Lecture52011

Download Report

Transcript Lecture52011

Internet Vulnerability & Criminal Activity

5.2 – 10/10/2011 Child Exploitation Pedophilia & Child Pornography

Child Exploitation

“Possession, manufacture and distribution of child pornography; online enticement of children for sexual acts; child prostitution; child sex tourism and; child sexual molestation. ”

Methods of Child Exploitation

 Enticement 

“Inviting, persuading, or attempting to persuade a child to enter any vehicle, building, room, or secluded place with intent to commit an unlawful sexual act upon or with the person of said child”

 Pornography 

“Depictions of minors in sexual acts or provocative poses”

 Molestation 

“Any sexual behavior or activity that is abusive or nonconsensual toward a child – or sexual behavior that is specifically prohibited by state/federal law”

Methods of Child Exploitation

 Prostitution 

“The use of a child by others for sexual activities in return for remuneration or any other form of consideration”

 Sex Tourism 

“Traveling to a foreign country with the intent to engage in sexual activity with a child”

Victims of Child Exploitation Online

Minor

“Anyone under the age of 18 no matter what the age of consent in a state maybe”

Characteristics of Victims

        Dysfunctional families Older rather than younger Confusion over sexual orientation Not always “innocent” May misrepresent themselves May be looking for / collecting pornography Do not understand what they are getting into Consent is not an issue

Computer/Internet Use by Sex Offenders

    Computer only a tool Online offenders most similar to acquaintance molesters Offender slang   “Traders” - Traffic in child porn “Travelers” - Solicit sex with children Problem area - adolescents    Producing/trading child porn (sexting) Soliciting sex with other adolescents Not sexually deviant

Illegal Computer/Internet Activities    Possessing / producing child pornography  Uploading / downloading child pornography Soliciting sex with children Offering a child for sexual purposes

Legal Sexual Activities

 Validating deviant sexual behavior and interests  Reinforcing deviant arousal patterns  Storing and sharing sexual fantasies  Lying about one’s age and identity

Legal Sexual Activities cont.

   Collecting adult pornography that is not obscene Disseminating “indecent” material, talking dirty, “cyber-sex”, and providing sex instructions Injecting oneself into the “problem” of computer exploitation of children to rationalize interests

Categories of Sexual Offenders  Situational Offenders  Preferential Offenders  Miscellaneous Offenders

Situational Offenders

“Normal” adolescent / adult

  Curious Impulsive 

Morally indiscriminate

  Power / anger motivated Previous violent offenses 

Profiteers

 Easy money

Miscellaneous “Offenders”    

Media Reporters

 Engage in illegal behavior for news story

Pranksters

 “cyber-smearing”

Older “Boyfriends”

 Late teens / early 20’s

Overzealous citizens

  Want to help law enforcement Be aware of true motivation

Preferential Offenders

Pedophile

 Prefers sex with children 

Diverse

  Wide variety of deviant interests Sexually indiscriminate 

Latent

 Recently begun to act on illegal urges

Understanding Sexual Offender Behavior

Paraphilia

Sexual deviations or perversions

Paraphilia Defined

  Psychosexual disorder Recurrent, intense sexual arousing fantasies, urges, or behaviors that involve:     Nonhuman objects Suffering or humiliation Children, other non-consenting persons Occurs over a period of six months

Types of Paraphilia

 Exhibitionism - exposure  Fetishism - objects  Pedophilia - children  Sexual masochism - self-pain  Sexual sadism - partner-pain  Voyeurism - watching

Pedophilia Characteristics (Psychological)

 Sexual in nature  Highly addictive  Compulsive & repetitive  Very difficult to treat  Unstopped by self-control/self-discipline  Only a crime if urge is acted on  Does not include adolescent consensual relationships

Pedophiles use of the Internet

 Trafficking in child pornography  Locating children to molest  Engaging in inappropriate communications with children  Communicating with other pedophiles

Internet Technologies used by Sex Offenders       Adult Pornography Social Networking Sites Chat Rooms Online Gaming Sites Peer-to-Peer (P2P) Web Cams

Some Pedophile Groups -

        

Some on the Web

North American Man - Boy Love Association - NAMBLA The Rene Guyon Society Childhood Sensuality Circle - CSC Pedophiliacs Anonymous - PAN Pedophile Information Exchange - PIE Pedophile Action for Liberation - PAL Pedophile Alliance League - P.A.L.

The Lewis Carroll Collectors Guild Howard Nichols Society

Evidence

        Screen name Screen profile Accuracy of profile Length of time active Amount of time spent online Number of transmissions Number of files Number of file originated       Number of files forwarded Number of files received Number of recipients Site of communication Theme of messages and chat Theme of pornography

Child Pornography

“Depictions of minors in sexual acts or provocative poses”

How the Internet Changed Child Porn    Prior to the Internet, Child porn local, very small distribution Mid 1980’s - Child porn almost wiped out Internet & technology allows  Cheap, easy creation of child porn   Anonymous distribution Available through all Net channels (IRC, P2P, web pages, e-mail)

The Role of the Internet in

       

Promoting Child Pornography

Permits vast quantities from around the world Instantly available in any time or place Can be accessed anonymously & privately Facilitates direct communication and file sharing between users Relatively inexpensive Images do not deteriorate & are easy to store Variety of formats; potential for real-time & interactive experiences Can be used to create composite or virtual images

Three Components of the Problem

 Production  Distribution  Downloading

Production

 Premium placed on new material – much material decades old  Professionally produced materials from third world countries  Most common, amateurs recording their own sexual exploits  Clandestine photography of children in public places

Distribution

     Uploading & dissemination of pornographic images May involve sophisticated pedophile rings & organized crime groups Many times carried out by amateurs Efforts to stop distribution focusing on ISP’s and police stings has changed the way in which child porn is distributed Increasingly, sophisticated security measures are being used

Methods of Distribution

    Web sites Web cam E-mail E-groups     Newsgroups Bulletin Board Systems Chat Rooms Peer-to-peer

Downloading

   Accessing child porn via the Internet Images do not need to be saved In most cases, users must be actively seeking child porn  Increasingly, good computer skills & inside knowledge required  Most downloading done via newsgroups & chat rooms

Offender Typology

   Browsers  Inadvertently find child porn, but knowingly keep the images  No networking  No security strategies Private fantasizers  Create digital images for personal use   No networking No security strategies Trawlers  Seek child porn through open sources   Minimal networking Few security strategies

Offender Typology

   Non-secure collectors  Seek child porn in non-secure chat rooms & other open levels   High levels of networking No security strategies Secure collectors  Use closed newsgroups or secret pedophile rings   High level of networking Sophisticated security measures Groomers  Develop online relationships with children, use child porn to “groom” victim   May or may not be involved with networking Little security strategies

Offender Typology

   Physical abusers  Child porn part of pedophilic interest  May create their own child porn, evidence of their behavior   May or may not network Security depends on victim’s silence Producers  Record abuse for purpose of distributing to others   Networking depends on if producer is also distributor Security depends on victim’s silence Distributors  Disseminates child porn images   May have purely financial interests Networking and security depends upon level of operation

How do Pedophiles use Child Pornography         Source of pride Sexual gratification Feed/create sexual fantasies Training/grooming potential victims Lower potential victim’s inhibitions Blackmail victim into silence Profit Barter with other pedophiles

Dangers Associated with Child Porn     Single most distinct characteristic of child molester Used by molester to ‘normalize’ behavior Long term use leads to desensitization Used by terrorist groups to exchange information http://www.timesonline.co.uk/tol/news/uk/crim e/article4959002.ece

Law Enforcement Challenges

 Structure of the Internet  Decentralized, P2P  One site shut down, another will instantly take it’s place  Uncertainties of jurisdiction   Requires cooperation among agencies No clue to where images originate

Law Enforcement Challenges

   Lack of regulation  Community protection vs. Freedom of Speech  Ambiguity regarding liability, ISP responsibility Differences in legislation  Differences between countries   Countries may vary in commitment Cultural differences Expertise of offenders  Long time offenders experts in security measures  Many sting operations catch the inexperienced, low-level offender

Sources

 Child Molesters: A Behavioral Analysis http://www.missingkids.com/en_US/publ ications/NC70.pdf

 Child Pornography on the Internet http://www.cops.usdoj.gov/files/ric/Publi cations/e04062000.pdf