And since the Internet knows no borders, it becomes a customs thing.
I know it seems like a stretch... but, most likely it came about as a result of re-consolidation/jurisdiction responsibilities after 9/11.
Cyber Crimes Center
Report suspicious activity
1-866-DHS-2-ICE or Operation.Predator.ice@dhs.gov
For tips to prevent and deter individuals from committing online child abuse: Virtual Global Task Force
Report suspected child sexual exploitation or missing children to the National Center for Missing & Exploited Children at -
http://www.missingkids.com1-800-843-5678 or www.cybertipline.com
The Cyber Crimes Center (C3) Child Exploitation Section (CES) investigates the trans-border large scale production and distribution of images of child abuse, as well as individuals who travel abroad to engage in sex with minors. The CES employs the latest technology to collect evidence and track the activities of individuals and organized groups who sexually exploit children through the use of websites, chat rooms, newsgroups and peer-to-peer trading. These investigative activities are organized under Operation Predator, a program managed by the CES. The CES also conducts clandestine operations throughout the world to identify and apprehend violators. The CES assists the field offices and routinely coordinates major investigations. The CES works closely with law enforcement agencies from around the world because the exploitation of children is a matter of global importance.
C3 brings the full range of ICE computer and forensic assets together in a single location to combat such Internet-related crimes as:
* Possession, manufacture and distribution of images of child abuse;
* International money laundering and illegal cyber-banking;
* Illegal arms trafficking and illegal export of strategic/controlled commodities;
* Drug trafficking, including trafficking in prohibited pharmaceuticals;
* General smuggling, including trafficking in stolen art and antiquities and violations of the Endangered Species Act;
*
Intellectual property rights violations, including music and software; * Immigration violations; and
* Identity and benefit fraud.
http://www.ice.gov/cyber-crimes/