The Wayback Machine - https://web.archive.org/all/20060107103504/http://www.ncmec.org:80/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=1491
 
    Home     About Us     Partners     Training     Site Search     News & Events
 
 Quick Search
Select a State (USA only)
Female     Male
Missing within   Year(s)
More search options
 
 Help Now
 Resources for
 Topics of Focus
 Global Network
 Language
 Special Thanks

 
 

Frequently Asked Questions

What are pornographic images of children?
I viewed pornographic images of children, what should I do?
What should I do if I accidentally receive or download pornographic images of children?
My 13-year-old son received an E-mail with an image of adult pornography, is this illegal?
Where do I report seeing adult pornography sites?
I viewed a text advertisement for pornographic images of children but I did not see images, should I still report it?
How do spammers and online stalkers find me?
What happens to my report after I submit it to NCMEC?
Does NCMEC investigate my report?
Will I be contacted about the outcome of my report?
How do I help keep my children safer online?

What are pornographic images of children?

Under federal law, child pornography1 is a visual depiction of a minor engaged in sexually explicit conduct.2

In addition to federal law, each of the 50 states and the District of Columbia has laws modeled after the federal statutes.

Sexually explicit conduct includes various forms of sexual activities such as intercourse, bestiality, masturbation, sadistic or masochistic abuse, or the lascivious exhibition of the genitals.3

It is illegal to possess, distribute, or manufacture these images.

If you are unclear about whether the sites you have come across meet the standards of the law, please do not hesitate to report them to www.cybertipline.com. NCMEC will review the site, determine whether it is a pornographic image of a child, and then forward it to the appropriate law-enforcement agency.

I viewed pornographic images of children, what should I do?
NCMEC, in conjunction with the Federal Bureau of Investigation, U.S. Immigration and Customs Enforcement (formerly the U.S. Customs Service), and the U.S. Postal Inspection Service, has developed an online reporting form for individuals who wish to report child sexual exploitation.

This reporting form can be found at http://www.cybertipline.com. When you access this page, you will find a form with several questions to answer regarding the incident.

For instance if you come across images depicting the sexual exploitation of a child on the Internet, we ask that you provide us with the web-site address, which is also known as the URL and stands for Uniform Resource Locator; the offender's E-mail address, if possible; and the time and date that you found the images. The more information you can provide, the more helpful the information is to law-enforcement authorities.

What should I do if I accidentally receive or download pornographic images of children?
If you downloaded such images, please follow the steps noted below because these images are illegal and may be needed for evidence.
  • Do not mail these images to law enforcement
  • Make sure you call or visit the proper law-enforcement authority and ask how they would like to handle this evidence
  • After speaking with the proper law-enforcement authority and hearing the steps they would like you to take, follow their instructions
  • After you have complied with their instructions, do not forget to delete the images from your computer including from both the "Trash" and "Cache" areas
My 13-year-old son received an E-mail with an image of adult pornography, is this illegal?
An incident such as this may be illegal; however, there are some stipulations to this. Please make a CyberTipline report at www.cybertipline.com and save the E-mail in which the image was attached. Please include the full expanded "Header" information in your CyberTipline report.
Where do I report seeing adult pornography sites?
The CyberTipline is not the forum to report adult pornography sites. If, however, you have any doubt that there are illegal images of children on the site, please make a CyberTipline report.

Report adult obscenity that does not include children to Morality in the Media at www.obscenitycrimes.org.

I viewed a text advertisement for pornographic images of children but I did not see images, should I still report it?
A text advertisement describing pornographic images of children is illegal. Follow the same steps you would if you found pornographic images of children on the Internet.

Please make a CyberTipline report and provide us with the URL, the offender's E-mail address if possible, and the time and date that you found the images. The more information you can provide, the more helpful the information is to law-enforcement authorities.

How do spammers and online stalkers find me?
Spammers, those who send unsolicited "junk" electronic mail (E-mail) to promote products or services, are not looking for you—they are looking for a million of you. Their goal is to contact as many people online as possible so that they can generate as many responses as possible.

Children are especially at risk because they are less likely to watch their "CyberSteps" and more likely to communicate in chatrooms and with unknown individuals.

Spammers can find you in many ways including

Member profiles and online white and yellow pages. There are various web sites that allow users to create profiles and search for members with similar profiles. Spammers use these sites to collect E-mails according to interests. Other sites serve as people- or business-finder web sites. Those white and yellow pages contain addresses from various sources that often share contacts. For example one service provider will add E-mail addresses to a major E-mail address search engine by default, making new addresses available to the public.

Chatrooms. Spammers harvest names from chatrooms, as it allows them to "target" their mailing lists.

Web pages. Spammers have programs that "spider" through web pages looking for E-mail addresses.

Web, E-mail, and paper forms. Some sites request various details via forms (e.g., guest books and registration forms). Spammers can get E-mail addresses from those either because the form becomes available on the world wide web or the site sells/gives the E-mail lists to others.

Surfer's web browser. Some sites use various tricks to extract a surfer's E-mail address from the web browser, sometimes without the surfer noticing it. One example of this is making the browser fetch one of the page's images through an anonymous connection to the site. In order to access the page, some browsers give the E-mail address the user has configured into the browser as the password for that account.

Chain letters and hoaxes. This method means the spammer uses a hoax to convince people to give him or her valid E-mail addresses. For example some spammers use chain letters with promises of free gifts to you and anyone the letter is forwarded to as long as it is copied to the spammer. They often claim to be associated with large reputable businesses.

Newsgroup or USENET postings. Spammers regularly scan newsgroups for E-mail addresses using ready-made programs designed to extract the addresses of anyone who is a member of that newsgroup.

Mailing lists. Spammers regularly attempt to get the lists of subscribers to mailing lists because some mail servers will give those upon request.

"Finger daemons." If one were to "finger query" asking for john@host, a list of information would be provided including login names for all people named John on that host. A query for @host will produce a list of all currently logged-on users (if the "server" allows this).

"Ident daemon." Some unix computers run a daemon, a program which runs in the background, initiated by the system administrator, intended to allow other computers to identify people who connect to them. When a person "surfing" from such a computer connects to a web site or news server, the site or server can connect back to the person's computer and ask that daemon for the person's E-mail address.

Domain contact points. Every domain has one to three contact points—administration, technical, and billing. The contact point includes the E-mail address of the contact person.

Cookies. In addition to extracting E-mail addresses from web sites by the methods described above, many web sites and E-newsletters use "cookies" to track your every move on their site. A cookie is a unique identifier that a web server places on your computer. It is a serial number for you personally that can be used to retrieve your records from their databases. It's usually a string of random-looking letters long enough to be unique. They are kept in a file called cookies or cookies.txt or MagicCookie in your browser directory/folder. Cookies can learn your preferences by asking questions at their site, and that information can be placed in cookies and used as a basis for offering you, or not offering you, future information. Cookies can be used to track where you travel on a site or what choices you make in response to options as you travel through a site. Any web site that knows your identity and has a cookie for you could set up procedures to exchange their data on you with other companies that buy advertising space from them, thus synchronizing the cookies they both have on your computer. This possibility means that once your identity becomes known to a single company listed in your cookies file, any of the others might know who you are every time you visit their sites. The result is that if a child goes to a soft-porn web site and signs up to win a trip, that child's name could be sold to other soft- and hard-core porn sites as well as to travel agencies.

    There are many convenient and legitimate uses for cookies. For instance they allow "mass customization" of the content on web sites and cannot pass viruses from the server to your hard drive. The information in the cookie is not a program and is never executed as code.

    Cookies cannot be used to get information from your hard drive that the server did not place there. They cannot capture an E-mail address from your browser, and they cannot steal credit-card numbers. They cannot capture personal information about you, unless you volunteer such information at a site, for example, in response to an offer of some kind. If you do volunteer personal information, that information could show up in a cookie and can be used with the information about you that is collected using cookies.


There are legitimate Internet resources that can be misused.

Once someone has your E-mail address there are legitimate Internet resources that can be misused to find additional information about you.

For instance by inputting an E-mail address and conducting a "reverse lookup" on a people-finder, a stalker can find your full name, home address, and telephone number. With that information, people can use a mapping tool on the Internet to determine where you live and exactly how to get to your house.

In addition they can conduct web and newsgroup searches to see if you have a web site, are on a web site, or have posted any messages to newsgroups. In essence, within one hour, a stalker may be able to find such information as your name, home and business addresses, home and business telephone numbers, preferences and hobbies, and even information about your family and neighbors.

Adapted from "How Do Spammers and Online Stalkers Find You?" in The Front Line, August 2001, Volume XXXXIV, page 8-9. Copyright © 2001 National Center for Missing & Exploited Children. All rights reserved.

What happens to my report after I submit it to NCMEC?
Every report is analyzed by staff in the Exploited Child Unit and is provided to the Federal Bureau of Investigation, U.S. Immigration and Customs Enforcement (formerly the U.S. Customs Service), U.S. Postal Inspection Service, and/or state/local law enforcement when such jurisdiction can be determined. Each of the agencies can review the reports and determine if further action is needed.
Does NCMEC investigate my report?
NCMEC is not a law-enforcement agency and does not have the authority to investigate and arrest perpetrators.

As indicated in the previous question, however, each report will be analyzed by staff members in the Exploited Child Unit and provided to the Federal Bureau of Investigation, U.S. Immigration and Customs Enforcement (formerly the U.S. Customs Service), the U.S. Postal Inspection Service, and/or state or local law-enforcement for their review and to determine if further action is needed.

Will I be contacted about the outcome of my report?
Reporting persons are not contacted regarding the final outcome of reports. If a reporting person desires to be updated about the status of a report, it is advised that law enforcement be contacted directly as the ECU does not handle the reports beyond initial intake and analysis.

Persons reporting unsolicited E-mail or pornographic images of children will only be contacted if additional information is needed.

Reporting persons are often contacted about other incident types to verify information provided, such as in a case of reported extrafamilial sexual exploitation, and explain what the reporting person's next steps should be, especially in a situation where there is potential or immediate risk to a child.

Thus it is always a good idea to include your contact information in the CyberTipline report. Please leave your name, your home and work telephone number, the time you would like to be contacted, and an E-mail address.

How do I help keep my children safer online?

Safety tips for families whose elementary-school-aged children and teenagers use computer online services are available in the publications noted below.

You will need the Adobe® Acrobat® Reader to view these files. Download a free copy of the Adobe Acrobat Reader.

Please visit www.NetSmartz.org for more information about Internet safety for your family.

Download These Publications
Child Safety on the Information Highway
Teen Safety on the Information Highway

For more information regarding these and other NCMEC publications, please visit Featured Publications and More Publications on the home page.

End Notes
1As stated by Janis Wolak, Kimberly Mitchell, and David Finkelhor in Internet Sex Crimes Against Minors: The Response of Law Enforcement (Alexandria, Virginia: National Center for Missing & Exploited Children, November 2003, page vii), “The term ‘child pornography,’ because it implies simply conventional pornography with child subjects, is an inappropriate term to describe the true nature and extent of sexually exploitive images of child victims. Use of this term should not be taken to imply that children ‘consented’ to the sexual acts depicted in these photographs; however, it is the term most readily recognized by the public, at this point in time, to describe this form of child sexual exploitation. It is used in this [document] to refer to illegal pictorial material involving children under the standards developed by statute, case law, and law-enforcement-agency protocols. It is hoped that a more accurate term will be recognized, understood, and accepted for use in the near future.”
218 U.S.C.A. 2252.
318 U.S.C.A. 2256.

 
Contact Us Privacy Policy Site Search Terms of Use
Copyright © 2006 National Center for Missing & Exploited Children. All rights reserved.