <strong>in</strong> which <strong>the</strong> new technology may be used <strong>to</strong> abuse children,giv<strong>in</strong>g case examples and discuss<strong>in</strong>g <strong>the</strong> implications for practice. With<strong>in</strong> this study 10areas of concern were identified and, at <strong>the</strong> time <strong>the</strong> report was written (November, 2003)Barnardos was able <strong>to</strong> confirm that staff <strong>in</strong> <strong>the</strong> organisation had worked with 83 cases <strong>in</strong><strong>the</strong> UK. The areas of concern identified are listed below:• <strong>Child</strong>ren view<strong>in</strong>g adult pornography• <strong>Child</strong>ren sold onl<strong>in</strong>e for sexual abuse offl<strong>in</strong>e• <strong>Child</strong>ren abused through prostitution• Adults/young people engag<strong>in</strong>g <strong>in</strong> cybersex with children• Young people plac<strong>in</strong>g images of children onl<strong>in</strong>e• <strong>Child</strong>ren of adults who <strong>download</strong>/distribute abuse images of children• Young people who <strong>download</strong> abuse images of children• <strong>Child</strong>ren groomed onl<strong>in</strong>e for sexual abuse offl<strong>in</strong>e• <strong>Child</strong>ren sold onl<strong>in</strong>e for sexual abuse onl<strong>in</strong>e• <strong>Child</strong>ren made <strong>the</strong> subjects of child abuse images<strong>Child</strong>ren made <strong>the</strong> subjects of abuse images (28 cases) was <strong>the</strong> largest category andaccounted for 33% of <strong>the</strong> <strong>to</strong>tal sample. However, it is important <strong>to</strong> be m<strong>in</strong>dful of <strong>the</strong> factthat abusive activity may take more than one form and that <strong>the</strong> scenario fac<strong>in</strong>g childrenmay frequently be more complex than be<strong>in</strong>g victim <strong>to</strong> only one type of abuse. In addition,those abus<strong>in</strong>g children via <strong>the</strong> new technologies often made use of dual media (for examplechatrooms and mobile phones) simultaneously <strong>to</strong> control <strong>the</strong>ir victims. One difficulty <strong>in</strong>relation <strong>to</strong> fur<strong>the</strong>r elaborat<strong>in</strong>g on <strong>the</strong>se additional harms is <strong>the</strong> paucity of research <strong>in</strong> thisarea. The report by ECPAT (2005), Violence Aga<strong>in</strong>st <strong>Child</strong>ren <strong>in</strong> Cyberspace, highlighted<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |43


oth <strong>the</strong> diversity of <strong>the</strong> children <strong>in</strong>volved <strong>in</strong> onl<strong>in</strong>e abusive practices and <strong>the</strong> fact thatharm may be <strong>in</strong>flicted even when <strong>the</strong> children <strong>the</strong>mselves have limited, or no, access <strong>to</strong><strong>the</strong> new technologies. These will be considered fur<strong>the</strong>r when we exam<strong>in</strong>e <strong>the</strong> importanceof cultural and geographical differences <strong>in</strong> conceptualis<strong>in</strong>g harm. In <strong>the</strong> follow<strong>in</strong>g sectiontwo of <strong>the</strong> areas of concern listed <strong>in</strong> <strong>the</strong> Barnardos’ study – children groomed onl<strong>in</strong>e forsexual abuse offl<strong>in</strong>e and children made <strong>the</strong> subjects of abusive images – are discussed <strong>in</strong>more detail. The rema<strong>in</strong>der are addressed <strong>in</strong> o<strong>the</strong>r sections of <strong>the</strong> paper.Our understand<strong>in</strong>g of <strong>the</strong> impacts of child sexual abuse on children’s emotional andpsychological well-be<strong>in</strong>g has grown rapidly over <strong>the</strong> past 20 years (Sgroi, 1982; F<strong>in</strong>kelhor,1986; Ben<strong>to</strong>vim et al., 1988; Jehu, 1988; Briere, 1989). Correspond<strong>in</strong>g knowledge onhow children are affected by sexual exploitation is on <strong>the</strong> o<strong>the</strong>r hand very sparse. Theeffects of sexual abuse are many and far rang<strong>in</strong>g. <strong>Child</strong>ren may feel grief, guilt and fear.They may display an <strong>in</strong>ability <strong>to</strong> trust, cognitive confusion, lack of mastery and control,repressed anger and hostility, blurred boundaries and role confusion, pseudo-maturity andfailure <strong>to</strong> complete developmental tasks, depression and poor social skills (Palmer, 2001).F<strong>in</strong>kelhor and Berl<strong>in</strong>er (1995) provided a conceptual framework for an understand<strong>in</strong>gof <strong>the</strong> impact of sexual abuse on children. They described four trauma-caus<strong>in</strong>g fac<strong>to</strong>rs:traumatic sexualisation, betrayal, powerlessness and stigmatisation. These authors suggestedthat, although <strong>the</strong>se fac<strong>to</strong>rs were present <strong>in</strong> o<strong>the</strong>r experiences which could be describedas traumatic, <strong>the</strong> way <strong>the</strong>y <strong>in</strong>tersected with<strong>in</strong> a given set of circumstances was what made<strong>the</strong> trauma of sexual abuse unique. Kelly (1992) used this framework and expanded it<strong>to</strong> <strong>in</strong>clude notions of ‘shame’ and ‘enforced silence’ that had been derived from previousresearch. We know that <strong>the</strong> degree of <strong>in</strong>ternalisation of sexually abusive experiencesis unique <strong>to</strong> each child and dependent on fac<strong>to</strong>rs such as: <strong>the</strong> nature of <strong>the</strong> abuse; <strong>the</strong>circumstances <strong>in</strong> which it occurred; <strong>the</strong> modus operandi of <strong>the</strong> abuser; <strong>the</strong> nature of <strong>the</strong>child’s previous life experiences; <strong>the</strong> degree of support with<strong>in</strong> <strong>the</strong> home environment; and<strong>the</strong> child’s natural ‘<strong>in</strong>-built’ resilience. In many parts of <strong>the</strong> world, child welfare/ protectionagencies and crim<strong>in</strong>al justice agencies have jo<strong>in</strong>tly drawn up procedures for <strong>in</strong>vestigat<strong>in</strong>gcases of child sexual abuse with <strong>the</strong> aim of safeguard<strong>in</strong>g <strong>the</strong> children concerned and hold<strong>in</strong>g<strong>the</strong> perpetra<strong>to</strong>r responsible. There are assessment and <strong>in</strong>tervention programmes <strong>in</strong> place<strong>to</strong> assist children <strong>in</strong> <strong>the</strong>ir recovery and help <strong>the</strong>m make sense of what has happened <strong>to</strong><strong>the</strong>m. However <strong>the</strong>re is still an urgent need, as expressed by several authors, <strong>to</strong> expand <strong>the</strong>knowledge base when assist<strong>in</strong>g child victims of sexual abuse and sexual exploitation via<strong>the</strong> new technology. With <strong>the</strong> <strong>in</strong>troduction of technology, we are faced with both a novelconduit for those <strong>in</strong>tent on harm<strong>in</strong>g children and <strong>the</strong> potential of <strong>the</strong>re be<strong>in</strong>g compleximpacts on children abused and exploited via this medium, which call for development ofnew methods of assistance (Palmer, 2005; Nyman, 2006; Söderström, 2006; von Weiller2008). Such impacts challenge us <strong>to</strong> review our current practice both with regard <strong>to</strong> how44|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


we <strong>in</strong>vestigate such cases and how we accommodate <strong>the</strong> recovery needs of <strong>the</strong> child victims.In particular, <strong>the</strong> research <strong>in</strong> Germany by von Weiller has highlighted some of <strong>the</strong> gaps <strong>in</strong>our ability <strong>to</strong> respond <strong>the</strong>rapeutically <strong>to</strong> <strong>the</strong>se children. These <strong>in</strong>clude:• Lack of experienced professionals• Lack of specific knowledge and expertise on <strong>the</strong> psychological impact on <strong>the</strong>victim• Limited access <strong>to</strong> services throughout <strong>the</strong> world• A need for shar<strong>in</strong>g of good practice among professionals both regionally and<strong>in</strong>ternationally• An ability <strong>to</strong> build on exist<strong>in</strong>g structures, while acknowledg<strong>in</strong>g cultural diversity, <strong>to</strong>enable both recognition of , and response <strong>to</strong>, <strong>the</strong> needs of <strong>the</strong>se children.Here we acknowledge <strong>the</strong> paucity of research on <strong>the</strong> impact of both Internet-related sexualabuse and what should be seen as Internet-related sexual exploitation. It is clear that <strong>in</strong><strong>the</strong> majority of countries practitioners do not explore such abuse nor do <strong>the</strong>y feel that <strong>the</strong>yhave <strong>the</strong> capacity or expertise <strong>to</strong> address <strong>the</strong> sexual exploitation children suffer.3.2.1 <strong>Child</strong>ren made <strong>the</strong> subjects of abuse imagesIn <strong>the</strong> context of abuse images, <strong>the</strong>re are four substantial studies (all but one of whichpredate <strong>the</strong> Internet), which have sought <strong>to</strong> exam<strong>in</strong>e <strong>the</strong> impact of ‘child pornography’.• Burgess and Hartman (1987) exam<strong>in</strong>ed children’s <strong>in</strong>volvement <strong>in</strong> pornography andsex r<strong>in</strong>gs;• Silbert (1989) exam<strong>in</strong>ed child pornography production <strong>in</strong> <strong>the</strong> context of childprostitution;• Sved<strong>in</strong> and Back’s (1996) sample was drawn from a group of children exposed <strong>to</strong>both <strong>the</strong> production of pornography and <strong>in</strong>tra and extra-familial abuse (an enlargedsample was published <strong>in</strong> 2003 and will be considered separately)• Scott’s (2001) study was <strong>in</strong> <strong>the</strong> context of ritual abuse.All four of <strong>the</strong>se studies are broadly similar <strong>in</strong> <strong>the</strong> accounts that <strong>the</strong>y give of <strong>the</strong> symp<strong>to</strong>msthat <strong>the</strong> children produced dur<strong>in</strong>g <strong>the</strong> abuse. Aga<strong>in</strong> it is difficult <strong>to</strong> disentangle <strong>the</strong>consequences of <strong>the</strong> abuse per se (physical symp<strong>to</strong>ms, such as ur<strong>in</strong>ary <strong>in</strong>fections andgenital soreness, as well as behavioural symp<strong>to</strong>ms such as sexualised behaviours) from <strong>the</strong>consequences of be<strong>in</strong>g pho<strong>to</strong>graphed, ie, <strong>the</strong> symp<strong>to</strong>ms of <strong>the</strong> sexual exploitation. HoweverSved<strong>in</strong> and Back (1996) gave details amongst <strong>the</strong>ir sample of restlessness, depression,hunger, exhaustion, concentration difficulties and aggressive behaviours. Silbert’s (1989)study also suggested that children who were exposed <strong>to</strong> longer periods of abuse suffered<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |45


more <strong>in</strong>tense emotional reactions, such as feel<strong>in</strong>gs of isolation, fear, anxiety and emotionalwithdrawal. The studies quoted do not specifically deal with <strong>the</strong> specific impacts thatimages have on sexually abused children. Nor do we have more than anecdotal accounts ofhow children perceive <strong>the</strong> fact that images of <strong>the</strong>ir abuse are distributed. The studies focuson sexual abuse and pho<strong>to</strong>graphy. In fact, only a few attempts are made <strong>to</strong> discern <strong>the</strong>impact on <strong>the</strong> child of <strong>the</strong> sexual exploitation aspect, and <strong>to</strong> describe and <strong>to</strong> study how <strong>the</strong>new technology becomes a part of <strong>the</strong> abuse experience. Even when this impact is lookedat however, it is mostly done so with<strong>in</strong> <strong>the</strong> context of <strong>the</strong> effects of <strong>the</strong> sexual abuse assuch and seen as an aggravat<strong>in</strong>g circumstance that deepens some of <strong>the</strong> symp<strong>to</strong>ms of <strong>the</strong>sexually abusive experience. Sved<strong>in</strong> and Back (2003) <strong>in</strong> <strong>the</strong>ir more recent work, attempt <strong>to</strong>describe <strong>the</strong> process through which <strong>the</strong> child’s abuse experience is aggravated by <strong>the</strong> newtechnology.There are some key differential impacts on children made <strong>the</strong> subjects of abusive images thathave implications for how we <strong>in</strong>vestigate such cases and how we address <strong>the</strong> <strong>the</strong>rapeuticneeds of <strong>the</strong> child victims. The disclosure process has different facets <strong>to</strong> it which Söderström(2006) described <strong>in</strong> his work with children that have had images of <strong>the</strong>ir abuse distributedvia <strong>the</strong> new technologies. He stated that <strong>the</strong> child’s cognitive perception of <strong>the</strong> abuse ismade more difficult s<strong>in</strong>ce <strong>the</strong> child constantly needs <strong>to</strong> defend him/herself from fac<strong>in</strong>g<strong>the</strong> fact that images were taken. He suggested that <strong>the</strong> picture tak<strong>in</strong>g <strong>in</strong> itself is an issuealmost separate from <strong>the</strong> abuse experience. The fact that <strong>the</strong>re are images of <strong>the</strong> abuse takesaway <strong>the</strong> important aspect of <strong>the</strong> child’s gradual disclosure <strong>in</strong> <strong>the</strong> heal<strong>in</strong>g process. To tell<strong>the</strong> abuse s<strong>to</strong>ry little by little, timed with <strong>the</strong> child’s possible cognitive understand<strong>in</strong>g of<strong>the</strong> circumstances around <strong>the</strong> abuse, becomes impossible if <strong>the</strong>re are pictures that depict<strong>the</strong> entire abuse and, so <strong>to</strong> speak, tell <strong>the</strong> whole s<strong>to</strong>ry <strong>in</strong> one glance. The fact that <strong>the</strong> childprotection specialist may not have seen <strong>the</strong> image at all will not be important <strong>in</strong> this, s<strong>in</strong>ce<strong>the</strong> child will be aware of <strong>the</strong> existence of <strong>the</strong> pictures.Söderström (2006) also describes <strong>the</strong> different ways <strong>in</strong> which images of <strong>the</strong> abuse maybecome part of <strong>the</strong> disclosure process at different times and thus have diverse impacts on<strong>the</strong> child:46|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Table 5: Disclosure of abuse through image production (Söderström, 2006)When <strong>the</strong> child discloses abuse and pictures are taken of <strong>the</strong> abuseIn <strong>the</strong>se cases <strong>the</strong> disclosure was made by a conscious act of tell<strong>in</strong>g. The child’s activedecision <strong>to</strong> disclose makes it easier <strong>to</strong> talk about <strong>the</strong> abuse <strong>in</strong> treatment and <strong>to</strong> addressfeel<strong>in</strong>gs that need <strong>to</strong> be processed as well as confused thoughts and misunderstand<strong>in</strong>gsthat need <strong>to</strong> be clarified.When a child discloses abuse, but reveals <strong>the</strong> existence of pictures only later <strong>in</strong>treatmentThe child experiences a strong sense of relief after hav<strong>in</strong>g disclosed some aspects of <strong>the</strong>abuse. She or he realises that her/his s<strong>to</strong>ry is believed and <strong>the</strong> experience of <strong>the</strong> ongo<strong>in</strong>gtreatment as be<strong>in</strong>g helpful, may help <strong>the</strong> child <strong>to</strong> risk disclos<strong>in</strong>g and address <strong>the</strong> picturetak<strong>in</strong>gas well.When a child is brought <strong>to</strong> treatment after abuse has been exposed by o<strong>the</strong>rsWhen <strong>the</strong> child is not <strong>the</strong> first <strong>to</strong> tell, <strong>the</strong>re may be very strong fac<strong>to</strong>rs that prevent<strong>the</strong> child from talk<strong>in</strong>g about <strong>the</strong> abuse and its consequences; fac<strong>to</strong>rs that also prevents<strong>the</strong> child from benefit<strong>in</strong>g from treatment. There may be feel<strong>in</strong>gs of shame and guil<strong>to</strong>r confused thoughts about responsibility and right and wrong. There may be strongfeel<strong>in</strong>gs of loyalty, fear or o<strong>the</strong>r effects of <strong>the</strong> groom<strong>in</strong>g process that are enhanced by <strong>the</strong>non-<strong>in</strong>tentional exposure of <strong>the</strong> abuse.When a child is brought <strong>to</strong> treatment after pictures of abuse have been exposedSuch fac<strong>to</strong>rs may be even stronger when <strong>the</strong>re is a distance <strong>in</strong> time and place between<strong>the</strong> abuse and <strong>the</strong> exposure. The scope of <strong>the</strong> sexual acts may be immediately obvious<strong>in</strong> <strong>the</strong> pictures, but not <strong>the</strong> groom<strong>in</strong>g and trickery of <strong>the</strong> child. If <strong>the</strong> perpetra<strong>to</strong>r and<strong>the</strong> child are caught <strong>in</strong> <strong>the</strong> act, a normal response from a non-offend<strong>in</strong>g adult oftenmakes it clear <strong>to</strong> <strong>the</strong> child that <strong>the</strong> rescuer blames <strong>the</strong> perpetra<strong>to</strong>r but <strong>the</strong> non-offend<strong>in</strong>gadult’s immediate reactions <strong>to</strong> child abuse images tend <strong>to</strong> be more ambiguous and oftenperceived as blam<strong>in</strong>g <strong>the</strong> child..<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |47


What is apparent <strong>in</strong> relation <strong>to</strong> <strong>the</strong>se studies is a pattern of enforced silence. The children<strong>in</strong> Sved<strong>in</strong> and Back’s (1996) study were reluctant <strong>to</strong> disclose <strong>the</strong> abuse, and <strong>the</strong>se authorssuggested that <strong>the</strong> record<strong>in</strong>g of <strong>the</strong> abuse exacerbated, and <strong>in</strong> some cases prevented,disclosure. Even when confronted with <strong>the</strong> visual evidence of <strong>the</strong>ir abuse, childrencont<strong>in</strong>ued <strong>to</strong> limit disclosure, tell<strong>in</strong>g people only what <strong>the</strong>y thought <strong>the</strong>y already knew.Similarly, <strong>in</strong> 2003 <strong>the</strong> Swedish authorities were faced with an <strong>in</strong>vestigation of a numberof children whose images had been traced elsewhere <strong>in</strong> <strong>the</strong> world and were eventuallyidentified as com<strong>in</strong>g from Sweden. When <strong>in</strong>terview<strong>in</strong>g <strong>the</strong> children <strong>the</strong> same resistance <strong>to</strong>acknowledg<strong>in</strong>g that <strong>the</strong>y were <strong>the</strong> subjects of <strong>the</strong> images was found. A similar phenomenonwas observed <strong>in</strong> England dur<strong>in</strong>g <strong>the</strong> <strong>in</strong>vestigations of Operation Ore. Some children whowere <strong>in</strong>terviewed categorically denied <strong>the</strong>y had been abused and cont<strong>in</strong>ued <strong>to</strong> do so evenwhen <strong>the</strong> <strong>in</strong>terview<strong>in</strong>g police officers expla<strong>in</strong>ed that <strong>the</strong>y knew <strong>the</strong>y had been abusedbecause <strong>the</strong>y had seen <strong>the</strong> record<strong>in</strong>gs of <strong>the</strong>ir abuse. Silbert (1989) had earlier co<strong>in</strong>ed <strong>the</strong>phrase ‘silent conspiracy’ <strong>to</strong> describe this silence. It is unclear as <strong>to</strong> whe<strong>the</strong>r <strong>the</strong> sense ofshame and humiliation, often reported <strong>in</strong> <strong>the</strong>se studies, relates <strong>to</strong> <strong>the</strong> pho<strong>to</strong>graphy itselfor <strong>the</strong> fact of disclos<strong>in</strong>g it <strong>to</strong> o<strong>the</strong>rs. We may well hypo<strong>the</strong>sise that <strong>the</strong> level of silenceis connected <strong>to</strong> <strong>the</strong> sexual exploitation and <strong>the</strong>refore needs <strong>to</strong> be dealt with with<strong>in</strong> <strong>the</strong>context of exploitative experiences and how <strong>the</strong>se are cognitively and emotionally workedthrough by <strong>the</strong> child. It may also be that children fear be<strong>in</strong>g thought <strong>to</strong> be complicit <strong>in</strong><strong>the</strong> abuse or pho<strong>to</strong>graphy through <strong>the</strong> evidence of, for example, <strong>the</strong>ir smil<strong>in</strong>g faces. Scott(2001) re<strong>in</strong>forced this idea <strong>in</strong> <strong>the</strong> description of how abusers had shown children films <strong>the</strong>yhad made of <strong>the</strong>m as a way of demonstrat<strong>in</strong>g <strong>the</strong>ir level of engagement and enjoyment.Similarly, Palmer (2005) reported that when children are <strong>the</strong> subject of abusive images,“<strong>the</strong>re seems <strong>to</strong> be an element of silenc<strong>in</strong>g which is over and above that of <strong>the</strong> perpetra<strong>to</strong>r/victim dynamic when pho<strong>to</strong>graphy is not <strong>in</strong>volved – ano<strong>the</strong>r dimension is <strong>in</strong>troduced <strong>to</strong><strong>the</strong> sexually abusive equation”. She suggested that <strong>the</strong> reasons for this may be a matrixwhich <strong>in</strong>cludes that <strong>the</strong> children feel <strong>the</strong>y are be<strong>in</strong>g seen <strong>to</strong> let it happen: some know <strong>the</strong>ywere made <strong>to</strong> smile and <strong>the</strong>refore appear <strong>to</strong> be ‘enjoy<strong>in</strong>g it’, a fact that clearly <strong>in</strong>dicates <strong>the</strong>specifics of sexual exploitation. <strong>Child</strong> victims of abusive imagery, as well as children thatare abused <strong>in</strong> o<strong>the</strong>r ways, will have been encouraged <strong>to</strong> <strong>in</strong>troduce o<strong>the</strong>r children <strong>to</strong> <strong>the</strong>perpetra<strong>to</strong>r and thus feel responsible for lett<strong>in</strong>g it happen <strong>to</strong> <strong>the</strong>m. Some children mayhave been encouraged <strong>to</strong> be pro-active <strong>in</strong> <strong>the</strong>ir own sexual abuse or that of o<strong>the</strong>r children,and some may have been shown <strong>the</strong>ir own abuse images and threatened that if <strong>the</strong>y do notco-operate <strong>the</strong> perpetra<strong>to</strong>r will show <strong>the</strong> images <strong>to</strong> significant people <strong>in</strong> <strong>the</strong>ir lives. Sheconjectured that “probably <strong>the</strong> greatest <strong>in</strong>hibi<strong>to</strong>rs <strong>to</strong> disclos<strong>in</strong>g what has occurred is <strong>the</strong>humiliation that children feel regard<strong>in</strong>g who may have seen <strong>the</strong>ir images and <strong>the</strong>ir fear ofbe<strong>in</strong>g recognised. They feel <strong>the</strong>y have literally been ‘caught <strong>in</strong> <strong>the</strong> act’”.48|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Silbert (1989) made reference <strong>to</strong> <strong>the</strong> long-term effects of be<strong>in</strong>g pho<strong>to</strong>graphed as be<strong>in</strong>gmore debilitat<strong>in</strong>g than those <strong>in</strong> <strong>the</strong> short or medium term, and that <strong>the</strong>se are compoundedwhen children are <strong>in</strong>volved <strong>in</strong> more than one form of sexual exploitation. This may alsobe exacerbated by <strong>the</strong> knowledge that o<strong>the</strong>rs may see or distribute <strong>the</strong> films. One accountgiven <strong>to</strong> <strong>the</strong> authors of <strong>the</strong> present paper by a victim of abuse images talked of feel<strong>in</strong>gfearful every time <strong>the</strong> mail arrived, overwhelmed with anxiety that <strong>the</strong> pho<strong>to</strong>graphs wouldbe <strong>in</strong> <strong>the</strong> post and that her mo<strong>the</strong>r would see <strong>the</strong>m. Silbert (1989) described such feel<strong>in</strong>gs as‘psychological paralysis’. This is also accompanied by <strong>the</strong> knowledge that such pho<strong>to</strong>graphsmay be used <strong>to</strong> exploit o<strong>the</strong>r children (Sved<strong>in</strong> and Back, 1996).Söderström (2006) argued, from meet<strong>in</strong>g with children pho<strong>to</strong>graphed and exploited, that<strong>the</strong> silence may well be a response <strong>to</strong> <strong>the</strong> child’s feel<strong>in</strong>gs of hav<strong>in</strong>g been violated <strong>in</strong> more waysthan through <strong>the</strong> abuse and <strong>the</strong> production of abusive images. The adults meet<strong>in</strong>g with <strong>the</strong>child will most often consider that <strong>the</strong> images portray<strong>in</strong>g <strong>the</strong> most severe abuse <strong>to</strong> be thosethat <strong>the</strong> child will be most affected by. Söderström argued that <strong>in</strong> a series of images, <strong>the</strong>child may often consider images that seem very normal, portray<strong>in</strong>g <strong>the</strong> child with clo<strong>the</strong>son but taken by <strong>the</strong> abuser, as equally or even more disturb<strong>in</strong>g, s<strong>in</strong>ce <strong>the</strong>se images will formpart of <strong>the</strong> entire abusive process and possibly rem<strong>in</strong>d <strong>the</strong> child of how <strong>the</strong> perpetra<strong>to</strong>rhas violated and built trust and rapport with <strong>the</strong> child. The professional and <strong>the</strong> childwill <strong>the</strong>n not be able <strong>to</strong> discuss this <strong>in</strong> a way that may lend itself <strong>to</strong> true communicationaround images that disturb <strong>the</strong> child. The lack of <strong>the</strong> professional’s understand<strong>in</strong>g will thus<strong>in</strong>crease <strong>the</strong> child’s <strong>in</strong>ability <strong>to</strong> disclose.After a famous case <strong>in</strong> Sweden (<strong>the</strong> Hudd<strong>in</strong>ge r<strong>in</strong>g) was uncovered, Sved<strong>in</strong> and Back(2003), from <strong>the</strong> youth-psychiatric cl<strong>in</strong>ic at <strong>the</strong> University Hospital <strong>in</strong> L<strong>in</strong>köp<strong>in</strong>g, reachedan agreement whereby <strong>the</strong> police would <strong>in</strong>form <strong>the</strong> cl<strong>in</strong>ic when <strong>the</strong>y were able <strong>to</strong> identifyany child via <strong>the</strong> seizure of images. This gave unique possibilities for <strong>in</strong>vestigat<strong>in</strong>g howchildren are recruited and what children remember of <strong>the</strong>ir participation <strong>in</strong> relation <strong>to</strong> <strong>the</strong>actual course of events depicted <strong>in</strong> pictures/videos as well as shed light upon <strong>the</strong> psychiatrichealth of children. The 2003 report <strong>in</strong>cluded 30 children (Sved<strong>in</strong> and Back, 2003). Oneaspiration of <strong>the</strong> project was <strong>to</strong> attempt <strong>to</strong> understand what it is that makes children notdisclose <strong>the</strong> sexual abuse <strong>the</strong>y had gone through. The study highlighted <strong>the</strong> shame of <strong>the</strong>children, and that this shame also contributed <strong>to</strong> <strong>the</strong> cont<strong>in</strong>uation of <strong>the</strong> relationship with<strong>the</strong> perpetra<strong>to</strong>r. They actively sought contact with an adult person, and had an emotionallysignificant relationship that <strong>the</strong>y had <strong>in</strong>vested <strong>in</strong>. It was not so simple <strong>to</strong> break this and,<strong>in</strong>stead, <strong>to</strong> see <strong>the</strong>mselves as abused and betrayed by that adult. Of <strong>the</strong> <strong>in</strong>terviewed children,“only two of <strong>the</strong>m began <strong>to</strong> talk spontaneously, and <strong>the</strong>re were five o<strong>the</strong>rs who eventuallygave a fairly complete account without be<strong>in</strong>g shown <strong>the</strong> pictures or <strong>the</strong> <strong>in</strong>vestiga<strong>to</strong>r say<strong>in</strong>gthat he/she knew what had happened (from <strong>the</strong> seized material). Five children denied<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |49


that anyth<strong>in</strong>g had occurred. All <strong>the</strong> children’s accounts were fragmentary, and <strong>the</strong> childrenshowed great difficulty <strong>in</strong> talk<strong>in</strong>g about <strong>the</strong>ir contact with <strong>the</strong> suspected perpetra<strong>to</strong>r. Theyoften said that <strong>the</strong>y did not remember what had happened; we do not know whe<strong>the</strong>rthis meant that <strong>the</strong>y did not have any memory of <strong>the</strong> <strong>in</strong>cidents or if it was <strong>to</strong>o difficult<strong>to</strong> put <strong>in</strong> words. Never<strong>the</strong>less, it became apparent that what <strong>the</strong> children least “wanted <strong>to</strong>remember”, <strong>the</strong> most unpleasant or abusive activities, and those that were probably <strong>the</strong>most shameful and guilt ridden had <strong>to</strong> do with <strong>the</strong> pho<strong>to</strong>graphy. It was shown that <strong>the</strong>more <strong>in</strong>terviews <strong>the</strong> children <strong>to</strong>ok part <strong>in</strong>, <strong>the</strong> more <strong>the</strong>y talked. It is as if that <strong>the</strong>y firstneeded <strong>to</strong> “sort out <strong>the</strong> memories which emerged” and only later could put <strong>in</strong><strong>to</strong> wordswhat had happened” (Sved<strong>in</strong> and Back, 2003).S<strong>in</strong>ce <strong>the</strong> Second World Congress we have cont<strong>in</strong>ued <strong>to</strong> see an expansion <strong>in</strong> <strong>the</strong> availabilityof technology and its cont<strong>in</strong>ued abuse through <strong>the</strong> production of abuse images and text.While it is difficult <strong>to</strong> disentangle <strong>the</strong> harms posed <strong>to</strong> children by a variety of sexuallyabusive and exploitative practices, it is important <strong>to</strong> note that abusive images, onceuploaded on<strong>to</strong> <strong>the</strong> Internet, cannot be removed. This highlights <strong>the</strong> consequent needsfor specific <strong>the</strong>rapeutic help for <strong>the</strong>se children which addresses <strong>the</strong> challenges posed bydisclosure, <strong>the</strong> loss of control by <strong>the</strong> child, and <strong>the</strong> need for heightened sensitivity withregard <strong>to</strong> <strong>the</strong>ir awareness of image dissem<strong>in</strong>ation.3.2.2 Work<strong>in</strong>g with children abused through abusive images on <strong>the</strong> InternetThis research, and our practice experience <strong>to</strong> date, clearly has implications for <strong>the</strong> recoveryof children sexually exploited through <strong>the</strong>ir <strong>in</strong>volvement <strong>in</strong> <strong>the</strong> production of Internetabuse images and for those professionals wish<strong>in</strong>g <strong>to</strong> assist <strong>the</strong>m. As noted above, <strong>to</strong> date,<strong>the</strong>re is a general lack of expertise and experience amongst professionals wish<strong>in</strong>g <strong>to</strong> meet<strong>the</strong> needs of children abused and exploited <strong>in</strong> this way. A recent German study suggestedthat many professionals feel both helpless about <strong>the</strong>ir ability <strong>to</strong> understand <strong>the</strong> needs ofsuch children and at times are part of a ‘conspiracy of silence’ <strong>in</strong> <strong>the</strong>ir unwill<strong>in</strong>gness <strong>to</strong> askquestions (von Weiler, 2008). It is go<strong>in</strong>g <strong>to</strong> be necessary for police officers, social welfareworkers and child professionals <strong>to</strong> re-evaluate <strong>the</strong>ir work<strong>in</strong>g practices <strong>in</strong> <strong>the</strong> light of whatwe have learnt. Palmer (2005) suggested that <strong>the</strong>re are three key areas which need <strong>to</strong>be addressed: manag<strong>in</strong>g <strong>the</strong> discovery/disclosure process and <strong>the</strong> <strong>in</strong>vestigative <strong>in</strong>terviewof <strong>the</strong> child, assessment of <strong>the</strong> recovery needs for <strong>the</strong> child, and <strong>the</strong> nature and conten<strong>to</strong>f <strong>the</strong> ensu<strong>in</strong>g <strong>in</strong>tervention programmes. We need <strong>to</strong> reth<strong>in</strong>k how we approach childvictims of abusive images once <strong>the</strong>y have been identified and <strong>the</strong>ir whereabouts discovered.Connected <strong>to</strong> Söderström’s work (Söderström, 2006), it is necessary <strong>to</strong> reiterate that <strong>the</strong>impact of disclosure on child victims should never be underestimated and that when <strong>the</strong>yare <strong>in</strong>formed that <strong>the</strong>ir images have been discovered <strong>the</strong> children feel impotent because50|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


<strong>the</strong>y will have had no control over <strong>the</strong> disclosure process – <strong>the</strong>y have not been able <strong>to</strong>choose when <strong>to</strong> disclose, what <strong>to</strong> disclose, how <strong>to</strong> disclose and <strong>to</strong> whom <strong>the</strong>y want <strong>to</strong>disclose. In some cases, <strong>the</strong> child victims are so acclimatised <strong>to</strong> <strong>the</strong>ir situation that <strong>the</strong>y seewhat is happen<strong>in</strong>g <strong>to</strong> <strong>the</strong>m as ‘normal’ and reject any assistance. One implication of this isthat more thought needs <strong>to</strong> be given <strong>to</strong> <strong>the</strong> tim<strong>in</strong>g and necessity of <strong>in</strong>vestigative <strong>in</strong>terviews.In <strong>the</strong>se situations <strong>the</strong> police have first hand evidence of what has occurred ‘objectively’<strong>to</strong> <strong>the</strong> child and need <strong>to</strong> tailor <strong>the</strong>ir <strong>in</strong>terviews <strong>to</strong> specific <strong>in</strong><strong>format</strong>ion <strong>the</strong>y may need <strong>to</strong>know ra<strong>the</strong>r than expect<strong>in</strong>g <strong>the</strong> child <strong>to</strong> relate what occurred: <strong>the</strong> discussion above on <strong>the</strong>silenc<strong>in</strong>g of children who are subjects of abusive images would contend that <strong>the</strong>y would getlittle <strong>in</strong><strong>format</strong>ion from <strong>the</strong> child o<strong>the</strong>r than that suggested/prompted by <strong>the</strong> <strong>in</strong>terviewer.Thus, <strong>to</strong> improve our forensic and <strong>in</strong>vestigative practice we need <strong>to</strong> address <strong>the</strong> follow<strong>in</strong>gquestions• Is it always necessary, for evidential purposes, <strong>to</strong> <strong>in</strong>terview children made <strong>the</strong> subjectsof abusive images?• In what circumstances might it not be necessary?• Might we need <strong>to</strong> <strong>in</strong>terview <strong>the</strong> child for o<strong>the</strong>r purposes?• When would we do this and why?• How do we need <strong>to</strong> change <strong>the</strong> way we assist children whose abuse has been <strong>the</strong>subject of pho<strong>to</strong>graphy, disclose what has happened <strong>to</strong> <strong>the</strong>m?The traumatic effects of sexual abuse, per se, are mentioned above and may also apply <strong>to</strong>children made <strong>the</strong> subjects of abusive images. However, four new significant impacts enter<strong>the</strong> equation when sexual exploitation <strong>in</strong> <strong>the</strong> form of pho<strong>to</strong>graphy and possible distributionof images is part of <strong>the</strong> victimisation and <strong>the</strong>se should be taken <strong>in</strong><strong>to</strong> account when assess<strong>in</strong>g<strong>the</strong> children’s assistance needs: <strong>the</strong>y are <strong>the</strong> impotence felt by <strong>the</strong> child because of <strong>the</strong>disclosure process; <strong>the</strong> shame and humiliation of ‘be<strong>in</strong>g seen <strong>to</strong> let it happen’; <strong>the</strong> personalresponsibility felt by <strong>the</strong> child, and <strong>the</strong> serious issue of <strong>the</strong> non-resolution of <strong>the</strong> abuse.<strong>Child</strong>ren are confronted by <strong>the</strong> knowledge that <strong>the</strong> images can never be destroyed andthat <strong>the</strong>y may cont<strong>in</strong>ue <strong>to</strong> be viewed and used by many thousands of people. The age of <strong>the</strong>child at <strong>the</strong> time of <strong>the</strong> production of <strong>the</strong> abuse images may have some relevance regard<strong>in</strong>grecovery. Where <strong>the</strong> child pho<strong>to</strong>graphed is pubescent, when an adult, she or he wouldprobably still be identifiable from <strong>the</strong>se images. It may be that when images are taken ofvery young children, <strong>the</strong> radical physical changes that take place as a result of growth andphysical development offer at least some protection from future identification when suchchildren reach adulthood.Cognitive behavioural <strong>the</strong>rapy is frequently <strong>the</strong> base of <strong>the</strong> <strong>the</strong>rapeutic approach usedby practitioners when work<strong>in</strong>g with children who have been sexually abused. Such anapproach may be used <strong>to</strong>ge<strong>the</strong>r with o<strong>the</strong>r <strong>the</strong>rapies such as play, art and behavioural<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |51


<strong>the</strong>rapies – accord<strong>in</strong>g <strong>to</strong> <strong>the</strong> age, stage of development and <strong>the</strong> needs of <strong>the</strong> child victim.<strong>Child</strong>ren are helped <strong>to</strong> make sense of what has happened <strong>to</strong> <strong>the</strong>m through understand<strong>in</strong>g<strong>the</strong>ir thoughts, feel<strong>in</strong>gs and actions. Therapists address <strong>the</strong> child’s perception of safety,enable <strong>the</strong>m <strong>to</strong> express <strong>the</strong>ir feel<strong>in</strong>gs and become empowered, help <strong>the</strong>m developassertiveness and communication skills and <strong>to</strong> disentangle <strong>the</strong>ir mixed feel<strong>in</strong>gs of guilt,trust and ambivalence. Such issues are also pert<strong>in</strong>ent <strong>to</strong> children made <strong>the</strong> subjects ofabusive images. However, <strong>the</strong>re is a need <strong>to</strong> ga<strong>in</strong> a greater understand<strong>in</strong>g of how best<strong>to</strong> address <strong>the</strong> four significant impacts on such victims as listed previously. Söderströmdraws out a number of additional practices called for when assist<strong>in</strong>g children recover<strong>in</strong>gfrom sexual exploitation through image production: he po<strong>in</strong>ts <strong>to</strong> <strong>the</strong> importance for <strong>the</strong>child <strong>to</strong> decipher <strong>the</strong> exploiter’s manoeuvr<strong>in</strong>g; <strong>the</strong> need <strong>to</strong> empower <strong>the</strong> child and assist <strong>in</strong>retriev<strong>in</strong>g agency <strong>in</strong> be<strong>in</strong>g <strong>the</strong> active part <strong>in</strong> <strong>the</strong> disclosure process; and tak<strong>in</strong>g care not <strong>to</strong>overemphasise what is <strong>in</strong> <strong>the</strong> images but allow<strong>in</strong>g <strong>the</strong> child <strong>to</strong> set <strong>the</strong> focus, among o<strong>the</strong>rth<strong>in</strong>gs (Söderström 2008). In particular, because of <strong>the</strong> nature of <strong>the</strong> silenc<strong>in</strong>g of childrenmade <strong>the</strong> subjects of abusive images, we need thus <strong>to</strong> be m<strong>in</strong>dful of <strong>the</strong> fact that disclosurewill be a spasmodic process and one that should be at <strong>the</strong> child’s pace and not at a pacethat suits, for example, <strong>the</strong> crim<strong>in</strong>al justice system. One of <strong>the</strong> most tax<strong>in</strong>g issues fac<strong>in</strong>g<strong>the</strong>rapists is how <strong>to</strong> assist child victims with <strong>the</strong> non-resolution of <strong>the</strong>ir abuse bear<strong>in</strong>g <strong>in</strong>m<strong>in</strong>d <strong>the</strong> reality that <strong>the</strong> images will be available <strong>in</strong> perpetuity. The empowerment processdur<strong>in</strong>g <strong>the</strong>rapy can assist victims <strong>in</strong> ‘liv<strong>in</strong>g with’ this reality. One 14-year-old adolescent,when her <strong>the</strong>rapy sessions were com<strong>in</strong>g <strong>to</strong> a close, reported <strong>to</strong> one of <strong>the</strong> authors, “I’m notworried anymore about what people might th<strong>in</strong>k of me, nor about <strong>the</strong> images that are out<strong>the</strong>re, because <strong>the</strong> people who look for images of me have got <strong>the</strong> problem, not me”. Wemust never underestimate <strong>the</strong> resilience of young people <strong>to</strong> overcome adversity. However,for some, <strong>the</strong> fact that <strong>the</strong> images are ‘out <strong>the</strong>re’ rema<strong>in</strong>s a recurr<strong>in</strong>g nightmare and onethat we must give fur<strong>the</strong>r thought <strong>to</strong>. One approach <strong>to</strong> this problem may be <strong>the</strong> use of<strong>in</strong>terventions which can be used for victims who have regular ‘flashbacks’ <strong>to</strong> <strong>the</strong>ir abuseor some traumatic event <strong>in</strong> <strong>the</strong>ir lives. The transfer of this approach <strong>to</strong> victims of abuseimages, though <strong>in</strong> its <strong>in</strong>fancy, is prov<strong>in</strong>g <strong>to</strong> have some success.In this section we exam<strong>in</strong>e <strong>the</strong> ethical issues <strong>in</strong>volved <strong>in</strong> tell<strong>in</strong>g children that <strong>the</strong>ir imageshave been dissem<strong>in</strong>ated on <strong>the</strong> Internet or by mobile phone and question whe<strong>the</strong>r <strong>the</strong>need <strong>to</strong> secure a conviction of <strong>the</strong> offender should always be prioritised over <strong>the</strong> needs of<strong>the</strong> child who has been abused and exploited. This has considerable implications for <strong>the</strong>crim<strong>in</strong>al justice system.52|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


3.3 <strong>Child</strong>ren persuaded and coerced <strong>in</strong><strong>to</strong> offl<strong>in</strong>e encounters lead<strong>in</strong>g<strong>to</strong> sexual abuseIn <strong>the</strong> context of sexual solicitation, or groom<strong>in</strong>g, we understand more about <strong>the</strong> processof victimisation, <strong>in</strong> part because <strong>the</strong> research has largely <strong>in</strong>volved <strong>the</strong> children <strong>the</strong>mselves.Much of this research has come from <strong>the</strong> Crimes aga<strong>in</strong>st <strong>Child</strong>ren Research Center(CCRC) at <strong>the</strong> University of New Hampshire and has been generated by two studies(YISS-1 and YISS-2), which <strong>in</strong>volved telephone <strong>in</strong>terviews with national samples ofyouth Internet users aged 10 <strong>to</strong> 17 conducted <strong>in</strong> 2000 and 2005 (F<strong>in</strong>kelhor, Mitchell, andWolak, 2000; Wolak, Mitchell, and F<strong>in</strong>kelhor, 2006). Wolak et al. (2008) have suggestedthat, <strong>the</strong> research <strong>in</strong><strong>to</strong> Internet-<strong>in</strong>itiated sex crimes makes it clear that <strong>the</strong> stereotype of<strong>the</strong> Internet child molester who uses trickery and violence <strong>to</strong> assault children is largely<strong>in</strong>accurate (Wolak, F<strong>in</strong>kelhor, and Mitchell, 2005). This US research would suggestthat most Internet-<strong>in</strong>itiated sex crimes <strong>in</strong>volve adult men who use <strong>the</strong> Internet <strong>to</strong> meetand seduce underage adolescents <strong>in</strong><strong>to</strong> sexual encounters. “The offenders use Internetcommunications such as <strong>in</strong>stant messages, e-mail, and chatrooms <strong>to</strong> meet and develop<strong>in</strong>timate relationships with victims. In <strong>the</strong> majority of cases, victims are aware that <strong>the</strong>yare convers<strong>in</strong>g onl<strong>in</strong>e with adults” (p. 112). Greenfield (2004), <strong>in</strong> <strong>the</strong> context of chatroomtext analysis, felt that <strong>the</strong> content of <strong>the</strong> chat showed evidence of dis<strong>in</strong>hibition <strong>in</strong> threeareas: sexuality, aggression and race relations, which could impact on early sexual prim<strong>in</strong>gand provide a model for racism, negative attitudes <strong>to</strong>wards women and homophobia. Ofrelevance is her conclusion that while some teenagers are unwitt<strong>in</strong>g, o<strong>the</strong>rs are activelycreat<strong>in</strong>g this culture and, ‘construct<strong>in</strong>g <strong>the</strong> Internet’ (p. 757).To date, <strong>the</strong> focus has been on <strong>the</strong> problems of children be<strong>in</strong>g made <strong>the</strong> targets of commerce,ignor<strong>in</strong>g <strong>the</strong> k<strong>in</strong>ds of social and cultural worlds that young people are creat<strong>in</strong>g onl<strong>in</strong>e.However, children and adolescents are not simply <strong>the</strong> targets of adult Internet creations,but are active participants <strong>in</strong> creat<strong>in</strong>g <strong>the</strong>ir own cyber cultures (Quayle and Taylor, 2006).Wolak et al. (2008) have argued that it is <strong>the</strong>se aspects of <strong>the</strong> Internet that create risks forsome young people who engage <strong>in</strong> specific ways with <strong>the</strong> new technologies. While <strong>the</strong>majority of youth (and <strong>in</strong> particular older, male children) appear <strong>to</strong> take risks, <strong>the</strong> vastmajority of children do not appear <strong>to</strong> be at risk (OPTEM, 2007). However, young peoplewho send personal <strong>in</strong><strong>format</strong>ion (eg, name, telephone number, pictures) <strong>to</strong> strangers or talkonl<strong>in</strong>e <strong>to</strong> such people about sex are more likely <strong>to</strong> receive aggressive sexual solicitations,def<strong>in</strong>ed by Mitchell, F<strong>in</strong>kelhor, and Wolak (2007) as solicitations <strong>in</strong>volv<strong>in</strong>g actual orattempted offl<strong>in</strong>e contact. In <strong>the</strong> five years between YISS-1 and 2 <strong>the</strong>re was an overalldecl<strong>in</strong>e <strong>in</strong> sexual solicitations, but not amongst m<strong>in</strong>ority youth and those liv<strong>in</strong>g <strong>in</strong> lessaffluent households. The authors felt that this <strong>in</strong>crease <strong>in</strong> harassment was largely expla<strong>in</strong>edby <strong>the</strong> <strong>in</strong>crease <strong>in</strong> <strong>the</strong> amount of Internet use of <strong>the</strong> previous five years (Mitchell, Wolak<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |53


and F<strong>in</strong>kelhor, 2007). However, <strong>in</strong> 2005 young people were 1.7 times more likely <strong>to</strong> reportaggressive solicitations, even when adjust<strong>in</strong>g for changes <strong>in</strong> demographic and Internet useand characteristics. The identified risk fac<strong>to</strong>rs for such aggressive solicitations <strong>in</strong>cludedbe<strong>in</strong>g female, us<strong>in</strong>g chat-rooms, us<strong>in</strong>g <strong>the</strong> mobile Internet, talk<strong>in</strong>g with people met onl<strong>in</strong>e,send<strong>in</strong>g personal <strong>in</strong><strong>format</strong>ion <strong>to</strong> people met onl<strong>in</strong>e, and experienc<strong>in</strong>g offl<strong>in</strong>e physical orsexual abuse.In <strong>the</strong> second survey, 4% (65 cases) reported an onl<strong>in</strong>e request <strong>to</strong> send a sexual picture of<strong>the</strong>mselves dur<strong>in</strong>g <strong>the</strong> previous year, but only one young person actually complied. Be<strong>in</strong>gfemale, of black ethnicity, hav<strong>in</strong>g a close onl<strong>in</strong>e relationship, engag<strong>in</strong>g <strong>in</strong> sexual behaviouronl<strong>in</strong>e and experienc<strong>in</strong>g sexual or physical abuse offl<strong>in</strong>e were risk fac<strong>to</strong>rs for receiv<strong>in</strong>g arequest for a sexual picture. Of <strong>in</strong>terest is <strong>the</strong> fact that requests were more likely <strong>to</strong> occurwhen young people were with friends, communicat<strong>in</strong>g with an adult, someone <strong>the</strong>y hadmet onl<strong>in</strong>e, who had sent a sexual picture <strong>to</strong> <strong>the</strong> young person, and who attempted oractually made, some form of offl<strong>in</strong>e contact (Mitchell, F<strong>in</strong>kelhor and Wolak, 2007b). In <strong>the</strong>first survey sexual solicitation appeared <strong>to</strong> be associated with depressive symp<strong>to</strong>ma<strong>to</strong>logy(Ybarra, Leaf and Diener-West, 2004). Young people who reported major depressive-likesymp<strong>to</strong>ms were 3.5 times more likely <strong>to</strong> report an unwanted onl<strong>in</strong>e sexual solicitationcompared <strong>to</strong> those with mild or no symp<strong>to</strong>ma<strong>to</strong>logy, and those with symp<strong>to</strong>ms were twiceas likely <strong>to</strong> report feel<strong>in</strong>g emotionally distressed by <strong>the</strong> <strong>in</strong>cident. In general, distress wasmore common among younger youth, those who received aggressive solicitations and thosewho were solicited on a computer away from <strong>the</strong>ir home (Mitchell, F<strong>in</strong>kelhor and Wolak,2001).A recent Swedish study looked at <strong>the</strong> number of 16 year-olds who had received requestsfor sexual onl<strong>in</strong>e meet<strong>in</strong>gs and offl<strong>in</strong>e encounters. Among <strong>the</strong> 7449 respondents 46%of <strong>the</strong> girls claimed that <strong>the</strong>y had received such requests from an adult. Several of <strong>the</strong>respondents reported hav<strong>in</strong>g received such solicitations both via <strong>the</strong> Internet and througho<strong>the</strong>r channels. The correspond<strong>in</strong>g figure for boys was 16%. The requests made were foradolescents <strong>to</strong> strip <strong>in</strong> front of <strong>the</strong> webcam or <strong>to</strong> watch an adult while he was masturbat<strong>in</strong>g<strong>in</strong><strong>to</strong> his web camera. The adolescents <strong>in</strong> <strong>the</strong> study clearly described <strong>the</strong>se <strong>in</strong>cidents ascommon and that <strong>the</strong>y happened all <strong>the</strong> time when us<strong>in</strong>g chat sites. None of <strong>the</strong> describedattempted solicitations were <strong>in</strong> any way sophisticated; <strong>the</strong> adult started request<strong>in</strong>g sexualservices at <strong>the</strong> onset of <strong>the</strong> chat conversation. In <strong>the</strong> same study, police reports of crimesaga<strong>in</strong>st children committed via new technologies were exam<strong>in</strong>ed and <strong>in</strong> 50% of <strong>the</strong>se <strong>the</strong>reported crimes occurred onl<strong>in</strong>e only where requests for images or for webcam contactswere <strong>the</strong> most frequent. The o<strong>the</strong>r reported crimes were offences committed offl<strong>in</strong>e butwhere contact was established on <strong>the</strong> Internet. In half of <strong>the</strong> offl<strong>in</strong>e crimes, <strong>the</strong> victim metwith <strong>the</strong> perpetra<strong>to</strong>r know<strong>in</strong>g that <strong>the</strong> meet<strong>in</strong>g would lead <strong>to</strong> sex. The o<strong>the</strong>r crimes were54|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


all crimes <strong>in</strong> which <strong>the</strong> victim thought that <strong>the</strong> meet<strong>in</strong>g would be of a completely differentcharacter (Brottsförebyggande Rådet 2007).Recent accounts from victims of groom<strong>in</strong>g <strong>in</strong> Sweden both confirmed <strong>the</strong> f<strong>in</strong>d<strong>in</strong>gs of<strong>the</strong> New Hampshire group and negated some of <strong>the</strong> conclusions. In <strong>the</strong> major Swedishcase <strong>in</strong>volv<strong>in</strong>g more than 100 girls it was evident that all of <strong>the</strong> girls knew <strong>the</strong>y weremeet<strong>in</strong>g <strong>the</strong> man <strong>in</strong> order for him <strong>to</strong> have sex with <strong>the</strong>m. At <strong>the</strong> same time none of<strong>the</strong> girls would admit <strong>to</strong> be<strong>in</strong>g fully aware of what this would imply. Someth<strong>in</strong>g <strong>in</strong> <strong>the</strong>chat conversations with <strong>the</strong> girls made <strong>the</strong> perpetra<strong>to</strong>r aware of <strong>the</strong>ir vulnerabilities andgave him an opportunity <strong>to</strong> exploit <strong>the</strong>se even before he exploited <strong>the</strong> girls sexually. Thevulnerabilities ranged from lonel<strong>in</strong>ess <strong>to</strong> suicidal thoughts. The fact that <strong>the</strong> girls wen<strong>to</strong>n <strong>the</strong>ir own account <strong>to</strong> <strong>the</strong> meet<strong>in</strong>gs with <strong>the</strong> perpetra<strong>to</strong>r does not make <strong>the</strong>m <strong>in</strong><strong>to</strong>consent<strong>in</strong>g subjects (Wagner 2008). It is obvious that <strong>the</strong> growth of solicitations for onl<strong>in</strong>econtacts is significant. Adolescents and children will report that <strong>the</strong>y happen and that allchildren know about it. From look<strong>in</strong>g <strong>in</strong><strong>to</strong> cases where offences both onl<strong>in</strong>e and offl<strong>in</strong>ehave occurred, it is obvious that requests for <strong>the</strong> adolescent <strong>to</strong> send images or <strong>to</strong> engage <strong>in</strong>webcam sex often marks <strong>the</strong> start of <strong>the</strong> sexual abuse.In recent years <strong>the</strong>re have been <strong>in</strong>creas<strong>in</strong>g concerns about <strong>the</strong> k<strong>in</strong>ds of behaviour relat<strong>in</strong>g <strong>to</strong>social network<strong>in</strong>g sites that may be associated with children plac<strong>in</strong>g <strong>the</strong>mselves at risk. Wewill discuss this fur<strong>the</strong>r when we exam<strong>in</strong>e <strong>the</strong> opportunities afforded by <strong>the</strong> Internet foryoung people <strong>to</strong> engage <strong>in</strong> problematic behaviour, but it is of note that <strong>in</strong> <strong>the</strong> YISS-2 16%of children had reported us<strong>in</strong>g blogs <strong>in</strong> <strong>the</strong> past year. Blogs conta<strong>in</strong> self-generated materialand share some of <strong>the</strong> qualities of social network<strong>in</strong>g sites. Mitchell, Wolak and F<strong>in</strong>kelhor(2008) found that teenagers and girls were <strong>the</strong> most common bloggers, and bloggerswere more likely than o<strong>the</strong>r young people <strong>to</strong> post personal <strong>in</strong><strong>format</strong>ion onl<strong>in</strong>e. However,bloggers were not more likely <strong>to</strong> <strong>in</strong>teract with people met onl<strong>in</strong>e and not known <strong>to</strong> <strong>the</strong>m<strong>in</strong> person. Bloggers who did not <strong>in</strong>teract were at no <strong>in</strong>creased risk of sexual solicitationand post<strong>in</strong>g personal <strong>in</strong><strong>format</strong>ion <strong>in</strong> itself did not add <strong>to</strong> risk. However, bloggers were atan <strong>in</strong>creased risk of onl<strong>in</strong>e harassment, regardless of whe<strong>the</strong>r or not <strong>the</strong>y <strong>in</strong>teracted witho<strong>the</strong>rs onl<strong>in</strong>e. The UK <strong>Child</strong>ren Go Onl<strong>in</strong>e Survey also suggested that young people whowere less satisfied with <strong>the</strong>ir lives and who have become more frequent and skilled Internetusers are more likely <strong>to</strong> value <strong>the</strong> Internet as a communicative environment, which maylead <strong>to</strong> more risky behaviours (Liv<strong>in</strong>gs<strong>to</strong>ne and Helsper, 2007).Through practice experience, it is possible <strong>to</strong> highlight a number of fac<strong>to</strong>rs that need <strong>to</strong>change if we are go<strong>in</strong>g <strong>to</strong> be able <strong>to</strong> assist those children who have been groomed onl<strong>in</strong>e forsexual abuse offl<strong>in</strong>e. We have learnt that groom<strong>in</strong>g onl<strong>in</strong>e, as opposed <strong>to</strong> offl<strong>in</strong>e, happensmore quickly and may be anonymous: children build up a quicker trust with <strong>the</strong>ir onl<strong>in</strong>e<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |55


‘friend’ and tend <strong>to</strong> be less <strong>in</strong>hibited <strong>in</strong> what <strong>the</strong>y communicate, and such offenders arenot restricted by time or accessibility as <strong>the</strong>y would be <strong>in</strong> <strong>the</strong> ‘real’ world. In general <strong>the</strong>y:f<strong>in</strong>d out as much as <strong>the</strong>y can about <strong>the</strong>ir potential victim; establish <strong>the</strong> risk and likelihoodof <strong>the</strong> child tell<strong>in</strong>g; f<strong>in</strong>d out about <strong>the</strong> child’s social networks; may give false <strong>in</strong><strong>format</strong>ionabout <strong>the</strong>mselves, <strong>in</strong>clud<strong>in</strong>g false images, and, if safe enough, will form a ‘relationship’ withor control <strong>the</strong> child such that <strong>the</strong>y are able <strong>to</strong> meet <strong>the</strong> child offl<strong>in</strong>e.Therapeutic approaches assist<strong>in</strong>g children and adolescents made victims of offl<strong>in</strong>e andonl<strong>in</strong>e exploitation are currently be<strong>in</strong>g <strong>in</strong>vestigated at BUP Elefanten, which is a <strong>Child</strong>and Adolescent Psychiatric Unit that treats sexually and physically abused children <strong>in</strong>Sweden. The project has been runn<strong>in</strong>g for <strong>the</strong> last three years and has <strong>in</strong>volved over 100<strong>in</strong>terviews with young people, <strong>the</strong>rapists, police, prosecu<strong>to</strong>rs and social workers. The youngpeople have been subjected <strong>to</strong> a variety of abuse practices <strong>in</strong>clud<strong>in</strong>g sexual harassment,engagement <strong>in</strong> webcam sex, hav<strong>in</strong>g <strong>the</strong>ir images uploaded on<strong>to</strong> <strong>the</strong> Internet, onl<strong>in</strong>eengagement lead<strong>in</strong>g <strong>to</strong> offl<strong>in</strong>e abuse, and children sell<strong>in</strong>g sex onl<strong>in</strong>e ( Jonsson, 2008). Theanalysis of this <strong>in</strong>terview data suggested that <strong>the</strong>se young people can be divided <strong>in</strong><strong>to</strong> threedescriptive groups: <strong>the</strong> fooled, who were lured <strong>in</strong><strong>to</strong> someth<strong>in</strong>g unexpected; <strong>the</strong> risk-takers,who take risks <strong>to</strong> meet emotional needs and secure attention, and <strong>the</strong> self-destructive, who,for example, sell sex or know<strong>in</strong>gly engage <strong>in</strong> abusive relationships. The latter group arereluctant <strong>to</strong> see <strong>the</strong>mselves as ‘victims’, <strong>in</strong>stead position<strong>in</strong>g <strong>the</strong>mselves as be<strong>in</strong>g <strong>in</strong> control.The results of <strong>the</strong>se cl<strong>in</strong>ical f<strong>in</strong>d<strong>in</strong>gs suggest that many of <strong>the</strong>se children reject offers ofhelp, and what is important is that practitioners do not collude with this but attempt <strong>to</strong>ma<strong>in</strong>ta<strong>in</strong> contact with <strong>the</strong>se young people until <strong>the</strong>y feel ready <strong>to</strong> engage.One of <strong>the</strong> predom<strong>in</strong>ant impacts of <strong>the</strong> groom<strong>in</strong>g process is, as with children made <strong>the</strong>subjects of abusive images, <strong>to</strong> silence <strong>the</strong> children. This silence is brought about both by <strong>the</strong>fact that <strong>the</strong> young people seriously believed that <strong>the</strong> person <strong>the</strong>y were go<strong>in</strong>g <strong>to</strong> meet was<strong>the</strong>ir friend and that <strong>the</strong>y would not want <strong>to</strong> own up <strong>to</strong> <strong>the</strong> nature of <strong>the</strong> conversations that<strong>the</strong>y held onl<strong>in</strong>e. The former po<strong>in</strong>t has implications regard<strong>in</strong>g how young people def<strong>in</strong>eand determ<strong>in</strong>e friendship, <strong>the</strong> latter relates <strong>to</strong> <strong>the</strong> fact that, as alluded <strong>to</strong> above, youngpeople become far less <strong>in</strong>hibited when communicat<strong>in</strong>g onl<strong>in</strong>e.There is an additional aspect <strong>to</strong> <strong>the</strong> groom<strong>in</strong>g-onl<strong>in</strong>e scenario which has implications forhow we <strong>in</strong>vestigate <strong>the</strong>se matters. This concerns <strong>the</strong> situations which arise from time <strong>to</strong>time where police carry out a forensic exam<strong>in</strong>ation of a suspect’s computer and discoverl<strong>in</strong>ks with victims who, until that po<strong>in</strong>t, were unknown <strong>to</strong> <strong>the</strong>m. The practice <strong>in</strong> <strong>the</strong> UK,<strong>to</strong> date, has been <strong>to</strong> trace <strong>the</strong> victim and <strong>to</strong> visit his or her home <strong>to</strong> <strong>in</strong>terview <strong>the</strong> youngperson <strong>in</strong> <strong>the</strong> presence of parents or carers. Such ‘cold call<strong>in</strong>g’ results <strong>in</strong> young peoplesay<strong>in</strong>g very little unless prompted by <strong>the</strong> police. Young people who have been <strong>in</strong> this56|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


situation have reported <strong>to</strong> one of <strong>the</strong> authors of this <strong>the</strong>matic paper that <strong>the</strong>y <strong>to</strong>ld <strong>the</strong> verym<strong>in</strong>imum of what had happened <strong>to</strong> <strong>the</strong> police and this was due <strong>to</strong> two dist<strong>in</strong>ct fac<strong>to</strong>rs:<strong>the</strong>y were <strong>to</strong>o embarrassed <strong>to</strong> tell <strong>the</strong> police, <strong>in</strong> front of <strong>the</strong>ir parents/carers, what <strong>the</strong>y hadcommunicated <strong>to</strong> <strong>the</strong>ir onl<strong>in</strong>e friend and, <strong>the</strong> breakdown of this friendship, prior <strong>to</strong> <strong>the</strong>police <strong>in</strong>vestigation, had resulted <strong>in</strong> <strong>the</strong>ir mourn<strong>in</strong>g <strong>the</strong> loss of <strong>the</strong> relationship.There is a need <strong>to</strong> acknowledge that some children do form relationships with those <strong>the</strong>ymeet onl<strong>in</strong>e, and for a small number of children <strong>the</strong>se will lead <strong>to</strong> sexual abuse and possiblyalso sexual exploitation. The fact that many of <strong>the</strong>se children will know that <strong>the</strong> person<strong>the</strong>y are communicat<strong>in</strong>g with, or who wishes <strong>to</strong> meet <strong>the</strong>m, has sexual <strong>in</strong>tentions does notmake this less exploitative, but does suggest a need for greater understand<strong>in</strong>g, sensitivityand openness on <strong>the</strong> part of practitioners. Such children may reject <strong>the</strong> label of ‘victim’and be difficult <strong>to</strong> engage with. We need resources <strong>to</strong> offer help over <strong>the</strong> long term, <strong>to</strong> stay<strong>in</strong> contact with children and <strong>to</strong> engage with <strong>the</strong>m <strong>in</strong> less prescriptive ways.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |57


4. Young people’s behaviour onl<strong>in</strong>e4.1 Access<strong>in</strong>g pornography onl<strong>in</strong>eIt would be naïve <strong>to</strong> assume that pornographic or sexualised materials did not exist prior <strong>to</strong><strong>the</strong> Internet. However, <strong>the</strong> Internet has brought with it a proliferation of easily accessiblesexualised material. On <strong>the</strong> Internet it is possible <strong>to</strong> f<strong>in</strong>d material <strong>to</strong> suit all <strong>in</strong>terestsand proclivities (Taylor and Quayle, 2003; Anderson 2006), ei<strong>the</strong>r through purposeful oraccidental exposure. The accessibility, <strong>in</strong>teractivity and anonymity of <strong>the</strong> Internet, however,are <strong>the</strong> very fac<strong>to</strong>rs that <strong>in</strong>crease <strong>the</strong> likelihood of exposure <strong>to</strong> violent or sexual material.In <strong>the</strong> European Commission’s Safety Awareness Facts Tools (SAFT) study (SAFT, 2003)study, almost one <strong>in</strong> five children had been <strong>in</strong>vited <strong>to</strong> a face-<strong>to</strong>-face meet<strong>in</strong>g with a stranger,and 34% had viewed a violent website, ei<strong>the</strong>r accidentally or on purpose. O<strong>the</strong>r authorshave highlighted <strong>the</strong> accidental exposure of young people <strong>to</strong> unwanted sexual material on<strong>the</strong> Internet (F<strong>in</strong>kelhor et al., 2000; Mitchell et al., 2003), but have also acknowledged <strong>the</strong>fact that exist<strong>in</strong>g research exam<strong>in</strong><strong>in</strong>g <strong>the</strong> effects of exposure <strong>to</strong> unwanted sexual materialhad been, “ almost entirely based on college students and o<strong>the</strong>r adults. None of it concernschildren, certa<strong>in</strong>ly not younger than aged 14. Moreover, <strong>the</strong> exist<strong>in</strong>g social research is allabout voluntary and anticipated exposure. No research on children or adults exists about<strong>the</strong> impact of exposure that is unwanted or unexpected.” (p. 334). The relationship betweenvoluntarily or <strong>in</strong>voluntarily access<strong>in</strong>g of pornography onl<strong>in</strong>e and <strong>the</strong> risk of fall<strong>in</strong>g victim<strong>to</strong> exploitation onl<strong>in</strong>e is an under-researched area. The hypo<strong>the</strong>sis regard<strong>in</strong>g <strong>the</strong> differentk<strong>in</strong>d of adolescents that are caught <strong>in</strong> abusive and exploitative relationships onl<strong>in</strong>emay <strong>in</strong>dicate that risk-takers and self-destructive young people may also be access<strong>in</strong>gpornography or visit<strong>in</strong>g chat sites cater<strong>in</strong>g <strong>to</strong> adults search<strong>in</strong>g for sex partners, but no suchempirical knowledge exists <strong>to</strong> date.Some authors would argue that <strong>in</strong>voluntary exposure <strong>to</strong> pornography is <strong>in</strong>deed anexploitative act if it is specifically aimed at young people by purposefully target<strong>in</strong>g sitesthat young people frequently use with l<strong>in</strong>ks that may lead <strong>to</strong> pornographic material,or us<strong>in</strong>g URLs that are close <strong>to</strong> URLs of sites frequented by young people, attract<strong>in</strong>g<strong>the</strong> chance visi<strong>to</strong>r who misspells <strong>the</strong> name of <strong>the</strong> website. In <strong>the</strong> YISS-1, Mitchell et al.(2003) <strong>in</strong>dicated that one <strong>in</strong> four of children who regularly used <strong>the</strong> Internet encounteredunwanted sexual pictures <strong>in</strong> <strong>the</strong> year prior <strong>to</strong> data collection. Seventy-three per cent ofsuch exposures occurred while <strong>the</strong> young people were search<strong>in</strong>g or surf<strong>in</strong>g <strong>the</strong> Internet,and <strong>the</strong> majority happened while at home. These authors also discussed <strong>the</strong> ways <strong>in</strong> whichprogramm<strong>in</strong>g techniques ma<strong>in</strong>ta<strong>in</strong>ed such exposure: “Explicit sex sites are also sometimes58|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


programmed <strong>to</strong> make <strong>the</strong>m difficult <strong>to</strong> exit, referred <strong>to</strong> as “mousetrapp<strong>in</strong>g”. In fact, <strong>in</strong> somesites <strong>the</strong> exit but<strong>to</strong>ns take a viewer <strong>in</strong><strong>to</strong> o<strong>the</strong>r sexually explicit sites. Indeed, <strong>in</strong> 26% of <strong>the</strong>surf<strong>in</strong>g <strong>in</strong>cidents, youth reported <strong>the</strong>y were brought <strong>to</strong> ano<strong>the</strong>r sex site when <strong>the</strong>y tried<strong>to</strong> exit <strong>the</strong> site <strong>the</strong>y were <strong>in</strong>. This happened <strong>in</strong> one third of <strong>the</strong> distress<strong>in</strong>g <strong>in</strong>cidents.” (p.342). The majority of children who were exposed <strong>to</strong> material regarded such exposure as notparticularly distress<strong>in</strong>g. However, <strong>the</strong> authors emphasised that such exposure, particularlyunwanted exposure, may affect attitudes about sex, <strong>the</strong> Internet, and young people’s senseof safety and community. By YISS-2 <strong>the</strong>re had been an <strong>in</strong>crease <strong>in</strong> unwanted exposure <strong>to</strong>pornography and this was particularly apparent among 10–12 years olds, 16–17 year oldboys and white, non-Hispanic youth (Mitchell, Wolak and F<strong>in</strong>kelhor, 2007). In a sample ofTaiwanese adolescents, 38% of <strong>the</strong> sample had some exposure <strong>to</strong> onl<strong>in</strong>e pornography, and<strong>the</strong> study <strong>in</strong>dicated that this was associated with greater acceptance of sexual permissivenessand greater likelihood of engag<strong>in</strong>g <strong>in</strong> sexually permissive behaviours (Lo and Wei, 2005).In a study of Australian youth (16–17 year olds), three quarters had been accidentallyexposed <strong>to</strong> pornographic websites, while 38% of boys and 2% of girls had deliberatelyaccessed <strong>the</strong>m (Flood, 2007). This study concluded that two features of children’s exposure<strong>to</strong> pornography mirror that seen <strong>in</strong> adults. First, males are more likely <strong>to</strong> seek out and aremore frequent consumers of X-rated movies and pornographic websites. Second, Internetusers of any age f<strong>in</strong>d it difficult <strong>to</strong> avoid unwanted encounters with sexually explicitmaterials. An example of this relates <strong>to</strong> some computer games, which may have a highsexual component. Such games may be rated ‘for adults’ but <strong>in</strong>evitably enjoy a high level ofparticipation by young people. It is also important <strong>to</strong> note that such exposure is not unique<strong>to</strong> <strong>the</strong> new technologies, but take place through more traditional media such as television,where broadcast<strong>in</strong>g times of erotic and sexual material (for example, <strong>in</strong> <strong>the</strong> Philipp<strong>in</strong>es)may occur dur<strong>in</strong>g times when children are likely <strong>to</strong> be viewers.One fac<strong>to</strong>r that may be of significance here relates <strong>to</strong> <strong>the</strong> controllability of exposure, and itmay be that <strong>the</strong>re are differences <strong>in</strong> <strong>the</strong> impact of accidental exposure <strong>to</strong> that of purposefulexposure. Fug (2008) has noted that <strong>the</strong>re are a number of m<strong>in</strong>ors who are surprised by<strong>the</strong> content of <strong>the</strong> material that <strong>the</strong>y <strong>in</strong>advertently happen upon when us<strong>in</strong>g <strong>the</strong> Internet.Unexpected or partial access <strong>to</strong> material may be an important issue, and Hargrave andLiv<strong>in</strong>gs<strong>to</strong>ne (2006) have suggested that, “The newer technologies (<strong>in</strong>clud<strong>in</strong>g video butalso <strong>the</strong> Internet and mobile communications) allow content <strong>to</strong> be seen out of context.One may see sets of trailers ra<strong>the</strong>r than <strong>the</strong> s<strong>to</strong>ryl<strong>in</strong>e <strong>in</strong> which <strong>to</strong> put <strong>the</strong> content. Edi<strong>to</strong>rialcontext has always been important <strong>in</strong> content regulation guidel<strong>in</strong>es (eg, <strong>the</strong> British Boardof Film Classification (BBFC), or <strong>the</strong> <strong>in</strong>dependent regula<strong>to</strong>r and competition authorityfor <strong>the</strong> UK communications <strong>in</strong>dustries – Ofcom), but it may prove difficult <strong>to</strong> build <strong>in</strong><strong>to</strong>parallel guidel<strong>in</strong>es for new media. However, it is clear from research on children’s accidentalexposure <strong>to</strong> pornography on <strong>the</strong> Internet that unexpected and decontextualised contentcan be particularly upsett<strong>in</strong>g. This poses a challenge for regula<strong>to</strong>rs” (p. 205).<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |59


However, young persons’ use of pornography has not been widely studied and most buildon self-reports, <strong>in</strong> which differences may well be those that <strong>the</strong> prevail<strong>in</strong>g societal normwould dictate <strong>to</strong> <strong>the</strong> adolescent. It may well be argued that many children and adolescentswill claim <strong>the</strong>y only accidentally stumble upon pornography s<strong>in</strong>ce <strong>the</strong>y believe it <strong>to</strong> be<strong>in</strong>appropriate <strong>to</strong> state that <strong>the</strong>y actively looked for it on <strong>the</strong> Internet. Mossige, A<strong>in</strong>saarand Sved<strong>in</strong> (2007) conv<strong>in</strong>c<strong>in</strong>gly showed that young people actively access pornography <strong>to</strong>a high extent and that <strong>the</strong> Internet is <strong>the</strong> ma<strong>in</strong> conduit. In <strong>the</strong> Swedish sample of 18-yearolds tak<strong>in</strong>g part <strong>in</strong> <strong>the</strong> study 65% of <strong>the</strong> boys watch pornography every month as opposed<strong>to</strong> 5% of girls who only rarely access pornography as often. It should be noted that only 7%of <strong>the</strong> boys and 31% of <strong>the</strong> girls <strong>in</strong> <strong>the</strong> study claimed that <strong>the</strong>y never watch pornography.The discussion of how access <strong>to</strong> pornography <strong>in</strong>fluences adolescents needs also take <strong>in</strong><strong>to</strong>account <strong>the</strong> fact that for many adolescents, pornographic films and images are someth<strong>in</strong>g<strong>the</strong>y or <strong>the</strong>ir friends are familiar with and that <strong>the</strong>y watch on a regular basis.A largely unknown fac<strong>to</strong>r relates <strong>to</strong> <strong>the</strong> nature of harm through exposure, and how itmight manifest itself beyond <strong>the</strong> immediacy of any distress. This has bear<strong>in</strong>g on how‘ma<strong>in</strong> stream’ pornography can be viewed as exploitative <strong>in</strong> how it is presented <strong>to</strong> <strong>the</strong>viewer. Obviously pornography on <strong>the</strong> Internet is look<strong>in</strong>g <strong>to</strong> make profit by direct<strong>in</strong>gviewers <strong>to</strong> pay-for-view sites but is pornography exploit<strong>in</strong>g children and adolescents <strong>in</strong>more ways than this? Kanuga and Rosenfeld (2004) have expressed <strong>the</strong> view that, “While<strong>the</strong>re is little <strong>document</strong>ation of <strong>the</strong> <strong>in</strong>fluence of unrestra<strong>in</strong>ed access <strong>to</strong> pornography onadolescents, <strong>the</strong>re is, at m<strong>in</strong>imum, concern that this may have a negative <strong>in</strong>fluence on<strong>the</strong> psychosocial developmental process which takes place dur<strong>in</strong>g puberty… While itmight not be possible <strong>to</strong> precisely def<strong>in</strong>e what constitutes normal sexual behaviour, <strong>the</strong>reshould be concern for young people with a relatively narrow perspective who are exposed<strong>to</strong> frequent images of behaviours such as sodomy, group sex, sadomasochistic practices,and bestiality” (p. 120). In a similar ve<strong>in</strong>, <strong>in</strong> a review of <strong>the</strong> literature related <strong>to</strong> <strong>in</strong>advertentexposure <strong>to</strong> pornography, Greenfield (2004) concluded that <strong>the</strong> evidence <strong>in</strong>dicates thatpornography and related sexual media can <strong>in</strong>fluence sexual violence, sexual attitudes, moralvalues and sexual activity for children and youth. However, it is important <strong>to</strong> note thatstudies on media violence show conflict<strong>in</strong>g results and have not clearly established sucha l<strong>in</strong>k, or, ra<strong>the</strong>r, a l<strong>in</strong>k has been established where already vulnerable groups seem <strong>to</strong>be negatively affected by access<strong>in</strong>g violent and pornographic material. Look<strong>in</strong>g at <strong>the</strong>different research attempts made <strong>to</strong> establish a l<strong>in</strong>k between access<strong>in</strong>g pornography andmaladaptive behaviours, Hargrave and Liv<strong>in</strong>gs<strong>to</strong>ne (2006) concluded that, <strong>the</strong> evidencethat view<strong>in</strong>g pornography harms children rema<strong>in</strong>s scarce, given ethical restrictions on <strong>the</strong>research, though many experts believe it <strong>to</strong> be harmful. O<strong>the</strong>r vulnerable groups havebeen researched, however, with some evidence that <strong>the</strong> harmful effects of violent contentespecially are greater for those who are already aggressive, for children with behaviour60|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


disorders, for young offenders with a his<strong>to</strong>ry of domestic violence and – for pornographiccontent – among sexual offenders.Gerad<strong>in</strong> and Thibaut (2004) suggested that adolescent exposure <strong>to</strong> sexual pathology bya parent, sexual <strong>in</strong>teractions of parents or surrogates, and exposure <strong>to</strong> pornography maycreate a maladaptive concept of appropriate sexual behaviours lead<strong>in</strong>g <strong>to</strong> offensive acts.This is a <strong>to</strong>pic that we will exam<strong>in</strong>e fur<strong>the</strong>r <strong>in</strong> relation <strong>to</strong> adolescent problematic onl<strong>in</strong>ebehaviour. However, what we do not know <strong>in</strong> this area far exceeds what we do know, andwhile such research alerts us <strong>to</strong> <strong>the</strong> possible dangers of unrestra<strong>in</strong>ed access <strong>to</strong> violent orcoercive sexual materials, it does not help us quantify who is at risk or what fac<strong>to</strong>rs might<strong>in</strong>crease ei<strong>the</strong>r vulnerability or resilience. Probably what is of more concern is that <strong>the</strong>majority of studies refer <strong>to</strong> onl<strong>in</strong>e pornography as if it was a uniform concept. There is littleattempt <strong>to</strong> differentiate between ma<strong>in</strong>stream pornography between consent<strong>in</strong>g <strong>in</strong>dividuals,content that is deviant (portray<strong>in</strong>g <strong>the</strong> use of animals, or for example faeces), violentcontent and abusive images of children. An exception <strong>to</strong> this is The Baltic Sea RegionalStudy of Adolescent’s Sexuality (Mossige, A<strong>in</strong>saar and Sved<strong>in</strong>, 2007), where questions wereasked about images <strong>in</strong>volv<strong>in</strong>g adult men and women, group sex, adults of <strong>the</strong> same sexand adults and children. In this study approximately 5% of <strong>the</strong> boys admit <strong>to</strong> hav<strong>in</strong>g seenimages where adults have sex with children. What may be central <strong>to</strong> <strong>the</strong> argument aboutharm through exposure <strong>to</strong> pornography, and may help account for <strong>the</strong> different reportedimpacts across countries, relates <strong>to</strong> family and parental context. Liv<strong>in</strong>gs<strong>to</strong>ne and Hargrave(2006) have commented that, “The evidence suggests that <strong>the</strong> children’s response <strong>to</strong> certa<strong>in</strong>media contents can be lessened or heightened by <strong>the</strong> ways <strong>in</strong> which families <strong>in</strong>teract anddiscuss what is seen” (p. 42).Participants <strong>in</strong> Paul and L<strong>in</strong>z’s (2008) study who were exposed <strong>to</strong> sexually explicitdepictions of females who appeared <strong>to</strong> be m<strong>in</strong>ors (‘barely legal’ pornography) were faster<strong>to</strong> recognise sexual words after be<strong>in</strong>g primed with neutral depictions of girls compared <strong>to</strong>participants who were pre-exposed <strong>to</strong> adult pornography. The results of this study suggestedthat <strong>the</strong> relationship between ‘streng<strong>the</strong>ned sex-youth cognitions’ and <strong>the</strong> likelihood ofact<strong>in</strong>g upon <strong>the</strong>m is complex. They concluded that <strong>the</strong> endorsement of deviant sexualbehaviour <strong>in</strong>volv<strong>in</strong>g m<strong>in</strong>ors may <strong>in</strong>clude <strong>the</strong> <strong>format</strong>ion of a sex-youth cognitive schema (acore belief that endorses sexually explicit behaviour by young people), but that <strong>the</strong> mere<strong>format</strong>ion of such a schema does not by any means guarantee deviant behaviour. Thisargument may sound academic, but <strong>the</strong>se studies may be an important contribution <strong>to</strong> ourvery impoverished understand<strong>in</strong>g of <strong>the</strong> impact of exposure <strong>to</strong> materials on <strong>the</strong> beliefs andattitudes of young people.Many youth are exposed <strong>to</strong> onl<strong>in</strong>e sexual materials, and we have clearly seen that not allof that exposure is accidental or damag<strong>in</strong>g. One concern is that exposure <strong>to</strong> deviant or<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |61


violent pornographies may impact on <strong>the</strong> beliefs and attitudes of some young people, and<strong>to</strong> a lesser extent on <strong>the</strong> behaviour of a few. This is <strong>in</strong>creas<strong>in</strong>gly be<strong>in</strong>g seen as a potentialpublic health issue, (Perr<strong>in</strong>, Madanat, Barnes, Carolan, Clark, Iv<strong>in</strong>s, Tuttle, Vogeler andWilliams, 2008, p. 13) and it would appear that <strong>the</strong> consequence of exposure <strong>in</strong> <strong>the</strong> largelyunregulated medium that is <strong>the</strong> Internet certa<strong>in</strong>ly warrants fur<strong>the</strong>r research.We understand very little about <strong>the</strong> consequences for children on decontextualisedexposure <strong>to</strong> what tends, <strong>in</strong> <strong>the</strong> literature, <strong>to</strong> be called pornography. There has been littleattempt <strong>to</strong> differentiate between different types of pornographies, although we know that<strong>the</strong> Internet has dramatically <strong>in</strong>creased <strong>the</strong> availability of diverse sexualised material. Wedo know that some children are more vulnerable, but we have also <strong>to</strong> be aware of <strong>the</strong> factthat for many children access<strong>in</strong>g sexualised text and images is an everyday occurrence.4.2 Internet affordanceA fur<strong>the</strong>r harm posed by <strong>the</strong> new technologies relates <strong>to</strong> <strong>the</strong> media <strong>the</strong>mselves and <strong>the</strong>opportunities afforded <strong>to</strong> young people <strong>to</strong> engage <strong>in</strong> ways that might be deemed worthyof concern. These might be called self-victimis<strong>in</strong>g activities through both <strong>the</strong> Internet andmobile phone technology, although this term may be seen <strong>to</strong> be problematic, as it relateslargely <strong>to</strong> <strong>the</strong> <strong>in</strong>creas<strong>in</strong>g ability <strong>to</strong> generate onl<strong>in</strong>e content. The evidence would suggest thatmobile phone ownership may be higher among children aged 11–16 than among adults,with 76% of children hav<strong>in</strong>g <strong>the</strong>ir own phone (<strong>Child</strong>-Wise Moni<strong>to</strong>r, 2002). Madell andMuncer (2004) surveyed 1340 secondary school children from <strong>the</strong> Teesside area of <strong>the</strong>UK. Of <strong>the</strong>se 86% owned a mobile phone (89.7% females and 82.3% males). In this study,mobile phone use was restricted <strong>to</strong> voice calls and text, but <strong>the</strong>re is evidence that mobilephones can <strong>in</strong>creas<strong>in</strong>gly also act as o<strong>the</strong>r forms of communication. Liv<strong>in</strong>gs<strong>to</strong>ne and Bober(2005), however, have argued this is now diversify<strong>in</strong>g, and <strong>in</strong> <strong>the</strong>ir study 38% of <strong>the</strong> youngpeople had a mobile phone, 17% a digital television and 8% a games console, all withaccess <strong>to</strong> <strong>the</strong> Internet. For many young people, <strong>the</strong> mobile phone is both a vital means ofcommunication and a way of relat<strong>in</strong>g <strong>to</strong>, and participat<strong>in</strong>g <strong>in</strong>, an extended social world.By 2007 <strong>in</strong> a qualitative study of 29 European countries, <strong>the</strong> vast majority of children hadmobile phones (OPTEM, 2007).However, <strong>the</strong>re are emerg<strong>in</strong>g concerns that such technological participation may <strong>in</strong>volvepractices that target o<strong>the</strong>r <strong>in</strong>dividuals or <strong>in</strong>volve <strong>the</strong> young person <strong>the</strong>mselves. As yet,no published accounts of such activities have emerged outside of anecdotal or cl<strong>in</strong>icalcase material, but it is an area that is worthy of consideration. In March 2005, two girls,<strong>in</strong> separate <strong>in</strong>cidents, <strong>to</strong>ok <strong>in</strong>decent pho<strong>to</strong>graphs of <strong>the</strong>mselves <strong>in</strong> <strong>the</strong>ir homes without62|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


ealis<strong>in</strong>g how widely <strong>the</strong>y could be circulated on <strong>the</strong> Internet, (TES Cymru, 2005). The firstcase <strong>in</strong>volved a 14-year-old girl who <strong>to</strong>ok naked pictures of herself us<strong>in</strong>g a digital camera,which she <strong>download</strong>ed on <strong>to</strong> her computer and sent via an <strong>in</strong>stant messag<strong>in</strong>g service. Thesecond case <strong>in</strong>volved a 13-year-old girl who sent pho<strong>to</strong>graphs of herself <strong>in</strong> underwear,with handcuffs and a whip, via a webcam <strong>to</strong> an Internet site. This set of pho<strong>to</strong>graphswas widely accessed by o<strong>the</strong>r pupils and led <strong>to</strong> a fight <strong>in</strong> <strong>the</strong> school grounds. The child’sparents were very distressed by <strong>the</strong> event as <strong>the</strong>y thought she was us<strong>in</strong>g <strong>the</strong> computer <strong>to</strong>do her homework. Both of <strong>the</strong> girls described <strong>the</strong>ir actions as ei<strong>the</strong>r a dare or fun. In asimilar <strong>in</strong>cident, a UK newspaper, <strong>the</strong> Daily Mail (2005), reported that police and socialservices were called <strong>in</strong> after six Suffolk schoolgirls <strong>to</strong>ok <strong>to</strong>pless pho<strong>to</strong>graphs of each o<strong>the</strong>rand posted <strong>the</strong>m on <strong>the</strong> Internet. The 15-year-olds posted <strong>the</strong> pictures on a website <strong>the</strong>yhad set up and one of <strong>the</strong> girls was arrested on suspicion of tak<strong>in</strong>g <strong>in</strong>decent pho<strong>to</strong>graphsof a child. A fur<strong>the</strong>r report (BBC, 2005), <strong>in</strong>volved both mobile phones and <strong>the</strong> Internet.It related <strong>to</strong> an adolescent boy <strong>in</strong> India who recorded a sexual act between himself and a16-year-old schoolgirl on his mobile phone. The pictures were <strong>the</strong>n circulated across Indiaand abroad. The clip, which lasted 2 m<strong>in</strong>utes 37 seconds, was copied on<strong>to</strong> video CDs andsold. Subsequently <strong>the</strong> head of an auction website was arrested after <strong>the</strong> sale of CDs thatappeared on <strong>the</strong> Internet show<strong>in</strong>g <strong>the</strong> sexual activity between <strong>the</strong> two students. The personwho had attempted <strong>to</strong> sell <strong>the</strong> clip on <strong>the</strong> auction site was himself a student (Quayle,2007).Self-generated images or films where <strong>the</strong> offender conv<strong>in</strong>ces <strong>the</strong> child <strong>to</strong> send him imagesof her/himself naked or <strong>in</strong> some cases masturbat<strong>in</strong>g are also seen as part of <strong>the</strong> groom<strong>in</strong>gprocess. The images are often used <strong>to</strong> persuade <strong>the</strong> child of <strong>the</strong> harmlessness <strong>in</strong> sexualcontacts between a child and an adult, lower<strong>in</strong>g <strong>the</strong> child’s <strong>in</strong>hibition <strong>to</strong> engage <strong>in</strong> offl<strong>in</strong>esex or <strong>to</strong> be paid by <strong>the</strong> adult <strong>to</strong> meet. The targeted child is vulnerable for a number ofreasons; lonel<strong>in</strong>ess, be<strong>in</strong>g bullied or <strong>in</strong> constant battle with parents, someth<strong>in</strong>g that <strong>the</strong>perpetra<strong>to</strong>r often recognises <strong>in</strong> his chat contact with <strong>the</strong> young person and exploits. Theadolescent <strong>in</strong>volved sees him or herself as an accomplice <strong>to</strong> <strong>the</strong> abuse after hav<strong>in</strong>g sent <strong>the</strong>perpetra<strong>to</strong>r images and after hav<strong>in</strong>g been paid for sexual services (Wagner 2008).Ano<strong>the</strong>r aspect of self-generated images is adolescents’ <strong>in</strong>volvement <strong>in</strong> voluntary andmutual webcam sex. The fact that webcam sex is becom<strong>in</strong>g more and more ma<strong>in</strong>streamfor young people will also lower <strong>the</strong>ir <strong>in</strong>hibition regard<strong>in</strong>g post<strong>in</strong>g images or films of<strong>the</strong>mselves on websites or mail<strong>in</strong>g <strong>the</strong>se <strong>to</strong> persons <strong>the</strong>y have only met onl<strong>in</strong>e. Aga<strong>in</strong>, notenough is known of how common webcam sex has become, but recent <strong>in</strong>terviews withschool counsellors and panels with adolescents seem <strong>to</strong> <strong>in</strong>dicate a rapid <strong>in</strong>crease ( Jonsson,2008). We do not know what effect, if any, this may have for adolescents, but we do knowthat it puts <strong>the</strong> adolescent at risk of hav<strong>in</strong>g images and films that were <strong>in</strong>tended for an<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |63


exclusive relationship distributed <strong>in</strong> wider circles and thus exploited. Websites whereformer boyfriends or girlfriends post images as a form of revenge are popular <strong>in</strong> severalcountries across <strong>the</strong> world. These sites may be seen as affect<strong>in</strong>g ma<strong>in</strong>ly adults but do also<strong>in</strong>fluence <strong>the</strong> lives of adolescents.The question of harm was also exam<strong>in</strong>ed by <strong>the</strong> University of New Hampshire groupthrough exam<strong>in</strong><strong>in</strong>g <strong>the</strong> case-loads of 1,504 practitioners <strong>to</strong> see what k<strong>in</strong>ds of problematicexperiences were reported that related <strong>to</strong> <strong>the</strong> new technologies. They found 11 typesof problematic experiences reported by youth and adult clients. These were: overuse;pornography; <strong>in</strong>fidelity; sexual exploitation and abuse; gam<strong>in</strong>g, gambl<strong>in</strong>g and role-play<strong>in</strong>g;harassment; isolative-avoidant use; frauds, steal<strong>in</strong>g and deception; failed onl<strong>in</strong>e relationships;harmful <strong>in</strong>fluence websites; and risky and <strong>in</strong>appropriate use (Mitchell, Becker-Bleaseand F<strong>in</strong>kelhor, 2005). A fur<strong>the</strong>r analysis exam<strong>in</strong>ed which problematic experiences wereidentified as primary or secondary problems (Mitchell and Wells, 2007). Youth and adultusers were more likely <strong>to</strong> have problems related <strong>to</strong> overuse of <strong>the</strong> Internet; use of adultpornography; child pornography; sexual exploitation perpetration; and gam<strong>in</strong>g, gambl<strong>in</strong>gand role play<strong>in</strong>g. O<strong>the</strong>r Internet-related problems, such as isolative-avoidant use, sexualexploitation victimisation, harassment perpetration, and onl<strong>in</strong>e <strong>in</strong>fidelity were equally likely.Youth problems related <strong>to</strong> gam<strong>in</strong>g, gambl<strong>in</strong>g or role-play<strong>in</strong>g were 1.7 times more likely <strong>to</strong>be identified as a primary present<strong>in</strong>g problem, and onl<strong>in</strong>e fraud or deception victimisationfour times more likely. Data on 512 youth receiv<strong>in</strong>g mental health services for Internetrelatedproblems, with particular attention <strong>to</strong> victims of onl<strong>in</strong>e sexual exploitation, wereexam<strong>in</strong>ed (Wells and Mitchell, 2007). Sexually exploited youth were more likely <strong>to</strong> havebeen given a diagnosis of Post Traumatic Stress Disorder (PTSD) than youth with o<strong>the</strong>rInternet-related problems. A quarter of <strong>the</strong>se victims were male, and <strong>the</strong>se young peoplepresented with <strong>the</strong> same mental health characteristics as victims of offl<strong>in</strong>e sexual abuse. Aquarter of all of <strong>the</strong> 512 young people had problems that related <strong>to</strong> sexual exploitation.A possible harm that only recently has been acknowledged is <strong>the</strong> fact that children becomewitnesses <strong>to</strong> <strong>the</strong>ir parents’ Internet activities. In <strong>the</strong> recently published report regard<strong>in</strong>gconcerns raised by children contact<strong>in</strong>g <strong>the</strong> child helpl<strong>in</strong>e <strong>in</strong> Sweden, parents’ use of <strong>the</strong>Internet was high on <strong>the</strong> list. <strong>Child</strong>ren contacted <strong>the</strong> helpl<strong>in</strong>e distressed over <strong>the</strong> fact that<strong>the</strong>ir fa<strong>the</strong>r accessed pornography on <strong>the</strong> Internet or that a parent engaged <strong>in</strong> sex chats <strong>to</strong>which <strong>the</strong> child somehow became a witness. In a few reported cases adolescents had notedthat a parent accessed what <strong>the</strong>y <strong>in</strong>terpreted as child pornography. In one telephone-call<strong>to</strong> <strong>the</strong> helpl<strong>in</strong>e, a 12-year-old girl discusses her distress <strong>in</strong> not<strong>in</strong>g that her mo<strong>the</strong>r, scantilydressed <strong>in</strong> front of <strong>the</strong> computer, uploaded images of herself ( Jonsland and Irgens, 2008).Technology affords opportunities for both adults and children <strong>to</strong> create content. Forsome children this is part of <strong>the</strong> ‘groom<strong>in</strong>g process’, whereas for o<strong>the</strong>rs it would, <strong>in</strong> o<strong>the</strong>r64|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


contexts, be seen as a consequence of developmentally normal sexual needs. In <strong>the</strong> contex<strong>to</strong>f digital transmission, such behaviours may expose children <strong>to</strong> scenarios that may beboth sexually abusive and sexually exploitative.4.3 Stay<strong>in</strong>g safe on <strong>the</strong> InternetWe have already considered how certa<strong>in</strong> onl<strong>in</strong>e behaviours leave children more vulnerable<strong>in</strong> relation <strong>to</strong> onl<strong>in</strong>e sexual solicitation and groom<strong>in</strong>g. Yet it is also <strong>the</strong> case that not allchildren are vulnerable and <strong>the</strong> work of <strong>the</strong> University of New Hampshire researcherswarns aga<strong>in</strong>st scare s<strong>to</strong>ries and asks us <strong>to</strong> pay particular attention <strong>to</strong> young people whoare at a higher risk, such as those with a his<strong>to</strong>ry of sexual abuse, concerns about sexualorientation and patterns of offl<strong>in</strong>e and onl<strong>in</strong>e risk tak<strong>in</strong>g (Wolak et al., 2008). Ra<strong>the</strong>rthan quantify<strong>in</strong>g children’s behaviour, <strong>the</strong> OPTEM (2007) study was a qualitative oneand <strong>in</strong>cluded data from 29 European countries. The children who were <strong>in</strong>terviewed wereextremely familiar with <strong>the</strong> Internet and described its use as be<strong>in</strong>g ‘self-evident’. Themajority had home Internet access as well as broadband and used <strong>the</strong> Internet regularlyand frequently. However, frequency correlated with age, with 12–14 year olds us<strong>in</strong>g <strong>the</strong>Internet daily and often between 1–3 hours. What is of <strong>in</strong>terest is that all <strong>the</strong> childrenrecognized that <strong>the</strong>re were risks with Internet use and <strong>the</strong>y self-generated discipl<strong>in</strong>e rules<strong>in</strong> relation <strong>to</strong> this. As expected, younger children were more constra<strong>in</strong>ed <strong>in</strong> what <strong>the</strong>y didand were more likely <strong>to</strong> be supervised by <strong>the</strong>ir parents.There was convergence <strong>in</strong> Internet use across <strong>the</strong> 29 countries, and most frequent usesreflected two recreational functions. Onl<strong>in</strong>e games were played ma<strong>in</strong>ly by younger childrenand boys, and <strong>the</strong> o<strong>the</strong>r form of enterta<strong>in</strong>ment was look<strong>in</strong>g for <strong>in</strong><strong>format</strong>ion on subjectsthat were of <strong>in</strong>terest or brows<strong>in</strong>g for fun. The Internet was also used for <strong>in</strong><strong>format</strong>ionfor schoolwork, communication functions (particularly older children and girls), and<strong>download</strong><strong>in</strong>g of music, films, videos and games, amongst older children and boys. Lessmentioned activities <strong>in</strong>cluded <strong>the</strong> creation of blogs or home pages, and post<strong>in</strong>g text, pho<strong>to</strong>sor music; read<strong>in</strong>g and respond<strong>in</strong>g <strong>to</strong> friends’ blogs and home pages; <strong>download</strong><strong>in</strong>g r<strong>in</strong>g<strong>to</strong>nes and images for mobile phones; and shar<strong>in</strong>g files (such as music, films, videos andgames) or pho<strong>to</strong>s. Th<strong>in</strong>gs that children did not do very often <strong>in</strong>cluded participat<strong>in</strong>g <strong>in</strong> openchatrooms, respond<strong>in</strong>g <strong>to</strong> blogs or home pages of strangers, tak<strong>in</strong>g part <strong>in</strong> competitions ormak<strong>in</strong>g phone calls. In fact many of <strong>the</strong> activities identified as leav<strong>in</strong>g children vulnerable<strong>to</strong> sexual solicitation did not take place. While most children had mobile phones, <strong>the</strong>rewere differences <strong>in</strong> patterns of use across different age groups. In younger children, keep<strong>in</strong>g<strong>in</strong> contact with parents was seen as an essential way of reassur<strong>in</strong>g both child and parents.With older children, <strong>the</strong> preferred use related <strong>to</strong> keep<strong>in</strong>g <strong>in</strong> <strong>to</strong>uch with friends, and while<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |65


tak<strong>in</strong>g pho<strong>to</strong>graphs was widespread send<strong>in</strong>g <strong>the</strong>m was very rare. Very few used <strong>the</strong> mobileInternet as it was seen as expensive and unnecessary.Risks identified by <strong>the</strong> children seemed <strong>to</strong> relate more <strong>to</strong> <strong>the</strong> Internet than <strong>to</strong> mobile phones,and <strong>in</strong>cluded risks <strong>to</strong> <strong>the</strong> computer (such as viruses and hack<strong>in</strong>g); <strong>in</strong>opportune appearancesof images, or mistaken access <strong>to</strong> undesired websites show<strong>in</strong>g violence or pornography;cons and fraud; and sex attacks by malicious adults. The latter was not mentioned as often,and older children tended <strong>to</strong> play down <strong>the</strong> impact of accidental exposure. While childrenacknowledged that <strong>the</strong>y sometimes let <strong>the</strong>mselves engage <strong>in</strong> risky behaviour, <strong>the</strong>y did notshow a lot of anxiety about risk and showed a preference for try<strong>in</strong>g <strong>to</strong> solve <strong>the</strong> problemsby <strong>the</strong>mselves or with<strong>in</strong> <strong>the</strong>ir peer group. They turned <strong>to</strong> <strong>the</strong>ir parents or o<strong>the</strong>r adults only<strong>in</strong> cases of potentially ‘dramatic’ problems.With<strong>in</strong> <strong>the</strong> OPTEM (2007) study, children showed a high level of awareness aboutprecautionary measures, but older children <strong>in</strong> particular often adopted actual behavioursthat were <strong>in</strong>consistent with <strong>the</strong>ir attitudes and stated pr<strong>in</strong>ciples. In particular <strong>the</strong>y tendednot <strong>to</strong> turn <strong>to</strong> parents or <strong>to</strong> o<strong>the</strong>r authority figures, and this was especially <strong>the</strong> case forolder boys. They were more likely <strong>to</strong> be receptive <strong>to</strong> <strong>the</strong> use of a worry but<strong>to</strong>n (such asdeveloped by <strong>the</strong> Virtual Global Task Force), but this was not unanimous. The study isimportant <strong>in</strong> highlight<strong>in</strong>g <strong>the</strong> fact that children are aware of risks, and do ‘police’ <strong>the</strong>ir ownactivities, but do not necessarily share a view of <strong>the</strong> new technologies that implies thatadults should be <strong>the</strong> reference po<strong>in</strong>t for judg<strong>in</strong>g and moni<strong>to</strong>r<strong>in</strong>g young people’s behaviour.Liv<strong>in</strong>gs<strong>to</strong>ne (2008) has also cautioned aga<strong>in</strong>st mak<strong>in</strong>g simple dist<strong>in</strong>ctions between offl<strong>in</strong>eand onl<strong>in</strong>e worlds, as this, “ … no longer captures <strong>the</strong> complex practices associated withonl<strong>in</strong>e technologies as <strong>the</strong>y become thoroughly embedded <strong>in</strong> <strong>the</strong> rout<strong>in</strong>es of everyday life…self-actualization <strong>in</strong>creas<strong>in</strong>gly <strong>in</strong>cludes a careful negotiation between <strong>the</strong> opportunities(for identity, <strong>in</strong>timacy, sociability) and risks (regard<strong>in</strong>g privacy, misunderstand<strong>in</strong>g, abuse)afforded by <strong>in</strong>ternet-mediated communication” (p. 407).Wickman, Anderson and Greenberg (<strong>in</strong> press) have emphasised <strong>the</strong> critical importanceof <strong>in</strong>volv<strong>in</strong>g young people <strong>in</strong> shap<strong>in</strong>g, plann<strong>in</strong>g and conduct<strong>in</strong>g health promotion<strong>in</strong>terventions. These authors suggest that, “The belief that <strong>the</strong>y will not get hurt contributes<strong>to</strong> teens th<strong>in</strong>k<strong>in</strong>g that <strong>the</strong>y are capable of handl<strong>in</strong>g risks and that <strong>the</strong>y can get away withit. This re<strong>in</strong>forces <strong>the</strong> belief that “it won’t happen <strong>to</strong> me”, thus contribut<strong>in</strong>g <strong>to</strong> fur<strong>the</strong>r<strong>in</strong>volvement <strong>in</strong> risk behaviours” (p. 8). Liv<strong>in</strong>gs<strong>to</strong>ne (2008) has also suggested that for thoseyoung people focused on ‘identity as connection’, onl<strong>in</strong>e risks might arise because of <strong>the</strong>irconfidence that <strong>the</strong>y can know and trust people with whom <strong>the</strong>y feel <strong>in</strong>timate, as well asfrom <strong>the</strong> possibility that o<strong>the</strong>rwise <strong>the</strong>y may be neglected or excluded from <strong>the</strong>ir peergroup. Indeed, as mentioned earlier <strong>in</strong> this paper, some young people report that <strong>the</strong>y see66|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


some people <strong>the</strong>y connect with onl<strong>in</strong>e as <strong>the</strong>ir friends and some will describe <strong>the</strong>mselvesas ‘<strong>in</strong> love’ with a particular contact despite <strong>the</strong> fact that <strong>the</strong>y have not met <strong>the</strong>m offl<strong>in</strong>e.However, as we will go on <strong>to</strong> consider, some of <strong>the</strong> risks posed onl<strong>in</strong>e do not relate <strong>to</strong> adultactivities, but <strong>to</strong> those of o<strong>the</strong>r children. Rickert and Ryan (2007) have suggested that weshould no longer conceptualise <strong>the</strong> Internet as <strong>the</strong> greatest source of abuse and exploitationfor young people, nor can we depict adolescents as merely play<strong>in</strong>g a passive, recipientrole while onl<strong>in</strong>e. These authors have emphasised that it is essential that we recognise <strong>the</strong>reciprocal nature of harassment and solicitation <strong>in</strong> order <strong>to</strong> design research and practicethat are both representative and mean<strong>in</strong>gful. This sentiment is also echoed by David-Ferdon and Hertz (2007), “… new media technologies are facilitat<strong>in</strong>g <strong>the</strong> development ofa new group of adolescents who under traditional circumstances are not victimized by <strong>the</strong>irpeers as well as provid<strong>in</strong>g ano<strong>the</strong>r conduit for perpetra<strong>to</strong>rs <strong>to</strong> cont<strong>in</strong>ue <strong>to</strong> victimize youthwho are already targets at school” (p. S2).This relationship between harassment and unwanted sexual solicitation possibly lead<strong>in</strong>g <strong>to</strong>sexual exploitation is a difficult one. Ybarra, Espelage and Mitchell (2007) have noted thatprevious research has suggested that <strong>the</strong>re may be an overlap between bully<strong>in</strong>g and sexualharassment perpetration and victimization. Their ‘Grow<strong>in</strong>g Up with Media’ survey of 158810–15 year olds <strong>in</strong>dicated that <strong>in</strong>volvement <strong>in</strong> Internet harassment and unwanted sexualsolicitation was associated with concurrent reports of psychosocial problems <strong>in</strong>clud<strong>in</strong>gsubstance use; <strong>in</strong>volvement <strong>in</strong> offl<strong>in</strong>e victimisation and perpetration of relational, physicaland sexual aggression; del<strong>in</strong>quent peers; a propensity <strong>to</strong> respond <strong>to</strong> stimuli with anger;poor emotional bonds with care givers, and poor care giver moni<strong>to</strong>r<strong>in</strong>g; as compared <strong>to</strong>youth with little or no <strong>in</strong>volvement. This was especially true for perpetra<strong>to</strong>r-victims ofInternet harassment and unwanted sexual solicitation. From <strong>the</strong> same analysis, Ybarra,Diener-West and Leaf (2007) <strong>in</strong>dicated that young people who were harassed onl<strong>in</strong>ewere significantly more likely <strong>to</strong> also report two or more detentions or suspensions fromschool, and skipp<strong>in</strong>g school <strong>in</strong> <strong>the</strong> previous year. Of special concern was that young peoplebe<strong>in</strong>g targeted by Internet harassment were eight times more likely than all o<strong>the</strong>r youth<strong>to</strong> concurrently report carry<strong>in</strong>g a weapon <strong>to</strong> school <strong>in</strong> <strong>the</strong> 30 days prior <strong>to</strong> <strong>the</strong> survey. Thismay be ano<strong>the</strong>r example of young people generat<strong>in</strong>g <strong>the</strong>ir own solutions <strong>to</strong> risk, with <strong>the</strong>potentially unfortunate consequences of elevat<strong>in</strong>g ra<strong>the</strong>r than reduc<strong>in</strong>g <strong>the</strong> possibility ofharm. It is also ano<strong>the</strong>r very good example of <strong>the</strong> reciprocal nature of onl<strong>in</strong>e and offl<strong>in</strong>ebehaviours.We will later consider <strong>the</strong> impact of educational programmes on children’s onl<strong>in</strong>e behaviour,but even from our discussion <strong>to</strong> date it is apparent that very often it is not that childrendo not understand potential risks, but that <strong>the</strong>y chose <strong>to</strong> discount or m<strong>in</strong>imise <strong>the</strong>m, and<strong>the</strong>y would certa<strong>in</strong>ly prefer not <strong>to</strong> share <strong>the</strong> consequences of both <strong>the</strong>ir mistakes and <strong>the</strong><strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |67


malevolent behaviour of o<strong>the</strong>rs. Aslanidou and Menexes (2008), <strong>in</strong> a study of Greek youngpeople, suggested that <strong>the</strong> Internet is a place and space safeguard<strong>in</strong>g <strong>the</strong> privacy of youngpeople, with <strong>the</strong> majority of <strong>the</strong>m preferr<strong>in</strong>g <strong>to</strong> surf alone. Yet <strong>the</strong>re is an obvious tensionbetween <strong>the</strong> bid <strong>to</strong> protect children, through education, advice and <strong>the</strong> use of proactivetechnical strategies, and <strong>the</strong> acknowledgements of <strong>the</strong> rights of children <strong>to</strong> explore <strong>the</strong>irsexuality <strong>in</strong> <strong>the</strong> context of this mediated environment. Authors such as Berson and Berson(2005) have contended, from <strong>the</strong>ir analysis of US and New Zealand youth, that a significantnumber of adolescent girls are engag<strong>in</strong>g <strong>in</strong> risky behaviours, <strong>in</strong>clud<strong>in</strong>g disclos<strong>in</strong>g personal<strong>in</strong><strong>format</strong>ion, send<strong>in</strong>g personal pho<strong>to</strong>graphs <strong>to</strong> onl<strong>in</strong>e acqua<strong>in</strong>tances and arrang<strong>in</strong>g face <strong>to</strong>face meet<strong>in</strong>gs. Clearly this data is at odds with what has been suggested by more recentstudies, and it may be that <strong>the</strong> impact of education programmes is be<strong>in</strong>g seen <strong>in</strong> a reductionof risk-tak<strong>in</strong>g behaviours, but <strong>the</strong>se authors suggest that <strong>the</strong>re is a lapse <strong>in</strong> preventative<strong>in</strong>terventions <strong>to</strong> create and ma<strong>in</strong>ta<strong>in</strong> awareness and safety for young people.The tensions between protect<strong>in</strong>g children’s privacy onl<strong>in</strong>e while reduc<strong>in</strong>g risk was addressedby Lw<strong>in</strong>, Stanaland and Miyazaki (2008). They argued that protect<strong>in</strong>g children on <strong>the</strong>Internet generally takes two forms: regula<strong>to</strong>ry <strong>in</strong>tervention and parent mediation. The USFederal Trade Commission (FTC) found that many websites were reluctant <strong>to</strong> protect<strong>the</strong> privacy of children and suggested legislation <strong>to</strong> reduce <strong>the</strong> unnecessary solicitationof personal <strong>in</strong><strong>format</strong>ion from children (FTC, 1998). The result was <strong>the</strong> implementationof <strong>the</strong> <strong>Child</strong>ren’s Onl<strong>in</strong>e Privacy Protection Act (COPPA), which sets guidel<strong>in</strong>es for onl<strong>in</strong>esafeguards designed <strong>to</strong> prevent <strong>the</strong> collection of personally identifiable <strong>in</strong><strong>format</strong>ion fromchildren unless parental consent is given (COPPA, 1998). With regard <strong>to</strong> <strong>the</strong> role of parents,research has suggested that active moni<strong>to</strong>r<strong>in</strong>g of children’s onl<strong>in</strong>e activities by parents canhelp guard children from <strong>the</strong> threats of <strong>the</strong> Internet. Valcke, Schellens, Van Keer andGerarts (2007) suggested clear evidence of unsafe Internet practices, and that only parentcontrol seemed <strong>to</strong> be significantly related <strong>to</strong> lower degrees of unsafe behaviours. This studyfound that no school based <strong>in</strong>terventions seemed <strong>to</strong> be associated with <strong>the</strong> level of unsafeInternet use. Similarly, Flem<strong>in</strong>g et al. (2006), <strong>in</strong> <strong>the</strong>ir study of older Australian children (13–16 year olds), found that with regard <strong>to</strong> exposure <strong>to</strong> <strong>in</strong>appropriate material and behavioursno differences were found accord<strong>in</strong>g <strong>to</strong> whe<strong>the</strong>r block<strong>in</strong>g or filter<strong>in</strong>g software was <strong>in</strong>stalled,but that <strong>the</strong>re were significant differences <strong>in</strong> onl<strong>in</strong>e safety practices. Younger participants(13–14 year olds) and those participants whose parents had not discussed Internet safetywith <strong>the</strong>m were less safety conscious. Steevens and Webster (2008), <strong>in</strong> a study of Canadianyouth (13–17 years old), <strong>in</strong>dicated that high levels of parental supervision reduce but donot elim<strong>in</strong>ate risk. These f<strong>in</strong>d<strong>in</strong>gs are at odds with blanket recommendations made byauthors such as Blev<strong>in</strong>s and An<strong>to</strong>n (2008) who, <strong>in</strong> <strong>the</strong> context of US Congressional efforts<strong>to</strong> protect children from Internet pornography, advocate <strong>the</strong> use of block<strong>in</strong>g and filter<strong>in</strong>gsoftware.68|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Two studies by Lw<strong>in</strong> et al. (2008) looked at <strong>the</strong> effectiveness of various mediation strategies<strong>in</strong> regulat<strong>in</strong>g children’s onl<strong>in</strong>e disclosure behaviour, both <strong>in</strong> <strong>the</strong> presence and absence ofwebsite safeguards. These authors suggested that <strong>the</strong>re was a blurred dist<strong>in</strong>ction betweensocial and commercial content <strong>in</strong> websites target<strong>in</strong>g children. This is of concern as previousresearch has suggested that <strong>in</strong>centives provided by commercial websites have been found<strong>to</strong> be more attractive <strong>to</strong> younger consumers than older ones. In <strong>the</strong> first study of youngerchildren (319 respondents with an average age of 10.9 years), <strong>the</strong> authors found that generalparental mediation strategies reduced children’s onl<strong>in</strong>e disclosure of sensitive <strong>in</strong><strong>format</strong>ion,and <strong>the</strong>re was an <strong>in</strong>teraction between parental mediation and website safeguards. However,<strong>the</strong> authors felt that parents’ roles as socialisation agents for <strong>the</strong>ir children tend <strong>to</strong> decreasewith <strong>the</strong> child’s age, and that over time adolescents’ perceived consequences of noncompliancewith parents’ <strong>in</strong>structions was less severe. Their second study <strong>the</strong>refore exam<strong>in</strong>edtwo groups of older children (13–14 and 15–17 years). Active mediation was shown <strong>to</strong> bemore effective than regulated or no parental mediation, and <strong>the</strong> effectiveness of websitesafeguards for active mediation participants was more valid. However, <strong>the</strong> older group ofadolescents was likely <strong>to</strong> react negatively <strong>to</strong> <strong>the</strong> presence of website safeguards, essentiallyexpress<strong>in</strong>g <strong>the</strong> <strong>in</strong>tention <strong>to</strong> circumvent <strong>the</strong> safeguard and disclose more <strong>in</strong><strong>format</strong>ion thanwhen <strong>the</strong> safeguard was absent.It appears <strong>the</strong>n that older children are not only reluctant <strong>to</strong> share <strong>in</strong><strong>format</strong>ion about<strong>the</strong>ir onl<strong>in</strong>e activities, but when attempts are made <strong>to</strong> curtail some of <strong>the</strong>ir behavioursfor some young people this is associated with a likely <strong>in</strong>crease <strong>in</strong> <strong>the</strong> behaviours targeted.The reality appears <strong>to</strong> be that many older children behave <strong>in</strong> ways that make many adultsuncomfortable <strong>in</strong> terms of access<strong>in</strong>g pornographic or violent material (eg, Carroll, Padilla-Walker, Nelson, Olson, Barry and Madsen, 2008) and engag<strong>in</strong>g <strong>in</strong> what might be seenas occasional unsafe practices. Subrahmanyam, Smahel and Greenfield (2006) sampledconversations from moni<strong>to</strong>red and unmoni<strong>to</strong>red teen chatrooms and found that morethan half of <strong>the</strong>ir respondents communicated identity <strong>in</strong><strong>format</strong>ion, most frequentlygender. They compensated for text based chat environments by provid<strong>in</strong>g <strong>in</strong><strong>format</strong>ionabout <strong>the</strong>mselves that would be visible and obvious <strong>in</strong> face-<strong>to</strong>-face communication. Sexual<strong>the</strong>mes constituted 5% of all utterances and bad or obscene language 3%. Participants whoself-identified by gender produced more implicit sexual communication. Of <strong>in</strong>terest, <strong>the</strong>protected environment of moni<strong>to</strong>red chat demonstrated less explicit sexuality and fewerobscenities. While this may be attributed <strong>to</strong> <strong>the</strong> moni<strong>to</strong>r<strong>in</strong>g process, it may also be <strong>the</strong> casethat differ<strong>in</strong>g populations of young people were attracted <strong>to</strong> different k<strong>in</strong>ds of chatrooms.This seems <strong>to</strong> largely mirror a lot of adult activity onl<strong>in</strong>e. Interviews with children conductedby ECPAT International <strong>in</strong> Thailand suggested that sexualised chat was not only a featureof western children, nor is lack of English a barrier, as <strong>in</strong>terfaces exist <strong>in</strong> most languagesfor popular web applications. Dur<strong>in</strong>g <strong>the</strong> same <strong>in</strong>terviews it was noted by one child that<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |69


mobile <strong>to</strong>p-ups are used as bait for young people <strong>to</strong> pose <strong>in</strong> compromis<strong>in</strong>g ways. In some<strong>in</strong>stances, <strong>the</strong> urgency and need <strong>to</strong> keep <strong>the</strong>ir mobile phones <strong>in</strong> a functional condition faroutweighs <strong>the</strong> need for personal safety and protection.What we see <strong>in</strong> this literature, <strong>the</strong>n, are very conflict<strong>in</strong>g views. From <strong>the</strong> assertion byKierkegaard (2008) that, “Aside from chat rooms, groom<strong>in</strong>g is facilitated through mobiles,email exchange, blogs and o<strong>the</strong>r types of social network<strong>in</strong>g sites where children can create<strong>the</strong>ir own social contents and make it accessible <strong>to</strong> o<strong>the</strong>r users. At <strong>the</strong> same time <strong>the</strong>ybecome targets <strong>to</strong> preda<strong>to</strong>rs” (p. 43), which emphasised that children are vulnerable andopen <strong>to</strong> exploitation, <strong>to</strong> a perspective that argues that <strong>the</strong> exclusion of young people from<strong>the</strong> Internet is one of <strong>the</strong> many examples of <strong>the</strong> dim<strong>in</strong>ish<strong>in</strong>g public space that is available<strong>to</strong> young people <strong>in</strong> this post-modern world. In this regard, Hillier and Harrison (2007)have drawn our attention <strong>to</strong> one ‘space-deprived’ group of marg<strong>in</strong>alised young people:same-sex attracted. These authors assert that <strong>in</strong> Australia opportunities <strong>to</strong> live <strong>the</strong>ir sexualdifferences openly rema<strong>in</strong>s limited, and <strong>the</strong>y explore <strong>the</strong> role of <strong>the</strong> Internet as a space<strong>in</strong> which some important sexuality work can be done. They found that <strong>the</strong> Internet wasprovid<strong>in</strong>g young people with <strong>the</strong> space <strong>to</strong> practise six different aspects of <strong>the</strong>ir sexual loves:identity, friendship, com<strong>in</strong>g-out, <strong>in</strong>timate relationships, sex and community.There are considerable difficulties <strong>in</strong> deterr<strong>in</strong>g children and adolescents from onl<strong>in</strong>epractices that might result <strong>in</strong> sexual abuse and exploitation. There are clearly tensionsbetween protect<strong>in</strong>g children’s privacy onl<strong>in</strong>e, while reduc<strong>in</strong>g risk, and this is a particularissue <strong>in</strong> relation <strong>to</strong> older children.4.4 Explor<strong>in</strong>g new terri<strong>to</strong>ries vs. unsafe practicesWe can maybe add <strong>to</strong> this by suggest<strong>in</strong>g that for many young people <strong>the</strong> Interne<strong>to</strong>ffers opportunity for an exploration of sexuality <strong>in</strong> a relatively safe environment. (Seealso <strong>the</strong> comment made on <strong>the</strong> <strong>in</strong>crease <strong>in</strong> consensual webcam sex between adolescentsmade <strong>in</strong> a previous section of this paper). Uecker, Angotti and Regnerus (<strong>in</strong> press) havesuggested (although with no explicit mention of <strong>the</strong> new technologies) that, “Adolescentsespoused <strong>in</strong> this new middle class sexual script are generally not <strong>in</strong>terested <strong>in</strong> rema<strong>in</strong><strong>in</strong>gvirg<strong>in</strong>s per se (for moral reasons) but never<strong>the</strong>less may exhibit <strong>the</strong> pattern of behaviouridentified as technical virg<strong>in</strong>ity. Instead, <strong>the</strong>y are <strong>in</strong>terested <strong>in</strong> rema<strong>in</strong><strong>in</strong>g free from <strong>the</strong>burden of pregnancy and <strong>the</strong> sorrow of STDs, so <strong>the</strong>y trade <strong>the</strong> “higher” pleasures ofactual <strong>in</strong>tercourse for a set of low risk substitutes: coupled oral sex, mutual masturbation,and solitary pornography use (and masturbation)” (p. 4). In a very different context (but70|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


perhaps reach<strong>in</strong>g <strong>the</strong> same conclusions), Lamarre (2006) has talked about pla<strong>to</strong>nic sex andShôjo Anime, <strong>in</strong> that it not only presents pornography for young men as acceptable but alsoendorses pornography as a solution <strong>to</strong> <strong>the</strong> problem of human sexuality, “… what one mightth<strong>in</strong>k of as sex with images, a k<strong>in</strong>d of safe sex <strong>in</strong> which people don’t <strong>to</strong>uch, <strong>in</strong> which <strong>the</strong>reis no penetration, but only a play with surfaces” (p. 58).However, Heverly (2008) has po<strong>in</strong>ted out that <strong>the</strong>re is little, if any, explicit recognitionamong young people that digital media may not only be used by <strong>the</strong>m, but <strong>in</strong> fact may use<strong>the</strong>m. This is expressed very powerfully <strong>in</strong> <strong>the</strong> follow<strong>in</strong>g. “… when young people become<strong>the</strong> subject (or object, if you will) of digital media, <strong>the</strong>y are used by it; when a digitalmedia artefact – a digital media file of any type, for example video, audio, still image, text– that features <strong>the</strong>m is created, part of <strong>the</strong>m becomes entangled with <strong>the</strong> digital mediaand forms <strong>the</strong> substance of it” (p. 199). Heverly (2008) dist<strong>in</strong>guished between those youngpeople who actively create media files <strong>in</strong> which <strong>the</strong>y are embedded and those for whom <strong>the</strong>activity is passive. This is very similar <strong>to</strong> <strong>the</strong> descriptive categories used earlier <strong>to</strong> describechildren’s level of engagement <strong>in</strong> <strong>the</strong> process of image production and distribution. Such ayoung person nei<strong>the</strong>r participates <strong>in</strong> <strong>the</strong> decision <strong>to</strong> create <strong>the</strong> artefact, nor directs any par<strong>to</strong>f its com<strong>in</strong>g <strong>in</strong><strong>to</strong> be<strong>in</strong>g. They may not even know that <strong>the</strong> digital media are be<strong>in</strong>g created,although <strong>the</strong>y may later acquire knowledge of it. Between <strong>the</strong>se two extremes exist manysituations where <strong>the</strong> young person may have knowledge of or may agree <strong>to</strong> <strong>the</strong> artefact’screation but cannot exercise control over its creation. As we have seen, <strong>the</strong> young personalso lacks control on many levels – legal, cultural, normative, technological – over <strong>the</strong>artefacts after <strong>the</strong>y have been created (Heverly, 2008). Th<strong>in</strong>gs have changed <strong>in</strong> <strong>the</strong> movefrom analogue <strong>to</strong> digital, and where <strong>the</strong> products of explor<strong>in</strong>g new sexual terri<strong>to</strong>ries were,<strong>in</strong> part, controllable through <strong>the</strong>ir potential destruction, this is no longer <strong>the</strong> case.While Hillier and Harrison (2007) have noted <strong>the</strong> importance of <strong>the</strong> new technologiesas provid<strong>in</strong>g a space for same-sex attracted children <strong>to</strong> explore <strong>the</strong>ir sexuality, it is alsoimportant <strong>to</strong> note <strong>the</strong> special vulnerability of children who are gay, lesbians, bi-sexual ortrans-sexual. This is a particularly at-risk group for sexual exploitation as <strong>the</strong>y are morelikely <strong>to</strong> use <strong>the</strong> new technologies <strong>to</strong> explore <strong>the</strong>ir sexuality, given <strong>the</strong> limited access <strong>to</strong> socialsupport provided by many countries (Sved<strong>in</strong> and Priebe, 2007). This is also highlightedby <strong>the</strong> report of <strong>the</strong> Special Rapporteur on <strong>the</strong> sale of children, child prostitution andchild pornography (Petit, 2005), who concluded that gay, lesbian, bisexual and transgenderadolescents are more exposed <strong>to</strong> violence, especially psychological violence. Hostilereactions <strong>to</strong> <strong>the</strong>ir sexuality by society may leave <strong>the</strong>m alone <strong>in</strong> a marg<strong>in</strong>alised situationthat <strong>the</strong>n exposes <strong>the</strong>m <strong>to</strong> exploitation.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |71


Young people may fail <strong>to</strong> understand that <strong>in</strong> us<strong>in</strong>g technology <strong>the</strong>y are potentially used byit. This may be of particular concern <strong>in</strong> relation <strong>to</strong> gay, lesbian, bisexual and transgenderadolescents who may exhibit special vulnerabilities and who may be open <strong>to</strong> exploitationby o<strong>the</strong>rs with<strong>in</strong> <strong>the</strong> onl<strong>in</strong>e environment.4.5 Young people’s sexually problematic behaviours and <strong>the</strong> newtechnologies4.5.1 Sexual solicitationTo date, <strong>the</strong>re is very little published research that helps us understand what it is thatyoung people do (as opposed <strong>to</strong> what <strong>the</strong>y may be exposed <strong>to</strong>) that constitutes sexuallyproblematic behaviour <strong>in</strong> relation <strong>to</strong> <strong>the</strong> new technologies (Quayle, 2007). In <strong>the</strong> follow<strong>in</strong>gwe are go<strong>in</strong>g <strong>to</strong> reconsider some of <strong>the</strong> behaviours recently exam<strong>in</strong>ed <strong>in</strong> <strong>the</strong> context ofadult offenders and see how <strong>the</strong>y apply <strong>to</strong> young people. The first of <strong>the</strong>se, solicit<strong>in</strong>gactivities, was explored <strong>in</strong> <strong>the</strong> YISS 1 study by F<strong>in</strong>kelhor et al. (2000) through <strong>the</strong> analysisof telephone <strong>in</strong>terview data from a large sample (1501) of young Internet users about <strong>the</strong>irexperiences onl<strong>in</strong>e. Their f<strong>in</strong>d<strong>in</strong>gs <strong>in</strong>dicated that one <strong>in</strong> five children who regularly used<strong>the</strong> Internet experienced a sexual solicitation or approach over <strong>the</strong> year exam<strong>in</strong>ed by <strong>the</strong>study. One <strong>in</strong> 33 received an aggressive sexual solicitation, which <strong>in</strong>cluded be<strong>in</strong>g asked <strong>to</strong>meet offl<strong>in</strong>e, telephone calls or th<strong>in</strong>gs sent through <strong>the</strong> post. One <strong>in</strong> four had unwantedexposure <strong>to</strong> sexual images, and one <strong>in</strong> 17 were threatened or harassed. Approximately onequarter of <strong>the</strong> children who reported <strong>the</strong>se <strong>in</strong>cidents were distressed by <strong>the</strong>m. The datafrom F<strong>in</strong>kelhor et al.’s (2000) survey <strong>in</strong>dicated that juveniles made up 48% of <strong>the</strong> overallsolicitations and 48% of <strong>the</strong> aggressive solicitations aga<strong>in</strong>st youth (27% were of unknownage). These authors concluded that not all of <strong>the</strong> sexual solici<strong>to</strong>rs on <strong>the</strong> Internet fit <strong>the</strong>media stereotype of an older, male preda<strong>to</strong>r. Many were young and some were women. Anumber of <strong>the</strong> sexual solicitations appeared <strong>to</strong> be propositions for ‘cybersex’, and <strong>in</strong> almosthalf of <strong>the</strong> <strong>in</strong>cidents <strong>the</strong> young person did not tell anyone about <strong>the</strong> episode.Many of <strong>the</strong> stereotypes we have of those who sexually solicit children with<strong>in</strong> <strong>the</strong> onl<strong>in</strong>eenvironment have been challenged, and it is important that we acknowledge this <strong>in</strong> bothunderstand<strong>in</strong>g who is at risk and that o<strong>the</strong>r young people may be <strong>the</strong> perpetra<strong>to</strong>rs.72|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


4.5.2 Young people access<strong>in</strong>g child abuse imagesThe second group of sexually abusive practices by adults and young people, <strong>in</strong>volv<strong>in</strong>gabusive images of children, were described <strong>in</strong> an important research report exam<strong>in</strong><strong>in</strong>g cases<strong>in</strong>vestigated by <strong>the</strong> Department of Internal Affairs Censorship Compliance Unit (CCU)<strong>in</strong> New Zealand. The results of this study were subsequently updated later that year byWilson and Andrews (2004), us<strong>in</strong>g <strong>the</strong> same methodology, and <strong>in</strong>clud<strong>in</strong>g an additional 79offenders. Their results <strong>in</strong>dicated that of <strong>the</strong> 184 people <strong>in</strong> <strong>the</strong> study, only one was female,and 89% were classified as New Zealand Europeans. The largest s<strong>in</strong>gle group of offenders,which rema<strong>in</strong>ed <strong>the</strong> same as <strong>in</strong> Carr’s (2004) study, “cont<strong>in</strong>ues <strong>to</strong> be aged between 15 and19 years. Those under 20 years of age at <strong>the</strong> time of detection comprise a quarter (24.3%) ofall offenders” (p. 2). The largest occupational group was students (32.4%), followed by thosewhose career was <strong>in</strong> <strong>in</strong><strong>format</strong>ion technology (19.5%). The majority of <strong>the</strong> offenders werefound <strong>to</strong> be <strong>in</strong> possession of child sex abuse material, with images of bestiality and materialconta<strong>in</strong><strong>in</strong>g <strong>the</strong> use of ur<strong>in</strong>e and excrement be<strong>in</strong>g <strong>the</strong> second and third most commonlyfound sorts of objectionable material. These two New Zealand reports provided <strong>the</strong> firstsystematic analysis of seized materials. They caused considerable concern because <strong>the</strong>yidentified a high number of young people engaged <strong>in</strong> <strong>the</strong> collection of illegal images, andthis was substantiated <strong>in</strong> <strong>the</strong> second data set. The results were somewhat different fromthose reported by Wolak et al. (2005) <strong>in</strong> <strong>the</strong> US <strong>in</strong> a study called N-JOV (National JuvenileOnl<strong>in</strong>e Victimisation Study) where only 3% were younger than 18.However, it should be noted that all of <strong>the</strong> school students were found <strong>to</strong> trade and/orpossess images of children and young people engaged <strong>in</strong> explicit sexual activity, <strong>in</strong>clud<strong>in</strong>gimages of children aged between 2 and 7 years, giv<strong>in</strong>g cause for concern about <strong>the</strong>iractivities. Also of concern was that school children were also proportionately more likely<strong>to</strong> trade and/or possess images of children and young people that suggested or implied<strong>in</strong>cest. None<strong>the</strong>less, Carr (2004) felt that <strong>the</strong> data did provide clues as <strong>to</strong> <strong>the</strong> motivationfor <strong>in</strong>itially access<strong>in</strong>g this material and that it offered support for, “<strong>the</strong> concept of asexually curious group of adolescents”. In contrast <strong>to</strong> <strong>the</strong> results of school students, those<strong>in</strong>dividuals who were identified as tertiary students aged under 25 years and non-studentsaged under 25 were found <strong>to</strong> demonstrate a much greater range of image preferences andwere identified as be<strong>in</strong>g proportionately more likely <strong>to</strong> collect images portray<strong>in</strong>g babies as<strong>the</strong> subject of sexual exploitation. In addition, 60% of those aged under 25 spent less than10 hours per week us<strong>in</strong>g <strong>the</strong> Internet. The research did not provide any evidence that <strong>the</strong>se<strong>in</strong>dividuals were <strong>in</strong>volved <strong>in</strong> <strong>the</strong> commission of physical sexual offences aga<strong>in</strong>st children,but <strong>the</strong> author expressed concern about <strong>the</strong> nature of <strong>the</strong> images <strong>in</strong> <strong>the</strong> light of researchsuggest<strong>in</strong>g offence behaviour beg<strong>in</strong>n<strong>in</strong>g <strong>in</strong> adolescence.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |73


The results of <strong>the</strong> New Zealand study also <strong>in</strong>dicated that offenders identified as secondaryschool students were more likely than <strong>the</strong> o<strong>the</strong>rs <strong>to</strong> collect large numbers of imagesthat were well <strong>in</strong>dexed. They were also more frequently associated with <strong>the</strong> collection ofimages of older children and teenagers, portrayed with o<strong>the</strong>r children, and were muchless likely <strong>to</strong> collect images of adult rape or <strong>the</strong> <strong>to</strong>rture of adults or children. Carr (2004)concluded that what is worry<strong>in</strong>g was that <strong>the</strong>ir Internet-based exploration had led <strong>the</strong>m<strong>to</strong> subject matter <strong>in</strong>volv<strong>in</strong>g largely deviant activities at a time when <strong>the</strong>y were most likely<strong>to</strong> be <strong>in</strong>fluenced by <strong>the</strong> message <strong>the</strong>y convey. Moultrie (2006) described <strong>the</strong> referral ofseven adolescent boys <strong>to</strong> The Tai<strong>the</strong> Service <strong>in</strong> 2001–2004 (a Barnardos’ UK project whereyoung people who have engaged <strong>in</strong> sexually harmful behaviour are referred for assessmentand longer-term <strong>in</strong>tervention work). Their referral followed arrest for possession and/ordistribution of child abuse images. The number of abuse images of which <strong>the</strong> young peoplewere found <strong>in</strong> possession varied from 15 <strong>to</strong> ‘several hundred’ (police <strong>in</strong><strong>format</strong>ion). Themajority were also charged with distribution, ei<strong>the</strong>r send<strong>in</strong>g images via email or mak<strong>in</strong>g<strong>the</strong>m available <strong>to</strong> o<strong>the</strong>rs on ‘peer-<strong>to</strong>-peer’ networks. Ages on referral ranged from 13 <strong>to</strong>16 years, and all but one child was identified as be<strong>in</strong>g white-westernised. Moultrie (2006)said of <strong>the</strong>se children, “Two of <strong>the</strong> young people <strong>in</strong> <strong>the</strong> <strong>in</strong>ternet sample were known <strong>to</strong>have sexually offended <strong>in</strong> addition <strong>to</strong> <strong>the</strong>ir <strong>in</strong>dex offence... One young person was arrestedfor tak<strong>in</strong>g <strong>in</strong>decent pho<strong>to</strong>graphs of local children. Ano<strong>the</strong>r had sexually assaulted hisyounger sister and ano<strong>the</strong>r younger girl, which he admitted immediately follow<strong>in</strong>g hisarrest for <strong>the</strong> Internet offences. Two young people also transmitted images of <strong>the</strong>mselvesmasturbat<strong>in</strong>g via webcam… There were no specific allegations <strong>in</strong> relation <strong>to</strong> <strong>the</strong> o<strong>the</strong>rboys, although it became apparent dur<strong>in</strong>g <strong>in</strong>volvement that a fur<strong>the</strong>r three were engag<strong>in</strong>g<strong>in</strong> ‘risky’ behaviours, ie, follow<strong>in</strong>g children, <strong>in</strong>volv<strong>in</strong>g <strong>the</strong>mselves <strong>in</strong> child focused activitiesand us<strong>in</strong>g film record<strong>in</strong>g equipment <strong>in</strong> <strong>the</strong> community” (p. 168). What is similar <strong>to</strong> <strong>the</strong>results from Carr’s study, and of concern given high levels of exposure <strong>to</strong> pornography, isthat approximately half <strong>the</strong> young people stated <strong>the</strong>y first used <strong>the</strong> Internet <strong>to</strong> view adultpornography, which was heterosexual and/or homosexual. A similar proportion said that<strong>the</strong>y began us<strong>in</strong>g chatrooms <strong>to</strong> explore <strong>the</strong>ir sexual orientation. Conversations with o<strong>the</strong>rsbecame <strong>in</strong>creas<strong>in</strong>gly sexual and, over time, turned <strong>to</strong> <strong>in</strong>creas<strong>in</strong>gly younger adolescents andchildren. The boys were aware at <strong>the</strong> outset, or became aware dur<strong>in</strong>g <strong>the</strong> course of <strong>the</strong>communications, that <strong>the</strong>y were correspond<strong>in</strong>g with adults, and this has resonances with<strong>the</strong> work of Wolak et al. (2008). Moultrie (2006) concluded that, “Young people <strong>in</strong> thissample have undoubtedly been victimized, <strong>in</strong> that adults have sent <strong>the</strong>m abuse images andcommunicated with <strong>the</strong>m about <strong>the</strong> sexual abuse of younger children. However, <strong>to</strong> regard<strong>the</strong>se young people solely as victims may result un<strong>in</strong>tentionally <strong>in</strong> <strong>the</strong> neglect of <strong>the</strong> needswe would identify for <strong>the</strong>m <strong>in</strong> address<strong>in</strong>g <strong>the</strong>ir sexual arousal and attitude <strong>to</strong>wards children<strong>in</strong>volved <strong>in</strong> <strong>the</strong> abuse images. Onl<strong>in</strong>e relationships and <strong>the</strong> ongo<strong>in</strong>g <strong>in</strong>fluence of such,should not be dismissed” (p. 173).74|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Some abusers <strong>in</strong>tent on groom<strong>in</strong>g young people onl<strong>in</strong>e <strong>in</strong> order <strong>to</strong> meet and abuse <strong>the</strong>moffl<strong>in</strong>e <strong>in</strong>troduce <strong>the</strong>m <strong>to</strong> different forms of pornography, <strong>in</strong>clud<strong>in</strong>g illegal material. Palmer(2004) suggested that this is generally done with two aims <strong>in</strong> m<strong>in</strong>d: <strong>to</strong> desensitise <strong>the</strong>young person <strong>to</strong> sexualised activities which may become <strong>in</strong>creas<strong>in</strong>gly abusive, and <strong>to</strong> feed<strong>the</strong> groomer’s fantasies of <strong>in</strong>troduc<strong>in</strong>g a young person <strong>to</strong> this material and <strong>to</strong> encourage<strong>the</strong>m <strong>to</strong> develop masturba<strong>to</strong>ry fantasies fuelled by <strong>the</strong> images. In such circumstances,<strong>the</strong> perpetra<strong>to</strong>r encourages exposure of <strong>the</strong> young person <strong>to</strong> adult pornography as away of demonstrat<strong>in</strong>g ‘preferred’ or ‘fantasised’ sexual activity <strong>to</strong> <strong>the</strong> young person andas a demonstration of what activity <strong>the</strong> adult wishes <strong>to</strong> engage <strong>in</strong>. Dur<strong>in</strong>g this process,<strong>the</strong> young person is unlikely <strong>to</strong> be aware of <strong>the</strong> motivation beh<strong>in</strong>d <strong>the</strong>ir onl<strong>in</strong>e ‘friend’s’suggestions but could become fixated on and develop masturba<strong>to</strong>ry fantasies <strong>to</strong> imageswhich are deemed illegal. A UK case example, which reflects Moultrie’s conclusions, isthat of a 13-year-old boy <strong>in</strong>troduced <strong>to</strong> adult pornography onl<strong>in</strong>e. He was encouraged <strong>to</strong>masturbate <strong>to</strong> this material and <strong>the</strong>n, over time, <strong>in</strong>troduced <strong>to</strong> illegal material of childrenbe<strong>in</strong>g sexually abused. By <strong>the</strong> time <strong>the</strong> police arrested this young person follow<strong>in</strong>g a ’st<strong>in</strong>g’operation, he was masturbat<strong>in</strong>g <strong>to</strong> images of very young children be<strong>in</strong>g buggered andraped. Follow<strong>in</strong>g a 6-month assessment period of his <strong>in</strong>tervention needs, <strong>the</strong> <strong>the</strong>rapistswere unable <strong>to</strong> f<strong>in</strong>d any contra-<strong>in</strong>dica<strong>to</strong>rs with<strong>in</strong> <strong>the</strong> young person’s background, family,school<strong>in</strong>g and attitudes which would cause <strong>the</strong>m <strong>to</strong> have concern about him, o<strong>the</strong>r thanhe had accessed abusive images of children. On fur<strong>the</strong>r discussion with <strong>the</strong> police and an<strong>in</strong>-depth exam<strong>in</strong>ation of <strong>the</strong> forensic evidence, it transpired that <strong>the</strong> young person hadbeen groomed by an adult who was <strong>in</strong>tent on eventually meet<strong>in</strong>g him offl<strong>in</strong>e <strong>to</strong> sexuallyabuse him. Thus, here we have a serious predicament: a young person who pleaded guilty<strong>to</strong> <strong>download</strong><strong>in</strong>g abusive images of children, is now a convicted sex offender, has his nameplaced on <strong>the</strong> sex offenders’ register and will never be allowed employment which <strong>in</strong>volveswork<strong>in</strong>g with children but who is <strong>in</strong> fact <strong>the</strong> victim of a sophisticated adult perpetra<strong>to</strong>r.This case example reflects <strong>the</strong> need <strong>to</strong> review how we manage cases where young peopleare <strong>in</strong>volved <strong>in</strong> sexual offend<strong>in</strong>g behaviour via <strong>the</strong> new technologies. At <strong>the</strong> very least, a fulland comprehensive assessment needs <strong>to</strong> be carried out before decisions are made regard<strong>in</strong>ghow <strong>to</strong> dispose of <strong>the</strong> matter – plac<strong>in</strong>g children and young people before <strong>the</strong> crim<strong>in</strong>aljustice system may not be <strong>the</strong> most appropriate way of resolv<strong>in</strong>g matters <strong>in</strong> many cases<strong>in</strong>volv<strong>in</strong>g young people who have displayed sexually abusive behaviours via <strong>the</strong> Internet.It is apparent that we understand very little about how children become <strong>in</strong>volved <strong>in</strong>access<strong>in</strong>g abusive images, <strong>the</strong> relationship of this <strong>to</strong> o<strong>the</strong>r sexually problematic behavioursand <strong>the</strong> developmental needs that this may be meet<strong>in</strong>g. What is of concern, for someadolescents, is <strong>the</strong> lack of adequate assessment <strong>to</strong> understand <strong>the</strong>ir behaviour, and weargue that plac<strong>in</strong>g such children with<strong>in</strong> <strong>the</strong> crim<strong>in</strong>al justice system is not <strong>the</strong> appropriateresponse.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |75


5. Cultural and geographical diversity and <strong>the</strong>connection between onl<strong>in</strong>e exploitation ando<strong>the</strong>r forms of sexual exploitation of children5.1 Cultural and geographical diversityThe <strong>the</strong>matic papers from both <strong>the</strong> First and <strong>the</strong> Second World Congresses called for <strong>the</strong>national and <strong>in</strong>ternational harmonisation of laws that would enable more effective polic<strong>in</strong>gof <strong>the</strong> Internet, particularly <strong>in</strong> relation <strong>to</strong> abusive images. However, while <strong>in</strong>tuitively thiswould seem <strong>to</strong> make sense it would be wrong <strong>to</strong> ignore cultural and geographical differences,both <strong>in</strong> relation <strong>to</strong> constructions of childhood and appropriate or acceptable practices. Thisis a difficult challenge and one that rema<strong>in</strong>s <strong>to</strong> be addressed. At best, what we might achieve<strong>in</strong> this paper is <strong>to</strong> open <strong>the</strong> debate. Orchard (2007), <strong>in</strong> <strong>the</strong> context of child prostitutionamong young Deradasis <strong>in</strong> rural Karnataka, India, has suggested that, “Dom<strong>in</strong>ant modelsof child prostitution presented <strong>in</strong> <strong>the</strong> media and many academic contexts rely on certa<strong>in</strong>constructions of what constitutes a ‘child’, such as <strong>in</strong>nocence, purity and dependence,which are often assumed <strong>to</strong> be universal features of this life stage. Indeed, <strong>the</strong> case for <strong>the</strong>abhorrence of child prostitution is often founded upon <strong>the</strong> absence of <strong>the</strong>se characteristics.The etiological exercise <strong>in</strong> disassociat<strong>in</strong>g young prostitutes from ‘normal’/‘good’ girls is anessential <strong>in</strong>gredient <strong>in</strong> ma<strong>in</strong>stream representations of child prostitution” (p. 2387). Orchard(2007) goes on <strong>to</strong> describe how understand<strong>in</strong>g <strong>the</strong> picture portrayed by <strong>the</strong>se youngwomen is not straightforward because <strong>the</strong>y do not present <strong>the</strong>mselves <strong>to</strong> be frightened,bra<strong>in</strong>washed victims of parental or systemic violence depicted <strong>in</strong> most accounts of childprostitution but <strong>in</strong>stead present <strong>the</strong>mselves as girls who do not always like what <strong>the</strong>y door what is demanded of <strong>the</strong>m, but do so out of a sense of filial duty, economic need,and “because do<strong>in</strong>g dhandha is <strong>in</strong>corporated <strong>in</strong><strong>to</strong> <strong>the</strong>ir models of filial duty…” (p. 2388).Orchard (2007) concluded that this data, obta<strong>in</strong>ed from ethnographic <strong>in</strong>terviews with <strong>the</strong>girls <strong>the</strong>mselves, mirrors f<strong>in</strong>d<strong>in</strong>gs from Thailand that identify <strong>the</strong> role of cultural, economic,religious, gender or familial fac<strong>to</strong>rs <strong>in</strong> <strong>the</strong> creation of abuse through child prostitution.These <strong>in</strong>clude filial duty, a rite of passage, a desired economic alternative as well as a formof sexual exploitation.Why might this research on abuse through child prostitution be of importance <strong>to</strong> ourdiscussion of sexual exploitation <strong>in</strong> <strong>the</strong> onl<strong>in</strong>e world? As yet we have little understand<strong>in</strong>gof <strong>the</strong> relationship between different forms of sexually exploitative practices. Often <strong>the</strong>connection between one form of sexual exploitation with ano<strong>the</strong>r is not unders<strong>to</strong>od or nottaken <strong>in</strong><strong>to</strong> account. In <strong>the</strong> ECPAT (2005) study it was asserted that, “Sometimes a child76|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


or young person’s experience of be<strong>in</strong>g made <strong>the</strong> subject of abuse materials is regarded as asecondary harm. This view is apparent where <strong>the</strong> violation co<strong>in</strong>cides with <strong>the</strong> committalof o<strong>the</strong>r crimes aga<strong>in</strong>st <strong>the</strong> child or young person, such as prostitution or traffick<strong>in</strong>g forsexual purposes. As well, <strong>the</strong> perception that image-mak<strong>in</strong>g is less harmful can be apparent<strong>in</strong> situations where a child’s carers or guardians express relief that a child was ‘onlypho<strong>to</strong>graphed’ ra<strong>the</strong>r than directly physically violated. These outlooks fail <strong>to</strong> recognise <strong>the</strong>deep harm that may be caused. Us<strong>in</strong>g a child for pornography production <strong>in</strong> any contextshould be seen as a fundamental abuse, ra<strong>the</strong>r than a by-product of o<strong>the</strong>r harms” (p. 13).Azaola (2000), a study completed <strong>in</strong> 1999–2000 on <strong>the</strong> commercial sexual exploitation ofchildren <strong>in</strong> Acapulco, Mexico, found that a number of children were exploited throughpornography production, and that much of <strong>the</strong> exploitation appeared well-organised.Many of <strong>the</strong> children were boys who lived on <strong>the</strong> streets, some of whom were <strong>in</strong>volved <strong>in</strong>abuse through prostitution with <strong>to</strong>urists. O<strong>the</strong>r children came from poor rural areas, and<strong>the</strong>ir parents were paid for <strong>the</strong>ir daughters <strong>to</strong> leave <strong>to</strong> supposedly ga<strong>in</strong> a job or fur<strong>the</strong>reducation. O<strong>the</strong>rs were middle-class schoolchildren who agreed <strong>to</strong> pose for pho<strong>to</strong>graphs<strong>in</strong> exchange for money. The people exploit<strong>in</strong>g <strong>the</strong> children <strong>in</strong> <strong>the</strong>se <strong>in</strong>stances were bothnationals and non-nationals.O’Brian, van den Borne and Noten (2004), <strong>in</strong> <strong>the</strong>ir report on traffick<strong>in</strong>g of children forsexual purposes <strong>in</strong> Europe, noted <strong>the</strong> follow<strong>in</strong>g case. “Maria, a 17-year old from Kharkiv,Ukra<strong>in</strong>e, was brought up <strong>in</strong> a s<strong>in</strong>gle-parent poor family. Toge<strong>the</strong>r with her mo<strong>the</strong>r, shecarefully studied <strong>the</strong> ads of marriage agencies and dreamed about a happy marriage witha rich foreigner. A good friend advised Maria <strong>to</strong> go <strong>to</strong> an agency which was located <strong>in</strong> aprivate flat, equipped as an office, <strong>in</strong> <strong>the</strong> centre of Kharkiv. Maria was worried that <strong>the</strong>rewas no notice or company name on <strong>the</strong> door, but she still went <strong>in</strong>. First, she was asked <strong>to</strong>have pictures taken of her <strong>in</strong> her underwear. Some time later, she was called by <strong>the</strong> agencyand asked <strong>to</strong> come and have <strong>the</strong> pho<strong>to</strong>s taken aga<strong>in</strong> because <strong>the</strong> previous pictures were said<strong>to</strong> be bad. She went. She was brought <strong>in</strong><strong>to</strong> a room <strong>in</strong> which <strong>the</strong>re were a lot of computers.Several naked girls were wait<strong>in</strong>g <strong>the</strong>re. Maria was offered $100 for pos<strong>in</strong>g for nude pho<strong>to</strong>s.Maria refused because she noticed that pornographic pictures were immediately sent viaInternet <strong>to</strong> <strong>the</strong> cus<strong>to</strong>mers. The clients <strong>in</strong>dicated what position a girl had <strong>to</strong> take and whatshe had <strong>to</strong> do” (p. 138). Similarly, <strong>the</strong> study reported a <strong>to</strong>urist agency from Moldova, whichwas set up <strong>in</strong> 1999 by two citizens who were husband and wife, who advertised jobs foryoung girls as dancers and waitresses <strong>in</strong> Cyprus and Spa<strong>in</strong>. In discussion with <strong>the</strong> girls whowere <strong>in</strong>terested <strong>in</strong> obta<strong>in</strong><strong>in</strong>g more details about <strong>the</strong> jobs, <strong>the</strong> couple expla<strong>in</strong>ed <strong>the</strong> work<strong>in</strong>gconditions. Depend<strong>in</strong>g on <strong>the</strong>ir perception of <strong>the</strong> girls, <strong>the</strong>y <strong>to</strong>ld some of <strong>the</strong>m that if <strong>the</strong>ywanted <strong>to</strong> earn more money <strong>the</strong>y could offer sex, but <strong>to</strong> o<strong>the</strong>rs <strong>the</strong>se conditions were notexpla<strong>in</strong>ed. The girls who accepted <strong>the</strong> agency’s offer were pho<strong>to</strong>graphed <strong>in</strong> bik<strong>in</strong>is, and <strong>the</strong>pho<strong>to</strong>s were sent <strong>to</strong> <strong>the</strong> purchasers, who <strong>the</strong>n made <strong>the</strong>ir choices, over <strong>the</strong> Internet.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |77


These accounts raise important challenges. They highlight <strong>the</strong> need <strong>to</strong> understand <strong>the</strong>complexity of liv<strong>in</strong>g circumstances for many of <strong>the</strong> world’s children, and aga<strong>in</strong> <strong>the</strong> agency(or lack of it) that we afford <strong>to</strong> older children <strong>in</strong> <strong>the</strong> choices that <strong>the</strong>y make. Haider (2008),<strong>in</strong> <strong>the</strong> context of work<strong>in</strong>g children <strong>in</strong> Bangladesh, exam<strong>in</strong>ed <strong>the</strong> tensions between official<strong>in</strong>ternational and national laws and <strong>the</strong> actual reality or ‘liv<strong>in</strong>g laws’ regard<strong>in</strong>g work<strong>in</strong>gchildren. He asserted that while <strong>the</strong>se children are ma<strong>in</strong>ly so impoverished that <strong>the</strong>y have<strong>to</strong> work for <strong>the</strong>ir own survival, <strong>to</strong> deny <strong>the</strong>m any agency <strong>in</strong> <strong>the</strong>ir own position seemsmisguided. Haider (2008) argued that <strong>the</strong> present dom<strong>in</strong>ant understand<strong>in</strong>g of child workis not compatible with <strong>the</strong> real-life situations of such children and may be <strong>in</strong>jurious <strong>to</strong> <strong>the</strong>ir<strong>in</strong>dividual <strong>in</strong>terests. The article suggested that a culture-specific analysis which properlydiagnoses <strong>the</strong> contextual struggles of work<strong>in</strong>g children <strong>in</strong> countries like Bangladesh is bettersuited <strong>to</strong> m<strong>in</strong>imis<strong>in</strong>g <strong>the</strong> ongo<strong>in</strong>g suffer<strong>in</strong>g of work<strong>in</strong>g children. “<strong>Child</strong> labour became anissue <strong>in</strong> Bangladesh <strong>in</strong> 1993 when <strong>the</strong> US Hark<strong>in</strong> Bill, threaten<strong>in</strong>g <strong>to</strong> boycott imports fromcountries resort<strong>in</strong>g <strong>to</strong> child labour, had <strong>the</strong> effect of very quickly empty<strong>in</strong>g <strong>the</strong> garmentfac<strong>to</strong>ries of an estimated 50,000 child workers (UNICEF, 1997). But <strong>the</strong>se ‘freed’ childrenwere <strong>the</strong>n forced <strong>in</strong><strong>to</strong> ra<strong>the</strong>r worse situations, <strong>in</strong>clud<strong>in</strong>g prostitution, as a consequence ofthis extra-terri<strong>to</strong>rial legislative threat, even though <strong>the</strong> International Labour Organization(ILO), UNICEF and <strong>the</strong> Bangladesh Garment Manufacturers and Exporters Associationreached an agreement <strong>in</strong> 1995 for ‘rehabilitat<strong>in</strong>g’ <strong>the</strong>se young workers with education ando<strong>the</strong>r opportunities (UNICEF, 1997). Earlier work by Blanchet (1996) had highlighted<strong>the</strong> unequal social relations <strong>in</strong> which children’s work is embedded and its far-reach<strong>in</strong>gconsequence on work<strong>in</strong>g children. Her empirical study on child workers <strong>in</strong> rural bidi(local cigarette) fac<strong>to</strong>ries, child prostitute workers <strong>in</strong> rural bro<strong>the</strong>ls and child workers <strong>in</strong>urban slums and streets demonstrated how both <strong>the</strong> state and society ignore <strong>the</strong> survivalactivities of work<strong>in</strong>g children. Haider (2008) concluded by say<strong>in</strong>g that, “For many children<strong>in</strong> Bangladesh, <strong>the</strong> experience of childhood is clearly not <strong>the</strong> ideal world constructed <strong>in</strong>books, while earn<strong>in</strong>g a liv<strong>in</strong>g and mak<strong>in</strong>g important livelihood decisions are very muchpart of <strong>the</strong>ir rout<strong>in</strong>e life” (p. 66).Such choices made by some of <strong>the</strong> world’s older children might mean that be<strong>in</strong>gpho<strong>to</strong>graphed <strong>in</strong> an abusive way is a better choice than be<strong>in</strong>g abused through prostitution.It also highlights <strong>the</strong> fact that older children may make choices which run counter <strong>to</strong>what we conceptualise as be<strong>in</strong>g ideal. Such choices are not only made by children liv<strong>in</strong>g<strong>in</strong> Bangladesh, Mexico or Eastern Europe. Sved<strong>in</strong> and Priebe (2007) sampled 4339students from <strong>the</strong> third year of upper secondary schools <strong>in</strong> five Swedish cities. Their results<strong>in</strong>dicated that 1.8% of <strong>the</strong> boys and 1.0% of <strong>the</strong> girls reported that <strong>the</strong>y had sold sex formoney or o<strong>the</strong>r reimbursements. Sell<strong>in</strong>g sex was associated with hav<strong>in</strong>g an immigrantbackground, higher level of unemployment <strong>in</strong> <strong>the</strong> family, and study<strong>in</strong>g a practical/vocational programme. Adolescents with <strong>the</strong> experience of sell<strong>in</strong>g sex had an <strong>in</strong>creased risk78|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


for different psychosocial problems, such as poorer mental health, weekly use of alcohol,and antisocial behaviours. The adolescents sell<strong>in</strong>g sex were also characterised by hav<strong>in</strong>ghad a greater number of sexual experiences, a greater preoccupation with sex, relativelyearly sexual debut, and experience with sexual abuse as victim and/or perpetra<strong>to</strong>r. The<strong>in</strong>dex group students watched pornography more frequently than <strong>the</strong> majority, and <strong>the</strong>yalso watched more deviant forms of pornography. However, it is important <strong>to</strong> note that<strong>the</strong>se authors were not suggest<strong>in</strong>g that ‘sell<strong>in</strong>g sex’ and ‘prostitution’ are commensurate.Sved<strong>in</strong> and Priebe (2007) suggested that “It is plausible <strong>to</strong> th<strong>in</strong>k that sell<strong>in</strong>g sex covers abroad spectrum of behaviour from novelty seek<strong>in</strong>g <strong>to</strong> act<strong>in</strong>g out behaviour with possiblel<strong>in</strong>ks <strong>to</strong> early sexual debut and <strong>to</strong> <strong>the</strong> adolescent’s own sexual traumatisation. It is difficult<strong>to</strong> establish a direct causal l<strong>in</strong>k between different background fac<strong>to</strong>rs and sell<strong>in</strong>g sex” (p.31?). In <strong>the</strong> second largest city <strong>in</strong> Sweden a group work<strong>in</strong>g <strong>to</strong> assist prostitutes has madea survey of young people sell<strong>in</strong>g sex. An <strong>in</strong>terest<strong>in</strong>g conclusion <strong>in</strong> <strong>the</strong> report is that eventhough several studies <strong>in</strong> western countries show that boys sell sex <strong>to</strong> a higher extentthan girls, boys are non-existent <strong>in</strong> accounts of sex sell<strong>in</strong>g. Somehow <strong>the</strong> female prostituterema<strong>in</strong>s <strong>the</strong> norm even when we talk about adolescents sell<strong>in</strong>g sex. The authors of <strong>the</strong> studybelieved that <strong>the</strong> reproduction of gender stereotypes means that we see a boy sell<strong>in</strong>g sexas so much more <strong>in</strong> control than a girl do<strong>in</strong>g <strong>the</strong> same th<strong>in</strong>g. This study concluded that<strong>the</strong> Internet is <strong>the</strong> major arena for com<strong>in</strong>g <strong>in</strong><strong>to</strong> contact with <strong>the</strong> buyer for boys sell<strong>in</strong>gsex. Sixty per cent of <strong>the</strong> boys and 45% of <strong>the</strong> girls hav<strong>in</strong>g sold sex met with <strong>the</strong> buyer on<strong>the</strong> Internet mak<strong>in</strong>g this <strong>the</strong> major arena for connect<strong>in</strong>g buyers of sexual services fromadolescents with sellers (Abelsohn and Hubelsjö, 2007).In Azaola’s (2000) study of Mexican children, pho<strong>to</strong>graphs were taken by people from<strong>the</strong> community as well as by those from outside of it, and it is apparent that here has beenan <strong>in</strong>vestment <strong>in</strong> try<strong>in</strong>g <strong>to</strong> understand <strong>the</strong> role of ‘sex <strong>to</strong>urism’ <strong>in</strong> <strong>the</strong> production of abuseimages. Huda (2006) has argued that economic and social <strong>in</strong>equalities, along with politicalconflicts, have led <strong>to</strong> <strong>the</strong> movement of people with<strong>in</strong> countries and across borders <strong>in</strong> SouthAsia. Fac<strong>to</strong>rs such as illiteracy, dependency, violence, social stigma, cultural stereotypes,gender disparity and endemic poverty are thought <strong>to</strong> place women and children <strong>in</strong> powerless,non-negotiable situations that have contributed <strong>to</strong> <strong>the</strong> emergence of sex traffick<strong>in</strong>g. In asummary of patterns of sex traffick<strong>in</strong>g <strong>in</strong> South Asia, Huda (2006) concluded that <strong>the</strong>reis:• An <strong>in</strong>crease <strong>in</strong> <strong>the</strong> number of girl children from poor, rural and urban families.• Sexual exploiters and prostitute users are <strong>the</strong> same clusters of men who abusechildren. Although only a small percentage of <strong>the</strong>se <strong>in</strong>dividuals are pedophiles, agreat majority are ord<strong>in</strong>ary men who buy sex <strong>to</strong> re<strong>in</strong>force <strong>the</strong>ir mascul<strong>in</strong>ity andexercise power over <strong>the</strong> weak and vulnerable.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |79


• For foreign men, <strong>the</strong>re is <strong>the</strong> added layer of racial discrim<strong>in</strong>ation and power overthird world women and children.• Increased traffick<strong>in</strong>g of women and girls from ethnic and m<strong>in</strong>ority groups who arevery often also experienc<strong>in</strong>g abuse <strong>in</strong> <strong>the</strong>ir communities and/or caught <strong>in</strong> armedconflicts and civil war.• Increas<strong>in</strong>g control of traffick<strong>in</strong>g routes and dest<strong>in</strong>ations by crime syndicates.• Increas<strong>in</strong>g use of technology <strong>to</strong> market women and children for prostitution, bridetrade, pornography and o<strong>the</strong>r slave-like practices via <strong>the</strong> Internet.• The ma<strong>in</strong>stream<strong>in</strong>g of prostitution <strong>in</strong> legitimate bus<strong>in</strong>ess and occupational categories<strong>in</strong> <strong>to</strong>urism, hospitality, health and enterta<strong>in</strong>ment establishments which are <strong>in</strong>tegral<strong>to</strong> development policies of governments.• Massive migration of women for enterta<strong>in</strong>ment and domestic work.• Cont<strong>in</strong>u<strong>in</strong>g <strong>in</strong>ability of governments and <strong>the</strong> <strong>in</strong>ternational community <strong>to</strong> respond <strong>to</strong><strong>the</strong> <strong>in</strong>creas<strong>in</strong>g traffick<strong>in</strong>g <strong>in</strong> women and children.• Intense lobby<strong>in</strong>g of certa<strong>in</strong> groups call<strong>in</strong>g for a liberalization of sex <strong>in</strong>dustry through<strong>the</strong> legalization of prostitution and its redef<strong>in</strong>ition as work on one hand, and <strong>the</strong>lobby <strong>to</strong> make dist<strong>in</strong>ctions between forced and free (choice prostitution, child vs.adult, and first world vs. third world, etc). (p. 376)Once aga<strong>in</strong> we see <strong>the</strong> tensions around discourses of work and children’s agency, and wealso see emerg<strong>in</strong>g <strong>the</strong> role of <strong>the</strong> new technologies <strong>in</strong> <strong>the</strong> propagation of abusive practices.Chow-White (2006) has argued that while images of ‘sex workers’ have primarily beendissem<strong>in</strong>ated through <strong>in</strong>formal networks of mail-order travel guides, magaz<strong>in</strong>es andvideotapes, <strong>the</strong> Internet has become an <strong>in</strong>creas<strong>in</strong>gly important <strong>to</strong>ol for <strong>the</strong> global spreadof <strong>in</strong><strong>format</strong>ion. There are <strong>in</strong>creas<strong>in</strong>g numbers of websites which provide commercial and<strong>in</strong><strong>format</strong>ion exchange which purport <strong>to</strong> relate only <strong>to</strong> <strong>in</strong><strong>format</strong>ion about adults. Given <strong>the</strong>nature of <strong>the</strong> Internet, and <strong>the</strong> fact that, for example, this site provides a free discussionforum, it is likely that <strong>in</strong><strong>format</strong>ion may be shared that would provide <strong>in</strong><strong>format</strong>ion <strong>to</strong> thosewith a sexual <strong>in</strong>terest <strong>in</strong> teenagers or young people. The follow<strong>in</strong>g is on <strong>the</strong> open<strong>in</strong>g pageof one particular site:We are your <strong>in</strong><strong>format</strong>ion source on where <strong>to</strong> f<strong>in</strong>d sex - with consent<strong>in</strong>g adults - across<strong>the</strong> globe. From Bangkok hookers <strong>to</strong> Filip<strong>in</strong>a virg<strong>in</strong>s <strong>to</strong> Lat<strong>in</strong>a busty babes, we br<strong>in</strong>g <strong>the</strong>world of sex travel, sex <strong>to</strong>urs and romantic adventure <strong>to</strong> you. Thailand, The Philipp<strong>in</strong>es,Brazil, Cambodia, Costa Rica, Amsterdam and Germany. We cover it all. Our adultvideos and adult DVD’s po<strong>in</strong>t <strong>the</strong> way. Our free discussion board allows everyone <strong>to</strong>share <strong>the</strong>ir experience. Our adult travel guides p<strong>in</strong>po<strong>in</strong>t <strong>the</strong> hottest and best places <strong>to</strong>f<strong>in</strong>d sex, romance, love, marriage and adventure throughout <strong>the</strong> world. That is whatwe are all about. Have Fun and tell your friends about us. (Accessed 28.7.2008)80|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


A recent study from Ukra<strong>in</strong>e demonstrated <strong>the</strong> connection between <strong>the</strong> traffick<strong>in</strong>g <strong>in</strong>children and <strong>the</strong> production of child abuse images: <strong>in</strong> 2002 girls were trafficked fromMoldova <strong>to</strong> Ukra<strong>in</strong>e where <strong>the</strong>y were pho<strong>to</strong>graphed for pornographic purposes. TheUkra<strong>in</strong>ian militia was <strong>to</strong>ld by <strong>the</strong> girls that <strong>the</strong>y had received money from foreigners formodell<strong>in</strong>g for pictures <strong>in</strong> <strong>the</strong> nude. The children were obviously exploited <strong>in</strong> <strong>the</strong> productionof child abuse images for <strong>the</strong> commercial market (see also ECPAT, 2008).One f<strong>in</strong>al example of <strong>the</strong> production of abusive images with<strong>in</strong> a non-western country comesfrom India. In a national study on child abuse <strong>in</strong> India (Kacker, Varadan and Kumar, 2007)<strong>the</strong>se authors reported that, “Out of <strong>the</strong> <strong>to</strong>tal child respondents, 4.46% reported be<strong>in</strong>gpho<strong>to</strong>graphed <strong>in</strong> nude. This is an unusually high percentage. Also for <strong>the</strong> first time dataon this k<strong>in</strong>d of abuse has been collected. The RAHI study had asked <strong>the</strong> question, “ask<strong>in</strong>gyou <strong>to</strong> pose for dirty pictures” and <strong>the</strong>y reported a response of 0.1%. When compared <strong>to</strong>this <strong>the</strong> revelation of <strong>the</strong> present study is alarm<strong>in</strong>g and needs fur<strong>the</strong>r probe. Among <strong>the</strong>sechildren, 52.01% were boys and 47.99% were girls. In different age groups, <strong>the</strong> majority ofcases (48.17%) where children were pho<strong>to</strong>graphed <strong>in</strong> nude were among younger children<strong>in</strong> <strong>the</strong> age group of 5–12 years. This was followed by 28.02% among adolescents <strong>in</strong> <strong>the</strong>age group 15–18 years and <strong>the</strong> rema<strong>in</strong><strong>in</strong>g 23.81% <strong>in</strong> <strong>the</strong> age group of 13–14 years” (p. 85).The majority of children questioned did not report <strong>the</strong> matter and preferred <strong>to</strong> keep quiet.What is of concern about <strong>the</strong> production of such images is that we have little knowledgeof how <strong>the</strong>y have become part of abusive practices aga<strong>in</strong>st children, and no knowledge as<strong>to</strong> how <strong>the</strong>y were used. Kacker et al.’s (2007) study demonstrated that <strong>the</strong> vast majorityof <strong>the</strong> children were pho<strong>to</strong>graphed by someone with<strong>in</strong> <strong>the</strong>ir immediate familial and socialnetwork. We do not know if <strong>the</strong>se pho<strong>to</strong>graphs were sold on, whe<strong>the</strong>r <strong>the</strong>y became part ofcommercial sexual exploitation (through <strong>the</strong> sale of DVDs) or whe<strong>the</strong>r <strong>the</strong>ir images willever f<strong>in</strong>d <strong>the</strong>ir way on<strong>to</strong> <strong>the</strong> Internet.The analysis of <strong>the</strong> COPINE archive <strong>in</strong> 2003 <strong>in</strong>dicated that <strong>the</strong> majority of images availablewere of white Caucasian and Asian children, with very few African or African-Americanchildren (Taylor and Quayle, 2005). Indeed, <strong>in</strong> 2003, websites started <strong>to</strong> appear advertis<strong>in</strong>gspecialist sites that <strong>in</strong>cluded <strong>in</strong>terracial pictures. Similarly, Carr’s (2004) study, which wasone of <strong>the</strong> few <strong>to</strong> analyse <strong>the</strong> images used by offenders, <strong>in</strong>dicated that <strong>the</strong> vast majority ofoffenders selected material portray<strong>in</strong>g Caucasian and Asian children. It is clearly unknownas <strong>to</strong> whe<strong>the</strong>r this will change as Internet availability and uptake <strong>in</strong>creases <strong>in</strong> o<strong>the</strong>r countries.Grabosky (2007) has noted that, “By <strong>the</strong> year 2015, half of <strong>the</strong> world’s onl<strong>in</strong>e populationwill reside <strong>in</strong> two countries: Ch<strong>in</strong>a and India. The take up of digital technology <strong>in</strong> Asiaover <strong>the</strong> com<strong>in</strong>g decade will be noth<strong>in</strong>g short of dramatic. In all probability, <strong>the</strong> growth ofonl<strong>in</strong>e commerce will follow a parallel trend. This will provide an unprecedented numberof potential victims and prospective offenders” (p. 157).<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |81


There are <strong>in</strong>creas<strong>in</strong>g reports of <strong>the</strong> production of abusive images across <strong>the</strong> world, butwe know little about how such images are used and whe<strong>the</strong>r we will see <strong>in</strong>creas<strong>in</strong>gdissem<strong>in</strong>ation of <strong>the</strong> same through technology. This also highlights <strong>the</strong> fact that for someolder children, decisions are made by <strong>the</strong>m <strong>in</strong> contexts that are less than ideal.5.2 Internet child pornography and <strong>the</strong> lawThroughout this paper we have resorted <strong>to</strong> mov<strong>in</strong>g between <strong>the</strong> terms ‘abuse images’ and‘child pornography’ as well as us<strong>in</strong>g <strong>the</strong>se <strong>to</strong> describe related crimes that reflect both sexualabuse and sexual exploitation across a number of studies. However, <strong>in</strong> <strong>the</strong> context of <strong>the</strong> law,<strong>the</strong> term ‘abuse images’ is not used. Akdeniz (2008) has suggested that, “In <strong>the</strong> fight aga<strong>in</strong>stchild pornography it is imperative from a legal po<strong>in</strong>t of view <strong>to</strong> def<strong>in</strong>e what constitutes childpornography… In England and Wales <strong>the</strong> Protection of <strong>Child</strong>ren Act (1978) concentrateson <strong>in</strong>decent pho<strong>to</strong>graphs and <strong>in</strong>decent pseudo-pho<strong>to</strong>graphs of children, and <strong>the</strong>re is nodef<strong>in</strong>ition provided for ‘child pornography’ per se. O<strong>the</strong>r common law jurisdictions such as<strong>the</strong> United States and Canada provide statu<strong>to</strong>ry legal def<strong>in</strong>itions for child pornography…”However, this view is not shared by all. Gillespie (personal communication) has arguedthat <strong>the</strong> Sexual Offences Act (SOA) of 2003 def<strong>in</strong>es <strong>the</strong> ‘child <strong>in</strong>volved <strong>in</strong> pornography’. Thedef<strong>in</strong>ition <strong>in</strong> <strong>the</strong> SOA 2003 refers <strong>to</strong> <strong>the</strong> def<strong>in</strong>ition <strong>in</strong> <strong>the</strong> Protection of <strong>Child</strong>ren Act 1978,and might suggest that <strong>in</strong> England and Wales child pornography is def<strong>in</strong>ed as <strong>in</strong>decentpho<strong>to</strong>graphs of children. When it comes <strong>to</strong> <strong>the</strong> crimes committed and how <strong>the</strong>se aredescribed we rely on <strong>the</strong> use of <strong>the</strong> terms ‘sexual abuse’ and ‘sexual exploitation’. Theseterms are sometimes used <strong>in</strong>terchangeably and at times <strong>the</strong> term ‘sexual exploitation’ isused <strong>to</strong> describe all crimes committed aga<strong>in</strong>st a child <strong>in</strong> <strong>the</strong> context of Internet offences,traffick<strong>in</strong>g of children and child prostitution. In this paper we have ma<strong>in</strong>ta<strong>in</strong>ed <strong>the</strong> viewthat ‘sexual abuse’ is <strong>the</strong> direct offence aga<strong>in</strong>st <strong>the</strong> child, whe<strong>the</strong>r or not it constitutes anactual contact offence, and ‘sexual exploitation’ is <strong>the</strong> purposeful exploitation of <strong>the</strong> <strong>in</strong>feriorstatus or dependency of <strong>the</strong> child for some form of ga<strong>in</strong>, commercial or o<strong>the</strong>rwise. Theterm ‘exploitation’ may, as is suggested by Asquith and Turner (2008) be used <strong>to</strong> ascribe alack of agency on <strong>the</strong> part of <strong>the</strong> victim.In research it is equally important <strong>to</strong> use terms that makes analyses comparable acrosscountries, cultures and geographical regions. The use of ‘child abuse images’ as a term both<strong>in</strong> research and <strong>in</strong> look<strong>in</strong>g at legal def<strong>in</strong>ition would speed up <strong>the</strong> process of aggregat<strong>in</strong>gcomparable data on <strong>the</strong> children that are abused. To recognise <strong>the</strong> role of <strong>the</strong> sexualexploiter as sometimes be<strong>in</strong>g separate from that of <strong>the</strong> sexual abuser would possibly meanlegislat<strong>in</strong>g more firmly aga<strong>in</strong>st some exploitative practices that have been described <strong>in</strong> <strong>the</strong>82|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


paper, such as onl<strong>in</strong>e abuse where <strong>the</strong>re is no physical contact between <strong>the</strong> offender and<strong>the</strong> child/adolescent. Gillespie (personal communication) has questioned whe<strong>the</strong>r mostlegal systems adequately deal with this situation, and although many States suggest that itis covered by child pornography laws, <strong>the</strong>se focus on <strong>the</strong> images and not <strong>the</strong> conduct of <strong>the</strong>offender. Ano<strong>the</strong>r term that creates difficulties is that of <strong>the</strong> Internet offender who attempts<strong>to</strong> meet a m<strong>in</strong>or for offl<strong>in</strong>e sexual encounters. Here <strong>the</strong> term m<strong>in</strong>or <strong>in</strong> some countrieswould mean a person up <strong>to</strong> <strong>the</strong> age of 17 whereas <strong>in</strong> o<strong>the</strong>r jurisdictions a m<strong>in</strong>or would<strong>in</strong>dicate a person below 15 or 14 years of age. Several studies on Internet sex offendersmeet<strong>in</strong>g with adolescents will present data on offenders meet<strong>in</strong>g with 16 and 17 year olds.In countries where adolescents at that age ‘own’ <strong>the</strong>ir own sexuality and are considered oldenough <strong>to</strong> consent <strong>to</strong> sexual relationships, an encounter where <strong>the</strong> alleged victim consents<strong>to</strong> <strong>the</strong> meet<strong>in</strong>g and <strong>to</strong> hav<strong>in</strong>g sex would not be considered a crime. In o<strong>the</strong>r countries, mostnotably <strong>in</strong> several states <strong>in</strong> <strong>the</strong> US, it would.At <strong>the</strong> same time, dur<strong>in</strong>g <strong>the</strong> past few years we have witnessed <strong>the</strong> developmen<strong>to</strong>f supranational and <strong>in</strong>ternational policy <strong>document</strong>s which set out <strong>to</strong> def<strong>in</strong>e ‘childpornography’. S<strong>in</strong>ce <strong>the</strong> Second World Congress we have seen <strong>the</strong> development of fourpolicy <strong>document</strong>s that are central <strong>to</strong> this issue. The European Union’s Framework Decisionon combat<strong>in</strong>g <strong>the</strong> sexual exploitation of children and child pornography entered <strong>in</strong><strong>to</strong> force<strong>in</strong> 2004 and required member states <strong>to</strong> take steps <strong>to</strong> ensure compliance by 20 January,2006. Here child pornography is def<strong>in</strong>ed as pornographic material that visually depicts orrepresents:(i) a real child <strong>in</strong>volved or engaged <strong>in</strong> sexually explicit conduct, <strong>in</strong>clud<strong>in</strong>g lasciviousexhibition of <strong>the</strong> genitals or <strong>the</strong> pubic area of a child; or(ii) a real person appear<strong>in</strong>g <strong>to</strong> be a child <strong>in</strong>volved or engaged <strong>in</strong> <strong>the</strong> conductmentioned <strong>in</strong> (i); or(iii) realistic images of a non-existent child <strong>in</strong>volved or engaged <strong>in</strong> <strong>the</strong>conduct mentioned <strong>in</strong> (i).As we can see, <strong>the</strong> def<strong>in</strong>ition <strong>in</strong> <strong>the</strong> EU Framework Decision talks about a ‘real’ child, ‘real’person and ‘realistic’ images, which may prove unlikely <strong>to</strong> cover virtual images or car<strong>to</strong>ons.The Council of Europe’s Cybercrime Convention (2001) came <strong>in</strong><strong>to</strong> force <strong>in</strong> July 2004, andArticle 9 def<strong>in</strong>es child pornography as pornographic material that visually depicts:a. a m<strong>in</strong>or engaged <strong>in</strong> sexually explicit conduct;b. person appear<strong>in</strong>g <strong>to</strong> be a m<strong>in</strong>or engaged <strong>in</strong> sexually explicit conduct;c. realistic images represent<strong>in</strong>g a m<strong>in</strong>or engaged <strong>in</strong> sexually explicit conduct.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |83


This <strong>in</strong>cludes all persons under <strong>the</strong> age of 18 years, however a Party may require a lowerage limit, which shall not be less than 16 years. In addition, each Party may reserve <strong>the</strong>right not <strong>to</strong> apply sub-paragraphs b. and c. Such materials may <strong>the</strong>refore be left out of legalprovisions target<strong>in</strong>g child pornography.The third <strong>document</strong> is <strong>the</strong> United Nation’s Optional Pro<strong>to</strong>col <strong>to</strong> <strong>the</strong> Convention on <strong>the</strong> Rightsof <strong>the</strong> <strong>Child</strong> on <strong>the</strong> sale of children, child prostitution and child pornography. This came <strong>in</strong><strong>to</strong>force <strong>in</strong> January 2002 and def<strong>in</strong>es child pornography as, “any representation, by whatevermeans of a child engaged <strong>in</strong> real or simulated explicit sexual activities or any representationof <strong>the</strong> sexual parts of a child for primarily sexual purposes”. In all three <strong>document</strong>s a childis def<strong>in</strong>ed as someone under <strong>the</strong> age of 18 years and all three <strong>in</strong>clude both pho<strong>to</strong>graphsof actual children as well as representations of children, which would appear <strong>to</strong> <strong>in</strong>cludecomputer generated images. However, <strong>the</strong> issue of age is subject <strong>to</strong> several reservationsand complicated by <strong>the</strong> age of sexual consent established under national law. There is no<strong>in</strong>strument that establishes a uniform age of consent, and this tends <strong>to</strong> clash with legalprovisions aim<strong>in</strong>g at protect<strong>in</strong>g children up <strong>to</strong> that age. The UN Optional Pro<strong>to</strong>col does notexpressly make reference <strong>to</strong> age but s<strong>in</strong>ce it is a pro<strong>to</strong>col <strong>to</strong> <strong>the</strong> UN Convention on <strong>the</strong> Rightsof <strong>the</strong> <strong>Child</strong> it is clear that it must mean a child under 18. Article 1a of <strong>the</strong> EU FrameworkDecision states that a child is someone under <strong>the</strong> age of 18, and this is one reason why, forexample, <strong>the</strong> def<strong>in</strong>ition of a ‘child’ <strong>in</strong> this context was redef<strong>in</strong>ed <strong>to</strong> 18 <strong>in</strong> England and Wales(Gillespie, 2008). Under <strong>the</strong> Cybercrime Convention <strong>the</strong> term ‘m<strong>in</strong>or’ used <strong>in</strong> <strong>the</strong> def<strong>in</strong>itionof child pornography <strong>in</strong>cludes all persons under 18 years of age. A Party may, however,require a lower age-limit, which shall be not less than 16 years. The ILO Convention 182on <strong>the</strong> Worst Forms of <strong>Child</strong> Labour (WFCL) describes child pornography as a WFCL (Art.3(b) and states that <strong>the</strong> Convention applies <strong>to</strong> all children under <strong>the</strong> age of 18. In Article1 it determ<strong>in</strong>es that member States that ratify this Convention shall take immediate andeffective measures <strong>to</strong> secure <strong>the</strong> prohibition and elim<strong>in</strong>ation of <strong>the</strong> WFCL as a matterof urgency. To date 169 countries have ratified this Convention. Also, all 181 memberStates of <strong>the</strong> ILO have an obligation (under <strong>the</strong> ILO Declaration of 1998) <strong>to</strong> respect,promote and realise <strong>the</strong> pr<strong>in</strong>ciples concern<strong>in</strong>g fundamental rights at work, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong>right <strong>to</strong> be free of <strong>the</strong> WFCL, which <strong>in</strong>cludes child pornography, (van de Gl<strong>in</strong>d, personalcommunication). Akdeniz (2008) draws our attention <strong>to</strong> <strong>the</strong> fact that <strong>the</strong> UN def<strong>in</strong>ition isbroad and, as it refers <strong>to</strong> “any representation”, would also <strong>in</strong>clude textual material, car<strong>to</strong>onsand draw<strong>in</strong>gs. This is an important development as, has been suggested by authors suchas Kierkegaard (2008), what has been sadly lack<strong>in</strong>g is <strong>the</strong> <strong>in</strong>clusion of provisions thatare future-proof. This would <strong>in</strong>clude “morphed images and writ<strong>in</strong>gs or all materials thatdegrade <strong>the</strong> child”, <strong>in</strong>clud<strong>in</strong>g written pornography. The most recent relevant <strong>in</strong>strumentestablish<strong>in</strong>g a def<strong>in</strong>ition of child pornography is <strong>the</strong> Council of Europe Convention on <strong>the</strong>Protection of children aga<strong>in</strong>st sexual exploitation and sexual abuse which provides <strong>the</strong> follow<strong>in</strong>g84|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


def<strong>in</strong>ition <strong>in</strong> Article 20 – Offences concern<strong>in</strong>g child pornography:1 Each Party shall take <strong>the</strong> necessary legislative or o<strong>the</strong>r measures <strong>to</strong> ensure that <strong>the</strong>follow<strong>in</strong>g <strong>in</strong>tentional conduct, when committed without right, is crim<strong>in</strong>alised:a produc<strong>in</strong>g child pornography;b offer<strong>in</strong>g or mak<strong>in</strong>g available child pornography;c distribut<strong>in</strong>g or transmitt<strong>in</strong>g child pornography;d procur<strong>in</strong>g child pornography for oneself or for ano<strong>the</strong>r person;e possess<strong>in</strong>g child pornography;f know<strong>in</strong>gly obta<strong>in</strong><strong>in</strong>g access, through <strong>in</strong><strong>format</strong>ion and communicationtechnologies, <strong>to</strong> child pornography.2 For <strong>the</strong> purpose of <strong>the</strong> present article, <strong>the</strong> term “child pornography” shall mean anymaterial that visually depicts a child engaged <strong>in</strong> real or simulated sexually explicitconduct or any depiction of a child’s sexual organs for primarily sexual purposes.3 Each Party may reserve <strong>the</strong> right not <strong>to</strong> apply, <strong>in</strong> whole or <strong>in</strong> part, paragraph 1.a and e<strong>to</strong> <strong>the</strong> production and possession of pornographic material:• consist<strong>in</strong>g exclusively of simulated representations or realistic imagesof a non-existent child;• <strong>in</strong>volv<strong>in</strong>g children who have reached <strong>the</strong> age set <strong>in</strong> application ofArticle 18, paragraph 2, where <strong>the</strong>se images are produced andpossessed by <strong>the</strong>m with <strong>the</strong>ir consent and solely for <strong>the</strong>ir own private use.4 Each Party may reserve <strong>the</strong> right not <strong>to</strong> apply, <strong>in</strong> whole or <strong>in</strong> part, paragraph 1.f.It is important <strong>to</strong> note that this def<strong>in</strong>ition is restricted <strong>to</strong> visual materials but does notrequire that a real child be used <strong>in</strong> <strong>the</strong>ir production (as is <strong>the</strong> case <strong>in</strong> <strong>the</strong> US). However,member states may opt not <strong>to</strong> crim<strong>in</strong>alise <strong>the</strong> production and possession of virtual childpornography. The Convention also creates a number of new offences and <strong>the</strong> offence ofpossession of child pornography is made broader as <strong>the</strong>re is no requirement <strong>to</strong> prove <strong>the</strong><strong>in</strong>tent <strong>to</strong> distribute <strong>the</strong> materials. The Convention, however, is clear on crim<strong>in</strong>alis<strong>in</strong>g <strong>the</strong>sexual exploitation through <strong>the</strong> clear description of <strong>the</strong> different crimes that connect<strong>to</strong> child abusive images. Importantly <strong>the</strong> Convention has chosen not <strong>to</strong> crim<strong>in</strong>alise <strong>the</strong>consensual production and possession of materials created by children who have reached<strong>the</strong> age of consent. However, most <strong>in</strong>struments do not directly address <strong>the</strong> issue ofadolescents who make or access <strong>in</strong>decent images of children. This <strong>in</strong> itself may prove <strong>to</strong>be problematic. Piper (2001) has argued that one of <strong>the</strong> landmark changes <strong>in</strong> terms ofcrim<strong>in</strong>al justice policy <strong>in</strong> recent times has been <strong>the</strong> approach <strong>to</strong> juvenile crime, which <strong>in</strong><strong>the</strong> UK led <strong>in</strong> <strong>the</strong> 1990s <strong>to</strong> <strong>the</strong> effective reduction <strong>in</strong> <strong>the</strong> age of crim<strong>in</strong>al responsibility <strong>to</strong><strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |85


10 years accompanied by a series of measures that were designed <strong>to</strong> tackle youth crime.She conv<strong>in</strong>c<strong>in</strong>gly argued that adolescents <strong>in</strong>volved <strong>in</strong> crim<strong>in</strong>ality became less victims ofsocial fail<strong>in</strong>gs <strong>in</strong> need of protection but ra<strong>the</strong>r crim<strong>in</strong>als who require <strong>the</strong> <strong>in</strong>tervention of<strong>the</strong> crim<strong>in</strong>al justice system. Gillespie (2008) has argued that <strong>in</strong> <strong>the</strong> UK <strong>the</strong> crim<strong>in</strong>al justicesystem is <strong>in</strong>creas<strong>in</strong>gly adopt<strong>in</strong>g a harsher approach <strong>to</strong> adolescents who break <strong>the</strong> law, with<strong>the</strong> law adopt<strong>in</strong>g very different approaches <strong>to</strong> adolescents <strong>in</strong>volved <strong>in</strong> <strong>in</strong>decent images ofchildren and those who have direct sexual contact with ano<strong>the</strong>r adult. This is echoed byHeverly (2008), “There is a desire <strong>to</strong> recognise children as au<strong>to</strong>nomous ac<strong>to</strong>rs, while at <strong>the</strong>same time <strong>in</strong>sulat<strong>in</strong>g <strong>the</strong>m from <strong>the</strong> repercussions of some of <strong>the</strong>ir actions. This conflictseems <strong>to</strong> underlie <strong>the</strong> current movements <strong>to</strong> remove m<strong>in</strong>or protection, even if <strong>the</strong> m<strong>in</strong>orcould not – from a developmental standpo<strong>in</strong>t – fully understand <strong>the</strong> implications of <strong>the</strong>iractions” (p. 110). It is also worth not<strong>in</strong>g that <strong>the</strong> Optional Pro<strong>to</strong>col does not expressly callfor <strong>the</strong> non-crim<strong>in</strong>alisation of children who are victims of sexual exploitation, and manychildren who are exploited through prostitution and pornography are treated as crim<strong>in</strong>al <strong>in</strong><strong>the</strong> justice system. The Committee on <strong>the</strong> Rights of <strong>the</strong> <strong>Child</strong> encourages State parties <strong>to</strong>abolish every legal provision result<strong>in</strong>g <strong>in</strong> adm<strong>in</strong>istrative or o<strong>the</strong>r punishment of <strong>the</strong> victimsof commercial and sexual exploitation and <strong>to</strong> prevent o<strong>the</strong>r stigmatisation of <strong>the</strong> victims.Even <strong>in</strong> countries where legislation uses <strong>the</strong> def<strong>in</strong>ition of child pornography quoted <strong>in</strong><strong>the</strong> <strong>in</strong>ternational <strong>in</strong>struments, <strong>the</strong> fact rema<strong>in</strong>s that images of adolescents who are postpubertalwill, <strong>in</strong> many countries, not be <strong>in</strong>vestigated as crimes aga<strong>in</strong>st <strong>the</strong> law mak<strong>in</strong>gpossession or distribution of child pornography illegal. In a controversial rul<strong>in</strong>g by <strong>the</strong>supreme court of Sweden <strong>in</strong> January 2005, a man was not sentenced for produc<strong>in</strong>g childpornography, even though he knew that <strong>the</strong> two girls that he paid <strong>to</strong> act <strong>in</strong> a pornographicfilm were only 16 years old. He was sentenced for sexual assault, but not for produc<strong>in</strong>gchild pornography s<strong>in</strong>ce <strong>the</strong> court found <strong>the</strong> girls’ physical maturation <strong>to</strong> be such that <strong>the</strong>irphysical age should not be seen as <strong>the</strong> decisive fact (Supreme Court of Sweden, 2005).A change <strong>in</strong> Swedish legislation has s<strong>in</strong>ce been suggested but has not come <strong>in</strong><strong>to</strong> force.Police <strong>in</strong> several countries will admit <strong>to</strong> not <strong>in</strong>vestigat<strong>in</strong>g images that portray adolescents<strong>in</strong> sexually abusive situations s<strong>in</strong>ce <strong>the</strong> verification of an adolescent’s age is difficult. Itmight be argued that, at a very m<strong>in</strong>imum, child pornography def<strong>in</strong>itions should <strong>in</strong>cludeany material:• Which shows or relates <strong>to</strong> a person who is a child, or is be<strong>in</strong>g depicted as a child,engaged, or depicted as be<strong>in</strong>g engaged, <strong>in</strong> sexual activity;• Which shows a person who is a child, or is be<strong>in</strong>g depicted as a child, witness<strong>in</strong>g anysuch activity by any person(s);• Which has as a dom<strong>in</strong>ant characteristic <strong>the</strong> depiction, for sexual purposes, of <strong>the</strong>breasts, genitals or anus of a child, or of a person be<strong>in</strong>g depicted as a child;86|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


• Which is a visual or audio representation that advocates, encourages or counsels anysexual activity with children that is an offence under any enactment, or• Which is any visual representation or description of, or <strong>in</strong><strong>format</strong>ion relat<strong>in</strong>g <strong>to</strong>, achild that <strong>in</strong>dicates or implies that <strong>the</strong> child is available for sexual purposes.The above is based on <strong>the</strong> Irish <strong>Child</strong> Traffick<strong>in</strong>g and Pornography Act, 1998, Section 2(Government of Ireland, 1998).ICMEC (2006) used <strong>the</strong> UN def<strong>in</strong>ition <strong>in</strong> its study of <strong>the</strong> 184 Interpol member countries.Their results <strong>in</strong>dicated that 95 countries have no legislation at all that specifically addresseschild pornography and 41 countries do not crim<strong>in</strong>alise possession of child pornography,regardless of <strong>in</strong>tent <strong>to</strong> distribute (ICMEC, 2006). The <strong>to</strong>pics addressed <strong>in</strong> this reportemphasised that attention should be give <strong>to</strong>:1. Def<strong>in</strong><strong>in</strong>g “child” for <strong>the</strong> purposes of child pornography as anyone under <strong>the</strong> age of18, regardless of <strong>the</strong> age of sexual consent;2. Def<strong>in</strong><strong>in</strong>g “child pornography,” and ensur<strong>in</strong>g that <strong>the</strong> def<strong>in</strong>ition <strong>in</strong>cludes computerand Internet specific term<strong>in</strong>ology;3. Creat<strong>in</strong>g offences specific <strong>to</strong> child pornography <strong>in</strong> <strong>the</strong> national penal code, <strong>in</strong>clud<strong>in</strong>gcrim<strong>in</strong>alis<strong>in</strong>g <strong>the</strong> possession of child pornography, regardless of one’s <strong>in</strong>tent <strong>to</strong>distribute, and <strong>in</strong>clud<strong>in</strong>g provisions specific <strong>to</strong> <strong>download</strong><strong>in</strong>g or view<strong>in</strong>g images on<strong>the</strong> Internet;4. Ensur<strong>in</strong>g crim<strong>in</strong>al penalties for parents or legal guardians who acquiesce <strong>to</strong> <strong>the</strong>irchild’s participation <strong>in</strong> child pornography;5. Penalis<strong>in</strong>g those who make known <strong>to</strong> o<strong>the</strong>rs where <strong>to</strong> f<strong>in</strong>d child pornography;6. Includ<strong>in</strong>g groom<strong>in</strong>g provisions;7. Punish<strong>in</strong>g attempt crimes;8. Establish<strong>in</strong>g manda<strong>to</strong>ry report<strong>in</strong>g requirements for healthcare and social serviceprofessionals, teachers, law enforcement officers, pho<strong>to</strong> developers, <strong>in</strong><strong>format</strong>iontechnology (IT) professionals, ISPs, credit card companies, and banks;9. Address<strong>in</strong>g <strong>the</strong> crim<strong>in</strong>al liability of children <strong>in</strong>volved <strong>in</strong> pornography; and10. Enhanc<strong>in</strong>g penalties for repeat offenders, organised crime participants, and o<strong>the</strong>raggravated fac<strong>to</strong>rs considered upon sentenc<strong>in</strong>g.However, <strong>the</strong> call by ICMEC (2006) for stiffer sentences does not elaborate on what <strong>the</strong>sesentences might be (prison or community) and does not consider o<strong>the</strong>r options, such asrequirement <strong>to</strong> engage with a sex offender management programme. Beech et al. (2008)have <strong>in</strong>dicated that, “However, social science evidence <strong>in</strong>dicates that deterrence will notimprove community protection. Not one s<strong>in</strong>gle review of controlled outcome research<strong>in</strong> crim<strong>in</strong>al justice or corrections has found a large or consistent effect on reduc<strong>in</strong>g re-<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |87


offend<strong>in</strong>g through variations <strong>in</strong> <strong>the</strong> type or severity of <strong>the</strong> crim<strong>in</strong>al penalty or disposition(Andrews, 1995). For example, Smith, Gogg<strong>in</strong>, and Gendreau (2002) concluded, afteran <strong>in</strong>-depth review of 111 studies <strong>in</strong>volv<strong>in</strong>g 442,000 offenders, of all offense types, that:(1) harsher crim<strong>in</strong>al sanctions do not deter re-offend<strong>in</strong>g; (2) prison sentences are related<strong>to</strong> <strong>in</strong>creased re-offend<strong>in</strong>g rates; (3) longer prison sentences are associated with high reoffend<strong>in</strong>grates; and (4) sentences of more than two years result <strong>in</strong> average <strong>in</strong>creases ofre-offend<strong>in</strong>g rate of 7%. The exception may be <strong>in</strong>capacitation where <strong>the</strong> communityis protected while offenders are <strong>in</strong> prison. However, it is expected that <strong>the</strong> majority ofoffenders <strong>in</strong> <strong>the</strong> context of this paper would eventually be released, if <strong>in</strong>carcerated <strong>in</strong> <strong>the</strong>first <strong>in</strong>stance” (p. 11). Adler (2001) has gone beyond this <strong>to</strong> suggest that <strong>the</strong> legal waraga<strong>in</strong>st pornography has already been lost, and that <strong>the</strong>re is, “<strong>the</strong> possibility that certa<strong>in</strong>sexual prohibitions <strong>in</strong>vite <strong>the</strong>ir own violation by <strong>in</strong>creas<strong>in</strong>g <strong>the</strong> sexual allure of what <strong>the</strong>yforbid. I suggest that child pornography law and <strong>the</strong> eroticization of children exist <strong>in</strong> adialectic of transgression and taboo: The dramatic expansion of child pornography lawmay have unwitt<strong>in</strong>gly heightened pedophilic desire” (Adler, 2001, p. 4). This rema<strong>in</strong>s acontentious issue.However, <strong>in</strong> law offences related <strong>to</strong> child pornography are not all treated as <strong>the</strong> same.Akdeniz (2008) referred <strong>to</strong> this as a ‘cha<strong>in</strong> of liability’. At <strong>the</strong> <strong>to</strong>p of <strong>the</strong> cha<strong>in</strong> are thosewho produce abusive images or content, and will be made up of, although not exclusively,those who will have sexually abused <strong>the</strong> children <strong>in</strong> <strong>the</strong> images. Many of <strong>the</strong>se will produceimages with<strong>in</strong> a domestic sett<strong>in</strong>g where production is part of a spectrum of abusive practices.As has been previously discussed, this group consists of sexual abusers and sexual exploiterss<strong>in</strong>ce <strong>the</strong> pho<strong>to</strong>graphy is always <strong>the</strong>re <strong>to</strong> cont<strong>in</strong>ue <strong>to</strong> exploit <strong>the</strong> sexual abuse <strong>in</strong> someway. The second group that sexually exploit are those who distribute child pornographyover <strong>the</strong> Internet, ei<strong>the</strong>r commercially (for f<strong>in</strong>ancial ga<strong>in</strong>), or non-commercially, where <strong>the</strong>images <strong>the</strong>mselves function as a form of currency (Taylor and Quayle, 2003) or possiblyas a means <strong>to</strong> raise <strong>the</strong>ir status <strong>in</strong> a group or <strong>to</strong> confirm <strong>the</strong>ir allegiance and sense ofbelong<strong>in</strong>g <strong>to</strong> a group. The f<strong>in</strong>al group are those who sexually exploit <strong>the</strong> child through <strong>the</strong>possession of images <strong>download</strong>ed from <strong>the</strong> Internet (or occasionally acquired via mobilephone). This latter group are often considered <strong>the</strong> least serious of offenders and are likely<strong>to</strong> attract a lower sentence. However, Clough (2008) has suggested that, “We have seenthat traditional notions of possession may prove problematic <strong>in</strong> <strong>the</strong> digital environment.While actual possession may be difficult <strong>to</strong> prove, <strong>in</strong> many cases it is clearly established,often on <strong>the</strong>ir own admission, that <strong>the</strong> defendant did <strong>in</strong> fact view child pornography. Itmay <strong>the</strong>refore be argued that ra<strong>the</strong>r than be<strong>in</strong>g prosecuted for possession, <strong>the</strong>y should beprosecuted for ‘access<strong>in</strong>g’ child pornography” (p. 233). Clough (2008) goes on <strong>to</strong> breakaccess<strong>in</strong>g down <strong>in</strong><strong>to</strong> three components:1. Display<strong>in</strong>g/view<strong>in</strong>g88|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


i. The display of <strong>the</strong> material by a computer or any o<strong>the</strong>r output of <strong>the</strong> material froma computer orii. The copy<strong>in</strong>g or mov<strong>in</strong>g of <strong>the</strong> material <strong>to</strong> any place <strong>in</strong> a computer or <strong>to</strong> a data s<strong>to</strong>ragedevice oriii. In <strong>the</strong> case of material that is a program – <strong>the</strong> execution of <strong>the</strong> program.2. Transmitt<strong>in</strong>g/receiv<strong>in</strong>g3. Request<strong>in</strong>gIt may also be argued that national laws should also <strong>in</strong>clude an offence of procur<strong>in</strong>g childpornography for oneself or ano<strong>the</strong>r person, with <strong>the</strong> implication that this is actively sought.This might cover <strong>download</strong><strong>in</strong>g of computer data as well as <strong>the</strong> purchase of child abuseimages onl<strong>in</strong>e.It is perhaps surpris<strong>in</strong>g that not all <strong>in</strong>struments necessarily crim<strong>in</strong>alise <strong>the</strong> view<strong>in</strong>g ofInternet child pornography. Gillespie (2008) concluded that, “The UN Pro<strong>to</strong>col does notmention this at all. The Council of Europe Convention on Cybercrime mentions it onlyobliquely, as it crim<strong>in</strong>alises <strong>the</strong> procurement of child pornography. Procurement could meanobta<strong>in</strong><strong>in</strong>g (and this, it is submitted, would <strong>in</strong>clude view<strong>in</strong>g) or it could mean purchas<strong>in</strong>g(<strong>in</strong> which case view<strong>in</strong>g may not be <strong>in</strong>cluded)”. All four <strong>in</strong>struments crim<strong>in</strong>alise possession,although this is sometimes subject <strong>to</strong> certa<strong>in</strong> limitations. Aga<strong>in</strong> <strong>the</strong> fact that view<strong>in</strong>g isnot universally crim<strong>in</strong>alised may be attributed <strong>to</strong> a disparity <strong>in</strong> how <strong>the</strong> exploitation of<strong>the</strong> image of child abuse should be seen. If view<strong>in</strong>g <strong>the</strong> image is part of <strong>the</strong> cha<strong>in</strong> ofsexual exploitation set <strong>in</strong> motion by <strong>the</strong> sexual abuse committed, <strong>the</strong>n this <strong>to</strong>o should becrim<strong>in</strong>alised. It would seem sensible <strong>to</strong> conclude that States should <strong>in</strong>clude a separateoffence of ‘<strong>the</strong> <strong>in</strong>tentional view<strong>in</strong>g and access<strong>in</strong>g’ of child pornography <strong>in</strong> <strong>the</strong>ir nationalbody of laws.One issue that rema<strong>in</strong>s ambiguous is how child pornography should be judged. Wehave seen that <strong>the</strong>re are differences <strong>in</strong> whe<strong>the</strong>r <strong>the</strong>se judgments are made objectively orsubjectively. This was discussed earlier <strong>in</strong> relation <strong>to</strong> def<strong>in</strong>itions of child pornography.Gillespie (2008) has argued that <strong>the</strong> <strong>in</strong>ternational <strong>in</strong>struments do not agree, or <strong>in</strong>deed onwhat should be represented. The UN Optional Pro<strong>to</strong>col appears <strong>to</strong> <strong>in</strong>dicate that <strong>the</strong>re shouldbe an objective judgment, as it refers <strong>to</strong> representations of sexual activity or sexual parts,but it <strong>the</strong>n <strong>in</strong>troduces a subjective element by say<strong>in</strong>g that it must be, “for primarily sexualpurposes”. Presumably this has been done <strong>to</strong> exclude material such as medical imagesthat are used for legitimate reasons (but which might also be misused). The Council ofEurope Convention on Cybercrime adopts an objective stance by concentrat<strong>in</strong>g on explicitconduct, similar <strong>to</strong> <strong>the</strong> EU Framework Decision which <strong>in</strong>cludes, “lascivious exhibition of<strong>the</strong> genitals or pubic area of a child”. The Council of Europe Convention on Cybercrime<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |89


follows <strong>the</strong> UN Optional Pro<strong>to</strong>col def<strong>in</strong>ition, but <strong>the</strong>n <strong>in</strong>troduces subjective elements. Thesedifferences may lead <strong>to</strong> different understand<strong>in</strong>gs of what needs <strong>to</strong> be represented. The newCouncil of Europe Convention on <strong>the</strong> protection of children aga<strong>in</strong>st sexual exploitation andsexual abuse establishes a new offence of, “know<strong>in</strong>gly obta<strong>in</strong><strong>in</strong>g access, through <strong>in</strong><strong>format</strong>ionand communication technology, <strong>to</strong> child pornography”, which is <strong>in</strong>tended <strong>to</strong> crim<strong>in</strong>alise<strong>the</strong> behaviour of those who access child pornography without <strong>download</strong><strong>in</strong>g. The act mustbe <strong>in</strong>tentional, mean<strong>in</strong>g that it would not cover those who come across illegal material<strong>in</strong>advertently. However, this is subject <strong>to</strong> an important caveat that States may reserve <strong>the</strong>irright not <strong>to</strong> crim<strong>in</strong>alise this conduct.However, <strong>the</strong> Council of Europe Convention on <strong>the</strong> Protection of children aga<strong>in</strong>st sexualexploitation and sexual abuse seeks not only <strong>to</strong> legislate aga<strong>in</strong>st sexual exploitation through<strong>the</strong> production, dissem<strong>in</strong>ation and possession of child pornography. Article 23 relates <strong>to</strong><strong>the</strong> solicitation of children for sexual purposes, requir<strong>in</strong>g each Party <strong>to</strong> take <strong>the</strong> necessarylegislative or o<strong>the</strong>r measures <strong>to</strong> crim<strong>in</strong>alise <strong>the</strong> <strong>in</strong>tentional proposal, through <strong>in</strong><strong>format</strong>ionand communication technologies, of an adult <strong>to</strong> meet a child who has not reached <strong>the</strong>age set <strong>in</strong> application of Article 18 paragraph 2, for <strong>the</strong> purpose of committ<strong>in</strong>g any of<strong>the</strong> offences established <strong>in</strong> accordance with Articles 18 paragraph 1a or 20 paragraph1a aga<strong>in</strong>st him or her, where this proposal has been followed by material acts lead<strong>in</strong>g <strong>to</strong>such a meet<strong>in</strong>g. The Convention was opened for signature on 25 Oc<strong>to</strong>ber 2007. To date(September 2008) <strong>the</strong>re have been 29 signatures and no ratifications.Let us conclude this section by revisit<strong>in</strong>g <strong>the</strong> Optional Pro<strong>to</strong>col. One significant featurelies <strong>in</strong> its focus on <strong>the</strong> welfare protection of <strong>the</strong> child, reflected <strong>in</strong> Articles 8–11. Dutiesare placed on States <strong>to</strong> protect <strong>the</strong> rights and <strong>in</strong>terests of child victims at all stages of<strong>the</strong> crim<strong>in</strong>al justice process (Article 8), <strong>to</strong> support laws, social policy and programmes<strong>to</strong> prevent <strong>the</strong> Pro<strong>to</strong>col offences and promote public awareness (Article 9) and <strong>to</strong> takeall necessary steps <strong>to</strong> streng<strong>the</strong>n <strong>in</strong>ternational co-operation (Article 10). However, anexam<strong>in</strong>ation of <strong>the</strong> reservations and declarations by countries were largely concerned withprovid<strong>in</strong>g a clearer focus on <strong>the</strong> various def<strong>in</strong>itions <strong>to</strong> ref<strong>in</strong>e <strong>the</strong> policy of <strong>in</strong>ternationalcrim<strong>in</strong>alisation. Buck (2008) concludes that, “Despite <strong>the</strong> ‘holistic’ approach that emergesfrom <strong>the</strong> work of <strong>the</strong> Special Rapporteur and <strong>the</strong> duality of overall purpose implicit <strong>in</strong><strong>the</strong> text of <strong>the</strong> Pro<strong>to</strong>col, <strong>the</strong> observations of state behaviour, <strong>in</strong> terms of <strong>the</strong>ir reservationsand declarations and <strong>in</strong> <strong>the</strong> report<strong>in</strong>g dialogue with <strong>the</strong> committee, reflects an unevenemphasis on <strong>in</strong>ternational crim<strong>in</strong>alisation but without <strong>the</strong> additional <strong>in</strong>tended focus onwelfare protection, re<strong>in</strong>tegration and rehabilitation of child victims… The content of <strong>the</strong>OPSC itself has emerged more as an <strong>in</strong>strument of <strong>in</strong>ternational crim<strong>in</strong>alisation as itscentral thrust ra<strong>the</strong>r than a comprehensive package of welfare protection” (p. 176). Whenwe look critically at our understand<strong>in</strong>g of, and responses <strong>to</strong>, victimisation through Internet90|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


sex offend<strong>in</strong>g, this would certa<strong>in</strong>ly seem <strong>to</strong> be true. The Optional Pro<strong>to</strong>col has emergedmore as an <strong>in</strong>strument of <strong>in</strong>ternational crim<strong>in</strong>alisation as its central tenet ra<strong>the</strong>r than acomprehensive package of welfare protection. Article 8 does provide a number of measuresthat States must take <strong>to</strong> protect children <strong>in</strong> <strong>the</strong> legal process but <strong>the</strong>se are not implemented.This means that o<strong>the</strong>r key <strong>in</strong>struments must also be used and implemented, notably <strong>the</strong>Guidel<strong>in</strong>es on Justice for <strong>Child</strong> Victims and Witnesses.The Guidel<strong>in</strong>es provide a practical framework <strong>to</strong>: guide professionals work<strong>in</strong>g with childvictims and witnesses of crimes <strong>in</strong> <strong>the</strong>ir day-<strong>to</strong>-day practice; assist <strong>in</strong> <strong>the</strong> review of laws,procedures and practices so that <strong>the</strong>se ensure full respect for <strong>the</strong> rights of child victims andwitnesses of crime; assist governments, <strong>in</strong>ternational organisations, public agencies, nongovernmentaland community-based organisations and o<strong>the</strong>r <strong>in</strong>terested parties <strong>in</strong> design<strong>in</strong>gand implement<strong>in</strong>g legislation, policy, programmes and practices, and support those car<strong>in</strong>gfor children <strong>in</strong> deal<strong>in</strong>g sensitively with this particularly vulnerable group. Even though <strong>the</strong><strong>Child</strong> Victims Guidel<strong>in</strong>es do not constitute a legally b<strong>in</strong>d<strong>in</strong>g <strong>document</strong>, <strong>the</strong>ir importanceis manifest <strong>in</strong> that <strong>the</strong> UN Committee on <strong>the</strong> Rights of <strong>the</strong> <strong>Child</strong> now systematically refers<strong>to</strong> <strong>the</strong>m <strong>in</strong> its recommendations <strong>to</strong> State Parties, for example by recommend<strong>in</strong>g that <strong>the</strong>yadapt child-sensitive procedures <strong>in</strong> accordance with <strong>the</strong> <strong>Child</strong> Victims Guidel<strong>in</strong>es.It is apparent that not all <strong>in</strong>struments necessarily def<strong>in</strong>e <strong>the</strong> <strong>in</strong>tentional view<strong>in</strong>g ofInternet child pornography as crim<strong>in</strong>al, and while possession is crim<strong>in</strong>alised this issometimes subject <strong>to</strong> certa<strong>in</strong> limitations. There are still unresolved issues about how childpornography should be judged, and ultimately while <strong>the</strong> Optional Pro<strong>to</strong>col places duties onStates <strong>to</strong> protect <strong>the</strong> rights and <strong>in</strong>terests of child victims at all stages of <strong>the</strong> crim<strong>in</strong>al justiceprocess, its central thrust is as an <strong>in</strong>strument of <strong>in</strong>ternational crim<strong>in</strong>alisation ra<strong>the</strong>r thana comprehensive package of welfare protection.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |91


6. Prevention and educationThe fact that children may come <strong>to</strong> harm <strong>in</strong> more ways than by be<strong>in</strong>g <strong>the</strong> objects of childabusive images has resulted <strong>in</strong> a grow<strong>in</strong>g concern regard<strong>in</strong>g <strong>the</strong> risks posed <strong>to</strong> children andyoung people as <strong>the</strong>y <strong>in</strong>creas<strong>in</strong>gly <strong>in</strong>teract and communicate via <strong>the</strong> Internet and mobilephones. This transition that we have seen over <strong>the</strong> past 10 years seems <strong>to</strong> be accelerat<strong>in</strong>gas <strong>the</strong> commercial <strong>in</strong>terests grow. Young people are a profitable market <strong>to</strong> explore and awebsite that can demonstrate a high number of daily young visi<strong>to</strong>rs will attract advertisersand generate profit. Creat<strong>in</strong>g and ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g a large group of loyal repeat visi<strong>to</strong>rs <strong>to</strong> a site,such as a group of members or owners of <strong>the</strong>ir own space that spend time on <strong>the</strong> site, is ameans of attract<strong>in</strong>g <strong>in</strong>ves<strong>to</strong>rs and <strong>in</strong>creas<strong>in</strong>g likelihood of generat<strong>in</strong>g profit.In o<strong>the</strong>r parts of this paper we have described young peoples’ use of <strong>the</strong> technologyand what is known about <strong>the</strong> risks of abuse and violence <strong>the</strong>y run. To counteract <strong>the</strong>sethreats organisations began produc<strong>in</strong>g materials with <strong>the</strong> aim of educat<strong>in</strong>g young peopleand children of different ages. The European Commission set up <strong>the</strong> Safer Internetprogramme, followed by <strong>the</strong> Safer Internet plus programme that, apart from f<strong>in</strong>anc<strong>in</strong>gnational hotl<strong>in</strong>es <strong>in</strong>volved <strong>in</strong> <strong>the</strong> effort <strong>to</strong> curb traffic <strong>in</strong> child abusive images, also f<strong>in</strong>anced<strong>in</strong>itiatives <strong>to</strong> make <strong>the</strong> Internet safe for children and young people by educative measuresand awareness-rais<strong>in</strong>g activities. The Safer Internet Plus programme has f<strong>in</strong>anced <strong>the</strong>establishment of Awareness nodes <strong>in</strong> <strong>the</strong> member states and also <strong>the</strong> coord<strong>in</strong>ation of <strong>the</strong>senodes through INSAFE 5 . Over <strong>the</strong> years <strong>the</strong> programme has f<strong>in</strong>anced <strong>the</strong> developmen<strong>to</strong>f filter<strong>in</strong>g technology software along with <strong>the</strong> production of traditional awareness-rais<strong>in</strong>gmaterials describ<strong>in</strong>g risks that young people may run when us<strong>in</strong>g <strong>the</strong> Internet 6 .6.1 Youth, agency and education6.1.1 In<strong>format</strong>ion materialsThe first generation of safety <strong>to</strong>ols were <strong>the</strong> <strong>in</strong>famous “Don’t” messages. These were pr<strong>in</strong>tedon mouse-mats, <strong>in</strong> leaflets and on stickers that could be stuck <strong>to</strong> a computer screen. Themessage <strong>in</strong> <strong>the</strong>m was that young people should keep <strong>the</strong>ir contact details away from people<strong>the</strong>y met on <strong>the</strong> Internet. These people might not be who <strong>the</strong>y claim <strong>to</strong> be, and it was mostimportant not <strong>to</strong> meet IRL (In Real Life) with anyone met only onl<strong>in</strong>e. These messageswere later ref<strong>in</strong>ed, partly because young people did meet o<strong>the</strong>r youth IRL and because92|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


<strong>the</strong> vast majority who met someone offl<strong>in</strong>e with whom <strong>the</strong>y had only had contact withonl<strong>in</strong>e had found <strong>the</strong> meet<strong>in</strong>g fun and reward<strong>in</strong>g (Medierådet, 2006). The message ofnot meet<strong>in</strong>g anyone offl<strong>in</strong>e who had only been met onl<strong>in</strong>e, changed <strong>in</strong><strong>to</strong>: “Br<strong>in</strong>g yourparent or a friend along <strong>to</strong> <strong>the</strong> first meet<strong>in</strong>g”. In exam<strong>in</strong><strong>in</strong>g of <strong>the</strong> Internet habits of youngpeople, some questionnaires and surveys have <strong>in</strong>cluded a question about offl<strong>in</strong>e meet<strong>in</strong>gswith onl<strong>in</strong>e acqua<strong>in</strong>tances. In <strong>the</strong> SAFT survey of 2005, a representative sample of 11–15year olds was asked about meet<strong>in</strong>g someone offl<strong>in</strong>e with whom <strong>the</strong>y had become friendsonl<strong>in</strong>e. Only 8% admitted <strong>to</strong> hav<strong>in</strong>g done so. This figure was, <strong>in</strong> fact, lower than that <strong>in</strong> asimilar survey made <strong>in</strong> 2003, when as many as 26% claimed hav<strong>in</strong>g met someone <strong>in</strong> thisway. The authors speculated whe<strong>the</strong>r young people had taken heed of some of <strong>the</strong> safetymessages and publicity about children be<strong>in</strong>g hurt by people <strong>the</strong>y meet offl<strong>in</strong>e after hav<strong>in</strong>gbecome friends onl<strong>in</strong>e. A follow-up question of obvious <strong>in</strong>terest asked <strong>the</strong> young person <strong>to</strong>categorise <strong>the</strong> experience. None of <strong>the</strong> respondents ticked <strong>the</strong> box: “The person I met withtried <strong>to</strong> hurt me”. The majority of <strong>the</strong> young people <strong>in</strong> <strong>the</strong> 2005 survey claimed that <strong>the</strong>meet<strong>in</strong>g had been fun and reward<strong>in</strong>g.The predom<strong>in</strong>ant aim of <strong>the</strong> safety <strong>to</strong>ols and messages has rema<strong>in</strong>ed <strong>to</strong> keep young peoplefrom meet<strong>in</strong>g with strangers offl<strong>in</strong>e. Films have been produced warn<strong>in</strong>g about <strong>the</strong> possibleharm that can occur. An example of this is Jenny’s S<strong>to</strong>ry, produced by <strong>Child</strong>net-International<strong>in</strong> <strong>the</strong> UK. Websites where true s<strong>to</strong>ries of young peoples’ experiences are described havealso been set up (www.katiesplace.org). The goals of such material are <strong>to</strong> keep adolescentssafe onl<strong>in</strong>e by <strong>in</strong>creas<strong>in</strong>g <strong>the</strong> technological awareness and sophistication of <strong>the</strong> teenagers<strong>the</strong>mselves. We cannot ignore <strong>the</strong> fact that attempt<strong>in</strong>g <strong>to</strong> prohibit certa<strong>in</strong> activities, bothonl<strong>in</strong>e and offl<strong>in</strong>e, does adolescents a disservice and denies <strong>the</strong> fact that educational, socialand psychological benefits of us<strong>in</strong>g <strong>the</strong> Internet far outweigh <strong>the</strong> dangers for <strong>the</strong> majorityof children (Tynes, 2007).6.1.2 Onl<strong>in</strong>e safety <strong>to</strong>olsOnl<strong>in</strong>e safety <strong>to</strong>ols have <strong>in</strong>cluded abuse but<strong>to</strong>ns added <strong>to</strong> websites that children visit, mak<strong>in</strong>git easy for young people <strong>to</strong> report problematic issues or frighten<strong>in</strong>g onl<strong>in</strong>e encounters <strong>the</strong>yexperience. In <strong>the</strong> UK, <strong>the</strong> abuse but<strong>to</strong>n <strong>in</strong>troduced by <strong>the</strong> <strong>Child</strong> Exploitation and Onl<strong>in</strong>eProtection <strong>Centre</strong>, CEOP, has been widely publicised, giv<strong>in</strong>g young people and adultsa one-s<strong>to</strong>p possibility of report<strong>in</strong>g different forms of unwanted experiences <strong>in</strong>clud<strong>in</strong>gabusive experiences, bully<strong>in</strong>g or o<strong>the</strong>r forms of abuse <strong>the</strong>y may witness or be exposed <strong>to</strong>.The Norwegian police have recently <strong>in</strong>itiated a similar abuse but<strong>to</strong>n, <strong>the</strong> use of whichis now quickly spread<strong>in</strong>g through <strong>the</strong> different network<strong>in</strong>g sites and chatrooms used bychildren and adolescents <strong>in</strong> Norway 7 . In both <strong>the</strong>se countries Microsoft has agreed <strong>to</strong> carry<strong>the</strong> abuse but<strong>to</strong>n on W<strong>in</strong>dows Live Messenger.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |93


Chatrooms are be<strong>in</strong>g moderated. Modera<strong>to</strong>rs follow <strong>in</strong> real time <strong>the</strong> conversations tak<strong>in</strong>gplace on chat sites, and are able <strong>to</strong> block users who use words that would <strong>in</strong>dicate improperuse of <strong>the</strong> site or who attempt <strong>to</strong> contact young people for offl<strong>in</strong>e meet<strong>in</strong>gs. Chatmoderationuses software <strong>to</strong>ols <strong>to</strong> build databases with words and phrases <strong>to</strong> look out foror aliases that might raise suspicion 8 . Some projects have <strong>in</strong>cluded adults who are visibleand present on <strong>the</strong> chat sites. They contact <strong>the</strong> young people enter<strong>in</strong>g <strong>the</strong> site, mak<strong>in</strong>g<strong>the</strong>m aware of what may happen and tell<strong>in</strong>g <strong>the</strong>m that <strong>the</strong>y are <strong>the</strong>re <strong>to</strong> assist should <strong>the</strong>young person or child require assistance. A form of onl<strong>in</strong>e men<strong>to</strong>r<strong>in</strong>g fits <strong>in</strong><strong>to</strong> this categoryof onl<strong>in</strong>e safety measures whereby young people <strong>in</strong> a specific community may be contactedby an adult men<strong>to</strong>r and where an onl<strong>in</strong>e relationship can be built.6.1.3 Helpl<strong>in</strong>esIn response <strong>to</strong> young people’s need for counsell<strong>in</strong>g after hav<strong>in</strong>g experienced abusive orproblematic encounters onl<strong>in</strong>e, organisations have set up specific helpl<strong>in</strong>es. These function<strong>in</strong> different ways: some will target parents with advice, o<strong>the</strong>rs will ma<strong>in</strong>ly target childrenand young people <strong>the</strong>mselves, while o<strong>the</strong>rs will also give advice <strong>to</strong> professionals that meetchildren. Several helpl<strong>in</strong>es target a number of different audiences and also offer advice on<strong>to</strong>pics related <strong>to</strong> o<strong>the</strong>r forms of distress that young people may have experienced. In Europe,<strong>the</strong> European Commission, <strong>in</strong> its ‘Safer Internet plus’ programme, is now encourag<strong>in</strong>g allawareness nodes and hotl<strong>in</strong>es <strong>to</strong> team up with organisations that run a helpl<strong>in</strong>e, or setup one <strong>the</strong>mselves. To date, 11 EU member States have such helpl<strong>in</strong>es <strong>in</strong>cluded <strong>in</strong> <strong>the</strong>European network of awareness nodes. 96.1.4 Education packages for use <strong>in</strong> school sett<strong>in</strong>gsThroughout Europe, North America, Australia and New Zealand a number of educationpackages have been produced for use with different age groups <strong>in</strong> school sett<strong>in</strong>gs. The <strong>to</strong>olsaddress cyberbully<strong>in</strong>g, chatt<strong>in</strong>g and general safety on <strong>the</strong> Internet. 10 Tools are sometimescollated <strong>in</strong><strong>to</strong> <strong>to</strong>ol-boxes and very often <strong>the</strong>re is an <strong>in</strong>teractive element <strong>in</strong>volved.Alongside <strong>the</strong>se packages for children and young people, some useful awareness rais<strong>in</strong>gproducts have been developed for both parents/carers and teachers. This is a welcomedevelopment and one which has enabled adults responsible for <strong>the</strong> welfare of children <strong>to</strong>become more empowered and pro-active <strong>in</strong> safeguard<strong>in</strong>g <strong>the</strong> children <strong>in</strong> <strong>the</strong>ir charge.6.1.5 Media co-operationIn some countries, awareness <strong>in</strong>itiatives have been supported by ma<strong>in</strong>stream media. ThePolish awareness node produced <strong>the</strong> film I am Anna; this received a great deal of attentionfrom ma<strong>in</strong>stream media, which that broadcast <strong>the</strong> film free of charge. 1194|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


6.1.6 Evaluation of impactFew <strong>in</strong><strong>format</strong>ion or educational <strong>to</strong>ols have been evaluated for <strong>the</strong>ir impact on behavioursof <strong>the</strong> target groups. Evaluation of educational <strong>to</strong>ols is generally limited <strong>to</strong> a description ofuser satisfaction. In <strong>the</strong> report, Onl<strong>in</strong>e Behaviour of Young People – A European Perspective,Insafe, <strong>the</strong> European network of national Safer Internet nodes, attempted <strong>to</strong> measurehow behaviours of young children may change as a result of education <strong>in</strong> Internet safety.With variations between age groups, 40–60 % of <strong>the</strong> respondents claimed that <strong>the</strong>y listenand take action when <strong>to</strong>ld about dangers on <strong>the</strong> Internet; this may <strong>in</strong>dicate a change <strong>in</strong>behaviour (Insafe 2007). The impact on children and young people who have seen <strong>the</strong> filmJenny’s S<strong>to</strong>ry, mentioned above, has been measured <strong>in</strong> a survey of 2000 students and 19teachers: 80% of <strong>the</strong> pupils thought that watch<strong>in</strong>g <strong>the</strong> film had <strong>in</strong>creased <strong>the</strong>ir awareness ofrisks <strong>the</strong>y may run by meet<strong>in</strong>g offl<strong>in</strong>e someone <strong>the</strong>y have met on <strong>the</strong> Internet. Seventy-twoper cent believed that <strong>the</strong>ir view about <strong>in</strong>troduc<strong>in</strong>g someone <strong>the</strong>y met on <strong>the</strong> Internet <strong>to</strong> afriend had changed s<strong>in</strong>ce watch<strong>in</strong>g <strong>the</strong> film. After view<strong>in</strong>g <strong>the</strong> film only 3% thought <strong>the</strong>ywould share <strong>the</strong>ir personal details with someone <strong>the</strong>y had not met face <strong>to</strong> face, compared<strong>to</strong> 18% who would have done so prior <strong>to</strong> watch<strong>in</strong>g <strong>the</strong> film. Before watch<strong>in</strong>g <strong>the</strong> film, only14% would have <strong>to</strong>ld someone about go<strong>in</strong>g <strong>to</strong> a meet<strong>in</strong>g a person <strong>the</strong>y had met onl<strong>in</strong>e.After <strong>the</strong> film, 95% believed <strong>the</strong>y would tell someone. 12Obviously <strong>the</strong>se statistics do not tell us whe<strong>the</strong>r this publicity impacts on behaviour or willprevail over time, or if <strong>the</strong> behaviour change will withstand <strong>the</strong> test of reality. As po<strong>in</strong>tedout elsewhere <strong>in</strong> this paper, vulnerability fac<strong>to</strong>rs <strong>in</strong>fluence how children and young peopleperceive contact attempts on <strong>the</strong> Internet. A child may leave school only <strong>to</strong> come home <strong>to</strong> alonely situation, <strong>in</strong> which an adult contacted on <strong>the</strong> Internet, far from be<strong>in</strong>g <strong>the</strong> dangerousperson <strong>the</strong> child learned about at school, will be someone <strong>the</strong>y would appreciate stay<strong>in</strong>g <strong>in</strong>contact with.Only a few studies have evaluated how well Safer Internet educational programmes changestudents’ knowledge, attitudes and behaviours. A Canadian study carried out <strong>in</strong> 2003measured <strong>the</strong> effectiveness of <strong>the</strong> ‘Miss<strong>in</strong>g Program’, which was an <strong>in</strong>teractive computergame designed <strong>to</strong> assist students <strong>in</strong> develop<strong>in</strong>g <strong>the</strong>ir own Internet safety guidel<strong>in</strong>es. Thestudy found that children demonstrated more knowledge about Internet safety after be<strong>in</strong>g<strong>in</strong>volved <strong>in</strong> <strong>the</strong> programme, but that <strong>the</strong>ir attitudes or behaviour did not change (Crombieand Tr<strong>in</strong>neer, 2003, cited <strong>in</strong> Chibnall, Wallace, Leicht and Lunghofer, 2006). Similarly, alarger study made <strong>in</strong> <strong>the</strong> UK focused on how children applied <strong>the</strong>ir knowledge on safetyguidel<strong>in</strong>es when <strong>in</strong>teract<strong>in</strong>g <strong>in</strong> chatrooms. The study <strong>in</strong>cluded 1,369 children between <strong>the</strong>ages of 9 and 16, and concluded that children are well aware of safety guidel<strong>in</strong>es but didnot know when <strong>to</strong> apply this knowledge. The study argues that educational programmesneed <strong>to</strong> develop children’s onl<strong>in</strong>e safety skills <strong>in</strong> real-time onl<strong>in</strong>e environments (O’Connell,<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |95


Price and Barrow, 2004). The evaluation of <strong>the</strong> i-Safe programme was an attempt <strong>to</strong> use amore rigorous longitud<strong>in</strong>al design <strong>in</strong>clud<strong>in</strong>g a test group and a control group. The f<strong>in</strong>d<strong>in</strong>gswere that students <strong>in</strong> <strong>the</strong> test group ga<strong>in</strong>ed considerable knowledge on how <strong>to</strong> use <strong>the</strong>Internet safely, and that <strong>the</strong> changes were statistically significant and rema<strong>in</strong>ed overtime. However, “For behavior, <strong>the</strong> f<strong>in</strong>d<strong>in</strong>gs were not as positive. For <strong>the</strong> most part, <strong>the</strong>rewere no significant changes <strong>in</strong> behavior between <strong>the</strong> treatment and comparison groupson all scales” (Chibnall, Wallace, Leicht and Lunghofer, 2006). In summary, <strong>the</strong>re seems<strong>to</strong> be little exist<strong>in</strong>g evidence that safety-guidel<strong>in</strong>es education <strong>in</strong>fluences children’s onl<strong>in</strong>ebehaviour, even though <strong>the</strong> different awareness campaigns significantly <strong>in</strong>crease <strong>the</strong> levelof knowledge of how <strong>to</strong> behave safely on <strong>the</strong> Internet.The paper acknowledges <strong>the</strong> considerable work that has been done <strong>in</strong> generat<strong>in</strong>g<strong>in</strong><strong>format</strong>ion and educational materials for young people, teachers and parents, alongwith <strong>the</strong> development of helpl<strong>in</strong>es. However, few <strong>in</strong><strong>format</strong>ion <strong>to</strong>ols or education <strong>to</strong>olshave been evaluated for <strong>the</strong>ir impact on <strong>the</strong> behaviour of <strong>the</strong> target groups. We mightconclude that <strong>in</strong> spite of considerable <strong>in</strong>vestment <strong>in</strong> this area <strong>the</strong>re is little evidence thatsuch strategies <strong>in</strong>fluence behaviour, as opposed <strong>to</strong> attitudes or level of knowledge.6.2 The role of <strong>in</strong>dustry, <strong>the</strong> private sec<strong>to</strong>r and NGOs6.2.1 INHOPEOne of <strong>the</strong> recommendations made by <strong>the</strong> <strong>the</strong>matic paper for <strong>the</strong> Second World Congresswas that more hotl<strong>in</strong>es were needed <strong>to</strong> assist with <strong>the</strong> report<strong>in</strong>g and removal of childpornography. In 2001 <strong>the</strong>re were 15 members of INHOPE drawn from 12 countries, andas of 2008 this has grown <strong>to</strong> 28. INHOPE’s 2007 Global Internet Trend Report (INHOPE,2007) <strong>in</strong>dicates that dur<strong>in</strong>g <strong>the</strong> last quarter of 2006 <strong>the</strong> hotl<strong>in</strong>e network processed anaverage of 91,000 reports per month. Approximately 35,000 of <strong>the</strong>se reports werereceived from <strong>the</strong> public, and 19,000 were determ<strong>in</strong>ed <strong>to</strong> refer <strong>to</strong> ei<strong>the</strong>r illegal or harmfulcontent (not actionable by <strong>the</strong> hotl<strong>in</strong>es but accepted as be<strong>in</strong>g ‘disturb<strong>in</strong>g’ <strong>to</strong> some people).INHOPE determ<strong>in</strong>ed that 9,600 reports related <strong>to</strong> child pornography, and that thisnumber was <strong>in</strong>creas<strong>in</strong>g at an average of 120 reports per month. However, as a percentageof all illegal or harmful content child pornography comprises approximately 50%, andis decreas<strong>in</strong>g at an average rate of 2% per year. INHOPE also provides data on reportsof ‘O<strong>the</strong>r <strong>Child</strong>-Related Content’ and this is comprised of: child traffick<strong>in</strong>g, child-sex<strong>to</strong>urism, child nudism, child groom<strong>in</strong>g activities, child erotica/<strong>in</strong>appropriate images ofchildren, and adult pornography accessible <strong>to</strong> children. Some of this content is consideredillegal <strong>in</strong> most countries, but o<strong>the</strong>r types (such as nudity) would not be considered illegal <strong>in</strong>96|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


most countries. However, such images can give cause for concern depend<strong>in</strong>g on <strong>the</strong> context<strong>in</strong> which <strong>the</strong>y are acquired and collected and might be thought of <strong>in</strong> <strong>the</strong>se circumstancesas ‘<strong>in</strong>dicative’. The number of such reports received was approximately 3,600 per month <strong>in</strong><strong>the</strong> last quarter of 2006, with an average rate of <strong>in</strong>crease of 51 additional reports per month.‘O<strong>the</strong>r <strong>Child</strong> Related Content’ accounted for approximately 19% of all processed reportsabout illegal or harmful content.However, INHOPE not only receives reports (both from <strong>the</strong> public and through itsown proactive searches), but also takes appropriate action. In <strong>the</strong> last quarter of 2006approximately 6,400 reports per month were made <strong>to</strong> law enforcement agencies. However,INHOPE hotl<strong>in</strong>es rarely received any structured feedback from law enforcement agencies<strong>in</strong> relation <strong>to</strong> <strong>the</strong>se reports. While <strong>the</strong>re may be a variety of reasons for this, <strong>the</strong> reportsuggested that this was demotivat<strong>in</strong>g for staff and, as a result, INHOPE is work<strong>in</strong>g <strong>to</strong>adopt a signed Memorandum of Understand<strong>in</strong>g with national law enforcement agencieswhich would <strong>in</strong>clude feedback <strong>in</strong> relation <strong>to</strong> reports forwarded for <strong>in</strong>vestigation. The matteris fur<strong>the</strong>r complicated as some national law enforcement agencies request that hotl<strong>in</strong>ereports are not forwarded <strong>to</strong> <strong>the</strong>m when content may lie outside <strong>the</strong>ir jurisdiction. Thepaucity of feedback given <strong>to</strong> hotl<strong>in</strong>es by law enforcement agencies is a cause for concern,and it is difficult <strong>to</strong> understand how <strong>the</strong> effectiveness of <strong>the</strong> hotl<strong>in</strong>es can be evaluated <strong>in</strong>terms of <strong>the</strong>ir impact without adequate feedback.6.2.2 IWFThe Internet Watch Foundation (IWF) is a member of INHOPE and takes as its remitthat it will work <strong>in</strong> partnership with ISPs, telecommunication companies, mobile phoneopera<strong>to</strong>rs, software providers, <strong>the</strong> police, government and <strong>the</strong> public <strong>to</strong> m<strong>in</strong>imise <strong>the</strong>availability of potentially illegal onl<strong>in</strong>e content. Dur<strong>in</strong>g 2007 <strong>the</strong> IWF processed 34,871reports, which resulted <strong>in</strong> 2,755 <strong>to</strong>p-level doma<strong>in</strong>s with child sexual abuse content be<strong>in</strong>gassessed, confirmed as potentially illegal and traced; <strong>the</strong> appropriate <strong>in</strong>telligence was <strong>the</strong>ndissem<strong>in</strong>ated (IWF Annual Report, 2007). The overall number of child sexual abusedoma<strong>in</strong>s known <strong>to</strong> <strong>the</strong> IWF appears <strong>to</strong> have rema<strong>in</strong>ed relatively static over recent years.This may suggest that content distributed through <strong>the</strong> World Wide Web appears not <strong>to</strong> beon <strong>the</strong> <strong>in</strong>crease, <strong>in</strong> spite of global Internet access, speed of connection and <strong>the</strong> availabilityof technologies. The 2007 figures also suggest that 80% of child abuse doma<strong>in</strong>s known <strong>to</strong>IWF are commercial operations.The IWF also provides an analysis of abusive images <strong>in</strong> relation <strong>to</strong> <strong>in</strong>telligence that may beseen as actionable and <strong>the</strong>refore passed on <strong>to</strong> CEOP (<strong>the</strong> <strong>Child</strong> Exploitation and Onl<strong>in</strong>eProtection <strong>Centre</strong>, UK). IWF also provides <strong>in</strong><strong>format</strong>ion about <strong>the</strong> children whose images<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |97


are hosted on identified websites; distribution accord<strong>in</strong>g <strong>to</strong> age is shown <strong>in</strong> Figure 4:The IWF data also suggests that, “There is a cont<strong>in</strong>u<strong>in</strong>g trend <strong>in</strong> <strong>the</strong> severity of <strong>the</strong> abuse<strong>in</strong> images on <strong>the</strong> websites our analysts exam<strong>in</strong>e, with a significant proportion of websitesdepict<strong>in</strong>g records of abuse at levels 4 and 5; <strong>the</strong> most brutal and extreme sexual abuse, ascategorised accord<strong>in</strong>g <strong>to</strong> <strong>the</strong> UK Sentenc<strong>in</strong>g Guidel<strong>in</strong>es Council… 47% of <strong>the</strong> websiteswe assessed depicted potentially illegal child sexual abuse images <strong>in</strong> <strong>the</strong>se most severecategories…” (IWF, 2007).Probably one of <strong>the</strong> most significant contributions made by <strong>the</strong> IWF s<strong>in</strong>ce <strong>the</strong> SecondWorld Congress has been <strong>the</strong> development of a block<strong>in</strong>g list of URLs ascerta<strong>in</strong>ed <strong>to</strong>conta<strong>in</strong> child abuse images. Potentially illegal URLs are regularly added <strong>to</strong> <strong>the</strong> unique list98|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


of onl<strong>in</strong>e child sexual abuse content; this list is dynamic and is updated twice a day. The listalso enables <strong>the</strong> IWF <strong>to</strong> track <strong>the</strong> longevity of <strong>the</strong> websites offer<strong>in</strong>g abusive content. Theirresults suggested that while a small number of doma<strong>in</strong>s were consistently ‘live’, and <strong>the</strong>reforerepresented on <strong>the</strong> block<strong>in</strong>g list, dur<strong>in</strong>g 2007 <strong>the</strong> vast majority (71%) were live for less than50 days dur<strong>in</strong>g <strong>the</strong> year. This also shows <strong>the</strong> cont<strong>in</strong>u<strong>in</strong>g trend for such websites <strong>to</strong> changeservers regularly <strong>to</strong> avoid detection and removal, but also, “<strong>the</strong> effectiveness of efforts <strong>to</strong>make operations difficult, transient, costly and risky for offenders” (IWF, 2007). The listhas been used by ISPs, mobile phone opera<strong>to</strong>rs, search providers and filter<strong>in</strong>g companies.Law Enforcement Agencies and associated hotl<strong>in</strong>es that are members of INHOPE canalso choose <strong>to</strong> have access <strong>to</strong> <strong>the</strong> list, which typically conta<strong>in</strong>s between 800 and 1,200 livechild abuse URLs at any one time.Unfortunately, <strong>the</strong> block<strong>in</strong>g mechanism cannot put an end <strong>to</strong> offenders abus<strong>in</strong>g childrenor distribut<strong>in</strong>g images of child sexual abuse on <strong>the</strong> Internet, but at least this <strong>in</strong>itiativecontributes <strong>to</strong> an overall solution. Block<strong>in</strong>g facilitated by <strong>the</strong> use of this list applies only<strong>to</strong> website content and as such has no role or remit for tackl<strong>in</strong>g <strong>the</strong> distribution of childsexual abuse content through o<strong>the</strong>r channels such as peer-<strong>to</strong>-peer or <strong>in</strong>stant messag<strong>in</strong>g.As can be seen <strong>in</strong> Figure 6, above, 82.5% of all doma<strong>in</strong>s apparently featur<strong>in</strong>g child abusecontent dur<strong>in</strong>g 2006 were traced <strong>to</strong> servers apparently located <strong>in</strong> <strong>the</strong> US and Russia. Thosethat appeared <strong>to</strong> be hosted <strong>in</strong> doma<strong>in</strong>s <strong>in</strong> <strong>the</strong> UK rema<strong>in</strong>ed under 1% (IWF, 2006). Wherea UK host is identified, <strong>the</strong> IWF l<strong>in</strong>ks with both <strong>in</strong>dustry and law enforcement agencies<strong>to</strong> ensure its removal.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |99


6.2.3 IT <strong>in</strong>dustry responseThe recommendations made by <strong>the</strong> <strong>the</strong>matic paper from <strong>the</strong> Second World Congress<strong>in</strong>cluded those for <strong>the</strong> Internet <strong>in</strong>dustry. In particular, reference was made <strong>to</strong> Codes ofPractice with regard <strong>to</strong> m<strong>in</strong>imum standards for <strong>the</strong> <strong>in</strong>dustry <strong>to</strong> follow, along with stronger,clearer and effective onl<strong>in</strong>e and offl<strong>in</strong>e advice and support for parents, o<strong>the</strong>r carers andchildren on how <strong>to</strong> stay safe onl<strong>in</strong>e <strong>in</strong> relation <strong>to</strong> both solicitation and child pornography.As we have seen, both government and NGO organisations have worked effectively with<strong>the</strong> IT <strong>in</strong>dustry <strong>in</strong> generat<strong>in</strong>g educational materials both as offl<strong>in</strong>e tra<strong>in</strong><strong>in</strong>g events andas onl<strong>in</strong>e <strong>in</strong><strong>format</strong>ion sources. However, it is difficult <strong>to</strong> identify data with<strong>in</strong> <strong>the</strong> publicarena that helps educa<strong>to</strong>rs and those <strong>in</strong>volved <strong>in</strong> child onl<strong>in</strong>e safety <strong>to</strong> understand <strong>the</strong>impact of educational packages (beyond attendance at tra<strong>in</strong><strong>in</strong>g events, uptake of DVDsand CDs and self-reports from children) and <strong>the</strong> impact of educational pages. The latteris important given <strong>the</strong> IT <strong>in</strong>dustry’s <strong>in</strong>vestment <strong>in</strong> provid<strong>in</strong>g such <strong>in</strong><strong>format</strong>ion, yet outside<strong>the</strong> <strong>in</strong>dustry we were unable <strong>to</strong> source materials that <strong>in</strong>dicated data on how many childrenvisited <strong>the</strong> stay<strong>in</strong>g-safe <strong>in</strong><strong>format</strong>ion and for how long, and whe<strong>the</strong>r this was a one-offview<strong>in</strong>g or someth<strong>in</strong>g that occurred on a more regular basis. Given <strong>the</strong> ease of obta<strong>in</strong><strong>in</strong>gthis <strong>in</strong><strong>format</strong>ion and <strong>the</strong> ability <strong>to</strong> compare such data with <strong>the</strong> length of time it takes <strong>to</strong>both read and process <strong>in</strong><strong>format</strong>ion given <strong>the</strong> age of <strong>the</strong> child, this is surpris<strong>in</strong>g.In July 2008 Fox Interactive Media recently published a response <strong>to</strong> <strong>the</strong> EuropeanCommission’s Safer Internet Public Consultation on Age Verification, Cross-Media Rat<strong>in</strong>g andClassification and Onl<strong>in</strong>e Social Network<strong>in</strong>g, which <strong>the</strong>y k<strong>in</strong>dly made available <strong>to</strong> <strong>the</strong> authorsof this <strong>the</strong>matic paper (Fox Interactive Media, 2008). We can use this <strong>in</strong><strong>format</strong>ion <strong>to</strong>exam<strong>in</strong>e some of <strong>the</strong> issues identified as be<strong>in</strong>g important <strong>in</strong> relation <strong>to</strong> <strong>the</strong> IT <strong>in</strong>dustry. In<strong>the</strong> context of Cross Media Rat<strong>in</strong>g and Classification, Fox Interactive stated that, “Given<strong>the</strong> different uses and characteristics of different delivery platforms we do not believe thata cross-media rat<strong>in</strong>g system is practical or <strong>in</strong> <strong>the</strong> best <strong>in</strong>terest of users. We also believe that<strong>the</strong> current rat<strong>in</strong>g systems are well established and <strong>the</strong> creation of a new rat<strong>in</strong>g systemcould cause consumer confusion. In addition, rat<strong>in</strong>g systems must take <strong>in</strong><strong>to</strong> considerationcultural sensitivities which vary across EU member states. Therefore, we do not believe it isappropriate <strong>to</strong> develop a pan-European system even if it is applied <strong>to</strong> a s<strong>in</strong>gle medium”. Theissue of media rat<strong>in</strong>g is clearly more complex than might have <strong>in</strong>itially been thought. It isalso <strong>the</strong> case that <strong>the</strong> available empirical evidence would suggest that media rat<strong>in</strong>gs affectbehaviour <strong>in</strong> different ways across populations, depend<strong>in</strong>g on <strong>the</strong> motivation of <strong>the</strong> mediauser and <strong>the</strong>ir age. For older adolescents, media rat<strong>in</strong>gs might actually serve <strong>to</strong> <strong>in</strong>crease <strong>the</strong>likelihood that <strong>the</strong> person might try <strong>to</strong> access what would o<strong>the</strong>rwise be thought <strong>to</strong> be age<strong>in</strong>appropriatematerial. Equally, <strong>the</strong> use of age verification was thought by Fox Interactive<strong>to</strong> be more relevant <strong>to</strong> ecommerce sites (<strong>to</strong> prevent young people from buy<strong>in</strong>g prohibitedproducts or engag<strong>in</strong>g <strong>in</strong> prohibited services, such as access<strong>in</strong>g adult content, alcohol and100|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


gambl<strong>in</strong>g). Based on research commissioned by MySpace Fox Interactive conclude that,“MySpace does not believe that exist<strong>in</strong>g age verification systems are effective or reliablewhen used <strong>to</strong> prevent <strong>in</strong>appropriate contact, access <strong>to</strong> <strong>in</strong>appropriate content, or reductionof preda<strong>to</strong>rs from free sites, <strong>in</strong>clud<strong>in</strong>g social network<strong>in</strong>g sites. Age verification systems can<strong>in</strong> fact add significant privacy and safety complexities <strong>to</strong> <strong>the</strong> environment, and may posenew risks <strong>to</strong> teens”.The focus <strong>in</strong>stead has been on educat<strong>in</strong>g users about safer onl<strong>in</strong>e practices and provid<strong>in</strong>g<strong>to</strong>ols <strong>to</strong> enhance <strong>the</strong> onl<strong>in</strong>e safety of users. The <strong>to</strong>ols listed by <strong>the</strong> <strong>document</strong> <strong>in</strong>clude:1. a registration page that requires prospective members <strong>to</strong> enter <strong>the</strong>ir exact birthdate, and <strong>in</strong>dividuals who enter a date that does not meet <strong>the</strong> requisite age are notpermitted <strong>to</strong> register;2. a session cookie on <strong>the</strong> registration page so that a prospective member cannot changehis/her age if <strong>the</strong> <strong>in</strong>itial age was below that specified <strong>in</strong> our terms of service.;3. <strong>to</strong> combat a situation where a teen under 14 lies about his or her age, MySpaceemploys a search algorithm, utilis<strong>in</strong>g terms commonly used by underage users, <strong>to</strong>f<strong>in</strong>d and delete underage profiles. The site is scanned for such terms and <strong>the</strong> databaseof search terms is updated <strong>to</strong> reflect changes <strong>in</strong> user behaviour and term<strong>in</strong>ology;4. profiles that have been reported by MySpace members or parents as belong<strong>in</strong>g<strong>to</strong> an underage user also are reviewed by MySpace. Whenever an underage useris identified, <strong>the</strong> profile is deleted. MySpace similarly will remove members if itbelieves <strong>the</strong>y are over 18 and <strong>the</strong>y represent <strong>the</strong>mselves as under 18.This clearly demonstrates that <strong>the</strong> IT <strong>in</strong>dustry has responded <strong>to</strong> many of <strong>the</strong> challengesmade <strong>in</strong> relation <strong>to</strong> child safety, but aga<strong>in</strong> it was difficult <strong>to</strong> secure <strong>in</strong><strong>format</strong>ion about howmany profiles are deleted and for what reasons, and what impact <strong>the</strong>se measures are hav<strong>in</strong>gon <strong>the</strong> actual behaviour of both young people and adults.On a cautionary note, while <strong>the</strong> IT <strong>in</strong>dustry has taken a responsible and <strong>in</strong>creas<strong>in</strong>glyproactive stance <strong>in</strong> relation <strong>to</strong> onl<strong>in</strong>e child protection, this has largely been voluntary andself-regulated. One recommendation made <strong>in</strong> <strong>the</strong> report by <strong>the</strong> ICMEC (2007) was <strong>in</strong>relation <strong>to</strong> manda<strong>to</strong>ry report<strong>in</strong>g of content, whereby a ‘notice and takedown’ requirementshould be enacted with<strong>in</strong> national legislation. The report also suggests that considerationshould be given <strong>to</strong> statu<strong>to</strong>ry pro<strong>to</strong>cols that would allow ISPs <strong>to</strong> report child pornographyfully and effectively (<strong>in</strong>clud<strong>in</strong>g <strong>the</strong> transmission of images) <strong>to</strong> law enforcement agenciesor ano<strong>the</strong>r designated body. This is someth<strong>in</strong>g of a challenge. In <strong>the</strong> US, <strong>the</strong> Protection of<strong>Child</strong>ren from Sexual Preda<strong>to</strong>rs Act of 1998 placed new responsibilities on all US electronicservices and remote comput<strong>in</strong>g service providers. ISPs must report <strong>to</strong> law enforcementagencies knowledge of facts or circumstances from which a violation of specified offences<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |101


<strong>in</strong>volv<strong>in</strong>g child victimisation or child pornography is apparent. However, a study byMcCabe (2008) <strong>in</strong>dicated that <strong>the</strong> majority of law enforcement agencies did not reportany cases of child abuse referred <strong>to</strong> <strong>the</strong>m through ISPs, and that <strong>in</strong> those cases that werereported <strong>to</strong> law enforcement agencies, <strong>the</strong> overwhelm<strong>in</strong>g majority of cases related <strong>to</strong> childpornography.F<strong>in</strong>ally, <strong>in</strong> recent times we have also seen <strong>the</strong> establishment of The F<strong>in</strong>ancial Coalitionaga<strong>in</strong>st <strong>Child</strong> Pornography (FCACP), which <strong>in</strong>cludes f<strong>in</strong>ancial <strong>in</strong>stitutions, ISPs, onl<strong>in</strong>epayment providers, and <strong>the</strong> non-profit National Center for Miss<strong>in</strong>g and Exploited<strong>Child</strong>ren. The Federal Deposit Insurance Corporation (FDIC), o<strong>the</strong>r federal bank<strong>in</strong>gagencies and f<strong>in</strong>ancial <strong>in</strong>stitution trade associations also work with <strong>the</strong> coalition <strong>to</strong> supportits endeavours. In 2007 <strong>the</strong> FCACP published its first best-practices <strong>document</strong> address<strong>in</strong>g<strong>the</strong> methods used by <strong>the</strong> f<strong>in</strong>ancial <strong>in</strong>dustry <strong>to</strong> research, verify and moni<strong>to</strong>r merchants whowant <strong>to</strong> jo<strong>in</strong> <strong>the</strong> payments system (FCACP, 2007). It is anticipated that <strong>the</strong> FCACP willref<strong>in</strong>e its methods for analys<strong>in</strong>g data and shar<strong>in</strong>g <strong>in</strong><strong>format</strong>ion, as well as expand its network<strong>to</strong> regions outside <strong>the</strong> US. Aga<strong>in</strong>st this background, it was <strong>the</strong>refore surpris<strong>in</strong>g <strong>to</strong> learnof <strong>the</strong> comparatively recent emergence of new f<strong>in</strong>ancial <strong>in</strong>struments, s<strong>to</strong>red value cards,o<strong>the</strong>rwise known as pre-paid credit cards, which can be obta<strong>in</strong>ed for cash and <strong>the</strong>refore,effectively, used anonymously. It would be highly regrettable if <strong>the</strong>se new cards, or o<strong>the</strong>rnew forms of onl<strong>in</strong>e payment, were allowed <strong>to</strong> underm<strong>in</strong>e much of <strong>the</strong> excellent workalready done by <strong>the</strong> FCACP (Carr, personal communication).This section acknowledges that s<strong>in</strong>ce 2001 <strong>the</strong>re has been an <strong>in</strong>crease <strong>in</strong> both <strong>the</strong>number of INHOPE hotl<strong>in</strong>es and <strong>the</strong> number of reports made <strong>to</strong> law enforcementagencies. However, INHOPE hotl<strong>in</strong>es rarely received any structured feedback from lawenforcement, and this is a cause for concern. An example is also given of <strong>the</strong> work ofone hotl<strong>in</strong>e, <strong>the</strong> Internet Watch Foundation (IWF), which has developed a block<strong>in</strong>g lis<strong>to</strong>f URLs ascerta<strong>in</strong>ed <strong>to</strong> conta<strong>in</strong> child abuse content. This list is updated daily and hasbeen used by law enforcement, associated hotl<strong>in</strong>es, Internet service providers, mobileopera<strong>to</strong>rs, search providers and filter<strong>in</strong>g companies. Similar actions are be<strong>in</strong>g taken with<strong>in</strong>o<strong>the</strong>r countries. The Internet <strong>in</strong>dustry has also responded <strong>in</strong> a positive way <strong>to</strong> educat<strong>in</strong>gusers and provid<strong>in</strong>g <strong>to</strong>ols <strong>to</strong> enhance onl<strong>in</strong>e safety. There are still oppos<strong>in</strong>g viewpo<strong>in</strong>tsas <strong>to</strong> whe<strong>the</strong>r <strong>in</strong>dustry activity should be voluntary or mandated, and <strong>the</strong>re is clearly aneed for <strong>in</strong>dustry <strong>to</strong> share its <strong>in</strong><strong>format</strong>ion <strong>to</strong> facilitate <strong>the</strong> development of better researchand outcomes for young people. The paper also acknowledges <strong>the</strong> welcome actions by <strong>the</strong>F<strong>in</strong>ancial Coalition Aga<strong>in</strong>st <strong>Child</strong> Pornography (FCACP).102|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


7. RecommendationsIn preparation of this <strong>the</strong>matic paper <strong>the</strong> authors were requested <strong>to</strong> suggest sixrecommendations <strong>to</strong> be implemented. The first three are for implementation <strong>in</strong> <strong>the</strong>immediate future, while <strong>the</strong> rema<strong>in</strong>der are for implementation by 2013, five years fromnow and <strong>the</strong> likely date for <strong>the</strong> next World Congress aga<strong>in</strong>st <strong>the</strong> Sexual Exploitationof <strong>Child</strong>ren and Adolescents. It is anticipated that each State concerned should presentevidence that that <strong>the</strong> actions have been achieved.7.1 Actions <strong>to</strong> be achieved <strong>in</strong> <strong>the</strong> immediate futureToge<strong>the</strong>r with all relevant stakeholders, <strong>in</strong>clud<strong>in</strong>g children and adolescents, each Stateshould:1. Effect an evaluation of national educational and <strong>in</strong><strong>format</strong>ion programmes <strong>to</strong>determ<strong>in</strong>e <strong>the</strong>ir impact on <strong>the</strong> behaviour of youth Internet users and ensure thatthis <strong>in</strong><strong>format</strong>ion enters <strong>the</strong> public doma<strong>in</strong> and addresses <strong>the</strong> deficiencies identified.As <strong>the</strong>y are citizens of this technologically mediated world, such evaluation shouldbe supported by children’s participation, build<strong>in</strong>g on <strong>the</strong>ir expertise and goodpractices.2. Determ<strong>in</strong>e current provision and practices for children victimised through <strong>the</strong> newtechnologies and ensure that systems are <strong>in</strong> place, <strong>in</strong>volv<strong>in</strong>g both law enforcementand child protection, <strong>to</strong> allow for effective <strong>in</strong>vestigation, assessment, <strong>in</strong>tervention,support and follow-up. Build<strong>in</strong>g on <strong>the</strong> rights of <strong>the</strong> child, this should be based ondevelopmental needs and with reference <strong>to</strong> good practice. At a m<strong>in</strong>imum this wouldrequire <strong>the</strong> development of at least one adm<strong>in</strong>istrative hub with<strong>in</strong> each country,which would draw upon national and local skills, resources and practices, and wouldprovide tra<strong>in</strong><strong>in</strong>g for dedicated child-protection staff.3. Work at a national level with children and young people of different age groups<strong>to</strong> determ<strong>in</strong>e fac<strong>to</strong>rs that protect children <strong>in</strong> relation <strong>to</strong> <strong>the</strong> new technologies andwhich promote resilience.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |103


7.2 Actions <strong>to</strong> be achieved by 2013Toge<strong>the</strong>r with all relevant stakeholders, each State should:1. Amend exist<strong>in</strong>g legislation <strong>to</strong> reflect objective, and <strong>in</strong>ternationally acceptable,measures aga<strong>in</strong>st all sexually abusive and sexually exploitative behaviours and materialsrelated <strong>to</strong> <strong>the</strong> new technologies (<strong>in</strong>clud<strong>in</strong>g virtual and car<strong>to</strong>on imagery and text),and make obta<strong>in</strong><strong>in</strong>g for self or o<strong>the</strong>rs, <strong>in</strong>tentional view<strong>in</strong>g and possession, crim<strong>in</strong>alactivities. Such legislation should also protect all victims of sexually abusive andsexually exploitative practices and ensure that law enforcement and judicial processesadopt child sensitive procedures <strong>in</strong> accordance with <strong>the</strong> Guidel<strong>in</strong>es on Justice for<strong>Child</strong> Victims and Witnesses. This should <strong>in</strong>clude children and adolescents whohave engaged <strong>in</strong> sexually abusive behaviours <strong>to</strong>wards o<strong>the</strong>rs through <strong>the</strong> medium of<strong>the</strong> new technologies.2. Demonstrate <strong>in</strong>vestment <strong>in</strong> prioritis<strong>in</strong>g children by allocat<strong>in</strong>g <strong>in</strong>creased childprotection and law enforcement resources <strong>to</strong> <strong>the</strong> identification of children whoseimages are circulat<strong>in</strong>g on <strong>the</strong> Internet and enable greater co-operation at nationaland <strong>in</strong>ternational levels.3. Initiate a programme of research across States <strong>to</strong> address:a. <strong>in</strong>herent aspects of <strong>the</strong> new technologies that appear <strong>to</strong> <strong>in</strong>crease <strong>the</strong> likelihood ofsexually exploitative and sexually abusive practices <strong>to</strong>wards children <strong>in</strong> relation <strong>to</strong><strong>the</strong> new technologies;b. <strong>the</strong> impact of technological expansion on <strong>the</strong> demographic characteristics ofchildren sexually abused and sexually exploited through <strong>the</strong> new technologies;c. <strong>the</strong> impact, on <strong>the</strong> family and wider social networks, of <strong>in</strong>creas<strong>in</strong>g crim<strong>in</strong>alisationof Internet related activityd. <strong>the</strong> role of <strong>the</strong> IT sec<strong>to</strong>r <strong>in</strong> <strong>the</strong> risk assessment and analysis of current andupcom<strong>in</strong>g products, <strong>in</strong> <strong>the</strong> use and adaptability of age verification methods andonl<strong>in</strong>e access systems, and <strong>in</strong> image-detection systems.All States should set targets and <strong>in</strong>dica<strong>to</strong>rs of progress <strong>to</strong> determ<strong>in</strong>e <strong>the</strong> results of thisprogramme and report on <strong>the</strong>se by 2013.104|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Endnotes1Dr. E<strong>the</strong>l Quayle, COPINE Research, Cl<strong>in</strong>ical & Health Psychology, School of Health <strong>in</strong> Social Science.University of Ed<strong>in</strong>burgh, Teviot Place, Ed<strong>in</strong>burgh, EH8 9AG, Scotland, UK. Email: E<strong>the</strong>l.Quayle@ed.ac.uk;quaylee<strong>the</strong>l@gmail.com2Lars Lööf, Head of <strong>Child</strong>ren’s Unit, Council of <strong>the</strong> Baltic Sea States Secretariat, P.O. Box 2010, SE-103 11S<strong>to</strong>ckholm, Sweden. Email: lars.loof@cbss.org3Ms. T<strong>in</strong>k Palmer, Direc<strong>to</strong>r, S<strong>to</strong>p it Now! UK & Ireland, P.O. Box 9841, Birm<strong>in</strong>gham, B48 7WB, UK. Email:t<strong>in</strong>kpalmer@s<strong>to</strong>pitnow.org.uk4Accessed on 21.9.2008 from: http://www.abcnyheter.no/node/73985.5Accessed 15.10.2008 from: http://www.safer<strong>in</strong>ternet.org/ww/en/pub/<strong>in</strong>safe/<strong>in</strong>dex.htm6Accessed 15.10.2008 from: http://ec.europa.eu/<strong>in</strong><strong>format</strong>ion_society/activities/sip/<strong>in</strong>dex_en.htm7Accessed 15.10.2008 from: http://www.saf<strong>to</strong>nl<strong>in</strong>e.no/nyheter/2008-09-02_konferanse.html8See for example www.chatmodera<strong>to</strong>rs.com, accessed 15.10.2008.9Accessed 15.10.2008 from http://www.safer<strong>in</strong>ternet.org/ww/en/pub/<strong>in</strong>safe/focus/national_helpl<strong>in</strong>es.htm9Accessed 15.10.2008 from: http://www.media-awareness.ca/english/games/<strong>in</strong>dex.cfm, http://www.bbc.co.uk/chatguide, http://us.mcafee.com/virus<strong>in</strong>fo/vil/parents/article_parentteacherguide.pdf, www.gridclub.com/cybercafe10Accessed 15.10.2008 from: http://www.dzieckowsieci.pl/strona.php?p=22312Accessed 13.10..2008 from: http://www.childnet.com/jenny/evaluation.html<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |105


BibliographyAbelsohn, Jonna and Hubelsjö, Anna. I sexualitetens gränstrakter. [On <strong>the</strong> fr<strong>in</strong>ges of sexuality].Resursförvaltn<strong>in</strong>gen Göteborgs stad. Go<strong>the</strong>nburg. 2007.Adam, A. Cyberstalk<strong>in</strong>g and Internet pornography: Gender and <strong>the</strong> gaze. Ethics and In<strong>format</strong>ionTechnology, 4, 2002, 133-142.Adler, A. The Perverse Law of <strong>Child</strong> Pornography. Columbia Law Review, 101(March), 2001, 209-273.Akdeniz, Y. Internet <strong>Child</strong> Pornography and <strong>the</strong> Law. National and International Responses. Ashgate.Aldershot. 2008.Alexy, E.M., Burgess, A.W. and Baker, T. Internet offenders: Traders, travelers and comb<strong>in</strong>ation tradertravelers.Journal of Interpersonal Violence, 20, 2005, 804-812.American Psychiatric Association. Diagnostic and statistical manual of mental disorders (DSM-IV-TR).American Psychiatric Association. Wash<strong>in</strong>g<strong>to</strong>n, D.C. 2000.Anderson, C. The Long Tail. Random House. London. 2006.Andrews, D.A. The psychology of crim<strong>in</strong>al conduct and effective treatment. In J. McGuire (Ed.), WhatWorks: Reduc<strong>in</strong>g Re-offend<strong>in</strong>g: Guidel<strong>in</strong>es from Research and Practice. Wiley. Chichester. 1995. pp. 35-62.Ashcroft v. Free Speech Coalition. 535 U.S. 224 2002.Aslanidou, S. and Menexes, G. Youth and <strong>the</strong> Internet: Uses and practices <strong>in</strong> <strong>the</strong> home. Computers andEducation, 51, 2008, 1375-1391.Asquith, S. and Turner, E. Recovery and Re<strong>in</strong>tegration of <strong>Child</strong>ren from <strong>the</strong> Effects of Sexual Exploitationand Related Traffick<strong>in</strong>g. 2008. Oak Foundation. Geneva. pp. 5-6.Azaola, E. Boy and girl victims of sexual exploitation <strong>in</strong> Mexico. UNICEF-DIF. 2000. Accessed on 15Oc<strong>to</strong>ber2008 from: www.oas.org/atip/country%20specific/AZAOLA%20Mexico%20<strong>Child</strong>%20Sex%20Exploitation.pdfBaartz, D. Australians, <strong>the</strong> Internet and technology-enabled child sex abuse: A statistical profile. AustralianFederal Police. 2008.Bates, A. and Metcalf, C. A psychometric comparison of <strong>in</strong>ternet and non-<strong>in</strong>ternet sex offenders from acommunity treatment sample. Journal of Sexual Aggression, 13 (1), 2007, 11-20.BBC. BBC News, 24 April 2005. Accessed 10 January2006 from: http://www.newsvole.bbc.co.uk/mpapps/page<strong>to</strong>ols/pr<strong>in</strong>t/news.bbc.co.uk/2/htp.Beech, A.R., Elliott, I.A., Birgden, A. and F<strong>in</strong>dlater, D. The Internet and child sexual offend<strong>in</strong>g: Acrim<strong>in</strong>ological review. Aggression and Violent Behavior, doi:10.1016/j.arb.2008.03.007.106|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Bensimon, P. The role of pornography <strong>in</strong> sexual offend<strong>in</strong>g, Sexual Addiction and Compulsivity, 14, 2007,95-117.Ben<strong>to</strong>vim, A., El<strong>to</strong>n, A., Hildebrand, J., Tranter, M. and Vizard, E. (Eds.). <strong>Child</strong> Sexual Abuse with<strong>in</strong> <strong>the</strong>Family: Assessment and Treatment. Wright. London. 1988.Berson, I.R. and Berson, M.J. Challeng<strong>in</strong>g onl<strong>in</strong>e behaviours of youth. Social Science Computer Review,23 (1), 2005, 29-38.Blanchet, T. Lost Innocence, S<strong>to</strong>len <strong>Child</strong>hoods. The University Press Limited. Dhaka. 1996.Blev<strong>in</strong>s, J.L. and An<strong>to</strong>n, F. Muted voices <strong>in</strong> <strong>the</strong> legislative process: <strong>the</strong> role of scholarship <strong>in</strong> USCongressional efforts <strong>to</strong> protect children from <strong>in</strong>ternet pornography. New Media and Society, 10, 2008,115-137.Briere, J. Therapy for Adults Molested as <strong>Child</strong>ren. Spr<strong>in</strong>ger. New York. 1989.Brottsförebyggande Rådet. Vuxnas sexualla kontakter med barn via Internet. [Adults’ sexual contacts with<strong>Child</strong>ren via <strong>the</strong> Internet] Report 2007:11. Brottsförebyggande Rådet. S<strong>to</strong>ckholm. 2007.Buck, T. ‘International crim<strong>in</strong>alisation and child welfare protection’: <strong>the</strong> Optional Pro<strong>to</strong>col <strong>to</strong> <strong>the</strong>Convention on <strong>the</strong> Rights of <strong>the</strong> <strong>Child</strong>. <strong>Child</strong>ren and Society, 22, 2008, 167-178.Burgess, A.W., and Hartman, C. <strong>Child</strong> abuse aspects of child pornography. Psychiatric Annals, 1987,248-253.Buzzell, T. Demographic characteristics of persons us<strong>in</strong>g pornography <strong>in</strong> three technological contexts.Sexuality and Culture, 9 (11), 2005, 28-48.Carr, A. Internet Traders of <strong>Child</strong> Pornography and O<strong>the</strong>r Censorship Offenders <strong>in</strong> New Zealand. Departmen<strong>to</strong>f Internal Affairs. New Zealand. 2004.Carr, J. Personal communication by email, 10 Oc<strong>to</strong>ber 2008.Carroll, J.S., Padilla-Walker, L.M., Nelson, L.J., Olson, C.D., Barry, C.M. and Madsen, S.D. PornographyAcceptance and Use Among Emerg<strong>in</strong>g Adults. Journal of Adolescent Research, 23 (1), 2008, 6-30.Cassell, J. and Cramer, M. High tech or high risk: Moral panics about girls onl<strong>in</strong>e. In T. McPherson(Ed.), Digital Youth, Innovation, and <strong>the</strong> Unexpected. The J.D. and C.T. MacArthurs Foundation Series onDigital Media and Learn<strong>in</strong>g. The MIT Press. Cambridge, MA. 2008. pp. 53-76.Chibnall, S., Wallace, M., Leicht, C. and Lunghofer, L. I-SAFE evaluation. Fairfax, VA. 2006.<strong>Child</strong>ren’s Onl<strong>in</strong>e Privacy Protection Act (COPPA). 1998. Accessed on 15 Oc<strong>to</strong>ber 2008 from: http://www.ftc.gov/ogc/coppa1.htm.<strong>Child</strong>net-International UK. Jenny’s S<strong>to</strong>ry. Accessed on 15 Oc<strong>to</strong>ber 2008 from: http://www.childnet.com/jenny/<strong>in</strong>dex.html<strong>Child</strong>-Wise Moni<strong>to</strong>r (2002). Accessed on 18 June 07 from: http://www.childwise.co.uk/moni<strong>to</strong>r.htm<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |107


Choo, K-K.R., Smith, R.G. and McCusker, R. Future directions <strong>in</strong> technology-enabled crime: 2007-09.Australia Institute of Crim<strong>in</strong>ology. Canberra. Accessed on 22 April 2008 from: http://www.aic.gov.au.Chow-White, P.A. Race, gender and sex on <strong>the</strong> net: semantic networks of sell<strong>in</strong>g and s<strong>to</strong>rytell<strong>in</strong>g sex<strong>to</strong>urism. Media, Culture, Society, 28, 2006, 883-905.Clough, J. Now you see it, now you don’t: Digital images and <strong>the</strong> mean<strong>in</strong>g of ‘possession’. Crim<strong>in</strong>al LawForum, 19, 2008, 205-239.Cooper, S. Forensic Pediatrics. <strong>Expert</strong> meet<strong>in</strong>g on children and young persons with abusive and violentexperiences connected <strong>to</strong> cyberspace - challenges for research, rehabilitation, prevention and protection.<strong>Child</strong>ren putt<strong>in</strong>g <strong>the</strong>mselves at risk. Self-victimisation, post<strong>in</strong>g your own image and o<strong>the</strong>r dangerousbehaviours. Allmannana Barnhuset. Satra Bruk, Sweden. May 2006.Daily Mail, 21 April 2005. p. 24. Accessed on 15 February2006 from: http://www.communitycare.co.uk/AccessSite/articles/article.asp?liSectionID=4&liarticleID=49007David-Ferdon, C. and Hertz, M.C. Electronic media, violence and adolescents: An emerg<strong>in</strong>g publichealth problem. Journal of Adolescent Health, 41, 2007, S1-S5.Davidson, J. Current Practice and Research <strong>in</strong><strong>to</strong> Internet Sex Offend<strong>in</strong>g. Risk Management AuthorityResearch. Paisley, Scotland. 2007.Dennis, J.P. Women are victims, men make choices: The <strong>in</strong>visibility of men and boys <strong>in</strong> <strong>the</strong> global sextrade. Gender Issues, 25, 2008, 11-25.Durk<strong>in</strong>, K.F., and Bryant, C. Propagandiz<strong>in</strong>g pederasty: A <strong>the</strong>matic analysis of <strong>the</strong> onl<strong>in</strong>e exculpa<strong>to</strong>ryaccounts of unrepentant paedophiles. Deviant Behaviour: An Inter-Discipl<strong>in</strong>ary Journal, 20 (2), 1999,103-127.ECPAT. Violence Aga<strong>in</strong>st <strong>Child</strong>ren <strong>in</strong> Cyberspace. Bangkok, Thailand. September 2005.External <strong>Expert</strong>s Study Group on Protection of <strong>Child</strong>ren from Harmful Effects of Virtual Society.Kodomo wo Seikoui<strong>to</strong> no Taisho <strong>to</strong> suru Comic<strong>to</strong>ni ni tsuite (Comics conta<strong>in</strong><strong>in</strong>g images of sexual abuse ofchildren). In F<strong>in</strong>al Report on <strong>the</strong> Protection of <strong>Child</strong>ren from <strong>the</strong> Harmful Effects of Virtual Society. SaishuHokokusho. 2006. pp. 21-26.FCACP (F<strong>in</strong>ancial Coalition Aga<strong>in</strong>st <strong>Child</strong> Pornography). Accessed on 15 Oc<strong>to</strong>ber 2008 from: http://www.fdic.gov/news/news/f<strong>in</strong>ancial/2007/fil07072.htmlF<strong>in</strong>kelhor, D. and Berl<strong>in</strong>er, L. Research on <strong>the</strong> treatment of sexually abused children: A review andrecommendations. Journal of <strong>the</strong> American Academy of <strong>Child</strong> and Adolescent Psychiatry, 34 (11), 1995,1408-1423.F<strong>in</strong>kelhor, D. and Ormrod, R. <strong>Child</strong> pornography: patterns from <strong>the</strong> NIBRS.: US Department of JusticePrograms, Office of Juvenile Justice and Del<strong>in</strong>quency Prevention. Wash<strong>in</strong>g<strong>to</strong>n, D.C. 2004.F<strong>in</strong>kelhor, D., Mitchell, K. and Wolak, J. Onl<strong>in</strong>e victimization: A report on <strong>the</strong> nation’s youth. (NCMEC6-00-020). National Center for Miss<strong>in</strong>g and Exploited <strong>Child</strong>ren. Alexandria, VA. 2000.Flem<strong>in</strong>g, M.J., Greentree, S., Cocotti-Muller, D., Elias, K.A. and Morrison, S. Safety <strong>in</strong> cyberspace:Adolescent’s safety and exposure onl<strong>in</strong>e. Youth and Society, 38 (2), 2006, 135-154.108|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Flood, M. Exposure <strong>to</strong> pornography among youth <strong>in</strong> Australia. Journal of Sociology, 43 (1), 2007, 45-60.Fox Interactive Media. Response <strong>to</strong> <strong>the</strong> European Commission’s Safer Internet Public Consultation on AgeVerification, Cross-Media Rat<strong>in</strong>g and Classification and Onl<strong>in</strong>e Social Network<strong>in</strong>g. Submitted: 31 July2008.FTC (Federal Trade Commission). Privacy onl<strong>in</strong>e: A report <strong>to</strong> Congress. Federal Trade Commission.Wash<strong>in</strong>g<strong>to</strong>n, D.C.Fug, O.C. Save <strong>the</strong> children: The protection of m<strong>in</strong>ors <strong>in</strong> <strong>the</strong> <strong>in</strong><strong>format</strong>ion society and <strong>the</strong> audiovisualmedia services direc<strong>to</strong>rate. Journal of Consumer Policy, 31, 2008, 45-61.Galbreath, N.W., Berl<strong>in</strong>, F.S., and Sawyer, D. Paraphilias and <strong>the</strong> Internet. In A. Cooper (Ed.), Sex and<strong>the</strong> Internet: A guidebook for cl<strong>in</strong>icians. Brunner-Routledge. New York. 2002. pp. 187-205.Gerad<strong>in</strong>, P. and Thibaut, F. Epidemiology and treatment of adolescent sexual offend<strong>in</strong>g. Pediatric Drugs,6 (2), 2004, 79-91.Gillespie, A.A. Sentences for offences <strong>in</strong>volv<strong>in</strong>g child pornography. Crim<strong>in</strong>al Law Review, 2003,80-92.Gillespie, A. Indecent Images, Groom<strong>in</strong>g and <strong>the</strong> Law. Crim<strong>in</strong>al Law Review, 2006, 412-421.Gillespie, A. International Legal Regulation of “<strong>Child</strong> Pornography”. Paper presented at <strong>the</strong> ThematicPaper Prepara<strong>to</strong>ry Meet<strong>in</strong>g, Bangkok, Thailand. 15 August 2008.Gillespie, A. Reader <strong>in</strong> Law, Leicester de Montfort Law School. Personal communication. Email 12Oc<strong>to</strong>ber 2008.Gonçalves, I.T. Personal communication by email. 9 Oc<strong>to</strong>ber 2008.Government of Ireland. <strong>Child</strong> Traffick<strong>in</strong>g and Pornography Act, 1998, Section 2. Accessed on 15 Oc<strong>to</strong>ber2008 from: http://www.irishstatutebook.ie.Grabosky, P. The Internet, technology and organised crime. Asian Crim<strong>in</strong>ology, 2, 2007, 145-161.Grabowski, S. The real cost of “free” programs such as <strong>in</strong>stant messag<strong>in</strong>g and peer-<strong>to</strong>-peer file shar<strong>in</strong>g applications.SANS Institute. 2003. Accessed on 15 Oc<strong>to</strong>ber 2008 from: https://www2.sans.org/read<strong>in</strong>g_room/whitepapers/pro<strong>to</strong>cols/1155.php.Greenfield, P.M. Developmental considerations for determ<strong>in</strong><strong>in</strong>g appropriate Internet use guidel<strong>in</strong>es forchildren and adolescents. Applied Developmental Psychology, 25, 2004, 751-762.Guardian, 10 March 2008. Accessed on 24 September 2008 from: www.guardian.co.uk/world/2008/mar/10/japan.Haider, M. Recognis<strong>in</strong>g complexity, embrac<strong>in</strong>g diversity. South Asia Research, 28 (1), 2008, 49-72.Hargrave, A. and Liv<strong>in</strong>gs<strong>to</strong>ne, S. Harm and offence <strong>in</strong> media content: A critical review of <strong>the</strong> evidence.Intellect Books. Bris<strong>to</strong>l, UK. 2006.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |109


Harmon, D., and Boer<strong>in</strong>ger, S. A content analysis of Internet-accessible written pornographic depictions.Electronic Journal of Sociology, 3 (1), 1997.Hartman, C.R., Burgess, A.W. and Lann<strong>in</strong>g, K.V. Typology of collec<strong>to</strong>rs. In A.W. Burgess and M.L.Clark (Eds.), <strong>Child</strong> Pornography and Sex R<strong>in</strong>gs. Lex<strong>in</strong>g<strong>to</strong>n Books. Toron<strong>to</strong>. 1984. pp. 93-109.Hernandez, A.E. Sexual exploitation of children over <strong>the</strong> Internet: The face of a child preda<strong>to</strong>r and o<strong>the</strong>rissues. Paper presented before <strong>the</strong> Subcommittee on Oversight and Investigations Committee on Energyand Commerce at <strong>the</strong> United States House of Representatives. United States Department of Justice.Wash<strong>in</strong>g<strong>to</strong>n, D.C. September 2006.Hernandez, A.E. Self-reported contact sexual offenses by participants <strong>in</strong> <strong>the</strong> Federal Bureau of Prison’s SexOffender Treatment Program: Implications for Internet Sex Offenders. Paper presented at <strong>the</strong> 19th Researchand Treatment Conference of <strong>the</strong> Association for <strong>the</strong> Treatment of Sexual Abusers, San Diego, California.November 2000.Heverly, R.A. Grow<strong>in</strong>g up digital: Control and <strong>the</strong> pieces of a digital life. In T. McPherson (Ed.), DigitalYouth, Innovation, and <strong>the</strong> Unexpected. The John d. and Ca<strong>the</strong>r<strong>in</strong>e T. MacArthur Foundation Series on DigitalMedia and Learn<strong>in</strong>g. The MIT Press. Cambridge, MA. 2008. pp. 199-218.Hillier, L. and Harrison, L. Build<strong>in</strong>g realities less limited than <strong>the</strong>ir own: Young people practis<strong>in</strong>g samesexattraction on <strong>the</strong> Internet. Sexualities, 10 (1), 2007, 82-100.Huda, S. Sex traffick<strong>in</strong>g <strong>in</strong> South Asia. International Journal of Gynaecology and Obstetrics, 94, 2006,374-381.ICMEC. <strong>Child</strong> pornography: Model legislation and global review. Accessed on 6 December 2006 from:http://www.icmec.org/en_X1/pdf/ModelLegislationFINAL.pdf.INHOPE. 2007 Global Internet Trend Report. Accessed on 15 Oc<strong>to</strong>ber 2008 from www.<strong>in</strong>hope.org.Insafe. Onl<strong>in</strong>e Behaviour of Young People. European Schoolnet for <strong>the</strong> Insafe plus programme. Brussels.2007.IWF (Internet Watch Foundation). Annual and Charity Report. 2006. Accessed on 5 March 2007 from:http://www.iwf.org.uk/corporate/page.173.htm.IWF (Internet Watch Foundation). Annual and Charity Report. 2007. Accessed on 10 September 2008from: http://www.iwf.org.uk/corporate/page.188.htm.Jehu, D. Beyond Sexual Abuse. Therapy with Women who were <strong>Child</strong>hood Victims. John Wiley. Chichester.1988.Jones, V. and Skogrand, E. Position Paper Regard<strong>in</strong>g Onl<strong>in</strong>e Images of Sexual Abuse and o<strong>the</strong>r InternetrelatedSexual Exploitation of <strong>Child</strong>ren. Save <strong>the</strong> <strong>Child</strong>ren Europe Group. August 2005.Jonsland, Thomas and Irgens, Peter. Barnen, BRIS och IT. [<strong>Child</strong>ren, BRIS and IT] BRIS. S<strong>to</strong>ckholm.2008.Jonsson, L<strong>in</strong>da. Internet-related Violence. Paper presented at Council of Europe Conference: Build<strong>in</strong>g aEurope for and with <strong>Child</strong>ren. Towards a Strategy 2009 – 2011. S<strong>to</strong>ckholm. 2008.110|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Joyce, E. and Kraut, R. Predict<strong>in</strong>g cont<strong>in</strong>ued participation <strong>in</strong> newsgroups. Journal of Computer-MediatedCommunication, 11(3), 2006, 723-747.Kacker, L., Varadan, S. and Kumar, P. Study on child abuse India. M<strong>in</strong>istry of Women and <strong>Child</strong>Development. New Delhi, India. 2007.Kane, J. Issues and Experiences <strong>in</strong> Combat<strong>in</strong>g Violence Aga<strong>in</strong>st <strong>Child</strong>ren, Young People and Women.DaphneBooklets. European Commission: Direc<strong>to</strong>rate-General for Justice, Freedom and Security. Brussels.2006.Kanuga, M. and Rosenfeld, W.D. Adolescent sexuality and <strong>the</strong> <strong>in</strong>ternet: <strong>the</strong> good, <strong>the</strong> bad, and <strong>the</strong> URL.Journal of Pediatric and Adolescent Gynecology, 17 (2), 2004, 117-124Kelly, L. Pornography and <strong>Child</strong> Sexual Abuse. In C. Itz<strong>in</strong> (Ed.), Pornography: Women, Violence and CivilLiberties. Oxford University Press. Oxford. 1992. pp. 113-123.Kierkegaard, S, Cyber<strong>in</strong>g, onl<strong>in</strong>e groom<strong>in</strong>g and age play. Computer Law and Security Report, 24, 2008,41-55.K<strong>in</strong>g, P.J. No playth<strong>in</strong>g: Ethical issues concern<strong>in</strong>g child pornography. Ethic Theory Moral Practice, 11,2008, 327-345.Krone, T. A typology of onl<strong>in</strong>e child pornography offend<strong>in</strong>g. Trends and Issues <strong>in</strong> Crime and Crim<strong>in</strong>alJustice, 279, 2004, 1-6.Lamarre, T. Pla<strong>to</strong>nic sex: Perversion and Shôjo Anime. (Part One). Animation, 1, 2006, 45-59.Lann<strong>in</strong>g, K.V. Investiga<strong>to</strong>r’s Guide <strong>to</strong> Allegations of ‘Ritual’ <strong>Child</strong> Abuse, Behavioral Science Unit, NationalCenter for <strong>the</strong> Analysis of Violent Crime, Federal Bureau of Investigation, FBI Academy. Quantico,Virg<strong>in</strong>ia 22135. 1992.Lann<strong>in</strong>g, K.V. <strong>Child</strong> molesters: a behavioral analysis, 4th ed. 2001. Accessed on 19 Oc<strong>to</strong>ber 2006 from:http://www.ncmec.org/en_US/publications?NC70.pdf.Lann<strong>in</strong>g, K.V. <strong>Child</strong> Pornography. Paper presented at <strong>the</strong> <strong>Child</strong> Pornography Roundtable. NationalCenter for Miss<strong>in</strong>g and Exploited <strong>Child</strong>ren, Wash<strong>in</strong>g<strong>to</strong>n, D.C. February 2008.Lee, J. Project Specialist, <strong>Child</strong> Victim Identification Program, National Center for Miss<strong>in</strong>g andExploited <strong>Child</strong>ren. Personal Communication by email. 10 September 2008.Lehmann, C.U., Cohen, B.A. and Kim, G.R. Detection and management of pornography-seek<strong>in</strong>g <strong>in</strong>an onl<strong>in</strong>e cl<strong>in</strong>ical derma<strong>to</strong>logy atlas. Journal of <strong>the</strong> American Academy of Derma<strong>to</strong>logy, 54 (6), 2006, 1123-1137.Liv<strong>in</strong>gs<strong>to</strong>ne, S. Tak<strong>in</strong>g risky opportunities <strong>in</strong> youthful content creation: teenager’s use of social network<strong>in</strong>gsites for <strong>in</strong>timacy, privacy and self-expression. New Media and Society, 10 (3), 2008, 393-411.Liv<strong>in</strong>gs<strong>to</strong>ne, S. and Bober, M. UK <strong>Child</strong>ren Go Onl<strong>in</strong>e. 2005. Accessed on 15 Oc<strong>to</strong>ber 2008 from: http://www.children-go-onl<strong>in</strong>e.net.Liv<strong>in</strong>gs<strong>to</strong>ne, S. and Hargrave, A.M. Harmful <strong>to</strong> children? Draw<strong>in</strong>g conclusions from empirical researchon media effects. In U. Carlsson (Ed.), Regulation, Awareness, Empowerment. Young People and HarmfulMedia Content <strong>in</strong> <strong>the</strong> Digital Age. Nordicom. Göttenborg. 2006.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |111


Liv<strong>in</strong>gs<strong>to</strong>ne, S. and Helsper, E.J. Tak<strong>in</strong>g risks when communicat<strong>in</strong>g on <strong>the</strong> Internet. The role of offl<strong>in</strong>esocial-psychological fac<strong>to</strong>rs <strong>in</strong> young people’s vulnerability <strong>to</strong> onl<strong>in</strong>e risks. In<strong>format</strong>ion, Communicationand Society, 10 (5), 2007, 618-643.Lo, V-H., and Wei, R. Exposure <strong>to</strong> Internet pornography and Taiwanese adolescents’ sexual attitudesand behaviour. Journal of Broadcast<strong>in</strong>g and Electronic Media, 49 (2), 2005, 221-237.Lw<strong>in</strong>, M.O., Stanaland, A.J.S. and Miyazaki, A.D. Protect<strong>in</strong>g children’s privacy onl<strong>in</strong>e: How parentalmediation strategies affect website safeguard effectiveness. Journal of Retail<strong>in</strong>g, 84 (2), 2008, 205-217.Madell, D. and Muncer, S. Back from <strong>the</strong> beach but hang<strong>in</strong>g on <strong>the</strong> telephone? English adolescents’attitudes and experiences of mobile phones and <strong>the</strong> Internet. CyberPsychology and Behavior, 7 (3). 2004,359-367.MAPAP Project. Measurement and Analysis of P2P Activity Aga<strong>in</strong>st Paedophile Content. 2008. Accessedon 8 August 2008 from: http://www.anitpaedo.lip6.fr/.Marshall, W.L. Revisit<strong>in</strong>g <strong>the</strong> use of pornography by sexual offenders: implications for <strong>the</strong>ory andpractice. Journal of Sexual Aggression, 6, 2000, 67-77McCabe, K. The role of Internet service providers <strong>in</strong> cases of child pornography and child prostitution.Social Science Computer Review, 26 (2), 2008, 247-251.Medierådet. Ungar och medier. [Kids and media]. Medierådet. S<strong>to</strong>ckholm. 2006.Mehta, M.D., Best, D. and Poon, N. Peer-<strong>to</strong>-peer shar<strong>in</strong>g on <strong>the</strong> Internet: An analysis of how Gnutellanetworks are used <strong>to</strong> distribute pornographic material. Canadian Journal of Law and Technology, 1 (1),2002.Middle<strong>to</strong>n, D. Internet Sexual Offend<strong>in</strong>g. In A.R. Beech, L.A. Craig and K.D. Browne (Eds.), Assessmentand Treatment of Sex Offenders: A Handbook. Oxford: Wiley Blackwell. In press.Middle<strong>to</strong>n, D., Elliot, I.A., Mandeville-Norden, R and Beech, A. The Pathways Model and InternetOffenders: An Investigation <strong>in</strong><strong>to</strong> <strong>the</strong> Applicability of <strong>the</strong> Ward and Siegert Pathways Model of <strong>Child</strong>Sexual Abuse with Internet Offenders. Psychology, Crime and Law, 12 (6), 2007, 589-603.Mitchell, K.J. and Wells, M. Problematic Internet experiences: Primary or secondary present<strong>in</strong>g problems<strong>in</strong> persons seek<strong>in</strong>g mental health care? Social Science and Medic<strong>in</strong>e, 65, 2007, 1136-1141.Mitchell, K.J., Becker-Blease, K.A. and F<strong>in</strong>kelhor, D. Inven<strong>to</strong>ry of problematic Internet experiencesencountered <strong>in</strong> cl<strong>in</strong>ical practice. Professional Psychology: Research and Practice, 36 (5), 2005, 498-409.Mitchell, K.J., F<strong>in</strong>kelhor, D. and Wolak, J. Risk fac<strong>to</strong>rs for and impact of onl<strong>in</strong>e sexual solicitation ofyouth. JAMA, 285 (23), 2001, 3011-3014.Mitchell, K.J., F<strong>in</strong>kelhor, D, and Wolak, J. The exposure of youth <strong>to</strong> unwanted sexual material on <strong>the</strong><strong>in</strong>ternet: A national survey of risk, impact and prevention. Youth and Society, 34 (3), 2003, 330-358.Mitchell, K.J. F<strong>in</strong>kelhor, D. and Wolak, J. Onl<strong>in</strong>e requests for sexual pictures from youth: Risk fac<strong>to</strong>rsand <strong>in</strong>cident characteristics. Journal of Adolescent Health, 41, 2007, 196-203.112|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Mitchell, K.J., F<strong>in</strong>kelhor, D. and Wolak, J. Youth Internet users at risk for <strong>the</strong> most serious onl<strong>in</strong>esolicitations. American Journal of Preventive Medic<strong>in</strong>e, 32 (6), 2007b, S32-S37.Mitchell, K.J., Wolak, J. and F<strong>in</strong>kelhor, D. Trends <strong>in</strong> youth reports of sexual solicitations, harassment, andunwanted exposure <strong>to</strong> pornography on <strong>the</strong> Internet. Journal of Adolescent Health, 40, 2007, 116-126.Mitchell, K.J., Wolak, J. and F<strong>in</strong>kelhor, D. Are blogs putt<strong>in</strong>g youth at risk for onl<strong>in</strong>e sexual solicitationor harassment? <strong>Child</strong> Abuse and Neglect, 32, 2008, 277-294.Moultrie, D. Young People with Harmful Sexual Behaviours. Adolescents convicted of possession ofabuse images of children: A new type of adolescent sex offender? Journal of Sexual Aggression, 12 (2),2006, 165-174.Mossige, S., A<strong>in</strong>saar, M. and Sved<strong>in</strong>, C.G. The Baltic Sea Regional Study on Adolescent´s Sexuality. NOVARapport 18/07. NOVA. Oslo. pp. 93-111.Newsgroups, Nons<strong>to</strong>p. Usenet and Newsgroups: What is Usenet? Accessed on 12 June 2008 from: http://www.giganews.com/usenet.html.Nyman, Anders. Abused Onl<strong>in</strong>e. County Council of Östergötland. L<strong>in</strong>köp<strong>in</strong>g. 2006.O’Brian, M., van den Borne, A. and Noten, T. Jo<strong>in</strong>t east west research on traffick<strong>in</strong>g <strong>in</strong> children for sexualpurposes <strong>in</strong> Europe: <strong>the</strong> send<strong>in</strong>g countries. ECPAT. Amsterdam. 2004.O’Brien, M.D. and Webster, S.D. The construction and prelim<strong>in</strong>ary validation of <strong>the</strong> Internet Behavioursand Attitudes Questionnaire (IBAQ). Sex Abuse, 19, 2007, 237-256.O’Connell, R., Price, J. and Barrow, C. Emerg<strong>in</strong>g trends amongst primary school children’s use of <strong>the</strong> Internet.Cyberspace Research Unit, University of Central Lancashire. 2004.O’Halloran, E. A Content Analysis of a ‘Boy Love’ Support Forum: Revisit<strong>in</strong>g Durk<strong>in</strong> and Bryant.Unpublished MA Forensic Psychology <strong>the</strong>sis, University of Cork, Cork, Ireland. 2008.OPTEM. Safer Internet for <strong>Child</strong>ren. Qualitative Study <strong>in</strong> 29 European <strong>Centre</strong>s. European Commission.Brussels. 2007.Orchard, T.R. Girl, woman, lover, mo<strong>the</strong>r: Towards a new understand<strong>in</strong>g of child prostitution amongyoung Devadasis <strong>in</strong> rural Karnataka, India. Social Science and Medic<strong>in</strong>e, 64, 2007, 2379-2390.Oswell, D. When images matter: Internet child pornography, forms of observation and an ethics of <strong>the</strong>virtual. In<strong>format</strong>ion, Communication and Society, 9 (2), 2006, 244-265.Palmer, T. Pre-trial Therapy for <strong>Child</strong>ren who have been Sexually Abused. In S. Richardson and H.Bacon (Eds.), Creative responses <strong>to</strong> <strong>Child</strong> sexual Abuse. Jessica K<strong>in</strong>gsley. London. 2001Palmer, T. Just One Click. Barnardos. London. 2004.Palmer, T. Beh<strong>in</strong>d <strong>the</strong> Screen: <strong>Child</strong>ren who are <strong>the</strong> Subjects of Abusive Images. In E. Quayle and M.Taylor (Eds.), View<strong>in</strong>g <strong>Child</strong> Pornography on <strong>the</strong> Internet. Russell House Publish<strong>in</strong>g. Lyme Regis, UK.2005Paul, B. and L<strong>in</strong>z, D.G. The effects of exposure <strong>to</strong> virtual child pornography on viewer cognitions andattitudes <strong>to</strong>ward deviant sexual behavior. Communication Research, 35, 2008, 3-37.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |113


Perr<strong>in</strong>, P.C., Madanat, H.N., Barnes, M.D., Corolan, A., Clark, R.B., Iv<strong>in</strong>s, N. et al. Health education’srole <strong>in</strong> fram<strong>in</strong>g pornography as a public health issue: local and national strategies with <strong>in</strong>ternationalimplications. Promotion and Education, 15, 2008, 11-18.Petit, J. Special Rapporteur. Rights of <strong>the</strong> <strong>Child</strong> (<strong>Child</strong> Pornography on <strong>the</strong> Internet) (E/CN.4/2005/78).Report <strong>to</strong> <strong>the</strong> Commission on Human Rights, Economic and Social Concerns. United Nations. NewYork. 2005.Piper, C. Who are <strong>the</strong>se youths? Language <strong>in</strong> <strong>the</strong> service of policy. Youth Justice, 1, 2001, 30-39.Quayle, E. Assessment issues with young people who engage <strong>in</strong> problematic sexual behaviour through<strong>the</strong> Internet. In M.C. Calder (Ed.), New developments with young people who sexually abuse. Russell HousePublish<strong>in</strong>g. Lyme Regis, UK. 2007.Quayle, E. Internet Offend<strong>in</strong>g. In D.R. Laws and W. O’Donohue (Eds.), Sexual Deviance. GuilfordPress. New York. 2008. pp. 439-458.Quayle, E. and Taylor, M. Paedophiles, pornography and <strong>the</strong> Internet: Assessment issues. British Journalof Social Work, 32, 863-875. 2002.Quayle, E. and Taylor, M. Young people who sexually abuse: <strong>the</strong> role of <strong>the</strong> new technologies. In M.Erooga and H. Masson (Eds.), <strong>Child</strong>ren and Young People who Sexually Abuse O<strong>the</strong>rs. Routledge. London.2006. pp. 115-128.Renold, E. and Creigh<strong>to</strong>n, S.J. Images of Abuse: A Review of <strong>the</strong> Evidence on <strong>Child</strong> Pornography. NSPCC.London. 2003.Rickert, V.I. and Ryan, O. Is <strong>the</strong> Internet <strong>the</strong> source? Journal of Adolescent Health, 40, 2007, 104-105.SAFT. Safety Awareness Facts Tools. European Commission. Brussels. Accessed on 5 June 2007 from:http://www.ec.europa.eu/<strong>in</strong><strong>format</strong>ion_society/activities/sip/projects/awareness/closed_projects/saft/<strong>in</strong>dex_en.htm.Se<strong>to</strong>, M. and Eke, A. The crim<strong>in</strong>al his<strong>to</strong>ries and later offend<strong>in</strong>g of child pornography offenders. SexualAbuse: A Journal of Research and Treatment, 17 (2), 2005, 201-210.Se<strong>to</strong>, M.C., Can<strong>to</strong>r, J.M., and Blanchard, R. <strong>Child</strong> pornography offenses are a valid diagnostic <strong>in</strong>dica<strong>to</strong>rof pedophilia. Journal of Abnormal Psychology, 115, 2006, 610-615.Schuijer, J. and Rossen, B. The Trade <strong>in</strong> <strong>Child</strong> Pornography. IPT forensics, 4. 1992. Accessed on 8 July2002 from: http://www.ipt-forensics.com/journal/volume4/j4_2_1.htmScott, S., The Politics and Experience of <strong>Child</strong> Sexual Abuse: Beyond Disbelief. Open University Press.Buck<strong>in</strong>gham. 2001Sgroi, S. Handbook Of Cl<strong>in</strong>ical Intervention In <strong>Child</strong> Sexual Abuse. Lex<strong>in</strong>g<strong>to</strong>n Books. Lex<strong>in</strong>g<strong>to</strong>n, MA.1982.Sheldon, K. and Howitt, D. Sexual fantasy <strong>in</strong> paedophile offenders: Can any model expla<strong>in</strong> satisfac<strong>to</strong>rilynew f<strong>in</strong>d<strong>in</strong>gs from a study of Internet and contact sexual offenders? Legal and Crim<strong>in</strong>ological Psychology,13, 2008, 137-158.114|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Shukan Bunshun. Yoji Rape Bon ga Bakaure suru Saish<strong>in</strong> “Lolicon Jijyo” (Lolita: The Latest Situation –Comics with <strong>Child</strong> Rape Images on High Demand). Weekly Bunshun, 15 December 2005, p. 30.Smith, P., Gogg<strong>in</strong>, C. and Gendreau, P. The effects of prison sentences and <strong>in</strong>termediate sanctions onrecidivism: general effects and <strong>in</strong>dividual differences. Public Works and Government Services, Solici<strong>to</strong>rGeneral’s Office. Ottawa. 2002.Silbert, M.H. The Effects on Juveniles of Be<strong>in</strong>g Used for Pornography and Prostitution. In D. Zillmanand C. Bryant (Eds.), Pornography: Research Advances and Policy Considerations. Lawrence Erlbaum.Hillside, New Jersey. 1989Söderström, Bengt. Experiences from and questions raised <strong>in</strong> cl<strong>in</strong>ical practice. In <strong>Child</strong>ren and YoungPersons with Abusive and violent Experiences Connected <strong>to</strong> Cyberspace. Swedish <strong>Child</strong>ren’s WelfareFoundation. 2006.Söderström, Bengt. Internet-related violence. Paper presented at Council of Europe conference: Build<strong>in</strong>ga Europe for and with <strong>Child</strong>ren. Towards a Strategy for 2009 - 2011. S<strong>to</strong>ckholm. 2008.Steevens, V. and Webster, C. Clos<strong>in</strong>g <strong>the</strong> barn door: The effect of parental supervision on Canadianchildren’s onl<strong>in</strong>e privacy. Bullet<strong>in</strong> of Science, Technology and Society, 28 (11), 2008, 4-19.S<strong>to</strong>p It Now, UK and Ireland. Helpl<strong>in</strong>e Report (2006). Accessed onl<strong>in</strong>e on 10 January 2007 and availablefrom: http://www.s<strong>to</strong>pitnow.org.uk/publications.htm.Subrahmanyam, K., Smahel, D. and Greenwood, P. Connect<strong>in</strong>g developmental constructions <strong>to</strong><strong>the</strong> Internet: Identity presentation and sexual exploration <strong>in</strong> onl<strong>in</strong>e teen chat rooms. DevelopmentalPsychology, 42 (3), 2006, 395-406.Sullivan, C. Internet traders of child pornography: profil<strong>in</strong>g research. Censorship Compliance Unit. NewZealand. 2005.Supreme Court of Sweden [Högsta Doms<strong>to</strong>len]. Mål nr B 1460-04. [Rul<strong>in</strong>g nr B 1460-04]. S<strong>to</strong>ckholm.2005.Sved<strong>in</strong>, C.G. and Back, K, <strong>Child</strong>ren who Don’t Speak Out. Save <strong>the</strong> <strong>Child</strong>ren Sweden. S<strong>to</strong>ckholm. 1996.Sved<strong>in</strong>, C.G. and Back, K. Why Didn’t They Tell Us? Sexual Abuse <strong>in</strong> <strong>Child</strong> Pornography. Save <strong>the</strong> <strong>Child</strong>renSweden. S<strong>to</strong>ckholm. 2003.Sved<strong>in</strong>, C.G. and Priebe, G. Sell<strong>in</strong>g sex <strong>in</strong> a population-based study of high school seniors <strong>in</strong> Sweden:Demographic and psychosocial correlates. Archives of Sexual Behavior, 36, 2007, 21-32.Tate, T. <strong>Child</strong> Pornography. Methuen. St. Ives, UK. 1990.Taylor, M. and Quayle, E. <strong>Child</strong> Pornography: An Internet Crime. Routledge. Brigh<strong>to</strong>n. 2003.Taylor, M. and Quayle, E. Abusive images of children. In S. Cooper, A. Giard<strong>in</strong>o, V. Vieth and N. Kellogg(Eds.), Medical, Legal and Social Science Aspects of <strong>Child</strong> Sexual Exploitation. GW Medical Publish<strong>in</strong>g.Sa<strong>in</strong>t Louis. 2005.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |115


Taylor, M., Holland, G., and Quayle, E. Typology of Paedophile Picture Collections. The Police Journal,74 (2), 2001, 97-107.TES (Times Educational Supplement) Cymru. 9 March 2005.Tynes, B.M. Internet safety gone wild? Journal of Adolescent Research, 22 (6), 2007, 575-584.Uecker, J.E., Angotti, N. and Regnerus, M.D. Go<strong>in</strong>g most of <strong>the</strong> way: “Technical virg<strong>in</strong>ity” amongAmerican adolescents. Social Science Research. In press.Valcke, M., Schellens, T., Van Keer, H. and Gerarts, M. Primary school children’s safe and unsafe use of<strong>the</strong> Internet at school: An explora<strong>to</strong>ry study. Computers <strong>in</strong> Human Behavior, 23, 2007, 2838-2850.von Weiller, J. Care and Treatment of child victims of child pornographic exploitation <strong>in</strong> Germany. Paperpresented at <strong>the</strong> meet<strong>in</strong>g ‘<strong>Child</strong>ren’s Reactions <strong>to</strong> Onl<strong>in</strong>e Violence - Cop<strong>in</strong>g Strategies Used’. London.2008.Wagner, K. Alexandramannen. Förlags AB We<strong>in</strong>co. Västra Frölunda. 2008.Ward, T. and Siegert, R.J. Toward a comprehensive <strong>the</strong>ory of child sexual abuse: A <strong>the</strong>ory knitt<strong>in</strong>gperspective. Psychology, Crime and Law, 8, 2002, 319-351.Waters, F. <strong>Child</strong> sex crimes on <strong>the</strong> <strong>in</strong>ternet. State of Wyom<strong>in</strong>g At<strong>to</strong>rney General, 2007.Webb, L., Craissati, J. and Keen, S. Characteristics of Internet child pornography offenders: A comparisonwith child molesters. Sex Abuse, 19, 2007, 449-465.Wells, M. and Mitchell, K.J. Youth sexual exploitation on <strong>the</strong> Internet: DSM-IV diagnoses and genderdifferences <strong>in</strong> co-occurr<strong>in</strong>g mental health issues. <strong>Child</strong> and Adolescent Social Work Journal, 24 (3), 2007,235-260.Wickman, M.E., Anderson, N.L.R. and Greenberg, C.S. The adolescent perception of <strong>in</strong>v<strong>in</strong>cibility andits <strong>in</strong>fluence on teen acceptance of health promotion strategies. Journal of Paediatric Nurs<strong>in</strong>g. In press.Wilson, D. and Andrews, C. Internet traders of child pornography and o<strong>the</strong>r censorship offenders <strong>in</strong> NewZealand: Updated statistics (November 2004). Accessed 10 September 2005 from: http://www.dia.govt.nz/puforms.nsf/URL/profil<strong>in</strong>gupdate.pdf/$file/profil<strong>in</strong>gupdate.pdf.Wolak, J. Mitchell, K. and F<strong>in</strong>kelhor, D. Onl<strong>in</strong>e victimization: 5 years later (NCMEC 07-06-025).National Center for Miss<strong>in</strong>g and Exploited <strong>Child</strong>ren. Alexandria, VA. 2006.Wolak, J., F<strong>in</strong>kelhor, D. and Mitchell, K.J. <strong>Child</strong>-Pornography Possessors Arrested <strong>in</strong> Internet-RelatedCrimes: F<strong>in</strong>d<strong>in</strong>gs from <strong>the</strong> National Juvenile Onl<strong>in</strong>e Victimization Study. National Center for Miss<strong>in</strong>g andExploited <strong>Child</strong>ren. Wash<strong>in</strong>g<strong>to</strong>n, D.C. 2003.Wolak, J., F<strong>in</strong>kelhor, D. and Mitchell, K.J. <strong>Child</strong>-Pornography Possessors Arrested <strong>in</strong> Internet-RelatedCrimes: F<strong>in</strong>d<strong>in</strong>gs from <strong>the</strong> National Juvenile Onl<strong>in</strong>e Victimization Study. National Center for Miss<strong>in</strong>g andExploited <strong>Child</strong>ren. Wash<strong>in</strong>g<strong>to</strong>n, D.C. 2005.116|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e


Wolak, J., F<strong>in</strong>kelhor, D., Mitchell, K.J. and Ybarra, M.L. Onl<strong>in</strong>e “preda<strong>to</strong>rs” and <strong>the</strong>ir victims. AmericanPsychologist, 63 (2), 2008, 111-128.Wortley, R. and Smallbone, S. <strong>Child</strong> Pornography on <strong>the</strong> Internet. 2006. Accessed on 10 May 2007 andavailable from: www.cops.usdoj.gov.Ybarra, M.L., Espelage, D.L. and Mitchell, K.J. The co-occurrence of Internet harassment and unwantedsexual solicitation, victimization and perpetration: Associates with psychosocial <strong>in</strong>dica<strong>to</strong>rs. Journal ofAdolescent Health, 41, 2007, S31-S41.Ybarra, M.L., Diener-West, M. and Leaf, P.J. Exam<strong>in</strong><strong>in</strong>g <strong>the</strong> overlap <strong>in</strong> Internet harassment and schoolbully<strong>in</strong>g: Implications for school <strong>in</strong>tervention. Journal of Adolescent Health, 41, 2007, S42-S50.Ybarra, M.L., Leaf, P.J. and Diener-West, M. Sex differences <strong>in</strong> youth-reported depressivesymp<strong>to</strong>ma<strong>to</strong>logy and unwanted Internet sexual solicitation. Journal of Medical Internet Research, 6 (1),2004, 9-18.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |117


The World Congress III aga<strong>in</strong>st Sexual Exploitation of <strong>Child</strong>ren and Adolescents aims <strong>to</strong> mobilise all countries<strong>to</strong> guarantee <strong>the</strong> rights of children and adolescents <strong>to</strong> be protected aga<strong>in</strong>st sexual exploitation by tak<strong>in</strong>g action<strong>to</strong>:• Build on current achievements, exam<strong>in</strong>e new challenges and dimensions of sexual exploitation and setmore targeted strategies and measures <strong>to</strong> address <strong>the</strong>m;• Exam<strong>in</strong>e <strong>in</strong>itiatives that have been effective <strong>in</strong> different regions and identify channels <strong>to</strong> facilitate betterexchange of experience, skills and knowledge;• Open new channels and secure greater <strong>in</strong>ternational cooperation on key issues (<strong>in</strong>clud<strong>in</strong>g cross-borderand <strong>in</strong>ter-regional cooperation) <strong>to</strong> facilitate collaborations for counteraction;• Catalyse a systemic and <strong>in</strong>ter-sec<strong>to</strong>ral approach <strong>to</strong> guarantee children and adolescents´ right <strong>to</strong> beprotected from sexual exploitation; and• Establish time-bound goals <strong>to</strong> promote and moni<strong>to</strong>r progress on action plans made by <strong>the</strong> Congress.Commercial sexual exploitation of children occurs <strong>in</strong> many different ways and <strong>in</strong> a wide variety of sett<strong>in</strong>gs.The underly<strong>in</strong>g causes are numerous, complex and closely <strong>in</strong>terrelated and must be analysed, unders<strong>to</strong>odand confronted accord<strong>in</strong>gly. In order <strong>to</strong> facilitate <strong>the</strong> implementation of <strong>the</strong> objectives of <strong>the</strong> World CongressIII, <strong>the</strong> Central Organiz<strong>in</strong>g Committee (Government of Brazil, UNICEF, ECPAT and <strong>the</strong> NGO Group for <strong>the</strong>Convention on <strong>the</strong> Rights of <strong>the</strong> <strong>Child</strong>) commissioned <strong>the</strong>matic papers on five major areas of this complexphenomenon and violation of child rights.The World Congress III <strong>the</strong>mes are on:• Theme 1: Dimensions of Commercial Sexual Exploitation: prostitution of children, child traffick<strong>in</strong>g forsexual purposes, child abuse images and sexual exploitation onl<strong>in</strong>e, sexual exploitation of children <strong>in</strong><strong>to</strong>urism• Theme 2: Legal Frameworks and Law Enforcement• Theme 3: Integrated Inter-Sec<strong>to</strong>ral Policies• Theme 4: Role of <strong>the</strong> Private Sec<strong>to</strong>r and Corporate Social Responsibility• Theme 5: Strategies for International Cooperation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!