The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

follows the same grooming process as predators who do not use the Internet. First, the predatormeets the child and builds trust through deception. Once the child develops trust in theperpetrator, the perpetrator often exposes the child to pornography to lower the child’sinhibitions about sex. The Internet offers perpetrators the opportunity to groom multiple victimsat the same time, because the technology allows perpetrators to communicate with potentialvictims without drawing public attention to themselves. The perpetrator may use photographic orother electronic equipment to capture and transmit images of the victim. Law enforcementofficers must acquire probative evidence against the perpetrator, collecting and preserving allevidence of grooming, such as pornography, Web cameras, and other electronic equipment, sothat prosecutors can present the evidence at trial to show the perpetrator’s motivation.The author describes the online grooming process, details evidence, and shows how to use theevidence in trial. Understanding the typical procedure that online predators follow whencommitting an offense enables prosecutors to use evidence of the process to build a solid caseagainst online predators.HarassmentChaffin, Stacy M. “The New Playground Bullies of Cyberspace: Online Peer SexualHarassment.” Howard Law Journal 51, no. 3 (2008): 777–818.Focusing on online sexual harassment among adolescent peers, the author of this study reviewslegal cases that limit students’ freedom of speech. Online peer sexual harassment occurs amongteenagers when schoolmates, classmates, and friends use e-mail, cell phones, text messaging,instant messaging, personal Web sites, social-networking Web sites, and polling Web sites tomake threats against and spread sexual rumors about their adolescent peers. The author arguesthat, although school administrators are already taking steps to prohibit offline sexualharassment, they also need to prevent online sexual harassment. In support of her call for action,Chaffin cites stories of children who have taken their own lives after experiencing online sexualharassment. Middle school and high school children form online groups, behaving in hurtfulways, such as dehumanizing a classmate, behavior that they are less likely to engage in outsideof the group. Both groups and individuals often use social-networking Web sites, such asFacebook, My Space, and YouTube, to harass their peers.Court decisions regarding students’ rights to free speech ۛincluding Tinker v. Des MoinesIndependent Community School District, (1, below) which permits schools to discipline studentsfor harmful speech; Bethel School District No. 403 v. Fraser, (2, below) which finds thatstudents’ expressive rights are not equal to those of adults; and Hazelwood School District v.Kuhlmeier, (3, below) which finds that schools need not tolerate students’ speech if it impedesthe school’s basic educational mission ۛsupport the argument that online sexual harassment doesnot deserve protection under the First Amendment and that schools should regulate suchbehavior. Nevertheless, even though online sexual harassment is harmful to young people, mostschools do not discipline students for engaging in it. The author believes that schooladministrators should treat online sexual harassment as a threat to adolescent safety and act toprotect students from harassment.F-24

1 Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). 2 Bethel School District V. Fraser, 478 U.S. 675, 678 (1986). 3 Hazelwood School District v. Kuhlmeier, 484 U.S. 260 (1988). The National Campaign to Prevent Teen and Unwanted Pregnancy and CosmoGirl.com. “Sexand Tech: Results from a Survey of Teen and Young Adults.” Report, Washington, DC, 2008.http://www.thenationalcampaign.org/sextech/PDF/SexTech_Summary.pdf accessed March 26,2009).This study presents the results, including the questionnaire and responses, of a unique survey ontext messaging of sexual content among adolescents and young adults. Sexting is adolescentslang referring to the sending or receiving of sexually suggestive images and text messages,often by cell phone. Participants in the study ۛ653 teenagers, ages 13 to 19, and 627 youngadults, ages 20 to 26 ۛcompleted the online survey between September 25, 2008, and October 3,2008. The researchers further analyzed some of the survey responses according to gender orage ۛfor example, they segregated the responses of young adolescents ages 13 to 16. Aconsiderable number of those 13 to 19 years old in this survey had sent, by electronic means,nude or seminude pictures or sexually suggestive text. Twenty percent of teenagers had sentnude or seminude pictures or videos of themselves, and 11 percent of girls ages 13 to 16 had sentsuch images. Thirty-nine percent of teenagers reported having sent sexually suggestive textmessages, and 48 percent of teenagers reported having received such messages. Of thoseteenagers who had sent sexually suggestive content, 71 percent of the girls and 67 percent of theboys reported that they had sent the content to their boyfriends or girlfriends. However, 15percent of those teenagers said that they had sent or posted nude or seminude pictures to peopleknown to them only through online contact. Of those teenagers who had sent sexually suggestivecontent, 66 percent of the girls and 60 percent of the boys said that they had sent the material forfun or to flirt, and 12 percent of said that they had sent it because they felt pressured to sendsexually suggestive messages or images. The study offers points for adolescents to considerbefore they send sexually suggestive content and suggestions to help parents speak with theirchildren about sex and technology.Lenhart, Amanda. “Cyberbullying and Online Teens.” Research Memo, Pew/Internet andAmerican Life Project, Pew Research Center, Washington, DC, June 27, 2007.http://www.pewinternet.org/~/media//Files/Reports/2007/PIP%20Cyberbullying%20Memo.pdf.pdf (accessed March 23, 2009).In the national Parents and Teens 2006 Survey, researchers conducted telephone interviews, fromOctober 23, 2006, to November 19, 2006, of 935 youth Internet users ages 12 to 17. Based on thereports of youth identified as victims of cyberbullying in that survey, the author reports theprevalence and pattern of online harassment and bullying among adolescents. The study foundthat 32 percent of the teenagers interviewed had been harassed online. Girls ۛ especially oldergirls, ages 15 to 17 ۛ were more likely to have experienced online harassment than boys: 38percent of the girls and 41 percent of the older girls had experienced online harassment, ascompared to 26 percent of the boys. Sending or forwarding a private e-mail was the mostcommon method of cyberbullying (comprising 15 percent of all cyberbullying incidents),followed by spreading rumors online (13 percent), sending threatening or aggressive messagesF-25

follows the same grooming process as predators who do not use the Internet. First, the predatormeets the child <strong>and</strong> builds trust through deception. Once the child develops trust in theperpetrator, the perpetrator often exposes the child to pornography to lower the child’sinhibitions about sex. <strong>The</strong> Internet offers perpetrators the opportunity to groom multiple victimsat the same time, because the technology allows perpetrators to communicate with potentialvictims without drawing public attention to themselves. <strong>The</strong> perpetrator may use photographic orother electronic equipment to capture <strong>and</strong> transmit images of the victim. Law en<strong>for</strong>cementofficers must acquire probative evidence against the perpetrator, collecting <strong>and</strong> preserving allevidence of grooming, such as pornography, Web cameras, <strong>and</strong> other electronic equipment, sothat prosecutors can present the evidence at trial to show the perpetrator’s motivation.<strong>The</strong> author describes the online grooming process, details evidence, <strong>and</strong> shows how to use theevidence in trial. Underst<strong>and</strong>ing the typical procedure that online predators follow whencommitting an offense enables prosecutors to use evidence of the process to build a solid caseagainst online predators.HarassmentChaffin, Stacy M. “<strong>The</strong> New Playground Bullies of Cyberspace: Online Peer SexualHarassment.” Howard Law Journal 51, no. 3 (2008): 777–818.Focusing on online sexual harassment among adolescent peers, the author of this study reviewslegal cases that limit students’ freedom of speech. Online peer sexual harassment occurs amongteenagers when schoolmates, classmates, <strong>and</strong> friends use e-mail, cell phones, text messaging,instant messaging, personal Web sites, social-networking Web sites, <strong>and</strong> polling Web sites tomake threats against <strong>and</strong> spread sexual rumors about their adolescent peers. <strong>The</strong> author arguesthat, although school administrators are already taking steps to prohibit offline sexualharassment, they also need to prevent online sexual harassment. In support of her call <strong>for</strong> action,Chaffin cites stories of children who have taken their own lives after experiencing online sexualharassment. Middle school <strong>and</strong> high school children <strong>for</strong>m online groups, behaving in hurtfulways, such as dehumanizing a classmate, behavior that they are less likely to engage in outsideof the group. Both groups <strong>and</strong> individuals often use social-networking Web sites, such asFacebook, My Space, <strong>and</strong> YouTube, to harass their peers.Court decisions regarding students’ rights to free speech ۛincluding Tinker v. Des MoinesIndependent Community School District, (1, below) which permits schools to discipline students<strong>for</strong> harmful speech; Bethel School District No. 403 v. Fraser, (2, below) which finds thatstudents’ expressive rights are not equal to those of adults; <strong>and</strong> Hazelwood School District v.Kuhlmeier, (3, below) which finds that schools need not tolerate students’ speech if it impedesthe school’s basic educational mission ۛsupport the argument that online sexual harassment doesnot deserve protection under the First Amendment <strong>and</strong> that schools should regulate suchbehavior. Nevertheless, even though online sexual harassment is harmful to young people, mostschools do not discipline students <strong>for</strong> engaging in it. <strong>The</strong> author believes that schooladministrators should treat online sexual harassment as a threat to adolescent safety <strong>and</strong> act toprotect students from harassment.F-24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!