13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

States Postal Inspection Service, 80 percent of child pornography purchasers are active abusers<strong>and</strong> almost 40 percent of the child pornographers investigated during the past several years havesexually molested children in the past. Moreover, a study completed in 2000 by the Director ofthe Sex Offender Treatment Program at the Butner Federal Correctional Complex in NorthCarolina revealed that of 54 inmates convicted of child pornography offenses, 79.6% of themadmitted that they had also molested significant numbers of children. <strong>Child</strong> sexual abusersfrequently use pornographic images to groom child victims prior to committing sexual abuse.Repeated exposure to pornographic images involving children serves to normalize child sexualabuse <strong>and</strong> desensitize the child to such behaviors. Evidence gathered from law en<strong>for</strong>cementinvestigations has indicated that offenders who have collections of child pornography are oftenalso actively engaged in child sexual abuse with the children depicted in the pictures. As such, itis clear that owning <strong>and</strong> viewing child pornographic pictures extends beyond merely looking atpictures <strong>and</strong> most often involves the actual sexual abuse of children in the past, present, <strong>and</strong>future of the offender. <strong>The</strong>re<strong>for</strong>e, perpetrators who possess child pornography should bevigilantly pursued by law en<strong>for</strong>cement as likely child sexual abusers.<strong>The</strong> Internet <strong>and</strong> Family <strong>and</strong> Acquaintance Sexual Abuse.Mitchell, Kimberly J.; Finkelhor, David; Wolak, Janis.<strong>Child</strong> Maltreatment, vol. 10, no. 1, pp. 49-60, Feb 2005.Abstract: This article explores the dynamics of cases involving family <strong>and</strong> acquaintance sexualoffenders who used the Internet to commit sex crimes against minors. Although the stereotype ofInternet crimes involves unknown adults meeting juvenile victims online, Internet use can alsoplay a role in sexual crimes against minors by family members <strong>and</strong> acquaintances. Data werecollected from a national sample of law en<strong>for</strong>cement agencies about arrests <strong>for</strong> Internet-relatedsex crimes against minors. Family <strong>and</strong> acquaintance offenders were nearly as numerous asoffenders who used the Internet to meet victims online. <strong>The</strong>y used the Internet in various ways tofurther their crimes including as a tool to seduce or groom, store or disseminate sexual images ofvictims, arrange meetings <strong>and</strong> communicate, reward victims, or advertise or sell victims.<strong>Prevention</strong> messages <strong>and</strong> investigation approaches should be revised to incorporate awareness ofsuch cases <strong>and</strong> their dynamics.Commercial And Sexual <strong>Exploitation</strong> Of of <strong>Child</strong>ren And Young People(CSEC) in the UK—AReview.Chase, Elaine; Statham, June.<strong>Child</strong> Abuse Review, Jan/Feb2005, Vol. 14 Issue 1, p4-25, 22p.Abstract: This paper reviews recent in<strong>for</strong>mation <strong>and</strong> data relevant to the commercial sexualexploitation of children <strong>and</strong> young people in the UK. Three main aspects of exploitation areaddressed: abuse through prostitution; abuse through pornography; <strong>and</strong> the trafficking ofchildren <strong>and</strong> young people to <strong>and</strong> through the UK <strong>for</strong> the purposes of commercial sexualexploitation. Most published research in this area relates to young people exploited throughprostitution. <strong>The</strong> review explores the range of vulnerability factors, the processes used to engageyoung people in prostitution <strong>and</strong> the types of support strategies <strong>for</strong> those being exploited. Ratherless in<strong>for</strong>mation is currently available on the scale of child pornography, or the links between theuse of pornography <strong>and</strong> other <strong>for</strong>ms of sexual abuse. <strong>The</strong> internet as a modern technology <strong>for</strong>proliferating child pornography is discussed, alongside its role in providing opportunities <strong>for</strong>paedophiles to access <strong>and</strong> ‘groom’ children <strong>for</strong> sexual purposes. Finally, the review provides aF-39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!