0% found this document useful (0 votes)
85 views35 pages

Osaec Sop Bali

Our children deserve safety each day, From those who would harm them online in secret ways. Laws now work to stop this abuse before it starts, Protecting the innocent souls and healing their hearts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views35 pages

Osaec Sop Bali

Our children deserve safety each day, From those who would harm them online in secret ways. Laws now work to stop this abuse before it starts, Protecting the innocent souls and healing their hearts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Online

Sexual
Abuse and
Exploitation
of Children
(OSAEC)
Online
Sexual ❑situations involving
digital, internet and
Abuse and communication
Exploitation technologies at some
of Children point during the
continuum of abuse or
exploitation.

❑It can occur fully


online and in-person
interactions between
offenders and children.
❑Visual-images, videos,
Child Sexual drawings and audio material
Abuse that depict a child being
sexually abused.
Materials
(CSAM) ❑It involves production,
distribution, dissemination,
importing, exporting,
offering, selling, possession
of, or knowingly obtaining
access to child sexual abuse
material online (even if the
sexual abuse that is depicted
in the material was carried
out offline).
CSAM and Pornography
❑Pornography is a term defined as
ADULTS engaging in erotic
behavior in pictures, video, and /or
writing, intended to cause sexual
excitement.
❑When CHILDREN are involved, its
not pornography. Its SEXUAL
ABUSE, and it’s a CRIME!
GROOMING ❑Identifying and/or preparing
CHILDREN children via online technology
ONLINE FOR with a view to exploiting them
SEXUAL sexually (whether the acts that
PURPOSES follow are then carried out
online or offline or even not
carried out at all).
❑Acts of grooming are not
limited to acts where a physical,
in-person meeting has been
attempted and/or occurred but
also applies to acts conducted
online.
❑involves establishing an emotional
connection with a child to gain the child’s
trust (also called long term grooming).
❑Offenders can also focus on quickly
gaining leverage over a victim rather than
first establishing a trusting relationship.
❑Groomers sometimes also groom others
such as the child’s peers, family and
community-at-large.
❑Grooming behaviors….filling the
needs of a child by giving
attention and gifts, psychological
coercion, manipulation, ‘sexually
educating’ and desensitizing a
child.
❑Groomers progressively
sexualize the relationship with
the child (either quickly or
slowly).
❑Groomers commonly use
isolation, secrecy and blame to
sustain the child’s participation
and silence.
❑Contact with a child is
generally initiated online
(chatrooms, gaming sites or
social media platforms), but
offline grooming also occurs.
❑“self-production of sexual
images”, or as 'the creating,
SEXTING sharing and forwarding of
sexually suggestive nude or
nearly nude images through
mobile phones and/or the
internet’.
❑“unwanted sexting”. the non-
consensual aspects of the
activity (sharing or receiving
unwanted sexually explicit
photos or messages).
Why and How do Children
Engage in Sexting?
❑Children themselves generally record
and share images at their own initiative
or at the request of another person.

❑Images can be recorded with different


devices (mobile phones are used to
produce content….shared via text, chat
or social media platforms online).
❑Content is shared with a boyfriend
or girlfriend, other peers or people
they are communicating with.
❑gratification in a sexual
relationship, experimenting,
soliciting compliments or attention
and affirming a commitment to
someone.
❑Peer pressure.
❑Children often do not understand
the potential consequences of their
behavior and do not take measures
to hide identifying information.
❑children vulnerable to becoming
victims of sexual extortion,
(cyber)bullying and sometimes
having their picture copied or used in
collections of child sexual
abuse/exploitation material.
SEXUAL ❑blackmailing of a person
with the help of (self-
EXTORTION generated) images of that
(SEXTORTION) person
❑In order to extort sexual
favors, money, or other
benefits from her/him under
the threat of sharing the
material beyond the consent
of the depicted person
(posting images on social
media).
When carried out against
children, sexual extortion
❑children or young people are coerced
into continuing to produce sexual material
and/or told to perform distressing acts
under threat of exposure to others of the
material.
❑In some instances, the abuse spirals so
out of control that victims have attempted
to self-harm or commit suicide as the only
way of escaping it.
Offenders and Characteristics
of Sexual Extortion
❑Perpetrators often rely on a position of
authority or a perceived imbalance of power
rather than on physical violence or force to
coerce a child into sexual favors or money.
❑The psychological coercion generally
manifests with threat of withholding certain
benefits or threat of undesirable consequences
if demands are not met.
❑The sexual component
could involve a perpetrator’s
demand for any form of
unwanted sexual activity,
➢exposing private body
parts,
➢posing for sexual
photographs,
➢submitting to sexual or
physical abuse during a
meeting offline.
❑reflected in the methods applied to
obtain goods, services or money.
❑Sexual extortion can involve the
(threat of) dissemination of
compromising images online or to
peers.
❑result in other negative
consequences like (cyber)bullying
which further victimizes or harms the
child.
Live Online ❑involves coercion of a
Child child to participate in
Sexual sexual activities, alone or
Abuse with other persons.
❑The sexual activity is, at
the same time,
transmitted live or
‘streamed’ over the
Internet and watched by
others remotely.
The persons watching
remotely are the persons who
have
orequested and/or ordered the sexual
abuse of the child,
odictating how the act should be
carried out,
omay be paying for the abuse to take
place.
❑Offenders watching live sexual
abuse of children via webcam may
gain access through intermediaries
or facilitators.
❑Facilitators are sometimes the
child’s family or community members
who force the child to perform in
front of a webcam and communicate
with and elicit (potential) customers.
❑The offender and the
facilitator or child agree on
a time and date when the
abuse will take place and
the offender will log on.
❑Appointments are made
via chat, e-mail, phone and
any other available
channel.
❑The parties involved will agree on a price the
offender will pay, usually through common
legitimate payment services. The amounts
paid are generally small to prevent raising
suspicion related to the transactions.
❑Different platforms such as Skype or
webcam-supported chat sites are being used
to live stream the abuse over the Internet.
❑This allows offenders to view the abuse in
real time and/or to direct it through the chat or
voice function.
Legal
Instruments
The Optional Article 3:
Protocol to ❑Offering, delivering or accepting
the by whatever means, a child for the
Convention purpose of sexual exploitation of
on the Rights the child.
of the Child ❑Producing, distributing,
on the Sale of disseminating, importing,
Children, exporting, selling or possessing
Child child.
Prostitution
❑pornography for the purpose of
and Child sexual exploitation of the child.
Pornography
(OPSC). ❑Attempting to commit any of
these acts and to comply or
participate in any of these acts.
The Council ❑“The Lanzarote Convention”.
of Europe Any State around the world can
Convention become a party to the
on Convention.
the ❑Its objectives are:
Protection
of Children ❑to prevent and combat sexual
against exploitation and sexual abuse of
children;
Sexual
Exploitation ❑to protect the rights of child
and Sexual victims;
Abuse ❑to promote national and
international cooperation
❑'Budapest Convention', is the first
international treaty
The Council ❑seeking to address Internet and
computer crime. It pursues a
of Europe common criminal policy to facilitate
Convention detection, investigation and
on prosecution of conducts directed
against or misusing the
Cybercrime confidentiality, integrity and
availability of computer systems,
networks and computer data.
❑This policy includes adopting and
harmonizing domestic criminal and
procedural law as well as fostering
international cooperation.
International Labor Organisation (ILO)
Convention 182 Concerning the Prohibition
and Immediate Action for the Elimination of
the Worst Forms of Child Labor

❑The Convention calls on Members to take


immediate and effective measures to secure
the prohibition and elimination of 'the worst
forms of child labor' and to ensure effective
implementation of its provisions, including
penal and other sanctions.
❑The goal of this Convention is
to address the need for
The African harmonized legislation in the
area of cyber security in
Union (AU) Member States of the African
Convention Union – including criminal
on Cyber procedural law - and to
establish in each State Party a
Security mechanism capable of
and combating violations of privacy.
Personal
Data ❑Criminalize “child
pornography”
Protection
Activity 5: Poem Writing
(Rhymed Poem)
Theme: Protection and
promotion of child rights in your
community.
ABAB Rhyme Scheme
❑First line and third line (end rhyming) - A
❑Second and fourth line (end rhyming) B
❑Typically ten syllables per line.
Example: Sonnet 14 (Shakespeare)
Not from the stars do I my judgment pluck;—A
And yet methinks I have astronomy,—B
But not to tell of good or evil luck,—A
Of plagues, of dearths, or seasons' quality;—B
AABB Rhyme Scheme
❑First and second line (end rhyming)
❑Third and fourth line (end rhyming)
Example: The Scars That Never Heal
Innocence lost, a childhood stolen, A
A heart that’s shattered, and a spirit broken. A
The pain of child abuse, a trauma so real, B
Leaves scars that never heal. B
A child’s world, once full of wonder, C
Is now a place of fear and thunder. C
The love and care that should be there, D
Is replaced by pain and despair. D

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy