<<

Medical, Legal, & Social Science Aspects of Sexual Exploitation A Comprehensive Review of , , and Internet Crimes

G.W. Medical Publishing, Inc. St. Louis Medical, Legal, & Social Science Aspects of Child Sexual Exploitation A Comprehensive Review of Pornography, Prostitution, and Internet Crimes

Richard J. Estes, DSW, ACSW Sharon Cooper, MD, FAAP Angelo P. Giardino, MD, PhD, FAAP Professor Adjunct Associate Professor of Pediatrics Associate Chair – Pediatrics Chair, Concentration in Social and University of North Carolina School of Associate Physician-in Chief/ Economic Development Medicine Vice-President, Clinical Affairs Director, International Programs Chapel Hill, North Carolina St. Christopher’s Hospital for Children University of Pennsylvania School of Social Clinical Assistant Professor of Pediatrics Associate Professor in Pediatrics Work Uniformed Services University of Health Drexel University College of Medicine Philadelphia, Pennsylvania Sciences Adjunct Professor of Pediatric Nursing LaSalle Bethesda, Maryland University School of Nursing Victor I. Vieth, JD Chief , Developmental Pediatric Service Philadelphia, Pennsylvania Director Womack Army Medical Center APRI’s National Child Protection Training Fort Bragg, North Carolina Nancy D. Kellogg, MD Center Professor of Pediatrics Winona State University University of Texas Health Science Center at Winona, Minnesota San Antonio Medical Director Alamo Children’s Advocacy Center

G.W. Medical Publishing, Inc. St. Louis FOREWORD In my career as a prosecutor, and now a Congressman, I have seen tremendous im- provements in our nation’s response to cases of child maltreatment. In most commu- nities today, multidisciplinary teams work together for the benefit of children. Many elected district attorneys, sheriffs, and police chiefs have developed specialized units to respond to cases of child . Through the work of the American Prosecutors Research Institute’s National Center for Prosecution of Child Abuse, the National Child Protection Training Center at Winona State University, Fox Valley Technical College, the National Center for Missing & Exploited Children, and other federally funded programs, thousands of frontline professionals are trained annually in the art and science of handling child protection cases. Perhaps the most important development is the Children’s Advocacy Center program. Children’s Advocacy Centers (CACs) are child-friendly facilities where children can be interviewed sensitively and receive medical and psychological services. As a district attorney, I had the privilege of starting the nation’s first Children’s Advocacy Center. As a member of Congress, I championed support for the National Children’s Advo-cacy Center in Huntsville, Alabama, and the National Children’s Alliance, a coalition of CACs from across the nation that is headquartered in Washington, DC. Today there are hundreds of CACs in every part of our country. We can not, however, rest on our laurels. As detailed in the pages of this book, modern technology poses a new threat to our children. It is increasingly easy for perpetrators to exploit children through the Internet, to create and disseminate , and to solicit children for illicit purposes. The commercial exploitation of children is a global problem that impacts every community in the United States. Through the pioneering work of Dr. Richard Estes and other researchers, we know that hundreds of thousands of children are at risk of commercial exploitation. Although more research needs to be done, there is some evidence to suggest these children are just as likely to come from rural and suburban communities as urban centers. I commend GW Medical Publishing as well as the editors and contributors to this book for producing a treatise that addresses child sexual exploitation from every angle. I am particularly grateful to the survivors of child pornography, commercial exploitation, and online solicitation for sharing their pain with those of us who will read this book. I hope the courage of these survivors spurs all of us to do more to protect children. Finally, I want to commend the frontline investigators, prosecutors, medical and mental health professionals, and other child advocates who are in the trenches daily trying to spare children from every form of exploitation. You labor long hours for little pay or honor on behalf of someone else’s children. Please know that your selfless dedication is not unnoticed. Indeed, your heroism is an inspiration to us all.

Congressman Robert E. “Bud” Cramer, Jr. Member of the US House of Representatives (1991-present) Founder of the Children’s Advocacy Center movement

ix FOREWORD It is common to hear pronouncements from public figures that children are society’s most important and treasured assets. To an overwhelming majority, this concept is fundamentally true. To a marginal and deviant minority, however, children are viewed as commodities to be traded, imported, and exported like any other merchandise. Parents and professionals need help combating the alarming growth of child exploitation and this book is a valuable tool in the fight to protect our children from predators who would use them for financial gain or prurient reasons. Global in scope, these 2 volumes are written by individuals who represent a wide array of backgrounds, disciplines, and perspectives. Some authors are the authentic voices of those who were victimized and forced to navigate a system that was intended to help but found to be less than helpful. Some speak from distant lands that are growing ever closer with the ease of air travel and where the youth are being sold to travelers seeking to indulge their perverse needs with someone else’s children. Some voices are actually electronic particles from cyberspace delivering images of unspeakable abuse to our home and office computers. Some of the highlights of this book that I found interesting include: — A chapter discussing exploitation in advertising and the need for healthcare providers to be aware of the “slippery slope” that can occur when girls and teens are used in sexualized marketing — A chapter about the resources of the National Center for Missing & Exploited Children with a focus on their Exploited Child Unit — A chapter from UNICEF on the global commodification of children for sexual work and exploitation — A chapter from the University of Washington School of Journalism discussing the importance of addressing child victims of sexual exploitation in an empathetic and nonvictimizing manner in the newspapers; the chapter includes excerpts and photographs from a focused series in the Atlanta Journal Constitution called “The Selling of Atlanta’s Children,” which played an important role in convincing the Georgia State Legislature to change its laws to make the selling of children a felony, as compared to its history of misdemeanor status for over a century — A chapter from the Association for the Treatment of Sexual Abusers (ATSA) regarding the ethical issues in child assessments and the benchmarks for parole and probation determinations — Chapters relating to the medical and surgical complications of prostitution — A chapter discussing the demographics of girls who are brought into the criminal justice system and recommendations for communities to avoid the incarceration of prostituted children and youths — A chapter that explains the nuts and bolts of “cloning a computer” when an investigation is conducted in a child pornography case — A chapter describing other aspects of federal laws that are involved when children and youths are trafficked into the United States for sexual exploitation purposes, including civil rights violations and labor law violations — A chapter on the AMBER Alert legislation and the several children whose lives contributed to its inception — A chapter detailing the frequently overlooked concept of child sexual exploitation in rural communities

xi Foreword

This book represents the culmination of the efforts of an impressive collection of premier investigators, judicial participants, child protection agency personnel, and clinicians to gather and organize information about child exploitation. It is the most comprehensive text on this subject and it is a welcome addition to the literature on child maltreatment.

Robert M. Reece, MD Clinical Professor of Pediatrics Tufts University School of Medicine Visiting Professor of Pediatrics Dartmouth Medical School Editor, The Quarterly Update

xii FOREWORD In 1981, my worst nightmare became a reality when my 6-year-old son, Adam, was abducted and murdered. The prime suspect in Adam’s case was never charged. He died in prison while serving a life sentence for other crimes. With determination to spare other families from enduring a similar tragedy, my wife Revé and I worked to help enact the Missing Children Act of 1982 and the Missing Children’s Assistance Act of 1984. We founded the National Center for Missing & Exploited Children (NCMEC) in 1984. In the past 20 years, the rate of recovery of missing children has increased from 62% to 95%. While the NCMEC is best known for its work in tracking down missing children, the Exploited Child Unit, established in 1997, has also been a primary resource for law enforcement and families in the investigation and prosecution of the sexual exploitation of children. Child sexual exploitation is a worldwide problem, encompassing child pornography, molestation, and prostitution. In recent years, computers and the Internet have become favorite tools of child molesters as they collect and trade pornographic images and solicit new victims online. Medical, Legal, & Social Science Aspects of Child Sexual Exploitation: A Comprehensive Review of Pornography, Prostitution, and Internet Crimes is a 2- volume text that addresses this pervasive problem. Written by physicians, nurses, attorneys, social workers, and law enforcement officials who are leading experts in the field, the text takes a multidisciplinary approach to the medical and legal issues faced by victims of sexual exploitation. The contributions of authors from countries outside the United States help to highlight the international nature of this problem. First-person accounts by adults who were exploited as children and teenagers help to put a human face on the issue. The role of the media is addressed, both as contributors to the problem and as partners in creating and implementing solutions. Other chapters discuss the role of the United States Postal Inspection Service, the investigation of Internet exploitation cases, prosecutorial and judicial issues, the role of the medical expert, and the establishment of criminal liability for groups promoting child sexual exploitation. It is my sincere belief that this book will be a significant contribution to the literature in this field, and by doing so, will help to combat this worldwide problem.

John Walsh Cofounder, National Center for Missing & Exploited Children Host, Fox Television’s America’s Most Wanted

xiii PREFACE The idea for this work originated from the need to establish a repository of information for multidisciplinary team members who are learning about Internet crimes against children. When the concept of mass communication began with Gutenberg’s printing press in the 14th century, the purpose was to disperse infor- mation and promote new ideas. Seven centuries later, the Internet has expanded upon the original purpose of the printing press and now includes the and of our most vulnerable resource: children. As methods of victimization have become more innovative, sophisticated, and elusive, professionals are challenged in their efforts to prevent, detect, intervene, and treat children that fall prey to online predators. Knowledge regarding Internet crimes against children has been primarily limited to media coverage of the topic. This text serves to separate fact from fiction and to dispel several myths and misconceptions, including the belief that prostituted youths typically market themselves by choice and can easily escape from this form of abuse. To the uninformed, it is inconceivable that children and youth are often sold from within their own homes, that the Internet is used in numerous capacities to make such arrangements, and that Internet cafés present a nearly untraceable means of making the deal. Online solicitation has become an increasing threat to children. Many naïve children and youths unwittingly receive unwanted sexual solicitations, and may be enticed to leave their homes and families to meet online predators; such encounters may end tragically in , physical assault, abduction, or murder. What was slavery and bondage in the past has now become for forced labor and sexual exploitation. These crimes continue to escalate worldwide. The text begins with the history of child exploitation and proceeds to explain the contemporary and global nature of this form of child victimization. A careful analysis of the acquaintance molester leads the reader to complex types of sexual exploitation, illustrated with online, local, national, and international examples of the scope of these crimes against children. A collage of perspectives is presented, including exploitation in advertising, the role of the journalistic media response to these types of victims of crime, medical evaluation and treatment of victims, offender and victim mental health impact, and social science research in the area of commercial sexual exploitation of children. The reader will experience a judicial and criminal justice view, the perspective of the sexually exploited male, an education regarding the Internet community with respect to offender dynamics, and important aspects of the offender evaluation when potential parole, probation, and public safety is being considered. From the investigative and prosecuting platform, numerous important issues are discussed: the role of the first responder in an Internet crime against a child; the details of “cloning software” and the best way to present this complex information to a judge or jury; the technology of victim identification from an Internet Web site; the importance of strategy in prostitution cases when the common bias is that the victim is an offender; the recognition of the organized crime aspects of girls domestically trafficked across a country for and prostitution; the international requirements of police agencies in abduction and exploitation cases; and the realization that child pornography production and collection is a highly recidivistic crime. Investigations of high profile cases of sexual exploitation have resulted in an organized response to the sex tourist who travels to exploit young children for sexual purposes. The worst-case scenario of child abduction, sexual assault, and homicide are described, as well as community responses such as the AMBER Alert program, designed to facilitate a rapid and safe recovery of a missing child or youth.

xv Preface

From a child maltreatment perspective, this groundbreaking work provides com- prehensive and diverse information for this contemporary, yet misunderstood and daunting, form of child exploitation. It has been an immense honor to work with truly professional contributors, all of whom have been eager and cooperative in providing an international and expert treatise on a subject that all parents and professionals must acknowledge and understand. As the Internet, the “printing press” of the 21st century, has opened new doors for the worldwide exchange of information and ideas, so too has it opened a Pandora’s box of opportunities for criminals that victimize children and youths. At present, the knowledge regarding Internet crimes against children is fragmented, scant, and discipline-specific. This text is the first step toward comprehension, effective intervention, and the multi- disciplinary coordination of investigations of crimes involving these exploited children. It will open your eyes and your mind to a new dark side of child abuse that we can no longer afford to ignore.

Sharon W. Cooper, MD, FAAP Richard J. Estes, DSW, ACSW Angelo P. Giardino, MD, PhD, FAAP Nancy D. Kellogg, MD Victor I. Vieth, JD

xvi REVIEWS As a former Police Chief I know that With the emergence of the Internet and important policy decisions regarding the its worldwide expansion as a favored establishment of comprehensive child pro- mode of communication, there is an ever- tection strategies are often based upon a increasing avenue for the sexual exploita- tragic case or anecdotal evidence that tion of children. This informative publi- often ignores the scope and scale of the cation, authored by acknowledged leaders overall problem. The research conducted in the field of forensic science, provides by these nationally recognized experts professionals working with child abuse provides important insight into emerging victims, their families, and the suspected threats to children and serves as a guide perpetrators with a wide range of forensic for developing an effective national techniques and knowledge that will serve response. as an essential forensic reference. Brad Russ Faye Battiste-Otto, RN, SANE ICAC Training & Technical Assistance Founder/President of American Program Director Forensic Nurses University of New Hampshire Cofounder, International Association Internet Crimes Against Children of Forensic Nurses Research Center Palm Springs, CA Durham, NH In giving a broad scope of understanding The factual information, practical about the sexual exploitation of children, methodologies, and expertise in this book this book delineates familial child sexual can be used as a practical tool in combat- abuse and commercial sexual exploita- ing the horror of the commercial sexual tion. Its international perspective suggests exploitation of children. The fact that that the causes are broader than defined this text is guided by internationally rec- by western countries and therefore pre- ognized child rights principles and docu- vention foci need to be tailored accord- ments gives one hope that change is possi- ingly. While giving information on ble in a world where exploitation of chil- offender motives and treatment, it dren is so prevalent. As a survivor and emphasizes the victim as blameless, a now activist, I encourage the government, view that continues to need reinforce- professionals, and the public to care ment. The detailed nature of the book about this issue and be practical and and the number of worthy contributors humane in their approach to combating reiterate its use as a text for all manner exploitation. This book provides us with of helping professionals. that template. Jane Rudd, PhD Cherry Kingsley Associate Professor Special Advisor Saint Joseph College International Centre to Combat West Hartford, CT Exploitation of Children Vancouver, Canada

xvii Reviews

The subject matter is disturbing, but this Very worthwhile and a must-read for is a must-read resource book for profes- law enforcement and other professionals sionals working in the field of child mal- involved in identifying, rescuing, and treatment in the 21st century. The con- treating child victims of . tents provide a comprehensive review of This book allows the reader to better research, current programs, and concepts understand how and why individuals use that address intervention, investigation, the computer to facilitate the sexual and prevention. exploitation of children. Jeanie Ming, CPNP Det Sgt Paul Gillespie Forensic Pediatric Nurse Practitioner Officer In Charge Child Abuse Services Team Child Exploitation Section Orange, CA Toronto Police Service Toronto, Canada Medical, Legal, & Social Science Aspects of Child Sexual Exploitation is Whether it is , traffick- a rare and welcome departure from the ing, cyber-enticement, child pornography, “same old, same old” of recent years and or , tens of thousands of chil- is truly new and innovative. This book is dren suffer irreparable physical and psy- the first to provide in-depth coverage of chological harm from producers and cus- an emerging and serious global issue. The tomers of this form of abuse. As a leader authors and editors are well qualified to in the education of forensic nurses, the address the complex social, psychological, International Association of Forensic and legal issues presented by child sexual Nurses supports all efforts to educate exploitation. healthcare providers, criminal justice and John E.B. Myers social service professionals about the Distinguished Professor and Scholar crimes of child exploitation. Since there is University of the Pacific presently a lack of evidence-based infor- McGeorge School of Law mation, we look forward to this new pro- Sacramento, CA fessional resource. International Association of Forensic This text brings to light the necessary role Nurses (IAFN) of interagency collaboration in child Board of Directors, 2005-2006 exploitation cases while providing direct guidance through case study and lessons of necessary considerations, benefits and limitations of emerging tools, and strate- gies for the investigation, proper assess- ment, and ongoing management of per- petrators. Margaret Bullens Forensic Psychophysiologist and Sex Offender Management Consultant Grapevine, TX

xviii CONTENTS IN BRIEF

VOLUME ONE

SCOPE OF THE PROBLEM CHAPTER 1: A BRIEF HISTORY OF CHILD SEXUAL EXPLOITATION 1 CHAPTER 2: COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN ADVERTISING ...... 25 CHAPTER 3: CHILD SEXUAL EXPLOITATION FROM A GLOBAL PERSPECTIVE ...... 59 CHAPTER 4: RAPE SURVIVORS: PSYCHOSOCIAL PROBLEMS AND INVESTIGATION IN SOUTHERN ASIA...... 85

EXPERIENTIAL PERSPECTIVES CHAPTER 5: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN THE UNITED STATES ...... 95 CHAPTER 6: WHAT IT IS LIKE TO BE “SERVED” IN THE “SYSTEM”: A SURVIVOR’S PERSPECTIVE ...... 129 CHAPTER 7: ADULT SURVIVORS OF THE CHILD SEXUAL EXPLOITATION INDUSTRY: PSYCHOLOGICAL PROFILES . . . . 155 CHAPTER 8: EXPERIENTIAL YOUTH PERSPECTIVES: CANADA . . 179

PORNOGRAPHY CHAPTER 9: UNDERSTANDING THE IMPACT OF PORNOGRAPHY ON ADULTS AND CHILDREN ...... 193 CHAPTER 10: RESOURCES OF THE EXPLOITED CHILD UNIT AT THE NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN® ...... 203 CHAPTER 11: MEDICAL ANALYSIS OF CHILD PORNOGRAPHY. . 213 CHAPTER 12: CHILD SEXUAL ABUSE AND THE . . 246 CHAPTER 13: ABUSIVE IMAGES OF CHILDREN AND THE INTERNET: RESEARCH FROM THE COPINE PROJECT . . . . 257 CHAPTER 14: ETHICAL ISSUES IN SEXUAL OFFENDER ASSESSMENTS ...... 278

PROSTITUTED CHILDREN AND YOUTH CHAPTER 15: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN NORTH AMERICA ...... 299

xix Contents In Brief

CHAPTER 16: PSYCHOSOCIAL CONTEXT LEADING JUVENILES TO PROSTITUTION AND SEXUAL EXPLOITATION ...... 337 CHAPTER 17: MEDICAL CARE OF THE CHILDREN OF THE NIGHT 350 CHAPTER 18: THE MEDICAL IMPLICATIONS OF ANOGENITAL TRAUMA IN CHILD SEXUAL EXPLOITATION ...... 369 CHAPTER 19: COMMUNITY AND MENTAL HEALTH SUPPORT OF JUVENILE VICTIMS OF PROSTITUTION ...... 399 CHAPTER 20: INTIMATE PARTNER VIOLENCE IN THE LIVES OF PROSTITUTED ADOLESCENTS ...... 423

ONLINE SOLICITATION CHAPTER 21: ONLINE VICTIMIZATION: WHAT YOUTH TELL US 438 CHAPTER 22: THE USE OF THE INTERNET FOR CHILD SEXUAL EXPLOITATION ...... 469

VOLUME TWO

INVESTIGATION AND PROSECUTION CHAPTER 23: ACQUAINTANCE CHILD MOLESTERS: A BEHAVIORAL ANALYSIS ...... 529 CHAPTER 24: THE WORK OF THE UNITED STATES POSTAL INSPECTION SERVICE: COMBATING CHILD SEXUAL EXPLOITATION 595 CHAPTER 25: THE ROLE OF THE FIRST RESPONDER IN THE CRIMINAL INVESTIGATIVE PROCESS ...... 603 CHAPTER 26: INVESTIGATING INTERNET CHILD EXPLOITATION CASES ...... 611 CHAPTER 27: PROSECUTORIAL ISSUES IN THE CHILD PORNOGRAPHY ARENA ...... 635 CHAPTER 28: CHILDHOOD VICTIMIZATION AND THE DERAILMENT OF GIRLS AND WOMEN TO THE CRIMINAL JUSTICE SYSTEM . . 704 CHAPTER 29: JUVENILE COURTS AND SEXUAL EXPLOITATION: A JUDGE’S OBSERVATIONS ...... 711 CHAPTER 30: AN INVESTIGATION OF VICTIM AND OFFENDER DYNAMICS IN PROSTITUTES AND INCARCERATED PEDOPHILES . 715 CHAPTER 31: HUMAN TRAFFICKING FOR SEXUAL EXPLOITATION: THE ROLE OF INTERPOL ...... 735 CHAPTER 32: INVESTIGATION AND PROSECUTION OF THE PROSTITUTION OF CHILDREN ...... 745 CHAPTER 33: INTERNET ...... 789 CHAPTER 34: THE MEDICAL EXPERT AND CHILD SEXUAL EXPLOITATION ...... 802 CHAPTER 35: COMPUTER FORENSIC SOFTWARE AND ITS LEGAL VALIDATION ...... 835 xx Contents In Brief

CHAPTER 36: INTERNET TRAVELERS ...... 873 CHAPTER 37: ESTABLISHING CRIMINAL CONSPIRACY AND AIDER AND ABETTOR LIABILITY FOR GROUPS THAT PROMOTE SEXUAL EXPLOITATION OF CHILDREN ...... 895 CHAPTER 38: THE HIDDEN TRUTH OF INVOLUNTARY SERVITUDE AND SLAVERY ...... 928

PREVENTION RECOMMENDATIONS CHAPTER 39: KEEPING THE FAITH: A CALL FOR COLLABORATION BETWEEN THE FAITH AND CHILD PROTECTION COMMUNITIES ...... 947 CHAPTER 40: EXITING ROUTE: A PEER SUPPORT MODEL FOR EXITING AND HEALING PROGRAMS ...... 966 CHAPTER 41: THE AMBER ALERT PROGRAM: MISSING CHILDREN BEFORE AND AFTER ...... 980 CHAPTER 42: THE IMPACT OF NEWS COVERAGE: HOW THE MEDIA CAN HELP ...... 994 CHAPTER 43: WORKING WITH THE TOURISM INDUSTRY TO PREVENT CHILD SEXUAL EXPLOITATION: AN INDIVIDUAL PERSPECTIVE ...... 1010 CHAPTER 44: HOTLINES AND THE HISTORY OF INHOPE: THE ASSOCIATION OF INTERNET HOTLINE PROVIDERS . . . . . 1019 CHAPTER 45: SHADOW CHILDREN: ADDRESSING THE COMMERCIAL EXPLOITATION OF CHILDREN IN RURAL AMERICA ...... 1027 CHAPTER 46: RECOMMENDATIONS FOR ACTION FOR DEALING EFFECTIVELY WITH CHILD SEXUAL EXPLOITATION . . . . . 1041

xxi CONTENTS IN DETAIL

VOLUME ONE

Forewords Congressman Robert E. "Bud" Cramer ...... ix Robert Reece, MD ...... xi John Walsh...... xiii

CHAPTER 1: A BRIEF HISTORY OF CHILD SEXUAL EXPLOITATION Ancient Civilizations ...... 1 Ancient Egypt ...... 1 The Old Testament ...... 2 Ancient Greece ...... 2 Ancient Rome ...... 3 Ancient China ...... 4 The Middle Ages ...... 4 The Renaissance...... 6 The Age of Enlightenment...... 7 Puritanism...... 7 Pornography and Literature ...... 8 The 19th Century...... 9 Government Regulation...... 9 Changes in Family Lifestyles...... 10 The Influence of Photography ...... 10 Pornography and Prostitution in the 20th and 21st Centuries ...... 11 Use of the Internet ...... 16 The History of the Role of the Internet in Sexual Exploitation ...... 17 Internet Crimes Against Children...... 19 Conclusion ...... 22

CHAPTER 2: COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN ADVERTISING Why Advertising? ...... 25 What Sexual Exploitation of Children in Advertising Looks Like . . . . . 28 The History of Child Sexually Exploitative Advertising ...... 30 Sex and Violence ...... 35 The Impact of Sexually Exploitative Advertising on Children, Adults, and Society...... 38 Body Image...... 40 The Sex Exploiter ...... 42 Regulation of Advertising to Children in the United States ...... 43 Status of Guidelines Regarding Sexualization of Children and Advertising to Adolescents ...... 45 Sexually Explicit Photos and Proof of Age ...... 45 Recommendations for Change...... 46 Let Kids Be Kids...... 46 Dads and Daughters ...... 47 What Pediatricians Can Do...... 48

xxiii Contents In Detail

Conclusion ...... 51 Appendix 2-1: The Marketing Machine ...... 52

CHAPTER 3: CHILD SEXUAL EXPLOITATION FROM A GLOBAL PERSPECTIVE Definition of Sexual Exploitation ...... 59 The Concept of Sexual Exploitation From a Global Perspective ...... 60 The Scope of the Problem of Sexually Exploited Children: Some Numbers . 62 Children in Commercial Sexual Exploitation ...... 63 The Face of Child Prostitution: A Situation Analysis From Southeast Asia . 63 Thailand ...... 64 Philippines...... 64 A South Asian Study...... 65 Children Born in Brothels (Brothel Children) ...... 65 An Example From Eastern Europe ...... 66 The Middle East...... 66 Examples From Africa...... 67 Examples From Central America...... 67 Other Forms of Sexual Exploitation ...... 68 Early Marriages ...... 68 Temple Prostitution: Devadasi...... 68 Sugar Daddies ...... 69 Psychosocial Factors With an Impact on the Vulnerability of Children Regarding Commercial Sexual Exploitation...... 69 Poverty ...... 99 Power and Powerlessness...... 69 Lack of Knowledge ...... 70 Child as a Commodity ...... 70 Consumerism ...... 70 Macho or Machismo Culture ...... 71 Children Sexually Abused or Exploited in the Private Sphere ...... 71 Taboos...... 71 Lack of Knowledge Regarding the Needs of Children ...... 71 Dysfunctional Families ...... 72 Environmental Factors: Circumstances Increasing Children’s Vulnerability to Sexual Exploitation ...... 72 The Demand for Children...... 72 The Economic Impact of Child Sexual Exploitation ...... 73 Street Children ...... 73 Children With Disabilities ...... 73 Orphaned Children...... 73 Children in Armed Conflicts ...... 73 Indigenous Children ...... 74 Children Who Work ...... 75 Children Who Are Trafficked ...... 75 in Schools ...... 75 School Dropouts ...... 76 Children in Institutions ...... 76 Health Consequences for Children Exposed to Sexual Exploitation . . . . 76 Measures Being Taken: Rescue, Recovery, and Reintegration ...... 77 Measures of Rescue, Recovery, and Reintegration in Developing Countries . 78 Recovery and Integration Programs...... 79 International Conventions and Protocols ...... 79 Preventive Measures: Future Perspectives ...... 80 Conclusion ...... 81 xxiv Contents In Detail

CHAPTER 4: RAPE SURVIVORS: PSYCHOSOCIAL PROBLEMS AND INVESTIGATION IN SOUTHERN ASIA Background ...... 85 Victims and the Criminal Justice System...... 87 A Child Rape Victim...... 88 A Repeatedly Raped Victim ...... 89 A Gang Rape Victim ...... 89 Reasons Why Rape Victims Do Not Report the Crime ...... 89 Physical Condition of the Victim and Offender ...... 90 Psychological Problems of Incest Victims...... 91 Immediate Needs of and Appropriate Responses to Rape Victims . . . . . 91 Investigation ...... 92 Preparations for an Investigation ...... 92 Physical Evidence of a Rape ...... 92 Interviewing Victims ...... 92 Dealing With the Suspect ...... 93 Conclusion ...... 94

CHAPTER 5: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN THE UNITED STATES Introduction ...... 95 Factors Contributing to the Commercial Sexual Exploitation of Children . 96 Child Maltreatment in the United States ...... 97 The Commercial Sexual Exploitation of Children in the United States . . 98 Research Methods ...... 99 Research Partners ...... 99 Project Phasing...... 100 Country Selection ...... 100 City Selection ...... 100 Key Informants for the City, Country, and Regional Studies...... 101 Statutory Reviews ...... 101 Findings...... 102 Factors That Contribute to Sexual Exploitation of Children ...... 102 More and Less Common Forms of the Commercial Sexual Exploitation of Children ...... 102 Social, Emotional, Health, and Other Risks to Sexually Exploited Children 102 Risks of Sexual Exploitation and Commercial Sexual Exploitation for Children Living in Their Own Homes ...... 103 Risks of Sexual Exploitation and Commercial Sexual Exploitation for “Street,” Homeless, and Other Children Not Living in Their Own Homes ...... 106 Impact of Commercial Sexual Exploitation on Children ...... 106 Categories of Commercially Sexually Exploited Children in America . . 106 Profiles of Child Sexual Exploiters in the United States...... 109 Sexual Exploiters of Children Living in Their Own Homes . . . . 110 Sexual Exploiters of Children Not Living in Their Own Homes . . 111 Domestic and International Trafficking in Children for Sexual Purposes . 112 Regions and Countries of Origin of Sexually Exploited Trafficked Foreign Children in the United States...... 112 Adult Traffickers of Children for Sexual Purposes ...... 112 Risk of Child Sexual Exploitation in Comparison With Other Social Risks to Which American Children and Youth Are Exposed ...... 112 National Capacity of the United States for Addressing Child Sexual Exploitation...... 113 Conclusion ...... 119

xxv Contents In Detail

CHAPTER 6: WHAT IT IS LIKE TO BE “SERVED” IN THE “SYSTEM”: A SURVIVOR’S PERSPECTIVE Foster Uncare...... 129 Home Again...... 131 Abused Boys...... 131 Protecting Boys...... 133 Runaway to Jail: First Offense ...... 133 Today, My Son, You Are a Man...... 134 Don’t Mess With Me! ...... 135 Disciplining Boys or Breaking Their Spirits? ...... 136 Violence 101...... 137 Sentenced to the Streets...... 138 Life on the Streets ...... 138 : The Prostitution Solution ...... 139 On the Road...... 139 Making the Scene ...... 140 The Tolerated Sexual Abuse of Boys ...... 141 Why Are So Many Children Homeless?...... 142 Back to the Street ...... 143 Caged ...... 144 Chicago Blues ...... 145 Life in the Hole...... 145 Prisoners of Our Imagination ...... 147 Changes in the System ...... 147

CHAPTER 7: ADULT SURVIVORS OF THE CHILD SEXUAL EXPLOITATION INDUSTRY: PSYCHOLOGICAL PROFILES The Victims ...... 155 Claire ...... 155 Gloria ...... 156 Jane ...... 156 Joyce...... 157 Childhood Trauma ...... 157 Trauma Beliefs...... 158 Beliefs About Themselves: Lovability ...... 159 Beliefs About Themselves: Power...... 162 Beliefs About Others: Trust ...... 163 Coping Behaviors...... 164 Missing Life Skills ...... 166 Psychiatric Outcomes ...... 169 From Victim to Survivor of the Child Sexual Exploitation Industry . . . . 169 Survivors ...... 170 Claire ...... 170 Gloria ...... 171 Jane ...... 172 Joyce...... 172 Research...... 173 Childhood Sexual Abuse ...... 173 Child and Adult Prostitution...... 174 Where Are They Now?...... 174 Claire ...... 174 Gloria ...... 174 Jane ...... 175 Joyce...... 175 Conclusion ...... 175 xxvi Contents In Detail

CHAPTER 8: EXPERIENTIAL YOUTH PERSPECTIVES: CANADA Language and Respect ...... 179 How Did You Enter Commercial Sexual Exploitation? ...... 180 Monica...... 180 Justin...... 181 Chris...... 182 What Kept You in Commercial Sexual Exploitation?...... 184 Monica...... 184 Justin...... 185 Chris...... 186 How Did You Exit Commercial Sexual Exploitation? ...... 187 Monica...... 187 Justin...... 189 Chris...... 190 Top 20 Guidelines for Professionals Dealing With Exploited Youth . . . . 191

CHAPTER 9: UNDERSTANDING THE IMPACT OF PORNOGRAPHY ON ADULTS AND CHILDREN The Nature of Pornographic Material ...... 193 The Influence of Pornography ...... 194 Pornography as Advertising ...... 194 Sexually Oriented Businesses...... 195 Empirical Research ...... 195 Experience of Clinical Psychologists...... 196 Damage to Children ...... 197 Child Pornography ...... 198 Conclusion ...... 199

CHAPTER 10: RESOURCES OF THE EXPLOITED CHILD UNIT AT THE NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN® The Creation of the National Center for Missing & Exploited Children . . 203 The Growth of Sexual Exploitation on the Internet ...... 203 The Exploited Child Unit...... 204 The CyberTipline: The Public’s Resource for Protecting Children . . . 204 How Does the CyberTipline Work?...... 204 Child Victim Identification Project ...... 205 Child Recognition & Identification System...... 207 Child Pornography Evidence Guide ...... 207 Methods of Identification ...... 207 Exploited Child Unit Technical Assistance Services ...... 209 Law Enforcement Partnerships...... 209 Federal Bureau of Investigation ...... 210 Crimes Against Children Program ...... 210 Innocent Images National Initiative...... 211 Bureau of Immigration and Customs Enforcement ...... 211 United States Postal Inspection Service ...... 211 Internet Crimes Against Children Task Forces...... 211 Multijurisdictional Cases ...... 211 Conclusion ...... 212

CHAPTER 11: MEDICAL ANALYSIS OF CHILD PORNOGRAPHY Properly Handling of Evidence ...... 213 Eliminating the Risk of Possible Courtroom Confusion or Exclusion of Evidence ...... 213 Eliminating the Risk of Further Exploitation of the Child Victim . . . 214

xxvii Contents In Detail

Receipt of Evidence ...... 214 Receipt of Photographs and Videos ...... 214 Receipt of Computer-Based Evidence ...... 215 Purposes of Medical Analysis of Child Pornography...... 216 Assessing the Victim’s Age...... 216 Identifying the Victim ...... 217 Gaining Information About the Collector...... 217 Assessing Images Produced by the Collector for Further Investigative Evidence ...... 217 Videotape Evidence ...... 217 Inserted Pornographic Vignettes ...... 217 Unusual Angles Shown in the Video...... 218 Partial Image of a Perpetrator ...... 218 Multiple Subjects in a Video...... 218 Content of Video May Provide Information About the of Children ...... 220 Incest Shown on a Videotape ...... 220 Photographs and Published Materials as Evidence ...... 220 Written Child Pornography ...... 221 Example of Written Child Pornography ...... 221 Significance of Written Child Pornography ...... 221 Other Information Commonly Found With Written Child Pornography . 222 The Definition of Sexually Explicit Images in the United States . . . . . 222 Victim Identification Analysis ...... 222 Gender ...... 223 Ethnicity ...... 224 Clinical Indications to Help Determine a Child’s Ethnicity ...... 224 General Characteristics of European Ancestry ...... 224 General Characteristics of Hispanic Ancestry ...... 225 General Characteristics of Asian Ancestry ...... 225 General Characteristics of African Ancestry...... 225 Other Clues to Help Determine a Child’s Ethnicity...... 226 Video Titles and Internet Web Site Banners ...... 226 Stereotypical Settings of the Country of Origin ...... 226 Background Scenes ...... 226 Toddler Pornography ...... 226 Development of Maturation of Toddlers ...... 226 Sadistic Toddler Abuse ...... 228 Impact of Sadistic Abuse on Infants and Toddlers...... 228 Psychosexual Maturation ...... 228 Pornography and Child Seduction...... 229 Pornography Used to Instruct the Child ...... 230 Pornography Used to Excite the Perpetrator ...... 230 Pornography Used to Excite the Child ...... 230 Children Who Appear Drugged ...... 230 Musculoskeletal Development ...... 231 Radiographic Studies...... 231 Comparing Head Height and Total Height Ratio...... 231 Other Signs of Musculoskeletal Maturation ...... 231 Dental Maturation...... 231 Physical Sexual Maturation ...... 232 Stages of Sexual Maturation ...... 232 Stages 1 and 2...... 233 Stage 3...... 237 Stage 4...... 237 Stage 5...... 237 xxviii Contents In Detail

Using the Sexual Maturation Rating to Determine a Child’s Age . . . . 237 Delayed or Early Sexual Maturation ...... 238 Sexual Maturation Rates and Children Who Are Not From the United States...... 238 Images ...... 239 Conclusion ...... 240

CHAPTER 12: CHILD SEXUAL ABUSE AND THE PARAPHILIAS Pedophilia ...... 246 Pedophiles and Child Pornography ...... 247 Other Paraphilias ...... 248 Zoophilia (Bestiality)...... 248 Fetishism ...... 249 Urophilia, Coprophilia, and Klismaphilia...... 251 Sadism and Hyperdominance ...... 251 Necrophilia ...... 252 Conclusion ...... 253

CHAPTER 13: ABUSIVE IMAGES OF CHILDREN AND THE INTERNET: RESEARCH FROM THE COPINE PROJECT The Origins of COPINE...... 257 What Is Child Pornography?...... 258 How Do Images Circulate on the Internet? ...... 261 The Nature of Offending ...... 264 Abuse Images and the Offending Process ...... 265 Victims ...... 270 Conclusion ...... 273

CHAPTER 14: ETHICAL ISSUES IN SEXUAL OFFENDER ASSESSMENTS Standards and Guidelines for Sex Offender Assessments ...... 278 The Association for the Treatment of Sexual Abusers...... 279 ATSA Standards ...... 279 Measures Used in Sexual Offender Assessments...... 280 Physiological Measures of Sexual Arousal and Interest: ...... 281 Ethical Issues in the Use of Penile Plethysmography ...... 282 Physiological Measures: Viewing Time...... 284 Ethical Issues in the Use of Viewing Time Measures ...... 284 Measurement of Dissimulation: Polygraphy ...... 286 Ethical Issues in the Use of the Polygraph ...... 286 Measurement of : The Hare Psychopathy Checklist . . . . 288 Ethical Issues in the Use of the Psychopathy Checklist ...... 289 Conditions Contributing to the Likelihood of Misinterpretation . . . . . 290 Conclusion ...... 291

CHAPTER 15: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN NORTH AMERICA North America: The Paradox of Affluence and Poverty ...... 299 Commercial Sexual Exploitation of Children in the Region ...... 304 Commercial Sexual Exploitation of Children in Canada ...... 304 Profiles of the Children ...... 304

xxix Contents In Detail

Profiles of the Exploiters ...... 305 Trafficking ...... 305 National Legislation...... 306 Law Enforcement ...... 306 Prevention, Prosecution, and Protection Programs ...... 307 Child Pornography and Online Sexual Victimization ...... 307 The Private Sector ...... 308 Commercial Sexual Exploitation of Children in Mexico ...... 309 Profiles of the Children ...... 309 Profiles of the Exploiters ...... 309 Trafficking ...... 310 National Legislation...... 311 Law Enforcement ...... 311 Prevention, Prosecution, and Protection Programs ...... 311 Child Pornography and Online Sexual Victimization ...... 311 The Private Sector ...... 312 Commercial Sexual Exploitation of Children in the United States . . . 312 Profiles of Children ...... 313 Profiles of Exploiters ...... 315 Trafficking ...... 317 National Legislation...... 319 Law Enforcement ...... 319 Prevention, Prosecution, and Protection Programs ...... 319 Child Pornography and Online Sexual Victimization ...... 320 The Private Sector ...... 321 Eliminating the Commercial Sexual Exploitation of Children in North America. 321

CHAPTER 16: PSYCHOSOCIAL CONTEXT LEADING JUVENILES TO PROSTITUTION AND SEXUAL EXPLOITATION Youth Alienation and Victimization ...... 337 A Historical Perspective ...... 338 Typology of Homeless Youth Involved in Survival Sex ...... 339 Situational Runaways ...... 339 Runaways...... 339 Thrownaways ...... 340 Systems Youth ...... 340 Gender Comparisons...... 341 Health Consequences of Sexual Exploitation ...... 342 Recommendations ...... 345

CHAPTER 17: MEDICAL CARE OF THE CHILDREN OF THE NIGHT Clinical Approach ...... 350 “TEAMSTAT” Approach ...... 350 Tell Them Your Agenda...... 350 Express Concern ...... 350 Assure Normalcy of Feelings...... 351 Medical Issues ...... 351 xxx Contents In Detail

Sexual/Physical Victimization ...... 352 Drug and Alcohol Use...... 353 Psychiatric Symptoms and Diagnoses ...... 355 Safety Issues ...... 356 Family History/Support ...... 356 Runaway Tendencies ...... 356 Test and Treat Presumptively...... 356 Access Appropriate Psychological and Legal Assistance ...... 356 Timely Follow-up...... 356 Medical Emergencies ...... 356 Sexual Assault Emergencies ...... 356 Substance Abuse Emergencies ...... 358 Psychiatric Emergencies...... 358 Clinical Evaluation and Management ...... 358 Conditions Related to Sexual or Physical Victimization ...... 358 Adequate Preparation ...... 359 Familiarity With Examination Positions ...... 359 Confident, Yet Sensitive Approach to the Child ...... 360 Documentation of Injuries ...... 361 Diagnostic Testing ...... 363 Sexually Transmitted Diseases ...... 363 Pregnancy ...... 364 Substance Abuse Screening/Testing/Monitoring ...... 364 Treatment ...... 366 Follow-up ...... 366 Referrals ...... 366 Conclusion ...... 366

CHAPTER 18: THE MEDICAL IMPLICATIONS OF ANOGENITAL TRAUMA IN CHILD SEXUAL EXPLOITATION Introduction ...... 369 Normal Anatomy ...... 370 Embryonic Development ...... 370 Normal Genitalia ...... 370 Males ...... 370 Females ...... 370 Childhood Genital Trauma in General ...... 373 Straddle Injury ...... 373 Males ...... 373 Females ...... 373 Coincidental Genital Trauma ...... 374 Coincidental Genital Trauma in Pregnancy ...... 374 Nonsexual Violence and Genital Trauma ...... 374 Female Circumcision ...... 374 Gynecological Surgery and Genital Trauma ...... 377 Differential Diagnosis for Childhood Genital Trauma ...... 379 The Patient History ...... 380

xxxi Contents In Detail

The Importance of Obtaining a History ...... 380 The Interviewer ...... 382 Concluding the Interview ...... 383 The Physical Examination ...... 384 Who is the Examiner ...... 386 Where to Examine ...... 386 When to Examine ...... 386 How to Examine ...... 386 Why Examine ...... 386 Laboratory Testing ...... 387 Sexually Transmitted Disease Testing ...... 387 Deoxyribonucleic Acid Update ...... 387 Processing and Analysis ...... 387 Collection and Storage of Specimens ...... 388 Commercial Sexual Exploitation of Children ...... 388 Causes for Genital Trauma in Prostituted Children ...... 389 Genital Injury Related to the Commercial Sexual Exploitation of Children 389 Consequences of Genital Trauma ...... 390 Acute Visible Injuries ...... 390 Acute Internal Injuries ...... 390 Chronic Consequences ...... 391 Common Sexually Transmitted Diseases ...... 391 Preemptive, Preventive, and Prophylactic Therapies ...... 392 Postcoital Contraception ...... 392 Plan A ...... 392 Plan B ...... 392 Bacterial Agent Treatment ...... 392 Viral Agents ...... 392 Conclusion ...... 393

CHAPTER 19: COMMUNITY AND MENTAL HEALTH SUPPORT OF JUVENILE VICTIMS OF PROSTITUTION Healthcare Settings ...... 397 Ambulatory Care Clinics ...... 398 Emergency Care Facilities ...... 398 Mental Health Clinics ...... 398 Juvenile Detention Facilities ...... 399 Initial Assessment of Victims ...... 399 Establishing Communication and Trust ...... 399 Initial Assessment and Rapport-Building Interview ...... 401 Psychiatric Assessment ...... 406 Developmental, Behavioral, and Emotional Assessment ...... 408 Intermediate and Long-Term Community and Mental Health Support of Victims ...... 409 Clinical Treatment Sites ...... 409 Goals of Long-Term Therapy ...... 410 Special Issues for Boys ...... 412 xxxii Contents In Detail

Providing a Safe Environment...... 412 Specific Therapeutic Approaches ...... 413 Visual Cues ...... 413 Family History and Family Genograms ...... 414 Example of a Treatment Program ...... 417 Long-Term Prognosis ...... 419 Prevention ...... 420

CHAPTER 20: INTIMATE PARTNER VIOLENCE IN THE LIVES OF PROSTITUTED ADOLESCENTS Dynamics of Dating Violence ...... 423 Myths Surrounding Sexual Violence ...... 424 International Sanctioning of Prostitution ...... 424 Prostitution Recognized as Male Violence Against Women ...... 425 Pimps as Predators ...... 426 Health Consequences of Dating Violence ...... 426 Health Consequences of Prostitution ...... 428 Victims Becoming Violent ...... 428 Clinical Presentations ...... 429 Screening ...... 429 Documentation ...... 430 Photographic Documentation ...... 431 Safety Planning and Referrals ...... 431 Conclusion ...... 432

CHAPTER 21: ONLINE VICTIMIZATION: WHAT YOUTH TELL US Methods ...... 438 Participants ...... 438 Patterns of Youth Internet Use ...... 439 Overall Incidence of Online Victimization ...... 439 Sexual Solicitations and Approaches ...... 439 Unwanted Exposure to Sexual Material ...... 440 Harassment ...... 440 Sexual Solicitations and Approaches ...... 441 Youth Targets for Sexual Solicitations ...... 441 Perpetrators of Sexual Solicitations ...... 441 Solicitation Incident Characteristics ...... 444 Youth Response to Online Sexual Solicitations ...... 444 Impact of Solicitations on Youth ...... 444 Youth at Risk for Sexual Solicitation ...... 445 Are Youth Forming Risky Internet Friendships With Adults? . . . . . 446 Are Youth Being Solicited to Run Away by Potentially Predatory Adults? 447 Summary ...... 447 Unwanted Exposure to Sexual Material ...... 448 Youth With Unwanted Exposures to Sexual Material ...... 448 Exposure Incident Characteristics ...... 450 Youth Response to Unwanted Exposure to Sexual Material ...... 451

xxxiii Contents In Detail

Impact of Exposure ...... 451 Youth at Risk for Unwanted Exposure to Sexual Material ...... 451 Summary ...... 452 Harassment ...... 453 Youth Targets for Harassment ...... 453 Perpetrators of the Harassment ...... 456 Harassment Incident Characteristics ...... 456 Youth Response to Harassment ...... 456 Impact of Harassment ...... 456 Summary ...... 456 Risks and Remedies ...... 457 Parental Concern ...... 457 Use of Filtering and Blocking Software ...... 457 Knowledge of Help Sources ...... 457 Study Conclusions ...... 458 Many Youth Encounter Offensive Experiences on the Internet . . . . 458 The Offenses and Offenders Are More Diverse Than Previously Thought 458 Most Sexual Solicitations Fail, but Their Quantity Remains Alarming . . 459 Teenagers Are the Primary Vulnerable Population ...... 459 Sexually Explicit Material on the Internet is Intrusive ...... 459 Most Youth Brush Off These Offenses, but Some Become Distressed . . 459 Many Youth Do Not Tell Anyone About the Experience ...... 459 Youth and Parents Do Not Report These Experiences and Do Not Know Where to Report Them ...... 460 Internet Friendships Between Teenagers and Adults Are Common and Usually Seem to Be Benign ...... 460 Implications and Recommendations ...... 460 Create Materials Specifically Describing Diverse Hazards ...... 460 Address Both Sexual and Nonsexual Internet Victimization ...... 461 Inform the Public of Help Resources and Make Reporting of Offensive Internet Behavior Easier ...... 461 Development of Prevention and Intervention Strategies for Youth of Varying Ages ...... 462 Mobilize Youth to Help “Clean Up” Internet Behavior Standards . . . 462 Educate Health, School, and Family Counselors About the New Internet Hazards ...... 462 More Research Is Needed ...... 463 Better Understanding Is Needed Abut Families’ Ideas About and Use of Filtering and Blocking Software ...... 463 Enact Laws to Make Offensive Acts Illegal on the Internet ...... 463 Conventional Forms of Youth Victimization Need Our Continued Attention ...... 464 Conclusion ...... 464 Recommended Research Materials ...... 464 Appendix 21-1: Methodological Details ...... 465 Participation Rate ...... 466 Appendix 21-2: Definitions and Instrumentation ...... 466 Sexual Solicitation Items ...... 466 xxxiv Contents In Detail

Unwanted Exposure to Sexual Material Items ...... 467 Harassment Items ...... 467 Appendix 21-3: Limitations of the Study ...... 467

CHAPTER 22: THE USE OF THE INTERNET FOR CHILD SEXUAL EXPLOITATION Why Do Individuals Use the Internet for Sexually Deviant and Illegal Purposes? ...... 469 Accessibility ...... 470 Affordability ...... 470 Anonymity ...... 470 Components of the Internet Used for Sexually Deviant and Illegal Activity ...... 471 Newsgroups ...... 472 E-mail ...... 472 Web Sites ...... 472 Chat Rooms ...... 473 Sexually Deviant and Illegal Internet Usage ...... 474 Child Pornography ...... 474 Locating Children to Molest ...... 476 Communication With Other Child Sex Offenders ...... 477 The Internet Role in the Etiology of Child Sexual Abuse ...... 479 Cognitive Distortions ...... 479 Recommendations for Evaluating and Treating Internet-Related Sex Offenders ...... 482 Conclusion ...... 483

INDEX ...... 489

VOLUME TWO

CHAPTER 23: ACQUAINTANCE CHILD MOLESTERS: A BEHAVIORAL ANALYSIS Introduction ...... 529 Caution ...... 529 Overview ...... 530 “Stranger Danger” ...... 531 Intrafamilial Child Sexual Abuse ...... 531 Acquaintance Child Molestation ...... 532 Definitions ...... 535 Need ...... 535 Defining the Terms Used ...... 536 “Sexual Victimization of Children” ...... 536 “Sexual Exploitation of Children” ...... 536 “Investigator” ...... 537 “Sexual Activity” ...... 537 “Child” ...... 538 “Parapilia” ...... 539 “MO” and “Ritual” ...... 539

xxxv Contents In Detail

“Child Molester” ...... 540 “Pedophile” ...... 541 Offender Typology ...... 542 Child Molester Versus Pedophile ...... 542 Typology of Sex Offenders ...... 544 Situational-Type Child Molesters ...... 547 Preferential-Type Child Molesters ...... 547 Who Cares? ...... 548 Profiling? ...... 550 Summary of Typologies ...... 551 Potential Problem Areas ...... 551 Combination Offenders ...... 551 Nuisance Sex Offenders ...... 552 Importance ...... 552 Evaluation ...... 553 Multiple Offenders ...... 554 Incest Cases ...... 554 Female Offenders ...... 555 Adolescent Offenders ...... 555 Acquaintance-Exploitation Cases ...... 556 Overview ...... 556 Dynamics of Cases ...... 556 “Experts” ...... 557 Risk to Other Children ...... 557 Role of Parents ...... 557 Disclosure Continuum Status ...... 557 Multiple Victims ...... 558 Multiple Offenders ...... 558 Gender of the Victim ...... 558 Sexual Exploitation Versus Sexual Abuse Cases ...... 558 Types of Multiple-Victim Cases ...... 558 “Historical” Multiple-Victim Cases ...... 559 ...... 560 Offender Strategies ...... 562 Control ...... 562 The Seduction Process ...... 563 Operation of Cases Involving Multiple Child Victims ...... 565 Offender-Victim Bond ...... 566 High-Risk Situations ...... 566 Summary ...... 567 Conclusion ...... 568 Investigating Acquaintance Sexual Exploitation ...... 568 The Investigative Perspective ...... 569 Emotion Versus Reason ...... 570 The “Big-Picture” Approach ...... 571 Interview ...... 571 Assess and Evaluate ...... 575 “Children Never ”...... 575 “If They Have the Details, It Must Have Happened” ...... 576 Areas of Evaluation ...... 578 xxxvi Contents In Detail

Contagion ...... 580 Summary of Evaluation and Assessment ...... 581 Corroborate ...... 581 Document Behavioral Symptoms of Sexual Victimization . . . . . 582 Document Patterns of Behavior ...... 582 Identify Adult Witnesses and Suspects ...... 584 Medical Evidence ...... 584 Other Victims ...... 584 Search Warrants ...... 585 Physical Evidence ...... 585 Child Pornography and Child Erotica ...... 586 Computers ...... 586 Consensual Monitoring ...... 586 Subject Confessions ...... 587 Surveillance ...... 587 Investigating Multiple-Victim Cases ...... 588 Understanding the Seduction Process ...... 588 Understanding the Preferential Molester ...... 590 Proactive Approach ...... 591 Establish Communication With Parents ...... 592

CHAPTER 24: THE WORK OF THE UNITED STATES POSTAL INSPECTION SERVICE: COMBATING CHILD SEXUAL EXPLOITATION The United States Postal Inspection Service ...... 595 Early Enforcement Efforts: Obscenity Investigations ...... 595 Protecting Children From Sexual Exploitation: A National Priority . . . . . 596 Child Exploitation Program Overview ...... 598 Operation Avalanche ...... 599 Operation Lost Innocence ...... 601 Conclusion ...... 602

CHAPTER 25: THE ROLE OF THE FIRST RESPONDER IN THE CRIMINAL INVESTIGATIVE PROCESS Preliminary Investigation by First Responders ...... 603 The Investigator ...... 605 The Interview Process ...... 606 When Investigations Fail ...... 608 Conclusion ...... 608

CHAPTER 26: INVESTIGATING INTERNET CHILD EXPLOITATION CASES A New Area to Patrol ...... 611 Identifying Suspects and Potential Crime Areas on the Internet . . . . 611 Prosecution of Suspects ...... 611 Investigation Task Forces ...... 612 Role of the Investigator ...... 613 Internet Basics ...... 613 Trader and Traveler Cases ...... 613 Locating Evidence ...... 613 World Wide Web ...... 616

xxxvii Contents In Detail

Hypertext Transfer Protocol ...... 617 Problems Investigators Confront ...... 617 Information Helpful to Investigators ...... 617 Internet Relay Chat ...... 618 Electronic Mail ...... 619 Usenet Newsgroups ...... 620 File Transfer Protocol ...... 621 Web-Based Chat ...... 622 Messengers ...... 622 Peer-to-Peer Networks ...... 623 Other Future Threats ...... 623 Online Service Providers ...... 624 Internet Protocol Address “Tracing” ...... 624 The Importance of Time ...... 625 Other Technical Challenges ...... 625 Victim Identification ...... 626 The Undercover Technique ...... 628 Other Internet Crime Concerns ...... 628 Typical Internet Child Exploitation Cases ...... 629 Conclusion ...... 630 Appendix 26-1: Glossary of Internet-Related Terms ...... 630

CHAPTER 27: PROSECUTORIAL ISSUES IN THE CHILD PORNOGRAPHY ARENA Search and Seizure Issues ...... 635 Search Warrants ...... 636 Background Information ...... 636 Probable Cause ...... 636 Drafting the Warrant ...... 637 Expert Opinion ...... 638 Additional Considerations in Description of Items to Be Seized . . . 639 Particularity ...... 639 Overbreadth ...... 641 Anticipatory Warrants ...... 641 Good Faith ...... 642 Staleness ...... 642 Exceptions to the Warrant Requirement ...... 643 Plain View Exemption ...... 643 Consent Exception ...... 644 Exigent Circumstances Exception ...... 645 Private Searches ...... 645 Probation and Parole Searches ...... 646 Charging and Pretrial Considerations ...... 646 Defining Child Pornography ...... 646 Proving Scienter ...... 648 Statutes of Limitation ...... 649 Jurisdiction ...... 649 Number of Counts and Images to Charge ...... 650 Additional and/or Alternative Charges ...... 650 xxxviii Contents In Detail

Victim Issues ...... 651 Discovery: Whether to Give Child Pornography to the Defense . . . . 651 Jury Selection ...... 654 The Underlying Crime ...... 654 Computers and Computer Evidence ...... 655 Government Regulation of the Internet ...... 655 Diffusing Potential Defenses ...... 655 Meeting Untrue Defenses ...... 657 Mistaken Identity ...... 657 Investigate Techniques to Prove Identity ...... 657 Forensic Examination ...... 658 Defeating Hacker/Intrusion Defenses ...... 658 Providing the Image Depicts a “Real” Child After Ashcroft v Free Speech . 659 Testimony of the Child or Someone Who Knows the Child . . . . 659 Child Pornography Historian ...... 661 Computer Graphics Expert ...... 661 Proving Age ...... 661 Proving Minority Through Computer Forensics ...... 662 Proving Age Through Expert Testimony ...... 662 Proving Age Through Lay Opinion ...... 663 Proving Age Through the Defendant ...... 664 Age as a Question for the Trier of Fact to Decide ...... 664 The Mistake-of-Age Defense for Producers of Child Pornography . . 664 Lack of Intent ...... 665 Entrapment ...... 665 Internet Addiction ...... 668 Accident ...... 668 “Deleted” Computer Images ...... 669 “Mere Viewing” ...... 669 First Amendment ...... 670 Social Worker Claimed He Was Researching the Internet for Therapeutic Material ...... 670 Journalist Claimed He Was Researching an Article on Child Pornography...... 670 “Author” Claimed He Was Researching a Book on Child Abuse . . 671 Conclusion ...... 671 Appendix 27-1: Legislation Extending or Removing the Statutes of Limitation for Offenses Against Children ...... 676 State Legislation ...... 676 Alabama ...... 676 Alaska ...... 676 Arkansas ...... 677 Colorado ...... 677 Connecticut ...... 678 Delaware ...... 678 Florida ...... 678 Georgia ...... 678 Hawaii ...... 679 Idaho ...... 679

xxxix Contents In Detail

Illinois ...... 679 Indiana ...... 680 Iowa ...... 680 Kansas ...... 680 Louisiana ...... 681 Maine ...... 681 Massachusetts ...... 681 Michigan ...... 682 Minnesota ...... 682 Mississippi ...... 682 Missouri ...... 682 Montana ...... 682 Nebraska ...... 683 Nevada ...... 683 New Hampshire ...... 683 New Jersey ...... 683 New Mexico ...... 684 New York ...... 684 North Dakota ...... 684 Oklahoma ...... 684 Oregon ...... 685 Pennsylvania ...... 685 Rhode Island ...... 686 South Dakota ...... 686 Tennessee ...... 686 Texas ...... 686 Utah ...... 686 Vermont ...... 686 Washington ...... 687 Wisconsin ...... 687 Federal Legislation ...... 687 18 USCA § 3509(k) ...... 687 18 USCA § 3283 ...... 687 Appendix 27-2: Sample Indictments ...... 688 Indictment 1 ...... 688 Indictment 2 ...... 690 Appendix 27-3: Voir Dire in Computer-Facilitated Crimes Against Children 692 Simple Questions ...... 692 Comfort Level with Computers ...... 692 Computer Forensic Examiner/Expert Testimony/Computer Evidence 693 Government Regulation of the Internet ...... 694 Bias Regarding “Sting” Tactics ...... 694 Attempt and Factual Impossibility ...... 694 Children on the Internet ...... 695 Problematic Victims ...... 695 Attitudes Toward Adult Pornography ...... 697 Attitudes Toward Child Pornography ...... 697 Virtual Child Pornography ...... 698 Fantasy/Good Samaritan/Cyber Vigilante/First Amendment Defenses 698 Accident ...... 698 xl Contents In Detail

Sample Format of State’s Requested Voir Dire Questions ...... 699 CHAPTER 28: CHILDHOOD VICTIMIZATION AND THE DERAILMENT OF GIRLS AND WOMEN TO THE CRIMINAL JUSTICE SYSTEM Questions About Criminal Behavior Among Abused and Neglected Girls and Women ...... 704 Is Criminal Behavior Among Abused and Neglected Girls and Women Rare? ...... 704 Is Criminal Behavior Among Abused and Neglected Girls and Women Predominantly Sexual? ...... 704 Do Abused-Status and Neglected-Status Offenders Escalate to Criminal Offenses? ...... 705 Do Abused and Neglected Girls Develop Antisocial and/or Delinquent Lifestyles That Persist Into Adulthood, and Do They Become Chronic, Persistent Offenders With Serious Criminal Careers? ...... 705 Potential Mechanisms in the Derailment of Abused and Neglected Girls and Women ...... 705 Running Away ...... 705 Deficits in IQ or Cognitive Ability ...... 706 Lack of Traditional Social Controls ...... 706 Relationships With Deviant and/or Delinquent Friends and/or Relatives 707 Failure to Learn the Social and Psychological Skills Necessary for Successful Adult Development ...... 707 Conclusion ...... 707

CHAPTER 29: JUVENILE COURTS AND SEXUAL EXPLOITATION: A JUDGE’S OBSERVATIONS The History of Juvenile Courts ...... 711 The Modern Juvenile Court ...... 712 Juvenile Prostitution ...... 712 Juvenile Prostitution Cases ...... 713 Conclusion ...... 714

CHAPTER 30: AN INVESTIGATION OF VICTIM AND OFFENDER DYNAMICS IN PROSTITUTES AND INCARCERATED PEDOPHILES Primary Victim Impact ...... 715 Background Information ...... 717 Consequences ...... 718 Incarcerated Pedophiles ...... 719 Men Who Molest Boys ...... 719 Definitions ...... 719 Male-Target and Female-Target Pedophiles ...... 720 The Pedophile Population ...... 721 Research Methods ...... 722 Findings ...... 724 Age and Race ...... 724 Criminal Convictions and History ...... 724 Offender Childhood and Background ...... 724 Childhood Sexual Abuse ...... 725 Marriage and Adult Relationships ...... 726 Education, Employment, and Volunteer Affiliations ...... 726 First Experiences as a Perpetrator ...... 727

xli Contents In Detail

Victim Preferences ...... 727 Victim Grooming and Seduction ...... 728 Miscellaneous Findings ...... 729 Conclusion ...... 731

CHAPTER 31: HUMAN TRAFFICKING FOR SEXUAL EXPLOITATION: THE ROLE OF INTERPOL Human Trafficking ...... 735 Interpol Structure and Administration ...... 736 National Central Bureaus ...... 736 Interpol Tools for the Protection of Children ...... 737 Individual Notices ...... 737 International Yellow Notices and the Interpol Poster on Missing Children 738 International Green Notices ...... 738 Computer Systems ...... 738 Data Entry, Electronic Archiving, and Automatic Consultation . . . . 739 Interpol Achievements and Cooperation Among Agencies ...... 739 Influence of Interpol in the International Community ...... 742 Republic of Macedonia ...... 742 International Human Trafficking and Smuggling ...... 742 Conclusion ...... 744

CHAPTER 32: INVESTIGATION AND PROSECUTION OF THE PROSTITUTION OF CHILDREN Introduction ...... 745 The Crimes ...... 745 Prostitution of Children ...... 745 Laws and Penalties ...... 745 Reasons Children Become Victims of Prostitution ...... 747 Infantilization of Prostitution ...... 747 Enforcement of the Laws ...... 748 Trafficking in Children ...... 748 Child Sex Tourism ...... 749 The Investigation ...... 749 The Trial ...... 751 Charging and Pretrial Decisions ...... 751 Jury Selection ...... 752 Prostitution Is a Victimless Crime ...... 753 Children Freely Choose Prostitution ...... 754 Prostitution Can Be an Exciting and Glamorous Life ...... 754 Prostitution Is a Deterrent to Sex Crimes ...... 754 Opening Statement ...... 755 Case in Chief ...... 755 Victim Testimony ...... 755 Law Enforcement Testimony ...... 756 Additional Expert Testimony ...... 756 Meeting Untrue Defenses ...... 757 Closing ...... 758 Sentencing ...... 759 Victim Assistance ...... 759 xlii Contents In Detail

Conclusion ...... 760 Appendix 32-1: Crimes Involving the Prostitution of Children . . . . . 763 State Legislation ...... 763 Alabama ...... 763 Alaska ...... 764 Arizona ...... 764 Arkansas ...... 765 California ...... 765 Colorado ...... 766 Connecticut ...... 767 Delaware ...... 768 District of Columbia ...... 769 Florida ...... 769 Georgia ...... 769 Hawaii ...... 769 Idaho ...... 770 Illinois ...... 770 Indiana ...... 772 Iowa ...... 772 Kansas ...... 772 Kentucky ...... 773 Louisiana ...... 773 Maine ...... 773 Maryland ...... 774 Massachusetts ...... 774 Michigan ...... 775 Minnesota ...... 775 Mississippi ...... 776 Missouri ...... 776 Montana ...... 777 Nebraska ...... 777 Nevada ...... 777 New Hampshire ...... 779 New Jersey ...... 779 New Mexico ...... 779 New York ...... 780 North Carolina ...... 781 North Dakota ...... 781 Ohio ...... 782 Oklahoma ...... 782 Oregon ...... 783 Pennsylvania ...... 784 Rhode Island ...... 784 South Carolina ...... 784 South Dakota ...... 785 Tennessee ...... 785 Texas ...... 785 Utah ...... 785 Virginia ...... 785 Washington ...... 786

xliii Contents In Detail

West Virginia ...... 786 Wisconsin ...... 787 Wyoming ...... 788 Federal Legislation ...... 788 18 USCA§ 2423. Transportation of Minors ...... 788

CHAPTER 33: INTERNET PEDOPHILIA Introduction ...... 789 Historical Perspective ...... 789 Law Enforcement Difficulties ...... 789 Images and the Internet...... 792 Victim Identification by Image Analysis ...... 794 Victim Identification Process ...... 794 Investigations ...... 795 Conclusion ...... 797

CHAPTER 34: THE MEDICAL EXPERT AND CHILD SEXUAL EXPLOITATION Expert Witness Role in Comorbid Forms of Child Abuse ...... 802 The Qualification Examination ...... 806 The Medical Diagnosis of a Child Sexual Abuse Argument ...... 806 ICD-9-CM Determination ...... 806 DSM-IV-TR Criteria Determination ...... 809 Practices Guidelines From National Organizations ...... 810 Types of Medical Expert Testimony ...... 810 Substantive Testimony ...... 811 Rehabilitative Testimony ...... 812 Types of Expert Witnesses ...... 813 Background Witness ...... 813 Case Witness ...... 813 Evaluating Witness ...... 814 Testimony in Child Sexual Abuse ...... 814 Element I: The Medical History ...... 814 Element II: Behavior ...... 821 Element III: Physical Examination ...... 825 Victim Impact Testimony ...... 828 Testimony in Internet Child Pornography Analysis ...... 829 Summary Opinion in Child Sexual Exploitation ...... 830

CHAPTER 35: COMPUTER FORENSIC SOFTWARE AND ITS LEGAL VALIDATION Authentication of Recovered Data for Accuracy ...... 835 Authentication of Computer Evidence ...... 835 Authentication of the Recovery Process ...... 837 Authentication of the EnCase Recovery Process ...... 839 Challenges to Foundation Must Have Foundation ...... 839 Validation of Computer Forensic Tools ...... 840 Daubert/Frye Standard ...... 840 Computer Forensics as an Automated Process ...... 842 Commercial Versus Custom Forensic Software and Authentication Issues. 844 xliv Contents In Detail

Expert Witness Testimony ...... 845 Threshold Under Rule 702 ...... 845 Illustrations of Testimony ...... 846 Direct Examination: Pretrial Evidentiary Hearing ...... 846 Direct Examination for the Presentation of Computer Evidence . . 851 The Best Evidence Rule ...... 856 “Original” Electronic Evidence ...... 857 Presenting Electronic Evidence at Trial ...... 858 United States v Naparst ...... 859 Legal Analysis of the Evidence File ...... 859 Evidence File Format ...... 860 CRC and MD5 Hash Value Storage and Case Information Header . . . 861 Chain-of-Custody Documentation ...... 862 Challenges to EnCase and Other Litigated Issues ...... 862 State (Ohio) v Cook ...... 862 Taylor v State ...... 863 Matthew Dickey v Steris Corporation ...... 863 United States v Habershaw ...... 864 Appendix 35-1: Expert Report Submitted to the Court in United States v Habershaw, 2001WL 1867803 ...... 867

CHAPTER 36: INTERNET TRAVELERS Evolution of the Traveler Phenomenon ...... 873 The Internet as a Hunting Ground ...... 873 Children: Vulnerable Internet Targets ...... 874 Internet Sex Crime Studies ...... 875 Internet Sex Crimes Against Minors: The Response of Law Enforcement 875 Arrest Statistics ...... 875 Internet Sex Crimes Versus Conventional Sex Crimes ...... 876 Offender Profile ...... 876 Online Victimization: A Report on the Nation’s Youth ...... 876 Traveler Variations ...... 877 Local Travelers ...... 877 Interstate and Intrastate Travelers ...... 877 Global Travelers ...... 878 Victim Travelers ...... 878 Traveler No-Shows ...... 878 Sting Operations ...... 878 Addressing the Problem: Law Enforcement ...... 878 Law Enforcement Struggles ...... 878 Undercover Operations ...... 879 The Sting ...... 879 Interstate Operations ...... 880 Addressing the Problem: The Federal Government ...... 880 The PROTECT Act ...... 880 White House Attention ...... 880 Internet Crimes Against Children Task Forces ...... 881 Statistics ...... 881 Federal Partners ...... 882 National Center for Missing & Exploited Children ...... 882

xlv Contents In Detail

Background ...... 882 Web Site Success ...... 882 The CyberTipline ...... 882 National and International Cooperation ...... 884 Legal Issues ...... 884 Jurisdiction ...... 884 Theoretical Issues ...... 884 State Law ...... 884 Federal Law ...... 885 Travelers and the Courts ...... 886 Impossibility Defense ...... 886 Outrageous Government Conduct and Manufactured Jurisdiction Defense ...... 887 Entrapment Defense ...... 888 Constitutional Attack Defense ...... 889 Fantasy Defense ...... 890 Conclusion ...... 891

CHAPTER 37: ESTABLISHING CRIMINAL CONSPIRACY AND AIDER AND ABETTOR LIABILITY FOR GROUPS THAT PROMOTE SEXUAL EXPLOITATION OF CHILDREN Introduction ...... 895 Language That Creates Conspiracies or Aids and Abets Crimes of Child Sexual Exploitation Is Not Protected Under the First Amendment ...... 897 Images of Child Pornography and Speech Inciting Criminal Activity Are Not Afforded First Amendment Protection ...... 900 Pornographic Images of Children Are Not Protected by the First Amendment ...... 900 Compelling State Interest ...... 900 Narrow Construction and Child Pornography ...... 903 The First Amendment Does Not Offer Protection to Speech Used by Groups That Promote and Distribute Child Sexual Exploitation . . . . 904 A Conspiracy Is Established When One Party Advocates or Provides Instruction or Opportunity to the Coconspirators ...... 910 The Agreement ...... 912 The Illegal Act Agreed Upon ...... 913 The Overt Act to Further the Illegal Act ...... 915 The Possibility of Withdrawal ...... 919 Criminal Liability as an Aider and Abettor ...... 919 Conclusion ...... 922

CHAPTER 38: THE HIDDEN TRUTH OF INVOLUNTARY SERVITUDE AND SLAVERY The Crime Scene ...... 928 Background: The Story Behind a Gruesome Discovery ...... 929 Investigating the Crime ...... 931 The Wisdom of a Team Approach ...... 931 The First Breaks ...... 933 Hiccups ...... 934 The End Result: Sheer Determination and a Lot of Luck ...... 935 xlvi Contents In Detail

How to Determine Whether Your Case is a Trafficking Case ...... 935 The Importance of Identifying the Crime ...... 935 Legal Parameters: Victimhood Defined ...... 937 Spotting a Victim ...... 938 How to Obtain Help ...... 940 Lessons Learned: Investigative “Best Practices” ...... 941 Conclusion ...... 944

CHAPTER 39: KEEPING THE FAITH: A CALL FOR COLLABORATION BETWEEN THE FAITH AND CHILD PROTECTION COMMUNITIES The Conflict ...... 947 The Cost ...... 952 Crossing the Bridge That Divides ...... 953 Conclusion ...... 955 Appendix 39-1: Teaching the Faith-Based Community to Teach Themselves and Their Children Personal Safety ...... 958 Appendix 39-2: Making Congregations Safe for Child Abuse Victims . . . 961 Appendix 39-3: Seven Suggestions to Make Congregations Safe for Victims of Domestic Violence ...... 963

CHAPTER 40: EXITING ROUTE: A PEER SUPPORT MODEL FOR EXITING AND HEALING PROGRAMS Understanding Commercial Sexual Exploitation of Children ...... 966 Barriers and Challenges to Exiting ...... 966 Successful Exiting and Healing ...... 969 Exiting Route Model ...... 970 Stages of an Exiting and Healing Group Life Cycle for Sexually Exploited Youth ...... 973 Inclusion ...... 973 Conflict ...... 974 Resolution ...... 975 Production ...... 975 Termination ...... 975 More Insight ...... 976 Principles of Good Practice ...... 976 Conclusion ...... 978

CHAPTER 41: THE AMBER ALERT PROGRAM: MISSING CHILDREN BEFORE AND AFTER Children Whose Lives Begged for a Better Response ...... 980 Etan Patz ...... 980 The Atlanta Murders ...... 980 Adam Walsh ...... 982 Jacob Wetterling ...... 983 Polly Klass ...... 983 Megan Nicole Kanka ...... 983 Jimmy Rice ...... 983 Amber Hagerman ...... 984 The AMBERAlert ...... 985 An Overview ...... 985 The Notification Process ...... 985

xlvii Contents In Detail

Role of the National AMBER Alert Coordinator ...... 985 Abduction of Infants and the AMBERAlert ...... 986 Abduction of Teenagers and the AMBER Alert ...... 986 An AMBER Alert Success Story ...... 987 Strategy for AMBER Coordination ...... 987 Assessment of Current AMBER Activity ...... 987 Creation of a Coordinated AMBER Network ...... 988 Communication of “Lessons Learned”...... 988 Child Lures Prevention ...... 988 Attempted Nonfamily Abductions ...... 989 National Incidence Study of Missing, Abducted, Runaway, and Thrownaway Children ...... 989 National Incidence Study of Missing, Abducted, Runaway, and Thrownaway Children-2 ...... 990 Conclusion ...... 991

CHAPTER 42: THE IMPACT OF NEWS COVERAGE: HOW THE MEDIA CAN HELP Understanding Journalists ...... 994 Journalism Values ...... 995 The Impact of News ...... 996 Coverage That Works ...... 998 Working With the News for the Sake of Exploited Kids ...... 1003 Improving Attitudes About Journalists ...... 1003 Getting News Attention ...... 1004 When a Reporter Calls ...... 1005 Helping Victims Who Go Public ...... 1006 Conclusion ...... 1006

CHAPTER 43: WORKING WITH THE TOURISM INDUSTRY TO PREVENT CHILD SEXUAL EXPLOITATION: AN INDIVIDUAL PERSPECTIVE Concern Raised for Exploitation of Children Through Sex Tourism . . . 1010 Increase in Numbers of Children Involved in Prostitution in Southeast Asia ...... 1010 Minimization of Actual of the Existence of Child Prostitution . 1010 Formation of the End Child Prostitution in Asian Tourism Campaign . 1011 Creating a Global Network ...... 1011 A Multidisciplinary Approach ...... 1012 Travel and Tourism Industry Education and Actions ...... 1013 Tourism Campaigns in Sending Countries ...... 1013 Tourism Campaigns in Destination Countries ...... 1014 Other Tourism Incentives ...... 1014 Child Wise Tourism ...... 1014 The Code of Conduct for the Protection of Children From Sexual Exploitation in Travel and Tourism ...... 1015 The Youth Career Initiative ...... 1016 Conclusion ...... 1017

CHAPTER 44: INTERNET HOTLINES AND THE HISTORY OF INHOPE: THE ASSOCIATION OF INTERNET HOTLINE PROVIDERS What is an INHOPE Hotline? ...... 1019 xlviii Contents In Detail

Historical Background ...... 1019 How Do INHOPE Hotlines Operate? ...... 1020 INHOPE Activities ...... 1022 Working Groups ...... 1022 Best Practice Papers ...... 1022 Interactions With Law Enforcement Officials ...... 1022 Report-Receiving Mechanisms ...... 1023 Expertise ...... 1023 Acceleration ...... 1023 Contacts ...... 1023 Trends ...... 1023 Workload of the Member Hotlines ...... 1024 Statistics Reference Period ...... 1024 Analysis of Trends ...... 1024 Success Stories ...... 1025 Operation Marcy ...... 1025 Operation Hamlet ...... 1025 Spain ...... 1025

CHAPTER 45: SHADOW CHILDREN: ADDRESSING THE COMMERCIAL EXPLOITATION OF CHILDREN IN RURAL AMERICA Introduction ...... 1027 A Harsh Existence: Who Are the Commercially Exploited Children? . . . 1028 Survival Sex ...... 1028 The Horrors of Child Prostitution: Broken Lives ...... 1030 Histories of Commercially Exploited Children: Faces Behind the Label . . 1031 Current Approach by Law Enforcement Agencies and the Need for Social Service Resources ...... 1032 The Supply of Commercially Exploited Children in Small Towns and Communities ...... 1032 Cutting Off the Supply of Commercially Exploited Children From Small or Rural Communities ...... 1033 Use of Community Policing Practices ...... 1033 Use of a Community Network to Identify Children at Risk . . . . . 1033 Education of Children About the Dangers of the Street ...... 1034 Education of Parents to Keep Their Children Safe ...... 1034 Close Monitoring of Local Strip Clubs ...... 1034 Development of a Network of State and National Contacts . . . . . 1035 Addressing Child Abuse at the Earliest Ages ...... 1035 Development of Forensic Interviewing Skills for Children of All Ages . 1035 Development of Investigative Abilities for Child Sexual Exploitation . . 1036 Closely Working With Social Sciences ...... 1036 Public Advocation for Commercially Exploited Children in an Effort to Acquire the Necessary Resources to Address This Social Ill . . . . . 1037 Conclusion ...... 1037

CHAPTER 46: RECOMMENDATIONS FOR ACTION FOR DEALING EFFECTIVELY WITH CHILD SEXUAL EXPLOITATION Recommendations ...... 1041 Protect the Children ...... 1041

xlix Table of Contents

Protect the Children: The Role of the Family ...... 1041 Protect the Children: The Contribution of Teachers, Clinicians, and Other Adults Who Come in Direct Contact With Children ...... 1042 Protect the Children: Promote Community Involvement in Education and Advocacy ...... 1042 Protect the Children: The Role of the Government ...... 1043 Target Adult Sexual Exploiters of Children, Not the Children, for ...... 1043 Increase the Penalties Associated With Sexual Crimes Against Children . 1044 Fully Enforce and Strengthen Existing National and State Laws Relating to Child Sexual Exploitation ...... 1044 Establish a National Child Sexual Exploitation Intelligence Center . . 1045 Expand Federally Funded Multijurisdictional Task Forces on Child Sexual Exploitation Into All Major Federal and State Jurisdictions . . . . . 1046 Expand Federally Funded Internet Crimes Against Children Task Force Programs Into All Major Federal and State Jurisdictions ...... 1046 Promote Effective Public-Private Partnerships for Combating Child Sexual Exploitation ...... 1047 Enlarge the National Pool of Child Sexual Exploitation Experts and Specialists ...... 1047 Undertake More Specialized Studies of Perpetrators and Victims of Child Sexual Exploitation ...... 1048 Conclusion ...... 1049

INDEX ...... 1050

l Medical, Legal, & Social Science Aspects of Child Sexual Exploitation A Comprehensive Review of Pornography, Prostitution, and Internet Crimes

G.W. Medical Publishing, Inc. St. Louis 1 Chapter

A BRIEF HISTORY OF CHILD SEXUAL EXPLOITATION Sharon W. Cooper, MD, FAAP

A discussion of the history of sexual exploitation must include pornography and pros- titution; these 2 entities are closely intertwined. It is common for children and youth who have been exploited through one venue to be victimized by the other. In ancient times, images that were drawn, carved, or chronicled were felt to have been reproduc- tions or reminiscent of actual experiences. Consequently, the unfolding of centuries of sexual practices with intermittent travesties crosses cultures, religions, and even the developments of the so-called spoils of war that led to exploitation reserved for en- slaved populations. It is difficult to separate child exploitation historically from that of adults for several reasons: 1. Children were often seen in historical times as chattel with little value to their lives. Consequently, their use as sexual objects was not worthy of close scrutiny and, therefore, was not necessarily worthy of documentation. 2. Many ancient societies were patriarchal, and the position of women and children was far below the needs and desires of men. Because of this, child sexual abuse and exploitation were not acknowledged and were less likely to be documented or seen as illegal. 3. The gradual transition from childhood to adulthood was often heralded by pu- berty. Because these physiological changes varied in different centuries, cultures, and ethnic groups, exploitation of children is more difficult to define in a his- torical sense. For these reasons, historical reviews will often combine adult and child pornography and prostitution, recognizing that many children and youth were included in such sexual practices. ANCIENT CIVILIZATIONS Pornography has been present for centuries. The word pornography is derived from the Greek words porni (“prostitute”) and graphein (“to write”). In the Greek and Roman era, erotic and obscene themes were readily depicted in literature and art. Dionysus, the Greek god of wine, brought to literature frivolity and resulting drunk- enness and the eastern orgies with their associated religious themes. Dionysus, often referred to in Roman mythology as Bacchus, was the source of salacious writings of songs performed at ancient Greek festivals. These writings became some of the first written historical evidences of pornography.

ANCIENT EGYPT The ancient Egyptians developed the process of using the papyrus plant to make sails, cords, and paper. Paper made from the papyrus plant, which was the chief writing material in ancient Egypt, was adopted by the Greeks, and was used extensively in the Roman Empire. Used mainly as scrolls for legal documents and as pages for the

1 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

production of books, it was also used for correspondences. Consequently, the pornog- raphic texts were initially documented on papyrus. Papyrus became unnecessary in the eighth and ninth centuries AD when other plant fibers were introduced.

THE OLD TESTAMENT Biblical history described and warned against sexual exploitation primarily regarding the use of prostitutes. Sexual favors, as described in the Old Testament, were often for the purposes of hospitality or for procreation when a wife was infertile. Such was the case when Sarai gave Abram her handmaid, Hagar, who later bore the child Ishmael (Genesis 16:1-16) (Rainbow Studies Inc, 1996). Concubines were considered dif- ferent from prostitutes in Biblical times because they were mistresses who lived in the homes of their patrons. Concubines may have been girls or women and were housed separately from the wives of the patriarch. Prostitution was not thought to exist in the early Israelite tribes until they came in contact with the Canaanites in the 15th century (Third Millennium Trust, 1890). The Canaanites had fertility cults and worshipped gods in temples, temples which had their own prostitutes. The Israelites began to di- vide prostitutes into 2 separate categories: the zonah, which were profane prostitutes, and the q’deshah, or the holy prostitutes. The latter, referred to as shrine prostitutes, were derived from those cultures that had polytheistic deities (Larue, 1998). Hebrew law did not forbid prostitution but confined the practice to foreign women. In the Book of Leviticus, which was written around 1500 BC, Israelites were warned regarding the dangers of prostitution. The 19th chapter was devoted to instructions for holy living. In particular, it was considered a traresty for parents to lead their children to a life of prostitution: “Do not degrade your daughter by making her a prostitute, or the land will turn to prostitution and be filled with wickedness” (Levit- icus 19:29) (Rainbow Studies Inc, 1996). In addition, Israelites were warned against becoming prostitutes: “No Israelite man or woman is to become a shrine prostitute. You must not bring the earnings of a female prostitute or of a male prostitute into the house of the Lord your God to pay any vow, because the Lord your God detests them both” (Deuteronomy 23:17) (Rainbow Studies Inc, 1996). Not all prostitutes in the Bible, however, were seen as evil. In the Book of Joshua in the Old Testament, Rahab was a well-known and respected prostitute who hid 2 spies sent by Joshua to survey the land of Jericho, in exchange for the safety of her family. She let them down by a rope through a window in her house, over the city wall, to escape guards from the king of Jericho (Joshua 2:1-15) (Rainbow Studies Inc, 1996).

ANCIENT GREECE In ancient Greece, around the fifth century BC, art and culture reflected the diver- sified roles of girls and women. Athenian girls were usually married by the age of 14 to 15 years, whereas the Athenian women of Sparta were specifically forbidden to marry before the age of 18 years. Spartan women were thought to have a higher level of respectability and were not to be depicted as showing any flesh. Even in Athenian art depicting marital relations between husbands and wives, the women were com- pletely clothed, while their husbands were nude. The Greeks sought to establish a “refined” level of prostitution. This embodiment was the hetaera, or the groomed prostitute. Greek men had concubines (who would be called mistresses in the current era) for their daily bodily care, wives for legitimate childbearing, and hetaerae for pleasure. Even though the hetaerae were beautifully cared for and coiffed, they were still treated as prostitutes and were beaten and raped at the will of their sponsors. Grecian artwork of the hetaerae occasionally depicted beatings with fists, sticks, and sandals. Though the hetaerae were highly refined and similar to Japanese geishas in their skills as courtesans, they were usually slaves from the poorest classes. Other classes of prostitutes included the streetwalkers, prostitutes who were confined to brothels, and the temple or consecrated prostitutes (Figure 1-1).

2 2 Chapter

COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN ADVERTISING Linnea W. Smith, MD Marcia E. Herman-Giddens, PA, DrPH V. Denise Everette, MD, FAAP

In a society where in a year an estimated quarter of a million children are sexually exploited for profit in the United States alone (Estes & Weiner, 2001), and 2 to 3 million reports were filed alleging the maltreatment of children, there is a growing movement to determine what may be contributing to this climate of misuse and abuse of children. Applying the public health model that no illness is ever brought under control by treating only the casualties, the health care profession, along with other social scientists and organizations, is examining cultural influences that may contribute to this exploitation. Of primary focus is the content of mass media that may increase the vulnerability of children to victimization or contribute to the demand side of sexual and physical abuse and other sexual exploitation of children. Though there has been investigation and discussion of certain forms of media vio- lence and television content, advertising has not received as much emphasis as other media forms when looking at the use and portrayal of children in ads and children as consumers of advertising. This chapter will examine the role of advertising in the sexual exploitation of children and what pediatricians, parents, and others are doing and can do to keep children safe and healthy. This chapter draws on the theories and methods developed in cultural studies, founded in the 1970s by media scholars who were dissatisfied with the traditional approach to the study of media. This approach tended to ignore the ideological impact of popular culture and its role in constructing hegemonic discourse (DeFleur, 1998). The main aim of the cultural studies approach is to explore the long-term effects of living in a culture where individuals are bombarded with images that distort notions of reality (Barker, 2000; Grossberg & Radway, 1997; Lewis, 2002). This contrasts with the more positivist paradigm that posits a somewhat simplistic relationship between images and short-term behavioral change. Cultural studies theorists were critical of quantitative content analysis, arguing that splitting media texts into quantifiable units failed to capture the way that the texts work as a struc- tured whole. For this reason, the research discussed in this chapter utilizes qualitative rather than quantitative content analysis to examine the codes and conventions of the images. WHY ADVERTISING? Advertising is a pervasive and powerful force in American culture (Jhally, 1995). According to the Canadian Advertising Foundation’s Code of Advertising Standards (2004), advertising is defined as “any paid message communicated by the media with the intent to influence the choice, opinion, or behavior of those addressed by the commercial message.” One leader in mass communication research identified

25 Chapter 2: Commercial Sexual Exploitation of Children in Advertising messages in commercial media—television and “new” media, in the form of video games and Web sites—and teaching par- ents and children to navigate the slippery slopes of what is and is not healthy. No organization, even one whose primary focus is the welfare of children, is exempt from the normalization of these port- rayals. Although this example did not appear in an ad, there are several important lessons to learn from the cover photo for the June/July 2001 issue of Healthy Kids (Figure 2-1), a bimonthly parenting magazine from the American Academy of Pediatrics for parents of children aged 2 to 10 years old. Unfortunately, this kind of portrayal of female children is common in print advertising and normalized in our popular culture, in part due to the cumulative effect of frequent pictures like this in the media. Consequently, many of us in society, including child advocates and healthcare professionals, have become desen- sitized to the overt and underlying messages these powerful images convey. What is the purpose of the image? What unintended commu- nication is really happening? The 5- to 7-year-old child model is wearing a contrived costume of a white cowboy hat, pink two-piece bathing suit top, and tan cargo pants (pants perhaps more commonly associated with teen fashion). Her hat is coyly positioned, not as a child would wear it on her own. Her left knee is bent with the left leg in front of the right, holding a nearby tree trunk with her left arm. Her pose is passive, arti- Figure 2-1 ficial, and in keeping with the traditional female pin-up pose. Her head is positioned downward, an example of Goffman’s “head cant” in which the level of the head is lowered or tilted “in a display of ingratiation and submissiveness” (Schroeder, 1998). This is in sharp contrast to the traditional male stance that is taut, rigid, or straining, indicating power and control, or standing on both feet ready to act. Yet she looks up at the camera and reader, as if knowing she is on display. She is not playing, reading, talking with other children, or doing any of the things appropriate for a child her age. She is doing nothing but being displayed for the pleasure of the viewers. She is submissive and compliant to the photographer’s wishes. She is trivialized as an active child who is going swimming, playing on the beach, getting ready to ride horses, or engage in other cowboy activity. Yet her “costume” is not practical, and dress-up games traditionally do not occur on a beach. The cowboy hat seems to sexualize the costume (see also Figure 2-2). Her hair is carefully groomed and fluffed. (There are credits to the hairdresser, modeling agency, and fashion companies on the inside front page). Her only value as a female child is the attention she gets and that is based on her physical appearance and groomed beauty. She is eye candy for all viewers. The public would be unlikely to accept a photo of a male child presented in this way. In addition to the valid concerns about the female child being presented in a sex- Figure 2-2 ualized manner, there are also important issues regarding the social construction of gender. The cover is similar to print advertising today, which has traditionally Figure 2-1. This child model is in a tradi- emphasized sexuality and physical appearance to sell products. In her research, Moog tional female pin-up pose, leg bent and “shows how print advertising communicates immature attitudes about sexuality to head tilted coyly (Healthy Kids, cover photo, young people; consequently, their definitions and perceptions of sexuality and gender June/July 2001). identity become ‘stunted’” (Fox, 1996). Figure 2-2. As in its grown-up counterparts, Because of this conventionalized display of the body, Kuhn (1985) believes that the western-theme fashion is an advertising focus, this time for child beauty pageant viewer is more likely to hold the girl responsible for soliciting the spectator’s gaze and contestants (Pageantry, Summer 2003). constructing her own body as an object of scrutiny. This gives an exhibitionistic

29 3 Chapter

CHILD SEXUAL EXPLOITATION FROM A GLOBAL PERSPECTIVE Ingrid Leth, Former Senior Adviser, UNICEF*

The literature on sexual exploitation of children reflects the cultural background from which it is derived. Generally, textbooks describe the phenomenon from a Western and often urban perspective. The purpose of this chapter is to describe the concept of sexual exploitation in different frameworks, analyze root causes and risk factors, and illuminate different aspects of sexual exploitation and abuse in a broader scope. The emphasis is on regions of the world where sexual exploitation plays a major role. The international conventions and aid organizations’ efforts to combat the phenomenon will be described. The descrip- tions will be based on available situation analyses and research studies. This chapter will also provide an overview of the methodology used in these studies. The studies are of variable quality, partly because the issue is sensitive. For example, brothel owners or guards may be present when children are informants, causing the conditions in which studies are carried out to be stressful. It seems highly objec- tionable that researchers should pretend to be customers in order to approach the children and tape the interviews without the respondents’ knowledge. Conducting reliable studies is a critical issue (Ennew et al, 1996). In fact, few studies since the First World Congress Against Commercial Sexual Exploitation, which took place in Stockholm in 1996, could be labeled reliable. Much material exists, but one problem with the nongovernmental organization (NGO) literature is that “the academic literature seems to be largely ignored or unknown” (Ennew et al, 1996). In addition, within mainstream campaign literature, certain categories become blurred. The following are among the most common sources of error: — Prepubescent and postpubescent children are often included in the numbers given for prostituted children along with young women over age 18. — Numbers given for Western tourist clients are confused with numbers of Western tourists as a whole, with no account given of local clients (Ennew et al, 1996). Child sexual abuse and exploitation are universal problems, and no country can claim to be without these scourges. However, the problem is particularly widespread in Southeast Asia (eg, Thailand, the Philippines, Cambodia, Vietnam, China), southern Asia (eg, India, Nepal, Sri Lanka), and Latin America (eg, Brazil). In Africa, the prob- lem emerges in a less visible way. DEFINITION OF SEXUAL EXPLOITATION In studies and situation analyses from developing countries, sexual exploitation is the most commonly used term. In a background paper for the Second World Congress, O’Connell-Davidson (2001) provides a definition of sex exploiters. With a slight change, this definition may be used to define child sexual exploitation (CSE) as taking unfair advantage of some imbalance of power between an adult/young person

* The contents of this chapter do not necessarily reflect the policies or views of UNICEF.

59 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

and a child under the age of 18 in order to use her or him sexually for either profit or personal pleasure. The term sexual abuse is used here to emphasize the emotional relationship between the child victim and the sex exploiter, often within the context of families. Along with sexual abuse and commercialized sexual exploitation, this definition in- cludes the question of consent. Children below the age of 18 can not give informed consent. The term sex exploiter may be more useful than perpetrator or sex offender, because it may encompass commercial sexual exploitation as well. The Convention on the Rights of the Child (CRC) defines childhood as continuing up to age 18 years old (Office of the High Commissioner for Human Rights, 1989). This normative rule is followed in this context, even if children have to care for their families before age 18 or are married at age 10. THE CONCEPT OF SEXUAL EXPLOITATION FROM A GLOBAL PERSPECTIVE In Western academic literature, the term sexual abuse is used, and there is little ref- erence to CSE such as prostitution. This may be because in Western societies the prostitution of children is not a significant problem nor is it defined as a problem to be dealt with. Children involved in the sex trade are regarded as “bad kids” who are to for what happened to them (Spangenberg, 2001). Child prostitution is, thus, considered a form of sexual acting out (Hollin & Howells, 1991). This clinical ap- proach does not include aspects of necessity and survival. Therefore, it is necessary to link this tradition to its historic background and to look at other cultures to under- stand this phenomenon. In Western societies, sexual abuse and exploitation became a political issue in the 1970s largely as a consequence of the women’s liberation movement. Unseen aspects of family life were brought into the open, including wife battering, child abuse, and child sexual abuse. The knowledge obtained in the past 25 years, however, can not be easily generalized beyond Western culture. To understand the broader scope of the problem, it is necessary to include the ex- ploitative sides of sexual abuse. We may roughly distinguish among physical injury, sexual abuse, emotional or , and neglect (Creighton, 2002), de- spite the fact that a sexually abusive act includes 2 or 3 of these aspects. From a global perspective, sexual exploitation should be added. In this context, the concept of sexual exploitation should be considered as a general term also to include both com- mercial and noncommercial sexual abuse. Sexual exploitation of children may occur inside and outside of families and is committed by a male or, in rare cases, a female perpetrator or sex offender (Ennew, 1986). The most common model to categorize sex offenders was developed by Groth (1979). He describes 3 types of sexual per- petrators: the regressive type, the fixated type, and the situational type. The men committing these acts by having sex with children are not considered normal but are thought to have a personality disorder. Among the general public it is considered perverted to have sex with children, and in prisons sex exploiters are treated harshly and are placed lowest in the status hierarchy of the inmates. In Western communities, there is an outspoken condemnation of offenders because sexual exploitation is known to be harmful to children and to have long-lasting consequences. It is not only a question of a disorder but also a question of morality. In Western countries, legislation and attitudes define childhood as a special life stage requiring nurturing, formal education, and protection up to a specific age. Children are often brought up in a world of their own and in many ways are segregated from the adult working realm.

60 INDEX

A emotion, reason (contrast), 570–571 AACAP. See American Association of Child and Adolescent interview, 571–575 Psychiatrists investigation, 568–593 AAP. See American Academy of Pediatrics perspective, 569–570 AAS, 429, 430t law enforcement role, 572 Abduction. See Attempted nonfamily abduction; Infants; rapport, establishment, 573 Teenagers terms, clarification, 573 involvement, 534 videotaping, 573–574 Abel, Gene, 279, 722 Acquaintance-exploitation cases, 556–568 Abel VT, 284 assessment/evaluation, 575–581 Abercrombie ad. See Elementary school children mannequins behavior patterns, documentation, 582–584 Abuse corroboration, 581–588 cases, comparison, 559t disclosure continuum status, 557–558 clergy reports, 948 dynamics, 556–558 definition, 715 experts, usage, 557 images, offending process (relationship), 265–273 high-risk situations, 566–567 medical evidence, 822 investigation, 566–567 method, 825 medical evidence, 584 pornographic evidence, 827 parents, role, 557 questions, usage, 381t–382t Acquaintance-seduction preferential offender, 588 Abuse Assessment Screen (AAS), 429, 430t Acquired immunodeficiency syndrome (AIDS), 141, 148 Abused girls/women, criminal behavior compromise, 392 frequency, 704 contraction, 73, 76, 747 questions, 704–705 risk, 425, 804 sexual characteristic, 704–705 transmission, 1030 Abused/neglected girls vulnerability, 968 antisocial/delinquent lifestyle development, 705 Acute internal injuries. See Genital trauma derailment mechanisms, 705–707 Acute visible injuries. See Genital trauma Abused/neglected women, derailment mechanisms, 705–707 Addiction, 197. See also Cyber addiction; Drugs Abused-status offenders, escalation. See Criminal offenders Admirable Discourses of the Plain Girl, The, 6 Abusive Images Unit (AIU), investigations, 795–797 Adolescents Accidental disclosure, 820 advertising guidelines, status, 45–46 Accidental touching, 728 boy, anal-penile penetration (history), 360f Acquaintance child exploitation cases, 590 female, hymenal clefts, 362f Acquaintance child molestation, 532–535 girls Acquaintance child molesters, behavioral analysis abnormal vaginal bleeding, differential diagnosis, caution, 529–530 379t definitions, 535–542 anal penetration, denial, 360f need, 535–536 intimate partner violence. See Prostituted adolescents introduction, 529–535 offenders, 555–556 overview, 530–535 online contact, 477 Acquaintance child molesters, determination, 533 substance abuse, CRAFFT Screening test, 355t Acquaintance sexual exploitation Trichomonas vaginalis discharge, 356f assessment/evaluation, 575–581 victims, uncomplicated STDs (management). See Sexual big picture approach, 571 abuse disclosure/reporting continuum, 572–573 Adult/ sexual contact, 473

489 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

sexually deviant Internet users, supporters (online Aggressive solicitations, 444 communication), 478t Agreement, definition (conspiracy law), 912 Adults Aider/abettor development, social/psychological skills (learning criminal liability, 919–922 failure), 707 liability, establishment. See Child sexual exploitation male/female juxtaposition, ad, 36f AIDS. See Acquired immunodeficiency syndrome pornography AIM. See America Online attitudes, sample questions, 697 AIU. See Abusive Images Unit impact, understanding, 193 Alcohol prostitution, research, 174 intoxication, 352 relationships. See Incarcerated pedophiles use, 353–355 sexual exploiters, targeting/punishing. See Children Alger, Horatio, 949 sexually exploitative advertising, impact, 38–43 Alice's Adventures in Wonderland (illustration), 11f solicitation. See Youth Alienation, 337. See also Youth alienation/victimization survivors, psychological profiles. See Child sexual AMBER. See America's Missing: Broadcast Emergency exploitation industry Response traffickers, sexual purposes. See Children Ambulatory care clinics, 398 witnesses/suspects, identification, 584 America Online (AOL), 18, 624, 635 youth Internet friendships access controls, 457 appearance, 460 Instant Messenger (AIM), 622f formation/risk, 446–447 American Academy of Pediatrics (AAP), 810. See also Media Advanced Research Projects Agency (ARPA), 17–18 Matters Adventure-based programs, usage, 417 advertising, assessment, 39 Advertising. See MTV national campaign, 47 change, recommendations, 46–51 News, 50 commercial sexual exploitation of children, 25 policy statement, 27 appearance, 28–30 American Advertising Federation, 43 conclusion, 51 American Association of Advertising Agencies, 43 examination, reasons, 25–28 American Association of Child and Adolescent Psychiatrists focus, child beauty pageant contestants, 29f (AACAP), 48 guidelines, status. See Adolescents American Hospital Association, 806, 809 history. See Child sexually exploitative advertising American Journalism Review (AJR), 1004 pediatricians, impact, 48 American Professional Society on the Abuse of Children pornography, relationship, 194 (APSAC), 810 sex/violence, 35–37 American Prosecutors Research Institute (APRI), 1035–1036 Advertising Standards Canada, 45 American Psychological Association (APA), ethical principles, Advocacy, promotion, 1042–1043 198 Affective disorders, 77 American Registry for Internet Numbers (ARIN), 624, 630, Affidavit, providing, 660f 632 Affluence, poverty (paradox). See North America America's Missing: Broadcast Emergency Response Africa, child prostitution (example), 67 (AMBER) Alert African ancestry, characteristics, 225 activity, assessment, 987–988 African descent, racial differences, 224f coordination, strategy, 987–988 Age, proof. See Child pornography lessons, communication, 988 defendant, testimony, 664 national coordinator, role, 985–986 expert testimony, 662–663 network, creation, 988 lay opinion, usage, 663–664 notification process, 985 trier of fact, decision question, 664 overview, 985 Age of consent, 560–562, 829 program, 979 laws, 199 relationship. See Infants; Teenagers Age of Enlightenment, child sexual exploitation, 7 success story, 987 Age of mistake. See Children system, 320 Age-inappropriate sexual behavior, 822 Amnesty International, 376 Aggression, 228, 408 Anal penetration, denial. See Adolescents Aggressive sexual solicitations, 440 Anal sphincter dilatation, 362f

490 Index

Anal trauma, 584 Assistant US Attorney (AUSA), 932 Anal-penile penetration, 362 Association for the Treatment of Sexual Abusers (ATSA), Anatomy, normal appearance, 370–373 277, 279 Ancient China conference, 285 sexual symbiosis, symbol, 4f Ethics Committee, 291 Ancient China, child sexual exploitation, 4 standards, 279–280, 291 Ancient civilizations, child sexual exploitations, 1–4 Association of Internet Hotline Providers (INHOPE) Ancient Egypt, child sexual exploitation, 1–2 activities, 1022–1025 Ancient Greece Best Practice Papers, 1022 child sexual exploitation, 2–3 Code of Practice, 1022 prostitution, classes, 3f historical background, 1019–1020 Ancient Rome history, 1019 child sexual exploitation, 3–4 hotline , presence, 3 definition, 1019 Ancillary details, 817 operation process, 1020–1022 Angel (movie ad), 41f impact. See Spain Annular hymen, 372f interaction. See Law enforcement Anogenital trauma, medical implications. See Child sexual member hotlines, workload, 1024–1025 exploitation members, 1021t Anthroscopy, 224 statistics reference period, 1024 Anticipatory warrants, 641–642 success stories, 1025–1026 Antisocial lifestyle development. See Abused/neglected girls trends, analysis, 1024–1025 Antisocial personality disorder (ASPD), 288 Association of National Advertisers, 44 Anti-virus software, 630 Association of Southeast Asian Nations (ASEAN) Regional Anxiety, 352 Think Tank, 1015 disorder, 228 Atlanta Journal-Constitution, article, 998–1000, 999f, 1003 APNIC. See Asian-Pacific Network Information Center Atlanta murders, 980–982 Applets, 622 commemorative artwork, 981f APRI. See American Prosecutors Research Institute victims, 981t APSAC. See American Professional Society on the Abuse of ATSA, 932 Children Attempt charge, sample questions, 694–695 Archival file review group, 723 Attempted nonfamily abductions, 989–991 ARIN. See American Registry for Internet Numbers Attention Center for Border Children, 311 Armed conflicts, children (involvement), 73–74 Attention deficit hyperactivity disorder, 228, 408 Armstrong v Executive Office of the President, 858 Attorney's Office for the Defense of the Child and the ARPA. See Advanced Research Projects Agency Woman and the Family, 311 ARPANET, 17 AUSA, 932 Ars Amatoria (Ovid), 3–4 Authorities (distrust), example, 90t Artha, 5 Automatic consultation. See International police ASEAN. See Association of Southeast Asian Nations Ashbee, Sir Henry Spencer, 10 B Ashcroft v Free Speech, 206 Back Orifice (BO), susceptibility, 659 decision, 656, 659 Backlash, impact, 575 definitions, unconstitutionality, 19 Bacterial agent treatment, 392 impact, 215. See also Real child depiction Bad kids, consideration, 60 problems, 651 Bandura, Albert, 479 ruling, 259, 474, 638 Bandwidth, 630 Asian ancestry, characteristics, 225 Bangkok Post, poverty/children sale, 70 Asian descent, racial differences, 224f Barrie, JM, 248 Asian-Pacific Network Information Center (APNIC), 624, Beating the Devil Out of Them (Murray Straus), 136 630, 632 Becker, Judith, 279 ASPD, 288 Behavior Assault victims overlap. See Reported behavior nongenital injuries, 359t patterns, documentation. See Acquaintance-exploitation physical examination, conducting (objectives), 387t cases

491 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

precociousness, 822 violence, disposition, 137–138 standards (cleanup), youth (mobilization). See Internet Boys & Girls Clubs of America (BGCA), 875 Behavioral assessment. See Juveniles; Victims BPAM, 238 Bell, Yusuf, 981 Brandenburg v Ohio, 900, 907 Benign neglect, 1044 Breast development, Tanner stages. See Females Benin, absent children (study), 67 Breast Pubic Axillary Menses (BPAM), 238 Berners-Lee, Tim, 18 Broadband, 630 Best evidence rule, 856–859 Brooks, Tamara, 987 , 859 Brothel children, 65–66 Best practices, 711 Brothels, 63–65 Bestiality. See Zoophilia Browser, 630 Beyond Borders, 308 Bruising, 430 BGCA, 875 Bulletin boards, 895t Big baby, 539 Bundeskriminalamt (BKA), 627 Big Brothers Big Sisters, 726 Bundy, Ted, 989 Birth control, information, 33 Bureau of Alcohol Tobacco and Firearms, 203 Bit-stream forensic image, 861 Bureau of Immigration and Customs Enforcement (ICE), BKA, 627 626 Blocking software, 610t law enforcement partnerships, 211 understanding, improvement, 463 participation, 928 usage, 457 Business community, social responsibility, 49 Blogs, 248 Blue demonic face, drawing, 405f C BO. See Back Orifice C. Trachomatis. See Chlamydia trachomitis Bodily injury, 826 C3. See Cyber Crimes Center Body image, 40–43 Cable modem, 630 Body parts, abuse, 555 Cache, evidence, 658 Bondage, 551 Calcium channel blockers, 358 Bone v State, 838 California State Department of Justice, 884 Border wallpaper, British feature, 796f Call girls, 64 Borderline touching, 728 Calvin, John, 949 Boy Scouts, 726 Calvin Klein. See Klein Boyfriends, attachments, 97 Canada Boy-love computer forum discussion group, 731 child pornography, 307–308 Boy-love magazine, 915 children, profiles, 304–305 Boy-lover newsgroups, 480 commercial sexual exploitation Boy-lover Usenet groups, 481 entrance process, 180–184 Boys existence, explanation, 184–187 abuse, 131–132 exit process, 187–191 aggression. See Caretaking adult CSEC, 304–321 anal-penile penetration, history. See Adolescents experiential youth perspectives, 179 athletic clothing, ad, 36f exploiters, profiles, 305 discipline, 136–137 language/respect, 179 hitchhiking, 139–141 law enforcement, 306–307 lovers, 480 national legislation, 306 man, transition, 134–135 online sexual victimization, 307–308 molestation, 719 political/economic characteristics, 299t–301t prostitution, solution, 139–141 population/health/social characteristics, 302t–303t protection, 133 prevention/prosecution/protection programs, 307 pubic hair/genitalia development, stage/fiducial limits private sector, role, 308 (median ages), 236t trafficking, 305–306 sexual abuse, toleration, 141 Canada Customs and Revenue Agency (CCRA), 307 special issues. See Juveniles Canada Evidence Act, 836 spirit, breaking, 136–137 Canadian Police Information Center, 305 street life, 138, 143–144 Capacity-building, principle, 976–977

492 Index

Captive Daughters, 321 images, 239–240 Car Relax Alone Friends Forget Trouble (CRAFFT) relationship. See Child pornography Screening test, 353. See also Adolescents Child exploitation Cardiac arrhythmia, 358 cases, investigation. See Internet Caretaker missing, 991 concern. See Sex tourism episodes, 991t identification. See Commercially exploited children Caretaking adult news, interaction, 1003–1006 abuse, 135 Child Exploitation and Obscenity Section (CEOS), 600 boys, aggression, 135 Child Exploitation of Obscenity Section. See United States Carroll, Lewis, 11, 248 Department of Justice CARU. See Children's Advertising Review Unit Child Find Manitoba, 307 Case information header. See Cyclical Redundancy Check; Child Lures Prevention Safe Environment Program, 988–989 Message Digest 5 Child molesters, 720. See also Preferential-type child Case witness, 813–814 molesters; Situational-type child molesters Casey Journalism Center on Children and Families, 996 behavioral analysis, 544t. See also Acquaintance child Casper Star-Tribune, 1001, 1002f molesters Causation, 196 definition, 540–541 CBC. See Complete blood count pedophile, contrast, 542–544 CBT framework, 269 term, usage, 720 CCRA. See Canada Customs and Revenue Agency Child pornography, 198–199. See also Canada; Electronic ccTLD. See Country code top-level domain child pornography; Mexico; United States; Written Center for Prevention of Sexual and Domestic Violence, 953 child pornography Centers for Disease Control and Prevention (CDC), acquisition, 469 recommendations, 363 analysis, testimony. See Internet Centers for Medicaid and Medicare Services, 432, 806 article research, journalist claim, 670–672 Central America, child prostitution (example), 67–68 attitudes, sample questions, 697–698. See also Virtual Central Intelligence Agency (CIA), trafficking estimates, 743 child pornography CEOS, 600 charges, additions/alternatives, 650–651 Cerebral ischemia, 358 charging, considerations, 646–654 Cervantes v Cates, 653 child erotica, relationship, 560, 586 Cervical cancer, 428 children Chain-of-custody documentation, 862 age, proof, 661–665 Chain-of-custody information, 862f identification methods, 207–209 Channel, 630 collection, 558. See also Pedophiles Charm school cases, 745 collector, 535 Chat rooms, 473, 630, 895t images, assessment, 217 information, 636 information gathering, 217 relationship, building, 801 computers, evidence, 655 Chicago Juvenile Detention Center, 145–147 counts, number (charging), 650 , 896t damage, 197–198 Child, definition, 538–539 defense, 651–654 Child abuse diffusion, 655–657 addressing, 1035 defining, 646–647 book research, author claim, 671 definition, 258–261 case, expert testimony (components). See Physical child construction, narrowness, 843–844 abuse case meeting, 216 comorbid forms, expert witness role, 802–806 depiction, 239 despair, 405 discovery, accident, 668–669 images, 789, 793 distribution, 469 prevalence, 791 ethnicity, relationship, 224–226 registry, 549 evidence, handling, 213t victims, congregation safety, 961–963 federal legislation, 19t Child erotica, 560, 586 gender, relationship, 223–224 definition, 667 historian, 661 depiction, 239 images, 549

493 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

First Amendment exclusion, 840–844 Idaho, code, 770 number, charging, 650 Illinois, code, 770–772 impact, understanding, 193 Indiana, code, 772 information disclosure. See Defense investigation, 745, 749–751 Internet, usage, 474–476 involvement/increase. See Southeast Asia Internet-related possession/distribution/trading, 875 Iowa, code, 772 investigations, 829 jury selection, 752–758 jurisdiction, 649–650 Kansas, code, 772 jury selection, 654–657 Kentucky, code, 773 laws, 903 laws, 745–747 legislation, 598t enforcement, 748 location, 664 Louisiana, code, 773 medical analysis, 213 Maine, code, 773–774 purposes, 216–217 Maryland, code, 774 mistaken identity, 657–659 Massachusetts, code, 774 NAMBLA support, 917 Michigan, code, 775 pretrial considerations, 646–654 minimization, 1010 producers, mistake-of-age defense, 664–665 Minnesota, code, 775–776 prosecutorial issues, 635 Mississippi, code, 776 regulation, state interest, 840–843 Missouri, code, 776 search and seizure issues, 635–646 Montana, code, 777 spam, 1024 myths, 754t underlying crime, 654–655 Nebraska, code, 777 untrue defenses, meeting, 657–671 Nevada, code, 777–779 victim issues, 651 New Hampshire, code, 779 videotape, 220 New Jersey, code, 779 viewing, possession (comparison), 669–670 New Mexico, code, 779–780 Child Pornography Evidence Guide. See National Center for New York, code, 780–781 Missing & Exploited Children North Carolina, code, 781 Child Pornography Prevention Act (CPPA), 474, 650, 897 North Dakota, code, 781 overturning, 900, 902 Ohio, code, 782 Child prostitution. See Middle East; Philippines; Thailand Oklahoma, code, 782–783 Alabama, code, 763 Oregon, code, 783 Alaska, code, 764 penalties, 745–747 Arizona, code, 764 Pennsylvania, code, 784 Arkansas, code, 755 promotion, myths (involvement), 12t California, code, 765–766 prosecution, 745 charging/pretrial decisions, 751–752 research, 174 Colorado, code, 766–767 Rhode Island, code, 784 Connecticut, code, 767–768 sentencing, 759 crimes, 745–749 situation analysis. See Southeast Asia involvement, 763–788 South Carolina, code, 784–785 definition, 745 South Dakota, code, 785 Delaware, code, 768–769 state legislation, 763–788 denial, 1010 Tennessee, code, 785 District of Columbia, code, 769 Texas, code, 785 example. See Africa; Central America; Eastern Europe trial, 751–759 expert testimony, 756–757 case in chief, 755–758 factors, 746t closing, 758–759 federal legislation, 788 opening statement, 755 Florida, code, 769 untrue defenses, meeting, 757–758 Georgia, code, 769 Utah, code, 785 Hawaii, code, 769–770 victims, reasons, 747 high-risk locations, 217 Virginia, code, 785–786 horrors, 1030 Washington, code, 786

494 Index

West Virginia, code, 786–787 forensic pediatric/nurse examination, medical Wisconsin, code, 787–788 justification, 827t Wyoming, code, 788 global perspective, 59 Child Protection Act of 1984, 597 history, 1 Child protective services (CPS), 409 illegality, 918 agencies, 350, 398 Internet usage, 469 intervention, 397 investigation, 636 involvement, 356 investigative abilities, development, 1036 notification/intervention, 353 medical expert, input, 799 Child Recognition & Identification System (CRIS), 207 multijurisdictional task forces, expansion, 1046 Child sex rings, types, 556 national/state laws, enforcing/strengthening, 1044–1045 Child sex tourism, 297, 319, 749, 935 newsgroups, relation, 621t definition, 1009 perspectives, 80–81 global actions, 1015t prevention. See Tourism industry Child sexual abuse. See Intrafamilial child sexual abuse preventive measures, 80–81 argument, medical diagnosis, 806–810 private sphere, 71 behavior, 821–825 protection, code of conduct. See Tourism; Travel definition, 97t, 315, 753 public-private partnerships, promotion, 1047 diagnosis, confirmation, 814 qualification examination, 806 etiology, Internet (role), 479 recommendations, 1041–1049 forensic pediatric/nurse examination, medical rescue/recovery/reintegration, 77–80 justification, 827t risk, comparison, 115f. See Social risks history, core elements, 817 summary opinion, 830–831 medical history, 814–821 taboos, 71 modified clinical encounter form, 822t USPIS, attack, 595 paraphilias, relationship, 243 victims, specialized studies (increase), 1048–1049 physical examination, 825–827 vulnerability, increase, 72–76 private sphere, 71 Child sexual exploitation (CSE), group promotion prohibited conduct, policies, 951t aider/abettor liability, establishment, 895–897 reporting, decision making guidelines, 811t criminal conspiracy, establishment, 895–897 testimony, 814–827 First Amendment, nonprotection, 904–910 trivialization. See Playboy cartoons Child sexual exploitation (CSE) industry victims, 802 adult survivors psychological profiles, 155 Child sexual abuse accommodation syndrome (CSAAS), research, 173–174 756–757, 820, 821t survivors, update, 174–175 Child sexual assault, definition, 97t, 315 victim/survivor, transition, 169 Child Sexual Behavior Inventory (CSBI), 229 Child Trafficking and Pornography Act (1998), 260 Child sexual exploitation (CSE), 369. See also Ancient Child Victim Identification Project (CVIP), 205–209 civilizations; Middle Ages; Renaissance, Nineteenth Child victims. See Combating Paedophile Information century; United States Postal Inspection Service Networks in Europe anogenital trauma, medical implications, 369 exploitation (continuance), risk (elimination), 214 cases, 374 involvement. See Multiple child victims conspiracy primacy, 258 creation, First Amendment exclusion, 897–910 statements, videotaping/audiotaping, 573 establishment, 910–919 uncomplicated STDs, management. See Sexual abuse crimes (aiding/abetting), First Amendment exclusion, Child Welfare League of America (CWLA), 320 897–910 Child Wise Tourism program, 1014–1015 definition, 59–60, 95t, 536–537 brochure, 1016f economic impact, 73 postcard campaign, 1014f environmental factors, 72–76 Child Workers in Nepal (CWIN) evaluation, 386 childcare center, 89 experts/specialists, national pool (enlargement), Concerned Center, 85 1047–1048 study, 89 exposure, health consequences, 76–77 Childhood factors, 102 definition, 60

495 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

fears, 579 exposure, health consequences. See Sexual exploitation prostitution, psychosocial factors, 69t factual/legal impossibility, 757 trauma, 157–169 forensic interviewing skills, development, 1035–1036 victimization, 703 head height, total height ratio (comparison), 231 Childhood genital trauma, 373–380 health, quality, 77 differential diagnosis, 379–380 histories. See Commercially exploited children Childhood sexual abuse. See Incarcerated pedophiles homelessness, prevalence (explanation), 142–143 research, 173–174 identification, methods. See Child pornography results, 725 instruction, pornography (usage), 230 Childhood sexual exploitation industry victims Internet targets, 874–875 adult psychological disorders, 169t Interpol coping strategies, 165t poster. See Missing children missing life skills, 167t protection tools, 737–739 Childhood sexual industry victims, beliefs, 158t interviewers, 612 Childlike model, suffering (ad), 37f involvement. See Armed conflicts; Institutions Children. See Brothel children; Commercial sexual knowledge (absence), impact, 70 exploitation of children; Indigenous children; life skills, absence, 166–169 Orphaned children; Street children; Working living in their own homes children sexual exploitation/commercial sexual exploitation, abuse images, relationships, 264f risks, 103 abusive images, 257. See also Internet sexual exploiters, 110–111 COPINE typology, 259t sexual exploiters, impact, 316 acquaintance, testimony, 659–660 location (molestation reasons), Internet usage, 476–477 adult sexual exploiters, targeting/punishing, 1043–1044 lovability, belief, 159–162 adult traffickers, sexual purposes, 112 lying, ability, 575–576 advertising, regulation, 43–45 macho/machismo culture, impact, 71 advocacy, 569 maltreatment, 97 age DSM-IV-TR codes, 809 determination, sexual maturation rating (usage), ICD-9-CM codes, 809t 237–238 type, 109f proof. See Child pornography mannequins usage. See Elementary school children age, mistake, 757 mannequins approach, sensitivity, 360–361 missing/abducted, list, 980t beauty pageant contestants. See Advertising models. See Pin-up model choice. See Prostitution molestation commercial exploitation. See Rural America cases, physical/forensic evidence (consideration), commodities, 70 639t consumerism, impact, 70 example, 719 coping behaviors, 164–166 needs, knowledge (absence), 71 crimes, voir dire (sample questions). See Computer- not living in their own homes, sexual exploiters, 111–112 facilitated crimes against children impact, 316–317 cyber-enticement, 819t offenses, statutes of limitation removal demand, 72–73 federal legislation, 687 depiction, image proof (Ashcroft v Free Speech impact). state legislation, 676–687 See Real child depiction online contact, 477 details, importance, 576–578 personal safety, instruction, 958–961 disabilities, inclusion, 73 poverty, impact, 69 domestic/international trafficking, sexual purposes, power 112–113 belief, 162–163 drugged appearance. See Videotapes impact, 69–70 education, 1034 powerlessness, impact, 69–70 ethnicity, determination problem, scope. See Sexually exploited children clinical indications, 224–225 profiles. See Canada; Mexico; United States clues, 226 protection, 1041–1043. See also Combating Paedophile excitation, pornography (usage), 230 Information Networks in Europe

496 Index

communities. See Faith communities Circumcision. See Females government right, cases, 901t Circumferential strain gauge, 281 radiographic studies, 231 CIS. See Criminal information system rape victims. See Southern Asia Clergy, hiding, 948–949 response, need, 980–984 Clindamycin, 357 risk. See Sexual offenders Clinical evaluation/management. See Physical victimization; safety policies, 951 Sexual victimization seduction Clinical treatment sites, 409–410 relationship. See Pornography Clinically identified paraphilias, examples, 245t video content, usage, 220 Clinicians, contribution, 1042 sexual crimes Clitoridectomy, 374, 375f federal statutes, 13t Close friendship, definition, 446 penalties, increase, 1044 Code Adam, initiation, 982 sexual exploiters, profiles. See United States , 748 sexual maturation (timing), international estimates, 239t Coercive same-sex relationships, 341 sexual offenders (communication), Internet usage, Cognitive ability, deficits, 706 477–479 Cognitive distortions (cognitive restructurings), 479–482 sexual trafficking, 937 Coincidental genital trauma, 374. See also Pregnancy sexual victimization, 534–535 Colposcope, usage, 584. See also Photocolposcope definition, 536 Columbia Journalism Review, 1005 knowledge, increase, 531–532 Combat sports, 137 perspectives, 530 Combating Paedophile Information Networks in Europe term, usage, 536 (COPINE), 741, 794 sexualization, guidelines (status), 45–46 child victims/protection, 270–273 sexually exploitative advertising origins, 257–273 history, 30–38 research, 257 impact, 38–43 system, 222 supply. See Commercially exploited children typology. See Children testimony, 659–660 University of Cork College, 223 testing/treating, 356 Combination offenders, 551 trafficking, 75, 319, 748–749 Commercial exploitation. See Rural America trust, belief, 163–164 Commercial exploitation of children and women, vulnerability, psychosocial factors, 69–72 international agreements (ratification), 322t–323t vulvovaginal symptoms, etiology. See Prepubertal child Commercial forensic software, custom forensic software welfare system, survivor perspective, 129 (contrast), 844–845 work. See Working children Commercial nexus, 109 Children at risk (identification), community network (use), Commercial sexual exploitation 1033–1034 entrance process. See Canada Children of the night, 759 existence, explanation. See Canada clinical approach, 350 exit process. See Canada medical care, 349 questions, 179 TEAMSTAT approach, 350–358 Commercial sexual exploitation of children (CSEC), 63–68, Children of the Shadows (documentary), 75 369, 388–390. See also Advertising; Canada; Children's Advertising Review Unit (CARU), 43–45 Mexico; North America; United States CSEC principles, 44 activities. See Mexico Child/woman, interchangeability. See Cosmetics ad cases, 63 China, child sexual exploitation. See Ancient China CSEC-focused NGOs, 115 Chlamydia, 356, 1030 CSEC-focused services, 113 Chlamydia trachomitis (C. Trachomatis), 363, 392 definition, 95t attack, 391 factors, contribution, 96–97, 103t Chlorpromazine, 183 forms, 102, 104t–105t Chou Dynasty, 4 genital injury, relationship, 389–390 Chronic offenders, 705 impact, 69–72, 106 Chronic PTSD, 828 international conventions/protocols, 79–80 Church, remedial measures (effectiveness), 950 North American cities, study, 101t

497 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

at risk categories, 107t–108t access, defense stoppage, 860f trafficking functionaries. See United States comfort level, questions, 692–693 understanding, 966 evidence. See Child pornography victims, 106, 304 authentication, 835–837 worldwide numbers, 62t–63t presentation, direct examination, 851–856 Commercial sexual exploitation of North American children, sample questions, 693–694 prevention (national/regional efforts), 323t–328t graphics expert, testimony, 661 Commercial sexual exploited/trafficked foreign children, hacker/intrusion defenses, defeating, 658–659 regions/countries of origin. See United States images, deletion, 669 Commercially exploited children post-arrest examination, 790 histories, 1031–1032 records, 739 identification, 1028 usage, 586 national contacts, network development, 1035 Comstock, Anthony “Mad Anthony,” 10, 595–596 public advocation, 1037 Comstock Law (1873), 10, 595 small town/community supply, 1032–1033 Conference on Missing, Exploited, and Runaway Children, cutoff, 1033–1037 985 state contacts, network development, 1035 Confessions, 599. See also Subject confessions Commercially sexually exploited children, categories. See Confidentiality. See Juveniles; Victims United States Conflict. See Sexually exploited youth Commission on Obscenity and Pornography (Meese Congregation safety. See Child abuse; Domestic violence Commission) (1985), 9, 12, 597–598 Consensual monitoring, 586–587 Commonwealth (Pennsylvania) v Zingarelli, 890 Consent. See Age of consent Communication cases. See Lack of consent cases establishment. See Juvenile prostitution; Victims exception, 644–645 skills, absence, 168 Conspiracy. See Child sexual exploitation; Silent conspiracy Community. See Faith communities illegal act, furtherance (overt act), 915–919 children, supply. See Commercially exploited children Conspiracy law health support. See Juvenile prostitution; Victims agreement, definition, 912–913 involvement, promotion, 1042–1043 goal, 913 network, use. See Children at risk illegal act, agreement, 913–915 policing practices, use, 1033 Constitutional attack defense. See Travelers Community-based sex offender treatment programs, 286 Consumerism, impact. See Children Comorbid forms, expert witness role. See Child abuse Contagion, 580 Complainants, types, 609 Control, sense, 707 Complete blood count (CBC), testing, 390–391 Control question techniques (CQTs), 287 Compliant, term (usage), 529 Convention Against Cyber Crime (Council of Europe), 80 CompuServe, 635 Convention on the Rights of the Child (CRC), 60, 70 Computed tomographic (CT) scan, 370, 380, 390–391 Article 19, 79 Computer forensics protocol, adoption, 80 application, performing, 843 COPINE. See Combating Paedophile Information Networks automated process, 842–844 in Europe examination, 658 Coping behaviors. See Children; Victims examiners, 612 Coprophilia, 249, 251, 551 sample questions, 693–694 case studies, 251 overview, 847–848 Core elements, 817. See also Child sexual abuse software Corpora, tumescence, 370 legal validation, 835 Corporal punishment, faith-based community (scriptural litigated issues, 862–865 authorization), 950 tools, validation, 840–845 Correlation, 9094 usage. See Minority Cosmetics ad, child/woman (interchangeability), 33f Computer-based evidence, receipt, 215–216 Costa Rica, study, 72 Computer-facilitated crimes against children, voir dire Council of Better Business Bureaus, 43 (sample questions), 692–698 National Advertising Division (NAD), 45 Computer-generated evidence, introduction, 838 Council of Europe. See Convention Against Cyber Crime Computers Counselor-style interview, effectiveness, 731

498 Index

Counterfeit deviance, 291 CyberTip, 308 Country code identifiers, 618t CyberTipline (NCMEC), 612–613, 882–883 Country code top-level domain (ccTLD), 618, 630 logo, 204f Country of origin. See United States reports, 205f stereotypical settings, 226. See also Videotapes Cyclical Redundancy Check (CRC), 861 Courtroom confusion, risk (elimination), 213–214 hash values, separation, 861f Courtship disorder, 281 hash value storage/case information header, 861–862 CPPA. See Child Pornography Prevention Act CPS. See Child protective services D CQTs. See Control question techniques Dads and Daughters (DADs), 47 CRAFFT. See Car Relax Alone Friends Forget Trouble Daguerre, Louis Jacques Mande, 10–11 CRC. See Convention on the Rights of the Child; Cyclical Dallas Police Department, 320 Redundancy Check ICAC Task Force, 599 Crescentic hymen, 372f Data Crime acquisition, 848 identification, importance, 935–937 authentication. See Recovered data investigation, 931–935 process, 848 networks, organization, 105t dump, 838 scene, 928–931 entry. See International police Crimes Agasint Children Research Center (University of logistic regression findings, 445 New Hampshire), 875 on-site review, 214 Criminal conspiracy, establishment. See Child sexual recovery process, 848–849 exploitation Date rape drug, 816 Criminal information system (CIS), 739 Dating violence Criminal Investigations/Child Exploitation program, 661 health consequence, 426–428 Criminal investigative process, first responder (role), 603 Dating violence, dynamics, 423–424 Criminal justice, descriptive typology, 548 Daubert factors, addressing, 849–850 Criminal justice system Daubert hearing, request, 668 girls/women, involvement, 703 Daubert v Merrell Dow Pharmaceuticals, Inc, 840–842, 845 victims, 87–89 Daubert/Frye standard, 840–842 Criminal offenses David Series, 794 abused-status offenders, escalation, 705 Davis, Jr, Sammy, 981 neglected-status offenders, escalation, 705 Deception, usage. See Polygraphy CRIS. See Child Recognition & Identification System Defendant, testimony. See Age Crossover sexual offenses, 244 Defense CSAAS. See Child sexual abuse accommodation syndrome child pornography, information disclosure, 651–654 CSBI. See Child Sexual Behavior Inventory closing argument, 758 CSE. See Child sexual exploitation meeting. See Child pornography CSEC. See Commercial sexual exploitation of children Delayed sexual maturation, 238 CT. See Computed tomographic Deleted files, recovery, 853. See also Multiple CD-ROM Cuff-like hymen, 372f sessions Culturally acceptable exploitation, 749 Delinquency, 705 Cutting injury, 430 Delinquent lifestyle, development. See Abused/neglected girls CVIP. See Child Victim Identification Project Demonstrative aid (graph), 823f CWIN. See Child Workers in Nepal Denial, impact, 166 CWLA. See Child Welfare League of America Dental maturation, 231–232 Cyber addiction, 476 Deoxyribonucleic acid (DNA). See Exclusive DNA; Inclusive Cyber crime, 896 DNA; Inconclusive DNA Cyber Crimes Center (C3), 882 analysis, 585 Cyber vigilante, 1023 component, 386 sample questions, 698 distinction, 387 Cyber-enticement attempts, 799 PCR, usage. See Mitochondrial DNA Cybersex, 267, 444 polymerase chain reaction. See Nuclear DNA seeking, 471 processing/analysis, 387–388 Cyberspace, 630 update, 387–388

499 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Department of Homeland Security (DHS), 882 Distributed P2P, 623 Depression, 352, 428 DNA. See Deoxyribonucleic acid history, 96 DNS, 617, 630 incidence, 813 Dodgson, Charles L., 11, 248 mental health diagnosis, 805 Domain name, 630, 1020 result, 399 Domain name system (DNS), 617, 630 suffering, 429 Domestic servitude, 939 Deprivation, long-term impact, 804 Domestic trafficking, 297 Desensitization, 197 extent, 99 Desperation/silence, drawing, 406f sexual purposes. See Children Destination countries, tourism campaigns, 1014 Domestic violence victims, congregation safety, 963–964 Detective, role, 605–608 Dominance. See Hyperdominance Detention facilities. See Juveniles DOS utilities, usage, 843–844 Detrimental effects test, 885 Download, 631 Devadasi, 5. See also Temple prostitution Doxycycline, 357 Developing countries, rescue/recovery/reintegration, 78–79 Drawings, 413f. See also Blue demonic face; Incarceration; Developmental assessment. See Juveniles; Victims Preincarceration drawings; Prison drawings Deviant behavior, 478–479 Dropouts. See Schools Deviant fantasies, Internet usage, 482 Drugs Deviant/delinquent friends/relatives, girls/women abuse, 407 (relationships), 707 addiction, 141 D&G Fashion (sex sale), ad, 39f allergies, 351 Dharma, 5 history, information request. See Juveniles; Victims DHS, 882 intoxication, 352 Diagnostic and Statistical Manual of Mental Disorders, 4th overdose, 967 edition Text Revision (DSM-IV-TR) problems, 77 analysis. See Paraphilias use, 353–355 cautionary statement, 550 symptoms, 353t–354t codes. See Children withdrawal, symptoms, 353t–354t criteria determination, 809–810 DSL, 615, 631 definitions DSM-IV-TR. See Diagnostic and Statistical Manual of Mental distinctions, 536 Disorders, 4th edition Text Revision exclusions, 541, 548 Dugdale, William, 10 diagnosis. See Pedophilia Dysfunctional families, 72 diagnostic system, 543 Dysthymia, 228 nomenclature, 251 sexual perversions, 16 E understanding, 805 Early marriages, 68 Diagnostic testing, 363–366. See also Pregnancy; Sexually Early pregnancy, physical consequences, 77 transmitted diseases Early sexual maturation, 238 Diaper Pail Fraternity, 250 Eastern Europe, child prostitution (example), 66 Diaperists (adult babies), 250 Eating disorders, 428 Digital photography, 793 Ecchymoses, 430 Digital Subscriber Line (DSL), 615, 631 Economic opportunities, 969–970 Direct examination, 846–847 ECPAT. See End Child Prostitution, Child Pornography and Direct v United States, 908, 909, 916 for Sexual Purposes Disclosure continuum status. See Acquaintance-exploitation ECTWT, 1011 cases ECU. See Exploited Child Unit Disclosure sequence, 579 Ecumenical Coalition on Third World Tourism (ECTWT), Disclosure/reporting continuum. See Acquaintance sexual 1011 exploitation eDonkey, 623 Dissimulation, measurement, 286–288 Education Dissociating, impact, 166 profile. See Incarcerated pedophiles Distressing exposures, 440 promotion, 1042–1043 Distressing incidents, 439 El Caracol, 311

500 Index

Electronic archiving. See International police Episodic dyscontrol behavior, 228 Electronic bulletin boards, information, 636 Ernst & Young report, 863 Electronic child pornography, 319 Erotica images. See Child erotica Electronic evidence. See Original electronic evidence Estradiol, 231 presentation, 858–859 Ethnicity Electronic mail (E-mail), 631 determination, clinical indications. See Children services, 620 relationship. See Child pornography usage, 472, 615, 619–620 European ancestry, characteristics, 224–225 Elementary school children mannequins, usage (Abercrombie European Association of Communications Agencies, 44 ad), 33f European Community, 1045 Ellis, Havelock, 251 European descent, racial differences, 224f Embryonic development, 370 European Union (EU) Safer Internet Action Plan, 1019 Emergencies. See Medical emergencies; Sexual assault Europorn, 8 emergencies; Substance abuse Evans, Alfred, 980 Emergency care facilities, 398 Evans family, case study, 15–16 Emotion, reason (contrast). See Acquaintance sexual Evidence. See Original electronic evidence; Photographs; exploitation Physical evidence; Published materials Emotional abuse, 805 examples, 606t victims, 718 exclusion, risk (elimination), 213–214 Emotional assessment. See Juveniles; Victims files Emotional leakage, control, 605 format, 860–861 Emotional scars, 717 legal analysis, 859–862 Emotional sexual abuse, 61t handling, 213–214. See also Child pornography Emotion-related problem, 570 location. See Internet Employment, profile. See Incarcerated pedophiles receipt, 214–216 EnCase rule. See Best evidence rule Evidence File, 857 testimony. See Federal Rule of Evidence 702 imaging ability, 860 Examination positions, familiarity, 359–360 involvement, 835 Excitation, pornography (usage). See Children; Perpetrators process Excited utterance, 820 authentication, Federal Rule of Evidence 901 Exclusive DNA, 388 (usage), 849 Exclusive pedophiles, 246 challenges, 862–865 Exclusive type pedophile, 720 recovery process, 839 Exhibitionism, 61t, 243, 249, 551 Software, 853, 863 Exigent circumstances exception, 645 usage, 852 Exit Route Model, 972 Timeline, 864 Exiting usage, 844, 847 barriers/challenges, 966–969 Encryption, 626, 631 group life cycle, stages. See Sexually exploited youth End Child Prostitution, Child Pornography and Trafficking process (representation), spinning top (usage), 971f of Children for Sexual Purposes (ECPAT), 20, 43, programs, peer support model, 965 321, 717, 741 route, 965 campaign good practice, principles, 976–977 brochure, 1012f model, 970–973 formation, 1010, 1011 success, 969–970 multidisciplinary approach, 1012–1013 Experienced children/youth, 965 training, 1048 Experiential children, decision making, 976 English as a Second Language (ESL), 183 Experiential youth Enlightenment. See Age of Enlightenment decision making, 976 Entrapment, 665–667. See also Street-level entrapment perspectives. See Canada defense. See Travelers Expert testimony. See Age response, 667 components. See Child abuse inducement, requirement, 665–666 impact. See Tanner scale Environmental factors. See Child sexual exploitation inconsistent explanations, 803 Ephebophilia, 541, 721 inconsistent renditions, 803

501 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

inconsistent responses, 803 lifestyles, changes. See Nineteenth century sample questions, 693–694 role, 1041–1042 Expert witnesses, 813–814 sponsors, 803 role. See Child abuse support, 356 testimony, 845–856 tree, creation, 414 authentication process, 848–849 Fantasy defense. See Travelers types, 813–814 sample questions, 698 continuum, 813f Fantasy writings, 3 Expertise, recognition (principle), 977 Fantasy-driven behavior, 546 Experts FCC v Pacifica Foundation, 901t decision-making process, synopsis, 830 Federal Bureau of Investigation (FBI), 205, 626 national pool, enlargement. See Child sexual exploitation Behavioral Science Unit, 550 opinions. See Search warrants child sexual assault patterns, 110 report. See United States v Habershaw contraband, handling, 214 testimony, types. See Medical expert cooperation, 320 usage. See Acquaintance-exploitation cases Innocent Images National Initiative (IINI), 211, 562, Exploitation. See Child sexual exploitation; Sexual exploitation 751, 882 cases; Acquaintance-exploitation cases Innocent Images Task Force, 661 comparison, 559t intelligence information, 591 Exploited Child Unit (ECU), 883 juvenile arrest records, 312 Child Pornography Evidence Guide, 207 law enforcement partnerships, 210–211 Internet searches, technical assistance searches, 210t logo, 15f organization, 206f participation, 928 resources, 203–209 poster, distribution, 531 technical assistance services, 209 screen capture, HTML source code, 617f Exploited children, congressional findings, 883t Victim-Witness Coordinators, 936 Exploited youth, professional guidelines, 191–192 Web site, 1044 Exploiters, profiles. See Canada; Mexico; United States Federal government, response. See Internet travelers Extrafamilial pimp, 745 Federal Prohibition of Female Genital Mutilation Act of Eyes, blackening (Calvin Klein ad), 33f 1995, 376 Federal Rule of Evidence 701, 663 F Federal Rule of Evidence 702, 810 Fabricated victimization, 821 threshold, 845–846 Factual impossibility. See Children; Travelers Federal Rule of Evidence 901, 836, 842, 846 legal impossibility, contrast, 887 usage. See EnCase sample questions, 694–695 Federal Rules of Evidence, 835 Faith communities, child protection communities Federal Trade Commission (FTC), violent entertainment collaboration, 947 marketing studies, 37 conflict, 947–952 Feelings (normalcy), assurance, 351 cost, 952–953 Fellatio image, 218 gap, bridging, 953–955 Females Faith-based community anal-penile penetration, repeat, 362f character witnesses, 947 breast development, Tanner stages, 235t instruction, 958–961 circumcision, 374–377 members, involvement. See Multidisciplinary teams Web sites, 376t–377t scriptural authorization. See Corporal punishment genitalia, normal appearance, 375f training materials, 953 hymenal clefts. See Adolescents False misses, 287 model, thinness (ad), 41f False witnesses, nonrecognition, 608 normal genitalia, 370–373 Family offenders, 555 counselor, education. See Internet PH development, Tanner stages, 234f dysfunction, 96 straddle injury, 373–374 genograms, 414–417 Female-target pedophiles, 720–721 history, 356 Fetal alcohol syndrome, 148 obtaining, 414–417. See also Juveniles; Victims Fetish, origin, 249

502 Index

Fetishism, 249–250 Foreskin anatomy, 370 case studies, 249–250 Foster care, problems, 129–131 Fico, Frederick, 996 Foundations, active status, 979t File name Fourth Amendment encryption, 631 meaning, 646 extension, 852 nonapplication. See Nongovernmental actors File server (f-serve), 618 Frankel, Max, 995 File signature mismatches, 852 Franklin, Benjamin, 595 File slack, 658 Freedman, Eric, 996 area, information (discovery), 859f Freeh, Louis, 210 evidence, discovery, 854–856 Freeman-Longo, Robert, 279 usage, 855f Frotteurism, 243, 249 File Transfer Protocol (FTP), 615, 621–622, 631 Frye v United States, 840–842 program, allowance (screen capture), 621f F-serve, 618 server, 622 FTC. See Federal Trade Commission site, 796 FTP. See File Transfer Protocol usage, 913 Fuller, David, 875 File-by-file copy, 837 File-created dates, 858 G Files, remnants (discovery), 865f G8. See Group of Eight Nations Filtering software Gajdusek, Daniel Carleton, 749 understanding, improvement, 463 Gang rape victim. See Southern Asia usage, 457 Gates Rubber Company v Bando Chemical Industries, 837, 843 Firewall, 631. See also Personal firewall Gateway, 631 First Amendment Gateway cities, 927 acceptance. See Pornography Gay community, prostitution, 342 defense, 670–671 GEMS. See Girls Educational and Mentoring Services; Great sample questions, 698 Escape Maneuvers exclusion. See Child pornography; Child sexual Gender. See Victims exploitation comparisons, 341–342 nonprotection. See Child sexual exploitation relationship. See Child pornography protection, refusal, 909 General Equivalency Diploma (GED) program, 411 First responders Generic top-level domain (gTLD), 631 preliminary investigation, 603–605 uses, 618t role. See Criminal investigative process Genital injury, relationship. See Commercial sexual First World Congress Against Commercial Sexual exploitation of children Exploitation of Children (1996), 20, 59, 78, 298, Genital trauma, 826. See also Childhood genital trauma; 741 Coincidental genital trauma action, plea, 795 acute internal injuries, 390–391 Agenda for Action, 21t–22t acute visible injuries, 390 Flexbility, principle, 977 causes. See Prostituted children Fluanxol, 183 chronic consequences, 391 Flynt, Larry, 193 consequences, 390–392 Forbidden activities, engagement, 728 relationship. See Gynecological surgery; Nonsexual Forced labor, 937 violence Foreign children, regions/countries of origin. See United Genitalia, normal appearance, 370–373. See also Females; States Males Forensic interviewing skills, development. See Children Genitals, exhibition, 647 Forensic software Genograms, 810. See also Family authentication issues, 844–845 example, 416f, 418f contrast. See Commercial forensic software Gentamicin, 357 Forensics. See Computer forensics Geoghan, John, 951 evidence Giboney v Empire Storage & Ice, 900 collection, 361 Ginsberg v New York, 901t consideration. See Children Girls

503 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

anal penetration denial. See Adolescents H Hacker defense, defeating. See Computers history, 360f Hagerman, Amber, 984, 984f antisocial/delinquent lifestyle development. See Haldol, 183 Abused/neglected girls Hansen, Jane, 1000–1001, 1003 criminal behavior, questions. See Abused girls/women Harassment. See Youth derailment mechanisms. See Abused/neglected girls impact. See Youth involvement. See Criminal justice system incident characteristics, 456 lovers, 480 perpetrators, 456 pubic hair/breast development, maturity stage (median youth targets, 453 ages), 234t Hard-core pornography, 193 relationships. See Deviant/delinquent friends/relatives Hardware write-blocking device, usage, 860 runaways, 705–706 Hare Psychopathy Checklist: Youth Version (PCL-YV), 289 Girls Educational and Mentoring Services (GEMS), 321 Hare Psychopathy Checklist (PCL), 288–289 Global opposition network, creation. See Sex tourism questionnaire screens, 723 Global travelers, 878 usage, ethical issues, 289 Globe Newspaper Co v Superior Court, 901t Hare Psychopathy Checklist-Revised (PCL-R), 288 Gnutella, 623 usage, 289 Golden showers, 539 Harvey, Milton, 981 Gonadotropin-releasing hormone, 231 Hash value storage. See Cyclical Redundancy Check; Message Gonorrhea, 356. See also Prepubertal female Digest 5 attack, 391 Hatch, Orrin, 902–903 Good faith exception, 642 Head cant, 29 Good Samaritan defense, 758 Head height, total height ratio (comparison). See Children sample questions, 698 Header, 631 GOs. See Governmental organizations Healing Government group life cycle stages. See Sexually exploited youth conduct, defense. See Outrageous government conduct programs, peer support model, 965 defense success, 969–970 role, 1043 Health counselor, education. See Internet Governmental organizations (GOs), 64, 1011, 1024. See also Health risks. See Sexually exploited children Nongovernmental organizations Healthcare settings. See Juvenile prostitution Grapes of Wrath, The (John Steinbeck), 142 , 541 Graphical user interface (GUI), 849, 851. See also Windows Help resources GUI; Windows-based GUI knowledge. See Online victimization Gray, Laurence, 1004 public, awareness, 461–462 Great Escape Maneuvers (GEMS) Program, 984 Helping Individual Prostitutes Survive (HIPS), 321 Greece, child sexual exploitation. See Ancient Greece Hematoma, 361f, 373 Greeley, Andrew M., 948–949 Hepatitis, 363, 428. See also Sexually transmitted viral Green notices. See International police hepatitis Groh v Ramirez, 640 health risk, 404 Grooming, 902 Her Majesty's Customs and Excise Service, Paedophile process, 546, 728 Intelligence Unit, 250 techniques, 607 Herpes simplex virus (HSV), 363 usage, 579 HSV-1 / HSV-2, 391 Group arrest, 974 type 1, 363f Group encounter, reality, 974 type 2 lesions, 363f Group of Eight Nations (G8), 627, 1022 Hetaera, 2 Growth hormone, 231 Heterotypic continuity, 289 gTLD. See Generic top-level domain Hidden files (recovery), renamed file extensions (usage), Gucci ad, topless mother/nude infant, 35f 852–853 GUI. See Graphical user interface High Technology Crime Investigation Association (HTCIA), Guislain, Joseph, 252 847 Gynecological examination, 351 High-guard gait, 226 Gynecological surgery, genital trauma (relationship), 377 High-income households, runaways, 313

504 Index

High-rate offenders, 705 Hypertext markup language (HTML), 472, 631 High-risk situations. See Acquaintance-exploitation cases code, 617 HIPS. See Helping Individual Prostitutes Survive Hypertext Transfer Protocol (HTTP), 617, 631 Hispanic ancestry, characteristics, 225 Hypopituitarism, 238 Historical multiple-victim cases, 558–560 Hypoventilation, 358 History. See Patients obtaining, importance, 380 I History files, 658 I Modi (Pietro Aretino), 6–7 HIV. See Human immunodeficiency virus IACIS. See International Association of Computer Holloway, C., 881 Investigative Specialists Homeless youth, involvement IANA. See Internet Assigned Name Authority medial diagnoses. See Prostitution ICAC. See Internet Crimes Against Children typology. See Survival sex ICANN. See Internet Corporation for Assigned Names and Homelessness, 174, 814 Numbers prevalence, explanation. See Children ICD-9-CM. See International Classification of Diseases, 9th Homosexual activity, 721 Revision Clinical Modification engagement, 570 ICE. See Bureau of Immigration and Customs Enforcement; , stigma, 566 Immigration and Customs Enforcement Host, 631 ICPC. See International Criminal Police Commission Hosting, 631 ICQ, 622f, 631 Hotkiss fashion ad, provocativeness, 34f IDE. See Internet Drive Electronics Household characteristics, 438t–439t Identification process. See Victims HPV. See Human papillomavirus Identified victims, Internet crimes, 875 HSV. See Herpes simplex virus (HSV) Identity HTCIA. See High Technology Crime Investigation Association mistake. See Child pornography HTML. See Hypertext markup language proving, investigative techniques, 657–658 HTTP, 617, 631 IFDTH. See International Federation terre des hommes Human dentition, chronology. See Primary teeth; Secondary IH&RA. See International Hotel & Restaurant Association teeth IINI. See Federal Bureau of Investigation Human immunodeficiency virus (HIV), 392 Illegal activity, Internet usage components, 471–473 antibodies, 364 Illegal Internet usage, 474–482 carrier, 553 Illegal magazines, 199 health risk, 404 Illegal purposes, Internet usage (reasons), 469–471 mother-to-child infection, 73 Illinois risk, 425, 804 physical examination questions/procedures, 385t factors, 399 Image-based world, 28 seroprevalence studies, 342 Images. See Self-made images transmission, 1030 analysis. See Victims risk, 357 circulation process. See Internet vulnerability, 968 deletion. See Computers Human papillomavirus (HPV) (venereal warts), 364f, investigator questions, 627t 391–392 morphing, 899t lesions, 364f offending process, relationship. See Abuse Human Rights Watch, sexual violence study, 75 proof, Ashcroft v Free Speech (impact). See Real child Human trafficking, 735–736, 927. See also Sexual depiction exploitation relationship. See Internet Interpol, influence. See International human sequential order, significance, 796f trafficking/smuggling IMAP. See Internet Message Access Protocol Hushmail, 620 Imipramine, 183 Hustlers, self-perception, 412 Immigration and Customs Enforcement (ICE), 882, 931 Hymen, types, 372f Immigration and Naturalization Service (INS), 928, 931 Hymenal clefts. See Adolescents arrests, 933 Hyperdominance, 251–252 Immigration and Refugee Protection Act (IRPA), 306 case studies, 252 Immigration fraud Hyperlinks, 473 case, 933

505 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

conspiracy, 935 Inserted pornographic vignettes, 217–218 Imperforate hymen, 372f Instant message, 631 Impossibility defense. See Travelers Institutions, children (involvement), 76 , 756 Integration programs. See Recovery Incarcerated pedophiles, 719–732 Intelligence analysts, 612 age/race, 724 Intelligence quotient (IQ), deficits, 706 childhood sexual abuse, 725–726 Intent, absence, 665–670 conclusion, 731–732 Intermediate community/mental health support. See Victims criminal convictions/history, 724 Internal Revenue Service (IRS), 928 definitions, 719–720 International Association of Computer Investigative education/employment/volunteer affiliations, 726 Specialists (IACIS), 847 findings, 724–731 International Classification of Diseases, 9th Revision Clinical marriage/adult relationships, 726 Modification (ICD-9-CM), 806 offender childhood/background, 724 codes, 808. See also Children perpetrator, first experiences, 727 determination, 806–809 research methods, 722–724 International Criminal Police Commission (ICPC), 735 victims International Criminal Police Congress (1914), 735 grooming/seduction, 728–729 International Criminal Police Organization (Interpol), 214, offender dynamics, investigation, 715 1012 preferences, 727–728 International Federation terre des hommes (IFDTH), 1014 Incarceration International Hotel & Restaurant Association (IH&RA), difficulties, 407 1016 drawings, 406f. See also Preincarceration drawings International human trafficking/smuggling, Interpol Incest, 220 (influence), 742–744 cases, 554–555 International Labour Organization (ILO), Convention No. showing. See Videotapes 182, 79–80 victims, psychological problems, 91 International Monetary Fund, 317 Inclusion (stage). See Sexually exploited youth International Organization for Migration (IOM), 79 Inclusive DNA, 388 International police (Interpol) Income poverty, 96 achievements, 739–742 Inconclusive DNA, 388 agency cooperation, 739–742 Indictments, samples, 688–691 automatic consultation, 739 Indigenous children, 74–75 computer systems, 738–739 Inducement, 665 data entry, 739 requirement. See Entrapment electronic archiving, 739 Infantilism, 551 General Assembly, 737, 741 Infantilization, 747 General Secretariat, Trafficking in Human Beings Infantiphiles, 250 Branch, 627 Infants individual notices, 737–736 abduction, AMBER Alert (relationship), 986 influence, 742–744. See also International human sadistic abuse, impact, 228 trafficking/smuggling; Macedonia Infibulation, 374, 375f information, country submittal, 614t INHOPE. See Association of Internet Hotline Providers international green notices, 737, 738 Initial assessment. See Victims international legislation, list, 735–736 Initial evidentiary foundation, challenges, 839–840 international yellow notices, 737, 738 Injuries. See Invisible injuries; Physical assault injuries; Sexual poster. See Missing children assault; Soft-tissue injury; Visible injuries protection tools. See Children documentation, 361–366 role, 735 pathognomonic patterns, 802 Specialist Group on Crimes Against Children, 740, 741 Inner-city children, dangers, 1032 structure/administration, 736 Innocent Images National Initiative (IINI). See Federal trafficking records, 743 Bureau of Investigation Working Party, 740 Inoculation injuries (results), preemptive/preventive/ International trafficking prophylactic therapies, 392–393 extent, 99 INS. See Immigration and Naturalization Service prohibition, laws, 310

506 Index

sexual purposes. See Children sexual exploitation Internet diverse hazards (prevention), material (creation), 460 access, process, 655 growth, 203 accessibility, 470 sexual solicitations. See Youth accident, sample questions, 698 sexually explicit material, intrusiveness, 459 activities, 457 solicitations. See Undercover law enforcement officers addiction, 668 suspects, identification, 611 advantages, 471 targets. See Children affordability, 470 technical challenges, 625–626 anonymity, 470–471 temporary files, 658 basics, 613–616 therapeutic research, social worker claim, 670 behavior standards (cleanup), youth (mobilization), 462 threats, 623–624 child abuse material, 793 time, importance, 625 child pornography trader/traveler cases, 613 analysis, testimony, 829–830 trading examples/history, 262t, 263f problem, 266 undercover technique, 628 children usage. See Child pornography; Child sexual exploitation; abusive images, 257 Illegal Internet usage; Sexually deviant Internet erotica, 239 usage; Twentieth century; Twenty-first century exploitation cases, 629–630 components. See Illegal activity; Sexually exploitation cases, investigation, 609 deviant activity involvement, sample questions, 695 reasons. See Illegal purposes; Sexually deviant sexual exploitation, usage, 475 purposes composite variable statistics, 446t use patterns. See Youth crimes. See Identified victims users, tracing, 625 areas, identification, 611 victimization, addressing. See Nonsexual Internet concerns, 628 victimization; Sexual Internet victimization evidence, location, 613–616 victims, identification, 626–628 friendships Web site banners, 226. See also Videotapes appearance. See Adults Internet Assigned Name Authority (IANA), 613, 631 formation/risk. See Adults Internet Corporation for Assigned Names and Numbers government regulation, 655 (ICANN), 613, 631, 632 sample questions, 694 Internet Crimes Against Children (ICAC), 15–22, 205, 880 hazards, health/school/family counselor education, federal partners, 882 462–463 network, usage, 212 hotlines, 1019 statistics, 881–882 hunting ground, 873–874 Task Force, 211, 600, 626, 881–882. See also Dallas images Police Department circulation process, 261–265 arrests, 1036 relationship, 792–794 creation, OJJDP authorization, 211, 881 information, usefulness, 617–618 locations, 881f investigation problems, 617 programs, expansion, 1046–1047 investigation task forces, 612–613 Internet Drive Electronics (IDE), 841 investigator, role, 613 Internet Message Access Protocol (IMAP), 632 offensive acts (illicitness), laws (need/enactment), 463 Internet pedophilia, 789, 792 offensive behavior, reporting, 461–462 historical perspective, 789 offensive experiences, youth encounters, 458 law enforcement difficulties, 789–792 one-stop shop, 470 Internet Protocol (IP), 18, 615, 632. See also Transmission patrolling, 611–613 Control Protocol/Internet Protocol protocol address tracing, 624–625 address, 1022 role. See Child sexual abuse information, 623 history. See Sexual exploitation usage. See Offenders sexual crimes Internet Relay Chat (IRC), 245, 615, 618–619, 632 law enforcement response. See Minors access, 619f studies, 875–877 channels

507 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

dedication, 637 help, obtaining, 940–941 descriptions, 619t hidden truth, 927 files, 846 investigation protocol, 261 problems, 934–935 usage, 790 solutions, 933–934 Internet Service Provider (ISP), 18, 632 team approach, 931–933 information, 636 lessons/best practices, 941 liaison, 609 IOM. See International Organization for Migration youth, disclosure, 451 IP. See Internet Protocol Internet travelers, 873 IPV. See Intimate partner violence federal government response, 880–884 IRC. See Internet Relay Chat jurisdiction, 884–886 Irish Garda, 741 federal law, 885–886 IRPA. See Immigration and Refugee Protection Act state law, 884–885 ISP. See Internet Service Provider theoretical issues, 884 IVP, 370, 380 law enforcement response, 878–880 legal issues, 884–891 J problem, addressing, 878–884 Jacob Wetterling Foundation, 979t Internet-accessible computers, 1034 Jacobsen v United States, 888 Internet-based crimes, problem, 609 Jamelske, John, 986–987 Internet-related possession/distribution/trading. See Child Jimmy Ryce Center for Victims of Predatory Abduction, pornography 979t Internet-related sex offenders, evaluation/treatment Jimmy Ryce Law Enforcement Training Center, 983 recommendations, 482–483 goals, 984t Interpersonal relationships, 424 Joint Commission on the Accreditation of Healthcare Organizations, 432 Interpersonal skills, 706 Jones, Christal Jean, 1031 Interpol. See International Criminal Police Organization; Jones, Dave, 883 International police Journalism Interstate operations, 880 publications/Web sites, 1004t Interstate travelers, 877–878 values, 995–996 Interviewer. See Children; Patients Journalists background, 579 attitudes, improvement, 1003–1004 tips. See Victims deadlines, 994 Interviewing tips, 607t prizes, examples, 995t Interviews. See Juveniles; Rapport-building interview; understanding, 994–995 Victims Jurisdiction, definition, 884 conclusion. See Patients Jury selection. See Child pornography Intimate partner violence (IPV), 423 Justice investigation, obstruction, 934 impact. See Pregnancy Juvenile courts Intrafamilial child sexual abuse, 531–532, 557 cases, 713–714 Intrafamilial molester, 533 current status, 712 Intrastate travelers, 877–878 establishment, 711 Intravenous pyelogram (IVP), 370, 380 history, 711–712 Intrusion defense, defeating. See Computers participants, roles, 712t Investigation, issues, 750t sexual exploitation, 711 Investigative abilities, development. See Child sexual system, problems, 713 exploitation Juvenile justice system Investigative trifecta, 606 changes, 147–150 Investigator survivor perspective, 129 definition, 537 Juvenile prostitution, 712–713 role, 605–608 healthcare settings, 397–399 types, 609t historical perspective, 338 Invisible injuries, 390 prevention, 420 Involuntary servitude, 937 psychosocial context, impact, 337. See also Prostitution; background/discovery, 929–931 Sexual exploitation

508 Index

questions, 403 Labia adhesions, 371 victims, community/mental health support, 397 Labia majora/minora, texture/size, 370 Juveniles Laboratory testing, 387–388 behavioral assessment, 408–409 Laceration, 430 boys, special issues, 412–413 Lack of consent cases, 561 communication/trust, establishment, 399–409 Lack of intent. See Intent confidentiality, rules (establishment), 401 Landesman, Peter (article), 743 detention facilities, 399 Landslide Productions, 264, 599–601 developmental assessment, 408–409 Lanning, Kenneth, 873, 880 drug history, information request, 404 Lateral decubitus position, 360 emotional assessment, 408–409 Latham, Beatrice, 11 family history, obtaining, 401–402 Law, Bernard F., 948 initial assessment, 401–406 Law enforcement. See Canada; Mexico institutions, expansion (belief), 147 approach. See Rural America; Shadow children interviews, 401–406 authorities, skepticism, 412 contextual elements, choices, 401 difficulties. See Internet pedophilia long-term prognosis, 419–420 false statements, 935 physical abuse, questions, 403–404 investigators, 569 psychiatric assessment, 406–408 national/international cooperation, 884 rapport, building, 401 officers, Internet solicitations. See Undercover law runaway behavior, inquiry, 404–406 enforcement officers safe environment, providing, 412–413 officials, INHOPE interaction, 1022–1023 school history, inquiry, 402 partnerships, 209–212 self-injurious thoughts/behaviors, assessment, 402–403 response. See Internet travelers; Minors sexual abuse, questions, 403–404 role. See Acquaintance sexual exploitation social support systems, inquiry, 402 struggles, 878–879 therapeutic approaches, 413–418 success, case studies, 209 treatment program, example, 417–418 testimony, 756 Law on Extraterritorial Legislation, 79 K Laws, Richard, 279 Kama, 5 Laxmi (rape), example, 88–89 Kanka, Megan Nicole, 983. See also Megan Nicole Kanka Lay opinion, usage. See Age Foundation LCR, 363 KaZaA, 623 Kemadrin, 183 Leach, Kimberly, 989 Kiddie porn, 30 Legal assistance, access, 356 Kidnappings. See Stereotypical kidnappings Legal impossibility. See Children; Travelers Kill switches, 645 contrast. See Factual impossibility King Mafia Crips, 16 Leighton, Jill, 1031–1032 Klaas, Polly, 983, 983t. See also Polly Klaas Foundation Let Kids Be Kids KlaasKids Foundation, 979t brochure, 47f Klein, Calvin (ad). See Eyes; Moss; Posture; Shields campaign, 46–47 child pornography, borderline, 35f Leviticus, Book of, 2 children, display (ad), 36f Liddell, Alice (photograph), 11f jeans, 34f Lie detection devices, 587 male model, underwear display, 42f Lie detector. See Sexual lie detector Klinefelter's syndrome, 238 Life Cycle of Groups, 972 Klismaphilia, 251 stages, 972t case studies, 251 Life skills. See Childhood sexual exploitation industry victims Knowledge (absence), impact. See Children absence. See Children; Victims Kos, Rudy, 951 Ligase chain reaction (LCR), 363 Kramer, Karen, 75 Likelihood to Sexually Harass (LSH) Scale, 38 Kumho Tire Company, Ltd v Carmichael, 842, 844 Link, 632 Local travelers, 877 L Logistic regression findings. See Data Labetalol, 358 Lolita, 896t

509 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

London Metropolitan Police, Paedophile Unit, 257 (AAP), 48 Long-arm statutes, 884–885 Medical care. See Children of the night Long-term community/mental health support. See Victims Medical emergencies, 356–358 Long-term therapy, goals. See Victims Medical evidence. See Acquaintance-exploitation cases Long-term victim impact, 801 Medical expert Long-term vision, principle, 977 input. See Child sexual exploitation Louisiana, Children's Code (Article 801), 712 involvement. See Witnesses Lovability, belief. See Children; Victims qualifying examination, template, 807t–808t Love, misplacement, 755 testimony, types, 810–812 Love Letter virus, 18 Medical history. See Child sexual abuse LSH. See Likelihood to Sexually Harass Medicine Wheel, 970. See also North American Aborginal Lu, Hsu (police interrogation), 93 Medicine Wheel Luteinizing hormone, 231 components, 971f Meese, Edwin, 597 M Meese Commission. See Commission on Obscenity and Macedonia (Republic of) Pornography Interpol, influence, 742 Megan Nicole Kanka Foundation, 979t Law on Public Order and Peace (criminal code), 742 Megan's law, 291, 319, 759, 983 Macho/machismo culture, impact. See Children Mekong subregion, prostitution, 63–64, 72, 76 Madams, 745 Memoirs of a Woman of Pleasure / Fannie Hill (John Cleland), 8 Mahari, 5 Mens rea, proof, 665 Maison Marie Frederic, 308 Mental health Maladaptive behaviors, 404 clinics, 398–399 Male-dominated gangs, involvement, 402 support. See Juvenile prostitution; Victims Male-male rape, trauma, 412 Mentally retarded or developmentally delayed (MR/DD) Males adult men, 283 genitalia development, Tanner stages, 236f Mentally retarded or developmentally delayed (MR/DD) involvement programs, 147 clients, 290 normal genitalia, 370 Message Digest 5 (MD5), 861 offenders, 559 case information header, 861–862 PH development, Tanner stages, 236f hash, 849, 857 straddle injury, 373 hash values, 207, 848, 850 victims, 560 acquisition, 862 Male-target pedophiles, 720–721 generation, 863 Mann Act. See White Slave Traffic Act separation, 861f Manufactured jurisdiction defense, 887–888 storage, 861–862 Marginalization, 337 Messenger programs, 615, 622 Mariscal, Angel, 601–602 types, 622f Marketing machine, impact, 52–53 Meta-analyses, 195 Marriages. See Early marriages Method of operation (MO), definition, 539–540 relationships. See Incarcerated pedophiles Mexico Marris, Jacqueline, 987 child pornography, 311–312 Masculinity, hegemonic constructions, 35 children, profiles, 309 Masochism, 551 CSEC, 304–321 Masochistic abuse, 647 activities, 312 Massage saloon, reference, 742 children, special risk, 314t–315t Masturbation, 647 exploiters, profiles, 309–310 excess, 822 law enforcement, 311 Matthew Dickey v Steris Corporation, 863–864 national legislation, 311 McGlone, Gerard, 953 online sexual victimization, 311–312 McVeigh, Timothy, 916 political/economic characteristics, 299t–301t MDTs. See Multidisciplinary teams population/health/social characteristics, 302t–303t Meaningful exchange, principle, 977 prevention/prosecution/protection programs, 311 Media, help, 993 private sector, role, 312 Media Matters: A National Media Education Campaign STDs, commonness, 309

510 Index

trafficking, 310 Multijurisdictional task forces (MJTFs), 1046 Microsoft Network (MSN), 624 expansion. See Child sexual exploitation Messenger, 622f Multiple CD-ROM sessions, deleted files (recovery), 853–854 Middle Ages, child sexual exploitation, 4–6 Multiple child victims, involvement, 237 Middle East, child prostitution, 66 Multiple offenders, 554, 558 Middle-income households, runaways, 313 Multiple victims, 558 Mid-guard gait, 226 cases. See Historical multiple-victim cases; Migrants, smuggling, 736 Multidimensional multiple-victim cases Miller v California, 900 investigation, 588–593 Minnesota Multiphasic Personality Inventory (MMPI), 291 types, 558–560 Minority (proof), computer forensics (usage), 662 Multiple-victim exploitation case, 589 Minors Munchausen syndrome, 580–581 exploitation, 799 Munchausen syndrome by proxy, 581 Internet sexual crimes, law enforcement response, 875–876 Murder, definition, 886 sexual abuse, 752 Musculoskeletal development, 231 sexual exploitation, federal statutes, 898t–899t Musculoskeletal maturation, signs, 231 transportation, 788 My Secret Life, 10 Mirror image hard drive, 862 Missing children N congressional findings, 883t N. gonorrhea. See Neisseria gonorrhea Interpol poster, 738 NAATs. See Nucleic acid amplification tests Missouri Sex Offender Treatment Program, 723 NAFTA. See North American Free Trade Agreement Mistake of age. See Children NAMBLA. See North American Man/Boy Love Association defense, 665. See also Child pornography Narcotic addictions, 148 Mistaken identity. See Child pornography National Advertising Review Board, 45 Mitochondrial DNA, PCR (usage), 388 National Advertising Review Council, 43 MJTFs. See Multijurisdictional task forces National Association of Elementary School Principals, 988 MMPI, 291 National Association of Secondary School Principals, 988 MO. See Method of operation National Center for Health Statistics, 806 Modem, 632. See also Cable modem National Center for Juvenile Justice, 1045 Molestation, 716. See also Children National Center for Missing & Exploited Children Molester. See Intrafamilial molester; Preferential-type child (NCMEC), 15, 882–883. See also CyberTipline; molesters; Situational-type child molesters Exploited Child Unit behavioral analysis. See Acquaintance child molesters background, 882 pedophile, contrast. See Child molester creation, 203 understanding. See Preferential molester function, 612–613 Molluscum contagiosum, 392 logo, 203f Money laundering, 752 victimization study, 437 Mood disturbances, 77 Web site, 875 Moore, Fleisha, 987 success, 882 Morpheus, 623 National Center for Prosecution of Child Abuse, 1035 Morphing, 216. See also Images National Center for the Analysis of Violent Crime Moss, Kate (NCAVC), 550, 559 Calvin Klein ad, 32f National central bureaus (NCBs), 736–737 Obsession (Calvin Klein) ad, 32f National Child Protection Training Center (NCPTC), 1035, Motivation continuum, 545t 1037 MR/DD. See Mentally retarded or developmentally delayed National Child Sexual Exploitation Intelligence Center MRI, 391 (NCSEIC), 1045 MSN. See Microsoft Network establishment, 1045 MTV, advertising, 38 National Child Victim Identification Program (NCVIP), 626 Multidimensional multiple-victim cases, 558–559 National Coalition for the Homeless, 143 Multidisciplinary teams (MDTs), 952 National contact, network development, 1035 cooperation, 92 National Crime Squad (United Kingdom), 600 faith-based community, member involvement, 954 National District Attorney's Association, 955t Multijurisdictional cases, 211–212 National Domestic Violence Hotline, 432

511 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

National Health and Nutrition Examination Survey III success, 998–1003 (NHANES III), 232, 236 impact, 996–998 National Incidence Study of Missing Abducted Runaway and interaction. See Children Thrownaway Children (NISMART), 989–990 reporters, interaction, 1005–1006 National Incidence Study of Missing Abducted Runaway and writing, 994 Thrownaway Children-2 (NISMART-2), 109, 312, Newsgroups, 632, 895t. See also Usenet newsgroups 990–991 posting, screen capture, 621f National Institute of Child Justice, 828 reference, screenshot, 871f National Institute of Mental Health (NIMH), 279 relation. See Child sexual exploitation National Institute of Standards & Technology (NIST), 841 usage, 245, 472 National Law Center on Homelessness and Poverty, 142 NGOs. See Nongovernmental organizations National Organization of Circumcision Information NHANES III, 232, 236 Resource Centers (NOCIRC), 376 NIMH, 279 National Policing Plan (United Kingdom), 790 Nineteenth century National Science Foundation Internet site (NSFNET), 18 child sexual exploitation, 9–11 National (NSOR), 1044 family lifestyles, changes, 10 National Survey of Violence Against Women (NSVAW), 427 government regulation, 9–10 National Surveys of Children, data, 38 photography, influence, 10–11 National Tourism Administration (Brazil), 1014 NISMART, 989–990 National Youth Crisis Hotline, 432 NISMART-2, 109, 312, 990–991 Naval Criminal Investigative Service (NCIS), 882 NIST, 841 NCAVC. See National Center for the Analysis of Violent Nitrates, 358 Crime Nitroprusside, 358 NCBs. See National central bureaus NNTP, 620, 632 NCIS. See Naval Criminal Investigative Service NOCIRC, 376 NCMEC. See National Center for Missing & Exploited No-knock warrants, 645 Children Noncontraband evidence, examples, 640 NCPTC. See National Child Protection Training Center Nonexclusive pedophiles, 246 NCSEIC. See National Child Sexual Exploitation Intelligence Nonexclusive type pedophiles, 720 Center Nonfamily abductions. See Attempted nonfamily abductions NCVIP. See National Child Victim Identification Program Nongenital injuries. See Assault victims Necrophagia, 253 Nongovernmental actors, Fourth Amendment Necrophilia, 252–253, 551. See also Pseudo-necrophilia (nonapplication), 645 case study, 253 Nongovernmental organizations (NGOs), 20, 59, 64, 1024 types, 252 cooperation, 739, 740 Neglect, pertinence, 804 issues, 71 Neglected girls, antisocial/delinquent lifestyle development. lobbying, 1010 See Abused/neglected girls posters, distribution, 738 Neglected girls/women, derailment mechanisms. See rescue actions, 78 Abused/neglected girls/women Nonhumanitarian sanctions, 317 Neglected-status offenders, escalation. See Criminal offenses Nonmarital relationships, 414 Neiman, Bill (testimony), 14 Nonsexual behavior, 537 Neisseria gonorrhea (N. gonorrhea), 363, 391, 392 Nonsexual Internet victimization, addressing, 461 Nepal, child rights issues, 86t Nonsexual violence, genital trauma (relationship), 374–378 NetSmartz, 875 Nonsexually explicit pornography, 911–912 Network, 632 Nontrade sanctions, 317 Network News Transfer Protocol (NNTP), 620, 632 Nonwhite victims, 727 Network Time Protocol (NTP), 625, 632 Noonan's syndrome, 238 New Scotland Yard, 250 North America New York Society for the Suppression of Vice, 10 affluence/poverty, paradox, 299–304 New York v Ferber, 659, 900–902 CSEC, 297 News elimination, 321 attention, getting, 1004–1005 North American Aborginal Medicine Wheel, 970f coverage North American Free Trade Agreement (NAFTA), 16, 100 impact, 993 study, 111

512 Index

North American Man/Boy Love Association (NAMBLA), strategies, 562–567 199, 896 surveillance, 738 agreement, 913 tracking, IP usage, 616t children, sex advocation, 222 typology, 542–551. See also Sexual offenders contact information, 472 problem areas, 551–556 essays, 916 victims, bonding, 566 involvement, charges. See Online sex rings Offending behaviors, nature, 264–265 joining, 911 Offending process, relationship. See Abuse images language, usage, 900, 909 Office of Juvenile Justice and Delinquency Prevention mailing list, 918 (OJJDP), 1027 newsletter, 473 authorization. See Internet Crimes Against Children organization, 897 image research, 31 spokesman, interview, 911t Office of the Victims of Crime Bulletin, 874 support. See Child pornography Office of Victims of Crimes, 759 network, 539 Off-street incomes, 969 vertical conspiracy liability, 912 O'Grady, Ron, 43 Web site, 248 Ohio Rules of Evidence 901, 863 North Carolina Pediatric Society, 47 OJJDP, 1027 NSFNET. See National Science Foundation Internet site Old Testament, child sexual exploitation, 2 NSOR. See National sex offender registry Online enticement, 881 NSVAW. See National Survey of Violence Against Women Online exploiter, victimization (minimization), 610t NTP. See Network Time Protocol Online messages, terms, 895t Nuclear DNA, polymerase chain reaction, 388 Online molesters, invisibility, 874 Nucleic acid amplification tests (NAATs), 363 Online service providers, 624, 632 Nude stimuli, inappropriate usage, 282 Online sex rings, 896, 899 Nuisance sex offenders, 547, 552–554 NAMBLA involvement, charges, 921 assessment, 553 Online sexual solicitations corroboration, 553 response. See Youth evaluation, 553–554 targets. See Youth importance, 552–553 Online sexual victimization. See Canada; Mexico; United progression, 552 States substitution, 553 Online victimization. See Youth definition, 440t O help resources, knowledge, 457–458 O (movie ad), 37f incidence, 439 Objectivity, belief, 995 offenses/offenders, diversity, 458–459 Obscene Publications Act (Lord Campbell), 10 parental concern, 457 Obscenity investigations. See United States Postal Inspection research Service materials, 464 Observed behavior, overlap. See Reported behavior need, 463 Obstetrical complications, 376 risks/remedies, 457–458 Occam's Razor, 608t youth, information, 437 OECD. See Organization for Economic Cooperation and Online Victimization; A Report on the Nation's Youth, 876–877 Development Operation Avalanche, 599–601, 791, 882 Offenders. See Adolescents; Combination offenders; Females; Operation Candyman, 264 Males; Multiple offenders; Nuisance sex offenders Operation Hamlet, 1025 assessments. See Sexual offender assessments Operation Lost Innocence, 601–602 childhood/background. See Incarcerated pedophiles Operation Marcy, 1025 comparison, 725f, 727f Operation Ore, 791 control, 562–563 , 882 gender, 109f Operation Sedan, 795 location, 878 Operation Starburst, 789 physical condition. See Southern Asia Operations. See Interstate operations; Sting operations; predator nature, 730 Travelers; Undercover operations relationship, 111f Opioids, 197

513 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Oppositional defiant disorder, 228 Patrons, 745–746 Orchid Club, 836–837, 896–897 Patz, Etan, 980, 980f agreement, proof, 913 Paul & Lisa Program, 759 child pornography distribution, 914 PCL. See Hare Psychopathy Checklist conspiracy, 915 PCL-R. See Hare Psychopathy Checklist-Revised liability, creation, 919 PCL-YV. See Hare Psychopathy Checklist: Youth Version Internet existence, 911 PCR. See Mitochondrial DNA; Polymerase chain reaction Organization for Economic Cooperation and Development Pederasty, presence. See Ancient Rome (OECD), 1022 Pediatric endocrinologist, expert opinion, 664 Organization for Security and Cooperation in Europe Pedophiles, 535, 596. See also Female-target pedophiles; (OSCE), 1022 Incarcerated pedophiles; Male-target pedophiles Original electronic evidence, 857 child pornography collections, 247–248 Orphaned children, 73 contrast. See Child molester Osborne, Clarence, 721 definition, 541–542, 719–720 Osborne v Ohio, 900, 903 distortion, glamorization, 31f OSCE. See Organization for Security and Cooperation in DSM-IV-TR definition, 720 Europe paraphernalia, 560 Osteometry, 224 population, 721–722 Outcomes, commitment (principle), 977 search difficulties, 873–874 Outrageous government conduct defense, 887–888 sexual motivations, 560 Overbreadth. See Search issues victim/offender dynamics, investigation. See Incarcerated cases, examples, 641 pedophiles Ovid. See Ars Amatoria Pedophilia, 246–248. See also Internet pedophilia; Web-based pedophilia P definition, 719–720 P2P. See Peer-to-peer DSM-IV-TR , women (violence), 87t definition, 720 Paraphilias, 551 diagnosis, 246 definition, 243, 539 knowledge, 731 DSM-IV-TR recidivism rates, 721 analysis, 243–244 Peer review/publication, 840 definitions, 539 Peer support examples. See Clinically identified paraphilias access, 969 listing, 244t model. See Exiting; Healing relationship. See Child sexual abuse PEERS. See Prostitute Empowerment Education and types, 248–253 Resource Society Parental concern. See Online victimization Peer-to-peer (P2P), 632. See also Distributed P2P Parentified child, 413 networks, 623 Parents Pelvic inflammatory disease (PID), 357, 376, 390 child discussions, importance, 50 Penetration, concept, 578 communication, establishment, 592–593 Penile length, 370 education, 1034 Penile plethysmography (PPG), 281–284 role. See Acquaintance-exploitation cases application, inappropriateness, 282–283 Parents Anonymous, 952 examination, 290 Parole searches, 646 procedure, standardization (absence), 283–284 Partialism (exclusion), US titles (involvement), 9t results, inappropriate use, 283 Participation, principle, 976 techniques, 282 Particularity. See Search issues usage, ethical issues, 282–284 cases, examples, 640 People v Arapahoe County Court, 652 Password, 632 People v Foley, 658 protection, 626 People v Fraser, 670 Patients People v Lagashi, 838–839, 842 history, 380–384 People v Mormon, 842 interview, conclusion, 383–384 People v Rodriguez, 841 interviewer, 382–383 People v Slusher, 646

514 Index

People v Weston, 890–891 predators, comparison, 426 Perianal scarring, 362f seduction scenarios, 1031 Periurethral bands, 371 sponsors, 803 Permission-giving beliefs, 169 Pin-up model, child model, 29f Perpetrators Plain view exception, 643–644 excitation, pornography (usage), 230 Playboy cartoons, child sexual abuse (trivialization), 31f first experience. See Incarcerated pedophiles Playground predators, 460 partial image. See Videotapes Plethysmography, 291. See also Penile plethysmography specialized studies, increase, 1048–1049 Pneumocystis carinii, 392 Perry v State, 912 Point-of-presence (POP), 615, 632 Persistent offenders, 705 Polaris Project, 744 Person, definition. See Young person Polaroid Macro 5 system, 431 Personal firewall, 632 Polaroid Spectra Law Enforcement camera, 431 PH. See Pubic hair Polleros, 309–310 Pharaonic circumcision, 374, 375f Polly Klaas Foundation, 979t, 983 Philippines, child prostitution, 64–65 Polygraph usage, ethical issues, 286–288 Phoenix House, 308 Polygraphy, 291 Photocolposcope, usage, 361 application, inappropriateness, 287 Photographs deception, usage, 288 distribution, 901 limited theoretical basis, 286–287 documentation. See Prostituted adolescents usage, 286–288 evidence, 220–221 validity, absence, 287 receipt, 214–215 Polymerase chain reaction (PCR), 363. See also Nuclear DNA Photography, influence. See Nineteenth century usage. See Mitochondrial DNA Photojournalists, pressure, 994 POP. See Point-of-presence Phthirus pubis, 392 POP3. See Post Office Protocol Physical abuse Pornographic material, nature, 193–194 questions. See Juveniles; Victims Pornographic vignettes. See Inserted pornographic vignettes victims, 718 Pornography. See Child pornography; Toddlers Physical assault injuries, 409–410 child seduction, relationship, 229–231 Physical child abuse case, expert testimony (components), 803 clinical psychologists, concerns, 196–197 Physical evidence, 585, 599 damage. See Children consideration. See Children empirical research, 195–196 Physical examination, 384–387. See also Child sexual abuse federal statutes, 46t examiner, identification, 386 forms, First Amendment acceptance, 221 location, 386 impact. See Twentieth century; Twenty-first century objectives. See Assault victims understanding. See Adults; Children process, 386 influence, 194–197 reasons, 386–387 literature, relationship. See Renaissance timing, 386 relationship. See Advertising Physical examiners, checklist, 384t ring, charging, 921–922 Physical sexual abuse, 61t usage, 230, 579. See also Children; Perpetrators Physical sexual maturation, 232–238 Possession, question, 669 Physical victimization, 352–353 Post Office Protocol (POP3), 632 clinical evaluation/management, 358–366 Postcoital contraception, 392 conditions, 358–361 Posterior vestibule scar, 362f Physiological measures. See Sexual arousal/interest; Viewing Post-traumatic stress syndrome (PTSD), 174, 398, 408, time 824t. See also Chronic PTSD Picquerism, 252 components, 816, 824, 828 PID. See Pelvic inflammatory disease incidence, 813 Pied pipers, 567 mental health diagnosis, 805 Pierce, William L., 916 result, 399 Pimp-controlled prostitution, 104t suffering, 429, 968 Pimp-controlled relationships, 426 symptoms, 823 Pimps. See Extrafamilial pimp Posture, vulnerability (Calvin Klein ad), 33f

515 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Poverty Producers, mistake-of-age defense. See Child pornography desperation, 1028 Production (stage). See Sexually exploited youth impact. See Children Profiling, usage, 550–551 paradox. See North America Project HOPE International, 321 Power Project Prosper, 1032 belief. See Children; Victims Prone knee-chest position, 360 impact. See Children Pro-pedophile groups, 473 Powerlessness, impact. See Children Prosecutorial economy, 650 PowerPoint Prosecutorial Remedies and Other Tools to end the presentation, 858 Exploitation of Children Today Act (PROTECT usage, 851 Act), 20, 320, 880 PPG. See Penile plethysmography creation, 215, 986 Prada ad (stalking), 36f definition. See Sexually explicit conduct Predators, comparison. See Pimps Prostitute Empowerment Education and Resource Society Predatory adult solicitation. See Youth (PEERS), 307, 308 Predication, examples, 611t Prostituted adolescents Predisposition, proof, 666–667 clinical presentations, 429–431 Preferential child molesters, 588 documentation, 430–431 Preferential child sex abusers, 310 intimate partner violence, 423 Preferential molester, understanding, 590–591 photographic documentation, 431 Preferential offenders, 591 safety planning/referrals, 431–432 Preferential sex offenders, 546, 559–560 screening, 429–430 Preferential-type child molesters, 547–548, 554 Prostituted children Pregnancy, 181, 967 genital trauma, causes, 389 coincidental genital trauma, 374 victims, treatment, 751 diagnostic testing, 364 Prostituted males, 1029 IPV, impact, 427 Prostitutes, 186 physical consequences. See Early pregnancy victim/offender dynamics, investigation, 715 prophylaxis, 352 Prostitution. See Juvenile prostitution; Mekong subregion; Preincarceration drawings, 406f Temple prostitution Prepubertal child, vulvovaginal symptoms (etiology), 378t children Prepubertal female, gonorrhea/trichmoniasis, 356f involvement/increase. See Southeast Asia Prepubertal girl, vaginal bleeding (differential diagnosis), 371t children, selection, 754 Prepubescence, 723 definition, 204 Pre-seduced victim, 565 deterrence. See Sexual crimes Pretrial evidentiary hearing, 846–847 experience, 190 Pretrial preparation, 825 health consequences, 428 Pretty Woman homeless youths media images, 1027 involvement, psychosocial interview, 343t–344t movie ad, 41f medical diagnoses, 343t Priapism, 3 impact. See Twentieth century; Twenty-first century Primary (deciduous) teeth, human dentition (chronology), 233t infantilization, 747 Primary victim impact, 715–719 international sanctioning, 424 background information, 717–718 investigation/prosecution. See Child prostitution consequences, 718–719 legalization, 425 Prince v Massachusetts, 901t lifestyle, 754 Prison drawings, 406f, 408f male violence, relationship. see Women Private searches, 645 psychosocial factors. See Childhood Private sector, role. See Canada; Mexico research. See Adults; Child prostitution Privilege defense, 656 risk, increase, 704 Proactive investigative approach, 591–592 seasonal problem, 717 Probability scores, 284 solution. See Boys Probation searches, 646 victimless crime, 753–754 Problematic victims, sample questions, 695–696 victims, reasons. See Children Prodigy, 635 Prostitution-related activities, 305

516 Index

PROTECT Act. See Prosecutorial Remedies and Other Tools Recovered data to end the Exploitation of Children Today Act authentication, 835–840 Protection of Children Against Sexual Exploitation Act, 596 recovery process, authentication, 837–839 Protection of Children from Sexual Predators Act, 885 Recovery. See Child sexual exploitation; Developing countries Protective orders, sample, 653f integration programs, 79 Protocol, 632 Rectocele, 377 Pseudo-necrophilia, 253 Redirection, 632 Psychiatric assessment. See Juveniles; Victims Regional Internet Registries (RIRs), 632 Psychiatric symptoms/diagnoses, 355 Registrar for Internet Numbers in Europe (RIPE), 624, 632, Psychological abuse, categories, 805t 633 Psychological assistance, access, 356 Rehabilitative testimony, 812 Psychological distress, symptoms, 342 Rehearsal process, 546 Psychological profiles. See Child sexual exploitation; Victims Rehkemper, Robert, 949 Psychopathy Relapse, 974 checklist. See Hare Psychopathy Checklist Remailers, 470, 633 measurement, 288–289 Renaissance Psychosexual maturation, 228–229 child sexual exploitation, 6–8 Psychosocial context. See Juvenile prostitution pornography, literature (relationship), 8–9 Psychosocial factors. See Children Renal failure, 358 PTSD. See Post-traumatic stress syndrome Renamed file extensions, usage. See Hidden files Puberty, onset, 825 Repeatedly raped victim. See Southern Asia Pubic hair (PH) development, 232. See also Females; Males Report Expertise Acceleration Contacts Trends (REACT), Public-private partnerships, promotion. See Child sexual 1022–1023 exploitation Reported behavior, observed behavior (overlap), 821f Published materials, evidence, 220–221 Reported missing Pumbroek, Thea, 14, 223, 801 episodes, 991t Puritanism, child sexual exploitation, 7–8 term, usage, 991 Reporters, interaction. See News Q Request For Comment (RFC), 633 Quayle, Ethel, 741 documents, 615 Quill, 1004 Rescue/reintegration. See Child sexual exploitation; Developing countries R Research Action and Information Network for Bodily Rachael Alert system, 984 Integrity of Women (RAINBO), 376 Racketeering Influenced and Corrupt Organization (RICO), Resolution (stage). See Sexually exploited youth 752 Restavek, 75 Radiographic studies. See Children Restriction Fragment Length Polymorphism (RFLP), 388 RAINBO, 376 Review studies, 195 Ramsey, JonBenet, 30 RFC. See Request For Comment Rape survivors, 85 RFLP. See Restriction Fragment Length Polymorphism background, 85–87 Rhabdomyolysis, 358 psychology, 89–90 Rhodes, Robert, 911t, 918 Rape victims. See Southern Asia Rice v Paladin Enterprises, 908–909 crime, nonreportage reasons. See Southern Asia RICO, 752 investigation. See Southern Asia RIPE. See Registrar for Internet Numbers in Europe needs/responses, 91 RIRs, 632 Rapes, 174, 967. See also Risk-taking behavior, 706 physical evidence, 92 Rite of passage, 555 preference, 243 Ritual Rapport-building interview, 400 concept. See Sexual ritual RCMP, 307 definition, 539–540 REACT. See Report Expertise Acceleration Contacts Trends usage, 579 Reactive cases, 876 Rome, child sexual exploitation. See Ancient Rome Real child depiction, image proof (Ashcroft v Free Speech Rosenbloom, Arlan L., 233, 663 impact), 659–661 Royal Canadian Mounted Police (RCMP), 307

517 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Rule 1001, 857 expert opinion, 638 Runaways, 339–340. See also Girls; Situational runaways; probable cause, 636–637 Women Searches. See Parole searches; Private searches; Probation behavior, inquiry. See Juveniles; Victims searches; Warrantless search definition, 990 Seattle Post-Intelligencer, 1004 detention, 144–147 Second World Congress Against Commercial Sexual jail (transition), first offense, 133–134 Exploitation of Children (2001), 20, 39, 42, 78 potential, predatory adult solicitation. See Youth preparatory conference, 66 status, 98 Session Statement, 752 tendencies, 356 Second World Congress East Asia and Pacific Regional Rural America, children (commercial exploitation), 1027 Consultation, 1048 introduction, 1027–1028 Secondary harmful effects, 195 law enforcement, approach, 1032 Secondary (permanent) teeth, human dentition (chronology), Rural communities, child protection (steps), 1033t 233t Ryce, Jimmy, 983–984, 983t. See also Jimmy Ryce Center for Sector by sector search, warrant excess, 864 Victims of Predatory Abduction Seduction. See Children; Victims control, 560 S process, 563–565 Sade, Marquis de, 8–9, 251 understanding, 588–590 Sadism, 251–252, 551 relationship. See Pornography case studies, 252 traps, complexity, 801 Sadistic abuse, 227, 647 usage, 579 impact. See Infants; Toddlers Seizures, 358 Sadistic preferential offenders, 589 issues. See Child pornography SAFE. See Sexual Assault and Felony Enforcement items, description, 639 SafeMessage, 620 Self-blame, 815 Safety contract, signing, 403 increase, 822 SAGE. See Standing Against Global Exploitation Self-destruction, 1030 Same-sex relations, 340 Self-esteem Same-sex relationships. See Coercive same-sex relationships decrease, 706, 707, 821 Save the Children, 66, 74 desire, 159 Save the Children Canada, 39–40 increase, 160 Save the Children—Norway, Nepal (SCNN), 89 Self-generated deterrents, 480 Scabies, 392 Self-harm, causing, 163 Scatologia, 551 Self-help, principle, 977 School children mannequins ad, usage. See Elementary school Self-injurious behaviors, assessment. See Juveniles; Victims children mannequins Self-injurious thoughts, 816 School counselor, education. See Internet assessment. See Juveniles; Victims Schools Self-made images, 812 dropouts, 76 Self-medication, 166 history, inquiry. See Juveniles; Victims Self-mutilation, 77 sexual violence, 75–76 Self-protective motive, 803 Scienter, proving, 648–649 Self-representation Scientific defense, 669 , 269 SCNN, 89 purpose, 265 Screen Cam, preparation, 669 Sending countries, tourism campaigns, 1013–1014 Scripts, 622 Sensory memory, 229 SCSI, 841 Septate hymen, 372f Search issues. See Child pornography Server, 633 overbreadth, 641 Servitude, hidden truth. See Involuntary servitude particularity, 639–641 Sex and America's Teenagers (Alan Guttmacher), 28 staleness, 642–643 Sex offenders. See Sexual offenders Search warrants, 585, 636–639 Sex tourism, 740. See also Children background information, 636 children, exploitation (concern), 1010–1011 drafting, 637–638 global opposition network, creation, 1011–1012

518 Index

White House, attention, 880–881 questions, pertinence, 818t–819t Sex trade sexual abuse cases, contrast, 558 children, exploitation (numbers), 717 trade, 179 White House attention, 880–881 Sexual exploitation of children, definition. See Child sexual , 748 exploitation Sex-related crimes, 415 Sexual exploiters, impact. See Children Sex-ring activity, 536 Sexual fantasy, 266 Sexual abuse. See Intrafamilial child sexual abuse Sexual intercourse, 647 acts, consideration, 61t Sexual Internet victimization, addressing, 461 adolescent victims, uncomplicated STDs (management), Sexual lie detector, 283 365t Sexual masochism, 249 cases, contrast. See Sexual exploitation Sexual material, unwanted exposure. See Youth child victims, uncomplicated STDs (management), Sexual maturation. See Delayed sexual maturation; Early 364t–365t sexual maturation; Physical sexual maturation disclosure, 815 rates, 238 levels, 271–272 stage 3, 237 overdiagnosis, 824 stage 4, 237 questions. See Juveniles; Victims stage 5, 237 research. See Childhood sexual abuse stages, 232–237 toleration. See Boys stages 1 & 2, 233–237 victims, 162, 718 timing, international estimates. See Children Sexual abusers, treatment (association), 279–280 Sexual maturation rating (SMR), 232, 237 Sexual activity usage. See Children definition, 537–538 Sexual minority engagement, 403 self-identification, 1049 Sexual approaches. See Youth status, 97 Sexual arousal Sexual motivation. See Pedophiles aid, 267 Sexual offender assessments interest, physiological measures, 281–284 ethical issues, 277 Sexual assault information, inclusion, 280t emergencies, 356–358 measures, usage, 280–289 injuries, 409 misinterpretation, conditions, 290–291 Sexual Assault and Felony Enforcement (SAFE), 884 standards/guidelines, 278–279 Sexual crimes Sexual offenders, 549. See also Nuisance sex offenders; cross-jurisdictional nature, 1043 Preferential sex offenders prostitution, deterrence, 754–755 behavior, rationalization, 221 studies. see Internet children, risk, 557 Sexual crimes, penalties (increase). See Children communication, Internet usage. See Children Sexual decision making, quality, 96 evaluation/treatment recommendations. See Internet- Sexual exploitation. See Child sexual exploitation; Juvenile related sex offenders courts fantasizing, 221 clinical evaluation/management, 358–366 prison, entrance, 729 concept, global perspective, 60–62 supervision, 278 definition, 59–60 treatment programs. See Community-based sex offender forms, 68–69 treatment programs growth. See Internet typology, 544–551 health consequences, 342–345 Sexual offending, etiology, 258 human trafficking, 735 Sexual Predators Apprehension Team (SPAT), 884 Internet Sexual ritual, concept, 539 role, history, 17–22 Sexual sadism, 249 usage. See Child sexual exploitation Sexual solicitations. See Aggressive sexual solicitations; Youth investigation. See Acquaintance sexual exploitation failure, 459 juveniles incident characteristics, 444 historical perspective, 338 perpetrators, 441–444 psychosocial context, impact, 337 quantity, 459

519 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

youth response. See Online sexual solicitations law enforcement, approach, 1032 Sexual symbiosis, symbol. See Ancient China Shields, Brooke (Calvin Klein ad), 31f Sexual trauma Shock statements, 400 recounts, 819 Shock time, 722 victims, follow-up considerations, 366t Shrader, Mary, 953 Sexual victimization, 352–353 Siblings, activities, 579 behavioral symptoms, documentation, 582 Silent conspiracy, 271 conditions, 358–361 Simple Mail Transport Program (SMTP), 633 experiences, 706 Sinatra, Frank, 981 medical interview, 352t Sisters Offering Support (SOS), 321 Sexual victimization of children, definition. See Children Situational child sex abusers, 305 Sexual violence. See Schools Situational offenders, 720 myths, 424 Situational runaways, 339 Sexualization, guidelines (status). See Children Situational-type child molesters, 547 Sexually deviant activity, Internet usage components, 471–473 Skills development, 969–970 Sexually deviant Internet usage, 474–482 Skin diseases, 77 Sexually deviant purposes, Internet usage (reasons), 469–471 Slavery Sexually explicit conduct, 646 background/discovery, 929–931 PROTECT definition, 222 help, obtaining, 940–941 Sexually explicit images, definition. See United States hidden truth, 927 Sexually explicit material, intrusiveness. See Internet investigation Sexually exploitative advertising, impact. See Adults; problems, 934–935 Children; Society solutions, 933–934 Sexually exploited children team approach, 931–933 problem, scope, 62–63 lessons/best practices, 941 social/emotional/health risks, 102–106 Slavery-like practices, 297 Sexually exploited trafficked foreign children, region/countries Small Computer System Interface (SCSI), 841 of origin. See United States Small towns, children (supply). See Commercially exploited Sexually exploited youth children conflict, 974–975 Smart, Elizabeth, 984 exiting/healing group life cycle stages, 973–976 Smith, Edward, 976 inclusion, 973–974 Smith, Kimberly, 1001 production, 975 Smith, Lamar, 879 resolution, 975 SMR. See Sexual maturation rating termination, 975–976 SMTP, 633 Sexually oriented business (SOB), 195 Smuggling, Interpol (influence). See International human Sexually transmitted diseases (STDs), 27, 391–392 trafficking/smuggling children, susceptibility, 77 Snuff film, 252 contraction, 76, 181, 309 SOB. See Sexually oriented business diagnostic testing, 363–364 Social adjustment classes, 136 exposure, 747 Social affiliations, 607 information, 33 Social controls, absence, 706–707 ongoing assessment, 356 Social psychological skills, learning failure. See Adults risk, 425, 804 Social risks. See Sexually exploited children seriousness, 826 child sexual exploitation (risk), comparison, 112–113 spread, 194 Social services symptomatic relief, 356 interaction, 1036–1037 symptoms, 399 resources, need, 1032 testing, 387 Social support systems, inquiry. See Juveniles; Victims transmission, 1030 Society, sexually exploitative advertising (impact), 38–43 vulnerability, 968 Society for the Suppression of Vice, 10 Sexually transmitted viral hepatitis, 392 SODDI. See Some other dude did it Sex/violence (pairing), ad, 36f Sodomy (Tcheou-Wang sanctification), 4 Shadow children, 1027 Soft-tissue injury, 391 introduction, 1027–1028 Software program, screen capture, 619f

520 Index

Solicitation. See Sexual solicitations; Youth Florida, 678 Some other dude did it (SODDI) defense, 655, 657 Georgia, 678–679 SOS. See Sisters Offering Support Hawaii, 679 Source code, introduction, 845 Idaho, 679 Southeast Asia, child prostitution Illinois, 679 involvement/increase, 1010 Indiana, 680 situation analysis, 63–66 Iowa, 680 Southern Asia Kansas, 680–681 child rape victim, 88–89 Louisiana, 681 gang rape victim, 89 Maine, 681 offender, physical condition, 90 Massachusetts, 681–682 psychosocial problems/investigation, 85 Michigan, 682 background, 85–87 Minnesota, 682 rape victims Mississippi, 682 crime, nonreportage reasons, 89–90 Missouri, 682 investigation, 92–94 Montana, 682–683 investigation preparations, 92 Nebraska, 683 repeatedly raped victim, 89 Nevada, 683 study, 65 New Hampshire, 683 suspect, dealing, 93–94 New Mexico, 684 victims New York, 684 interviews, 92–93 North Dakota, 684 physical condition, 90 Oklahoma, 684 Souvenir, 250 Oregon, 685 Spain, INHOPE impact, 1025–1026 Pennsylvania, 685–686 Spam, 633, 668. See also Child pornography Rhode Island, 686 SPAT. See Sexual Predators Apprehension Team South Dakota, 686 Specimens, collection/storage, 388 Tennessee, 686 Speech, protection, 904 Texas, 686 Spinning top. See Exiting Utah, 686 balance, absence, 972, 975 Vermont, 686–687 Sponsors, term (usage), 803 Washington, 687 Spoof, 633 Wisconsin, 687 St. Kizito attack (Kenya), 87 Statutory rape, 350 Stakeholder networks, identification, 99 laws, 752 Stalagmite effects, 39 STDs. See Sexually transmitted diseases Staleness. See Search issues Stereotypical kidnappings, 989 Standing Against Global Exploitation (SAGE), 321 Steris Corporation. See Matthew Dickey v Steris Corporation Stanford-Binet test, 283 Sting operations, 878–880. See also Travelers Start-up ISP, 658 Sting tactics, bias (sample questions), 694 State contacts, network development. See Commercially Stockholm Declaration and Agenda for Action to Combat exploited children the Commercial Sexual Exploitation of Children State legislation. See Child prostitution (1996), 306 State (Ohio) v Cook, 837, 843, 862–863 Stoelzle, Deirdre, 1001–1003 State v Bir Bahadur Biswokarma, 88 Straddle injury, 373–374. See also Females; Males State v Osborn, 668 Strain gauge, 281. See also Circumferential strain gauge Statutes of limitations, elimination, 649 Stranger danger, 531 Statutes of limitations, issues, 649 Street children, 73 Statutes of limitations removal. See Children Street Fest 2001, 973 Alabama, 676 Streetcar Named Desire, A, 140 Alaska, 676 Street-level entrapment, 667 Arkansas, 677 Strip clubs, monitoring, 1034–1035 Colorado, 677 Subject confessions, 587 Connecticut, 678 Submucosal hemorrhages, 361 Delaware, 678 Subscriber information, obtaining, 657

521 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Substance abuse, 148, 174 population, vulnerability, 459 CRAFFT Screening test. See Adolescents Telephone scatophilia, 249 emergencies, 358 Television advertisement, usage, 796f screening, 364–366 Tell Express Assure Medical issues Safety issues Test/treat testing/monitoring, 364–366 Access Timely follow-up (TEAMSTAT), 350 Substance-related disorders, 407 approach, 350–356, 351t. See also Children of the night Substantive testimony, 811–812 Temple prostitution (Devadasi), 68–69 Sugar daddies, 69 10-print file, 739 Suicidal behavior, 77 Termination (stage). See Sexually exploited youth Summit, Roland, 820 Terrell, Earl, 981 Sunna circumcision, 374, 375f Testimony. See Child sexual abuse; Internet; Rehabilitative Supine frog-leg position, 359 testimony; Substantive testimony; Victims Supine knee-chest position, 360 illustrations, 846–856 Supine lithotomy position, 360 Testosterone, 231 Supreme Court of Nepal, 88 Texas Court of Appeals, analogy, 654 SurfControl, 790 Thailand, child prostitution, 64 Surveillance, 587–588 Third-party exploiters, 310 Survival sex, 139–141, 814, 1028–1030 Thought-driven criminal sexual behavior, 545 definition, 340 Thrownaways, 340 homeless youth (involvement), typology, 339–341, 339t children, 1029 usage, 96 definition, 990–991 Survivors, 170–173 status, 98 perspective. See Children; Juvenile justice system Thumbnail, 215 public communication, 1007t Thyroid hormone, 231 transition. See Child sexual exploitation industry TLD. See Top-level domain update. See Child sexual exploitation industry Toddlers Suspects gross motor skills, development stages, 227t dealing. See Southern Asia maturation, development, 226–227 identification, 584. See also Internet pornography, 226–228 prosecution, 611–612 sadistic abuse, 227–228 Swap files, evidence, 854 impact, 228 Sweatshops, 938 Top-level domain (TLD), 618, 633 Syndrome, term (avoidance), 812 Touching, descriptions, 532 Syphilis, 391 Tourism. See Children; Sex tourism transmission, 1030 campaigns. See Destination countries; Sending countries System tray, 633 child sexual exploitation (protection), code of conduct, Systems youth, 340–341 1015–1016 incentives, 1014–1016 T Tourism and Child Prostitution Watch Task Force, 1013 Taboos. See Child sexual exploitation Tourism industry Tanner, James, 233, 662 education/actions, 1013 Tanner scale, expert testimony (impact), 662–663 interaction, child sexual exploitation prevention, 1009 Tanner stage language, usage, 830 Tracing. See Internet Tanner staging, 662 Trader cases. See Internet Task force. See Internet Crimes Against Children Trading process, example/history. See Internet roles, 612f Trafficking, 736. See also Canada; Domestic trafficking; Tax fraud, 752 Mexico; Sexual exploitation; United States Taylor, Max, 741 child victims, encounters, 939t Taylor v State, 654, 863 definition, 297 TCP. See Transmission Control Protocol estimates. See Central Intelligence Agency Teachers, contribution, 1042 legal parameters, 937–938 TEAMSTAT. See Tell Express Assure Medical issues Safety lessons/best practices, 941 issues Test/treat Access Timely follow-up records. See International police Teenagers victims, assistance, 938t abduction, AMBER Alert (relationship), 986–987 Trafficking cases

522 Index

determination process, 935–940 Internet, usage, 16–17 investigation lessons/tips, 941t–944t pornography/prostitution, impact, 11–17 power/status, significance, 944 Twenty-first century Trafficking Victims Protection Act (TVPA), 317, 936–937 Internet, usage, 16–17 Transmission Control Protocol (TCP), 18, 615, 633 pornography/prostitution, impact, 11–17 Transmission Control Protocol/Internet Protocol (TCP/IP), Tylenol, usage, 188 18, 615 Typologies. See Homeless youth; Offenders; Sexual offenders; Transvestic fetishism, 249 Survival sex Trap and trace orders, 941 reasons, 548–550 Trauma. See Childhood; Childhood genital trauma summary, 551 beliefs, 158–164 , 426 U Tr a ve l UFTAA, 1013 child sexual exploitation (protection), code of conduct, UK Court of Appeals, 259 1015–1016 sentencing guidelines scale, 259t industry, education/actions, 1013 Ultrasound, 370 Traveler-child relationship, 873 Unaccompanied Refugee Minor (URM) Program, 937–938 Travelers. See Global travelers; Internet travelers; Interstate Unallocated clusters, 849 travelers; Intrastate travelers; Local travelers; Victim Windows Metafiles recovery, evidence, 856 travelers Underage victim terms, 896t cases. See Internet Undercover (UC) law enforcement officers, Internet constitutional attack defense, 889–890 solicitations, 3693 courts, interaction, 886–891 Undercover (UC) operations, 628, 879–880 definition, 873 Undercover (UC) technique. See Internet entrapment defense, 888–889 Uniform Resource Locator (URL), 616, 633 fantasy defense, 890–891 United Federation of Travel Agents' Association (UFTAA), impossibility defense, 886–888 1013 factual impossibility, 886–887 United Nations Children's Fund (UNICEF), 376, 1016 legal impossibility, 887–888 issues, 71 isolation, proactive approach, 876 response, 78 no-shows, 878 United Nations Convention Against Transnational Organized phenomenon, evolution, 873 Crime, 742 sting operations, 878 United Nations Convention on the Rights of the Child, 965, variations, 877–878 1016 Traveling, 475 United Nations Crime Prevention and Criminal Justice Treatment program, example. See Juveniles; Victims Division, 740 Treponema pallidum, 391 United Nations Declaration of Human Rights, 1016 Trichomonas vaginalis, 356, 392 United Nations Development Program (UNDP), 301 discharge. See Adolescents United Nations High Commissioner for Refugees Trichomoniasis. See Prepubertal female (UNHCR), 74 Trigger pictures, 40 United Nations Population Fund (UNPF), 376 example, 41f United States Tri-National Regional Consultation on CSEC, 298 child pornography, 320–321 Trojan, 633 child sexual exploitation, addressing (national capacity), True misses, 287 113–119 Trulock v Freeh, 644 child sexual exploiters, profiles, 109–112 Trust children belief. See Children; Victims maltreatment, 97–98 establishment. See Juveniles prostitution; Victims profiles, 313 Turner Diaries, The, 916 commercial sexual exploited/trafficked foreign children, Turner's syndrome, 238 regions/countries of origin, 114t T-visa, 318 commercially sexually exploited children, categories, establishment, 748 106–109 TVPA. See Trafficking Victims Protection Act CSEC Twentieth century children, special risk, 314t–315t

523 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

trafficking functionaries, 116t–118t field divisions, 598 exploiters, profiles, 315–317 Forensic and Technical Services Division, 600 law enforcement, 319 function, 595 national legislation, 319 intelligence information, 591 online sexual victimization, 320–321 law enforcement partnerships, 211 political/economic characteristics, 299t–301t logo, 15f population/health/social characteristics, 302t–303t obscenity investigations, 595–596 prevention/prosecution/protection programs, 319–320 sexual exploitation, children (protection), 596–598 private sector, 321 United States Secret Service (USSS), 209, 626, 846 sexually explicit images, definition, 222 United States Surgeon General, 963 sexually exploited trafficked foreign children, United States v Acheson, 902 region/countries of origin, 112 United States v Anderson, 638, 642, 643 trafficking, 317–318 United States v Bailey, 889 United States Attorney General, Guidelines for Victim and United States v Bender, 662 Witness Assistance, 585 United States v Broyles, 664 United States Attorney's Office, 928 United States v Brunette, 637–638 United States Code, punishments, 885–886 United States v Byrne, 886 United States CSEC, 304–321 United States v Careay, 643–644 city selection, 100–101 United States v Cihak, 910 city/country/regional studies, informants, 101 United States v Cream, 650 country selection, 100 United States v Dean, screen shot usage, 858f findings, 102–119 United States v Deaton, 664 introduction, 95–99 United States v Durham, 644 United States v Esch, 648 project phasing, 100 United States v Fabiano, 648 research United States v Farner, 887 methods, 99–101 United States v Froman, 636–637 partners, 99–100 United States v Gallo, 664 statutory reviews, 101 United States v Gendron, 667 United States Customs and Border Protection, 214 United States v Gibbs, 910 United States Customs Service, 320 United States v Gourde, 637 Cyber Smuggling Center, 661 United States v Greany, 642 intelligence information, 591 United States v Griffith, 757 United States Department of Justice (USDOJ), 596 United States v Guagliardo, 661 Child Exploitation of Obscenity Section, 661 United States v Habershaw, 864–865 Civil Rights Division, 928, 932, 935–936 expert report, 867–871 Trafficking in Persons and Worker Exploitation United States v Hall, 664 Complaint Line, 940 United States v Hathcock, 669 United States Department of Labor (USDOL), 928, 932 United States v Hay, 643 Report on Child Prostitution as a Form of Forced Labor, 718 United States v Hilton, 846 United States Department of State United States v Horn, 642–643, 652 International Programs Section, 318 United States v Husband, 652 Office to Monitor and Combat Trafficking in Persons, United States v Jasorka, 642 318 United States v Jimenez-Calderon, 936 Public Diplomacy and Outreach Section, 318 United States v Katz, 663 Trafficking in Persons Report Section, 318 United States v Kimbrough, 651 United States Immigration and Customs Enforcement United States v Knights, 646 (ICE), 15 United States v Knox, 647 United States Postal Inspection Service (USPIS) United States v Koelling, 641 attack. See Child sexual exploitation United States v Lacy, 642 child exploitation United States v Lamb, 638, 664 arrests, 247 United States v Laney, 914 child exploitation program, overview, 598–602 United States v Lemmons, 644 contraband, handling, 214 United States v Leon, 638–639 cooperation, 320 United States v Long, 638, 662 enforcement efforts, 595–596 United States v Loy, 641, 642

524 Index

United States v Matthews, 670–671 Vaginal infections, 428 United States v McBroom, 668 Vaginal tearing, 747 United States v Mendelsohn, 907 Vaginal trauma, 584 United States v Motto, 668 Vaginal-penile penetration, 361f United States v Naparst, 859 hymenal tear/posterior vestibule tear, 361f United States v Peters, 888 Van Dam, Danielle (murder), 652 United States v Peterson, 910 VDRL, 363 United States v Poehlman, 666, 889 Venereal Disease Reference Library (VDRL), 363 United States v Pollard, 662 Venereal warts. See Human papillomavirus United States v Quinn, 842 Verbal sexual abuse, 61t United States v Richardson, 663–664 Versace ad, nude female toddler, 34f United States v Romero, 562, 638 Vertical conspiracy liability. See North American Man/Boy United States v Rowland, 642 Love Association United States v Rude, 641 Vestibular erythema, 371 United States v Saelee, 841 Vice-related issues, 938 United States v Scott-Emuakpor, 846 Victim Identification Project presentation, 794 United States v Simmonds, 643 Victim travelers, 878 United States v Simpson, 639 Victim Witness Specialist, assistance, 940 United States v Soto, 936 Victim-child, addressing, 917 United States v Stanley, 663 Victimhood, definition, 937–938 United States v Superior Growers Supply, 921 Victimization. See Childhood; Fabricated victimization; United States v Tank, 836–837 Online victimization; Physical victimization; Sexual United States v Taylor, 757 victimization; Youth alienation/victimization United States v Tucker, 669 addressing. See Nonsexual Internet victimization; Sexual United States v Upham, 639, 864 Internet victimization United States v Villard, 661–662, 664 conventional forms, attention. See Youth United States v Walser, 643 long-term negative outcomes, 272 United States v Weber, 638 nondisclosure, 823 United States v Whitaker, 837, 838, 842 occurrence, 760 United States v Wong, 643 Victims. See Males; Multiple victims United States v X-Citement Video, 648 age, assessment, 216–217 University of Washington School of Communications study, approach, 607 997 Unprotected speech, judging assistance, 759–760, 1006 case standards, 905t behavioral assessment, 408–409 guidelines, 905t–906t bonding. See Offenders Unsanctioned outsiders, contact, 940 cases, types. See Multiple victims Untrue defenses, meeting. See Child pornography communication/trust, establishment, 399–406 Upham, Troy, 671 concerns, 565 Upload, 633 confidentiality, rules (establishment), 401 Urinary tract infection (UTI), 376 coping behavior, 164–166 URL. See Uniform Resource Locator developmental assessment, 408–409 URM. See Unaccompanied Refugee Minor drug history, information request, 404 Urophilia, 249, 251, 551 emotional assessment, 408–409 case studies, 251 evaluation, areas, 578–579 US Communications Decency Act, 18 exploitation. See Child victims Usenet, 633 family history, obtaining, 401–402 Usenet newsgroups, 615, 620–621 follow-up considerations. See Sexual trauma monitoring, 269 gender, 558 USPIS. See United States Postal Inspection Service grooming/seduction. See Incarcerated pedophiles USSS. See United States Secret Service history, obtaining, 380t–381t UTI. See Urinary tract infection interviewer tips, 383t identification, 217, 938–940. See also Internet V analysis, 222–223 Vaginal bleeding, differential diagnosis. See Prepubertal child; image analysis, 794–797 Prepubertal girl process, 794–797

525 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

impact. See Long-term victim impact; Primary victim multiple subjects impact description, worksheet (example), 219 testimony, 828–829 usage, 218–220 initial assessment, 399–409, 400t, 401–406 perpetrators, partial image, 218 interaction, 579 receipt, 214–215 intermediate community/mental health support, titles, 226 409–418 Videotaping. See Acquaintance sexual exploitation Internet crimes. See Identified victims Viewing time (VT), 291. See also Abel VT interviews, 401–406. See also Southern Asia measures, usage (ethical issues), 284–286 contextual elements, choices, 401 physiological measures, 284–286 issues. See Child pornography results, misinterpretation, 285 liars, defense, 758 understudied populations, usage, 285–286 life skills, absence, 166–169 Violence, 967. See also Prostituted adolescents; Schools long-term community/mental health support, 409–418 disposition. See Boys long-term prognosis, 419–420 dynamics. See Dating violence long-term therapy, goals, 410–412 genital trauma, relationship. See Nonsexual violence lovability, belief, 159–162 health consequences. See Dating violence misperception/confusion, 578 propensity. See Victims physical abuse, questions, 403–404 relationship. See Women physical condition. See Southern Asia Viral agents, 392–393 preferences, 607. See also Incarcerated pedophiles Viral infections, 428 psychiatric assessment, 406–408 Virtual child pornography, 902 psychological problems. See Incest attitudes, sample questions, 698 psychological profiles, 155–157 Virtual community, 633 rapport, building, 401 Virtual defense, defeating, 649 runaway behavior, inquiry, 404–406 Virtual Global Task Force, 791 safety, creation, 91t Virus, 633 sample questions. See Problematic victims Visible injuries, 390 school history, inquiry, 402 Visual cues, usage, 413–414 selection, 607 Voice over IP (VoIP), 622, 624, 633 self-injurious thoughts/behaviors, assessment, 402–403 Voir dire sexual abuse, questions, 403–404 effectiveness, 654 social support systems, inquiry, 402 questions, sample format, 699–701 support services, 979t sample questions. See Computer-facilitated crimes survivor, transition. See Child sexual exploitation against children testimony, 755–756 Volumetric penile plethysmograph, 281 therapeutic approaches, 413–418 Volumetric plethysmograph, 281f treatment program, example, 417–418 , 61t, 243, 249, 551, 607 trust, belief, 163–164 VT. See Viewing time violence, propensity, 428 Vulnerability Victims of Trafficking and Violence Protection Act (2000), increase. See Child sexual exploitation 748 psychosocial factors. See Children Victim-Witness Coordinators. See Federal Bureau of Vulvar dermatoses, differential diagnosis, 377t–378t Investigation Victoria Declaration and Agenda for Action, 970 W Victoria Youth Summit, 965 Walsh, Adam, 982–983, 982f Videotapes Walsh, John/Revé, 203, 982 angles, unusualness, 218 Warrantless search, 644, 646 background scenes, 226 Warrants. See Anticipatory warrants; No-knock warrants; children, drugged appearance, 230–231 Search warrants content, usage. See Children requirement, exceptions, 643–646 country of origin, stereotypical settings, 226 WBC. See Web-based chat evidence, 217–220 Weapons of destruction, drawings, 406f incest, showing, 220 Web server, 1022 Internet Web site banners, 226 Web sites, 634

526 Index

components, 617f advent, 895 success. See National Center for Missing & Exploited creation, 18 Children electronic locations, 472 usage, 472–473 information, 636 Web-based chat (WBC), 615, 622 page advertising, 751 Web-based pedophilia, 792 Worm, 634 Welfare Writing styles, contrast, 1005t dependency, 148 Written child pornography, 221–222 system, survivor perspective. See Children example, 221 West Africa, prostitution, 78 information, 222 Wetterling, Jacob, 983. See also Jacob Wetterling Foundation significance, 221–222 White House, attention. See Sex tourism; Sex trade WTO, 1013 White Slave Traffic Act (Mann Act), 11–12, 877 WWW. See World Wide Web Whitman, Walt, 248 WHO. See World Health Organization Y Whois, 634 Yahoo! Messenger, 622f WiFi, 874 Yates v United States, 904 Williams, Roy, 792 Yellow notices. See International police Windows GUI, 861 YMCA, 726 Windows Metafiles Young person, definition, 306 explanation, 856 Youth. See Systems youth recovery, evidence. See Unallocated clusters characteristics, 438t–439t Windows operating systems, 659 commercial sexual exploitation, factors, 103t Windows-based computers, file extensions, 628 cyber-enticement, 819t Windows-based GUI, 850 encounters. See Internet WinMX, 623 exiting/healing group life cycle, stages. See Sexually Wireless fidelity (WiFi), 874 exploited youth Witnesses, 599. See also Case witness harassment, 440–441, 453–457 evaluation, 814 impact, 456 medical expert, involvement, 799t–800t response, 456 nonrecognition. See False witnesses targets, 453f testimony. See Expert witnesses testimony, 457t Women information. See Online victimization abuse, 164 Internet criminal behavior, questions. See Abused girls/women friendships, formation/risk. See Adults derailment, mechanisms. See Abused/neglected women offenses, impact, 459 involvement. See Criminal justice system sexual solicitations, 442t prostitution, male violence (relationship), 425 use, patterns, 439 relationships. See Deviant/delinquent friends/relatives intervention strategies, development, 462 runaways, 705–706 involvement, typology. See Survival sex violence. See Pakistan mobilization. See Internet Wonderland Club, 199, 248, 896 online harassment, 453t–455t agreement, proof, 913 online sexual exposure cessation, 897 findings/conclusions, 458t conspiracy, 912 recommendations, 461t liability, creation, 919 online sexual material, unwanted exposure, 448f Internet existence, 911 online sexual solicitations Woody, Kacie, 875 response, 444 Working children, 75 targets, 441f World Bank, 317 online victimization, 440f World Health Organization (WHO), 376 perspectives. See Canada World Report on Violence and Health, 1042 prevention strategies, development, 462 World Tourism Organizations (WTO), 1013 professional guidelines. See Exploited youth World Vision, training, 1048 response. See Online sexual solicitations World Wide Web (WWW), 615–618, 634 runaway potential, predatory adult solicitation, 447

527 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

sexual approaches, 439–448 sexual assaults, 111f sexual material, unwanted exposure, 440, 448–453, 448t–450t exposure incident characteristics, 450–451 response, 451 risk, 451–452 testimony, 451t sexual solicitations, 439–448 impact, 444–445 risk, 445 testimony, 445t solicitations disclosure/nondisclosure, 459–460 experiences, reporting, 460 suicide, rates, 40 targets. See Harassment sexual solicitations, 441 victimization, conventional forms (attention), 464 violence, rates, 40 Youth Advocate Program International, 321 Youth alienation/victimization, 337–338 Youth Career Initiative, 1016 Youth Internet Safety Survey implications/recommendations, 460–464 methods, 438–441 participants, 438 study, conclusions, 458–460 Z ZipLip, 620 Zoophilia (bestiality), 248–249, 551, 647

528 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation A Comprehensive Review of Pornography, Prostitution, and Internet Crimes

G.W. Medical Publishing, Inc. St. Louis Medical, Legal, & Social Science Aspects of Child Sexual Exploitation A Comprehensive Review of Pornography, Prostitution, and Internet Crimes

Richard J. Estes, DSW, ACSW Sharon Cooper, MD, FAAP Angelo P. Giardino, MD, PhD, FAAP Professor Adjunct Associate Professor of Pediatrics Associate Chair – Pediatrics Chair, Concentration in Social and University of North Carolina School of Associate Physician-in Chief/ Economic Development Medicine Vice-President, Clinical Affairs Director, International Programs Chapel Hill, North Carolina St. Christopher’s Hospital for Children University of Pennsylvania School of Social Clinical Assistant Professor of Pediatrics Associate Professor in Pediatrics Work Uniformed Services University of Health Drexel University College of Medicine Philadelphia, Pennsylvania Sciences Adjunct Professor of Pediatric Nursing LaSalle Bethesda, Maryland University School of Nursing Victor I. Vieth, JD Chief , Developmental Pediatric Service Philadelphia, Pennsylvania Director Womack Army Medical Center APRI’s National Child Protection Training Fort Bragg, North Carolina Nancy D. Kellogg, MD Center Professor of Pediatrics Winona State University University of Texas Health Science Center at Winona, Minnesota San Antonio Medical Director Alamo Children’s Advocacy Center

G.W. Medical Publishing, Inc. St. Louis FOREWORD In my career as a prosecutor, and now a Congressman, I have seen tremendous im- provements in our nation’s response to cases of child maltreatment. In most commu- nities today, multidisciplinary teams work together for the benefit of children. Many elected district attorneys, sheriffs, and police chiefs have developed specialized units to respond to cases of child abuse. Through the work of the American Prosecutors Research Institute’s National Center for Prosecution of Child Abuse, the National Child Protection Training Center at Winona State University, Fox Valley Technical College, the National Center for Missing & Exploited Children, and other federally funded programs, thousands of frontline professionals are trained annually in the art and science of handling child protection cases. Perhaps the most important development is the Children’s Advocacy Center program. Children’s Advocacy Centers (CACs) are child-friendly facilities where children can be interviewed sensitively and receive medical and psychological services. As a district attorney, I had the privilege of starting the nation’s first Children’s Advocacy Center. As a member of Congress, I championed support for the National Children’s Advo-cacy Center in Huntsville, Alabama, and the National Children’s Alliance, a coalition of CACs from across the nation that is headquartered in Washington, DC. Today there are hundreds of CACs in every part of our country. We can not, however, rest on our laurels. As detailed in the pages of this book, modern technology poses a new threat to our children. It is increasingly easy for perpetrators to exploit children through the Internet, to create and disseminate child pornography, and to solicit children for illicit purposes. The commercial exploitation of children is a global problem that impacts every community in the United States. Through the pioneering work of Dr. Richard Estes and other researchers, we know that hundreds of thousands of children are at risk of commercial exploitation. Although more research needs to be done, there is some evidence to suggest these children are just as likely to come from rural and suburban communities as urban centers. I commend GW Medical Publishing as well as the editors and contributors to this book for producing a treatise that addresses child sexual exploitation from every angle. I am particularly grateful to the survivors of child pornography, commercial exploitation, and online solicitation for sharing their pain with those of us who will read this book. I hope the courage of these survivors spurs all of us to do more to protect children. Finally, I want to commend the frontline investigators, prosecutors, medical and mental health professionals, and other child advocates who are in the trenches daily trying to spare children from every form of exploitation. You labor long hours for little pay or honor on behalf of someone else’s children. Please know that your selfless dedication is not unnoticed. Indeed, your heroism is an inspiration to us all.

Congressman Robert E. “Bud” Cramer, Jr. Member of the US House of Representatives (1991-present) Founder of the Children’s Advocacy Center movement

ix FOREWORD It is common to hear pronouncements from public figures that children are society’s most important and treasured assets. To an overwhelming majority, this concept is fundamentally true. To a marginal and deviant minority, however, children are viewed as commodities to be traded, imported, and exported like any other merchandise. Parents and professionals need help combating the alarming growth of child exploitation and this book is a valuable tool in the fight to protect our children from predators who would use them for financial gain or prurient reasons. Global in scope, these 2 volumes are written by individuals who represent a wide array of backgrounds, disciplines, and perspectives. Some authors are the authentic voices of those who were victimized and forced to navigate a system that was intended to help but found to be less than helpful. Some speak from distant lands that are growing ever closer with the ease of air travel and where the youth are being sold to travelers seeking to indulge their perverse needs with someone else’s children. Some voices are actually electronic particles from cyberspace delivering images of unspeakable abuse to our home and office computers. Some of the highlights of this book that I found interesting include: — A chapter discussing exploitation in advertising and the need for healthcare providers to be aware of the “slippery slope” that can occur when girls and teens are used in sexualized marketing — A chapter about the resources of the National Center for Missing & Exploited Children with a focus on their Exploited Child Unit — A chapter from UNICEF on the global commodification of children for sexual work and exploitation — A chapter from the University of Washington School of Journalism discussing the importance of addressing child victims of sexual exploitation in an empathetic and nonvictimizing manner in the newspapers; the chapter includes excerpts and photographs from a focused series in the Atlanta Journal Constitution called “The Selling of Atlanta’s Children,” which played an important role in convincing the Georgia State Legislature to change its laws to make the selling of children a felony, as compared to its history of misdemeanor status for over a century — A chapter from the Association for the Treatment of Sexual Abusers (ATSA) regarding the ethical issues in child sex offender assessments and the benchmarks for parole and probation determinations — Chapters relating to the medical and surgical complications of prostitution — A chapter discussing the demographics of girls who are brought into the criminal justice system and recommendations for communities to avoid the incarceration of prostituted children and youths — A chapter that explains the nuts and bolts of “cloning a computer” when an investigation is conducted in a child pornography case — A chapter describing other aspects of federal laws that are involved when children and youths are trafficked into the United States for sexual exploitation purposes, including civil rights violations and labor law violations — A chapter on the AMBER Alert legislation and the several children whose lives contributed to its inception — A chapter detailing the frequently overlooked concept of child sexual exploitation in rural communities

xi Foreword

This book represents the culmination of the efforts of an impressive collection of premier investigators, judicial participants, child protection agency personnel, and clinicians to gather and organize information about child exploitation. It is the most comprehensive text on this subject and it is a welcome addition to the literature on child maltreatment.

Robert M. Reece, MD Clinical Professor of Pediatrics Tufts University School of Medicine Visiting Professor of Pediatrics Dartmouth Medical School Editor, The Quarterly Update

xii FOREWORD In 1981, my worst nightmare became a reality when my 6-year-old son, Adam, was abducted and murdered. The prime suspect in Adam’s case was never charged. He died in prison while serving a life sentence for other crimes. With determination to spare other families from enduring a similar tragedy, my wife Revé and I worked to help enact the Missing Children Act of 1982 and the Missing Children’s Assistance Act of 1984. We founded the National Center for Missing & Exploited Children (NCMEC) in 1984. In the past 20 years, the rate of recovery of missing children has increased from 62% to 95%. While the NCMEC is best known for its work in tracking down missing children, the Exploited Child Unit, established in 1997, has also been a primary resource for law enforcement and families in the investigation and prosecution of the sexual exploitation of children. Child sexual exploitation is a worldwide problem, encompassing child pornography, molestation, and prostitution. In recent years, computers and the Internet have become favorite tools of child molesters as they collect and trade pornographic images and solicit new victims online. Medical, Legal, & Social Science Aspects of Child Sexual Exploitation: A Comprehensive Review of Pornography, Prostitution, and Internet Crimes is a 2- volume text that addresses this pervasive problem. Written by physicians, nurses, attorneys, social workers, and law enforcement officials who are leading experts in the field, the text takes a multidisciplinary approach to the medical and legal issues faced by victims of sexual exploitation. The contributions of authors from countries outside the United States help to highlight the international nature of this problem. First-person accounts by adults who were exploited as children and teenagers help to put a human face on the issue. The role of the media is addressed, both as contributors to the problem and as partners in creating and implementing solutions. Other chapters discuss the role of the United States Postal Inspection Service, the investigation of Internet exploitation cases, prosecutorial and judicial issues, the role of the medical expert, and the establishment of criminal liability for groups promoting child sexual exploitation. It is my sincere belief that this book will be a significant contribution to the literature in this field, and by doing so, will help to combat this worldwide problem.

John Walsh Cofounder, National Center for Missing & Exploited Children Host, Fox Television’s America’s Most Wanted

xiii PREFACE The idea for this work originated from the need to establish a repository of information for multidisciplinary team members who are learning about Internet crimes against children. When the concept of mass communication began with Gutenberg’s printing press in the 14th century, the purpose was to disperse infor- mation and promote new ideas. Seven centuries later, the Internet has expanded upon the original purpose of the printing press and now includes the deception and entrapment of our most vulnerable resource: children. As methods of victimization have become more innovative, sophisticated, and elusive, professionals are challenged in their efforts to prevent, detect, intervene, and treat children that fall prey to online predators. Knowledge regarding Internet crimes against children has been primarily limited to media coverage of the topic. This text serves to separate fact from fiction and to dispel several myths and misconceptions, including the belief that prostituted youths typically market themselves by choice and can easily escape from this form of abuse. To the uninformed, it is inconceivable that children and youth are often sold from within their own homes, that the Internet is used in numerous capacities to make such arrangements, and that Internet cafés present a nearly untraceable means of making the deal. Online solicitation has become an increasing threat to children. Many naïve children and youths unwittingly receive unwanted sexual solicitations, and may be enticed to leave their homes and families to meet online predators; such encounters may end tragically in sexual assault, physical assault, abduction, or murder. What was slavery and bondage in the past has now become human trafficking for forced labor and sexual exploitation. These crimes continue to escalate worldwide. The text begins with the history of child exploitation and proceeds to explain the contemporary and global nature of this form of child victimization. A careful analysis of the acquaintance molester leads the reader to complex types of sexual exploitation, illustrated with online, local, national, and international examples of the scope of these crimes against children. A collage of perspectives is presented, including exploitation in advertising, the role of the journalistic media response to these types of victims of crime, medical evaluation and treatment of victims, offender psychology and victim mental health impact, and social science research in the area of commercial sexual exploitation of children. The reader will experience a judicial and criminal justice view, the perspective of the sexually exploited male, an education regarding the Internet community with respect to offender dynamics, and important aspects of the offender evaluation when potential parole, probation, and public safety is being considered. From the investigative and prosecuting platform, numerous important issues are discussed: the role of the first responder in an Internet crime against a child; the details of “cloning software” and the best way to present this complex information to a judge or jury; the technology of victim identification from an Internet Web site; the importance of strategy in prostitution cases when the common bias is that the victim is an offender; the recognition of the organized crime aspects of girls domestically trafficked across a country for sexual slavery and prostitution; the international requirements of police agencies in abduction and exploitation cases; and the realization that child pornography production and collection is a highly recidivistic crime. Investigations of high profile cases of sexual exploitation have resulted in an organized response to the sex tourist who travels to exploit young children for sexual purposes. The worst-case scenario of child abduction, sexual assault, and homicide are described, as well as community responses such as the AMBER Alert program, designed to facilitate a rapid and safe recovery of a missing child or youth.

xv Preface

From a child maltreatment perspective, this groundbreaking work provides com- prehensive and diverse information for this contemporary, yet misunderstood and daunting, form of child exploitation. It has been an immense honor to work with truly professional contributors, all of whom have been eager and cooperative in providing an international and expert treatise on a subject that all parents and professionals must acknowledge and understand. As the Internet, the “printing press” of the 21st century, has opened new doors for the worldwide exchange of information and ideas, so too has it opened a Pandora’s box of opportunities for criminals that victimize children and youths. At present, the knowledge regarding Internet crimes against children is fragmented, scant, and discipline-specific. This text is the first step toward comprehension, effective intervention, and the multi- disciplinary coordination of investigations of crimes involving these exploited children. It will open your eyes and your mind to a new dark side of child abuse that we can no longer afford to ignore.

Sharon W. Cooper, MD, FAAP Richard J. Estes, DSW, ACSW Angelo P. Giardino, MD, PhD, FAAP Nancy D. Kellogg, MD Victor I. Vieth, JD

xvi REVIEWS As a former Police Chief I know that With the emergence of the Internet and important policy decisions regarding the its worldwide expansion as a favored establishment of comprehensive child pro- mode of communication, there is an ever- tection strategies are often based upon a increasing avenue for the sexual exploita- tragic case or anecdotal evidence that tion of children. This informative publi- often ignores the scope and scale of the cation, authored by acknowledged leaders overall problem. The research conducted in the field of forensic science, provides by these nationally recognized experts professionals working with child abuse provides important insight into emerging victims, their families, and the suspected threats to children and serves as a guide perpetrators with a wide range of forensic for developing an effective national techniques and knowledge that will serve response. as an essential forensic reference. Brad Russ Faye Battiste-Otto, RN, SANE ICAC Training & Technical Assistance Founder/President of American Program Director Forensic Nurses University of New Hampshire Cofounder, International Association Internet Crimes Against Children of Forensic Nurses Research Center Palm Springs, CA Durham, NH In giving a broad scope of understanding The factual information, practical about the sexual exploitation of children, methodologies, and expertise in this book this book delineates familial child sexual can be used as a practical tool in combat- abuse and commercial sexual exploita- ing the horror of the commercial sexual tion. Its international perspective suggests exploitation of children. The fact that that the causes are broader than defined this text is guided by internationally rec- by western countries and therefore pre- ognized child rights principles and docu- vention foci need to be tailored accord- ments gives one hope that change is possi- ingly. While giving information on ble in a world where exploitation of chil- offender motives and treatment, it dren is so prevalent. As a survivor and emphasizes the victim as blameless, a now activist, I encourage the government, view that continues to need reinforce- professionals, and the public to care ment. The detailed nature of the book about this issue and be practical and and the number of worthy contributors humane in their approach to combating reiterate its use as a text for all manner exploitation. This book provides us with of helping professionals. that template. Jane Rudd, PhD Cherry Kingsley Associate Professor Special Advisor Saint Joseph College International Centre to Combat West Hartford, CT Exploitation of Children Vancouver, Canada

xvii Reviews

The subject matter is disturbing, but this Very worthwhile and a must-read for is a must-read resource book for profes- law enforcement and other professionals sionals working in the field of child mal- involved in identifying, rescuing, and treatment in the 21st century. The con- treating child victims of sexual abuse. tents provide a comprehensive review of This book allows the reader to better research, current programs, and concepts understand how and why individuals use that address intervention, investigation, the computer to facilitate the sexual and prevention. exploitation of children. Jeanie Ming, CPNP Det Sgt Paul Gillespie Forensic Pediatric Nurse Practitioner Officer In Charge Child Abuse Services Team Child Exploitation Section Orange, CA Toronto Police Service Toronto, Canada Medical, Legal, & Social Science Aspects of Child Sexual Exploitation is Whether it is child prostitution, traffick- a rare and welcome departure from the ing, cyber-enticement, child pornography, “same old, same old” of recent years and or sex tourism, tens of thousands of chil- is truly new and innovative. This book is dren suffer irreparable physical and psy- the first to provide in-depth coverage of chological harm from producers and cus- an emerging and serious global issue. The tomers of this form of abuse. As a leader authors and editors are well qualified to in the education of forensic nurses, the address the complex social, psychological, International Association of Forensic and legal issues presented by child sexual Nurses supports all efforts to educate exploitation. healthcare providers, criminal justice and John E.B. Myers social service professionals about the Distinguished Professor and Scholar crimes of child exploitation. Since there is University of the Pacific presently a lack of evidence-based infor- McGeorge School of Law mation, we look forward to this new pro- Sacramento, CA fessional resource. International Association of Forensic This text brings to light the necessary role Nurses (IAFN) of interagency collaboration in child Board of Directors, 2005-2006 exploitation cases while providing direct guidance through case study and lessons of necessary considerations, benefits and limitations of emerging tools, and strate- gies for the investigation, proper assess- ment, and ongoing management of per- petrators. Margaret Bullens Forensic Psychophysiologist and Sex Offender Management Consultant Grapevine, TX

xviii CONTENTS IN BRIEF

VOLUME ONE

SCOPE OF THE PROBLEM CHAPTER 1: A BRIEF HISTORY OF CHILD SEXUAL EXPLOITATION 1 CHAPTER 2: COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN ADVERTISING ...... 25 CHAPTER 3: CHILD SEXUAL EXPLOITATION FROM A GLOBAL PERSPECTIVE ...... 59 CHAPTER 4: RAPE SURVIVORS: PSYCHOSOCIAL PROBLEMS AND INVESTIGATION IN SOUTHERN ASIA...... 85

EXPERIENTIAL PERSPECTIVES CHAPTER 5: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN THE UNITED STATES ...... 95 CHAPTER 6: WHAT IT IS LIKE TO BE “SERVED” IN THE “SYSTEM”: A SURVIVOR’S PERSPECTIVE ...... 129 CHAPTER 7: ADULT SURVIVORS OF THE CHILD SEXUAL EXPLOITATION INDUSTRY: PSYCHOLOGICAL PROFILES . . . . 155 CHAPTER 8: EXPERIENTIAL YOUTH PERSPECTIVES: CANADA . . 179

PORNOGRAPHY CHAPTER 9: UNDERSTANDING THE IMPACT OF PORNOGRAPHY ON ADULTS AND CHILDREN ...... 193 CHAPTER 10: RESOURCES OF THE EXPLOITED CHILD UNIT AT THE NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN® ...... 203 CHAPTER 11: MEDICAL ANALYSIS OF CHILD PORNOGRAPHY. . 213 CHAPTER 12: CHILD SEXUAL ABUSE AND THE PARAPHILIAS . . 246 CHAPTER 13: ABUSIVE IMAGES OF CHILDREN AND THE INTERNET: RESEARCH FROM THE COPINE PROJECT . . . . 257 CHAPTER 14: ETHICAL ISSUES IN SEXUAL OFFENDER ASSESSMENTS ...... 278

PROSTITUTED CHILDREN AND YOUTH CHAPTER 15: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN NORTH AMERICA ...... 299

xix Contents In Brief

CHAPTER 16: PSYCHOSOCIAL CONTEXT LEADING JUVENILES TO PROSTITUTION AND SEXUAL EXPLOITATION ...... 337 CHAPTER 17: MEDICAL CARE OF THE CHILDREN OF THE NIGHT 350 CHAPTER 18: THE MEDICAL IMPLICATIONS OF ANOGENITAL TRAUMA IN CHILD SEXUAL EXPLOITATION ...... 369 CHAPTER 19: COMMUNITY AND MENTAL HEALTH SUPPORT OF JUVENILE VICTIMS OF PROSTITUTION ...... 399 CHAPTER 20: INTIMATE PARTNER VIOLENCE IN THE LIVES OF PROSTITUTED ADOLESCENTS ...... 423

ONLINE SOLICITATION CHAPTER 21: ONLINE VICTIMIZATION: WHAT YOUTH TELL US 438 CHAPTER 22: THE USE OF THE INTERNET FOR CHILD SEXUAL EXPLOITATION ...... 469

VOLUME TWO

INVESTIGATION AND PROSECUTION CHAPTER 23: ACQUAINTANCE CHILD MOLESTERS: A BEHAVIORAL ANALYSIS ...... 529 CHAPTER 24: THE WORK OF THE UNITED STATES POSTAL INSPECTION SERVICE: COMBATING CHILD SEXUAL EXPLOITATION 595 CHAPTER 25: THE ROLE OF THE FIRST RESPONDER IN THE CRIMINAL INVESTIGATIVE PROCESS ...... 603 CHAPTER 26: INVESTIGATING INTERNET CHILD EXPLOITATION CASES ...... 611 CHAPTER 27: PROSECUTORIAL ISSUES IN THE CHILD PORNOGRAPHY ARENA ...... 635 CHAPTER 28: CHILDHOOD VICTIMIZATION AND THE DERAILMENT OF GIRLS AND WOMEN TO THE CRIMINAL JUSTICE SYSTEM . . 704 CHAPTER 29: JUVENILE COURTS AND SEXUAL EXPLOITATION: A JUDGE’S OBSERVATIONS ...... 711 CHAPTER 30: AN INVESTIGATION OF VICTIM AND OFFENDER DYNAMICS IN PROSTITUTES AND INCARCERATED PEDOPHILES . 715 CHAPTER 31: HUMAN TRAFFICKING FOR SEXUAL EXPLOITATION: THE ROLE OF INTERPOL ...... 735 CHAPTER 32: INVESTIGATION AND PROSECUTION OF THE PROSTITUTION OF CHILDREN ...... 745 CHAPTER 33: INTERNET PEDOPHILIA ...... 789 CHAPTER 34: THE MEDICAL EXPERT AND CHILD SEXUAL EXPLOITATION ...... 802 CHAPTER 35: COMPUTER FORENSIC SOFTWARE AND ITS LEGAL VALIDATION ...... 835 xx Contents In Brief

CHAPTER 36: INTERNET TRAVELERS ...... 873 CHAPTER 37: ESTABLISHING CRIMINAL CONSPIRACY AND AIDER AND ABETTOR LIABILITY FOR GROUPS THAT PROMOTE SEXUAL EXPLOITATION OF CHILDREN ...... 895 CHAPTER 38: THE HIDDEN TRUTH OF INVOLUNTARY SERVITUDE AND SLAVERY ...... 928

PREVENTION RECOMMENDATIONS CHAPTER 39: KEEPING THE FAITH: A CALL FOR COLLABORATION BETWEEN THE FAITH AND CHILD PROTECTION COMMUNITIES ...... 947 CHAPTER 40: EXITING ROUTE: A PEER SUPPORT MODEL FOR EXITING AND HEALING PROGRAMS ...... 966 CHAPTER 41: THE AMBER ALERT PROGRAM: MISSING CHILDREN BEFORE AND AFTER ...... 980 CHAPTER 42: THE IMPACT OF NEWS COVERAGE: HOW THE MEDIA CAN HELP ...... 994 CHAPTER 43: WORKING WITH THE TOURISM INDUSTRY TO PREVENT CHILD SEXUAL EXPLOITATION: AN INDIVIDUAL PERSPECTIVE ...... 1010 CHAPTER 44: HOTLINES AND THE HISTORY OF INHOPE: THE ASSOCIATION OF INTERNET HOTLINE PROVIDERS . . . . . 1019 CHAPTER 45: SHADOW CHILDREN: ADDRESSING THE COMMERCIAL EXPLOITATION OF CHILDREN IN RURAL AMERICA ...... 1027 CHAPTER 46: RECOMMENDATIONS FOR ACTION FOR DEALING EFFECTIVELY WITH CHILD SEXUAL EXPLOITATION . . . . . 1041

xxi CONTENTS IN DETAIL

VOLUME ONE

Forewords Congressman Robert E. "Bud" Cramer ...... ix Robert Reece, MD ...... xi John Walsh...... xiii

CHAPTER 1: A BRIEF HISTORY OF CHILD SEXUAL EXPLOITATION Ancient Civilizations ...... 1 Ancient Egypt ...... 1 The Old Testament ...... 2 Ancient Greece ...... 2 Ancient Rome ...... 3 Ancient China ...... 4 The Middle Ages ...... 4 The Renaissance...... 6 The Age of Enlightenment...... 7 Puritanism...... 7 Pornography and Literature ...... 8 The 19th Century...... 9 Government Regulation...... 9 Changes in Family Lifestyles...... 10 The Influence of Photography ...... 10 Pornography and Prostitution in the 20th and 21st Centuries ...... 11 Use of the Internet ...... 16 The History of the Role of the Internet in Sexual Exploitation ...... 17 Internet Crimes Against Children...... 19 Conclusion ...... 22

CHAPTER 2: COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN ADVERTISING Why Advertising? ...... 25 What Sexual Exploitation of Children in Advertising Looks Like . . . . . 28 The History of Child Sexually Exploitative Advertising ...... 30 Sex and Violence ...... 35 The Impact of Sexually Exploitative Advertising on Children, Adults, and Society...... 38 Body Image...... 40 The Sex Exploiter ...... 42 Regulation of Advertising to Children in the United States ...... 43 Status of Guidelines Regarding Sexualization of Children and Advertising to Adolescents ...... 45 Sexually Explicit Photos and Proof of Age ...... 45 Recommendations for Change...... 46 Let Kids Be Kids...... 46 Dads and Daughters ...... 47 What Pediatricians Can Do...... 48

xxiii Contents In Detail

Conclusion ...... 51 Appendix 2-1: The Marketing Machine ...... 52

CHAPTER 3: CHILD SEXUAL EXPLOITATION FROM A GLOBAL PERSPECTIVE Definition of Sexual Exploitation ...... 59 The Concept of Sexual Exploitation From a Global Perspective ...... 60 The Scope of the Problem of Sexually Exploited Children: Some Numbers . 62 Children in Commercial Sexual Exploitation ...... 63 The Face of Child Prostitution: A Situation Analysis From Southeast Asia . 63 Thailand ...... 64 Philippines...... 64 A South Asian Study...... 65 Children Born in Brothels (Brothel Children) ...... 65 An Example From Eastern Europe ...... 66 The Middle East...... 66 Examples From Africa...... 67 Examples From Central America...... 67 Other Forms of Sexual Exploitation ...... 68 Early Marriages ...... 68 Temple Prostitution: Devadasi...... 68 Sugar Daddies ...... 69 Psychosocial Factors With an Impact on the Vulnerability of Children Regarding Commercial Sexual Exploitation...... 69 Poverty ...... 99 Power and Powerlessness...... 69 Lack of Knowledge ...... 70 Child as a Commodity ...... 70 Consumerism ...... 70 Macho or Machismo Culture ...... 71 Children Sexually Abused or Exploited in the Private Sphere ...... 71 Taboos...... 71 Lack of Knowledge Regarding the Needs of Children ...... 71 Dysfunctional Families ...... 72 Environmental Factors: Circumstances Increasing Children’s Vulnerability to Sexual Exploitation ...... 72 The Demand for Children...... 72 The Economic Impact of Child Sexual Exploitation ...... 73 Street Children ...... 73 Children With Disabilities ...... 73 Orphaned Children...... 73 Children in Armed Conflicts ...... 73 Indigenous Children ...... 74 Children Who Work ...... 75 Children Who Are Trafficked ...... 75 Sexual Violence in Schools ...... 75 School Dropouts ...... 76 Children in Institutions ...... 76 Health Consequences for Children Exposed to Sexual Exploitation . . . . 76 Measures Being Taken: Rescue, Recovery, and Reintegration ...... 77 Measures of Rescue, Recovery, and Reintegration in Developing Countries . 78 Recovery and Integration Programs...... 79 International Conventions and Protocols ...... 79 Preventive Measures: Future Perspectives ...... 80 Conclusion ...... 81 xxiv Contents In Detail

CHAPTER 4: RAPE SURVIVORS: PSYCHOSOCIAL PROBLEMS AND INVESTIGATION IN SOUTHERN ASIA Background ...... 85 Victims and the Criminal Justice System...... 87 A Child Rape Victim...... 88 A Repeatedly Raped Victim ...... 89 A Gang Rape Victim ...... 89 Reasons Why Rape Victims Do Not Report the Crime ...... 89 Physical Condition of the Victim and Offender ...... 90 Psychological Problems of Incest Victims...... 91 Immediate Needs of and Appropriate Responses to Rape Victims . . . . . 91 Investigation ...... 92 Preparations for an Investigation ...... 92 Physical Evidence of a Rape ...... 92 Interviewing Victims ...... 92 Dealing With the Suspect ...... 93 Conclusion ...... 94

CHAPTER 5: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN THE UNITED STATES Introduction ...... 95 Factors Contributing to the Commercial Sexual Exploitation of Children . 96 Child Maltreatment in the United States ...... 97 The Commercial Sexual Exploitation of Children in the United States . . 98 Research Methods ...... 99 Research Partners ...... 99 Project Phasing...... 100 Country Selection ...... 100 City Selection ...... 100 Key Informants for the City, Country, and Regional Studies...... 101 Statutory Reviews ...... 101 Findings...... 102 Factors That Contribute to Sexual Exploitation of Children ...... 102 More and Less Common Forms of the Commercial Sexual Exploitation of Children ...... 102 Social, Emotional, Health, and Other Risks to Sexually Exploited Children 102 Risks of Sexual Exploitation and Commercial Sexual Exploitation for Children Living in Their Own Homes ...... 103 Risks of Sexual Exploitation and Commercial Sexual Exploitation for “Street,” Homeless, and Other Children Not Living in Their Own Homes ...... 106 Impact of Commercial Sexual Exploitation on Children ...... 106 Categories of Commercially Sexually Exploited Children in America . . 106 Profiles of Child Sexual Exploiters in the United States...... 109 Sexual Exploiters of Children Living in Their Own Homes . . . . 110 Sexual Exploiters of Children Not Living in Their Own Homes . . 111 Organized Crime and Child Sexual Exploitation ...... 112 Domestic and International Trafficking in Children for Sexual Purposes . 112 Regions and Countries of Origin of Sexually Exploited Trafficked Foreign Children in the United States...... 112 Adult Traffickers of Children for Sexual Purposes ...... 112 Risk of Child Sexual Exploitation in Comparison With Other Social Risks to Which American Children and Youth Are Exposed ...... 112 National Capacity of the United States for Addressing Child Sexual Exploitation...... 113 Conclusion ...... 119

xxv Contents In Detail

CHAPTER 6: WHAT IT IS LIKE TO BE “SERVED” IN THE “SYSTEM”: A SURVIVOR’S PERSPECTIVE Foster Uncare...... 129 Home Again...... 131 Abused Boys...... 131 Protecting Boys...... 133 Runaway to Jail: First Offense ...... 133 Today, My Son, You Are a Man...... 134 Don’t Mess With Me! ...... 135 Disciplining Boys or Breaking Their Spirits? ...... 136 Violence 101...... 137 Sentenced to the Streets...... 138 Life on the Streets ...... 138 Survival Sex: The Prostitution Solution ...... 139 On the Road...... 139 Making the Scene ...... 140 The Tolerated Sexual Abuse of Boys ...... 141 Why Are So Many Children Homeless?...... 142 Back to the Street ...... 143 Caged ...... 144 Chicago Blues ...... 145 Life in the Hole...... 145 Prisoners of Our Imagination ...... 147 Changes in the System ...... 147

CHAPTER 7: ADULT SURVIVORS OF THE CHILD SEXUAL EXPLOITATION INDUSTRY: PSYCHOLOGICAL PROFILES The Victims ...... 155 Claire ...... 155 Gloria ...... 156 Jane ...... 156 Joyce...... 157 Childhood Trauma ...... 157 Trauma Beliefs...... 158 Beliefs About Themselves: Lovability ...... 159 Beliefs About Themselves: Power...... 162 Beliefs About Others: Trust ...... 163 Coping Behaviors...... 164 Missing Life Skills ...... 166 Psychiatric Outcomes ...... 169 From Victim to Survivor of the Child Sexual Exploitation Industry . . . . 169 Survivors ...... 170 Claire ...... 170 Gloria ...... 171 Jane ...... 172 Joyce...... 172 Research...... 173 Childhood Sexual Abuse ...... 173 Child and Adult Prostitution...... 174 Where Are They Now?...... 174 Claire ...... 174 Gloria ...... 174 Jane ...... 175 Joyce...... 175 Conclusion ...... 175 xxvi Contents In Detail

CHAPTER 8: EXPERIENTIAL YOUTH PERSPECTIVES: CANADA Language and Respect ...... 179 How Did You Enter Commercial Sexual Exploitation? ...... 180 Monica...... 180 Justin...... 181 Chris...... 182 What Kept You in Commercial Sexual Exploitation?...... 184 Monica...... 184 Justin...... 185 Chris...... 186 How Did You Exit Commercial Sexual Exploitation? ...... 187 Monica...... 187 Justin...... 189 Chris...... 190 Top 20 Guidelines for Professionals Dealing With Exploited Youth . . . . 191

CHAPTER 9: UNDERSTANDING THE IMPACT OF PORNOGRAPHY ON ADULTS AND CHILDREN The Nature of Pornographic Material ...... 193 The Influence of Pornography ...... 194 Pornography as Advertising ...... 194 Sexually Oriented Businesses...... 195 Empirical Research ...... 195 Experience of Clinical Psychologists...... 196 Damage to Children ...... 197 Child Pornography ...... 198 Conclusion ...... 199

CHAPTER 10: RESOURCES OF THE EXPLOITED CHILD UNIT AT THE NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN® The Creation of the National Center for Missing & Exploited Children . . 203 The Growth of Sexual Exploitation on the Internet ...... 203 The Exploited Child Unit...... 204 The CyberTipline: The Public’s Resource for Protecting Children . . . 204 How Does the CyberTipline Work?...... 204 Child Victim Identification Project ...... 205 Child Recognition & Identification System...... 207 Child Pornography Evidence Guide ...... 207 Methods of Identification ...... 207 Exploited Child Unit Technical Assistance Services ...... 209 Law Enforcement Partnerships...... 209 Federal Bureau of Investigation ...... 210 Crimes Against Children Program ...... 210 Innocent Images National Initiative...... 211 Bureau of Immigration and Customs Enforcement ...... 211 United States Postal Inspection Service ...... 211 Internet Crimes Against Children Task Forces...... 211 Multijurisdictional Cases ...... 211 Conclusion ...... 212

CHAPTER 11: MEDICAL ANALYSIS OF CHILD PORNOGRAPHY Properly Handling of Evidence ...... 213 Eliminating the Risk of Possible Courtroom Confusion or Exclusion of Evidence ...... 213 Eliminating the Risk of Further Exploitation of the Child Victim . . . 214

xxvii Contents In Detail

Receipt of Evidence ...... 214 Receipt of Photographs and Videos ...... 214 Receipt of Computer-Based Evidence ...... 215 Purposes of Medical Analysis of Child Pornography...... 216 Assessing the Victim’s Age...... 216 Identifying the Victim ...... 217 Gaining Information About the Collector...... 217 Assessing Images Produced by the Collector for Further Investigative Evidence ...... 217 Videotape Evidence ...... 217 Inserted Pornographic Vignettes ...... 217 Unusual Angles Shown in the Video...... 218 Partial Image of a Perpetrator ...... 218 Multiple Subjects in a Video...... 218 Content of Video May Provide Information About the Seduction of Children ...... 220 Incest Shown on a Videotape ...... 220 Photographs and Published Materials as Evidence ...... 220 Written Child Pornography ...... 221 Example of Written Child Pornography ...... 221 Significance of Written Child Pornography ...... 221 Other Information Commonly Found With Written Child Pornography . 222 The Definition of Sexually Explicit Images in the United States . . . . . 222 Victim Identification Analysis ...... 222 Gender ...... 223 Ethnicity ...... 224 Clinical Indications to Help Determine a Child’s Ethnicity ...... 224 General Characteristics of European Ancestry ...... 224 General Characteristics of Hispanic Ancestry ...... 225 General Characteristics of Asian Ancestry ...... 225 General Characteristics of African Ancestry...... 225 Other Clues to Help Determine a Child’s Ethnicity...... 226 Video Titles and Internet Web Site Banners ...... 226 Stereotypical Settings of the Country of Origin ...... 226 Background Scenes ...... 226 Toddler Pornography ...... 226 Development of Maturation of Toddlers ...... 226 Sadistic Toddler Abuse ...... 228 Impact of Sadistic Abuse on Infants and Toddlers...... 228 Psychosexual Maturation ...... 228 Pornography and Child Seduction...... 229 Pornography Used to Instruct the Child ...... 230 Pornography Used to Excite the Perpetrator ...... 230 Pornography Used to Excite the Child ...... 230 Children Who Appear Drugged ...... 230 Musculoskeletal Development ...... 231 Radiographic Studies...... 231 Comparing Head Height and Total Height Ratio...... 231 Other Signs of Musculoskeletal Maturation ...... 231 Dental Maturation...... 231 Physical Sexual Maturation ...... 232 Stages of Sexual Maturation ...... 232 Stages 1 and 2...... 233 Stage 3...... 237 Stage 4...... 237 Stage 5...... 237 xxviii Contents In Detail

Using the Sexual Maturation Rating to Determine a Child’s Age . . . . 237 Delayed or Early Sexual Maturation ...... 238 Sexual Maturation Rates and Children Who Are Not From the United States...... 238 Child Erotica Images ...... 239 Conclusion ...... 240

CHAPTER 12: CHILD SEXUAL ABUSE AND THE PARAPHILIAS Pedophilia ...... 246 Pedophiles and Child Pornography ...... 247 Other Paraphilias ...... 248 Zoophilia (Bestiality)...... 248 Fetishism ...... 249 Urophilia, Coprophilia, and Klismaphilia...... 251 Sadism and Hyperdominance ...... 251 Necrophilia ...... 252 Conclusion ...... 253

CHAPTER 13: ABUSIVE IMAGES OF CHILDREN AND THE INTERNET: RESEARCH FROM THE COPINE PROJECT The Origins of COPINE...... 257 What Is Child Pornography?...... 258 How Do Images Circulate on the Internet? ...... 261 The Nature of Offending ...... 264 Abuse Images and the Offending Process ...... 265 Victims ...... 270 Conclusion ...... 273

CHAPTER 14: ETHICAL ISSUES IN SEXUAL OFFENDER ASSESSMENTS Standards and Guidelines for Sex Offender Assessments ...... 278 The Association for the Treatment of Sexual Abusers...... 279 ATSA Standards ...... 279 Measures Used in Sexual Offender Assessments...... 280 Physiological Measures of Sexual Arousal and Interest: Penile Plethysmography ...... 281 Ethical Issues in the Use of Penile Plethysmography ...... 282 Physiological Measures: Viewing Time...... 284 Ethical Issues in the Use of Viewing Time Measures ...... 284 Measurement of Dissimulation: Polygraphy ...... 286 Ethical Issues in the Use of the Polygraph ...... 286 Measurement of Psychopathy: The Hare Psychopathy Checklist . . . . 288 Ethical Issues in the Use of the Psychopathy Checklist ...... 289 Conditions Contributing to the Likelihood of Misinterpretation . . . . . 290 Conclusion ...... 291

CHAPTER 15: THE COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN IN NORTH AMERICA North America: The Paradox of Affluence and Poverty ...... 299 Commercial Sexual Exploitation of Children in the Region ...... 304 Commercial Sexual Exploitation of Children in Canada ...... 304 Profiles of the Children ...... 304

xxix Contents In Detail

Profiles of the Exploiters ...... 305 Trafficking ...... 305 National Legislation...... 306 Law Enforcement ...... 306 Prevention, Prosecution, and Protection Programs ...... 307 Child Pornography and Online Sexual Victimization ...... 307 The Private Sector ...... 308 Commercial Sexual Exploitation of Children in Mexico ...... 309 Profiles of the Children ...... 309 Profiles of the Exploiters ...... 309 Trafficking ...... 310 National Legislation...... 311 Law Enforcement ...... 311 Prevention, Prosecution, and Protection Programs ...... 311 Child Pornography and Online Sexual Victimization ...... 311 The Private Sector ...... 312 Commercial Sexual Exploitation of Children in the United States . . . 312 Profiles of Children ...... 313 Profiles of Exploiters ...... 315 Trafficking ...... 317 National Legislation...... 319 Law Enforcement ...... 319 Prevention, Prosecution, and Protection Programs ...... 319 Child Pornography and Online Sexual Victimization ...... 320 The Private Sector ...... 321 Eliminating the Commercial Sexual Exploitation of Children in North America. 321

CHAPTER 16: PSYCHOSOCIAL CONTEXT LEADING JUVENILES TO PROSTITUTION AND SEXUAL EXPLOITATION Youth Alienation and Victimization ...... 337 A Historical Perspective ...... 338 Typology of Homeless Youth Involved in Survival Sex ...... 339 Situational Runaways ...... 339 Runaways...... 339 Thrownaways ...... 340 Systems Youth ...... 340 Gender Comparisons...... 341 Health Consequences of Sexual Exploitation ...... 342 Recommendations ...... 345

CHAPTER 17: MEDICAL CARE OF THE CHILDREN OF THE NIGHT Clinical Approach ...... 350 “TEAMSTAT” Approach ...... 350 Tell Them Your Agenda...... 350 Express Concern ...... 350 Assure Normalcy of Feelings...... 351 Medical Issues ...... 351 xxx Contents In Detail

Sexual/Physical Victimization ...... 352 Drug and Alcohol Use...... 353 Psychiatric Symptoms and Diagnoses ...... 355 Safety Issues ...... 356 Family History/Support ...... 356 Runaway Tendencies ...... 356 Test and Treat Presumptively...... 356 Access Appropriate Psychological and Legal Assistance ...... 356 Timely Follow-up...... 356 Medical Emergencies ...... 356 Sexual Assault Emergencies ...... 356 Substance Abuse Emergencies ...... 358 Psychiatric Emergencies...... 358 Clinical Evaluation and Management ...... 358 Conditions Related to Sexual or Physical Victimization ...... 358 Adequate Preparation ...... 359 Familiarity With Examination Positions ...... 359 Confident, Yet Sensitive Approach to the Child ...... 360 Documentation of Injuries ...... 361 Diagnostic Testing ...... 363 Sexually Transmitted Diseases ...... 363 Pregnancy ...... 364 Substance Abuse Screening/Testing/Monitoring ...... 364 Treatment ...... 366 Follow-up ...... 366 Referrals ...... 366 Conclusion ...... 366

CHAPTER 18: THE MEDICAL IMPLICATIONS OF ANOGENITAL TRAUMA IN CHILD SEXUAL EXPLOITATION Introduction ...... 369 Normal Anatomy ...... 370 Embryonic Development ...... 370 Normal Genitalia ...... 370 Males ...... 370 Females ...... 370 Childhood Genital Trauma in General ...... 373 Straddle Injury ...... 373 Males ...... 373 Females ...... 373 Coincidental Genital Trauma ...... 374 Coincidental Genital Trauma in Pregnancy ...... 374 Nonsexual Violence and Genital Trauma ...... 374 Female Circumcision ...... 374 Gynecological Surgery and Genital Trauma ...... 377 Differential Diagnosis for Childhood Genital Trauma ...... 379 The Patient History ...... 380

xxxi Contents In Detail

The Importance of Obtaining a History ...... 380 The Interviewer ...... 382 Concluding the Interview ...... 383 The Physical Examination ...... 384 Who is the Examiner ...... 386 Where to Examine ...... 386 When to Examine ...... 386 How to Examine ...... 386 Why Examine ...... 386 Laboratory Testing ...... 387 Sexually Transmitted Disease Testing ...... 387 Deoxyribonucleic Acid Update ...... 387 Processing and Analysis ...... 387 Collection and Storage of Specimens ...... 388 Commercial Sexual Exploitation of Children ...... 388 Causes for Genital Trauma in Prostituted Children ...... 389 Genital Injury Related to the Commercial Sexual Exploitation of Children 389 Consequences of Genital Trauma ...... 390 Acute Visible Injuries ...... 390 Acute Internal Injuries ...... 390 Chronic Consequences ...... 391 Common Sexually Transmitted Diseases ...... 391 Preemptive, Preventive, and Prophylactic Therapies ...... 392 Postcoital Contraception ...... 392 Plan A ...... 392 Plan B ...... 392 Bacterial Agent Treatment ...... 392 Viral Agents ...... 392 Conclusion ...... 393

CHAPTER 19: COMMUNITY AND MENTAL HEALTH SUPPORT OF JUVENILE VICTIMS OF PROSTITUTION Healthcare Settings ...... 397 Ambulatory Care Clinics ...... 398 Emergency Care Facilities ...... 398 Mental Health Clinics ...... 398 Juvenile Detention Facilities ...... 399 Initial Assessment of Victims ...... 399 Establishing Communication and Trust ...... 399 Initial Assessment and Rapport-Building Interview ...... 401 Psychiatric Assessment ...... 406 Developmental, Behavioral, and Emotional Assessment ...... 408 Intermediate and Long-Term Community and Mental Health Support of Victims ...... 409 Clinical Treatment Sites ...... 409 Goals of Long-Term Therapy ...... 410 Special Issues for Boys ...... 412 xxxii Contents In Detail

Providing a Safe Environment...... 412 Specific Therapeutic Approaches ...... 413 Visual Cues ...... 413 Family History and Family Genograms ...... 414 Example of a Treatment Program ...... 417 Long-Term Prognosis ...... 419 Prevention ...... 420

CHAPTER 20: INTIMATE PARTNER VIOLENCE IN THE LIVES OF PROSTITUTED ADOLESCENTS Dynamics of Dating Violence ...... 423 Myths Surrounding Sexual Violence ...... 424 International Sanctioning of Prostitution ...... 424 Prostitution Recognized as Male Violence Against Women ...... 425 Pimps as Predators ...... 426 Health Consequences of Dating Violence ...... 426 Health Consequences of Prostitution ...... 428 Victims Becoming Violent ...... 428 Clinical Presentations ...... 429 Screening ...... 429 Documentation ...... 430 Photographic Documentation ...... 431 Safety Planning and Referrals ...... 431 Conclusion ...... 432

CHAPTER 21: ONLINE VICTIMIZATION: WHAT YOUTH TELL US Methods ...... 438 Participants ...... 438 Patterns of Youth Internet Use ...... 439 Overall Incidence of Online Victimization ...... 439 Sexual Solicitations and Approaches ...... 439 Unwanted Exposure to Sexual Material ...... 440 Harassment ...... 440 Sexual Solicitations and Approaches ...... 441 Youth Targets for Sexual Solicitations ...... 441 Perpetrators of Sexual Solicitations ...... 441 Solicitation Incident Characteristics ...... 444 Youth Response to Online Sexual Solicitations ...... 444 Impact of Solicitations on Youth ...... 444 Youth at Risk for Sexual Solicitation ...... 445 Are Youth Forming Risky Internet Friendships With Adults? . . . . . 446 Are Youth Being Solicited to Run Away by Potentially Predatory Adults? 447 Summary ...... 447 Unwanted Exposure to Sexual Material ...... 448 Youth With Unwanted Exposures to Sexual Material ...... 448 Exposure Incident Characteristics ...... 450 Youth Response to Unwanted Exposure to Sexual Material ...... 451

xxxiii Contents In Detail

Impact of Exposure ...... 451 Youth at Risk for Unwanted Exposure to Sexual Material ...... 451 Summary ...... 452 Harassment ...... 453 Youth Targets for Harassment ...... 453 Perpetrators of the Harassment ...... 456 Harassment Incident Characteristics ...... 456 Youth Response to Harassment ...... 456 Impact of Harassment ...... 456 Summary ...... 456 Risks and Remedies ...... 457 Parental Concern ...... 457 Use of Filtering and Blocking Software ...... 457 Knowledge of Help Sources ...... 457 Study Conclusions ...... 458 Many Youth Encounter Offensive Experiences on the Internet . . . . 458 The Offenses and Offenders Are More Diverse Than Previously Thought 458 Most Sexual Solicitations Fail, but Their Quantity Remains Alarming . . 459 Teenagers Are the Primary Vulnerable Population ...... 459 Sexually Explicit Material on the Internet is Intrusive ...... 459 Most Youth Brush Off These Offenses, but Some Become Distressed . . 459 Many Youth Do Not Tell Anyone About the Experience ...... 459 Youth and Parents Do Not Report These Experiences and Do Not Know Where to Report Them ...... 460 Internet Friendships Between Teenagers and Adults Are Common and Usually Seem to Be Benign ...... 460 Implications and Recommendations ...... 460 Create Materials Specifically Describing Diverse Hazards ...... 460 Address Both Sexual and Nonsexual Internet Victimization ...... 461 Inform the Public of Help Resources and Make Reporting of Offensive Internet Behavior Easier ...... 461 Development of Prevention and Intervention Strategies for Youth of Varying Ages ...... 462 Mobilize Youth to Help “Clean Up” Internet Behavior Standards . . . 462 Educate Health, School, and Family Counselors About the New Internet Hazards ...... 462 More Research Is Needed ...... 463 Better Understanding Is Needed Abut Families’ Ideas About and Use of Filtering and Blocking Software ...... 463 Enact Laws to Make Offensive Acts Illegal on the Internet ...... 463 Conventional Forms of Youth Victimization Need Our Continued Attention ...... 464 Conclusion ...... 464 Recommended Research Materials ...... 464 Appendix 21-1: Methodological Details ...... 465 Participation Rate ...... 466 Appendix 21-2: Definitions and Instrumentation ...... 466 Sexual Solicitation Items ...... 466 xxxiv Contents In Detail

Unwanted Exposure to Sexual Material Items ...... 467 Harassment Items ...... 467 Appendix 21-3: Limitations of the Study ...... 467

CHAPTER 22: THE USE OF THE INTERNET FOR CHILD SEXUAL EXPLOITATION Why Do Individuals Use the Internet for Sexually Deviant and Illegal Purposes? ...... 469 Accessibility ...... 470 Affordability ...... 470 Anonymity ...... 470 Components of the Internet Used for Sexually Deviant and Illegal Activity ...... 471 Newsgroups ...... 472 E-mail ...... 472 Web Sites ...... 472 Chat Rooms ...... 473 Sexually Deviant and Illegal Internet Usage ...... 474 Child Pornography ...... 474 Locating Children to Molest ...... 476 Communication With Other Child Sex Offenders ...... 477 The Internet Role in the Etiology of Child Sexual Abuse ...... 479 Cognitive Distortions ...... 479 Recommendations for Evaluating and Treating Internet-Related Sex Offenders ...... 482 Conclusion ...... 483

INDEX ...... 489

VOLUME TWO

CHAPTER 23: ACQUAINTANCE CHILD MOLESTERS: A BEHAVIORAL ANALYSIS Introduction ...... 529 Caution ...... 529 Overview ...... 530 “Stranger Danger” ...... 531 Intrafamilial Child Sexual Abuse ...... 531 Acquaintance Child Molestation ...... 532 Definitions ...... 535 Need ...... 535 Defining the Terms Used ...... 536 “Sexual Victimization of Children” ...... 536 “Sexual Exploitation of Children” ...... 536 “Investigator” ...... 537 “Sexual Activity” ...... 537 “Child” ...... 538 “Parapilia” ...... 539 “MO” and “Ritual” ...... 539

xxxv Contents In Detail

“Child Molester” ...... 540 “Pedophile” ...... 541 Offender Typology ...... 542 Child Molester Versus Pedophile ...... 542 Typology of Sex Offenders ...... 544 Situational-Type Child Molesters ...... 547 Preferential-Type Child Molesters ...... 547 Who Cares? ...... 548 Profiling? ...... 550 Summary of Typologies ...... 551 Potential Problem Areas ...... 551 Combination Offenders ...... 551 Nuisance Sex Offenders ...... 552 Importance ...... 552 Evaluation ...... 553 Multiple Offenders ...... 554 Incest Cases ...... 554 Female Offenders ...... 555 Adolescent Offenders ...... 555 Acquaintance-Exploitation Cases ...... 556 Overview ...... 556 Dynamics of Cases ...... 556 “Experts” ...... 557 Risk to Other Children ...... 557 Role of Parents ...... 557 Disclosure Continuum Status ...... 557 Multiple Victims ...... 558 Multiple Offenders ...... 558 Gender of the Victim ...... 558 Sexual Exploitation Versus Sexual Abuse Cases ...... 558 Types of Multiple-Victim Cases ...... 558 “Historical” Multiple-Victim Cases ...... 559 Age of Consent ...... 560 Offender Strategies ...... 562 Control ...... 562 The Seduction Process ...... 563 Operation of Cases Involving Multiple Child Victims ...... 565 Offender-Victim Bond ...... 566 High-Risk Situations ...... 566 Summary ...... 567 Conclusion ...... 568 Investigating Acquaintance Sexual Exploitation ...... 568 The Investigative Perspective ...... 569 Emotion Versus Reason ...... 570 The “Big-Picture” Approach ...... 571 Interview ...... 571 Assess and Evaluate ...... 575 “Children Never Lie”...... 575 “If They Have the Details, It Must Have Happened” ...... 576 Areas of Evaluation ...... 578 xxxvi Contents In Detail

Contagion ...... 580 Summary of Evaluation and Assessment ...... 581 Corroborate ...... 581 Document Behavioral Symptoms of Sexual Victimization . . . . . 582 Document Patterns of Behavior ...... 582 Identify Adult Witnesses and Suspects ...... 584 Medical Evidence ...... 584 Other Victims ...... 584 Search Warrants ...... 585 Physical Evidence ...... 585 Child Pornography and Child Erotica ...... 586 Computers ...... 586 Consensual Monitoring ...... 586 Subject Confessions ...... 587 Surveillance ...... 587 Investigating Multiple-Victim Cases ...... 588 Understanding the Seduction Process ...... 588 Understanding the Preferential Molester ...... 590 Proactive Approach ...... 591 Establish Communication With Parents ...... 592

CHAPTER 24: THE WORK OF THE UNITED STATES POSTAL INSPECTION SERVICE: COMBATING CHILD SEXUAL EXPLOITATION The United States Postal Inspection Service ...... 595 Early Enforcement Efforts: Obscenity Investigations ...... 595 Protecting Children From Sexual Exploitation: A National Priority . . . . . 596 Child Exploitation Program Overview ...... 598 Operation Avalanche ...... 599 Operation Lost Innocence ...... 601 Conclusion ...... 602

CHAPTER 25: THE ROLE OF THE FIRST RESPONDER IN THE CRIMINAL INVESTIGATIVE PROCESS Preliminary Investigation by First Responders ...... 603 The Investigator ...... 605 The Interview Process ...... 606 When Investigations Fail ...... 608 Conclusion ...... 608

CHAPTER 26: INVESTIGATING INTERNET CHILD EXPLOITATION CASES A New Area to Patrol ...... 611 Identifying Suspects and Potential Crime Areas on the Internet . . . . 611 Prosecution of Suspects ...... 611 Investigation Task Forces ...... 612 Role of the Investigator ...... 613 Internet Basics ...... 613 Trader and Traveler Cases ...... 613 Locating Evidence ...... 613 World Wide Web ...... 616

xxxvii Contents In Detail

Hypertext Transfer Protocol ...... 617 Problems Investigators Confront ...... 617 Information Helpful to Investigators ...... 617 Internet Relay Chat ...... 618 Electronic Mail ...... 619 Usenet Newsgroups ...... 620 File Transfer Protocol ...... 621 Web-Based Chat ...... 622 Messengers ...... 622 Peer-to-Peer Networks ...... 623 Other Future Threats ...... 623 Online Service Providers ...... 624 Internet Protocol Address “Tracing” ...... 624 The Importance of Time ...... 625 Other Technical Challenges ...... 625 Victim Identification ...... 626 The Undercover Technique ...... 628 Other Internet Crime Concerns ...... 628 Typical Internet Child Exploitation Cases ...... 629 Conclusion ...... 630 Appendix 26-1: Glossary of Internet-Related Terms ...... 630

CHAPTER 27: PROSECUTORIAL ISSUES IN THE CHILD PORNOGRAPHY ARENA Search and Seizure Issues ...... 635 Search Warrants ...... 636 Background Information ...... 636 Probable Cause ...... 636 Drafting the Warrant ...... 637 Expert Opinion ...... 638 Additional Considerations in Description of Items to Be Seized . . . 639 Particularity ...... 639 Overbreadth ...... 641 Anticipatory Warrants ...... 641 Good Faith ...... 642 Staleness ...... 642 Exceptions to the Warrant Requirement ...... 643 Plain View Exemption ...... 643 Consent Exception ...... 644 Exigent Circumstances Exception ...... 645 Private Searches ...... 645 Probation and Parole Searches ...... 646 Charging and Pretrial Considerations ...... 646 Defining Child Pornography ...... 646 Proving Scienter ...... 648 Statutes of Limitation ...... 649 Jurisdiction ...... 649 Number of Counts and Images to Charge ...... 650 Additional and/or Alternative Charges ...... 650 xxxviii Contents In Detail

Victim Issues ...... 651 Discovery: Whether to Give Child Pornography to the Defense . . . . 651 Jury Selection ...... 654 The Underlying Crime ...... 654 Computers and Computer Evidence ...... 655 Government Regulation of the Internet ...... 655 Diffusing Potential Defenses ...... 655 Meeting Untrue Defenses ...... 657 Mistaken Identity ...... 657 Investigate Techniques to Prove Identity ...... 657 Forensic Examination ...... 658 Defeating Hacker/Intrusion Defenses ...... 658 Providing the Image Depicts a “Real” Child After Ashcroft v Free Speech . 659 Testimony of the Child or Someone Who Knows the Child . . . . 659 Child Pornography Historian ...... 661 Computer Graphics Expert ...... 661 Proving Age ...... 661 Proving Minority Through Computer Forensics ...... 662 Proving Age Through Expert Testimony ...... 662 Proving Age Through Lay Opinion ...... 663 Proving Age Through the Defendant ...... 664 Age as a Question for the Trier of Fact to Decide ...... 664 The Mistake-of-Age Defense for Producers of Child Pornography . . 664 Lack of Intent ...... 665 Entrapment ...... 665 Internet Addiction ...... 668 Accident ...... 668 “Deleted” Computer Images ...... 669 “Mere Viewing” ...... 669 First Amendment ...... 670 Social Worker Claimed He Was Researching the Internet for Therapeutic Material ...... 670 Journalist Claimed He Was Researching an Article on Child Pornography...... 670 “Author” Claimed He Was Researching a Book on Child Abuse . . 671 Conclusion ...... 671 Appendix 27-1: Legislation Extending or Removing the Statutes of Limitation for Offenses Against Children ...... 676 State Legislation ...... 676 Alabama ...... 676 Alaska ...... 676 Arkansas ...... 677 Colorado ...... 677 Connecticut ...... 678 Delaware ...... 678 Florida ...... 678 Georgia ...... 678 Hawaii ...... 679 Idaho ...... 679

xxxix Contents In Detail

Illinois ...... 679 Indiana ...... 680 Iowa ...... 680 Kansas ...... 680 Louisiana ...... 681 Maine ...... 681 Massachusetts ...... 681 Michigan ...... 682 Minnesota ...... 682 Mississippi ...... 682 Missouri ...... 682 Montana ...... 682 Nebraska ...... 683 Nevada ...... 683 New Hampshire ...... 683 New Jersey ...... 683 New Mexico ...... 684 New York ...... 684 North Dakota ...... 684 Oklahoma ...... 684 Oregon ...... 685 Pennsylvania ...... 685 Rhode Island ...... 686 South Dakota ...... 686 Tennessee ...... 686 Texas ...... 686 Utah ...... 686 Vermont ...... 686 Washington ...... 687 Wisconsin ...... 687 Federal Legislation ...... 687 18 USCA § 3509(k) ...... 687 18 USCA § 3283 ...... 687 Appendix 27-2: Sample Indictments ...... 688 Indictment 1 ...... 688 Indictment 2 ...... 690 Appendix 27-3: Voir Dire in Computer-Facilitated Crimes Against Children 692 Simple Questions ...... 692 Comfort Level with Computers ...... 692 Computer Forensic Examiner/Expert Testimony/Computer Evidence 693 Government Regulation of the Internet ...... 694 Bias Regarding “Sting” Tactics ...... 694 Attempt and Factual Impossibility ...... 694 Children on the Internet ...... 695 Problematic Victims ...... 695 Attitudes Toward Adult Pornography ...... 697 Attitudes Toward Child Pornography ...... 697 Virtual Child Pornography ...... 698 Fantasy/Good Samaritan/Cyber Vigilante/First Amendment Defenses 698 Accident ...... 698 xl Contents In Detail

Sample Format of State’s Requested Voir Dire Questions ...... 699 CHAPTER 28: CHILDHOOD VICTIMIZATION AND THE DERAILMENT OF GIRLS AND WOMEN TO THE CRIMINAL JUSTICE SYSTEM Questions About Criminal Behavior Among Abused and Neglected Girls and Women ...... 704 Is Criminal Behavior Among Abused and Neglected Girls and Women Rare? ...... 704 Is Criminal Behavior Among Abused and Neglected Girls and Women Predominantly Sexual? ...... 704 Do Abused-Status and Neglected-Status Offenders Escalate to Criminal Offenses? ...... 705 Do Abused and Neglected Girls Develop Antisocial and/or Delinquent Lifestyles That Persist Into Adulthood, and Do They Become Chronic, Persistent Offenders With Serious Criminal Careers? ...... 705 Potential Mechanisms in the Derailment of Abused and Neglected Girls and Women ...... 705 Running Away ...... 705 Deficits in IQ or Cognitive Ability ...... 706 Lack of Traditional Social Controls ...... 706 Relationships With Deviant and/or Delinquent Friends and/or Relatives 707 Failure to Learn the Social and Psychological Skills Necessary for Successful Adult Development ...... 707 Conclusion ...... 707

CHAPTER 29: JUVENILE COURTS AND SEXUAL EXPLOITATION: A JUDGE’S OBSERVATIONS The History of Juvenile Courts ...... 711 The Modern Juvenile Court ...... 712 Juvenile Prostitution ...... 712 Juvenile Prostitution Cases ...... 713 Conclusion ...... 714

CHAPTER 30: AN INVESTIGATION OF VICTIM AND OFFENDER DYNAMICS IN PROSTITUTES AND INCARCERATED PEDOPHILES Primary Victim Impact ...... 715 Background Information ...... 717 Consequences ...... 718 Incarcerated Pedophiles ...... 719 Men Who Molest Boys ...... 719 Definitions ...... 719 Male-Target and Female-Target Pedophiles ...... 720 The Pedophile Population ...... 721 Research Methods ...... 722 Findings ...... 724 Age and Race ...... 724 Criminal Convictions and History ...... 724 Offender Childhood and Background ...... 724 Childhood Sexual Abuse ...... 725 Marriage and Adult Relationships ...... 726 Education, Employment, and Volunteer Affiliations ...... 726 First Experiences as a Perpetrator ...... 727

xli Contents In Detail

Victim Preferences ...... 727 Victim Grooming and Seduction ...... 728 Miscellaneous Findings ...... 729 Conclusion ...... 731

CHAPTER 31: HUMAN TRAFFICKING FOR SEXUAL EXPLOITATION: THE ROLE OF INTERPOL Human Trafficking ...... 735 Interpol Structure and Administration ...... 736 National Central Bureaus ...... 736 Interpol Tools for the Protection of Children ...... 737 Individual Notices ...... 737 International Yellow Notices and the Interpol Poster on Missing Children 738 International Green Notices ...... 738 Computer Systems ...... 738 Data Entry, Electronic Archiving, and Automatic Consultation . . . . 739 Interpol Achievements and Cooperation Among Agencies ...... 739 Influence of Interpol in the International Community ...... 742 Republic of Macedonia ...... 742 International Human Trafficking and Smuggling ...... 742 Conclusion ...... 744

CHAPTER 32: INVESTIGATION AND PROSECUTION OF THE PROSTITUTION OF CHILDREN Introduction ...... 745 The Crimes ...... 745 Prostitution of Children ...... 745 Laws and Penalties ...... 745 Reasons Children Become Victims of Prostitution ...... 747 Infantilization of Prostitution ...... 747 Enforcement of the Laws ...... 748 Trafficking in Children ...... 748 Child Sex Tourism ...... 749 The Investigation ...... 749 The Trial ...... 751 Charging and Pretrial Decisions ...... 751 Jury Selection ...... 752 Prostitution Is a Victimless Crime ...... 753 Children Freely Choose Prostitution ...... 754 Prostitution Can Be an Exciting and Glamorous Life ...... 754 Prostitution Is a Deterrent to Sex Crimes ...... 754 Opening Statement ...... 755 Case in Chief ...... 755 Victim Testimony ...... 755 Law Enforcement Testimony ...... 756 Additional Expert Testimony ...... 756 Meeting Untrue Defenses ...... 757 Closing ...... 758 Sentencing ...... 759 Victim Assistance ...... 759 xlii Contents In Detail

Conclusion ...... 760 Appendix 32-1: Crimes Involving the Prostitution of Children . . . . . 763 State Legislation ...... 763 Alabama ...... 763 Alaska ...... 764 Arizona ...... 764 Arkansas ...... 765 California ...... 765 Colorado ...... 766 Connecticut ...... 767 Delaware ...... 768 District of Columbia ...... 769 Florida ...... 769 Georgia ...... 769 Hawaii ...... 769 Idaho ...... 770 Illinois ...... 770 Indiana ...... 772 Iowa ...... 772 Kansas ...... 772 Kentucky ...... 773 Louisiana ...... 773 Maine ...... 773 Maryland ...... 774 Massachusetts ...... 774 Michigan ...... 775 Minnesota ...... 775 Mississippi ...... 776 Missouri ...... 776 Montana ...... 777 Nebraska ...... 777 Nevada ...... 777 New Hampshire ...... 779 New Jersey ...... 779 New Mexico ...... 779 New York ...... 780 North Carolina ...... 781 North Dakota ...... 781 Ohio ...... 782 Oklahoma ...... 782 Oregon ...... 783 Pennsylvania ...... 784 Rhode Island ...... 784 South Carolina ...... 784 South Dakota ...... 785 Tennessee ...... 785 Texas ...... 785 Utah ...... 785 Virginia ...... 785 Washington ...... 786

xliii Contents In Detail

West Virginia ...... 786 Wisconsin ...... 787 Wyoming ...... 788 Federal Legislation ...... 788 18 USCA§ 2423. Transportation of Minors ...... 788

CHAPTER 33: INTERNET PEDOPHILIA Introduction ...... 789 Historical Perspective ...... 789 Law Enforcement Difficulties ...... 789 Images and the Internet...... 792 Victim Identification by Image Analysis ...... 794 Victim Identification Process ...... 794 Investigations ...... 795 Conclusion ...... 797

CHAPTER 34: THE MEDICAL EXPERT AND CHILD SEXUAL EXPLOITATION Expert Witness Role in Comorbid Forms of Child Abuse ...... 802 The Qualification Examination ...... 806 The Medical Diagnosis of a Child Sexual Abuse Argument ...... 806 ICD-9-CM Determination ...... 806 DSM-IV-TR Criteria Determination ...... 809 Practices Guidelines From National Organizations ...... 810 Types of Medical Expert Testimony ...... 810 Substantive Testimony ...... 811 Rehabilitative Testimony ...... 812 Types of Expert Witnesses ...... 813 Background Witness ...... 813 Case Witness ...... 813 Evaluating Witness ...... 814 Testimony in Child Sexual Abuse ...... 814 Element I: The Medical History ...... 814 Element II: Behavior ...... 821 Element III: Physical Examination ...... 825 Victim Impact Testimony ...... 828 Testimony in Internet Child Pornography Analysis ...... 829 Summary Opinion in Child Sexual Exploitation ...... 830

CHAPTER 35: COMPUTER FORENSIC SOFTWARE AND ITS LEGAL VALIDATION Authentication of Recovered Data for Accuracy ...... 835 Authentication of Computer Evidence ...... 835 Authentication of the Recovery Process ...... 837 Authentication of the EnCase Recovery Process ...... 839 Challenges to Foundation Must Have Foundation ...... 839 Validation of Computer Forensic Tools ...... 840 Daubert/Frye Standard ...... 840 Computer Forensics as an Automated Process ...... 842 Commercial Versus Custom Forensic Software and Authentication Issues. 844 xliv Contents In Detail

Expert Witness Testimony ...... 845 Threshold Under Rule 702 ...... 845 Illustrations of Testimony ...... 846 Direct Examination: Pretrial Evidentiary Hearing ...... 846 Direct Examination for the Presentation of Computer Evidence . . 851 The Best Evidence Rule ...... 856 “Original” Electronic Evidence ...... 857 Presenting Electronic Evidence at Trial ...... 858 United States v Naparst ...... 859 Legal Analysis of the Evidence File ...... 859 Evidence File Format ...... 860 CRC and MD5 Hash Value Storage and Case Information Header . . . 861 Chain-of-Custody Documentation ...... 862 Challenges to EnCase and Other Litigated Issues ...... 862 State (Ohio) v Cook ...... 862 Taylor v State ...... 863 Matthew Dickey v Steris Corporation ...... 863 United States v Habershaw ...... 864 Appendix 35-1: Expert Report Submitted to the Court in United States v Habershaw, 2001WL 1867803 ...... 867

CHAPTER 36: INTERNET TRAVELERS Evolution of the Traveler Phenomenon ...... 873 The Internet as a Hunting Ground ...... 873 Children: Vulnerable Internet Targets ...... 874 Internet Sex Crime Studies ...... 875 Internet Sex Crimes Against Minors: The Response of Law Enforcement 875 Arrest Statistics ...... 875 Internet Sex Crimes Versus Conventional Sex Crimes ...... 876 Offender Profile ...... 876 Online Victimization: A Report on the Nation’s Youth ...... 876 Traveler Variations ...... 877 Local Travelers ...... 877 Interstate and Intrastate Travelers ...... 877 Global Travelers ...... 878 Victim Travelers ...... 878 Traveler No-Shows ...... 878 Sting Operations ...... 878 Addressing the Problem: Law Enforcement ...... 878 Law Enforcement Struggles ...... 878 Undercover Operations ...... 879 The Sting ...... 879 Interstate Operations ...... 880 Addressing the Problem: The Federal Government ...... 880 The PROTECT Act ...... 880 White House Attention ...... 880 Internet Crimes Against Children Task Forces ...... 881 Statistics ...... 881 Federal Partners ...... 882 National Center for Missing & Exploited Children ...... 882

xlv Contents In Detail

Background ...... 882 Web Site Success ...... 882 The CyberTipline ...... 882 National and International Cooperation ...... 884 Legal Issues ...... 884 Jurisdiction ...... 884 Theoretical Issues ...... 884 State Law ...... 884 Federal Law ...... 885 Travelers and the Courts ...... 886 Impossibility Defense ...... 886 Outrageous Government Conduct and Manufactured Jurisdiction Defense ...... 887 Entrapment Defense ...... 888 Constitutional Attack Defense ...... 889 Fantasy Defense ...... 890 Conclusion ...... 891

CHAPTER 37: ESTABLISHING CRIMINAL CONSPIRACY AND AIDER AND ABETTOR LIABILITY FOR GROUPS THAT PROMOTE SEXUAL EXPLOITATION OF CHILDREN Introduction ...... 895 Language That Creates Conspiracies or Aids and Abets Crimes of Child Sexual Exploitation Is Not Protected Under the First Amendment ...... 897 Images of Child Pornography and Speech Inciting Criminal Activity Are Not Afforded First Amendment Protection ...... 900 Pornographic Images of Children Are Not Protected by the First Amendment ...... 900 Compelling State Interest ...... 900 Narrow Construction and Child Pornography ...... 903 The First Amendment Does Not Offer Protection to Speech Used by Groups That Promote and Distribute Child Sexual Exploitation . . . . 904 A Conspiracy Is Established When One Party Advocates or Provides Instruction or Opportunity to the Coconspirators ...... 910 The Agreement ...... 912 The Illegal Act Agreed Upon ...... 913 The Overt Act to Further the Illegal Act ...... 915 The Possibility of Withdrawal ...... 919 Criminal Liability as an Aider and Abettor ...... 919 Conclusion ...... 922

CHAPTER 38: THE HIDDEN TRUTH OF INVOLUNTARY SERVITUDE AND SLAVERY The Crime Scene ...... 928 Background: The Story Behind a Gruesome Discovery ...... 929 Investigating the Crime ...... 931 The Wisdom of a Team Approach ...... 931 The First Breaks ...... 933 Hiccups ...... 934 The End Result: Sheer Determination and a Lot of Luck ...... 935 xlvi Contents In Detail

How to Determine Whether Your Case is a Trafficking Case ...... 935 The Importance of Identifying the Crime ...... 935 Legal Parameters: Victimhood Defined ...... 937 Spotting a Victim ...... 938 How to Obtain Help ...... 940 Lessons Learned: Investigative “Best Practices” ...... 941 Conclusion ...... 944

CHAPTER 39: KEEPING THE FAITH: A CALL FOR COLLABORATION BETWEEN THE FAITH AND CHILD PROTECTION COMMUNITIES The Conflict ...... 947 The Cost ...... 952 Crossing the Bridge That Divides ...... 953 Conclusion ...... 955 Appendix 39-1: Teaching the Faith-Based Community to Teach Themselves and Their Children Personal Safety ...... 958 Appendix 39-2: Making Congregations Safe for Child Abuse Victims . . . 961 Appendix 39-3: Seven Suggestions to Make Congregations Safe for Victims of Domestic Violence ...... 963

CHAPTER 40: EXITING ROUTE: A PEER SUPPORT MODEL FOR EXITING AND HEALING PROGRAMS Understanding Commercial Sexual Exploitation of Children ...... 966 Barriers and Challenges to Exiting ...... 966 Successful Exiting and Healing ...... 969 Exiting Route Model ...... 970 Stages of an Exiting and Healing Group Life Cycle for Sexually Exploited Youth ...... 973 Inclusion ...... 973 Conflict ...... 974 Resolution ...... 975 Production ...... 975 Termination ...... 975 More Insight ...... 976 Principles of Good Practice ...... 976 Conclusion ...... 978

CHAPTER 41: THE AMBER ALERT PROGRAM: MISSING CHILDREN BEFORE AND AFTER Children Whose Lives Begged for a Better Response ...... 980 Etan Patz ...... 980 The Atlanta Murders ...... 980 Adam Walsh ...... 982 Jacob Wetterling ...... 983 Polly Klass ...... 983 Megan Nicole Kanka ...... 983 Jimmy Rice ...... 983 Amber Hagerman ...... 984 The AMBERAlert ...... 985 An Overview ...... 985 The Notification Process ...... 985

xlvii Contents In Detail

Role of the National AMBER Alert Coordinator ...... 985 Abduction of Infants and the AMBERAlert ...... 986 Abduction of Teenagers and the AMBER Alert ...... 986 An AMBER Alert Success Story ...... 987 Strategy for AMBER Coordination ...... 987 Assessment of Current AMBER Activity ...... 987 Creation of a Coordinated AMBER Network ...... 988 Communication of “Lessons Learned”...... 988 Child Lures Prevention ...... 988 Attempted Nonfamily Abductions ...... 989 National Incidence Study of Missing, Abducted, Runaway, and Thrownaway Children ...... 989 National Incidence Study of Missing, Abducted, Runaway, and Thrownaway Children-2 ...... 990 Conclusion ...... 991

CHAPTER 42: THE IMPACT OF NEWS COVERAGE: HOW THE MEDIA CAN HELP Understanding Journalists ...... 994 Journalism Values ...... 995 The Impact of News ...... 996 Coverage That Works ...... 998 Working With the News for the Sake of Exploited Kids ...... 1003 Improving Attitudes About Journalists ...... 1003 Getting News Attention ...... 1004 When a Reporter Calls ...... 1005 Helping Victims Who Go Public ...... 1006 Conclusion ...... 1006

CHAPTER 43: WORKING WITH THE TOURISM INDUSTRY TO PREVENT CHILD SEXUAL EXPLOITATION: AN INDIVIDUAL PERSPECTIVE Concern Raised for Exploitation of Children Through Sex Tourism . . . 1010 Increase in Numbers of Children Involved in Prostitution in Southeast Asia ...... 1010 Minimization of Actual Denial of the Existence of Child Prostitution . 1010 Formation of the End Child Prostitution in Asian Tourism Campaign . 1011 Creating a Global Network ...... 1011 A Multidisciplinary Approach ...... 1012 Travel and Tourism Industry Education and Actions ...... 1013 Tourism Campaigns in Sending Countries ...... 1013 Tourism Campaigns in Destination Countries ...... 1014 Other Tourism Incentives ...... 1014 Child Wise Tourism ...... 1014 The Code of Conduct for the Protection of Children From Sexual Exploitation in Travel and Tourism ...... 1015 The Youth Career Initiative ...... 1016 Conclusion ...... 1017

CHAPTER 44: INTERNET HOTLINES AND THE HISTORY OF INHOPE: THE ASSOCIATION OF INTERNET HOTLINE PROVIDERS xlviii Contents In Detail

What is an INHOPE Hotline? ...... 1019 Historical Background ...... 1019 How Do INHOPE Hotlines Operate? ...... 1020 INHOPE Activities ...... 1022 Working Groups ...... 1022 Best Practice Papers ...... 1022 Interactions With Law Enforcement Officials ...... 1022 Report-Receiving Mechanisms ...... 1023 Expertise ...... 1023 Acceleration ...... 1023 Contacts ...... 1023 Trends ...... 1023 Workload of the Member Hotlines ...... 1024 Statistics Reference Period ...... 1024 Analysis of Trends ...... 1024 Success Stories ...... 1025 Operation Marcy ...... 1025 Operation Hamlet ...... 1025 Spain ...... 1025

CHAPTER 45: SHADOW CHILDREN: ADDRESSING THE COMMERCIAL EXPLOITATION OF CHILDREN IN RURAL AMERICA Introduction ...... 1027 A Harsh Existence: Who Are the Commercially Exploited Children? . . . 1028 Survival Sex ...... 1028 The Horrors of Child Prostitution: Broken Lives ...... 1030 Histories of Commercially Exploited Children: Faces Behind the Label . . 1031 Current Approach by Law Enforcement Agencies and the Need for Social Service Resources ...... 1032 The Supply of Commercially Exploited Children in Small Towns and Communities ...... 1032 Cutting Off the Supply of Commercially Exploited Children From Small or Rural Communities ...... 1033 Use of Community Policing Practices ...... 1033 Use of a Community Network to Identify Children at Risk . . . . . 1033 Education of Children About the Dangers of the Street ...... 1034 Education of Parents to Keep Their Children Safe ...... 1034 Close Monitoring of Local Strip Clubs ...... 1034 Development of a Network of State and National Contacts . . . . . 1035 Addressing Child Abuse at the Earliest Ages ...... 1035 Development of Forensic Interviewing Skills for Children of All Ages . 1035 Development of Investigative Abilities for Child Sexual Exploitation . . 1036 Closely Working With Social Sciences ...... 1036 Public Advocation for Commercially Exploited Children in an Effort to Acquire the Necessary Resources to Address This Social Ill . . . . . 1037 Conclusion ...... 1037

CHAPTER 46: RECOMMENDATIONS FOR ACTION FOR DEALING EFFECTIVELY WITH CHILD SEXUAL EXPLOITATION Recommendations ...... 1041

xlix Table of Contents

Protect the Children ...... 1041 Protect the Children: The Role of the Family ...... 1041 Protect the Children: The Contribution of Teachers, Clinicians, and Other Adults Who Come in Direct Contact With Children ...... 1042 Protect the Children: Promote Community Involvement in Education and Advocacy ...... 1042 Protect the Children: The Role of the Government ...... 1043 Target Adult Sexual Exploiters of Children, Not the Children, for Punishment ...... 1043 Increase the Penalties Associated With Sexual Crimes Against Children . 1044 Fully Enforce and Strengthen Existing National and State Laws Relating to Child Sexual Exploitation ...... 1044 Establish a National Child Sexual Exploitation Intelligence Center . . 1045 Expand Federally Funded Multijurisdictional Task Forces on Child Sexual Exploitation Into All Major Federal and State Jurisdictions . . . . . 1046 Expand Federally Funded Internet Crimes Against Children Task Force Programs Into All Major Federal and State Jurisdictions ...... 1046 Promote Effective Public-Private Partnerships for Combating Child Sexual Exploitation ...... 1047 Enlarge the National Pool of Child Sexual Exploitation Experts and Specialists ...... 1047 Undertake More Specialized Studies of Perpetrators and Victims of Child Sexual Exploitation ...... 1048 Conclusion ...... 1049

INDEX ...... 1050

l Medical, Legal, & Social Science Aspects of Child Sexual Exploitation A Comprehensive Review of Pornography, Prostitution, and Internet Crimes

G.W. Medical Publishing, Inc. St. Louis

li 23 Chapter

ACQUAINTANCE CHILD MOLESTERS: A BEHAVIORAL ANALYSIS* Kenneth V. Lanning, MS, Former Supervisory Special Agent, Federal Bureau of Investigation

INTRODUCTION CAUTION The sexual victimization of children involves varied and diverse dynamics. It can range from one-on-one intrafamilial abuse to multioffender/multivictim extrafamilial sex rings and from stranger abduction of toddlers to prostitution of teenagers. This chapter will focus primarily on sexual exploitation of children perpetrated by “ac- quaintance molesters.” This term and related terms will be defined, and insight will be provided into the behavioral patterns of offenders and victims in such cases. The term compliant will sometimes be used to describe those children who cooperate in or “consent” to their sexual victimization. Because children can not legally consent to having sex with adults, this compliance does not in any way alter the fact that they are victims of serious crimes. The reasons for and the complexity and investigative significance of this compliance will be discussed. The goal of this chapter is to describe, in plain language, the behavioral dynamics of these cases. Because of the complexity of human behavior, these dynamics will often be described on a continuum rather than as either/or categories. It is not in- tended to be a detailed, step-by-step investigative manual, nor does it offer rigid standards for forensic intervention. The material presented here may not be appli- cable to every case or circumstance. Although the intervention techniques discussed may be used in other cases of sexual victimization of children, they are intended to be applied primarily to cases involving the sexual molestation of children by adult ac- quaintances. Many real-world constraints, including lack of time and personnel, make following all the techniques discussed here impossible. In the interest of readability, children alleging sexual abuse or who are suspected of being sexually exploited will sometimes be referred to as “victims,” even though their victimization may not have been proven in a court of law. This shorthand should not blur the fact that forensic interveners are expected to keep an open mind and maintain objectivity. Although females can and do molest children, offenders will generally be referred to by the pronoun “he.” The information in this chapter and its application are based on my education, training, and more than 30 years of experience studying the criminal aspects of deviant sexual behavior and interacting with investigators, prosecutors, and other forensic interveners. Although I understand that data are not the plural of anecdote, the information and opinions in this chapter are based primarily on the totality of my

* Adapted from the National Center for Missing & Exploited Children. Lanning KV. Child Molesters: A Behavioral Analysis. 4th ed. Alexandria, Va: NCMEC: 2001.

529 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

acquired knowledge and expertise. My database is the thousands of cases on which I have consulted or studied. Its validity is the fact that its application has worked for all these many years. I have great confidence in its behavioral accuracy and reliability. Much of this chapter will set forth its application to criminal investigation. I believe that it can be adapted to varying degrees to forensic fact-finding by many disciplines. Forensic interveners based on departmental policy, rules of evidence, and current case law, however, must carefully evaluate its legal acceptance and application. This chap- ter is intended to be a practical behavioral analysis with application primarily to the objective, neutral fact-finding process. It is not intended to be a precise legal analysis with technical legal definitions. In addition, the use of terms also used in mental health (eg, impulsive, compulsive, pedophilia) is not meant to imply a psychiatric diagnosis or lack of legal responsibility. OVERVIEW In order to understand and intervene in allegations of what constitutes “acquain- tance” molestation, it is important to have an historical perspective of society’s general attitudes about sexual victimization of children. A brief synopsis of these attitudes in the United States is provided here in order to give a context to this discussion. That context, hopefully, will help investigators better understand some of the problems and investigative difficulties encountered in these cases. In the United States, society’s historical attitude about sexual victimization of children can generally be summed up in one word: denial. Most people do not want to hear about it and would prefer to pretend that such victimization just does not occur. Today, however, it is difficult to pretend that it does not happen. Stories and reports about child sexual abuse and exploitation are daily occurrences. Investigators dealing with sexual victimization of children must recognize and learn to address this denial. They must try to overcome it and encourage society to address, report, and prevent the sexual victimization of children. A complex problem such as the sexual victimization of children can be viewed from 3 major perspectives: personal, political, and professional. The personal perspective encompasses the emotional: how the issues affect individual needs and wants. The political perspective encompasses the practical: how the issues affect getting elected, obtaining funding or pay, and attaining status and power. The professional per- spective encompasses the rational and objective: how the issues affect sexually victimized children and what is in their best interest. Often these perspectives over- lap or are applied in combination. Because most of us use all 3, sometimes which perspective is in control may not be clear. The personal and political perspectives tend to dominate emotional issues such as the sexual victimization of children. The personal and political perspectives are real and will never go away. In fact, many positive things can and have been achieved through them, eg, attention, adequate funding, equipment, manpower. In general, however, sexually victimized children need more people addressing their needs from the professional perspective and fewer from the personal and political perspectives. In their zeal to overcome denial or influence opinion, some individuals allow the personal or political perspectives to dominate by exaggerating or misrepresenting the problem. Presentations and literature with poorly documented or misleading claims about 1 in 3 children being sexually molested, the multibillion-dollar child pornography industry, organized child slavery rings, and 50 000 stranger-abducted children are still common. The documented facts in the United States are bad enough and need no embellishment. True professionals, when communicating about the problem, should clearly define their terms and then consistently use those definitions unless indicating otherwise. Professionals should understand and cite reputable and scientific studies, and note the sources of information. Operational definitions for terms (eg, child, pedophile, sexual exploitation) used in cited research should be clearly expressed and not mixed to distort the findings. Once someone is

530 24 Chapter

THE WORK OF THE UNITED STATES POSTAL INSPECTION SERVICE: COMBATING CHILD SEXUAL EXPLOITATION Raymond C. Smith

The sexual exploitation of children spans all social and economic classes, and the per- petrators have no regard for the enduring grief and trauma they bring to their vic- tims. Every child is a potential victim. The dangers of child sexual exploitation should never be minimized. This most despicable of crimes—a crime against a child—results in physical and emotional suffering, ruined lives, and shattered dreams. Through public awareness, vigorous investigation, certain prosecution, and just sentencing, the incidence of this horrible crime can be reduced. Members of society have an obliga- tion to help protect children and their families. THE UNITED STATES POSTAL INSPECTION SERVICE As one of America’s oldest federal law enforcement agencies, the US Postal Inspection Service (USPIS), founded by Benjamin Franklin, has a long, proud, and successful history of fighting criminals who attack the nation’s postal system and misuse it to defraud, endanger, or otherwise threaten the American public. As the primary law en- forcement arm of the US Postal Service, the USPIS is a specialized, professional or- ganization performing investigative and security functions essential to a stable and sound postal system. As fact-finding and investigative agents, Postal Inspectors are federal law enforcement officers who carry firearms, make arrests, execute federal search warrants, and serve subpoenas. Inspectors work closely with US attorneys, other law enforcement agencies, and local prosecutors to investigate cases and prepare them for court. Approximately 2000 Postal Inspectors are stationed throughout the United States and enforce more than 200 federal laws regarding crimes that involve the US mail and postal system. EARLY ENFORCEMENT EFFORTS: OBSCENITY INVESTIGATIONS For more than a century, the USPIS has had specific responsibility for investigating the mailing of obscene matter. In the 1860s and 1870s, Special Agents (as Postal In- spectors were called then) had to deal with European smut peddlers who were invading American shores with obscene material. Special Agent Anthony Comstock, or “Mad Anthony,” as he was known, waged a relentless battle against anyone who used the US mail in an attempt to corrupt the morals of young people. In 1873, Congress passed the Comstock Act, a forerunner to the existing postal obscenity statute (18 USC § 1461). In a letter dated June 11, 1875, now in the Inspection Service Archives, Comstock wrote to his superior reporting on an investigation: I have the honor to report that yesterday in the city of New York I caused the arrest of one Zephir M. Caille, of 261 West 27th St., and doing business opposite 602 Broadway. He is charged with

595 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

selling obscene pictures, and today waived examination at Tombs Police Court and was com- mitted in default of $1,000—for trial in Special Sessions court. I seized about 175 pictures in his possession. I have found I had a good case in State court and therefore I took him there instead of waiting to work up a case in United States Court. He is a Frenchman, and I am informed owned a set of 37 different negatives for printing obscene photographs and supplied the trade throughout the country, although ostensibly keeping a stand on Broadway. I have the honor to be Very Respectfully Sir: Your Obedient Servant Anthony Comstock P.S. This fellow had a clasp knife sharpened as a dirk, but he did not get a chance to use it as I ironed him. PROTECTING CHILDREN FROM SEXUAL EXPLOITATION: A NATIONAL PRIORITY Through the years, child pornography has been investigated along with obscenity matters; however, it was not until the late 1970s that Congress took action to create federal legislation protecting children from sexual exploitation. Prior to the late 1970s, most Americans were unaware of the proliferation and com- mercial distribution of magazines, films, photographs, and videotapes depicting chil- dren in explicit sexual acts. Fortunately, we have come to realize that child pornog- raphy is not an “art form” but a manifestation of aberrant behavior resulting in the sexual molestation and abuse of children. Individuals with a preferred sexual interest in children, sometimes referred to as pref- erential offenders or pedophiles, are the primary producers and users of this insidious material. The primary reasons why these individuals produce, use, and collect child pornography are: — For their own sexual arousal and gratification. — To lower the inhibitions of their child victim. — As “blackmail” to ensure that the child does not tell the “secret” of the activity that he or she is being forced to endure. — To preserve the child’s “youth” by maintaining a pictorial record of the child’s ap- pearance at the “desirable” age even after he or she has grown older and matured. — As a medium of exchange with other like-minded individuals to enlarge their child pornography collections. — For commercial gain. Who are the victims? The popular notion that runaways and children from broken homes are the main targets of child molesters and pornographers is inaccurate. Often, the victim is the “child down the street” who has been seduced into a relationship by a trusted adult. Children may fail to disclose the abuse because of , , black- mail, or, in some instances, because for the first time in their life they have received the attention all children crave in what is interpreted to be affection from an adult. In 1977, the Protection of Children Against Sexual Exploitation Act became law (18 USC § 2251-2253). This was the first federal law specifically designed to protect children from commercialized sexual exploitation. It was the culmination of years of effort by Congress, the US Department of Justice (USDOJ), concerned members of the public, and the law enforcement community to take action against the pernicious effects of pornography and the sexual exploitation of children. Under this law, a child, or minor, was defined as a person younger than age 16.

596 25 Chapter

THE ROLE OF THE FIRST RESPONDER IN THE CRIMINAL INVESTIGATIVE PROCESS Det Sgt Joseph S. Bova Conti, BA Col Thomas P. O’Connor, BA, MA

The exploitation of children has been a problem for countless years. Curiosity and trust—innate qualities of children—are normally considered positive character traits, but they can make children particularly vulnerable to sexual predators. Today, under the veil of secrecy provided by electronic technology, the number of exploited chil- dren is growing at an alarming rate. The Internet introduces unique and sometimes difficult challenges to the law enforcement community. Jurisdictional boundaries previously recognized by child protection services and police have become blurred. Child exploitation is a worldwide phenomenon. It takes communication and coop- eration by those who protect children to bring the criminals to justice. This chapter reviews the investigative process and the role of the first responder, the uniformed officer, and the investigators and detectives assigned to a case. In most jurisdictions, the first responder is the uniformed officer receiving a call for police. Many times the call coming in is vague, with little information. Therefore, the first officer on the scene is responsible for evaluating the situation and taking the first steps in the investigation. Specialized training and a great deal of experience are required to handle exploitation crimes. The information in this chapter is a cul- mination of more than 70 combined years of law enforcement experience in the field—experience that includes in-depth interviews with perpetrators. The sug- gestions contained in this chapter are the result of numerous cases handled personally by the authors and offer a unique perspective into the behavior of the sexual predator. The hope is that this information can help a first responder identify the traits and qualities of sexual predators, effectively elicit confessions, and successfully prosecute the perpetrators. PRELIMINARY INVESTIGATION BY FIRST RESPONDERS The criminal investigative process begins with and is based on a well-documented account of all observations, actions, parties present, and evidence relevant to the initial scene. This compilation of facts and ideas helps determine whether a crime has been committed. It is the responsibility of the law enforcement community to make the critical link between mere suspicion and a formal accusation. Patrol officers responding to a child exploitation call should consider the following factors as an integral part of the preliminary investigative process: — The investigation starts immediately on arrival at the scene. Visual observations and details about what is being said are important. In particular, anything said spontaneously that is relevant to the issue at hand should be noted and incor-

603 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

porated into the initial report. The first responder’s responsibility is to ascertain whether a crime has been committed and if it has, who is responsible. — The officer should immediately determine whether the victim needs medical assistance and initiate the necessary procedures to provide the appropriate care. — All witnesses should be identified and interviewed. Their relative involvement in the incident should be noted. — If applicable, a timeline should be established detailing as much as possible of , what, where, when, how, and why of the situation. This timeline becomes a work sheet for the investigation. — Find and appropriately seize any physical evidence that could help determine what occurred. It may be necessary to obtain a suspect’s consent before searching for evidence. Recognize potential evidence, and take the steps necessary to pre- serve it. Keep in mind the complexities involving electronic imaging and the associated technological equipment. Experience in the field of sexual exploitation of children has revealed that perpetrators often keep a cache of souvenir images. If located, these images become the permanent record of a crime in progress. They can help identify additional victims, witnesses, and suspects. — A first responder must address the motives involved in the case. If relevant, review the victim’s or the witness’s motivation for reporting the incident. These should be used in conjunction with observed behavior to show a connection, or lack thereof, with the potential suspects. — Interview and obtain statements from all parties involved, including but not limited to individuals from other jurisdictions and child protection intervention workers. Include the victim’s statements (if appropriate, considering the victim’s age and relationship to the potential suspect). Medical records should also be obtained. — Determine exactly what occurred by specifying the nature of the criminal event and the overt acts associated with the incident. — If the suspect is at the scene, the on-site officers’ responsibility is to identify the individual and establish probable cause. Additionally, an investigator or a first responder may decide to have the suspect voluntarily go to the designated inter- view area (police department) and then talk with the suspect before making an arrest. Often, circumstances unique to each case influence the timing of an inter- view strategy and arrest. Numerous factors can be involved, one of which includes establishment of rapport with the suspect. The first responder should evaluate whether it is appropriate to handcuff a suspect in the presence of the victim or the suspect’s family, friends, or co-workers. In some situations, it may be better to delay the physical arrest in an attempt to gain the trust and acceptance of the suspect. Consideration should be given to any circumstances that may adversely affect the likelihood of obtaining a confession. — Police officers should draw on their overall police experience to determine imme- diately whether they should initiate the interview of the suspect or defer to a more experienced investigator who may be better trained for this intricate commu- nication process. — If an officer has sufficient training and experience, a confession from the suspect should be obtained that meets all of the criteria associated with current laws (eg, the Miranda decision). A written statement and, if possible, a videotaped state- ment are crucial for the successful prosecution of the perpetrator. The initial phase of a child exploitation case involves a complicated sequence of events that involves various activities. Officers should consider their experience and capa-

604 INDEX

A emotion, reason (contrast), 570–571 AACAP. See American Association of Child and Adolescent interview, 571–575 Psychiatrists investigation, 568–593 AAP. See American Academy of Pediatrics perspective, 569–570 AAS, 429, 430t law enforcement role, 572 Abduction. See Attempted nonfamily abduction; Infants; rapport, establishment, 573 Teenagers terms, clarification, 573 involvement, 534 videotaping, 573–574 Abel, Gene, 279, 722 Acquaintance-exploitation cases, 556–568 Abel VT, 284 assessment/evaluation, 575–581 Abercrombie ad. See Elementary school children mannequins behavior patterns, documentation, 582–584 Abuse corroboration, 581–588 cases, comparison, 559t disclosure continuum status, 557–558 clergy reports, 948 dynamics, 556–558 definition, 715 experts, usage, 557 images, offending process (relationship), 265–273 high-risk situations, 566–567 medical evidence, 822 investigation, 566–567 method, 825 medical evidence, 584 pornographic evidence, 827 parents, role, 557 questions, usage, 381t–382t Acquaintance-seduction preferential offender, 588 Abuse Assessment Screen (AAS), 429, 430t Acquired immunodeficiency syndrome (AIDS), 141, 148 Abused girls/women, criminal behavior compromise, 392 frequency, 704 contraction, 73, 76, 747 questions, 704–705 risk, 425, 804 sexual characteristic, 704–705 transmission, 1030 Abused/neglected girls vulnerability, 968 antisocial/delinquent lifestyle development, 705 Acute internal injuries. See Genital trauma derailment mechanisms, 705–707 Acute visible injuries. See Genital trauma Abused/neglected women, derailment mechanisms, 705–707 Addiction, 197. See also Cyber addiction; Drugs Abused-status offenders, escalation. See Criminal offenders Admirable Discourses of the Plain Girl, The, 6 Abusive Images Unit (AIU), investigations, 795–797 Adolescents Accidental disclosure, 820 advertising guidelines, status, 45–46 Accidental touching, 728 boy, anal-penile penetration (history), 360f Acquaintance child exploitation cases, 590 female, hymenal clefts, 362f Acquaintance child molestation, 532–535 girls Acquaintance child molesters, behavioral analysis abnormal vaginal bleeding, differential diagnosis, caution, 529–530 379t definitions, 535–542 anal penetration, denial, 360f need, 535–536 intimate partner violence. See Prostituted adolescents introduction, 529–535 offenders, 555–556 overview, 530–535 online contact, 477 Acquaintance child molesters, determination, 533 substance abuse, CRAFFT Screening test, 355t Acquaintance sexual exploitation Trichomonas vaginalis discharge, 356f assessment/evaluation, 575–581 victims, uncomplicated STDs (management). See Sexual big picture approach, 571 abuse disclosure/reporting continuum, 572–573 Adult/minor sexual contact, 473

1051 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

sexually deviant Internet users, supporters (online Aggressive solicitations, 444 communication), 478t Agreement, definition (conspiracy law), 912 Adults Aider/abettor development, social/psychological skills (learning criminal liability, 919–922 failure), 707 liability, establishment. See Child sexual exploitation male/female juxtaposition, ad, 36f AIDS. See Acquired immunodeficiency syndrome pornography AIM. See America Online attitudes, sample questions, 697 AIU. See Abusive Images Unit impact, understanding, 193 Alcohol prostitution, research, 174 intoxication, 352 relationships. See Incarcerated pedophiles use, 353–355 sexual exploiters, targeting/punishing. See Children Alger, Horatio, 949 sexually exploitative advertising, impact, 38–43 Alice's Adventures in Wonderland (illustration), 11f solicitation. See Youth Alienation, 337. See also Youth alienation/victimization survivors, psychological profiles. See Child sexual AMBER. See America's Missing: Broadcast Emergency exploitation industry Response traffickers, sexual purposes. See Children Ambulatory care clinics, 398 witnesses/suspects, identification, 584 America Online (AOL), 18, 624, 635 youth Internet friendships access controls, 457 appearance, 460 Instant Messenger (AIM), 622f formation/risk, 446–447 American Academy of Pediatrics (AAP), 810. See also Media Advanced Research Projects Agency (ARPA), 17–18 Matters Adventure-based programs, usage, 417 advertising, assessment, 39 Advertising. See MTV national campaign, 47 change, recommendations, 46–51 News, 50 commercial sexual exploitation of children, 25 policy statement, 27 appearance, 28–30 American Advertising Federation, 43 conclusion, 51 American Association of Advertising Agencies, 43 examination, reasons, 25–28 American Association of Child and Adolescent Psychiatrists focus, child beauty pageant contestants, 29f (AACAP), 48 guidelines, status. See Adolescents American Hospital Association, 806, 809 history. See Child sexually exploitative advertising American Journalism Review (AJR), 1004 pediatricians, impact, 48 American Professional Society on the Abuse of Children pornography, relationship, 194 (APSAC), 810 sex/violence, 35–37 American Prosecutors Research Institute (APRI), 1035–1036 Advertising Standards Canada, 45 American Psychological Association (APA), ethical principles, Advocacy, promotion, 1042–1043 198 Affective disorders, 77 American Registry for Internet Numbers (ARIN), 624, 630, Affidavit, providing, 660f 632 Affluence, poverty (paradox). See North America America's Missing: Broadcast Emergency Response Africa, child prostitution (example), 67 (AMBER) Alert African ancestry, characteristics, 225 activity, assessment, 987–988 African descent, racial differences, 224f coordination, strategy, 987–988 Age, proof. See Child pornography lessons, communication, 988 defendant, testimony, 664 national coordinator, role, 985–986 expert testimony, 662–663 network, creation, 988 lay opinion, usage, 663–664 notification process, 985 trier of fact, decision question, 664 overview, 985 Age of consent, 560–562, 829 program, 979 laws, 199 relationship. See Infants; Teenagers Age of Enlightenment, child sexual exploitation, 7 success story, 987 Age of mistake. See Children system, 320 Age-inappropriate sexual behavior, 822 Amnesty International, 376 Aggression, 228, 408 Anal penetration, denial. See Adolescents Aggressive sexual solicitations, 440 Anal sphincter dilatation, 362f

1052 Index

Anal trauma, 584 Assistant US Attorney (AUSA), 932 Anal-penile penetration, 362 Association for the Treatment of Sexual Abusers (ATSA), Anatomy, normal appearance, 370–373 277, 279 Ancient China conference, 285 sexual symbiosis, symbol, 4f Ethics Committee, 291 Ancient China, child sexual exploitation, 4 standards, 279–280, 291 Ancient civilizations, child sexual exploitations, 1–4 Association of Internet Hotline Providers (INHOPE) Ancient Egypt, child sexual exploitation, 1–2 activities, 1022–1025 Ancient Greece Best Practice Papers, 1022 child sexual exploitation, 2–3 Code of Practice, 1022 prostitution, classes, 3f historical background, 1019–1020 Ancient Rome history, 1019 child sexual exploitation, 3–4 hotline pederasty, presence, 3 definition, 1019 Ancillary details, 817 operation process, 1020–1022 Angel (movie ad), 41f impact. See Spain Annular hymen, 372f interaction. See Law enforcement Anogenital trauma, medical implications. See Child sexual member hotlines, workload, 1024–1025 exploitation members, 1021t Anthroscopy, 224 statistics reference period, 1024 Anticipatory warrants, 641–642 success stories, 1025–1026 Antisocial lifestyle development. See Abused/neglected girls trends, analysis, 1024–1025 Antisocial personality disorder (ASPD), 288 Association of National Advertisers, 44 Anti-virus software, 630 Association of Southeast Asian Nations (ASEAN) Regional Anxiety, 352 Think Tank, 1015 disorder, 228 Atlanta Journal-Constitution, article, 998–1000, 999f, 1003 APNIC. See Asian-Pacific Network Information Center Atlanta murders, 980–982 Applets, 622 commemorative artwork, 981f APRI. See American Prosecutors Research Institute victims, 981t APSAC. See American Professional Society on the Abuse of ATSA, 932 Children Attempt charge, sample questions, 694–695 Archival file review group, 723 Attempted nonfamily abductions, 989–991 ARIN. See American Registry for Internet Numbers Attention Center for Border Children, 311 Armed conflicts, children (involvement), 73–74 Attention deficit hyperactivity disorder, 228, 408 Armstrong v Executive Office of the President, 858 Attorney's Office for the Defense of the Child and the ARPA. See Advanced Research Projects Agency Woman and the Family, 311 ARPANET, 17 AUSA, 932 Ars Amatoria (Ovid), 3–4 Authorities (distrust), example, 90t Artha, 5 Automatic consultation. See International police ASEAN. See Association of Southeast Asian Nations Ashbee, Sir Henry Spencer, 10 B Ashcroft v Free Speech, 206 Back Orifice (BO), susceptibility, 659 decision, 656, 659 Backlash, impact, 575 definitions, unconstitutionality, 19 Bacterial agent treatment, 392 impact, 215. See also Real child depiction Bad kids, consideration, 60 problems, 651 Bandura, Albert, 479 ruling, 259, 474, 638 Bandwidth, 630 Asian ancestry, characteristics, 225 Bangkok Post, poverty/children sale, 70 Asian descent, racial differences, 224f Barrie, JM, 248 Asian-Pacific Network Information Center (APNIC), 624, Beating the Devil Out of Them (Murray Straus), 136 630, 632 Becker, Judith, 279 ASPD, 288 Behavior Assault victims overlap. See Reported behavior nongenital injuries, 359t patterns, documentation. See Acquaintance-exploitation physical examination, conducting (objectives), 387t cases

1053 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

precociousness, 822 violence, disposition, 137–138 standards (cleanup), youth (mobilization). See Internet Boys & Girls Clubs of America (BGCA), 875 Behavioral assessment. See Juveniles; Victims BPAM, 238 Bell, Yusuf, 981 Brandenburg v Ohio, 900, 907 Benign neglect, 1044 Breast development, Tanner stages. See Females Benin, absent children (study), 67 Breast Pubic Axillary Menses (BPAM), 238 Berners-Lee, Tim, 18 Broadband, 630 Best evidence rule, 856–859 Brooks, Tamara, 987 compliance, 859 Brothel children, 65–66 Best practices, 711 Brothels, 63–65 Bestiality. See Zoophilia Browser, 630 Beyond Borders, 308 Bruising, 430 BGCA, 875 Bulletin boards, 895t Big baby, 539 Bundeskriminalamt (BKA), 627 Big Brothers Big Sisters, 726 Bundy, Ted, 989 Birth control, information, 33 Bureau of Alcohol Tobacco and Firearms, 203 Bit-stream forensic image, 861 Bureau of Immigration and Customs Enforcement (ICE), BKA, 627 626 Blocking software, 610t law enforcement partnerships, 211 understanding, improvement, 463 participation, 928 usage, 457 Business community, social responsibility, 49 Blogs, 248 Blue demonic face, drawing, 405f C BO. See Back Orifice C. Trachomatis. See Chlamydia trachomitis Bodily injury, 826 C3. See Cyber Crimes Center Body image, 40–43 Cable modem, 630 Body parts, abuse, 555 Cache, evidence, 658 Bondage, 551 Calcium channel blockers, 358 Bone v State, 838 California State Department of Justice, 884 Border wallpaper, British feature, 796f Call girls, 64 Borderline touching, 728 Calvin, John, 949 Boy Scouts, 726 Calvin Klein. See Klein Boyfriends, attachments, 97 Canada Boy-love computer forum discussion group, 731 child pornography, 307–308 Boy-love magazine, 915 children, profiles, 304–305 Boy-lover newsgroups, 480 commercial sexual exploitation Boy-lover Usenet groups, 481 entrance process, 180–184 Boys existence, explanation, 184–187 abuse, 131–132 exit process, 187–191 aggression. See Caretaking adult CSEC, 304–321 anal-penile penetration, history. See Adolescents experiential youth perspectives, 179 athletic clothing, ad, 36f exploiters, profiles, 305 discipline, 136–137 language/respect, 179 hitchhiking, 139–141 law enforcement, 306–307 lovers, 480 national legislation, 306 man, transition, 134–135 online sexual victimization, 307–308 molestation, 719 political/economic characteristics, 299t–301t prostitution, solution, 139–141 population/health/social characteristics, 302t–303t protection, 133 prevention/prosecution/protection programs, 307 pubic hair/genitalia development, stage/fiducial limits private sector, role, 308 (median ages), 236t trafficking, 305–306 sexual abuse, toleration, 141 Canada Customs and Revenue Agency (CCRA), 307 special issues. See Juveniles Canada Evidence Act, 836 spirit, breaking, 136–137 Canadian Police Information Center, 305 street life, 138, 143–144 Capacity-building, principle, 976–977

1054 Index

Captive Daughters, 321 images, 239–240 Car Relax Alone Friends Forget Trouble (CRAFFT) relationship. See Child pornography Screening test, 353. See also Adolescents Child exploitation Cardiac arrhythmia, 358 cases, investigation. See Internet Caretaker missing, 991 concern. See Sex tourism episodes, 991t identification. See Commercially exploited children Caretaking adult news, interaction, 1003–1006 abuse, 135 Child Exploitation and Obscenity Section (CEOS), 600 boys, aggression, 135 Child Exploitation of Obscenity Section. See United States Carroll, Lewis, 11, 248 Department of Justice CARU. See Children's Advertising Review Unit Child Find Manitoba, 307 Case information header. See Cyclical Redundancy Check; Child Lures Prevention Safe Environment Program, 988–989 Message Digest 5 Child molesters, 720. See also Preferential-type child Case witness, 813–814 molesters; Situational-type child molesters Casey Journalism Center on Children and Families, 996 behavioral analysis, 544t. See also Acquaintance child Casper Star-Tribune, 1001, 1002f molesters Causation, 196 definition, 540–541 CBC. See Complete blood count pedophile, contrast, 542–544 CBT framework, 269 term, usage, 720 CCRA. See Canada Customs and Revenue Agency Child pornography, 198–199. See also Canada; Electronic ccTLD. See Country code top-level domain child pornography; Mexico; United States; Written Center for Prevention of Sexual and Domestic Violence, 953 child pornography Centers for Disease Control and Prevention (CDC), acquisition, 469 recommendations, 363 analysis, testimony. See Internet Centers for Medicaid and Medicare Services, 432, 806 article research, journalist claim, 670–672 Central America, child prostitution (example), 67–68 attitudes, sample questions, 697–698. See also Virtual Central Intelligence Agency (CIA), trafficking estimates, 743 child pornography CEOS, 600 charges, additions/alternatives, 650–651 Cerebral ischemia, 358 charging, considerations, 646–654 Cervantes v Cates, 653 child erotica, relationship, 560, 586 Cervical cancer, 428 children Chain-of-custody documentation, 862 age, proof, 661–665 Chain-of-custody information, 862f identification methods, 207–209 Channel, 630 collection, 558. See also Pedophiles Charm school cases, 745 collector, 535 Chat rooms, 473, 630, 895t images, assessment, 217 information, 636 information gathering, 217 relationship, building, 801 computers, evidence, 655 Chicago Juvenile Detention Center, 145–147 counts, number (charging), 650 Chickenhawk, 896t damage, 197–198 Child, definition, 538–539 defense, 651–654 Child abuse diffusion, 655–657 addressing, 1035 defining, 646–647 book research, author claim, 671 definition, 258–261 case, expert testimony (components). See Physical child construction, narrowness, 843–844 abuse case meeting, 216 comorbid forms, expert witness role, 802–806 depiction, 239 despair, 405 discovery, accident, 668–669 images, 789, 793 distribution, 469 prevalence, 791 ethnicity, relationship, 224–226 registry, 549 evidence, handling, 213t victims, congregation safety, 961–963 federal legislation, 19t Child erotica, 560, 586 gender, relationship, 223–224 definition, 667 historian, 661 depiction, 239 images, 549

1055 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

First Amendment exclusion, 840–844 Idaho, code, 770 number, charging, 650 Illinois, code, 770–772 impact, understanding, 193 Indiana, code, 772 information disclosure. See Defense investigation, 745, 749–751 Internet, usage, 474–476 involvement/increase. See Southeast Asia Internet-related possession/distribution/trading, 875 Iowa, code, 772 investigations, 829 jury selection, 752–758 jurisdiction, 649–650 Kansas, code, 772 jury selection, 654–657 Kentucky, code, 773 laws, 903 laws, 745–747 legislation, 598t enforcement, 748 location, 664 Louisiana, code, 773 medical analysis, 213 Maine, code, 773–774 purposes, 216–217 Maryland, code, 774 mistaken identity, 657–659 Massachusetts, code, 774 NAMBLA support, 917 Michigan, code, 775 pretrial considerations, 646–654 minimization, 1010 producers, mistake-of-age defense, 664–665 Minnesota, code, 775–776 prosecutorial issues, 635 Mississippi, code, 776 regulation, state interest, 840–843 Missouri, code, 776 search and seizure issues, 635–646 Montana, code, 777 spam, 1024 myths, 754t underlying crime, 654–655 Nebraska, code, 777 untrue defenses, meeting, 657–671 Nevada, code, 777–779 victim issues, 651 New Hampshire, code, 779 videotape, 220 New Jersey, code, 779 viewing, possession (comparison), 669–670 New Mexico, code, 779–780 Child Pornography Evidence Guide. See National Center for New York, code, 780–781 Missing & Exploited Children North Carolina, code, 781 Child Pornography Prevention Act (CPPA), 474, 650, 897 North Dakota, code, 781 overturning, 900, 902 Ohio, code, 782 Child prostitution. See Middle East; Philippines; Thailand Oklahoma, code, 782–783 Alabama, code, 763 Oregon, code, 783 Alaska, code, 764 penalties, 745–747 Arizona, code, 764 Pennsylvania, code, 784 Arkansas, code, 755 promotion, myths (involvement), 12t California, code, 765–766 prosecution, 745 charging/pretrial decisions, 751–752 research, 174 Colorado, code, 766–767 Rhode Island, code, 784 Connecticut, code, 767–768 sentencing, 759 crimes, 745–749 situation analysis. See Southeast Asia involvement, 763–788 South Carolina, code, 784–785 definition, 745 South Dakota, code, 785 Delaware, code, 768–769 state legislation, 763–788 denial, 1010 Tennessee, code, 785 District of Columbia, code, 769 Texas, code, 785 example. See Africa; Central America; Eastern Europe trial, 751–759 expert testimony, 756–757 case in chief, 755–758 factors, 746t closing, 758–759 federal legislation, 788 opening statement, 755 Florida, code, 769 untrue defenses, meeting, 757–758 Georgia, code, 769 Utah, code, 785 Hawaii, code, 769–770 victims, reasons, 747 high-risk locations, 217 Virginia, code, 785–786 horrors, 1030 Washington, code, 786

1056 Index

West Virginia, code, 786–787 forensic pediatric/nurse examination, medical Wisconsin, code, 787–788 justification, 827t Wyoming, code, 788 global perspective, 59 Child Protection Act of 1984, 597 history, 1 Child protective services (CPS), 409 illegality, 918 agencies, 350, 398 Internet usage, 469 intervention, 397 investigation, 636 involvement, 356 investigative abilities, development, 1036 notification/intervention, 353 medical expert, input, 799 Child Recognition & Identification System (CRIS), 207 multijurisdictional task forces, expansion, 1046 Child sex rings, types, 556 national/state laws, enforcing/strengthening, 1044–1045 Child sex tourism, 297, 319, 749, 935 newsgroups, relation, 621t definition, 1009 perspectives, 80–81 global actions, 1015t prevention. See Tourism industry Child sexual abuse. See Intrafamilial child sexual abuse preventive measures, 80–81 argument, medical diagnosis, 806–810 private sphere, 71 behavior, 821–825 protection, code of conduct. See Tourism; Travel definition, 97t, 315, 753 public-private partnerships, promotion, 1047 diagnosis, confirmation, 814 qualification examination, 806 etiology, Internet (role), 479 recommendations, 1041–1049 forensic pediatric/nurse examination, medical rescue/recovery/reintegration, 77–80 justification, 827t risk, comparison, 115f. See Social risks history, core elements, 817 summary opinion, 830–831 medical history, 814–821 taboos, 71 modified clinical encounter form, 822t USPIS, attack, 595 paraphilias, relationship, 243 victims, specialized studies (increase), 1048–1049 physical examination, 825–827 vulnerability, increase, 72–76 private sphere, 71 Child sexual exploitation (CSE), group promotion prohibited conduct, policies, 951t aider/abettor liability, establishment, 895–897 reporting, decision making guidelines, 811t criminal conspiracy, establishment, 895–897 testimony, 814–827 First Amendment, nonprotection, 904–910 trivialization. See Playboy cartoons Child sexual exploitation (CSE) industry victims, 802 adult survivors psychological profiles, 155 Child sexual abuse accommodation syndrome (CSAAS), research, 173–174 756–757, 820, 821t survivors, update, 174–175 Child sexual assault, definition, 97t, 315 victim/survivor, transition, 169 Child Sexual Behavior Inventory (CSBI), 229 Child Trafficking and Pornography Act (1998), 260 Child sexual exploitation (CSE), 369. See also Ancient Child Victim Identification Project (CVIP), 205–209 civilizations; Middle Ages; Renaissance, Nineteenth Child victims. See Combating Paedophile Information century; United States Postal Inspection Service Networks in Europe anogenital trauma, medical implications, 369 exploitation (continuance), risk (elimination), 214 cases, 374 involvement. See Multiple child victims conspiracy primacy, 258 creation, First Amendment exclusion, 897–910 statements, videotaping/audiotaping, 573 establishment, 910–919 uncomplicated STDs, management. See Sexual abuse crimes (aiding/abetting), First Amendment exclusion, Child Welfare League of America (CWLA), 320 897–910 Child Wise Tourism program, 1014–1015 definition, 59–60, 95t, 536–537 brochure, 1016f economic impact, 73 postcard campaign, 1014f environmental factors, 72–76 Child Workers in Nepal (CWIN) evaluation, 386 childcare center, 89 experts/specialists, national pool (enlargement), Concerned Center, 85 1047–1048 study, 89 exposure, health consequences, 76–77 Childhood factors, 102 definition, 60

1057 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

fears, 579 exposure, health consequences. See Sexual exploitation prostitution, psychosocial factors, 69t factual/legal impossibility, 757 trauma, 157–169 forensic interviewing skills, development, 1035–1036 victimization, 703 head height, total height ratio (comparison), 231 Childhood genital trauma, 373–380 health, quality, 77 differential diagnosis, 379–380 histories. See Commercially exploited children Childhood sexual abuse. See Incarcerated pedophiles homelessness, prevalence (explanation), 142–143 research, 173–174 identification, methods. See Child pornography results, 725 instruction, pornography (usage), 230 Childhood sexual exploitation industry victims Internet targets, 874–875 adult psychological disorders, 169t Interpol coping strategies, 165t poster. See Missing children missing life skills, 167t protection tools, 737–739 Childhood sexual industry victims, beliefs, 158t interviewers, 612 Childlike model, suffering (ad), 37f involvement. See Armed conflicts; Institutions Children. See Brothel children; Commercial sexual knowledge (absence), impact, 70 exploitation of children; Indigenous children; life skills, absence, 166–169 Orphaned children; Street children; Working living in their own homes children sexual exploitation/commercial sexual exploitation, abuse images, relationships, 264f risks, 103 abusive images, 257. See also Internet sexual exploiters, 110–111 COPINE typology, 259t sexual exploiters, impact, 316 acquaintance, testimony, 659–660 location (molestation reasons), Internet usage, 476–477 adult sexual exploiters, targeting/punishing, 1043–1044 lovability, belief, 159–162 adult traffickers, sexual purposes, 112 lying, ability, 575–576 advertising, regulation, 43–45 macho/machismo culture, impact, 71 advocacy, 569 maltreatment, 97 age DSM-IV-TR codes, 809 determination, sexual maturation rating (usage), ICD-9-CM codes, 809t 237–238 type, 109f proof. See Child pornography mannequins usage. See Elementary school children age, mistake, 757 mannequins approach, sensitivity, 360–361 missing/abducted, list, 980t beauty pageant contestants. See Advertising models. See Pin-up model choice. See Prostitution molestation commercial exploitation. See Rural America cases, physical/forensic evidence (consideration), commodities, 70 639t consumerism, impact, 70 example, 719 coping behaviors, 164–166 needs, knowledge (absence), 71 crimes, voir dire (sample questions). See Computer- not living in their own homes, sexual exploiters, 111–112 facilitated crimes against children impact, 316–317 cyber-enticement, 819t offenses, statutes of limitation removal demand, 72–73 federal legislation, 687 depiction, image proof (Ashcroft v Free Speech impact). state legislation, 676–687 See Real child depiction online contact, 477 details, importance, 576–578 personal safety, instruction, 958–961 disabilities, inclusion, 73 poverty, impact, 69 domestic/international trafficking, sexual purposes, power 112–113 belief, 162–163 drugged appearance. See Videotapes impact, 69–70 education, 1034 powerlessness, impact, 69–70 ethnicity, determination problem, scope. See Sexually exploited children clinical indications, 224–225 profiles. See Canada; Mexico; United States clues, 226 protection, 1041–1043. See also Combating Paedophile excitation, pornography (usage), 230 Information Networks in Europe

1058 Index

communities. See Faith communities Circumcision. See Females government right, cases, 901t Circumferential strain gauge, 281 radiographic studies, 231 CIS. See Criminal information system rape victims. See Southern Asia Clergy, hiding, 948–949 response, need, 980–984 Clindamycin, 357 risk. See Sexual offenders Clinical evaluation/management. See Physical victimization; safety policies, 951 Sexual victimization seduction Clinical treatment sites, 409–410 relationship. See Pornography Clinically identified paraphilias, examples, 245t video content, usage, 220 Clinicians, contribution, 1042 sexual crimes Clitoridectomy, 374, 375f federal statutes, 13t Close friendship, definition, 446 penalties, increase, 1044 Code Adam, initiation, 982 sexual exploiters, profiles. See United States Coercion, 748 sexual maturation (timing), international estimates, 239t Coercive same-sex relationships, 341 sexual offenders (communication), Internet usage, Cognitive ability, deficits, 706 477–479 Cognitive distortions (cognitive restructurings), 479–482 sexual trafficking, 937 Coincidental genital trauma, 374. See also Pregnancy sexual victimization, 534–535 Colposcope, usage, 584. See also Photocolposcope definition, 536 Columbia Journalism Review, 1005 knowledge, increase, 531–532 Combat sports, 137 perspectives, 530 Combating Paedophile Information Networks in Europe term, usage, 536 (COPINE), 741, 794 sexualization, guidelines (status), 45–46 child victims/protection, 270–273 sexually exploitative advertising origins, 257–273 history, 30–38 research, 257 impact, 38–43 system, 222 supply. See Commercially exploited children typology. See Children testimony, 659–660 University of Cork College, 223 testing/treating, 356 Combination offenders, 551 trafficking, 75, 319, 748–749 Commercial exploitation. See Rural America trust, belief, 163–164 Commercial exploitation of children and women, vulnerability, psychosocial factors, 69–72 international agreements (ratification), 322t–323t vulvovaginal symptoms, etiology. See Prepubertal child Commercial forensic software, custom forensic software welfare system, survivor perspective, 129 (contrast), 844–845 work. See Working children Commercial nexus, 109 Children at risk (identification), community network (use), Commercial sexual exploitation 1033–1034 entrance process. See Canada Children of the night, 759 existence, explanation. See Canada clinical approach, 350 exit process. See Canada medical care, 349 questions, 179 TEAMSTAT approach, 350–358 Commercial sexual exploitation of children (CSEC), 63–68, Children of the Shadows (documentary), 75 369, 388–390. See also Advertising; Canada; Children's Advertising Review Unit (CARU), 43–45 Mexico; North America; United States CSEC principles, 44 activities. See Mexico Child/woman, interchangeability. See Cosmetics ad cases, 63 China, child sexual exploitation. See Ancient China CSEC-focused NGOs, 115 Chlamydia, 356, 1030 CSEC-focused services, 113 Chlamydia trachomitis (C. Trachomatis), 363, 392 definition, 95t attack, 391 factors, contribution, 96–97, 103t Chlorpromazine, 183 forms, 102, 104t–105t Chou Dynasty, 4 genital injury, relationship, 389–390 Chronic offenders, 705 impact, 69–72, 106 Chronic PTSD, 828 international conventions/protocols, 79–80 Church, remedial measures (effectiveness), 950 North American cities, study, 101t

1059 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

at risk categories, 107t–108t access, defense stoppage, 860f trafficking functionaries. See United States comfort level, questions, 692–693 understanding, 966 evidence. See Child pornography victims, 106, 304 authentication, 835–837 worldwide numbers, 62t–63t presentation, direct examination, 851–856 Commercial sexual exploitation of North American children, sample questions, 693–694 prevention (national/regional efforts), 323t–328t graphics expert, testimony, 661 Commercial sexual exploited/trafficked foreign children, hacker/intrusion defenses, defeating, 658–659 regions/countries of origin. See United States images, deletion, 669 Commercially exploited children post-arrest examination, 790 histories, 1031–1032 records, 739 identification, 1028 usage, 586 national contacts, network development, 1035 Comstock, Anthony “Mad Anthony,” 10, 595–596 public advocation, 1037 Comstock Law (1873), 10, 595 small town/community supply, 1032–1033 Conference on Missing, Exploited, and Runaway Children, cutoff, 1033–1037 985 state contacts, network development, 1035 Confessions, 599. See also Subject confessions Commercially sexually exploited children, categories. See Confidentiality. See Juveniles; Victims United States Conflict. See Sexually exploited youth Commission on Obscenity and Pornography (Meese Congregation safety. See Child abuse; Domestic violence Commission) (1985), 9, 12, 597–598 Consensual monitoring, 586–587 Commonwealth (Pennsylvania) v Zingarelli, 890 Consent. See Age of consent Communication cases. See Lack of consent cases establishment. See Juvenile prostitution; Victims exception, 644–645 skills, absence, 168 Conspiracy. See Child sexual exploitation; Silent conspiracy Community. See Faith communities illegal act, furtherance (overt act), 915–919 children, supply. See Commercially exploited children Conspiracy law health support. See Juvenile prostitution; Victims agreement, definition, 912–913 involvement, promotion, 1042–1043 goal, 913 network, use. See Children at risk illegal act, agreement, 913–915 policing practices, use, 1033 Constitutional attack defense. See Travelers Community-based sex offender treatment programs, 286 Consumerism, impact. See Children Comorbid forms, expert witness role. See Child abuse Contagion, 580 Complainants, types, 609 Control, sense, 707 Complete blood count (CBC), testing, 390–391 Control question techniques (CQTs), 287 Compliant, term (usage), 529 Convention Against Cyber Crime (Council of Europe), 80 CompuServe, 635 Convention on the Rights of the Child (CRC), 60, 70 Computed tomographic (CT) scan, 370, 380, 390–391 Article 19, 79 Computer forensics protocol, adoption, 80 application, performing, 843 COPINE. See Combating Paedophile Information Networks automated process, 842–844 in Europe examination, 658 Coping behaviors. See Children; Victims examiners, 612 Coprophilia, 249, 251, 551 sample questions, 693–694 case studies, 251 overview, 847–848 Core elements, 817. See also Child sexual abuse software Corpora, tumescence, 370 legal validation, 835 Corporal punishment, faith-based community (scriptural litigated issues, 862–865 authorization), 950 tools, validation, 840–845 Correlation, 9094 usage. See Minority Cosmetics ad, child/woman (interchangeability), 33f Computer-based evidence, receipt, 215–216 Costa Rica, study, 72 Computer-facilitated crimes against children, voir dire Council of Better Business Bureaus, 43 (sample questions), 692–698 National Advertising Division (NAD), 45 Computer-generated evidence, introduction, 838 Council of Europe. See Convention Against Cyber Crime Computers Counselor-style interview, effectiveness, 731

1060 Index

Counterfeit deviance, 291 CyberTip, 308 Country code identifiers, 618t CyberTipline (NCMEC), 612–613, 882–883 Country code top-level domain (ccTLD), 618, 630 logo, 204f Country of origin. See United States reports, 205f stereotypical settings, 226. See also Videotapes Cyclical Redundancy Check (CRC), 861 Courtroom confusion, risk (elimination), 213–214 hash values, separation, 861f Courtship disorder, 281 hash value storage/case information header, 861–862 CPPA. See Child Pornography Prevention Act CPS. See Child protective services D CQTs. See Control question techniques Dads and Daughters (DADs), 47 CRAFFT. See Car Relax Alone Friends Forget Trouble Daguerre, Louis Jacques Mande, 10–11 CRC. See Convention on the Rights of the Child; Cyclical Dallas Police Department, 320 Redundancy Check ICAC Task Force, 599 Crescentic hymen, 372f Data Crime acquisition, 848 identification, importance, 935–937 authentication. See Recovered data investigation, 931–935 process, 848 networks, organization, 105t dump, 838 scene, 928–931 entry. See International police Crimes Agasint Children Research Center (University of logistic regression findings, 445 New Hampshire), 875 on-site review, 214 Criminal conspiracy, establishment. See Child sexual recovery process, 848–849 exploitation Date rape drug, 816 Criminal information system (CIS), 739 Dating violence Criminal Investigations/Child Exploitation program, 661 health consequence, 426–428 Criminal investigative process, first responder (role), 603 Dating violence, dynamics, 423–424 Criminal justice, descriptive typology, 548 Daubert factors, addressing, 849–850 Criminal justice system Daubert hearing, request, 668 girls/women, involvement, 703 Daubert v Merrell Dow Pharmaceuticals, Inc, 840–842, 845 victims, 87–89 Daubert/Frye standard, 840–842 Criminal offenses David Series, 794 abused-status offenders, escalation, 705 Davis, Jr, Sammy, 981 neglected-status offenders, escalation, 705 Deception, usage. See Polygraphy CRIS. See Child Recognition & Identification System Defendant, testimony. See Age Crossover sexual offenses, 244 Defense CSAAS. See Child sexual abuse accommodation syndrome child pornography, information disclosure, 651–654 CSBI. See Child Sexual Behavior Inventory closing argument, 758 CSE. See Child sexual exploitation meeting. See Child pornography CSEC. See Commercial sexual exploitation of children Delayed sexual maturation, 238 CT. See Computed tomographic Deleted files, recovery, 853. See also Multiple CD-ROM Cuff-like hymen, 372f sessions Culturally acceptable exploitation, 749 Delinquency, 705 Cutting injury, 430 Delinquent lifestyle, development. See Abused/neglected girls CVIP. See Child Victim Identification Project Demonstrative aid (graph), 823f CWIN. See Child Workers in Nepal Denial, impact, 166 CWLA. See Child Welfare League of America Dental maturation, 231–232 Cyber addiction, 476 Deoxyribonucleic acid (DNA). See Exclusive DNA; Inclusive Cyber crime, 896 DNA; Inconclusive DNA Cyber Crimes Center (C3), 882 analysis, 585 Cyber vigilante, 1023 component, 386 sample questions, 698 distinction, 387 Cyber-enticement attempts, 799 PCR, usage. See Mitochondrial DNA Cybersex, 267, 444 polymerase chain reaction. See Nuclear DNA seeking, 471 processing/analysis, 387–388 Cyberspace, 630 update, 387–388

1061 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Department of Homeland Security (DHS), 882 Distributed P2P, 623 Depression, 352, 428 DNA. See Deoxyribonucleic acid history, 96 DNS, 617, 630 incidence, 813 Dodgson, Charles L., 11, 248 mental health diagnosis, 805 Domain name, 630, 1020 result, 399 Domain name system (DNS), 617, 630 suffering, 429 Domestic servitude, 939 Deprivation, long-term impact, 804 Domestic trafficking, 297 Desensitization, 197 extent, 99 Desperation/silence, drawing, 406f sexual purposes. See Children Destination countries, tourism campaigns, 1014 Domestic violence victims, congregation safety, 963–964 Detective, role, 605–608 Dominance. See Hyperdominance Detention facilities. See Juveniles DOS utilities, usage, 843–844 Detrimental effects test, 885 Download, 631 Devadasi, 5. See also Temple prostitution Doxycycline, 357 Developing countries, rescue/recovery/reintegration, 78–79 Drawings, 413f. See also Blue demonic face; Incarceration; Developmental assessment. See Juveniles; Victims Preincarceration drawings; Prison drawings Deviant behavior, 478–479 Dropouts. See Schools Deviant fantasies, Internet usage, 482 Drugs Deviant/delinquent friends/relatives, girls/women abuse, 407 (relationships), 707 addiction, 141 D&G Fashion (sex sale), ad, 39f allergies, 351 Dharma, 5 history, information request. See Juveniles; Victims DHS, 882 intoxication, 352 Diagnostic and Statistical Manual of Mental Disorders, 4th overdose, 967 edition Text Revision (DSM-IV-TR) problems, 77 analysis. See Paraphilias use, 353–355 cautionary statement, 550 symptoms, 353t–354t codes. See Children withdrawal, symptoms, 353t–354t criteria determination, 809–810 DSL, 615, 631 definitions DSM-IV-TR. See Diagnostic and Statistical Manual of Mental distinctions, 536 Disorders, 4th edition Text Revision exclusions, 541, 548 Dugdale, William, 10 diagnosis. See Pedophilia Dysfunctional families, 72 diagnostic system, 543 Dysthymia, 228 nomenclature, 251 sexual perversions, 16 E understanding, 805 Early marriages, 68 Diagnostic testing, 363–366. See also Pregnancy; Sexually Early pregnancy, physical consequences, 77 transmitted diseases Early sexual maturation, 238 Diaper Pail Fraternity, 250 Eastern Europe, child prostitution (example), 66 Diaperists (adult babies), 250 Eating disorders, 428 Digital photography, 793 Ecchymoses, 430 Digital Subscriber Line (DSL), 615, 631 Economic opportunities, 969–970 Direct examination, 846–847 ECPAT. See End Child Prostitution, Child Pornography and Direct Sales v United States, 908, 909, 916 Trafficking of Children for Sexual Purposes Disclosure continuum status. See Acquaintance-exploitation ECTWT, 1011 cases ECU. See Exploited Child Unit Disclosure sequence, 579 Ecumenical Coalition on Third World Tourism (ECTWT), Disclosure/reporting continuum. See Acquaintance sexual 1011 exploitation eDonkey, 623 Dissimulation, measurement, 286–288 Education Dissociating, impact, 166 profile. See Incarcerated pedophiles Distressing exposures, 440 promotion, 1042–1043 Distressing incidents, 439 El Caracol, 311

1062 Index

Electronic archiving. See International police Episodic dyscontrol behavior, 228 Electronic bulletin boards, information, 636 Ernst & Young report, 863 Electronic child pornography, 319 Erotica images. See Child erotica Electronic evidence. See Original electronic evidence Estradiol, 231 presentation, 858–859 Ethnicity Electronic mail (E-mail), 631 determination, clinical indications. See Children services, 620 relationship. See Child pornography usage, 472, 615, 619–620 European ancestry, characteristics, 224–225 Elementary school children mannequins, usage (Abercrombie European Association of Communications Agencies, 44 ad), 33f European Community, 1045 Ellis, Havelock, 251 European descent, racial differences, 224f Embryonic development, 370 European Union (EU) Safer Internet Action Plan, 1019 Emergencies. See Medical emergencies; Sexual assault Europorn, 8 emergencies; Substance abuse Evans, Alfred, 980 Emergency care facilities, 398 Evans family, case study, 15–16 Emotion, reason (contrast). See Acquaintance sexual Evidence. See Original electronic evidence; Photographs; exploitation Physical evidence; Published materials Emotional abuse, 805 examples, 606t victims, 718 exclusion, risk (elimination), 213–214 Emotional assessment. See Juveniles; Victims files Emotional leakage, control, 605 format, 860–861 Emotional scars, 717 legal analysis, 859–862 Emotional sexual abuse, 61t handling, 213–214. See also Child pornography Emotion-related problem, 570 location. See Internet Employment, profile. See Incarcerated pedophiles receipt, 214–216 EnCase rule. See Best evidence rule Evidence File, 857 testimony. See Federal Rule of Evidence 702 imaging ability, 860 Examination positions, familiarity, 359–360 involvement, 835 Excitation, pornography (usage). See Children; Perpetrators process Excited utterance, 820 authentication, Federal Rule of Evidence 901 Exclusive DNA, 388 (usage), 849 Exclusive pedophiles, 246 challenges, 862–865 Exclusive type pedophile, 720 recovery process, 839 Exhibitionism, 61t, 243, 249, 551 Software, 853, 863 Exigent circumstances exception, 645 usage, 852 Exit Route Model, 972 Timeline, 864 Exiting usage, 844, 847 barriers/challenges, 966–969 Encryption, 626, 631 group life cycle, stages. See Sexually exploited youth End Child Prostitution, Child Pornography and Trafficking process (representation), spinning top (usage), 971f of Children for Sexual Purposes (ECPAT), 20, 43, programs, peer support model, 965 321, 717, 741 route, 965 campaign good practice, principles, 976–977 brochure, 1012f model, 970–973 formation, 1010, 1011 success, 969–970 multidisciplinary approach, 1012–1013 Experienced children/youth, 965 training, 1048 Experiential children, decision making, 976 English as a Second Language (ESL), 183 Experiential youth Enlightenment. See Age of Enlightenment decision making, 976 Entrapment, 665–667. See also Street-level entrapment perspectives. See Canada defense. See Travelers Expert testimony. See Age response, 667 components. See Child abuse inducement, requirement, 665–666 impact. See Tanner scale Environmental factors. See Child sexual exploitation inconsistent explanations, 803 Ephebophilia, 541, 721 inconsistent renditions, 803

1063 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

inconsistent responses, 803 lifestyles, changes. See Nineteenth century sample questions, 693–694 role, 1041–1042 Expert witnesses, 813–814 sponsors, 803 role. See Child abuse support, 356 testimony, 845–856 tree, creation, 414 authentication process, 848–849 Fantasy defense. See Travelers types, 813–814 sample questions, 698 continuum, 813f Fantasy writings, 3 Expertise, recognition (principle), 977 Fantasy-driven behavior, 546 Experts FCC v Pacifica Foundation, 901t decision-making process, synopsis, 830 Federal Bureau of Investigation (FBI), 205, 626 national pool, enlargement. See Child sexual exploitation Behavioral Science Unit, 550 opinions. See Search warrants child sexual assault patterns, 110 report. See United States v Habershaw contraband, handling, 214 testimony, types. See Medical expert cooperation, 320 usage. See Acquaintance-exploitation cases Innocent Images National Initiative (IINI), 211, 562, Exploitation. See Child sexual exploitation; Sexual exploitation 751, 882 cases; Acquaintance-exploitation cases Innocent Images Task Force, 661 comparison, 559t intelligence information, 591 Exploited Child Unit (ECU), 883 juvenile arrest records, 312 Child Pornography Evidence Guide, 207 law enforcement partnerships, 210–211 Internet searches, technical assistance searches, 210t logo, 15f organization, 206f participation, 928 resources, 203–209 poster, distribution, 531 technical assistance services, 209 screen capture, HTML source code, 617f Exploited children, congressional findings, 883t Victim-Witness Coordinators, 936 Exploited youth, professional guidelines, 191–192 Web site, 1044 Exploiters, profiles. See Canada; Mexico; United States Federal government, response. See Internet travelers Extrafamilial pimp, 745 Federal Prohibition of Female Genital Mutilation Act of Eyes, blackening (Calvin Klein ad), 33f 1995, 376 Federal Rule of Evidence 701, 663 F Federal Rule of Evidence 702, 810 Fabricated victimization, 821 threshold, 845–846 Factual impossibility. See Children; Travelers Federal Rule of Evidence 901, 836, 842, 846 legal impossibility, contrast, 887 usage. See EnCase sample questions, 694–695 Federal Rules of Evidence, 835 Faith communities, child protection communities Federal Trade Commission (FTC), violent entertainment collaboration, 947 marketing studies, 37 conflict, 947–952 Feelings (normalcy), assurance, 351 cost, 952–953 Fellatio image, 218 gap, bridging, 953–955 Females Faith-based community anal-penile penetration, repeat, 362f character witnesses, 947 breast development, Tanner stages, 235t instruction, 958–961 circumcision, 374–377 members, involvement. See Multidisciplinary teams Web sites, 376t–377t scriptural authorization. See Corporal punishment genitalia, normal appearance, 375f training materials, 953 hymenal clefts. See Adolescents False misses, 287 model, thinness (ad), 41f False witnesses, nonrecognition, 608 normal genitalia, 370–373 Family offenders, 555 counselor, education. See Internet PH development, Tanner stages, 234f dysfunction, 96 straddle injury, 373–374 genograms, 414–417 Female-target pedophiles, 720–721 history, 356 Fetal alcohol syndrome, 148 obtaining, 414–417. See also Juveniles; Victims Fetish, origin, 249

1064 Index

Fetishism, 249–250 Foreskin anatomy, 370 case studies, 249–250 Foster care, problems, 129–131 Fico, Frederick, 996 Foundations, active status, 979t File name Fourth Amendment encryption, 631 meaning, 646 extension, 852 nonapplication. See Nongovernmental actors File server (f-serve), 618 Frankel, Max, 995 File signature mismatches, 852 Franklin, Benjamin, 595 File slack, 658 Freedman, Eric, 996 area, information (discovery), 859f Freeh, Louis, 210 evidence, discovery, 854–856 Freeman-Longo, Robert, 279 usage, 855f Frotteurism, 243, 249 File Transfer Protocol (FTP), 615, 621–622, 631 Frye v United States, 840–842 program, allowance (screen capture), 621f F-serve, 618 server, 622 FTC. See Federal Trade Commission site, 796 FTP. See File Transfer Protocol usage, 913 Fuller, David, 875 File-by-file copy, 837 File-created dates, 858 G Files, remnants (discovery), 865f G8. See Group of Eight Nations Filtering software Gajdusek, Daniel Carleton, 749 understanding, improvement, 463 Gang rape victim. See Southern Asia usage, 457 Gates Rubber Company v Bando Chemical Industries, 837, 843 Firewall, 631. See also Personal firewall Gateway, 631 First Amendment Gateway cities, 927 acceptance. See Pornography Gay community, prostitution, 342 defense, 670–671 GEMS. See Girls Educational and Mentoring Services; Great sample questions, 698 Escape Maneuvers exclusion. See Child pornography; Child sexual Gender. See Victims exploitation comparisons, 341–342 nonprotection. See Child sexual exploitation relationship. See Child pornography protection, refusal, 909 General Equivalency Diploma (GED) program, 411 First responders Generic top-level domain (gTLD), 631 preliminary investigation, 603–605 uses, 618t role. See Criminal investigative process Genital injury, relationship. See Commercial sexual First World Congress Against Commercial Sexual exploitation of children Exploitation of Children (1996), 20, 59, 78, 298, Genital trauma, 826. See also Childhood genital trauma; 741 Coincidental genital trauma action, plea, 795 acute internal injuries, 390–391 Agenda for Action, 21t–22t acute visible injuries, 390 Flexbility, principle, 977 causes. See Prostituted children Fluanxol, 183 chronic consequences, 391 Flynt, Larry, 193 consequences, 390–392 Forbidden activities, engagement, 728 relationship. See Gynecological surgery; Nonsexual Forced labor, 937 violence Foreign children, regions/countries of origin. See United Genitalia, normal appearance, 370–373. See also Females; States Males Forensic interviewing skills, development. See Children Genitals, exhibition, 647 Forensic software Genograms, 810. See also Family authentication issues, 844–845 example, 416f, 418f contrast. See Commercial forensic software Gentamicin, 357 Forensics. See Computer forensics Geoghan, John, 951 evidence Giboney v Empire Storage & Ice, 900 collection, 361 Ginsberg v New York, 901t consideration. See Children Girls

1065 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

anal penetration denial. See Adolescents H Hacker defense, defeating. See Computers history, 360f Hagerman, Amber, 984, 984f antisocial/delinquent lifestyle development. See Haldol, 183 Abused/neglected girls Hansen, Jane, 1000–1001, 1003 criminal behavior, questions. See Abused girls/women Harassment. See Youth derailment mechanisms. See Abused/neglected girls impact. See Youth involvement. See Criminal justice system incident characteristics, 456 lovers, 480 perpetrators, 456 pubic hair/breast development, maturity stage (median youth targets, 453 ages), 234t Hard-core pornography, 193 relationships. See Deviant/delinquent friends/relatives Hardware write-blocking device, usage, 860 runaways, 705–706 Hare Psychopathy Checklist: Youth Version (PCL-YV), 289 Girls Educational and Mentoring Services (GEMS), 321 Hare Psychopathy Checklist (PCL), 288–289 Global opposition network, creation. See Sex tourism questionnaire screens, 723 Global travelers, 878 usage, ethical issues, 289 Globe Newspaper Co v Superior Court, 901t Hare Psychopathy Checklist-Revised (PCL-R), 288 Gnutella, 623 usage, 289 Golden showers, 539 Harvey, Milton, 981 Gonadotropin-releasing hormone, 231 Hash value storage. See Cyclical Redundancy Check; Message Gonorrhea, 356. See also Prepubertal female Digest 5 attack, 391 Hatch, Orrin, 902–903 Good faith exception, 642 Head cant, 29 Good Samaritan defense, 758 Head height, total height ratio (comparison). See Children sample questions, 698 Header, 631 GOs. See Governmental organizations Healing Government group life cycle stages. See Sexually exploited youth conduct, defense. See Outrageous government conduct programs, peer support model, 965 defense success, 969–970 role, 1043 Health counselor, education. See Internet Governmental organizations (GOs), 64, 1011, 1024. See also Health risks. See Sexually exploited children Nongovernmental organizations Healthcare settings. See Juvenile prostitution Grapes of Wrath, The (John Steinbeck), 142 Hebephilia, 541 Graphical user interface (GUI), 849, 851. See also Windows Help resources GUI; Windows-based GUI knowledge. See Online victimization Gray, Laurence, 1004 public, awareness, 461–462 Great Escape Maneuvers (GEMS) Program, 984 Helping Individual Prostitutes Survive (HIPS), 321 Greece, child sexual exploitation. See Ancient Greece Hematoma, 361f, 373 Greeley, Andrew M., 948–949 Hepatitis, 363, 428. See also Sexually transmitted viral Green notices. See International police hepatitis Groh v Ramirez, 640 health risk, 404 Grooming, 902 Her Majesty's Customs and Excise Service, Paedophile process, 546, 728 Intelligence Unit, 250 techniques, 607 Herpes simplex virus (HSV), 363 usage, 579 HSV-1 / HSV-2, 391 Group arrest, 974 type 1, 363f Group encounter, reality, 974 type 2 lesions, 363f Group of Eight Nations (G8), 627, 1022 Hetaera, 2 Growth hormone, 231 Heterotypic continuity, 289 gTLD. See Generic top-level domain Hidden files (recovery), renamed file extensions (usage), Gucci ad, topless mother/nude infant, 35f 852–853 GUI. See Graphical user interface High Technology Crime Investigation Association (HTCIA), Guislain, Joseph, 252 847 Gynecological examination, 351 High-guard gait, 226 Gynecological surgery, genital trauma (relationship), 377 High-income households, runaways, 313

1066 Index

High-rate offenders, 705 Hypertext markup language (HTML), 472, 631 High-risk situations. See Acquaintance-exploitation cases code, 617 HIPS. See Helping Individual Prostitutes Survive Hypertext Transfer Protocol (HTTP), 617, 631 Hispanic ancestry, characteristics, 225 Hypopituitarism, 238 Historical multiple-victim cases, 558–560 Hypoventilation, 358 History. See Patients obtaining, importance, 380 I History files, 658 I Modi (Pietro Aretino), 6–7 HIV. See Human immunodeficiency virus IACIS. See International Association of Computer Holloway, C., 881 Investigative Specialists Homeless youth, involvement IANA. See Internet Assigned Name Authority medial diagnoses. See Prostitution ICAC. See Internet Crimes Against Children typology. See Survival sex ICANN. See Internet Corporation for Assigned Names and Homelessness, 174, 814 Numbers prevalence, explanation. See Children ICD-9-CM. See International Classification of Diseases, 9th Homosexual activity, 721 Revision Clinical Modification engagement, 570 ICE. See Bureau of Immigration and Customs Enforcement; Homosexuality, stigma, 566 Immigration and Customs Enforcement Host, 631 ICPC. See International Criminal Police Commission Hosting, 631 ICQ, 622f, 631 Hotkiss fashion ad, provocativeness, 34f IDE. See Internet Drive Electronics Household characteristics, 438t–439t Identification process. See Victims HPV. See Human papillomavirus Identified victims, Internet crimes, 875 HSV. See Herpes simplex virus (HSV) Identity HTCIA. See High Technology Crime Investigation Association mistake. See Child pornography HTML. See Hypertext markup language proving, investigative techniques, 657–658 HTTP, 617, 631 IFDTH. See International Federation terre des hommes Human dentition, chronology. See Primary teeth; Secondary IH&RA. See International Hotel & Restaurant Association teeth IINI. See Federal Bureau of Investigation Human immunodeficiency virus (HIV), 392 Illegal activity, Internet usage components, 471–473 antibodies, 364 Illegal Internet usage, 474–482 carrier, 553 Illegal magazines, 199 health risk, 404 Illegal purposes, Internet usage (reasons), 469–471 mother-to-child infection, 73 Illinois risk, 425, 804 physical examination questions/procedures, 385t factors, 399 Image-based world, 28 seroprevalence studies, 342 Images. See Self-made images transmission, 1030 analysis. See Victims risk, 357 circulation process. See Internet vulnerability, 968 deletion. See Computers Human papillomavirus (HPV) (venereal warts), 364f, investigator questions, 627t 391–392 morphing, 899t lesions, 364f offending process, relationship. See Abuse Human Rights Watch, sexual violence study, 75 proof, Ashcroft v Free Speech (impact). See Real child Human trafficking, 735–736, 927. See also Sexual depiction exploitation relationship. See Internet Interpol, influence. See International human sequential order, significance, 796f trafficking/smuggling IMAP. See Internet Message Access Protocol Hushmail, 620 Imipramine, 183 Hustlers, self-perception, 412 Immigration and Customs Enforcement (ICE), 882, 931 Hymen, types, 372f Immigration and Naturalization Service (INS), 928, 931 Hymenal clefts. See Adolescents arrests, 933 Hyperdominance, 251–252 Immigration and Refugee Protection Act (IRPA), 306 case studies, 252 Immigration fraud Hyperlinks, 473 case, 933

1067 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

conspiracy, 935 Inserted pornographic vignettes, 217–218 Imperforate hymen, 372f Instant message, 631 Impossibility defense. See Travelers Institutions, children (involvement), 76 Impression management, 756 Integration programs. See Recovery Incarcerated pedophiles, 719–732 Intelligence analysts, 612 age/race, 724 Intelligence quotient (IQ), deficits, 706 childhood sexual abuse, 725–726 Intent, absence, 665–670 conclusion, 731–732 Intermediate community/mental health support. See Victims criminal convictions/history, 724 Internal Revenue Service (IRS), 928 definitions, 719–720 International Association of Computer Investigative education/employment/volunteer affiliations, 726 Specialists (IACIS), 847 findings, 724–731 International Classification of Diseases, 9th Revision Clinical marriage/adult relationships, 726 Modification (ICD-9-CM), 806 offender childhood/background, 724 codes, 808. See also Children perpetrator, first experiences, 727 determination, 806–809 research methods, 722–724 International Criminal Police Commission (ICPC), 735 victims International Criminal Police Congress (1914), 735 grooming/seduction, 728–729 International Criminal Police Organization (Interpol), 214, offender dynamics, investigation, 715 1012 preferences, 727–728 International Federation terre des hommes (IFDTH), 1014 Incarceration International Hotel & Restaurant Association (IH&RA), difficulties, 407 1016 drawings, 406f. See also Preincarceration drawings International human trafficking/smuggling, Interpol Incest, 220 (influence), 742–744 cases, 554–555 International Labour Organization (ILO), Convention No. showing. See Videotapes 182, 79–80 victims, psychological problems, 91 International Monetary Fund, 317 Inclusion (stage). See Sexually exploited youth International Organization for Migration (IOM), 79 Inclusive DNA, 388 International police (Interpol) Income poverty, 96 achievements, 739–742 Inconclusive DNA, 388 agency cooperation, 739–742 Indictments, samples, 688–691 automatic consultation, 739 Indigenous children, 74–75 computer systems, 738–739 Inducement, 665 data entry, 739 requirement. See Entrapment electronic archiving, 739 Infantilism, 551 General Assembly, 737, 741 Infantilization, 747 General Secretariat, Trafficking in Human Beings Infantiphiles, 250 Branch, 627 Infants individual notices, 737–736 abduction, AMBER Alert (relationship), 986 influence, 742–744. See also International human sadistic abuse, impact, 228 trafficking/smuggling; Macedonia Infibulation, 374, 375f information, country submittal, 614t INHOPE. See Association of Internet Hotline Providers international green notices, 737, 738 Initial assessment. See Victims international legislation, list, 735–736 Initial evidentiary foundation, challenges, 839–840 international yellow notices, 737, 738 Injuries. See Invisible injuries; Physical assault injuries; Sexual poster. See Missing children assault; Soft-tissue injury; Visible injuries protection tools. See Children documentation, 361–366 role, 735 pathognomonic patterns, 802 Specialist Group on Crimes Against Children, 740, 741 Inner-city children, dangers, 1032 structure/administration, 736 Innocent Images National Initiative (IINI). See Federal trafficking records, 743 Bureau of Investigation Working Party, 740 Inoculation injuries (results), preemptive/preventive/ International trafficking prophylactic therapies, 392–393 extent, 99 INS. See Immigration and Naturalization Service prohibition, laws, 310

1068 Index

sexual purposes. See Children sexual exploitation Internet diverse hazards (prevention), material (creation), 460 access, process, 655 growth, 203 accessibility, 470 sexual solicitations. See Youth accident, sample questions, 698 sexually explicit material, intrusiveness, 459 activities, 457 solicitations. See Undercover law enforcement officers addiction, 668 suspects, identification, 611 advantages, 471 targets. See Children affordability, 470 technical challenges, 625–626 anonymity, 470–471 temporary files, 658 basics, 613–616 therapeutic research, social worker claim, 670 behavior standards (cleanup), youth (mobilization), 462 threats, 623–624 child abuse material, 793 time, importance, 625 child pornography trader/traveler cases, 613 analysis, testimony, 829–830 trading examples/history, 262t, 263f problem, 266 undercover technique, 628 children usage. See Child pornography; Child sexual exploitation; abusive images, 257 Illegal Internet usage; Sexually deviant Internet erotica, 239 usage; Twentieth century; Twenty-first century exploitation cases, 629–630 components. See Illegal activity; Sexually exploitation cases, investigation, 609 deviant activity involvement, sample questions, 695 reasons. See Illegal purposes; Sexually deviant sexual exploitation, usage, 475 purposes composite variable statistics, 446t use patterns. See Youth crimes. See Identified victims users, tracing, 625 areas, identification, 611 victimization, addressing. See Nonsexual Internet concerns, 628 victimization; Sexual Internet victimization evidence, location, 613–616 victims, identification, 626–628 friendships Web site banners, 226. See also Videotapes appearance. See Adults Internet Assigned Name Authority (IANA), 613, 631 formation/risk. See Adults Internet Corporation for Assigned Names and Numbers government regulation, 655 (ICANN), 613, 631, 632 sample questions, 694 Internet Crimes Against Children (ICAC), 15–22, 205, 880 hazards, health/school/family counselor education, federal partners, 882 462–463 network, usage, 212 hotlines, 1019 statistics, 881–882 hunting ground, 873–874 Task Force, 211, 600, 626, 881–882. See also Dallas images Police Department circulation process, 261–265 arrests, 1036 relationship, 792–794 creation, OJJDP authorization, 211, 881 information, usefulness, 617–618 locations, 881f investigation problems, 617 programs, expansion, 1046–1047 investigation task forces, 612–613 Internet Drive Electronics (IDE), 841 investigator, role, 613 Internet Message Access Protocol (IMAP), 632 offensive acts (illicitness), laws (need/enactment), 463 Internet pedophilia, 789, 792 offensive behavior, reporting, 461–462 historical perspective, 789 offensive experiences, youth encounters, 458 law enforcement difficulties, 789–792 one-stop shop, 470 Internet Protocol (IP), 18, 615, 632. See also Transmission patrolling, 611–613 Control Protocol/Internet Protocol protocol address tracing, 624–625 address, 1022 role. See Child sexual abuse information, 623 history. See Sexual exploitation usage. See Offenders sexual crimes Internet Relay Chat (IRC), 245, 615, 618–619, 632 law enforcement response. See Minors access, 619f studies, 875–877 channels

1069 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

dedication, 637 help, obtaining, 940–941 descriptions, 619t hidden truth, 927 files, 846 investigation protocol, 261 problems, 934–935 usage, 790 solutions, 933–934 Internet Service Provider (ISP), 18, 632 team approach, 931–933 information, 636 lessons/best practices, 941 liaison, 609 IOM. See International Organization for Migration youth, disclosure, 451 IP. See Internet Protocol Internet travelers, 873 IPV. See Intimate partner violence federal government response, 880–884 IRC. See Internet Relay Chat jurisdiction, 884–886 Irish Garda, 741 federal law, 885–886 IRPA. See Immigration and Refugee Protection Act state law, 884–885 ISP. See Internet Service Provider theoretical issues, 884 IVP, 370, 380 law enforcement response, 878–880 legal issues, 884–891 J problem, addressing, 878–884 Jacob Wetterling Foundation, 979t Internet-accessible computers, 1034 Jacobsen v United States, 888 Internet-based crimes, problem, 609 Jamelske, John, 986–987 Internet-related possession/distribution/trading. See Child Jimmy Ryce Center for Victims of Predatory Abduction, pornography 979t Internet-related sex offenders, evaluation/treatment Jimmy Ryce Law Enforcement Training Center, 983 recommendations, 482–483 goals, 984t Interpersonal relationships, 424 Joint Commission on the Accreditation of Healthcare Organizations, 432 Interpersonal skills, 706 Jones, Christal Jean, 1031 Interpol. See International Criminal Police Organization; Jones, Dave, 883 International police Journalism Interstate operations, 880 publications/Web sites, 1004t Interstate travelers, 877–878 values, 995–996 Interviewer. See Children; Patients Journalists background, 579 attitudes, improvement, 1003–1004 tips. See Victims deadlines, 994 Interviewing tips, 607t prizes, examples, 995t Interviews. See Juveniles; Rapport-building interview; understanding, 994–995 Victims Jurisdiction, definition, 884 conclusion. See Patients Jury selection. See Child pornography Intimate partner violence (IPV), 423 Justice investigation, obstruction, 934 impact. See Pregnancy Juvenile courts Intrafamilial child sexual abuse, 531–532, 557 cases, 713–714 Intrafamilial molester, 533 current status, 712 Intrastate travelers, 877–878 establishment, 711 Intravenous pyelogram (IVP), 370, 380 history, 711–712 Intrusion defense, defeating. See Computers participants, roles, 712t Investigation, issues, 750t sexual exploitation, 711 Investigative abilities, development. See Child sexual system, problems, 713 exploitation Juvenile justice system Investigative trifecta, 606 changes, 147–150 Investigator survivor perspective, 129 definition, 537 Juvenile prostitution, 712–713 role, 605–608 healthcare settings, 397–399 types, 609t historical perspective, 338 Invisible injuries, 390 prevention, 420 Involuntary servitude, 937 psychosocial context, impact, 337. See also Prostitution; background/discovery, 929–931 Sexual exploitation

1070 Index

questions, 403 Labia adhesions, 371 victims, community/mental health support, 397 Labia majora/minora, texture/size, 370 Juveniles Laboratory testing, 387–388 behavioral assessment, 408–409 Laceration, 430 boys, special issues, 412–413 Lack of consent cases, 561 communication/trust, establishment, 399–409 Lack of intent. See Intent confidentiality, rules (establishment), 401 Landesman, Peter (article), 743 detention facilities, 399 Landslide Productions, 264, 599–601 developmental assessment, 408–409 Lanning, Kenneth, 873, 880 drug history, information request, 404 Lateral decubitus position, 360 emotional assessment, 408–409 Latham, Beatrice, 11 family history, obtaining, 401–402 Law, Bernard F., 948 initial assessment, 401–406 Law enforcement. See Canada; Mexico institutions, expansion (belief), 147 approach. See Rural America; Shadow children interviews, 401–406 authorities, skepticism, 412 contextual elements, choices, 401 difficulties. See Internet pedophilia long-term prognosis, 419–420 false statements, 935 physical abuse, questions, 403–404 investigators, 569 psychiatric assessment, 406–408 national/international cooperation, 884 rapport, building, 401 officers, Internet solicitations. See Undercover law runaway behavior, inquiry, 404–406 enforcement officers safe environment, providing, 412–413 officials, INHOPE interaction, 1022–1023 school history, inquiry, 402 partnerships, 209–212 self-injurious thoughts/behaviors, assessment, 402–403 response. See Internet travelers; Minors sexual abuse, questions, 403–404 role. See Acquaintance sexual exploitation social support systems, inquiry, 402 struggles, 878–879 therapeutic approaches, 413–418 success, case studies, 209 treatment program, example, 417–418 testimony, 756 Law on Extraterritorial Legislation, 79 K Laws, Richard, 279 Kama, 5 Laxmi (rape), example, 88–89 Kanka, Megan Nicole, 983. See also Megan Nicole Kanka Lay opinion, usage. See Age Foundation LCR, 363 KaZaA, 623 Kemadrin, 183 Leach, Kimberly, 989 Kiddie porn, 30 Legal assistance, access, 356 Kidnappings. See Stereotypical kidnappings Legal impossibility. See Children; Travelers Kill switches, 645 contrast. See Factual impossibility King Mafia Crips, 16 Leighton, Jill, 1031–1032 Klaas, Polly, 983, 983t. See also Polly Klaas Foundation Let Kids Be Kids KlaasKids Foundation, 979t brochure, 47f Klein, Calvin (ad). See Eyes; Moss; Posture; Shields campaign, 46–47 child pornography, borderline, 35f Leviticus, Book of, 2 children, display (ad), 36f Liddell, Alice (photograph), 11f jeans, 34f Lie detection devices, 587 male model, underwear display, 42f Lie detector. See Sexual lie detector Klinefelter's syndrome, 238 Life Cycle of Groups, 972 Klismaphilia, 251 stages, 972t case studies, 251 Life skills. See Childhood sexual exploitation industry victims Knowledge (absence), impact. See Children absence. See Children; Victims Kos, Rudy, 951 Ligase chain reaction (LCR), 363 Kramer, Karen, 75 Likelihood to Sexually Harass (LSH) Scale, 38 Kumho Tire Company, Ltd v Carmichael, 842, 844 Link, 632 Local travelers, 877 L Logistic regression findings. See Data Labetalol, 358 Lolita, 896t

1071 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

London Metropolitan Police, Paedophile Unit, 257 (AAP), 48 Long-arm statutes, 884–885 Medical care. See Children of the night Long-term community/mental health support. See Victims Medical emergencies, 356–358 Long-term therapy, goals. See Victims Medical evidence. See Acquaintance-exploitation cases Long-term victim impact, 801 Medical expert Long-term vision, principle, 977 input. See Child sexual exploitation Louisiana, Children's Code (Article 801), 712 involvement. See Witnesses Lovability, belief. See Children; Victims qualifying examination, template, 807t–808t Love, misplacement, 755 testimony, types, 810–812 Love Letter virus, 18 Medical history. See Child sexual abuse LSH. See Likelihood to Sexually Harass Medicine Wheel, 970. See also North American Aborginal Lu, Hsu (police interrogation), 93 Medicine Wheel Luteinizing hormone, 231 components, 971f Meese, Edwin, 597 M Meese Commission. See Commission on Obscenity and Macedonia (Republic of) Pornography Interpol, influence, 742 Megan Nicole Kanka Foundation, 979t Law on Public Order and Peace (criminal code), 742 Megan's law, 291, 319, 759, 983 Macho/machismo culture, impact. See Children Mekong subregion, prostitution, 63–64, 72, 76 Madams, 745 Memoirs of a Woman of Pleasure / Fannie Hill (John Cleland), 8 Mahari, 5 Mens rea, proof, 665 Maison Marie Frederic, 308 Mental health Maladaptive behaviors, 404 clinics, 398–399 Male-dominated gangs, involvement, 402 support. See Juvenile prostitution; Victims Male-male rape, trauma, 412 Mentally retarded or developmentally delayed (MR/DD) Males adult men, 283 genitalia development, Tanner stages, 236f Mentally retarded or developmentally delayed (MR/DD) involvement programs, 147 clients, 290 normal genitalia, 370 Message Digest 5 (MD5), 861 offenders, 559 case information header, 861–862 PH development, Tanner stages, 236f hash, 849, 857 straddle injury, 373 hash values, 207, 848, 850 victims, 560 acquisition, 862 Male-target pedophiles, 720–721 generation, 863 Mann Act. See White Slave Traffic Act separation, 861f Manufactured jurisdiction defense, 887–888 storage, 861–862 Marginalization, 337 Messenger programs, 615, 622 Mariscal, Angel, 601–602 types, 622f Marketing machine, impact, 52–53 Meta-analyses, 195 Marriages. See Early marriages Method of operation (MO), definition, 539–540 relationships. See Incarcerated pedophiles Mexico Marris, Jacqueline, 987 child pornography, 311–312 Masculinity, hegemonic constructions, 35 children, profiles, 309 Masochism, 551 CSEC, 304–321 Masochistic abuse, 647 activities, 312 Massage saloon, reference, 742 children, special risk, 314t–315t Masturbation, 647 exploiters, profiles, 309–310 excess, 822 law enforcement, 311 Matthew Dickey v Steris Corporation, 863–864 national legislation, 311 McGlone, Gerard, 953 online sexual victimization, 311–312 McVeigh, Timothy, 916 political/economic characteristics, 299t–301t MDTs. See Multidisciplinary teams population/health/social characteristics, 302t–303t Meaningful exchange, principle, 977 prevention/prosecution/protection programs, 311 Media, help, 993 private sector, role, 312 Media Matters: A National Media Education Campaign STDs, commonness, 309

1072 Index

trafficking, 310 Multijurisdictional task forces (MJTFs), 1046 Microsoft Network (MSN), 624 expansion. See Child sexual exploitation Messenger, 622f Multiple CD-ROM sessions, deleted files (recovery), 853–854 Middle Ages, child sexual exploitation, 4–6 Multiple child victims, involvement, 237 Middle East, child prostitution, 66 Multiple offenders, 554, 558 Middle-income households, runaways, 313 Multiple victims, 558 Mid-guard gait, 226 cases. See Historical multiple-victim cases; Migrants, smuggling, 736 Multidimensional multiple-victim cases Miller v California, 900 investigation, 588–593 Minnesota Multiphasic Personality Inventory (MMPI), 291 types, 558–560 Minority (proof), computer forensics (usage), 662 Multiple-victim exploitation case, 589 Minors Munchausen syndrome, 580–581 exploitation, 799 Munchausen syndrome by proxy, 581 Internet sexual crimes, law enforcement response, 875–876 Murder, definition, 886 sexual abuse, 752 Musculoskeletal development, 231 sexual exploitation, federal statutes, 898t–899t Musculoskeletal maturation, signs, 231 transportation, 788 My Secret Life, 10 Mirror image hard drive, 862 Missing children N congressional findings, 883t N. gonorrhea. See Neisseria gonorrhea Interpol poster, 738 NAATs. See Nucleic acid amplification tests Missouri Sex Offender Treatment Program, 723 NAFTA. See North American Free Trade Agreement Mistake of age. See Children NAMBLA. See North American Man/Boy Love Association defense, 665. See also Child pornography Narcotic addictions, 148 Mistaken identity. See Child pornography National Advertising Review Board, 45 Mitochondrial DNA, PCR (usage), 388 National Advertising Review Council, 43 MJTFs. See Multijurisdictional task forces National Association of Elementary School Principals, 988 MMPI, 291 National Association of Secondary School Principals, 988 MO. See Method of operation National Center for Health Statistics, 806 Modem, 632. See also Cable modem National Center for Juvenile Justice, 1045 Molestation, 716. See also Children National Center for Missing & Exploited Children Molester. See Intrafamilial molester; Preferential-type child (NCMEC), 15, 882–883. See also CyberTipline; molesters; Situational-type child molesters Exploited Child Unit behavioral analysis. See Acquaintance child molesters background, 882 pedophile, contrast. See Child molester creation, 203 understanding. See Preferential molester function, 612–613 Molluscum contagiosum, 392 logo, 203f Money laundering, 752 victimization study, 437 Mood disturbances, 77 Web site, 875 Moore, Fleisha, 987 success, 882 Morpheus, 623 National Center for Prosecution of Child Abuse, 1035 Morphing, 216. See also Images National Center for the Analysis of Violent Crime Moss, Kate (NCAVC), 550, 559 Calvin Klein ad, 32f National central bureaus (NCBs), 736–737 Obsession (Calvin Klein) ad, 32f National Child Protection Training Center (NCPTC), 1035, Motivation continuum, 545t 1037 MR/DD. See Mentally retarded or developmentally delayed National Child Sexual Exploitation Intelligence Center MRI, 391 (NCSEIC), 1045 MSN. See Microsoft Network establishment, 1045 MTV, advertising, 38 National Child Victim Identification Program (NCVIP), 626 Multidimensional multiple-victim cases, 558–559 National Coalition for the Homeless, 143 Multidisciplinary teams (MDTs), 952 National contact, network development, 1035 cooperation, 92 National Crime Squad (United Kingdom), 600 faith-based community, member involvement, 954 National District Attorney's Association, 955t Multijurisdictional cases, 211–212 National Domestic Violence Hotline, 432

1073 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

National Health and Nutrition Examination Survey III success, 998–1003 (NHANES III), 232, 236 impact, 996–998 National Incidence Study of Missing Abducted Runaway and interaction. See Children Thrownaway Children (NISMART), 989–990 reporters, interaction, 1005–1006 National Incidence Study of Missing Abducted Runaway and writing, 994 Thrownaway Children-2 (NISMART-2), 109, 312, Newsgroups, 632, 895t. See also Usenet newsgroups 990–991 posting, screen capture, 621f National Institute of Child Justice, 828 reference, screenshot, 871f National Institute of Mental Health (NIMH), 279 relation. See Child sexual exploitation National Institute of Standards & Technology (NIST), 841 usage, 245, 472 National Law Center on Homelessness and Poverty, 142 NGOs. See Nongovernmental organizations National Organization of Circumcision Information NHANES III, 232, 236 Resource Centers (NOCIRC), 376 NIMH, 279 National Policing Plan (United Kingdom), 790 Nineteenth century National Science Foundation Internet site (NSFNET), 18 child sexual exploitation, 9–11 National sex offender registry (NSOR), 1044 family lifestyles, changes, 10 National Survey of Violence Against Women (NSVAW), 427 government regulation, 9–10 National Surveys of Children, data, 38 photography, influence, 10–11 National Tourism Administration (Brazil), 1014 NISMART, 989–990 National Youth Crisis Hotline, 432 NISMART-2, 109, 312, 990–991 Naval Criminal Investigative Service (NCIS), 882 NIST, 841 NCAVC. See National Center for the Analysis of Violent Nitrates, 358 Crime Nitroprusside, 358 NCBs. See National central bureaus NNTP, 620, 632 NCIS. See Naval Criminal Investigative Service NOCIRC, 376 NCMEC. See National Center for Missing & Exploited No-knock warrants, 645 Children Noncontraband evidence, examples, 640 NCPTC. See National Child Protection Training Center Nonexclusive pedophiles, 246 NCSEIC. See National Child Sexual Exploitation Intelligence Nonexclusive type pedophiles, 720 Center Nonfamily abductions. See Attempted nonfamily abductions NCVIP. See National Child Victim Identification Program Nongenital injuries. See Assault victims Necrophagia, 253 Nongovernmental actors, Fourth Amendment Necrophilia, 252–253, 551. See also Pseudo-necrophilia (nonapplication), 645 case study, 253 Nongovernmental organizations (NGOs), 20, 59, 64, 1024 types, 252 cooperation, 739, 740 Neglect, pertinence, 804 issues, 71 Neglected girls, antisocial/delinquent lifestyle development. lobbying, 1010 See Abused/neglected girls posters, distribution, 738 Neglected girls/women, derailment mechanisms. See rescue actions, 78 Abused/neglected girls/women Nonhumanitarian sanctions, 317 Neglected-status offenders, escalation. See Criminal offenses Nonmarital relationships, 414 Neiman, Bill (testimony), 14 Nonsexual behavior, 537 Neisseria gonorrhea (N. gonorrhea), 363, 391, 392 Nonsexual Internet victimization, addressing, 461 Nepal, child rights issues, 86t Nonsexual violence, genital trauma (relationship), 374–378 NetSmartz, 875 Nonsexually explicit pornography, 911–912 Network, 632 Nontrade sanctions, 317 Network News Transfer Protocol (NNTP), 620, 632 Nonwhite victims, 727 Network Time Protocol (NTP), 625, 632 Noonan's syndrome, 238 New Scotland Yard, 250 North America New York Society for the Suppression of Vice, 10 affluence/poverty, paradox, 299–304 New York v Ferber, 659, 900–902 CSEC, 297 News elimination, 321 attention, getting, 1004–1005 North American Aborginal Medicine Wheel, 970f coverage North American Free Trade Agreement (NAFTA), 16, 100 impact, 993 study, 111

1074 Index

North American Man/Boy Love Association (NAMBLA), strategies, 562–567 199, 896 surveillance, 738 agreement, 913 tracking, IP usage, 616t children, sex advocation, 222 typology, 542–551. See also Sexual offenders contact information, 472 problem areas, 551–556 essays, 916 victims, bonding, 566 involvement, charges. See Online sex rings Offending behaviors, nature, 264–265 joining, 911 Offending process, relationship. See Abuse images language, usage, 900, 909 Office of Juvenile Justice and Delinquency Prevention mailing list, 918 (OJJDP), 1027 newsletter, 473 authorization. See Internet Crimes Against Children organization, 897 image research, 31 spokesman, interview, 911t Office of the Victims of Crime Bulletin, 874 support. See Child pornography Office of Victims of Crimes, 759 network, 539 Off-street incomes, 969 vertical conspiracy liability, 912 O'Grady, Ron, 43 Web site, 248 Ohio Rules of Evidence 901, 863 North Carolina Pediatric Society, 47 OJJDP, 1027 NSFNET. See National Science Foundation Internet site Old Testament, child sexual exploitation, 2 NSOR. See National sex offender registry Online enticement, 881 NSVAW. See National Survey of Violence Against Women Online exploiter, victimization (minimization), 610t NTP. See Network Time Protocol Online messages, terms, 895t Nuclear DNA, polymerase chain reaction, 388 Online molesters, invisibility, 874 Nucleic acid amplification tests (NAATs), 363 Online service providers, 624, 632 Nude stimuli, inappropriate usage, 282 Online sex rings, 896, 899 Nuisance sex offenders, 547, 552–554 NAMBLA involvement, charges, 921 assessment, 553 Online sexual solicitations corroboration, 553 response. See Youth evaluation, 553–554 targets. See Youth importance, 552–553 Online sexual victimization. See Canada; Mexico; United progression, 552 States substitution, 553 Online victimization. See Youth definition, 440t O help resources, knowledge, 457–458 O (movie ad), 37f incidence, 439 Objectivity, belief, 995 offenses/offenders, diversity, 458–459 Obscene Publications Act (Lord Campbell), 10 parental concern, 457 Obscenity investigations. See United States Postal Inspection research Service materials, 464 Observed behavior, overlap. See Reported behavior need, 463 Obstetrical complications, 376 risks/remedies, 457–458 Occam's Razor, 608t youth, information, 437 OECD. See Organization for Economic Cooperation and Online Victimization; A Report on the Nation's Youth, 876–877 Development Operation Avalanche, 599–601, 791, 882 Offenders. See Adolescents; Combination offenders; Females; Operation Candyman, 264 Males; Multiple offenders; Nuisance sex offenders Operation Hamlet, 1025 assessments. See Sexual offender assessments Operation Lost Innocence, 601–602 childhood/background. See Incarcerated pedophiles Operation Marcy, 1025 comparison, 725f, 727f Operation Ore, 791 control, 562–563 Operation Predator, 882 gender, 109f Operation Sedan, 795 location, 878 Operation Starburst, 789 physical condition. See Southern Asia Operations. See Interstate operations; Sting operations; predator nature, 730 Travelers; Undercover operations relationship, 111f Opioids, 197

1075 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Oppositional defiant disorder, 228 Patrons, 745–746 Orchid Club, 836–837, 896–897 Patz, Etan, 980, 980f agreement, proof, 913 Paul & Lisa Program, 759 child pornography distribution, 914 PCL. See Hare Psychopathy Checklist conspiracy, 915 PCL-R. See Hare Psychopathy Checklist-Revised liability, creation, 919 PCL-YV. See Hare Psychopathy Checklist: Youth Version Internet existence, 911 PCR. See Mitochondrial DNA; Polymerase chain reaction Organization for Economic Cooperation and Development Pederasty, presence. See Ancient Rome (OECD), 1022 Pediatric endocrinologist, expert opinion, 664 Organization for Security and Cooperation in Europe Pedophiles, 535, 596. See also Female-target pedophiles; (OSCE), 1022 Incarcerated pedophiles; Male-target pedophiles Original electronic evidence, 857 child pornography collections, 247–248 Orphaned children, 73 contrast. See Child molester Osborne, Clarence, 721 definition, 541–542, 719–720 Osborne v Ohio, 900, 903 distortion, glamorization, 31f OSCE. See Organization for Security and Cooperation in DSM-IV-TR definition, 720 Europe paraphernalia, 560 Osteometry, 224 population, 721–722 Outcomes, commitment (principle), 977 search difficulties, 873–874 Outrageous government conduct defense, 887–888 sexual motivations, 560 Overbreadth. See Search issues victim/offender dynamics, investigation. See Incarcerated cases, examples, 641 pedophiles Ovid. See Ars Amatoria Pedophilia, 246–248. See also Internet pedophilia; Web-based pedophilia P definition, 719–720 P2P. See Peer-to-peer DSM-IV-TR Pakistan, women (violence), 87t definition, 720 Paraphilias, 551 diagnosis, 246 definition, 243, 539 knowledge, 731 DSM-IV-TR recidivism rates, 721 analysis, 243–244 Peer review/publication, 840 definitions, 539 Peer support examples. See Clinically identified paraphilias access, 969 listing, 244t model. See Exiting; Healing relationship. See Child sexual abuse PEERS. See Prostitute Empowerment Education and types, 248–253 Resource Society Parental concern. See Online victimization Peer-to-peer (P2P), 632. See also Distributed P2P Parentified child, 413 networks, 623 Parents Pelvic inflammatory disease (PID), 357, 376, 390 child discussions, importance, 50 Penetration, concept, 578 communication, establishment, 592–593 Penile length, 370 education, 1034 Penile plethysmography (PPG), 281–284 role. See Acquaintance-exploitation cases application, inappropriateness, 282–283 Parents Anonymous, 952 examination, 290 Parole searches, 646 procedure, standardization (absence), 283–284 Partialism (exclusion), US titles (involvement), 9t results, inappropriate use, 283 Participation, principle, 976 techniques, 282 Particularity. See Search issues usage, ethical issues, 282–284 cases, examples, 640 People v Arapahoe County Court, 652 Password, 632 People v Foley, 658 protection, 626 People v Fraser, 670 Patients People v Lagashi, 838–839, 842 history, 380–384 People v Mormon, 842 interview, conclusion, 383–384 People v Rodriguez, 841 interviewer, 382–383 People v Slusher, 646

1076 Index

People v Weston, 890–891 predators, comparison, 426 Perianal scarring, 362f seduction scenarios, 1031 Periurethral bands, 371 sponsors, 803 Permission-giving beliefs, 169 Pin-up model, child model, 29f Perpetrators Plain view exception, 643–644 excitation, pornography (usage), 230 Playboy cartoons, child sexual abuse (trivialization), 31f first experience. See Incarcerated pedophiles Playground predators, 460 partial image. See Videotapes Plethysmography, 291. See also Penile plethysmography specialized studies, increase, 1048–1049 Pneumocystis carinii, 392 Perry v State, 912 Point-of-presence (POP), 615, 632 Persistent offenders, 705 Polaris Project, 744 Person, definition. See Young person Polaroid Macro 5 system, 431 Personal firewall, 632 Polaroid Spectra Law Enforcement camera, 431 PH. See Pubic hair Polleros, 309–310 Pharaonic circumcision, 374, 375f Polly Klaas Foundation, 979t, 983 Philippines, child prostitution, 64–65 Polygraph usage, ethical issues, 286–288 Phoenix House, 308 Polygraphy, 291 Photocolposcope, usage, 361 application, inappropriateness, 287 Photographs deception, usage, 288 distribution, 901 limited theoretical basis, 286–287 documentation. See Prostituted adolescents usage, 286–288 evidence, 220–221 validity, absence, 287 receipt, 214–215 Polymerase chain reaction (PCR), 363. See also Nuclear DNA Photography, influence. See Nineteenth century usage. See Mitochondrial DNA Photojournalists, pressure, 994 POP. See Point-of-presence Phthirus pubis, 392 POP3. See Post Office Protocol Physical abuse Pornographic material, nature, 193–194 questions. See Juveniles; Victims Pornographic vignettes. See Inserted pornographic vignettes victims, 718 Pornography. See Child pornography; Toddlers Physical assault injuries, 409–410 child seduction, relationship, 229–231 Physical child abuse case, expert testimony (components), 803 clinical psychologists, concerns, 196–197 Physical evidence, 585, 599 damage. See Children consideration. See Children empirical research, 195–196 Physical examination, 384–387. See also Child sexual abuse federal statutes, 46t examiner, identification, 386 forms, First Amendment acceptance, 221 location, 386 impact. See Twentieth century; Twenty-first century objectives. See Assault victims understanding. See Adults; Children process, 386 influence, 194–197 reasons, 386–387 literature, relationship. See Renaissance timing, 386 relationship. See Advertising Physical examiners, checklist, 384t ring, charging, 921–922 Physical sexual abuse, 61t usage, 230, 579. See also Children; Perpetrators Physical sexual maturation, 232–238 Possession, question, 669 Physical victimization, 352–353 Post Office Protocol (POP3), 632 clinical evaluation/management, 358–366 Postcoital contraception, 392 conditions, 358–361 Posterior vestibule scar, 362f Physiological measures. See Sexual arousal/interest; Viewing Post-traumatic stress syndrome (PTSD), 174, 398, 408, time 824t. See also Chronic PTSD Picquerism, 252 components, 816, 824, 828 PID. See Pelvic inflammatory disease incidence, 813 Pied pipers, 567 mental health diagnosis, 805 Pierce, William L., 916 result, 399 Pimp-controlled prostitution, 104t suffering, 429, 968 Pimp-controlled relationships, 426 symptoms, 823 Pimps. See Extrafamilial pimp Posture, vulnerability (Calvin Klein ad), 33f

1077 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Poverty Producers, mistake-of-age defense. See Child pornography desperation, 1028 Production (stage). See Sexually exploited youth impact. See Children Profiling, usage, 550–551 paradox. See North America Project HOPE International, 321 Power Project Prosper, 1032 belief. See Children; Victims Prone knee-chest position, 360 impact. See Children Pro-pedophile groups, 473 Powerlessness, impact. See Children Prosecutorial economy, 650 PowerPoint Prosecutorial Remedies and Other Tools to end the presentation, 858 Exploitation of Children Today Act (PROTECT usage, 851 Act), 20, 320, 880 PPG. See Penile plethysmography creation, 215, 986 Prada ad (stalking), 36f definition. See Sexually explicit conduct Predators, comparison. See Pimps Prostitute Empowerment Education and Resource Society Predatory adult solicitation. See Youth (PEERS), 307, 308 Predication, examples, 611t Prostituted adolescents Predisposition, proof, 666–667 clinical presentations, 429–431 Preferential child molesters, 588 documentation, 430–431 Preferential child sex abusers, 310 intimate partner violence, 423 Preferential molester, understanding, 590–591 photographic documentation, 431 Preferential offenders, 591 safety planning/referrals, 431–432 Preferential sex offenders, 546, 559–560 screening, 429–430 Preferential-type child molesters, 547–548, 554 Prostituted children Pregnancy, 181, 967 genital trauma, causes, 389 coincidental genital trauma, 374 victims, treatment, 751 diagnostic testing, 364 Prostituted males, 1029 IPV, impact, 427 Prostitutes, 186 physical consequences. See Early pregnancy victim/offender dynamics, investigation, 715 prophylaxis, 352 Prostitution. See Juvenile prostitution; Mekong subregion; Preincarceration drawings, 406f Temple prostitution Prepubertal child, vulvovaginal symptoms (etiology), 378t children Prepubertal female, gonorrhea/trichmoniasis, 356f involvement/increase. See Southeast Asia Prepubertal girl, vaginal bleeding (differential diagnosis), 371t children, selection, 754 Prepubescence, 723 definition, 204 Pre-seduced victim, 565 deterrence. See Sexual crimes Pretrial evidentiary hearing, 846–847 experience, 190 Pretrial preparation, 825 health consequences, 428 Pretty Woman homeless youths media images, 1027 involvement, psychosocial interview, 343t–344t movie ad, 41f medical diagnoses, 343t Priapism, 3 impact. See Twentieth century; Twenty-first century Primary (deciduous) teeth, human dentition (chronology), 233t infantilization, 747 Primary victim impact, 715–719 international sanctioning, 424 background information, 717–718 investigation/prosecution. See Child prostitution consequences, 718–719 legalization, 425 Prince v Massachusetts, 901t lifestyle, 754 Prison drawings, 406f, 408f male violence, relationship. see Women Private searches, 645 psychosocial factors. See Childhood Private sector, role. See Canada; Mexico research. See Adults; Child prostitution Privilege defense, 656 risk, increase, 704 Proactive investigative approach, 591–592 seasonal problem, 717 Probability scores, 284 solution. See Boys Probation searches, 646 victimless crime, 753–754 Problematic victims, sample questions, 695–696 victims, reasons. See Children Prodigy, 635 Prostitution-related activities, 305

1078 Index

PROTECT Act. See Prosecutorial Remedies and Other Tools Recovered data to end the Exploitation of Children Today Act authentication, 835–840 Protection of Children Against Sexual Exploitation Act, 596 recovery process, authentication, 837–839 Protection of Children from Sexual Predators Act, 885 Recovery. See Child sexual exploitation; Developing countries Protective orders, sample, 653f integration programs, 79 Protocol, 632 Rectocele, 377 Pseudo-necrophilia, 253 Redirection, 632 Psychiatric assessment. See Juveniles; Victims Regional Internet Registries (RIRs), 632 Psychiatric symptoms/diagnoses, 355 Registrar for Internet Numbers in Europe (RIPE), 624, 632, Psychological abuse, categories, 805t 633 Psychological assistance, access, 356 Rehabilitative testimony, 812 Psychological distress, symptoms, 342 Rehearsal process, 546 Psychological profiles. See Child sexual exploitation; Victims Rehkemper, Robert, 949 Psychopathy Relapse, 974 checklist. See Hare Psychopathy Checklist Remailers, 470, 633 measurement, 288–289 Renaissance Psychosexual maturation, 228–229 child sexual exploitation, 6–8 Psychosocial context. See Juvenile prostitution pornography, literature (relationship), 8–9 Psychosocial factors. See Children Renal failure, 358 PTSD. See Post-traumatic stress syndrome Renamed file extensions, usage. See Hidden files Puberty, onset, 825 Repeatedly raped victim. See Southern Asia Pubic hair (PH) development, 232. See also Females; Males Report Expertise Acceleration Contacts Trends (REACT), Public-private partnerships, promotion. See Child sexual 1022–1023 exploitation Reported behavior, observed behavior (overlap), 821f Published materials, evidence, 220–221 Reported missing Pumbroek, Thea, 14, 223, 801 episodes, 991t Puritanism, child sexual exploitation, 7–8 term, usage, 991 Reporters, interaction. See News Q Request For Comment (RFC), 633 Quayle, Ethel, 741 documents, 615 Quill, 1004 Rescue/reintegration. See Child sexual exploitation; Developing countries R Research Action and Information Network for Bodily Rachael Alert system, 984 Integrity of Women (RAINBO), 376 Racketeering Influenced and Corrupt Organization (RICO), Resolution (stage). See Sexually exploited youth 752 Restavek, 75 Radiographic studies. See Children Restriction Fragment Length Polymorphism (RFLP), 388 RAINBO, 376 Review studies, 195 Ramsey, JonBenet, 30 RFC. See Request For Comment Rape survivors, 85 RFLP. See Restriction Fragment Length Polymorphism background, 85–87 Rhabdomyolysis, 358 psychology, 89–90 Rhodes, Robert, 911t, 918 Rape victims. See Southern Asia Rice v Paladin Enterprises, 908–909 crime, nonreportage reasons. See Southern Asia RICO, 752 investigation. See Southern Asia RIPE. See Registrar for Internet Numbers in Europe needs/responses, 91 RIRs, 632 Rapes, 174, 967. See also Statutory rape Risk-taking behavior, 706 physical evidence, 92 Rite of passage, 555 preference, 243 Ritual Rapport-building interview, 400 concept. See Sexual ritual RCMP, 307 definition, 539–540 REACT. See Report Expertise Acceleration Contacts Trends usage, 579 Reactive cases, 876 Rome, child sexual exploitation. See Ancient Rome Real child depiction, image proof (Ashcroft v Free Speech Rosenbloom, Arlan L., 233, 663 impact), 659–661 Royal Canadian Mounted Police (RCMP), 307

1079 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Rule 1001, 857 expert opinion, 638 Runaways, 339–340. See also Girls; Situational runaways; probable cause, 636–637 Women Searches. See Parole searches; Private searches; Probation behavior, inquiry. See Juveniles; Victims searches; Warrantless search definition, 990 Seattle Post-Intelligencer, 1004 detention, 144–147 Second World Congress Against Commercial Sexual jail (transition), first offense, 133–134 Exploitation of Children (2001), 20, 39, 42, 78 potential, predatory adult solicitation. See Youth preparatory conference, 66 status, 98 Session Statement, 752 tendencies, 356 Second World Congress East Asia and Pacific Regional Rural America, children (commercial exploitation), 1027 Consultation, 1048 introduction, 1027–1028 Secondary harmful effects, 195 law enforcement, approach, 1032 Secondary (permanent) teeth, human dentition (chronology), Rural communities, child protection (steps), 1033t 233t Ryce, Jimmy, 983–984, 983t. See also Jimmy Ryce Center for Sector by sector search, warrant excess, 864 Victims of Predatory Abduction Seduction. See Children; Victims control, 560 S process, 563–565 Sade, Marquis de, 8–9, 251 understanding, 588–590 Sadism, 251–252, 551 relationship. See Pornography case studies, 252 traps, complexity, 801 Sadistic abuse, 227, 647 usage, 579 impact. See Infants; Toddlers Seizures, 358 Sadistic preferential offenders, 589 issues. See Child pornography SAFE. See Sexual Assault and Felony Enforcement items, description, 639 SafeMessage, 620 Self-blame, 815 Safety contract, signing, 403 increase, 822 SAGE. See Standing Against Global Exploitation Self-destruction, 1030 Same-sex relations, 340 Self-esteem Same-sex relationships. See Coercive same-sex relationships decrease, 706, 707, 821 Save the Children, 66, 74 desire, 159 Save the Children Canada, 39–40 increase, 160 Save the Children—Norway, Nepal (SCNN), 89 Self-generated deterrents, 480 Scabies, 392 Self-harm, causing, 163 Scatologia, 551 Self-help, principle, 977 School children mannequins ad, usage. See Elementary school Self-injurious behaviors, assessment. See Juveniles; Victims children mannequins Self-injurious thoughts, 816 School counselor, education. See Internet assessment. See Juveniles; Victims Schools Self-made images, 812 dropouts, 76 Self-medication, 166 history, inquiry. See Juveniles; Victims Self-mutilation, 77 sexual violence, 75–76 Self-protective motive, 803 Scienter, proving, 648–649 Self-representation Scientific defense, 669 enabling, 269 SCNN, 89 purpose, 265 Screen Cam, preparation, 669 Sending countries, tourism campaigns, 1013–1014 Scripts, 622 Sensory memory, 229 SCSI, 841 Septate hymen, 372f Search issues. See Child pornography Server, 633 overbreadth, 641 Servitude, hidden truth. See Involuntary servitude particularity, 639–641 Sex and America's Teenagers (Alan Guttmacher), 28 staleness, 642–643 Sex offenders. See Sexual offenders Search warrants, 585, 636–639 Sex tourism, 740. See also Children background information, 636 children, exploitation (concern), 1010–1011 drafting, 637–638 global opposition network, creation, 1011–1012

1080 Index

White House, attention, 880–881 questions, pertinence, 818t–819t Sex trade sexual abuse cases, contrast, 558 children, exploitation (numbers), 717 trade, 179 White House attention, 880–881 Sexual exploitation of children, definition. See Child sexual Sex trafficking, 748 exploitation Sex-related crimes, 415 Sexual exploiters, impact. See Children Sex-ring activity, 536 Sexual fantasy, 266 Sexual abuse. See Intrafamilial child sexual abuse Sexual intercourse, 647 acts, consideration, 61t Sexual Internet victimization, addressing, 461 adolescent victims, uncomplicated STDs (management), Sexual lie detector, 283 365t Sexual masochism, 249 cases, contrast. See Sexual exploitation Sexual material, unwanted exposure. See Youth child victims, uncomplicated STDs (management), Sexual maturation. See Delayed sexual maturation; Early 364t–365t sexual maturation; Physical sexual maturation disclosure, 815 rates, 238 levels, 271–272 stage 3, 237 overdiagnosis, 824 stage 4, 237 questions. See Juveniles; Victims stage 5, 237 research. See Childhood sexual abuse stages, 232–237 toleration. See Boys stages 1 & 2, 233–237 victims, 162, 718 timing, international estimates. See Children Sexual abusers, treatment (association), 279–280 Sexual maturation rating (SMR), 232, 237 Sexual activity usage. See Children definition, 537–538 Sexual minority engagement, 403 self-identification, 1049 Sexual approaches. See Youth status, 97 Sexual arousal Sexual motivation. See Pedophiles aid, 267 Sexual offender assessments interest, physiological measures, 281–284 ethical issues, 277 Sexual assault information, inclusion, 280t emergencies, 356–358 measures, usage, 280–289 injuries, 409 misinterpretation, conditions, 290–291 Sexual Assault and Felony Enforcement (SAFE), 884 standards/guidelines, 278–279 Sexual crimes Sexual offenders, 549. See also Nuisance sex offenders; cross-jurisdictional nature, 1043 Preferential sex offenders prostitution, deterrence, 754–755 behavior, rationalization, 221 studies. see Internet children, risk, 557 Sexual crimes, penalties (increase). See Children communication, Internet usage. See Children Sexual decision making, quality, 96 evaluation/treatment recommendations. See Internet- Sexual exploitation. See Child sexual exploitation; Juvenile related sex offenders courts fantasizing, 221 clinical evaluation/management, 358–366 prison, entrance, 729 concept, global perspective, 60–62 supervision, 278 definition, 59–60 treatment programs. See Community-based sex offender forms, 68–69 treatment programs growth. See Internet typology, 544–551 health consequences, 342–345 Sexual offending, etiology, 258 human trafficking, 735 Sexual Predators Apprehension Team (SPAT), 884 Internet Sexual ritual, concept, 539 role, history, 17–22 Sexual sadism, 249 usage. See Child sexual exploitation Sexual solicitations. See Aggressive sexual solicitations; Youth investigation. See Acquaintance sexual exploitation failure, 459 juveniles incident characteristics, 444 historical perspective, 338 perpetrators, 441–444 psychosocial context, impact, 337 quantity, 459

1081 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

youth response. See Online sexual solicitations law enforcement, approach, 1032 Sexual symbiosis, symbol. See Ancient China Shields, Brooke (Calvin Klein ad), 31f Sexual trauma Shock statements, 400 recounts, 819 Shock time, 722 victims, follow-up considerations, 366t Shrader, Mary, 953 Sexual victimization, 352–353 Siblings, activities, 579 behavioral symptoms, documentation, 582 Silent conspiracy, 271 conditions, 358–361 Simple Mail Transport Program (SMTP), 633 experiences, 706 Sinatra, Frank, 981 medical interview, 352t Sisters Offering Support (SOS), 321 Sexual victimization of children, definition. See Children Situational child sex abusers, 305 Sexual violence. See Schools Situational offenders, 720 myths, 424 Situational runaways, 339 Sexualization, guidelines (status). See Children Situational-type child molesters, 547 Sexually deviant activity, Internet usage components, 471–473 Skills development, 969–970 Sexually deviant Internet usage, 474–482 Skin diseases, 77 Sexually deviant purposes, Internet usage (reasons), 469–471 Slavery Sexually explicit conduct, 646 background/discovery, 929–931 PROTECT definition, 222 help, obtaining, 940–941 Sexually explicit images, definition. See United States hidden truth, 927 Sexually explicit material, intrusiveness. See Internet investigation Sexually exploitative advertising, impact. See Adults; problems, 934–935 Children; Society solutions, 933–934 Sexually exploited children team approach, 931–933 problem, scope, 62–63 lessons/best practices, 941 social/emotional/health risks, 102–106 Slavery-like practices, 297 Sexually exploited trafficked foreign children, region/countries Small Computer System Interface (SCSI), 841 of origin. See United States Small towns, children (supply). See Commercially exploited Sexually exploited youth children conflict, 974–975 Smart, Elizabeth, 984 exiting/healing group life cycle stages, 973–976 Smith, Edward, 976 inclusion, 973–974 Smith, Kimberly, 1001 production, 975 Smith, Lamar, 879 resolution, 975 SMR. See Sexual maturation rating termination, 975–976 SMTP, 633 Sexually oriented business (SOB), 195 Smuggling, Interpol (influence). See International human Sexually transmitted diseases (STDs), 27, 391–392 trafficking/smuggling children, susceptibility, 77 Snuff film, 252 contraction, 76, 181, 309 SOB. See Sexually oriented business diagnostic testing, 363–364 Social adjustment classes, 136 exposure, 747 Social affiliations, 607 information, 33 Social controls, absence, 706–707 ongoing assessment, 356 Social psychological skills, learning failure. See Adults risk, 425, 804 Social risks. See Sexually exploited children seriousness, 826 child sexual exploitation (risk), comparison, 112–113 spread, 194 Social services symptomatic relief, 356 interaction, 1036–1037 symptoms, 399 resources, need, 1032 testing, 387 Social support systems, inquiry. See Juveniles; Victims transmission, 1030 Society, sexually exploitative advertising (impact), 38–43 vulnerability, 968 Society for the Suppression of Vice, 10 Sexually transmitted viral hepatitis, 392 SODDI. See Some other dude did it Sex/violence (pairing), ad, 36f Sodomy (Tcheou-Wang sanctification), 4 Shadow children, 1027 Soft-tissue injury, 391 introduction, 1027–1028 Software program, screen capture, 619f

1082 Index

Solicitation. See Sexual solicitations; Youth Florida, 678 Some other dude did it (SODDI) defense, 655, 657 Georgia, 678–679 SOS. See Sisters Offering Support Hawaii, 679 Source code, introduction, 845 Idaho, 679 Southeast Asia, child prostitution Illinois, 679 involvement/increase, 1010 Indiana, 680 situation analysis, 63–66 Iowa, 680 Southern Asia Kansas, 680–681 child rape victim, 88–89 Louisiana, 681 gang rape victim, 89 Maine, 681 offender, physical condition, 90 Massachusetts, 681–682 psychosocial problems/investigation, 85 Michigan, 682 background, 85–87 Minnesota, 682 rape victims Mississippi, 682 crime, nonreportage reasons, 89–90 Missouri, 682 investigation, 92–94 Montana, 682–683 investigation preparations, 92 Nebraska, 683 repeatedly raped victim, 89 Nevada, 683 study, 65 New Hampshire, 683 suspect, dealing, 93–94 New Mexico, 684 victims New York, 684 interviews, 92–93 North Dakota, 684 physical condition, 90 Oklahoma, 684 Souvenir, 250 Oregon, 685 Spain, INHOPE impact, 1025–1026 Pennsylvania, 685–686 Spam, 633, 668. See also Child pornography Rhode Island, 686 SPAT. See Sexual Predators Apprehension Team South Dakota, 686 Specimens, collection/storage, 388 Tennessee, 686 Speech, protection, 904 Texas, 686 Spinning top. See Exiting Utah, 686 balance, absence, 972, 975 Vermont, 686–687 Sponsors, term (usage), 803 Washington, 687 Spoof, 633 Wisconsin, 687 St. Kizito attack (Kenya), 87 Statutory rape, 350 Stakeholder networks, identification, 99 laws, 752 Stalagmite effects, 39 STDs. See Sexually transmitted diseases Staleness. See Search issues Stereotypical kidnappings, 989 Standing Against Global Exploitation (SAGE), 321 Steris Corporation. See Matthew Dickey v Steris Corporation Stanford-Binet test, 283 Sting operations, 878–880. See also Travelers Start-up ISP, 658 Sting tactics, bias (sample questions), 694 State contacts, network development. See Commercially Stockholm Declaration and Agenda for Action to Combat exploited children the Commercial Sexual Exploitation of Children State legislation. See Child prostitution (1996), 306 State (Ohio) v Cook, 837, 843, 862–863 Stoelzle, Deirdre, 1001–1003 State v Bir Bahadur Biswokarma, 88 Straddle injury, 373–374. See also Females; Males State v Osborn, 668 Strain gauge, 281. See also Circumferential strain gauge Statutes of limitations, elimination, 649 Stranger danger, 531 Statutes of limitations, issues, 649 Street children, 73 Statutes of limitations removal. See Children Street Fest 2001, 973 Alabama, 676 Streetcar Named Desire, A, 140 Alaska, 676 Street-level entrapment, 667 Arkansas, 677 Strip clubs, monitoring, 1034–1035 Colorado, 677 Subject confessions, 587 Connecticut, 678 Submucosal hemorrhages, 361 Delaware, 678 Subscriber information, obtaining, 657

1083 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

Substance abuse, 148, 174 population, vulnerability, 459 CRAFFT Screening test. See Adolescents Telephone scatophilia, 249 emergencies, 358 Television advertisement, usage, 796f screening, 364–366 Tell Express Assure Medical issues Safety issues Test/treat testing/monitoring, 364–366 Access Timely follow-up (TEAMSTAT), 350 Substance-related disorders, 407 approach, 350–356, 351t. See also Children of the night Substantive testimony, 811–812 Temple prostitution (Devadasi), 68–69 Sugar daddies, 69 10-print file, 739 Suicidal behavior, 77 Termination (stage). See Sexually exploited youth Summit, Roland, 820 Terrell, Earl, 981 Sunna circumcision, 374, 375f Testimony. See Child sexual abuse; Internet; Rehabilitative Supine frog-leg position, 359 testimony; Substantive testimony; Victims Supine knee-chest position, 360 illustrations, 846–856 Supine lithotomy position, 360 Testosterone, 231 Supreme Court of Nepal, 88 Texas Court of Appeals, analogy, 654 SurfControl, 790 Thailand, child prostitution, 64 Surveillance, 587–588 Third-party exploiters, 310 Survival sex, 139–141, 814, 1028–1030 Thought-driven criminal sexual behavior, 545 definition, 340 Thrownaways, 340 homeless youth (involvement), typology, 339–341, 339t children, 1029 usage, 96 definition, 990–991 Survivors, 170–173 status, 98 perspective. See Children; Juvenile justice system Thumbnail, 215 public communication, 1007t Thyroid hormone, 231 transition. See Child sexual exploitation industry TLD. See Top-level domain update. See Child sexual exploitation industry Toddlers Suspects gross motor skills, development stages, 227t dealing. See Southern Asia maturation, development, 226–227 identification, 584. See also Internet pornography, 226–228 prosecution, 611–612 sadistic abuse, 227–228 Swap files, evidence, 854 impact, 228 Sweatshops, 938 Top-level domain (TLD), 618, 633 Syndrome, term (avoidance), 812 Touching, descriptions, 532 Syphilis, 391 Tourism. See Children; Sex tourism transmission, 1030 campaigns. See Destination countries; Sending countries System tray, 633 child sexual exploitation (protection), code of conduct, Systems youth, 340–341 1015–1016 incentives, 1014–1016 T Tourism and Child Prostitution Watch Task Force, 1013 Taboos. See Child sexual exploitation Tourism industry Tanner, James, 233, 662 education/actions, 1013 Tanner scale, expert testimony (impact), 662–663 interaction, child sexual exploitation prevention, 1009 Tanner stage language, usage, 830 Tracing. See Internet Tanner staging, 662 Trader cases. See Internet Task force. See Internet Crimes Against Children Trading process, example/history. See Internet roles, 612f Trafficking, 736. See also Canada; Domestic trafficking; Tax fraud, 752 Mexico; Sexual exploitation; United States Taylor, Max, 741 child victims, encounters, 939t Taylor v State, 654, 863 definition, 297 TCP. See Transmission Control Protocol estimates. See Central Intelligence Agency Teachers, contribution, 1042 legal parameters, 937–938 TEAMSTAT. See Tell Express Assure Medical issues Safety lessons/best practices, 941 issues Test/treat Access Timely follow-up records. See International police Teenagers victims, assistance, 938t abduction, AMBER Alert (relationship), 986–987 Trafficking cases

1084 Index

determination process, 935–940 Internet, usage, 16–17 investigation lessons/tips, 941t–944t pornography/prostitution, impact, 11–17 power/status, significance, 944 Twenty-first century Trafficking Victims Protection Act (TVPA), 317, 936–937 Internet, usage, 16–17 Transmission Control Protocol (TCP), 18, 615, 633 pornography/prostitution, impact, 11–17 Transmission Control Protocol/Internet Protocol (TCP/IP), Tylenol, usage, 188 18, 615 Typologies. See Homeless youth; Offenders; Sexual offenders; Transvestic fetishism, 249 Survival sex Trap and trace orders, 941 reasons, 548–550 Trauma. See Childhood; Childhood genital trauma summary, 551 beliefs, 158–164 Traumatic bonding, 426 U Tr a ve l UFTAA, 1013 child sexual exploitation (protection), code of conduct, UK Court of Appeals, 259 1015–1016 sentencing guidelines scale, 259t industry, education/actions, 1013 Ultrasound, 370 Traveler-child relationship, 873 Unaccompanied Refugee Minor (URM) Program, 937–938 Travelers. See Global travelers; Internet travelers; Interstate Unallocated clusters, 849 travelers; Intrastate travelers; Local travelers; Victim Windows Metafiles recovery, evidence, 856 travelers Underage victim terms, 896t cases. See Internet Undercover (UC) law enforcement officers, Internet constitutional attack defense, 889–890 solicitations, 3693 courts, interaction, 886–891 Undercover (UC) operations, 628, 879–880 definition, 873 Undercover (UC) technique. See Internet entrapment defense, 888–889 Uniform Resource Locator (URL), 616, 633 fantasy defense, 890–891 United Federation of Travel Agents' Association (UFTAA), impossibility defense, 886–888 1013 factual impossibility, 886–887 United Nations Children's Fund (UNICEF), 376, 1016 legal impossibility, 887–888 issues, 71 isolation, proactive approach, 876 response, 78 no-shows, 878 United Nations Convention Against Transnational Organized phenomenon, evolution, 873 Crime, 742 sting operations, 878 United Nations Convention on the Rights of the Child, 965, variations, 877–878 1016 Traveling, 475 United Nations Crime Prevention and Criminal Justice Treatment program, example. See Juveniles; Victims Division, 740 Treponema pallidum, 391 United Nations Declaration of Human Rights, 1016 Trichomonas vaginalis, 356, 392 United Nations Development Program (UNDP), 301 discharge. See Adolescents United Nations High Commissioner for Refugees Trichomoniasis. See Prepubertal female (UNHCR), 74 Trigger pictures, 40 United Nations Population Fund (UNPF), 376 example, 41f United States Tri-National Regional Consultation on CSEC, 298 child pornography, 320–321 Trojan, 633 child sexual exploitation, addressing (national capacity), True misses, 287 113–119 Trulock v Freeh, 644 child sexual exploiters, profiles, 109–112 Trust children belief. See Children; Victims maltreatment, 97–98 establishment. See Juveniles prostitution; Victims profiles, 313 Turner Diaries, The, 916 commercial sexual exploited/trafficked foreign children, Turner's syndrome, 238 regions/countries of origin, 114t T-visa, 318 commercially sexually exploited children, categories, establishment, 748 106–109 TVPA. See Trafficking Victims Protection Act CSEC Twentieth century children, special risk, 314t–315t

1085 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

trafficking functionaries, 116t–118t field divisions, 598 exploiters, profiles, 315–317 Forensic and Technical Services Division, 600 law enforcement, 319 function, 595 national legislation, 319 intelligence information, 591 online sexual victimization, 320–321 law enforcement partnerships, 211 political/economic characteristics, 299t–301t logo, 15f population/health/social characteristics, 302t–303t obscenity investigations, 595–596 prevention/prosecution/protection programs, 319–320 sexual exploitation, children (protection), 596–598 private sector, 321 United States Secret Service (USSS), 209, 626, 846 sexually explicit images, definition, 222 United States Surgeon General, 963 sexually exploited trafficked foreign children, United States v Acheson, 902 region/countries of origin, 112 United States v Anderson, 638, 642, 643 trafficking, 317–318 United States v Bailey, 889 United States Attorney General, Guidelines for Victim and United States v Bender, 662 Witness Assistance, 585 United States v Broyles, 664 United States Attorney's Office, 928 United States v Brunette, 637–638 United States Code, punishments, 885–886 United States v Byrne, 886 United States CSEC, 304–321 United States v Careay, 643–644 city selection, 100–101 United States v Cihak, 910 city/country/regional studies, informants, 101 United States v Cream, 650 country selection, 100 United States v Dean, screen shot usage, 858f findings, 102–119 United States v Deaton, 664 introduction, 95–99 United States v Durham, 644 United States v Esch, 648 project phasing, 100 United States v Fabiano, 648 research United States v Farner, 887 methods, 99–101 United States v Froman, 636–637 partners, 99–100 United States v Gallo, 664 statutory reviews, 101 United States v Gendron, 667 United States Customs and Border Protection, 214 United States v Gibbs, 910 United States Customs Service, 320 United States v Gourde, 637 Cyber Smuggling Center, 661 United States v Greany, 642 intelligence information, 591 United States v Griffith, 757 United States Department of Justice (USDOJ), 596 United States v Guagliardo, 661 Child Exploitation of Obscenity Section, 661 United States v Habershaw, 864–865 Civil Rights Division, 928, 932, 935–936 expert report, 867–871 Trafficking in Persons and Worker Exploitation United States v Hall, 664 Complaint Line, 940 United States v Hathcock, 669 United States Department of Labor (USDOL), 928, 932 United States v Hay, 643 Report on Child Prostitution as a Form of Forced Labor, 718 United States v Hilton, 846 United States Department of State United States v Horn, 642–643, 652 International Programs Section, 318 United States v Husband, 652 Office to Monitor and Combat Trafficking in Persons, United States v Jasorka, 642 318 United States v Jimenez-Calderon, 936 Public Diplomacy and Outreach Section, 318 United States v Katz, 663 Trafficking in Persons Report Section, 318 United States v Kimbrough, 651 United States Immigration and Customs Enforcement United States v Knights, 646 (ICE), 15 United States v Knox, 647 United States Postal Inspection Service (USPIS) United States v Koelling, 641 attack. See Child sexual exploitation United States v Lacy, 642 child exploitation United States v Lamb, 638, 664 arrests, 247 United States v Laney, 914 child exploitation program, overview, 598–602 United States v Lemmons, 644 contraband, handling, 214 United States v Leon, 638–639 cooperation, 320 United States v Long, 638, 662 enforcement efforts, 595–596 United States v Loy, 641, 642

1086 Index

United States v Matthews, 670–671 Vaginal infections, 428 United States v McBroom, 668 Vaginal tearing, 747 United States v Mendelsohn, 907 Vaginal trauma, 584 United States v Motto, 668 Vaginal-penile penetration, 361f United States v Naparst, 859 hymenal tear/posterior vestibule tear, 361f United States v Peters, 888 Van Dam, Danielle (murder), 652 United States v Peterson, 910 VDRL, 363 United States v Poehlman, 666, 889 Venereal Disease Reference Library (VDRL), 363 United States v Pollard, 662 Venereal warts. See Human papillomavirus United States v Quinn, 842 Verbal sexual abuse, 61t United States v Richardson, 663–664 Versace ad, nude female toddler, 34f United States v Romero, 562, 638 Vertical conspiracy liability. See North American Man/Boy United States v Rowland, 642 Love Association United States v Rude, 641 Vestibular erythema, 371 United States v Saelee, 841 Vice-related issues, 938 United States v Scott-Emuakpor, 846 Victim Identification Project presentation, 794 United States v Simmonds, 643 Victim travelers, 878 United States v Simpson, 639 Victim Witness Specialist, assistance, 940 United States v Soto, 936 Victim-child, addressing, 917 United States v Stanley, 663 Victimhood, definition, 937–938 United States v Superior Growers Supply, 921 Victimization. See Childhood; Fabricated victimization; United States v Tank, 836–837 Online victimization; Physical victimization; Sexual United States v Taylor, 757 victimization; Youth alienation/victimization United States v Tucker, 669 addressing. See Nonsexual Internet victimization; Sexual United States v Upham, 639, 864 Internet victimization United States v Villard, 661–662, 664 conventional forms, attention. See Youth United States v Walser, 643 long-term negative outcomes, 272 United States v Weber, 638 nondisclosure, 823 United States v Whitaker, 837, 838, 842 occurrence, 760 United States v Wong, 643 Victims. See Males; Multiple victims United States v X-Citement Video, 648 age, assessment, 216–217 University of Washington School of Communications study, approach, 607 997 Unprotected speech, judging assistance, 759–760, 1006 case standards, 905t behavioral assessment, 408–409 guidelines, 905t–906t bonding. See Offenders Unsanctioned outsiders, contact, 940 cases, types. See Multiple victims Untrue defenses, meeting. See Child pornography communication/trust, establishment, 399–406 Upham, Troy, 671 concerns, 565 Upload, 633 confidentiality, rules (establishment), 401 Urinary tract infection (UTI), 376 coping behavior, 164–166 URL. See Uniform Resource Locator developmental assessment, 408–409 URM. See Unaccompanied Refugee Minor drug history, information request, 404 Urophilia, 249, 251, 551 emotional assessment, 408–409 case studies, 251 evaluation, areas, 578–579 US Communications Decency Act, 18 exploitation. See Child victims Usenet, 633 family history, obtaining, 401–402 Usenet newsgroups, 615, 620–621 follow-up considerations. See Sexual trauma monitoring, 269 gender, 558 USPIS. See United States Postal Inspection Service grooming/seduction. See Incarcerated pedophiles USSS. See United States Secret Service history, obtaining, 380t–381t UTI. See Urinary tract infection interviewer tips, 383t identification, 217, 938–940. See also Internet V analysis, 222–223 Vaginal bleeding, differential diagnosis. See Prepubertal child; image analysis, 794–797 Prepubertal girl process, 794–797

1087 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

impact. See Long-term victim impact; Primary victim multiple subjects impact description, worksheet (example), 219 testimony, 828–829 usage, 218–220 initial assessment, 399–409, 400t, 401–406 perpetrators, partial image, 218 interaction, 579 receipt, 214–215 intermediate community/mental health support, titles, 226 409–418 Videotaping. See Acquaintance sexual exploitation Internet crimes. See Identified victims Viewing time (VT), 291. See also Abel VT interviews, 401–406. See also Southern Asia measures, usage (ethical issues), 284–286 contextual elements, choices, 401 physiological measures, 284–286 issues. See Child pornography results, misinterpretation, 285 liars, defense, 758 understudied populations, usage, 285–286 life skills, absence, 166–169 Violence, 967. See also Prostituted adolescents; Schools long-term community/mental health support, 409–418 disposition. See Boys long-term prognosis, 419–420 dynamics. See Dating violence long-term therapy, goals, 410–412 genital trauma, relationship. See Nonsexual violence lovability, belief, 159–162 health consequences. See Dating violence misperception/confusion, 578 propensity. See Victims physical abuse, questions, 403–404 relationship. See Women physical condition. See Southern Asia Viral agents, 392–393 preferences, 607. See also Incarcerated pedophiles Viral infections, 428 psychiatric assessment, 406–408 Virtual child pornography, 902 psychological problems. See Incest attitudes, sample questions, 698 psychological profiles, 155–157 Virtual community, 633 rapport, building, 401 Virtual defense, defeating, 649 runaway behavior, inquiry, 404–406 Virtual Global Task Force, 791 safety, creation, 91t Virus, 633 sample questions. See Problematic victims Visible injuries, 390 school history, inquiry, 402 Visual cues, usage, 413–414 selection, 607 Voice over IP (VoIP), 622, 624, 633 self-injurious thoughts/behaviors, assessment, 402–403 Voir dire sexual abuse, questions, 403–404 effectiveness, 654 social support systems, inquiry, 402 questions, sample format, 699–701 support services, 979t sample questions. See Computer-facilitated crimes survivor, transition. See Child sexual exploitation against children testimony, 755–756 Volumetric penile plethysmograph, 281 therapeutic approaches, 413–418 Volumetric plethysmograph, 281f treatment program, example, 417–418 Voyeurism, 61t, 243, 249, 551, 607 trust, belief, 163–164 VT. See Viewing time violence, propensity, 428 Vulnerability Victims of Trafficking and Violence Protection Act (2000), increase. See Child sexual exploitation 748 psychosocial factors. See Children Victim-Witness Coordinators. See Federal Bureau of Vulvar dermatoses, differential diagnosis, 377t–378t Investigation Victoria Declaration and Agenda for Action, 970 W Victoria Youth Summit, 965 Walsh, Adam, 982–983, 982f Videotapes Walsh, John/Revé, 203, 982 angles, unusualness, 218 Warrantless search, 644, 646 background scenes, 226 Warrants. See Anticipatory warrants; No-knock warrants; children, drugged appearance, 230–231 Search warrants content, usage. See Children requirement, exceptions, 643–646 country of origin, stereotypical settings, 226 WBC. See Web-based chat evidence, 217–220 Weapons of destruction, drawings, 406f incest, showing, 220 Web server, 1022 Internet Web site banners, 226 Web sites, 634

1088 Index

components, 617f advent, 895 success. See National Center for Missing & Exploited creation, 18 Children electronic locations, 472 usage, 472–473 information, 636 Web-based chat (WBC), 615, 622 page advertising, 751 Web-based pedophilia, 792 Worm, 634 Welfare Writing styles, contrast, 1005t dependency, 148 Written child pornography, 221–222 system, survivor perspective. See Children example, 221 West Africa, prostitution, 78 information, 222 Wetterling, Jacob, 983. See also Jacob Wetterling Foundation significance, 221–222 White House, attention. See Sex tourism; Sex trade WTO, 1013 White Slave Traffic Act (Mann Act), 11–12, 877 WWW. See World Wide Web Whitman, Walt, 248 WHO. See World Health Organization Y Whois, 634 Yahoo! Messenger, 622f WiFi, 874 Yates v United States, 904 Williams, Roy, 792 Yellow notices. See International police Windows GUI, 861 YMCA, 726 Windows Metafiles Young person, definition, 306 explanation, 856 Youth. See Systems youth recovery, evidence. See Unallocated clusters characteristics, 438t–439t Windows operating systems, 659 commercial sexual exploitation, factors, 103t Windows-based computers, file extensions, 628 cyber-enticement, 819t Windows-based GUI, 850 encounters. See Internet WinMX, 623 exiting/healing group life cycle, stages. See Sexually Wireless fidelity (WiFi), 874 exploited youth Witnesses, 599. See also Case witness harassment, 440–441, 453–457 evaluation, 814 impact, 456 medical expert, involvement, 799t–800t response, 456 nonrecognition. See False witnesses targets, 453f testimony. See Expert witnesses testimony, 457t Women information. See Online victimization abuse, 164 Internet criminal behavior, questions. See Abused girls/women friendships, formation/risk. See Adults derailment, mechanisms. See Abused/neglected women offenses, impact, 459 involvement. See Criminal justice system sexual solicitations, 442t prostitution, male violence (relationship), 425 use, patterns, 439 relationships. See Deviant/delinquent friends/relatives intervention strategies, development, 462 runaways, 705–706 involvement, typology. See Survival sex violence. See Pakistan mobilization. See Internet Wonderland Club, 199, 248, 896 online harassment, 453t–455t agreement, proof, 913 online sexual exposure cessation, 897 findings/conclusions, 458t conspiracy, 912 recommendations, 461t liability, creation, 919 online sexual material, unwanted exposure, 448f Internet existence, 911 online sexual solicitations Woody, Kacie, 875 response, 444 Working children, 75 targets, 441f World Bank, 317 online victimization, 440f World Health Organization (WHO), 376 perspectives. See Canada World Report on Violence and Health, 1042 prevention strategies, development, 462 World Tourism Organizations (WTO), 1013 professional guidelines. See Exploited youth World Vision, training, 1048 response. See Online sexual solicitations World Wide Web (WWW), 615–618, 634 runaway potential, predatory adult solicitation, 447

1089 Medical, Legal, & Social Science Aspects of Child Sexual Exploitation

sexual approaches, 439–448 sexual assaults, 111f sexual material, unwanted exposure, 440, 448–453, 448t–450t exposure incident characteristics, 450–451 response, 451 risk, 451–452 testimony, 451t sexual solicitations, 439–448 impact, 444–445 risk, 445 testimony, 445t solicitations disclosure/nondisclosure, 459–460 experiences, reporting, 460 suicide, rates, 40 targets. See Harassment sexual solicitations, 441 victimization, conventional forms (attention), 464 violence, rates, 40 Youth Advocate Program International, 321 Youth alienation/victimization, 337–338 Youth Career Initiative, 1016 Youth Internet Safety Survey implications/recommendations, 460–464 methods, 438–441 participants, 438 study, conclusions, 458–460 Z ZipLip, 620 Zoophilia (bestiality), 248–249, 551, 647

1090