: 2 Derbyshire County Council Child Sexual Exploitation Bulletin Protect-Prevent-Pursue-Recovery-Safeguard December 2016

Welcome to our monthly bulletins regarding CSE which is used as a forum to share policy development and resources alongside reminders of embedded practice. For those who do not know me I am Terri Tassi, I am a Child Protection Manager - Operational CSE lead. If there is anything you would like covering or would like to respond to anything within the bulletin then please do not hesitate to contact me on [email protected] or 01629 532838 Issues from Last Bulletin

Missing Protocol

In the last bulletin it was raised that I had put a link on to the Runaway and Missing from Care protocol 2014 when the most up to date one is 2016. I would like to reassure you that this link will take you to the most recent policy, February 2016.

What is CSE?

It was also raised that not everybody will understand what CSE stands for. This is Child Sexual Exploitation. Child Sexual Exploitation is a form of sexual abuse that involves the manipulation and/or coercion of a child under the age of 18 into sexual activity. This can include them performing sexual activities or others performing sexual activities on them. This is often in exchange for something such as money, drugs, gifts, accommodation or even affection. Some children and young people are trafficked i.e moved around, for the purpose of sexual exploitation. Models of CSE are;

THE RELATIONSHIP/PEER MODEL

This is where a young person believes they are in a loving ‘relationship’ or friendship and then the perpetrator can coerce them to have sex with friends or associates. Peer to peer grooming can sometimes be associated with gang activity, where the young person doing the grooming is a victim themselves. This is often known as the ‘Boyfriend Model’ which can make people disregard the fact that boys and young men can also be sexually exploited in this way.

1 ORGANISED/NETWORK MODEL & TRAFFICKING MODEL

This exploitation includes the sex trafficking of children/young people, sometimes across the country or internationally or even just between houses or hotels. This can be part of an organised network of ‘buying and selling’ of the sexual services of young people by perpetrators. Young people/children may also be used themselves to recruit other young people into the network. This often involves numerous victims and perpetrators and is the most widely reported in the media.

INAPPROPRIATE RELATIONSHIP MODEL

This usually involves one perpetrator who has inappropriate power or control over a young person – one indicator could be a significant age gap or a person in a position of authority exploiting a young person for sex. The young person may believe they are in a loving relationship. Proving child sexual exploitation in this model requires a lot of evidence gathering.

GANGS MODEL

The East Midlands Consortium spoke of there still being limited understanding of gang models in child sexual exploitation. This can include sexual exploitation through gang initiation rituals, gang pressure or as punishment for crossing areas/boundaries. Many gang members can also be victims themselves. However, the consensus is that this is under reported. THE PARTY MODEL

Parties are organised by groups of adults to lure young people. Young people are offered drinks, drugs and car rides often for free. They are introduced to an exciting environment and a culture where sexual promiscuity and violence is normalised. Parties are held at various locations and children are persuaded (sometimes financially) to bring their peers along. Children are also encouraged to associate with others via Facebook, Bebo, ooVoo, etc. The parties may be held some distance from the child’s home, enabling the perpetrators to force the child to have sex in return for a lift home. Drugs and alcohol are used to suppress the children’s resistance. Images may be taken of them without their clothes for purpose of future bribery. (ref; CEOP) The “free drugs/alcohol” could also suddenly have a price on them and this “traps” the young person into ways of paying this off.

INTERNET BASED CSE (CONTACT OR NONE CONTACT)

When sexual exploitation happens online, young people may be persuaded, or forced, to:  send or post sexually explicit images of themselves

 take part in sexual activities via a webcam or smartphone

 have sexual conversations by text or online.

2 Abusers may threaten to send images, video or copies of conversations to the young person's friends and family unless they take part in other sexual activity. Images or videos may continue to be shared long after the sexual abuse has stopped. This could lead onto face to face meetings.

Child sexual exploitation is often perceived as a hidden crime. All too often young people trust their abuser and don't understand that they're being abused. They may depend on their abuser or be too scared to tell anyone what's happening.

At the bottom of this bulletin is a list of potential risk indicators to CSE. Please feel free to print this off and put it on your office wall. Tasking Group

Tasking group discussed the on-going concern for a number of Derby City children being found at the International Hotel in Derby. If anybody hears of children they are working with associating with the International Hotel could you ensure an Operation Liberty form is completed or if this is a referral then a report made to the police.

If there is any relevant information to share at the next tasking meeting regarding concerns for young people at risk of CSE, potential hotspots or perpetrators then please let me know.

Operation Liberty Forms

Operation Liberty is a way that intelligence can be shared with the police. Operation Liberty forms help build a picture of intelligence that can support police to pursue or disrupt perpetrators of CSE. The form is on the version of the CSE toolkit that is not on Framework i and can be used by all professionals. Every Operation Liberty form is checked.

 This form provides a multi-agency system of sharing information with Derbyshire Police, to aid keeping young people safe.  It helps the Police gain intelligence and helps the identification of alleged or known perpetrators.  It assists with the prevention and disruption of CSE.  Please note, this form is for reporting intelligence/information and NOT to be used for reporting referrals or concerns.

Please provide information about SPECIFIC EVENTS/INCIDENTS. Include as much detail as possible (where known) regarding name's / descriptions / nicknames / vehicle details /date of birth/ addresses. Do not use abbreviations.

Once completed please email to [email protected] Ensure a copy is uploaded onto Framework i.

3 Missing

Placing a Looked After Child out of county requires the authority where the child is placed to be alerted to that child residing there. As part of this process I ask that you make it clear what your plans are in relation to return interviews and ensure this is recorded within the child’s plan. If there are concerns regarding a young person placed out of county in relation to CSE the toolkit must still be completed. The protocols around cross boarder placements are being reviewed. Please be aware if a child is placed with Derbyshire carers who reside outside of the Derbyshire boarders you still need to alert that local authority.

When other local authorities place children within Derbyshire they have to advise us if there is an identified concern around CSE or going missing. This will also identify if they need support around return interviews. If this is identified then the business services who deal with this will alert me. I will then ask for a current risk assessment/toolkit and current child’s plan. If they are placed within a private residential unit I will be asking the workers there to complete a one page profile with the young person so they are able to tell us how they like to be approached, what are their interests etc.

The aim is that the workers who are tasked with undertaking the visit will have a current assessment and child’s plan, along with how the child wishes to be approached and possibly a photograph of them. These will all be in documents along with the compact report from the police which will detail their information on visiting the child.

Whist this is to enable us to respond in a more child centred way to the child it is really important that the social worker for the child is contacted to ensure the risk assessment is up to date etc. If you become aware of an out of county child that is not does not have a child’s plan etc on file please let me know. On-line Safety

We are tasked with helping protect young people from the ever evolving digital world when reality is most of us don’t protect ourselves. A very short film has been launched by Cifas, the UK’s leading fraud prevention service, which has also released new figures showing a 52% rise in young identity fraud victims in the UK. They have shown a video where a coffee shop offered a free coffee and croissant if you like their page on Facebook. The film is called “Data to go” and is readily available on Youtube, BT and other businesses in a bid to raise awareness. It demonstrates how much information about you can be gathered from this one “click”.

I have been compiling a catalogue of the most used Apps by young people and also showing the potential risks around this. Most Apps are used sensibly but there is an element of risk to most of them. Here are just a few and I am happy to share more if people find it helpful (I have 33 pages!). By the way, Facebook is not “cool” anymore.

4 Instagram

 Children are on the lookout for "likes." Similar to the way they use Facebook, children/young people may measure the "success" of their photos -- even their self-worth -- by the number of likes or comments they receive. Posting a photo or video can be problematic if teens are posting to validate their popularity.  Public photos are the default. Photos and videos shared on Instagram are public unless privacy settings are adjusted. Hashtags # and location information can make photos even more visible to communities beyond their followers if his or her account is public.  Private messaging is now an option. Instagram Direct allows users to send "private messages" to up to 15 mutual friends. These pictures don't show up on their public feeds. Although there's nothing wrong with group chats, children may be more likely to share inappropriate images with their inner circles.

Kik

Kik is an instant messaging app. It lets you create your own username and message others without using your mobile number. You can share photos, organise events, share games, news and anything of interest to you from the internet.

Kik is an app that lets children text for free. It's fast and has no message limits, character limits, or fees if you only use the basic features. Because it's an app, the texts won't show up on children’s phones so no amount of monitoring will protect in this instance.

Stranger danger is an issue. Kik allows communication with strangers who share their Kik usernames to find people to chat with. The app allegedly has been used in high-profile crimes, including the murder of a 13-year-old girl and a case involving indecent images of children.

Snapchat

It's a myth that Snapchats go away forever. Data is data: Whenever an image is sent, it never truly goes away. (For example, the person on the receiving end can take a screenshot of the image before it disappears.) Snapchats can even be recovered. After a major hack in

5 December 2013 and a settlement with the FTC, Snapchat has clarified its privacy policy, but we should all stay wary. It can make sexting seem OK. The seemingly risk-free messaging might encourage users to share inappropriate pictures. NSPCC have a video called Alex’s Willy that shows how easily these photos are shared.

MeetMe

MeetMe is a social network and dating site which allows users to meet and communicate with other people worldwide Although not marketed as a dating app, MeetMe does have a "match" feature whereby users can "secretly admire" others, and its large user base means fast-paced communication and guaranteed attention. It's an open network. Users can chat with whomever's online, as well as search locally using GPS, opening the door to potential trouble.

Lots of details are required. First and last name, age, and postcode are requested at registration, or you can log in using a Facebook account. The app also asks permission to use location services on children’s mobile devices, meaning they can find the closest matches wherever they go.

Minecraft

Playing games on line opens up opportunities for children to be groomed by “helping” them get to the next level. This can then offering to team up next time they play together and can lead to arranging to play at the same time etc. This could all be very innocent but could also be an inroad to the child. Often players team up with people they do not know. These conversations could move onto another forum away from the game.

Please remember the warning signs of CSE are below.

The lists below are not exhaustive but are potentially significant influences on a young person’s vulnerability to sexual exploitation. Warning signs for children and young people who may be at risk of sexual exploitation

6 Sexual health and behaviour Evidence of sexually transmitted infections, pregnancy and termination; inappropriate sexualised behaviour

Absent from school or repeatedly running away Evidence of truancy or periods of being missing from home or care

Familial abuse and/or problems at home Familial sexual abuse, physical abuse, emotional abuse, neglect, as well as risk of forced marriage or honour-based violence; domestic violence; substance misuse; parental mental health concerns; parental criminality; experience of homelessness; living in a care home or temporary accommodation

Emotional and physical condition Thoughts of, or attempted, suicide or self-harming; low self-esteem or self-confidence; problems relating to sexual orientation; learning difficulties or poor mental health; unexplained injuries or changes in physical appearance identify

Gangs, older age groups and involvement in crime Involvement in crime; direct involvement with gang members or living in a gang-afflicted community; involvement with older individuals or lacking friends from the same age group; contact with other individuals who are sexually exploited

Use of technology and sexual bullying Evidence of ‘sexting’, sexualised communication on-line or problematic use of the internet and social networking sites

Alcohol and drug misuse Problematic substance use

Receipt of unexplained gifts or money Unexplained gifts including money, mobile phones, phone credit, clothes and make-up

Distrust of authority figures Resistance to communicating with parents, carers, teachers, social services, health, police and others

7