13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

pedophile's goal is to obtain a child's trust through an escalation of attention intended to result inthe seduction of a child into sexual acts through a face-to-face meeting. <strong>The</strong> predator can claimto be of the same sex as an intended victim in order to gain the potential victim's trust. Similarly,by pretending to be in the same age group, an unsuspecting child will consider the pedophile apeer. As conversations develop, a pedophile in<strong>for</strong>ms the child that he shares similar interests <strong>and</strong>common experiences. This paper summarizes four cases in which such a model of seduction wasused on the Internet. Under the direct sexual model, a pedophile uses Internet communications intaking a relatively short time to introduce the subject of sex with a potential victim. <strong>The</strong>re maybe a trade of images of child or adult pornography. Pedophiles use Internet bulletin boards totrade child pornography or to obtain lists of children who have had a prior association withpedophiles. As in the trust-based model, the ultimate goal is usually to arrange a meeting inperson. Two cases of this type of use of the Internet are presented. If parents observe disturbingchanges in their child's behavior, they may seek the assistance of a child psychologist orpsychiatrist.: A mental health professional who is sufficiently in<strong>for</strong>med about the Internetexploitation of children may detect victimization from subtle clues. Also, an awareness of thephenomenon of "cyberstalking" <strong>and</strong> pedophilia on the Internet can facilitate a thoroughevaluation of a pedophile in a <strong>for</strong>ensic setting. Further, government intervention can help preventchild sexual exploitation through the Internet. <strong>The</strong> Federal Trade Commission is currentlyseeking legislation that requires Internet companies to get parental consent be<strong>for</strong>e permittingchildren under the age of 13 to enter Internet sites that solicit addresses, phone numbers, <strong>and</strong>personal in<strong>for</strong>mation. In addition, the FBI is involved in training State <strong>and</strong> local law en<strong>for</strong>cementofficials in how to establish cyber police units to patrol the Internet. <strong>The</strong> <strong>National</strong> Center <strong>for</strong>Missing & Exploited <strong>Child</strong>ren has established a "cyber-tipline" <strong>for</strong> the public to use in reportingany suspicious or illicit activity that involves children on the Internet. 12 references.<strong>Child</strong> Pornography And <strong>The</strong> Internet: Perpetuating A Cycle Of Abuse.Quayle, Ethel; Taylor, Max.Deviant Behavior, Jul2002, Vol. 23 Issue 4, p331-361, 31p.Abstract: Thirteen men convicted of downloading child pornography were interviewed with aview to underst<strong>and</strong>ing how these men talked about the photographs <strong>and</strong> the function such talkplayed in their accounts. <strong>The</strong> interviews were in<strong>for</strong>med by earlier work with defended subjects<strong>and</strong> were analyzed within a discursive framework. Quotations are used from the interviews toillustrate the analysis. Six principal discourses emerged within these accounts in relation to childpornography: sexual arousal; as collectibles; facilitating social relationships; as a way ofavoiding real life; as therapy; <strong>and</strong> in relation to the Internet. <strong>The</strong>se are discussed in the context ofprevious research. <strong>The</strong> analysis illustrates the important role that the Internet plays in increasingsexual arousal to child pornography <strong>and</strong> highlights individual differences in whether this servesas a substitute or as a blueprint <strong>for</strong> contact offenses. It also draws our attention to the importantrole that community plays in the Internet <strong>and</strong> how collecting facilitates the objectification ofchildren <strong>and</strong> increases the likelihood that in the quest <strong>for</strong> new images children continue to besexually abused. Discourses focusing on both therapy <strong>and</strong> addiction serve to distance therespondent from personal agency <strong>and</strong> allow <strong>for</strong> continued engagement with child pornography.F-42

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!