Additional Academic SourcesFagan, P., Wise, T., Schmidt, C. <strong>and</strong> Berlin, F. (2002), “Pedophilia,” Journal of theAmerican Medical Association, 288(19), 2458-2465.<strong>Child</strong> Pornography Desensitizes ViewersHern<strong>and</strong>ez, Andres, “Psychological <strong>and</strong> Behavioral Characteristics of <strong>Child</strong> PornographyOffenders in Treatment,” presented at the University of North Carolina Symposium.http://www.iprc.unc.edu/G8/Hern<strong>and</strong>ez_position_paper_Global_Symposium.pdf<strong>Child</strong> Pornography <strong>and</strong> Contact OffensesA study completed in 2000 by the Director of the Sex Offender Treatment Program at the ButnerFederal Correctional Complex in North Carolina revealed that of 54 inmates convicted of childpornography offenses, 79.6% of them admitted that they had also molested significant numbersof children.Dr. Andres Hern<strong>and</strong>ez, director of the Bureau of Prisons Sex Offender Treatment Program,looked at a sample of 155 offenders in his program who had been convicted of possession,receipt, or distribution of child pornography. Of these 155 offenders, 26 percent had knowndocumented histories of contact sexual offenses against children upon entering treatment, with atotal number of 75 victims. By the end of treatment, however, 85 percent of the sample admittedthat they had committed at least one prior h<strong>and</strong>s-on offense against a child, with a total numberof 1,777 victims. Fifty-two percent of the sample underwent a polygraph examination to validatethe accuracy of the self-reported instances of abuse.Dr. Hern<strong>and</strong>ez concluded that a “substantial percentage of offenders in our study who initiallyclaimed to be at low (or no) risk of harm to children because they exclusively collected childabuse images <strong>and</strong> allegedly never molested a child, subsequently indicated that they hadcommitted undetected child sexual abuse.”Dr. Hern<strong>and</strong>ez’ findings, by his own admission, may overstate the relationship between childpornography offenders <strong>and</strong> contact offenders, since the subjects of his study were a self-selectedgroup.Jensen, C.J., Bailey, P., <strong>and</strong> Jensen, S., “Selection, Engagement <strong>and</strong> Seduction of <strong>Child</strong>ren<strong>and</strong> Adults by <strong>Child</strong> Molesters,” <strong>The</strong> Prosecutor, 36, 41-47 (2002).Klain, E.J., Davies, H.J., <strong>and</strong> Hicks, M.A., <strong>Child</strong> Pornography: <strong>The</strong> Criminal-Justice-SystemResponse, NCMEC, Alex<strong>and</strong>ria, Virginia, (March 2001).Lanning, K.V., “Pedophiles Use the Images to Silence <strong>The</strong>ir Victims: Photograph theAbuse <strong>and</strong> Blackmail the <strong>Child</strong> Into Silence With the Shameful Images of Abuse,”NCMEC 1992.C-6
McCarthy, J. <strong>and</strong> Gaunt, N. (2004). “Responding Effectively to On-line <strong>Child</strong> PornographyOffenders,” SAFE Programme, Auckl<strong>and</strong>, New Zeal<strong>and</strong>,www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/ papers/john_mccarthy.pdf.Montgomery-Devlin, J., “<strong>The</strong> Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren <strong>and</strong> Young People in Northern Irel<strong>and</strong>: Overview from the Barnardos Beyond the Shadows Service,” <strong>Child</strong> Care in Practice, 14, 381-400 (2008).Muir, D., Violence against children in cyberspace, ECPAT International (2005). Quayle, E., Loof, L., <strong>and</strong> Palmer, T., “<strong>Child</strong> pornography <strong>and</strong> sexual exploitation of children online,”. Paper presented at the End <strong>Child</strong> Prostitution, <strong>Child</strong> Pornography <strong>and</strong> the Trafficking of <strong>Child</strong>ren <strong>for</strong> Sexual Purposes (ECPAT) International to the World Congress III against Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren <strong>and</strong> Adolescents, Rio de Janeiro, Brazil, (2008). Quayle, E., <strong>and</strong> Taylor, M., “Model of Problematic Internet Use in People with a Sexual Interest in <strong>Child</strong>ren,” CyberPsychology & Behavior, 6(1), 100 (January 2003:93-106) Obsessions with Collecting <strong>Child</strong> Pornography In the words of one offender, “I managed to find the whole series from somebody <strong>and</strong> I let thechannel operators know…[ ] they were deeply grateful. It’s kind of like an art collector whofinds a lost Picasso.”Quayle, E., <strong>and</strong> Taylor, M., “<strong>Child</strong> Pornography <strong>and</strong> the Internet: Perpetuating a cycle ofabuse,” Journal of Deviant Behavior, 23(4), 331-362, (2002) at p. 10<strong>Child</strong> Pornography to Contact Offenses“Accessing the images appeared to rein<strong>for</strong>ce existing fantasies <strong>and</strong> was used to give permissionto act on them."… it made me want to do the things I wanted to do. It gave me more courage to dothem… knowing that I've seen it on there… they were doing it… I can do it." (DX p. 67)Here the account used the pictures as a <strong>for</strong>m of justification, a sense that if others are engaged inthis then it doesn't matter. It allowed one respondent to ignore the other cues that were presentedto him, such as his victim crying or constantly covering her face with her nightdress.”Quayle, E., <strong>and</strong> Taylor, M., “<strong>Child</strong> pornography <strong>and</strong> the Internet: Perpetuating a cycle ofabuse,” Deviant Behaviour 23(4), 331-362, (2002) p. 9.Quayle <strong>and</strong> Taylor, “Problematic Internet Use,” 101.Fathers’ Victimizing <strong>The</strong>ir <strong>Child</strong>ren“When I made this video tape [victimizing my daughter] I was copying these [ ] movie clips…that I’d downloaded [ ] … I wanted to be … doing what they were doing.”“It was then that I thought about steps of involving my daughter… [ ] in creating video toactually trade to get the material I wanted.”C-7
- Page 1:
U.S. Department of Justice
- Page 5 and 6:
4. UNITED STATES ATTORNEY’S OFFIC
- Page 7 and 8:
V. CONCLUSION .....................
- Page 9 and 10:
amount of information, including: (
- Page 12 and 13:
assisting state, local, tribal and
- Page 14 and 15:
goals that can provide some measura
- Page 16 and 17:
State and federal investigators and
- Page 18 and 19:
a. Available indicators suggest chi
- Page 20 and 21:
These two applications (Fairplay, R
- Page 22 and 23:
The Figure below shows the number o
- Page 24 and 25:
For FY 2008, ICAC Task Forces repor
- Page 26 and 27:
Some researchers suggest that viewi
- Page 28 and 29:
interests in children and their des
- Page 31 and 32:
could later bediscovered by lawenfo
- Page 33 and 34:
domains are commercial purveyors of
- Page 35 and 36:
• The offender communicates with
- Page 37 and 38:
1. Online enticement complaints are
- Page 39 and 40:
elationship. After the child has ga
- Page 41 and 42:
Influenced and Corrupt Organization
- Page 43 and 44:
D. Child Sex TourismChild sex touri
- Page 45 and 46:
Exploitation of Children Today (PRO
- Page 47 and 48:
A task force model often is employe
- Page 49 and 50:
The United States Attorney’s offi
- Page 51 and 52:
FBI and CEOS, in conjunction with N
- Page 53 and 54:
The effects of child sex tourism re
- Page 55 and 56:
352 investigations and 162 charged
- Page 57 and 58:
• CEOS worked closely with NDIC i
- Page 59 and 60:
• Alameda County, CA, Children's
- Page 61 and 62:
• Additional data have been submi
- Page 63 and 64:
postsentence persons and civilly co
- Page 65 and 66:
B. A Review of the Internet Crimes
- Page 67 and 68:
• Providing training and technica
- Page 69 and 70:
Table 1 : ICAC Task Force Agencies
- Page 71 and 72:
State Task Force Agency Number of T
- Page 73 and 74:
State Agency FY 2009 FY 2009 FY 200
- Page 75 and 76:
State Agency FY2008#AZCACACACACACOC
- Page 77 and 78:
Number of Criminal Referrals to Uni
- Page 79 and 80:
d. Number of local prosecutions and
- Page 81 and 82:
State Agency FY 2008# of Cases Refe
- Page 83 and 84:
State Agency FY 2008 Jan.-June 2009
- Page 85 and 86:
8. Number and type of ICAC Task For
- Page 87 and 88:
ICAC Undercover Chat 4 Regional 9.2
- Page 89 and 90:
has developed highly successful ini
- Page 91 and 92:
field offices, both domestic and fo
- Page 93 and 94:
2. Department of Defense’s Effort
- Page 95 and 96:
of a mail circular. Since the progr
- Page 97 and 98:
• The Street Outreach Program fun
- Page 99 and 100:
the Defense Computer Forensic Labor
- Page 101 and 102:
• Distributes photographs and des
- Page 103 and 104:
iii. Enough Is EnoughEnough Is Enou
- Page 105 and 106:
1. Overarching Efforts to Coordinat
- Page 107 and 108:
combine resources and expertise on
- Page 109 and 110:
United States has submitted annual
- Page 111 and 112:
CEOS has worked with foreign law en
- Page 113 and 114:
. Department of Homeland Security
- Page 115 and 116:
Finally, G/TIP has worked extensive
- Page 117 and 118:
F. Review of Internet Safety Progra
- Page 119 and 120:
the accessibility, cost, and effect
- Page 121 and 122: activity by predators searching for
- Page 123 and 124: 3. Federal Trade Commission and Dep
- Page 125 and 126: Funder: • U.S. Department of Agri
- Page 127 and 128: Delivery: • Online games; printab
- Page 129 and 130: TABLE 1: FEDERALLY FUNDED INTERNET
- Page 131 and 132: Program/Product NameandContactInfor
- Page 133 and 134: TABLE 2: SAMPLE OF PRIVATE NONPROFI
- Page 135 and 136: Program/Product NameProducerFor Kid
- Page 137 and 138: TABLE 1: PARTICIPANT EVALUATIONS OF
- Page 139 and 140: FY 2011. The primary forensics resp
- Page 141 and 142: The DEU is the principal group resp
- Page 143 and 144: CD/DVDs. The CFS has the capability
- Page 145 and 146: First, the Department will continue
- Page 147 and 148: and the Innocence Lost task forces,
- Page 149 and 150: deconflict cases, and share informa
- Page 151 and 152: with the ICACs to help increase the
- Page 153 and 154: from Landslide’s business premise
- Page 155 and 156: victimized children worldwide, incl
- Page 157 and 158: association, was arrested after the
- Page 159 and 160: is transnational in scope; cooperat
- Page 161 and 162: Over the course of their communicat
- Page 163 and 164: An ICE investigation resulted in th
- Page 165 and 166: U.S. v. RichardsonICE PRESS RELEASE
- Page 167 and 168: APPENDIX C THREAT ASSESSMENT: ACADE
- Page 169 and 170: Selected Quotes from Appendix C of
- Page 171: * * * “Sheldon and Howitt (2007)
- Page 175 and 176: high-profile jobs. Some seemed isol
- Page 177 and 178: Trends 2008, http://www.iwf.org.uk/
- Page 179 and 180: Source: National Center for Missing
- Page 181 and 182: Federal Bureau of Investigation (FB
- Page 183 and 184: scientific survey process, but rath
- Page 185 and 186: • 42 percent of respondents repor
- Page 187 and 188: The Effect of the Lack of Internet
- Page 189 and 190: • 44 percent of respondents repor
- Page 191 and 192: • 24 percent of respondents repor
- Page 193 and 194: ONLINE ENTICEMENTExtent of Online E
- Page 195 and 196: • 37 percent of respondents repor
- Page 197 and 198: • 8 percent of respondents report
- Page 199 and 200: SEX TOURISMNature and ExtentAmong N
- Page 201 and 202: • 50 percent of respondents repor
- Page 203 and 204: Average Federal and State Sentences
- Page 205 and 206: SOURCESNumerous federal, state, and
- Page 207 and 208: Federal Bureau of Investigation (FB
- Page 209 and 210: Southern Texas Utah VermontVirginia
- Page 211 and 212: APPENDIX EDEPARTMENT-FUNDED RESEARC
- Page 213 and 214: victimization. The project has four
- Page 215 and 216: APPENDIX FSYNTHESIS OF MAJOR STUDIE
- Page 217 and 218: 17 that among the participants who
- Page 219 and 220: authors, extrapolating survey data,
- Page 221 and 222: officials can gain greater awarenes
- Page 223 and 224:
Moessner, Chris. “Cyberbullying.
- Page 225 and 226:
The authors of this chapter in a bo
- Page 227 and 228:
Wells, Melissa, David Finkelhor, Ja
- Page 229 and 230:
The article reports the results of
- Page 231 and 232:
system ۛincluding perspectives of
- Page 233 and 234:
etween 42 and 44 percent of pornogr
- Page 235 and 236:
Reporting the demographic, psycholo
- Page 237 and 238:
predator with a victim took place i
- Page 239 and 240:
1 Tinker v. Des Moines Independent
- Page 241 and 242:
conducted between September 1999 an
- Page 243 and 244:
with each grade level, with the per
- Page 245 and 246:
Understanding Online Child Pornogra
- Page 247 and 248:
focusing on violent (including sexu
- Page 249 and 250:
their offending than did Internet o
- Page 251 and 252:
trafficking, rape and sexual assaul
- Page 253 and 254:
States Postal Inspection Service, 8
- Page 255 and 256:
Getting to Grips with Sexual Groomi
- Page 257 and 258:
Child Seduction and Self-Representa
- Page 259 and 260:
Annotated Bibliography: Child Explo
- Page 261 and 262:
Abstract The author discusses teach
- Page 263 and 264:
implications for nursing practice i
- Page 265 and 266:
providers assisting child victims,
- Page 267 and 268:
Problematic Internet Experiences: P
- Page 269 and 270:
Online Requests for Sexual Pictures
- Page 271 and 272:
Sheldon Kennedy and a Canadian Trag
- Page 273 and 274:
people involved in prostitution and
- Page 275 and 276:
debates about child labour, exploit
- Page 277 and 278:
Abstract The article presents the v
- Page 279 and 280:
dealing with sexual offenses agains