Internet Vulnerability & Criminal Activity 6.2 – 10/10/2011 Child Enticement, Child Molestation, & Sexual Tourism.

Slides:



Advertisements
Similar presentations
Forensic Victimology 2nd Edition Chapter Seventeen: Sexual Offenders and their Victims.
Advertisements

Domestic Violence 101. APC is committed to providing safe shelter, advocacy, and supportive services for victims of domestic violence, rape, sexual assault,
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
Youth and Social Networking Sites Comenius Project
POMS and Associates CHILD ABUSE REPORTING. POMS and Associates The Law NMSA 32A-4-3. Any person…acting in an official capacity who knows or has a reasonable.
Journal Explain in your own words what abuse is.
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
Internet Safety for Students
Sex Offender Registration and Community Notification Meeting The purpose of community notification is to provide information to protect you and your family,
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Internet Safety Cyber Bullying. Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom.
Sex, Laws and Videos: 21st Century Sex Crimes Use of Recording Devices, Film, Cell Phones, Computers and the Internet Ginger Kimes Staff Attorney Prosecutor.
Sex Crime Prevention 1 Vermont Criminal Information Center Sex Crime Prevention.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Cyber and Internet Safety El Rodeo School September 11, 2013.
The ultimate guide to cyber- bullying.. Cyber-bullying is the use of electronic information and communication to bully or otherwise harass an individual.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Campus Security Authorities Incident Reporting Form Instructions.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
Internet Sex OffendersInternet Sex Offenders  It is humbling to speak about this topic because I have been a prosecutor long enough to remember the days.
Video: SNL Clip Quick Facts Online teens admit that they frequently communicate with people they have never met. – 54% have Instant Messaged a stranger.
Two major things to Look for on the Internet  1. Predators. Predators  2. How to Target a PredatorHow to Target a Predator  3. How can Parents Minimize.
Child Exploitation and Obscenity Section What we do... What we do... Assist 93 federal prosecution offices nationwide on child exploitation and child pornography.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Committed to preventing child abuse through educational services to parents, children, community members, as well as youth-serving professionals. Founding.
Chapter 4 Ethics and Laws Copyright © 2012 by Mosby, an imprint of Elsevier Inc. All rights reserved.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
Housing Ex-Offenders: Identifying Barriers and Proposing Solutions Angela Lee ODRC Reentry and Family Program Administrator.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Use of force Ocga
Unhealthy Relationships. Vocabulary Dating Violence: A pattern of physical, emotional, or sexual abuse that occurs in a dating relationship. Physical.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Criminal Law Chapter 3. Classifications of Crimes Crime: –Considered an act against the public good Plaintiff: –The party that accuses a person of a crime.
Being Good Digital Citizens with Today’s Technologies.
Elements of a Crime. Criminal Act The first necessary element of any crime is that a person's action be in violation of a law. Generally, a person must.
By Gail Brenner. The main purpose in this survey is to find out how students use networking sites.
Recent Forms of Deviance
Chapter 12 Privacy and Children. Naïve Kids Soupy Sales encourages kids to take money from parents wallets, send to him They do- $80,000.00! Sales is.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
{ Cyber Bullying. Cyber Bullying is typically referred to as “ a communication or posting by one or more people using cybertechnology or digital media.
Unit 4. Why is murder so fascinating? Excessive exposure as dysfunctional Desensitize to human suffering Appears more widespread than it is.
QUESTION… Is the internet bad?. GOODBad News/Finances Homework Research Shopping Games Education Sports Travel Entertainment Genealogy Pornography.
Healthy Media Boundaries
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Chapter 2 – Criminal Law. Spirit of the Law Crime – Act against the public good Punishable by fine, imprisonment or both Must be prohibited by the law.
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
Child Sexual Exploitation Kirstie King MSCB Learning and Development Officer.
Child Sexual Exploitation Detective Inspector Angie Chapman.
 Sexual assault  Incest  Child abuse  Child pornography  Human Trafficking  Rape *If you are uncomfortable… please let me know and you can step.
8 th Grade Lesson Sex & the Law Texas Version. It Can be Against the LAW! Criminal Law: Sexual Activity as a Teen.
Caritas of Archdiocese of Prague Migration Centre Joint Staff Training Event Meeting in Prague 23 th – 27 th 2015.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Sexual Offenders Chapter 6.
CHILD SEXUAL EXPLOITATION
School Climate & Discipline Program
Increasing Awareness and Prevention
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
Increasing Awareness and Prevention
Sexualized Behaviors in Children and Teens
Exploitation, Child Pornography, & Child Molestation
Internet Vulnerability & Criminal Activity
Abuse and Neglect Children and teens need care. They need food, clothing, and a place to call home. They also need protection from danger. Both neglect.
Presentation transcript:

Internet Vulnerability & Criminal Activity 6.2 – 10/10/2011 Child Enticement, Child Molestation, & Sexual Tourism

Methods of Child Exploitation Enticement “Inviting, persuading, or attempting to persuade a child to enter any vehicle, building, room, or secluded place with intent to commit an unlawful sexual act upon or with the person of said child” Pornography “Depictions of minors in sexual acts or provocative poses” Molestation “Any sexual behavior or activity that is abusive or nonconsensual toward a child – or sexual behavior that is specifically prohibited by state/federal law”

Methods of Child Exploitation Prostitution “The use of a child by others for sexual activities in return for remuneration or any other form of consideration” Sex Tourism “Traveling to a foreign country with the intent to engage in sexual activity with a child”

Tools of Child Molesters

Social Networking Sites MySpace, Facebook, Twitter

Crime potentials - Social Networks Too much personal information Registered Sex Offenders 744 total on MySpace Crimes against children Crimes against adults, unknown Easy for online predators to find targets Personal schedules posted online Stalking / Cyber stalking / Cyber bullying

Online Chat AOL, Web Based Chat Rooms

Crime Potential - Chat Rooms Child luring / Child molestation Grooming victims Exposure to inappropriate material Cyber stalking Cyber bullying Child pornography (photos, web cams) Kidnapping, murder Validation of deviant desires

321TeenChat.com No age verification No monitoring Parents in next room Adult predators Adolescent to Adolescent

Online Games

Crime Potential - Online Games May not follow Entertainment Software Rating Board (ESRB) rating system Similar to chat rooms Predators find many potential victims May expose children to inappropriate material Potential for parental child abuse / neglect

Peer-to-Peer (P2P) Kazaa, Limewire, Pirate Bay (Bit Torrent), Gnutella

Crime Potential - P2P Copyright violations Malware Uploading child pornography Downloading child pornography Private P2P networks Semi-anonymous

Web Cams

Crime Potential - Web Cams Child pornography production Child pornography possession Child exploitation Justin Berry Nearly nude photos Exposure Rape / Sexual assault

Child Molestation “And sexual behavior or activity that is abusive or nonconsensual toward a child – or sexual behavior that is specifically prohibited by state/federal law”

Child Molester vs. Pedophile Pedophile may not be a child molester Pedophile desires / fantasizes about sex with children, but may never act on desire Child molester may not be a pedophile Child molester may have sex with a child because of: Curiosity Availability Opportunity Desire to hurt child’s loved one

Child Molester Characteristics Male Adolescent - most molestations Adult - more victims w/ greater frequency Good at finding vulnerable children Low self-esteem Bad home life Economically/socially disadvantaged Communicates with child at child’s level

Child Molester Characteristics cont. Known to child Trusted adult Family member Online chat history Use a combination of deception, desensitization, & psychological conditioning to lure potential victim - Grooming Be friendly - reward w/ gifts & money Friendly trusting relationship w/ caregiver When relationship established, molestation begins May have several victims at different stages

Necessary Steps for Molester Must have motivation to sexually abuse a child Must overcome the molester’s internal inhibitions of molestation Must overcome external impediments to abuse Must have child available with no supervision Must overcome avoidance/resistance by child

Overcoming Victim’s Avoidance Show child adult porn Arouse curiosity Educate child Show child child &/or deviant porn Other children doing it Continue child’s exposure to porn Desensitize victim Convince child to allow molester to kiss/touch child Sex between child & molester

Preferential Molester Characteristics More intelligent Higher socio/economic bracket Criminal behavior Deviant sexual need - paraphilia Scripted, compulsive, fantasy driven Repeated fantasy creates need Make “needy” mistakes Pornography related to pedophilia

Situational Molester Characteristics Victimize children, but not a pedophile Child is available Have control over/live with child Think they can get away with it Curiosity Non-sexual need - power/anger/revenge Less intelligent Lower socio/economic class Opportunistic/impulsive Make stupid &/or sloppy mistakes Pornography, if collected, often violent in nature

Sex Tourism “traveling to a foreign country with the intent to engage in sexual activity with a child”

Sex Tourism Characteristics Men in western countries Visit developing/3 rd world counties To engage in illegal sex practices Internet – primary facilitator Important source of income for countries w/ weak economies

Sex Tourism Laws 18 U.S.C. § 2423 TRANSPORTATION OF MINORS (a) Transportation with intent to engage in criminal sexual activity. A person who knowingly transports an individual who has not attained the age of 18 years in interstate or foreign commerce, or in any commonwealth, territory or possession of the United States, with intent that the individual engage in prostitution, or in any sexual activity for which any person can be charged with a criminal offense, shall be fined under this title and imprisoned not less than 10 years or for life. (b) Travel with intent to engage in illicit sexual conduct. A person who travels in interstate commerce or travels into the United States, or a United States citizen or an alien admitted for permanent residence in the United States who travels in foreign commerce, for the purpose of engaging in any illicit sexual conduct with another person shall be fined under this title or imprisoned not more than 30 years, or both. (c) Engaging in illicit sexual conduct in foreign places. Any United States citizen or alien admitted for permanent residence who travels in foreign commerce, and engages in any illicit sexual conduct with another person shall be fined under this title or imprisoned not more than 30 years, or both. (d) Ancillary offenses. Whoever, for the purpose of commercial advantage or private financial gain, arranges, induces, procures, or facilitates the travel of a person knowing that such a person is traveling in interstate commerce or foreign commerce for the purpose of engaging in illicit sexual conduct shall be fined under this title, imprisoned not more than 30 years, or both. (e) Attempt and conspiracy. Whoever attempts or conspires to violate subsection (a), (b), (c), or (d) shall be punishable in the same manner as a completed violation of that subsection. (f) Definition. As used in this section, the term "illicit sexual conduct" means (1) a sexual act (as defined in section 2246 [18 USCS § 2246]) with a person under 18 years of age that would be in violation of chapter 109A [18 USCS §§ 2241 et seq.] if the sexual act occurred in the special maritime and territorial jurisdiction of the United States; or (2) any commercial sex act (as defined in section 1591 [18 USCS § 1591]) with a person under 18 years of age. (g) Defense. In a prosecution under this section based on illicit sexual conduct as defined in subsection (f)(2), it is a defense, which the defendant must establish by a preponderance of the evidence, that the defendant reasonably believed that the person with whom the defendant engaged in the commercial sex act had attained the age of 18 years.

Category of Sex Tourists Preferential abuser Pedophile Situational Abuser Opportunity arises Abuser’s justifications Child has ‘chosen’ that ‘profession’ Child chooses to do this so child is consenting Child ultimately benefits monetarily Victim is ‘inferior’, deserving of exploitation

Effects on Victims Sexually related diseases Risk of physical violence or death Psychological damage Suicide and substance abuse Common feelings: Shame Guilt Low self-esteem Stigmatism Betrayal Sleeplessness Hopelessness Depression

Why Kids are Susceptible Emotional immaturity Easy to manipulation and intimidation Desire for attention, validation, and affection Lack of caution and self-preservation Taught to obey adults Less likely to know when not to do so Embarrassed to tell parent or trusted adult Sex or other “forbidden topics” Tattletale

Sources FAQ_ENG_2008.pdf