HOME

TheInfoList



OR:

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs (Information and Communication Technologies)-facilitated sexual exploitation is a
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
involving
sex trafficking Sex trafficking is human trafficking for the purpose of sexual exploitation. It has been called a form of modern slavery because of the way victims are forced into sexual acts non-consensually, in a form of sexual slavery. Perpetrators of the ...
and the
live streaming Livestreaming is streaming media simultaneously recorded and broadcast in real-time over the internet. It is often referred to simply as streaming. Non-live media such as video-on-demand, vlogs, and YouTube videos are technically streamed, but n ...
of coerced sexual acts and/or rape on
webcam A webcam is a video camera which is designed to record or stream to a computer or computer network. They are primarily used in videotelephony, livestreaming and social media, and security. Webcams can be built-in computer hardware or peripher ...
. Cybersex trafficking is distinct from other
sex crimes Sex and the law deals with the regulation by law of human sexual activity. Sex laws vary from one place or jurisdiction to another, and have varied over time. Unlawful sexual acts are called sex crimes. Some laws regarding sexual activity are ...
. Victims are transported by traffickers to 'cybersex dens', which are locations with webcams and internet-connected devices with live streaming software. There, victims are forced to perform sexual acts on themselves or other people in
sexual slavery Sexual slavery and sexual exploitation is an attachment of any ownership right over one or more people with the intent of coercing or otherwise forcing them to engage in sexual activities. This includes forced labor, reducing a person to a ...
or raped by the traffickers or assisting assaulters in live videos. Victims are frequently ordered to watch the paying live distant consumers or purchasers on shared screens and follow their commands. It is often a commercialized, cyber form of
forced prostitution Forced prostitution, also known as involuntary prostitution or compulsory prostitution, is prostitution or sexual slavery that takes place as a result of coercion by a third party. The terms "forced prostitution" or "enforced prostitution" appea ...
. Women, children, and people in poverty are particularly vulnerable to coerced
internet sex Cybersex, also called computer sex, Internet sex, netsex and, colloquially, cyber or cybering, is a virtual sex encounter in which two or more people have long distance sex via electronic video communication (webcams, VR headsets, etc) and other ...
. The
computer-mediated communication Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated forma ...
images produced during the crime are a type of
rape pornography Rape pornography is a subgenre of pornography involving the description or depiction of rape. Such pornography either involves simulated rape, wherein sexually consenting adults feign rape, or it involves actual rape. Victims of actual rape may ...
or
child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
that is filmed and broadcast in real time and can be recorded. There is no data about the magnitude of cybersex trafficking in the world. The technology to detect all incidents of the live streaming crime has not been developed yet. Millions of reports of cybersex trafficking are sent to authorities annually. It is a billion-dollar, illicit industry that was brought on with the Digital Age and is connected to
globalization Globalization, or globalisation (Commonwealth English; see spelling differences), is the process of interaction and integration among people, companies, and governments worldwide. The term ''globalization'' first appeared in the early 20t ...
. It has surged from the world-wide expansion of telecommunications and global proliferation of the internet and
smartphones A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
, particularly in
developing countries A developing country is a sovereign state with a lesser developed industrial base and a lower Human Development Index (HDI) relative to other countries. However, this definition is not universally agreed upon. There is also no clear agreem ...
. It has also been facilitated by the use of software,
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
communication systems, and network technologies that are constantly evolving, as well as the growth of international
online payment An e-commerce payment system (or an electronic payment system) facilitates the acceptance of electronic payment for offline transfer, also known as a subcomponent of electronic data interchange (EDI), e-commerce payment systems have become incr ...
systems with
wire transfer Wire transfer, bank transfer, or credit transfer, is a method of electronic funds transfer from one person or entity to another. A wire transfer can be made from one bank account to another bank account, or through a transfer of cash at a cash ...
services and
cryptocurrencies A cryptocurrency, crypto-currency, or crypto is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it. It ...
that hide the transactor's identities. The transnational nature and global scale of cybersex trafficking necessitate a united response by the nations, corporations, and organizations of the world to reduce incidents of the crime; protect, rescue, and rehabilitate victims; and arrest and prosecute the perpetrators. Some governments have initiated advocacy and media campaigns that focus on awareness of the crime. They have also implemented training seminars held to teach law enforcement, prosecutors, and other authorities, as well as NGO workers, to combat the crime and provide trauma-informed aftercare service. New legislation combating cybersex trafficking is needed in the twenty-first century.


Terminology

Cyber-, as a
combining form Neoclassical compounds are compound words composed from combining forms (which act as affixes or stems) derived from classical Latin or ancient Greek roots. New Latin comprises many such words and is a substantial component of the technical an ...
, is defined as 'connected with electronic communication networks, especially the internet.'
Sex trafficking Sex trafficking is human trafficking for the purpose of sexual exploitation. It has been called a form of modern slavery because of the way victims are forced into sexual acts non-consensually, in a form of sexual slavery. Perpetrators of the ...
is human trafficking for the purpose of sexual exploitation, including sexual slavery. Victims of cybersex trafficking are
trafficked ''Trafficked'' is a 2017 American thriller drama film directed by Will Wallace and starring Ashley Judd, Sean Patrick Flanery and Anne Archer. Plot In California, Sara is eighteen and has to leave her foster home; she is offered training to be a ...
or transported to 'cybersex dens,' which are rooms or locations with a webcam. The
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
also involves the transporting or
streaming Streaming media is multimedia that is delivered and consumed in a continuous manner from a source, with little or no intermediate storage in network elements. ''Streaming'' refers to the delivery method of content, rather than the content i ...
of images of the victims' bodies and
sexual assaults Sexual assault is an act in which one intentionally sexually touches another person without that person's consent, or coerces or physically forces a person to engage in a sexual act against their will. It is a form of sexual violence, which ...
in real time through a computer with a webcam to other computers connected to the internet. It thus occurs partly in the physical or real world, as the sexual assault is real, and partly in
cyberspace Cyberspace is a concept describing a widespread interconnected digital technology. "The expression dates back from the first decade of the diffusion of the internet. It refers to the online world as a world 'apart', as distinct from everyday re ...
.


Victims

Victims, predominantly women and children, are abducted, threatened, or deceived. Others are drugged. They are held captive and locked up in rooms with covered or no windows and a webcam. They experience physical and psychological trauma.
Gang rape Gang rape, also called serial gang rape, group rape, or multiple perpetrator rape in scholarly literature,Ullman, S. E. (2013). 11 Multiple perpetrator rape victimization. Handbook on the Study of Multiple Perpetrator Rape: A Multidisciplinary Re ...
has occurred on webcam. Some are coerced into
incest Incest ( ) is human sexual activity between family members or close relatives. This typically includes sexual activity between people in consanguinity (blood relations), and sometimes those related by affinity ( marriage or stepfamily), ado ...
. Victims have been denied food, deprived of sleep, and been forced to perform when sick. They have contracted diseases, including
tuberculosis Tuberculosis (TB) is an infectious disease usually caused by '' Mycobacterium tuberculosis'' (MTB) bacteria. Tuberculosis generally affects the lungs, but it can also affect other parts of the body. Most infections show no symptoms, ...
, while in captivity. A number are assaulted or
torture Torture is the deliberate infliction of severe pain or suffering on a person for reasons such as punishment, extracting a confession, interrogation for information, or intimidating third parties. Some definitions are restricted to acts ...
d. Victims can be exploited in any location where the cybersex traffickers have a computer, tablet, or phone with internet connection. These locations, commonly referred to as ‘cybersex dens,’ can be in homes, hotels, offices, internet cafes, and other businesses, making them extremely difficult or impossible for law enforcement to identify. The number of cybersex trafficking victims is unknown. Some victims are simultaneously forced into prostitution in a brothel or other location. Rescues involving live streaming commercial sexual exploitation of children by parents often require a separation of the minors from the families and new lives for them in a shelter. Some victims are not physically transported and held captive, but rather victims of online
sextortion Sextortion (a portmanteau of ''sex'' and '' extortion'') employs non-physical forms of coercion to extort sexual favors from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coerci ...
. They are threatened, webcam blackmailed, or bullied to film themselves committing online sexual acts. Victims have been coerced to self-penetrate, in what has been called 'rape at a distance.' Others are deceived, including by phony romantic partners who are really rape or child pornography distributors, to film themselves masturbating. The videos are live streamed to purchasers or recorded for later sale. Those who are of a lower class, discriminate race, minority, or other social disadvantages are at an increased risk of being victimized. The cybersex trafficking and or non-consensual dissemination of sexual content involving women and girls, often involving threats, have been referred to as "digital gender violence" or 'online
gender-based violence Gender-related violence or gender-based violence includes any kind of violence directed against people due to their gender or gender identification. Types of gender-related violence include: * Violence against women (sometimes referred to simply a ...
.' Victims, despite being coerced, continue to be criminalized and prosecuted in certain jurisdictions.


Perpetrators

Traffickers transport victims to locations with webcams and live streaming software. They or assisting assaulters then commit and film sex crimes to produce real time rape pornography or child pornography materials that may or may not be recorded. The online audience or consumers, who are often from another country, may issue commands to the victims or rapers and pay for the services. Male and female perpetrators, operating behind a virtual barrier and often with anonymity, come from countries throughout the world and from every social and economic class. Some traffickers and assaulters have been the victim's family members, friends, and acquaintances. Traffickers can be part of or aided by international criminal organizations, local
gangs A gang is a group or society of associates, friends or members of a family with a defined leadership and internal organization that identifies with or claims control over territory in a community and engages, either individually or collectivel ...
, or small crime rings or just be one person. They operate clandestinely and sometimes lack coordinated structures that can be eradicated by authorities. The majority of purchasers or consumers are men. The
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
nature of modern technology makes it difficult to track perpetrators. Some are motivated by sexual gratification. Traffickers advertise children on the internet to obtain purchasers. Funds acquired by cybersex traffickers can be laundered. Overseas predators seek out and pay for live streaming or made-to-order services that sexually exploit children. They engage in threat to gain the trust of local traffickers, often the victims' parents or neighbors, before the abuse takes place.


Internet platforms

Cybersex trafficking is partly an internet-based crime. Perpetrators use social media networks, videoconferences, dating pages, online chat rooms,
mobile apps A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on des ...
,
dark web The dark web is the World Wide Web content that exists on ''darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can comm ...
sites, and other pages and domains. They also use
Telegram Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
and other cloud-based
instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and tri ...
and
voice over Voice-over (also known as off-camera or off-stage commentary) is a production technique where a voice—that is not part of the narrative (non- diegetic)—is used in a radio, television production, filmmaking, theatre, or other presentations. ...
IP services, as well as
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
(P2P) platforms, virtual private networks (VPN), and Tor protocols and software, among other applications, to carry out activities
anonymously Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
. Consumers have made payments to traffickers, who are sometimes the victim's family members, using
Western Union The Western Union Company is an American multinational financial services company, headquartered in Denver, Colorado. Founded in 1851 as the New York and Mississippi Valley Printing Telegraph Company in Rochester, New York, the company cha ...
,
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers, and serves as an electronic alternative to traditional paper ...
, and other
electronic payment system An e-commerce payment system (or an electronic payment system) facilitates the acceptance of electronic payment for offline transfer, also known as a subcomponent of electronic data interchange (EDI), e-commerce payment systems have become incre ...
s.


Dark web

Cybersex trafficking occurs commonly on some
dark web The dark web is the World Wide Web content that exists on ''darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can comm ...
sites, where users are provided sophisticated technical cover against identification.


Social media

Perpetrators use Facebook and other social media technologies. They use fake job listings in order to lure in victims. They do this by creating fake job agencies to get victims to meet with the perpetrator. These fake job listing can be things such as modeling gigs. Social media makes it easier for perpetrators to groom multiple people at once. They continuously send friend request to increase their chances of getting a victim. Social media gives perpetrators the platform to hide their identity. On social media you can portray to be who ever you want. Therefore, perpetrators use fake accounts to get victims attention. Most perpetrators pose as an attractive person who is living a lavish life. This is used to attract vulnerable users who desire those luxuries. People who desperately desire a luxury living are the easiest targets. They fall for the manipulation that they too can live a life like those fake accounts. Furthermore, younger people are more likely to be victims to cybersex on social media. They are less aware and still learning how to use social media. In addition, adolescents are the more vulnerable on social media because they are exploring. Adolescents can use social media to explore their sexuality. This makes them more accessible to perpetrators. Without guidance adolescents are at risk of falling for the tricks used to lure them into cybersex. In addition, they are less likely to detect when their security is at risk. Perpetrators fake a romantic relationship with the victims on social media to exploit them. Perpetrators will convince victims to perform the sexual acts. They can perform these sexual acts through tools such as webcams. More common on social media is to send pictures or videos. Victims send explicit pictures or videos because they trust the "friend" they have on social media. The victims will do it out of "love" or naiveness. Others do the performances out of fear. They can be threatened with information they previously shared with the perpetrator when they befriended them. However, it becomes an endless cycle when they perform the sexual acts once. After victims do these sexual acts, perpetrators use it as leverage. Perpetrators threaten them to do more sexual acts or they have will be share to their family and friends the one that they have of them. They use online sites such as Instagram to promote sex services.


Videotelephony

Cybersex trafficking occurs on
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, debi ...
and other
videoconferencing Videotelephony, also known as videoconferencing and video teleconferencing, is the two-way or multipoint reception and transmission of audio signal, audio and video signals by people in different locations for Real-time, real time communication. ...
applications. Pedophiles direct
child sex abuse Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whethe ...
using its live streaming services.


Activities by region


Australia and Oceania

The
Australian Federal Police The Australian Federal Police (AFP) is the national and principal federal law enforcement agency of the Australian Government with the unique role of investigating crime and protecting the national security of the Commonwealth of Australia. ...
(AFP) investigates cybersex trafficking crimes domestically and in the Asia-Pacific region. In 2016,
Queensland Police Service The Queensland Police Service (QPS) is the principal law enforcement agency responsible for policing the Australian state of Queensland. In 1990, the Queensland Police Force was officially renamed the Queensland Police Service and the old motto ...
officers from Task Force Argos In 2016, Queensland Police Service officers from Task Force Argos executed a federal search warrant at a 58-year-old Australian man's residence. The Australian man pleaded guilty to numerous charges, including soliciting a child for sex and having sex with a child under 16 years of age outside of
Australia Australia, officially the Commonwealth of Australia, is a sovereign country comprising the mainland of the Australian continent, the island of Tasmania, and numerous smaller islands. With an area of , Australia is the largest country by ...
. Using
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, debi ...
, the man conducted "live remote"
sexual abuse Sexual abuse or sex abuse, also referred to as molestation, is abusive sexual behavior by one person upon another. It is often perpetrated using force or by taking advantage of another. Molestation often refers to an instance of sexual assa ...
, exploiting two young children in the
Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
while making payments to their mother. The exploitation began when the children were only 2 and 7 years old, and the abuse continued for nearly five years. In May 2019, according to the
Australian Federal Police The Australian Federal Police (AFP) is the national and principal federal law enforcement agency of the Australian Government with the unique role of investigating crime and protecting the national security of the Commonwealth of Australia. ...
(AFP), numerous cases were also uncovered related to Australians allegedly paying for and manipulating
child sexual abuse Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whet ...
. In November 2019, Australia was alerted by
Child Sexual Abuse Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whet ...
live streaming Livestreaming is streaming media simultaneously recorded and broadcast in real-time over the internet. It is often referred to simply as streaming. Non-live media such as video-on-demand, vlogs, and YouTube videos are technically streamed, but n ...
when AUSTRAC filed legal action against
Westpac Bank Westpac Banking Corporation, known simply as Westpac, is an Australian multinational banking and financial services company headquartered at Westpac Place in Sydney, New South Wales. Established in 1817 as the Bank of New South Wales, i ...
in relation to over 23 million suspected violations of the ''Anti-Money Laundering and Counter-Terrorism Financing Act 2006'' (Cth). Since 2017, IJM (International Justice Mission) Australia has been working on legal reforms to strengthen Australia's response to OSEC, commonly known as online sex trafficking of children. On June 16, 2020, both houses of the
Parliament of Australia The Parliament of Australia (officially the Federal Parliament, also called the Commonwealth Parliament) is the legislative branch of the government of Australia. It consists of three elements: the monarch (represented by the governor- ...
enacted th
Crimes Legislation Amendment (Sexual Crimes Against Children and Community Protection Measures) Bill 2019
which received royal assent on June 22, 2020. Jacob Sarkodee, CEO of IJM Australia, noted that this new legislation recognizes the contribution of Australians to the growing demand for online sex trafficking of children. According t
2020 Global OSEC report
https://ijm.org.au/wp-content/uploads/2020/05/Final_OSEC-Public-Summary_05_20_2020.pdf Australians are the third largest purchasers of cybersex trafficking of children in Philippines. Under the proposal made by the IJM, the new legislation specifies that those who watch live streaming of child cybersex trafficking will receive the same penalties as those who manipulate and direct the sexual abuse of children themselves.


East Asia

Cybersex trafficking occurred in the 2018–2020 Nth room case in South Korea. In March 2020, South Korean news agencies reported some details about Nth room case: in crypto-messaging apps such as
Telegram Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas ...
and
Discord Discord is a VoIP and instant messaging social platform. Users have the ability to communicate with voice calls, video calls, text messaging, media and files in private chats or as part of communities called "servers".The developer documenta ...
, "at least 74 women and 16 minors performed "sex shows" online for global audience of thousands who paid for cryptocurrency". The victims were manipulated and tortured by viewers and were referred to as slaves. This case is related to the widespread availability and expansion of spy cameras (often referred to as " Molka") in South Korea. North Korean women and girls have been subjected to penetrative vaginal and anal rape, groping, and forced masturbation in 'online rape dens' in China. In the trade for female North Koreans, cybersex trafficking is the small but rapidly growing element. Girls as young as 9 years old were abused and exploited in "sex shows" that are broadcast live online to a paying audience, many of them are believed to be Korean men. According t
Korea Future Initiative 2019
an estimated 60 percent of North Korean female refugees in China are trafficked into the sex trade, of these, about 15 percent is sold into cybersex dens for exploitation by a global online audiences. China's crackdown on undocumented North Koreans in July 2017 and a developing cybersex industry have fueled the rapid expansion of cybersex dens. Cybersex trafficking is thought to be extremely lucrative. According to primary research, helpers experiences, and survivors testimonies, live streamed videos of cybersex featuring North Korean girls ages 9–14 can cost $60-$110, while videos featuring North Korean girls and women ages 17–24 can cost up to $90. Offenders are believed to manipulate victims by the means of drugs and violence (physical and sexual). In investigation conducted from February to September 2018, South Korean websites have been discovered to promote North Korean cybersex and pornography, even in the form of "pop-up" advertisements. The high demand of North Korean cybersex victims is largely driven by South Korean man high involvement in searching Korean-language
pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
. In South Korea, compared to the penalties made for production and distribution of child sexual abuse imagery, the penalties for those who possess images of child porn are far below international standards.


Europe

The European Union Agency for Law Enforcement Cooperation (Europol) investigates and spreads awareness about live streaming sexual abuse. Europol's European Cybercrime Centre (EC3) is especially equipped to combat the cybercrime. The United Kingdom's
National Crime Agency The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom. It is the UK's lead agency against organised crime; human, weapon and drug trafficking; cybercrime; and economic crime that goes across regional and in ...
(NCA) investigates cybersex trafficking crimes domestically and abroad. Europe was the second largest source of "online enticement
CyberTipline reports
International Justice Mission with 14 Implementing and Advisory Partners. (2020, May). ''Full Length Report: Online Sexual Exploitation of Children in the Philippines: Analysis and Recommendations for Governments, Industry, and Civil Society''. International Justice Mission. According t
Global Threat Assessment 2018
many customers of Online Sexual Exploitation of Children (OSEC) are centered in Europe, along with those who are traffickers and victims of OSEC. In 2019, Europe accounted for 14% of all sexual exploitation worldwide. Minors are usually trafficked for the purpose of sexual exploitation to EU, and most of them are foreign female children from Nigeria. In Europe, women and children exploited in the sex trade are increasingly being advertised online, with children are found being promoted as adults. The great Internet freedom and low web hosting costs make the Netherlands one of the countries with a major market for online sexual exploitation. In the 2018 annual report, Internet Watch Foundation (IWF) has said that about 79 percent (82803 out of 105047) of the URLs for materials of child sexual abuse are in Europe, with the vast majority of them are Netherlands-based.2018 Annual Report
. ''IWF''. Retrieved 6 December 2021.
The material is produced from different countries in the globe, but they are all hosted on computer servers in the Netherlands. IWF has reported that over 105,047 URLs were linked to illegal images of child sexual abuse, with the Netherlands hosting 47 percent of the content.


North America

The
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
(FBI) and Homeland Security Investigations (HSI), the investigative arm of the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
, carry out anti-cybersex trafficking operations. The
United States Department of State The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other na ...
Office to Monitor and Combat Trafficking in Persons (J/TIP) partners with agencies and organization overseas to rescue cybersex trafficked victims.


Southeast Asia

The
United Nations Children's Fund UNICEF (), originally called the United Nations International Children's Emergency Fund in full, now officially United Nations Children's Fund, is an agency of the United Nations responsible for providing humanitarian and developmental aid t ...
(UNICEF) identified the
Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
as the global center of cybersex trafficking. The Office of Cybercrime within the Philippines Department of Justice receives hundreds of thousands of tips of videos and images of sexually exploited Filipino children on the internet. The
Philippine National Police The Philippine National Police ( fil, Pambansang Pulisya ng Pilipinas, acronymed as PNP) is the armed national police force in the Philippines. Its national headquarters is located at Camp Crame in Bagong Lipunan ng Crame, Quezon City. Currentl ...
, along with its Women and Children Protection Center (WCPC), Philippine Internet Crimes Against Child Center (PICACC), Philippine InterAgency Council Against Trafficking (IACAT, Department of Justice (Philippines), and
Department of Social Welfare and Development The Philippines' Department of Social Welfare and Development ( fil, Kagawaran ng Kagalingan at Pagpapaunlad Panlipunan, Kagawaran ng Kagalingang Panlipunan at Pagpapaunlad, abbreviated as DSWD) is the executive department of the Philippine Gov ...
fight cybersex trafficking in the country. Rancho ni Cristo in
Cebu Cebu (; ceb, Sugbo), officially the Province of Cebu ( ceb, Lalawigan sa Sugbo; tl, Lalawigan ng Cebu; hil, Kapuroan sang Sugbo), is a province of the Philippines located in the Central Visayas region, and consists of a main island and 16 ...
is a shelter devoted exclusively to rehabilitating children of live streaming sexual abuse. Children in the shelter are provided food, medical care, counseling, mentoring and life skills training. The
Royal Thai Police The Royal Thai Police (RTP) ( th, สำนักงานตำรวจแห่งชาติ; ) is the national police force of Thailand. The RTP employs between 210,700 and 230,000 officers, roughly 17 percent of all civil servants (excludi ...
's Internet Crimes Against Children (TICAC) task force combats cybersex trafficking in the nation.


Combating the crime

Authorities, skilled in online forensics,
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
, and other areas, use data analysis and information sharing to fight cybersex trafficking.
Deep learning Deep learning (also known as deep structured learning) is part of a broader family of machine learning methods based on artificial neural networks with representation learning. Learning can be supervised, semi-supervised or unsupervised. ...
,
algorithms In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...
, and facial recognition are also hoped to combat the cybercrime. Flagging or panic buttons on certain videoconferencing software enable users to report suspicious people or acts of live streaming sexual abuse. Investigations are sometimes hindered by
privacy laws Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or ...
that make it difficult to monitor and arrest perpetrators. The
International Criminal Police Organization The International Criminal Police Organization (ICPO; french: link=no, Organisation internationale de police criminelle), commonly known as Interpol ( , ), is an international organization that facilitates worldwide police cooperation and cri ...
(ICPO-INTERPOL) collects evidence of live streaming sexual abuse and other
sex crimes Sex and the law deals with the regulation by law of human sexual activity. Sex laws vary from one place or jurisdiction to another, and have varied over time. Unlawful sexual acts are called sex crimes. Some laws regarding sexual activity are ...
. The Virtual Global Taskforce (VGT) comprises law enforcement agencies across the world who combat the cybercrime. The
United Nations Children's Fund UNICEF (), originally called the United Nations International Children's Emergency Fund in full, now officially United Nations Children's Fund, is an agency of the United Nations responsible for providing humanitarian and developmental aid t ...
(UNICEF) funds training for police to identify and address the cybercrime. Multinational
technology companies A technology company (or tech company) is an electronics-based technological company, including, for example, business relating to digital electronics, software, and internet-related services, such as e-commerce services. Details According to '' F ...
, such as Google,
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
, and Facebook, collaborate, develop digital tools, and assist law enforcement in combating it. Led by
Thorn Thorn(s) or The Thorn(s) may refer to: Botany * Thorns, spines, and prickles, sharp structures on plants * ''Crataegus monogyna'', or common hawthorn, a plant species Comics and literature * Rose and Thorn, the two personalities of two DC Comic ...
, an organization that uses technology to combat child sexual exploration globally, a coalition of Big Tech companies including Facebook, Microsoft, Google, and Twitter have been developing ever more sophisticated tools to put in the hands of law enforcement worldwide to combat this issue at every level.


Education

The
Ministry of Education Malaysia The Ministry of Higher Education (MOHE; ms, Kementerian Pendidikan Tinggi) is a ministry of the Government of Malaysia that is responsible for higher education, polytechnic, community college, student loan, accreditation, student volunt ...
introduced cybersex trafficking awareness in secondary school syllabuses. Research shows that predators under 18 years old use coercion and threats to conceal abuse, but adult predators use psychological abuse. Adult predators use psychological abuse to trick the child into thinking that they actually consented to having sex with them or that the child is responsible for what happened to them. Teaching the risks of online chatting to children is important to reduce the risk of being a victim of cybersex. With online chatting, a predator might gain knowledge on what a child's hobbies and favorite items are by stalking their page or waiting to see what a child posts. After a predator gains this personal knowledge, he goes on to speak to this child, pretending to also be a child with the same interests to lure them in after gaining their trust. This plays a risk because the child may never really know who’s on the other side of the screen and potentially become a victim of a predator.


Relation to other sex crimes

Cybersex trafficking shares similar characteristics or overlaps with other
sex crimes Sex and the law deals with the regulation by law of human sexual activity. Sex laws vary from one place or jurisdiction to another, and have varied over time. Unlawful sexual acts are called sex crimes. Some laws regarding sexual activity are ...
. That said, according to attorney Joshua T. Carback, it is "a unique development in the history of sexual violence" and "distinct in several respects from traditional conceptions of online child pornography and human trafficking". The main particularization is that involves victims being trafficked or transported and then raped or abused in live webcam sex shows. The
United Nations Office on Drugs and Crime The United Nations Office on Drugs and Crime (UNODC; French: ''Office des Nations unies contre la drogue et le crime'') is a United Nations office that was established in 1997 as the Office for Drug Control and Crime Prevention by combining the ...
identified the cybercrime involving trafficked victims on webcam sex shows as an emerging problem. The illegal
live streaming Livestreaming is streaming media simultaneously recorded and broadcast in real-time over the internet. It is often referred to simply as streaming. Non-live media such as video-on-demand, vlogs, and YouTube videos are technically streamed, but n ...
shows occur in 'cybersex dens,' which are rooms equipped with webcams. The cybercrime has sometimes been informally called 'webcam rape'.


Non-governmental organizations

The
International Justice Mission International Justice Mission is an international, non-governmental 501(c)(3) organization focused on human rights, law and law enforcement. Founded in 1997 by lawyer Gary Haugen of the United States, it is based in Washington, D.C. All IJM emp ...
is one of the world's leading nonprofit organizations that carries out anti-cybersex trafficking initiatives. End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes (ECPAT) and the Peace and Integrity of Creation-Integrated Development Center Inc., a non-profit organization in the Philippine, support law enforcement operations against cybersex trafficking. The
National Center for Missing & Exploited Children The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization established in 1984 by the United States Congress. In September 2013, the United States House of Representatives, United States Senate, and the Pres ...
in the United States assists authorities in cybersex trafficking cases. It provides CyberTipline reports to law enforcement agencies.
Terre des hommes Terre des hommes, also Terre des Hommes (''Land of People'' or ''Land of Men''), is an international children's rights charitable humanitarian umbrella organization under the aegis of the International Federation of Terre des Hommes (TDHIF), wit ...
is an international non-profit that combats the live streaming sexual abuse of children. The Korea Future Initiative is a London-based organization that obtains evidence and publicizes violations of human rights, including the cybersex trafficking of North Korean women and girls in China.


See also

* List of organizations that combat human trafficking *
Child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
*
Hurtcore Hurtcore, a portmanteau of the words "hardcore" and "hurt", is a name given to a particularly extreme form of child pornography, usually involving degrading violence, bodily harm and murder relating to child sexual abuse. The material is usually s ...
*
Livestreamed crime The livestreaming of crimes is a phenomenon in which people live stream criminal acts. Due to the fact publishing to social media is done with the intent of others viewing the published materials, it is often impossible to protect the privacy ...


References


Further reading

* *
Abstract

Abstract
*
Abstract
* * * *


External links


International Justice Mission (IJM) Cybersex Trafficking Casework

Korea Future Initiative Report (London, 2019) ''Sex Slaves: The Prostitution, Cybersex & Forced Marriage of North Korean Women & Girls in China''

The United Nations Correspondents Association (UNCA) Briefing on Combatting Cybersex Trafficking
{{Types of crime Human trafficking Computer security Cybercrime Child labour Child sexual abuse Crimes against women Forced prostitution Livestreamed crimes Organized crime activity Sex and the law Sex crimes Sex industry Sexual abuse Sexual ethics
Trafficking Smuggling is the illegal transportation of objects, substances, information or people, such as out of a house or buildings, into a prison, or across an international border, in violation of applicable laws or other regulations. There are various ...
Sexual slavery Violence against children Violence against men Violence against women