Английская Википедия:Cybersex trafficking
Шаблон:Short description Шаблон:Use mdy dates
Шаблон:Sex and the law Cybersex trafficking, live streaming sexual abuse,[1][2][3] webcam sex tourism/abuse[4] or ICTs (Information and Communication Technologies)-facilitated sexual exploitation[5] is a cybercrime involving sex trafficking and the live streaming of coerced[6][7] sexual acts and/or rape on webcam.[8][9][10]
Cybersex trafficking is distinct from other sex crimes.[8] Victims are transported by traffickers to 'cybersex dens',[11][12][13] which are locations with webcams[14][9][15] and internet-connected devices with live streaming software. There, victims are forced to perform sexual acts[7] on themselves or other people[16] in sexual slavery[7][17] or raped by the traffickers or assisting assaulters in live videos. Victims are frequently ordered to watch the paying live distant consumers or purchasers on shared screens and follow their commands.[10][18][19] It is often a commercialized,[20] cyber form of forced prostitution.[7][21] Women,[22][23][24] children, and people in poverty are particularly vulnerable[10][15][25] to coerced internet sex. The computer-mediated communication images produced during the crime are a type of rape pornography[26] or child pornography[27][28][29] that is filmed and broadcast in real time and can be recorded.[30]
There is no data about the magnitude of cybersex trafficking in the world.[31][32][33] The technology to detect all incidents of the live streaming crime has not been developed yet.[34] Millions of reports of cybersex trafficking are sent to authorities annually.[35]Шаблон:Failed verification It is a billion-dollar, illicit industry[28] that was brought on with the Digital Age[9][25] and is connected to globalization. It has surged from the world-wide expansion of telecommunications and global proliferation of the internet[10] and smartphones,[36][37][38] particularly in developing countries. It has also been facilitated by the use of software, encrypted communication systems,[39] and network technologies[40] that are constantly evolving,[20] as well as the growth of international online payment systems with wire transfer services[36][32][41] and cryptocurrencies that hide the transactor's identities.[42][43]
The transnational nature and global scale of cybersex trafficking necessitate a united response by the nations, corporations, and organizations of the world to reduce incidents of the crime;[16] protect, rescue, and rehabilitate victims; and arrest and prosecute the perpetrators. Some governments have initiated advocacy and media campaigns that focus on awareness of the crime. They have also implemented training seminars held to teach law enforcement, prosecutors, and other authorities, as well as NGO workers, to combat the crime and provide trauma-informed aftercare service.[44] New legislation combating cybersex trafficking is needed in the twenty-first century.[45][38]
Terminology
Cyber-, as a combining form, is defined as 'connected with electronic communication networks, especially the internet.'[46] Sex trafficking is human trafficking for the purpose of sexual exploitation, including sexual slavery.[47] Victims of cybersex trafficking are trafficked or transported to 'cybersex dens,' which are rooms or locations with a webcam.[14] The cybercrime also involves the transporting or streaming of images of the victims' bodies and sexual assaults in real time through a computer with a webcam to other computers connected to the internet.[8][6][10] It thus occurs partly in the physical or real world, as the sexual assault is real,[48] and partly in cyberspace.[49]
Victims
Victims, predominantly women[50][51][18] and children,[22] are abducted,[7] threatened, or deceived.[10][18] Others are drugged.[52] They are held captive and locked up[18] in rooms with covered or no windows and a webcam.[10] They experience physical and psychological trauma.[10][28][44] Gang rape has occurred on webcam.[17][53] Some are coerced into incest.[31] Victims have been denied food,[17] deprived of sleep,[18] and been forced to perform when sick.[6] They have contracted diseases, including tuberculosis, while in captivity.[6] A number are assaulted[6][18] or tortured.[29][54]
Victims can be exploited in any location where the cybersex traffickers have a computer, tablet, or phone with internet connection.[9] These locations, commonly referred to as 'cybersex dens,'[11][12][13] can be in homes, hotels, offices, internet cafes, and other businesses, making them extremely difficult or impossible for law enforcement to identify.[10] The number of cybersex trafficking victims is unknown.[31][32] Some victims are simultaneously forced into prostitution in a brothel or other location.[55]
Rescues involving live streaming commercial sexual exploitation of children by parents often require a separation of the minors from the families and new lives for them in a shelter.[44]
Some victims are not physically transported and held captive, but rather victims of online sextortion. They are threatened,[56] webcam blackmailed,[57] or bullied to film themselves committing online sexual acts.[58] Victims have been coerced to self-penetrate, in what has been called 'rape at a distance.'[57] Others are deceived, including by phony romantic partners who are really rape or child pornography distributors, to film themselves masturbating.[59] The videos are live streamed to purchasers or recorded for later sale.[30]
Those who are of a lower class, discriminate race, minority, or other social disadvantages are at an increased risk of being victimized.[40] The cybersex trafficking and or non-consensual dissemination of sexual content involving women and girls, often involving threats, have been referred to as "digital gender violence" or 'online gender-based violence.'[60]
Victims, despite being coerced, continue to be criminalized and prosecuted in certain jurisdictions.[40]
Perpetrators
Traffickers
Perpetrators who transport victims to locations with webcams and live streaming software. They or assisting assaulters then commit and film sex crimes to produce real time rape pornography or child pornography materials that may or may not be recorded. Male and female[41][61][62] perpetrators, operating behind a virtual barrier and often with anonymity, come from countries throughout the world[32][36][28] and from every social and economic class. Some traffickers and assaulters have been the victim's family members, friends, and acquaintances.[10][15][28] Traffickers can be part of or aided by international criminal organizations, local gangs, or small crime rings or just be one person.[10] They operate clandestinely and sometimes lack coordinated structures that can be eradicated by authorities.[10] The encrypted nature of modern technology makes it difficult to track perpetrators.[32] Some are motivated by sexual gratification.[29] Traffickers advertise children on the internet to obtain purchasers.[33] Funds acquired by cybersex traffickers can be laundered.[39]
Overseas predators seek out and pay for live streaming or made-to-order services[36] that sexually exploit children.[9][15][31] They engage in threats to gain the trust of local traffickers, often the victims' parents or neighbors, before the abuse takes place.[44]
Consumers
The online audience who are often from another country, may issue commands to the victims or rapists and pay for the services. The majority of purchasers or consumers are men,[54][28] as women who engage in cybersex prefer personal consensual cybersex in chat rooms or direct messaging.[63]
There is a strong correlation between viewing/purchasing child cybersex materials and actually sexually abusing children; cybersex materials can motivate cybersex consumers to move from the virtual world to committing sex crimes in person.[64]
Internet platforms
Cybersex trafficking is partly an internet-based crime.[17] Perpetrators use social media networks,[41] videoconferences, dating pages, online chat rooms, mobile apps,[48] dark web sites,[43][36] and other pages and domains.[65] They also use Telegram and other cloud-based instant messaging[57] and voice over IP services, as well as peer-to-peer (P2P) platforms, virtual private networks (VPN),[40] and Tor protocols and software, among other applications, to carry out activities anonymously.
Consumers have made payments to traffickers, who are sometimes the victim's family members, using Western Union, PayPal, and other electronic payment systems.[66]
Dark web
Cybersex trafficking occurs commonly on some dark websites,[43] where users are provided sophisticated technical cover against identification.[36]
Social media
Perpetrators use Facebook[29][39][57] and other social media technologies.[36][41]
They use fake job listings in order to lure in victims.[67] They do this by creating fake job agencies to get victims to meet with the perpetrator.[68] These fake job listing can be things such as modeling gigs. Social media makes it easier for perpetrators to groom multiple people at once. They continuously send friend requests to increase their chances of getting a victim.[69] Social media gives perpetrators the platform to hide their identity. On social media you can portray to be who ever you want. Therefore, perpetrators use fake accounts to get victims attention. Most perpetrators pose as an attractive person who is living a lavish life.[68] This is used to attract vulnerable users who desire those luxuries. People who desperately desire a luxury living are the easiest targets. They fall for the manipulation that they too can live a life like those fake accounts. Furthermore, younger people are more likely to be victims to cybersex on social media.[70] They are less aware and still learning how to use social media. In addition, adolescents are the more vulnerable on social media because they are exploring. Adolescents can use social media to explore their sexuality. This makes them more accessible to perpetrators.[71] Without guidance adolescents are at risk of falling for the tricks used to lure them into cybersex. In addition, they are less likely to detect when their security is at risk.[72] Perpetrators fake a romantic relationship with the victims on social media to exploit them.[73] Perpetrators will convince victims to perform the sexual acts. They can perform these sexual acts through tools such as webcams. More common on social media is to send pictures or videos. Victims send explicit pictures or videos because they trust the "friend" they have on social media. The victims will do it out of "love" or naiveness. Others do the performances out of fear. They can be threatened with information they previously shared with the perpetrator when they befriended them. However, it becomes an endless cycle when they perform the sexual acts once. After victims do these sexual acts, perpetrators use it as leverage. Perpetrators threaten them to do more sexual acts or they will share to their family and friends what they already have of them.[74]
They use online sites such as Instagram to promote sex services.[74]
Videotelephony
Cybersex trafficking occurs on Skype[75][37][36] and other videoconferencing applications.[76][32] Pedophiles direct child sex abuse using its live streaming services.[75][36][29]
Activities by region
Australia and Oceania
The Australian Federal Police (AFP) investigates cybersex trafficking crimes domestically and in the Asia-Pacific region.[38][75][32]
In 2016, Queensland Police Service officers from Task Force Argos In 2016, Queensland Police Service officers from Task Force Argos executed a federal search warrant at a 58-year-old Australian man's residence.[77] The Australian man pleaded guilty to numerous charges, including soliciting a child for sex and having sex with a child under 16 years of age outside of Australia.[78] Using Skype, the man conducted "live remote" sexual abuse, exploiting two young children in the Philippines while making payments to their mother.[77][78] The exploitation began when the children were only 2 and 7 years old, and the abuse continued for nearly five years.[77] In May 2019, according to the Australian Federal Police (AFP), numerous cases were also uncovered related to Australians allegedly paying for and manipulating child sexual abuse.[79] In November 2019, Australia was alerted by Child Sexual Abuse live streaming when AUSTRAC filed legal action against Westpac Bank in relation to over 23 million suspected violations of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth).[77]
Since 2017, IJM (International Justice Mission) Australia has been working on legal reforms to strengthen Australia's response to OSEC, commonly known as online sex trafficking of children.[80] On June 16, 2020, both houses of the Parliament of Australia enacted the Crimes Legislation Amendment (Sexual Crimes Against Children and Community Protection Measures) Bill 2019, which received royal assent on June 22, 2020.[80] Jacob Sarkodee, CEO of IJM Australia, noted that this new legislation recognizes the contribution of Australians to the growing demand for online sex trafficking of children.[80] According to 2020 Global OSEC report,[81] Australians are the third largest purchasers of cybersex trafficking of children in Philippines.[81][80] Under the proposal made by the IJM, the new legislation specifies that those who watch live streaming of child cybersex trafficking will receive the same penalties as those who manipulate and direct the sexual abuse of children themselves.[80]
East Asia
Cybersex trafficking occurred in the 2018–2020 Nth room case in South Korea.[82] In March 2020, South Korean news agencies reported some details about Nth room case: in crypto-messaging apps such as Telegram and Discord, "at least 74 women and 16 minors performed "sex shows" online for global audience of thousands who paid for cryptocurrency".[83] The victims were manipulated and tortured by viewers and were referred to as slaves. This case is related to the widespread availability and expansion of spy cameras (often referred to as "Molka") in South Korea.Шаблон:Citation needed
North Korean women and girls have been subjected to penetrative vaginal and anal rape, groping, and forced masturbation in 'online rape dens' in China.[6][17][84]
In the trade for female North Koreans, cybersex trafficking is the small but rapidly growing element.[85] Girls as young as 9 years old were abused and exploited in "sex shows" that are broadcast live online to a paying audience, many of them are believed to be Korean men.[85][86]
According to Korea Future Initiative 2019, an estimated 60 percent of North Korean female refugees in China are trafficked into the sex trade,[85] of these, about 15 percent is sold into cybersex dens for exploitation by a global online audiences.[87] China's crackdown on undocumented North Koreans in July 2017 and a developing cybersex industry have fueled the rapid expansion of cybersex dens.[87]
Cybersex trafficking is thought to be extremely lucrative.[85] According to primary research, helpers experiences, and survivors testimonies, live streamed videos of cybersex featuring North Korean girls ages 9–14 can cost $60-$110, while videos featuring North Korean girls and women ages 17–24 can cost up to $90.[85] Offenders are believed to manipulate victims by the means of drugs and violence (physical and sexual).[87] In investigation conducted from February to September 2018, South Korean websites have been discovered to promote North Korean cybersex and pornography, even in the form of "pop-up" advertisements.[85] The high demand of North Korean cybersex victims is largely driven by South Korean man high involvement in searching Korean-language pornography.[87][85] In South Korea, compared to the penalties made for production and distribution of child sexual abuse imagery, the penalties for those who possess images of child porn are far below international standards.[88]
Europe
The European Union Agency for Law Enforcement Cooperation (Europol) investigates and spreads awareness about live streaming sexual abuse.[43] Europol's European Cybercrime Centre (EC3) is especially equipped to combat the cybercrime.[20]
The United Kingdom's National Crime Agency (NCA) investigates cybersex trafficking crimes domestically and abroad.[38][36][32]
Europe was the second largest source of "online enticement" CyberTipline reports.[89] According to Global Threat Assessment 2018 Шаблон:Webarchive, many customers of Online Sexual Exploitation of Children (OSEC) are centered in Europe, along with those who are traffickers and victims of OSEC.[90]
In 2019, Europe accounted for 14% of all sexual exploitation worldwide.[91] Minors are usually trafficked for the purpose of sexual exploitation to EU, and most of them are foreign female children from Nigeria.[91] In Europe, women and children exploited in the sex trade are increasingly being advertised online, with children are found being promoted as adults.[91]
The great Internet freedom[92] and low web hosting costs[93] make the Netherlands one of the countries with a major market for online sexual exploitation.[94] In the 2018 annual report,Internet Watch Foundation (IWF) has said that about 79 percent (82803 out of 105047) of the URLs for materials of child sexual abuse are in Europe, with the vast majority of them are Netherlands-based.[95] The material is produced from different countries in the globe, but they are all hosted on computer servers in the Netherlands.[92] IWF has reported that over 105,047 URLs were linked to illegal images of child sexual abuse, with the Netherlands hosting 47 percent of the content.[93][95]
North America
The Federal Bureau of Investigation (FBI)[38][27] and Homeland Security Investigations (HSI), the investigative arm of the United States Department of Homeland Security, carry out anti-cybersex trafficking operations.[61] The United States Department of State Office to Monitor and Combat Trafficking in Persons (J/TIP) partners with agencies and organization overseas to rescue cybersex trafficked victims.[96]
Southeast Asia
The United Nations Children's Fund (UNICEF) identified the Philippines as the global center of cybersex trafficking.[11] The Office of Cybercrime within the Philippines Department of Justice receives hundreds of thousands of tips of videos and images of sexually exploited Filipino children on the internet.[11] The Philippine National Police, along with its Women and Children Protection Center (WCPC), Philippine Internet Crimes Against Child Center (PICACC),[32] Philippine InterAgency Council Against Trafficking (IACAT, Department of Justice (Philippines), and Department of Social Welfare and Development[96] fight cybersex trafficking in the country.[13][61] Rancho ni Cristo in Cebu is a shelter devoted exclusively to rehabilitating children of live streaming sexual abuse.[44] Children in the shelter are provided food, medical care, counseling, mentoring and life skills training.
The Royal Thai Police's Internet Crimes Against Children (TICAC) task force combats cybersex trafficking in the nation.[59]
Combating the crime
Authorities, skilled in online forensics, cryptography, and other areas,[32] use data analysis and information sharing to fight cybersex trafficking.[75] Deep learning, algorithms, and facial recognition are also hoped to combat the cybercrime.[39] Flagging or panic buttons on certain videoconferencing software enable users to report suspicious people or acts of live streaming sexual abuse.[30] Investigations are sometimes hindered by privacy laws that make it difficult to monitor and arrest perpetrators.[36]
The International Criminal Police Organization (ICPO-INTERPOL) collects evidence of live streaming sexual abuse and other sex crimes.[40] The Virtual Global Taskforce (VGT) comprises law enforcement agencies across the world who combat the cybercrime.[20] The United Nations Children's Fund (UNICEF) funds training for police to identify and address the cybercrime.[16]
Multinational technology companies, such as Google, Microsoft, and Facebook, collaborate, develop digital tools, and assist law enforcement in combating it.[39]
Led by Thorn, an organization that uses technology to combat child sexual exploration globally, a coalition of Big Tech companies including Facebook, Microsoft, Google, and Twitter have been developing ever more sophisticated tools to put in the hands of law enforcement worldwide to combat this issue at every level.
Education
The Ministry of Education Malaysia introduced cybersex trafficking awareness in secondary school syllabuses.[97]
Research shows that predators under 18 years old use coercion and threats to conceal abuse, but adult predators use psychological abuse. Adult predators use psychological abuse to trick the child into thinking that they actually consented to having sex with them or that the child is responsible for what happened to them.[98]
Teaching the risks of online chatting to children is important to reduce the risk of being a victim of cybersex. With online chatting, a predator might gain knowledge on what a child's hobbies and favorite items are by stalking their page or waiting to see what a child posts. After a predator gains this personal knowledge, he goes on to speak to this child, pretending to also be a child with the same interests to lure them in after gaining their trust. This plays a risk because the child may never really know who's on the other side of the screen and potentially become a victim of a predator.[99]
Relation to other sex crimes
Cybersex trafficking shares similar characteristics or overlaps with other sex crimes. That said, according to attorney Joshua T. Carback, it is "a unique development in the history of sexual violence"[8] and "distinct in several respects from traditional conceptions of online child pornography and human trafficking".[8] The main particularization is that involves victims being trafficked or transported and then raped or abused in live webcam sex shows.[8][100][41] The United Nations Office on Drugs and Crime identified the cybercrime involving trafficked victims on webcam sex shows as an emerging problem.[101] The illegal live streaming shows occur in 'cybersex dens,' which are rooms equipped with webcams.[14] The cybercrime has sometimes been informally called 'webcam rape'.[102][103]
Non-governmental organizations
The International Justice Mission is one of the world's leading nonprofit organizations that carries out anti-cybersex trafficking initiatives.[25][15][10] End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes (ECPAT)[10][43] and the Peace and Integrity of Creation-Integrated Development Center Inc., a non-profit organization in the Philippine, support law enforcement operations against cybersex trafficking.[96]
The National Center for Missing & Exploited Children in the United States assists authorities in cybersex trafficking cases.[104] It provides CyberTipline reports to law enforcement agencies.[105]
Terre des hommes is an international non-profit that combats the live streaming sexual abuse of children.[36][28]
The Korea Future Initiative is a London-based organization that obtains evidence and publicizes violations of human rights, including the cybersex trafficking of North Korean women and girls in China.[51]
See also
- List of organizations that combat human trafficking
- Child pornography
- Hurtcore
- Livestreamed crime
- Andrew Tate
References
Further reading
- Шаблон:Cite book
- Шаблон:Cite book
- Шаблон:Cite journal Abstract.
- Шаблон:Cite journal Abstract.
- Шаблон:Cite book
- Шаблон:Cite journal Abstract.
- Шаблон:Cite journal
- Шаблон:Cite book
- Шаблон:Cite web
- Шаблон:Cite book
External links
- International Justice Mission (IJM) Cybersex Trafficking Casework Шаблон:In lang
- Korea Future Initiative Report (London, 2019) Sex Slaves: The Prostitution, Cybersex & Forced Marriage of North Korean Women & Girls in China Шаблон:In lang
- The United Nations Correspondents Association (UNCA) Briefing on Combatting Cybersex Trafficking Шаблон:In lang
Шаблон:Sex trafficking Шаблон:Sexual abuse Шаблон:Sex Шаблон:Pedophilia Шаблон:Violence against women/end Шаблон:Types of crime Шаблон:Computer security
- ↑ Шаблон:Citation pp. 1–4.
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite news
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite journal
- ↑ 6,0 6,1 6,2 6,3 6,4 6,5 Шаблон:Cite web
- ↑ 7,0 7,1 7,2 7,3 7,4 Шаблон:Cite web
- ↑ 8,0 8,1 8,2 8,3 8,4 8,5 Шаблон:Cite journal
- ↑ 9,0 9,1 9,2 9,3 9,4 Шаблон:Cite web
- ↑ 10,00 10,01 10,02 10,03 10,04 10,05 10,06 10,07 10,08 10,09 10,10 10,11 10,12 10,13 Шаблон:Cite web
- ↑ 11,0 11,1 11,2 11,3 Шаблон:Cite web
- ↑ 12,0 12,1 Шаблон:Cite web
- ↑ 13,0 13,1 13,2 Шаблон:Cite web
- ↑ 14,0 14,1 14,2 Шаблон:Cite web
- ↑ 15,0 15,1 15,2 15,3 15,4 Шаблон:Cite web
- ↑ 16,0 16,1 16,2 Шаблон:Cite web
- ↑ 17,0 17,1 17,2 17,3 17,4 Шаблон:Cite newsШаблон:Cbignore
- ↑ 18,0 18,1 18,2 18,3 18,4 18,5 Шаблон:Cite web
- ↑ Шаблон:Cite webШаблон:Cbignore
- ↑ 20,0 20,1 20,2 20,3 Шаблон:Cite web
- ↑ Шаблон:Cite journal p. 43.
- ↑ 22,0 22,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 25,0 25,1 25,2 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 27,0 27,1 Шаблон:Cite web
- ↑ 28,0 28,1 28,2 28,3 28,4 28,5 28,6 Шаблон:Cite web
- ↑ 29,0 29,1 29,2 29,3 29,4 Шаблон:Cite web
- ↑ 30,0 30,1 30,2 Шаблон:Cite web
- ↑ 31,0 31,1 31,2 31,3 Шаблон:Cite web
- ↑ 32,0 32,1 32,2 32,3 32,4 32,5 32,6 32,7 32,8 32,9 Шаблон:Cite web
- ↑ 33,0 33,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 36,00 36,01 36,02 36,03 36,04 36,05 36,06 36,07 36,08 36,09 36,10 36,11 Шаблон:Cite web
- ↑ 37,0 37,1 Шаблон:Cite web
- ↑ 38,0 38,1 38,2 38,3 38,4 Шаблон:Cite web
- ↑ 39,0 39,1 39,2 39,3 39,4 Шаблон:Cite web
- ↑ 40,0 40,1 40,2 40,3 40,4 Шаблон:Cite web
- ↑ 41,0 41,1 41,2 41,3 41,4 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 43,0 43,1 43,2 43,3 43,4 Шаблон:Cite web
- ↑ 44,0 44,1 44,2 44,3 44,4 Шаблон:Cite web
- ↑ Шаблон:Citation pp. 201-203.
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite book
- ↑ 48,0 48,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 51,0 51,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 54,0 54,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 57,0 57,1 57,2 57,3 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 59,0 59,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 61,0 61,1 61,2 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 68,0 68,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite web
- ↑ 74,0 74,1 Шаблон:Cite web
- ↑ 75,0 75,1 75,2 75,3 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 77,0 77,1 77,2 77,3 Шаблон:Cite book
- ↑ 78,0 78,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 80,0 80,1 80,2 80,3 80,4 Шаблон:Cite web
- ↑ 81,0 81,1 https://ijm.org.au/wp-content/uploads/2020/05/Final_OSEC-Public-Summary_05_20_2020.pdf Шаблон:Bare URL PDF
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 85,0 85,1 85,2 85,3 85,4 85,5 85,6 Шаблон:Cite book
- ↑ Шаблон:Cite news
- ↑ 87,0 87,1 87,2 87,3 Шаблон:Cite journal
- ↑ Шаблон:Cite news
- ↑ International Justice Mission with 14 Implementing and Advisory Partners. (2020, May). Full Length Report: Online Sexual Exploitation of Children in the Philippines: Analysis and Recommendations for Governments, Industry, and Civil Society. International Justice Mission.
- ↑ WePROTECT Global Alliance. (2018). Global Threat Assessment 2018: Working Together to End Sexual Exploitation of Children Online.
- ↑ 91,0 91,1 91,2 Шаблон:Cite web
- ↑ 92,0 92,1 Шаблон:Cite news
- ↑ 93,0 93,1 Шаблон:Cite news
- ↑ Шаблон:Cite book
- ↑ 95,0 95,1 "2018 Annual Report". IWF. Retrieved 6 December 2021.
- ↑ 96,0 96,1 96,2 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite journal
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- Английская Википедия
- Страницы с неработающими файловыми ссылками
- Sex trafficking
- Human trafficking
- Computer security
- Cybercrime
- Child labour
- Child sexual abuse
- Crimes against women
- Forced prostitution
- Livestreamed crimes
- Organized crime activity
- Rape
- Sex and the law
- Sex crimes
- Sex industry
- Sexual abuse
- Sexual ethics
- Sexual misconduct
- Sexual slavery
- Violence against children
- Violence against men
- Violence against women
- Страницы, где используется шаблон "Навигационная таблица/Телепорт"
- Страницы с телепортом
- Википедия
- Статья из Википедии
- Статья из Английской Википедии