The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

and/or violent offense, 1% (n = 2) for a hands-on sex offense, involving child sexual abuse, 3.3%(n = 8) for a hands-off sex offense and one for a nonsexual violent offense. When applying abroad definition of recidivism, which included ongoing investigations, charges and convictions,3% (n = 7) of the study sample recidivated with a violent and/or sex offense, 3.9% (n = 9) with ahands-off sex offense and 0.8% (n = 2) with a hands-on sex offense. CONCLUSION:Consuming child pornography alone is not a risk factor for committing hands-on sex offenses -at least not for those subjects who had never committed a hands-on sex offense. The majority ofthe investigated consumers had no previous convictions for hands-on sex offenses. For thoseoffenders, the prognosis for hands-on sex offenses, as well as for recidivism with childpornography, is favorable.Pedophiles in Wonderland: Censoring the Sinful in Cyberspace.Russell, Gabrielle.Journal of Criminal Law and Criminology, vol. 98, no. 4, pp. 1467-1500, Summer 2008.Abstract: This article describes the constitutional problems with legally proscribing virtual ageplay under either child pornography or obscenity law. Second Life is a popular virtual worldcreated by Linden Research, Incorporated. While there are many kinds of virtual environments,many of which are text-based, massively multiplayer online game (MMOG) environments arethe most real-world environments, in appearance and in the way that users can interact with theirsurroundings and with each other. A user navigates through these virtual worlds as an avatar thata user can design to look like anything, including a child; avatars are free to do whatever theircreators please including having sex. While some adults design avatars that look like monsters orcelebrities, others prefer to adopt a childlike appearance. Some adults also favor less sociallyacceptable activities and use their young counterparts for virtual age play or sexual role playoccurring in a virtual world where one avatar appears to be a child and the other an adult; thistheme has become a very popular and newsworthy online pastime. This article begins with anexplanation of virtual age play and an overview of the laws that bear on its legal standing,followed by a discussion of why regulation of such activity under child pornography law isinappropriate. The article concludes by exploring the potential regulation of virtual age playunder obscenity law, ultimately rejecting that strategy as an unconstitutional restriction of freespeech and individual liberty. This article notes that not only is there no proof that the man whois stimulated by cybersex with a virtual child is any more likely to seek our real sex with a realchild but that there may be some therapeutic value in indulging such fantasies.Pornography Use And Sexual Aggression: The Impact Of Frequency And Type Of PornographyUse On Recidivism Among Sexual Offenders.Kingston, Drew A.; Fedoroff, Paul; Firestone, Philip; Curry, Susan; Bradford, John M.Aggressive Behavior, Jul/Aug2008, Vol. 34, Issue 4, p341-351, 11p.Abstract: In this study, we examined the unique contribution of pornography consumption to thelongitudinal prediction of criminal recidivism in a sample of 341 child molesters. We specificallytested the hypothesis, based on predictions informed by the confluence model of sexualaggression that pornography will be a risk factor for recidivism only for those individualsclassified as relatively high risk for re-offending. Pornography use (frequency and type) wasassessed through self-report and recidivism was measured using data from a national databasefrom the Royal Canadian Mounted Police. Indices of recidivism, which were assessed up to 15years after release, included an overall criminal recidivism index, as well as subcategoriesF-32

focusing on violent (including sexual) recidivism and sexual recidivism alone. Results for bothfrequency and type of pornography use were generally consistent with our predictions. Mostimportantly, after controlling for general and specific risk factors for sexual aggression,pornography added significantly to the prediction of recidivism. Statistical interactions indicatedthat frequency of pornography use was primarily a risk factor for higher-risk offenders, whencompared with lower-risk offenders, and that content of pornography (i.e., pornographycontaining deviant content) was a risk factor for all groups. The importance of conceptualizingparticular risk factors (e.g., pornography), within the context of other individual characteristics isdiscussed.The Internet and Child Sexual Offending: A Criminological Review.Beech, Anthony R; Elliott, Ian A; Birgden, Astrid; Findlater, Donald.Aggression and Violent Behavior, vol. 13, no. 3, pp. 216-228, June-July 2008.Abstract: This paper outlines the current literature on what is known about the processes bywhich individuals utilize the Internet for child sexual abuse. First, three ways in which theInternet is utilized are outlined: (1) by dissemination of sexually abusive images of children forpersonal and/or commercial reasons; (2) by communication with other individuals with a sexualinterest in children: and (3) by maintaining and developing online pedophilic networks. Second,content and availability of abusive images are described, and the difficulties faced by criminaljustice agencies in both the definition of abusive images and their prohibition is discussed. Third,the potential for offenders to 'cross-over' from online offenses to contact sexual victimization ofchildren is examined and placed within a context of various Internet offender typologies thathave been developed. Finally, implications of this body of research for law and public policy areconsidered."In My Own World": A Case Study of a Paedophile's Thinking and Doing and His Use of theInternet.Wilson, David; Jones, Timothy.Howard Journal of Criminal Justice, vol. 47, no. 2, pp. 107 - 120, May 2008.Abstract: This case study of a convicted pedophile ("James") in England focuses on the linksbetween his "thinking and doing," i.e., the interaction of his fantasy life, his use of the Internet,and his contact offenses against children. For James, his thoughts, sexual desires, impulses, andfantasies were objectified and reinforced by pornographic images and videos viewed on theInternet, which were acted out in sexual contact with children. Thus, he was unrestrained inbringing his thinking, fantasizing, and visualization into the real world of sexual contact withchildren. The authors note that the proposed model drawn from James' case study does notsuggest that every individual who has fantasies of unlawful or deviant sexual acts will inevitablyact on them in the real world. For most who engage in such fantasies, they coexist with aconscience conditioned by societal norms, empathy, and histories of conditioned normativebehaviors aimed at doing no harm to others in the real world of consensual intimate sexualinteractions. The danger comes when individuals, like James, with deviant sexual fantasies donot have a coexisting powerful reservoir of restraints based in social and genetic conditions thatkeep "thinking" from becoming "doing." The case study of James derived from access granted toa convicted pedophile serving his sentence at HMP Grendon, a facility unique in the penalsystem of England and Wales in its operation as a therapeutic community. James wasF-33

focusing on violent (including sexual) recidivism <strong>and</strong> sexual recidivism alone. Results <strong>for</strong> bothfrequency <strong>and</strong> type of pornography use were generally consistent with our predictions. Mostimportantly, after controlling <strong>for</strong> general <strong>and</strong> specific risk factors <strong>for</strong> sexual aggression,pornography added significantly to the prediction of recidivism. Statistical interactions indicatedthat frequency of pornography use was primarily a risk factor <strong>for</strong> higher-risk offenders, whencompared with lower-risk offenders, <strong>and</strong> that content of pornography (i.e., pornographycontaining deviant content) was a risk factor <strong>for</strong> all groups. <strong>The</strong> importance of conceptualizingparticular risk factors (e.g., pornography), within the context of other individual characteristics isdiscussed.<strong>The</strong> Internet <strong>and</strong> <strong>Child</strong> Sexual Offending: A Criminological Review.Beech, Anthony R; Elliott, Ian A; Birgden, Astrid; Findlater, Donald.Aggression <strong>and</strong> Violent Behavior, vol. 13, no. 3, pp. 216-228, June-July 2008.Abstract: This paper outlines the current literature on what is known about the processes bywhich individuals utilize the Internet <strong>for</strong> child sexual abuse. First, three ways in which theInternet is utilized are outlined: (1) by dissemination of sexually abusive images of children <strong>for</strong>personal <strong>and</strong>/or commercial reasons; (2) by communication with other individuals with a sexualinterest in children: <strong>and</strong> (3) by maintaining <strong>and</strong> developing online pedophilic networks. Second,content <strong>and</strong> availability of abusive images are described, <strong>and</strong> the difficulties faced by criminaljustice agencies in both the definition of abusive images <strong>and</strong> their prohibition is discussed. Third,the potential <strong>for</strong> offenders to 'cross-over' from online offenses to contact sexual victimization ofchildren is examined <strong>and</strong> placed within a context of various Internet offender typologies thathave been developed. Finally, implications of this body of research <strong>for</strong> law <strong>and</strong> public policy areconsidered."In My Own World": A Case Study of a Paedophile's Thinking <strong>and</strong> Doing <strong>and</strong> His Use of theInternet.Wilson, David; Jones, Timothy.Howard Journal of Criminal Justice, vol. 47, no. 2, pp. 107 - 120, May 2008.Abstract: This case study of a convicted pedophile ("James") in Engl<strong>and</strong> focuses on the linksbetween his "thinking <strong>and</strong> doing," i.e., the interaction of his fantasy life, his use of the Internet,<strong>and</strong> his contact offenses against children. For James, his thoughts, sexual desires, impulses, <strong>and</strong>fantasies were objectified <strong>and</strong> rein<strong>for</strong>ced by pornographic images <strong>and</strong> videos viewed on theInternet, which were acted out in sexual contact with children. Thus, he was unrestrained inbringing his thinking, fantasizing, <strong>and</strong> visualization into the real world of sexual contact withchildren. <strong>The</strong> authors note that the proposed model drawn from James' case study does notsuggest that every individual who has fantasies of unlawful or deviant sexual acts will inevitablyact on them in the real world. For most who engage in such fantasies, they coexist with aconscience conditioned by societal norms, empathy, <strong>and</strong> histories of conditioned normativebehaviors aimed at doing no harm to others in the real world of consensual intimate sexualinteractions. <strong>The</strong> danger comes when individuals, like James, with deviant sexual fantasies donot have a coexisting powerful reservoir of restraints based in social <strong>and</strong> genetic conditions thatkeep "thinking" from becoming "doing." <strong>The</strong> case study of James derived from access granted toa convicted pedophile serving his sentence at HMP Grendon, a facility unique in the penalsystem of Engl<strong>and</strong> <strong>and</strong> Wales in its operation as a therapeutic community. James wasF-33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!