Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Vulnerability & Criminal Activity

Similar presentations


Presentation on theme: "Internet Vulnerability & Criminal Activity"— Presentation transcript:

1 Internet Vulnerability & Criminal Activity
4.1 – 2/15/10 Child Exploitation - Pedophilia & Child Pornography This week & next week – looking at how children are exploited online

2 Child Exploitation “Possession, manufacture and distribution of child pornography; online enticement of children for sexual acts; child prostitution; child sex tourism and; child sexual molestation. ” Long Term Effects of the Victims of Child Exploitation Violent and emotional trauma Fear Intimidation Lose of trust Delinquency, criminal behavior Drug/alcohol abuse Abusive behaviors of other children 25% of child exploiters are other children

3 Methods of Child Exploitation
Enticement “Inviting, persuading, or attempting to persuade a child to enter any vehicle, building, room, or secluded place with intent to commit an unlawful sexual act upon or with the person of said child” Pornography “Depictions of minors in sexual acts or provocative poses” Molestation “Any sexual behavior or activity that is abusive or nonconsensual toward a child – or sexual behavior that is specifically prohibited by state/federal law” Adult taking advantage of a child’s vulnerability Child/Minor any one under the age of 18 (even if age of consent lower in state)

4 Methods of Child Exploitation
Prostitution “The use of a child by others for sexual activities in return for remuneration or any other form of consideration” Sex Tourism “Traveling to a foreign country with the intent to engage in sexual activity with a child”

5 Victims of Child Exploitation Online

6 Minor “Anyone under the age of 18 no matter what the age of consent in a state maybe”

7 Characteristics of Victims
Dysfunctional families Older rather than younger Confusion over sexual orientation Not always “innocent” May misrepresent themselves May be looking for / collecting pornography Do not understand what they are getting into Consent is not an issue Teens curious & stupid Full of bravado

8 Computer/Internet Use by Sex Offenders
Computer only a tool Online offenders most similar to acquaintance molesters Offender slang “Traders” - Traffic in child porn “Travelers” - Solicit sex with children Problem area - adolescents Producing/trading child porn (sexting) Soliciting sex with other adolescents Not sexually deviant Will focus on the use of the internet more than general computer use Computer a tool, not target - storage creation of child porn - way to exploit kids, find others with same interests For investigation purposes, OL offenders most like acquaintances - take time to groom child Kids curious, hormonally challenged & do stupid things Investigating child sexual exploitation requires knowledge of technical, legal, & behavioral aspects of computer usage - may require expert assisance

9 Illegal Computer/Internet Activities
Possessing / producing child pornography Uploading / downloading child pornography Soliciting sex with children Offering a child for sexual purposes Many ways to produce child porn - child porn almost gone in the 80’s/ Computer Internet brought it back

10 Legal Sexual Activities
Validating deviant sexual behavior and interests Reinforcing deviant arousal patterns Storing and sharing sexual fantasies Lying about one’s age and identity

11 Legal Sexual Activities cont.
Collecting adult pornography that is not obscene Disseminating “indecent” material, talking dirty, “cyber-sex”, and providing sex instructions Injecting oneself into the “problem” of computer exploitation of children to rationalize interests

12 Categories of Sexual Offenders
Situational Offenders Preferential Offenders Miscellaneous Offenders

13 Situational Offenders
“Normal” adolescent / adult Curious Impulsive Morally indiscriminate Power / anger motivated Previous violent offenses Profiteers Easy money Normal teens / adults - searching for porno online, curious, impulsive Morally indiscriminate - mothers offering kids for sex Behavior not long-term, persistant or as predictable as preferrential

14 Miscellaneous “Offenders”
Media Reporters Engage in illegal behavior for news story Pranksters “cyber-smearing” Older “Boyfriends” Late teens / early 20’s Overzealous citizens Want to help law enforcement Be aware of true motivation

15 Preferential Offenders
Pedophile Prefers sex with children Diverse Wide variety of deviant interests Sexually indiscriminate Latent Recently begun to act on illegal urges Pedophile - porn will be child porn Diverse - may have some child porn, but not main interest

16 Understanding Sexual Offender Behavior

17 Sexual deviations or perversions
Paraphilia Sexual deviations or perversions Medical conditions

18 Paraphilia Defined Psychosexual disorder
Recurrent, intense sexual arousing fantasies, urges, or behaviors that involve: Nonhuman objects Suffering or humiliation Children, other non-consenting persons Occurs over a period of six months

19 Types of Paraphilia Exhibitionism - exposure Fetishism - objects
Pedophilia - children Sexual masochism - self-pain Sexual sadism - partner-pain Voyeurism - watching Some not illegal Not illegal if urges are not acted upon

20 Pedophilia Characteristics (Psychological)
Sexual in nature Highly addictive Compulsive & repetitive Very difficult to treat Unstopped by self-control/self-discipline Only a crime if urge is acted on Does not include adolescent consensual relationships Pysch point of view, not legal Usually higher socio-economic status, education but as computer usage becomes more wide spread, not so much the case any more

21 Pedophiles use of the Internet
Trafficking in child pornography Locating children to molest Engaging in inappropriate communications with children Communicating with other pedophiles Big problem - Victims become perps – patterns of sexual desires/ behaviors laid down in childhood adolescence Communicating - reinforcement

22 Internet Technologies used by Sex Offenders
Adult Pornography Social Networking Sites Chat Rooms Online Gaming Sites Peer-to-Peer (P2P) Web Cams

23 Some Pedophile Groups - Some on the Web
North American Man - Boy Love Association - NAMBLA The Rene Guyon Society Childhood Sensuality Circle - CSC Pedophiliacs Anonymous - PAN Pedophile Information Exchange - PIE Pedophile Action for Liberation - PAL Pedophile Alliance League - P.A.L. The Lewis Carroll Collectors Guild Howard Nichols Society

24 Evidence Screen name Screen profile Accuracy of profile
Length of time active Amount of time spent online Number of transmissions Number of files Number of file originated Number of files forwarded Number of files received Number of recipients Site of communication Theme of messages and chat Theme of pornography Things to look for when investigating - help determine perp behavior

25 “Depictions of minors in sexual acts or provocative poses”
Child Pornography “Depictions of minors in sexual acts or provocative poses” Idea of protecting children from sexual exploitation relatively late – 1880’s girl's age of consent was 10 1977 – only 2 states has laws outlawing kids in obscene materials First federal law – 1978 1988 – first laws concerning child porn online 1990 – Private possession of child porn became illegal – Possession may just be access, not saving files While attempts have been made to outlaw virtual child porn & young looking over 18 year olds, laws have been overturned as being too broad

26 How the Internet Changed Child Porn
Prior to the Internet, Child porn local, very small distribution Mid 1980’s - Child porn almost wiped out Internet & technology allows Cheap, easy creation of child porn Anonymous distribution Available through all Net channels (IRC, P2P, web pages, ) While the loosening of social attitudes toward sex made child porn more available during the 1970’s problem, LE had contained the problem

27 The Role of the Internet in Promoting Child Pornography
Permits vast quantities from around the world Instantly available in any time or place Can be accessed anonymously & privately Facilitates direct communication and file sharing between users Relatively inexpensive Images do not deteriorate & are easy to store Variety of formats; potential for real-time & interactive experiences Can be used to create composite or virtual images

28 Three Components of the Problem
Production Distribution Downloading

29 Production Premium placed on new material – much material decades old
Professionally produced materials from third world countries Most common, amateurs recording their own sexual exploits Clandestine photography of children in public places

30 Distribution Uploading & dissemination of pornographic images
May involve sophisticated pedophile rings & organized crime groups Many times carried out by amateurs Efforts to stop distribution focusing on ISP’s and police stings has changed the way in which child porn is distributed Increasingly, sophisticated security measures are being used

31 Methods of Distribution
Web sites Web cam E-groups Newsgroups Bulletin Board Systems Chat Rooms Peer-to-peer

32 Downloading Accessing child porn via the Internet
Images do not need to be saved In most cases, users must be actively seeking child porn Increasingly, good computer skills & inside knowledge required Most downloading done via newsgroups & chat rooms Require fees & psswords

33 Offender Typology Browsers Private fantasizers Trawlers
Inadvertently find child porn, but knowingly keep the images No networking No security strategies Private fantasizers Create digital images for personal use Trawlers Seek child porn through open sources Minimal networking Few security strategies Different patterns of Internet behavior Various levels of involvement w/ Internet child porn Different degrees of networking w/ other offenders Different expertise in employing secure stratigies

34 Offender Typology Non-secure collectors Secure collectors Groomers
Seek child porn in non-secure chat rooms & other open levels High levels of networking No security strategies Secure collectors Use closed newsgroups or secret pedophile rings High level of networking Sophisticated security measures Groomers Develop online relationships with children, use child porn to “groom” victim May or may not be involved with networking Little security strategies Different patterns of Internet behavior Various levels of involvement w/ Internet child porn Different degrees of networking w/ other offenders Different expertise in employing secure stratigies

35 Offender Typology Physical abusers Producers Distributors
Child porn part of pedophilic interest May create their own child porn, evidence of their behavior May or may not network Security depends on victim’s silence Producers Record abuse for purpose of distributing to others Networking depends on if producer is also distributor Distributors Disseminates child porn images May have purely financial interests Networking and security depends upon level of operation Any of the other offender levels may be considered distributors

36 How do Pedophiles use Child Pornography
Source of pride Sexual gratification Feed/create sexual fantasies Training/grooming potential victims Lower potential victim’s inhibitions Blackmail victim into silence Profit Barter with other pedophiles

37 Dangers Associated with Child Porn
Single most distinct characteristic of child molester Used by molester to ‘normalize’ behavior Long term use leads to desensitization Used by terrorist groups to exchange information -

38 Law Enforcement Challenges
Structure of the Internet Decentralized, P2P One site shut down, another will instantly take it’s place Uncertainties of jurisdiction Requires cooperation among agencies No clue to where images originate Why aren’t we doing something? Cause it isn’t easy.

39 Law Enforcement Challenges
Lack of regulation Community protection vs. Freedom of Speech Ambiguity regarding liability, ISP responsibility Differences in legislation Differences between countries Countries may vary in commitment Cultural differences Expertise of offenders Long time offenders experts in security measures Many sting operations catch the inexperienced, low-level offender Child abuse okay in some countries - Afghanistan

40 Sources Child Molesters: A Behavioral Analysis - Child Pornography on the Internet -


Download ppt "Internet Vulnerability & Criminal Activity"

Similar presentations


Ads by Google