The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
follows the same grooming process as predators who do not use the Internet. First, the predatormeets the child and builds trust through deception. Once the child develops trust in theperpetrator, the perpetrator often exposes the child to pornography to lower the child’sinhibitions about sex. The Internet offers perpetrators the opportunity to groom multiple victimsat the same time, because the technology allows perpetrators to communicate with potentialvictims without drawing public attention to themselves. The perpetrator may use photographic orother electronic equipment to capture and transmit images of the victim. Law enforcementofficers must acquire probative evidence against the perpetrator, collecting and preserving allevidence of grooming, such as pornography, Web cameras, and other electronic equipment, sothat prosecutors can present the evidence at trial to show the perpetrator’s motivation.The author describes the online grooming process, details evidence, and shows how to use theevidence in trial. Understanding the typical procedure that online predators follow whencommitting an offense enables prosecutors to use evidence of the process to build a solid caseagainst online predators.HarassmentChaffin, Stacy M. “The New Playground Bullies of Cyberspace: Online Peer SexualHarassment.” Howard Law Journal 51, no. 3 (2008): 777–818.Focusing on online sexual harassment among adolescent peers, the author of this study reviewslegal cases that limit students’ freedom of speech. Online peer sexual harassment occurs amongteenagers when schoolmates, classmates, and friends use e-mail, cell phones, text messaging,instant messaging, personal Web sites, social-networking Web sites, and polling Web sites tomake threats against and spread sexual rumors about their adolescent peers. The author arguesthat, although school administrators are already taking steps to prohibit offline sexualharassment, they also need to prevent online sexual harassment. In support of her call for action,Chaffin cites stories of children who have taken their own lives after experiencing online sexualharassment. Middle school and high school children form online groups, behaving in hurtfulways, such as dehumanizing a classmate, behavior that they are less likely to engage in outsideof the group. Both groups and individuals often use social-networking Web sites, such asFacebook, My Space, and YouTube, to harass their peers.Court decisions regarding students’ rights to free speech ۛincluding Tinker v. Des MoinesIndependent Community School District, (1, below) which permits schools to discipline studentsfor harmful speech; Bethel School District No. 403 v. Fraser, (2, below) which finds thatstudents’ expressive rights are not equal to those of adults; and Hazelwood School District v.Kuhlmeier, (3, below) which finds that schools need not tolerate students’ speech if it impedesthe school’s basic educational mission ۛsupport the argument that online sexual harassment doesnot deserve protection under the First Amendment and that schools should regulate suchbehavior. Nevertheless, even though online sexual harassment is harmful to young people, mostschools do not discipline students for engaging in it. The author believes that schooladministrators should treat online sexual harassment as a threat to adolescent safety and act toprotect students from harassment.F-24
1 Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). 2 Bethel School District V. Fraser, 478 U.S. 675, 678 (1986). 3 Hazelwood School District v. Kuhlmeier, 484 U.S. 260 (1988). The National Campaign to Prevent Teen and Unwanted Pregnancy and CosmoGirl.com. “Sexand Tech: Results from a Survey of Teen and Young Adults.” Report, Washington, DC, 2008.http://www.thenationalcampaign.org/sextech/PDF/SexTech_Summary.pdf accessed March 26,2009).This study presents the results, including the questionnaire and responses, of a unique survey ontext messaging of sexual content among adolescents and young adults. Sexting is adolescentslang referring to the sending or receiving of sexually suggestive images and text messages,often by cell phone. Participants in the study ۛ653 teenagers, ages 13 to 19, and 627 youngadults, ages 20 to 26 ۛcompleted the online survey between September 25, 2008, and October 3,2008. The researchers further analyzed some of the survey responses according to gender orage ۛfor example, they segregated the responses of young adolescents ages 13 to 16. Aconsiderable number of those 13 to 19 years old in this survey had sent, by electronic means,nude or seminude pictures or sexually suggestive text. Twenty percent of teenagers had sentnude or seminude pictures or videos of themselves, and 11 percent of girls ages 13 to 16 had sentsuch images. Thirty-nine percent of teenagers reported having sent sexually suggestive textmessages, and 48 percent of teenagers reported having received such messages. Of thoseteenagers who had sent sexually suggestive content, 71 percent of the girls and 67 percent of theboys reported that they had sent the content to their boyfriends or girlfriends. However, 15percent of those teenagers said that they had sent or posted nude or seminude pictures to peopleknown to them only through online contact. Of those teenagers who had sent sexually suggestivecontent, 66 percent of the girls and 60 percent of the boys said that they had sent the material forfun or to flirt, and 12 percent of said that they had sent it because they felt pressured to sendsexually suggestive messages or images. The study offers points for adolescents to considerbefore they send sexually suggestive content and suggestions to help parents speak with theirchildren about sex and technology.Lenhart, Amanda. “Cyberbullying and Online Teens.” Research Memo, Pew/Internet andAmerican Life Project, Pew Research Center, Washington, DC, June 27, 2007.http://www.pewinternet.org/~/media//Files/Reports/2007/PIP%20Cyberbullying%20Memo.pdf.pdf (accessed March 23, 2009).In the national Parents and Teens 2006 Survey, researchers conducted telephone interviews, fromOctober 23, 2006, to November 19, 2006, of 935 youth Internet users ages 12 to 17. Based on thereports of youth identified as victims of cyberbullying in that survey, the author reports theprevalence and pattern of online harassment and bullying among adolescents. The study foundthat 32 percent of the teenagers interviewed had been harassed online. Girls ۛ especially oldergirls, ages 15 to 17 ۛ were more likely to have experienced online harassment than boys: 38percent of the girls and 41 percent of the older girls had experienced online harassment, ascompared to 26 percent of the boys. Sending or forwarding a private e-mail was the mostcommon method of cyberbullying (comprising 15 percent of all cyberbullying incidents),followed by spreading rumors online (13 percent), sending threatening or aggressive messagesF-25
- Page 187 and 188: The Effect of the Lack of Internet
- Page 189 and 190: • 44 percent of respondents repor
- Page 191 and 192: • 24 percent of respondents repor
- Page 193 and 194: ONLINE ENTICEMENTExtent of Online E
- Page 195 and 196: • 37 percent of respondents repor
- Page 197 and 198: • 8 percent of respondents report
- Page 199 and 200: SEX TOURISMNature and ExtentAmong N
- Page 201 and 202: • 50 percent of respondents repor
- Page 203 and 204: Average Federal and State Sentences
- Page 205 and 206: SOURCESNumerous federal, state, and
- Page 207 and 208: Federal Bureau of Investigation (FB
- Page 209 and 210: Southern Texas Utah VermontVirginia
- Page 211 and 212: APPENDIX EDEPARTMENT-FUNDED RESEARC
- Page 213 and 214: victimization. The project has four
- Page 215 and 216: APPENDIX FSYNTHESIS OF MAJOR STUDIE
- Page 217 and 218: 17 that among the participants who
- Page 219 and 220: authors, extrapolating survey data,
- Page 221 and 222: officials can gain greater awarenes
- Page 223 and 224: Moessner, Chris. “Cyberbullying.
- Page 225 and 226: The authors of this chapter in a bo
- Page 227 and 228: Wells, Melissa, David Finkelhor, Ja
- Page 229 and 230: The article reports the results of
- Page 231 and 232: system ۛincluding perspectives of
- Page 233 and 234: etween 42 and 44 percent of pornogr
- Page 235 and 236: Reporting the demographic, psycholo
- Page 237: predator with a victim took place i
- Page 241 and 242: conducted between September 1999 an
- Page 243 and 244: with each grade level, with the per
- Page 245 and 246: Understanding Online Child Pornogra
- Page 247 and 248: focusing on violent (including sexu
- Page 249 and 250: their offending than did Internet o
- Page 251 and 252: trafficking, rape and sexual assaul
- Page 253 and 254: States Postal Inspection Service, 8
- Page 255 and 256: Getting to Grips with Sexual Groomi
- Page 257 and 258: Child Seduction and Self-Representa
- Page 259 and 260: Annotated Bibliography: Child Explo
- Page 261 and 262: Abstract The author discusses teach
- Page 263 and 264: implications for nursing practice i
- Page 265 and 266: providers assisting child victims,
- Page 267 and 268: Problematic Internet Experiences: P
- Page 269 and 270: Online Requests for Sexual Pictures
- Page 271 and 272: Sheldon Kennedy and a Canadian Trag
- Page 273 and 274: people involved in prostitution and
- Page 275 and 276: debates about child labour, exploit
- Page 277 and 278: Abstract The article presents the v
- Page 279 and 280: dealing with sexual offenses agains
follows the same grooming process as predators who do not use the Internet. First, the predatormeets the child <strong>and</strong> builds trust through deception. Once the child develops trust in theperpetrator, the perpetrator often exposes the child to pornography to lower the child’sinhibitions about sex. <strong>The</strong> Internet offers perpetrators the opportunity to groom multiple victimsat the same time, because the technology allows perpetrators to communicate with potentialvictims without drawing public attention to themselves. <strong>The</strong> perpetrator may use photographic orother electronic equipment to capture <strong>and</strong> transmit images of the victim. Law en<strong>for</strong>cementofficers must acquire probative evidence against the perpetrator, collecting <strong>and</strong> preserving allevidence of grooming, such as pornography, Web cameras, <strong>and</strong> other electronic equipment, sothat prosecutors can present the evidence at trial to show the perpetrator’s motivation.<strong>The</strong> author describes the online grooming process, details evidence, <strong>and</strong> shows how to use theevidence in trial. Underst<strong>and</strong>ing the typical procedure that online predators follow whencommitting an offense enables prosecutors to use evidence of the process to build a solid caseagainst online predators.HarassmentChaffin, Stacy M. “<strong>The</strong> New Playground Bullies of Cyberspace: Online Peer SexualHarassment.” Howard Law Journal 51, no. 3 (2008): 777–818.Focusing on online sexual harassment among adolescent peers, the author of this study reviewslegal cases that limit students’ freedom of speech. Online peer sexual harassment occurs amongteenagers when schoolmates, classmates, <strong>and</strong> friends use e-mail, cell phones, text messaging,instant messaging, personal Web sites, social-networking Web sites, <strong>and</strong> polling Web sites tomake threats against <strong>and</strong> spread sexual rumors about their adolescent peers. <strong>The</strong> author arguesthat, although school administrators are already taking steps to prohibit offline sexualharassment, they also need to prevent online sexual harassment. In support of her call <strong>for</strong> action,Chaffin cites stories of children who have taken their own lives after experiencing online sexualharassment. Middle school <strong>and</strong> high school children <strong>for</strong>m online groups, behaving in hurtfulways, such as dehumanizing a classmate, behavior that they are less likely to engage in outsideof the group. Both groups <strong>and</strong> individuals often use social-networking Web sites, such asFacebook, My Space, <strong>and</strong> YouTube, to harass their peers.Court decisions regarding students’ rights to free speech ۛincluding Tinker v. Des MoinesIndependent Community School District, (1, below) which permits schools to discipline students<strong>for</strong> harmful speech; Bethel School District No. 403 v. Fraser, (2, below) which finds thatstudents’ expressive rights are not equal to those of adults; <strong>and</strong> Hazelwood School District v.Kuhlmeier, (3, below) which finds that schools need not tolerate students’ speech if it impedesthe school’s basic educational mission ۛsupport the argument that online sexual harassment doesnot deserve protection under the First Amendment <strong>and</strong> that schools should regulate suchbehavior. Nevertheless, even though online sexual harassment is harmful to young people, mostschools do not discipline students <strong>for</strong> engaging in it. <strong>The</strong> author believes that schooladministrators should treat online sexual harassment as a threat to adolescent safety <strong>and</strong> act toprotect students from harassment.F-24