This 2021 Global Threat Assessment report is our most comprehensive yet and shows how the global response to child sexual exploitation and abuse online needs a new approach. Without this, more children will continue to be placed at risk and experience abuse.
1 in 3 (34%) of respondents to our Economist Impact global survey were asked to do something sexually explicit online they were uncomfortable with during childhood
77%
The Internet Watch Foundation saw a 77% rise in child ‘self-generated’ sexual material from 2019 to 2020
18%
18% in our global survey of 18-20 years old reported experiencing a sexually explicit image of themselves being shared by a peer without consent
COVID-19 has had a huge impact on children and their online exposure
We need to prioritise prevention in our response
This is about much more than promoting online safety or deterrence campaigns. We all have a duty to create safe online environments where children can thrive, free from sexual exploitation and abuse.
As well as responding to reports of abuse and minimising further harm by stopping the spread of child sexual abuse material online, we need a step change in the global response focussed on stopping the abuse before it happens.
Our survey of tech companies in partnership with the Technology Coalition revealed that while most companies use tools to detect child sexual abuse material (87% use image ‘hash-matching’), only 37% currently use tools to detect the online grooming of children.
Despite the challenges, there is hope
To tackle this complex, global issue, everyone with a role to protect children online needs to work together. Countries, companies and charities are all involved in tackling this crime. The pace of change is not yet fast enough, but it is happening.
Thanks to WeProtect Global Alliance’s members and this new comprehensive Global Threat Assessment, we know more than ever about the scale and complexity of this issue, and what’s being done worldwide to tackle it.
Child sexual exploitation and abuse online is moving up the global agenda and online safety technology is more accessible and advanced than ever.
We now need to come together to scale up and speed up the global response to build a digital world that is designed to protect children from sexual exploitation and abuse.
Key recommendations
The below recommendations would enable governments, civil society, communities and online service providers to capitalise on positive developments to enhance the threat response, including prevention.
These recommendations are aligned to WeProtect Global Alliance’s Global Strategic Response framework.
CROSS-CUTTING: Governments, the private sector, and civil society must commit sufficient funding to tackle the threat.
Policy/legislation
Governments must:
Criminalise all offences relating to child sexual exploitation and abuse.
Invest in strengthening child protection systems.
Consider other legislative options (i.e. internet regulation).
Criminal Justice
Governments must:
Invest in deterrence and rehabilitation
Fund specialist police units to cultivate threat expertise.
Invest in building international policing capabilities.
Governments and police agencies must develop consistent approaches for the investigation of cross-border crimes.
Victim support services
Policymakers must work with the industry to set standards and reduce online harm.
Governments must invest in victim support services
All stakeholders must safely engage survivors of child sexual abuse to inform the design of effective services, policies and support.
Technology
Online service providers must take a ‘Safety by Design’ approachfor services aimed at children.
Online service providers should publish regular transparency reports.
Developers of online safety technologies should continue innovating to enhance the detection of child sexual abuse online.
Societal
Governments must incorporate online safety into school curricula.
All stakeholders involved in the response must educate communities on the risk and impact of child sexual abuse.
Research and insight
Governments, NGOs and online service providers must invest in research to:
Better understand pathways into offending.
Better understand the drivers behind child ‘self-generated’ sexual material.
Understand risk and protective factors for children.
Improve the evidence picture for ‘Global South’ countries.
This report was researched and written by Chloe Setter, Natalia Greene, Nick Newman and Jack Perry.
We would like to thank PA Consulting, Crisp, Economist Impact, the dedicated project Steering Committee, as well as contributors from across our membership and beyond, for bringing this document together.
Our site uses cookies to give you the best experience
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimise our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.