Online child sexual exploitation is an issue that is becoming more prevalent across the whole world. Therefore, a wide-ranging response is needed to address it. To facilitate this, ECPAT recognizes that an understanding of the different forms of online child sexual exploitation is required, as well as for these to be discussed through common language. Through this publication, ECPAT provides resources for a better understanding of online child sexual exploitation.
Section 1 describes and explains five different types of online child sexual exploitation and provides brief guidance on what can be done about each of the five types. The five different types of online child sexual exploitation covered in the publication are:
- Child sexual abuse material, as well as digitally produced child sexual abuse material
- Online grooming
- Sexting
- Sexual extortion
- Live online child sexual abuse
Section 2 discusses “five relevant regional and/or international legal instruments containing provisions regarding one or more of the manifestations of online child sexual exploitation”. It outlines relevant articles, provides weaknesses and strengths of each of the five different legal instruments and also gives information about how many states have ratified and/or signed the frameworks. The five legal frameworks covered by this publication are:
- Optional Protocol to the Convention on the Rights of the Child on the sale of children, child prostitution and child pornography
- Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse
- Council of Europe Convention on Cybercrime
- International Labour Organisation Convention 182 concerning the Prohibition and Immediate Action for the Elimination of the Worst Forms of Child Labour
- African Union Convention on Cyber Security and Personal Data Protection
Section 3 outlines terms and tools that are pertinent to online child sexual exploitation. It describes both how they are utilized by child sex offenders to facilitate online child sexual exploitation as well as how authorities and service provides can utilize these same tools to detect and capture the offenders. The seven different terms and tools covered by this publication are:
- IP-addresses
- Filtering and blocking
- Encryption
- TOR
- PhotoDNA
- Cloud computing
- Splash pages