Interpersonal Cybercrime
Module 6 provides a comprehensive exploration of cybercrime victimization, addressing various forms of online exploitation and abuse such as online child sexual abuse material, cyberstalking, cyberharassment, image-based sexual abuse, and cyberbullying. It sheds light on the diverse groups affected by these crimes, emphasizing the impact of cyberexploitation, bullying, stalking, and obscenity on vulnerable populations. A significant portion of the module is dedicated to examining the legal landscape surrounding cybercrimes. It delves into relevant laws and legislation aimed at combatting cybercrimes and safeguarding individuals, particularly children, in online environments. U.S. Supreme Court cases serve as foundational examples, illustrating federal efforts to target cybercriminals and protect minors from online threats. Moreover, the module provides a cursory review of the intersection between online content and the sex trade industry, touching upon issues such as prostitution and sex tourism. By exploring the influence of online platforms on facilitating such activities, readers gain insights into the broader societal implications of cybercrime.
Learning Objectives
After completing this module, you should be able to:
- understand the nature of cybercrime victimization.
- describe the groups affected by cyber exploitation, bullying, stalking, and obscenity.
- describe the perpetrators of cyberstalking and exploitation via the Internet.
- understand the law and legislation in the areas of cyberstalking, cyber exploitation, and pornography.
- describe the Supreme Court cases that have been decided concerning federal efforts to target cybercriminals and protect children online.
- understand and describe the issues with online pornography, child sexual abuse material, and child exploitation facilitated by the Internet.
- understand the ways that the sex trade including prostitution and sex tourism has changed with the explosion of online content.
- understand and describe the difficulties faced by law enforcement in detecting, investigating, and prosecuting cases of cyberstalking and cyberexploitation.
Summary
This chapter offers a comprehensive exploration of cybercrime victimization, focusing on its various dimensions and the diverse groups affected by cyber exploitation, bullying, stalking, and obscenity. It delves into the characteristics of perpetrators involved in cyberstalking and exploitation via the internet, shedding light on the motivations and tactics employed by these individuals. In addition, this chapter serves as a comprehensive resource for policymakers, law enforcement professionals, and researchers grappling with the complexities of cybercrimes in contemporary society.
A significant portion of the chapter is dedicated to analyzing the legal landscape surrounding cybercrimes, particularly in the realms of cyberstalking, cyber exploitation, and online pornography. Readers gain insights into the relevant laws and legislation aimed at addressing these issues, along with federal efforts targeting cybercriminals and protecting children online. Notably, the chapter examines key Supreme Court cases that have shaped legal responses to cybercrimes and online exploitation.
Moreover, the chapter provides a detailed examination of the nature and extent of online pornography, child sexual abuse material, and child exploitation facilitated by the internet. It explores how the proliferation of online content has transformed the landscape of the sex trade, including prostitution and sex tourism, presenting new challenges for law enforcement and policymakers.
The chapter concludes by addressing the difficulties faced by law enforcement agencies in detecting, investigating, and prosecuting cases of cyberstalking and cyber exploitation. It highlights the technological and jurisdictional complexities inherent in combating cybercrimes, along with the need for enhanced collaboration and resources to effectively address these challenges in the digital age.
Overall, this chapter serves as a comprehensive resource for understanding the multifaceted nature of cybercrime victimization, legal frameworks, societal impacts, and the evolving dynamics of online exploitation and abuse. It provides valuable insights for policymakers, law enforcement professionals, and researchers grappling with the complexities of cybercrimes in contemporary society.
Key Takeaways
These key points summarize the learning objectives, highlighting the focus on understanding the impact, legal context, and enforcement difficulties related to cybercrime and online exploitation.
Cybercrime Victimization aids in the understanding the nature and impact of cybercrime on victims.
Affected groups describes those who are impacted by cyber exploitation, bullying, stalking, and obscenity.
Perpetrators describes those individuals who commit cyberstalking and exploitation through the Internet.
Legislation and laws provide an overview of the legal framework surrounding cyberstalking, cyber exploitation, and online pornography, including relevant laws and regulations.
Supreme Court Cases establish a legal basis from which the government and authorized agencies fight against cybercrime and protecting children online are examined.
The ever-changing form and method of online content is covered problems related to online pornography, child sexual abuse material, and child exploitation facilitated by the Internet.
Sex trade and the internet requires an analysis of how the sex trade, including prostitution and sex tourism, has evolved due to the proliferation of online content.
Law enforcement continue to experience challenges associated with detecting, investigating, and prosecuting cyberstalking and cyberexploitation cases.
Key Terms/Concepts
Anonymity Practices
Child Pornography Prevention Act of 1996
Child sexual abuse material (CSAM)
Children's Online Privacy Protection Act of 1998
Children's Online Privacy Protection Rule ("COPPA")
Cyberbullying
Cyberexploitation
Internet Anonymity
Internet Crimes Against Children (ICAC)
National Center for Missing & Exploited Children (NCMEC)
Modern Example
AI-generated child sexual abuse material (CSAM)
The emergence of AI-generated child sexual abuse material (CSAM) presents a significant and concerning challenge in the realm of cybercrime and child exploitation. AI technology has advanced to the point where it can realistically create images and videos that depict minors in sexually explicit situations, often indistinguishable from real content. This poses several unique challenges:
Authenticity: AI-generated CSAM can be incredibly realistic, making it difficult for both humans and traditional content moderation algorithms to distinguish between genuine and fabricated material. This authenticity can exacerbate the dissemination of CSAM, as perpetrators may use AI to produce large volumes of illicit content.
The proliferation of AI-generated CSAM can increase the accessibility of such material, as it can be easily shared and distributed through various online platforms and networks. This accessibility can perpetuate the victimization of minors and facilitate the exploitation of vulnerable individuals.
The existence of AI-generated CSAM raises complex legal and ethical questions regarding the production, distribution, and possession of such material. Law enforcement agencies and policymakers must grapple with how to address this type of content within existing legal frameworks and ensure that perpetrators are held accountable for their actions.
The creation and dissemination of AI-generated CSAM can have profound and lasting impacts on the victims depicted in the material. Even though the content may be fabricated, victims may still experience significant emotional and psychological harm knowing that such material exists and is being circulated online.
Addressing the challenge of AI-generated CSAM requires a multifaceted approach that involves collaboration between technology companies, law enforcement agencies, policymakers, and advocacy groups. This approach may include developing advanced detection and moderation tools capable of identifying AI-generated content, implementing robust legal frameworks to prosecute offenders, and providing support services for victims affected by this form of exploitation. Additionally, efforts to educate the public about the existence and dangers of AI-generated CSAM are crucial in raising awareness and fostering proactive measures to combat this emerging threat
- For more information, watch WBTV’s – AI-generated child sex abuse material (Jamie Boll, Feb. 2024)
- Read the Report: IWF research into how artificial intelligence (AI) is increasingly being used to create child sexual abuse imagery online. (Oct. 2023)
AI for safer children initiative and its Global Hub (AI for Good, Jan. 2024)
Artificial Intelligence (AI) can not only assist law enforcement agencies in solving crimes but is becoming increasingly crucial particularly in child sexual exploitation and abuse cases, where vast amounts of material heavily burden individual officers. Examples of AI tools and techniques to support law enforcement in these investigations will be discussed, as well as the AI for Safer Children Global Hub – an online platform with a catalogue of over 70 of these tools – and trainings which bring together a community united in combating this crime with innovative methods.
Read, Review, Watch and Listen
- Read The History of Child Pornography on the Internet – Journal of Sex Education and Therapy (Casanova et al., 2000). The History of Child Pornography on the Internet.
- [1].
- Read Supreme Court Strikes Down Ban on Virtual Child Pornography (PBS News, April, 2002).
- Read about the National Center for Missing & Exploited Children (NCMEC): and child sexual abuse material (CSAM).
- Read the NCMEC’s brochure, Coping with child sexual abuse material csam exposure 2020.
- Read about the United States’ national bullying initiative – click HERE.
- Read and learn about the Definition, Research on Bullying, Bullying and Suicide, and Anti-Bullying Laws (stopbullying.gov, 2021).
- Read about the Internet Crimes Against Children (ICAC) Task Force Program.
- Learn more about ICAC’s resources from the Internet Safety page. Review resources within each of the four categories: (1) Parents, (2) Youth, (3) General, and (4) Videos.
- Read Sexual harassment in the metaverse? Woman alleges rape in virtual world.
- Read Brian Dunleavy’s Sextortion’ study: Men at higher risk for online blackmail in pandemic than women [UPI, Jan. 2022].
- Watch Interview with Justice Berry (New York Times, Dec. 2005).
Watch One Good Friend | StopBullying.gov:
Activity
STOP!!! Students should review the course syllabus to determine the assignment of this activity.
This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.
Purpose
The purpose of this activity is to further explore prevention resources for child combating interpersonal cybercrime.
Overview
A variety of victimizations can occur online, many that are like their real-world counterparts. In particular, the nature of the victimizations included threats, obscene comments and intimations, and exposure to obscene and threatening materials, including pictures and other media. Most often, children and women are the primary targets of those who would commit cyberstalking and exploitation over the Internet. Most commonly, white males between the ages of 18 and 35 make up most of the offenders.
The U.S. Supreme Court has had the opportunity to hear several cases regarding cybercrime laws, e.g., Child Pornography Prevention Act (1996). Many of the same issues involving non-cybercrimes are being heard by the court. Many of the laws were overturned for being too vague and sweeping with too broad of a stroke. The federal government has responded with the passage of new laws and refinements of the old laws to regulate and control content on the Internet, particularly the access of children to objectionable content. These types of crimes also present unique difficulties for law enforcement, including lack of expertise, lack of resources, and difficulty in tracking and prosecuting offenders.
Instructions
- Review Module 6 Key Terms/Concepts and focus on those legal protections instituted by the United States government, e.g., Child Pornography Prevention Act 1996.
- Visit the Rape, Abuse & Incest National Network (RAINN) and review the overview of child sexual abuse.
- Also review statistics related to the prevalence of sexual abuse against children and teens: HERE
- Read Prevention of Sexual Abuse Through Educational Programs Directed Towards Children by Dr. David Finkelhor (2007).
- Go to the Monique Burr – Foundation (MBF) for Children – Prevention Education Programs and select ONE of the nine series videos to review. Note that each video is approximately 1-hour in length.
Answer the following questions:
- Think about your findings in step 4 and identify the name of the selected MBF online series and explain its focus and general purpose; be specific and go beyond the title of the presentation.
- Describe one of the most interesting or important things that you learned from watching the video presentation. Be specific and incorporate course-related concepts into your answer.
- In your estimation, how might education based prevention programs support or accentuate the work of technology industry and/or enforcement professionals involved in combatting CSAM? Explain.
Key Terms/Concepts
Child exploitation is the act of using a minor child for profit, labor, sexual gratification, or some other personal or financial advantage. According to the United States Department of Justice (DOJ) [2021], the advent of the internet created a new tool for child-pornography collectors, traders and manufacturers to sexually exploit children. Prior to the digital age, child pornographers relied on physical exchanges or the U.S. mail system to gain access to illegal material. The internet provided an instant, somewhat anonymous, at-home vehicle for these individuals to meet one another, trade files, and access children to victimize.
Child molestation is a crime involving a range of indecent or sexual activities between an adult and a child, usually under the age of 14. In psychiatric terms, these acts are sometimes known as pedophilia. It is important, however, to keep in mind that child molestation and child Sexual Abuse refer to specific, legally defined actions.
Children’s Online Privacy Protection Act of 1998 directs the Federal Trade Commission (FTC) to prescribe regulations requiring commercial website operators to follow fair information practices in connection with the collection and use of personal information from children under age 16, including by obtaining verifiable parental consent for the collection, use, or disclosure of personal information from children under the age of 13.
Children’s Online Privacy Protection Rule (“COPPA”) imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.
Child sexual abuse material (CSAM), formerly known as child pornography (CP), involves the abuse and harm perpetrated against children and is a more accurate description of the harm. The more accurate label of CSAM is slowly replacing the reference to CP throughout academic and legal communities. It is important to remember that unlike adult pornography, children do not engage in consensual erotic behavior intended to cause sexual excitement.
Professional Note, Eric R. Ramirez-Thompson PhD, is a proud and active member of RAINN’s Speakers Bureau. He encourages those who want to learn more or need assistance to visit these other resources:
- https://1in6.org/
- https://nomore.org/campaigns/
- https://1in6.org/get-information/male-survivor-stories/
Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading.
Discussion Questions
- How can schools balance their duty of care for student safety with respect for student privacy and freedom of expression in cyber-space?
- What are some of the legal and educational challenges that cyber-bullying poses for schools in Canada and the U.S.?
- What are some of the best practices or policy guidelines that schools can adopt to prevent and address cyber-bullying among their students?
- How do you evaluate the arguments of the critics who claim that the concepts taught in prevention programs are too complex, inappropriate, or ineffective for children to learn and apply?
- What are the strengths and limitations of the studies that have examined the outcomes of prevention programs, such as victimization rates, disclosure rates, self-blame, and anxiety levels?
- What other prevention strategies besides school-based education programs could be implemented to reduce the occurrence and impact of child sexual abuse? How would you measure their effectiveness?
Supplemental Readings
- National Center for Missing and Exploited Children (NCMEC)
- Internet anonymity practices in computer crime (Armstrong, H.L. & Forde, P.J., 2003) InternetAnonymity
- Cyber-Dilemmas In The New Millennium: School Obligations To Provide Student Safety In A Virtual School Environment (Shariff, Shaheen, McGill Journal of Education, 2005) Cyber-Dilemmas in the New Millennium
- FBI-Crimes Against Children/Online Predators
- Teens and Cyberbullying – 2022 (Pew Research Center, Dec. 2022)
- 2023 National Strategy for Child Exploitation Prevention & Interdiction (U.S. DOJ, September, 2023). Accessed September 2024.
- Teen Girls Confront an Epidemic of Deepfake Nudes in Schools (DNYUS, April 8, 2024)
Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.
Click HERE to report any needed updates, e.g., broken links.
- a. While most legislation uses the term “child pornography,” there has been recent movement globally towards use of other terms, including “child sexual abuse material” and “child sexual abuse content,” which more accurately capture the exploitation that occurs. ↵
The methods and tools that internet users employ to achieve anonymity, such as encryption, proxy servers, virtual private networks, Tor, etc.
Amends the Federal criminal code to prohibit and set penalties for specified activities relating to material: (1) constituting or containing child pornography, including knowingly possessing any book, magazine, periodical, film, videotape, computer disk, or other material that contains three or more images of child pornography (and enhances penalties if the offender has a prior Federal or State conviction relating to aggravated sexual abuse, sexual abuse, abusive sexual conduct involving a minor or ward, or for specified activities relating to child pornography (prior conviction)); and (2) depicting the sexual exploitation of minors, including knowingly mailing, or transporting or shipping in interstate or foreign commerce, including by computer, any visual depiction created, adapted, or modified to appear that an identifiable minor is engaged in sexually explicit conduct. Revises the definition of "visual depiction" to include data stored on computer disk or by electronic means which is capable of conversion into a visual image.
Formerly known as child pornography (CP), involves the abuse and harm perpetrated against children and is a more accurate description of the harm. The more accurate label of CSAM is slowly replacing the reference to CP throughout academic and legal communities. It is important to remember that unlike adult pornography, children do not engage in consensual erotic behavior intended to cause sexual excitement.
Children's Online Privacy Protection Act of 1998 - Directs the Federal Trade Commission (FTC) to prescribe regulations requiring commercial website operators to follow fair information practices in connection with the collection and use of personal information from children under age 16, including by obtaining verifiable parental consent for the collection, use, or disclosure of personal information from children under the age of 13.
COPPA imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.
Bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior (StopBully.gov, 2021).
The non-consensual distribution or publication of intimate photos or videos online.
The ability to conceal one’s identity or location on the internet, which can be used for both legitimate and illegitimate purposes.
A national network of 61 coordinated task forces, representing over 4,500 federal, state, and local law enforcement, dedicated to investigating, prosecuting and developing effective responses to internet crimes against children.
A private, non-profit 501(c)(3) corporation whose mission is to help find missing children, reduce child sexual exploitation, and prevent child victimization. NCMEC works with families, victims, private industry, law enforcement, and the public to assist with preventing child abductions, recovering missing children, and providing services to deter and combat child sexual exploitation.