2016 National Strategy for Child Exploitation

Total Page:16

File Type:pdf, Size:1020Kb

2016 National Strategy for Child Exploitation The National Strategy for Child Exploitation Prevention and Interdiction A REPORT TO CONGRESS APRIL 2016 Introduction by Attorney General Loretta Lynch National Strategy on Child Exploitation Prevention and Interdiction Child exploitation is one of the most reprehensible and destructive offenses confronting America today. It harms the safety and well-being of our young people; it devastates our families and communities; and it degrades our strength as a nation of laws and civic security. No matter what form child exploitation takes—from the creation and circulation of child pornography to the trafficking of children for sex—it demands the full attention of law enforcement, policymakers, community leaders, and service providers, each of whom plays an essential role in combating this unconscionable crime. At the Department of Justice, we’re advancing and expanding a number of efforts to protect our nation’s children, to hold perpetrators accountable, and to help victims reclaim their lives. We continue to build on initiatives like Project Safe Childhood, which brings together federal, state, local, and tribal law enforcement in a comprehensive and unified response to the abuse and exploitation of minors. Our Internet Crimes Against Children Task Force Program has facilitated the training of more than 500,000 law enforcement professionals since its inception, providing valuable techniques related to investigating, prosecuting, and preventing technology-enabled crimes against children. Just last year, 61 coordinated task forces representing more than 3,500 federal, state, local, and tribal law enforcement and prosecutorial agencies conducted more than 54,000 investigations that resulted in the arrest of more than 8,500 individuals. And we are aggressively confronting evolving threats online by prosecuting those who use the so-called “Dark Net” in the service of child pornography and child sex trafficking, and by seeking to work closely with the private sector to ensure that state-of-the-art encryption technology is no shield for criminal activity. These are vital undertakings, and they have led to significant and life-changing progress —but we still have work to do. The pages that follow contain the National Strategy on Child Exploitation Prevention and Interdiction—a roadmap to building on our successes and tackling new challenges during the next several years. Formulated over the course of a year by an interagency working group, this strategy harnesses the expertise of law enforcement at all levels, as well as the experience and knowledge of non-governmental stakeholders. It identifies innovative ways in which the federal government and its partners can address child exploitation. And it reaffirms our unwavering commitment to ensuring that all children in America are able to reach their potential in a nation that protects them from violence and abuse. Investigating and prosecuting child exploitation crimes is extraordinarily difficult work, but the dedicated prosecutors and agents of the Department of Justice have proven themselves equal to the challenge. I am confident that with the help of this critical document—and with the hard work and partnership of federal, state, local and tribal law enforcement, victim-service organizations across the country and our allies overseas—we will continue to make lasting progress toward a brighter future for our children, and a safer nation for all our people. I look forward to everything that we will accomplish together in the service of that mission in the days and months to come. Table of Contents I. Executive Summary . 1 II. Introduction . 15 III. Review of Efforts to Combat Child Exploitation . 18 A. Federal Bureau of Investigation . 18 B. U.S. Immigration and Customs Enforcement/Homeland Security Investigations . 24 C. U.S. Postal Inspection Service. 31 D. U.S. Marshals Service . 34 E. Child Exploitation and Obscenity Section. 35 F. U.S. Attorney’s Offices . 41 G. INTERPOL Washington . 44 H. Bureau of Prisons . 45 I. Office of Justice Programs . 48 J. Office of Community Oriented Policing Services . 60 K. Department of Health and Human Services . 61 L. President’s Interagency Task Force to Monitor and Combat Trafficking in Persons 65 M. Department of Defense . 65 N. Department of Education . 67 O. National Center for Missing & Exploited Children. 68 IV. National Child Exploitation Threat Assessment 2016 . 71 V. Goals and Objectives for Continuing the Fight Against Child Exploitation. 80 A. Investigations and Prosecutions . 80 B. Outreach and Awareness Activities . 83 C. Victim Services .. 86 D. Policy and Legislative Initiatives . 91 VI. Child Exploitation in Indian Country . 97 VII. Conclusion . 108 Appendices A. Prosecution Accomplishments Summary. 110 B. Review of the Internet Crimes Against Children Task Force Program . 114 C. Department of Justice-Funded Research on Child Exploitation . 136 D. National Strategy on Child Exploitation Prevention and Interdiction 2016 Survey Analysis . 141 E. Legislative Proposals. 149 I. EXECUTIVE SUMMARY 1. INTRODUCTION The PROTECT Our Children Act of 2008 requires that the Attorney General develop and implement a National Strategy for Child Exploitation Prevention and Interdiction (National Strategy). The first National Strategy was published in 2010. This, the second National Strategy, builds on that work. The National Strategy is a culmination of a year of discussions among members of an inter-agency working group convened by the National Coordinator for Child Exploitation Prevention and Inter­ diction at the Department of Justice (DOJ, or the Department). The National Strategy first discusses the work of federal law enforcement agencies and prosecutors since 2010, as well as other agencies and offices that play important roles in this work by supporting victims, providing grants to state, local, and tribal governments and non-profit partners, and educating the public about the dangers of child exploitation, and also the work of the non-governmental National Center for Missing & Exploited Children (NCMEC). Second, it provides a threat assessment that addresses the nature and scope of the problem and updates the assessment contained in the 2010 National Strategy. Third, it lays out plans for continuing the fight against child exploitation in four key areas: investigations and prosecutions; outreach and education; victim services; and policy initiatives. Fourth, the National Strategy has a section dedicated solely to child exploitation in Indian County, as the issues there are often unique. Finally, a series of appendices include statistics on federal prosecutions; detailed tables of information on the Internet Crimes Against Children Task Force Program (ICAC program) funded by DOJ; research on child exploitation funded by DOJ; a summary of the survey on which the threat assessment is based; and the text of DOJ legislative proposals. Throughout the National Strategy case studies are included as examples of child exploitation prosecutions brought by DOJ. 2. REVIEW OF EFFORTS TO COMBAT CHILD EXPLOITATION This section of the National Strategy provides a comprehensive overview of existing efforts to combat child exploitation, including those by non-governmental organizations such as NCMEC. A. Federal Bureau of Investigation (FBI) The FBI leads Child Exploitation Task Forces (CETFs), collaborating with nearly 400 state, local, tribal, and federal law enforcement partners to identify and prosecute individuals and enterprises that sexually exploit children. The FBI also leads the Innocence Lost National Initiative (ILNI) to address the problem of children being recruited into prostitution by sex traffickers. Currently, the ILNI operates as part of 71 CETFs nationwide. Under the ILNI, the FBI conducts Operation Cross Country annually to recover children from sex traffickers and coordinate victim services for identified victims. 1 The FBI also leads the Innocent Images National Initiative (IINI), a proactive, intelligence-driven, multi-agency investigative operation that focuses on combating the proliferation of child pornography and child sexual exploitation worldwide. The IINI provides centralized coordination and analysis of case information that is both national and international in scope. In Fiscal Year 2014 through 2015, the IINI program was credited with over 2,900 arrests and 2,200 convictions involving the online sexual exploitation of children. In addition, the FBI operates a Child Sex Tourism (CST) Initiative targeting U.S. citizens who travel abroad to engage in sexual activity with children. Finally, the FBI operates a Child Abduction Rapid Deployment (CARD) Team to provide a nationwide resource to support child abduction and critically missing children investigations. The FBI’s work is supported by the Violent Crimes Against Children (VCAC) Intelligence Unit, which engages in intelligence collection, analysis, and dissemination; identifies VCAC threats, trends, and vulnerabilities; writes national-in-scope intelligence products; identifies intelligence gaps and collection requirements; and provides actionable intelligence to law enforcement, policy-makers, non-governmental organizations, private industry, and the public to aid in the identification, recovery, and prevention of child victims. In addition, FBI’s Digital Analysis Research Center provides digital forensic extraction and analysis, testimony, and support to the FBI’s VCAC program. B. Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement (ICE)/Homeland
Recommended publications
  • Civil Society and Law Enforcement by Jon Fox
    Sex Laws in Thailand Part 3: Civil Society and Law Enforcement by Jon Fox 25 January 2010 This article is the final installment in the Thailand Law Forum’s series on Sex Laws in Thailand. It looks at challenges to protecting children and the role of non-governmental organizations (NGOs) and international law enforcement in the fight against sexual crimes in Thailand. The first article explained the long reach of U.S. law, encompassing both U.S. citizens, and in certain circumstances, non-U.S. citizens. The second installment drew out the “consumption” habits and patterns of Thailand’s sex industry and the legal and cultural milieu in which prostitution takes place in Thailand. Sex Laws in Thailand Part 1: US Laws Abroad: The Long Arm of Uncle Sam Sex Laws in Thailand Part 2: Laws Regulating Commercial Sex and Entertainment Places Thailand stands on the front lines of the battle against sexual exploitation in Southeast Asia. Thai authorities have successfully adopted a two pronged approachForum to sexual crimes: establishing a strict legal framework tackling various elements of sex crimes (trafficking, prostitution, sex with minors to name but a few); and cooperating with local communities and civil society groups to identify and protect victims. However, despite the progress made by the Thai authorities, there is much room for improvement,Law particularly in terms of enforcement and prosecution. Child sexual exploitation provides a particularly clear view into wider trends of sex crimes taking place in Thailand today. From many Southeast Asian countries and Thailand‟s rural areas, young boys and girls are taken to large Thai cities to be sexually exploited.
    [Show full text]
  • Transaction-Tax Evasion in the Housing Market José G
    Transaction-tax Evasion in the Housing Market José G. Montalvo Amedeo Piolatto Josep Raya This version: January 2020 (March 2019) Barcelona GSE Working Paper Series Working Paper nº 1080 Transaction-tax evasion in the housing market Revised Version January 2020 Jos´eG. Montalvo 1 Amedeo Piolatto2 Josep Raya3 U. Pompeu Fabra-ICREA, Autonomous U. Barcelona, U. Pompeu Fabra, Research Professor BGSE BGSE, IEB, MOVE ESCSE (Tecnocampus) Acknowledgements: We gratefully acknowledges the financial sup- port of the Spanish Ministry of Economy and Competitiveness (Mont- alvo: ECO2017-82696P, Piolatto: PGC2018-094348; Raya: ECO2016- 78816R), the Government of Catalonia (Montalvo: ICREA-Academia and SGR2017-616; Piolatto: 2017SGR711), the Programa Ram´ony Cajal (Piolatto: RYC-2016-19371), the Severo Ochoa Programme for Centres of Excellence in R&D of the Spanish Ministry of Economy and Competitiveness (Montalvo and Piolatto: SEV-2015-0563) and the Barcelona GSE. 1Universitat Pompeu Fabra, Ramon Trias Fargas 25-27, 08005 Barcelona. Tel.: +34 935 422 509. E-mail: [email protected] 2[Corresponding Author] Autonomous U. Barcelona (UAB), Bellaterra Campus, 08193, Barcelona. Tel.: Phone: +34 935 868 493 E-mail: [email protected] 3Universitat Pompeu Fabra, Ramon Trias Fargas 25-27, 08005 Barcelona. Tel.: +34 931 696 501. E-mail: [email protected] Abstract We model the behaviour of a mortgagor considering to evade the real estate transfer tax. We build an observable measure of over-appraisal that is in- versely related with tax evasion and conclude that the tax authority could focus auditing efforts on low-appraisal transactions. We include `behavi- oural' components (shame and stigma) allowing to introduce buyers' and societal characteristics that explain individual and idiosyncratic variations.
    [Show full text]
  • Recovering from Childhood Abuse
    Recovering from Childhood Abuse Sarah Kelly and Jonathan Bird This book is written by survivors for all survivors who experienced any form of abuse or neglect in childhood and for those who provide support. 2014 Copyright © NAPAC 2014 1 Dedication To all the brave survivors and their supporters who have helped us learn what works in recovering from childhood abuse. In memory of those people who could not find the support they needed to survive as adults and tragically took their own lives. All happy families are alike; each unhappy family is unhappy in its own way. Leo Tolstoy, Anna Karenina People are not disturbed by things, but by the view they take of them. Epictetus, first century AD Thanks to BIG Lottery and all our other generous funders and donors who have made NAPAC’s work and this book possible. Grateful thanks also go to Peter Saunders, Helen Munt, Julie Brock, Kathryn Livingston and Melanie Goodwin of First Person Plural, and Tracey Storey of Irwin Mitchell, who have all contributed to the writing of this book. Proof reading and layout were kindly donated by James Badenoch QC, Ann Watkins and Katie John, and our thanks go to them for their time and efforts. Copyright © NAPAC 2014 2 Contents Page About the authors 4 Foreword – Tim Lambert 5 Introduction 6 Chapter 1: What is abuse? 9 Chapter 2: Maladaptive coping strategies 25 Chapter 3: Mental health 32 Chapter 4: Dissociative spectrum – Katherine and Melanie of FPP 41 Chapter 5: Impacts 49 Chapter 6: Therapy and appropriate coping mechanisms 56 Chapter 7: Transfer of responsibility 67 Chapter 8: How to disclose and how to hear disclosure 80 Chapter 9: The legal process – Tracey Storey, solicitor, Irwin Mitchell 86 Conclusions 96 Bibliography 98 Useful contacts 99 Copyright © NAPAC 2014 3 About the authors Sarah Kelly is a survivor of childhood emotional and sexual abuse.
    [Show full text]
  • Gender-Based Violence, and an Analysis of the Criminal Justice Laws and Policies That Perpetuate This Narrative
    UCLA UCLA Women's Law Journal Title Women and Girls' Experiences Before, During, and After Incarceration: A Narrative of Gender-based Violence, and an Analysis of the Criminal Justice Laws and Policies that Perpetuate this Narrative Permalink https://escholarship.org/uc/item/4773j0sp Journal UCLA Women's Law Journal, 20(2) Authors Sangoi, Lisa Kanti Goshin, Lorie Smith Publication Date 2014 DOI 10.5070/L3202021355 Peer reviewed eScholarship.org Powered by the California Digital Library University of California WOMEN AND GIRls’ ExpERIENCES BEFORE, DURING, AND AFTER INCARCERATION: A Narrative of Gender-based Violence, and an Analysis of the Criminal Justice Laws and Policies that Perpetuate This Narrative By Lisa Kanti Sangoi* & Lorie Smith Goshin** I. Introduction Women and girls involved with the United States’ (U.S.) criminal justice system experience gender-based violence (GBV)1 at rates that far exceed the general population. Their experiences with GBV often start in childhood or early adolescence, and may continue through adulthood, producing lifelong histories of abuse. These violent experiences can influence involvement in criminal ac- tivity.2 They may extend throughout incarceration, as correctional staff emotionally, verbally, physically, and sexually abuse women and girls at high rates, or facilitate such abuse by other inmates. Many criminal justice involved (CJI) women reenter their commu- nities debilitated by their time and experiences in detention, and by laws that limit their access to public assistance due to their status as convicted felons. As a cumulative result of their histories of vio- * Lisa Sangoi received her Master’s in Human Rights Studies from Colum- bia University, and is currently pursuing a J.D.
    [Show full text]
  • 2. the Link Between Child Sex Tourism and Child Trafficking
    Foreword International child sex tourism, a truly global phenomenon, and one which affects some of the most vulnerable members of our societies – children and adolescents, has received significantly less attention on the international arena than have other related phenomena, such as child pornography and trafficking in children for commercial sexual exploitation. While these crimes are all closely linked, and demand concerted action, child sex tourism deserves significantly more attention than it has been receiving as a stand-alone concern. In this regard, the United States Department of State Office to Monitor and Combat Trafficking in Persons (TIP Office) has taken the lead in placing emphasis on child sex tourism as an issue that deserves improved understanding and greater levels of intervention. Child sex tourism is mentioned in numerous country narratives in the 2006 Trafficking in Persons Report, and the TIP Office is clearly committed to including countries’ efforts to combat child sex tourism, especially as connected to the creation of demand for child sex tourism, in its consideration for tier placements. The report, based on exhaustive research conducted by The Protection Project (TPP) regarding the issue of child sex tourism, was made possible by a generous award from the TIP Office seeking to improve understanding of the global phenomenon of international child sex tourism and existing interventions to combat it. The report provides a description of the scope of the problem of child sex tourism and illustrates different responses adopted in several countries where child sex tourism is emerging or significant, especially Cambodia, Costa Rica, Honduras, Philippines, Thailand, and Vietnam.
    [Show full text]
  • “Is Deterrence Approach Effective in Combating Tax Evasion? a Meta-Analysis”
    “Is deterrence approach effective in combating tax evasion? A meta-analysis” Muh Dularif https://orcid.org/0000-0002-4905-2595 AUTHORS Sutrisno T. Nurkholis Erwin Saraswati Muh Dularif, Sutrisno T., Nurkholis and Erwin Saraswati (2019). Is deterrence ARTICLE INFO approach effective in combating tax evasion? A meta-analysis. Problems and Perspectives in Management, 17(2), 93-113. doi:10.21511/ppm.17(2).2019.07 DOI http://dx.doi.org/10.21511/ppm.17(2).2019.07 RELEASED ON Thursday, 25 April 2019 RECEIVED ON Sunday, 20 January 2019 ACCEPTED ON Wednesday, 06 March 2019 LICENSE This work is licensed under a Creative Commons Attribution 4.0 International License JOURNAL "Problems and Perspectives in Management" ISSN PRINT 1727-7051 ISSN ONLINE 1810-5467 PUBLISHER LLC “Consulting Publishing Company “Business Perspectives” FOUNDER LLC “Consulting Publishing Company “Business Perspectives” NUMBER OF REFERENCES NUMBER OF FIGURES NUMBER OF TABLES 89 2 10 © The author(s) 2021. This publication is an open access article. businessperspectives.org Problems and Perspectives in Management, Volume 17, Issue 2, 2019 Muh Dularif (Indonesia), Sutrisno T. (Indonesia), Nurkholis (Indonesia), Erwin Saraswati (Indonesia) Is deterrence approach BUSINESS PERSPECTIVES effective in combating tax evasion? A meta-analysis Abstract LLC “СPС “Business Perspectives” The purpose of this paper is to present the results of a meta-analysis of the relationship Hryhorii Skovoroda lane, 10, Sumy, between determinant factors and tax evasion based on deterrence approach. Using 40022, Ukraine the meta-analysis method, each statistical result of empirical studies is converted into www.businessperspectives.org r-pearson as standardized effect size, and then synthesized into a mean effect size in order to increase power and to resolve uncertainty.
    [Show full text]
  • The Girl in the Letter
    Copyright © 2018 Emily Gunnis The right of Emily Gunnis to be identified as the Author of the Work has been asserted by her in accordance with the Copyright, Designs and Patents Act 1988. This Ebook edition first published in 2018 by HEADLINE REVIEW An imprint of HEADLINE PUBLISHING GROUP Apart from any use permitted under UK copyright law, this publication may only be reproduced, stored, or transmitted, in any form, or by any means, with prior permission in writing of the publishers or, in the case of reprographic production, in accordance with the terms of licences issued by the Copyright Licensing Agency. All characters in this publication are fictitious and any resemblance to real persons, living or dead, is purely coincidental. Cataloguing in Publication Data is available from the British Library Edna St. Vincent Millay, ‘First Fig’, 1920 Mary Elizabeth Frye, ‘Do Not Stand at My Grave and Weep’, 1932 Cover images: garden © Tuan Tran/Getty Images and girl © Rekha Garton/Trevillion Images; gate © kzww, shadows © milano1968 and leaves © Mongkol Rujitham, all at Shutterstock. Author photo © Laurie Fletcher eISBN 978 1 4722 5508 2 HEADLINE PUBLISHING GROUP An Hachette UK Company Carmelite House 50 Victoria Embankment London EC4Y 0DZ www.headline.co.uk www.hachette.co.uk Table of Contents Title Page Copyright Page About the Author About the Book Dedication Prologue Chapter One Chapter Two Chapter Three Chapter Four Chapter Five Chapter Six Chapter Seven Chapter Eight Chapter Nine Chapter Ten Chapter Eleven Chapter Twelve Chapter Thirteen
    [Show full text]
  • The Career Benefits of Writing Without Bullshit Josh Bernoff
    The Career Benefits of Writing Without Bullshit Josh Bernoff ChangeThis | 145.05 Clarity. Boldness. We say that we value these qualities in communication at work. So why is nearly everything we read so full of bullshit? Our inboxes, browsers, and smartphone screens are filled with jargon-laden, meandering drivel. Why can’t people get to the point and say what they mean? This is a pervasive problem that erodes all of our productivity, and I can prove it. I surveyed 547 businesspeople just like you—people who write at least two hours per day for work, outside of email. Here’s what they told me. First off, they average 46 hours per week spent reading and writing for work. Consuming and creating text has become a full-time job. Taken together, the email, Web pages, reports, and social media posts we all create and consume have taken over our time at work. ChangeThis | 145.05 Second, people are frustrated as hell with what they read. More than 80% say that poorly written material wastes a lot of their time. They rate the average effectiveness of what they read as a pathetic 5.4 on a ten-point scale. Most of them agree that what they read is too long, poorly organized, unclear, and filled with jargon. After 35 years of reading and writing for work, I decided to face this problem head-on: to determine what causes bullshit, and how we can all learn to write without it. The problem is real. And the solution is within reach. It’s just a question of committing yourself to writing without bullshit.
    [Show full text]
  • Federal Prosecution of Child Sex Exploitation Offenders, 2006
    U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Bulletin December 2007, NCJ 219412 Federal Prosecution of Child Sex Exploitation Offenders, 2006 Mark Motivans, Ph.D., Federal prosecutions of child sex exploitation offenders and Tracey Kyckelhahn, BJS Statisticians Number of suspects in matters prosecuted 1,500 During 2006, 3,661 suspects were referred to U.S. attor- Child pornography neys for child sex exploitation offenses. Child pornography constituted 69% of referrals, followed by sex abuse (16%) 1,000 and sex transportation (14%). Almost 6 in 10 child sex crime suspects were prosecuted in 2006, up from 4 in 10 in 1994. Nine of 10 defendants were convicted and sentenced 500 to prison, up from 8 in 10 in 1994. The median prison sen- Sex abuse tence imposed increased from 36 months to 63 months Sex transportation over this period. Most suspects charged with sex exploita- 0 tion were white, male, U.S. citizens, and had attended 1994 1996 1998 2000 2002 2004 2006 some college. Note: Includes matters with a child sex exploitation offense as lead charge. In this bulletin, Federal child sex exploitation offenses Source: Executive Office for U.S. Attorneys, include child pornography, sex transportation, and sex National LIONS database, fiscal year 2006. abuse. Data from the Executive Office for United States Figure 1 Attorneys, the Administrative Office of the U.S. Courts, and the U.S. Sentencing Commission were used to describe Child pornography made up 69% of sex offenses Federal prosecution of child sex exploitation crimes. Con- referred to U.S. attorneys in 2006 gressional authority to regulate interstate commerce, The main sex exploitation offense referred to U.S.
    [Show full text]
  • 20120906Wdlawyss(Dre
    US Justice: Print Friendly Version Page 1 of 3 Home » Briefing Room » Justice News Department of Justice Office of Public Affairs FOR IMMEDIATE RELEASE Thursday, September 6, 2012 Third Dreamboard Member Sentenced to Life in Prison for Participating in International Criminal Network Organized to Sexually Exploit Children WASHINGTON – A Wisconsin man was sentenced today to life in prison for his participation in an international criminal network, known as Dreamboard, dedicated to the sexual abuse of children and the creation and dissemination of graphic images and videos of child sexual abuse throughout the world, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney Stephanie Finley of the Western District of Louisiana and Director of U.S. Immigration and Customs Enforcement (ICE) John Morton. John Wyss, aka “Bones,” 55, of Monroe, Wis., was sentenced by U.S. District Judge Maurice Hicks in the Western District of Louisiana. On May 17, 2012, Wyss was found guilty after trial of one count of engaging in a child exploitation enterprise, one count of conspiracy to advertise child pornography and one count of conspiracy to distribute child pornography. Evidence presented at trial revealed that Wyss had been an active member of Dreamboard, an online child pornography bulletin board, since January 2008 and had made numerous postings revealing that he had produced child pornography by capturing images of minors engaging in sexually explicit activity via webcam, including one video in which adult males were engaged in sexual intercourse with prepubescent girls. Wyss was charged in an indictment unsealed on Aug.
    [Show full text]
  • Child Sexual Exploitation and Abuse
    ChildFund Rapid Review of Online Safety Risks: Full Report April 2020 Table of Contents Glossary Executive Summary COVID-19 COVID-19 Impact on CSE and CSA - Interpol COVID-19, Children at Increased Risk How children (10-18) experienced online risks during the Covid-19 lockdown Surge in reports in UK during COVID-19 Online child sex abuse cases triple under lockdown in Philippines NetClean Report 2020 NGO / CSO Reports International Child Sexual Exploitation database Canada Cybertip.ca Analysis Online Sexual Exploitation of Children in the Philippines Rapid Evidence Assessment Measuring the scale and changing nature of child sexual abuse and child sexual exploitation Factsheet: Child Sexual Exploitation and Abuse What Works to Prevent Online and Offline Child Sexual Exploitation and Abuse? Child Online Protection in India Out of the shadows: Shining light on the response to child sexual abuse and exploitation Child Online Protection in Rwanda Child Online Protection in the MENA Region Global Threat Assessment Operation Delego and Dreamboard Child Online Safety Index (COSI) The State of the World’s Children 2017: Children in a Digital World GlobalKids Argentina GlobalKids Brazil GlobalKids Ghana GlobalKids Uruguay GlobalKids Chile Meta-Analysis / Systematic Reviews Prevalence of Multiple Forms of Sexting Behavior Among Youth Harms experienced by child users of online and mobile technologies The Prevalence of Unwanted Online Sexual Exposure and Solicitation Among Youth Cyberbullying Cyberbullying Among Adolescents and Children: Cyberbullying Survey UNICEF Cross-national aspects of cyberbullying victimization among 14–17-year-old adolescents across seven European countries Bibliography Glossary Child Sexual Exploitation (CSE) is a broad term that encompasses all forms of child sexual exploitation.
    [Show full text]
  • "Where Has Their Innocence Gone?" Addressing Child Sex Tourism
    Florida A&M University College of Law Scholarly Commons @ FAMU Law Journal Publications Faculty Works 2014 "Where Has Their Innocence Gone?" Addressing Child Sex Tourism Cheryl Page Follow this and additional works at: https://commons.law.famu.edu/faculty-research Part of the Criminal Law Commons, Human Rights Law Commons, and the International Law Commons Where Has Their Innocence Gone? Addressing Child Sex Tourism Cheryl Taylor George, Professor of Law, Lincoln Memorial University– Duncan School of Law, Knoxville, Tennessee Introduction Children around the world are used as objects to satisfy the perverted sexual desires of devi- Safety and security don’t just happen, ants. The bulk of these children reside in poor they are the result of collective consen- and vastly uneducated countries around the sus and public investment. We owe our globe (Fisher, 2013) and their innocence is children, the most vulnerable citizens stolen and shattered on a daily basis (Hume, in our society, a life free of violence and Cohen, & Sorvino, 2013). fear. This article addresses the already rampant – Nelson Mandela (as cited in problem of sex tourism with special atten- U.S. Government International tion on child sex tourism. The focus will be to Assistance for Children inform the who, what, and where of sex tour- in Adversity, 2014) ism, its history, the economics of it, the laws— both domestic and international—concerning On October 12, 2012, Malala Yousafzai was sex tourism, court cases involving sex tour- shot by a known terrorist organization ism, the problems associated with combating (Husain, 2013). Her crime or offense? She was sex tourism, and also possible solutions in attending school.
    [Show full text]