Online predator

Last updated
A West Midlands Police poster informing children about how to respond to online predators West Midlands Police.png
A West Midlands Police poster informing children about how to respond to online predators

Online predators are individuals who commit child sexual abuse that begins or takes place on the Internet.

Contents

Conceptions

Internet-facilitated crimes against minors involve deceit and begin with adults communicating with children over the Internet with the goal of coercing them into illegal sexual activity. Sometimes the sexual abuse happens face to face. [1] [2]

Chat rooms, instant messaging, Internet forums, social networking sites, cell phones, and even video game consoles have issues with online predations. [3] [4] [5] [6] These online areas attract predators because they allow them to have access to make contact with victims without drawing attention. [7] In addition, there is insufficient reliable data concerning the number of minors sharing personal information online due to children's privacy issues. [8] Also, the anonymity of online conversations leads to the disinhibition of minors, making them feel more comfortable and more likely to engage in risky behaviors. [9] This allows predators to use manipulation to put their targets into situations where they will comply with the predator's sexual demands. Initial manipulation often involves introducing the minors to sexual activity, showing them pornography, and requesting sexually explicit information and pictures. [10] This online predatory behavior does not often lead to actual or attempted offline contact, [7] but it could.

Even though it is the mainstream view that predators will use distinct tactics to meet victims, most actual in-person meetings do not involve any deception. In fact, the minors are usually complicit with perpetrators often using promises of love and romance to seduce victims to meet. [11]

Laws

In Australia, the murder of Carly Ryan in February 2007 led to public opinion pressure which eventually resulted in nationwide legal changes, nicknamed "Carly's Law", being made in 2017 to help protect minors online. [12] Ryan, aged 15, was a victim of online grooming and predatory behaviour, which was considered unique at the time, given that Ryan was the first person in Australia killed by an online predator. [13] [14]

In the U.S., some risks involving online predatory behavior are addressed by the Children's Internet Protection Act, which was passed in 2000. [15] This law required schools and libraries to install filtering and blocking software, to keep students away from obscene and harmful materials and individuals online. [16] A bill called HR 5319 or the "Deleting Online Predators Act of 2006" (DOPA) was later introduced, intensifying the provisions of CIPA. [17] As of 2007, the bill was effectively defeated. [18]

Some individuals have also initiated actions against laws designed to protect children. Doe v. Shurtleff , 628 F.3d 1217 (10th Cir. 2010), was a United States Court of Appeals for the Tenth Circuit case assessing the constitutionality of Utah Code Ann. § 77-27-21.5, a law that requires sex offenders to register their internet identifiers with the state in order to "assist in investigating kidnapping and sex-related crimes, and in apprehending offenders". [19] [20] In this case, a convicted sex offender, appearing anonymously as John Doe, appealed a decision Archived 2014-01-04 at the Wayback Machine by the U.S. District Court for the District of Utah to vacate an order enjoining the enforcement of Utah Code Ann. § 77-27-21.5.

Criticism

Cases involving stalking, violence, abduction, rape and/or murder are very rare. Most online sex offenders are young adults who target teens and seduce victims into sexual relationships. They take time to develop the trust and confidence of teens, so the teens see these relationships as romances or sexual adventures. Nearly 75 percent of victims who met offenders face-to-face did so more than once. Most of these offenders are charged with crimes such as statutory rape for non-forcible sexual contact as the victims are, by law, too young to consent. The youth most vulnerable to online sex offenders often have histories of sexual or physical abuse, family problems, and tendencies to take risks both on- and offline.[ citation needed ] A 2007 study found no cases of minors being targeted by Internet predators on the basis of information they had posted on social media. The research that concluded the statistic that "1 in 5 children are sexually solicited online" [21] is being questioned. [22]

See also

Related Research Articles

Child sex tourism (CST) is tourism for the purpose of engaging in the prostitution of children, which is commercially facilitated child sexual abuse. The definition of child in the United Nations Convention on the Rights of the Child is "every human being below the age of 18 years". Child sex tourism results in both mental and physical consequences for the exploited children, which may include sexually transmitted infections, "drug addiction, pregnancy, malnutrition, social ostracism, and death", according to the State Department of the United States. Child sex tourism, part of the multibillion-dollar global sex tourism industry, is a form of child prostitution within the wider issue of commercial sexual exploitation of children. Child sex tourism victimizes approximately 2 million children around the world. The children who perform as prostitutes in the child sex tourism trade often have been lured or abducted into sexual slavery.

Operation Predator is an initiative started on July 9, 2003 by U.S. Immigration and Customs Enforcement (ICE), a division of the Department of Homeland Security, to protect children from sexual predators.

Sexual grooming is the action or behavior used to establish an emotional connection with a minor, and sometimes the child's family, to lower the child's inhibitions with the objective of sexual abuse. It can occur in various settings, including online, in person, and through other means of communication. Children who are groomed may experience mental health issues, including "anxiety, depression, post-traumatic stress, and suicidal thoughts."

<span class="mw-page-title-main">Commercial sexual exploitation of children</span> Commercial transaction that involves the sexual exploitation of a child

Commercial Sexual Exploitation of Children (CSEC) defines the “umbrella” of crimes and activities that involve inflicting sexual abuse on to a child as a financial or personal opportunity. Commercial Sexual Exploitation consists of forcing a child into prostitution, sex trafficking, early marriage, child sex tourism and any other venture of exploiting children into sexual activities. According to the Office of Juvenile Justice and Delinquency Prevention, the lack of reporting the crime and “the difficulties associated with identifying and measuring victims and perpetrators” has made it almost impossible to create a national estimate of the prevalence of Commercial Sexual Exploitation of Children in the United States. There is an estimated one million children that are exploited for commercial sex globally; of the one million children that are exploited, the majority are girls.

A sex offender is a person who has committed a sex crime. What constitutes a sex crime differs by culture and legal jurisdiction. The majority of convicted sex offenders have convictions for crimes of a sexual nature; however, some sex offenders have simply violated a law contained in a sexual category. Some of the serious crimes which usually result in a mandatory sex-offender classification are sexual assault, statutory rape, bestiality, child sexual abuse, incest, rape, and sexual imposition.

Sexual abuse or sex abuse, also referred to as molestation, is abusive sexual behavior by one person upon another. It is often perpetrated using force or by taking advantage of another. Molestation often refers to an instance of sexual assault against a small child, whereas sexual abuse is a term used for a persistent pattern of sexual assaults.

Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.

<span class="mw-page-title-main">Anti-pedophile activism</span> Form of activism

Anti-pedophile activism encompasses opposition to pedophiles, pedophile advocacy groups, child sexual abuse material, and child sexual abuse.

Task Force Argos is a branch of the Queensland Police Service, responsible for the investigation of online child exploitation and abuse. Founded in 1997, the unit's original charter was to investigate institutional child abuse allegations arising from the Forde Inquiry.

Laws against child sexual abuse vary by country based on the local definition of who a child is and what constitutes child sexual abuse. Most countries in the world employ some form of age of consent, with sexual contact with an underage person being criminally penalized. As the age of consent to sexual behaviour varies from country to country, so too do definitions of child sexual abuse. An adult's sexual intercourse with a minor below the legal age of consent may sometimes be referred to as statutory rape, based on the principle that any apparent consent by a minor could not be considered legal consent.

Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child, indecent exposure, child grooming, and child sexual exploitation, such as using a child to produce child pornography.

<span class="mw-page-title-main">Ages of consent in the United States</span> U.S. law on age of consent to sexual activity

In the United States, each state and territory sets the age of consent either by statute or the common law applies, and there are several federal statutes related to protecting minors from sexual predators. Depending on the jurisdiction, the legal age of consent is between 16 and 18. In some places, civil and criminal laws within the same state conflict with each other.

A range of research has been conducted examining the link between viewing child pornography and perpetration of child sexual abuse, and much disagreement persists regarding whether a causal connection has been established. Perspectives fall into one of three positions:

Sexting is sending, receiving, or forwarding sexually explicit messages, photographs, or videos, primarily between mobile phones. It may also include the use of a computer or any digital device. The term was first popularized early in the 21st century and is a portmanteau of sex and texting, where the latter is meant in the wide sense of sending a text possibly with images. Sexting is not an isolated phenomenon but one of many different types of sexual interaction in digital contexts that is related to sexual arousal.

Child pornography is erotic material that depicts persons under the age of 18. The precise characteristics of what constitutes child pornography varies by criminal jurisdiction.

Child sexual abuse laws in the United States have been enacted as part of the nation's child protection policies.

<span class="mw-page-title-main">Criminal Law (Sexual Offences and Related Matters) Amendment Act, 2007</span>

The Criminal Law Amendment Act, 2007 is an act of the Parliament of South Africa that reformed and codified the law relating to sex offences. It repealed various common law crimes and replaced them with statutory crimes defined on a gender-neutral basis. It expanded the definition of rape, previously limited to vaginal sex, to include all non-consensual penetration; and it equalised the age of consent for heterosexual and homosexual sex at 16. The act provides various services to the victims of sexual offences, including free post-exposure prophylaxis for HIV, and the ability to obtain a court order to compel HIV testing of the alleged offender. It also created the National Register for Sex Offenders, which records the details of those convicted of sexual offences against children or people who are mentally disabled.

Online child abuse is a unique form of child abuse also known as “Cyber Molestation” due to its virtual, distanced, and anonymous nature. Such abuse may not happen face-to-face, nor does it necessarily require physical contact. However, online abuse can result in negative face-to-face consequences in the form of statutory rape, forcible sexual assault, harassment, etc. In the United States, online child abuse is recognized as a form of child abuse by the National Society for the Prevention of Cruelty to Children.

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam or having victims use a digital program with varying kinds of data to output to customers.

<span class="mw-page-title-main">Sex sting</span> Type of sting operation

A sex sting is a type of sting operation where a person, usually a law enforcement officer, purports to be a child or teenager on the internet in order to engage in sexually explicit activities with an adult. The evidence of the interactions between the two parties is then collected by the undercover agent and used in criminal prosecutions.

References

  1. "Internet Safety: Keeping It Real". Oracle Thinkquest. Archived from the original on 2013-08-01. Retrieved 2012-12-23.
  2. "[CONTENT] - Parenting Tips". www.ahaparenting.com. Retrieved 12 October 2017.
  3. "Online Predators: Help minimize the risk". Microsoft Corporation. 24 September 2008.
  4. Williams, Pete (February 3, 2006). "MySpace, Facebook attract online predators". NBC News . Retrieved December 8, 2006.
  5. Burt, David (March 16, 2009). "Playstation Pedophiles". Filtering Facts. Archived from the original on 2009-04-05. Retrieved March 16, 2009. [G]aming consoles such as PlayStation, Wii, and Xbox have become Internet-enabled, interactive devices. This provides an opportunity for pedophiles to befriend and groom minors.
  6. "Dr. Phil.com". www.drphil.com. Retrieved 12 October 2017.
  7. 1 2 Wolak, Janis; Finkelhor, David (December 1, 2013). "Are Crimes by Online Predators Different From Crimes by Sex Offenders Who Know Youth In-Person?". Journal of Adolescent Health. 53 (6). San Diego, California: Society for Adolescent Health and Medicine: 736–741. doi: 10.1016/j.jadohealth.2013.06.010 . ISSN   1054-139X. PMID   23890773.
  8. Dobler, Elizabeth; Johnson, Denise; Wolsey, Thomas DeVere (January 23, 2017). Teaching the Language Arts: Forward Thinking in Today's Classrooms. Abingdon, England: Routledge. ISBN   9781351667050.
  9. Dombrowski, Stefan C.; Gischlar, Karen L.; Durst, Theo (May 1, 2007). "Safeguarding young people from cyber pornography and cyber sexual predation: a major dilemma of the internet". Child Abuse Review. 16 (3). Oxford, England: Wiley: 153–170. doi:10.1002/car.939. ISSN   1099-0852.
  10. Lanning, Kenneth (2005). "Compliant Child Victims: Confronting an Uncomfortable Reality". ASPAC Advisor: 14.
  11. Troup-Leasure, Karyl; Snyder, Howard N. (August 2005). "Statutory rape known to law enforcement". Juvenile Justice Bulletin. Washington, D.C.: Office of Juvenile Justice and Delinquency Prevention.
  12. "Criminal Code Amendment (Protecting Minors Online) Bill 2017". www.aph.gov.au. Retrieved 2018-08-23.
  13. "My little girl was killed by an internet predator". Australian Woman's Weekly . September 7, 2017. Retrieved August 23, 2018.
  14. "Case 91: Carly Ryan – Casefile: True Crime Podcast". Casefile: True Crime Podcast. August 4, 2018. Retrieved August 23, 2018.
  15. Spivet, Bonnie (2011). Avoiding Predators Online. New York City: The Rosen Publishing Group, Inc. p. 19. ISBN   9781448864119.
  16. "International Journal of Cyber Criminology- Catherine Marcum". www.cybercrimejournal.com. Retrieved 2019-05-22.
  17. Evans, Meryl (May 31, 2006). "The Pandora's Box of Social Networking". TechNewsWorld. Retrieved May 22, 2019.
  18. Essex, Don (Spring 2009). "From Deleting Online Predators to Educating Internet Users". Young Adult Library Services. 7 (3). Chicago, Illinois: Young Adult Library Services Association: 36–45.
  19. Doe v. Shurtleff , 628 F.3d 1217 (10th Cir.2010).
  20. "Utah Code Ann. § 77-27-21.5". Archived from the original on 28 December 2011. Retrieved 12 October 2017.
  21. "Pennsylvania attorney general: cybersafety" (PDF). Archived from the original (PDF) on 5 April 2014. Retrieved 12 October 2017.
  22. "Spreading "1 in 5" Number Does More Harm Than Good". Slashdot . February 26, 2008.