Feeds

'Rare for tech not to be involved in child abuse cases'

'Hysterical' report claims huge amounts of molestation

Secure remote control for conventional and virtual desktops

A report that identified more than 16,000 British children who could be at "high risk of child exploitation" during a 12-month period has also highlighted the apparent dangers kids face when using the internet.

It warned:

Technology forms part of most people’s lives, especially those of young people. As a result it has been rare to identify cases of child sexual exploitation where the use of technology has not been a factor.

This fact is significant, as information technology is having a direct impact in a multitude of ways on the means by which people are able to sexually exploit children.

The interim report, entitled I thought I was the only one. The only one in the world, was published on Wednesday morning by the Children’s Commissioner’s office, which has been undertaking an inquiry into child sexual exploitation in gangs and groups.

It listed a number of different methods apparently employed by those seeking to sexually exploit young people. It said that such gangs and groups were found to the do the following:

  • Threatening that they will share images of [the young person] online, and using these threats to coerce the victim into ongoing sexual abuse.
  • Harassment and bullying through text messaging.
  • Purchasing mobile phones for victims and then sharing their numbers among group or gang members.
  • Random contact with children via social networking sites.
  • Using ‘friends’ lists’ on networking sites of known victims to target new children.
  • Viewing of extreme or violent pornography and discussing it during sexual assaults.
  • Posting images of girls (or boys) with rival gang members to invite a sexual assault as punishment.
  • Filming and distributing incidents of rape.
  • Distributing Blackberry pin numbers for lists of girls labelled as ‘easy’.

The report concluded that the use of technology had popped up repeatedly during evidence submissions from victims who said mobile phones and social networks, for example, helped gangs to initiate, organise and maintain child sexual exploitation.

The commissioner's report also wagged a finger at online pornography as an influencing factor for abusers. But the findings were also reportedly labelled as "hysterical" by unnamed senior government sources speaking to the BBC.

While the deputy children's commissioner Sue Berelowitz claimed that the report as one of the most comprehensive ever undertaken to uncover the true extent of child exploitation abuse in England, the study only garnered data from just over half of police constabulary areas in the country.

It said that 21 agencies had contributed some sort of information to the report, but that 19 had not submitted any evidence. Despite that lack of data, the report concluded that 16,500 kids were at high risk of such abuse over the 40 constabulary areas.

"Evidence to the inquiry indicates that in any given year, the actual number of children being abused is far greater than the 2,409 that have been confirmed," the study claimed.

Two tech companies mentioned fleetingly in the report were Facebook and BlackBerry-maker RIM. We sought their views on the conclusions of the study.

Facebook, which is the dominant social network in the UK, told The Register:

"We have a zero tolerance policy for child exploitative behaviour on the site and such activity is rare. However, when illegal behaviour is detected, Facebook works with law enforcement agencies such as CEOP [child exploitation and online protection centre] to ensure that these people are brought to justice."

Facebook, for its part, removes its youngest users - the 13-to-17-year-olds - from public search, meaning they can only post content to friends of friends and not beyond that scope. Adults are only allowed to befriend youngsters on the site if they have an existing social connection, such as being part of the same school network.

RIM had not got back to us with comment at time of publication. The full report can be viewed here [PDF]. ®

Intelligent flash storage arrays

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.