Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs (Information and Communication Technologies)-facilitated sexual exploitation is a
cybercrime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
involving
sex trafficking and the
live streaming of coerced
sexual acts and/or rape on
webcam
A webcam is a video camera which is designed to record or stream to a computer or computer network. They are primarily used in videotelephony, livestreaming and social media, and security. Webcams can be built-in computer hardware or periphera ...
.
Cybersex trafficking is distinct from other
sex crimes.
Victims are transported by traffickers to 'cybersex dens',
which are locations with webcams
and internet-connected devices with live streaming software. There, victims are forced to perform sexual acts
on themselves or other people
in
sexual slavery
Sexual slavery and sexual exploitation is an attachment of any ownership right over one or more people with the intent of coercing or otherwise forcing them to engage in sexual activities. This includes forced labor, reducing a person to a s ...
or raped by the traffickers or assisting assaulters in
live videos. Victims are frequently ordered to watch the paying live distant consumers or purchasers on shared screens and follow their commands.
It is often a commercialized,
cyber form of
forced prostitution
Forced prostitution, also known as involuntary prostitution or compulsory prostitution, is prostitution or sexual slavery that takes place as a result of coercion by a third party. The terms "forced prostitution" or "enforced prostitution" appea ...
.
Women,
children, and people in poverty are particularly vulnerable
to coerced
internet sex. The
computer-mediated communication
Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated forma ...
images produced during the crime are a type of
rape pornography or
child pornography
Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a chi ...
that is filmed and broadcast in
real time and can be recorded.
There is no data about the magnitude of cybersex trafficking in the world.
The technology to detect all incidents of the
live streaming crime has not been developed yet. Millions of reports of cybersex trafficking are sent to authorities annually. It is a billion-dollar, illicit industry
that was brought on with the
Digital Age and is connected to
globalization
Globalization, or globalisation (English in the Commonwealth of Nations, Commonwealth English; American and British English spelling differences#-ise, -ize (-isation, -ization), see spelling differences), is the process of foreign relation ...
. It has surged from the world-wide expansion of telecommunications and global proliferation of the internet
and
smartphones
A smartphone is a Mobile device, portable computer device that combines Mobile phone, mobile telephone and Mobile computing, computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities ...
,
particularly in
developing countries
A developing country is a sovereign state with a lesser developed Industrial sector, industrial base and a lower Human Development Index (HDI) relative to other countries. However, this definition is not universally agreed upon. There is al ...
. It has also been facilitated by the use of software,
encrypted
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
communication systems,
and network technologies
that are constantly evolving,
as well as the growth of international
online payment
An e-commerce payment system (or an electronic payment system) facilitates the acceptance of electronic payment for offline transfer, also known as a subcomponent of electronic data interchange (EDI), e-commerce payment systems have become incre ...
systems with
wire transfer services
and
cryptocurrencies
A cryptocurrency, crypto-currency, or crypto is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it. It ...
that hide the transactor's identities.
The
transnational
Transnational may refer to:
* Transnational company
* Transnational crime
* Transnational feminism
* Transnational governance
* Transnationality
* Transnational marriage
* Transnational organization
* Transnational organized crime
* Transnational ...
nature and global scale of cybersex trafficking necessitate a united response by the nations, corporations, and organizations of the world to reduce incidents of the crime;
protect, rescue, and rehabilitate victims; and arrest and prosecute the perpetrators. Some governments have initiated advocacy and media campaigns that focus on awareness of the crime. They have also implemented training seminars held to teach law enforcement, prosecutors, and other authorities, as well as NGO workers, to combat the crime and provide trauma-informed aftercare service.
New legislation combating cybersex trafficking is needed in the twenty-first century.
Terminology
Cyber-, as a
combining form
Neoclassical compounds are compound words composed from combining forms (which act as affixes or stems) derived from classical Latin or ancient Greek roots. New Latin comprises many such words and is a substantial component of the technical ...
, is defined as 'connected with electronic communication networks, especially the internet.'
Sex trafficking is human trafficking for the purpose of sexual exploitation, including sexual slavery.
Victims of cybersex trafficking are
trafficked or transported to 'cybersex dens,' which are rooms or locations with a webcam.
The
cybercrime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
also involves the transporting or
streaming of images of the victims' bodies and
sexual assaults
Sexual assault is an act in which one intentionally sexually touches another person without that person's consent, or coerces or physically forces a person to engage in a sexual act against their will. It is a form of sexual violence, which ...
in
real time through a computer with a webcam to other computers connected to the internet.
It thus occurs partly in the physical or real world, as the sexual assault is real, and partly in cyberspace
Cyberspace is a concept describing a widespread interconnected digital technology. "The expression dates back from the first decade of the diffusion of the internet. It refers to the online world as a world 'apart', as distinct from everyday re ...
.
Victims
Victims, predominantly women and children, are abducted, threatened, or deceived. Others are drugged. They are held captive and locked up in rooms with covered or no windows and a webcam. They experience physical and psychological trauma. Gang rape
Gang rape, also called serial gang rape, group rape, or multiple perpetrator rape in scholarly literature,Ullman, S. E. (2013). 11 Multiple perpetrator rape victimization. Handbook on the Study of Multiple Perpetrator Rape: A Multidisciplinary Re ...
has occurred on webcam.[ Some are coerced into ]incest
Incest ( ) is human sexual activity between family members or close relatives. This typically includes sexual activity between people in consanguinity (blood relations), and sometimes those related by affinity ( marriage or stepfamily), ado ...
. Victims have been denied food,[ deprived of sleep,] and been forced to perform when sick. They have contracted diseases, including tuberculosis
Tuberculosis (TB) is an infectious disease usually caused by ''Mycobacterium tuberculosis'' (MTB) bacteria. Tuberculosis generally affects the lungs, but it can also affect other parts of the body. Most infections show no symptoms, in w ...
, while in captivity. A number are assaulted or torture
Torture is the deliberate infliction of severe pain or suffering on a person for reasons such as punishment, extracting a confession, interrogation for information, or intimidating third parties. Some definitions are restricted to acts ...
d.
Victims can be exploited in any location where the cybersex traffickers have a computer, tablet, or phone with internet connection. These locations, commonly referred to as ‘cybersex dens,’ can be in homes, hotels, offices, internet cafes, and other businesses, making them extremely difficult or impossible for law enforcement to identify. The number of cybersex trafficking victims is unknown. Some victims are simultaneously forced into prostitution in a brothel or other location.
Rescues involving live streaming commercial sexual exploitation of children by parents often require a separation of the minors from the families and new lives for them in a shelter.
Some victims are not physically transported and held captive, but rather victims of online sextortion. They are threatened, webcam blackmailed, or bullied to film themselves committing online sexual acts. Victims have been coerced to self-penetrate, in what has been called 'rape at a distance.' Others are deceived, including by phony romantic partners who are really rape or child pornography distributors, to film themselves masturbating. The videos are live streamed to purchasers or recorded for later sale.
Those who are of a lower class, discriminate race, minority, or other social disadvantages are at an increased risk of being victimized. The cybersex trafficking and or non-consensual dissemination of sexual content involving women and girls, often involving threats, have been referred to as "digital gender violence" or 'online gender-based violence.'
Victims, despite being coerced, continue to be criminalized and prosecuted in certain jurisdictions.
Perpetrators
Traffickers transport victims to locations with webcams and live streaming software. They or assisting assaulters then commit and film sex crimes to produce real time rape pornography or child pornography materials that may or may not be recorded. The online audience or consumers, who are often from another country, may issue commands to the victims or rapers and pay for the services. Male and female perpetrators, operating behind a virtual barrier and often with anonymity, come from countries throughout the world and from every social and economic class. Some traffickers and assaulters have been the victim's family members, friends, and acquaintances. Traffickers can be part of or aided by international criminal organizations, local gangs
A gang is a group or society of associates, friends or members of a family with a defined leadership and internal organization that identifies with or claims control over territory in a community and engages, either individually or collective ...
, or small crime rings or just be one person. They operate clandestinely and sometimes lack coordinated structures that can be eradicated by authorities. The majority of purchasers or consumers are men. The encrypted
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
nature of modern technology makes it difficult to track perpetrators. Some are motivated by sexual gratification. Traffickers advertise children on the internet to obtain purchasers. Funds acquired by cybersex traffickers can be laundered.
Overseas predators seek out and pay for live streaming or made-to-order services that sexually exploit children. They engage in threat to gain the trust of local traffickers, often the victims' parents or neighbors, before the abuse takes place.
Internet platforms
Cybersex trafficking is partly an internet-based crime. Perpetrators use social media networks, videoconferences, dating pages, online chat rooms, mobile apps
A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on ...
, dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
sites, and other pages and domains. They also use Telegram
Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
and other cloud-based instant messaging
Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
and voice over IP services, as well as peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
(P2P) platforms, virtual private networks (VPN), and Tor protocols and software, among other applications, to carry out activities anonymously.
Consumers have made payments to traffickers, who are sometimes the victim's family members, using Western Union
The Western Union Company is an American multinational financial services company, headquartered in Denver, Colorado.
Founded in 1851 as the New York and Mississippi Valley Printing Telegraph Company in Rochester, New York, the company ch ...
, PayPal
PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers, and serves as an electronic alternative to traditional paper ...
, and other electronic payment systems.
Dark web
Cybersex trafficking occurs commonly on some dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
sites, where users are provided sophisticated technical cover against identification.
Social media
Perpetrators use Facebook and other social media technologies.
They use fake job listings in order to lure in victims. They do this by creating fake job agencies to get victims to meet with the perpetrator. These fake job listing can be things such as modeling gigs. Social media makes it easier for perpetrators to groom multiple people at once. They continuously send friend request to increase their chances of getting a victim. Social media gives perpetrators the platform to hide their identity. On social media you can portray to be who ever you want. Therefore, perpetrators use fake accounts to get victims attention. Most perpetrators pose as an attractive person who is living a lavish life. This is used to attract vulnerable users who desire those luxuries. People who desperately desire a luxury living are the easiest targets. They fall for the manipulation that they too can live a life like those fake accounts. Furthermore, younger people are more likely to be victims to cybersex on social media. They are less aware and still learning how to use social media. In addition, adolescents are the more vulnerable on social media because they are exploring. Adolescents can use social media to explore their sexuality. This makes them more accessible to perpetrators. Without guidance adolescents are at risk of falling for the tricks used to lure them into cybersex. In addition, they are less likely to detect when their security is at risk. Perpetrators fake a romantic relationship with the victims on social media to exploit them. Perpetrators will convince victims to perform the sexual acts. They can perform these sexual acts through tools such as webcams. More common on social media is to send pictures or videos. Victims send explicit pictures or videos because they trust the "friend" they have on social media. The victims will do it out of "love" or naiveness. Others do the performances out of fear. They can be threatened with information they previously shared with the perpetrator when they befriended them. However, it becomes an endless cycle when they perform the sexual acts once. After victims do these sexual acts, perpetrators use it as leverage. Perpetrators threaten them to do more sexual acts or they have will be share to their family and friends the one that they have of them.
They use online sites such as Instagram to promote sex services.
Videotelephony
Cybersex trafficking occurs on Skype
Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, ...
and other videoconferencing
Videotelephony, also known as videoconferencing and video teleconferencing, is the two-way or multipoint reception and transmission of audio and video signals by people in different locations for real time communication.McGraw-Hill Concise Encyc ...
applications. Pedophiles direct child sex abuse using its live streaming services.
Activities by region
Australia and Oceania
The Australian Federal Police
The Australian Federal Police (AFP) is the national and principal federal law enforcement agency of the Australian Government with the unique role of investigating crime and protecting the national security of the Commonwealth of Australia ...
(AFP) investigates cybersex trafficking crimes domestically and in the Asia-Pacific region.
In 2016, Queensland Police Service
The Queensland Police Service (QPS) is the principal law enforcement agency responsible for policing the Australian state of Queensland. In 1990, the Queensland Police Force was officially renamed the Queensland Police Service and the old mott ...
officers from Task Force Argos In 2016, Queensland Police Service officers from Task Force Argos executed a federal search warrant at a 58-year-old Australian man's residence. The Australian man pleaded guilty to numerous charges, including soliciting a child for sex and having sex with a child under 16 years of age outside of Australia. Using Skype
Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, ...
, the man conducted "live remote" sexual abuse
Sexual abuse or sex abuse, also referred to as molestation, is abusive sexual behavior by one person upon another. It is often perpetrated using force or by taking advantage of another. Molestation often refers to an instance of sexual assa ...
, exploiting two young children in the Philippines
The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no),
* bik, Republika kan Filipinas
* ceb, Republika sa Pilipinas
* cbk, República de Filipinas
* hil, Republ ...
while making payments to their mother. The exploitation began when the children were only 2 and 7 years old, and the abuse continued for nearly five years. In May 2019, according to the Australian Federal Police
The Australian Federal Police (AFP) is the national and principal federal law enforcement agency of the Australian Government with the unique role of investigating crime and protecting the national security of the Commonwealth of Australia ...
(AFP), numerous cases were also uncovered related to Australians allegedly paying for and manipulating child sexual abuse
Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whet ...
. In November 2019, Australia was alerted by Child Sexual Abuse
Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whet ...
live streaming when AUSTRAC filed legal action against Westpac Bank in relation to over 23 million suspected violations of the ''Anti-Money Laundering and Counter-Terrorism Financing Act 2006'' (Cth).
Since 2017, IJM (International Justice Mission) Australia has been working on legal reforms to strengthen Australia's response to OSEC, commonly known as online sex trafficking of children. On June 16, 2020, both houses of the Parliament of Australia
The Parliament of Australia (officially the Federal Parliament, also called the Commonwealth Parliament) is the legislative branch of the government of Australia. It consists of three elements: the monarch (represented by the governor-g ...
enacted th
Crimes Legislation Amendment (Sexual Crimes Against Children and Community Protection Measures) Bill 2019
which received royal assent on June 22, 2020. Jacob Sarkodee, CEO of IJM Australia, noted that this new legislation recognizes the contribution of Australians to the growing demand for online sex trafficking of children. According t
2020 Global OSEC report
[https://ijm.org.au/wp-content/uploads/2020/05/Final_OSEC-Public-Summary_05_20_2020.pdf ] Australians are the third largest purchasers of cybersex trafficking of children in Philippines. Under the proposal made by the IJM, the new legislation specifies that those who watch live streaming of child cybersex trafficking will receive the same penalties as those who manipulate and direct the sexual abuse of children themselves.
East Asia
Cybersex trafficking occurred in the 2018–2020 Nth room case in South Korea. In March 2020, South Korean news agencies reported some details about Nth room case: in crypto-messaging apps such as Telegram
Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
and Discord, "at least 74 women and 16 minors performed "sex shows" online for global audience of thousands who paid for cryptocurrency". The victims were manipulated and tortured by viewers and were referred to as slaves. This case is related to the widespread availability and expansion of spy cameras (often referred to as " Molka") in South Korea.
North Korean women and girls have been subjected to penetrative vaginal and anal rape, groping, and forced masturbation in 'online rape dens' in China.
In the trade for female North Koreans, cybersex trafficking is the small but rapidly growing element. Girls as young as 9 years old were abused and exploited in "sex shows" that are broadcast live online to a paying audience, many of them are believed to be Korean men.
According t
Korea Future Initiative 2019
an estimated 60 percent of North Korean female refugees in China are trafficked into the sex trade, of these, about 15 percent is sold into cybersex dens for exploitation by a global online audiences. China's crackdown on undocumented North Koreans in July 2017 and a developing cybersex industry have fueled the rapid expansion of cybersex dens.
Cybersex trafficking is thought to be extremely lucrative. According to primary research, helpers experiences, and survivors testimonies, live streamed videos of cybersex featuring North Korean girls ages 9–14 can cost $60-$110, while videos featuring North Korean girls and women ages 17–24 can cost up to $90. Offenders are believed to manipulate victims by the means of drugs and violence (physical and sexual). In investigation conducted from February to September 2018, South Korean websites have been discovered to promote North Korean cybersex and pornography, even in the form of "pop-up" advertisements. The high demand of North Korean cybersex victims is largely driven by South Korean man high involvement in searching Korean-language pornography
Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults, . In South Korea, compared to the penalties made for production and distribution of child sexual abuse imagery, the penalties for those who possess images of child porn are far below international standards.
Europe
The European Union Agency for Law Enforcement Cooperation (Europol) investigates and spreads awareness about live streaming sexual abuse. Europol's European Cybercrime Centre (EC3) is especially equipped to combat the cybercrime.
The United Kingdom's National Crime Agency
The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom. It is the UK's lead agency against organised crime; human, weapon and drug trafficking; cybercrime; and economic crime that goes across regional and in ...
(NCA) investigates cybersex trafficking crimes domestically and abroad.
Europe was the second largest source of "online enticement
CyberTipline reports
[International Justice Mission with 14 Implementing and Advisory Partners. (2020, May). ''Full Length Report: Online Sexual Exploitation of Children in the Philippines: Analysis and Recommendations for Governments, Industry, and Civil Society''. International Justice Mission.] According t
Global Threat Assessment 2018
many customers of Online Sexual Exploitation of Children (OSEC) are centered in Europe, along with those who are traffickers and victims of OSEC.
In 2019, Europe accounted for 14% of all sexual exploitation worldwide. Minors are usually trafficked for the purpose of sexual exploitation to EU, and most of them are foreign female children from Nigeria. In Europe, women and children exploited in the sex trade are increasingly being advertised online, with children are found being promoted as adults.
The great Internet freedom and low web hosting costs make the Netherlands one of the countries with a major market for online sexual exploitation. In the 2018 annual report,Internet Watch Foundation
The Internet Watch Foundation (IWF) is a registered charity based in Cambridge, England. It states that its remit is "to minimise the availability of online sexual abuse content, specifically child sexual abuse images and videos hosted anywhe ...
(IWF) has said that about 79 percent (82803 out of 105047) of the URLs for materials of child sexual abuse are in Europe, with the vast majority of them are Netherlands-based.[2018 Annual Report]
. ''IWF''. Retrieved 6 December 2021. The material is produced from different countries in the globe, but they are all hosted on computer servers in the Netherlands. IWF has reported that over 105,047 URLs were linked to illegal images of child sexual abuse, with the Netherlands hosting 47 percent of the content.
North America
The Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI) and Homeland Security Investigations (HSI), the investigative arm of the United States Department of Homeland Security
The United States Department of Homeland Security (DHS) is the Federal government of the United States, U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the I ...
, carry out anti-cybersex trafficking operations. The United States Department of State
The United States Department of State (DOS), or State Department, is an United States federal executive departments, executive department of the Federal government of the United States, U.S. federal government responsible for the country's fore ...
Office to Monitor and Combat Trafficking in Persons
The Office to Monitor and Combat Trafficking in Persons (J/TIP) is an agency within the United States Department of State charged with investigating and creating programs to prevent human trafficking both within the United States and internation ...
(J/TIP) partners with agencies and organization overseas to rescue cybersex trafficked victims.
Southeast Asia
The United Nations Children's Fund
UNICEF (), originally called the United Nations International Children's Emergency Fund in full, now officially United Nations Children's Fund, is an agency of the United Nations responsible for providing humanitarian and developmental aid to ...
(UNICEF) identified the Philippines
The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no),
* bik, Republika kan Filipinas
* ceb, Republika sa Pilipinas
* cbk, República de Filipinas
* hil, Republ ...
as the global center of cybersex trafficking. The Office of Cybercrime within the Philippines Department of Justice receives hundreds of thousands of tips of videos and images of sexually exploited Filipino children on the internet. The Philippine National Police
The Philippine National Police ( fil, Pambansang Pulisya ng Pilipinas, acronymed as PNP) is the armed national police force in the Philippines. Its national headquarters is located at Camp Crame in Bagong Lipunan ng Crame, Quezon City. Current ...
, along with its Women and Children Protection Center (WCPC), Philippine Internet Crimes Against Child Center (PICACC), Philippine InterAgency Council Against Trafficking (IACAT, Department of Justice (Philippines), and Department of Social Welfare and Development
The Philippines' Department of Social Welfare and Development ( fil, Kagawaran ng Kagalingan at Pagpapaunlad Panlipunan, Kagawaran ng Kagalingang Panlipunan at Pagpapaunlad, abbreviated as DSWD) is the executive department of the Philippine Go ...
fight cybersex trafficking in the country. Rancho ni Cristo in Cebu
Cebu (; ceb, Sugbo), officially the Province of Cebu ( ceb, Lalawigan sa Sugbo; tl, Lalawigan ng Cebu; hil, Kapuroan sang Sugbo), is a province of the Philippines located in the Central Visayas region, and consists of a main island and ...
is a shelter devoted exclusively to rehabilitating children of live streaming sexual abuse. Children in the shelter are provided food, medical care, counseling, mentoring and life skills training.
The Royal Thai Police
The Royal Thai Police (RTP) ( th, สำนักงานตำรวจแห่งชาติ; ) is the national police force of Thailand. The RTP employs between 210,700 and 230,000 officers, roughly 17 percent of all civil servants (excludi ...
's Internet Crimes Against Children (TICAC) task force combats cybersex trafficking in the nation.
Combating the crime
Authorities, skilled in online forensics, cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
, and other areas, use data analysis and information sharing to fight cybersex trafficking. Deep learning, algorithms
In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...
, and facial recognition Facial recognition or face recognition may refer to:
* Face detection, often a step done before facial recognition
* Face perception, the process by which the human brain understands and interprets the face
* Pareidolia, which involves, in part, se ...
are also hoped to combat the cybercrime. Flagging or panic buttons on certain videoconferencing software enable users to report suspicious people or acts of live streaming sexual abuse. Investigations are sometimes hindered by privacy laws that make it difficult to monitor and arrest perpetrators.
The International Criminal Police Organization
The International Criminal Police Organization (ICPO; french: link=no, Organisation internationale de police criminelle), commonly known as Interpol ( , ), is an international organization that facilitates worldwide police cooperation and cr ...
(ICPO-INTERPOL) collects evidence of live streaming sexual abuse and other sex crimes. The Virtual Global Taskforce (VGT) comprises law enforcement agencies across the world who combat the cybercrime. The United Nations Children's Fund
UNICEF (), originally called the United Nations International Children's Emergency Fund in full, now officially United Nations Children's Fund, is an agency of the United Nations responsible for providing humanitarian and developmental aid to ...
(UNICEF) funds training for police to identify and address the cybercrime.
Multinational technology companies, such as Google, Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
, and Facebook, collaborate, develop digital tools, and assist law enforcement in combating it.
Led by Thorn, an organization that uses technology to combat child sexual exploration globally, a coalition of Big Tech companies including Facebook, Microsoft, Google, and Twitter have been developing ever more sophisticated tools to put in the hands of law enforcement worldwide to combat this issue at every level.
Education
The Ministry of Education Malaysia introduced cybersex trafficking awareness in secondary school syllabuses.
Research shows that predators under 18 years old use coercion and threats to conceal abuse, but adult predators use psychological abuse. Adult predators use psychological abuse to trick the child into thinking that they actually consented to having sex with them or that the child is responsible for what happened to them.
Teaching the risks of online chatting to children is important to reduce the risk of being a victim of cybersex. With online chatting, a predator might gain knowledge on what a child's hobbies and favorite items are by stalking their page or waiting to see what a child posts. After a predator gains this personal knowledge, he goes on to speak to this child, pretending to also be a child with the same interests to lure them in after gaining their trust. This plays a risk because the child may never really know who’s on the other side of the screen and potentially become a victim of a predator.
Relation to other sex crimes
Cybersex trafficking shares similar characteristics or overlaps with other sex crimes. That said, according to attorney Joshua T. Carback, it is "a unique development in the history of sexual violence" and "distinct in several respects from traditional conceptions of online child pornography and human trafficking". The main particularization is that involves victims being trafficked or transported and then raped or abused in live webcam sex shows. The United Nations Office on Drugs and Crime
The United Nations Office on Drugs and Crime (UNODC; French: ''Office des Nations unies contre la drogue et le crime'') is a United Nations office that was established in 1997 as the Office for Drug Control and Crime Prevention by combining the ...
identified the cybercrime involving trafficked victims on webcam sex shows as an emerging problem. The illegal live streaming shows occur in 'cybersex dens,' which are rooms equipped with webcams. The cybercrime has sometimes been informally called 'webcam rape'.
Non-governmental organizations
The International Justice Mission is one of the world's leading nonprofit organizations that carries out anti-cybersex trafficking initiatives. End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes (ECPAT) and the Peace and Integrity of Creation-Integrated Development Center Inc., a non-profit organization in the Philippine, support law enforcement operations against cybersex trafficking.
The National Center for Missing & Exploited Children
The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization established in 1984 by the United States Congress. In September 2013, the United States House of Representatives, United States Senate, and the Pres ...
in the United States assists authorities in cybersex trafficking cases. It provides CyberTipline reports to law enforcement agencies.
Terre des hommes is an international non-profit that combats the live streaming sexual abuse of children.
The Korea Future Initiative is a London-based organization that obtains evidence and publicizes violations of human rights, including the cybersex trafficking of North Korean women and girls in China.
See also
* List of organizations that combat human trafficking
* Child pornography
Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a chi ...
* Hurtcore
* Livestreamed crime
The livestreaming of crimes is a phenomenon in which people live stream criminal acts. Due to the fact publishing to social media is done with the intent of others viewing the published materials, it is often impossible to protect the privacy of t ...
References
Further reading
*
*
Abstract
Abstract
*
Abstract
*
*
*
*
External links
International Justice Mission (IJM) Cybersex Trafficking Casework
Korea Future Initiative Report (London, 2019) ''Sex Slaves: The Prostitution, Cybersex & Forced Marriage of North Korean Women & Girls in China''
The United Nations Correspondents Association (UNCA) Briefing on Combatting Cybersex Trafficking
{{Types of crime
Human trafficking
Computer security
Cybercrime
Child labour
Child sexual abuse
Crimes against women
Forced prostitution
Livestreamed crimes
Organized crime activity
Sex and the law
Sex crimes
Sex industry
Sexual abuse
Sexual ethics
Trafficking
Sexual slavery
Violence against children
Violence against men
Violence against women