{"id":7299,"date":"2023-04-12T04:00:00","date_gmt":"2023-04-11T16:00:00","guid":{"rendered":"https:\/\/www.childrescue.org.nz\/?p=7299"},"modified":"2023-04-25T06:58:43","modified_gmt":"2023-04-24T18:58:43","slug":"the-perfect-storm-why-osec-is-growing-so-quickly","status":"publish","type":"post","link":"https:\/\/www.childrescue.org.nz\/blog\/the-perfect-storm-why-osec-is-growing-so-quickly\/","title":{"rendered":"The Perfect Storm: Why OSEC is Growing So Quickly"},"content":{"rendered":"
\n\t
\n\t\t

This global surge is like nothing law enforcement\u2019s ever seen before.<\/h3>\n

In a recent post, we discussed the growing issue of the online sexual exploitation of children (OSEC)<\/a>. This complex problem differs vastly from \u201ctraditional\u201d forms of exploitation, both in how the crime is committed and how they investigate and rescue. If you haven\u2019t already, we encourage you to read that post, so you can familiarise yourself with those differences before diving into this article. One thing both types of exploitation share: they damage the hearts and minds of children.<\/p>\n

In the last few years, OSEC abuse has grown at an alarming rate. Government lockdowns and school closings marked a turning point in the rise as more children spent extra time online, and the upward trend has only continued since then. A study by the European Parliament notes that reports of suspected OSEC abuse increased by 35% in 2021 alone<\/a>. So, the question is: why are kids suffering from online abuse at such an alarming rate?<\/p>\n\t<\/div>\n<\/div>\n\n\n

<\/p>\n\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"According\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

According to UNICEF, 40% of all school-aged children across East and Southern Africa were not in school due to the COVID-19 outbreaks as of July 2021<\/p>\n\t<\/div>\n\n

\n\t
\n\t\t

Today we\u2019ll look at four factors that, combined, have created the perfect storm that has driven the rise in OSEC cases.\u00a0<\/span><\/p>\n

Uniquely susceptible<\/span><\/h2>\n

The first contributing factor to the current online exploitation storm is how a child’s mind responds to online content.\u00a0<\/span><\/p>\n

Children are naturally more vulnerable than adults in every aspect. They are physically smaller, still developing cognitively and still maturing emotionally. Each of these reasons contribute to why predators can exploit children easily, but in discussing OSEC, let\u2019s narrow our focus to the cognitive changes children experience.<\/span><\/p>\n

The age varies per child, but at around 10 years old, kids\u2019 brains undergo some fundamental changes. According to the American Psychological Association, this marks <\/span>when children begin to seek out social rewards<\/span><\/a>.\u00a0<\/span><\/p>\n

These rapid changes gear the child\u2019s mind to crave acceptance. They begin to value how others perceive them, including friends and strangers. Over the next couple of years, they become very sensitive to praise from others as pleasure receptors quickly multiply in the social part of the brain.\u00a0<\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"In\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

In some countries where we work, such as Cambodia, some girls are motivated to enter the sex industry to fund a materialistic lifestyle and mimic over-sexualised behaviour seen online<\/p>\n\t<\/div>\n\n

\n\t
\n\t\t

During this time of increased malleability, children are <\/span>primed to learn positive social behaviours<\/span><\/a> and form good habits that will serve them in adulthood. There\u2019s an opportunity for loving encouragement from parents or trusted friends to help fill this need and guide them to maturity.<\/span><\/p>\n

But now, during these formative years, something else happens to most kids: <\/span>they\u2019re given a smartphone.<\/b><\/p>\n

Most social media companies utilise algorithms designed to activate the brain\u2019s pleasure receptors\u2014the same receptors just beginning to form for kids. Even fully mature adults with years of life experience can become addicted to chasing that next \u201clike.\u201d<\/span><\/p>\n

Children, for lack of both social and mental maturity, aren\u2019t equipped to handle that volume of stimulus.<\/span><\/p>\n

But if current data is any indication, they are being absolutely flooded with it.<\/span><\/p>\n

More time online<\/span><\/h2>\n

That brings us to the second factor in this perfect storm: the increased time kids are spending online.<\/span><\/p>\n

More children are online than ever\u2014and they spend more time online than ever.<\/span><\/p>\n

In 2019, UNICEF estimated that <\/span>one in three children were internet users<\/span><\/a>\u2014and one in three internet users were children<\/span><\/a>. And that was before the past years\u2019 lockdowns pushed more kids online.\u00a0<\/span><\/p>\n

Economic shutdowns and government lockdowns acted as a storm all on their own, driving children online for entertainment and socialisation. A wide-ranging survey of U.S. teens by Common Sense Media indicates that <\/span>internet usage grew faster during the pandemic than in the four years prior<\/span><\/a>.<\/span><\/p>\n

Children are now spending significant portions of their day in front of a screen. The study above stated that <\/span>teens\u2019 screen time increased from an average of six hours and 40 minutes a day in 2015 to almost eight hours and 40 minutes a day in 2021<\/span><\/a>. The director of the Internet Foundation for the Development of Thailand (IFDT) says that according to their studies, children and young adults typically use the internet \u201cup to ten hours a day.\u201d<\/span><\/p>\n

The internet, in and of itself, is not inherently bad; it\u2019s simply a tool. It\u2019s probably the most important educational tool since the printing press, bringing a wealth of knowledge to users of every socioeconomic background.<\/span><\/p>\n

This tool, however, provides equal access to all users, benevolent and nefarious alike.\u00a0<\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"Young\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

Young children being exploited via livestream <\/p>\n\t<\/div>\n\n

\n\t
\n\t\t

Imagine the internet as an enormous library. Within it, people from all over the world can find every encyclopedia, holy book and medical journal in history\u2014along with theaters, game rooms and lobbies where people can meet and interact.\u00a0<\/span><\/p>\n

But as the library became more popular, it grew unchecked, adding rooms and content from more questionable sources until it became more like a sprawling, noisy mall.<\/span><\/p>\n

And now imagine that this enormous campus has no staff, no security cameras, no guards or police. The doors are open at all hours, and <\/span>anyone<\/span><\/i> of any age or background can enter.<\/span><\/p>\n

The internet has experienced a similar evolution. And when shutdowns throughout the last few years restricted physical interactions, children weren\u2019t the only ones driven online.<\/span><\/p>\n

Plentiful hunting grounds<\/span><\/h2>\n

Until now, we\u2019ve only been dealing with factors that combine to make kids more dependent on the internet. Next, we\u2019ll discuss how traffickers took advantage.<\/span><\/p>\n

When bars and brothels shut down around the world, child sex offenders didn\u2019t take a break. According to Caleb, an experienced former detective and Destiny Rescue’s (an organisation whose rescue work in Thailand, Cambodia, Nepal and the Philippines Child Rescue helps fund) Global OSEC Director, child predators began to look for prey online when they lost access to victims in physical locations.<\/span><\/p>\n

They quickly discovered that the web was rife with young, easily-influenced children. Already practiced deceivers, offenders came up with a myriad of ways to disguise their true identities. They learned to pose as children themselves, taking up their targets’ mannerisms and speech patterns. Others created profiles that made them appear charming representatives from legitimate businesses looking for product testers or models.\u00a0<\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"Despite\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

Despite the challenges the internet brings to rescue work, sometimes it allows unique opportunities to connect with perpetrators, such as in this case in the Dominican Republic<\/p>\n\t<\/div>\n\n

\n\t
\n\t\t

After creating fake profiles, predators started conversations with children to groom them for abuse. Others contacted traffickers who sold hour-long sessions in which a child was abused in front of a webcam. Still others showered impressionable teens with those coveted \u201csocial rewards\u201d until the kids were convinced to share illicit photos. From there, it was easy to extort more images and videos under the threat of going public with the images.<\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"Groomers\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

Groomers often start by asking for innocent images before moving to their real objectives<\/p>\n\t<\/div>\n\n

\n\t
\n\t\t

The market snowballed as traffickers seized the opportunity. Some physical traffickers simply switched to renting out time with children online instead of in a brothel, opening their \u201cmerchandise\u201d up to a broader audience. Others started acting as middlemen between predators and desperately impoverished families willing to abuse their children in front of a camera for money to survive.<\/span><\/p>\n

As detectives tried to track offenders who migrated to the internet, they realised that online abusers are exceptionally hard to find and catch.<\/span><\/p>\n

The perfect hiding place<\/span><\/h2>\n

That brings us to the final element of the OSEC storm: abusers\u2019 ability to operate unseen and unhindered.<\/span><\/p>\n

Online offenders often have dozens of fake profiles and layers of security to keep their activities under wraps. Some simply watch from the shadows, but the most dangerous among them brazenly pose as different people or contract others to do it for them.<\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"The\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

The blurred social media profile of a trafficker in Nepal<\/p>\n\t<\/div>\n\n

\n\t
\n\t\t

Let\u2019s return to our metaphor of the library. Imagine that alongside all the educational and social sections, there are numerous peepholes and secret rooms where deviants can spy on other patrons unnoticed. Moreover, more than a few visitors, children included, are not what they seem\u2014behind the disguise of an average guest might lurk a predator looking for his next victim.<\/span><\/p>\n

The problem is frustrating for law enforcement. \u201cIt wasn\u2019t always like this,\u201d an investigator from the Royal Thai Police said. \u201cThe investigations (for physical abusers) were less difficult.\u201d <\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t\"The\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t

The Destiny Rescue Thailand team with law enforcement agency officials during a recent training <\/p>\n\t<\/div>\n\n

\n\t
\n\t\t\t<\/div>\n<\/div>\n\n
\n\t
\n\t\t

Due to <\/span>notoriously low reporting among OSEC survivors<\/span><\/a>, detectives must be intentional in their search for offenders and survivors alike. Sorting through profiles to decide what\u2019s real and fake while analyzing terabytes of data to identify exploitation can take months. Moreover, the lion\u2019s share of the investigation can only use publicly accessible information without a warrant. And because the perpetrator often operates out of a different country, cutting through cross-national red tape further delays the investigation.<\/span><\/p>\n

Every additional day police spend on an investigation compounds harm to the child; every day combing through data is another day a child is abused.\u00a0<\/span><\/p>\n

Many children who endure abuse for years can suffer long-term psychological damage. Others feel so trapped they can\u2019t see a way out. Sadly, the Director of the IDFT reported two recent cases of teenage girls who couldn\u2019t bear the torture of exploitation and were manipulated into thinking that reporting the abuse would make matters even worse. Both girls, feeling trapped and desperate, committed suicide.<\/span><\/p>\n

Working toward a solution<\/span><\/h2>\n

The problem is nothing short of monumental. One statistic estimated that there are <\/span>over 1 million sexual predators online at any given time<\/span><\/a>. Destiny Rescue Global OSEC Director Caleb reported that a recent search in a specific area of Thailand showed over 4,000 instances of child sexual abuse material (CSAM) being distributed at a <\/span>single moment<\/span><\/i>.\u00a0<\/span><\/p>\n\t<\/div>\n<\/div>\n\n

\n
\"\"

Destiny Rescue’s Global OSEC Director presented on OSEC at a recent intelligence training in Thailand<\/em><\/figcaption><\/figure><\/div>\n\n
\n\t
\n\t\t

Complex problems demand innovative solutions, and we\u2019re excited to work alongside an organisation that’s a part of one that has the potential to put OSEC offenders on their heels. Destiny Rescue has partnered with industry experts to develop a groundbreaking piece of software that cuts months off of OSEC investigations. In a future post, we\u2019ll go into more detail about how the software efficiently sniffs out OSEC abuse.<\/span><\/p>\n

To return to our analogy one more time: we\u2019re putting a watchdog in the library.<\/span><\/p>\n

Donate today to help rescue children from human trafficking and sexual exploitation.<\/p>\n\t<\/div>\n<\/div>\n\n