{"id":14906,"date":"2020-02-12T00:00:00","date_gmt":"2020-02-12T00:00:00","guid":{"rendered":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/"},"modified":"2026-01-23T11:34:55","modified_gmt":"2026-01-23T11:34:55","slug":"end-network-abuse-act-icac","status":"publish","type":"post","link":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/","title":{"rendered":"The END Network Abuse Act and the Fight Against Child Exploitation"},"content":{"rendered":"\n<p>The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it\u2019s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and videos, and identified over 15,800 victims of online child exploitation and abuse.<\/p>\n<!--more--><br>\n<p>Abusers are operating on computers nationwide, and shockingly, are bold enough to be circulating and sharing images on government computers. As a result, Congress saw a need to step up the battle against child exploitation and introduced the End Network Abuse Act (otherwise known as the End National Defense Network Abuse Act).&nbsp;<\/p>\n<br>\n<p>It\u2019s well known that abusers who consume or create child pornography will go to any length to avoid detection. What wasn\u2019t known until recently was how many of them would take their behaviors to government networks and computers &#8211; specifically, Department of Defense computers. This information came to light as a result of an investigation called \u201cProject Flicker\u201d, carried out by U.S. Immigration and Customs Enforcement. This investigation identified over 5,000 individuals, including many associated with the D.O.D., who subscribed to child sexual abuse material (CSAM).<\/p>\n<br>\n<p>Hundreds of individuals from the D.O.D. were identified as suspects, and several had even brazenly used their government devices to both view and share content. Representatives Abigail Spanberger and Mark Meadows saw a gap in the system that needed to be addressed, so they introduced the bipartisan bill to halt the ability of offenders to use D.O.D. computer networks to share or procure CSAM.&nbsp;<\/p>\n<br>\n<p>This bill identifies the difficulties surrounding the reporting and identifying victims as well as the overwhelming need for continuing and advanced training on tools and technologies to keep up with this vast landscape of abuse and exploitation. The END Network Abuse Act, when it passes, will require all investigative organization officials at the D.O.D. to be trained in online investigative tools, technologies, and techniques; computer forensics; complex evidentiary issues; child victim identification; child victim referral for comprehensive investigation and treatment services, and; related instruction.<\/p>\n<br>\n<p>The Act also requires the D.O.D. to engage in partnerships with groups such as law enforcement, child protection services, children\u2019s advocacy services, and trauma-informed healthcare providers to minimize the impact of the images and halt their spread.<\/p>\n<br>\n<p>ADF Solutions is also dedicated to the fight against online child exploitation and abuse. Our fast, innovative digital forensics software is used by investigators and analysts globally to combat CSAM. For more information on our software and our work the Internet Crimes Against Children (ICAC) task forces, download our <a href=\"\/icac\" rel=\" noopener\">ICAC White Paper<\/a> here.&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it\u2019s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and&#8230;<\/p>\n","protected":false},"author":4,"featured_media":13313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[63],"tags":[128,95,129,119,97,185,78,104,109,27],"class_list":["post-14906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-child-exploitation","tag-computer-forensics","tag-crimes-against-children","tag-cyber-forensics","tag-forensic-analysis","tag-forensic-science","tag-icac","tag-icac-task-force","tag-internet-investigation","tag-mobile-device-forensics","optech-blog blog-single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The END Network Abuse Act and the Fight Against Child Exploitation - ADF Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The END Network Abuse Act and the Fight Against Child Exploitation - ADF Solutions\" \/>\n<meta property=\"og:description\" content=\"The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it\u2019s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\" \/>\n<meta property=\"og:site_name\" content=\"ADF Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adfsolutions\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-12T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T11:34:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ADF Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@adfsolutions\" \/>\n<meta name=\"twitter:site\" content=\"@adfsolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ADF Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\"},\"author\":{\"name\":\"ADF Solutions\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc\"},\"headline\":\"The END Network Abuse Act and the Fight Against Child Exploitation\",\"datePublished\":\"2020-02-12T00:00:00+00:00\",\"dateModified\":\"2026-01-23T11:34:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\"},\"wordCount\":468,\"publisher\":{\"@id\":\"https:\/\/adfsolutions.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png\",\"keywords\":[\"Child Exploitation\",\"Computer Forensics\",\"Crimes Against Children\",\"Cyber Forensics\",\"Forensic Analysis\",\"Forensic Science\",\"ICAC\",\"ICAC Task Force\",\"Internet Investigation\",\"Mobile Device Forensics\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\",\"url\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\",\"name\":\"The END Network Abuse Act and the Fight Against Child Exploitation - ADF Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/adfsolutions.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png\",\"datePublished\":\"2020-02-12T00:00:00+00:00\",\"dateModified\":\"2026-01-23T11:34:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage\",\"url\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png\",\"contentUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/adfsolutions.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The END Network Abuse Act and the Fight Against Child Exploitation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/adfsolutions.com\/#website\",\"url\":\"https:\/\/adfsolutions.com\/\",\"name\":\"ADF Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/adfsolutions.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/adfsolutions.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/adfsolutions.com\/#organization\",\"name\":\"ADF Solutions\",\"url\":\"https:\/\/adfsolutions.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png\",\"contentUrl\":\"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"ADF Solutions\"},\"image\":{\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adfsolutions\",\"https:\/\/x.com\/adfsolutions\",\"https:\/\/www.linkedin.com\/company\/adf-solutions\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc\",\"name\":\"ADF Solutions\",\"url\":\"https:\/\/adfsolutions.com\/author\/adfsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The END Network Abuse Act and the Fight Against Child Exploitation - ADF Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/","og_locale":"en_US","og_type":"article","og_title":"The END Network Abuse Act and the Fight Against Child Exploitation - ADF Solutions","og_description":"The numbers surrounding pornographic images of children, and the child abuse that creates it, are so staggering that it\u2019s difficult not to be disheartened. According to the National Center for Missing and Exploited Children (NCMEC), their cyber tipline received over 42.9 million reports by November 2018. NCMEC had also reviewed over 267 million images and...","og_url":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/","og_site_name":"ADF Solutions","article_publisher":"https:\/\/www.facebook.com\/adfsolutions","article_published_time":"2020-02-12T00:00:00+00:00","article_modified_time":"2026-01-23T11:34:55+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png","type":"image\/png"}],"author":"ADF Solutions","twitter_card":"summary_large_image","twitter_creator":"@adfsolutions","twitter_site":"@adfsolutions","twitter_misc":{"Written by":"ADF Solutions","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#article","isPartOf":{"@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/"},"author":{"name":"ADF Solutions","@id":"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc"},"headline":"The END Network Abuse Act and the Fight Against Child Exploitation","datePublished":"2020-02-12T00:00:00+00:00","dateModified":"2026-01-23T11:34:55+00:00","mainEntityOfPage":{"@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/"},"wordCount":468,"publisher":{"@id":"https:\/\/adfsolutions.com\/#organization"},"image":{"@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage"},"thumbnailUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png","keywords":["Child Exploitation","Computer Forensics","Crimes Against Children","Cyber Forensics","Forensic Analysis","Forensic Science","ICAC","ICAC Task Force","Internet Investigation","Mobile Device Forensics"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/","url":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/","name":"The END Network Abuse Act and the Fight Against Child Exploitation - ADF Solutions","isPartOf":{"@id":"https:\/\/adfsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage"},"image":{"@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage"},"thumbnailUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png","datePublished":"2020-02-12T00:00:00+00:00","dateModified":"2026-01-23T11:34:55+00:00","breadcrumb":{"@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#primaryimage","url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png","contentUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/Blog-Post-19-1.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/adfsolutions.com\/end-network-abuse-act-icac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adfsolutions.com\/"},{"@type":"ListItem","position":2,"name":"The END Network Abuse Act and the Fight Against Child Exploitation"}]},{"@type":"WebSite","@id":"https:\/\/adfsolutions.com\/#website","url":"https:\/\/adfsolutions.com\/","name":"ADF Solutions","description":"","publisher":{"@id":"https:\/\/adfsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adfsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/adfsolutions.com\/#organization","name":"ADF Solutions","url":"https:\/\/adfsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png","contentUrl":"https:\/\/adfsolutions.com\/wp-content\/uploads\/2026\/01\/favicon.png","width":512,"height":512,"caption":"ADF Solutions"},"image":{"@id":"https:\/\/adfsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/adfsolutions","https:\/\/x.com\/adfsolutions","https:\/\/www.linkedin.com\/company\/adf-solutions\/"]},{"@type":"Person","@id":"https:\/\/adfsolutions.com\/#\/schema\/person\/4c5574625c6ba44f67522fbd564da0dc","name":"ADF Solutions","url":"https:\/\/adfsolutions.com\/author\/adfsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/comments?post=14906"}],"version-history":[{"count":1,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14906\/revisions"}],"predecessor-version":[{"id":15402,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/posts\/14906\/revisions\/15402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/media\/13313"}],"wp:attachment":[{"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/media?parent=14906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/categories?post=14906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adfsolutions.com\/wp-json\/wp\/v2\/tags?post=14906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}