Prof. Alisdair A. Gillespie De Montfort University, UK.

Slides:



Advertisements
Similar presentations
The European Online Grooming Project_ Findings Launch The British Academy 3 rd February 2011.
Advertisements

Policy Analysis and Law Reform. Reform by law States obligation under the CRC (article 4) States parties shall adopt all appropriate legislative, administrative,
Children's Rights and Child Protection: Whats that got to do with the Internet? Vernon Jones Save the Children Denmark.
Sexuality & Safeguarding Working with Sexually Active Children & Young People October 2005.
Sexual Exploitation A training course delivered by Reconstruct Ltd.
Prof. Alisdair A. Gillespie De Montfort University, UK.
Prof. Alisdair A. Gillespie De Montfort University, UK.
Policing Online Child Sexual Abuse: Understanding Grooming in the 21 st Century Dr Elena Martellozzo.
ISSUES, RESEARCH, PRACTICE Josie Phillips, Research Associate.
Policing Domestic Violence Lessons from 30 years of practice Professor Betsy Stanko Head, Strategic Research and Analysis Unit Metropolitan Police, London.
What is Child Sexual Exploitation
Passion Training & Consultancy Sex and the law Sarah Andrews Passion Training and Consultancy
Modern Slavery Bill Government set out to consolidate, clarify and improve the existing modern slavery legislation by simplifying three existing offences:
The Timing and the Number of Interviews Brit Tammiste Ministry of Justice of Estonia Criminal Policy Department, Analysis division
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
REPORTING REQUIREMENTS 1 Virginia Child Protection Accountability System §
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
 The average pedophile will commit 117 sexual crimes in their lifetime.  According to the U.S. Justice Department, 33% or girls & 14% of boys are sexually.
Criminalising all forms of sexual exploitation and sexual abuse of children Ksenija Turković University of Zagreb.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
Grooming: Dutch (good) practice min symposium March 18, 2015, T-ES 16 March 2015.
QUIZ C HALLENGING A TTITUDE AND P ERCEPTIONS. Children living / working on the streets are a social threat, and are to be blamed for an increase in juvenile.
Project Coordinator, UNODC
Sexting Images What is it? The sending of sexually explicit photos, images, text messages, or s by using a cell phone or other mobile device.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Sexual Offender Treatment in Estonia: the Current Situation and Future Perspective Kaire Tamm Ministry of Justice of Estonia Criminal Policy Department.
Carlene Firmin MBE Head of the MsUnderstood Partnership.
Optional Protocol to the Convention on the Rights of the Child on the sale of Children, Child Prostitution and Child Pornography.
Criminalising child pornography and sexual abuse on the internet
1 Is it illegal or unsuitable? SID 2013 quiz for parents and carers © e-Safer Suffolk 2013.
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
CHILDREN’S HEARING SYSTEM. CHILDREN’S HEARINGS Need to know: Why a child may appear before a hearing How the hearings system works Actions that can be.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Policies and Tech VAW 15 August 2015 Mary Kiio.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
© Childnet International 2008 What are the risks?.
Detective Inspector Paul Cook Bedfordshire Police Public Protection Unit.
OPSC Optional protocol on sale of children children prostitution and pornography.
GEETA SEKHON (Ph. D) S EXUAL E XPLOITATION OF W OMEN AND C HILDREN T HE L EGAL F RAMEWORK.
E-safety is all about keeping children safe online.
Freedom of Speech Computers in the World.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
CHILD TRAFFICKING IN SCOTLAND: NETWORKS OF EXPLOITATION? Paul Rigby University of Stirling 2 Sept 2013.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Computer crimes.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
San José, Costa Rica, 9-10 June 2014 Marie-laure Lemineur Head, Sexual Exploitation of Children Online Programme The sexual exploitation of children through.
Trends in online offence against children online and international regulations and responses Conference against sexual crimes against children online Jakarta,
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
Child Sexual Exploitation Detective Inspector Angie Chapman.
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
Recognising grooming and CSE What you need to know about targeting, grooming and Child Sexual Exploitation A guide for anyone working with young people.
Child Sexual Abuse DS Stuart Barton 04/02/16. Hampshire Police Organisational Response Head of Child Abuse Investigation Team DCI Scott MacKechnie Child.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
Child Sexual Exploitation & Modern Slavery
Child Sexual Exploitation and Abuse
Rape and Sexual Violence Strategic Governance Group Standards
Public Security versus Social Media:
SEXTING This PowerPoint is aimed at year 6 children. While some parents may have already bought their children mobile phones or passed on their old ones.
In 2017, 4327 reports were received from the Finnish public
SOMEC What is it? Why is it important?
Child Sexual Exploitation in England (UK)
The Criminal Code & Sexual Assault
UNODC and CYBERCRIME October 2009.
Peer on Peer Abuse Harmful Sexualised Behaviour July 2019
The Law and the Offence of Grooming
DEFINING THE CONCEPT OF TRAFFICKING IN PERSONS
Presentation transcript:

Prof. Alisdair A. Gillespie De Montfort University, UK

 Examines the response of the criminal law to child sexual exploitation.  Focuses primarily on the issue of child solicitation/grooming.  Also considers the response where children generate harmful content.

Child Solicitation/Grooming Attack ◦ No previous identification of the child. ◦ No intention to abuse in the future. ◦ Extremely high-risk. Abuse ◦ Offender unlikely to want to be caught. ◦ Likely to want to create a pattern of abuse ◦ Control required.  Grooming is neither new nor particularly hi- tech.  How does an offender abuse a child?

Child Solicitation/Grooming  Controlling a Child ◦ Negative control  Abuse of power (teacher, cleric etc.)  Threats to child (violence, care etc.)  Threats to those known to the child ◦ “Positive” control  Befriending a child  McLachlan notes that “monsters don’t get children, nice men do.”  Create a situation where the child “acquiesces”

 The Internet allows for a degree of anonymity.  Quayle & Taylor “You can’t go up to a boy in the street and say… do you fancy having sex… whereas you could online.”  Yet we also know that (increasingly) it is not by subterfuge.

 Place in International Law. Instrument OPSC  CoE Sexual Exploitation CoE Cybercrime  EU Directive

 CoE Convention on Protection of Children. ◦ Each party shall take the necessary legislative measures...to criminalise the intentional proposal, through information and communication technologies, of an adult to meet a child who has not reached the age [of consent]...for the purpose of committing any of the [sexual] offences...where this proposal has been followed by material acts leading to such a meeting. ◦ EU Directive (Article 6.1 has similar wording).

 Difficulties: ◦ Proving intent. ◦ What are “material steps”? ◦ “Thought crime”? ◦ Proactive or Reactive?

 Some changes in grooming behaviour.  There appears some evidence that less meeting and more on pornography.  Difficulty where law focuses on meeting a child.

 The EU Directive is the only international instrument that appears to have recognised this directly. ◦ Member states shall…ensure that an attempt, by means of information and communication technology, to commit the offences…by an adult soliciting a child…to provide child pornography depicting that child is punishable. (Article 6.2) ◦ Other instruments arguably cover it through procuring child pornography. Still limiting: Cyber-sex?

 England (famously) has a ‘grooming’ offence (s.15, SOA 2003) but this is somewhat misunderstood. ◦ It arguably does not criminalise grooming but the results of grooming. ◦ It is focused on the issue of a meeting. ◦ It is only one of a patchwork of offences that relate to grooming.

Causing/inciting a child to engage in sexual activity Criminalises the invitation to a child to engage in sexual activity. s. 10 Causing a child to watch a sexual act. Includes sending pornography (adult or child) to a child. s. 12 Arranging or facilitating the commission of an offence. An inchoate offence that criminalises the arrangement of an offence that will lead to a child sex offence. s.14 Meeting a child following grooming. Intentionally meeting a child to have sexual relations with it following previous meetings or communication. s.15

 Tackling the solicitation/grooming of a child requires a multi-faceted approach.  Traditional approaches concentrated on the meeting with a child but this is not the only form of exploitative situation. ◦ Some studies suggest that once a child has sent indecent material / posed in front of a webcam the footage is then used to blackmail the victim into contact offending.  Recognition of the portability of technology.