Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Derecho - Derecho público / Derecho constitucional / Derechos fundamentales

The Multi-Facets of Cyber-Sex Trafficking. A Call for Action and Reform from Society

Título: The Multi-Facets of Cyber-Sex Trafficking. A Call for Action and Reform from Society

Tesis de Máster , 2014 , 78 Páginas

Autor:in: Ericka Rodas (Autor)

Derecho - Derecho público / Derecho constitucional / Derechos fundamentales
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

In the year 2014, human trafficking is still prevalent. Traffickers around the world abuse vulnerable individuals and rob them of their freedom to be safe from harm despite the international and national laws that are in place. In particular, sex trafficking, a subset of human trafficking is a form of discrimination in which people in power, typically men, take advantage of the vulnerabilities of women and children— though men are also victims—to exploit them for their services, whether for labor and/or sex. In addition, deception, fraud, force, and coercion are often used to recruit victims (UNODC 2000, Article 3(a)) although that should not be the main factor when investigating and prosecuting these crimes; for children proof of the threat or use of force or coercion is not required. Already a hidden crime due to the difficulty of identifying the traffickers and victims, the advances in internet technology have offered traffickers a new mechanism to escape detection from law enforcement. Internet offers affordability, accessibility, and anonymity –the “Triple-A Engine Effect” (Manning 2006, 133). Shawn Henry, former Executive Assistant Director of the FBI informed the public that the Internet, despite its contribution to knowledge, has many setbacks. “At any given time, there are an estimated 750,000 child predators online — and they all have a key to your house via the Internet” (FBI News Video 2011, Shawn Henry). As a result, it is time for individuals to be more cognizant of the importance of internet safety in order to combat cyber-sex trafficking.
In May 2013, the use of the Internet to facilitate sex trafficking came to the fore again with the case in the Philippines in which three girls were rescued from a ring forcing them to perform live sex shows via the Internet for customers. Often the customers-- mostly Americans and Europeans--paid $56/minute for the girls to perform live sexual acts (web-cam sex) based on the customers’ typed requests transmitted via computers (de Leon 2013). In the case of the three girls, who were eight years old when the abuse started, U.S. agencies, the Philippine National Police and the non-profit Visayan Forum Foundation received tips on one of their frequent customers, Jeffrey Herschell from Washington, Pennsylvania with the help of the victims. This information helped law enforcement arrest and sentence the offender to 12 years in federal prison (Coorlim 2013).

Extracto


Table of Contents

Introduction

Appeal of the Internet for Traffickers and Buyers

Appeal of Internet to Children and Teens

Advances in Technology

How Should One Refer to the Criminals Who Engage in this Crime?

Cyber -Sex-Trafficking: As Harmful as “Traditional” Sex Trafficking

Type of Services to be Given Child Sex-Trafficking Victims and Potential Victims

How Can the U.S. Limit Access to Pornographic and Sexually Explicit Material of Children without Violating the Right of Free Speech?

How Can Civil Society Be More Involved in Reducing this Crime?

Trauma Effects on Children-Boys Can be Victims Too- Eliminating Gender Bias

Viewing pornography and child abuse imagery by youth affects their future relationships and their development

What to do When the Perpetrator is the Child’s Parent and the Buyer is a Teenager?

Conclusion

Research Objectives and Core Themes

This thesis examines the evolution of sex trafficking in the digital age, specifically focusing on how internet technology is exploited by traffickers to recruit and abuse children. The research aims to redefine cyber-sex trafficking to improve investigation and prosecution efforts, while simultaneously exploring strategies for global collaboration to protect victims and educate civil society on internet safety.

  • The role of technology and anonymity in facilitating modern sex trafficking.
  • Legislative shortcomings and the need for comprehensive legal reforms in the U.S. and the Philippines.
  • The intersection of civil society, law enforcement, and technology companies in victim identification.
  • Trauma-informed care and empowerment strategies for at-risk youth and victims.
  • Overcoming gender bias in the recognition and support of child trafficking victims.

Excerpt from the Book

Appeal of the Internet for Traffickers and Buyers

With progress comes technological innovation. Although this is great news for our fast-paced society, it also allows traffickers to recruit victims on social media sites such as Facebook, Twitter, Instagram, Tumblr, Skype, Snapchat, and Oovoo among many others by gaining their trust by posing as a child/teen with similar interests and problems. With the internet and social media, one does not necessarily have to have access to a computer to speak with an online friend; that can be done with smartphones, iPads, iPods, and tablets, as well as anywhere there is Wi-Fi access. Therefore, it is difficult for law enforcement to identify traffickers, buyers, and victims if there is no constancy in the device used. Furthermore, the danger of live transmissions of sex acts is that it is not recorded. By the time law enforcement arrive at the scene, the crime would have already been committed and the trafficker/buyer can easily deny that any harm has been committed. Law enforcement would have to catch them in the act but that would require knowing the inside details of the arrangement and/or would have to find direct communication: e-mails, phone calls, or texts between traffickers and buyers confirming the operation and payment details. The Internet guarantees safety to traffickers and buyers because it is borderless, as already stated, and individuals can presume many identities. In order to defeat them, technological innovations need to advance in law enforcement’s favor.

Summary of Chapters

Introduction: Provides an overview of human trafficking, specifically highlighting how internet technology has created new mechanisms for exploitation, such as the "Triple-A Engine Effect."

Appeal of the Internet for Traffickers and Buyers: Explores how technological advancements and social media platforms facilitate recruitment and allow perpetrators to maintain anonymity while committing crimes.

Appeal of Internet to Children and Teens: Analyzes why youth are particularly vulnerable to online manipulation, focusing on their need for social acceptance and the tendency to individualize online identities.

Advances in Technology: Discusses how initiatives like the "Sweetie" 3-D model and the THORN organization’s tools help law enforcement track and deter online predators.

How Should One Refer to the Criminals Who Engage in this Crime?: Addresses the linguistic and psychological distinction between "pedophiles" and "child molesters" and why the latter term is crucial for legal accountability in digital contexts.

Cyber -Sex-Trafficking: As Harmful as “Traditional” Sex Trafficking: Argues that internet-facilitated abuse is as severe as physical trafficking and advocates for more specific legislative definitions.

Type of Services to be Given Child Sex-Trafficking Victims and Potential Victims: Proposes reform in rehabilitative services, including self-esteem seminars and internet safety education for victims.

How Can the U.S. Limit Access to Pornographic and Sexually Explicit Material of Children without Violating the Right of Free Speech?: Evaluates the balance between constitutional free speech and the moral obligation to protect children through filters and responsible corporate policy.

How Can Civil Society Be More Involved in Reducing this Crime?: Emphasizes the need for open communication between parents, educators, and children to cultivate responsible digital citizenship.

Trauma Effects on Children-Boys Can be Victims Too- Eliminating Gender Bias: Challenges societal stereotypes that neglect male victims of sexual exploitation and discusses the necessity of inclusive support systems.

Viewing pornography and child abuse imagery by youth affects their future relationships and their development: Examines the psychological impact of accidental or willing exposure to pornography on youth development.

What to do When the Perpetrator is the Child’s Parent and the Buyer is a Teenager?: Analyzes a complex international case to demonstrate that traffickers and buyers do not fit a single profile, necessitating nuanced legal responses.

Conclusion: Summarizes the necessity of a multi-sectoral approach, emphasizing technology, legislation, and constant dialogue between guardians and youth to eradicate the crime.

Keywords

Cyber-sex trafficking, human trafficking, child exploitation, internet safety, law enforcement, digital forensics, victim advocacy, social media, online recruitment, child pornography, legislation, trauma-informed care, gender bias, civil society, digital citizenship

Frequently Asked Questions

What is the primary focus of this thesis?

The work investigates the multi-faceted nature of cyber-sex trafficking, focusing on how perpetrators use internet technology to exploit children and how society, legislation, and law enforcement can collaborate to mitigate these crimes.

What are the central themes covered in the book?

The book covers technological facilitation of crime, the necessity of improved legal definitions, the role of corporate responsibility in tech companies, and the importance of trauma-informed support for victims.

What is the primary research question?

The research seeks to determine how to effectively redefine cyber-sex trafficking, how to balance digital content restrictions with free speech, and how various sectors of civil society can collaborate to prevent the exploitation of children.

Which scientific methods are utilized?

The author employs a comparative analysis of legislative frameworks in the United States and the Philippines, along with a review of case studies and research reports from organizations like ECPAT-USA, THORN, and the Family Online Safety Institute.

What topics are discussed in the main body?

The main body covers the mechanics of online recruitment, the impact of technology on both perpetrators and victims, legal strategies to combat exploitation, and the necessity of victim-centered rehabilitative services.

Which keywords best characterize this work?

The most relevant keywords include cyber-sex trafficking, child exploitation, internet safety, digital forensics, and collaborative prevention strategies.

How does the author propose to fix the issue of gender bias in victim support?

The author argues for the recognition of male victims, emphasizing that sexual exploitation is a human rights issue rather than a gender-specific one, and calls for inclusive screening and assessment tools by social service providers.

What is the importance of the "Sweetie" project mentioned in the text?

The "Sweetie" project demonstrates how technology can be used proactively by law enforcement to catch and identify predators by gaining their trust, effectively turning the technology back against the traffickers.

Final del extracto de 78 páginas  - subir

Detalles

Título
The Multi-Facets of Cyber-Sex Trafficking. A Call for Action and Reform from Society
Universidad
New York University  (Center for Global Affairs)
Curso
Graduate Thesis
Autor
Ericka Rodas (Autor)
Año de publicación
2014
Páginas
78
No. de catálogo
V274893
ISBN (Ebook)
9783656671275
ISBN (Libro)
9783656671282
Idioma
Inglés
Etiqueta
multi-facets cyber-sex trafficking call action reform society
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Ericka Rodas (Autor), 2014, The Multi-Facets of Cyber-Sex Trafficking. A Call for Action and Reform from Society, Múnich, GRIN Verlag, https://www.grin.com/document/274893
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  78  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint