Power, Impunity and Anonymity

Total Page:16

File Type:pdf, Size:1020Kb

Power, Impunity and Anonymity POWER, IMPUNITY AND ANONYMITY Understanding the Forces Driving the Demand for Sexual Exploitation of Children POWER, IMPUNITY AND ANONYMITY 1 Understanding the Forces Driving the Demand for Sexual Exploitation of Children POWER, IMPUNITY AND ANONYMITY Understanding the Forces Driving the Demand for Sexual Exploitation of Children Researchers and Writers: Eliana Riggio Mark Erik Hecht The Introduction, Chapters 1, 2, 3 and 7 and Sections relating to SEC prevention in Chapter 6 were written by Eliana Riggio. Chapters 4 and 5 and Sections relating to the legal and private sectors in Chapters 6 and 7 were written by Mark Erik Hecht. Additional Input and Support: Alessia Altamura Mark Capaldi Initial Research and Editorial Assistance: Melody Burke Mairi Calder Linda Fouad Rebecca Rittenhouse Vincent Wong March, 2016 Copyright 2016, ECPAT International This publication was produced with the financial assistance of Defence for Children-ECPAT Netherlands and the Ministry of Foreign Affairs of The Netherlands. The views expressed herein are solely those of the authors. The support received from the above-mentioned donor does not constitute endorsement of the opinions expressed. TABLE OF CONTENTS ACKNOWLEDGEMENTS i LIST OF ACRONYMS ii INTRODUCTION 1 1. DEFINING DEMAND FOR SEXUAL EXPLOITATION OF CHILDREN 5 1.1 Defining sexual exploitation of children 5 1.2 Defining demand for sexual exploitation of children 8 1.3 The Demand Tree 10 1.4 Promoting a human-rights terminology 12 2. MAPPING THE DEMAND 13 2.1 Understanding the demand for sexual exploitation of children: The three levels of the Demand Tree 14 2.1.1. The immediate level of the demand for child sexual exploitation 14 2.1.2 The intermediate level of the demand for child sexual exploitation 31 2.1.3. The underlying level of the demand for child sexual exploitation 36 2.1.3.1 Sexual attitudes underpinning sexual exploitation of children 36 2.1.3.2 Gender and social norms 39 2.1.3.3 Globalisation, poverty and inequality 43 2.1.3.4 Impunity 46 3. A VIRTUAL MARKETPLACE: THE NEW SUPPLY AND DEMAND 47 3.1 The Internet and websites 47 3.2 Linking predators to victims 48 POWER, IMPUNITY AND ANONYMITY Understanding the Forces Driving the Demand for Sexual Exploitation of Children 4. THE LEGAL FRAMEWORKS 51 4.1 International legal instruments and mechanisms 51 4.2 Regional legal instruments and mechanisms 53 4.3 Identifying possible gaps with international and regional law 56 4.4 Domestic legal frameworks 57 4.4.1 Criminalisation of sexual exploitation of children 57 4.4.2 Aproaches to addressing the demand for adult prostitution 59 4.4.3 Further legal remedies 63 4.4.4 The offenders 65 4.4.5 Lesons learned from domestic law 67 5. THE ROLE OF THE PRIVATE SECTOR 68 5.1 Travel and tourism 68 5.2 Media 70 5.3 New technologies 71 5.4 Financial institutions 72 6. STEPPING UP MEASURES TO ADDRESS THE DEMAND FOR SEXUAL EXPLOITATION OF CHILDREN: A COMPREHENSIVE FRAMEWORK FOR ACTION 74 6.1 Toward building a prevention framework for sexual exploitation of children 74 6.2 Developing more comprehensive preventive action 77 6.3 Enforcing legal measures to curb demand 77 6.3.1 Applying the law 77 6.3.2 Corporate Social Responsibility 81 6.4 Ensuring child sex offenders supervision, management and rehabilitation through a package of justice system strategies 83 POWER, IMPUNITY AND ANONYMITY Understanding the Forces Driving the Demand for Sexual Exploitation of Children 7. RECOMMENDATIONS: DEVELOPING A STRATEGY TO ERADICATE THE DEMAND TREE 89 A Theory of Change to Eliminate the Demand for Sexual Exploitation of Children 90 Strategy 1: Develop local, national and global situation analyses of demand for SEC 90 Strategy 2: Raise awareness, educate and develop capacities 92 Strategy 3: Promote the transition from harmful to rights-sensitive social norms and practices 96 Strategy 4: Frame and enforce laws and policies 97 Strategy 5: Develop and implement local, national and global strategies 99 Strategy 6: Leverage the Internet to prevent demand 100 Strategy 7: Measure progress toward ending demand for SEC 103 Strategy 8: Empower children and adolescents 104 ANNEXES 108 Annex A: LIST OF PARTICIPANTS 109 Annex B: A Theory of Change to Eliminate the Demand for Sexual Exploitation of Children 110 BIBLIOGRAPHY 113 POWER, IMPUNITY AND ANONYMITY Understanding the Forces Driving the Demand for Sexual Exploitation of Children ACKNOWLEDGEMENTS In Geneva in October 2015, a Global High Level Expert Meeting was held to help validate and refine this report. The meeting brought together the United Nations (UN) Special Rapporteur on the sale of children, child prostitution and child pornography (Ms. Maud de Boer - Buquicchio) and staff from her office, academics, sociologists, psychologists, independent consultants, practitioners, and representatives of civil society organisations, and UN agencies. ECPAT International wishes to thank the Special Rapporteur for holding the expert consultation in Geneva and for her thematic study and recommendations to tackle the demand for the sexual exploitation of children. Special thanks for their input are also extended to Margaret Akullo, Alessia Altamura, Mark Capaldi, Donald Findlater, Hans Guyt, Susanna Greijer, Dorian Hall, Mark E. Hecht, Lori Heise, Nekane Lavín, Julia O’Connell Davidson, Lorraine Radford, Eliana Riggio, Dorothy Rozga, Maia Rusakova, Lucie Shuker, Joe Sullivan, and Jane Warburton. i POWER, IMPUNITY AND ANONYMITY i Understanding the Forces Driving the Demand for Sexual Exploitation of Children LIST OF ACRONYMS ACHPR African Charter on Human and Peoples’ Rights ACRWC African Charter on the Rights and Welfare of the Child AHRC Asian Human Rights Commission CAASE Chicago Alliance against Sexual Exploitation CAM Child Abuse Materials CATW Coalition against Trafficking in Women CCLP Centre on Communications, Leadership, and Policy CEFM Child, Early, and Forced Marriage CEOP Child Exploitation and Online Protection CIS Commonwealth of Independent States CPA Child Protection Alliance (The Gambia) CSA Circles of Support and Accountability (Canada) CSEC Commercial Sexual Exploitation of Children ECPAT End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes EFC European Financial Community EU European Union FCACP Financial Coalition against Child Pornography FBI Federal Bureau of Investigation (US) GBV Gender-Based Violence GEMS Girls Education and Mentoring Services HRC Human Rights Commission (UN) IAWG Inter-Agency Working Group ICPC International Child Protection Certificate ICT Information and Communication Technologies IEC Information, Education, Communication ILO International Labour Organization IOM International Organization for Migration ISP Internet Service Provider ISO International Organisation for Standardisation ITU International Telecommunication Union IWF Internet Watch Foundation (UK) ii POWER, IMPUNITY AND ANONYMITY ii Understanding the Forces Driving the Demand for Sexual Exploitation of Children MDG Millennium Development Goal MENA Middle East and North Africa NGO Non-Governmental Organisation NPA National Plan of Action OECD Organization for Economic Cooperation and Development OPSC Optional Protocol on the Sale of Children, Child Prostitution and Child Pornography OSCE Organisation for Security and Cooperation in Europe P2P Peer to Peer SAARC South Asian Association for Regional Cooperation SDG Sustainable Development Goal SECTT Sexual Exploitation of Children in Tourism and Travel UK United Kingdom UN United Nations UNCRC UN Convention on the Rights of the Child UNDOC UN Documentation Centre UNICEF UN International Children Emergency Fund UNWTO UN World Tourism Organization US United States USD US Dollar iii POWER, IMPUNITY AND ANONYMITY Understanding the Forces Driving the Demand for Sexual Exploitation of Children INTRODUCTION Nearly twenty years ago, when the First World Congress against the Commercial Sexual Exploitation of Children was held in Stockholm, Sweden (August 1996),1 the problem of sexual exploitation of children (SEC) facing the international community was imputed to a discrete and well characterised group of offenders: profiled as being mainly men; travelling from Western to developing countries; perceived as affected by forms of psychosexual disorders, such as paedophilia; or displaying other pathologically transgressive behaviours. In the short span of only two decades, SEC has exploded to acquire planetary dimensions, with virtually no region, country or social group, age or sexual inclination being spared by a scourge now recognised as one of the most severe and widespread forms of violence against children. As noted with reference to SEC-related analysis in a report of the UN Special Rapporteur on the sale of children, child prostitution and child pornography, “the research results exemplify problems that exist in all parts of the world.”2 Today, approaching children for illicit purposes is a highly profitable domestic and international operation, organised on the global market, progressively brokered on the Internet, and supported by powerful criminal networks and businesses. Power imbalance between vulnerable children and abusive adults, impunity and anonymity emerge as the key forces driving the demand for sexual exploitation of children in the rising globalised sex market. While the organisation of the market is global, the demand for SEC is not only international, but also local. In addition to being created by unrelenting flows of travelling perpetrators, demand continues to be generated
Recommended publications
  • Reforming the Police in Post-Soviet States: Georgia and Kyrgystan
    Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. The United States Army War College The United States Army War College educates and develops leaders for service at the strategic level while advancing knowledge in the global application of Landpower. The purpose of the United States Army War College is to produce graduates who are skilled critical thinkers and complex problem solvers. Concurrently, it is our duty to the U.S. Army to also act as a “think factory” for commanders and civilian leaders at the strategic level worldwide and routinely engage in discourse and debate concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and strategic research and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development CENTER for contributes to the education of world class senior STRATEGIC LEADERSHIP and DEVELOPMENT leaders, develops expert knowledge, and provides U.S. ARMY WAR COLLEGE solutions to strategic Army issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical review, and writing expertise to agencies that develop stability operations concepts and doctrines. U.S. Army War College The Senior Leader Development and Resiliency program supports the United States Army War College’s lines of SLDR effort
    [Show full text]
  • 2020 ANNUAL REPORT 1 TABLE of Contents LETTER from the Ceo Letter from Victor Boutros, Our CEO
    ANNUAL 2020 REPORT HTI 2020 ANNUAL REPORT 1 TABLE of Contents LETTER From the Ceo Letter from Victor Boutros, our CEO ....................................................................1 Celebrating our Partners .....................................................................................2 Dear Friends, The Human Trafficking Institute Model ...............................................................3 “Our Sputtering Engine of Impact: Your Nonprofit Must Focus on Mere Country Partnerships and our Work ....................................................................4 Survival”–that was the sobering headline in a Forbes article from 2020 by leadership expert William Meehan III. Meehan joined a chorus of Thought Leadership in the United States ............................................................8 commentators, who warned that the COVID-19 pandemic is poised to become “an extinction-level event” for America’s non-profits. One survey Tackling COVID-19 ..............................................................................................10 found that 90% of U.S.-based nonprofits experienced a reduction in Interview with John Freeman, Director of Law Enforcement Operations ........... 12 revenue, and another found that 50% expected revenue drops of at least 20%. “In usual times nonprofits don’t die, they linger,” noted Meehan, Interview with Chris Lick, Law Enforcement Advisor, Belize ................................. 13 ominously adding, “[These] are very unusual times.” Financial Summary ....................................................................................................
    [Show full text]
  • 1 Introduction
    1 Introduction I. THE PROBLEM OF ANONYMITY NONYMOUS WRITING IS both an old and a new phenomenon. Before the Renaissance most writing was anonymous; many of the Aearly poems in anthologies are ascribed to ‘ Anon ’ . The medieval auctor (the term from which the word ‘ author ’ derives) was generally little more than a scribe, transcribing earlier texts. The name of the writer was irrelevant to the readers of a text, so it was immaterial that generally he was anonymous. 1 The identifi cation or naming of authors has been associated with the development of printing, and then subsequently with the role of copyright in ascribing property rights to them and the birth of the Romantic Author as a heroic fi gure at the end of the eighteenth century. 2 But even then a high proportion of novels were anonymous; between 1770 and 1800 over 70 per cent of novels were published without a named author, and during the 1820s the proportion rose to nearly 80 per cent. 3 There has certainly been a marked decline in anonymous writing in the late nineteenth and twentieth centuries, though some notable writers in this period have always, or sometimes, used pseudonyms (see section IV of this chapter and chapter 2 , section II), among them George Orwell (the pseudonym of Eric Blair), Sylvia Plath and Doris Lessing. The Internet is responsible for the revival of anonymous writing and indeed for many of the problems now associated with it. Many blogs are written under a pseudonym, though often the identity of the author is well known, as with Paul Staines, the author of the Guido Fawkes political blog.
    [Show full text]
  • 2008 Hate Crime Survey
    2008 Hate Crime Survey About Human Rights First HRF’s Fighting Discrimination Program Human Rights First believes that building respect for human The Fighting Discrimination Program has been working since rights and the rule of law will help ensure the dignity to which 2002 to reverse the rising tide of antisemitic, racist, anti- every individual is entitled and will stem tyranny, extremism, Muslim, anti-immigrant, and homophobic violence and other intolerance, and violence. bias crime in Europe, the Russian Federation, and North America. We report on the reality of violence driven by Human Rights First protects people at risk: refugees who flee discrimination, and work to strengthen the response of persecution, victims of crimes against humanity or other mass governments to combat this violence. We advance concrete, human rights violations, victims of discrimination, those whose practical recommendations to improve hate crimes legislation rights are eroded in the name of national security, and human and its implementation, monitoring and public reporting, the rights advocates who are targeted for defending the rights of training of police and prosecutors, the work of official anti- others. These groups are often the first victims of societal discrimination bodies, and the capacity of civil society instability and breakdown; their treatment is a harbinger of organizations and international institutions to combat violent wider-scale repression. Human Rights First works to prevent hate crimes. For more information on the program, visit violations against these groups and to seek justice and www.humanrightsfirst.org/discrimination or email accountability for violations against them. [email protected]. Human Rights First is practical and effective.
    [Show full text]
  • Lapp 1 the Victorian Pseudonym and Female Agency Research Thesis
    Lapp 1 The Victorian Pseudonym and Female Agency Research Thesis Presented in partial fulfillment of the requirements for graduation with research distinction in English in the undergraduate colleges of The Ohio State University by Anna Lapp The Ohio State University April 2015 Project Advisor: Professor Robyn Warhol, Department of English Lapp 2 Chapter One: The History of the Pseudonym Anonymity disguises information. For authors, disguised or changed names shrouds their circumstance and background. Pseudonyms, or pen names, have been famously used to disguise one’s identity. The word’s origin—pseudṓnymon—means “false name”. The nom de plume allows authors to conduct themselves without judgment attached to their name. Due to an author’s sex, personal livelihood, privacy, or a combination of the three, the pen name achieves agency through its protection. To consider the overall protection of the pseudonym, I will break down the components of a novel’s voice. A text is written by a flesh-and-blood, or actual, author. Second, an implied author or omnipresent figure of agency is present throughout the text. Finally, the narrator relates the story to the readers. The pseudonym offers freedom for the actual author because the author becomes two-fold—the pseudonym and the real person, the implied author and the actual author. The pseudonym can take the place of the implied author by acting as the dominant force of the text without revealing the personal information of the flesh-and-blood author. Carmela Ciuraru, author of Nom de Plume: A (Secret) History of Pseudonyms, claims, “If the authorial persona is a construct, never wholly authentic (now matter how autobiographical the material), then the pseudonymous writer takes this notion to yet another level, inventing a construct of a construct” (xiii-xiv).
    [Show full text]
  • Child Notice Afghanistan
    Child Notice Afghanistan 2018 UNICEF The Netherlands UNICEF Afghanistan Child Notice Afghanistan 2018 Authors: Horia Mosadiq, Majorie Kaandorp (2018 edition) Naeem Poyesh, Hussain Hassrat, Abdul Ahad Mohammadi, Jane E. Thorson, Zakiah Mirzaei, Fatema Ahmadi (2015 edition) With support from: Majorie Kaandorp, UNICEF The Netherlands Design: Schone Vormen 2018 For further information, please contact: Majorie Kaandorp Children’s Rights Advocacy Officer UNICEF The Netherlands Email: [email protected] The Child Notice Afghanistan has been produced by UNICEF The Netherlands, in cooperation with UNICEF Afghanistan. The 2015 edition of the Child Notice Afghanistan was developed as part of the project Better information for durable solutions and protection which was financially supported by the Return Fund of the European Commission. The Child Notice describes the situation of children in the countries of origin providing legal and practical information on education, health care, child protection, armed conflict, juvenile justice, trafficking etc. The Child Notice has been developed based on this Methodology Guidance on Child Notice. 2 UNICEF Child Notice Afghanistan TABLE OF CONTENT LIST OF ACRONYMS 5 DISCLAIMER 6 INTRODUCTION 7 READER’S GUIDE 9 SUMMARY 15 1 Demographic and statistical data on children 17 1.1 Demographic and statistical data on children 17 1.2 Islam and Religion 21 1.3 Family Structure 21 1.4 Political Development 22 2 Basic Legal Information 24 2.1 Conventions on children’s and human rights 24 2.2 National legislation 25 2.3
    [Show full text]
  • Running Head: the TRAGEDY of DEPORTATION 1
    Running head: THE TRAGEDY OF DEPORTATION 1 The Tragedy of Deportation An Analysis of Jewish Survivor Testimony on Holocaust Train Deportations Connor Schonta A Senior Thesis submitted in partial fulfillment of the requirements for graduation in the Honors Program Liberty University Spring 2016 THE TRAGEDY OF DEPORTATION 2 Acceptance of Senior Honors Thesis This Senior Honors Thesis is accepted in partial fulfillment of the requirements for graduation from the Honors Program of Liberty University. ______________________________ David Snead, Ph.D. Thesis Chair ______________________________ Christopher Smith, Ph.D. Committee Member ______________________________ Mark Allen, Ph.D. Committee Member ______________________________ Brenda Ayres, Ph.D. Honors Director ______________________________ Date THE TRAGEDY OF DEPORTATION 3 Abstract Over the course of World War II, trains carried three million Jews to extermination centers. The deportation journey was an integral aspect of the Nazis’ Final Solution and the cause of insufferable torment to Jewish deportees. While on the trains, Jews endured an onslaught of physical and psychological misery. Though most Jews were immediately killed upon arriving at the death camps, a small number were chosen to work, and an even smaller number survived through liberation. The basis of this study comes from the testimonies of those who survived, specifically in regard to their recorded experiences and memories of the deportation journey. This study first provides a brief account of how the Nazi regime moved from methods of emigration and ghettoization to systematic deportation and genocide. Then, the deportation journey will be studied in detail, focusing on three major themes of survivor testimony: the physical conditions, the psychological turmoil, and the chaos of arrival.
    [Show full text]
  • Why Do People Seek Anonymity on the Internet?
    Why Do People Seek Anonymity on the Internet? Informing Policy and Design Ruogu Kang1, Stephanie Brown2, Sara Kiesler1 Human Computer Interaction Institute1 Department of Psychology2 Carnegie Mellon University 5000 Forbes Ave., Pittsburgh, PA 15213 [email protected], [email protected], [email protected] ABSTRACT literature that exists mainly derives from studies of one or a In this research we set out to discover why and how people few online communities or activities (e.g., the study of seek anonymity in their online interactions. Our goal is to 4chan in [5]). We lack a full understanding of the real life inform policy and the design of future Internet architecture circumstances surrounding people’s experiences of seeking and applications. We interviewed 44 people from America, anonymity and their feelings about the tradeoffs between Asia, Europe, and Africa who had sought anonymity and anonymity and identifiability. A main purpose of the asked them about their experiences. A key finding of our research reported here was to learn more about how people research is the very large variation in interviewees’ past think about online anonymity and why they seek it. More experiences and life situations leading them to seek specifically, we wanted to capture a broad slice of user anonymity, and how they tried to achieve it. Our results activities and experiences from people who have actually suggest implications for the design of online communities, sought anonymity, to investigate their experiences, and to challenges for policy, and ways to improve anonymity tools understand their attitudes about anonymous and identified and educate users about the different routes and threats to communication.
    [Show full text]
  • Enhancing Survivor-Centred Healthcare Response for Male Victims/Survivors of Sexual Violence in Afghanistan
    Enhancing Survivor-Centred Healthcare Response for Male Victims/Survivors of Sexual Violence in Afghanistan March 2021 | Acknowledgments All Survivors Project (ASP) and Youth Health and Development Organization (YHDO) would like to thank the victims/survivors of sexual violence, healthcare providers, community health workers and government and non-government stakeholders who participated in this research and shared their perceptions and experiences. The report was authored by Julienne Corboz. Layout and production assistance was provided by Roberto Thillet. ASP and YHDO, and the author of this report, are extremely grateful to the stakeholders who participated in the National Advisory Group, particularly those who peer reviewed and provided valuable feedback on drafts of the report, including: Taiba Jafari, Director of the Gender Directorate, Islamic Republic of Afghanistan Ministry of Public Health; Najeebullah Zadran Babrakzai, National Coordinator for the Rights of Children, Afghanistan Independent Human Rights Commission; and Palwasha Aabed, Child Protection Officer, United Nations Assistance Mission in Afghanistan. The author is also grateful for peer review and feedback from the ASP and YHDO team. All Survivors Project, and not the peer reviewers, is responsible for the final content of this report. Cover illustration: Brian Stauffer © 2021 All Survivors Project and Youth and Development Organization Contents Acronyms . 4 Executive Summary . 5 Recommendations . 11 Introduction . 15 Background . 17 Overview of Methodology . 22 Results . 25 Barriers to Male Victims/Survivors of Sexual Violence Accessing Healthcare Services 25 The Role of Communities in Supporting Male Victims/Survivors of Sexual Violence 42 Healthcare Services for Male Victims/Survivors of Sexual Violence . 45 Needs of Male Victims/Survivors of Sexual Violence .
    [Show full text]
  • THE POLISH POLICE Collaboration in the Holocaust
    THE POLISH POLICE Collaboration in the Holocaust Jan Grabowski The Polish Police Collaboration in the Holocaust Jan Grabowski INA LEVINE ANNUAL LECTURE NOVEMBER 17, 2016 The assertions, opinions, and conclusions in this occasional paper are those of the author. They do not necessarily reflect those of the United States Holocaust Memorial Museum. First printing, April 2017 Copyright © 2017 by Jan Grabowski THE INA LEVINE ANNUAL LECTURE, endowed by the William S. and Ina Levine Foundation of Phoenix, Arizona, enables the Center to bring a distinguished scholar to the Museum each year to conduct innovative research on the Holocaust and to disseminate this work to the American public. Wrong Memory Codes? The Polish “Blue” Police and Collaboration in the Holocaust In 2016, seventy-one years after the end of World War II, the Polish Ministry of Foreign Affairs disseminated a long list of “wrong memory codes” (błędne kody pamięci), or expressions that “falsify the role of Poland during World War II” and that are to be reported to the nearest Polish diplomat for further action. Sadly—and not by chance—the list elaborated by the enterprising humanists at the Polish Foreign Ministry includes for the most part expressions linked to the Holocaust. On the long list of these “wrong memory codes,” which they aspire to expunge from historical narrative, one finds, among others: “Polish genocide,” “Polish war crimes,” “Polish mass murders,” “Polish internment camps,” “Polish work camps,” and—most important for the purposes of this text—“Polish participation in the Holocaust.” The issue of “wrong memory codes” will from time to time reappear in this study.
    [Show full text]
  • Russian Federation State Actors of Protection
    European Asylum Support Office EASO Country of Origin Information Report Russian Federation State Actors of Protection March 2017 SUPPORT IS OUR MISSION European Asylum Support Office EASO Country of Origin Information Report Russian Federation State Actors of Protection March 2017 Europe Direct is a service to help you find answers to your questions about the European Union. Free phone number (*): 00 800 6 7 8 9 10 11 (*) Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. More information on the European Union is available on the Internet (http://europa.eu). Print ISBN 978-92-9494-372-9 doi: 10.2847/502403 BZ-04-17-273-EN-C PDF ISBN 978-92-9494-373-6 doi: 10.2847/265043 BZ-04-17-273-EN-C © European Asylum Support Office 2017 Cover photo credit: JessAerons – Istockphoto.com Neither EASO nor any person acting on its behalf may be held responsible for the use which may be made of the information contained herein. EASO Country of Origin Report: Russian Federation – State Actors of Protection — 3 Acknowledgments EASO would like to acknowledge the following national COI units and asylum and migration departments as the co-authors of this report: Belgium, Cedoca (Center for Documentation and Research), Office of the Commissioner General for Refugees and Stateless Persons Poland, Country of Origin Information Unit, Department for Refugee Procedures, Office for Foreigners Sweden, Lifos, Centre for Country of Origin Information and Analysis, Swedish Migration Agency Norway, Landinfo, Country of
    [Show full text]
  • Relativitas Budaya Dan Berlangsungnya Budaya Bacha Bazi Di Afganistan Pasca Pemerintahan Taliban
    Journal of International Relations, Volume 6, Nomor 4, 2020, hal 535-544 Online di http://ejournal-s1.undip.ac.id/index.php/jihi Relativitas Budaya dan Berlangsungnya Budaya Bacha Bazi di Afganistan Pasca Pemerintahan Taliban Dwi Ramadhani Departemen Hubungan Internasional, Fakultas Ilmu Sosial dan Ilmu Politik Universitas Diponegoro Jalan Prof.H.Soedarto,SH., Tembalang, Semarang, Kotak Pos 1269 Website: http://www.fisip.undip.ac.id Email: [email protected] ABSTRACT This research explains the issue of opposing human rights carried out by the people of Afghanistan against boys through the bacha bazi culture. The conservative culture in Afghanistan led to a separation between men and women, thus bacha bazi serves to be a means of fulfilling the sexual needs of the male community in Afghanistan. “Women are for children, boys are for pleasure” is a famous sentence that explains the culture of bacha bazi for the people of Afghanistan. Although very normal, bacha bazi is taboo to talk about so that the practice is done in secret. The Taliban regime in 1996-2001 was able to abolish the bacha bazi culture, but with the fall of the regime, this culture is increasingly spreading. Domestic and international organizations, as well as foreign troops in Afghanistan, have sought to eradicate the culture, but have encountered difficulties. So this research was conducted to answer how the bacha bazi culture can take place after the Taliban government. The research methodology is an explanative qualitative method through data collection techniques with a literature study. The results of this study are proof that cultural relativity keeps this culture going on in Afghanistan despite violating human rights.
    [Show full text]