Cybersex trafficking,live streaming sexual abuse,[1][2][3]webcam sex tourism/abuse[4] orICTs (Information and Communication Technologies)-facilitated sexual exploitation[5] is acybercrime involvingsex trafficking and thelive streaming of coerced[6][7] sexual acts and/or rape onwebcam.[8][9][10]
Cybersex trafficking is distinct from othersex crimes.[8] Victims are transported by traffickers to 'cybersex dens',[11][12][13] which are locations with webcams[14][9][15] and internet-connected devices with live streaming software. There, victims are forced to perform sexual acts[7] on themselves or other people[16] insexual slavery[7][17] or raped by the traffickers or assisting assaulters inlive videos. Victims are frequently ordered to watch the paying live distant consumers or purchasers on shared screens and follow their commands.[10][18][19] It is often a commercialized,[20] cyber form offorced prostitution.[7][21] Women,[22][23][24] children, and people in poverty are particularly vulnerable[10][15][25] to coercedinternet sex. Thecomputer-mediated communication images produced during the crime are a type ofrape pornography[26] orchild pornography[27][28][29] that is filmed and broadcast inreal time and can be recorded.[30]
There is no data about the magnitude of cybersex trafficking in the world.[31][32][33] The technology to detect all incidents of thelive streaming crime has not been developed yet.[34] Millions of reports of cybersex trafficking are sent to authorities annually.[35][failed verification] It is a billion-dollar, illicit industry[28] that was brought on with theDigital Age[9][25] and is connected toglobalization. It has surged from the world-wide expansion of telecommunications and global proliferation of the internet[10] andsmartphones,[36][37][38] particularly indeveloping countries. It has also been facilitated by the use of software,encrypted communication systems,[39] and network technologies[40] that are constantly evolving,[20] as well as the growth of internationalonline payment systems withwire transfer services[36][32][41] andcryptocurrencies that hide the transactor's identities.[42][43]
Thetransnational nature and global scale of cybersex trafficking necessitate a united response by the nations, corporations, and organizations of the world to reduce incidents of the crime;[16] protect, rescue, and rehabilitate victims; and arrest and prosecute the perpetrators. Some governments have initiated advocacy and media campaigns that focus on awareness of the crime. They have also implemented training seminars held to teach law enforcement, prosecutors, and other authorities, as well asNGO workers, to combat the crime and provide trauma-informed aftercare service.[44] New legislation combating cybersex trafficking is needed in the twenty-first century.[45][38]
Cyber-, as acombining form, is defined as 'connected with electronic communication networks, especially the internet.'[46]Sex trafficking is human trafficking for the purpose of sexual exploitation, including sexual slavery.[47] Victims of cybersex trafficking aretrafficked or transported to 'cybersex dens,' which are rooms or locations with a webcam.[14] Thecybercrime also involves the transporting orstreaming of images of the victims' bodies andsexual assaults inreal time through a computer with a webcam to other computers connected to the internet.[8][6][10] It thus occurs partly in the physical or real world, as the sexual assault is real,[48] and partly incyberspace.[49]
Victims, predominantly women[50][51][18] and children,[22] are abducted,[7] threatened, or deceived.[10][18] Others are drugged.[52] They are held captive and locked up[18] in rooms with covered or no windows and a webcam.[10] They experience physical and psychological trauma.[10][28][44]Gang rape has occurred on webcam.[17][53] Some are coerced intoincest.[31] Victims have been denied food,[17] deprived of sleep,[18] and been forced to perform when sick.[6] They have contracted diseases, includingtuberculosis, while in captivity.[6] A number are assaulted[6][18] ortortured.[29][54]
Victims can be exploited in any location where the cybersex traffickers have a computer, tablet, or phone with internet connection.[9] These locations, commonly referred to as 'cybersex dens,'[11][12][13] can be in homes, hotels, offices, internet cafes, and other businesses, making them extremely difficult or impossible for law enforcement to identify.[10] The number of cybersex trafficking victims is unknown.[31][32] Some victims are simultaneouslyforced into prostitution in a brothel or other location.[55]
Rescues involving live streamingcommercial sexual exploitation of children by parents often require a separation of the minors from the families and new lives for them in a shelter.[44]
Some victims are not physically transported and held captive, but rather victims of onlinesextortion. Online game platforms with large child audiences have also been identified as potential environments where grooming may begin, particularly when adults and minors interact in unmoderated digital spaces.[56] Minors are threatened,[57]webcam blackmailed,[58] or bullied to film themselves committing online sexual acts.[59] Victims have been coerced to self-penetrate, in what has been called 'rape at a distance.'[58] Others are deceived, including by phony romantic partners who are really rape or child pornography distributors, to film themselves masturbating.[60] The videos are live streamed to purchasers or recorded for later sale.[30]
Those who are of a lower class, discriminate race, minority, or other social disadvantages are at an increased risk of being victimized.[40] The cybersex trafficking and or non-consensual dissemination of sexual content involving women and girls, often involving threats, have been referred to as "digital gender violence" or 'onlinegender-based violence.'[61]
Victims, despite being coerced, continue to be criminalized and prosecuted in certain jurisdictions.[40]
Perpetrators transport victims to locations with webcams and live streaming software. They or assisting assaulters then commit and film sex crimes to produce real time rape pornography or child pornography materials that may or may not be recorded. Male and female[41][62][63] perpetrators, operating behind a virtual barrier and often with anonymity, come from countries throughout the world[32][36][28] and from every social and economic class. Some traffickers and assaulters have been the victim's family members, friends, and acquaintances.[10][15][28] Traffickers can be part of or aided byinternational criminal organizations, localgangs, or small crime rings or just be one person.[10] They operate clandestinely and sometimes lack coordinated structures that can be eradicated by authorities.[10] Theencrypted nature of modern technology makes it difficult to track perpetrators.[32] Some are motivated by sexual gratification.[29] Traffickers advertise children on the internet to obtain purchasers.[33] Funds acquired by cybersex traffickers can belaundered.[39]
Overseaspredators seek out and pay for live streaming or made-to-order services[36] that sexually exploit children.[9][15][31] They engage in threats to gain the trust of local traffickers, often the victims' parents or neighbors, before the abuse takes place.[44]
The online audience who are often from another country, may issue commands to the victims or rapists and pay for the services. The majority of purchasers or consumers are men,[54][28] as women who engage in cybersex prefer personal consensual cybersex in chat rooms or direct messaging.[64]
There is a strong correlation between viewing/purchasing child cybersex materials and actually sexually abusing children; cybersex materials can motivate cybersex consumers to move from the virtual world to committing sex crimes in person.[65]

Cybersex trafficking is partly an internet-based crime.[17] Perpetrators use social media networks,[41]videoconferences, dating pages, online chat rooms,mobile apps,[48]dark web sites,[43][36] and other pages and domains.[66] They also useTelegram and other cloud-basedinstant messaging[58] andvoice over IP services, as well aspeer-to-peer (P2P) platforms,virtual private networks (VPN),[40] andTor protocols and software, among other applications, to carry out activitiesanonymously.
Consumers have made payments to traffickers, who are sometimes the victim's family members, usingWestern Union,PayPal, and otherelectronic payment systems.[67]
Cybersex trafficking occurs commonly on somedark websites,[43] where users are provided sophisticated technical cover against identification.[36]
Perpetrators use Facebook,[29][39][58] Instagram,[68] and other social media technologies.[36][41]
They use fake job listings in order to lure in victims.[69] They do this by creating fake job agencies to get victims to meet with the perpetrator.[70] These fake job listings can be things such as modeling gigs. Social media makes it easier for perpetrators to groom multiple people at once. They continuously send friend requests to increase their chances of getting a victim.[71] Social media gives perpetrators the platform to hide their identity. On social media, one can pretend to be anyone. Therefore, perpetrators use fake accounts to get victims attention. Most perpetrators pose as an attractive person who is living a lavish life.[70] This is used to attract vulnerable users who desire those luxuries. People who desperately desire a luxury living are the easiest targets. They fall for the manipulation that they too can live a life like ones depicted on fake accounts. Furthermore, younger people are more likely to be victims to cybersex on social media.[72] They are less aware and still learning how to use social media. In addition, adolescents are the more vulnerable on social media because they are exploring. Adolescents can use social media to explore their sexuality. This makes them more accessible to perpetrators.[73] Without guidance adolescents are at risk of falling for the tricks used to lure them into cybersex. In addition, they are less likely to detect when their security is at risk.[74] Perpetrators fake a romantic relationship with the victims on social media to exploit them.[75]
Perpetrators will convince victims to perform sexual acts. They can perform these sexual acts through tools such as webcams. More common on social media is to send pictures or videos. Victims send explicit pictures or videos because they trust the "friend" they have on social media. The victims will do it out of "love" or naiveness. Others do the performances out of fear. They can be threatened with information they previously shared with the perpetrator when they befriended them. However, it becomes an endless cycle when they perform the sexual acts once. After victims do these sexual acts, perpetrators use it as leverage. Perpetrators threaten them to do more sexual acts or they will share to their family and friends what they already have of them.[68]
Cybersex trafficking occurs onSkype[76][37][36] and othervideoconferencing applications.[77][32] Pedophiles directchild sex abuse using its live streaming services.[76][36][29]
This sectionneeds expansion. You can help byadding to it.(May 2020) |
TheAustralian Federal Police (AFP) investigates cybersex trafficking crimes domestically and in the Asia-Pacific region.[38][76][32] A 2021 investigative analysis by the Australian Institute of Criminology reported that Australia remains one of the top source countries for livestreamed child sexual exploitation demand, noting that offenders frequently target families in Southeast Asia through social media and encrypted messaging platforms.[78]
In 2016,Queensland Police Service officers fromTask Force Argos In 2016, Queensland Police Service officers from Task Force Argos executed a federal search warrant at a 58-year-old Australian man's residence.[79] The Australian man pleaded guilty to numerous charges, including soliciting a child for sex and having sex with a child under 16 years of age outside ofAustralia.[80] UsingSkype, the man conducted "live remote"sexual abuse, exploiting two young children in thePhilippines while making payments to their mother.[79][80] The exploitation began when the children were only two and seven years old, and the abuse continued for nearly five years.[79] In May 2019, according to theAustralian Federal Police (AFP), numerous cases were also uncovered related to Australians allegedly paying for and manipulatingchild sexual abuse.[81] In November 2019, Australia was alerted byChild Sexual Abuselive streaming whenAUSTRAC filed legal action againstWestpac in relation to over 23 million suspected violations of theAnti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth).[79]
Since 2017,IJM (International Justice Mission) Australia has been working on legal reforms to strengthen Australia's response to OSEC, commonly known as online sex trafficking of children.[82] On June 16, 2020, both houses of theParliament of Australia enacted theCrimes Legislation Amendment (Sexual Crimes Against Children and Community Protection Measures) Bill 2019Archived December 6, 2021, at theWayback Machine, which received royal assent on June 22, 2020.[82] Jacob Sarkodee, CEO ofIJM Australia, noted that this new legislation recognizes the contribution of Australians to the growing demand for online sex trafficking of children.[82] According to2020 Global OSEC report,[83] Australians are the third largest purchasers of cybersex trafficking of children in the Philippines.[83][82] Under the proposal made by theIJM, the new legislation specifies that those who watch live streaming of child cybersex trafficking will receive the same penalties as those who manipulate and direct the sexual abuse of children themselves.[82]
Cybersex trafficking occurred in the 2018–2020Nth room case in South Korea, which was first discovered in 2019 by Park Jihyun.[84][85] In March 2020, South Korean news agencies reported some details about Nth room case: in crypto-messaging apps such asTelegram andDiscord, "at least 74 women and 16 minors performed "sex shows" online for global audience of thousands who paid for cryptocurrency".[86] The victims were manipulated and tortured by viewers and were referred to as slaves. This case is related to the widespread availability and expansion of spy cameras (often referred to as "Molka") in South Korea.[87]
In the trade for female North Koreans, cybersex trafficking is the small but rapidly growing element.[88] Girls as young as 9 years old were abused and exploited in "sex shows" that are broadcast live online to a paying audience, many of them are believed to be Korean men.[88][89] According toKorea Future Initiative 2019, an estimated 60 percent of North Korean female refugees in China are trafficked into thesex trade.[88] Of these, about 15 percent are sold into cybersex dens for exploitation by global online audiences.[90] China's crackdown on undocumented North Koreans in July 2017 and a developing cybersex industry have fueled the rapid expansion of cybersex dens.[90][6][17][91]
Cybersex trafficking is thought to be extremely lucrative.[88] According to primary research, helpers experiences, and survivors testimonies, live streamed videos of cybersex abuse featuring North Korean girls ages 9–14 can cost $60-$110, while videos featuring North Korean girls and women ages 17–24 can cost up to $90.[88] Offenders are believed to manipulate victims by the means of drugs and violence (physical and sexual).[90] In investigation conducted from February to September 2018, South Korean websites have been discovered to promote North Korean cybersex and pornography, even in the form of "pop-up" advertisements.[88] The high demand of North Korean cybersex victims is largely driven by South Korean men's high involvement in searching Korean-languagepornography.[90][88] In South Korea, compared to the penalties for production and distribution ofchild sexual abuse imagery, the penalties for those who possess images ofchild porn are far below international standards.[92]
TheEuropean Union Agency for Law Enforcement Cooperation (Europol) investigates and spreads awareness about live streaming sexual abuse.[43] Europol'sEuropean Cybercrime Centre (EC3) is especially equipped to combat the cybercrime.[20]
The United Kingdom'sNational Crime Agency (NCA) investigates cybersex trafficking crimes domestically and abroad.[38][36][32]
Europe was the second largest source of "online enticement" CyberTipline reports.[93] According to Global Threat Assessment 2018, many customers of Online Sexual Exploitation of Children (OSEC) are centered in Europe, along with those who are traffickers and victims of OSEC.[94]
In 2019, Europe accounted for 14% of all sexual exploitation worldwide.[95] Minors are usually trafficked for the purpose of sexual exploitation to EU, and most of them are foreign female children from Nigeria.[95] In Europe, women and children exploited in the sex trade are increasingly being advertised online, with children are found being promoted as adults.[95]
The great Internet freedom[96] and low web hosting costs[97] make the Netherlands one of the countries with a major market for online sexual exploitation.[98] In the 2018 annual report,Internet Watch Foundation (IWF) has said that about 79 percent (82803 out of 105047) of the URLs for materials of child sexual abuse are in Europe, with the vast majority of them are Netherlands-based.[99] The material is produced from different countries in the globe, but they are all hosted on computer servers in the Netherlands.[96] IWF has reported that over 105,047 URLs were linked to illegal images of child sexual abuse, with the Netherlands hosting 47 percent of the content.[97][99]
TheFederal Bureau of Investigation (FBI)[38][27] and Homeland Security Investigations (HSI), the investigative arm of theUnited States Department of Homeland Security, carry out anti-cybersex trafficking operations.[62] TheUnited States Department of StateOffice to Monitor and Combat Trafficking in Persons (J/TIP) partners with agencies and organization overseas to rescue cybersex trafficked victims.[100]
TheUnited Nations Children's Fund (UNICEF) identified thePhilippines as the global center of cybersex trafficking.[11] The Office of Cybercrime within thePhilippines Department of Justice receives hundreds of thousands of tips of videos and images of sexually exploitedFilipino children on the internet.[11] ThePhilippine National Police, along with its Women and Children Protection Center (WCPC), Philippine Internet Crimes Against Child Center (PICACC),[32] Philippine InterAgency Council Against Trafficking (IACAT), Department of Justice (Philippines), andDepartment of Social Welfare and Development[100] fight cybersex trafficking in the country.[13][62] Rancho ni Cristo inCebu is a shelter devoted exclusively to rehabilitating children of live streaming sexual abuse.[44] Children in the shelter are provided food, medical care, counseling, mentoring and life skills training.
TheRoyal Thai Police's Internet Crimes Against Children (TICAC) task force combats cybersex trafficking in the nation.[60]
Authorities, skilled in online forensics,cryptography, and other areas,[32] use data analysis and information sharing to fight cybersex trafficking.[76]Deep learning,algorithms, andfacial recognition are also hoped to combat the cybercrime.[39] Flagging or panic buttons on certain videoconferencing software enable users to report suspicious people or acts of live streaming sexual abuse.[30] Investigations are sometimes hindered byprivacy laws that make it difficult to monitor and arrest perpetrators.[36]
TheInternational Criminal Police Organization (ICPO-INTERPOL) collects evidence of live streaming sexual abuse and othersex crimes.[40] TheVirtual Global Taskforce (VGT) comprises law enforcement agencies across the world who combat the cybercrime.[20] TheUnited Nations Children's Fund (UNICEF) funds training for police to identify and address the cybercrime.[16]
Multinationaltechnology companies, such as Google,Microsoft, and Facebook, collaborate, develop digital tools, and assist law enforcement in combating it.[39]
Led byThorn, an organization that uses technology to combat child sexual exploration globally, a coalition of Big Tech companies including Facebook, Microsoft, Google, and Twitter have been developing ever more sophisticated tools to put in the hands of law enforcement worldwide to combat this issue at every level.
TheMinistry of Education Malaysia introduced cybersex trafficking awareness in secondary school syllabuses.[101]
Research shows that predators under 18 years old use coercion and threats to conceal abuse, but adult predators use psychological abuse. Adult predators use psychological abuse to trick the child into thinking that they actually consented to having sex with them or that the child is responsible for what happened to them.[102]
Teaching the risks of online chatting to children is important to reduce the risk of being a victim of cybersex. With online chatting, a predator might gain knowledge on what a child's hobbies and favorite items are by stalking their page or waiting to see what a child posts. After a predator gains this personal knowledge, he goes on to speak to this child, pretending to also be a child with the same interests to lure them in after gaining their trust. This plays a risk because the child may never really know who's on the other side of the screen and potentially become a victim of a predator.[103]

Cybersex trafficking shares similar characteristics or overlaps with othersex crimes. That said, according to attorney Joshua T. Carback, it is "a unique development in the history of sexual violence"[8] and "distinct in several respects from traditional conceptions of online child pornography and human trafficking".[8] The main particularization is that involves victims being trafficked or transported and then raped or abused in live webcam sex shows.[8][104][41] TheUnited Nations Office on Drugs and Crime identified the cybercrime involving trafficked victims on webcamsex shows as an emerging problem.[105] The illegallive streaming shows occur in 'cybersex dens,' which are rooms equipped withwebcams.[14] The cybercrime has sometimes been informally called 'webcam rape'.[106][107]
TheInternational Justice Mission is one of the world's leadingnon-governmental organizations that carries out anti-cybersex trafficking initiatives.[25][15][10] End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes (ECPAT)[10][43] and the Peace and Integrity of Creation-Integrated Development Center Inc., a non-profit organization in the Philippine, support law enforcement operations against cybersex trafficking.[100]
TheNational Center for Missing & Exploited Children in the United States assists authorities in cybersex trafficking cases.[108] It provides CyberTipline reports to law enforcement agencies.[109]
Terre des hommes is an international non-profitumbrella organization that combats the live streaming sexual abuse of children.[36][28][110]
The Korea Future Initiative is a London-based organization that obtains evidence and publicizes violations of human rights, including the cybersex trafficking of North Korean women and girls in China.[51]