The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society A thesis submitted to the Center for Global Affairs at New York University in partial fulfillment of the requirements for the degree of Master of Science in Global Affairs By: Ericka Carolina Rodas Concentration: Human Rights and International Law Thesis Advisor: Sylvia Maier, Ph.D. New York, NY Spring, 2014 Acknowledgements: I would like to extend my sincere gratitude to my advisor Dr. Sylvia Maier for her extensive guidance and support throughout the research and writing of this project. I would also like to extend my thanks to the staff and board of ECPAT-USA for having offered me an internship opportunity for the academic year 2013-2014. I was able to conduct research through ECPAT-USA and had access to existing knowledge in the field which contributed significantly to the writing of this thesis. Rodas, Ericka Carolina 1 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Contents Introduction .................................................................................................................................................. 2 Appeal of the Internet for Traffickers and Buyers ........................................................................................ 5 Appeal of Internet to Children and Teens..................................................................................................... 5 Advances in Technology................................................................................................................................ 7 How Should One Refer to the Criminals Who Engage in this Crime? ........................................................... 9 Cyber -Sex-Trafficking: As Harmful as “Traditional” Sex Trafficking ........................................................... 12 Type of Services to be Given Child Sex-Trafficking Victims and Potential Victims ..................................... 18 How Can the U.S. Limit Access to Pornographic and Sexually Explicit Material of Children without Violating the Right of Free Speech? ............................................................................................................ 27 How Can Civil Society Be More Involved in Reducing this Crime? ............................................................. 39 Trauma Effects on Children-Boys Can be Victims Too- Eliminating Gender Bias ....................................... 64 Viewing pornography and child abuse imagery by youth affects their future relationships and their development ............................................................................................................................................... 66 What to do When the Perpetrator is the Child’s Parent and the Buyer is a Teenager?............................. 68 Conclusion ................................................................................................................................................... 69 Bibliography ................................................................................................................................................ 71 Rodas, Ericka Carolina 2 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Introduction In the year 2014, human trafficking is still prevalent. Traffickers around the world abuse vulnerable individuals and rob them of their freedom to be safe from harm despite the international and national laws that are in place. In particular, sex trafficking, a subset of human trafficking is a form of discrimination in which people in power, typically men, take advantage of the vulnerabilities of women and children— though men are also victims—to exploit them for their services, whether for labor and/or sex. In addition, deception, fraud, force, and coercion are often used to recruit victims (UNODC 2000, Article 3(a)) although that should not be the main factor when investigating and prosecuting these crimes; for children proof of the threat or use of force or coercion is not required. Already a hidden crime due to the difficulty of identifying the traffickers and victims, the advances in internet technology have offered traffickers a new mechanism to escape detection from law enforcement. Internet offers affordability, accessibility, and anonymity –the “Triple-A Engine Effect” (Manning 2006, 133). Shawn Henry, former Executive Assistant Director of the FBI informed the public that the Internet, despite its contribution to knowledge, has many setbacks. “At any given time, there are an estimated 750,000 child predators online — and they all have a key to your house via the Internet” (FBI News Video 2011, Shawn Henry). As a result, it is time for individuals to be more cognizant of the importance of internet safety in order to combat cyber-sex trafficking. In May 2013, the use of the Internet to facilitate sex trafficking came to the fore again with the case in the Philippines in which three girls were rescued from a ring forcing them to perform live sex shows via the Internet for customers. Often the customers-- mostly Americans and Europeans--paid $56/minute for the girls to perform live sexual acts (web-cam sex) based on the customers’ typed requests transmitted via computers (de Leon 2013). In the case of the three Rodas, Ericka Carolina 3 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society girls, who were eight years old when the abuse started, U.S. agencies, the Philippine National Police and the non-profit Visayan Forum Foundation received tips on one of their frequent customers, Jeffrey Herschell from Washington, Pennsylvania with the help of the victims. This information helped law enforcement arrest and sentence the offender to 12 years in federal prison (Coorlim 2013). The methods of recruitment of the victims resemble that of “traditional” sex trafficking. Traffickers prey on an individual’s poverty, runaways, kidnapped children, and individuals from abusive homes. Also, traffickers rely on a child’s negligent use of the Internet to lure them into their dangerous world; children often do not realize that safety precautions should be used on online because they think it is a safe place to share one’s personal information. It grants its users mobility and the ability to use more than one mobile device, thereby making it borderless and difficult for law enforcement to prosecute traffickers and buyers. Moreover, if the sexual encounter is not recorded, it will be difficult to trace the IP address and to prove that a crime has been committed. Since this is a relatively new phenomenon there is no standard definition for this besides “cyber mediated crime” (Davis 2012, 276) or “child abuse imagery” (Smolenski 2013, 2). I will be examining cases and laws in the Philippines, a source country, and the United States as a source, transit, and destination country; these two countries are reflective of where current demand and supply originate for this heinous crime. The Philippines is more advanced in its human trafficking law since it added Section 3g: Sex Tourism, Section 3h: Sexual Exploitation and Section 3j: pornography facilitated by “whatever means” in Republic Act 10364 of 2012. The U.S. however, failed to enact House Resolution 2801 on Internet Facilitated Human Trafficking introduced in September 2011. This is may have been caused by lack of Rodas, Ericka Carolina 4 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society understanding of the issue. The committee chair of the House Energy and Commerce House Judiciary has not given approval to refer the bill to move past the committee. With the ever increasing importance and use of the Internet, child rights advocates hope that this Bill will be passed and approved in Congress; it would establish a task force for the study of the causes and effects of this crime and produce an effective response and prevention methods. Questions that will be answered in this project are the following: How can we redefine cyber-sex trafficking in order to make it a crime “worthy” of being investigated? Law enforcement is often concerned with traditional crimes and might not have the resources necessary to investigate and prosecute the crime. Traffickers have modified their methods of recruitment and business with potential buyers. As they realized that law enforcement began monitoring the streets, they started to use the Internet as a means to facilitate their illegal activity since it guarantees anonymity of the user. Therefore, law enforcement needs to be informed and trained on cyber-sex trafficking to be able to combat it effectively; otherwise traffickers will continue to sexually exploit children online with impunity. 2. Given the failure of U.S. Congress at present to enact H.R. 2730 “Strengthening the Child Welfare Response to Human Trafficking Act of 2011” and H.R. 2801 “E-SAFETI Task Force Act” how can the U.S. limit access to pornographic and sexually explicit material of children without violating the right of free speech enshrined in the 1st Amendment of the U.S. Constitution? 3. How can the U.S. and the Philippines collaborate with different sectors of civil society: parents, educators, children themselves, and law enforcement (including adequate resources) to prevent this crime from happening in the first place? Rodas, Ericka Carolina 5 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Appeal of the Internet for Traffickers and Buyers With progress comes technological innovation. Although this is great news for our fastpaced society, it also allows traffickers to recruit victims on social media sites such as Facebook, Twitter, Instagram, Tumblr, Skype, Snapchat, and Oovoo among many others by gaining their trust by posing as a child/teen with similar interests and problems. With the internet and social media, one does not necessarily have to have access to a computer to speak with an online friend; that can be done with smartphones, iPads, iPods, and tablets, as well as anywhere there is Wi-Fi access. Therefore, it is difficult for law enforcement to identify traffickers, buyers, and victims if there is no constancy in the device used. Furthermore, the danger of live transmissions of sex acts is that it is not recorded. By the time law enforcement arrive at the scene, the crime would have already been committed and the trafficker/buyer can easily deny that any harm has been committed. Law enforcement would have to catch them in the act but that would require knowing the inside details of the arrangement and/or would have to find direct communication: e-mails, phone calls, or texts between traffickers and buyers confirming the operation and payment details. The Internet guarantees safety to traffickers and buyers because it is borderless, as already stated, and individuals can presume many identities. In order to defeat them, technological innovations need to advance in law enforcement’s favor. Appeal of Internet to Children and Teens In addition, the Internet’s anonymity has led it to be a favorite source of communication among youth. This resonates especially with those who feel socially excluded in society or who are introverted. Hence, unfortunately a youth feels at home while on the various internet platforms rather than the actual home. Jan Willem Duyvendak, in his book The Politics of Home argues that individuals from all societies struggle to feel at home somewhere. When they do find Rodas, Ericka Carolina 6 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society a place that they identify as home, they might personalize it only to find that they do not belong there (CGA Lecture November 4, 2013). The traffickers use this need to feel at home to target children who come from a troubled family life, poverty, abusive homes, and runaways. Moreover, social media sites and chat rooms often pressure individuals, especially youth to assume a different identity in order to please others and to gain popularity. Nancy Baym in Personal Connections in the Digital Age notes, “In many online environments, people seek to individualize themselves as different from the other participants (Baym 2010, 108). Therefore, the lack of internet barriers when communicating contributes to the lack of internet safety practices by youth. In particular, “When friends in an SNS can be strangers, admirers, confidants, coworkers, family, and a host of other relationship types, yet all be called same thing on site, it triggers inevitable confusion” (Baym 2010, 145). Furthermore, the Internet is appealing to youth because they are able to meet many people online with similar and different interests. They are fast to judge that they can befriend someone solely because they like the same artist or actor. For a child who has trouble socializing at school and in society in general, this provides ample opportunity to feel accepted and to be taken advantage of by traffickers. Perpetrators offer a sense of security and affection to youth who need it; they learn the various likes and dislikes of their targeted victims and pretend to have undergone the same experiences as them to gain their trust. As it is argued, “When people meet one another online, especially in media with few identifying cues, they often seem to like one another more than they would if they had met in person” (Baym 2010,126). With the Internet, there is not the pressure to say the right thing right away because there is time for reflection. One can respond to a Facebook message hours to a day later and one will not question it. Rodas, Ericka Carolina 7 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society As a result, youth in particular do not question the identity of individuals on the web, leading them to befriend others without any demonstrable urgency to verify this information. As noted by Dombrowski, Gischlar, and Durst, “Participants sometimes consider these online friends to be closer and more accepting of their true selves” (Dombrowski et al. 2007, 158). When there are direct face to face first time encounters there exists a greater sense of security and safety; this is due to the fact that there is a human element that is absent in online communications which is filled with words and pictures on the screen. The anonymity of the Internet is beneficial to the perpetrator. Dombrowski et al. argue “as these networks were developed to obscure the identity of participants, they offer effective anonymity for those who wish to disseminate pornography” (Dombrowski et al. 2007, 158). Advances in Technology Since traffickers often use more than one mobile device to escape detection, law enforcement needs all the help it can receive from technology experts. Recently, on November 4, 2013, Terre des Hommes in the Netherlands devised a creative way to catch online predators who engage in webcam child sex tourism. They established a 3-D model of a Filipino girl nicknamed Sweetie to chat with predators online. The traffickers and buyers truly believed Sweetie was an actual ten year-old girl and sent sexually explicit messages in an attempt to further the encounter. This mechanism of using technology before the trafficker harms a child is innovative and makes the day where all children will be safe from sexual exploitation closer (Terre des Hommes 2013). Moreover, it demonstrates the increase in awareness of the issue and the ability from individuals in the technology sector to collaborate with law enforcement to facilitate the tracking down of perpetrators. It also demonstrates the naivety of traffickers who perceived Sweetie to be real and continued to chat with her unsuspectingly. Rodas, Ericka Carolina 8 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society In addition, the U.S. based NGO THORN represents another technology based organization that will help law enforcement. The organization partners with nonprofits and academic institutions to study the role technology plays in child sex trafficking and online exploitation. The THORN Technology Task Force consists of more than twenty technology companies including Microsoft, Twitter, Facebook, Google, and Yahoo which share their company’s latest innovations to develop tools to identify both victims and perpetrators (THORN 2014, “Task Force”).With that shared information on best practices, THORN strives to catch the offenders and identify victims at the source (THORN 2013, “Tech Task Force” 0:55). THORN’s Shared Hash initiative allows for technology companies to disseminate information on child pornography by sharing digital fingerprints of abuse images via a cloudbased tool. As a result, the identification, removal, and reporting of child pornography to law enforcement are increased (THORN 2014). Moreover, its deterrence program, led by technology experts, seeks to discourage individuals from sexually exploiting children. Ron Conway, Founder of SV Angel and Founder of the THORN Tech Task Force explains, “The software that we put in place deters these perpetrators from taking action. We go and we message them and encourage them to go seek help” (THORN 2013, “Our Work—Deterrence” 0:48). As of September 2013, Homeland Security Investigations from ICE collaborated with Operation Predator to create this new smartphone application in which people can report tips on unknown or fugitive predators 24/7 by phone or online. Representatives from ICE report, The Operation Predator App enables those who download it to receive alerts about wanted predators, to share the information with friends via email and social media tools, and to provide information to HSI by calling or submitting an online tip. Additionally, the app enables users to view news about arrests and prosecutions of child predators and additional resources about ICE and its global partners in the fight against child exploitation (ICE News Release 2013). Rodas, Ericka Carolina 9 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Although this is great news, International Organization for Adolescents (IOFA) recently shared that traffickers are getting smart and are avoiding law enforcement by the new phenomenon of “chatlining.” They have realized that law enforcement and the anti-trafficking community are monitoring their activities on the Internet and therefore, they have found a safe method of communication. Traffickers and perpetrators use cell phones to complete business transactions. Traffickers will only reveal the age of victim and if the buyer is interested he will respond with buying price. If trafficker agrees on price, they will agree on a meeting place (“Responding to Child Trafficking in Westchester County Agenda” IOFA Training September 25-27, 2013). The International Organization for Adolescents is also currently in the process of piloting a scientifically validated screening tool to identify child victims of sex and labor trafficking. This is part of the Child Right Model: Building the Child Welfare Response to Child Trafficking; there still exists a stigma to sex trafficking victims, even if they are minors. Therefore, there is an urgent need to have all victims treated as victims and not as criminals (IOFA Conference, January 28, 2014). How Should One Refer to the Criminals Who Engage in this Crime? Should these types of offenders, who violate the freedom and dignity of children, be referred to as pedophiles or child molesters? Kenneth V. Lanning argues that society should not use the term interchangeably. He defines pedophilia as “a diagnostic term referring to persons with recurrent, intense sexually arousing fantasies, urges, or behaviors involving prepubescent children…” (Lanning 2012, 74). Furthermore, he clearly states that “a child molester is an individual who sexually molests children. A pedophile might have a sexual preference for Rodas, Ericka Carolina 10 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society children and fantasize about having sex with them, but if he does not act this fantasy out, he is not a child molester (Lanning 2012, 74). Although one can understand these distinctions, how can one ensure that both pedophiles and child molesters receive the help they need to avoid harming children? Furthermore, how does one categorize those individuals who only engage in sexually explicit conversations with young children and/or ask the child to perform sexually explicit acts via the webcam? Even though there is not any physical touching involved it is as if the encounter was held in person. The child is sexually molested by words and being ordered to perform sexual acts. He or she feels ashamed, scared, and distrustful of adults in general; the same effects as in traditional sexual exploitation cases. Therefore, the term child molester has to be employed in cases involving computers and the Internet as well. Otherwise, it will signify to internet “abusers” that this behavior is acceptable and an easy alternative to physical molestation and harm. The community, especially law enforcement, social service providers, and educators need to send the message that children are not to be harmed in any form. If they are aware that the community is being vigilant they will think twice before resorting to the Internet. It is never acceptable to endanger the welfare of the child regardless of the circumstances. Children have their entire lives ahead of them and it would be unjust to deny them their dignity and freedom. However, the situation becomes complicated when the alleged pedophile and/or molester has himself/herself been a victim of sexual abuse/pornography when younger. Should they be considered less “guilty” because they themselves have been victimized? Or should they be considered just as guilty as or guiltier than the traditional offender because they should have Rodas, Ericka Carolina 11 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society known better? This question is currently up to debate with the case of former chief of staff to Senator Lamar Alexander (R-Tennessee) Ryan Loskarn. Law enforcement arrested the seemingly law-abiding Loskarn on December 11, 2013 at his home for possession of child pornography. Officials reported to have found two hundred child pornographic videos on his hard drive (Sullum 2014, 1-2). Many citizens quickly questioned the motives behind Loskarn’s actions. Criticism towards the former chief of staff also was rampant in many conversations. The increased emphasis on this case originated in the fact that Loskarn violated the law despite being a representative of the law. Many expressed their shock in comments such as “He should have known better. What’s wrong with him? How can it be? He’s a chief of staff.” These commentaries are common among children’s rights advocates who simply cannot understand why anyone would harm a child intentionally or non-intentionally. However, the answer is not always as simple as it seems and should serve as a lesson for children’s rights advocates. As evidenced by law enforcement that arrested Loskarn, he did not actually produce the child pornography; he only downloaded and viewed it on his computer; that in and of itself is considered a less severe crime since there has not been any in-person contact. He faced up to eight years in prison for simple possession and viewing of child pornography (Sullum 2014, 2). Nevertheless, the United States finally found the cause behind the former chief of staff’s actions on January 23, 2014 when he took his life. In a suicide note he explained that he did not intentionally seek child pornographic images on the Internet. It started with a simple search for music on a peer-to-peer network. The reason why he did not report it when he first came across it? “I found myself drawn to videos that matched my own childhood abuse. It’s painful and humiliating to admit to myself, let alone the whole world, but I pictured myself as a child in the image or video. The more an image mirrored some element of my memories and took me back, Rodas, Ericka Carolina 12 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society the more I felt a connection” (Jesse Ryan Loskarn 2014, 1). Unable to overcome his childhood sexual abuse as a child, Loskarn found some strange comfort viewing child pornography. For him, it represented a form of connecting with the abused children because he felt their pain and also was a form of healing for him in some matter since he never revealed his childhood abuse before speaking with his psychiatric counselor in prison. Ryan Loskarn himself recognized that his abuse did not justify his actions but rather provided an explanation. Perhaps the healthcare community should devise better ways to help child abuse victims “heal.” His apology to the children he hurt is touching. “And last, to the children in the images: I should have known better. I perpetuated your abuse and that will be a burden on my soul for the rest of my life” (Jesse Ryan Loskarn 2014, 2). The lesson from this tragic story is that legislation should be reformed to assign prison sentences according to the gravity of the crime committed. Viewing and/or distributing child pornography is a crime but not as serious as meeting a potential victim online and luring them to engage in sexual activities either through webcam or in-person. Cyber -Sex-Trafficking: As Harmful as “Traditional” Sex Trafficking Cyber-sex-trafficking is a relatively new phenomenon which requires more in-depth study in order to increase and ameliorate prevention efforts. As a result, this illegal act is known by many terms: cyber-sex-trafficking, child webcam sex tourism, or even “internet-facilitated sex-trafficking” (H.R. 2801, Introduced September 6, 2011). What these terms have in common is the reference to the Internet. The difference with previous years is that in addition to being able to sell children on websites such as Backpage.com, traffickers can now provide to their clients child sexual services via live transmissions such as webcam, various chat rooms, and social media outlets. Rodas, Ericka Carolina 13 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society The message needs to be made to law enforcement officials and representatives that this is not a crime that occurs occasionally. It happens every day on several electronic devices, especially if the perpetrator does not record or save the encounter. The internet task force mentioned in H.R 2801 to study and make recommendations for the prevention of this crime is an excellent strategy; nevertheless, it is essential that more components be included in the definition of internet-facilitated human trafficking. Currently, H.R. 2801 defines internet-facilitated human trafficking as “the use of the internet to engage in severe forms of trafficking in persons” (H.R. 2801, 2011, G (1)). This definition is an excellent foundation but needs more in-depth explanation. It does not define the many ways that the Internet can be used to condone and promote the commercial sexual exploitation of children. Paragraph 1 of the definition can include “Internet used to exclusively sell children online to potential buyers.” Part 2 can include “Internet used to engage in sexually explicit conversations and/or sexual acts via the Internet (webcams, social media, and chat rooms).” Furthermore, Paragraph 3 of the definition can include “use of the Internet to view and/or distribute child pornography. This does not necessarily include use of the Internet to engage in sexual explicit activities via webcam and/or chat. That is included in Paragraph 2 of this definition.” With this extended and detailed definition, society is better prepared to respond to potential and actual cases of internet-facilitated human trafficking. The Internet could be misused in many ways just as it could prove to be useful for benevolent purposes. The internet task force, if it launches, will be able to analyze these three components of the definition and find different and common characteristics for each. In addition, the various sectors represented in this potential internet task force will offer many suggestions and opportunities for improvement in the Rodas, Ericka Carolina 14 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society response to this crime, especially in terms of technology innovation. The goal for this task force is to “study and make recommendations to prevent internet-facilitated human trafficking” (H.R. 2801, 2011, Section 2(a)). The twenty members of the task force include representatives from the Department of State, Federal Communications Commission, Federal Bureau of Investigation, Immigration and Customs Enforcement, Administration for Children and Families, Department of Justice, Department of Labor, Secretary of State, companies fighting human trafficking, one of which represents an internet company, non-profit organizations, academic institutions, State Attorney General’s office, a victim of severe forms of human trafficking, and members from the public or private sectors (H.R. 2801 2011, Section 2(b)). These representatives from different sectors of society will bring their individual expertise to reduce cases of human trafficking facilitated by the Internet. It is also assumed that this task force will seek to educate youth on internet safety as part of their recommendations to prevent this crime. A multi-prong approach is needed to prevent internet- facilitated human trafficking. One can catch the predators in action, but youth need to be educated and empowered as well in order to dissuade traffickers from recruiting them. The ever evolving technologies today require a task force that is cognizant of all changes and updates in technology in order to outsmart the traffickers. In turn, the response to human trafficking of minors needs to be improved in general as well. There is this general misconception that anyone who engages in sexual activity of any kind, including prostitution is guilty. This perception is dangerous as it does not take into consideration the many causes of human trafficking discussed previously. Not every individual willingly engages in prostitution. For children, it is never a free choice. They are essentially robbed of their freedom and dignity. A child does not have the capacity to understand and to Rodas, Ericka Carolina 15 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society consent to sex. Protecting children should be the priority of every citizen but especially that of law enforcement, social service providers, educators, and health care providers. An attempt has been made in Congress to ameliorate the child welfare response to human trafficking in H.R. 2730. Originally introduced in August 1, 2011, and referred to the House Ways and Means Committee, it still needs to be passed by the full Congress. Stephanie Richard, Policy and Legal Services Director, at the Coalition to Abolish Slavery and Trafficking argued that “The United States government needs to do better at utilizing existing state resources to combat modern-day slavery in our own backyards. HR 2730, as introduced by Representative Bass will assist both labor and sex trafficked children be identified and provided specialize assistance by our State child welfare agencies” (U.S. Representative Karen Bass Press Release 2011). However, Faiza Mathon-Mathieu, Director of Public Policy and Government Relations at ECPAT-USA explains that the process for new legislation to become law can be long There has been a growing interest in legislation that would address the role between the child welfare system and child trafficking, specifically child sex trafficking. In the most recent session, the 113th Congress had two child welfare focused child trafficking bills under consideration in the House and the Senate. Both the Senate and the House Finance and Ways and Means committees respectively passed in mark-up one of the bills that extends protections to child sex trafficking victims in the child welfare system. This is quite significant progress (Mathon-Mathieu 2014). This act if passed will focus on both preventing and responding effectively to cases of child trafficking. Section Two of the Act calls for the Secretary of Health and Human Services to develop effective guidelines for child welfare agencies to identify a potential child trafficking situation and to respond effectively to it. In addition, the guidelines “… should include advice on how State and local law enforcement agencies may collaborate proactively with non-profit organizations on how to manage cases involving a child who is such a victim…” (H.R. 2730 2011, Section 2(b)). Child rights advocates might argue that the most notable inclusion in this Rodas, Ericka Carolina 16 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society legislature is the provision of residential safe havens and extending services to youth victims until the age of 21 (H.R. 2730 2011, Section 2(c) and 2(f)). This emphasizes the need for the safety and security of youth who are either at-risk or are victims of human trafficking. Experts in the field are still gathering evidence as to the number of cyber-sex trafficking victims as it is hard to trace the origins and identities of traffickers and victims. However, Operation Fair Play and Operation Roundup, two law enforcement programs in Wyoming and Palm Beach County, Florida respectively have found that since 2009, there have been “over 20 million different IP addresses offering child pornography files (pictures, videos) on a Peer-to-Peer file-sharing network” (U.S. Department of Justice 2010, 12). This statistic is notable and leads law enforcement and child trafficking experts to believe that the statistic for minor victims is just as high. Although federal legislation on this issue still needs to be strengthened, local efforts have been successful. In the Philippines, law reform on human trafficking has already been enacted since 2012. This represents an important advancement in the anti-trafficking world as it recognizes victims and survivors of this crime as individuals who need to be protected and given adequate services. Section Three of Republic Act 10364 defines trafficking in persons as the recruitment, obtaining, hiring, providing, offering, transportation, maintaining, harboring, or receipt of persons with or without the victim’s consent or knowledge, within or across national borders by means of threat, or use of force, or other forms of coercion…abuse of power or of position, taking advantage of the vulnerability of the person… (Congress of the Philippines 2012, Section 3(a)). This revised definition in the Filipino law demonstrates their understanding and commitment to the cause. It is justly emphasized that the initial consent of the victims does not determine the victim’s culpability in the crime. As a general commentary, it is absurd to believe that a child will willingly consent to being subjected to this inhumane practice of selling one’s body for sex. Rodas, Ericka Carolina 17 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society They are still developing and do not understand fully what a sexual relationship signifies. Section 3(b) of the Act confirms that children should be automatically considered victims due to their diminished capacity to defend themselves and to understand what is occurring. Moreover, the inclusion of Sex Tourism, Section 3(g), Sexual Exploitation, Section 3(h) and Pornography, Section 3(j) to the definition of sex trafficking is important in mitigating the number of cases of sex trafficking, sexual exploitation, and that of cybersex-trafficking. The Filipino government recognizes that the means of sex-trafficking have evolved. In order to effectively combat this crime, we need to catch up with the traffickers and buyers. The definition of pornography in Republic Act 10364 states, “refers to any representation, through publication, exhibition, cinematography, indecent shows, information technology, or by whatever means, of a person engaged in real of simulated explicit sexual activities or any representation of the sexual part of a person for primarily sexual services” (Congress of the Philippines 2012, Section 3(J)). Therefore, the Philippines has started to concentrate their investigation efforts towards the Internet as that is where most of the transactions and encounters take place-a safety net. As in the provision provided in the American law, this revised AntiTrafficking law in the Philippines includes a provision for programs for trafficking victims which include rehabilitative services (Congress of the Philippines 2012, Section 15) and an InterAgency Council Against Trafficking which will study and provide recommendations of this crime (Congress of the Philippines 2012, Section 21). Rodas, Ericka Carolina 18 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Type of Services to be Given Child Sex-Trafficking Victims and Potential Victims It is justly argued that services for at-risk children and actual child victims need to be reformed. The rehabilitative services and shelter are essential but more needs to be included if one wants to fight trafficking facilitated by the Internet. Children and youth need to be taught a course called “The 411 of Internet Safety” in which at-risk and trafficking victims will be taught the importance of exercising caution when using the Internet. This course will make them empowered to make smart decisions when online. Most importantly, children will learn that if they ever feel uncomfortable when interacting with someone online, they should immediately confide in a trusted adult. Furthermore, children should be reminded that nothing is ever their fault if they are victims to this crime or if they are at-risk. Their value as an individual human being to their communities, families, friends, and to the future of society should also be emphasized. As Paul Wolters, from Terre des Hommes in the Netherlands explained, “Give children the support and the confidence to report any abuse or attempted abuse to their parents, teachers or anyone they trust. Make sure they understand it is not their fault if they fall victim to online abuse: they are victims, not perpetrators (many children refuse to report abuse because they are ashamed and often even feel they are co-responsible)” (Wolters 2014). Therefore, it is essential that compassion and trust be displayed towards the children in order for them to feel truly safe. In addition, self-esteem seminars need to be also implemented as required services for atrisk and trafficked children online. These seminars will be implemented as part of the rehabilitative services offered by social service providers to minors in their programs. The exact structure of the self-esteem seminars is discussed in the following paragraphs. However, the Rodas, Ericka Carolina 19 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society success of this program will be assessed by observation of the participants’ subsequent interactions with each other and other individuals not in the program. Essentially, it will ensure that children become active members of society. As mentioned, children need to understand their value as individual human beings. Since traffickers pursue their victims based on their emotional stability and level of self-esteem, this is crucial for services to be beneficial. Dombrowski et al. recount a study by Finkelhor et al. which focused on online sexual encounters and found “that one in five young internet users reported being solicited sexually within a year’s time and that one in four of those solicited found the event very distressing”(Dombrowski et al. 2007, 155). A further extension of this study determined that the children who were exposed to these unwanted online sexual advancements experienced stress and negative behavior (Dombrowski et al. 2007, 157). This highlights that children do not intentionally seek to view or engage in pornographic material or child webcam sex tourism. Children who may feel excluded at home or in school might tend to resort to the Internet and to social media in order to feel accepted in society. Moreover, as a reminder, these children can come from a high or low socio-economic background, be of any age, and be either American or foreign born children. Another online study of twelve to eighteen girls’ internet use by CyberAngels, the College of Education at the University of South Florida, and the Department of Child and Family Studies at the Louis de la Parte Florida Mental Health Institute was included in Seventeen Magazine between May and June 1999. It has been concluded that Our results on girls’ preferred online activity were mirrored in a subsequent survey which reported that girls spend the majority of their time engaged in e-mail communication, instant messaging, and chat. Generally, girls are using the Internet to engage in more relationship oriented activities. Some respondents noted that online dialogue is used as a mechanism to empower themselves and find a voice. In face to face interactions young women may perceive that body size, facial features, and Rodas, Ericka Carolina 20 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society other superficial characteristics are judged as more important than personality. Conversely, online exchanges take place in a context that often is devoid of these visual cues (Berson et al. 2008, 66-67). Therefore, the anonymity of the Internet provides a form of security to children and adolescents who lack self-esteem in offline relationships. They can find solace with pretending they are someone else, i.e. pretend to be more sophisticated than they actually are to acquire acceptance. For these girls, the true identity of the individuals with whom they interact online is not important as long as they are accepted and loved by someone (Berson et al. 2008, 67). Furthermore, this online interaction is paralleled by the increasing use of computers in the home and in school. Computers are replacing the in-person form of communication which forms the basis of humanity. The National Centre for Education Statistics has determined that “nearly 25% of children under the age of 6 use the Internet; 91% of school-aged children (ages 6-18) use computers and 59% of students (4-18) access the Internet on a regular basis” (Dombrowski et al. 2007, 154). Furthermore, Dombrowski et al. note the following findings from Cyberspace Research Unit, “33% of child respondents (no ages provided) indicated that they had chatted with someone who later confessed to being up to 5 years older than originally introduced; 40% admitted to engaging in chat room conversations of a sexual nature; and 25% of child internet users had been solicited for a face-to-face encounter (Dombrowski et al. 2007 154). These findings justify the need to create self-esteem and self-empowerment classes for atrisk and actual victims of cybersex trafficking. These classes should be divided by age group: five to seven year olds, eight to ten year olds, eleven to fourteen year olds, and an age group of fifteen to seventeen year olds. The divide between the different age groups is necessary because their learning capacities vary depending on their age. A five or six year old will not have the Rodas, Ericka Carolina 21 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society same developmental capacity as a child who is fifteen, sixteen, or seventeen year old. Therefore, discussions on similar topics should be tailored for each age group. Self-esteem and empowerment discussions for five to six year olds shall include activities which focus on each child’s special and unique talents. This can be done either orally and/or by drawing pictures of their individual talents. As a result, the children will learn that they are all valued individuals in society; likewise, they will be taught to respect each other’s differences because we are all unique. Therefore, the young children will feel confident in themselves and will be proud to share their talents. In turn, this will help the children learn that it is important to notify a trusted adult if their person is violated or if they feel threatened by someone in their daily lives whether it is online or in person. For the eight to ten year olds, activities shall be slightly different. In a group setting they should each share their individual strengths while encouraging each other to continue to pursue their talents and subsequently their dreams. The children can then perform in a presentation on the importance of being confident in oneself and they can demonstrate their talent or state a speech about their individual importance. This activity will have the children realize that everyone has their own individual talents and differences which make everyone unique in their own way. Social service providers who come into contact with these children need to make them understand that their individuality is always important and that they should never feel otherwise. Furthermore, within the group setting, each child can also teach the others about their special talent. For instance, if one is exceptional in dancing, that child should teach the other children a simple dance routine. Rodas, Ericka Carolina 22 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society For our eleven to fourteen year olds, the activities can be more advanced. Individual discussions with the social workers and affected children are necessary as with any age group. Social workers can ask yes or no questions to the children about what makes them feel empowered. The children can then write an essay or poem about situations that mark them as empowered. The discussion can then focus on what it means to be an excellent leader. These responses can then be shared within the group or individually with the social service provider. It is foreseen that these activities will assist children realize that they are all empowered individuals and therefore will question anyone who attempts to undermine their individuality in any capacity. This will hopefully have them realize that they do not need to pretend to be someone else when interacting with someone online or in person. In addition, the self-esteem and empowerment “course” as part of the services for at-risk and trafficked children should focus on one’s unique individuality and opportunity to influence their peers and community positively. In addition to sharing their unique talents and strengths to social workers and to the group if desired they should also discuss how one would feel if they are teased or bullied by their peers or another individual. The response would be “ashamed, angry, sad, hopeless, lost…” The discussion will then continue on with explaining to the adolescents that they should never allow a person online or in person make them feel this way either; it is important that they are aware that their individuality –personality—and body have a right to be respected by everyone including adults. If they ever feel threatened they should know that they should confide in a trusted adult who will help them. Unlike what some individuals may believe, once the child or adolescent has been trapped into the power of the traffickers and buyers, it is difficult for them to escape and seek help on Rodas, Ericka Carolina 23 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society their own. For one, they feel ashamed for what they have done and the trafficker and buyer lead them to believe that their family and friends will not want them anymore because they have engaged in inappropriate behavior. Foreign children tend to be recruited by trusted friends and family members who promise them well-paying jobs. The online encounters are either held inside the home or in designated cyber-cafes to escape detection. As for American children, they are often recruited through online conversations via chat and social media, through their peers, family, and sometimes through unintentional browsing of a pornographic website. As with other countries, the encounters are often held in the home of the child or in the residence/business location of trafficker. It is important to note that children who are trafficked online are usually not kidnapped into the industry, but groomed by the trafficker and associates to enter the trade. Specific cases are discussed below and in the individual country case sections. “Andrea,” a Filipino girl recounts her experience when she was just fourteen to the new phenomenon of cyber-sex trafficking. Her cousin recruited her by promising her a well-paying babysitting job in the city; a big change from her life in the village where poverty is rampant. She describes how she felt the first time she was instructed to display herself naked in front of a webcam, “I was so embarrassed because I don’t want others to see my private parts. The customer told me to remove my blouse and to show him my breasts (de Leon 2013, para. 2). This testimony serves as proof that children and adolescents who are victims or are at-risk of becoming a victim do not engage in it willingly. Instead, they are groomed for several weeks in order to gain the perpetrators’ trust. The first time they are asked to engage in cyber-sex they do it out of fear of angering the trafficker and of the consequences. If their parents are their traffickers they follow orders because it is disrespectful to disobey one’s parents.’ Rodas, Ericka Carolina 24 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Moreover, the children do not see any other option since they are now considered the “breadwinners” of the family and do not want their family to return to poverty. Another Filipino girl, “Gen” admitted to CNN her experience in the illicit trade as follows, “Whatever the American client wants us to do, we must do it” (Coorlim 2013, para. 3). The voluntary testimony of “Gen,” “Andrea,” and other girls allowed the American and Filipino government and security to find the traffickers and buyers and bring them to justice. Their experiences are proof that something must be done to bring an end to this crime and help those who have been victimized or at-risk to be empowered and heal with time. Even if they wanted to escape, it is very dangerous as the trafficker threatens the victim and the victim’s family with violence. Therefore it is time to treat these children as individuals in need of assistance and not as criminals who “should” have known the difference between right and wrong. An extension of the self-esteem/empowerment initiatives is the inclusion of traumasensitive interactions with social service providers, law enforcement, health providers, and educators. For one, victims and at-risk children cannot be forced to answer questions or give information if they are not ready to do so. The American federal law, Trafficking Victims Protection Act, requests law enforcement to have victims act as witnesses in a trafficking case as a prerequisite for victims to receive rehabilitative services, housing, safety, etc. (U.S. Congress 2000, Section 107 E (I-II)). Although the intention is understandable, one does want the traffickers, buyers, and those involved to be brought to justice, it tends to backfire. The victims/survivors have seen and endured things that they should not have been subjected to and they are traumatized. Melanie Hannan, from the International Organization for Adolescents describes their new program called the Child Right Model, Rodas, Ericka Carolina 25 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society IOFA is in full support of Safe Harbour legislation which dictates that states treat children involved in trafficking as victims. We have developed the Child Right model to assist states in implementing these laws once passed. One aspect of the model includes training, which covers referring and serving child victims of trafficking. In these trainings we discuss how to engage clients and respond to them in a trauma-informed way so that they may receive services as victims rather than face punitive consequences. Through Child Right: NY IOFA has partnered with the Center for the Human Rights of Children at Loyola University – Chicago to develop a scientifically validated screening tool to identify child victims of labor or sex trafficking in the child welfare context. The tool is designed to be administered to a child or youth by a child welfare professional to identify whether a child has experienced a trafficking situation rather than another related form of child maltreatment. The tool will enable child welfare professionals to identify which children are in need of specialized services for child victims of trafficking. It will also help New York State to collect data on child trafficking in a standardized way so that more funding for these services may be allocated. The tool is not intended to educate children about the dangers of the internet; however it may begin conversations on the subject between the youth and the professional (Hannan, 2014). Hannan rightly explains that the best mechanism to identify and prosecute those responsible for this crime is to engage in conversation with the children that demonstrates to them that they can trust adults and that there are adults who do care about them. If one just pressures and or forces them to speak before they are ready to do so, one is just alienating them further. Moreover, it will just convince them that no adult can be trusted and that one just wants to shame them for what they have been through and do not care about their experiences; that one just wants to profit from them. As a result, they will become alienated and hostile to those who should be helping them. That is why it is important for law enforcement and others to be able to obtain information by another mechanism-improved technology-which will be discussed later in this study. Furthermore, another important provision to provide to survivors is guaranteed education. By this children are encouraged to remain in school in order to complete their education. They Rodas, Ericka Carolina 26 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society will then associate a full education with success and empowerment. However, since they will most likely be too traumatized to return to school immediately they need to be evaluated weekly by a social service provider and/or psychologist. Until the child feels comfortable returning to school, they should have the option of receiving private tutoring or class with the other survivors in the facility. As a result, the children will realize that their education is important for their future and will want to continue. The teachers at these facilities will have to be trained on how to interact with survivors of sex trafficking and sex trafficking facilitated by the Internet. A discussion should also be held for each individual age group on the different jobs and careers that are available for them once they are adults; in essence, a mini career day. Once they are fully rehabilitated, children are invited back to their school and other activities. Likewise, social service providers need to assess the safety of the child’s home life. If it is known that the child ran away from home or that he or she has been abused at home and/or recruited by his or her parents, relatives, or other “trusted” adult to engage in sex- trafficking, then it is obviously dangerous for the child to return to that home. This information can be derived by gaining the trust of the child survivors. This can be achieved by assuring the children that one is truly there to help them and not to criticize them or blame them for what they have been subjected to. The next step would be to find appropriate foster parents to adopt these children to ensure they are not neglected again. The foster parents would naturally receive a mini-training without unintentionally traumatizing them. In New York, Jewish Child Care Association recently launched its RESOLVE program to find caring adults to open their homes to trafficked youth, both boys and girls (JCCA RESOLVE). By taking into consideration all of these proposed changes to current legislation, cyber trafficking of children will become an issue that is of utmost importance. Furthermore, with this revised legislation, law enforcement, social Rodas, Ericka Carolina 27 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society service providers, psychologists, and educators will know how to proceed effectively with these cases. All children matter and should be helped in any way possible. Otherwise, traffickers will continue to abuse children both online and offline because of their presumed immunity from prosecution and liability. How Can the U.S. Limit Access to Pornographic and Sexually Explicit Material of Children without Violating the Right of Free Speech? This is a difficult question to answer because of the perception that any and all information on the Internet is available for all to download and view. Although the Internet does provide many benefits: increased access to various sources of information and increased and improved access to communication, it has led to an increase in illegal activities and crimes. When it concerns children, however, the common response among society is to restrict/ prohibit the illegal activity which in this case is occurring online. Others, nevertheless, may argue that restricting/prohibiting access to certain materials online may undermine their right to free speech and freedom of expression. However, before forming an opinion it is important to remember that the Internet is not always safe as one might presume. It is stated that “unencrypted wireless communications are open to eavesdropping by technically astute users and the level of skill required to do this has decreased as wireless communication is more common” (Dombrowski et al. 2007, 161). Therefore, one should become accustomed to accessing wireless networks that require a security password to reduce the number of perpetrators who actively seek children online. Under international law, the International Covenant on Civil and Political Rights is a treaty that protects citizens’ various civil and political rights; the United States values civil and political rights, also known as negative rights because government cannot in theory take them Rodas, Ericka Carolina 28 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society away from you, rather than economic and social, and cultural rights which are positive rights. Article 19 of the ICCPR concerns freedom of speech, expression, and association. Paragraph 2 of the Article explicitly states, Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive, and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing, or in print, in the form of art, or through any media or his choice (General Assembly 1976, Article 19 (2)). This definition parallels closely with that of Amendment 1 of the U.S. Constitution which states “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances” (U.S. Congress 1791, Amendment 1). Even though it is understandable that government should not restrict an individual’s ability to express himself or herself freely—we can all think for ourselves—certain exceptions must be made when an individual or group is placed in danger due to another individual’s action or inaction. Paragraph 3 of Article 19 of the ICCPR declares that “…It may be subject to certain restrictions, but these shall only be such as are provided by law and are necessary: for respect of the rights or reputations of others and for the protection of national security of or public order, or of public health or morals” (General Assembly 1976, Article 19 (3)). It is thus clear that cyber trafficking of children which includes pornography violates freedom of speech as children are abused and endangered by the perpetrators. Terre des Hommes A solution to reduce the number of cases of cyber trafficking of children is by having filters placed by internet companies and by parents/guardians to restrict the content that children Rodas, Ericka Carolina 29 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society can access online. Paul Wolters, of Terre des Hommes explains how offering filters to parents/guardians does not violate freedom of speech as the main goal is to protect children. How can a filter violate the freedom of speech? If anyone switches off a television because they do not want to hear / see the content of that show, are they violating the freedom of speech of that channel? No. No one is stopping that channel from broadcasting. Only some people may choose not to tune into that channel. The same with websites and chat rooms, computer games. We do not see how a filter that parents may install voluntarily and in protection of the well-being of their minor children (whom they have the obligation to protect) would infringe freedom of speech. Such a filter does not stop any organisation of sending their messages (in other words: it does not limit their freedom of speech). The same way that anyone may chose not to answer a phone call, or to change a television channel, or to switch off the television, anyone may chose not to access a website or chat room he or she considers harmful or otherwise undesirable for themselves or for their children that they are responsible for (Wolters, 2014). The Children’s Internet Protection Act, passed in U.S. Congress in 2000 places an obligation on schools or libraries receiving discounts through E-rate program to enact child-friendly filters on the Internet (Federal Communications Commission). This legislation ensures that minors are safeguarded from obscene images and content online and does not violate freedom of speech. As a result, schools and libraries play an important role by providing access to suitable content online to children. However, educators and librarians should still monitor youth’s activity online as they might be able to remove the filter(s) themselves. Therefore, one can state that technology companies and internet websites in general have a moral obligation to ensure that young people can feel safe online. It may take time for them to develop the most efficient methods in terms of filters and other mechanisms; however, as long as there is evidence that they are researching and collaborating with other members of society to have this succeed, it will be a step in the right direction. As stated in the ICCPR, it is a question of morals and respect; how can one abuse children and not do anything about it? Their dignity as an individual is being violated. Rodas, Ericka Carolina 30 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Filters for now offer the best solution for minimizing cases of cyber trafficking. There are three types of filters. “Inclusion filtering relies on the creation of a ‘whitelist’ (a list of specific sites that are to be accessible to the user); all other content is then denied. Exclusion filtering, conversely, relies on the existence of a ‘blacklist’ (sites to be denied). The third method uses ‘content filtering’ technology that evaluates the requested data and checks to see if its content matches descriptions (keywords, phrases, or image characteristics) (Dombrowski et al. 2007, 162). As already stated by Mr. Wolters, many filters already exist for parents to apply on smart phones, the Internet on their personal computer, iPods, and iPads but it needs to be strengthened. Nowadays, most children tend to be very tech savvy and can unblock the filters while they use the device and reinstall them once they have finished, convincing their parents/guardians that the filters do indeed work. In addition, children may seek out other forms of communications such as different chat rooms and social media: Facebook, Twitter, Facetime, Snapchat, Skype, and Instagram, that parents and guardians might not be aware of as an alternative to text messages. As explained by Dombrowski et al. This (e.g. AOL Instant Messenger) represents one of the more prevalent internet communications technologies. With clients available for multiple platforms (including mobile phones) and interoperability between private networks, it is estimated that 52 million people had used synchronous chat as of 2002…The trend suggests increased growth of this medium, especially among younger users of technology…A user of synchronous chat often participates in multiple concurrent conversations, a process which limits time for reflection and may result in a child participant unwittingly revealing personal information to other participants (Dombrowski et al. 2007, 159-160). Nevertheless, it is still important to remember that the safety of children is first and foremost. Hence, if a technology company, internet provider, or a website realizes that a user is engaging in an activity that harms youth either physically, emotionally, and/or mentally, they should block the content from reaching other audiences and report it to the proper authorities. Rodas, Ericka Carolina 31 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Therefore, the right to freedom of speech and of association which includes freedom to receive and share information with others has its limitations and is not always granted. Paul Wolters describes a recent situation in the Netherlands which exemplifies a situation of blocking or restricting certain websites. Terre des Hommes does not have an opinion on how national authorities should act. However, yesterday—March 5— in the Netherlands an interesting ruling was published on a court case involving an organisation of "people who are attracted to children" as they describe themselves (they claim to condemn actual sexual relations with minors). The organisation claimed freedom of association and freedom of speech to justify its existence. However, the judge ruled that the interest of children and their well-being is more important than the freedom of association and freedom of speech of adults that feel attracted to children. The judge ruled that the organisation should be forbidden (Wolters 2014). This ruling presents an opportunity for the owners of these “sites” to protect children as their top priority. Such inhumane practices both online and offline need to be monitored and controlled lest their activity is condoned and perpetuated day after day. Conversely, there are critics who believe that limiting access to certain websites and filtering certain keywords may inadvertently pose a legal problem. The protection of children is recognized by these critics but they fear that it might go too far. For example, if internet service providers and technology companies block the word ‘sex,’ it will prohibit all web searches that contain the word ‘sex.’ Although this action is intended to prohibit traffickers and perpetrators from sexually exploiting minors online and to avoid children from accidently accessing and viewing a pornographic site, there are potential negative consequences. By prohibiting ‘sex’ related web searches, one is potentially limiting information on a healthy sexual relationship, rape and sexual assault, women’s health care, and other related information which is important for girls and women to know. Most companies use a combination of the three types of filters, although blacklists are the most common. It has been found that Rodas, Ericka Carolina 32 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society If the blacklist criteria are too closely defined (e.g. ‘foo’ and ‘bar’), alternative spellings or wordings (e.g. ‘f00’ and ‘b@r’ or ‘foobar’) may be missed. As a result, programs that compile lists tend to cast a very wide net, leading to allegations of overblocking. Documents with Metadata indicating that they relate to the University of ‘Essex’ or the ‘Essex’ Police Department may be blacklisted by filters which prevent Access to pages containing the word ‘sex’ (Dombrowski et al. 2007, 162163). Therefore, simply applying filters on various technological devices and the Internet in particular is not as simple as it seems. A well-intentioned effort to safeguard children may restrict the rights of others to have access to essential information; as always, if a person specifically looks for information and accesses information that harms children such as child abuse imagery (child pornographic images) or webcam sex encounters, the right to have free access to information is waived. Technology companies need to ameliorate the available filters so that children can be protected without restricting access to other indispensable information for adults and in some cases children. However, if an adult intentionally searches for pornographic websites or for sites that promote child webcam sex, he or she should be apprehended without regards to the rights of freedom of speech. Some might argue that they are “just viewing” these images and sexual acts and are not actually forcing the girls to engage in such illicit activities, rather the traffickers are. Regardless, by simply viewing and accessing these websites, these buyers are implicitly condoning the abuse of children via the Internet. Pornography has been defined by critics and defenders alike. Catharine A. MacKinnon and Andrea Dworkin viewed pornography as an act which demeans the dignity of its participants. …the sexually explicit subordination of women through pictures and/or words… and it created standing to sue in civil court for women (and men, children, and transsexuals used in the place of women) who had experienced discrimination as a result Rodas, Ericka Carolina 33 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society of the traffic in pornography, who had been coerced into pornographic performances, who had pornography forced on them, or who had been assaulted as a result of pornography (Palczewski 2001, 1). Although this argument focuses mostly on the impact on women, the logic applies to children as well. It is difficult to fathom how a child can find and seek sexual gratification in these sexually explicit ‘performances.’ Testimony from various child survivors in the beginning of this study indicates that they feel ashamed, angry, confused, and stressed. Moreover, children become distressful of adults. It has been found that “…even those children who were distressed by the incident failed to report it to an adult. Thus it appears that internet sexual solicitation and pornography pose threats to at least a percentage of children and adolescents” (Dombrowski et al. 2007, 155). With such effects on children it is evident that children’s’ innocence is being taken advantage of, which is clear indication of child abuse. The term child abuse imagery should replace the term pornography as it more deeply focuses attention on the impact on children; the term pornography in contrast emphasizes the act in and of itself rather than the specific people who are involved and therefore, might be mistakenly viewed as an artistic expression. Critics of the prohibition of pornography view it as freedom of expression and speech because it is only images and not ‘live abuse.’ Barry Lynn argues that A speech/conduct distinction exists and that speech is speech and sex is sex. Speech by definition is content and connotatively neutral….Pornography functions like other speech in that it transmits ideas, offers a safety valve and aids selfrealization… The neutrality concerning pornography is represented by his early interchangeable use of the term “pornography” and the phrase “sexually-oriented material” (Palczewki 2001, 12). Rodas, Ericka Carolina 34 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society This view is limited as it views all forms of pornography as a truly consensual act from all participants all the time. As already argued, this opinion is too simplistic as it analyzes pornography in general without separating it into adult and child pornography; some adults do participate willingly into pornographic activity while others may be coerced into engaging in this activity. When it involves children however, there is no free will involved as minors do not understand completely what is happening; they only know that it makes them confused, ashamed, and possibly angry and they are unable to understand why they are being told to produce these images and live videos. The children can only think to themselves “I must be doing this because ‘Michael’ loves me and only wants what is best for me. I need to keep him happy.” Therefore, one should reconsider stating that all pornography is consensual and available for unlimited downloading and access online. One should refocus his or her attention on being vigilant for potential child victims online on the different social media platforms. Facebook Emily Vacher, Head of Public Safety at Facebook, rightly believes that technology online cannot help reduce cases of child sexual exploitation. Parents and guardians can apply all the filters that they would like on the Internet but that does not replace the most important prevention tool-communication. Adults need to speak to children in a way that empowers them to make safe decisions online. She also recommends that children be made aware of the various privacy settings available on Facebook to limit what information can be seen by the Facebook community. For instance, on one’s Facebook profile, one has the option to select “View As” to view one’s profile as the public would. In this way Facebook users can modify their privacy settings to avoid unwanted solicitation. One can also select who in the Facebook community can view your posts: statuses, videos, pictures, comments, and links. Vacher explained that you can Rodas, Ericka Carolina 35 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society select “only me” if it something truly private, “only friends” if you want only your friends to see it, “friends and friends of friends” allows friends of your friends to access your profile and postsyou may or may not know these individuals, and finally the “public” filter allows anyone on the Facebook network to view one’s profile and selected posts. (Vacher, ECPAT-USA Panel, March 17, 2014). These options allow anyone with a Facebook account to ‘self-filter’ one’s information on the social media site. Users are empowered to select who can see which information on their profile and search results. This empowers Facebook users, especially youth to make safe decisions online. Moreover, Vacher notes that Facebook users have the opportunity to report suspicious activity to the Facebook team. This is done to empower users to be good digital citizens and to protect each other online. Once a photo, video, or other content has been reported on Facebook, staff will create a digital fingerprint of the image and it will immediately become blocked. Facebook staff will then immediately send the information and refer the situation to the National Center for Missing and Exploited Children who will then report it to the law enforcement of the appropriate country-the country where the image or video was already uploaded from. This exemplifies the cross border implementation of the law as the Internet does not have borders. One can also block a person from contacting them. During the panel discussion on the Uses and Misuses of Technology, Vacher also explained how it is possible for employees to investigate reports made by other users. “Facebook has a policy on keeping everyone safe with its four components. We have a policy prohibiting pornography in all its forms, a true name culture in which users are encouraged to not lie about their name and age, partnerships with individual experts and organizations on online safety, and Rodas, Ericka Carolina 36 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society our tools- engineers are working to develop improved safety tools” (Vacher, ECPAT-USA Panel, March 17, 2014). By clearly stating in its policy that it does not tolerate any form of pornography and that there will be investigations if suspected of such activity, users are warned in advance that this type of behavior will not be tolerated; therefore, there should not be any argument about freedom of speech being violated because the terms of service have already been explained. THORN: Digital Defenders of Children Furthermore, Julie Cordua, Executive Director of THORN: Digital Defenders of Children also participated in the panel on March 17, 2014, hosted by ECPAT-USA. She explained how her organization informs innovators and technology companies on how predators might be using their platforms to exploit children online and then they advise the companies on prevention measures (Cordua, ECPAT-USA Panel, March 17, 2014). One of their innovative tools that companies can take advantage of is the Shared Hash Initiative which is part of the organization’s Sound Practices Guide for new technology companies to ensure that the site is child friendly. As explained in the Sound Practices Guide Thorn is developing a system in which companies using PhotoDNA or another hash system could share hashes of these ‘worst of the worst’ photos in order to more rapidly build a database of identified image hashes and, consequently, more rapidly remove this content from their systems. The result of this, beyond more rapid identification and removal, would be a reduced human impact on front-line safety teams who have to view content, possible reduction in costs for teams scanning for images and more effective and efficient reporting to NCMEC that could lead to quicker victim identification (THORN 2013, 22). In a separate interview, Cordua confirmed that “The shared hash initiative has been adopted by the National Center for Missing and Exploited Children and will be rolled into their CyberTipline reporting tool this year” (Cordua, 2014). This photo tool allows for various Rodas, Ericka Carolina 37 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society technology companies to prescreen photos before they can be uploaded on one’s website; most importantly, it permits for a collection of similar child abuse photos among companies to be able to catch the predators. If potential predators know that their activity is being monitored, they might be deterred from engaging in such activity. As a result, it allows for child abuse images to be filtered out from individual websites before damage can be done. Another measure that new technology websites and existing websites and technology companies can employ to ensure children’s safety is user’s terms of service. One can adapt the language to meet one’s company’s mission but it should be clear that one’s company does not tolerate child sexual exploitation, or child abuse imagery in any form. As explained in the Sound Practices Guide Ensure that language is included in terms of service that prohibits your service from being used for the exploitation of minors. Stronger language can include prohibiting pornography and more specifically, child sexual exploitation on your platform. This will notify users at the outset that your platform does not allow this type of content and that when it is identified, it will be removed and reported (THORN 2013, 8). Moreover, one should consider enabling user flagging on one’s websites as well to encourage users to report suspicious activities. Activate your user base to become a second set of eyes and ears for your service. Make it easy for users to flag and report exploitative content or behavior. This should include educating your users about forms of exploitation, the warning signs and making it easy across platforms to report photos, links, users, ads, and other suspicious behavior (THORN 2013, 8). With these two main tools, owners and employees of various technology companies can take an active role in mitigating child sexual exploitation online. The terms of service and user flagging allow employees and managers of the companies to be able to investigate suspicious activities and to refer them to appropriate authorities for further investigation if necessary. Since it is in writing, users of these websites cannot argue that their freedom of speech has been violated if Rodas, Ericka Carolina 38 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society they are searched because they have already agreed to it when they first accessed the website. Another thing to tackle is to have users actually read the terms of service but that is another issue to solve. Most users just browse through the companies’ regulations without taking time to read them thoroughly. Cordua in her speech at the ECPAT-USA panel on March 17, 2014 also mentioned another type of “self-filter” users can use with the help of THORN. We operate in peer to peer networks making it more difficult for people to find child pornography. When people search for this content they may instead get information we seed in this environment. To date, our files have been downloaded more than 4 million times. We also run this type of deterrence program on search platforms and have more than 1500 people a day reaching our help page via search. We then direct people to an organization called Stop It Now. The 10% stat is to say that of the people that reach our Thorn landing page, 10% take the next step to click through to help resources via Stop It Now (Cordua 2014). This use of peer to peer networks is very innovative as it targets the “source” of the problem which is demand. Once the individuals who search for child abuse imagery and/or live webcam sex performances reach the THORN landing page, they will hopefully think about the consequences of their intended actions. The fact that 10% of those that reach THORN access the STOP It Now resources is compelling; it is hoped that that number will increase. THORN is in the lead with devising this filter to catch actual and would-be predators. This initiative represents an important advancement because in actuality it will be very difficult to arrest every predator who attempts to produce, distribute, and/or receive child abuse imagery and will affect available resources. Rodas, Ericka Carolina 39 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society How Can Civil Society Be More Involved in Reducing this Crime? Family Online Safety Institute First and foremost, communication between parents and younger children and older children need to be established. If one talks about the importance of online safety, then youth in general will be more inclined to practice necessary online safety on a regular basis. Children tend to be naive and to believe that the Internet is safe in and of itself. Stephen Balkam, CEO of Family Online Safety Institute cited the following statistics at the ECPAT-USA panel discussion. One out of ten teens has shared their username/password with someone other than their parents; girls are more likely to do this than boys. In addition, the percentage of girls to boys who are concerned about their online identity is 81% to 72%. Furthermore, Balkam also mentioned that a Pew research study found that the number of text messages sent per day increased from 50 per day in 2009 to 60 a day in 2011. It has been found that older girls are more likely to be on Twitter than boys (Balkam, ECPAT-USA Panel, March 17, 2014). With these statistics it is clear that the youth of today are on the Internet, social media, and other forms of mobile communication in increasing numbers. One of the three P’s of Family Online Safety Institute is Good Digital Parenting. Adults and “parents need to have a talk about digital life online because it is difficult for parents to keep up with all the app’s that kids are using online” (Balkam, ECPAT-USA Panel, March 17, 2014). By speaking to children about online safety and actively engaging them in the conversation by asking questions, youth will be more receptive about being responsible digital citizens. This initiative is part of the organization’s Platform for Good campaign in which resources are provided to youth about safe online practices. The most used tool for the spring is the spring Rodas, Ericka Carolina 40 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society cleaning checklist for internet users entitled “Now is the perfect time to clean-up your digital footprint.” The guidelines are to “search yourself online; check privacy settings on commonly accessed websites; use strong passwords for your different accounts online; update your software regularly; think before you post on social media- if you would not want your immediate family, colleges, or future employers to see it, then you should not post it; maintain your mobile devicesboth computers and smart phones by using strong passwords and updating regularly; finally build a positive reputation online by posting important achievements, news, and/or events that you are passionate about” (Family Online Safety Institute, “Clean Up Your Digital Footprint”). Rodas, Ericka Carolina 41 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Source: A Platform for Good. “Clean Up Your Digital Footprint.” http://www.aplatformforgood.org/pages/clean-up-your-digital-footprint Cases in the United States The United States’ recent increase in internet related crime has witnessed the development of some technology to combat it. However, more needs to be done. On May 18, 2013 a former football coach, Joseph J. Ostrowski from Pennsylvania was sentenced to 25 years for producing child pornography, interstate extortion and cyber stalking. The internet platforms he used to recruit and exploit his victims included Facebook, Skype, e-mail, instant messaging, Rodas, Ericka Carolina 42 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society and text messages. Ostrowski committed his crimes in other states including New York and New Jersey. In addition, the defendant admits posing as a student or school alumnus to lure his victims. Moreover, he pleaded guilty to persuading and enticing, and attempting to persuade and entice minors to engage in sexually explicit conduct for production of pornography including live transmission via web-cam (U.S. Fed News Service 2013). This particular case demonstrates that there is not one typical trafficker and they may not all look like your common criminal. They are often well-known and respected people in their communities; therefore, it is challenging to identify and prosecute such traffickers because they lead a double life and are able to hide their activities. Furthermore, this investigation was led by the FBI who was informed by Project Safe Childhood, a project of the Department of Justice to combat sexual exploitation and abuse. Thus, sharing of information within law enforcement is necessary to punish the perpetrators and protect the victims. Similarly, in March 2014, James Alfred Beckman Jr., of Mattawan, Michigan and former associate director for MPI Research has been charged with sexual exploitation of two boys and possession of child pornography images. The nine charges which were filed in U.S. District Court in Grand Rapids include six counts of sexual exploitation of a child and attempted sexual exploitation of a child, two counts of distribution of child pornography, and one count of receipt of child pornography. As in the previous case, the offender is a well-known and prominent man in his community. His active participation in the community led him to believe that he would be able to escape detection from others and law enforcement. Beckman’s trial started in February 2014 and the jury has deliberated the case (Hall Jr. 2014). Rodas, Ericka Carolina 43 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Unlike the former case, the investigation started because one of the alleged victims, a ten year old boy, reported the incident to his mother who reported it to authorities. The minor told his mother that he feigned sleep when Beckman sexually abused him but remembers seeing a laptop computer and believes the webcam was on to produce a live transmission of the sexual encounter. Furthermore, a FBI agent claimed that more than three hundred images of child pornography have been found on the defendant’s computer at his former job (Hall Jr. 2013). The initiative taken by the victim’s mother is significant because it demonstrates the trust between children and their parents which is rare in today’s society. Children tend to be reluctant to report an incident to their parents or an educator because they fear reprisal for having used the Internet in the first place, in most cases without permission. As recounted by Dombrowski et al. A similar percentage (23%) of young people in the Finkelhor study found exposure to pornography very/extremely distressing. Moreover, Finklehor et al. reported that even those children who were distressed by the incident failed to report it to an adult (Dombrowski et al. 2007, 155). Hence, effective prevention of cyber trafficking of minors will be achieved if educators and parents/guardians alike engage with youth on the importance of internet safety practices. Trust needs to be established between both parties for this to be effective. Particular methods on achieving this trust will be discussed further. Moreover, this case demonstrates the difficulty of proving a cyber-pornography case. Sexual encounters are often not recorded and therefore, it is as if nothing ever happened. Furthermore, the possession of child abuse images on Beckman’s work computer poses challenges as well. His attorney Anastase Markou has already indicated a motion to dismiss six of the charges claiming it “is based on the contentions that federal investigators have found no “captured images” or “webcam activity” on Beckman’s work or personal computers “despite an Rodas, Ericka Carolina 44 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society extensive and exhaustive analysis”” (Hall Jr. 2013). Since the images are located on his work computer, Markou can argue that another person could have downloaded those images; there is no recorded footage of the defendant downloading the images. In addition, prosecutors will have to prove with an unreasonable doubt that there was a criminal intent to commit this crime. There is a possibility that the defendant might also claim that he inadvertently visited a website that unintentionally led him to download images of children; hopefully, prosecutors will obtain as much evidence as possible to be able to win the case. If one does not take this case seriously, then there will be countless similar cases in the future that will not be resolved. With this attitude, society is rendering it easier for traffickers to exploit youth online and children will become even more reluctant to discuss their concerns with a trusted adult. Philippines Case and Implication for the International Community Global civil society can come together to fight this crime by sharing resources and knowledge. It is an issue that affects everyone. Traffickers often use more than one computer/mobile device in different locations in order to have a successful business. It is a crime that hurts our children, the leaders of tomorrow. For instance, the power of shared knowledge is seen in July 2013, in which three minors and six women from the Philippines were rescued from a ring forcing them to perform live sex shows via the Internet for customers in a house used as the place of operations in Barangay Malabanias, Angeles City, Pampanga (ABS CBN News 2013). The raid succeeded because U.S. Immigration and Customs Enforcement’s Homeland Security Initiatives assisted with their technical expertise when asked to help by the Inter- Rodas, Ericka Carolina 45 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Agency Council against Trafficking and the International Justice Mission (ABS CBN News 2013). The sharing of expertise in a specific field always accelerates the process and guarantees results. Officials in the raid found a plethora of evidence of the crime including “computer sets, webcams, cameras, sex toys, notebooks containing lists of earnings and contributions as well as proofs of payment through money transfer” (ABS CBN News 2013). The three suspects who have been arrested face a maximum of life imprisonment and a fine not exceeding P5 million. The necessity for cross-border sharing of information and resources is described by IACAT chairperson and Justice Secretary Leila de Lima, “Trafficking is a crime against humanity and all efforts and cooperation are needed to combat this scourge. The inter-government cooperation further reinforced the [Philippines-United States] alliance in combating the menace of modern day slavery” (ABS CBN News 2013). Involving Parents and Educators Children first and foremost need to be included in the dialogue. As active users of the Internet they need to be informed of its potential dangers and be consulted on safe internet practices. An online survey on Seventeen Magazine in 1999 conducted with CyberAngels, the College of Education at the University of South Florida, and the Department of Child and Family Studies at the Louis de la Parte Florida Mental Health Institute, asked girls aged twelve to eighteen on their internet use, involvement in at-risk behavior on the web, and their thoughts on promoting internet safety. Results demonstrate that 30% spend between three to five hours online each week and 12% spend between ten to twelve hours online each week (Berson Michael J. and Berson Ilene R. 2008, 58). The numbers today are most likely higher as youth can access the Internet on their smartphones at any time and do not have to wait to have access to a computer. Moreover, there is a negative correlation between time spent online and risk of engaging in Rodas, Ericka Carolina 46 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society dangerous cyber activities; it only exacerbates when youth have no continued dialogue with their teachers and/or parents to discuss proper internet use. Specifically, it has been found that “Teens have a tendency to maintain secrecy about cyber activity, contributing to a void of information about the prevalence of internet abuse directed toward children” (Berson et al. 2008, 65). However, if parents and educators actively engage youth in internet safety discussions, they will be able to retain the attention of youth and guarantee their commitment to abide by these safety practices. Youth in general do not favor being told they cannot do something and they will tend to disobey the rules. Therefore, if they are asked to list the potential dangers of sharing too much information online and the need for safe behavior they will be more receptive. According to the age groups, educators can also provide potential scenarios to their students and ask what the best response would be. Berson et al. argue correctly that “Young people can be adequately prepared for potential risks on the Internet by learning how to identify ambiguous situations, take appropriate steps to minimize their vulnerability, and augment their abilities to make informed decisions for safe navigation online” (Berson et al. 2008, 68). It can be safely argued then that youth like being empowered because it provides them with a sense that their opinions and input matter rather than being lectured to. In addition, this will positively improve their self-esteem which will deter traffickers who prey on the vulnerable. Likewise, parents and educators need to be at ease speaking about this issue with youth. In addition, it cannot be a one-time discussion; dialogue needs to be constant, at least once every week or every other week. Continuous discussion between youth and trusted adults is necessary for there to be effective protection for youth and to thereby reduce incidences of cyber trafficking. It is stated, Rodas, Ericka Carolina 47 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Although many young people have become aware of cyber safety as a result of initial discussions with adults, there appears to be a paucity of ongoing communication, leaving parents generally unaware of the online behaviors of their children. This is described by Young (1998) as a benign neglect of children’s Internet activity (Berson et al. 2008, 65). Therefore, parents and educators need to be regularly trained on how to identify and respond to potential situations that endanger youth. One of the first steps for educators and parents is to discuss with children according to their age level the importance of maintaining one’s privacy online by not oversharing one’s personal information in order to ensure one’s safety (Berson et al. 2008, 65). “If one would not engage in this type of activity in person, one should not do so online.” Framed in this manner, youth will realize that their safety and well-being is of utmost importance and will feel more comfortable expressing their concerns to adults. Educators and caregivers can monitor youth’s behavior and determine if there is a sudden change in academic performance, loss of interest in favorite hobbies, decrease in social interaction, sudden withdrawal, and too much time spent on the Internet. If any of these factors are present both educators and parents have to respond effectively. Dombrowski et al. remark, “Unwanted exposure can evoke strong negative feelings and lead to significant stress” (Dombrowski et al. 2007, 157). Moreover, additional methods to safeguard youth’s safety is for parents to supervise their children’s online friends, monitor youth’s screen names, establish an Internet contract with youth, monitor Internet use—only a certain amount of time allowed online each day—and to use the computer in a common area such as the living room. Educators can monitor students’ online activity by walking around the classroom and also establishing an online safety contract that outlines the students’ responsibility and the educators’ responsibility to foster a safe learning environment (Dombrowski et al. 2007, 165-166). Rodas, Ericka Carolina 48 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society The need for an Internet contract has been initiated by the Family Online Safety Institute and can be downloaded online on their website. The Family Online Safety Contract includes two parts: Parent’s Contract and Child’s Contract. This is important because it recognizes the need for both youth and parents/guardians to establish certain guidelines for safe internet use while respecting each other’s privacy and personal space. Some of the most important rules outlined for parents are the following “I will get to know the services and websites my child uses. I will set reasonable rules and guidelines for computer use by my children, including how much time they may spend online; I will encourage them to participate in offline activities as well. We will discuss these rules and post them near the computer as a reminder… If my child continues to break our Internet rules after we have discussed them I will impose penalties for their actions including taking away his or her computer, cell phone, or other devices until the behavior changes” (Family Online Safety Institute, Family Online Contract “Parent’s Contract:” Rules 2, 3 and 12). For the Children’s part of the Contract, guidelines include “I will tell my parents my usernames and passwords, but always keep them private from everyone else. I will not share my personal information or my parent’s or family’s with anyone online. This includes: name, address, telephone number, age, or school name. I will not post this information to my profiles even if I think only my friends will see it. I will tell my parents about the people I meet online, even if they don’t ask. I won’t answer e-mails, IMs, messages or friend requests from people I don’t know and my parents haven’t approved. If I see or read things that I think are bad, inappropriate, or mean I will show my parents right away. I will help my parents learn more about the Internet and what I do and where I go online…” (Family Online Safety Institute, Rodas, Ericka Carolina 49 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Family Online Contract “Child’s Contract”: Rules 1, 2, 4, 5, and 10). As remarked by Sean McDonald from Social Impact Lab, “It starts at home but it takes a village” (McDonald 2014). Law Enforcement and Technology Law enforcement is one of the many sectors of civil society that is involved in the identification of both offenders and victims. Without them, it will be difficult to obtain justice for the crime that has been committed. However, there needs to be continued training of law enforcement to ensure they will be informed of the many mechanisms offenders use to recruit and exploit victims. Although statistics on the exact number of cyber-sex trafficking victims is difficult to obtain, Terre des Hommes Netherlands estimates that there are more than ten thousand minor victims in the Philippines alone (Terre des Hommes “FAQ’s” 1). However, the actual number of victims around the world is expected to be much higher as actual evidence of the crime is difficult to obtain and victims may be afraid to seek help. In addition, “only six predators have ever been convicted of engaging as customers in WCST… Terre des Hommes urges all governments to adopt proactive investigation policies to patrol online hotspots where WCST is known to take place and to catch and identify predators without waiting for child victims to report crimes” (Terre des Hommes 2013, 16). Moreover, GMA News in February 2014 announced that the Philippine National Police is currently investigating over 31 provinces in the country believed to be prone to cyber-sex trafficking. The ‘watch’ includes 18 provinces in the Luzon region, six provinces in Visayas, and seven provinces in Mindanao (Dinglasan 2014). Rodas, Ericka Carolina 50 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Source: One World-Nations Online. Philippines Political Map. http://www.nationsonline.org/oneworld/map/philippines-political-map.htm “Sweetie” Chat Conversation Since traffickers often use more than one mobile device to escape detection, law enforcement needs all the help it can receive from the technology experts. Terre des Hommes Rodas, Ericka Carolina 51 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society created “Sweetie” to catch the predators by gaining their trust by posing as a ten-year old Filipino girl. The ability of the buyers to see “Sweetie” even though she is not real, gave them the confidence to engage in conversations with “her” even after learning that she was ten-years of age. The operation succeeded as 1,000 predators have been identified within ten weeks (Terre des Hommes “FAQ’s”, 15-16). An excerpt from one of the chat conversations can be found below. The buyer identifies as Older4 Young and “Sweetie” as 10 f Philippines. Older4Young: hi there how old are you? 10 f Philippines: hi, me 10 f Philippines. 10 f Philippines: u? Older4Young: mmmmm I like that my daughter is your age. Are you a virgin? Older4Young: I am 35 you like older men? 10 f Philippines: yes, sometimes, if they nice Older4Young: do you do cam shows? (Terre des Hommes 2013, 3). Source: Terre des Hommes Netherlands. 2013. Stop Webcam Child Sex Tourism. “Sweetie.” November 4. http://www.terredeshommes.org/webcam-child-sex-tourism/ Virtual Child Pornography In addition, Ana Morse, President of ECPAT-USA informed the audience at the technology panel about another mechanism traffickers are using to lure and groom children in Rodas, Ericka Carolina 52 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society this illicit trade. “Virtual” or CGI child pornography involves the use of a virtual image of a child to convince him or her to engage in cyber-sex trafficking (Morse, ECPAT-USA Panel, March 17, 2014). Moreover, it was discussed that traffickers have started using Instagram, MyRedbook, Craigslist, and game sites such as MocoSpace and Xbox live to sexually exploit children. Perpetrators escape detection from law enforcement by using pre-paid and disposable phones (Morse, ECPAT-USA Panel, March 17, 2014). Although traffickers have been using many forms of technology to profit their business, technology companies have started to develop software and other tools to identify them. Morse shared that Google is developing a trafficking in persons hotline, Microsoft developed PhotoDNA software that can identify existing child abuse images, JP Morgan Chase has successfully uncovered illicit financial transactions with its money-laundering protocols, and Palantir has provided the National Center for Missing and Exploited Children with a program to analyze their various databases (Morse, ECPAT-USA Panel, March 17, 2014). Fred Humphries, VP of U.S. Government Affairs at Microsoft explained the important role technology companies play in combating cyber-sex trafficking. “Human trafficking and child exploitation are horrific crimes particularly when facilitated through hidden online platforms. Exploring new ways communication technology and public-private partnerships could be used in the global effort to combat human trafficking is necessary to curtailing this burgeoning problem” (U.S. Representative Karen Bass Press Release 2014). Polaris Project “BeFree” Texting Hotline The important link between technology and law enforcement is reinforced by the testimony given by Julie Cordua of THORN at the panel hosted by ECPAT-USA on March 17, 2014 at the Church Center for the United Nations. One of the first steps is to obtain data when Rodas, Ericka Carolina 53 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society possible by the survivors themselves. THORN conducted a survivor survey in which children revealed that technology played a great role in the grooming process, recruitment, exploitation, and escape. Traffickers nowadays provide their victims with mobile phones and expect children to communicate with them via this device at all times. Cordua indicated that the results of the survey will be published within the next two months (Cordua 2014). Due to this discovery, the thoughts turned to how to use technology to help victims seek help and therefore, receive adequate assistance from law enforcement. THORN then partnered with the National Human Trafficking Hotline, a project of Polaris Project; they successfully launched a texting option to allow victims to text to “BEFREE” to receive help. It has been found that The text short code in collaboration with the National Human Trafficking Hotline has resulted in more than 500 human trafficking cases opened via text (this means there was a lead submitted and it was referred to law enforcement or local authorities to investigate – not necessarily that an arrest was made) and we know of 5 rescues of trafficking victims since March 2013 (Cordua 2014). Polaris Project has recently reported on the success of the texting tool since it was implemented in March 2013. It has been found that victims are using the texting option to reach the National Hotline more than calling the hotline number. The existence of these tools: both hotline number and texting feature allow victims and concerned individuals to seek help and ensure the safety of individuals. Polaris Project notes that “In our first year, 17% of texting conversations were from victims of human trafficking compared to 9% of phone calls in 2013. Victims of human trafficking are closely monitored by their traffickers, and for many, a text message can be a more discreet way for them to reach out for help. This data was reached by analyzing 1,111 texting conversations between March 13-March 14” (Polaris Project 2014, 1). Rodas, Ericka Carolina 54 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Moreover, from a total of 155 human trafficking cases learned through the texting tool, “74% of cases referenced sex trafficking, 8% referenced labor trafficking, 68% of cases referenced at least one female victim, 8% referenced at least one male victim. 56% of cases referenced at least one adult victim, 27% referenced at least one minor victim. 38 tips were provided to law enforcement. 130 referrals were provided to individuals who requested local anti-trafficking services” (Polaris Project 2014, 2). Source: Polaris Project. 2014. The First Year of Texting. “Cases of Human Trafficking reported via text in the first year of the national human trafficking hotline’s texting program.” http://www.polarisproject.org/resources/hotline-statistics/the-first-year-of-texting These statistics for the first year of operation are commendable and demonstrates the true collaboration between law enforcement and a civil society organization. It is hoped that the texting tool will continue to save lives, especially those of men, boys, and labor trafficking victims who often do not know that there is help available or they are too ashamed to seek help. Hence, Polaris Project will continue to spread awareness of this tool to the general public especially to social service providers, anti-trafficking organizations, first responders, and law Rodas, Ericka Carolina 55 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society enforcement. An individual can also make a difference by providing the texting number hotline to his or her community at-large, especially at schools, places of worship, shelters, restaurants, malls, and hospitals/doctors’ offices, common places where victims and potential victims can be typically found. Proof that the texting tool benefits those individuals who come into contact with victims is exemplified by the words of Ronna Bright, Project Manager for the Fresno Economic Opportunities Commission Central Valley against Human Trafficking (CVAHT) in California It is imperative that victims of human trafficking have a variety of options to reach out and communicate in their quest for information, assistance, and escape. The ability to silently text with an advocate can be a lifeline to a victim who is isolated and controlled. We live in a global, fast-paced technology-driven world and it is exciting to spread awareness of this texting capability. Thank you Polaris Project… (Polaris Project 2014, 3). This initiative proves that different members are needed to mitigate this crime. We all have different capabilities and unless civil society joins together, traffickers will continue to exploit children with impunity and victims and potential victims will be too afraid or will not know how to seek help. One needs to be informed about the latest technology in order to always be one step ahead of the traffickers. THORN: Escort Page Tool Another initiative taken by the organization THORN is the Escort Page tool. As already discussed, the rise of the Internet has led to an increase in the amount of escort ads of children to be placed online. Many attendees of the panel on the Use of Technology and Sex Trafficking hosted by ECPAT-USA were surprised to learn from Cordua that the victims themselves are forced to write their own escort ads on websites such as Backpage. Since traffickers know that the use of children is illegal and that law enforcement will be monitoring such ads, they have Rodas, Ericka Carolina 56 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society their victims’ upload fake pictures of adults to trick law enforcement, technology companies, and buyers. However, with the help of technology company, Digital Reasoning, they were able to develop the Escort Page tool which is described below. The tool is based off a machine learning algorithm that identifies certain indicators unique to a child’s ad and then uses that learning to identify those ads online. Our Escort page tool is just in testing right now with a few local jurisdictions across the country and has resulted in 5 trafficking victims being arrested. We do know traffickers and buyers have been arrested and identified by these tools, but we don’t have the exact data on this. Law enforcement has the information and for a variety of reasons does not always share back with us (Cordua 2014). To emphasize, this tool is important in the anti-trafficking world. By being able to create a saved list of key words that can identify a potential child escort ad, it facilitates the job of law enforcement and others. It is physically time-consuming to read through every escort ad on every website that offers these services. This tool enables the owners of these websites to efficiently screen through suspicious escort ads in a number of minutes. As explained by Julie Cordua, this information is then shared with law enforcement who investigates the matter. It is expected that if the ad is indeed that of a minor child, he or she will be referred to the appropriate services and that the traffickers and buyers are brought to justice. Common words in a child escort ad might include, “young and innocent.” Tor Network Furthermore, recently Homeland Security, Immigration and Customs Enforcement, and other law enforcement officials joined together to shut down an international child trafficking ring which shared among its members sexually explicit images of children. The secret website which was known only by buyers of child abuse imagery, operated under the Tor network from June 2012 until June 2013, which hides a user’s location and thereby ensures anonymity (BBC Rodas, Ericka Carolina 57 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society News US and Canada 2014, 2). Jonathan Johnson, the supposed administrator of this site is one of the fourteen men arrested for involvement in its operation. Hopefully, they will receive high conviction rates to send a message to other individuals who produce, receive, and share child abuse imagery that it is not acceptable in any form. In addition, U.S. law enforcement officials state that about 250 children are on this site. Most of the victims were U.S. boys aged thirteen to seventeen and twenty-three of the victims are originally from Britain, Canada, New Zealand, Australia, and Belgium (BBC News US and Canada 2014, 1). The fact that the website operated undetected from law enforcement for about a year and that victims included children of both genders and other parts of the world confirms that the Internet truly has no borders and that greater surveillance is needed. BBC also noted that officials discovered that the website contained more than 2,000 shared sexually explicit webcam videos, mostly of boys. These boys were groomed on various social media sites to share sexually explicit videos of themselves with women and with men posing as women (BBC News US and Canada 2014, 1-2). However, the ring was not found by technology efforts. Surprisingly, it was investigated when a child received a suspicious item through U.S. Postal Service (BBC News US and Canada 2014, 2). Therefore, one needs not only advanced technology to stop the perpetrators but involvement from all members of society. Awareness of the issue is imperative to mitigating and eventually ending the issue. If you are not yet compelled to be involved in this cause, the words of ICE Deputy Director Daniel Ragsdale will. “Never before in the history of this agency have we identified and located this many minor victims in the course of a single child exploitation investigation” (BBC News US and Canada 2014, 1). The success of this recent operation by Rodas, Ericka Carolina 58 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society federal law enforcement officials indicates that cyber trafficking is becoming an important issue for law enforcement in this day of age; this is important as this crime cannot be stopped solely by law enforcement; they need assistance from society in general, especially technology companies, which will be discussed in the following paragraphs. Without the recent technology updates, law enforcement will not be able to track down other perpetrators and buyers of child abuse imagery. Difficulty of having up to date technology for law enforcement to arrest traffickers and buyers As already discussed in this study, law enforcement need to have the latest technology in order for them to be able to arrest these criminals and see them prosecuted in court. The Internet in and of itself is borderless and therefore, it is difficult to locate the original IP address of when the crime started and become distributed to others. A study of law enforcement in North Carolina found that “Compared to more traditional crimes, computer-related crimes often do not elicit the same reaction from the public and political system—both of which heavily influence criminal justice policy—resulting in only a small amount of effort and resources being allocated in this area (Davis 2012, 273). Although this study is limited to North Carolina and was completed in 2011 it can be applied to other states within the U.S. and the U.S. national government as well as foreign countries, in this case the Philippines. The success of Polaris Project’s texting tool within one year is remarkable and shows that law enforcement is slowly starting to recognize cybercrimes, especially cyber-sex trafficking of children as a priority. However, law enforcement needs to continue to be trained on human trafficking and cyber-sex trafficking in order to outsmart the traffickers and buyers. It will be ideal if law enforcement is able to detect a potential cyber-sex trafficking victim in the grooming process and early stages of recruitment before they enter the illicit trafficking world. In particular, North Rodas, Ericka Carolina 59 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Carolina law enforcement suggested the following training opportunities that can be offered to them: “computer and cell phone forensics, search warrant preparation, and legal aspects of cybercrime, network intrusion, online predator detection, and IP address tracking (Davis 2012, 277). If this training is offered to various law enforcement officials, it will help solidify identification of potential and actual victims of child cyber-sex trafficking and solidify evidence needed in court in order to prosecute the offenders. For instance, a 2008 study of North Carolina law enforcement received a total of 127 survey responses from a total of 263. 40.8% of 2008 survey respondents indicated that the inability to trace and monitor internet communications hinders their ability to investigate cybercrime (Davis 2012, 278). The respondents indicated that online enticement of minors/child pornography received 4.9% of investigations and cyber-attacks/cybersquatting received about 1.9% (Davis 2012, 277). Recent data is not available but it is assumed that the number of investigations in this area have increased as a result of heightened awareness of the role of the Internet and trafficking. With the growing awareness of the relationship between crimes and the Internet, it is hoped that law enforcement will have the necessary tools at their fingertips to prosecute these crimes. A crime, regardless if it is committed via cyberspace or not is still considered a crime. Traffickers utilize the Internet because they know it is difficult to prosecute and prove if there is no recorded evidence. With time, collaboration from all levels of society and all levels of government will help to deter traffickers from using the Internet to sexually exploit children. Justin T. Davis argues that Rodas, Ericka Carolina 60 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society …leadership from both government and local law enforcement must begin to recognize the problems associated with computers and crime to effectively implement strategies that will enhance computer crime control… Due to culture within agencies, investigating computer crimes often takes on a lower precedent. Thereby, a stigma is placed on computer-related crime as these crimes rarely place an officer in the line of dangers” (Davis 2012, 281-282). Moreover, in general, the lack of reliable digital evidence in courts also negatively affects the outcome of child pornography cases. Richard Boddington who conducted a study on the challenges of implementing reliable digital evidence in a child pornography trial notes that, Because the legal fraternity generally understands little about computer science, the potential for miscarriages of justice are great… Defendants are pleading guilty based on what appears to be overwhelming hearsay evidence, mainly digital evidence without robust defence rebuttal. Reason for this may be the evidence is compelling, the defendant may have limited financial resources, the defence lawyers misread the evidence, plea-bargaining offers lesser sentences, etc (Boddington 2012, 156). This study which was conducted in Australia highlights the importance of not only having reliable digital evidence and the mechanisms to do that but also the importance of excellent analytical skills by attorneys of the digital evidence. For instance, a law enforcement official can find evidence of child abuse imagery/child pornography and evidence of webcam sex encounters with minors on someone’s computer; however, the case becomes more complicated when it is known that there are multiple users of one single computer. In this scenario the owner of the computer or other electronic devices may or may not be the true culprit. In situations such as these, it is important that the actual individual who produced, downloaded, or distributed these images is brought to justice. Boddington examines one of these cases which took place in Australia in his study. The case is named the State of Western Australia versus Buchanan (2009) which included a charge of possession of child pornography. In addition, in analyzing a case, there exist many types of reasoning that law enforcement and attorneys can utilize to win a case. The most common one is abductive reasoning in which Rodas, Ericka Carolina 61 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society individuals make quick assumptions based on the facts provided to them without exploring any other possible explanations. On the other hand, deductive reasoning and inductive reasoning allow for more analysis (Boddington 2012, 157). In particular, Cases relying on digital evidence are often complex and involve various groups of related and unrelated evidence that make up the various threads of evidence that form part of the rope of evidence. The problem confronting the examiner is locating and selecting the evidence which requires careful, unbiased reasoning. Each thread complements the whole but often important threads are subject to misinterpretation or are overlooked (Boddington 2012, 157). Therefore, analysis of received evidence needs to be objective and not subjective. Although the community as a whole wants to minimize and eventually eradicate cyber trafficking of children around the world, it is important that the innocent are not unjustly prosecuted for a crime that they did not commit. For this to happen, prosecutors and attorneys need to receive an updated training on how to proceed with such cases and the necessity to not oversimplify the situation. Richard Boddington comments on the 2009 State of Western Australia versus Buchanan case on mere possession of child abuse imagery/child pornography, Expedient use of the evidence selected by the prosecution analyst, combined with questionable inferences about the probity of the evidence, suggested a disregard about the defendants’ presumed innocence in the selected case. The charge of possession with intent, hinged on the defendant’s ownership and exclusive access to the computer. No explicit evidence was offered to support the truth of the contention nor was any attempt made to show others had access of the computer. Offensive pictures and video files and access to child pornography websites was offered as prima facie evidence of guilt, presumably based on abductive reasoning (Boddington 2012, 158). If prosecutors and attorneys want to effectively deter and stop perpetrators and buyers of child abuse imagery they need to rethink their logic and deductive reasoning tactics. If one only succeeds in prosecuting innocent individuals, then those individuals who are guilty will continue Rodas, Ericka Carolina 62 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society their illicit business with impunity. They need to know that there are consequences and that they will be held justly accountable. Forensic examiners and prosecutors need to provide logical explanations of the evidence acquired by first defining legal and investigative questions for the case and then proceeding to define forensic scientific questions (Boddington 2012, 158-159). A checklist for digital evidence should be made available for forensic examiners and prosecutors for evaluation of digital evidence. It should include “accuracy, authenticity, completeness, confidentiality, consistency, possession, relevance, and timeliness” (Boddington 2012, 161). As a result, this checklist could serve as a template for a Code of Conduct for law enforcement and forensic examiners. A Code of Conduct for the tourism and hospitality industry already exists and is under the direction of ECPAT-USA in the United States. The Tourism and Child Protection Code of Conduct “is the only voluntary set of business principles travel and tour companies can implement to prevent child sex tourism and trafficking of children. The Code is a joint venture between the tourism private sector and ECPAT” (ECPAT-USA 2014). The tourism and hospitality companies which sign the Code of Conduct commit themselves to corporate social responsibility by protecting at-risk children and actual victims of trafficking. Likewise, by law-enforcement and its affiliates signing a similar Code of Conduct, it will emphasize its commitment to moral and ethical investigative responsibility. Top officials need to meet to decide on the exact language before finalizing it and disseminating the Code for law enforcement officials. With increased awareness of the importance of accurate analysis and fact-checking, more precise and successful cases will be prosecuted in court. Richard Boddington affirms that a successful analysis of child abuse imagery cases includes Browsing activities for child pornography may be corroborated through search histories, downloaded files, browser caches, and viewing and storage behavior by the user… A simple validation check would have Rodas, Ericka Carolina 63 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society identified exculpatory evidence raising the possibility that others were involved in illicit browsing and downloading offensive material. Reconstruction of browsing activities is part of the validation process, checking and testing each file is crucial to measure the truth of the matter. This must be done before any attempt can be made to test the weight of the evidence (Boddington 2012, 163). The Real Impact of Lack of Awareness of the Issue among Parents and Youth The lack of understanding of how child abuse imagery permeates the virtual world more frequently contributes to the lack of education among adults and youth on internet safety. As already discussed, it is important to be up to date on the latest technologies and how they can be misused by traffickers. Perpetrators rely on the lack of security vigilance by adults and youth alike to target their victims. A February 2014 study by the BBC in UK corroborates this point; it can be assumed that the findings are similar around the world. Researchers found that in the UK, “…over 20% of parents do not monitor what their children are doing online (BBC News Technology 2014). Moreover, David Emm, a senior security researcher at Kaspersky Lab declares that “When children use mobile devices to access the web, they are using the same internet, with the same risks. There is a common misconception that smartphones and tablets don’t need the same level of restriction as a PC” (BBC News Technology 2014). However, there is a solution to the lack of awareness of internet safety awareness among adults, especially parents/guardians. Schools should partner with law enforcement and technology companies to have workshops at least twice a year that teach them about safe practices online and how to install necessary security features and filters on all electronic devices that require an internet connection. In the subsection titled “Involving Parents and Educators,” engaging children as educators of their parents about the Internet is discussed. These workshops can also include students of the school to highlight the importance of communication and trust between both parties. Law enforcement and technology companies can explain in more detail the Rodas, Ericka Carolina 64 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society importance of monitoring one’s child’s activity online and how to apply filters for extra security and how they work. Tony Neate, CEO of Get Safe Online, in UK informed BBC Without using controls such as built-in security, safety, and privacy features and search engine filters, children will almost certainly run into something that really isn’t appropriate for their age, or any age. The survey also found that teenagers aged 13-16 were more vulnerable to being bullied online that those aged 8-12. However, parents worried less about the older group using a tablet (BBC News Technology 2014). Trauma Effects on Children-Boys Can be Victims Too- Eliminating Gender Bias There is this common misconception among society that victims of CSEC are solely girls and not boys because females are perceived to be the weaker sex, subject to vulnerabilities. In contrast, the general public believes males are the stronger sex and are able to defend themselves when needed. This gender stereotype is harmful to children and the rest of society. There are girls who are strong-willed and passionate just as there are boys who might not have the strength to defend themselves physically and emotionally because they are insecure. One needs to remember that as humans, we are not all the same and experience different emotions and have different abilities. With this gender stereotype, one is essentially stating that it is expected for girls to become victims because it is in their “nature” and if boys become victimized it is their fault for not being “brave and smart enough” to fend off the predator (s). This mentality will only continue to corroborate the actions of traffickers and buyers who believe they will not be apprehended and prosecuted for their actions. Steven Procopio, a Licensed Independent Clinical Social Worker wrote a news article for CNN about the need to address boy victims of CSEC in all its forms. The survivor he met with Rodas, Ericka Carolina 65 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society “Brian” shared with Procopio his problem of domestic violence at home and drug abuse. Desperate to leave his abusive home, “Brian” began to sell his body online via Skype, which were live sex encounters with customers. When his parents learned of “Brian’s” activity online, they kicked him out because they believed it made him homosexual. The survivor has since then been placed under the care of the Department of Children and Families (Procopio 2014, 1-2). The behavior of the parents is indicative of the fear and unwillingness among individuals that victims can also be boys and that the boys’ sexuality should not be the prime concern. This only discourages boys from seeking help because they do not want to be shamed or to be “fixed” by society in regards to their sexuality. Victims of both genders can be heterosexual or homosexual. Steven Procopio states Indicators of abuse among males are most often not even recognized due to the assumption that boys can “take care of themselves…” First there is a sense of shame and stigma about being gay or being perceived as gay by family that keeps boys from selfidentifying as sexually exploited. And whole boys are not always forthcoming about their experiences of exploitation, they are also not being asked. Law enforcement and service providers often fail to screen or assess boy at intake with the misguided belief that boys are not victims of CSEC…” (Procopio 2014, 2) This reality serves as a call for law enforcement, first responders, and the community that minor victims of sex trafficking, both online and offline, need to always be helped. Sex trafficking of children is not a gender and/or a sexual orientation question. Rather, it is a question of protecting the human rights and dignity of the human race; one has the right to protect one’s own body from harm and from maintaining autonomy over one’s person. Victims of trafficking are never at fault for what the perpetrators and buyers inflicted on them; they are taken advantage of as traffickers prey on their weaknesses and what they lack in life: emotionally, financially, and Rodas, Ericka Carolina 66 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society also in relationships. For a child, the trafficker represents financial security and a source of love that was absent in his or her family. Also for children who feel excluded from their peer groups or who lack friends and social skills, their trafficker represents to them the only person who accepts them for who they are. The way society and first responders perceive the issue of sex trafficking and the victims needs to change so that victims feel comfortable confiding to them about their need for help. In addition, all victims experience trauma at various levels. Steven Procopio shares that “It has been estimated that as many as 50% of commercially sexually exploited children are boys. Many boys involved in commercial sexual exploitation have a history of complex trauma that often started with childhood sexual abuse and the reality is that approximately one in six boys in the U.S. has a history of sexual abuse” (Procopio 2014, 2). Together we can make a difference in the lives of at-risk and actual victims of child cyber-sex trafficking and sextrafficking. This will succeed only if there is increased awareness of the issue and more dialogue with one’s community. Viewing pornography and child abuse imagery by youth affects their future relationships and their development The discussion now turns to the viewing of pornography and/or child abuse imagery by youth whether willingly, unwillingly, or unknowingly. With the plethora of electronic devices that are made available in this day of age, it is easy for youth to become entrapped in the illicit world of traffickers and buyers. The organization Young Minds, based in the United Kingdom, conducted a survey of 2000 people ages 11-25. The results of this survey, although based in the United Kingdom can be used to infer the situation in the United States, the Philippines, and other countries. Results demonstrate that 11.8% of 11-14 year olds had watched pornography on their Rodas, Ericka Carolina 67 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society electronic devices by accident and 13.4% of 15-17 year olds had accessed it by accident (Blake 2014, 2). For those who accessed it regularly, 10% of 11-14 year olds do so while 11.6% of 1517 year olds access it frequently (Blake 2014, 2). These results call for direct involvement with first responders to understand the cause of these viewings. For those who access it willingly, it may signify a need to be accepted in a relationship or mere curiosity. Nevertheless, for others the experience is not the same. The study by Young Minds found that “Three quarters of 11 to 14 year olds described their reaction to watching pornography as disturbed, upset, worried, or excited. . . However, a quarter of people questioned said they didn’t feel anything” (Blake 2014, 2). This data confirms that prepubescent children have minimal to no knowledge of sexual encounters and are rightfully confused when they come across it. Pubescent children certainly have their fears and doubts but they are less profound. Help is still needed. As Dr. Eileen Vizard, a child psychiatrist states, “With children, whose brains are still developing, there could be long lasting effects on the way their brains function…They tend to escalate the seriousness of what they want to look at, sexual material that involves coercive acts towards women or maybe children” (Blake 2014, 3). If children and youth do not talk about what they see online with a trusted adult and/or peer, they will not understand the gravity of what they are watching and will not realize that the individuals in the videos and live sex encounters are being oppressed and their individual autonomy is controlled. Furthermore, continued view of this illicit material will most likely lead viewers, especially children, to believe that this behavior is accepted in society; of utmost danger is the belief that children might decide to engage in this type of behavior because they believe it is the only way to be loved and accepted in society. Furthermore, continuous viewing of these websites might cause youth’s relationships with friends, family, and significant others (if applicable) to Rodas, Ericka Carolina 68 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society become violent because “That is what you need to do to assert your presence in everyday life.” This sentiment is especially true of those youth who watch these pornographic websites together. Young Minds found that those between the ages of 11 to 14 participated more in this shared viewing of pornography than 15-18 year olds of which only 29% of those surveyed had engaged in watching pornography together (Blake 2014, 2). Therefore, continued dialogue is important among children, teachers, parents, first responders, and other trusted adults. What to do When the Perpetrator is the Child’s Parent and the Buyer is a Teenager? Once again, one needs to stop making generalizations of the crime of cyber-sex trafficking and sex-trafficking in general. Just as the gender, sexuality, and age of the victim(s) do not matter, the gender, sexuality, and age of the trafficker and buyer is not standard either. In March 2011, a 32 year-old mother of four from Maine was charged to 20 years in jail for producing sexually explicit videos with her two-year old daughter for Nicholas Wilde, a teenager from Sheffield, England. He was sentenced to four years in jail in February 2010 (Daily Mail Reporter 2011, 1-2). This proves that sex-trafficking in all its forms, and human trafficking in general is a complex issue. It is hard to believe that a parent: mother or father—generalizations should be avoided—would sell their child (children) for sex, let alone produce the heinous images. The reasons for these actions may be economic or a desperate need to be loved and accepted by someone in their life. In this particular international case, Ms. Carr and Mr. Wilde met on an internet dating site, which then led to the teenage boy instructing Ms. Carr to engage in sexually explicit activities with her two year-old daughter. The case was revealed thanks to a 16 year old girl who received child abuse imagery from Wilde via an internet chat room. In this situation, the Rodas, Ericka Carolina 69 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society teenage girl reacted positively by notifying her mother who then contacted the appropriate authorities (Daily Mail Reporter 2011, 1-2). Judge Woodcock, who overlooked this child abuse imagery case states, “What you have done, Ms. Carr is violate the most basic bond of society, the bond between a mother and her child, between a mother and her daughter. It is incumbent upon me to protect… the people who can’t protect themselves. I’ll tell you unequivocally that yours is the worst case I’ve ever seen…. I have always thought possession was bad enough, but production is another level of evil” (Daily Mail Reporter 2011, 2). Judge Woodcock does make an important point, production of child abuse imagery, especially by a loved one does seem to worse than mere possession; however, one needs to focus on all aspects of child abuse imagery in order to combat it effectively. Conclusion Cyber-sex-trafficking is a new phenomenon which needs better legislation and policy, particularly in the U.S. The Philippines presents an excellent example of legislation that should be adopted by national governments. Since this crime is borderless and offers ease of mobility to perpetrators, technology needs to be improved and shared with countries around the world; sharing of knowledge and resources is a strong force for global civil society which should decrease the number of cases of cyber-trafficking. Moreover, this information should be shared with law enforcement to facilitate the identification of a potential situation and the actual prosecution of the crime. Lastly, these efforts would be ineffective without the active participation of parents/guardians and educators in effective online safety discussions with youth. Dombrowksi et al. argue that “Technology should supplement, not replace, the actions of caregivers” (Dombrowski et al. 2007, 164). Therefore, even if parents and educators insert Rodas, Ericka Carolina 70 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society security features on computers, it will not serve its purpose if youth know how to disable it and continue to interact with strangers online. Constant dialogue is needed to ensure that safety rules are followed, preferably those devised by youth themselves. Together, global civil society can make the world a safer place for children. Rodas, Ericka Carolina 71 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Bibliography ABS CBN News. 2013. 6 rescued from cybersex den in Pampanga. ABS CBN News. August 13. www.abs-cbnnews.com/print/319315 Baym, Nancy. 2010. Personal Connections in the Digital Age. MA: Polity Press: 99149. BBC News. 2014. Parents unaware of dangers faced by children on smartphones. BBC News Technology. February 10. www.bbc.co.uk/news/technology-26121434 BBC News. 2014. US police break up ring sharing indecent images of children. BBC News US and Canada. March 18. www.bbc.com/news/world-us-canada-26639092?print=true Berson, Michael J. and Berson, Ilene R. 2002.Emerging Risks of Violence in the Digital Age. Journal of School Violence 1, no.2: 51-71. Blake, Jonathan. 2014. Mobile porn access ‘damaging’ children and teenagers. Newsbeat. BBC. February 11. www.bbc.co.uk/newsbeat/26122390 Boddington, Richard. 2012. A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial. ADFSL Conference on Digital Forensics, Security and Law, Perth, WA, Australia: 155- 171. Congress of the Philippines. Republic Act No. 10364 of 2012. (passed February 2013). Coorlim, Leif. 2013. Girls from CNN Freedom Project help bust U.S. child pornographer. CNN. May 29. www.edition.cnn.com/2013/05/28/us/child-porn-conviction Rodas, Ericka Carolina 72 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Cordua, Julie, 2014. Interview by author. E-mail Correspondence. March 18. Daily Mail. Reporter. 2011. ‘The worst case I’ve ever seen’: Judge jails U.S. woman for 20 years for abusing 2-year-old daughter on web-cam as teenager watched in Britain. Mail Online March 15. http://www.dailymail.co.uk/news/article-1366537/The-worst-case-Ive-seenJulie-Carr-Maine-sexually-assaulted-year-old-sick-webcam-sentenced-20-years.html Davis, Justin T. 2012. Examining perceptions of local law enforcement in the fight against crimes with a cyber component. Policing: An International Journal of Police Strategies and Management 35, no. 2: 272-284. De Leon, Sunshine. 2013. Cyber-sex trafficking: A 21st Century scourge. CNN. July 18. http://www.cnn.com/2013/07/17/world/asia/philippines-cybersex-trafficking/ Dinglasan, Rouchelle 2014. Police watch over 31 provinces considered as cybercrime ‘hotspots.’ GMA News. February 14. http://www.gmanetwork.com/news/story/346911/news/nation/police-watch-over-31-provincesconsidered-as-cybercrime-hotspots Duyvendak, Jan Willem. 2011. The Politics of Home. New York: Palgrave Macmillan. Lecture, Center for Global Affairs at New York University, New York. November 4, 2013. ECPAT-USA 2014. The Code of Conduct. http://www.ecpatusa.org/code Facebook. Family Safety Center. Accessed March 18, 2014. https://www.facebook.com/safety Rodas, Ericka Carolina 73 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Facebook. What is Social Reporting? Accessed March 18, 2014. https://www.facebook.com/help/128548343894719/ Family Online Safety Institute. Clean-Up Your Digital Footprint. A Platform for Good. http://www.aplatformforgood.org/pages/clean-up-your-digital-footprint Family Online Safety Institute. Family Online Safety Contract. A Platform for Good. http://www.fosi.org/images/stories/resources/family-online-safety-contract.pdf Federal Communications Commission. Children’s Internet Protection Act. http://www.fcc.gov/guides/childrens-internet-protection-act Gischlar, Karen L.; Durst, Theo, and Dombrowski, Stefan C. 2007. Safeguarding Young People from Cyber Pornography and Cyber Sexual Predation: A Major Dilemma of the Internet. Child Abuse Review 16: 153-170. Hall Jr. Rex. 2014. Jury deliberating in Mattawan man’s child pornography case. MLive. March 10. http://www.mlive.com/news/kalamazoo/index.ssf/2014/03/jury_deliberations_underway_fo.html Hall Jr. Rex. 2013.Mattawan man facing 9 new charges in child porn case involving webcam, two boys. MLive. November 29. http://www.mlive.com/news/kalamazoo/index.ssf/2013/11/mattawan_man_facing_9_new_char.h tml Hannan, Melanie. 2014. Interview by author. E-mail Correspondence. January 27. Rodas, Ericka Carolina 74 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Henry, Shawn. 2011. Shawn Henry on Cyber Safety. FBI News Video. May 16. http://www.fbi.gov/news/videos/henry_051611 ICE News Release. 2013. ICE Launches Smartphone App to locate predators, rescue children from abuse and exploitation. September 12. http://www.ice.gov/news/releases/1309/130912washingtondc.htm IOFA Conference. 2013. Responding to Child Trafficking in Westchester County Agenda. ChildRights: Building Child Welfare Response to Child Trafficking in New York State. September 25-27. Access to information provided by ECPAT-USA. IOFA Webinar Conference. 2014. Scientifically Validated Screening Tool to Identify Victims of Child Sex and Labor Trafficking. January 28. JCCA. RESOLVE- Specialized Family Foster Care: Commercially Sexually Exploited Children. http://www.jccany.org/site/PageServer?pagename=programs_foster_resolve Lanning, Kenneth. 2012. Cyber “Pedophiles:” A Behavioral Perspective. In Serial Offenders Theory and Practice. ed. Kevin Borgeson and Kristen Kuehnle, 71-87. MA: Jones and Bartlett Learning LLC. Loskarn, Jesse Ryan. 2014. Jesse Ryan Loskarn’s Last Message. January 23. Accessed February 14, 2014. www.jesseryanloskarnslastmessage.com/333880300 Manning, Jill C. 2006. “The Impact of Internet Pornography on Marriage and the Family: A Rodas, Ericka Carolina 75 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society Review. Sexual Addiction and Compulsivity 13, no. 2-3:131-165. Mathon-Mathieu, Faiza. 2014. Interview by author. E-mail Correspondence. May 1. Palczewski, Catherine Helen. 2001. Contesting Pornography: Terministic Catharsis and Definitional Argument. Argumentation and Advocacy 38 (Summer): 1-17. Polaris Project. 2014. The First Year of Texting. Hotline Statistics. http://www.polarisproject.org/resources/hotline-statistics/the-first-year-of-texting Procopio, Steven. ed. Simon Rushton 2013. Exploited boys are too often failed. CNN Freedom Project. September 18. http://thecnnfreedomproject.blogs.cnn.com/2013/09/18/exploitedboys-are-too-often-failed/ Smolenski, Carol. 2013. Child Exploitation Online. Keynote Address. The Body Computing Conference. October 4. Sullum, Jacob. 2014. Our misguided child porn laws do little to protect children. The Watch: The Washington Post. February 11. http://www.washingtonpost.com/news/thewatch/wp/2014/02/11/our-misguided-child-porn-laws-do-little-to-protect-children/ Terre des Hommes Netherlands. 2013. “Sweetie.” November 4. http://www.youtube.com/sweetie Terre des Hommes Netherlands. Frequently Asked Questions on Webcam Child Sex Tourism: 122. http://www.terredeshommes.org/webcam-child-sex-tourism/ Terre des Hommes Netherlands. 2013. Report “Webcam Child Sex Tourism- Becoming Sweetie: Rodas, Ericka Carolina 76 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society A Novel Approach to Stopping the Global Rise of Webcam Child Sex Tourism” (November): 1-113. http://www.terredeshommes.org/wpcontent/uploads/2013/11/Webcam-child-sex-tourism-terre-des-hommes-NL-nov-2013.pdf THORN. 2013. Sound Practices Guide to Fight Child Sexual Exploitation Online. Access granted by Julie Cordua. March 18, 2014. THORN. 2014. Technology Task Force http://www.wearethorn.org/about-our-fight-againstsexual-exploitation-of-children/ THORN 2013. Tech Task Force. November 12. https://www.youtube.com/watch?v=zMB1CiGUjHk (accessed April 21, 2014). THORN. 2014. Our Work. http://www.wearethorn.org/our-work-to-stop-child-trafficking-now/ THORN. 2014. Our Work—Deterrence. November 8. https://www.youtube.com/watch?v=p0Fblfen1MQ (accessed April 21, 2014). United Nations General Assembly. 1976. International Covenant on Civil and Political Rights, New York, NY: Article 19 (2-3). UNODC. 2000. The Protocol to Prevent, Suppress, and Punish Trafficking in Human Beings, Especially Women and Children, Palermo, Italy: Article 3(a). U.S. Congress. 1791. Bill of Rights, New York, NY: Amendment 1. http://www.archives.gov/exhibits/charters/bill_of_rights_transcript.html U.S. Congress. H.R. 2730 (112th): Strengthening the Child Welfare Response to Human Trafficking Act of 2011. (Introduced 2011). Rodas, Ericka Carolina 77 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society U.S. Congress. H.R. 2801 (112th): E-SAFETI Task Force Act. (Introduced 2011). U.S. Department of Justice 2010. The National Strategy for Child Exploitation Prevention and Interdiction. A Report to Congress (August): 12-13. http://www.justice.gov/psc/docs/natstrategyreport.pdf U.S. Department of State. 2000. Victims of Trafficking and Violence Protection Act of 2000. http://www.state.gov/documents/organization/10492.pdf U.S. Fed News Service. 2013. Former Wilkes-Barre, Pennsylvania, Football Coach Sentenced To 25 Years for Producing Child Pornography, Interstate Extortion, and Cyber Stalking. May 15. Accessed by ProQuest Central October 3, 2013. U.S. Representative Karen Bass. 2011. U.S. Rep. Karen Bass Introduces Bills to Strengthen Child Welfare Agencies Responses to Trafficking, Establishes Task Force to Combat Cyber Human Trafficking. Press Release. August 9. http://bass.house.gov/pressrelease/us-rep-karen-bass-introduces-bills-strengthen-child-welfare-agencies-responses Vacher, Emily; Morse, Ana; McDonald, Sean Martin; Cordua, Julie; Balkam, Stephen. 2014. Use and Misuse of Technology Protecting Girls from Internet Exploitation. ECPAT-USA Panel, Church Center for the United Nations, New York, NY. March 17. Wolters, Paul. 2014. Interview by author. E-mail Correspondence. March 6. Rodas, Ericka Carolina 78 The Multi-Facets of Cyber-Sex Trafficking: A Call for Action and Reform from Society