Surreptitious Image-Based Sexual Abuse

By Shannon Martucci, M.S., and Rachel Murdock, M.S.

A stock image of a small camera hidden between books on a shelve.


This article aims to educate law enforcement officers, forensic interviewers, prosecutors, and child advocates on surreptitious recordings within image-based sexual abuse (IBSA), the nonconsensual taking or sharing of nude or sexual images.1 Because IBSA is a relatively novel term and newly studied phenomenon, surreptitious IBSA will be referred to as surreptitious recordings.

Specifically, the authors will focus on providing an overview of surreptitious recordings of children, their impact on victims and investigations, ways the investigative team can work together to best assist minor victims, and how to adequately prepare for and execute forensic interviews of those victimized.

Background

Surreptitious viewing of private activities for sexual gratification has a long-standing history within the violation of voyeurism. However, surreptitious recordings have become more prevalent due to technological advances because they enable the creation and distribution of child sexual abuse material (CSAM).2

Cases of IBSA involving surreptitiously recorded CSAM can prove incredibly challenging because the victim may learn for the first time from law enforcement that such material of them has been recorded or disseminated. IBSA encompasses a wide range of technology-facilitated crimes and is exacerbated by increasing Internet accessibility and creativity in digital device processes, both of which enable new methods to victimize minors. Because IBSA is a relatively newly studied phenomenon, existing research is limited regarding minor victims. One study of IBSA victims found the most common form reported was nude or sexual images taken without consent.3

Offenders create surreptitious recordings involving minors in various ways, including hacking, upskirting, installing hidden cameras, recording sexual acts without consent, and recording incapacitated victims.

Shannon Martucci

Ms. Martucci is a child/adolescent forensic interviewer in the FBI’s Child Victim Services Unit.

Rachael Murdock

Ms. Murdock, a former child/adolescent forensic interviewer in the FBI’s Child Victim Services Unit, is an owner/clinician providing mental health counseling in private practice.

  • Hacking: In these cases, the subject assumes control of a victim’s computer, smartphone, tablet, or other device to damage or access their webcam, personal files, social media accounts, data, documents, and any images within, thereby compromising digital devices and networks.
  • Upskirting: Typically, upskirting occurs in public and involves taking photographs or videos from below a person’s skirt or dress without their knowledge or consent. The images are created by the subject in real time and may be discovered when the perpetrator is caught in the act or during an investigation. This is a unique violation because it undercuts the expectation of privacy over one’s own body in public places, like shopping centers, trains, buses, streets, and parks.4
  • Installing hidden cameras: Hidden or covert camera recordings may include public and private locations, like a dressing room or bathroom inside someone’s home, where privacy would reasonably be expected. Images captured via hidden or covert recordings may consist of an individual’s private parts or consensual sexual activity.5
  • Recording without consent: Nonconsensually recorded sexual acts may be captured either in person or online and may include children compliant in the activity but unaware it is being recorded or digitally captured. Often, these acts are described as the offender taking a screenshot of an image meant to disappear or of a live video conversation.
  • Recording incapacitated victims: Such victims include those filmed or photographed while sleeping or under the influence of alcohol or other drugs. They may be conscious during their victimization but unaware that sexual activity is being recorded.

Understanding the method of capturing surreptitious recordings is an important part of investigative efforts in collaborating with multidisciplinary teams (MDTs).6 During an investigation, this information is critical in preparing for forensic interviews of potential victims and witnesses.

Interviews

Forensic interviews are an important component of IBSA investigations, especially when surreptitious recordings are suspected. “The goal of a forensic interview is to obtain a statement from a [minor victim or witness], in a developmentally sensitive, unbiased and [legally defensible] manner, that will support accurate and fair decision-making in the criminal justice and child welfare systems. Although information obtained from an investigative interview might be useful for making treatment decisions, the interview is not part of a treatment process.”7

Preparation

To prepare for the forensic interview, interviewers should ascertain how law enforcement learned of the evidence. Was it from a search warrant following images traded online, hidden camera discovered in public and traced back to the subject, or report from a victim who is being blackmailed with surreptitiously captured images to self-produce additional ones for a subject? This information may help formulate forensically sound questions and provide the interviewer with the level of understanding the victim may have about the CSAM’s production.

In cases involving surreptitious recordings, it is highly recommended to use interviewers skilled in presenting evidence during forensic interviews. These cases require advanced interviewing skills as the interviewer will need to review, prepare, and determine the appropriateness of presenting the image(s) at that time.

Forensic interviewers are neutral fact finders trained to avoid assumptions when interviewing children. Their neutrality also plays a role in determining the value of presenting surreptitious recording evidence in the interview. This integral part of the practice does not change simply because the evidence appears to speak for itself.

For example, how often has a child disclosed a sexual assault that occurred in their bedroom at night and indicated they feigned sleep while the perpetrator assaulted them? Considering this and educating the MDT can help facilitate conversations about why the images in surreptitious recordings may hold value for presentation in an interview. Just because the child appears unconscious in an image does not mean they were. Interviewers should remain neutral and understand the victim may or may not know about the images. The forensic interview itself may be used to determine the victim’s degree of knowledge of the images and how or if the CSAM evidence may be used during the interview.

In CSAM cases involving victims who self-produced images or were knowingly filmed or photographed by a perpetrator, presenting evidence is much more straightforward and typically recommended as an important investigative step in the interview process. With surreptitious recordings, this practice is much more nuanced. Done improperly and without adequate training, presenting evidence in the forensic interview can harm the victim and investigation.

Successful Approach

Bearing these risks in mind, FBI child/adolescent forensic interviewers (CAFIs) have extensive experience presenting evidence in the forensic interview and peer reviewing this practice. This has resulted in adjustments to how evidence is presented, particularly when the case involves surreptitiously captured images.

“Offenders create surreptitious recordings involving minors in various ways. …”

The FBI has followed its practice of presenting evidence since 2002. Its approach involves acknowledging up front to the interviewee8 that the forensic interviewer has evidence they may present during the interview. By establishing this transparency early, a more trusting relationship can be built. This part of the practice typically takes place following the introduction of interview guidelines and may include a statement such as: “I want to tell you that I have some screenshots from a video9 with me today that I may want to speak with you about. When we get to that, I will let you know.”

Alerting the interviewee to the evidence helps avoid making them feel betrayed, allows them to anticipate what may happen in the interview, and cues them as to what the interviewer may be referencing. Presenting evidence can lead to more robust disclosures and confirmation that the interviewee is the victim depicted in the images. Research suggests that what enables victims to disclose information about abusive images is the interviewer letting them know about the images, establishing a trusting relationship, and demonstrating patience with the disclosure process.10

Forensic interviewers use a balance of science and art in their work.

To adhere to the science, they should follow a research-based protocol for their interviews. Some may have concerns about cases of surreptitious recordings and a minor’s ability to provide a free narrative as most protocols require this.

However, interviewees’ efforts to produce a free narrative should be encouraged. Interviewers can look for opportunities to acquire one and should always offer the minor an opportunity to do so. For example, if the interviewee appears to be sleeping in the recording, a narrative about bedtime routine, any causes to wake during the night, the minor’s body feeling different in the morning, or other variables may elicit important details.

The art of the forensic interview is demonstrated when determining the appropriate time to present that evidence. Once the interviewer arrives at this point, they may state:

Remember I told you I have some screenshots from a video? I have them here now, and I would like to talk to you about them. I can describe them to you first and then show them to you. Or I can just show them to you. You might have a question or another idea. What would you like us to do?

In cases where the interviewee declines to view the images, they will not be shown. However, this may prompt additional inquiries by the interviewer, such as “Do you have any questions about the images?” “Do you have any worries about what may be in them?”

In most instances, it would be appropriate to present the evidence to the interviewee should they wish to see it.

With cases of surreptitious recordings, the practice of presenting evidence typically does not change. However, in some cases, the interviewer and MDT may elect not to show the images or give the interviewee an option to view them at all. This necessary adjustment accounts for the additional layer of victimization—that the private sexual images were taken without the victim's knowledge.11 CAFIs must balance this nuance with the victim’s right to know. Therefore, in determining the appropriateness of presenting an image to an interviewee, it is important to consider:

  • The interviewee’s age during the allegations’ time frame
  • Contact or familiarity the interviewee has with the subject
  • Apparent lack of knowledge of surreptitious recordings displayed during the interview

In cases where the victim clearly has no recollection of the surreptitious recording, memory of the perpetrator, or knowledge of the investigation’s necessity in general, it would be appropriate to opt out of presenting images to them. Instead, the interviewer should advise the MDT to work with family members to determine an appropriate developmental stage to inform the victim of the evidence and the crime committed against them.

“Forensic interviewers are neutral fact finders trained to avoid assumptions when interviewing children.”

A child may deny knowledge of CSAM following multiple prompts in the interview. In such cases, the interviewer must inquire about any in-person or online sexual activity with the subject that may have resulted in CSAM without the victim’s awareness. For example, when knowing the evidence depicts the victim with the subject, the interviewer should be intentional in the phrasing of questions to continue building trust in the interview.

Instead of asking, “Was there ever a time you saw/met the subject in-person?” the interviewer should say, “Tell me about a time you saw/met the subject.” In doing so, the interviewer avoids being deceitful and damaging the trusting relationship in the interview by feigning ignorance of what the evidence conclusively supports.

When the time comes to present the evidence, the interviewer can prepare the victim by stating:

I have some screenshots with me that you may or may not be aware were taken. I can describe them to you first and then show them to you, I can just show them to you, or I don’t have to tell you or show you anything about them at all. Which would you prefer?

Often, victims of surreptitious recordings will elect to see the images during the forensic interview. It is important not to make this decision for them without a specific reason because offering victims a choice to be informed avoids perpetuating the secrecy of their victimization. When asked about their desire to view the evidence in forensic interviews conducted by FBI CAFIs, victims have stated “I wanted to know what happened to me,” “I have a right to know what happened to me,” or “I wanted to know what really happened.”

In some cases, surreptitious recording victims have been concerned or curious over what the images depicted. This may prove particularly important in cases involving heightened media attention as potential victims or witnesses may be consuming information that is inaccurate, exaggerated, or unrelated to their personal experience. If not given the choice to be informed, these victims may never learn the extent to which they may have been victimized. At times, they have expressed relief to have a more complete understanding of what the perpetrator captured.

Next Steps

After the forensic interview, investigators often engage with caregivers to consider any safety concerns, discuss next steps in the investigation, and inform them of victims’ rights. Sometimes during this conversation, caregivers ask investigators to have a conversation with their child about Internet safety and the dangers of their online behaviors. 

This conversation with investigators may lead to victims feeling blamed or responsible for their victimization. Investigators who lack experience in discussing Internet safety from a trauma-informed perspective may inadvertently engage in victim blaming. Negative experiences for victims may involve the investigator telling them not to do things like video chat in the future to avoid this happening again.12

Education may be necessary to explain the dynamics of IBSA to help caregivers shift blame from their child to the perpetrators of these crimes. It can be helpful to discuss the grooming process, manipulation, fear, shame, and feelings of being stuck, which victims often report following online victimization. Caregivers need help understanding how surreptitious recordings occur so they can grasp the dynamics, best support their child, and realize how a conversation with investigators about Internet safety may not be appropriate or in the victim’s best interest. 

Victims are often worried about what information will be shared with caregivers following a forensic interview. So caregivers can offer the best care for their children, it is important to provide enough information but without betraying victims’ trust or compromising the investigation. When safety concerns, such as signs of suicidality, arise, these must always be shared with caregivers. Children and adolescents may experience suicidal thoughts due to feelings of hopelessness and helplessness.13 Being a victim of an online crime can exacerbate these feelings as they may not know how to navigate or escape what they are experiencing.

“After the forensic interview, investigators often engage with caregivers to consider any safety concerns, discuss next steps in the investigation, and inform them of victims’ rights.”

Due to the increased risks of suicidality, conducting suicide assessments following forensic interviews is vital. Gathering information from caregivers about mental health history, prior suicide attempts, and access to lethal means is important. Various brief and effective suicidality assessments can help determine the need for additional evaluation.

Submission Of Cases

The National Center for Missing & Exploited Children (NCMEC) serves as the central repository of CSAM files in the United States. When law enforcement obtains CSAM during an investigation, it should be submitted to the NCMEC’s Child Victim Identification Program for review and matching of identified victims.14

Within the FBI’s Victim Services Division, the Child Exploitation Notification Program15 facilitates the notification process for federal victims of distributed CSAM through use of the Victim Notification System.16 The guardian or victim (if over age 18) can decide if they wish to be notified regarding subsequent investigations and prosecutions involving images of the victim.

In cases involving surreptitious recordings, it is especially important to communicate to families who may refuse to allow their child to have any knowledge of the investigation or the existence of CSAM of the victim that “Once a child victim reaches 18 years of age, the [U.S. Justice] Department is obligated to provide that victim with notification in cases in which the crime occurred when the victim was a minor.”17 The child has a right to know, and it is up to the MDT to inform them in the most developmentally sensitive and trauma-informed way possible.

Conclusion

A victim should not be forced to disclose abuse, and it is crucial to prioritize their mental health in all cases. It may be in the victim’s best interest to participate in an interview at a later or more developmentally appropriate time. This allows follow-up to gather more information when the victim is more actively disclosing or able to discuss their experience in a way that will not cause significant distress.

The burden of the case should never be placed on a child’s shoulders. Forensic interviewers must balance the victim’s right to know what happened to them, the needs of the investigation, and the overall well-being of the child when working an investigation involving surreptitious recordings. This delicate balance is maintained by adequately preparing for forensic interviews, thoroughly reviewing the evidence, making victim-centered decisions regarding the presentation of evidence, and providing appropriate reassurance to the victim. When done correctly, further potential suffering is limited, victim experiences are validated, and important investigative details are corroborated.18

FBI child/adolescent forensic interviewers are available for consultation, guidance, and training to any forensic interviewers, law enforcement officers, and other multidisciplinary team members. Navigating the ever-changing landscape of image-based violations is an incredible challenge for these teams. 

However, when law enforcement officials build strong investigative teams, prioritize the victim’s well-being, and consult with colleagues to ensure best practices, they are better equipped to advocate for children and bring justice to offenders.

“A victim should not be forced to disclose abuse, and it is crucial to prioritize their mental health in all cases.”

Ms. Martucci can be reached at sgmartucci@fbi.gov and Ms. Murdock at rachel@beyondthestormkc.com.


Endnotes

1 Nicola Henry et al., Image-Based Sexual Abuse: A Study on the Causes and Consequences of Non-Consensual Nude or Sexual Imagery (New York: Routledge, 2021); Sophie Maddocks, “From Non-Consensual Pornography to Image-Based Sexual Abuse: Charting the Course of a Problem with Many Names,” Australian Feminist Studies 33, no. 97 (2018): 345-36, https://doi.org/10.1080/08164649.2018.1542592; Clare McGlynn et al., “‘It’s Torture for the Soul’: The Harms of Image-Based Sexual Abuse,” Social & Legal Studies 30, no. 4 (2020): 541-562, https://doi.org/10.1177/0964663920947791; Clare McGlynn et al., Shattering Lives and Myths: A Report on Image-Based Sexual Abuse (UK: Durham University and University of Kent, 2019), https://durham-repository.worktribe.com/output/1605209; and Clare McGlynn and Erika Rackley, “Image-Based Sexual Abuse,” Oxford Journal of Legal Studies 37, no. 3 (2017): 534–561, https://doi.org/10.1093/ojls/gqw033
2 McGlynn and Rackley.
3 Henry et al.
4 Asher Flynn and Nicola Henry, “Image-Based Sexual Abuse: An Australian Reflection,” Women & Criminal Justice 31, no. 4 (2021): 313-326, https://doi.org/10.1080/08974454.2019.1646190.
5 The terms consensual or compliant describe sexual encounters in which both parties are cooperating participants; this does not consider the individuals’ age as children cannot legally consent to sexual activity.
6 MDTs are public-private partnerships that include various agencies and departments responsible for protecting children. This typically includes institutions of law enforcement, child protective services, mental health, medical health, and victim advocacy. See “Who We Are,” National Children's Advocacy Center, accessed February 27, 2025, https://www.nationalcac.org/about-us/.
7 State of Michigan, Governor’s Task Force on Children’s Justice and Family Independence Agency, Forensic Interviewing Protocol, https://www.michigan.gov/mdhhs/-/media/Project/Websites/mdhhs/Adult-and-Childrens-Services/Abuse-and-Neglect/Childrens-Protective-Services/DHS-PUB-0779-First-Edition.pdf?rev=7cca49518a07497f8b068bb92cfa51bd&hash=A25F81F9AE15DE4DE2CE4F464C50E855.
8 The term interviewee describes both the victim and witness participating in the forensic interview.
9 FBI CAFIs do not introduce video evidence to children. When CSAM production involves video-recorded evidence, CAFIs will advise law enforcement to screen capture still images from the video.
10 Julia von Weiler, Annette Haardt-Becker, and Simone Schulte, “Care and Treatment of Child Victims of Child Pornographic Exploitation (CPE) in Germany,” Journal of Sexual Aggression 16, no. 2 (2010): 211-222, https://doi.org/10.1080/13552601003759990
11 Bobby Chesney and Danielle Citron, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security,” California Law Review 107, no. 6 (2019): 1753-1820, https://www.jstor.org/stable/26891938/; Flynn and Henry; and McGlynn and Rackley.
12 Justin W. Patchin and Sameer Hinduja, “Sextortion Among Adolescents: Results from a National Survey of U.S. Youth,” Sexual Abuse 32, no. 1 (2018): 30–54, https://doi.org/10.1177/1079063218800469; and Janis Wolak et al., “Sextortion of Minors: Characteristics and Dynamics,” Journal of Adolescent Health 62, no. 1 (2018): 72-79, https://doi.org/10.1016/j.jadohealth.2017.08.014.  
13 Kevin Caruso, “Hopelessness: A Dangerous Suicide Warning Sign,” Suicide.org, accessed February 27, 2025, http://www.suicide.org/hopelessness-a-dangerous-warning-sign.html.
14 For additional information, see “Case Resources,” National Center for Missing & Exploited Children, accessed February 27, 2025, https://www.missingkids.org/ourwork/caseresources.
15 The FBI’s Child Exploitation Notification Program (CENP) was known as the Child Pornography Victim Assistance (CPVA) program until 2023. For additional information, see “Child Exploitation Notification Program,” How We Can Help You, U.S. Department of Justice, Federal Bureau of Investigation, accessed January 29, 2025, https://www.fbi.gov/how-we-can-help-you/victim-services/cenp.
16 See “Victim Notification System,” U.S. Department of Justice, accessed January 29, 2025, https://www.notify.usdoj.gov/index.jsp.
17 U.S. Department of Justice, The Attorney General Guidelines for Victim and Witness Assistance, 2022, https://www.justice.gov/d9/pages/attachments/2022/10/21/new_ag_guidlines_for_vwa.pdf. 
18 Nicola Gavey and Johanna Schmidt, “‘Trauma of Rape’ Discourse: A Double-Edged Template for Everyday Understandings of the Impact of Rape?” Violence Against Women 17, no. 4 (2011): 433-456, https://doi.org/10.1177/1077801211404194; and Suzanne McKenzie-Mohr and Michelle N. Lafrance, “Telling Stories Without the Words: ‘Tightrope Talk’ in Women’s Accounts of Coming to Live Well After Rape or Depression,” Feminism & Psychology 21, no. 1 (2011): 49-73, https://doi.org/10.1177/0959353510371367.