Share with someone:
ACUMINOR REPORT 2018:2
In the Philippines, a mother sexually abuses her little girl for EUR 10-60 through a chat forum. A man in Denmark is providing instructions as he watches the abuse in real-time via webcam. In Spain, a young girl is crying as she gets undressed. A man from Germany is threatening to kill her family if she does not send him sexual material. In Finland, a teenage girl discovers that her private pictures have been stolen as she is contacted online by a man from Belgium, extorting her for money. This is the agonising reality for many children across the world, and online sexual exploitation of children takes many different forms.
“THIS IS THE AGONISING REALITY FOR MANY CHILDREN ACROSS THE WORLD, AND ONLINE SEXUAL EXPLOITATION OF CHILDREN TAKES MANY DIFFERENT FORMS”
INTERNET – AN EXTENDED HUNTING GROUND
Adult attraction and sexual abuse of children have occurred throughout human history. In the 1850s, the first publica- tion dedicated solely to child sexual abuse was published, but it was not until the 1970s that widespread public awareness of the matter was recognised in the West. At that point, physical contact needed to be established by the perpetrator, delimiting the range of potential victims. Modern technology has replaced the need of this physical presence. Rapid technological developments in conjunction with anonymization tools and encryption on, for instance darknet offers a clandestine and worldwide platform for perpetrators to connect with each other, and to share and trade material.
PUTTING THE PIECES TOGETHER
Crimes in the digital era often constitute a substantial challenge for law enforcement agencies that struggle to stay ahead of perpetrators and shed light on their course of action. Thus, collaboration and information sharing are crucial. Intelligence has identified numerous different risk factors linked to perpetrators and victims, e.g. age, country of residence and money flows. In fact, money flows vary depending on the type of online sexual exploitation, i.e. live streaming and sextortion. Knowing how, where and to whom these transactions are made can play an essential role in discovering sexual abuse online.
““IN ORDER FOR SOCIETY TO WIN THE FIGHT AGAINST ONLINE SEXUAL EXPLOITATION OF CHILDREN, FINANCIAL INSTITUTIONS NEED TO MAKE SURE THAT THEY DO EVERYTHING IN THEIR POWER TO FIND, STOP AND REPORT THE PERPETRATORS”
LIVE STREAMING
Live-streamed abuse is when a perpetrator directs abuse online to fit their preferences. The orders are usually com- municated via a chat forum while the abuse is streamed via webcam in real-time. This crime involves three parties, the perpetrator with a sexual interest (ordering the abuse), the perpetrator with a financial interest (conducting the abuse), and a child (the victim).
Transactions are often made via money transfer services, the regular banking and online payment system, and prepaid cards. Together with relevant customer and geo- graphical factors, the following are examples of transaction indicators for live stream sexual abuse:
- Card payment to an online payment solution shortly followed by an outgoing transaction
- Amounts does not in general exceed EUR 60
- Low value transactions to the same recipient (financial interest perpetrator)
There are indications that shows a relationship between live streaming and travellng to a country to commit hands-on abuse. It also happens that a perpetrator has travelled to a country and maintained contact with the abused party upon return, in order to obtain abuse material or access live streaming.
SEXTORTION
Sextortion, to extort someone into sending content of sexual character by using threats, has increased rapidly. Nearly 70% of the European countries have reported cases of sex- ual coercion or extortion of minors. Adults who are affected are often forced to pay, whereas affected children are pri- marily controlled to produce more material. Perpetrators of sextortion can be very persistent and continue their threats for months or years. Transactions are often made via the regular banking system or virtual currencies.
Together with relevant customer and geographical factors, the following are examples of indicators for sextortion:
- Single or numerous outgoing transactions to the same recipient (perpetrator)
- Single or numerous incoming transactions from one or multiple senders (victims)
WHAT CAN YOU DO TO HELP?
In EU there have been relatively few convictions of live streaming and sextortion cases compared to the estimated number of offences, but victims have been identified in Canada, the Philippines, Scotland and the U.S. Recent intelligence has identified an increased presence by organised crime groups in the production and trade of live- streamed sexual abuse and sextortion, crimes they consider a business opportunity. With further collaboration and intelli– gence work, such networks can be dissolved. Identifying and understanding the risks from certain trans- actions and behaviours is a must. Transactions can serve as evidence against a perpetrator and, even more importantly, lead to the identification of a victim. All parts of society need help each other win the fight against online sexual exploitation of children. Finanical institutions must to make sure that they, as part of their anti-financial crime efforts, do everything in their power to find, stop and report the perpertators.
Terms of use
You are free to use this report for your own personal development, in internal training or in other risk management activities. You are of course not allowed to resell this report, nor claim that you have made it yourself.
Please remember to state the source as follows:
Acuminor. (2018). Online sexual exploitation of children. Report 2018:2. Stockholm: Acuminor.
© Acuminor 2018

To your inbox. Completely free.
Stay informed with daily financial crime news, in-depth analyses and other updates
Thank you for signing up, enjoy and stay safe! /The Acuminor Team
By clicking "Sign me up" you give us permission to provide you with information relevant to you and process your personal information in accordance with our Privacy Policy.