1 / 29

Online Predators and the Dissemination of Child Pornography

Online Predators and the Dissemination of Child Pornography. The Chronology of Child Pornography. 1990: Technology advances -- such as digital cameras -- result in a literal explosion of child pornography images. 2000: Sales of child pornography is now a global cottage industry.

yaron
Download Presentation

Online Predators and the Dissemination of Child Pornography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Online Predators and the Dissemination of Child Pornography

  2. The Chronology of Child Pornography 1990: Technology advances -- such as digital cameras -- result in a literal explosion of child pornography images 2000: Sales of child pornography is now a global cottage industry 1970: Mostly photographic images 1980: Increased use of video cameras

  3. SEX OFFENDERS AND THE INTERNET • INSTANT ACCESS TO THE INTERNET OR HUNTING GROUNDS • OPEN DISCUSSION BETWEEN LIKE MINDED PEOPLE • MUTUAL SUPPORT WITH OTHERS WITH LIKE AFFLICTIONS • SHARED IDEAS OF HOW AND WHEN • DISGUISED IDENTITIES (CLOAK OF ANONYMITY) • READILY ACCESSIBLE VICTIMS • MEANS TO IDENTIFY (TRACING YOUR VICTIM) • LONG-TERM RELATIONSHIPS

  4. AVERAGE CHILD SEX OFFENDER WILL.. COMMIT ONE HUNDRED AND SEVENTEEN ACTS OF MOLESTATION BEFORE BEING REPORTED TO THE AUTHORITIES EIGHTY PERCENT OF THESE OFFENDERS FALL WITHIN NORMAL INTELLIGENCE RANGES FIFTY-NINE PERCENT GAIN SEXUAL ACCESS TO THEIR VICTIMS THROUGH SEDUCTION OR ENTICEMENT

  5. 1501 youth ages 10 – 17 were surveyed 1 in 5 (19%) received unwanted sexual solicitation 5 % received distressing sexual solicitation 3% received aggressive solicitation involving offline contact Of the surveyed youth 1/3 were male 2/3 were female 77% of those contacted were 14 – 17 and 23% were 10 – 13 The younger group reported 37 % of the distressing solicitations Highlights of theYouth Internet Safety Survey • 95% of the solicitors were strangers • 2/3 of all solicitations were made by males • 70% of the solicitations happened in the child’s home, the other 30% happened at a friends home • 75% of the contacts were described as not distressing. 25% were described as distressing or extremely frightening • 24% of the incidents were reported to the parents • More than 1/3 of the distressing complaints went unreported

  6. CLASSIC PROFILE OF A PREDATOR • LOW SELF ESTEEM • LITTLE EXPERIENCE WITH WOMEN • TREMENDOUS SENSE OF INADEQUACEY • THINKS NO ONE CARES ABOUT THEM • FEELS SOCIALY INCOMPETENT • BELIEVES OTHERS WILL REJECT THEM • OFFENDERS AGE RANGE 18-35

  7. PROFILE OF AN INTERNET PREDATOR • MARRIED WITH ADULT CHILDREN (THE “NORMAL” NEIGHBOR) • SUCCESSFUL CAREER-UPPER MANAGEMENT • COLLEGE GRADUATE (POST GRADUATE DEGREE) • UPPER MIDDLE CLASS LIFESTYLE • OFFENDER AGE RANGE 35 AND OLDER

  8. PROFILE OF AN INTERNET VICTIM • LOW SELF ESTEEM • LIMITED SOCIAL SKILLS/SUPPORT GROUP • UNDER-ACHIEVER WITH BETTER THAN AVERAGE COMPUTER SKILLS • INTACT FAMILY • PRIVATE COMPUTER USE • MIDDLE TO UPPER CLASS LIFESTYLE • VULNERABILITY

  9. Case Study

  10. Case Example Cops: Teen Girl Lured on Internet, KilledAP Christina Long Tuesday, May 21, 2002 A pretty Connecticut cheerleader who mysteriously vanished last week was found strangled in a Greenwich ravine yesterday -- and her cyber-suitor has confessed to her sickening murder, cops said. "She was really obsessed with computers," best pal Thamiris Silva said. "That's what got her into trouble ... computers." When her aunt went to retrieve her, Christina didn't show up. Reilly called cops and begged neighbors for any information on the girl's whereabouts -- to no avail. After an intense manhunt, local cops and FBI agents began focusing on the teen's bedroom computer, where they discovered provocative messages from Dos Reis, cops said. Pals said Christina spent hours on the computer and often spoke of teen boys she'd met online.

  11. Preferential Child Molester/Child Pornographer Adult photos are sent and received Child photos are sent and received Child sexual contact is desired and sought Closet Predator dangerous Law Enforcement Fantasies are had while viewing children engaged in sexual activity or in sexually suggestive poses both clothed and not clothed. Galleries are still exciting. Receive sexual gratification from actual physical contact with children and from

  12. What happens when Predators are released Continuous and Ongoing Monitoring Long TermTreatment High Rates ofRecidivism RelapsePrevention The Predators Future

  13. A possible scenario for abduction

  14. Lurk in the chat rooms that the kids hangout in Find a child that is vulnerable: Child that is a latchkey kid Child that has private access to the computer Child that has computer illiterate parents Child that is exploring the darker side of the web Child who is fighting authority in the household Talk to the child. At first I may appear to be another child Gain the confidence of the child and begin the grooming process Start chipping away at the parental authority Begin the grooming process to make the child want to leave Phase 1

  15. I will have to identify the child as best as possible Questions will be asked in different ways looking for the same answers Questions like: Where are you from What's the school mascot Do you live near a Wal-Mart Do you live near a McDonalds Once the questions have been asked and basic Intel has been gathered, the Predator will start narrowing down the geographic location of the child Going to the school website Calling the school asking for or about the child Looking the locations of Wal-Mart and McDonalds up on the net Looking for other landmarks in the area that I could use to pinpoint the child’s location. Reverse tracing the IP address to se if it is coming from a local node Phase 2

  16. Once I have obtained all the info I need to identify the child and the child’s location I can start the abduction plan Continue to chat with the child at the same time everyday make a routine The predator can then pack up a laptop and move into a motel/hotel locally The predator continues to talk to the child. The child receives no special warnings letting them know the predator is near The predator observes the child watching the routes they take home from school The predator chooses a spot that is best for an abduction and waits The unsuspecting child comes along, is lured to the car and abducted The child is a latchkey kid who gets home at 1530. The parents arrive home at 1730, how far can I go with that child in two hours Phase 3

  17. How far can I go in 2 Hours Hillsboro San Antonio Huntsville Many other places

  18. Galleries or Precursors TeenSuicide AIDS Free Speech

  19. ELEMENTS • AGE OF THE CHILD • Does it really matter what the actual age of the child is according to the law? • Can just the appearance of a child can qualify the picture for child pornography • ILLEGAL OR LEWD DISPLAY • The display must meet certain criteria. Is it lewd, does the image portray sexually explicit conduct

  20. 18 US Code Sec 2552A: Material Constituting or Containing Child Pornography Possession, manufacture, transportation, or distribution of ONE or more books, magazines, periodicals, films, video tapes, computer disk, or other visual depiction of a minor engaging in sexually explicit conduct Including by means of a COMPUTER ELEMENTS

  21. Texas Penal Code; Title 9, Chapter 43 (1) a child[0] younger than 18 years of age at the time the image of the child[0] was made; (2) an image that to a reasonable person would be virtually indistinguishable from the image of a child[0] younger than 18 years of age; or (3) an image created, adapted, or modified to be the image of an identifiable child[0]. (i) In this section, "identifiable child[0]" means a person, recognizable as an actual person by the person's face, likeness, or other distinguishing characteristic, such as a unique birthmark or other recognizable feature: (1) who was younger than 18 years of age at the time the visual depiction was created, adapted, or modified; or (2) whose image as a person younger than 18 years of age was used in creating, adapting, or modifying the visual depiction. ELEMENTS

  22. ART OR PORN This depicts a child posed and photographed. Does this meet the elements for lewd behavior, does it show a Sexually Explicit Act The Smithsonian InstituteJuly 2001 Children of Summer Exhibit

  23. TRADITIONAL PARK SETTING

  24. Hunting Grounds Simply go to any search engine and type inpre teen chatroom

  25. VIRTUAL PARK JOHN13/MJacksonville JUDY14/FMinneapolis SALLY13/FLouisville CINDY/LARRY13/F/50/MPittsburgh MSN CHAT Johnny13/MSan Jose JUDY15/FNew Haven MATT13/MMadison JOAN12/FLas Vegas

  26. Their not talking about Pokemon here HOTNHARD

  27. CHATROOM LINGO ASL AGESEXLOCATION Do you want to CYBER –Do I want to have internet sex

  28. INFO ON OUR FREIND In most if not all webchats a tab is provided to show the network that the other person is coming from. If we can see them then they can see us

  29. SUMMARY During the last block of instruction we covered the following topics: • What is a Predator • Where do the Predators hunt • The law on Child Pornography • How to be proactive

More Related