Wednesday, 20 January 2021

UN in your language

Predators in a digital age: vans and candy replaced by internet and IP's

860181962 7aa9182419 z

19 May 2014 - Today, the boogey-man rarely hides under the bed or in the closet, but rather you'll find him behind a computer monitor. A computer screen today is a mask hiding one’s identity, facilitating exploitation of the vulnerable.

None are more vulnerable on the web than children, and the internet allows predators to exploit children around the world, even in the safety of their own homes. The UN Office on Drugs and Crime (UNODC), in cooperation with experts in law enforcement and academia, has launched a study on the effects of new technologies on the abuse and exploitation of children.

Children have unprecedented access to computers and mobile technologies, and have in recent decades tended to adopt these from an early age, resulting in Information and Communication technologies (ICTs) becoming thoroughly embedded in their lives. But this unprecedented access is rife with dangers, especially for young users.

“Cyberspace is a place where children can be groomed with impunity, while the perpetrators remain hidden. By launching this study, UNODC and its partners are helping to bring online child abusers out of the shadows and into the judicial spotlight through better training and better investigative techniques among law enforcement officers,” said UNODC Executive Director Yury Fedotov.

One of the most recent examples are the 251 victims of an exploitation website based in the US, whose members groomed and abused children from around the world to create explicit child sexual abuse material. Children from five countries were identified by the immigration and customs enforcement arm (Ice) of the US Department of Homeland Security. The website, which ran from June 2012 to June 2013 on an encrypted web service, had about 27,000 subscribers and contained about 2,000 webcam videos of the victims at the time it was shut down, according to the department. At least one of the men created fake female personas on social media sites to lure and exploit the children. He also admitted to coaching others to do the same.

Purveyors of child pornography have found in the digital-age a simple and hard to track way of exploiting children. Cases have emerged around the world where seemingly respectable members of society around the world have used the anonymity of the computer to feed their darker impulses. This was highlighted in Greece, when a pediatrician was arrested for possession and distribution of large quantities of child pornographic materials. Or the case of a U.S. Navy pilot who used a false Facebook account to lure a 15-year-old girl into sending him explicit photos.

The globalized and anonymous cyberspace environment also help predators evade detection in new ways, and a multitude of technical challenges hinder governments' abilities to identify and address child exploitation offences. Organized criminal networks also exploit the void, profiting from the commercial child pornography and child sex trafficking markets. This market is further helped by a lack of consistent legislation as individual states vary considerably in their definitions of child abuse and exploitation, and often cannot move fast enough to enact laws that keep pace with technology.

Social Media

Facebook R dark blue 150px  TwitterBird R dark blue 150px  Vimeo R dark blue 150px  Youtube R dark blue 150px  Instagram R dark blue 150px
>> All our channels

externallinks-icon120x120External link:


infoPoint32x32 Dblue Latest Products:

New Backgrounders:
          Refugees and Migrants
          Sustainable Development Goals (SGDs)

Library Newsletter - October 2019
(new websites, information material & publications)

UN Press & Media Contacts

externallinks-icon120x120External link (non-UN):


When the Security Council approaches the final stage of negotiation of a draft resolution the text is printed in blue... What's in Blue helps interested UN readers keep up with what might soon be "in blue".