The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction

dcf.state.fl.us
from dcf.state.fl.us More from this publisher
13.07.2015 Views

B. Online EnticementOnline offenders use the Internet to entice and manipulate children into situations in which theybecome vulnerable to sexual exploitation, particularly child pornography, sexual contact, andabduction. From 2004 through 2008, ICAC task force officers processed 20,562 documentedonline enticement complaints, including 7,879 documented complaints of suspectedtravelers 51 —aggressive and dangerous online child predators who travel to the location of a childfor the purpose of establishing physical contact. 52From 2004 through 2008, ICAC task force officers processed 20,562documented online enticement complaints, including 7,879 documentedcomplaints of suspected travelers 1 —aggressive and dangerous online childpredators who travel to the location of a child for the purpose of establishingphysical contact.Online enticement can lead to offenders’ grooming victims to self-produce child pornography,which then becomes part of the child pornography market and forever harms the child. Recentcase examples have shown offenders using web cams to entice the minor to perform a sex act infront of the camera that he then records. Often, the offender will blackmail the minor intoengaging in these acts through threats to reveal a less explicit recorded image to friends andfamily. NCMEC data show that approximately 28 percent of identified child victims seen inchild pornography produced the images of themselves, whether by inducement or not, and thissegment of child pornography has been increasing. 53In addition, another possible consequence of online enticement is abduction. According toNational Incidence Studies on Missing, Abducted, Runaway and Throwaway Children, theprimary motive in non-family abductions is sexual. Since the inception of the Child AbductionRapid Deployment (CARD) teams in October 2005, the FBI has developed 10 CARD teams tocombat this risk by aiding state and local law enforcement in child abduction investigations. 64percent of non-family abduction deployments have resulted in the child victim being sexuallyvictimized by their abductor. Moreover, in 36 percent of non-family abductions, the child victimwas murdered by their abductor.51 For Department reporting purposes, a traveler investigation involves the transportation of at least one individualfor the purpose of sexual conduct with a minor.52 Travelers meet specific children for the purpose of engaging in illegal sexual conduct. Children who makecontact with such predators are at great risk of kidnapping, rape, torture, or murder. These predators may travelwithin a state or region, across the country, or even internationally to meet a potential victim. They also may arrangefor a victim to travel to meet them.53See Appendix D, NCMEC.29

1. Online enticement complaints are increasing, drawing more law enforcementresources into complex and time-consuming investigations.Children are increasingly targeted for sexual exploitation by individuals who monitor Internetforums for potential victims. From 2004 through 2008 there were sharp increases in the numberof online enticement incidents reported to the NCMEC CyberTipline 54 and the number ofdocumented enticement complaints processed by ICAC investigators. 55 However, there is noactual measurement of online enticement. NCMEC acknowledges that increased publicawareness has contributed to the increased number of incidents reported to the CyberTipline.Still, recent publicity has highlighted the fact that two prominent social networking sites had todelete the accounts of thousands of registered sex offenders using their sites.Investigating the rising number of online enticement complaints poses a relatively new strain onlaw enforcement resources because online enticement cases require specialized technical trainingfor investigators, coordination with Internet providers, and, often, the support of computerforensic examiners to recover digital evidence from computers and other electronic storagedevices. Depending on the technical ability of the offender and the complexity of the case, childsexual exploitation investigations involving computer forensic evidence may be resolved in afew days or take years. Officers pursuing individual online predator suspects may monitor asuspect’s Internet activity across several online forums, aliases, and communication devices.2. Online predators demonstrate great patience in manipulating children intovulnerable situations.Online predators gradually manipulate or “groom” children until they voluntarily provide sexualimages online or agree to meetpredators for sex. Grooming is the Video Game Chatpsychological process predators In January 2008, a 27-year-old Missouri man allegedlyalways have used to encourage traveled to California to meet a 15-year-old girl with thechildren to engage in sexual activity,intention of engaging in sex. He initially made contactwith the girl while playing video games on the Internetbut it is now being applied to onlineand developed the relationship by using social networkingenticement. 56 Grooming typicallysites, text messaging, and a cell phone he sent to her as abegins with the selection of a child birthday present. He was charged with using interstatewho exhibits desired behaviors or commerce to entice or coerce a minor to engage in sexualpsychological characteristics such as activity and traveling in interstate commerce to engage inlow self-esteem or family problems. illicit sexual activity.The victim frequently is shownincreasing levels of attention,Source: ICE, News Release, “Missouri Man Charged withaffection, empathy, and generosity. Traveling to California to Engage in Sex with Minor He Met onXbox LIVE,” February 6, 2009.Online predators often relate tochildren through mastering music,54 See Appendix D, Figure 4.55 See Appendix D, Figure 7.56 Enticement is the unlawful solicitation of a minor by any means for unlawful sexual conduct, according to the Department, Office of Juvenile Justice Programs. 30

B. Online EnticementOnline offenders use the Internet to entice <strong>and</strong> manipulate children into situations in which theybecome vulnerable to sexual exploitation, particularly child pornography, sexual contact, <strong>and</strong>abduction. From 2004 through 2008, ICAC task <strong>for</strong>ce officers processed 20,562 documentedonline enticement complaints, including 7,879 documented complaints of suspectedtravelers 51 —aggressive <strong>and</strong> dangerous online child predators who travel to the location of a child<strong>for</strong> the purpose of establishing physical contact. 52From 2004 through 2008, ICAC task <strong>for</strong>ce officers processed 20,562documented online enticement complaints, including 7,879 documentedcomplaints of suspected travelers 1 —aggressive <strong>and</strong> dangerous online childpredators who travel to the location of a child <strong>for</strong> the purpose of establishingphysical contact.Online enticement can lead to offenders’ grooming victims to self-produce child pornography,which then becomes part of the child pornography market <strong>and</strong> <strong>for</strong>ever harms the child. Recentcase examples have shown offenders using web cams to entice the minor to per<strong>for</strong>m a sex act infront of the camera that he then records. Often, the offender will blackmail the minor intoengaging in these acts through threats to reveal a less explicit recorded image to friends <strong>and</strong>family. NCMEC data show that approximately 28 percent of identified child victims seen inchild pornography produced the images of themselves, whether by inducement or not, <strong>and</strong> thissegment of child pornography has been increasing. 53In addition, another possible consequence of online enticement is abduction. According to<strong>National</strong> Incidence Studies on Missing, Abducted, Runaway <strong>and</strong> Throwaway <strong>Child</strong>ren, theprimary motive in non-family abductions is sexual. Since the inception of the <strong>Child</strong> AbductionRapid Deployment (CARD) teams in October 2005, the FBI has developed 10 CARD teams tocombat this risk by aiding state <strong>and</strong> local law en<strong>for</strong>cement in child abduction investigations. 64percent of non-family abduction deployments have resulted in the child victim being sexuallyvictimized by their abductor. Moreover, in 36 percent of non-family abductions, the child victimwas murdered by their abductor.51 For Department reporting purposes, a traveler investigation involves the transportation of at least one individual<strong>for</strong> the purpose of sexual conduct with a minor.52 Travelers meet specific children <strong>for</strong> the purpose of engaging in illegal sexual conduct. <strong>Child</strong>ren who makecontact with such predators are at great risk of kidnapping, rape, torture, or murder. <strong>The</strong>se predators may travelwithin a state or region, across the country, or even internationally to meet a potential victim. <strong>The</strong>y also may arrange<strong>for</strong> a victim to travel to meet them.53See Appendix D, NCMEC.29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!