Thorn


TECHNOLOGY AND EXPLOITATION


NUMBER OF CHILD PORNOGRAPHY FILES REPORTED ANNUALLY

The number of images/videos submitted to NCMEC by law enforcement and reviewed by the Child Victim Identification Program has increased from 450,000 in 2004 to more than 17 million in 2011. Technology has made it easier for predators to create and share child pornography and connect with like-minded individuals. The increased availability of exploitative content has the effect of “normalizing” behaviors that are both dangerous and illegal.

Source: National Center for Missing & Exploited Children (NCMEC)
Chart of number of child pornography files submitted annually

3 OUT OF 4 VICTIMS ARE TRAFFICKED ONLINE

Over three-quarters of underage sex trafficking victims we spoke with said they had been advertised or sold online. The Internet simplifies illegal transactions for johns, and helps create new opportunities for pimps who profit from the sexual victimization of children.

Source: Thorn Survivor Survey
Image of 3 out of 4 children trafficked online

PRIVACY POLICY +

THORN is committed to providing information and activities relating to THORN'S mission on the website. While we encourage the interactive nature of our website, we strive to promote the online safety and privacy of our users.

Information You Provide to Us: We collect information about you when you visit and interact with this site. Some of this information is automatically collected, and some is collected when you interact with the site. The type of information that is automatically collected can include date and time of access of the site, the Internet protocol address of the computer that you are using, the domain and host from which you access the Internet, your browser software and operating system, and the specific activities you are engaged in while visiting the site. Information from which you can be personally identified may also be collected by us at the site, including your name and email address.

Linked Sites: From time to time, the website may contain links to other websites that are not controlled and/or maintained by THORN. Please be aware that these other websites may have different privacy policies which may subject you to different privacy practices. Please review the privacy policies of such other websites for information concerning what information is collected on such sites and how it is used.

If you have registered to receive e-mail communications from us and later change your mind, you may contact us to have your name removed from our distribution lists. To opt out, you can send an e-mail to: info (at) wearethorn.org with UNSUBSCRIBE in the subject line.