“Our Laws Have Not Caught up with the Technology”: Understanding Challenges and Facilitators in Investigating and Prosecuting Child Sexual Abuse Materials in the United States
Abstract
:1. Introduction
1.1. Definition of CSAM
1.2. Prevalence of CSAM
1.3. Current Challenges to Investigating CSAM
1.3.1. Procedural Challenges to Investigating CSAM
1.3.2. Challenges of CSAM Disclosure to Investigators
1.3.3. Effects of CSAM Exposure on Investigators
1.4. Rationale
2. Methods
2.1. Participants
2.2. Data Collection
2.3. Data Analysis
3. Findings
3.1. Theme 1: Challenges to Investigating and Prosecuting CSAM
3.1.1. Technology and Internet Service Providers (ISPs)
The technology is clearly the biggest thing. I mean there’s a new app, new program, new security, just about every day, let alone every month, or year. So as an organization … we’re always kind of playing catch up and trying to figure out what the next thing is. (FG4, 1)
I think law enforcement is really constantly trying to catch up. I feel like no matter what, we’re always going to be behind unless, as the companies develop it, they keep us in mind…And this is how we help law enforcement, but we’re always the afterthought. (II9)
There are different avenues for people to trade this imagery, through Bit Torrent and the Dark Web, you know we’re just beginning to get access to that stuff. The file sharing stuff has been active for 10 plus years and I’m still kind of astounded how many people use it because it’s open information that law enforcement monitors, but yet people continue because it’s the easiest way for them to access this data. (FG16, 3)
You see horrible things on both sides [Dark Web and traditional platforms]. It’s not necessarily a matter of what they’re trading, it’s just their knowledge in where and how to trade it…I think just the ones [perpetrators] who understand how to use communication on the dark side of the web, that’s where they’re going to go to just because they know it’s more secure and they’ve got a better chance of staying anonymous on that side. (FG4, 1)
I don’t imagine that the state system would get much response. And so, on occasion I have weighed in from my federal phone or email and that has been more helpful. (FG13, 1)
I don’t have data from [Company X] because I don’t have cyber tips from [Company X]. I know we are either getting images straight off the phone or we’re not doing anything with [Company X] because [Company X] doesn’t play ball. (FG13, 2)
[Company Y] showed this video…about how they review every search warrant and they look for whatever they can to reject it so they don’t have to provide this information to law enforcement. (FG10, 1)
They [technology companies] shut the account down. They don’t tell them why, but if a person has half a brain, they’re thinking, ‘okay, I just uploaded three child porn images and lo and behold, within a day my computer got shut down.’ (FG10, 2)
3.1.2. Laws
Our laws have not caught up with our technology and the reality of our situation. (FG1, 2)
If you look at the statutes governing this area [CSAM], most of them were written in the seventies, some are written in the eighties. There was no way that they’d envision what we’re seeing today. (FG13, 3)
I applied for the search warrant. We got the search warrant, did the search of the house and everything went fine. But that is in itself a problem because you know, the old way, you just write it, you go seize everything and analyze it. We can’t do that anymore. You have to specifically identify which device you want to search [and] explain your probable cause to search that device. And so it’s created a whole other set of challenges. (FG10, 1)
You have to develop the expertise over the years to be able to feel confident in your ability to write solid warrants for a variety of different internet platforms like Google Mail and Snapchat and Facebook. And so, he’s really been focused on that for the last several years. (FG8, 2)
There is corroboration through an image. The likelihood that we would get a plea on that case, it would be very high, I would say above 90 percent…it’s [an image] a damning piece of evidence for the defense. (FG7, 1)
3.1.3. Lack of Resources
We don’t have enough people [to investigate] so we can really only get the low bearing fruit. (II9)
We regularly gripe amongst ourselves about how our caseload is different than those who are doing property crimes … it would be wonderful if there was an acknowledgement about the content we deal with. (FG7, 1)
Always [investigating] the ones that were the most imminent. Never get to triage it, but it was most imminent threat to offend. Those were your priorities, and it may make a lot of folks upset because it might take a while to get to their case, but there were cases coming in every day. (FG10, 3)
I am concerned that if we had access to all the images that were out there, had all the disclosures in the world, that we wouldn’t be able to tackle that [and] the system would become overwhelmed … we are fortunate that we have two people dedicated to this work. That’s unheard of in this area to have two people dedicated to child pornography investigations. And even these two find themselves constrained by forensic processing and the length of time that it takes. (FG16, 1)
We’re competing with every single other law enforcement investigation because you better believe that every gang shooting, they need to know what those texts were on those cell phones … so we need more resources, more forensically trained examiners for these devices … Both the hardware and the expertise is incredibly expensive. (FG7, 1)
If we have a big operation, [we] will get resources. We can always pull people, but it’s the day-to-day investigations that build up … we need more investigators that are dedicated to this and allocated to this full-time. (FG12, 1)
These small departments … these really strapped departments, have no capacity to do any of this kind of in-depth stuff. (FG1, 1)
not enough investigators, money for training, money for technology … The bad guys on the internet … are able to get this high level of technology that law enforcement can’t compete with because we’re not a multimillionaire business. So that makes it really, really challenging. (FG10, 4)
3.1.4. Service Provider Mental Health and Well-Being
You don’t get these images out of your head. It doesn’t leave. So even though they [investigators] always say it doesn’t bother them, that it’s okay, I think it’s there. What does it do long-term? (II9)
You view these images and it’s traumatic. (FG14, 1)
I mean, honestly, folks who do anything to do with child sex abuse should be going to talk to someone on a regular basis just for their own mental health. (FG10, 3)
How are our staff getting that support to address the vicarious trauma? And to make sure that we’re at least identifying it and recognizing it when we train. We always include that piece and talking about how people can develop their resilience around that kind of stuff. (FG7, 2)
I think the population we generally forget about, too, is we have secretaries. They are in the trenches with us … We don’t talk about their exposure to this stuff [CSAM]. We assume that we’re the only ones who have to go in and do all the hard work and the reality is just not true and it trickles all the way down to anybody who touches our file. (FGS7, 1)
We’ve had a number of employees that have needed to get out, and once that happened it needed to happen pretty quick. (FG13, 2)
Every few weeks there’s people turning over in SVU [Special Victims Unit]. So as soon as someone gets capacity or training, then they move on. (II15)
It’s a tough business to be in because we need it [mental health support]. We need the help. We’re just a little worried about what will happen if it went against you. (FG9, 2)
They offer all the resources that I think someone could need, whether it be therapy, whether it be time off, or whether it be just someone to talk to. A majority of all that comes with the people you’re working with. That’s why this unit’s really tight knit. (FG14, 1)
The importance of self-care for frontline service providers and law enforcement is critical to being able to maintain just a personally healthy perspective within work that we’re doing because it’s really traumatic work to deal with. (FG13, 1)
3.2. Theme 2: Facilitators to Investigating and Prosecuting CSAM
3.2.1. Multidisciplinary Teams (MDTs)
So when we say MDT, we mean multidisciplinary team, and public policy in the state of [X] says that investigating allegations of child abuse or neglect is very complicated and so the major agencies involved should work together and the district attorney in every county in [state] shall convene a multidisciplinary child abuse team or MDT to assist in that investigation. On that team, you should have representatives of your district attorney’s office or law enforcement agencies, your local [state] Department of Human Services, child protective workers or CPS workers, schools, healthcare [or] hospital personnel. Who else is on there? Other advocacy groups and then your child advocacy center or [also known as] the child … intervention center. (FG6, 1)
3.2.2. Training
So many of these trainings I go to and they’re just not that helpful. You come away disappointed because you’re going away from your family, your organization, spending all this money, you had to travel all the way over there. And this one [Dallas Crimes Against Children Conference] is just spectacular. It’s done for any kind of crime involving children, not just sex abuse. It’s for physical abuse, strangulations, domestic stuff. And it’s not just prosecutors, it’s for law enforcement, it’s for social workers. I’m sure the pediatricians who do this kind of stuff as well, therapists, all of that. It’s a fantastic training. That is … where the light bulb started to really light up for me. (FG8, 3)
I tell people it took me about a year and a half to really grasp this type of investigation and I kind of just learned by asking them questions and then just getting into it. Training’s been great, but [there is] nothing like real life, real world experience. (FG14, 1)
4. Discussion
4.1. Theme 1: Challenges to Investigating and Prosecuting CSAM
4.1.1. Technology and ISPs
4.1.2. Laws
4.1.3. Lack of Resources
4.1.4. Service Provider Mental Health and Well-Being
4.2. Theme 2: Facilitators to Investigating and Prosecuting CSAM
4.2.1. Multidisciplinary Teams (MDTs)
4.2.2. Training
4.3. Strengths and Limitations
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Alaggia, Ramona. 2010. An ecological analysis of child sexual abuse disclosure: Considerations for child and adolescent mental health. Journal of the Canadian Academy of Child. and Adolescent Psychiatry 19: 32. [Google Scholar]
- Binford, Warren. 2015. The Digital Child. SSRN. Available online: https://ssrn.com/abstract=2563874 (accessed on 24 November 2020).
- Binford, Warren, Janna Giesbrecht-McKee, Joshua L. Savey, and Rachel Schwartz-Gilbert. 2015. Beyond Paroline: Ensuring meaningful remedies for child pornography victims at home and abroad. Children’s Legal Rights Journal 35: 117–62. [Google Scholar] [CrossRef] [Green Version]
- Bissias, George, Brian Levine, Marc Liberatore, Brian Lynn, Juston Moore, Hanna Wallach, and Janis Wolak. 2016. Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. Child Abuse & Neglect 52: 185–99. [Google Scholar]
- Bourke, Michael L., and Sarah W. Craun. 2014. Coping with secondary traumatic stress: Differences between U.K and U.S. child exploitation personnel. Traumatology: An International Journal 20: 57–64. [Google Scholar] [CrossRef]
- Brady, Patrick Q. 2016. Crimes against caring: Exploring the risk of secondary traumatic stress, burnout and compassion satisfaction among child exploitation investigators. Journal of Police and Criminal Psychology 32: 305–18. [Google Scholar] [CrossRef]
- Burns, Carolyn M., Jeff Morley, Richard Bradshaw, and José Domene. 2008. The emotional impact on and coping strategies employed by police teams investigating internet child exploitation. Traumatology: An International Journal 14: 20–31. [Google Scholar] [CrossRef]
- Bursztein, Elie, Travis Bright, Michelle DeLaune, David M. Eliff, Nick Hsu, Lindsey Olson, John Shehan, Madhukar Thakur, and Kurt Thomas. 2019. Rethinking the detection of child sexual abuse imagery on the Internet. Paper presented at The International World Wide Web Conference, San Francisco, CA, USA, May 13–17; pp. 2601–7. [Google Scholar]
- Butt, David. 2007. Freedom of Expression and Internet Child Exploitation. Paper presented at the European Regional Conference on the “Ethical Dimensions of the Information Society”, Strasbourg, France, September 13–14. [Google Scholar]
- Canadian Centre for Child Protection (CCCP). 2016. Child Sexual Abuse Images on the Internet: A cybertip.ca Analysis. Available online: https://www.protectchildren.ca/pdfs/CTIP_CSAResearchReport_2016_en.pdf (accessed on 24 November 2020).
- Canadian Centre for Child Protection (CCCP). 2017. Survivors’ Survey. Available online: https://www.protectchildren.ca/pdfs/C3P_SurvivorsSurveyExecutiveSummary2017_en.pdf (accessed on 24 November 2020).
- Council of Europe. 2019. Mechanisms for Collective Action to Prevent and Combat Online Child Sexual Exploitation and Abuse: A Comparative Review. Available online: https://rm.coe.int/191120-comparative-reviews-web-version/168098e10a (accessed on 24 November 2020).
- Dillof, Anthony M. 2016. Possession, child pornography, and proportionality: Criminal liability for aggregate harm offenses. Florida State University Law Review 44: 1331–80. [Google Scholar]
- Edinburgh, Laurel, Julie Pape-Blabolil, Scott B. Harpin, and Elizabeth Saewyc. 2015. Assessing exploitation experiences of girls and boys seen at a child advocacy center. Child Abuse & Neglect 46: 47–59. [Google Scholar]
- Gale, Nicola K., Gemma Heath, Elaine Cameron, Sabina Rashid, and Sabi Redwood. 2013. Using the framework method for the analysis of qualitative data in multi-disciplinary health research. BMC Medical Research Methodology 13: 117–25. [Google Scholar] [CrossRef] [Green Version]
- Hébert, Martine, Marc Tourigny, Mireille Cyr, Pierre McDuff, and Jacques Joly. 2009. Prevalence of childhood sexual abuse and timing of disclosure in a representative sample of adults from Quebec. The Canadian Journal of Psychiatry 54: 631–36. [Google Scholar] [CrossRef]
- Henzey, Michael J. 2011. Going on the offensive: A comprehensive overview of internet child pornography distribution and aggressive legal action. Appalachian Journal of Law 11: 1–70. [Google Scholar]
- Hillman, Henry, Christopher Hooper, and Kin-Kwang Raymond Choo. 2014. Online child exploitation: Challenges and future research directions. Computer Law & Security Review 30: 687–98. [Google Scholar]
- International Centre for Missing and Exploited Children. 2018. Child sexual abuse material: Model legislation and global review. Available online: https://www.icmec.org/child-pornography-model-legislation-report/ (accessed on 24 November 2020).
- Keller, Michael H., and Gabriel J. X. Dance. 2019. The Internet is overrun with images of child sexual abuse: What went wrong. New York Times. Available online: https://www.nytimes.com/interactive/2019/09/28/us/child-sex-abuse.html (accessed on 24 November 2020).
- Krause, Meredith. 2009. Identifying and managing stress in child pornography and child exploitation investigators. Journal of Police and Criminal Psychology 24: 22–29. [Google Scholar] [CrossRef]
- Lee, Hee-Eun, Tatiana Ermakova, Vasilis Ververis, and Benjamin Fabian. 2020. Detecting child sexual abuse material: A comprehensive survey. Forensic Science International: Digital Investigation 34: 301022. [Google Scholar]
- Marshall, Catherine, and Gretchen B. Rossman. 2014. Designing Qualitative Research. Thousand Oaks: Sage Publications. [Google Scholar]
- Martin, Jennifer. 2013. Out of Focus: Exploring Practitioners’ Understandings of Child Sexual Abuse Images on the Internet. Unpublished doctoral dissertation. Factor-Inwentash Faculty of Social Work University of Toronto, Toronto, ON, Canada. [Google Scholar]
- Martin, Jennifer. 2014. “It’s Just an Image, Right?”: Practitioners’ Understanding of Child Sexual Abuse Images Online and Effects on Victims. Child. & Youth Services 35: 96–115. [Google Scholar]
- McCabe, K. A. 2008. The role of Internet service providers in cases of child pornography and child prostitution. Social Science Computer Review 26: 247–51. [Google Scholar] [CrossRef]
- National Centre for Missing and Exploited Children (NCMEC). 2019. Captured on Film: Survivors of Child Sex Abuse Imagery Are Stuck in a Unique Cycle of Trauma. Available online: http://www.missingkids.org/ourwork/publications (accessed on 24 November 2020).
- Owen, G., and N. Savage. 2016. Empirical analysis of Tor hidden services. IET Information Security 10: 113–18. [Google Scholar] [CrossRef]
- Powell, Martine, Cassematis Peter, Benson Mairi, Smallbone Stephen, and Wortley Richard. 2014a. Police officers’ perceptions of the challenges involved in internet child exploitation investigation. Policing: An International. Journal of Police Strategies & Management 37: 543–57. [Google Scholar] [CrossRef]
- Powell, Martine, Cassematis Peter, Benson Mairi, Smallbone Stephen, and Wortley Richard. 2014b. Police officers’ strategies for coping with the stress of investigating internet child exploitation. Traumatology: An International Journal 20: 32–42. [Google Scholar] [CrossRef]
- Powell, Martine, Cassematis Peter, Benson Mairi, Smalllbone Stephen, and Wortley Richard. 2015. Police Officers’ Perceptions of their reactions to viewing internet child exploitation material. Journal of Police and Criminal Psychology 30: 103–11. [Google Scholar] [CrossRef] [Green Version]
- Seigfried-Spellar, Kathryn C. 2018. Assessing the psychological well-being and coping mechanisms of law enforcement investigators vs. digital forensic examiners of child pornography investigations. Journal of Police and Criminal Psychology 33: 215–26. [Google Scholar] [CrossRef]
- Seto, Michael C., Cierra Buckman, R. Gregg Dwyer, and Ethel Quayle. 2018. Production and active trading of child sexual exploitation images depicting identified victims: NCMEC/Thorn Research Report. Alexandria, VA: National Center for Missing and Exploited Children. Available online: https://www.missingkids.org/content/dam/missingkids/pdfs/ncmec-analysis/Production%20and%20Active%20Trading%20of%20CSAM_FullReport_FINAL.pdf (accessed on 24 November 2020).
- Slane, Andrea, Jennifer Martin, Jonah R. Rimer, Angela W. Eke, Roberta Sinclair, Grant Charles, and Ethel Quayle. 2018. Professionals’ Perspectives on Viewing Child Sexual Abuse Images to Improve Response to Victims. Canadian Review of Sociology/Revue canadienne de sociologie 55: 579–96. [Google Scholar] [CrossRef] [PubMed]
- Steel, Chad M. 2015. Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms. Child Abuse & Neglect 44: 150–58. [Google Scholar]
- United States Department of Justice [DOJ]. 2017. Child Pornography. Available online: https://www.justice.gov/criminal-ceos/child-pornography (accessed on 24 November 2020).
- United States Department of Justice [DOJ]. 2020. Citizens Guide to U.S. Federal Law on Child Pornography. Available online: https://www.justice.gov/criminal-ceos/citizens-guide-us-federal-law-child-pornography (accessed on 24 November 2020).
- Violanti, John M., and Fred Aron. 1995. Police stressors: Variations in perception among police personnel. Journal of Criminal Justice 23: 287–94. [Google Scholar] [CrossRef]
- Von Weiler, Julia, Annette Haardt-Becker, and Simone Schulte. 2010. Care and treatment of child victims of child pornographic exploitation (CPE) in Germany. Journal of Sexual Aggression 16: 211–22. [Google Scholar] [CrossRef]
- Wolak, Janis, and Kimberly J. Mitchell. 2009. Work Exposure to Child Pornography in ICAC Task Force and Affiliates [PDF file]. Crimes against Children Research Center. Available online: http://www.unh.edu/ccrc/pdf/Law%20Enforcement%20Work%20Exposure%20to%20CP.pdf (accessed on 24 November 2020).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cullen, O.; Ernst, K.Z.; Dawes, N.; Binford, W.; Dimitropoulos, G. “Our Laws Have Not Caught up with the Technology”: Understanding Challenges and Facilitators in Investigating and Prosecuting Child Sexual Abuse Materials in the United States. Laws 2020, 9, 28. https://doi.org/10.3390/laws9040028
Cullen O, Ernst KZ, Dawes N, Binford W, Dimitropoulos G. “Our Laws Have Not Caught up with the Technology”: Understanding Challenges and Facilitators in Investigating and Prosecuting Child Sexual Abuse Materials in the United States. Laws. 2020; 9(4):28. https://doi.org/10.3390/laws9040028
Chicago/Turabian StyleCullen, Olivia, Keri Zug Ernst, Natalie Dawes, Warren Binford, and Gina Dimitropoulos. 2020. "“Our Laws Have Not Caught up with the Technology”: Understanding Challenges and Facilitators in Investigating and Prosecuting Child Sexual Abuse Materials in the United States" Laws 9, no. 4: 28. https://doi.org/10.3390/laws9040028
APA StyleCullen, O., Ernst, K. Z., Dawes, N., Binford, W., & Dimitropoulos, G. (2020). “Our Laws Have Not Caught up with the Technology”: Understanding Challenges and Facilitators in Investigating and Prosecuting Child Sexual Abuse Materials in the United States. Laws, 9(4), 28. https://doi.org/10.3390/laws9040028