13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

grooming process to coerce the youth into sexualized discussions, transmission of selfcreatedimages, or offline sexual contact (typically intercourse). In total, 52% ofoffenders lied about at least one aspect of themselves. Yet significant deception did notappear to be common (Wolak et al. 2008b). A quarter (25%) of adults participating inInternet-initiated sexual relationships with minors shaved off a few years from their realage, a practice also common in online adult–adult interactions (Hancock et al. 2007), <strong>and</strong>26% lied about some other aspect of their identity. Only 5% of offenders pretended to bethe same age as the youth victim online (Wolak et al. 2004). Wolak, Finkelhor, Mitchell,<strong>and</strong> Ybarra concluded that, ‘when deception does occur, it often involves promises oflove <strong>and</strong> romance by offenders whose intentions are primarily sexual’ (2008b: 113)” p.16* * *“In the small number of offline meetings between minors <strong>and</strong> adults that involved sex,interviews with police indicate that most victims are underage adolescents who knowthey are going to meet adults <strong>for</strong> sexual encounters <strong>and</strong> the offenses tended to fit a modelof statutory rape involving a postpubescent minor having non<strong>for</strong>cible sexual relationswith an adult, most frequently in their twenties (Hines <strong>and</strong> Finkelhor 2007; Wolak et al.2008b). Of all law en<strong>for</strong>cement reports of Internet-initiated sexual encounters, 95% ofreported cases were non<strong>for</strong>cible (Wolak et al. 2004). In one national survey (YISS-1) noinstances of Internet-initiated sex were reported, <strong>and</strong> another (YISS-2), two youth out of1500 (one 15-year-old girl <strong>and</strong> one 16-year-old girl) surveyed reported an offline sexualassault resulting from online solicitation. Although identity deception may occur online,it does not appear to play a large role in criminal cases where adult sex offenders havebeen arrested <strong>for</strong> sex crimes in which they met victims online; only 5% of youth weredeceived by offenders claiming to be teens or lying about their sexual intentions (Wolaket al. 2008b).” p. 17-18.* * *“Similarly, despite anecdotal reports (Quayle <strong>and</strong> Taylor 2001), cyberstalking—a crimewhere offenders locate youth offline using in<strong>for</strong>mation found online (Jaishankar et al.2008)—appears to be very rare (Wolak et al. 2008b).” p. 18.* * *“In addition to being a crime in <strong>and</strong> of itself, child pornography also factors into sexualsolicitation. Some offenders expose youth to child pornography during the groomingprocess <strong>and</strong> make videos <strong>and</strong> images of offline sexual acts with youth, or ask youth totake sexual pictures of themselves. Once these videos <strong>and</strong> images are uploaded, it isnearly impossible to keep them from being traded, downloaded, <strong>and</strong> viewed by thirdparties. Taylor <strong>and</strong> Quayle describe the way this content can never be deleted as, ‘apermanent record of crime, <strong>and</strong> serves to perpetuate the images <strong>and</strong> memory of thatabuse’ (Taylor <strong>and</strong> Quayle 2003: 24).” p. 35.C-4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!