The images are horrific. Children, some just 3 or 4 years old, being sexually abused and in some cases tortured.
Pictures of child sexual abuse have long been produced and shared, but it has never been like this: Technology companies reported a record 45 million online photos and videos of the abuse last year.
More than a decade ago, when the reported number was less than 1 million, the proliferation of the explicit imagery had already reached a crisis point. Tech companies, law enforcement agencies and legislators in Washington responded, committing to new measures meant to rein in the scourge. Landmark legislation passed in 2008.
Yet the explosion in detected content kept growing exponentially.
An investigation by The New York Times found an insatiable criminal underworld that had exploited the flawed and insufficient efforts to contain it.
A paper recently published in conjunction with the National Center for Missing and Exploited Children described a system at a breaking point, with reports of abusive images exceeding the capabilities of independent clearinghouses and law enforcement to take action. It suggested that future advancements in machine learning might be the only way to catch up with criminals.
In interviews, victims across the United States described in heart-wrenching detail how their lives had been upended by the abuse. Many of the survivors and their families said their view of humanity had been inextricably changed by the crimes themselves and the online demand for images of them.
I dont really know how to deal with it, said one woman who, at age 11, had been filmed being sexually assaulted by her father. Youre just trying to feel OK and not let something like this define your whole life. But the thing with the pictures is thats the thing that keeps this alive.
The Times reporting revealed a problem global in scope but one firmly rooted in the United States because of the central role Silicon Valley has played in facilitating the imagerys spread and in reporting it to authorities. While the material, commonly known as child pornography, predates the digital era, smartphone cameras, social media and cloud storage have allowed images to multiply at an alarming rate.
In a particularly disturbing trend, online groups are devoting themselves to sharing images of younger children and more extreme forms of abuse. The groups use encrypted technologies and the dark web, the vast underbelly of the internet, to teach pedophiles how to carry out the crimes and how to record and share images of the abuse worldwide.
After years of uneven monitoring of the material, several major tech companies stepped up surveillance of their platforms. Executives with some companies pointed to the voluntary monitoring and the spike in reports as indications of their commitment to addressing the problem.
But police records and emails, as well as interviews with local, state and federal law enforcement officials, show that some tech companies still fall short. It can take weeks or months for them to respond to questions from authorities, if they respond at all. Sometimes they respond only to say they have no records, even for reports they initiated.
And when tech companies cooperate fully, encryption and anonymization can create digital hiding places for perpetrators. Facebook announced in March plans to encrypt Messenger, which last year was responsible for nearly 12 million of the 18.4 million worldwide reports of child sexual abuse material, according to people familiar with the reports. Reports to authorities typically contain more than one image, and last year encompassed the record 45 million photos and videos.
The law Congress passed in 2008 foresaw many of todays problems, but the Times found that the federal government had not fulfilled major aspects of the legislation.
The Justice Department has produced just two of six required reports to compile data about internet crimes against children and set goals to eliminate them, and there has been a constant churn of short-term appointees leading the departments efforts.
The federal government has also not lived up to the laws funding goals. Congress has regularly allocated about half of the $60 million in yearly funding for state and local law enforcement efforts. Separately, the Department of Homeland Security this year diverted nearly $6 million from its cybercrimes units to immigration enforcement.
Further impairing the federal response are shortcomings at the National Center for Missing and Exploited Children, which reviews reports it receives and then distributes them to federal, state and local law enforcement agencies, as well as international partners.
The nonprofit center has relied in large measure on 20-year-old technology, has difficulty keeping experienced engineers on staff and, by its own reckoning, regards stopping the online distribution of photos and videos secondary to rescuing children.
The videos found on the computer of an Ohio man and site administrator named Jason Gmoser were described by investigators as among the most gruesome and violent images of child pornography. The videos were stored in a hidden computer file and had also been encrypted.
Increasingly, criminals are using advanced technologies like encryption to stay ahead of police. In this case, the Ohio man, who helped run a website on the dark web known as the Love Zone, had more than 3 million photos and videos on his computers.
The site, now shuttered, had nearly 30,000 members and required them to share images of abuse to maintain good standing, according to court documents. A private section of the forum was available only to members who shared imagery of children they abused themselves.
Multiple police investigations have broken up enormous dark web forums, including one known as Childs Play that was reported to have had over 1 million user accounts.
Offenders can cover their tracks by connecting to virtual private networks, which mask their locations; deploying encryption techniques, which can hide their messages and make their hard drives impenetrable; and posting on the dark web, which is inaccessible to conventional browsers.
The anonymity offered by the sites emboldens members to post images of very young children being sexually abused, and in increasingly extreme and violent forms.
Exhibits in the Love Zone case include screenshots showing the forum had dedicated areas where users discussed ways to remain safe while posting and downloading imagery.
Testimony in Gmosers criminal case revealed that it would have taken authorities trillions of years to crack the 41-character password he had used to encrypt the site. He eventually turned it over and was sentenced to life in prison in 2016.
Truly Terrible Things
The surge in criminal activity on the dark web accounted for only a fraction of the 18.4 million reports of abuse last year. That number originates almost entirely with tech companies based in the United States.
Companies have known for years that their platforms were being co-opted by predators, but many of them essentially looked the other way. And while many companies have made recent progress in identifying the material, they were slow to respond.
The recent surge by tech companies in filing reports of online abuse wouldnt exist if they did their job then, said Hemanshu Nigam, a former federal prosecutor in cybercrime and child exploitation cases who now runs a cybersecurity consulting firm.
The companies knew the house was full of roaches, and they were scared to turn the lights on, said Hany Farid, who worked with Microsoft to develop technology in 2009 for detecting child sexual abuse material. And then when they did turn the lights on, it was worse than they thought.
Federal law requires companies to preserve material about their reports of abuse imagery for 90 days. But given the overwhelming number of reports, it is not uncommon for requests from authorities to reach companies too late.
Most tech companies have been quick to respond to urgent inquiries, but responses in other cases vary significantly. Police officers in Missouri, New Jersey, Texas and Wisconsin pointed to Tumblr, a blogging and social networking site with 470 million users, as one of the most problematic companies, lamenting Tumblrs poor response to requests.
Law enforcement officials also pointed to problems with Microsofts Bing search engine, and Snap, the parent company of the social network Snapchat. Bing was said to regularly submit reports that lacked essential information, making investigations difficult. Snapchat is engineered to delete most of its content within a short period of time.
Facebook has long known about abusive images on its platforms, including a video of a man sexually assaulting a 6-year-old that went viral last year on Messenger. When Mark Zuckerberg, Facebooks chief executive, announced in March that Messenger would move to encryption, he acknowledged the risk it presented for truly terrible things like child exploitation.
Annual funding for state and regional investigations was authorized at $60 million, but only about half of that is regularly approved. It has increased only slightly from 10 years ago when accounting for inflation. Even $60 million a year would now be vastly inadequate.
And even the most recent biennial strategy reports published by the Justice Department, in 2010 and 2016, did not include data about some of the most pressing concerns, such as trade in illicit imagery.
When the law Congress passed in 2008 was reauthorized in 2012, the coordinator role was supposed to be elevated to a senior executive position. That has not happened.
The National Center for Missing and Exploited Children has also struggled with demands to contain the spread of the imagery.
As child exploitation has grown on the internet, the center has not kept up. The technology it uses for receiving and reviewing reports of the material was created in 1998. To perform key upgrades and help modernize the system, the group has relied on donations from tech companies like Palantir and Google.
The center has said it intends to make significant improvements to its technology starting in 2020, but the problems dont stop there. Police complain that the most urgent reports are not prioritized, or are sent to the wrong department completely. And despite its mandate by Congress, the center is not subject to public records laws and operates with little transparency.
The Times found that there was a close relationship between the center and Silicon Valley that raised questions about governance practices. The center receives both money and in-kind donations from tech companies, while employees of the same companies are sometimes members of its board. That practice, those working in the area of child protection said, could elevate the interests of tech companies above the childrens.
The close relationship with tech companies may ultimately be in jeopardy. In 2016, a federal court held that the national center, though private, qualified legally as a government entity because it performed a number of essential government functions.
If that view gains traction, Fourth Amendment challenges about searches and seizures by the government could change how the center operates. And under those circumstances, if they were to collaborate too closely with the center, companies could also be viewed as government actors subject to new legal requirements and court challenges when they police their own sites.
It was a sunny afternoon in July, and an unmarked police van in Salt Lake City was parked outside a pink stucco house.
At the back of the van, a man who lived in the house was seated, while officers cataloged hard drives and sifted through web histories from his computers. The man had shared sexually explicit videos online, police said.
The year was barely half over, and the team of Chief Jessica Farnsworth, an official with the Utah attorney generals office who led a raid of the house, had already conducted about 150 such raids across Utah. The specially trained group, one of 61 nationwide, coordinates responses to internet crimes against children.
The Utah group expects to arrest nearly twice as many people this year as last year, but federal funding has not kept pace. Funding for the 61 task forces from 2010 to 2018 remained relatively flat, federal data shows, while the number of leads referred to them increased by more than 400%.
Much of the federal money goes toward training new staff members because the cases take a heavy emotional and psychological toll on investigators, resulting in constant turnover.
The volume of work has also forced the task forces to make difficult choices. Some have focused on the youngest and most vulnerable victims, while others have cut back on undercover operations.
The internet is well known as a haven for hate speech, terrorism-related content and criminal activity, all of which have raised alarms and spurred public debate and action. But the problem of child sexual abuse gets scant attention because few people want to confront the enormity and horror of the content.
Some state lawmakers, judges and members of Congress have refused to discuss the problem in detail, or have avoided attending meetings and hearings, according to interviews with law enforcement officials and victims.
Steven Grocki, who leads the child exploitation and obscenity section at the Justice Department, said the reluctance was a societal problem. They turn away from it because its too ugly of a mirror, he said.
While the imagery is often defined as child pornography, experts prefer terms like child sexual abuse imagery or child exploitation material to underscore the seriousness of the crimes and to avoid conflating it with adult pornography.
Each and every image is a depiction of a crime in progress, said Sgt. Jeff Swanson, a task force commander in Kansas. The violence inflicted on these kids is unimaginable.
More here:
Utah and other states try to combat increase of child sex abuse online - Salt Lake Tribune
- Quinn: Supreme Court should clarify Fourth Amendment rights in the digital age [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Fourth amendment | Wex Legal Dictionary / Encyclopedia ... [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- The Fourth Amendment is destroyed by the Roberts led Supreme Court. - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Protections for e-data clear Senate committee [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- Weighing The Risks Of Warrantless Phone Searches During Arrests [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- Court may let cops search smartphones [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- Supreme Court to hear case on police searches of cellphones [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- Fourth Amendment in the digital age: Supreme Court to decide if police can search cellphones without a warrant [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- What Scalia knows about illegal searches [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- Should police be allowed to search your smartphone - Video [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- The Shaky Legal Foundation of NSA Surveillance on Americans [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Pennsylvania Supreme Court rules police don't need warrants to search cars [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Local police: Updated vehicle-search law still requires probable cause [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Liberal Supreme Court Justice Comes To The Defense Of Scalia [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Smartphones and the Fourth Amendment - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Fourth Amendment Defined & Explained - Law [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]
- I-Team: Do police seek search warrant friendly judges? [Last Updated On: May 8th, 2014] [Originally Added On: May 8th, 2014]
- Is Big Brother Listening? Applying the Fourth Amendment in an Electronic Age - Video [Last Updated On: May 9th, 2014] [Originally Added On: May 9th, 2014]
- Magistrate waxes poetic while rejecting Gmail search request [Last Updated On: May 10th, 2014] [Originally Added On: May 10th, 2014]
- The Fourth Amendment - Video [Last Updated On: May 10th, 2014] [Originally Added On: May 10th, 2014]
- License reader lawsuit can be heard, appeals court rules [Last Updated On: May 15th, 2014] [Originally Added On: May 15th, 2014]
- Seize the Rojo - Video [Last Updated On: May 16th, 2014] [Originally Added On: May 16th, 2014]
- NSA Spying Has a Disproportionate Effect on Immigrants [Last Updated On: May 16th, 2014] [Originally Added On: May 16th, 2014]
- Motorists sue Aurora, police in 2012 traffic stop after bank robbery [Last Updated On: May 18th, 2014] [Originally Added On: May 18th, 2014]
- Judge Says NSA Phone Surveillance Likely Unconstitutional - Video [Last Updated On: May 21st, 2014] [Originally Added On: May 21st, 2014]
- New York Attorney Heath D. Harte Releases a Statement on Fourth Amendment Rights [Last Updated On: May 22nd, 2014] [Originally Added On: May 22nd, 2014]
- The Fourth Amendment Rights - Video [Last Updated On: May 23rd, 2014] [Originally Added On: May 23rd, 2014]
- Bangor Area School District teachers vote no to random drug [Last Updated On: May 24th, 2014] [Originally Added On: May 24th, 2014]
- I Don't Care About The Contitution, Take Your Fourth Amendment And Shove It The Hills Hotel - Video [Last Updated On: May 27th, 2014] [Originally Added On: May 27th, 2014]
- Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border - Standing UP & Pushing Back! pt 2/2 - Video [Last Updated On: August 31st, 2014] [Originally Added On: August 31st, 2014]
- Suit charges Daytona Beach's rental inspection program violates civil rights [Last Updated On: September 3rd, 2014] [Originally Added On: September 3rd, 2014]
- 4th Amendment - Laws.com [Last Updated On: September 4th, 2014] [Originally Added On: September 4th, 2014]
- YOU CAN ARREST ME NOW (cops refuse, steal phone) - Video [Last Updated On: September 7th, 2014] [Originally Added On: September 7th, 2014]
- The Feds Explain How They Seized The Silk Road Servers [Last Updated On: September 8th, 2014] [Originally Added On: September 8th, 2014]
- Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA? [Last Updated On: September 9th, 2014] [Originally Added On: September 9th, 2014]
- Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained [Last Updated On: September 10th, 2014] [Originally Added On: September 10th, 2014]
- Family of a mentally ill woman files lawsuit against San Mateo Co. after deadly shooting [Last Updated On: September 10th, 2014] [Originally Added On: September 10th, 2014]
- Minnesota Supreme Court upholds airport drug case decision [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Law Talk - Obamacare Rollout; Fourth Amendment, NSA Spying Stop & Frisk DUI Check Points lta041 - Video [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Volokh Conspiracy: The posse comitatus case and changing views of the exclusionary rule [Last Updated On: September 15th, 2014] [Originally Added On: September 15th, 2014]
- Guest: Why the privacy of a public employees cellphone matters [Last Updated On: September 16th, 2014] [Originally Added On: September 16th, 2014]
- Volokh Conspiracy: Apples dangerous game [Last Updated On: September 19th, 2014] [Originally Added On: September 19th, 2014]
- Judge expounds on privacy rights [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- The Fourth Amendment By Maison Erdman - Video [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- Volokh Conspiracy: When administrative inspections of businesses turn into massive armed police raids [Last Updated On: September 22nd, 2014] [Originally Added On: September 22nd, 2014]
- The chilling loophole that lets police stop, question and search you for no good reason [Last Updated On: September 23rd, 2014] [Originally Added On: September 23rd, 2014]
- Pet Owners Look to Muzzle Police Who Shoot Dogs [Last Updated On: September 27th, 2014] [Originally Added On: September 27th, 2014]
- Volokh Conspiracy: A few thoughts on Heien v. North Carolina [Last Updated On: September 29th, 2014] [Originally Added On: September 29th, 2014]
- Volokh Conspiracy: Third Circuit on the mosaic theory and Smith v. Maryland [Last Updated On: October 1st, 2014] [Originally Added On: October 1st, 2014]
- Volokh Conspiracy: Third Circuit gives narrow reading to exclusionary rule [Last Updated On: October 2nd, 2014] [Originally Added On: October 2nd, 2014]
- Volokh Conspiracy: Supreme Court takes case on duration of traffic stops [Last Updated On: October 3rd, 2014] [Originally Added On: October 3rd, 2014]
- Search & Seizure, Racial Bias: The American Law Journal on the Philadelphia CNN-News Affiliate WFMZ Monday, October 6 ... [Last Updated On: October 3rd, 2014] [Originally Added On: October 3rd, 2014]
- Argument preview: How many brake lights need to be working on your car? [Last Updated On: October 3rd, 2014] [Originally Added On: October 3rd, 2014]
- The 'Barney Fife Loophole' to the Fourth Amendment [Last Updated On: October 3rd, 2014] [Originally Added On: October 3rd, 2014]
- Search & Seizure: A New Fourth Amendment for a New Generation? - Promo - Video [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Ap Government Fourth Amendment Project - Video [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Lubbock Liberty Workshop With Arnold Loewy On The Fourth Amendment - Video [Last Updated On: October 5th, 2014] [Originally Added On: October 5th, 2014]
- Feds Hacked Silk Road Without A Warrant? Perfectly Legal, Prosecutors Argue [Last Updated On: October 7th, 2014] [Originally Added On: October 7th, 2014]
- Supreme Court Starts Term with Fourth Amendment Case [Last Updated On: October 7th, 2014] [Originally Added On: October 7th, 2014]
- Argument analysis: A simple answer to a deceptively simple Fourth Amendment question? [Last Updated On: October 9th, 2014] [Originally Added On: October 9th, 2014]
- Feds Say That Even If FBI Hacked The Silk Road, Ulbricht's Rights Weren't Violated [Last Updated On: October 9th, 2014] [Originally Added On: October 9th, 2014]
- Mass Collection of U.S. Phone Records Violates the Fourth Amendment - Video [Last Updated On: October 9th, 2014] [Originally Added On: October 9th, 2014]
- Leggett sides with civil liberties supporters [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Search & Seizure / Car Stops: A 'New' Fourth Amendment for a New Generation? - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- The Fourth Amendment- The Maininator Period 4 - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Judge nukes Ulbricht's complaint about WARRANTLESS FBI Silk Road server raid [Last Updated On: October 11th, 2014] [Originally Added On: October 11th, 2014]
- Montgomery County will not hold immigrants without probable cause -- Gazette.Net [Last Updated On: October 13th, 2014] [Originally Added On: October 13th, 2014]
- Debate: Does Mass Phone Data Collection Violate The 4th Amendment? [Last Updated On: October 14th, 2014] [Originally Added On: October 14th, 2014]
- Does the mass collection of phone records violate the Fourth Amendment? [Last Updated On: October 19th, 2014] [Originally Added On: October 19th, 2014]
- When Can the Police Search Your Phone and Computer? [Last Updated On: October 21st, 2014] [Originally Added On: October 21st, 2014]
- Supreme Court to decide if cops can access hotel registries without warrants [Last Updated On: October 22nd, 2014] [Originally Added On: October 22nd, 2014]
- Third Circuit Allows Evidence from Warrantless GPS Device [Last Updated On: October 22nd, 2014] [Originally Added On: October 22nd, 2014]
- US court rules in favor of providing officials access to entire email account [Last Updated On: October 24th, 2014] [Originally Added On: October 24th, 2014]
- EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN'S FOURTH AMENDMENT RIGHT - Video [Last Updated On: October 25th, 2014] [Originally Added On: October 25th, 2014]
- FBI demands new powers to hack into computers and carry out surveillance [Last Updated On: October 30th, 2014] [Originally Added On: October 30th, 2014]
- Fourth Amendment (United States Constitution ... [Last Updated On: November 4th, 2014] [Originally Added On: November 4th, 2014]
- Fourth Amendment - Video [Last Updated On: November 4th, 2014] [Originally Added On: November 4th, 2014]
- Call Yourself a Hacker and Lose Fourth Amendment Rights - Video [Last Updated On: November 5th, 2014] [Originally Added On: November 5th, 2014]
- Volokh Conspiracy: Magistrate issues arrest warrants for 17 years but is new to probable cause [Last Updated On: November 7th, 2014] [Originally Added On: November 7th, 2014]