The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

Additional Academic SourcesFagan, P., Wise, T., Schmidt, C. and Berlin, F. (2002), “Pedophilia,” Journal of theAmerican Medical Association, 288(19), 2458-2465.Child Pornography Desensitizes ViewersHernandez, Andres, “Psychological and Behavioral Characteristics of Child PornographyOffenders in Treatment,” presented at the University of North Carolina Symposium.http://www.iprc.unc.edu/G8/Hernandez_position_paper_Global_Symposium.pdfChild Pornography and Contact OffensesA study completed in 2000 by the Director of the Sex Offender Treatment Program at the ButnerFederal Correctional Complex in North Carolina revealed that of 54 inmates convicted of childpornography offenses, 79.6% of them admitted that they had also molested significant numbersof children.Dr. Andres Hernandez, director of the Bureau of Prisons Sex Offender Treatment Program,looked at a sample of 155 offenders in his program who had been convicted of possession,receipt, or distribution of child pornography. Of these 155 offenders, 26 percent had knowndocumented histories of contact sexual offenses against children upon entering treatment, with atotal number of 75 victims. By the end of treatment, however, 85 percent of the sample admittedthat they had committed at least one prior hands-on offense against a child, with a total numberof 1,777 victims. Fifty-two percent of the sample underwent a polygraph examination to validatethe accuracy of the self-reported instances of abuse.Dr. Hernandez concluded that a “substantial percentage of offenders in our study who initiallyclaimed to be at low (or no) risk of harm to children because they exclusively collected childabuse images and allegedly never molested a child, subsequently indicated that they hadcommitted undetected child sexual abuse.”Dr. Hernandez’ findings, by his own admission, may overstate the relationship between childpornography offenders and contact offenders, since the subjects of his study were a self-selectedgroup.Jensen, C.J., Bailey, P., and Jensen, S., “Selection, Engagement and Seduction of Childrenand Adults by Child Molesters,” The Prosecutor, 36, 41-47 (2002).Klain, E.J., Davies, H.J., and Hicks, M.A., Child Pornography: The Criminal-Justice-SystemResponse, NCMEC, Alexandria, Virginia, (March 2001).Lanning, K.V., “Pedophiles Use the Images to Silence Their Victims: Photograph theAbuse and Blackmail the Child Into Silence With the Shameful Images of Abuse,”NCMEC 1992.C-6

McCarthy, J. and Gaunt, N. (2004). “Responding Effectively to On-line Child PornographyOffenders,” SAFE Programme, Auckland, New Zealand,www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/ papers/john_mccarthy.pdf.Montgomery-Devlin, J., “The Sexual Exploitation of Children and Young People in Northern Ireland: Overview from the Barnardos Beyond the Shadows Service,” Child Care in Practice, 14, 381-400 (2008).Muir, D., Violence against children in cyberspace, ECPAT International (2005). Quayle, E., Loof, L., and Palmer, T., “Child pornography and sexual exploitation of children online,”. Paper presented at the End Child Prostitution, Child Pornography and the Trafficking of Children for Sexual Purposes (ECPAT) International to the World Congress III against Sexual Exploitation of Children and Adolescents, Rio de Janeiro, Brazil, (2008). Quayle, E., and Taylor, M., “Model of Problematic Internet Use in People with a Sexual Interest in Children,” CyberPsychology & Behavior, 6(1), 100 (January 2003:93-106) Obsessions with Collecting Child Pornography In the words of one offender, “I managed to find the whole series from somebody and I let thechannel operators know…[ ] they were deeply grateful. It’s kind of like an art collector whofinds a lost Picasso.”Quayle, E., and Taylor, M., “Child Pornography and the Internet: Perpetuating a cycle ofabuse,” Journal of Deviant Behavior, 23(4), 331-362, (2002) at p. 10Child Pornography to Contact Offenses“Accessing the images appeared to reinforce existing fantasies and was used to give permissionto act on them."… it made me want to do the things I wanted to do. It gave me more courage to dothem… knowing that I've seen it on there… they were doing it… I can do it." (DX p. 67)Here the account used the pictures as a form of justification, a sense that if others are engaged inthis then it doesn't matter. It allowed one respondent to ignore the other cues that were presentedto him, such as his victim crying or constantly covering her face with her nightdress.”Quayle, E., and Taylor, M., “Child pornography and the Internet: Perpetuating a cycle ofabuse,” Deviant Behaviour 23(4), 331-362, (2002) p. 9.Quayle and Taylor, “Problematic Internet Use,” 101.Fathers’ Victimizing Their Children“When I made this video tape [victimizing my daughter] I was copying these [ ] movie clips…that I’d downloaded [ ] … I wanted to be … doing what they were doing.”“It was then that I thought about steps of involving my daughter… [ ] in creating video toactually trade to get the material I wanted.”C-7

McCarthy, J. <strong>and</strong> Gaunt, N. (2004). “Responding Effectively to On-line <strong>Child</strong> PornographyOffenders,” SAFE Programme, Auckl<strong>and</strong>, New Zeal<strong>and</strong>,www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/ papers/john_mccarthy.pdf.Montgomery-Devlin, J., “<strong>The</strong> Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren <strong>and</strong> Young People in Northern Irel<strong>and</strong>: Overview from the Barnardos Beyond the Shadows Service,” <strong>Child</strong> Care in Practice, 14, 381-400 (2008).Muir, D., Violence against children in cyberspace, ECPAT International (2005). Quayle, E., Loof, L., <strong>and</strong> Palmer, T., “<strong>Child</strong> pornography <strong>and</strong> sexual exploitation of children online,”. Paper presented at the End <strong>Child</strong> Prostitution, <strong>Child</strong> Pornography <strong>and</strong> the Trafficking of <strong>Child</strong>ren <strong>for</strong> Sexual Purposes (ECPAT) International to the World Congress III against Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren <strong>and</strong> Adolescents, Rio de Janeiro, Brazil, (2008). Quayle, E., <strong>and</strong> Taylor, M., “Model of Problematic Internet Use in People with a Sexual Interest in <strong>Child</strong>ren,” CyberPsychology & Behavior, 6(1), 100 (January 2003:93-106) Obsessions with Collecting <strong>Child</strong> Pornography In the words of one offender, “I managed to find the whole series from somebody <strong>and</strong> I let thechannel operators know…[ ] they were deeply grateful. It’s kind of like an art collector whofinds a lost Picasso.”Quayle, E., <strong>and</strong> Taylor, M., “<strong>Child</strong> Pornography <strong>and</strong> the Internet: Perpetuating a cycle ofabuse,” Journal of Deviant Behavior, 23(4), 331-362, (2002) at p. 10<strong>Child</strong> Pornography to Contact Offenses“Accessing the images appeared to rein<strong>for</strong>ce existing fantasies <strong>and</strong> was used to give permissionto act on them."… it made me want to do the things I wanted to do. It gave me more courage to dothem… knowing that I've seen it on there… they were doing it… I can do it." (DX p. 67)Here the account used the pictures as a <strong>for</strong>m of justification, a sense that if others are engaged inthis then it doesn't matter. It allowed one respondent to ignore the other cues that were presentedto him, such as his victim crying or constantly covering her face with her nightdress.”Quayle, E., <strong>and</strong> Taylor, M., “<strong>Child</strong> pornography <strong>and</strong> the Internet: Perpetuating a cycle ofabuse,” Deviant Behaviour 23(4), 331-362, (2002) p. 9.Quayle <strong>and</strong> Taylor, “Problematic Internet Use,” 101.Fathers’ Victimizing <strong>The</strong>ir <strong>Child</strong>ren“When I made this video tape [victimizing my daughter] I was copying these [ ] movie clips…that I’d downloaded [ ] … I wanted to be … doing what they were doing.”“It was then that I thought about steps of involving my daughter… [ ] in creating video toactually trade to get the material I wanted.”C-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!