Survivor’s voices only become meaningful when their ideas and voices impact material things, like legislation, policies and products. Survivor inclusion adds so much credibility when their experiences are heard.
Recently, the International Justice Mission (IJM) and the University of Nottingham Rights Lab conducted the Scale of Harm study. It measured the prevalence of trafficking of children to produce child sexual exploitation material (CSEM). The study revealed that 1 in 100 – or nearly half a million children in the Philippines – in 2022 alone were trafficked to produce CSEM. These figures suggest more work is needed to ensure the safety of not just Filipino children but every child in every part of the globe. I was part of the research team with two other survivor consultants, and we facilitated focus group discussions with survivors.
The Global Threat Assessment paints a similar picture of a growing global crisis, both in terms of scale and the evolving methods used by perpetrators. Safety by Design principles, global alignment of internet regulations, and the application of public health strategies to violence prevention are key recommendations. Importantly, so is a call to involve children’s voices and adopt a child-centered approach to better understand the threat and bridge gaps in the response.
As someone who experienced the harm of online sexual abuse, I would say that no one can validate study results like Scale of Harm the way survivors can. My advocacy work is equally important as my other jobs. I was there, experienced and witnessed the horrors of online sexual abuse. Because of that, I am fully committed to protecting children from this crime. I cannot imagine other children going through similar, and maybe even worse, trauma.
When I was in an aftercare shelter, I received trauma-informed and genuine care from the people who were there for me. IJM, together with partners, demonstrated trauma-informed and child-centered approaches in supporting victim-survivors from rescue to healing and restoration. Long-term assistance, livelihood skills and independence were key – teach victims-survivors these so that when they go back to the community they are not as vulnerable when they go back.
I also see the importance of providing a platform where they can lead and stop the stigma of being seen as “just survivors”. Being treated as subject-matter experts and getting our perspective across. We need a community where we can feel safe and heard.
I am a member of the Philippine Survivor Network—a group of survivors who desire and pursue safe communities through justice systems that protect the most vulnerable people. Being with fellow survivors helped me heal and find my own voice.
When we allow survivor advocates to influence policymaking, we allow the most affected people to be heard, lead and be involved in matters that are important to them. There are currently gaps and loopholes in programs and policies because survivor’s voices are not incorporated.
I envision a community where we can speak freely and draw safety from each other.
Safety is not just about being safe in our physical environment but also in our daily interactions online. How are we ensuring the safety of our children and survivors in an online environment? Online sexual exploitation of children is a global problem that needs global solutions. The solution involves not just the country where the victim lives but also in places where online predators live and drive demand.
What we really lack now is the support from the community and government. It is impossible to end child sexual abuse online without whole society solutions. The community needs to be engaged and demonstrate what accountability means by stopping the crime of exploiting children.
The global community, especially tech and finance companies, need to work together to make the internet safer and stop online sexual abuse. This includes creating safe applications and platforms to protect children, removing harmful materials quickly, and ensuring children and adults see only age-appropriate content online.
While user privacy is important, tech companies should be able to quickly find and remove abusive materials and be held responsible when they don’t. We can protect privacy and protect children from online abuse.
If dangers to children come from their own homes, educating families may help change minds. Sharing information about online abuse and its long-term effects, especially with parents, can help. Everyone — governments, organizations, and companies—need to share the responsibility for online safety equally.
Our website uses cookies to give you the best experience.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimise our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Please note:
This action will also remove this member from your connections and send a report to the site admin.
Please allow a few minutes for this process to complete.