SlideShare a Scribd company logo
1 of 13
ICT and prevention of
Sexual Exploitation of Children
THEO NOTEN
ECPAT NETHERLANDS
ECPAT International is a network of CSOs with presence in 77
countries in all regions, Global Secretariat – based in Bangkok
Earlier this year, we celebrated our 25th anniversary in Chiang Mai.
ECPAT’s work is solely focused on ending the sexual exploitation of
children, particularly its four main manifestations:
• Trafficking for sexual puposes,
• Child sexual abuse images (commonly known as child
pornography),
• Sexual exploitation of children through prostitution
• Child sex exploitation through travel and tourism
IT IS NOT ABOUT TECHNOLOGY
…….IT IS ABOUT HUMAN BEHAVIOUR
It is a fact that ICT is being misused by exploiters to commit crimes
against children.
• Advertisements are placed online to recruit children under false
pretences and subsequently traffic and exploit them,
• Skype is used to transmit live streamed child pornographic shows
across borders,
• The Onion Router (TOR) is housing the most extreme images of
child sexual abuse
• SNS are used by traffickers to identify potential victims
………. Supply and demand meet on the internet
Hotlines and Helplines
e-learning
serious game
.
'In Your Hands' E-learning course on child trafficking
This is a free ECPAT UK resource which is appropriate for all professionals
who may work with children who may have been trafficked.
http://course.ecpat.org.uk
'Every Child, Everywhere - Child Protection Training in the Travel Industry
This e-learning course focuses on safeguarding children from exploitation
in travel and tourism, preventing child exploitation and abuse, including
child trafficking. For Every Child, Everywhere ECPAT UK has joined forces
with ABTA the British Travel Association.
www.childprotection-tourism.org
a cost free E-learning course for tourism students and experts
on the topic of "How to Protect Children from Sexual Exploitation in Travel
and Tourism", developed by ECPAT Germany
Diverse language versions are available once completed the course and
the knowledge test, a "Confirmation of Participation“ is available.
http://ecpat-serious-game.eu/en.html
Campaigns
https://www.facebook.com/DontLookAwayNL?fref=photo
https://www.facebook.com/ecpat.report/info?tab=page_info
http://ecpat-serious-game.eu/en.html
http://blog.thebodyshop.com/post/20066216691/20-countries-commit-to-protect-children-from-sex
https://www.facebook.com/Sweetie.International
Ecpat: Ict and human trafficking-trace

More Related Content

What's hot

Gender and Development and Human Trafficking
Gender and Development and Human Trafficking Gender and Development and Human Trafficking
Gender and Development and Human Trafficking Paula Marie Llido
 
Journal online sexual abuse of children ecpat indonesia
Journal online sexual abuse of children   ecpat indonesiaJournal online sexual abuse of children   ecpat indonesia
Journal online sexual abuse of children ecpat indonesiaECPAT Indonesia
 
SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)VogelDenise
 

What's hot (6)

Gender and Development and Human Trafficking
Gender and Development and Human Trafficking Gender and Development and Human Trafficking
Gender and Development and Human Trafficking
 
Mohamed Askar's CV
Mohamed Askar's CVMohamed Askar's CV
Mohamed Askar's CV
 
Project for drum beat mozilla
Project for drum beat mozillaProject for drum beat mozilla
Project for drum beat mozilla
 
Resolution 2014
Resolution 2014Resolution 2014
Resolution 2014
 
Journal online sexual abuse of children ecpat indonesia
Journal online sexual abuse of children   ecpat indonesiaJournal online sexual abuse of children   ecpat indonesia
Journal online sexual abuse of children ecpat indonesia
 
SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)
 

Viewers also liked

Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopTRACE Project
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies TRACE Project
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickersTRACE Project
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODCTRACE Project
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking TRACE Project
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking TRACE Project
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsTRACE Project
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking TRACE Project
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children TRACE Project
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers TRACE Project
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...TRACE Project
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human traffickingTRACE Project
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalTRACE Project
 

Viewers also liked (18)

Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus Workshop
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickers
 
Kidane Selam
Kidane SelamKidane Selam
Kidane Selam
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODC
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beings
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children
 
key note
key notekey note
key note
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...
 
FRA presentation
FRA presentation FRA presentation
FRA presentation
 
Rijken Conny
Rijken ConnyRijken Conny
Rijken Conny
 
IOM Presentation
IOM Presentation IOM Presentation
IOM Presentation
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human trafficking
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removal
 

Similar to Ecpat: Ict and human trafficking-trace

Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyCTIC Technology Centre
 
2013 05 19 safe host conference ebnt oss.269 presentazione_01_eng
2013 05 19  safe host conference ebnt oss.269 presentazione_01_eng2013 05 19  safe host conference ebnt oss.269 presentazione_01_eng
2013 05 19 safe host conference ebnt oss.269 presentazione_01_engGABRIELE GUGLIELMI
 
Child protection in tourism
Child protection in tourismChild protection in tourism
Child protection in tourismrespontour
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
Daniel asfaw acopea
Daniel asfaw   acopeaDaniel asfaw   acopea
Daniel asfaw acopeaAdrian Hall
 
How to protect children ecpat eng
How to protect children   ecpat engHow to protect children   ecpat eng
How to protect children ecpat engSAFE HOST PROJECT
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachNzeih Chukwuemeka
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Child online protection a collective responsibillity
Child online protection   a collective responsibillityChild online protection   a collective responsibillity
Child online protection a collective responsibillitychioma Ibe
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefFAIR PLAY AD / @VeronicaRRSouza
 
2013 05 18 safe host conferencia florencia anna moilanen unicef eng
2013 05 18 safe host conferencia florencia anna moilanen unicef eng2013 05 18 safe host conferencia florencia anna moilanen unicef eng
2013 05 18 safe host conferencia florencia anna moilanen unicef engGABRIELE GUGLIELMI
 
SEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDY
SEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDYSEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDY
SEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDYIACOPO QUARONE
 
Tourism & human trafficking 1.22.14
Tourism & human trafficking 1.22.14Tourism & human trafficking 1.22.14
Tourism & human trafficking 1.22.14AnonDownload
 

Similar to Ecpat: Ict and human trafficking-trace (20)

Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
2013 05 19 safe host conference ebnt oss.269 presentazione_01_eng
2013 05 19  safe host conference ebnt oss.269 presentazione_01_eng2013 05 19  safe host conference ebnt oss.269 presentazione_01_eng
2013 05 19 safe host conference ebnt oss.269 presentazione_01_eng
 
Child protection in tourism
Child protection in tourismChild protection in tourism
Child protection in tourism
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
Daniel asfaw acopea
Daniel asfaw   acopeaDaniel asfaw   acopea
Daniel asfaw acopea
 
How to protect children ecpat eng
How to protect children   ecpat engHow to protect children   ecpat eng
How to protect children ecpat eng
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Child online protection a collective responsibillity
Child online protection   a collective responsibillityChild online protection   a collective responsibillity
Child online protection a collective responsibillity
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Infopack facilitators wanted
Infopack facilitators wantedInfopack facilitators wanted
Infopack facilitators wanted
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Brosiura en
Brosiura enBrosiura en
Brosiura en
 
Stop sex trafficking of children and young people
Stop sex trafficking of children and young peopleStop sex trafficking of children and young people
Stop sex trafficking of children and young people
 
2013 05 18 safe host conferencia florencia anna moilanen unicef eng
2013 05 18 safe host conferencia florencia anna moilanen unicef eng2013 05 18 safe host conferencia florencia anna moilanen unicef eng
2013 05 18 safe host conferencia florencia anna moilanen unicef eng
 
SEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDY
SEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDYSEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDY
SEX TOURISM AND SEXUAL EXPLOTAION OF CHILDREN: KENYA CASE STUDY
 
Tourism & human trafficking 1.22.14
Tourism & human trafficking 1.22.14Tourism & human trafficking 1.22.14
Tourism & human trafficking 1.22.14
 
Child Focus - Prevention of sexual abuse: vision and practices
Child Focus - Prevention of sexual abuse: vision and practicesChild Focus - Prevention of sexual abuse: vision and practices
Child Focus - Prevention of sexual abuse: vision and practices
 

Recently uploaded

一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 

Recently uploaded (20)

一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 

Ecpat: Ict and human trafficking-trace

  • 1. ICT and prevention of Sexual Exploitation of Children THEO NOTEN ECPAT NETHERLANDS
  • 2. ECPAT International is a network of CSOs with presence in 77 countries in all regions, Global Secretariat – based in Bangkok Earlier this year, we celebrated our 25th anniversary in Chiang Mai. ECPAT’s work is solely focused on ending the sexual exploitation of children, particularly its four main manifestations: • Trafficking for sexual puposes, • Child sexual abuse images (commonly known as child pornography), • Sexual exploitation of children through prostitution • Child sex exploitation through travel and tourism
  • 3.
  • 4. IT IS NOT ABOUT TECHNOLOGY …….IT IS ABOUT HUMAN BEHAVIOUR It is a fact that ICT is being misused by exploiters to commit crimes against children. • Advertisements are placed online to recruit children under false pretences and subsequently traffic and exploit them, • Skype is used to transmit live streamed child pornographic shows across borders, • The Onion Router (TOR) is housing the most extreme images of child sexual abuse • SNS are used by traffickers to identify potential victims ………. Supply and demand meet on the internet
  • 6.
  • 7.
  • 9. . 'In Your Hands' E-learning course on child trafficking This is a free ECPAT UK resource which is appropriate for all professionals who may work with children who may have been trafficked. http://course.ecpat.org.uk 'Every Child, Everywhere - Child Protection Training in the Travel Industry This e-learning course focuses on safeguarding children from exploitation in travel and tourism, preventing child exploitation and abuse, including child trafficking. For Every Child, Everywhere ECPAT UK has joined forces with ABTA the British Travel Association. www.childprotection-tourism.org a cost free E-learning course for tourism students and experts on the topic of "How to Protect Children from Sexual Exploitation in Travel and Tourism", developed by ECPAT Germany Diverse language versions are available once completed the course and the knowledge test, a "Confirmation of Participation“ is available.

Editor's Notes

  1. ECPAT NETWORK AND 25TH ANNIVERSARY
  2. IT´S NOT ABOUT TECHNOLOGY, IT IS ABOUT HUMAN BEHAVIOUR