The European Online Grooming Project_ Findings Launch The British Academy 3 rd February 2011.

Slides:



Advertisements
Similar presentations
SHARED LEARNING ON THE REINTEGRATION OF EUROPES (ex)OFFENDERS JUNE 2012 Monday, 18th, 12: :00 Tuesday, 19th, 09: :00 PERMANENT REPRESENTATION.
Advertisements

Real world approaches to assessing the impact of research on policy
The European Online Grooming Project_ Key Findings and Implications House of Lords 18 th April 2012.
Contents: The Consortium Background Goal Objectives Methodology, dissemination strategies and timetable UNIVERSITA CATTOLICA DEL SACRO CUORE MILANO.
The Open Method of Coordination as an example of policy learning at the European Level Six Countries Programme Stockholm May 2006 Peder Christensen.
March 2007 Overview. International Network on School Bullying and Violence The aim of the Network is to stimulate and support more effective measures.
Government of the Republic of Serbia Ministry of Labor and Social Policy GENERAL AND SPECIAL PROTOCOL ON CHILD PROTECTION FROM ABUSE AND NEGLECT.
Daphne III – Action grant KICK-OFF Meeting Violence against children the EU policy perspective 21 January :30 Centre Albert Borschette.
The EU framework for integration of third-country nationals: a focus on the role of cities and on funding opportunities Martin Schieffer, Immigration and.
Data on missing children in the EU? Developing evidence-based child-friendly policies EC Forum on the Rights of the Child Brussels, 23 November 2011 Alexandra.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines ITU Regional Workshop on Policy Advocacy & Child Online Protection.
Presenter Name(s) Issue date National Student.
Implementation and impact of NQFs: Report of a study in 16 countries Methodology, key findings, and analysis Stephanie Allais 29 th September 2010.
Faculty of Health & Social Care Improving Safeguarding Practice: Study of Serious Case Reviews Wendy Rose and Julie Barnes.
Home Office Safeguarding Vulnerable Persons Team TOWARDS AN ACTION PLAN ON CHILD TRAFFICKING David McDonald Safeguarding Vulnerable Persons Coordinator.
Multi-professional Working: Cultures, Identities and Conceptualizations of Practice. Fiona Collins.
Ynys Saff: Providing a safe island for children and young people who have experienced sexual victimisation Amanda Robinson School of Social Sciences Roxanne.
BUILDING A EUROPE FOR AND WITH CHILDREN The ONE in FIVE Campaign Regina Jensdottir.
The European Year of Volunteering 1 st February
A PRESENTATION FOR THE PARENTS OF MIDDLETON PRIMARY SCHOOL
Children Internet Safety via collaboration between Russian NGOs and Internet business.
E Safety Dorothy Stringer School. E Safety E safety is normal safety the difference is the knowledge gap.
Study on indicators measuring the implementation, protection, respect and promotion of children's rights in the European Union: Preliminary Findings Ioannis.
Communications Regulatory Agency Media Literacy and Protection of Children Experiences of the Communications Regulatory Agency of BH Kemal Huseinović,
EURESOURCE Research Programme Religious Sources of Solidarity.
ROSE BROAD ESRC PHD STUDENT SCHOOL OF LAW UNIVERSITY OF MANCHESTER The UK Criminal Justice System and Researching Human Trafficking.
Research on Child Trafficking Christine Beddoe Director ECPAT UK. Lisbon 2012.
Prof. Alisdair A. Gillespie De Montfort University, UK.
Prof. Alisdair A. Gillespie De Montfort University, UK.
Prof. Alisdair A. Gillespie De Montfort University, UK.
1/16 Technology Enhanced Learning considering e-safety
Internet Grooming - Understanding Offender Behaviour and Protecting Young People House of Lords 26 th March 2010 Centre for Abuse and Trauma Studies (CATS)
Policing Online Child Sexual Abuse: Understanding Grooming in the 21 st Century Dr Elena Martellozzo.
Kate Gerrish, Ann McDonnell, Fiona Kennedy. Programme 13.00Welcome & overview of the research projectKate Gerrish 13.15Framework for capturing impact.
Hit and Miss: A Study of Post-Release Support Brendan Quinn and Amy Kirwan 23 rd June 2009.
Reducing Re-offending Operating Principles Purposeful offender interactions | Seamless management of offenders | Succeeding with Māori | Professional judgement.
1. European Commission GHS Implementation Status in the European Community ICCM Dubai UNITAR Side event 4-6 February 2006 Eva Sandberg European Commission.
STIR Connecting online and offline contexts and risks. The Italian perspective Gianna Cappello (University of Palermo, CESIE, Italy) Noemi de Luca (CESIE,
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
11 Professor Rosalind F Croucher Commissioner. 22.
Name ____________________ Date ___________ Period ____.
Understanding relationships between education, health and well-being among young people: what can the HBSC study contribute? Professor Candace Currie HBSC.
1 ENOC 18 th Annual Conference Rights of the child and child poverty October 2014, Edinburgh Lara Blake European Commission DG JUST Unit C1 Fundamental.
What is Child Sexual Exploitation
 An estimated 2,577 arrests in 2000  An estimated 7,010 arrests in 2006  Almost 3 times as many.
Inclusion Quality Mark for Wales
Differences in safeguarding children and vulnerable adults
Safeguarding Disabled Children Yasmin Kovic & David Miller.
1/15 E-Safety in Initial Teacher Training Secondary Phase.
1 Is it illegal or unsuitable? SID 2013 quiz for parents and carers © e-Safer Suffolk 2013.
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
UK Child Exploitation and Online Protection (CEOP) Alex Nagle Head of Harm Reduction.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
Violence against children in conflict with the law: developing international indicators ICOPA XII - International Conference on Penal Abolition Rosie Meek:
Presented by (Date) HF.
Professor Anthea Hucklesby Centre for Criminal Justice Studies, University of Leeds, UK Co-funded by the Criminal Justice Programme.
9th International Conference “Keeping children and young people safe online” 1 Szymon Wójcik Nobody’s Children Foundation Warsaw, Poland.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
Richard Swetenham Head of Unit of eContent and Safer Internet European Commission, General Directorate Information Society and Media Safer Internet Programme:
Safeguarding and Child Protection Governor Training Jane Flynn School Improvement Adviser.
1. 2 Research methodology Methodology Monthly surveys conducted online among a nationally representative sample of circa n=2000 UK adults aged 18+
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
The Safer Internet programme 5 October 2010 Workshop on Information Security Margareta Traung Project officer eContent and Safer Internet unit.
1 Belfast, Horst Forster European Commission Belfast,
Child Sexual Exploitation and Abuse
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
National Strategy Guide on Online Child Protection
UNODC and CYBERCRIME October 2009.
Presentation transcript:

The European Online Grooming Project_ Findings Launch The British Academy 3 rd February 2011

Presentation overview The European Online Grooming Project_ Legislative and empirical context Project design Interview findings Young people online Safety, treatment & policy implications Next steps

European Consortium UK –Stephen Webster, National Centre for Social Research, London –Professor Julia Davidson, Kingston University, London –Professor Antonia Bifulco, Kingston University, London Belgium –Professor Thierry Pham, University de Mons, Belgium Italy –Professor Vincenzo Caretti, Università degli Studi di Palermo Norway –Professor Petter Gottschalk Norwegian School of Management, Oslo

The European Online Grooming Project_ Largest study of online grooming to date. Aims: –understand the different ways sexual offenders approach, communicate and groom young people online. –empower policy makers, front line professionals, teachers, carers and young people to effectively manage online risks. Co-funded by the European Union, through the Safer Internet Plus Programme. Running from June 2009 to December 2011

Scale of the Challenge 30m US children online in 2000 (Gottschalk, 2010); 2,660 reports of inappropriate approaches (Centre for Exploited & Missing Children). UK: 1 in 5 young people receive sexual solicitation, over two thirds unsupervised online (Davidson & Martellozzo, 2008). CEOP: (11/2010): 6291 reports via panic button, 66% related to online grooming. Increase in self-taken images of young people in offender collections.

EU Directives Combating the Sexual Abuse, Sexual Exploitation of Children and Child Pornography (2009) outlines protection challenge with wide variation in criminal law and enforcement. Article 5 - online grooming solicitation of children for sexual purposes (p5)… –each member state to ensure this conduct is punishable in law. –children under age of consent under national law, adult arranges to meet for the purposes of sexual abuse via 'an information system (p5).

Lisbon Treaty European Commission (03/10) –indecent child image websites blocked from the Internet. –human traffickers handed maximum sentences of 5-10 years. Proposal's scope would also punish grooming and ensure abusers cannot re-offend in another EU country. Change use of term child pornography to indecent image.

National Legislation UK one of the first EU states to initiate online grooming legislation (s15, Sexual Offences Act 2003, England & Wales). Norway followed the UKs example (2007), General Civil Penal Code, Article 195. Sweden introduced legislation in No online grooming legislation in Belgium or Italy.

Research Context Literature focussed primarily on indecent image evidence to date (Seto & Eke 2005; OBrien & Webster 2007). Some co-occurrence of contact sexual offences among indecent image offenders (Wolak et al, 2005; Seto et al, 2006; Hernandez, 2000). Position remains unclear.

Theoretical Framework Cannot explain online grooming without understanding the offender – computer – young person interaction. Multiple theories explored to explain the behaviour: –online disinhibition effect (Suller, 2004) –self-regulation model (Ward & Hudson, 2005) –attachment theory (van Ijzendorm, 1997; Burk & Burkhart, 2003) –cognitive-affective processes (Fonagy, 1999; Fonagy et al 2002) –contextual ecological models (Bronfenbrenner, 1995)

Research Findings

Research Design Three interlinked phases: –Scoping interviews with stakeholders (police officers, treatment providers, industry staff), case-file review; development of theoretical model; literature review. –In-depth interviews with 33 online groomers in the UK, Norway, & Belgium – chat-logs from Italy. –Workshops with parents, teachers & young people. Framework analysis - case & theme based approach.

Sample (n=33) N Age IQ ScoreLow (<=90) Average (91-109) High (110+) Not known Pre-consNone Non-sexual Sexual children Off-line On-line N Victim age Victim gender Male Female 5 26 OffenceOnline grooming no meeting 2 Online grooming meeting 8 Images & online grooming – no meet 5 Images & online grooming – meet 18

Challenging Assumptions All online groomers want to meet young people… Pornography and indecent images cause online offending… Young people are passive when communicating with adults…. All online offending involves socialisation…..

Who are Online Groomers? Like contact sexual offenders – not a homogeneous group. Where differ: –high IQ but not particularly high educational attainment –IT competence seems to be primarily self taught, via workplace, observing family and online research Using full range of ICT hardware, chatrooms, social networking sites, file-sharing sites and game platforms to contact young people

Features of Online Grooming Vulnerability Scanning Identity Contact Desensitisation & Intensity Outcomes Perceptions of YP & Behaviour MaintenanceRisk Management Dissonance IT Security Private Spaces Online Environment

Maintenance Online Environment The Internet –Confidence –Stimulation –Scale plenty of fish in the sea, youll catch one eventually Addiction –Tense if not online Disinhibition –Anonymity (on both sides) –Normalising explicit sexual conduct Dissonance Adult & Child Images & Chat –Justifies abuse –Fuels fantasy –Escalates some behaviours Offence Supportive Beliefs –Harm reduction views –Socio-affective reasons –External locus of control Perceptions, Behaviour of YP –Sexual screen names –Sexual chat

Grooming Features Vulnerability –Situational –Interpersonal Scanning –Mapping –Random –Virtual presentation Identity –Self –Minor changes –Other I never used my own identity, you change names, you lay it on.. Contact –Single & multiple encounters –Varied timescale –Diverse styles Desensitisation & Intensity –Sex request You test them by saying are you this or that and see if receptive.. –Incentives –Threats Outcomes –Collect image –Meet young person

Risk Management Personal logistics online –Proxy servers –Hiding images/chat –Multiple hardware & phones Personal spaces –Private forums –Switch to phone Geography –Different victim location from home

Classifying Online Offenders Distorted Attachment Believe in mutual consent/love No images or group contact Longer contact process Uses own identity Physical meeting Hyper-Sexual Dehumanise YP Extensive image collections Contact with other offenders Tailored/sexual identity Fast, impersonal contact methods Adaptable Offender Own needs focus Believes YP mature/provocative Minimal image collections, if any Tailored contact /mirroring victim Own & tailored identity

Features of Online Grooming & Types Vulnerability Scanning Identity Contact Desensitisation & Intensity Outcomes Perceptions of YP & Behaviour MaintenanceRisk Management Dissonance IT Security Private Spaces Online Environment

Young People Online

Context Project focused on interviewing online groomers only. No direct contact with victims. Themes included in offender topic guide regarding age, choice of victims, type of grooming approach & victims response. Although not a statistically drawn sample, victims described by the online groomers in this research tended to be female teenagers.

Existing Research Evidence Vulnerable: high affection needs, attention, difficult relationships with parent. Seeking love online - a true relationship. Resist disclosure to continue relationship. Risk-taking: seek adventure, disinhibited, feel in control. Less known about family risks. Open to non-disclosure blackmail - own behaviour used by groomer as proof of cooperation or seduction. Resilient: fend off approaches considered weird. Adopt safety messages. Secure family backgrounds. Palmer, 2006, Davidson & Martelozzo, 2008

Vulnerability Dimensions: 1 Loneliness Many of the girls lacked adult contact….they felt safe with me.. I always made time… When a girl said she was in love with me, it was easier to handle. Self-harm Self-mutilation observed by at physical meeting. Self-esteem Concern about body image -groomer exploits by mirroring compliments.

Vulnerability Dimensions: 2 Concurrent sexual abuse She wanted attention in her life, she said she had lost her mum and her step-dad abused her. They had no hang ups, they were already being abused. Family Break-up Looked after young people, separated children. Consequently….offender meets needs to extent they perceive young person in control of the encounter: –She began to pester me to go online and talk to her. –She could walk away from me at any time and she new this. –They ask me, theyre re convinced theyre adults, whos the victim?

Disinhibited Online Risk-Takers Involved using sexual screen names; using sexual chat; populating adult chat rooms; sending explicit images of self. Online groomers watch for and drawn to this: –she said Id love to shag an older guy. –one girl said, would you like to see me naked? –she said Hi Im 16 and fancy chatting to a fifty-year old. However, online confidence did not always mirror offline reality: –she was really quiet when met, even after a few meetings she never really said anything. –she presented as womanly and mature but when we met I knew it was just a mask….

Resilient Young People Evidence of safety messages getting through as offenders told by some to go away in no uncertain terms. –It was not easy as young girls had been taught not to talk to guys age 20. –when presented own identity, was told piss off you nonce. –sometimes they would hang up and Id just forget it. –I wouldnt get cross if the girls said no I would just move on to the next one.

Explanatory Frameworks for Offender & Victim Self-regulation: under-regulation, mis-regulation, disinhibition. Attachment patterns: social approach/avoidance – loneliness, lack of social confidence, anonymity to mask fear of rejection, lack of empathy. Cognitive-affective processes: defensive patterns, mentalisation, self-awareness, denial. Contextual social factors: opportunity, access, desensitisation, internet availability young people.

Matching of Offender and Victim Distorted attachment Adaptable Focus own need Hyper- sexualised Vulnerable Risk taking Resilient Offender Young Person Psychological Profile Attachment/vulnerability Disinhibition/regulation Context & Protective factors

Implications

Prevention, Intervention & Treatment Safety messages to YP, parents teachers Technological preventative solutions Monitoring, risk awareness, diagnostic tools

Online Safety & Industry: 1 Targeting Why are some YP more resilient, less likely to interact? Messages Consider online disinhibition in context of safety campaigns for YP, should there be a more targeted approach? Can industry work more proactively to raise awareness with young people, parents and educators? Appropriate online behaviour, ethical use, digital footprint – level 1 images in offender collections.

Online Safety & Industry: 2 Logistics Consider how SNS might design out offender behaviour (grooming, networking, indecent image sharing). Is more specialist monitoring possible? Health Consequences Issue of harm in context of offender approach- all YP may be harmed at some level. How can this be managed?

Offender Management & Assessment Management Consider if possible to more closely monitor Internet related behaviours under MAPPA? Assessment Understand risks that accompany certain behaviours. Develop validated diagnostic tools that allow for exploration of online behaviours with all offenders.

Offender Treatment The role of the Internet within treatment - nature of online reality for individuals. How easy it is for some offenders to feel anonymous and disinhibited. The process of networking and normalising. Consider moving away from Internet only treatment groups – some issues no different to other CSAs.

Reflections for the Panel…… A public health problem that requires a multi- disciplinary, flexible response: Managing Online Grooming Tailored safety programmes Awareness for parents & educators Secure online environments Offender risk & intervention

Next Steps Focus groups with parents, teachers and young people (March – May 2011) Annual report (June 2011) Final report (December 2011)

Further Information ex_en.htm ex_en.htm Project Contacts:

Staying in touch Follow us on Remember to hashtag the European Online Grooming Project #POG