RCW 10.112.010
Findings- 2017 c 114 : "The legislature must continue to act to aid law enforcement in their efforts to prevent the unthinkable acts of sexual abuse of children and the horrendous social and emotional trauma experienced by victims of child pornography by expanding the tools available for law enforcement. The legislature finds that the expansion of the internet and computer-related technologies have led to a dramatic increase in the production and availability of child pornography by simplifying how it can be created, distributed, and collected. Between 2005 and 2009, the national center for missing and exploited children's child victim identification program has seen a four hundred thirty-two percent increase in child pornography films and files submitted for identification of the children depicted. The United States department of justice estimates that pornographers have recorded the abuse of more than one million children in the United States alone. Furthermore, there is a direct correlation between individuals who possess, download, and trade graphic images of child pornography and those who molest children. A well-known study conducted by crimes against children research center for the national center for missing and exploited children concluded that an estimated forty percent of those who possess child pornography have also directly victimized a child and fifteen percent have attempted to entice a child over the internet.
Victims of child pornography often experience severe and lasting harm from the permanent memorialization of the crimes committed against them. Child victims endure depression, withdrawal, anger, and other psychological disorders. Each and every time such an image is viewed, traded, printed, or downloaded, the child in that image is victimized again.
Investigators and prosecutors report serious challenges with combating child pornography because offenders can act anonymously on the internet. Investigators track the trading of child pornography by using internet protocol addresses, which are unique identifiers that each computer is assigned when it accesses the internet. Under federal law, if an internet service provider is presented with a subpoena and an internet protocol address by law enforcement, the provider must turn over the names and addresses of account holders matched to it. Access to such information allows investigators to efficiently evaluate investigative leads and determine whether to request a warrant for a specific internet user. The legislature finds that in investigations of child exploitation, the use of a special inquiry judge is the appropriate process for obtaining subpoenas for the production of records from electronic communications providers under a less than probable cause standard while maintaining judicial oversight." [2017 c 114 s 1.]