The Complete Mystery of Madeleine McCann™
Welcome to 'The Complete Mystery of Madeleine McCann' forum 🌹

Please log in, or register to view all the forums as some of them are 'members only', then settle in and help us get to the truth about what really happened to Madeleine Beth McCann.

When you register please do NOT use your email address for a username because everyone will be able to see it!

Predators in a digital age: vans and candy replaced by internet and IP's Mm11

Predators in a digital age: vans and candy replaced by internet and IP's Regist10
The Complete Mystery of Madeleine McCann™
Welcome to 'The Complete Mystery of Madeleine McCann' forum 🌹

Please log in, or register to view all the forums as some of them are 'members only', then settle in and help us get to the truth about what really happened to Madeleine Beth McCann.

When you register please do NOT use your email address for a username because everyone will be able to see it!

Predators in a digital age: vans and candy replaced by internet and IP's Mm11

Predators in a digital age: vans and candy replaced by internet and IP's Regist10

Predators in a digital age: vans and candy replaced by internet and IP's

View previous topic View next topic Go down

Predators in a digital age: vans and candy replaced by internet and IP's Empty Predators in a digital age: vans and candy replaced by internet and IP's

Post by Olympicana_Reloaded 19.05.14 21:45

19 May 2014 - Today, the boogey-man rarely hides under the bed or in the closet, but rather you'll find him behind a computer monitor. A computer screen today is a mask hiding one’s identity, facilitating exploitation of the vulnerable.

None are more vulnerable on the web than children, and the internet allows predators to exploit children around the world, even in the safety of their own homes. The UN Office on Drugs and Crime (UNODC), in cooperation with experts in law enforcement and academia, has [You must be registered and logged in to see this link.] on the effects of new technologies on the abuse and exploitation of children.

Children have unprecedented access to computers and mobile technologies, and have in recent decades tended to adopt these from an early age, resulting in Information and Communication technologies (ICTs) becoming thoroughly embedded in their lives. But this unprecedented access is rife with dangers, especially for young users.

“Cyberspace is a place where children can be groomed with impunity, while the perpetrators remain hidden. By launching this study, UNODC and its partners are helping to bring online child abusers out of the shadows and into the judicial spotlight through better training and better investigative techniques among law enforcement officers,” said UNODC Executive Director Yury Fedotov.

One of the most recent examples are the 251 victims of an exploitation website based in the US, whose members groomed and abused children from around the world to create explicit child sexual abuse material. Children from five countries were identified by the immigration and customs enforcement arm (Ice) of the US Department of Homeland Security. The website, which ran from June 2012 to June 2013 on an encrypted web service, had about 27,000 subscribers and contained about 2,000 webcam videos of the victims at the time it was shut down, according to the department. At least one of the men created fake female personas on social media sites to lure and exploit the children. He also admitted to coaching others to do the same.

Purveyors of child pornography have found in the digital-age a simple and hard to track way of exploiting children. Cases have emerged around the world where seemingly respectable members of society around the world have used the anonymity of the computer to feed their darker impulses. This was highlighted in Greece, when a pediatrician was arrested for possession and distribution of large quantities of child pornographic materials. Or the case of a U.S. Navy pilot who used a false Facebook account to lure a 15-year-old girl into sending him explicit photos.

The globalized and anonymous cyberspace environment also help predators evade detection in new ways, and a multitude of technical challenges hinder governments' abilities to identify and address child exploitation offences. Organized criminal networks also exploit the void, profiting from the commercial child pornography and child sex trafficking markets. This market is further helped by a lack of consistent legislation as individual states vary considerably in their definitions of child abuse and exploitation, and often cannot move fast enough to enact laws that keep pace with technology.

[You must be registered and logged in to see this link.]
avatar
Olympicana_Reloaded

Posts : 167
Activity : 203
Likes received : 0
Join date : 2012-07-10

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum