The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
and/or violent offense, 1% (n = 2) for a hands-on sex offense, involving child sexual abuse, 3.3%(n = 8) for a hands-off sex offense and one for a nonsexual violent offense. When applying abroad definition of recidivism, which included ongoing investigations, charges and convictions,3% (n = 7) of the study sample recidivated with a violent and/or sex offense, 3.9% (n = 9) with ahands-off sex offense and 0.8% (n = 2) with a hands-on sex offense. CONCLUSION:Consuming child pornography alone is not a risk factor for committing hands-on sex offenses -at least not for those subjects who had never committed a hands-on sex offense. The majority ofthe investigated consumers had no previous convictions for hands-on sex offenses. For thoseoffenders, the prognosis for hands-on sex offenses, as well as for recidivism with childpornography, is favorable.Pedophiles in Wonderland: Censoring the Sinful in Cyberspace.Russell, Gabrielle.Journal of Criminal Law and Criminology, vol. 98, no. 4, pp. 1467-1500, Summer 2008.Abstract: This article describes the constitutional problems with legally proscribing virtual ageplay under either child pornography or obscenity law. Second Life is a popular virtual worldcreated by Linden Research, Incorporated. While there are many kinds of virtual environments,many of which are text-based, massively multiplayer online game (MMOG) environments arethe most real-world environments, in appearance and in the way that users can interact with theirsurroundings and with each other. A user navigates through these virtual worlds as an avatar thata user can design to look like anything, including a child; avatars are free to do whatever theircreators please including having sex. While some adults design avatars that look like monsters orcelebrities, others prefer to adopt a childlike appearance. Some adults also favor less sociallyacceptable activities and use their young counterparts for virtual age play or sexual role playoccurring in a virtual world where one avatar appears to be a child and the other an adult; thistheme has become a very popular and newsworthy online pastime. This article begins with anexplanation of virtual age play and an overview of the laws that bear on its legal standing,followed by a discussion of why regulation of such activity under child pornography law isinappropriate. The article concludes by exploring the potential regulation of virtual age playunder obscenity law, ultimately rejecting that strategy as an unconstitutional restriction of freespeech and individual liberty. This article notes that not only is there no proof that the man whois stimulated by cybersex with a virtual child is any more likely to seek our real sex with a realchild but that there may be some therapeutic value in indulging such fantasies.Pornography Use And Sexual Aggression: The Impact Of Frequency And Type Of PornographyUse On Recidivism Among Sexual Offenders.Kingston, Drew A.; Fedoroff, Paul; Firestone, Philip; Curry, Susan; Bradford, John M.Aggressive Behavior, Jul/Aug2008, Vol. 34, Issue 4, p341-351, 11p.Abstract: In this study, we examined the unique contribution of pornography consumption to thelongitudinal prediction of criminal recidivism in a sample of 341 child molesters. We specificallytested the hypothesis, based on predictions informed by the confluence model of sexualaggression that pornography will be a risk factor for recidivism only for those individualsclassified as relatively high risk for re-offending. Pornography use (frequency and type) wasassessed through self-report and recidivism was measured using data from a national databasefrom the Royal Canadian Mounted Police. Indices of recidivism, which were assessed up to 15years after release, included an overall criminal recidivism index, as well as subcategoriesF-32
focusing on violent (including sexual) recidivism and sexual recidivism alone. Results for bothfrequency and type of pornography use were generally consistent with our predictions. Mostimportantly, after controlling for general and specific risk factors for sexual aggression,pornography added significantly to the prediction of recidivism. Statistical interactions indicatedthat frequency of pornography use was primarily a risk factor for higher-risk offenders, whencompared with lower-risk offenders, and that content of pornography (i.e., pornographycontaining deviant content) was a risk factor for all groups. The importance of conceptualizingparticular risk factors (e.g., pornography), within the context of other individual characteristics isdiscussed.The Internet and Child Sexual Offending: A Criminological Review.Beech, Anthony R; Elliott, Ian A; Birgden, Astrid; Findlater, Donald.Aggression and Violent Behavior, vol. 13, no. 3, pp. 216-228, June-July 2008.Abstract: This paper outlines the current literature on what is known about the processes bywhich individuals utilize the Internet for child sexual abuse. First, three ways in which theInternet is utilized are outlined: (1) by dissemination of sexually abusive images of children forpersonal and/or commercial reasons; (2) by communication with other individuals with a sexualinterest in children: and (3) by maintaining and developing online pedophilic networks. Second,content and availability of abusive images are described, and the difficulties faced by criminaljustice agencies in both the definition of abusive images and their prohibition is discussed. Third,the potential for offenders to 'cross-over' from online offenses to contact sexual victimization ofchildren is examined and placed within a context of various Internet offender typologies thathave been developed. Finally, implications of this body of research for law and public policy areconsidered."In My Own World": A Case Study of a Paedophile's Thinking and Doing and His Use of theInternet.Wilson, David; Jones, Timothy.Howard Journal of Criminal Justice, vol. 47, no. 2, pp. 107 - 120, May 2008.Abstract: This case study of a convicted pedophile ("James") in England focuses on the linksbetween his "thinking and doing," i.e., the interaction of his fantasy life, his use of the Internet,and his contact offenses against children. For James, his thoughts, sexual desires, impulses, andfantasies were objectified and reinforced by pornographic images and videos viewed on theInternet, which were acted out in sexual contact with children. Thus, he was unrestrained inbringing his thinking, fantasizing, and visualization into the real world of sexual contact withchildren. The authors note that the proposed model drawn from James' case study does notsuggest that every individual who has fantasies of unlawful or deviant sexual acts will inevitablyact on them in the real world. For most who engage in such fantasies, they coexist with aconscience conditioned by societal norms, empathy, and histories of conditioned normativebehaviors aimed at doing no harm to others in the real world of consensual intimate sexualinteractions. The danger comes when individuals, like James, with deviant sexual fantasies donot have a coexisting powerful reservoir of restraints based in social and genetic conditions thatkeep "thinking" from becoming "doing." The case study of James derived from access granted toa convicted pedophile serving his sentence at HMP Grendon, a facility unique in the penalsystem of England and Wales in its operation as a therapeutic community. James wasF-33
- Page 195 and 196: • 37 percent of respondents repor
- Page 197 and 198: • 8 percent of respondents report
- Page 199 and 200: SEX TOURISMNature and ExtentAmong N
- Page 201 and 202: • 50 percent of respondents repor
- Page 203 and 204: Average Federal and State Sentences
- Page 205 and 206: SOURCESNumerous federal, state, and
- Page 207 and 208: Federal Bureau of Investigation (FB
- Page 209 and 210: Southern Texas Utah VermontVirginia
- Page 211 and 212: APPENDIX EDEPARTMENT-FUNDED RESEARC
- Page 213 and 214: victimization. The project has four
- Page 215 and 216: APPENDIX FSYNTHESIS OF MAJOR STUDIE
- Page 217 and 218: 17 that among the participants who
- Page 219 and 220: authors, extrapolating survey data,
- Page 221 and 222: officials can gain greater awarenes
- Page 223 and 224: Moessner, Chris. “Cyberbullying.
- Page 225 and 226: The authors of this chapter in a bo
- Page 227 and 228: Wells, Melissa, David Finkelhor, Ja
- Page 229 and 230: The article reports the results of
- Page 231 and 232: system ۛincluding perspectives of
- Page 233 and 234: etween 42 and 44 percent of pornogr
- Page 235 and 236: Reporting the demographic, psycholo
- Page 237 and 238: predator with a victim took place i
- Page 239 and 240: 1 Tinker v. Des Moines Independent
- Page 241 and 242: conducted between September 1999 an
- Page 243 and 244: with each grade level, with the per
- Page 245: Understanding Online Child Pornogra
- Page 249 and 250: their offending than did Internet o
- Page 251 and 252: trafficking, rape and sexual assaul
- Page 253 and 254: States Postal Inspection Service, 8
- Page 255 and 256: Getting to Grips with Sexual Groomi
- Page 257 and 258: Child Seduction and Self-Representa
- Page 259 and 260: Annotated Bibliography: Child Explo
- Page 261 and 262: Abstract The author discusses teach
- Page 263 and 264: implications for nursing practice i
- Page 265 and 266: providers assisting child victims,
- Page 267 and 268: Problematic Internet Experiences: P
- Page 269 and 270: Online Requests for Sexual Pictures
- Page 271 and 272: Sheldon Kennedy and a Canadian Trag
- Page 273 and 274: people involved in prostitution and
- Page 275 and 276: debates about child labour, exploit
- Page 277 and 278: Abstract The article presents the v
- Page 279 and 280: dealing with sexual offenses agains
focusing on violent (including sexual) recidivism <strong>and</strong> sexual recidivism alone. Results <strong>for</strong> bothfrequency <strong>and</strong> type of pornography use were generally consistent with our predictions. Mostimportantly, after controlling <strong>for</strong> general <strong>and</strong> specific risk factors <strong>for</strong> sexual aggression,pornography added significantly to the prediction of recidivism. Statistical interactions indicatedthat frequency of pornography use was primarily a risk factor <strong>for</strong> higher-risk offenders, whencompared with lower-risk offenders, <strong>and</strong> that content of pornography (i.e., pornographycontaining deviant content) was a risk factor <strong>for</strong> all groups. <strong>The</strong> importance of conceptualizingparticular risk factors (e.g., pornography), within the context of other individual characteristics isdiscussed.<strong>The</strong> Internet <strong>and</strong> <strong>Child</strong> Sexual Offending: A Criminological Review.Beech, Anthony R; Elliott, Ian A; Birgden, Astrid; Findlater, Donald.Aggression <strong>and</strong> Violent Behavior, vol. 13, no. 3, pp. 216-228, June-July 2008.Abstract: This paper outlines the current literature on what is known about the processes bywhich individuals utilize the Internet <strong>for</strong> child sexual abuse. First, three ways in which theInternet is utilized are outlined: (1) by dissemination of sexually abusive images of children <strong>for</strong>personal <strong>and</strong>/or commercial reasons; (2) by communication with other individuals with a sexualinterest in children: <strong>and</strong> (3) by maintaining <strong>and</strong> developing online pedophilic networks. Second,content <strong>and</strong> availability of abusive images are described, <strong>and</strong> the difficulties faced by criminaljustice agencies in both the definition of abusive images <strong>and</strong> their prohibition is discussed. Third,the potential <strong>for</strong> offenders to 'cross-over' from online offenses to contact sexual victimization ofchildren is examined <strong>and</strong> placed within a context of various Internet offender typologies thathave been developed. Finally, implications of this body of research <strong>for</strong> law <strong>and</strong> public policy areconsidered."In My Own World": A Case Study of a Paedophile's Thinking <strong>and</strong> Doing <strong>and</strong> His Use of theInternet.Wilson, David; Jones, Timothy.Howard Journal of Criminal Justice, vol. 47, no. 2, pp. 107 - 120, May 2008.Abstract: This case study of a convicted pedophile ("James") in Engl<strong>and</strong> focuses on the linksbetween his "thinking <strong>and</strong> doing," i.e., the interaction of his fantasy life, his use of the Internet,<strong>and</strong> his contact offenses against children. For James, his thoughts, sexual desires, impulses, <strong>and</strong>fantasies were objectified <strong>and</strong> rein<strong>for</strong>ced by pornographic images <strong>and</strong> videos viewed on theInternet, which were acted out in sexual contact with children. Thus, he was unrestrained inbringing his thinking, fantasizing, <strong>and</strong> visualization into the real world of sexual contact withchildren. <strong>The</strong> authors note that the proposed model drawn from James' case study does notsuggest that every individual who has fantasies of unlawful or deviant sexual acts will inevitablyact on them in the real world. For most who engage in such fantasies, they coexist with aconscience conditioned by societal norms, empathy, <strong>and</strong> histories of conditioned normativebehaviors aimed at doing no harm to others in the real world of consensual intimate sexualinteractions. <strong>The</strong> danger comes when individuals, like James, with deviant sexual fantasies donot have a coexisting powerful reservoir of restraints based in social <strong>and</strong> genetic conditions thatkeep "thinking" from becoming "doing." <strong>The</strong> case study of James derived from access granted toa convicted pedophile serving his sentence at HMP Grendon, a facility unique in the penalsystem of Engl<strong>and</strong> <strong>and</strong> Wales in its operation as a therapeutic community. James wasF-33