Google AI
The Times Australia
The Times World News

.

Virtual child sexual abuse material depicts fictitious children – but can be used to disguise real abuse

  • Written by: Larissa Christensen, Senior Lecturer in Criminology & Justice | Co-leader of the Sexual Violence Research and Prevention Unit (SVRPU), University of the Sunshine Coast
Virtual child sexual abuse material depicts fictitious children – but can be used to disguise real abuse

Child sexual abuse material (previously known as child pornography) can be a confronting and uncomfortable topic.

Child sexual abuse material specifically refers to the possession, viewing, sharing, and creation of images or videos containing sexual or offensive material involving children.

But less publicised is another form of child sexual abuse material: virtual child sexual abuse material (VCSAM).

Read more: What's in a name? Online child abuse material is not 'pornography'[1]

What’s virtual child sexual abuse material (VCSAM)?

VCSAM is sexual content depicting fictitious children in formats such as text, drawings, deepfakes[2], or computer-generated graphics[3]. It’s also known as fictional child pornography, pseudo pornography, or fantasy images.

Recent technological advancements mean fictitious children can now be virtually indistinguishable[4] from real children in child sexual abuse material.

Some offenders create VCSAM through a morphing technique which uses technology to transform real images[5] into exploitative ones.

A non-sexual image of a real child could be visually altered[6] to include sexual content. For example a child holding a toy altered to depict the child holding adult genitals.

Morphing can also happen in the reverse, where an image of an adult is morphed[7] to look like a child – for example adult breasts are altered to look prepubescent.

A darkened picture of a hooded man sitting alone at a laptop.
Offenders can manipulate both real and fictitious images to produce VCSAM. John Williams RUS/Shutterstock

Another type of VCSAM includes photo-editing multiple images[8] to create a final, more realistic airbrushed image.

But what might be most troubling about VCSAM is it may still feature images and videos of real children being sexually abused.

In fact, certain software can be used to make images and videos of real victims look like “fictional” drawings or cartoons[9].

In this way, this allows offenders to effectively disguise a real act of child sexual abuse[10], potentially preventing law enforcement from bringing victims to safety.

It may also enable repeat offenders to avoid detection.

Read more: How the world's biggest dark web platform spreads millions of items of child sex abuse material — and why it's hard to stop[11]

Why do some people engage with VCSAM?

There’s limited evidence revealing why some people might engage with VCSAM.

To learn more about this offending group, we recently investigated the possible psychological basis[12] for people who engage with such material.

We discovered several potential reasons[13] why offenders might use VCSAM.

Some used it for relationship-building.

Despite the diverse offending group, some offenders who use child sexual abuse material have been found to have limited intimate relationships[14] and heightened loneliness[15].

Online communities of other deviant but like-minded people may therefore provide offenders with a greater sense of belonging, social validation, and support[16]. Such interactions may also, in turn, serve as positive reinforcement for their criminal behaviour.

A phone screen showing social media apps like Facebook, WhatsApp, Instagram etc.
Online communities may positively reinforce criminal behaviour among child sexual abuse offenders. Ritchie B. Tongo/AAP

Others may use this material to achieve sexual arousal.

It could be argued the material may also normalise[17] the sexualisation of children.

In fact, professionals in child welfare and law enforcement seem to share the concern that VCSAM may “fuel the abuse” of children[18] by framing the offenders’ criminal behaviour as acceptable.

Sometimes the material is used for “grooming”.

Adult offenders may show child sexual abuse material to children, breaking down the child’s inhibitions[19] to falsely normalise[20] the abusive act being depicted.

This is one form of grooming – that is, predatory conduct[21] aimed to facilitate later sexual activity with a child.

Such material can also be used to teach children[22] how to engage in sexual activities.

For example, offenders may use VCSAM to show children material depicting young – and, most alarmingly, happy – cartoon characters engaging in sexual activities[23].

An urgent cause for concern

Clearly, VCSAM is incredibly harmful.

It can be used to disguise the abuse[24] of real children, as a gateway to “contact offending[25]” against children (meaning abusing them in real life), and as a grooming[26] technique.

Child welfare and law enforcement officials have sounded the alarm about the increasing creation and distribution of VCSAM for over a decade.

And it seems this problem will only escalate with the development of increasingly sophisticated software[27] and digital technologies.

So while VCSAM remains illegal and offenders are frequently prosecuted, detecting – and ultimately preventing – these often obscure acts of abuse remains a challenge.

Read more: It takes a village: law reform can't be the only response to online child abuse material[28]

References

  1. ^ What's in a name? Online child abuse material is not 'pornography' (theconversation.com)
  2. ^ text, drawings, deepfakes (theconversation.com)
  3. ^ computer-generated graphics (link.springer.com)
  4. ^ virtually indistinguishable (heinonline.org)
  5. ^ transform real images (link.springer.com)
  6. ^ visually altered (heinonline.org)
  7. ^ image of an adult is morphed (heinonline.org)
  8. ^ photo-editing multiple images (heinonline.org)
  9. ^ victims look like “fictional” drawings or cartoons (webarchive.nationalarchives.gov.uk)
  10. ^ disguise a real act of child sexual abuse (webarchive.nationalarchives.gov.uk)
  11. ^ How the world's biggest dark web platform spreads millions of items of child sex abuse material — and why it's hard to stop (theconversation.com)
  12. ^ we recently investigated the possible psychological basis (link.springer.com)
  13. ^ several potential reasons (link.springer.com)
  14. ^ limited intimate relationships (www.tandfonline.com)
  15. ^ heightened loneliness (www.tandfonline.com)
  16. ^ sense of belonging, social validation, and support (link.springer.com)
  17. ^ normalise (webarchive.nationalarchives.gov.uk)
  18. ^ “fuel the abuse” of children (webarchive.nationalarchives.gov.uk)
  19. ^ breaking down the child’s inhibitions (onlinelibrary.wiley.com)
  20. ^ falsely normalise (www.researchgate.net)
  21. ^ predatory conduct (www.justice.vic.gov.au)
  22. ^ used to teach children (onlinelibrary.wiley.com)
  23. ^ cartoon characters engaging in sexual activities (link.springer.com)
  24. ^ disguise the abuse (www.tandfonline.com)
  25. ^ contact offending (www.researchgate.net)
  26. ^ grooming (www.tandfonline.com)
  27. ^ increasingly sophisticated software (webarchive.nationalarchives.gov.uk)
  28. ^ It takes a village: law reform can't be the only response to online child abuse material (theconversation.com)

Read more https://theconversation.com/virtual-child-sexual-abuse-material-depicts-fictitious-children-but-can-be-used-to-disguise-real-abuse-180248

Times Magazine

Petrol Prices Soar and Rationing Fears Grow — The 10 Cheapest Cars to Run in Australia

Australians are once again confronting a familiar pressure point: the cost of fuel. With petrol pr...

Why Is Professional Porsche Servicing Important for Performance and Longevity?

Owning a Porsche is a symbol of precision engineering, luxury, and high performance. To maintain t...

6 ways your smartwatch is lying to you, according to science

You check your smartwatch after a run. Your fitness score has dropped. You’ve burnt hardly any...

Has the adoption of electric vehicles led to new forms of electricity theft

Why the concern exists Electric vehicles (EVs) like the Tesla Model 3 or Nissan Leaf shift “fue...

Adobe Ushers in a New Era of Creativity with New Creative Agent and Generative AI Innovations in Adobe Firefly

Adobe (Nasdaq: ADBE) — the global technology leader that unleashes creativity, productivity and ...

CRO Tech Stack: A Technical Guide to Conversion Rate Optimization Tools

The fascinating thing is that the value of this website lies in the fact that creating a high-cali...

The Times Features

Cost of living increases worry Farrer residents

COST OF LIVING ‘CRUNCH’ HITS FARRER HARD, THE NATIONALS HEAR During a visit to Albury this week...

What's On: Two Psychics and a Medium – Australian …

HIT LIVE SHOW TWO PSYCHICS AND A MEDIUM EMBARK ON  AUSTRALIAN TOUR — AND NO TWO NIGHTS WILL BE T...

Before vaccines, diphtheria used to kill hundreds each …

The Northern Territory[1] and Western Australia[2] are experiencing outbreaks of an almost-era...

realestate.com.au attracts the buyer for 9 in 10 listed…

New PropTrack data reveals the impact realestate.com.au has on property sales, with the  platfor...

The Hidden Threat Inside Data Centers: Why Fuel Degrada…

Data centers are designed with one overriding objective: uninterrupted operation. To achieve this...

Holidays: How to Book a Flight — and Protect Your Money…

For decades, booking an overseas holiday was a straightforward transaction: choose your destinat...

Olivia Colman, Kate Box to join an exclusive Live Q…

Fresh out of cinemas, JIMPA - the new film by acclaimed director Sophie Hyde (Good Luck to you, ...

Homemade Food: Cheaper Than Takeaway, Healthier Than Yo…

As the cost of living continues to bite across Australia, households are taking a harder look at...

The Coalition wants NDIS reform to focus on 3 things. H…

The government is expected to announce further changes to the National Disability Insurance Sche...