The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
Additional Academic SourcesFagan, P., Wise, T., Schmidt, C. and Berlin, F. (2002), “Pedophilia,” Journal of theAmerican Medical Association, 288(19), 2458-2465.Child Pornography Desensitizes ViewersHernandez, Andres, “Psychological and Behavioral Characteristics of Child PornographyOffenders in Treatment,” presented at the University of North Carolina Symposium.http://www.iprc.unc.edu/G8/Hernandez_position_paper_Global_Symposium.pdfChild Pornography and Contact OffensesA study completed in 2000 by the Director of the Sex Offender Treatment Program at the ButnerFederal Correctional Complex in North Carolina revealed that of 54 inmates convicted of childpornography offenses, 79.6% of them admitted that they had also molested significant numbersof children.Dr. Andres Hernandez, director of the Bureau of Prisons Sex Offender Treatment Program,looked at a sample of 155 offenders in his program who had been convicted of possession,receipt, or distribution of child pornography. Of these 155 offenders, 26 percent had knowndocumented histories of contact sexual offenses against children upon entering treatment, with atotal number of 75 victims. By the end of treatment, however, 85 percent of the sample admittedthat they had committed at least one prior hands-on offense against a child, with a total numberof 1,777 victims. Fifty-two percent of the sample underwent a polygraph examination to validatethe accuracy of the self-reported instances of abuse.Dr. Hernandez concluded that a “substantial percentage of offenders in our study who initiallyclaimed to be at low (or no) risk of harm to children because they exclusively collected childabuse images and allegedly never molested a child, subsequently indicated that they hadcommitted undetected child sexual abuse.”Dr. Hernandez’ findings, by his own admission, may overstate the relationship between childpornography offenders and contact offenders, since the subjects of his study were a self-selectedgroup.Jensen, C.J., Bailey, P., and Jensen, S., “Selection, Engagement and Seduction of Childrenand Adults by Child Molesters,” The Prosecutor, 36, 41-47 (2002).Klain, E.J., Davies, H.J., and Hicks, M.A., Child Pornography: The Criminal-Justice-SystemResponse, NCMEC, Alexandria, Virginia, (March 2001).Lanning, K.V., “Pedophiles Use the Images to Silence Their Victims: Photograph theAbuse and Blackmail the Child Into Silence With the Shameful Images of Abuse,”NCMEC 1992.C-6
McCarthy, J. and Gaunt, N. (2004). “Responding Effectively to On-line Child PornographyOffenders,” SAFE Programme, Auckland, New Zealand,www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/ papers/john_mccarthy.pdf.Montgomery-Devlin, J., “The Sexual Exploitation of Children and Young People in Northern Ireland: Overview from the Barnardos Beyond the Shadows Service,” Child Care in Practice, 14, 381-400 (2008).Muir, D., Violence against children in cyberspace, ECPAT International (2005). Quayle, E., Loof, L., and Palmer, T., “Child pornography and sexual exploitation of children online,”. Paper presented at the End Child Prostitution, Child Pornography and the Trafficking of Children for Sexual Purposes (ECPAT) International to the World Congress III against Sexual Exploitation of Children and Adolescents, Rio de Janeiro, Brazil, (2008). Quayle, E., and Taylor, M., “Model of Problematic Internet Use in People with a Sexual Interest in Children,” CyberPsychology & Behavior, 6(1), 100 (January 2003:93-106) Obsessions with Collecting Child Pornography In the words of one offender, “I managed to find the whole series from somebody and I let thechannel operators know…[ ] they were deeply grateful. It’s kind of like an art collector whofinds a lost Picasso.”Quayle, E., and Taylor, M., “Child Pornography and the Internet: Perpetuating a cycle ofabuse,” Journal of Deviant Behavior, 23(4), 331-362, (2002) at p. 10Child Pornography to Contact Offenses“Accessing the images appeared to reinforce existing fantasies and was used to give permissionto act on them."… it made me want to do the things I wanted to do. It gave me more courage to dothem… knowing that I've seen it on there… they were doing it… I can do it." (DX p. 67)Here the account used the pictures as a form of justification, a sense that if others are engaged inthis then it doesn't matter. It allowed one respondent to ignore the other cues that were presentedto him, such as his victim crying or constantly covering her face with her nightdress.”Quayle, E., and Taylor, M., “Child pornography and the Internet: Perpetuating a cycle ofabuse,” Deviant Behaviour 23(4), 331-362, (2002) p. 9.Quayle and Taylor, “Problematic Internet Use,” 101.Fathers’ Victimizing Their Children“When I made this video tape [victimizing my daughter] I was copying these [ ] movie clips…that I’d downloaded [ ] … I wanted to be … doing what they were doing.”“It was then that I thought about steps of involving my daughter… [ ] in creating video toactually trade to get the material I wanted.”C-7
- Page 121 and 122: activity by predators searching for
- Page 123 and 124: 3. Federal Trade Commission and Dep
- Page 125 and 126: Funder: • U.S. Department of Agri
- Page 127 and 128: Delivery: • Online games; printab
- Page 129 and 130: TABLE 1: FEDERALLY FUNDED INTERNET
- Page 131 and 132: Program/Product NameandContactInfor
- Page 133 and 134: TABLE 2: SAMPLE OF PRIVATE NONPROFI
- Page 135 and 136: Program/Product NameProducerFor Kid
- Page 137 and 138: TABLE 1: PARTICIPANT EVALUATIONS OF
- Page 139 and 140: FY 2011. The primary forensics resp
- Page 141 and 142: The DEU is the principal group resp
- Page 143 and 144: CD/DVDs. The CFS has the capability
- Page 145 and 146: First, the Department will continue
- Page 147 and 148: and the Innocence Lost task forces,
- Page 149 and 150: deconflict cases, and share informa
- Page 151 and 152: with the ICACs to help increase the
- Page 153 and 154: from Landslide’s business premise
- Page 155 and 156: victimized children worldwide, incl
- Page 157 and 158: association, was arrested after the
- Page 159 and 160: is transnational in scope; cooperat
- Page 161 and 162: Over the course of their communicat
- Page 163 and 164: An ICE investigation resulted in th
- Page 165 and 166: U.S. v. RichardsonICE PRESS RELEASE
- Page 167 and 168: APPENDIX C THREAT ASSESSMENT: ACADE
- Page 169 and 170: Selected Quotes from Appendix C of
- Page 171: * * * “Sheldon and Howitt (2007)
- Page 175 and 176: high-profile jobs. Some seemed isol
- Page 177 and 178: Trends 2008, http://www.iwf.org.uk/
- Page 179 and 180: Source: National Center for Missing
- Page 181 and 182: Federal Bureau of Investigation (FB
- Page 183 and 184: scientific survey process, but rath
- Page 185 and 186: • 42 percent of respondents repor
- Page 187 and 188: The Effect of the Lack of Internet
- Page 189 and 190: • 44 percent of respondents repor
- Page 191 and 192: • 24 percent of respondents repor
- Page 193 and 194: ONLINE ENTICEMENTExtent of Online E
- Page 195 and 196: • 37 percent of respondents repor
- Page 197 and 198: • 8 percent of respondents report
- Page 199 and 200: SEX TOURISMNature and ExtentAmong N
- Page 201 and 202: • 50 percent of respondents repor
- Page 203 and 204: Average Federal and State Sentences
- Page 205 and 206: SOURCESNumerous federal, state, and
- Page 207 and 208: Federal Bureau of Investigation (FB
- Page 209 and 210: Southern Texas Utah VermontVirginia
- Page 211 and 212: APPENDIX EDEPARTMENT-FUNDED RESEARC
- Page 213 and 214: victimization. The project has four
- Page 215 and 216: APPENDIX FSYNTHESIS OF MAJOR STUDIE
- Page 217 and 218: 17 that among the participants who
- Page 219 and 220: authors, extrapolating survey data,
- Page 221 and 222: officials can gain greater awarenes
McCarthy, J. <strong>and</strong> Gaunt, N. (2004). “Responding Effectively to On-line <strong>Child</strong> PornographyOffenders,” SAFE Programme, Auckl<strong>and</strong>, New Zeal<strong>and</strong>,www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/ papers/john_mccarthy.pdf.Montgomery-Devlin, J., “<strong>The</strong> Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren <strong>and</strong> Young People in Northern Irel<strong>and</strong>: Overview from the Barnardos Beyond the Shadows Service,” <strong>Child</strong> Care in Practice, 14, 381-400 (2008).Muir, D., Violence against children in cyberspace, ECPAT International (2005). Quayle, E., Loof, L., <strong>and</strong> Palmer, T., “<strong>Child</strong> pornography <strong>and</strong> sexual exploitation of children online,”. Paper presented at the End <strong>Child</strong> Prostitution, <strong>Child</strong> Pornography <strong>and</strong> the Trafficking of <strong>Child</strong>ren <strong>for</strong> Sexual Purposes (ECPAT) International to the World Congress III against Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren <strong>and</strong> Adolescents, Rio de Janeiro, Brazil, (2008). Quayle, E., <strong>and</strong> Taylor, M., “Model of Problematic Internet Use in People with a Sexual Interest in <strong>Child</strong>ren,” CyberPsychology & Behavior, 6(1), 100 (January 2003:93-106) Obsessions with Collecting <strong>Child</strong> Pornography In the words of one offender, “I managed to find the whole series from somebody <strong>and</strong> I let thechannel operators know…[ ] they were deeply grateful. It’s kind of like an art collector whofinds a lost Picasso.”Quayle, E., <strong>and</strong> Taylor, M., “<strong>Child</strong> Pornography <strong>and</strong> the Internet: Perpetuating a cycle ofabuse,” Journal of Deviant Behavior, 23(4), 331-362, (2002) at p. 10<strong>Child</strong> Pornography to Contact Offenses“Accessing the images appeared to rein<strong>for</strong>ce existing fantasies <strong>and</strong> was used to give permissionto act on them."… it made me want to do the things I wanted to do. It gave me more courage to dothem… knowing that I've seen it on there… they were doing it… I can do it." (DX p. 67)Here the account used the pictures as a <strong>for</strong>m of justification, a sense that if others are engaged inthis then it doesn't matter. It allowed one respondent to ignore the other cues that were presentedto him, such as his victim crying or constantly covering her face with her nightdress.”Quayle, E., <strong>and</strong> Taylor, M., “<strong>Child</strong> pornography <strong>and</strong> the Internet: Perpetuating a cycle ofabuse,” Deviant Behaviour 23(4), 331-362, (2002) p. 9.Quayle <strong>and</strong> Taylor, “Problematic Internet Use,” 101.Fathers’ Victimizing <strong>The</strong>ir <strong>Child</strong>ren“When I made this video tape [victimizing my daughter] I was copying these [ ] movie clips…that I’d downloaded [ ] … I wanted to be … doing what they were doing.”“It was then that I thought about steps of involving my daughter… [ ] in creating video toactually trade to get the material I wanted.”C-7