Child Sexual Exploitation
Total Page:16
File Type:pdf, Size:1020Kb
ADDITIONAL RESOURCES Indiana State Police Internet Crimes against Children (ICAC) Youth Educators Program National Center for Missing and Exploited Children Child Sexual Past high profile instances of youth being Websites: victimized by cyber bullies, and sexual WWW.Cybertipline.com predators demanded a proactive program Exploitation be developed and implemented in an effort SEXTORTION WWW.Netsmartz.org to inoculate youth against such criminal acts. WWW.Missingkids.com There are 61 Internet Crimes against Children Task Force (ICAC) in the United National Suicide Prevention Lifeline: States. However, the Indiana ICAC Task Force is the first to have full-time Youth https://www.suicidepreventionlifeline.org Educators. Each Youth Educator works within 1-800-273-8255 the structure of the Indiana ICAC Task Force with presentations specifically designed to prevent victimization in the areas of: Online child sexual solicitation Online child extortion, also known as sextortion Online production of child pornography Online bullying, also known as cyberbullying Online radicalization mitigation to reduce the recruitment of youth by terrorists Want to learn more about the Indiana State and criminal extremists. Police ICAC Youth Educator Program email your questions to? The Indiana ICAC Youth Educators provides age appropriate Cyber Safety presentations to help reach our youth before they become [email protected] victims, to provide help to those who have already been victimized and mitigate the potential for acts of school violence YOUTH EDUCATOR “This project was supported (in part or in whole) by committed due to online victimization. Grant Funds awarded by the Indiana Criminal Justice Institute and made possible by Award No. 2016VA-GX- 0017 awarded by the Department of Justice, Office of Justice Programs, Office for Victims of Crime. 1/19-cab How are they finding victims? Using multiple online identities against a MOTIVES FOR SEXTORTION Sextortion most commonly occurs via given child, such as being the person Based on the information known by phone/tablet messaging apps, social blackmailing for sexual content as well as the CyberTipline reporter, sextortion pretending to be a supportive friend to networking sites, and during video chats. appears to have occurred with one In 41% of reports, it was suspected or the child or a sympathetic victim of the of three primary objectives (In 12% known that multiple online platforms same offender of reports, the objective could not be were involved in facilitating Pretending to be younger and/or determined): communication between the a female To acquire additional, and often offender and child. Threatening to physically hurt or increasingly more explicit, sexual Commonly, the offender would sexually assault the child or their family content (photos/videos) of the approach the child on a social Threatening to create sexual content child (76%) networking site and then attempt to of the child using digital-editing tools To obtain money from the child (6%) move the communication to anonymous Accessing the child’s account without To have sex with the child (6%) messaging apps or video chats where authorization and stealing sexual he/she would obtain sexually explicit content of the child content from the child. Creating a fake profile as the child and Sextortion is digital blackmail Why do the victims send more? posting sexual content of the child It typically occurs when a child is coerced Many different manipulation tactics are used Pretending to be a modeling agent to into sharing a nude photograph or video of obtain sexual content of the child themselves on the internet (sexting). Many by offenders, often in combination, to acquire sexual content (images and/or Threatening to post sexually explicit times, the child has never personally met conversations with the child online the extorter. videos) of the child, obtain money from the What are the effects of Sextortion? child or have sex with the child. The most Who are the child victims? common tactics are: In 18% of CyberTipline sextortion reports, it 78% of the incidents involved female Threatening to post previously acquired was indicated that the child victim had children and 12% involved male children (In sexual content online (71%); and experienced a negative outcome as the 10% of incidents, child gender could not be Threatening to post previously acquired result of the victimization, such as sexual content online specifically for determined); hopelessness, fear, anxiety and depression. The average age at the time of the family and friends to see (29%). In 28% of these reports with negative incident was approximately 15 years old, Some other tactics include: outcomes (5% of all sextortion reports), the despite a wider age-range for female Reciprocation, whereby the offender child had engaged in self-harm, had been children (8-17 years old) compared to coerced the child into providing sexual suicidal, or had attempted suicide as a content by promising reciprocity male children (11-17 years old); and result of the victimization. In 22% of the CyberTipLine reports, the Developing a bond with the child reporter mentioned being suspicious of, through flattery and praise There was no difference between male and or knowing that, multiple children were Secretly recording sexually explicit female children in negative outcomes of targeted by the same offender. videos of the child during video chats sextortion, or how commonly they were indicated in the CyberTipline reports. 1/19-cab .