Online Child Sex Exploitation Presentation PDF

Summary

This presentation examines the nature of online child sexual exploitation, exploring grooming tactics, solicitation of sexual content, and the impact on young people. It covers topics from cybersex addiction to sextortion, the challenges of online investigations, and the legal frameworks surrounding such offenses.

Full Transcript

TRIGGER WARNING Tonight’s class will discuss topics related to sexual assault in a very direct and potentially graphic manner If you are adversely affected, please do reach out to the UNH Psychological and Counseling Services (PACS) -> (603) 862- 2090 Please note, any attemp...

TRIGGER WARNING Tonight’s class will discuss topics related to sexual assault in a very direct and potentially graphic manner If you are adversely affected, please do reach out to the UNH Psychological and Counseling Services (PACS) -> (603) 862- 2090 Please note, any attempt at humor during tonight’s class is made as an effort to lower the stress associated with this topic; and is not intended to lessen the severity of the issue ONLINE VICTIMIZATI ON ONLINE SOLICITATION “Intentionally or knowingly communicating certain sexual content to a minor, or trying to induce or ‘solicit’ a minor to perform a sexual act” – From an investigative standpoint, the spectrum of violations is wide, but the focus is more narrow LANDSCA PE Nowadays sexual victimization is done more through popular social media websites and apps – Prior to the internet, much of this was done through the mail Connections with other participants was more difficult U.S. Postal Inspection Service heavily involved Social media is also used for phishing and sextortion – Form of blackmail – Sexual information/ images used to extort sexual favors from the victim LANDSCA PE Online Enticement: An Analysis of Missing Children and Youth 2020-2023 LANDSCA PE Children are considered a vulnerable population in social media because of their lack of maturity and understanding in regard to privacy – Lack of understanding of the threats – Some behavior’s become more normalized (“nudes” culture) Society recognizes responsibility to protect children – Laws & penalties – Parental oversite – Age restrictions – Reporting systems – Automated monitoring GROOMING What is grooming? – The befriending and establishment of an emotional connection with a child to lower the child’s inhibitions in order to have a sexual experience and/or make sexual contact with the child GROOMING INVOLVES  Acting like the person to establish rapport  Sympathizing with them  Use flattery, and even claim to love them  Will eventually bring up sex and attempt to progress the relationship Victims of grooming are often online seeking some of these (genuine) connections, making them a suitable target  Any information gained about the victim will be used to exploit them  Eventually, information learned can be used against the person, i.e. blackmail RAPPORT  Definition: Ability to foster a connection that creates trust, openness and understanding; Primarily a subconscious connection  Communication*  7% Words The sweetest sound to a  38% Tone person’s ear is their name  55% Body Language  Building Rapport through:  Matching and Mirroring  Copying someone’s words, tone and body language  Asking questions  Focusing on similarities GROOMING PROCESS 1. Share Interests / Establish Rapport 2. Establish Trust 3. Share Secrets 4. Break Down Barriers 5. Threats / Exploitation (Pics/emotional attachment) 6. Face-to-face meeting ONLINE SOLICITATION Grooming Process 1. Shared Interests  Predator lures target by appealing to their interests 2. Trust  Builds trust by appearing interested in everything  Becomes the Best Friend 3. Secrecy  Discourages inclusion of others because they “simply won’t understand” the relationship 4. Breaking Down Barriers  Takes advantage of youths natural sexual curiosity by slowly introducing sexual content into conversation  The predator exposes the victim to things such as pictures that are uncomfortable  However, with repeated exposure makes it seem normal  The Victim is encouraged to think that sex between a child and an adult is normal 5. Threats / Exploitation  The predator may resort to threats if he senses that the victim is withdrawing or hesitant to meet  May threaten to expose the relationship to parents or others,  the victim will fear repercussions for his/her action and will not seek help 6. Face-to-Face Meeting  The ultimate goal  Whether the child goes willingly or not, they are still a victim!  Most victims are willing  Violence is uncommon in Internet predators IDENTIFYING SEXUAL GROOMING THEMES USED ONLINE 2013 Study: looks to establish possible strategies that Internet sex offenders use w/in the grooming process – w/in the initial hour of contact Grooming is difficult to identify/define – Internet grooming involves a variety of behaviors/processes – Can differ greatly in intensity and duration IDENTIFYING SEXUAL GROOMING THEMES USED BY INTER NET SEX OFFENDERS Examined Eight Transcripts – “Decoy” posing as a child – Adult male– later convicted following the discussions Major Themes Identified: – Rapport-building – Sexual content – Assessing the child’s receptiveness to YOUTH INTERNET SAFETY SURVEY (YISS)  Conducted by Crimes Against Children Research Center at UNH  First Survey Sampled 1501 youths 10-17 who use the internet regularly was conducted Aug. 1999- Jan. 2000  Wave 2 – 2005  Wave 3 - 2010  Addressed 5 main issues  Sexual solicitations and approaches  Aggressive sexual solicitation  Unwanted exposure to sexual material  Harassment  Distressing incidents ONLINE VICTIMIZATION  Encountering unwanted…  Sexual solicitations  Sexual material  People who threaten and harass them in a variety of ways  According to the Youth Internet Safety Surveys (I, II, & III)- …  Unwanted sexual solicitations have declined from 2000 to 2005 to 2010  Aggressive solicitations stayed consistent from 2000 to 2005 to 2010 RISKY BEHAVIORS  Posting or sending personal information or pictures  Engaging in online Sexual Behaviors  Going to X-rated websites  Using a screen-name with sexual connotations  Sending sexual pictures online  Talking to people you only know online about sex  Using the internet to harass or embarrass others by saying rude or nasty things  Engaging in these risky behaviors were associated with an increased risk of victimization CHANCES OF BEING VICTIMIZED Chance of Being Victimized Number of Risk Factors Courtesy OJJDP YISS-2 ADVICE Two factors were related to solicitation regardless of the number of other factors: 1. Talking to unknown people online— particularly about sex 2. Being rude or nasty online ONLINE ENTICEMENT Online enticement - the use of the Internet to entice, invite, or persuade a child to meet for sexual acts or to help arrange such a meeting; is a serious offense  Predators have used E-mail, instant messages, bulletin boards, and chat areas to gain a child's confidence and then arrange a face-to-face meeting  More recently predators have used apps such as Whisper, Snapchat, Kik, TikTok, WhatsApp, and Grindr – among others  This sometimes leads to the child traveling to meet the person he or she is chatting with or the person traveling to meet the child  Sometimes the other party is an adult whose intent is to have sex with the child MADBURY UC CHAT CASE Suspect - 22yo male Victim – 14yo female Charges: – certain uses of a computer-prohibited – Endangering the welfare of a minor – Interference with custody – Sending “obscene” materials M ADBURY CASE - CONVICTION Attempted SA – 8 months Attempted criminal restraint – 2-4 years suspended – 3 years probation – Sex offender counseling – No contact with minors – Registered sex offender 10 years DEPTH OF THE PROBLEM 20% of youth using the internet claim to have received sexual solicitations online 89% of Internet users using chat rooms claimed to have received sexual solicitations 29% of children age 7-17 give out personal information online Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed WHAT DOES THE DATA SAY NOW: THORN STUDY (ONLINE GROOMING: EXAMINING RISKY ENCOUNTERS AMID EVERYDAY DIGITAL SOCIALIZATION, 2022) Young people view flirting or dating adults online as common. In fact, 1 in 4 9-12-year-olds sees it as normal for kids their age to date adults aged 18-20. Minors are regularly approached online by someone they believe is attempting to “befriend and manipulate” them. 4 in 10 minors (40%) said they have been approached online by someone they believe was attempting “to befriend and manipulate” them, with 47% of teen girls saying they have experienced this. WHAT DOES THE DATA SAY NOW: THORN STUDY (ONLINE GROOMING: EXAMINING RISKY ENCOUNTERS AMID EVERYDAY DIGITAL SOCIALIZATION, 2022) Young people are frequently asked for nudes by contacts they only know online. 40% of minors have experienced cold solicitations for nudes online, including roughly 1 in 4 (28%) of 9-12-year-olds. Online-only contacts often ask young people to move conversations from public platforms to private chats, increasing the vulnerability and opportunities for abuse. Nearly 2 in 3 (65%) minors said they have experienced an online-only contact to invite them “to move from a public chat into a private conversation on a different platform.” SEXTORTION The use of sexual content (nude photos, videos, etc.) to blackmail an individual “The practice of extorting money or sexual favors from someone by threatening to reveal evidence of their sexual activity” – To continue to exploit – To prevent disclosure – For money SEXTORTION GOALS To acquire increasingly more explicit sexual content (photos/videos) of the child (78%) – Female children were blackmailed significantly more often for sexually explicit content (84%) compared to male children (53%). To obtain money or goods from the child (7%) – Male children were blackmailed significantly more often for money/goods (32%) compared to female children (2%) To have sex with the child (5%) – There was no statistically significant difference between male (3%) and female (5%) children in the rate that they were blackmailed to meet for sex. FINANCIAL SEXTORTION ON THE RISE 2022 - 3,000 young people, mostly boys between 14 and 17, were targeted last year as part of a “sextortion” scheme, a drastic increase from previous years. A dozen minors died by suicide because of the ongoing blackmail According to the NCMEC from 2018 to 2021, there was over a 300% increase in reports of online enticement. SEXTORTION PERPETRATORS West Africa - Nigeria and Ivory Coast Response – FBI Child Exploitation Operational Unit (CEOU) – DHS Cyber Crimes Center's Child Exploitation Investigations Unit (CEIU) SEXUAL EXPLOITATION OF CHILDREN: CHILD SEXUAL ABUSE MATERIALS (CSAM) CSAI / CSAM Formerly called “child pornography”, “CP”, or ”child sexual abuse imagery/material” Name adapted to better reflect that the physical action is abusive Pornography, in adult terms, would be consensual – this is not CSAM is any form of media (pictures, video) that captures the sexual abuse or exploitation of a child From sexual posing to documentation of sexual assault CSAM CSAM: TRENDS IN AGE & GENDER More than half of all identified child victims with CSAM in circulation online are prepubescent or younger (infants and toddlers). CSAM: TRENDS IN RACE & ETHNICITY Preponderance of files in seized CSAM collections featured Caucasian girls of westernized appearance; – Asian children comprised the second most common ethnic group – Following by Hispanic-Latino and Black children CSAM featuring female versus male children: 4 to 1 CSAM featuring white children versus non-white children: 10 to 1 ONLINE SOLICITATION INVESTIGATIVE PROCESS INTERNET CRIMES AGAINST CHILDREN In 1998, The U.S. Department of Justice's Office of Juvenile and Delinquency Prevention created the Internet Crimes Against Children (ICAC) Program. Reauthorized in 2008 & 2017 The program is aimed at fortifying state and local law enforcement efforts to combat technology-facilitated child exploitation and other Internet crimes against children Specialized training for investigators & prosecutors Technical assistance – forensics Victim services Community education Currently 61 coordinated national ICAC task forces in the U.S. FY23: Assisted in 184,700 investigations Lead to 10,800 arrests NATIONAL CENTER FOR MISSING AND EXPLOITED CHILDREN (NCMEC) 1984 – John and Revé Walsh and other child advocates founded the National Center for Missing & Exploited Children as a private, non-profit organization to serve as the national clearinghouse and to provide a coordinated, national response to problems relating to missing and exploited children. 1998 – Following an increase in reports relating to the online sexual exploitation of children, NCMEC created the CyberTipline. The CyberTipline provides an online mechanism for members of the public and electronic service providers (ESPs) to report incidents of suspected child sexual exploitation. 2002 – NCMEC launched it Child Victim Identification Program (CVIP) to help identify and rescue children in child sexual abuse images and videos. Today, NCMEC's CVIP acts as the nation's hub for identifying child victims of CSAM. Images of unidentified children are analyzed for potential location or identifiers of the abuser. DUTY TO REPORT: 18 U.S.C. § 2258A Electronic Service Providers (ESPs) SHALL report instances of “apparent child pornography” to the CyberTipline; specifically the company MAY provide in each report: Time/date of the reporting incident Email address/screen name f the suspected violator IP address associated with the reported incident All suspected illegal images and videos Nothing in the law requires ESPs to: Monitor any user, subscriber or customer Proactively monitor their networks or looks for violations However, many do this! PhotoDNA In addition to filing a report, ESPs remove the abusive content so it is no longer publicly available INVESTIGATIVE PROCESS Crime is “Whois” Search Preservati Subpoena Get reported lookup on warrant / Discover on Letter or Search “Return” (Citizen or IP Address arrest IP Address to Warrant to from Internet (gets warrant of Interest Network Network Network Service network for Owner Owner Owner Provider) owner) individual GOING DARK oviders required to produce information if they have it/record Some providers have a very narrow window of retent “Whois” Search Preservati Subpoena Get lookup on warrant / Discover on Letter or Search “Return” IP Address arrest IP Address to Warrant to from (gets warrant of Interest Network Network Network network for Owner Owner Owner owner) individual Providers not legally required record/store any subscriber or content information!!! END-TO-END ENCRYPTION Prevents 3rd parties from reading sensitive transmitted information 3rd parties can no longer look for CSAI and report them to the CyberTipline NCMEC predicts that half of their CyberTipline reports will vanish Facebook Msngr, Insta, WhatsApp, Signal, Viber all use E-to-E Encryption https://heimdalsecurity.com/blog/wp-content/uploads/end_to_end_encryption_infographic-1.png APPLICABLE FEDERAL LAWS Child Protection and Sexual Predator Punishment Act of 1998 – Prohibits the transfer of obscene material to minors – Amends the Child Abuse Act of 1990 by requiring online service providers to report evidence of CSAM offenses to law enforcement agencies Child Sexual Abuse Act of 1994 – Penalizes U.S. citizens traveling across state or national borders to engage in sexual activity with children – Also prohibits the production of sexually explicit depictions of a minor for importation into the U.S. Protection of Children from Sexual Predators Act of 1998 – Use of interstate facilities to transmit information about a minor – Transfer of obscene material to minors – Increased penalties and expanded prosecution for CSAM cases Child Pornography Prevention Act of 1996 – Crime to sell, possess, possess with intent to sell, download, or produce child pornography or any visual (virtual) depiction that is intended to represent or resemble child pornography THINK. PAIR. SHARE. With the rise of Artificial Intelligence (AI) in today’s society, do you believe that AI-generated depictions of CSAM should be constitutional protected? LEGAL CHALLENGES Ashcroft v. Free Speech Coalition (2002) – U.S. Supreme Court case that struck down two overbroad provisions of the Child Pornography Prevention Act of 1996 because they abridged "the freedom to engage in a substantial amount of lawful speech. The suit alleged that the "appears to be" and "conveys the impression" provisions are overbroad and vague and, thus, restrain works otherwise protected by the First Amendment. United States v. Wilson (2021) – Ninth Circuit held that Google’s use of hash programs to identify CSAM was legal, but warrantless viewing of these materials by law enforcement was a 4th amendment violation. In conflict with previous Circuit Court rulings; various State courts have made varying conclusions Supreme Court has declined to review, so far APPLICABLE STATE LAWS 649-B:4 Certain Uses of Computer Services Prohibited. – Online solicitation of minor (felony) 639:3 Endangering Welfare of Child – Solicitation of minor (felony) 649-A:3 Possession/Distribution/Manufacture of Child Sexual Abuse Images – Felony 645:1 Indecent Exposure and Lewdness – “d**k pic” statute* (misd/felony +/- 16yo) – 2023 644:9-a Nonconsensual Dissemination of Private Sexual Images – Revenge porn (felony) – 2016 DOVER SOLICITATION CASE 2022 Suspect: 20yo male Victim: 13yo female Initial Facts: – Victim’s guardian discovers sexual content on Snapchat – Consent for phone ID potential suspect – phone number SW to Snapchat for records – Suspect using fake account (pretending to be 14yo male) – Found CSAM videos sent from victim to suspect – Suspect sent videos from fake account to real account Additional SW – Confirm ID of suspect Arrest warrants for suspect – FL extradition authorized Florida HSI gets involved – Execute SW at house, arrest suspect, interview (confession) DOVER SOLICITATION CASE: CONVICTION 2024 Guilty Plea – Possession of CSAI (20 counts) 5-10 years prison – Suspended – Manufacture of CSAI (12 counts) 12 months county jail 6 years probation Sex Offender Program No internet / social media No contact anyone under 18 CSAM INVESTIGATIVE PROCESS CYBERTIPLINE WORKFLOW CSAM INVESTIGATIONS Starts from a CyberTip, citizen report, or proactive investigation – Proactive-Undercover officers seeking CSAM images online and capturing IP addresses After IP identified, typical subpoena to provider to obtain name/address; Search Warrant for seizure of digital evidence Computer forensic tools pull images from allocated and unallocated space – Analysts review materials according to bounds of the search warrant CSAM INVESTIGATIONS Lab work to categorize each of the images via known CSAM hash sets (From NCMEC, Interpol, others) and analyst review – Cat 1 – Known CSAM; possibly known victim – Cat 2 – Suspected CSAM; nudes showing genitalia – Cat 3 – Suspected CSAM; age indeterminate – Cat 4 – Computer and hand-generated images Report with images provided to prosecutors Vast majority of cases reach a plea deal VICTIM S QUESTION??? Why is CSAM illegal to possess? REVICTIMIZATION Never ending process of victimization – Initially victimized when sexual contact occurs – Every time photo is traded and viewed child is revictimized Child Sexual Abuse survivors often say the hardest part of the victimization process is the revictimization – Goes long into adulthood – Concern that they will be recognized Resources available to survivors: – Restitution – Removal of content A LETTER FROM A SURVIVOR “When I was a minor a family member went to federal prison for abusing me most of my early childhood and sharing images of the abuse online. About five years after the arrest, I randomly received a letter in the mail. It said that they had caught someone with the images of me. I was shocked because I hadn’t heard from anyone about my case in all those years. They were notifying me that I could file for restitution because of the law about notifying me every time someone was caught. I was in a dangerous place with my mental health even before the notifications. When I started to receive multiples notices a week, I asked for them to stop contacting me. I was young, had no idea how I could file for restitution, and could not mentally handle knowing how often people were caught with images of my abuse. A couple years later an attorney contacted me who had heard about my case and wanted to help. I wanted to learn more but I was worried about collecting restitution from people who had hurt me. I didn’t want to feel like I was getting paid for their continued abuse of me. I was so thankful that my attorney reached out and was able to explain that this was the price that offenders should have to pay for what they have done to me. Once I saw how I could finally get therapy and help if we collected restitution I was fully on board. I liked the idea of holding people accountable for their actions. I also liked that it was warning other people that they will be held liable for their actions if they look up these kinds of images. It shows that this is not a victimless crime.” NCMEC – THE VICTIM Reports of online enticement increased by more than 300% from 44,155 in 2021 to 186,819 in 2023. 12.7 million CyberTipLine reports of suspected child sexual exploitation between 1998- 2016 – 10.2 million reports in 2017 Now at 36.2 million reports in 2023 alone There were 105,653,162 data files reported to the CyberTipline in 2023. NCMEC – THE VICTIM Prepubescent children are at the greatest risk to be depicted in CSAM When boys are victimized, they are much more likely than girls to be subjected to very explicit or egregious abuse On average boys depicted in CSAM are younger than girls and more likely to have not yet reached puberty Overall, content has become more egregious and explicit as time goes on – Penetrative sexual activity between adults and children and Sadism or bestiality have trended upward over the years OFFENDE RS NCMEC – THE OFFENDER 82% male 9% female 9% gender undetermined 98% of offenders were seemingly unknown to the child in real life, while 2% were likely known – Of the known offenders, 53% were family members and 56% were male The most common familial offenders were parents or step parents (57%) or siblings (37%) NCMEC – THE OFFENDER 60% of offenders wanted sexually explicit images of children 30% wanted to meet and have sexual contact with children 8% wanted to engage in sexual conversation/role- play with children online 2% wanted to acquire financial gain The Online Enticement of Children: An In-Depth Analysis of CyberTipline Reports. 2017 OFFENDERS – THE COLLECTION Highly important to offender Constantly growing Well maintained, often categorized Almost never destroy a collection Kept in a controlled space so they are ready and secured – Used to be commonly stored on hard drives, but these are easily removed and searched by LEOs – Cloud storage, flash drives, and encryptions are commonly used today Some services will not cooperate with LEOs Share/Trade with others Easy access to the collection OFFENDERS – EXPLANATIONS FOR USE OF CSAM As a means of achieving sexual arousal, where images were used as either a substitute or a stimulus for contact sexual offending. As a source of pleasure through collecting a complete series of images. As a means of enabling online social relationships with like-minded others. As a replacement for absent or unsatisfying relationships in the real world. As therapy for exploring and dealing with one’s problems. As a manifestation of the addictive properties of the internet. OFFENDERS – USE OF CSAM Permanent record of abuse For arousal/gratification/personal sexual stimulation Lowers children's inhibition – Next step in offending; sexualizing the child – As an instructional tool about sex for the child Validate and legitimize belief systems Trade or sell for profit Blackmail victims and co-offenders THINK. PAIR. SHARE. What % of CSAM possessors have had a contact offense with a child? THE ‘BUTNER STUDY” – HERNANDEZ & BOURKE Study of federal inmates convicted of CSAM possession – 76% eventually admitted to hands-on child sex abuse that was unknown to law enforcement – Occurred during mandatory therapy sessions Lead to a focus on polygraph interviews for CSAM suspects & arrestees UPDATED STATISTICS UPDATED STATISTICS CYBERSEX ADDICTION CYBERSEX ADDICTION Cybersex Addiction: the use of digitized sexual content (visual, auditory, or written) obtained either over the Internet or as data retrieved by a computer, for the purpose of sexual arousal and stimulation. – Schneider (2000) – The increasing role of computers in homes and offices has lead to the new problem of cybersex addiction. CYBERSEX ADDICTS Three Types: 1. Recreational – Curiosity or entertainment driven – No problems associated with behavior 2. Sexually Compulsive – Individuals who spend at least 11 hours / week on cybersex activities CYBERSEX ADDICTS 3. “At Risk” User – Individuals even with no prior history of compulsivity – When faced with accessibility, affordability, and anonymity of the computer and Internet they put significant amounts of time and effort into cybersex activities. These three factors of the Internet: – Accelerate these activities – Addiction can arise without prior sexual addiction COMPULSIVE BEHAVIORS The difference between a compulsive and a non-compulsive user lies in the inability of the former to stop the activity and control its intensity when he/she chooses to do so (Kafka, 1993; Schneider, 1994). Cooper (1998) defines sexual compulsion as an uncontrollable urge to perform an irrational sexual act even if the individual is well aware of its negative consequences. TRIPLE A ENGINE Affordability, Accessibility & Anonymity …of cybersex leads to rapid progression (Cooper’s “Triple A Engine”)  For those with pre-existing sexual compulsive behaviors, the Triple A Engine can significantly speed up the progression  It can facilitate the expansion of the addict’s interest into areas that initially would have been taboo or repulsive,  Example: images of SM, bestiality & CSAM become acceptable  *Similar to the movement of pot to cocaine to crack or heroin CONSEQUENCES Cybersex addicts: Negative effects on self-esteem, emotional state, job performance, and couple relationships. Could lead into crossing sexual boundaries (i.e., child pornography, incest, bestiality, etc.) Desensitizes individuals to otherwise deviant behaviors. RECOVERY Attending 12-Step sex addiction meetings daily contact with a 12-Step sponsor Individual & couple counseling 30-day inpatient treatment programs Professional medical treatment – Therapists DISCUSSION Do you think the accessibility, affordability and the anonymity of the internet puts individuals at risk for illegal sexual behaviors such as child online sexual exploitation or pornography? Why? How can understanding cybersex addiction and recovery processes aid law enforcement in combating illegal sexual behaviors? Explain. IMPORTANT  Case studies suggest that compulsive sexual offenders / predators are more patient and calculating than traditional street criminals  Setting up the contact offenses could take months to years  Hard to create protection programs for children based off of past behavior  Protection programs must protect “access” to children Reference Slides YISS-3 http://www.unh.edu/ccrc/projects/yiss3.html Goal: help reduce youth risk of victimization through technology use (i.e., Internet, text messaging, webcams) 1. Continue to track existing trends in the number and types of threats youth encounter using technology 2. Assess risks to youth of new behaviors and activities, including youth creating and distributing explicit images of themselves and/or peers 3. Assess benefits and utilization of safety programs and technologies 4. Identify activities and behaviors most closely associated with risk. Trends in Youth Internet Victimization: Findings From Three Youth Internet Safety Surveys 2000 – 2010 http://www.unh.edu/ccrc/pdf/YISS%20Trends%202 011.pdf Methodology Report: http://www.unh.edu/ccrc/pdf/YISS_Me thods_Report_final.pdf YISS FINDINGS CONTINUED Increase in reports of online harassment 6% in 2000 9% in 2005 11% in 2010 Decline in reports of unwanted exposure to pornography 24% in 2005 23% in 2010 *Side Note – there had been an increase between 2000 and 2005 (25% to 34%) A decline in distressing and aggressive sexual solicitations Only seen among girls General and distressing online harassment increased significantly for girls only Increased 50% for girls – 10% in 2005 to 15% in 2010 Significant declines in reports of unwanted exposure to pornography and distressing exposures occurred equally for both boys and girls TRENDS WITH AGE The declines in unwanted sexual solicitations occurred primarily for younger adolescents 10 –12 year olds (63% decline between 2005 and 2010) 13–15 year olds (52% decline between 2005 and 2010) Youth aged 16 and 17 years No significant decline in overall sexual solicitations Significant decline distressing sexual solicitation – from 6% in 2005 to 3% in 2010 Aggressive sexual solicitations declined by 46% among youth aged 13-15 years, from 5% in 2005 to 3% in 2010 Between 2005 and 2010 No significant difference of online harassment * Overall, unwanted exposure to pornography, as well as distressing exposure, declined primarily for older adolescents aged 13-15 years and 16-17 years. Unwanted exposure to pornography was almost reduced to half for these groups, from 9% in 2005 to 5% in 2010 * ONLINE VICTIMIZATION According to the Youth Internet Safety Surveys (I, II, & III)- there has been…  Unwanted sexual solicitation had a 50% reduction in 2010 (1/10 youth) compared with the YISS in 2000 (1/5 youth)  Unwanted sexual solicitations declined from…  19% in 2000  13% in 2005  9% in 2010  Total of 50% decline in reports of this problem between 2000 and 2010  Aggressive solicitations (in which offline contact was attempted or made) did not change significantly DEPTH OF THE PROBLEM: TIME SPENT ONLINE During the first two (2) waves of the YISS, smartphones were less prevalent – Today, over half of U.S. children have a smartphone by the age of 11 84% of teenagers have their own phone 1 in 5 children (6%) have a phone by the age of 8 45% of teens say they are “almost constantly” on the Internet POPULATION ESTIMATES OF EFFECTED YOUTH YOUTH INTERNET SAFETY SURVEY (YISS)  Sexual solicitations and approaches: Requests to engage in sexual activities or sexual talk or give personal sexual information that were unwanted or, whether wanted or not, made by an adult.  Aggressive sexual solicitation: Sexual solicitations involving off-line contact with the perpetrator through regular mail, by telephone, or in person, or attempts for off-line contact.  Unwanted exposure to sexual material: Without seeking or expecting sexual material, being exposed to pictures of naked people or people having sex when doing online searches, surfing the Web, opening email or email links.  Harassment: Threats or other offensive behavior (not sexual solicitation) sent online to the youth or posted online about the youth for others to see. Not all such incidents were distressing to the youth who experienced them.  Distressing incident: Episodes where youth rated themselves as very or extremely upset or afraid as a result of the incident.

Use Quizgecko on...
Browser
Browser