The traditional distinction between commercial and non-commercial distribution, which cast the former as largely profit driven and conducted by those with limited sexual interest in children, is no longer as obvious.
It is weakened by the fact that offenders with a sexual interest in children who produce and distribute CAM are becoming entrepreneurial, exploiting developing technologies CSE offenders continue to exploit currently available technology, coupled with anonymous networks to hide their activities from LE attention.
They are a highly effective and efficient means of building and rebuilding a collection quickly after accidental loss or apprehension.
Some specialists describe the material which is being shared there as known and often dated.
It is necessary to acknowledge that new CAM can be a currency in itself.
Child sexual abusers continue to exploit technology that enables the streaming of live images and video in many different ways.The presumed greater level of anonymity and strong networking may be favouring their sexual urges, which would not be revealed in any other environment lacking such features.The use of Tor in the proliferation of CAM remains a key threat, regardless of some loss of trust about its complete anonymity and technical limitations.This represents a significant driver for such a modus operandus to become even more widespread.The frequent small amounts of money being transferred through intermediaries minimises any red flags from financial transaction monitoring agencies.
In the most extreme cases online solicitation may turn into sexual extortion, where victims are threatened by disseminating indecent materials depicting them and have to comply with offender demands, leaving them with psychological damage and increasing the potential for self-harm or suicide attempts.