<<

If you have issues viewing or accessing this file contact us at NCJRS.gov.

NATIONAL CENTER FOR MISt.f9IN(. 1~"I"j('lrl'l~I) -----1.---' CHI L D R E N

Child Rings: A Behavioral Analysis For Criminal Justice Professionals Handling Cases of Sexual ~ Exploitation

In cooperation with the Federal Bureau of Investigation ------149214 U.S. Department of Justice National Institute of Justice

This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been grantedNaElona1 by • center f'or Mlsslng . & Exploited Chi1dren/DOJ/FBI to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner.

Child Sex Rings: A Behavioral Analysis

For Criminal Justice Professionals Handling Cases of Child Sexual Exploitation

April 1992 Second Edition

Kenneth V. Lanning Supervisory Special Agent

Behavioral Unit Federal Bureau of Investigation FBI Academy Quantico, Virginia

© National Center for Missing & Exploited Children Dedication

This book is dedicated to the victims of child sex rings and to the memory of two FBI agents who devoted their professional lives to helping sexually exploited children.

Leo E. Brunnick FBI Boston,

Alan V. MacDonald FBI Boston, Massachusetts Contents

Author's Preface v

1. Historical Overview 1 "Stranger Danger" 1 Intrafamilial Child Sexual 2 Return to "Stranger Danger" 2 The Acquaintance Molester 3 : A "New" Form of "Stranger Danger" 3

2. Definitions 5 Sexual Victimization of Children 6 of Children 6 Sexual Exploitation of Children 8

3. Child Sex Rings 9 Dynamics of Child Sex Rings 9 Types of Child Sex Rings 10

4. Historical Child Sex Rings 11 Characteristics of Historical Child Sex Rings 11 Offender Strategies 12

5. Multidimensional Child Sex Rings 17 Dynamics of Multidimensional Child Sex Ring Cases 17 Characteristics of Multidimensional Child Sex Rings 18 Scenarios 19 What Is "" ? 20 Why Are Victims Alleging Things That Do Not Seem to Be True? 22 Alternative Explanations 24 Do Child Victims About Sexual Abuse and Exploitation? 27

6. Investigating Multidimensional Child Sex Rings 31 Corroboration of 31 General Investigative Techniques 32 Investigating Historical Child Sex Rings 37 Investigating Multidimensional Child Sex Rings 39 Summary 44

Appendix A: Protocols in Investigating Multi-Victim, Multi-Offender Child Sexual Exploitation 47

Appendix B: Macro-Case Investigations 59

References 65

Additional Readings 67

National Center for Missing and Exploited Children inside back cover

iii Acknowledgments

In addition to all the child victim advocates with whom the author has discussed the issue of child sex rings over the past eleven years, the author would like to thank the following for their assistance in the development and publication of this book:

Lucy Berliner, M.S.W. Donna Pence Sexual Center Tennessee Bureau of Investigation , Washington Nashville, Tennessee

Ann Wolbert Burgess, R.N., D.N.Sc. John B. Rabun, Jr., A.C.S.W. van Ameringen Professor of Psychiatric Mental National Center for Missing and Exploited Children Health Nursing Arlington, Virginia University of Pennsylvania School of Nursing Philadelphia, Pennsylvania J. Kerry Rice, M.S.W. University of Louisville Richard Cage Louisville, Kentucky Montgomery County (Maryland) Police Department Dan Sexton, M.S.W. Robert E. Cramer, Jr. Child Help, USA National Children's Advocacy Center , Huntsville, Alabama Toby Tyler Robert B. Derbyshire Against Children Detail Baltimore County (Maryland) Police Department San Bernardino (California) Sheriff's Office

Beth Dickinson County Sheriff's Department Whittier, California

Park Elliott Dietz, M.D. Forensic Psychiatrist Newport Beach, California The National Center for Missing and Exploited Chil­ Sandi Gallant dren would also like to thank the following individu­ (California) Police Department als who helped in the editing of this book:

Linda Lowrance Cynthia Lent National Victim Center FBI Academy Fort Worth, Texas Quantico, Virginia

Sherrill Mulhern Theresa Delaney and Suzanne Weller Anthropologist National Center for Missing and Exploited Children Kansas City, Missouri Arlington, Virginia

TheNational Center for Missing and Exploited Children (NCMEC), anationaJ clearinghouse and resource center, is funded under Cooperative Agreement 89-MC-CX-KOOl from the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice.

Points of view or opinions in this book are those of NCMEC and do not necessarily represent the official position or policies of the U.S. Department of Justice

iv Author's Preface

Since 1981 I have been assigned to the Behavioral ing the same events), is the primary reason I Science Unit at the FBI Academy in Quantico, began to question at least some aspects of these Virginia, and have specialized in studying all allegations. aspects of the sexual victimization of children. I have devoted more than seven years part­ The FBI Behavioral Science Unit provides assis­ time, and eleven years full-time, of my profes­ tance to criminal justice professionals in the United sionallife to researching, training, and consulting States and foreign countries. It to de­ in the area of the sexual victimization of children. velop practical applications of the behavioral sci­ The issues of child sexual abuse and exploitation ences to the criminal justice system. As a result of are a big part of my professional life's work. I training and research conducted by the Unit and have no reason to deny their existence or nature. its successes in analyzing violent , many In fact, I have done everything I can to make professionals contact the Behavioral Science Unit people more aware of the problem. Some have for assistance and guidance in dealing with vio­ even blamed me for helping to create the hysteria lent crime, especially those cases considered dif­ that has led to these bizarre allegations. I can ferent, unusual, or bizarre. This service is pro­ accept no outside income and am paid the same vided at no cost and is not limited to crimes under salary by the FBI whether or not children are the investigative jurisdiction of the FBI. abused and exploited-and whether the number In 1983 and 1984, when I first began to hear is one or one million. As someone deeply con­ stories of what sounded like satanic or cerned about and professionally committed to activity in connection with allegations of child sex the issue, I did not lightly question the allegations rings (allegations that have since come to be re­ of hundreds of victims of child sexual abuse and ferred to most often as "ritual" child abuse), I exploitation. tended to believe them. I had been dealing with In response to accusations by a few that I am bizarre, deviant behavior for many years and had a "satanist" who has infiltrated the FBI to facili­ long since realized that almost anything is pos­ tate a cover-up, how does anyone (or should sible. Just when you think that you have heard it anyone have to) disprove such allegations? Al­ all, along comes another strange case. The idea though reluctant to dignify such absurd accusa­ tha tthere are a few cunning, secretive individuals tions with a reply, a.ll I can say to those who have in positions of power somewhere in this country made such allegations is that they are wrong and regularly killing a few people as part of some to those who heard such allega tions is to carefully satanic ritual or ceremony and getting away with consider the source. it is certainly within the realm of possibility. But The reason I have taken the position I have is the number of alleged cases began to grow and not because I support or believe in "satanism/' grow. We now have hundreds of victims alleging but because I sincerely believe that my approach that thousands of offenders are abusing and even is the proper and most effective investigative murdering tens of thousands of people as part of strategy. I believe that my approach is in the best organized satanic , and there is little or no interest of victims of child sexual abuse. It would corroborative evidence. The very reason many have been easy to sit back, as many have, and say "experts" cite for believing these allegations (i.e., nothing publicly about this controversy. I have many victims, who never met each other, report- spoken out and published on this issue because I

v am concerned about the credibility of the child quences become greater, and therefore the level sexual abuse issue and outraged that, in some of proof must be greater. The amount of corrobo­ cases, individuals are getting away with molest­ ration necessary to act upon allegations of abuse ing children because we cannot prove the allega­ is dependent upon the consequences of such ac­ tions of some people that these individuals are tion. We need to be concerned about the distribu­ satanic devil worshipers who engage in brain­ tion and publication of unsubstantiated allega­ washing, , and cannibalism as tions of bizarre sexual abuse. needs part of a large . to be disseminated to encourage communication There are many valid perspectives from which and research about the phenomena. The risks, to assess and evaluate victim allegations of sexual however, of intervenor and victim "contagion" abuse and exploitation. Parents may choose to and public hysteria are potential negative aspects believe simply because their children make the of such dissemination. Because of the highly claims. The level of proof necessary may be emotional and often religious nature of this topic, minimal because the consequences of believing there is a greater possibility that the spreading of are within the . One parent correctly told information will result in a kind of self-fulfilling me, "I believe what my child needs me to be­ prophesy. lieve." If such extreme allegations are going to be Therapists may choose to believe simply be­ disseminated to the general public, they must be cause their professional assessment is that their presented in the context of being assessed and patient the victimization and describes it evaluated, at least, from the professional perspec­ so vividly. The level of proof necessary may be no tive of the disseminator and, at best, also from the more than therapeutic evaluation because the professional perspective of relevant others. This consequences are between therapist and patient. is what I will to do in this discussion. The No independent corroboration may be required. assessment and evaluation of such allegations are A social worker must have more real, tangible areas where enforcement, mental health, and evidence of abuse in order to take protective other professionals (anthropologists, folklorists, action and initiate legal proceedings. The level of sociologists, historians, engineers, surgeons, etc.) proof necessary must be higher because the con­ may be of some assistance to each other in validat­ sequences ( of visitation, ) are ing these cases individually and in general. greater. This book sets forth my behavioral analysis of The law enforcement officer deals with the child sex rings. All the information is forth criminal justice system. The levels of proof neces­ from a law enforcement perspective in order to sary are reasonable suspicion, probable cause, improve the investigation and prosecution of and beyond a reasonable doubt because the con­ t~ese cases. The book, however, is not meant to be sequences (criminal investigation, search and sei­ a step-by-step manual on how to investigate these zure, arrest, incarceration) are so great. This cases but, rather, a general guide for law enforce­ discussion will focus primarily on the criminal ment in applying the behavioral analysis setforth. justice system and the law enforcement perspec­ The book may also be useful for social service tive. The level of proof necessary for taking action professionals, therapists, members of the legal on allegations of criminal acts must be more than system, researchers, and students examining the simply the victim alleged it and it is possible. This issues of child sexual abuse and exploitation. in no way denies the validity and importance of After many years of evaluating and analyzing the parentat therapeutic, social welfare, or any child sex ring cases, I have identified two major other perspective of these allegations. patterns or types of cases. It is difficult to label When, however, therapists and other profes­ these two patterns or types. At first I referred to sionals begin to conduct training, publish articles, them as traditional and nontraditional child sex and communicate through the media, the conse- rings. The idea of referring to any kind of child

vi sexual abuse and exploitation as "traditional," tation. I have also long realized the confusion however, was distasteful to me. For a time they created by calling different things by the same were called Type A and Type B child sex rings. name or the same thing by different names. There­ For want of better labels, I now refer to these two fore, chapters on an historical overview and the types of cases as historical child sex rings and clarification of definitions have been included in multidimensional child sex rings. These terms were this book. first suggested to me by an unknown police offi­ The complete citations for any books, articles, cer attending a training conference in , and studies mentioned in the body of the text are Ontario. After some and analysis, these set forth in the References at the end. In addition, terms were adopted because they give a descrip­ because of the complexity of many of the issues tive name or label to each type of case without the discussed in the book, an Additional Readings emotion or implication of such terms as "tradi­ section is also set forth, containing books and tional," "ritualistic," or "satanic" abuse. articles that present additionalinformation, opin­ In order to have a better understanding of the ions, and perspectives about child sex rings. problems of investigating and prosecuting child sex ring cases, I believe that it is necessary to have some knowledge of societal attitudes and histori­ Kenneth V. Lanning cal perspectives on child sexual abuse and exploi- Quantico, Virginia

vii

In order to attempt to deal with allegations of "Stranger Dangel''' what constitutes a child sex ring, it is important to have an historical perspective of society's atti­ During the 1950s and 1960s, the primary focus in tudes about child sexual abuse. A brief synopsis the literature and discussions on sexual abuse of of recent attitudes in the will be children was on "stranger danger"-the dirty old provided here, but those desiring more detailed man in the wrinkled raincoat. If one could not information about such societal attitudes, par­ deny the existence of child sexual abuse, one ticularly in other and in the more distant described victimization in simplistic terms of good past, should refer to Florence Rush's book, The and evil. The "stranger danger" approach to Best Kept Secret: Sexual Abuse of Children, and preventing child sexual abuse is clear-cut. We Sander J. Breiner's book, Slaughter of the Innocents immediately know who the good guys and bad (see References). guys are and what they look like. Society's about child sexual abuse The FBI distributed a poster that epitomized and exploitation can be summed up in one word: this attitude. It showed a man, with his hat pulled denial. Most people do not want to hear about it down, hiding behind a tree with a bag of candy in and would prefer to pretend that child sexual his hands. He was waiting for a sweet little victimization just does not occur. Today, how­ walking home from school alone. At the top it ever, it is difficult to pretend that it does not read, "Boys and , color the page, memorize happen. Stories and reports about child sexual the rules." At the bottom it read, "For your victimization are daily occurrences. protection, remember to turn down from It is important for professionals dealing with strangers, und refuse rides offered by strangers." child sexual abuse to recognize and learn to man­ The poster clearly contrasts the evil of the of­ age this denial of a serious problem. Profession­ fender with the goodness of the child victim. als must overcome the denial and encourage so­ The myth of the child molester as the dirty old ciety to deal with, report, and prevent sexual man in the wrinkled raincoat is now being re­ victimization of children. evaluated, based on what we now know about Some professionals, however, in their zeal to the kinds of people who victimize children. The make American society more aware of this vic­ fact is, a child molester can look like anyone else timization, tend to exaggerate the problem. Pre­ and even be someone we know and like. sentations and literature with poorly documented There is another myth that is still with us and or misleading claims about one in three children is far less likely to be discussed. This is the myth being sexually molested, the $5 billion child por­ of the child victim as a completely innocent little nographyindustry, child rings, and50,000 girl walking down the street minding her own stranger-abducted children are not uncommon. business. It may be more important to dispel this The problem is bad enough; it is not necessary to myth than the myth of the evil offender, espe- exaggerate it. Professionals should cite reputable . cially when talking about the sexual exploitation and scientific studies and note the sources of of children and child sex rings. Child victims can information. If they do not, when the exaggera­ be boys as well as girls and not all victims are little tions and distortions are discovered, their cred­ "angels." ibility and the credibility of the issue are lost.

1

In the emotional zeal over the problem of molester and related problems such as child por­ missing children, isolated horror stories and dis­ nography, the voice calling us back to "stranger tortednumbers were sometimes used. TheAmeri­ danger" still persists. can public was led to believe that most of the missing children had been kidnapped by Satanism: A HNew" Form of pedophiles-a new term for child molesters. The HStranger Danger" media, profiteers, and well-intentioned zealots all played big roles in this hype and hysteria over It is difficult to define satanism precisely. No missing children. attempt will be made to do so here. However, it is important to realize that, for some people, any The Acquaintance Molester religious system other than their own is satanic. In today's version of "stranger danger," Only recently has society begun to deal openly it is the satanic devil worshipers who are traffick­ with a critical piece in the puzzle of child sexual ing in child and snatching and vic­ abuse-acquaintance molestation. This seems to timizing the children. Many who warned us in be the most difficult aspect of the problem for us the early about pedophiles snatching 50,000 to face. People seem more willing to accept a kids a year now contend they were wrong only father or stepfather, particularly one from a dif­ about who was doing the , not about ferent background, as a child molester than a the number abducted. This is again the desire for parish priest, a -door neighbor, a police offi­ the simple and clear-cut explanation for a com­ cer, a pediatrician, an FBI agent, or a scout leader. plex problem. The acquaintance molester, by definition, is one For those who know anything about crimi­ of us. These kinds of molesters have always nology, one of the oldest theories of crime is existed, but our society has not been willing to demonology: The devil makes you do it. This accept that fact. makes it even easier to deal with the child mo­ Sadly, one of the main reasons that the crimi­ lester who is the "pillar of the community." It is nal justice system and the public were forced to not his fault. It is not our fault. There is no way confront the problem of acquaintance molesta­ we could have known that the devil made him do tion was the preponderance of lawsuits arising it. Thif: explanation has tremendous appeal be­ from the negligence of many institutions. cause, like"stranger danger," it presents the clear­ One of the unfortunate outcomes of society's cut, black-and-white struggle between good and preference for the "stranger danger" concept is evil as the explanation for , ex­ whatthe author calls, "say no, yell, and tell" . ploitation, and abuse. This is the result of prevention programs that tell In regard to satanic "ritual" abuse, today we potential child victims to avoid sexual abuse by may not be where we were with inc::st in the 1960s saying no, yelling, and telling. This might work when some people denied the problem existed, with the stranger hiding behind a tree. Adoles­ but where we were with missing children in the cent boys seduced by a scout leader or children early 1980s when some people exaggerated and who actively participate in their victimization distorted the nature of the problem. The best data often feel guilty and themselves because now available, as published in the U.S. Depart­ they did not do wha tthey were"supposed" to do. ment ofJustice's 1990 NationalIncidence Studies on They may feel a need to describe their victimiza­ Missing,Abducted,Runaway, and Thrownaway Chil­ tion in more socially acceptable but sometimes dren in America (NISMART), estimate the number inaccurate ways that relieve them of this guilt. of stereotypical child abductions at between 200 While American society became increasingly and 300 a year and the number of stranger abduc­ more aware of the problem of the acquaintance tion of children at between 43 and 147

3 a year (see References). Approximately half of the abducted children are teenagers. Today's facts are significantly different from yesterday's per­ ceptions and those who exaggerated the problem, however well-intentioned, have lost credibility and damaged the of the problem.

4 2& Definitions

In Chapter I, the author deliberately used a vari­ we rarely define them. What is the difference ety of terms without defining them in order to between child molestation and child ? Why make a point. Many of the terms are thought to be does one group call itself Society' s League Against basic and are regularly used by both profession­ Molesters (SLAM) and another group call itself als and nonprofessionals. Mothers Against the Rape of Children (MARC)? During the 1980s, the author had the honor What does it mean to the average citizen to read and privilege of making presentations at the N a­ in the paper that a child was the victim of indecent tional Conference on Sexual Victimization of assault, or a child was sodomized, or an offender Children, the National Conference on Child Abuse was convicted of indecent libert-ies with a child? and Neglect, the National Conference on Missing Terms such as of children and and Exploited Children, the National Conference youth or sexual assault of children and adolescents on Child Sexual Exploitation, and the National imply that a youth or an adolescent is not a child. Symposium on Child Sexual Abuse. All these At what age does a child become a youth? If such conferences were very similar and many of the a person is sexually victimized, is that considered same issues were discussed. A number of the youth molestation or sexual abuse of youths? presenters were the same. Why then were they Although many recognize the importance of called by different names? What, if any, is the definitions, a major problem is the fact that most difference between sexual exploitation, abuse, of these terms do not have universally accepted and victimization of children? There is still con­ definitions. They have different meanings on fusion among professionals with regard to the different levels to different disciplines. For ex­ terms child molester and pedophile. (For a complete ample, the dictionary definition of a pedophile is discussion of the terms child molester and pedophile, not the same as the psychiatric definition in the see Child Molesters: A Behavioral Analysis, listed in Diagnostic and Statistical Manual of Mental Disor­ References.) ders (DSM-III-R) (see References). Legal defini­ Some say that pervades tions may not be the same as societal attitudes. In the country, and others say that it is not openly usage in the federal , sexual distributed anywhere in the United States. Some exploitation of children is what occurs outside the say there is a connection between missing chil­ family, and sexual abuse of children is what occurs dren and child pornography, and others say there inside the family. The definition problem is most is not. Some people quote the FBI as stating that acute when professionals from different disci­ there are approximately 70 stranger-abducted plines come together to work or communicate children each year, while others claim that there about child sexual abuse. are 50,000. This is not simply a matter of a The important point, then, is not that these difference of opinion. This is actually the result of terms should have only one definition but that confusion over definitions. people using the terms should communicate their In written and spoken communication, defi­ definitions, whatever they might be. Following nitions are crucial to understanding. The prob­ are the author's attempts to define some terms lem is that when we use basic or common terms, used in this book. These are certainly not the only

5 definitions for these terms. They may not even be Another problem is the fact that the offender the best definitions. They are simply the author's can be significantly older than the child victim but definitions. not be an . Offenders are frequently 13 to 16 years of age. The criminal justice system has a Sexual Victimization of Children difficult time with these adolescent sex offenders. An even more difficult case involves an offender The term sexual victimization of children is a broad who is 6, 7, or 8 years old. The criminal justice term that encompasses all the ways in which a system does not seem to have the slightest idea child can be sexually victimized. Under this what to do with a child molester who is 7 years umbrella term are the following terms: sexual old. abuse of children, sexual exploitation of children, and The criminal investigator must understand missing children. The term missing children is partly the dynamics involved. As a general rule, the outside this umbrella because a portion of the younger the , the greater the likeli­ population of missing children has nothing to do hood that the offender is also a victim. The author with sexual victimization. is not suggesting that the offenses of such chil­ dren be ignored, but only that they also be viewed Sexual Abuse of Children as a possible indicator of prior victimiza tion. This victimization may involve psychological, physi­ The basic term sexual abuse of children comprises cal, or sexual abuse that mayor may not be three elements: 1) a significantly older criminal in nature. who engages in 2) sexual activity with 3) someone A central theme of this training book is to who is legally a child. This seems to be a simple, emphasize the "big picture" approach to investi­ basic definition, but each of the elements is com­ gation. In short, a reported case of a 7-year-old plex and potentially confusing. child molester requires an investigation of more than just the reported crime. Almost everyone Significantly Olderlndividual How much older has heard of the "cycle of " (see below). is "significantly older"? Clearly, in many cases, Many people, however, have the idea that the the dynamics of the case may be more important cycle of violence only means that child victims than simply the chronological age of the indi­ grow up and become adult offenders. It also can viduals. There are, however, some working guide­ mean that the same individual is both a victim lines. Is it sexual abuse for a 14-year-old child to and offender at the same time. For example, say have sex with a 12-year-old child? The rule of that a man sexually molests a 13-year-old boy. thumb that psychiatrists and others use is that The 13-year-old boy goes home and molests his 7- there must be an age difference of five years. year-old brother. The 7-year-old brother then There are, however, cases in which the age differ­ molests the baby his mother is babysitting. The ence is less than five years and yet the sexual investigation of the last crime should lead back to behavior seems to fit the power abuse dynamics the first crime. of child sexual abuse. There are also cases in CYCLE OF VIOLENCE which the age difference is greater than five years, but the behavior does not seem to fit the dynam­ Family Physical! ics. One of the most difficult cases to evaluate is Sexual Abuse that involving a younger and an older adoles­ cent-for example, a 13-year-old girl and a 19- year-old boy. It is more than five years' differ­ ence, but is it child sexual abuse? What does the law say? What does society say?

6 The definition of sexual abuse of children states Other acts involve societal and cultural judg­ that the offender is a significantly older indi­ ments. Does allowing children to watch vidual, not a significantly older male. There are have sex or to gain access to pornography consti­ female child molesters. From his investigative tute child sexual abuse or child neglect? Should , the au/:;lor believes that between 5 artists, photographers, and therapists have spe­ percent and 15 percent of the sexual abuse of cial privileges under child pornography statutes? children is perpetrated by females. But this cre­ Is it child abuse to ask a child to reenact sexual ates another set of problems. abuse the child has described? Is it a crime to When the victim of a female child molester is photograph the reenactment? Is burning a child's an adolescent boy, some consider the boy "lucky" genitals with a lit cigarette , sexual or experiencing a "rite of passage." When the abuse, or both? victim is a young child, it is difficult to prove that the alleged acts were sexual in nature. The author Legally a Child What is a child? The answer to is aware of cases in which a woman has been this basic and simple question can be confusing caught with her mouth on the genitals of a young and complex. In our society, for purposes of child and subsequently claimed that the act was being served alcohol you become an adult at 21; part of some child-rearing or calming technique. for purposes of voting you become an adult at 18; If a male offender alleged this, he would be a for purposes of driving a car you become an adult laughingstock. at 16; and for purposes of consenting to you become an adult, in some states, at 14. Sexual Activity What is a sexual act? Child It is not clear in our society exactly when a sexual abuse can run the gamut of "normal" child becomes an adult. The author recently sexual acts from fondling to intercourse. It can found an article in the newspaper with the head­ also include deviant sexual acts involving sado­ ing, "No longer children, but not yet fully formed masochism, , urination, and defecation. adolescents, the 10- to 14-year-old group has Some acts can be sexual acts if you can prove come under increasing scrutiny." Is this article the intent of the individual. Are kissing a child, implying that 10-year-old persons are not chil­ hugging a child, or appearing naked in front of a dren? There clearly can be a conflict between the child sexual acts? Are giving a child an enema, law and society when it comes to defining a child. taking a rectal temperature, or cutting a child's The main problem is with the 13- to 17-year-old hair sexual acts? Are a physical examination by a age group. Those are the victims who most likely doctor, wrestling instructions by a coach, or pho­ look like adults, act like adults, and have sex tographing a child playing dead sexual acts? It is drives like adults-but who mayor may not be common for child molesters when interviewed to considered children under some and by admit their acts but deny the intent (i.e., "I was society. teaching my child the difference between a good For example, federal law defines child pornog­ and bad touch. II "I was teaching my child the facts raphy as sexually explicit visual depictions of of life. ") All these acts could be sexual acts if you minors. A is defined as someone who has could prove the intent was for sexual gratifica­ not yet reached his or her eighteenth birthday. A tion. Some acts may not be crimes even if you sexually explicit photograph of a mature-looking could prove they were for sexual gratification. 17-year-old girl is therefore legally child pornog­ Photographing children in the playground, tape raphy. Such photographs are not, however, what recording the belching of boys, or listening to most people think of when they think of child children urinate in a public bathroom can be pornography. This again reflects the problem of sexual acts for some individuals, but they are definitions. Arguments about child pornogra­ most likely not crimes. phy, such as whether it is openly sold or whether

7 it is of interest only to pedophiles, may be prima­ dealing with adolescent victims. Issues such as rily the result of confusion over the definition. whether the victim consented or whether the Many people using the term sexual abuse of offender was a guardian or caretaker are impor­ children are referring to children 12 or younger. tant legal considerations in such cases. It is con­ This results in a sympathy level for victims that is fusing how the law determines when inversely proportional to their age and sexual dealing with a 14-year-old boy seduced by a 55- development. There was a famous case in the year-old pedophile. early 1980s involving a judge who sentenced a To determine who is a child, law enforcement convicted child molester to a minimal officers must turn to the law. The penal code will because the judge felt the 5-year-old victim was legally define who is a child. But law enforcement sexually promiscuous. Society was outraged and officers must still deal with their own perceptions demanded that the judge be removed from the as well as those of the and society as a whole. bench. The sad reality is that most people were outraged for the wrong reason-because they Sexual Exploitation of Children thought it was impossible for a 5-year-old child to be sexually promiscuous. Although not typical, it Sexual exploitation is a form of victimization that is possible for such a child to be sexually promis­ goes beyond the dynamics of an offender, a vic­ cuous. Of course, this is the result of abuse, not the tim, and a sexual act. Sexual exploitation of children, cause. It should make no difference, however, as the author uses the term, includes the dynam­ whether or not the 5-year-old child was sexually ics of 1) child pornography, 2) child , promiscuous. It in no way lessens the offender's and 3) child sex rings. crime or responsibility. If you change the case It is not relevant to confine the term to sexual slightly and make the victim 9 years old, does that acts within or outside the family because sexual make a difference? Most people would probably exploitation of children can clearly occur in both say no. If you change it again and make the victim cases. An incestuous father can be a collector and 12 years old, many people would still say it makes distributor of child pornography. A father mo­ no difference, buttheymightwanttoseea picture lesting his own child can also simultaneously of the victim. If you change it again and make the sexually abuse other children and thus operate a victim 13, 14, IS, or 16 years old, the response of child sex ring. Not all sexually exploited children society and even the law would vary greatly. are sexually abused. For example, a child who Legal definitions of who is a child vary from has been surreptitiously photographed in the state to state and even statute to statute when nude by a child molester has been sexually ex­ ploited but not necessarily sexually abused.

8 3. Child Sex Rings

In this book, the term child sex ring is defined as tigation of child sex rings requires specialized one or more offenders simultaneously involved techniques. The author has become convinced sexually with several child victims. As a rule of that the intrafamilial modelfor dealing with child thumb, a child is defined as someone who has not sexual abuse has only limited application when yet reached his or her eighteenth birthday. Legal dealing with multi-offender / multi-victim child definitions, however, of what constitutes a child sexual exploitation cases. may vary from situation to situation and case to In one case that the author was asked to case and must be considered in any criminal evaluate, a military officer had sexually molested investigation. his daughter from shortly after birth to shortly I Child sex rings need not have a commercial before her seventh birthday. He was convicted component. In one case in which a was and sent to prison. After several years he was convicted of sexually molesting several of his released and is now living with his and students, the author used the term child sex ring daughter. When the author describes this case during a pre-sentence hearing. The attor­ during a presentation, most people operating ney objected, stating that there was no evidence only from the intrafamilial perspective of child that his had operated a sex ring. By defini­ sexual abuse react with disgust or outrage to the tion,however, that is exactly what the teacher had notion that the offender is back in the home with operated. Just because the children were not the victim. Although that is of some concern to bought and sold does not mean that it was not a the author, it is minor compared with the author's sex ring. concern for other young female children in the A child sex ring does not necessarily mean community where the offender now lives. Hav­ group sex. Although that has happened in some ing reviewed and analyzed the offender's collec­ cases, it is more likely that the offender is sexually tion of child pornography and , the author interacting with the children one at a time. In a knows a great deal about this man's sexual fanta­ child sex ring, the offender has sex with other sies and desires. His daughter is now too old to be children before terminating the sexual relation­ a preferred . Those who focus on ship with prior victims. The various child victims intrafamilial abuse rarely think of the danger to being molested during a certain period of time other children in the community because, in their usually know each other but mayor may not , intrafamilial offenders molest only their know that the offender is having sex with the own children. other children. Some may believe they are the only ones having a "special" relationship with the Dynamics of Child Sex Rings offender. Other victims may actually witness the sexual activity of the offender with other chil­ Child sex rings have many dynamics different dren. Offenders may have favorite victims that from "typical" intrafamilial abuse cases. they treat differently than the other victims. Many of the nation's child sexual abuse ex­ Multiple Victims Interaction among the mul­ perts have little or no experience dealing with tiple victims is one major difference. In child sex ring cases. All their experience is with intrafamilial cases, the sexual activity is usually a one-on-one intrafamilial cases. The inves- secret that the victim has discussed with no one

9 until takes place. Suspected victims of timate the importance of their role. Their interac­ child sex rings are more often interviewed as a tion with their victimized child can be crucial to result of discovery by others rather than volun­ the case. If the parents interrogate their children tary disclosure by the victim. This significantly or conduct their own investigation, the results changes the nature of these interviews. In addi­ can be damaging to the proper investigation of tion, in a child sex ring there are multiple victims the case. It is also possible that a child sexually whose interactions, before and after discovery, exploited in a sex ring also was or is sexually, must be examined and evaluated. physically, or psychologically abused at home.

Multiple Offenders Interaction among multiple Gender of the Victim The gender of the victim is offenders is a second major difference. Offenders the fourth major difference between intrafamilial sometimes communicate with each other and and sex ring cases. In a recent study, Dr. Gene information and material. Offender inter­ Abel found that two thirds of all victims molested action is an important in the investiga­ outside the home were boys. Unlike intrafamilial tion of these cases. The existence of multiple sexual abuse, in which the most common re­ offenders can be an investigative difficulty, but it ported victim is a young female, in child sex rings can also be an advantage. The more offenders we are often dealing with the adolescent boy involved, the greater the odds that there is a weak victim. link who can be used to corroborate the alleged abuse. Types of Child Sex Rings

The Victim's Parents The role ofthe child victim's After many years of evaluating and analyzing parents is a third major difference between child child sex ring cases, the author has identified two sex rings and intrafamilial child sexual abuse. In major patterns or types of child sex ring cases: intrafamilial cases there is usually an abusing and historical child sex rings and multidimensional child anonabusing parent. In such cases, a nonabusing sex rings. These terms were adopted because they mother may protect the child, pressure the child give a descriptive and generic name to each type not to talk about the abuse, or persuade the child of case yet avoid such loaded labels as "tradi­ to recant the story so that the father does not go to tional" or "ritualistic" or "satanic" child sexual jail. Dealing with these dynamics is important abuse and exploitation. Historical child sex rings and can be difficult. are described in Chapter 4; multidimensional Since parents are usually not the abusers in child sex rings are described in Chapter 5. Inves­ child sex ring cases, their role is different. It is a tigative techniques particular to each type of child potentially serious , however, to underes- sex ring are described in Chapter 6.

10 4. Historical Child Sex Rings The term historical child sex ring is now used to Characteristics of Historical Child Sex Rings refer to what the author previously called a child sex ring. In her 1984 book, Child Pornography and Historical child sex ring cases have the general Sex Rings, Dr. Ann W. Burgess set forth the dy­ characteristics described below. namics of such child sex rings. Dr. Burgess's research identified three types of child sex rings: Male Offenders As many as 95 percent or more solo, transition, and syndicated. In the solo ring, of the offenders in these cases are male. Even in the offender keeps the activity and photographs those few cases where there is a female offender, completely secret. Each ring involves one of­ she will most likely have one or more male accom­ fender and multiple victims. In the transition plices who are the ringleaders. ring, offenders begin to share their , I pornography, or victims. Photographs and let­ Preferential Molesters Most of the offenders in ters are traded and victims may be tested by other these cases are true pedophiles, or preferential offenders and eventually traded for their sexual child molesters. (For a complete description of services. In the syndicated ring, a well-structured the preferential child molester, see Child Molesters: organization recruits children, produces pornog­ A Behavioral Analysis, listed in References.) Most raphy, delivers direct sexual services, and estab­ of the preferential molesters will be in the seduc­ lishes an extensive network of customers. tion pattern of behavior. The main characteristics Some have beglill to refer to child sex rings as of preferential child molesters are multiple vic­ multi-offender / multi-victim cases. An historical tims, access to children, and collection of child child sex ring can involve a daycare center, a pornography and/ or . school, a scout troop, a Little League team, or neighborhood children. It can also involve mar­ Male Victims As many as 66 percent or more of riage as a method of access to children,intrafamilial the victims in these cases are male. Most of these molestation of children, and the use of family males are boys between the ages of 10 and 16. children to attract other victims. In contrast to the confusion and lack of cor­ Sexual Motivation Although preferential child roboration characteristic of multidimensional molesters frequently claim that sex is only a small child sex ring cases, there is much we know about part of their "" for children, the fact is that historical child sex ring cases. The information is when the is gone, the relation­ well-documented by law enforcement investiga­ ship is essentially over. Their primary reason for tion and is based on the author's involvement in interacting with the children is to have sex. This hundreds of these cases. The investigation of is not to say, however, that sex is their only these cases can be challenging and time consum­ motivation. Some preferential child molesters ing; once, however, a law enforcement agency care about children. understands the dynamics and is willing to com­ mit the manpower and resources, it can be easier Child Pornography and Child Erotica Preferen­ in these cases to obtain than in one­ tial child molesters almost always collect child on-one intrafamilial cases. pornography and/ or child erotica. Child pornog-

11 raphy can be defined as the sexually explicit visual molesters seduce children the same way that depiction of a minor, including sexually explicit adults seduce one another. The major difference, photographs, negatives, slides, magazines, mov­ however, is the disparity between the adult au­ ies, or videotapes. Child erotica (pedophile para­ thority of the child molester and the vulnerability phernalia) can be defined as any material, relat­ of the child victim. This is especially important if ing to children, that serves a sexual purpose for a the child molester is a prestigious authority fig­ given individuaL Some of the more common ure, such as a teacher, police officer, priest, scout types of child erotica include toys, games, draw­ leader, and so on. ings, fantasy writings, diaries, souvenirs, sexual aids, manuals, letters, books about children, psy­ The Process The seduction process chological books on , and ordinary begins when the preferential child molester sees photographs of children. a potential victim who fits his age and gender The preferential child molester's motivations preferences. It may be a 6-year-old girl or a 14- for collecting the material are that it fuels his year-old boy. Child molesters, however, can and sexual fantasies, validates his behavior, and is a do have s(x with children and sometimes adults souvenir of his relationship with the child. Many who do not fit their preferences. A child molester preferential child molesters do not possess com­ may be experimenting or may be unable to find a mercial child pornography because it is difficult child who fits his preference. Child molesters to obtain in the United States. The preferential who prefer adolescent boys sometimes become child molester who is operating a child sex ring is involved with adolescent girls as a method of very likely to have sexually explicit and arousing or attracting the boys. nonsexually explicit visual depictions of the vic­ The offender's next step in the seduction pro­ tims. cess is to gather information about the potential victim. This may involve nothing more than a Control Through Seduction Child molesters ten-minute spot evaluation of the child's de­ control their victims in a variety of ways. In the meanor, personality, dress, and financial status. historical child sex ring, they control them prima­ Through practice, many child molesters have rily through the seduction process, seducing their developed a real knack for spotting vulnerable victims with , affection, kindness, and victims. Other preferential child molesters may gifts until they have lowered the victims' inhibi­ have access to school, medical, or records. tions and gained their cooperation and "con­ These records could be valuable in determining a sent." child's interests or vulnerabilities. Almost any child can be seduced, but the most vulnerable children are those who come from broken homes Offender Strategies or who are victims of emotional neglect. The seduction process takes place over time. Control Maintaining control is very important in The offender who is operating a sex ring has the operation of a child sex ring. It takes a certain many other victims. He is willing to put in the amount of skill and cunning to maintain a simul­ time it takes to seduce a child. It may take a few taneous sexual relationship with multiple part­ minutes or a few years. Some molesters may even ners. It is especially difficult if you have the start grooming a potential victim long before the added pressure of concealing illegal behavior. In child has reached his age preference. order to operate a child sex ring, an offender has In addition to seducing his child victims, sex to know how to control and manipulate children. ring operators sometimes "seduce" the victim's As stated above, control is primarily main­ parents, gaining their trust and confidence so that tained through attention, affection, and gifts­ they will allow him free access to their children. A part of the seduction process. Preferential child favorite target victim is a boy living with a single

12 mother. The offender will sometimes pretend The typical adolescent boy is easily sexually romantic interest in the mother or express a desire aroused, sexually curious, sexually inexperienced, to be a father figure for her child. He may even and somewhat rebellious. All these traits com­ marry her or move in with her. The relationship bine to make the adolescent boy one of the easiest with the mother can be used as a cover for his victims of seduction. An adolescent boy with interest in children, and her child can be used as emotional and sexual needs is no match for a 50- bait to lure or gain access to other children. Most year-old man with an organized plan. Yet, adult parents, for example, would not be reluctant to offenders who seduce them and the society that allow their child to go on an overnight trip with judges them continue to claim that these victims the "father" of one of their child's . In this "consented." The result is a victim who feels case, however, the man in question is not the responsible for his abuse and embarrassed about child's father or even the stepfather. He is just a his actions. Once a victim is seduced, each succes­ man who lives with the mother. Once a molester sive sexual incident becomes easier and quicker. has put in the time and effort to seduce a child, he Eventually, the child victim may even take the will be very reluctant to give up access to the child initiative in the seduction. until he is finished with the child. The next step in the seduction process is the The true pedophile or preferential child mo­ lowering of inhibitions. It is easy to be judgmen­ lester often possesses an important talent in the tal toward victims when you look at only the end seduction process: his ability to identify with product of their seduction. At the beginning of children. He knows the "in" games, toys, televi­ the relationship, the child is looking for friend­ sion shows, and movies. He is skilled at recogniz­ ship, emotional support, a job, or just some fun. ing and then temporarily filling the emotional The lowering of sexual inhibitions is usually done and physical needs of children. This is why such so gradually and skillfully that the victim does offenders can be the Big Brother of the Year, the not realize he or she is a victim until it is too late. most popular teacher, or the best soccer coach. It may begin with simple affection: a kiss on the They are sometimes described as "pied pipers" cheek, a pat, a hug. It may to talking who simply attract children. This isnotto say that about sex, wrestling on the floor, hide-and-seek in some cases children will not sense that some in the dark, working out with weights, strip poker, adult is "weird" or has a "problem" before other swimming nude in the pool. The introduction of adults recognize it. photography or video cameras during this pro­ The essence of the seduction process is the cess is common. Innocent pictures progress to offender providing attention, affection, and gifts pictures of the "fun and games," which progress to the potential victim. Gifts and financial incen­ to nude or partially nude pichrres, which then tivesareimportant,especiallyforkidsfromlower escalate into sexually explicit pictures. socioeconomic backgrounds, but attention and Most preferential child molesters usually work affection are the real key. How do you tell a child towards a situation in which the child has to not to respond to attention and affection? All change clothing, or spend the night, or both. If the children crave it, but especially children who are child molester achieves either of these two objec­ not getting it at home. Moreover, because the tives, the success of the seduction is almost as­ offender is interested only in short-term gain, he sured. The objectives of changing clothes can be may allow his victims to "break the rules"-play accomplished by such ploys as squirting with the basketball or. football in the house, drink alcohol, garden hose, turning up the heat in the house, use drugs, 01' view pornography. The homes of exercising, taking a bath or shower, physical ex­ many preferential child molesters are miniature amination of the child, or swimming in a pool. amusement parks filled with garnes, toys, and Spending the night with the child is the best way athletic equipment appealing to children of his for the sexual activity to progress. age preference.

13 Sexual activity can begin with conversation tims may compete over who can do an act first or about sex. The sexual activity can progress to longest. A series of sexual acts may result in some fondling while wrestling, playing hide-and-seek special reward or recognition. The offender may in the dark, drying the child with a towel! massag­ use to control his victims, and the ing an injury, playing a physical game, or cud­ boys will enforce the rules on each other. No dling in . Adult pornography is frequently victim wants to be the one to ruin it for anyone left out for the children to "discover." else, and each victim may think he or she is the A collection of adult pornography is very offender's "favorite." All these techniques sim­ effective in sexually arousing and lowering the ply capitalize on the developmental needs of inhibitions of adolescent boys. This is the pri­ children. mary reason why preferential child molesters Violence, threats of violence, and collect adult pornography. Some of them may are most likely used by the offender when push­ even attempt to use this collection as proof that ing a victim out or attempting to hold onto a still­ they do not have a sexual preference for children. desirable victim who wants to leave. Sexually Alcohol and drugs are also used, especially with explicit notes, audiotapes, videotapes, and pho­ adolescent boys, to lower inhibitions. By the time tographs are effective insurance for a victim's the victims realize what is going on, they are in the silence. Victims worried about disclosure of ille­ middle of it and ashamed of their . gal acts, such as , joyriding, petty They did not "say no, yell, and telL" , and are also subject to black­ mail. Many victims, however, are most con­ Operation of the Historical Child Sex Ring The cerned over disclosure of (and therefore more operation of a child sex ring is dynamic and ever likely to deny) engaging in sex for money, bizarre changing. It is like a pipeline. At any given sex acts, homosexual acts in which they were the moment there are victims being recruited, vic­ active participant, and sex with other victims. In tuns being seduced, victims being molested, and child sex rings, not only does the offender have vicmns being let go, or "dumped." For most sex with the child but, in some cases, the children preferential child molesters, it is easy to recruit, have sex with each other. While children may seduce, and molest the victims. It is difficult to let admit that they were forced by the offender to the victims go without their turning against you perform certain acts with him, they find it hard to and disclosing the abuse. explain sexual experiences with other children. The offenders control the victims once they Therefore, they frequently deny such activity. are in the pipeline through a combination of One offender told the author that if you select bonding, competition, and peer pressure. Most your victims properly and seduce them properly, children, especially adolescent children, want to the secret takes care of itself. be a part of some peer group. Any offender When trying to push a victim out the end of operating a sex ring has to find a way to bind the the pipeline, the offender may pass the child to victims together. Some offenders use an existing another pedophile who prefers older children. structure such as a scout troop, a sports team, or The victim now enters a new pipeline as a pre­ ScllOOI club. Other offenders create their own seduced victim. group, such as a magic club, computer club, or religious . Some offenders just make up a Offender-Victim Bond Because victims of his­ name and establish their own rules and regula­ torical sex rings have been carefully seduced and tions. They may call themselves the "88 Clubl1 or often do not realize they are victims, they repeat­ the "Winged Serpents.'f In recent years, several edly and voluntarily return to the offender. offenders have used satanism and the occult as a Society and the criminal justice system have a bonding and controlling mechanism. difficult time understanding this. If a boy is Competition, sometimes focusing on sexual molested by his neighbor, teacher, or priest, why acts, is also an effective control technique. Vic- does he allow it to continue? Most likely, he does

14

'------_._------_. - not realize he is a victim. Some victims are willing course, some of these allegations may be true and to trade sex for attention and affection. The sex should be investigated. They are, however, not itself might even be enjoyable. The offender may typical of historical sex rings. Violence is most be them better than anyone has ever likely used to prevent disclosure. Violence dur­ treated them. They may not realize they are ing sex may also be used by sadistic preferential victims until the offender pushes them out. Then child molesters, but this is relatively rare in sex they realize all the attention, affection, and gifts rings. were just part of the master plan to use and exploit Because of the bond with the offender, vic­ them. This may be the final blow for a troubled tims frequently resent law enforcement interven­ child who has had a traumatic life. tion and may even warn the offender. Even the Most of these victims never disclose their occasional victim who comes forward and dis­ victimization. When an occasional victim does closes may feel guilty and warn the offender. The come forward and report, it is usually because he offender may also continue to manipulate the is angry at the offender for "dumping" him. He victims after investigation and disclosure. The might be jealous that the offender found a younger offender may appeal to the victim's sympathy. boy. One 16-year-old victim tried to the He may make a feeble attempt at suicide to make man who had sexually exploited him but still the victims feel guilty or disloyal. Some offenders denied he was sexually victimized. He pled may threaten the victims with physical harm or guilty rather than use the abuse as a mitigating with disclosure of the blackmail material. Some circumstance and publicly admit he had engaged offenders may bribe the victim and his family. insexualactivitywithaman. He privately admit­ A particular aspect of this offender-victim his victimization to a prosecutor. bond is especially troubling for the criminal jus­ In another case, several boys took the stand tice system. Some victims, when being pushed and testified concerning the moral character of out, or while still in the pipeline, may assist the the accused molester. When the accused molester offender in obtaining new victims. They become changed his plea to guilty, he admitted that the the bait to lure other victims. Such recruiters or boys who testified for him were also victims. "graduate" victims can and should be considered Many victims not only do not disclose, but they subjects of investigation. Their offenses, how­ strongly deny it happened when confronted. Since ever, should be viewed in the context of their most of the offenders are male, the stigma of victimization and the child sex ring. homosexuality is a serious problem for male vic­ Some victims in historical sex rings disclose tims. Although being seduced by a male child incomplete and minimized information about the molester does not necessarily make a boy a homo­ child sexual exploitation, which creates signifi­ sexual, the victims do not understand this. If a cant problems for the investigation and prosecu­ victim does disclose, he risks ridicule by his peers. tion of such cases. For instance, when the inves­ In interviewing victims of historical child sex tigator finally gets a victim to disclose the exploi­ rings, law enforcement should-in their own tation and abuse, the victim furnishes a version of minds-pretend that the victim is a subject or his victimization that he swears is true. Subse­ suspect, and expect the victim to deny or mini­ quent investigation then uncovers child pornog­ mize his acts. Some boy victims will continue to raphy or additional victims-directly conflicting deny their victimization no ma tter what the inter­ with the first victim's story. The most common viewer says or does. Some will make admissions example of this is that the victim admits that the but will minimize the quality and the quantity of offender sucked his penis, but denies that he the acts. They may minimize their involvement sucked the offender's penis. The execution of a by claiming to be drunk, drugged, or tied up, and search warrant then leads to the seizure of photo­ maximize the offender's involvement by claim­ graphs of the victim sucking the offender's penis. ing he threatened them or had a weapon. Of Additional victims may also confirm this, but

15 they vehemently deny that they did the same and can all be used to control, manipulate, thing. and motivate victims. Leaders in such organiza­ Investigators and prosecutors must under­ tions, especially those who are not the parents of stand and learn to deal with the incomplete and children involved, should be carefully screened contradictory statements of victims of historical and closely monitored. child sex rings. The dynamics of their victimiza­ Another high-risk situation involves high­ tion must be considered. They are embarrassed status authority figures. As stated above, child and ashamed of their behavior and rightfully molesters sometimes use their adult authority to believe that society will not understand their give them an edge in the seduction process. Adults victimization. Investigators who have a stereo­ with an added authority (, camp counsel­ typed concept of child sexual abuse victims or ors, coaches, religious leaders, law enforcement who are accustomed to interviewing younger officers, doctors, judges, and so on) present even children molested within their family will have a greater problems in the investigation of cases of difficult time interviewing adolescent boys mo­ child sex rings. Such offenders are in a better lested in a sex ring. Many of these victims will be position to seduce and manipulate victims and troubled, even delinquent boys from broken escape responsibility. They are usually believed homes. when they deny any allegations. In such cases, The author has a training slide on interview­ the law enforcement investigator must almost ing child sexual abuse and exploitation victims always find multiple victims or recover child tha t reads, "Never imply guilt or show disgustfor pornography or erotica in order to get a convic­ activity revealed." The same rule applies when tion. interviewing adolescent boys or girls involved in The most difficult case of all involves a subject a child sex ring. It is not the victim's fault even if who has an ideal for any child mo­ the victim did not say no, did not resist, did not lester: a therapist who specializes in treating tell, or even enjoyed the activity. troubled youth. This offender need only sit in his office while society pre-selects the most vulner­ High-Risk Situations There are certain high-risk able victims and brings them to him. The victims sihlations that arise in investigating historical are by definition "troubled" and unlikely to be child sex rings. Unfortunately, certain youth believed if they do make an allegation. In addi­ organizations inadvertently provide the child tion, such therapists, especially if they are molester with almost everything necessary to psychiatrist's or physician's assistants, can claim operate a child sex ring. A scouting organization, that certain acts of physical touching were alegiti­ for example, fulfills the sex ring offender's needs mate part of their examination or treatment. They for: 1) access to children of a specific age or may also claim to be doing research on child gender, 2) a bonding mechanism to ensure the development or on child sexual abuse. Again, cooperation and of victims, and 3) oppor­ such a case could probably only be proven through tunities to spend the night with a victim or have the identification of multiple victims and the a victim change clothing. The bonding mecha­ recovery of child pornography or erotica. Fortu­ nism of the scouts is especially useful to the nately for American law enforcement, but unfor­ offender. Loyalty to the leader and the group, tunately for American children, such offenders competition among boys, a system of rewards almost always have multiple victims and collect and recognition, and through oaths child pornography and child erotica.

16 5. Multidimensional Child Sex Rings

Sometime in early 1983 the author was first con­ tacted on these cases on a regular basis. Inquiries tacted by a law enforcement agency for guidance have been received from law enforcement offic­ in what was then thought to be an unusual case. ers, prosecutors, therapists, victims, of The exact date of the contact is unknown because victims, and the media from all over the United its significance was not recognized at the time. In States and now foreign countries. The author the months and years that followed, the author does not claim to understand completely all the received more and more inquiries about "these dynamics of these cases. He continues to keep an kinds of cases." The requests for assistance came open and to search for answers to the ques­ (and continue to come) from all over the United tions and solutions to the problems they pose. States. Many of the aspects of these cases varied, This discussion is based on the author's analysis but there were also some commonalities. Early of the several hundred of "these kinds of cases" on, however, one particularly difficult and poten­ on which he has consulted since 1983. (See also tially significant issue began to emerge. Appendix A and Appendix B.) These cases involved and continue to involve unsubstantiated allegations of bizarre activity that Dynamics of Multidimensional Child are difficult either to prove or disprove. Many of Sex Ring Cases the unsubstantiated allegations, however, do not seem to have occurred or even be possible. These What are "these kinds of cases"? They were and cases seem to call into question the credibility of continue to be difficult to define. They all involve victims of child sexual abuse and exploitation. allegations of what sounds like child sexual abuse, These are the most polarizing, frustrating, and but with a combination of some atypical dynam­ baffling cases the author has encountered in more ics. These cases seem to have the following four than eighteen years of studying the criminal as­ dynamics in common: 1) multiple young victims, pects of deviant sexual behavior. The author 2) multiple offenders, 3) fear as the controlling privately sought answers, but said nothing pub­ tactic, and 4) bizarre or ritualistic activity. licly about these cases until 1985. In October 1984, the problems in investigat­ Multiple Young Victims In almost all the cases, ing and prosecuting one of these cases in Jordan, the sexual abuse was alleged to have taken place Minnesota, became publicly known. In February or at least begun when the victims were between 1985, at the FBI Academy, the FBI sponsored and the ages of birth and 6. This very young age may the author coordinated the first national seminar be an important key to understanding these cases. held to study "these kinds of cases." Later in 1985, In addition, the victims all described multiple similar conferences sponsored by other organiza­ children being abused. The numbers ranged tions were held in Washington, D. c.; Sacramento, from three or four to as many as several hundred California; and Chicago, Illinois. These cases victims. have also been discussed at many recent regional and national conferences dealing with the sexual Multiple Offenders In almost all the cases the victimization of children and Multiple Personal­ victims reported numerous offenders. The num­ ity Disorder. Few answers have come from these bers ranged from two or three all the way up to conferences. The author continues to be con- dozens of offenders. In one recent case, the vic-

17 tims alleged 400-500 offenders were involved. always the same-none! The experts usually had Interestingly, many of the offenders (perhaps as only dealt with one-an-one intrafamilial sexual many as 40-50 percent) were reported to be fe­ abuse cases. Recently, an even more disturbing males. The multiple offenders were often family trend has developed. More and more of the members and were described as being part of a victims have been identified or evaluated by ex­ cult, occult, or satanic group. perts who have been trained to identify and spe­ cialize in . Fear as Controlling Tactic Child molesters in general are able to maintain control and ensure Characteristics of Multidimensional the secrecy of their victims in a variety of ways. Child Sex Rings These include attention and affection, , blackmail, embarrassment, threats, and violence. As previously stated, a major problem in commu­ In almost all ofthe cases studied by the author, the nicating, training, and researching in this area is victims described being frightened and reported the term used to define "these kinds of cases." threats against themselves, their families, their Many refer to them as ritual, ritualistic, or ritual­ friends, and even their pets. They reported wit­ ized abuse of children cases or satanic ritual abuse nessing acts of violence perpetrated to reinforce (SRA) cases. Such words carry specialized mean­ this fear. It is the author's belief that this fear and ings for many people and might imply that all the traumatic memory of the events may be an­ these cases are connected to occult or satanic other key to understanding many of these cases. activity. If ritual abuse is not necessarily occult or satanic, but is "merely" severe, repeated, pro­ Bizarre or Ritualistic Activity This is the most longed abuse, why use a term that, in the minds of difficult dynamic of these cases to describe. Bi­ so many, implies such specific motivation? zarre is a relative term. Is the use of urine or feces Others refer to these cases as multi-offender / in sexual activity bizarre, or is it a well-docu­ multi-victim cases. The problem with this term is mented aspect of sexual deviancy, or is it part of that most multi.ple offender and victim cases do established satanic rituals? As previously dis­ not involve the four dynamics discussed above. cussed, the ritualistic aspectis even more difficult For want of a better term, the author has to define. How do you distinguish acts per­ decided to refer to "these kinds of cases" as mul­ formed in a precise manner to enhance or allow tidimensional child sex rings. Right now the author from those acts that fulfill spiritual seems to be the only one using this term. The needs or comply with "religious" ceremonies? author is, however, not sure if this is truly a Victims in these cases report ceremonies, chant­ distinct kind of child sex ring case or just a case not ing, robes and costumes, drugs, use of urine and properly handled. Following are the general feces, animal sacrifice, , abduction, mutila­ characteristics of these multidimensional child tion, murder, and even cannibalism and sex ring cases as contrasted with more common vampirism. All things considered, the word bi­ historical child sex ring cases. zarre is probably preferable to the word ritual to describe this activity: female Offenders As many as 40-50 percent of Wh.en the author was contacted on these cases, the offenders in these cases are reported to be it was very common for a prosecutor or investiga­ women. This is in marked contrast to historical to say that the alleged victims had been evalu­ child sex rings (see Chapter 4) in which almost all ated by an "expert" who would stake his or her the offenders are men. professional reputation on the fact that the vic­ tims were telling the "truth." When asked how Situational Molesters The offenders appear to many cases this expert had previously evaluated be sexually interacting with the child victims for involving these four dynamics, the answer was reasons other than a true sexual preference for

18 children. The children are substitute victims and Control Through Fear Control through fear may the abusive activity may have little to do with be the overriding characteristic of these cases. pedophilia. (See Child Molesters: A Behavioral Control is maintained by frightening the chil­ Analysis,listed in References for a further expla­ dren. A very young child might not be able to nation about types of molesters.) understand the significance of much of the sexual activity but certainly understands fear. The sto­ Male and Female Victims Both boys and girls ries that the victims tell may be their perceived appear to be targeted, but with an apparent pref­ versions of severe traumatic memories. They erence for girls. Almost all the adult survivors are may be victims of a severely traumatized child­ female, but daycare cases frequently involve male hood in which being sexually abused was just one as well as female victims. The most striking of the many negative events affecting their lives. characteristic of the victims, however, is their young age (generally birth to 6 years old when the Scenarios abuse began). Multidimensional child sex rings typically emerge Multidimensional Motivation Sexual gratifica­ from one of four scenarios: 1) adult survivors, 2) tion appears to be only part of the motivation for daycare cases, 3) family/isolated neighborhood the "sexual" activity. Many people today argue cases, and 4) custody/visitation disputes. that the motivation is "spiritual"-possibly part of an occult ceremony. It is the author's opinion Adult Survivors In adult survivor cases, adults that the motivation may have more to do with of almost any age-nearly always women-are , hostility, rage, and resentment carried out suffering the consequences of a variety of per­ against weak and vulnerable victims. Much of sonal problems and failures in their lives (e.g., the ritualistic abuse of children may not be sexual promiscuity, eating disorders, drug and alcohol in nature. Some of the activity may, in fact, be abuse, failed relationships, self-mutilation, un­ physical abuse directed at sexually significant employment). As a result of some precipitating body parts (penis, anus, nipples). This may also stress or crisis, they often seek therapy. They are partially explain the large percentage of female frequently hypnotized, intentionally or uninten­ offenders. Physical abuse of children by females tionally, as part of the therapy and are often is well-documented. diagnosed as suffering from Multiple . Gradually, during the therapy, the Pornography and Paraphernalia Although many adults reveal previously unrecalled memories of of the victims of mul tidimensional child sex rings early childhood victimization that includes mul­ claim that pictures and videotapes of the activity tiple victims and offenders, fear as the controlling were made, no such visual record has been found tactic, and bizarre or ritualistic activity. Adult

by law enforcement. In recent years, American survivors may also claim that /I cues" from certain law enforcement has seized large amounts of events in their recent life "triggered" the previ­ child pornography portraying children in a wide ously repressed memories. variety of sexual activity and . None The multiple offenders are often described as of it, however, portrays the kind of bizarre and/ members of a cult or satanic group. Parents, or ritualistic activity described by these victims. family members, clergy, civic leaders, police of­ Perhaps these offenders use and store their por­ ficers (or individuals wearing police uniforms), nography and paraphernalia in ways different and other prominent members of society are fre­ from preferential child molesters (pedophiles). quently described as present at and participating This is an area needing additional research and in the exploitation. The alleged bizarre activity investigation. often includes insertion of foreign objects, wit-

19 nessing mutilations, and sexual acts and ily. The group is often defined by geographic being filmed or photographed. The offenders boundary, such as a cul-de-sac, apartment build­ may allegedly still be harassing or threa tening the ing, or isolated rural setting. Such accounts are victims. They report being particularly fright­ most common in rural or suburban communities ened on certain dates and by certain situations. In with high concentrations of religiously conserva­ several of these cases, women (called breeders) tive people. The stories are similar to those told of claim to have had babies that were turned over for the daycare setting, but with more male offend­ . This type of case is probably best ers. The basic dynamics remain the same, but typified by books like Michelle Remembers I 's victims tend to be more than 6 years of age, and Underground, and Satan's Children (see References). the scenario may also involve a custody or visita­ If and when therapists come to believe the tion dispute. patient or decide the law requires it, or FBI are sometimes contacted to conduct an inves­ CustodyNisitation Dispute In custody /visita­ tigation. The therapists may also fear for their tion dispute cases, the allegations emanate from a safety because they now know the "secret." The custody or visitation dispute over at least one therapists will frequently tell law enforcement child under the age of 7. The four dynamics that they will stake their professional reputation described above make these cases extremely dif­ on the fact that their patient is telling the truth. ficult to handle. When complicated by the strong SOYle adult survivors go directly to law enforce­ emotions of this scenario, the cases can be over­ ment. They may also go from place to place in an whelming. This is especially true if the disclosing effort to find therapists or investigators who will child victims have been taken into the "under­ listen to and believe them. Their ability to pro­ ground" by a parent during the custody or visita­ vide verifiable details varies and many were raised tion dispute. Some of these parents or relatives in apparently religious homes. Some adult survi­ may even provide authorities with diaries or vors are now reporting participation in specific tapes of their interviews with the children. An murders or child abductions that are known to accurate evaluation and assessment of a young have taken place or leaving out the satanic cult child held in isolation in this underground while aspect. being "debriefed" by a parent or someone else is almost impossible. However well-intentioned, Daycare In daycare cases, children currently or these self-appointed investigators severely dam­ formerly attending a daycare center gradually age any chance to validate these cases objectively. describe their victimization at the center and at other locations to which they were taken by the What Is "Ritual" Child Abuse? daycare staff. The cases include multiple victims and offenders, fear, and bizarre or ritualistic ac­ The author cannot define ritual child abuse pre­ tivity, with a particularly high number of female cisely and prefers not to use the term, but is, offenders. Descriptions of strange games, inser­ however, frequently forced to use it (as through­ tion of foreign objects, killing of animals, photo­ out this discussion) so that people will have some graphing of activities, and wearing of costumes idea of what is being discussed. Use of the term are common. The accounts of the young children, is confusing, misleading, and counterproductive. however, do not seem to be quite as ''bizarre'' as The newer term, satanic ritual abuse (SRA), is those of the adult survivors with fewer accounts even worse. Certain observations, however, are of human sacrifice. important for investigative understanding. Most people today use the term to refer to Family/Isolated Neighborhood In family /iso­ abuse of children that is part of some evil spiritual lated neighborhood cases, children describe their belief system, which almost by definition must be victimization within their family or extended fam- satanic.

20 Dr. , coauthor of Michelle tute child abuse? Does group care of children in Remembers, defined ritualized abuse of children, a commune or cult constitute child abuse? Does in a presentation in Richmond, Virginia, on May the fact that any acts in question were performed 7,1987, as "repeated physical, emotional, mental, with parental permission affect the nature of the and spirihlal combined with a systematic crime? Many ritualistic acts, whether satanic or use of symbols and secret ceremonies designed to not, are simply not crimes. To open the Pandora's turn a child against itself, family, society, and box of labeling child abuse as "ritualistic" simply God." He also states that "the sexual assault has because it involves a spiritual belief system, means ritualistic meaning and is not for sexual gratifica­ to apply the definition to all acts by all spiritual tion." belief systems. The day may come when many in This definition may have value for academics, the forefront of concern about ritual abuse will sociologists, and therapists, but it creates poten­ regret they opened the box. tial problems for law enforcement. Certain acts When a victim describes and investigation engaged in with children (i.e., kissing, touching, corroborates what sounds like ritualistic activity, appearing naked, etc.) may be criminal if per­ several must be considered. The formed for sexual gratification. If the ritualistic ritualistic activity may be part of the excessive acts were in fact perfO'rmed for spiritual indoctri­ religiosity of mentally disturbed, even psychotic nation, potential prosecution can be jeopardized, offenders. It may be a misunderstood part of particularly if the acts can be defended as consti­ sexual ritual. The ritualistic activity may be inci­ tutionally protected religiOUS expression. The dental to any real abuse. The offender may be mutilation of a baby's genitals for sadistic sexual involved in ritualistic activity with a child and pleasure is a crime. The circumcision of a baby's also may be abusing a child, but one may have genitals for religious reasons is most likely NOT a little or nothing to do with the othel. crime. The intent of the acts is important for The offender may be deliberately engaging in criminal prosecution. ritualistic activity with a child as part of child Not all spiritually motivated ritualistic activ­ abuse and exploitation. The motivation, how­ ity is satanic. Santeria, witchcraft, voodoo, and ever, may be not to indoctrinate the child into a most religious cults are not satanism. In fact, most belief system, but to lower the inhibitions of, spiritually or religiously based abuse of children control, manipulate, and/ or confuse the child. In has nothing to do with satanism. Most child all the hlrmoil over this issue, it would be a very abuse that could be termed "ritualistic" by vari­ effective strategy for any child molester deliber­ ous definitions is more likely to be physical and ately to introduce ritualistic elements into his psychological rather than sexual in nature. If a crime in order to confuse the child and therefore distinction needs to be made between satanic and the criminal justice system. This would, however, nonsatanic child abuse, the indicators for that make the activity a part of the offender's modus distinction must be related to specific satanic operandi (MO) and not ritual. symbols, artifacts, or doctrine rather than the The ritualistic activity and the child abuse mere presence of any ritualistic element. may be integral parts of some spirihlal belief Not all such ritualistic activity with a child is system. In that case, the greatest risk is to the a crime. Almost all parents with religious beliefs children of the practitioners. But this is true of all indoctrinate their children into that belief system. cults and , not just satanic cults. A high Is male circumcision for religious reasons child potential of abuse exists for any children raised in abuse? Is the religious circumcision of females a group isolated from the mainstream of society, child abuse? Does having a child kneel on a hard especially if the group has a charismatic leader floor reciting the rosary constitute child abuse? whose orders are unquestioned and blindly Does having a child chant a satanic prayer or obeyed by the members. Sex, money, and power attend a constitute child abuse? Does are often the main motivations of the leaders of a religious belief in corporal consti- such cults.

21 Why Are Victims Alleging Things hysteria in the early 1980s. Yet, a January 1989 That Do Not Seem To Be True? Juvenile Justice Bulletin, published by the Office of Juvenile Justice and Delinquency Prevention of Some of what the victims in these cases allege is the U.S. Department of Justice, entitled "Stranger­ physically impossible (victim cut up and put back Abduction Homicides of Children" reports that together, offender took the building apart and researchers now estimate that the number of chil­ then rebuilt it); some is possible but improbable dren kidnapped and murdered by nonfamily mem­ (human sacrifice, cannibalism, vampirism); some bers is between 52 and 158 a year and that adoles­ is possible and probable (child pornography, cents 14 to 17 years old account for nearly two clever manipulation of victims); and some is cor­ thirds of these victims. These figures are also roborated (medical evidence of vaginal or anal consistent with the 1990 NISMART study previ­ trauma, offender confessions). ously mentioned. The most significant crimes being alleged that We live in a very violent society, and yet we do not seem to be true are the human sacrifice and have "only" about 23,000 murders a year. Those cannibalism by organized satanic cults. In none who accept these stories of mass human sacrifice of the multidimensional child sex ring cases of would have us believe that the satanists and other which the author is aware have bodies of the occult practitioners'~re murdering more than murder victims been found-in spite of major twice as many people every year in this country as excavations where the abuse victims claim the all the other murders combined. bodies were loca ted. The alleged explanations for In addition, in none of the cases of which the this include: the offenders moved the bodies after author is aware has any evidence of a well-orga­ the children left, the bodies were burned in por­ nized satanic cult been found. Many of those who table high-temperature ovens, the bodies were accept the stories of organized ritual abuse of put in double-decker graves under legitimately children and human sacrifice will tell you that the buried bodies, a mortician member of the cult best evidence they now have is the consistency of disposed of the bodies in a crematorium, the stories from all over America. It sounds like a offenders ate the bodies, the offenders used powerful argument. It is interesting to note that, corpses and aborted fetuses, or the power of Satan without having met each other, the hundreds of caused the bodies to disappear. people who claim to have been abducted by aliens Not only are no bodies found, but also, more from outer space also tell stories and give descrip­ importantly, there is no physical evidence that a tions of the aliens that are similar to each other. murder took place. Many of those not in law This is not to imply that allegations of child abuse enforcement do not understand that, while it is are in the same category as allegations of abduc­ possible to get rid of a body, it is even more tion by aliens from outer space. It is intended only difficult to get ride of the physical evidence that a to illustrate that individuals who never met each murder took place, especially a human sacrifice other can sometimes describe similar events with­ involving sex, blood, and mutilation. Such activ­ out necessarily having experienced them. ity would leave behind trace evidence that could The large number of people telling the same be found using modern crime scene processing story is, in fact, the biggest reason to doubt these techniques in spite of extraordinary efforts to stories. It is simply too difficult for that many clean it up. people to commit so many horrendous crimes as The victims of these human sacrifices and part of an organized conspiracy. Two or three murders are alleged to be abducted missing chil­ people murder a couple of children in a few dren, runaway and thrownaway children, der­ communities as part of a ritual, and nobody finds elicts, and the babies of breeder women. It is out? Possible. Thousands of people do the same interesting to note that many of those espousing thing to tens of thousands of victims over many these theories are using the long-since-discred­ years? Not likely. Hundreds of communities all ited numbers and rhetoric of the missing children over America are run by mayors, police depart-

22 ments, and community leaders who are practic­ with it. Why? Human nature is the answer. ing satanists and who regularly murder and eat People get angry and jealous. They come to resent people? Notlikely. In addition, these community the fact that another conspira tor is getting "more" leaders and high-ranking officials also suppos­ than they. They get in trouble and want to make edly commit these complex crimes leaving no a deal for themselves by informing on others. evidence, and at the same time function as leaders If a group of individuals degenerate to the and managers while heavily involved in using point of engaging in human sacrifice, murder, illegal drugs. Probably the closest documented and cannibalism, that would most likely be the example of this type of alleged activity in Ameri­ beginning of the end for such a group. The odds can history is the Ku Klux Klan which ironically are that someone in the group would have a used Christianity, not satanism, to rationalize its problem with such acts and be unable to maintain activity but which, as might be expected, was the secret. evenhmlly infiltrated by informants and betrayed The appeal of the satanic is by its members. twofold. First, it is a simple explanation for a As stated initially, the author was inclined to complex problem. Nothing is more simple than believe the allegations of the victims. But as the "the devil made them do it." If we do not under­ cases poured in and the months and years went stand something, we make it the work of some by, the author became more concerned about the supernatural force. During the Middle Ages, lack of physical evidence and corroboration for killers were thought to be vampires and many of the more serious allegations. With in­ werewolves, and child sexual abuse was the work creasing frequency, the author began to ask the of demons taking the form of parents and priests. question, "Why are victims alleging things that Even today, especially for those raised to believe do not seem to be true?" Many possible answers so, satanism offers an explanation as to why were considered. "good" people do bad things. It may also help to The first possible answer is obvious: clever "explain" unusual, bizarre, and compulsive sexual offenders. The allegations may not seem to be urges and behavior. true but they are true. The criminal justice system Second, the conspiracy theory is a popular lacks the knowledge, skill, and motivation to get one. We find it difficult to believe that one bizarre to the bottom of this crime conspiracy. The perpe­ individual could commit a crime we find so offen­ trators of this crime conspiracy are clever, cun­ sive. Conspiracy theories about soldiers missing ning individuals using sophisticated mind con­ in action (MIAs), abductions by UFOs, Elvis trol and techniques to control their Presley sightings, and the of promi­ victims. Law enforcement does not know how to nent public figures are the focus of much atten­ investigate these cases. tion in this country. These conspiracy theories It is technically possible that these allegations and allegations of ritual abuse have the following of an organized conspiracy involving taking over in common: 1) self-proclaimed experts, 2) tabloid daycare centers, abduction, cannibalism, mur­ media interest, 3) belief the government is in­ der, and human sacrifice might be true. But if volvedina cover-up, and 4) emotionally involved they are true, they constitute one of the greatest direct and indirect victim/witnesses. crime in history. On a recent television program commemorat­ Many people do not understand how difficult ing the 100th anniversary of Jack the Ripper, it is to commit a conspiracy crime involving nu­ almost 50 percent of the viewing audience who merous co-conspirators. One clever and cunning called the polling telephone numbers indicated individual has a good chance of getting away that they tHought the murders were corrunitted as with a well-planned interpersonal crime. Bring part of a conspiracy involving the British Royal one partner into the crime and the odds of getting Family. The five experts on the program, how­ away with it drop considerably. Themorepeople ever, unanimously agreed the crimes were the involved in the crime, the harder it is to get away work of one disorganized but lucky individual

23 who was diagnosed as a paranoid schizophrenic. Pathological Distortion and Pseudomemories In many ways, the murders ofT ack the Ripper are The first possible answer to why adult victims are similar to those allegedly committed by satanists alleging things that do not seem to be true is today. pathological distortion. The allegations in question If your child's molestation was perpetrated may be errors in processing reality influenced by by a sophisticated satanic cult, there is nothing underlying mental disorders such as dissociative you could have done to prevent it and therefore disorders, borderline or histrionic personality dis­ no reason to feel any guilt. I have been present orders, or psychosis. These distortions may be when parents who believe their children were manifested in false accounts of victimization in ritually abused at daycare centers have told oth­ order to gain psychological benefits such as atten­ ers that the cults had sensors in the road,lookouts tion and sympathy (factitious disorder). When in the air, and informers everywhere; therefore, such individuals repeatedly go from place to theusuallyrecommended advice of unannounced place or person to person making these false visits to the daycare center would be impossible. reports of their own "victimization," it is called Munchausen Syndrome. When the repeated false Alternative Explanations reports concern the "victimization" of their chil­ dren or others linked to them, it is called Even if only part of an allegation is not true, what Munchausen Syndrome by Proxy. It is amazing then is the answer to the question, "Why are when some therapists state that they believe the victims alleging things that do not seem to be allegations because they cannot think of a reason true?" After consulting with psychiatrists, psy­ why the "victim," whose failures are now ex­ chologists, anthropologists, therapists, social plained and excused or who is now the center of workers, child sexual abuse experts, and law attention at a conference or on a national televi­ enforcement investigators for more than eight sion program, would lie. If you can be forgiven years, the author can find no single, simple an­ for mutilating and killing babies, you can be swer. The answer to the question seems to be a forgiven for anything. complex set of dynamics that can be different in Although not always pathological, many "vic­ each case. In spite of the fact that some skeptics tims" may develop pseudomemories of their vic­ keep looking for it, there does not appear to be one timization and eventually come to believe the answer to the question that fits every case. Each events actually occurred. Noted forensic psy­ case is different, and each case may involve a chiatrist Park E. Dietz, in a personal communica­ different combination of answers. tion with the author in November 1991, stated: The author has identified a series of possible alternatives to this question. The alternative an­ Pseudomemories have been acquired swers also do not preclude the possibility that through (particularly if one is en­ clever offenders are sometimes involved. The couraged to keep a journal or diary author will not attempt to explain completely and to regard dream content as "clues" these alternative answers because he cannot. They about the past or as snippets of history), are presented simply as areas for consideration substance-induced altered states of con­ and evaluation by child sexual abuse intervenors, sciousness (alcohol or other drugs), group for further elaboration by experts in these fields, influence (particularly hearing vivid ac­ and for research by objective social scientists. The counts of events occurring to others with first step, however, in finding the answers to this whom one identifies emotionally such as question is to admit the possibility that some of occurs in incest survivor groups), reading what the victims describe may not have hap­ vivid accounts of events occurring to oth­ pened. Some child advocates seem unwilling to ers with whom one identifies emotion­ do this. ally, watching such accounts in films or on

24 television, and . The most effi­ part of an elaborate defense mechanism of the cientmeans of inducing pseudomemories mind called "splitting." The victims create a is hypnosis. clear-cut, good-and-evil manifestation of their complex victimization that is then psychologi­ It is characteristic of pseudomemories that cally more manageable. the recollections of complex events (as Through the defense mechanism of dissocia­ opposed to a simple unit of information, tion, the victim may escape the horrors of reality such as a tag number) are incomplete and by putting his or her mind elsewhere. This may without chronological sequence. Often result in the victim inaccurately processing the the person reports some uncertainty be­ reality of what happened because the victim was cause the pseudomemories are experi­ thinking of other things not accura tely processing enced in a manner they describe as 'hazy,' what was actually going on. In a dissociative 'fuzzy,' or 'vague.' They are often per­ state, a young child who ordinarily would know plexed that they recall some details viv­ the difference might misinterpret a film or video idly, but others dimly. Pseudomemories as reality. are not . When first telling oth­ Another defense mechanism may tell the vic­ ers of pseudomemories, these individuals tim that it could have been worse, and so his or her do not have the unshakable but irrational victimization was not so bad. They are not alone that deluded subjects have, but in their victimization-other children were also with social support they often come to abused. Their father who abused them is no defend vigorously the truthfulness of the different from other prominent people in the pseudomemories. Pseudomemories are community they claim also abused them. Satanism not fantasies, but may incorporate ele­ may help to explain why their outwardly good ments from fantasies experienced in the and religious parents did such terrible things to past. Even where the events described are them in the privacy of their home. Their religious implausible, listeners may believe them training may convince them that such unspeak­ because they are reported with such in­ able acts by supposedly "good" people must be tense affect (i.e., with so much emotion the work of the devil. The described human attached to the story) that the listener sacrifice may be symbolic of the "death" of their concludes that the events must have hap­ childhood. pened because no one could 'fake' the It may be that we should anticipate that indi­ emotional aspects of the retelling. It also viduals severely abused as very young children occurs, however, that persons report by multiple offenders with fear as the primary pseudomemories in such a matter-of-fact controlling tactic will repress the memory. This and emotionless manner that mental of their victimization may be health professionals conclude that the distorted and embellished when later recalled. person has 'dissociated' intellectualknowl­ Perhaps a horror-filled yet inaccurate account of edge of the events from emotional appre­ victimization is not only not a counterindication ciation of their impact. of abuse, but is in fact a corroborative indicator of extreme physical, psychological, and/ or sexual Traumatic Memory The second possible answer abuse. The author does not believe it is a coinci­ is traumatic memory. Fear and severe trauma can dence nor the result of deliberate planning by cause victims to store memory of those events in satanists that in almost all the cases of ritual abuse a fragmented way which can distort reality and that have come to his attention, the abuse is confuse events. This is a well-documented fact in alleged to have begun prior to the age of 7 and was cases involving individuals taken hostage or in perpetrated by multiple offenders. It may well be life-and-death sihlations. The distortions may be that such abuse, at a young age by multiple of-

25 fenders, is the most difficult to accurately recall fuse or intimidate the victims. Simple magic and with the specific and precise detail needed by the other techniques may be used to trick the chil­ criminal justice system and the most likely to be dren. Drugs may also be deliberately used to distorted and exaggerated when it is recalled. In confuse the victims and distort their perceptions. her book Too Scared to Cry, child psychiatrist Such acts would then be MO, not ritual. As Lenore Terr, a leading expert on psychic trauma previously stated, the perceptions of young vic­ in childhood, states, "that a series of early child­ tims may also be influenced by any trauma being hood shocks might not be fully and accurately experienced. This is the most popular alternative 'reconstructed' from the dreams and behaviors of explanation and even the more zealous believers the adult." of ritual abuse allegations use it, but only to explain obviously impossible events. Normal Childhood Fears and Fantasy The third possible answer may be normal childhood fears and Overzealous Intervenors Overzealous intervenors, fantasy. Most young children are afraid of ghosts causing intervenor contagion, may be a fifth an­ and monsters. Even as adults, many people feel swer. These intervenors can include parents, uncomfortable, for example, about dangling their family members, foster parents, doctors, thera­ arms over the side of their bed. They still remem­ pists, social workers, law enforcement officers, ber the "monster" under the bed from childhood. prosecutors, and any combination thereof. Vic­ While young children may rarely invent stories tims have been subtly as well as overtly rewarded about sexual activity, they might describe their and bribed by usually well-meaning intervenors victimization in terms of evil as they understand for furnishing further details. In addition, some it. In church or at home, children may be told of of what appears not to have happened may have satanic activity as the source of evil. The children originated as a result of intervenors making as­ may be "dumping" all their fears and worries sumptions about or misinterpreting whatthe vic­ unto an attentive and encouraging listener. tims are saying. The intervenors then repeat, and Children do fantasize. Perhaps whatever possibly embellish, these assumptions and misin­ causes a child to allege something impossible terpretations, and eventually the victims are (such as being cut up and put back together) is "forced" to agree with or come to accept this similar to what causes a child to allege something "official" version of what happened. possible but improbable (such as witnessing an­ The judgment of intervenors may be affected other child being chopped up and eaten.) by their zeal to uncover child sexual abuse, sa­ tanic activity, or conspiracies. However well­ Misperceptions, Confusion, and Trickery intentioned, these overzealous intervenors must Misperception, confusion, and trickery may be a accept varying degrees of responsibility for the fourth answer. Expecting young children to give unsuccessful prosecution of those cases where accurate accounts of sexual activity for which criminal abuse did occur. This is the most contro­ they have little frame of reference is unreason­ versial and least popular of the alternative expla­ able. The Broadway play M. Butterfly is the true nations. story of a man who had a fifteen-year affair, including the "birth" of a baby, with a "woman" Urban Legends Allegations of and knowledge who turns out to have been a man all along. If a about ritualistic or satanic abuse may also be grown man does not know when he has had spread through urban legends. In The Vanishing vaginal intercourse with a woman, how can we Hitchhiker, the first of his four books on the topic, expect young children not to be confused? Fur­ Dr. Jan Harold Brunvand defines urbah legends thermore, some clever offenders may deliber­ as "realistic stories concerning recent events (or ately introduce elements of satanism and the alleged events) with an ironic or supernatural occult into the sexual exploitation simply to con- twist." Dr. Brunvand's books convincingly ex-

26 plain that just because individuals throughout Most people would agree that just because a the country who never met each other tell the victim tells you one detail that turns out to be true, same story does not mean that it is true. Absurd this does not mean that every detail is true. But urban legends about the corporate logos of Proc­ many people seem to believe that if you can tor and Gamble and Liz Claiborne being satanic disprove one part of a victim's story, then the symbols persist in spite of all efforts to refute entire story is false. As previously stated, one of them with reality. Some urban legends about the author's main concerns in these cases is that child and other threats to citizens people are getting away with sexually abusing have even been disseminated unknowingly by children or committing other crimes because we law enforcement agencies. Such legends have cannot prove that they are members of organized always existed, but today the aggres­ cults who murder and eat people. sively participate in their rapid and more efficient The author has discovered that the subject of dissemination. Many Americans mistakenly be­ multidimensional child sex rings is a very emo­ lieve that print and television tabloids check out tional and polarizing issue. Everyone seems to and verify the details of their stories before put­ demand that one choose a side. On one side of the ting them on the air. Mass hysteria may partially issue are those who say that nothing really hap­ account for large numbers of victims describing pened and it is all a big witch hunt led by the same symptoms or experiences. overzealous fanatics and incompetent "experts." Training conferences for all the disciplines The other side says, in essence, that everything involved in child sexual abuse may also playa happened; victims never lie about child sexual role in the spread of this contagion. At one child abuse, and so it must be true. abuse conference attended by the author, an ex­ There is a middle ground. It is the job of the hibitor was selling more than fifty different books professional investigator to listen to all the vic­ dealing with satanism and the occult. By the end tims and conduct appropriate investigation in an of the conference, he had sold nearly all the books. effort to find out what happened, considering all At another national child sexual abuse confer­ possibilities. Not all childhood trauma is abuse. ence, the author witnessed more than 100 attend­ Not all child abuse is a crime. The great frustra­ ees copying down the widely disseminated 29 tion of these cases is the fact that you are often "Symptoms Characterizing Satanic Ritual Abuse" convinced that something traumatic happened to in preschool-aged children. Is a 4-year-old child's the victim, but do not know with any degree of "preoccupation with urine and feces" an indica­ certainty exactly what happened, when it hap­ tion of satanic ritual abuse or part of normal pened, or who did it. development? Do Child Victims Lie About Sexual Abuse Combination Most multidimensional child sex and Exploitation? ring cases probably involve a combination of the answers previously set forth, as well as other The crucial central issue in the evaluation of a possible explanations unknown to the author at response to cases of multidimensional child sex this time. Obviously, cases with adult survivors rings is the statement, "Children never lie about are more likely to involve some of these answers sexual abuse or exploitation. If they have details, than those with young children. Each case of it must have happened." This statement, over­ sexual victimization must be individually evalu­ simplified by many, is the basic premise upon ated on its own merits without any preconceived which some believe the child sexual abuse and explanations. All the possibilities must be ex­ exploitation movement is based. It is almost plored if for no other reason than the fact that the never questioned or debated at training confer­ defense attorneys for any accused subjects will ences. In fact, during the 1970s, there was a almost certainly do so. successful crusade to eliminate laws requiring

27 corroboration of child victim statements in child Victims may supply details of sexual or other sexual abuse cases. The best way to convict child acts using information from sources other than molesters is to have the child victims testify in their own direct victimization. Such sources must court. If we believe them, the jury will believe be evaluated carefully by the investigator of mul­ them. Any challenge to this basic premise was tidimensional child sex rings. viewed as a threat to the movement and a denial that the problem existed. Personal Knowledge The victim may have per­ The author believes that children rarely lie sonal knowledge of the sexual or ritual acts, but about sexual abuse or exploitation, if a lie is not as a result of the alleged victimization. The defined as a statement deliberately and mali­ knowledge could have come from viewing por­ ciously intended to deceive. The problem is the nography, , or occult material; wit­ oversimplification of the statement. Just because nessing sexual or ritual activity in the home; or a child is not lying does not necessarily mean the witnessing the sexual abuse of others. It could child is telling the truth. The author believes that also have come from having been sexually or in the majority of these cases, the victims are not physically abused, but by other than the alleged lying. They are telling you what they have come offenders and in ways other than the alleged to believe has happened to them. Furthermore, offense. the assumption that children rarely lie about sexual abuse does not necessarily apply to everything a Other Children or Victims Young children to­ child says during a sexual abuse investigation. day are socially interacting more often and at a Stories of mutilation, murder, and cannibalism younger age than ever before. Many parents are are not really about sexual abuse. unable to provide possibly simple explanations Children rarely lie about sexual abuse or ex­ for their children's stories because they were not ploitation, but they do fantasize, furnish false with the children when the events occurred. They information, furnish misleading information, do not even know what videotapes their children misperceive events, try to please adults, respond may have seen, what games they may haveplayed, to leading questions, and respond to rewards. or what stories they may have been told or over­ Children are not adults in little bodies and do go heard. Children are being placed in daycare through developm.entalstages that must be evalu­ centers for eight, ten, or twelve hours a day start­ ated and understood. In many ways, however, ing as young as 6 weeks of age. The children share children are no better and no worse than other experiences by playing house, school, or doctor. victims or witnesses of a crime. They should not Bodily functions such as urination and defecation be automatically believed, nor should they be are a focus of attention for these young children. automatically disbelieved. To a certain extent, each child shares the experi­ The second part of the statement-if children ences of all the other children. can supply details, the crime must have hap·· The odds are fairly high that in any typical pened-must also be carefully evaluated. The daycare center there might be some children who details in question in most of the cases of multidi­ are victims of incest; victims of physical abuse; mensional child sex rings have little to do with victims of ; children of cult sexual activity. Law enforcement and social work­ members (even satanists); children of sexually ers must do more than attempt to determine how open parents; children of sexually indiscriminate a child could have known about sex acts. These parents; children of parents obsessed with vic­ cases involve determining how a victim could timization; children of parents obsessed with the have known about a wide variety of bizarre and evils of satanism; children without ; ritualistic activity. Young children may know children with a teenage brother or pregnant little about specific sex acts, but they may know a mother; children with and lot about monsters, torture, kidnapping, and literature in the home; children with bizarre toys, murder. games, comics, and magazines; children with a

28 VCR and slasher films in their home; children material intended to fight the problem actually with access to dial-a-porn, party lines, or pornog­ fuels the problem and damages effective prosecu­ raphy; or children victimized by a daycare center tion. staff member. The possible effects of the interac­ tion of such children prior to the disclosure of the Suggestions and Leading Questions This prob­ alleged abuse must be evaluated. lem is particularly important in cases stemming Adult survivors may obtain details from group from custody/visitation disputes involving at therapy sessions, support networks, church least one child under the age of 7. It is the author's groups, or self-help groups. The willingness and opinion that most suggestive, leading question­ ability of to corroborate adult survivor ing of children by intervenors is inadvertently accounts of ritual abuse varies. Some will support done as part of a good-faith effort to learn the and partially corroborate the victim's allegations. truth. Not all intervenors are in equal positions to Others will vehemently deny them and support potentially influence victim allegations. Parents their accused parents or relatives. and relatives especially are in a position to subtly influence their young children to describe their Media The amount of sexually explicit, occult, victimization in a certain way. Children may also anti-occult, or violence-oriented material avail­ overhear their parents discussing the details of able to adults and even children in the modern the case. Children often tell their parents what world is overwhelming. This includes movies, they believe their parents want or need to hear. videotapes, television, music, toys, and books. Some children may be instinctively attempting to There are also documentaries on satanism, witch­ provide "therapy" for their parents by telling craft, and the occult that are available on video­ them what seems to satisfy them and somehow tape. Many televangelists have videotapes on makes them feel better. In one case a father gave satanism and the occult that they are selling on the police a tape recording to "prove" that his their programs. child's statements were spontaneous disclosures The National Coalition on Television Vio­ and not the result of leading, suggestive ques­ lence News estimates that 12 percent of the mov­ tions. The tape recording indicated just the oppo­ ies produced in the United States can be classified site. Why then did the father voluntarily give it to as satanic horror films. Cable television and the the police? Probably because he truly believed home VCR make all this material readily avail­ that he was not influencing his child's statements­ able even to young children. Religious broadcast­ but he was. ers and almost all the television tabloid andmaga­ Therapists are probably in the best position to zine programs have done shows on satanism and influence the allegations of adult survivors. The the occult. Heavy metal and black metal music, accuracy and reliability of the accounts of adult which often has a satanic theme, is readily avail­ survivors who have been hypnotized during able and popular. In addition to the much-de­ therapy is certainly open to question. One nation­ bated fantasy role-playing games, there are nu­ ally known therapist personally told the author merous popular toys on the market with an oc­ that the reason police cannot find out about sa­ cult-oriented, bizarre, or violent theme. tanic or ritualistic activity from child victims is Books on satanism and the occult, both fiction that they do not know how to ask leading ques­ and nonfiction, are readily available inmost book­ tions. Highly suggestive books and pictures por­ stores, especially religious bookstores. Several traying "satanic" activity have been developed recent books specifically discuss the issue of ritu­ and marketed to therapists for use during evalu­ alistic abuse of children. Obviously, very young ation and treatment. Types and styles of verbal children do not read this material, but their par­ interaction useful in therapy may create signifi­ ents, relatives, and therapists might and then cant problems in a criminal investigation. It discuss it in front of or with them. Much of the should be noted, however, that when a therapist

29 ---_._---- -

does a poor investigative interview as part of a fender or to misperception inadvertently caused criminal investigation, that is the fault of the by youthful inexperience. criminal justice system that allowed it and not the therapist who did it. Education and Awareness Programs Some well­ The extremely sensitive, emotional, and reli­ intentioned awareness programs designed to pre­ gious nature of these cases make problems with vent child sex abuse, alert professionals, or fight leading questions more likely than in other kinds satanism may, in fact, be unrealistically increas­ of cases. Intervenors motivated by religious fer­ ing the fears of professionals, children, and par­ vor and/or exaggerated concerns about sexual ents and creating self-fulfilling prophesies. Some abuse of children are more likely to lose their of what children and their parents are telling objectivity. intervenors may have been learned in or fueled by such programs. Religious programs, books, Misperception and Confusion by Victim In one and pamphlets that emphasize the power and case, a child's description of the apparently im­ evil force of Satan may be adding to the problem. possible act of walking through a wall turned out In fact, in cases seen by the author, most of the to be the very possible act of walking between the daycare centers in which ritualistic abuse is al­ studs of an unfinished wall in a room under leged to have taken place were church affiliated construction. In another case, pennies in the anus centers and many of the adult survivors alleging turned out to be copper-foil-covered supposito­ it came from apparently religious families. Susan ries. The children may describe what they believe Kelley, Ph.D., in a personal communication with happened. It is not a lie, but neither is it an the author in April 1992, stated that her research accurate account of what happened. It may be indicated 77.1 percent of the daycare centers in due to confusion deliberately caused by the of- which ritualistic abuse was alleged were religious affiliated daycare centers.

30 6. Investigating Multidimensional Child Sex Rings This chapter is intended to offer general guide­ Although there is frequently more corrobora­ lines on how to apply the previously discussed tive evidence available than many investigators behavioral dynamics to the investigation and pros­ realize, corroboration can be difficult in one-on­ ecution of cases of child sex rings. one child abuse cases, especially when the of­ Child sexual abuse cases can be difficult to fender is a situational child molester. In spite of prove in a court of law. Frequently there is only the many investigative difficulties already dis­ the word of one child againstthat of an adult. This cussed in this book, corroboration in child sex is, however, rarely the case in a child sex ring. ring cases is usually easier. With multiple victims, no one victim should have Law enforcement officers must stop looking to the total burden of proof. at child sexual abuse and exploitation through a keyhole-focusing on one act, by one offender, Corroboration of Evidence against one victim, on one day. Law enforcement must "kick the door open" and take the big pic­ Many factors combine to make it difficult and ture-focusing on proactive techniques, offender possibly traumatic for children to testify in court. typologies, patterns of behavior, multiple acts, In spite of some recent advances that make such multiple victims, and child pornography. This is testimony easier for the child victim or witness, a absolutely essential in the investigation of child primary objective of every law enforcement in­ sex rings. vestigation of child sexual abuse and exploitation The "big picture" approach starts with four should be to prove the case without child victim basic assumptions about child molesters: testimony in court. This is more a than a rule. It may not always be possible, but it 1. Child molesters sometimes molest should be an investigative goal. It is possible multiple victims. more often than the investigator may think, how­ 2. Intrafamilial child molesters some­ ever. Most children testify in court if necessary. times molest children outside their Obviously, the best and easiest way to avoid families. child victim testimony in court is to build a case 3. Other sex offenders sometimes molest that is so strong that the offender pleads guilty. In children. the zeal to convince society that child sexual 4. Other criminals sometimes molestchil­ abuse and exploitation exist and children do not dren. lie about it, seeking corroboration for alleged abuse has been interpreted by some as a sign of The emphasis on the word sometimes should denial or disbelief. It is, however, the author's be noted. In law enforcement, we tend to create opinion that corroboration is "the name of the neat categories of offenders. The only problem is game." Itisnotthejoboflawenforcementofficers that the offenders sometimes do not cooperate to believe a child or any other victims or wit­ and stay within the definitions. Awindowpeeper, nesses. It is the job of law enforcement to listen, an exhibitionist, or a rapist can also be a child assess, and evaluate, and then attempt to corrobo­ molester. The research of the FBI Behavioral rate. Attempts should be made to corroborate Science Unit and others clearly demonstrates this. any and all aspects of a victim's statement. "Regular" criminals can also be child molesters.

31 The author has recently been involved in three Document Indicators of Sexual Abuse Because cases in which a drug dealer and two organized the behavioral and environmental indicators of crime hit men have been identified as child mo­ child sexual abuse are set forth in many publica­ lesters. The first child molester put on the FBI tions elsewhere, they will not be set forth here "Ten Most Wanted" List was recently arrested again. The documentation of the indicators of burglarizing a service station. The simple con­ child sexual abuse and exploitation can be ex­ cept that an intrafamilial child molester might tremely valuable in corroborating child victim molest children outside his family seems beyond statemt'uts. The use of expert witnesses to intro­ the comprehension of some child abuse profes­ duce this evidence into a court of law is a comp}zx sionals. Identifying other victims can be one of legal issue which will not be discussed here in the most effective ways of corroborating an alle­ detail (see When the Victim Is a Child, listed in gation of sexual abuse by one victim. References). Experts may not be allowed to tes­ The author has evaluated a number of child tify about the guilt and innocence of the accused, sex ring cases in which the offender operated for but may be able to testify about the nature of the years after identification because no one took the offense and the victim's behavior. The most "big pichlre" approach. It is almost impossible to commonly acceptable use of such expert testi­ convict a "pillar of the community" child mo­ mony is to rebut defense allegations that the lester based only on the testimony of one delin­ prosecution has no evidence other than the testi­ quent adolescent. A child sex ring operator can­ mony of a child victim. These and other possible not be stopped unless law enforcement is willing uses of expert testimony should be discussed to evaluate the allegation, do background inves­ with the prosecutor of each case. tigation, document patterns of behavior, review Mental health professionals, sodal workers, records, identify other acts and victims, and de·· child protective service workers, as well as law velop probable cause for a search warrant. This enforcement investigators can be the source of will often mean working with other local, state, such expert testimony documenting the indica­ and federal law enforcement agencies. Many tors of sexual abuse. It must be emphasized that offenders cross jurisdictional boundaries and v io­ these are only indicators and their significance late a variety of laws when committing their must be evaluated in context by truly objective crimes. experts. Many behavioral indicators of child sexual abuse are actually indicators of trauma, General Investigative Techniques stress, and anxiety that could be caused by other events in the child's life. One advantage to the investigation of child sex rings is that the possibility of developing signifi­ Document Patterns of Behavior Two patterns of cant corroborative evidence is far greater than in behavior need documentation: victim patterns one-on-one sexual abuse cases. Much of this and offender patterns. evidence can be identified and located only if the Experts such as Roland C. Summit, M.D.; investigator has a solid understanding of the Suzanne M, Sgroi, M.D.; Ann W. Burgess, R.N" namre and dynamics of child sex rings. The D.N.sc.; and others have documented and pub­ following general investigative techniques are lished information about child sexual abuse vic­ offered as ways to corroborate allegations of child tim behavior patterns. This book has set forth sexual abuse and avoid child victim testimony in victim patterns of behavior seen in child sex ring court. If child victim testimony cannot be avoided, cases. The fact that a victim does not disclose the at least the victim will not bear the total burden of abuse for years or recants previous disclosures proof if these techniques are used. These tech­ may be part of a pattern of behavior which in fact niques can, to varying degrees, be used in any corroborates sexual abuse. Paul Derohannesian, child sexual abuse case. Here, however, they are Assistant District Attorney, Albany (New York) set forth for use in the investigation of child sex states, "The absence of proof of child sexual abuse rings. 32 can be proof of child sexual abuse." The secrecy, years. Better training and the use of protocols, the the sequence of disclosures, the recantation of colposcope, toluidine blue dye, and other tech­ statements, and the distortion of events can all be niques have improved the ability of doctors to corroboration. medically corroborate child sexual abuse. When With regard to offender patterns of behavior, used with a camera, the colposcope can docu­ many have been set forth elsewhere in this book, ment the trauma without additional examina­ and others are contained in Child Molesters: A tions of the child victim. Investigators and pros­ Behavioral Analysis,listed in References. The law ecutors should be cautioned, however, that due to enforcement investigator must understand that camera, film, and skilllirnitations, the developed doing a background investigation on a suspected photographs do not always reveal what the doc­ child molester means more than obtaining the tor observed. Positive laboratory tests for sexu­ date and place of birth and credit and criminal ally transmitted diseases can be valuable evi­ checks. School, juvenile, military, medical, em­ dence especially in cases involving very young ployment, and bank records can be valuable children. Statements made to doctors by the child sources of information about an offender. Know­ victim as part of the medical examination may be ing the kind of offender you are dealing with can admissible in court without the child testifying. go a long way toward learning where and what Law enforcementinvestigators should be cau­ kind of corroborative evidence might be found. tious of doctors who have been identified as child Knowing the kind of offender you are dealing abuse crusaders or who always find-or never with can be helpful in determining the existence find-medical evidence of sexual abuse. Medical and location of other victims and child pornogra­ doctors should be objective scientists doing a phy or erotica. professional examination. The exact cause of any vaginal or anal trauma needs to be carefully and Identify Adult Witnesses and Suspects One scientifically evaluated. It should also be noted benefit of a multi-offender case is that it increases that many acts of child sexual abuse do not leave the likelihood that there is a weak link in the any physical injuries that can be identified by a group. The conspiracy model of building a case medical examination. In addition, children's in­ against one suspect and then using that suspect's can heal rapidly. Thus, lack of medical testimony against others can be useful. Because corroboration does not necessarily mean that a of the need to protect potential child victims, the child was not sexually abused or that it cannot be conspiracy model of investiga tion has limita tions proven in court. in child sexual abuse and exploitation cases. You cannot knowingly allow children to be molested Other Victims The simple understanding and as you build your case. Corroboration of a child recognition that a child molester might have other victim's statement with adult witness testimony, victims is one of the most important steps in however, is an important and valuable technique. corroborating an allegation of child sexual abuse. There is strength in numbers. If an investigation Medical Evidence Whenever possible, all chil­ uncovers one or two victims, each will probably dren suspected of having been sexually victim­ have to testify in court. If an investigation uncov­ ized should be afforded a medical examination. ers five, ten, or thirty victims, the odds are that The primary purpose of this examination is to none of them will testify because there will not be assess potential injury and the need for treatment a trial. In one recent case, a Christian minister and to reassure the patient. A secondary purpose accused of sexually molesting boys announced at is to determine the presence of any corroborating a press conference two days before his trial that evidence of acute or chronic trauma. The ability the angel of the Lord had appeared to him and and willingness of medical doctors to corrobora te told him he would not be convicted at his trial. He child sexual abuse has improved greatly in recent technically was not convicted at his trial because

33 before the trial he changed his plea to guilty. cal evidence if found. The back page missing Why? Thirty victims were prepared to testify from a pornography magazine that the victim against him. With multiple victims, the only described is physical evidence. Satanic occult defense is to allege a flawed investigation. paraphernalia is evidence if it corroborates crimi­ Because of the volume of crime and limited nal activity. resources, many law enforcement agencies may be unable to continue an investigation to find Child Pornography and Child Erotica Child thirty victims. If that is the case, they need to try pornography, especially that produced by the to identify as many victims as possible. Other offender, is one of the most valuable pieces of victims are sometimes identified through public­ corroborative evidence of child sexual abuse that ity about the case. Consistency of statements any investigator can have. Obviously, many child obtained from multiple victims, independently molesters do not possess or collect child pornog­ interviewed, can be powerful corroboration. raphy. Investigators, however, should always look for it. Preferential child molesters, especially Search Warrants The major law enforcement those operating child sex rings, almost always problem with the use of search warrants in child collect child pornography or child erotica. If sexual abuse and exploitation cases is that they situational child molesters possess child pornog­ are not obtained soon enough. In many cases, raphy, they usually have pictures of their own investigators have probable cause for a search victims. In addition to viewing any homemade warrant but do not know it. Because of the videotapes seized from the offenders, investiga­ possibility of the movement or destruction of tors must also listen carefully to them. The voices evidence, search warrants should be obtained as and sounds may reveal valuable corroborative or soon as legally possible. Waiting too long and intelligence information. If necessary, photo­ developing, in essence, too much probable cause graphic enhancement can be used to help identify may be a reason for or even lawsuits individuals, locations, and dates on newspapers against agencies on the basis that the delay al­ and magazines otherwise unrecognizable in the lowed additional victims to be molested. Know­ child pornography. In one case, a subject was ing what to search foris also important. The value positively identified from his fingerprint, which and significance of child erotica (pedophile para­ was visible in a recovered child pornography phernalia) is often not recognized by investiga­ photograph. The FBI, U.S. Customs, and the U.S. tors. (See Child Molesters: A Behavioral Analysis, Postal Inspection Service all maintain listed in References.) and child pornography reference files that can be accessed by law enforcement agencies. Physical Evidence Physical evidence can be de­ Child erotica is not as significant as child fined as any object that corroborates anything a pornography, but it can be of value. It can help child victim said, saw, tasted, smelled, drew, and prove intent. It can be a source of intelligence so on. It could be bed sheets, articles of clothing, information-identifying other offenders or vic­ sexual aids,lubricants, and so on. It could also be tims. It can also be used to deny bond if it an object or sign on the wall described by a victim. indicates the offender is a risk to the community. If the victim says the offender ejaculated on a door Child erotica can be instrumental in influencing knob, that becomes physical evidence if found. the offender to plead guilty, and it can also be Positive identification of a subject through DNA used at the time of sentencing to demonstrate the analysis of trace amounts of biological evidence full scope of the offender's activity. This is consis­ left at a crime scene may result in a child victim tent with the "big picture" approach. not having to testify because the subject pleads guilty. Ifthe victim says the offender kept condoms Consensual Monitoring Consensual monitor­ in the nightstand by his bed, they become physi- ing is a valuable, but often underutilized, investi-

34 gative technique. It includes the use of pretext Videotaping or Audiotaping of Victims Taping phone calls and body recorders. Because of the of victims was once thought to be an ideal solu­ legal issues involved and variations in state laws, tion to many of the problems involving child use of this technique should always be discussed victim interviews and testimony. Many legisla­ with department legal advisors and prosecutors. tures rushed to pass special laws allowing it. Remember, children are not small-statured Aside from the Constitutional issues, there are adults and must never be endangered by officials. advantages and disadvantages to videotaping or The use of this teclmique with child victims pre­ audiotaping child victim statements. sents ethical as well as legal considerations. Pre­ text phone calls may be more suitable than body The advantages include the following: recorders with cllild victims but are obviously not appropriate in all cases. They may not be suitable 1. The ability to reduce the number of for use with very young victims. The use of this interviews. technique should usually be discussed with the 2. The visual impact of a videotaped parents of a victim who is a minor. The parent, statement. however, may not be trusted to be discreet about 3. The ability to deal with recanting or the use of this technique or may even be a suspect changing statements. or subject in the investigation. Although there is 4. The potential to induce a confession the potential for further emotional trauma, many when played for an offender who cares victims afterwards describe an almost therapeu­ for the child victim. tic sense of empowerment or return of conti'ol through the use of this technique. The disadvantages include: Investigators using this technique should en­ sure that they have a telephone number that 1. The artificial setting created when cannot be traced to the police and that they have people "play" to the camera instead of a method to verify the date and time of the pretext concentrating on communicating. telephone calls. Sometimes victims or their rela­ 2. Determining which interview to tives or friends do the monitoring and recording record and explaining variations be­ on their own. Investigators need to check appro­ tween them. priate laws concerning the legality of these acts 3. Accounting for the tapes after the in­ and the admissability of the material obtained. vestigation. Copies are sometimes Consensual monitoring with body recorders furnished with little control to defense is probably best reserved for use with undercover attorneys and expert witnesses. Many investigators and adult informants. Under no are played at training conferences circumstances should an investigative agency without concealing the identity of vic­ produce a videotape or audiotape of the actual tims. molestation of a child victim as part of an investi­ 4. Since there is no single objective crite­ gative technique. The victim might be used to rion on how to conduct such an inter­ introduce the undercover investigator to the sub­ view, each tape is subject to interpre­ ject. tation and criticism by "experts." Inappropriate responses obtained through consensual monitoring can be almost as damag­ Many people in favor of videotaping argue, ing as outright admissions. When told by a victim "If you are doing it right, what do you have to over the telephone that the police or a therapist hide?" When you videotape a victim interview, wants to discuss the sexual relationship, "Let's however, you create a piece of evidence that did talk about it later tonight" is not an appropriate not previously exist and chat evidence can be­ response by an offender. come the target of a great deal of highly subjective

35 scrutiny. Every word, inflection, gesture, and Investigators should consider non-custodial, movement rather than whether or not the child non-confrontational interviews of the subject at was molested becomes the focus of attention. An home or work. If you do not confront the subject imperfect interview does not mean reliable infor­ with all your evidence, he may be more likely to mation was not obtained. minimize his acts rather than fully deny them. As Although some of the disadvantages can be previously stated, many child molesters admit reduced if the tapes are made during the medical their acts but deny the intent. Interviews during evaluatiol1, it is the author's opinion that the the execution of a search warrant should also be disadvantages of taping outweigh the advan­ considered. Investigators should not overlook tages. Many experienced child sexual abuse pros­ admissions made by the offender to , girl­ ecutors are against the taping of child victim friends, neighbors, friends, and even the media. statements as a general rule, although special Interview techniques and strategies could circumstances may alter this opinion on a case­ easily be the topic of an entire training publica­ by-case basis. Departments should be careful of tion. In this limited space, however, no attempt written policies concerning taping. It is poten­ will be made to present an in-depth discussion of tially embarrassing and damaging to have to subject interviews. Suffice it to say, the ability to admit in court that you usually tape such inter­ be an effective interviewer is an important skill views, but you did not in this case. It is better to for any criminal investigator. In view of the be able to say that you usually do not tape such stakes involved, child sexual abuse investigators interviews, but you did in a certain case because must do everything reasonably possible to im­ of some special circumstances. prove their skills in this area.

Subj ed Confessions Getting a subject to confess Surveillance Surveillance can be a time-consum­ obviously can be an effective way to corroborate ing and expensive investigative technique. In child sexual abuse and avoid child victim testi­ child sex ring cases, it can also be highly effective. mony in court. Unfortunately, many investiga­ Time and expense can be reduced if the surveil­ tors put minimal effort into subject interviews. lance is not open-ended but is based on inside They typically rush in too soon without develop­ information about the subject's activity. One ing background information and an interview obvious problem, however, is what to do when

strategy. The biggest probleml however, is the the surveillance team comes to believe that a child fact that many investigators cannot control or is being victimized. How much reasonable suspi­ conceal their anger and outrage at the offender's cion or probable cause does an investigator on behavior. They want to spend as little time as physical or electronic surveillance need in order possible with him. In addition, many investiga­ to take action? If a suspected child molester tors find it difficult to discuss deviant sexual simply goes into a residence with a child, does behavior calmly and nonjudgmentally. law enforcement have the right to intervene? The fact is that many of these offenders really What if the offender is simply paying the newspa­ want to discuss their behavior or at least their per boy or watching television with a neighbor­ rationalization for it. If treated with professional­ hood child? These are important legal and ethical ism, empathy, and understanding, many of these issues to consider when using the surveillance offenders will make significant admissions. If the technique. In spite of these potential problems, offender is allowed to project some of the blame surveillance is a valuable technique in the inves­ for his behavior on someone or something else, he tigation of child sex rings. is more lil

! 36 LI ______and skill of the prosecutor. One effective tech­ asked the boy why he did not scream or fight nique, when appropriate, is to file federal or local when the offender abused him sexually. child pornography charges, that usually do not By asking such questions in this way, the require victims to testify. A combination of fed­ investigator is communicating to the boy that the eral, state, and local charges may convince the investigator has no understanding of the subtle subject to plead guilty. Some offenders may seduction of the boy. The investigator is back in plead guilty in order to do their time in the federal the world of dirty old men in wrinkled raincoats penitentiary. Since the sexual abuse of children in jumping out from behind trees. Obviously, the sex rings sometimes involves the commission of investigator did not understand that the molester other crimes, charges involving viola tions of child was probably the boy's best friend, who seduced labor laws, involuntary servitude, bad checks, him with attention and affection. The victim drugs, or can also be filed. Valuable realized that the investigator would not under­ information can also be introduced in court with­ stand what happened, and so the boy "adjusted" out child victim testimony if the prosecutor is the story and tried to explain with an excuse that familiar with the use of out-of-court statements the investigator would accept and understand. and the exceptions to the hearsay rule. The boy was suffering from the "say no, yell, and tell" guilt. Investigating Historical Child Sex Rings Most adolescent boy victims will deny their victimization even if the investigator does the The general investigative techniques discussed in investigation properly. Almost all articles and the previous section are applicable in varying training presentations on the interviewing of sexu­ degrees to the investigation of historical child sex ally abused children mention nothing about the rings. The "big picture" approach is the key to the interview of adolescent boys or girls. The empha­ successful investigation and prosecution of these sis is usually on such things as developing rap­ cases. Multiple victims corroborated by child port by getting on the floor and playing and using pornography, erotica, and other physical evi­ the child's own terminology. Interestingly, many dence make a powerful case likely to result in a of the same interview principles do in fact apply guilty plea, no trial, and therefore no child victim to the interview of adolescent victims. You must testimony. The following techniques apply pri­ begin by developing a rapport with the victim; marily to the investigation of historical child sex but this is far more difficult to do with a 13-year­ rings. (See also Chapter 4.) old streetwise boy. You must learn the victim's terminology; while terms such as "head job" and Understand the Seduction Process The seduc­ "rim job" are vulgar, it is important to find out tion process was discussed in depth in Chapter 4. exactly what the victim means by them. After understanding the seduction process, the The interview of an adolescent boy victim of investigator must be able to communicate this sexual exploitation is extremely difficult at best. understanding to the victim. This is the difficult The stigma of homosexuality and embarrassment part. One investigator recently contacted the over victimization greatly incfe."1se the likelihood author and described what sounded like a classic that the victims will deny or misrepresent the historical sex ring involving a seduction preferen­ sexual activity. tial child molester. The investigator stated, how­ When attempting to identify potential vic­ ever, that his first disclosing victim ( a 12-year-old tims of an historical sex ring, the author recom­ boy) described being gagged and tied up by the mends trying to start with victims who are about offender. While this is certainly possible, it is not to or have just left the offender's "pipeline." The typical of such offenders. When asked when and victim most likely to disclose would be one who how the victim furnished this information, the has just left the ring and who has a or close investigator admitted that it was after he had friend about to enter the ring. The desire to

37 protect younger victims from what they have molesters (pedophiles). After many of these pre­ endured is the strongest motivation for overcom­ sentations, adult male members of the audience ing their and embarrassment. The next have approached the author in private and ad­ best choice would be a victim who has just en­ mitted they were victimized as boys. Most stated tered the "pipeline." they had never before told anyone of their victim­ Before beginning the interview, the investiga­ ization but were now able to tell because they tor must understand that the victim may have realized that the author understood the problem many positive feelings for the offender and may and that they were not the only ones so victim­ even resent law enforcement intervention. Time ized. The key to getting adolescent boys to dis­ must be spent attempting to develop a working close their victimization is to communicate subtly relationship with the vktim. The investigator to them your understanding of the seduction must be able to discuss a wide variety of sexual process. After the first few victims disclose, the activity, understanding the victim's terminology others usually come forward more readily. and without being judgmental. Not being judg­ mental may be much more difficult with a delin­ Understanding the Preferential Molester Men quent adolescent engaged in homosexual activity sexually attracted to young adolescent boys are than with an innocent 8-year-old girl abused by the most persistent and prolific child molesters her father. Investigators often nonverbally com­ known to the criminal justice system. Depending municate their judgmental attitude unknowingly on how you define molestation, they can easily through gestures, expressions, and body have hundreds if not thousands of victims in a language. lifetime. They usually begin their activity when The investigator must communicate to the they were teenagers themselves and continue victim that he or she is not atfault even though the throughout their lives as long as they are physi­ victim did not say no, did not fight, did not tell, or cally able. even enjoyed it. When the victim comes to believe They may be "pillars of the community" and that the investigator understands what he experi­ are often described as "nice guys." They almost enced, he or she is more likely to talk. The always have a means of access to children (mar­ investigator must allow the victim to use sce­ riage, neighborhood, occupation). Determining narios to save face when disclosing the victimiza­ their means of access helps to identify potential tion. Adolescent boy victims are highly likely to victims. Investigation should always verify the deny certain types of sexual activity. The investi­ credentials of those who attempt to justify their gator must accept the fact that even if a victim acts as part of some "professional" activity. It discloses, the information is likely to be incom­ must be understood, however, that just because plete, minimizing his involvement and acts. If all an offender is a doctor, priest, minister, or thera­ else fails, the investigator can try the no-nonsense pist, for example, does not mean he is not also a approach. No matter what the investigator does, child molester. most cLdolescent boy victims will deny they were Because the molestation of children is part of victims. Therefore, it is important that as many a long-term persistent pattern of behavior, prefer­ potential victims as legally and ethically possible ential child molesters are like human evidence are interviewed. It is also possible that some machines. During their lifetime, they leave be­ troubled teenagers may exaggerate their victim­ hind a string of victims and a collection of child ization or even falsely accuse individuals. Alle­ pornography and erotica. Therefore, the prefer­ gations must be objectively investigated consid­ ential child molester is easy to convictifinvestiga­ ering all possibilities. tors understand how to recognize him and how The author has given many presentations he operates-and if their departments give them describing the dynamics of historical sex rings the time and resources. It is obviously better to and the seduction techniques of preferential child convict the preferential child molester based on

38 his past behavior. If, however, all else fails, he can state and local law enforcement departments have be convicted in the future based on his continuing been using proactive investigative techniques for molestation of children. years. Because the production and distribution of Most preferential child molesters spend their child pornography frequently involves violations entire lives attempting to convince themselves of federal law, the U.S. Postal Inspection Service, and others that they are not perverts. They try to U.S. Customs, and the FBI all have intelligence convince themselves that they love and nurture information about child pornography traffickers. children. Because most of them have hidden their The author strongly recommends that any law activities for so long, when identified and pros­ enforcement agency about to begin the use of ecuted, they try to convince themselves that they these proactive techniques contact nearby fed­ will somehow continue to escape responsibility. eral, state, and local law enforcement agencies to This is why they often proclaim their innocence determine what is already being done. Many right up to the time of their trial. If, however, the areas of the country have organized task forces on investigator and prosecutor have properly devel­ child pornography and sexual exploitation of oped the case, preferential child molesters almost children. Unless law enforcement agencies learn always change their plea to guilty. The last thing to work together in these proactive teclmiques, they want is to have the public hear the details of they will end up "investigating" each other. Pref­ their sexual activity with children. After pleading erential child molesters are also actively trying to guilty, they attempt to convince the sentencing identify and learn about these proactive tech­ authority that their lives have been ruined and niques. that they are "sick" and need treatment. The proactive approach also includes the analysis of records and documents obtained or Proactive Approach Many investigators have seized from offenders during an investigation. In told the author that they investigate almost exclu­ addition to possibly being used to convict these sively one-on-one intrafamilial child sexual abuse offenders, such material can contain valuable cases, not child sex rings. The author does not intelligence information about other offenders doubt that intrafamilial sexual abuse cases are the and victims. This material must be carefully most common, but believes that there are more evaluated in order not to overestimate or under­ child sex ring cases than many investigators real­ estimate its significance. ize. If a police department takes a reactive ap­ proach and waits for ring cases to be reported, Investigating Multidimensional they will probably wait a long time. As previ­ Child Sex Rings ously stated, most of these victims will deny their victimization when questioned, much less volun­ Multidimensional child sex rings can be among tarily come forward and report it. the most difficult, frustrating, and complex cases Because this book is available to the general that any law enforcement officer will ever inves­ public, specific details of proactive investigative tigate. The investigation of allegations of recent techniques will not be set forth. In general, how­ activity from multiple young children under the ever, proactive investigation involves the use of age of 7 presents one set of problems and must surveillance, mail covers, undercover correspon­ begin quickly, with interviews of all potential dence, "sting" operations, and reverse "sting" victims being completed as soon as possible. The operations. For example, when an offender who investigation of allegations of activity ten or more has been communicating with other offenders is years earlier from adult survivors presents other arrested, investigators can assmne his identity problems and should proceed, unless victims are and continue the correspondence. at immediate risk, more deliberately with gradu­ It is not necessary for each law enforcement ally increasing resources as corroborated facts agency to "reinvent the wheel." Federal law warrant. enforcement agencies such as the U.S. Postal In­ In spite of any skepticism, allegations of ritual spection Service, U.S. Customs, the FBI, and some abuse should be aggressively and thoroughly 39 investigated. This investigation should attempt It is best to focus on the crime and all the to corroborate the allegations of ritual abuse, but evidence to corroborate its commission. Informa­ should simultaneously also attempt to identify tion about local satanic or occult activity is only of alternative explanations. The only debate is over value if it is based on specific law enforcement how much investigation is enough. Any law intelligence and not on some vague enforcement agency must be prepared to defend unsubstantiated generalities. Cases are not solved and justify its actions when scrutinized by the by decoding signs, symbols, and dates using un­ public, the media, elected officials, or the . documented satanic crime "manuals." In one This does not mean, however, that a law enforce­ case, a law enforcement agency executing a search ment agency has an obligation to prove that the warrant seized only the satanic paraphernalia alleged crimes did not occur. This is almost and left behind the other evidence that would always impossible to do and investigators should have corroborated victim statements. Cases are be alert for and avoid this trap. solved by people- and behavior-oriented investi­ One major problem in the investigation of gation. Evidence of satanic or occult activity may multidimensional child sex rings is the dilemma help explain certain aspects of the case (i.e., link of recognizing soon enough that you have one. multiple offenders explain specific acts, etc.\ but Investigators must be alert for cases with the even offenders who commit crimes in a spiritual potential for the four basic dynamics: 1) multiple context are usually motivated by power, sex, and young victims, 2) multiple offenders,3) fear as the money. controlling tactic, and 4) bizarre or ritualistic ac­ tivity. The following techniques apply primarily Keep Investigation and Religious Beliefs Sepa­ to the investigation of such multidimensional rate The author believes that one of the biggest child sex rings. (See also Chapter 5.) mistakes any investigator of these cases can make is to attribute supernatural powers to the offend­ Minimize Satanic/Occult Aspect There are those ers. During an investigation, a good investigator who claim that one of the major reasons more of may sometimes be able to use the beliefs and these cases have not been successfully prosecuted superstitions of the offenders to his or her advan­ is that the satanic/occult aspect has not been tage. The reverse happens if the investigator aggressively pursued. One state has even intro­ believes that the offenders possess supernatural duced legislation creating added penalties when powers. Satanic/ occult practitioners have no certain crimes are committed as part of a ritual or more power than any other human beings. Law ceremony. A few states have passed special ritual enforcement officers who believe that the investi­ crime laws. The author strongly disagrees with gation of these cases puts them in conflict with the such an approach. It makes no difference what supernaturalforces of evil should probably not be spirihml belief system was used to enhance and assigned to them. The religious beliefs of officers facilitate or rationalize and justify criminal be­ should provide spiritual strength and support for havior. It serves no purpose to "prove" someone them, but not affect the objectivity and profes­ is a satanist. As a matter of fact, if it is alleged that sionalism of the investigation. the subject committed certain criminal acts under It is easy to get caught up in these cases and the influence of or in order to conjure up super­ begin to see "satanism" everywhere. natural spirits or forces, this may very well be the Oversensitization to this perceived threat may basis for an insanity or diminished capacity de­ cause an investigator to "see" satanism in a crime fense or may damage the intent aspect of a sexu­ when it really is notthere (quasi-satanism). Often ally motivated crime. The defense may very well the eye sees what the mind perceives. It may also be more interested in all the "evidence of satanic cause an investigator not to recognize a staged activity." Some of the satanic crime "experts" crime scene deliberately seeded with "satanic who train law enforcement wind up working or clues" in order to mislead the police (pseudo­ testifying for the defense in these cases. satanism). On rare occasions, an overzealous

40 investigator or intervenor may even be tempted be viewed with skepticism, butthoroughlyinves­ to plant "evidence of satanism" in order to cor­ tigated. Consider and investigate all possible roborate such allegations and beliefs. Supervi­ explanations of events. It is the investigator's job, sors need to be alert for and monitor these reac­ and the information learned will be invaluable in tions in their investigators. counteracting the defense attorneys when they raise the alternative explanations. Listen to the Victims It is not the investigator's For example, an adult survivor's account of duty to believe the victims, it is his or her job to ritual victimization might be explained by any listen and be an objective fact finder. Interviews one of at least four possibilities. First, the allega­ of young children should be done by investiga­ tions may be a fairly accurate account of what tors trained and experienced in such interviews. actually happened. Second, they may be deliber­ Investigators must have direct access to the al­ ate (malingering) told for the usual reasons leged victims for interview purposes. Therapists people lie (e.g., money, revenge, ). Third, for an adult survivor sometimes want to act as they may be deliberate lies (factitious disorder) intermediaries in their patient's interview. This told for atypical reasons (e.g., attention, forgive­ should be avoided if at all possible. Adult survi­ ness). Lies so motivated are less likely to be vor interviews are often confusing, difficult, and recognized by the investigator and more likely to extremely time consuming. The investigator must be rigidly maintained by the liar unless and until remember, however, that almost anything is pos­ confronted with irrefutable evidence to the con­ sible. Most important, the investigator must re­ trary. Fourth, the allegations may be a highly member that there is much middle ground. Just inaccurate account of what actually happened, because one event did happen does not mean that but the victim truly believes it (pseudomemory) all reported events happened, and just because and therefore is not lying. A polygraph examina­ one event did not happen does not mean that all tion of such a victim would be of limited value. other events did not happen. Do not become such Other explanations or combinations of these ex­ a zealot that you believe it all, nor such a cynic that planations are also possible. Only thorough inves­ you believe nothing. Varying amounts and parts tigation will point to the correct or most likely of the allegation may be factual. Attempting to explanation. find evidence of what did happen is the great Investigators cannot rely on therapists or sa­ challenge of these cases. ALL investigative inter­ tanic crime experts as a shortcut to the explana­ action with victims must be carefully and thor­ tion. In one case, the "experts" confirmed and oughly documented. validated the account of a female who claimed to be a I5-year-old deaf mute kidnapped and held Assess and Evaluate Victim Statements This is for three years by a satanic cult and forced to the part of the investigative process in child sexual participate in bizarre rituals before recently es­ victimization cases that seems to have been lost. caping. Active investigation, however, deter­ Is the victim describing events and activities that mined that she was a 27-year-old woman who are consistent with law enforcement documented could hear and speak, who had not been kid­ criminal behavior or that are consistent with dis­ napped by anyone, and who had a lengthy his­ torted media accounts and erroneous public per­ tory of mental problems and at least three other ceptions of criminal behavior? Investigators similar reports of false victimization. Her "accu­ should apply the ~'template of probability." Ac­ rate" accounts of what the "real satanists" do counts of child sexual victimization that are more were simply the result of having read, while in like books, television, and movies (e.g., big con­ mental hospitals, the same books the "experts" spiracies, child sex slaves, organized pornogra­ had. A therapist may have important insights phy rings) and less like documented cases should about whether an individual was traumatized,

41 but knowing the exact cause of that trauma is • attitudes about sexuality in home another matter. There have been cases where • extent of sex education in home investigation has discovered that individuals di­ • activities of siblings agnosed by therapists as suffering from Post Viet­ • need or craving for attention nam Syndrome were never in or saw no 8 religious beliefs and training combat. • childhood fears Conversely, in another case, a law enforce­ IS custody / visitation disputes ment "expert" on satanic crime told a therapist • victimization of or by family members that a patient's accounts of satanic murders in a • interaction between victims rural Pacific Northwest town were probably true because the community was a hotbed of such Events to be evaluated during the alleged satanic activity. When the therapist explained abuse include: that there was almost no violent crime reported in the community, the officer explained that that is • use of fear or scare tactics how you know it is the satanists. If you knew • degree of trauma about the murders or found the bodies, it would • use of magic, , or trickery not be satanists. How do you argue with that kind 8 use of rituals of "logic"? 8 use of drugs The first step in the assessment and evalua­ • use of pornography tion of victim statements is to determine the dis­ closure sequence, including how much time has Events to be evaluated after the alleged abuse elapsed since disclosure was first made and the include: incident was reported to the police or social ser­ vices. The longer the delay, the bigger the poten­ " disclosure sequence tial for problems. The next step is to ddermine the • background of prior interviewers number and purpose of all prior interviews of the • background of parents victim concerning the allegations. The more in­ CII co-mingling of victims terviews conducted before the investigative in­ IS type of therapy received terview, the larger the potential for problems. Although there is nothing wrong with admitting Eva.1uate Contagion Consistent statements ob­ shortcomings and seeking help, law enforcement tained from different multiple victims are power­ should never abdicate its control over the irlves­ ful pieces of corroborative evidence-that is, as tigative interview. When an investigative inter­ long as those statements were not "contaminated." view is conducted by or with a social worker or Investigation must carefully evaluate both pre­ therapist using a team approach, law enforce­ and post-disclosure contagion and both victim ment must direct the process. Problems can also and intervenor contagion. Are the different vic­ be created by interviews conducted by various tim statements consistent because they describe intervenors AFTER the investigative interview(s). common experiences or events or because they The investigator must closely and carefully reflect contamination or urban legends? evaluate events in the victim's life before, during, The sources of potential contagion are wide­ and after the alleged abuse. Events to be evalu­ spread. Victims can communicate with each other ated before the alleged abuse include: both prior to and after their disclosures. Interve­ nors can communicate with each other and with 8 background of victim victim8. The team or cell concepts of investigation • abuse of drugs in home discussed in Appendix A and Appendix Bare " pornography in home attempts to deal with potential investigator con­ • play, television, and VCR habits tagion. All the victims are not interviewed by the

42 same individuals and interviewers do not neces­ aspects of the case and result in the successful prosecu­ sarily share information directly with each other. tion of the substance of the case. Consistency of Teams report to a leader or supervisor who evalu­ statements becomes more significantif contagion ates the information and decides what other in­ is identified or disproved by independent inves­ vestigators need to know. tigation. The easier cases are the ones where there Documenting existing contagion and elimi­ is a single, identifiable source of contagion. Most nating additional contagion are crucial to the cases, however, seem to involve multiple conta­ successful investigation and prosecution of these gion factors. cases. There is no way, however, to erase or undo Munchausen Syndrome and Munchausen contagion. The best you can hope for is to identify Syndrome by Proxy are complex and controver­ and evaluate it and attempt to explain it. Mental sialissues in these cases. No attempt will be made health professionals requested to evaluate sus­ to discuss them in detail, but they are docu­ pected victims must be ca:!;efully selected. Hav­ mented facts (see References). Most of the litera­ ing a victim evaluated by one of the self-pro­ ture about them focuses on their manifestation in claimed experts on satanic ritual abuse or by some the medical setting as false or self-inflicted illness other overzealous intervenor may result in the or injury. They are also manifested in the criminal credibility of that victim's testimony being se­ justice setting as false or self-inflicted crime vic­ verely damaged. timization. If parents would poison their chil­ In order to evaluate the contagion element, dren to prove an illness, they might sexually investigators must meticulously and aggressively abuse their children to prove a crime. "Victims" investigate these cases. The precise disclosure have been known to destroy property, manufac­ sequence of the victim must be carefully identi­ ture evidence, and mutilate themselves in order fied and documented. Investigators must verify to convince others of their victimization. The through active investigation the exact nature and motivation is psychological gain (i.e., attention, content of each disclosure, outcry, or statement forgiveness, etc.) and not necessarily money, jeal­ made by the victim. Second-hand information ousy, or revenge. These are the unpopular, but about disclosure is not good enough. documented, of the world. Recognizing Whenever possible, personal visits should be tl1eir existence does not mean that child sexual made to all locations of alleged abuse and the abuse and sexual assault are not real and serious victims' homes. Events prior to the alleged abuse problems. must be carefully evaluated. Investigators may have to view television programs, films, and vid­ Establish Communication with Parents The eotapes seen by the victims. It may be necessary importance and difficulty of this technique in to conduct a background investigation and evalu­ extrafamilial cases involving young children can­ ation of everyone, both professional and nonpro­ not be overemphasized. An investigator must fessional, who interviewed the victims about the maintain ongoing communication with the par­ allegations prior to and after the investigative ents of victims in these abuse cases. Not all interview(s). Investigators must be familiar with parents react the same way to the alleged abuse of the information about "ritualistic abuse of chil­ their children. Some are very supportive and dren" being disseminated in magazines, books, cooperative. Others overreact and some even television programs, videotapes, and conferences. deny the victimization. Sometimes there is ani­ Every possible way that a victim could have mosity and mistrust among parents with differ­ learned about the details of the abuse must be ent reactions. Once the parents lose faith in the explored, if for no other reason than to eliminate police or prosecutor and begin to interrogate their them and counter the defense's arguments. They own children and conduct their own investiga­ may, however, be validity to these contagion tion, the case may be lost forever. Parents from factors. They may explain some of the "unbelievable" one case communicate the results of their "inves-

43 tigation" with each other and some have even Child Abuse and Neglect. Appendix B contains contacted the parents in other cases. Such paren­ guidelines developed by Donna Pence and the tal activity is an obvious source or potential con­ Tennessee Bureau of Investigation. The guide­ tamination. Parents must be reminded that their lines set forth in these protocols can be applied to children's credibility will be jeopardized when the investigation of any child sex ring. The guide­ and if the information obtained turns out to be lines, however, are especially pertinent to the unsubstantiated or false. To minimize this prob­ investigation of what the author calls the multidi­ lem, within the limits of the law and without mensional child sex ring. jeopardizing investigative techniques, parents Sergeant Beth Dickinson, Los Angeles County must be told on a regular basis how the case is Sheriff's Department, was the chairperson of the progressing. (See also Appendix A and Appendix Multi-Victim, Multi-Suspect Child Sexual Abuse B.) Parents can also be assigned constructive Subcommittee that developed Appendix A. Ser­ things to do (e.g., lobbying for new legislation, geant Dickinson states, "One of the biggest ob­ working on awareness and prevention programs) stacles for investigators to overcome is the reluc­ in order to channel their energy, concern, and tance of law enforcement administrators to com­ "guilt." mit sufficient resources early on to an investiga­ tion that has the potential to be a multidimen­ sional child sex ring. The concepti purpose of Develop a Contingency Plan If a department these protocols is to get in and get on top of the waits until actually confronted with a case before investigation in a timely manner-to get it inves­ a response is developed, it may be too late. In tigated in a timely manner in order to assess the cases involving ongoing abuse of children, de­ risk to children and to avoid hysteria, media partments must respond quickly, and this re­ , and cross-contamination of in­ quires advance planning. These are added prob­ formation. The team approach reduces stress on lems for small- to medium-sized departments individual investigators, allowing for peer sup­ with limited personnel and resources. Effective port and minimizing feelings of being over­ investigation of these cases requires planning, whelmed." identification of resources, and, in many cases, The team approach and working together mutual aid agreements between agencies. The does not mean, however, that each diScipline U.S. Department of Defense has conducted spe­ forgets its role and starts doing the other's job. cialized training and has developed such a plan The team approach does mean thatiflaw enforce­ for child sex ring cases involving military facili­ ment officers need to be concerned that their ties and personnel. investigation might further traumatize a child Once a case is contaminated and out of con­ victim, then therapists and doctors need to be trol, the author has little advice on how to salvage concerned that their treatment techniques might what may once have been a prosecutable criminal hinder the investigation. violation. A few ofthese cases have even been lost on appeal after a conviction because of contami­ Summary nation problems. The investigation of child sex rings can be diffi­ Multidisciplinary Task Forces Appendix A and cult and time consuming. The likelihood, how­ Appendix B set forth specific guidelines for ever, of a great deal of corroborative evidence in multidiSciplinary task force approaches to the a multi-victim/multi-offender case increases the investigation of child abuse and exploitation in­ chances of a successful prosecution if the crime volving multiple victims or multiple suspects. occurred. Because there is still so much we do not Appendix A contains guidelines developed by know or understand about the dynamics of mul­ the Los Angeles County Inter-Agency Council on tidimensional child sex rings, investigative tech-

44 1uques are less certain. Each new case must be resulting in individual self-serving disclosures carefully evaluated in order to improve investi­ are likely to occur in any group involved in orga­ gative procedures. nized kidnapping, baby breeding, and human Because mental health professionals seem to sacrifice). If and when members of a destructive be unable to determine, with any degree of cer­ cult commit murders, they are bound to make tainty, the accuracy of victim statements in these mistakes, leave evidence, and eventually make cases, law enforcement must proceed using the admissions in order to brag about their crimes or corroboration process. If some of what the victim to reduce their legal liability . The discovery of the describes is accurate, some misperceived, some murders in Matamoros, , in 1989, and the distorted, and some contaminated, what is the results of the subsequent investigation are good jury supposed to believe? Until mental health examples of these dynamics. professionals can come up with better answers, Overzealous intervenors must accept the fact the jury should be asked to believe what the that some of their well-intentioned activity is investigation can 'corroborate. Even if only a por­ contaminating and damaging the prosecutive tion of what these victims allege is factual, that potential of the cases where criminal acts did may still constitute significant criminal activity. occur. We must all (i.e., the media, churches, Law enforcement has the obvious problem of therapists, victim advocates, law enforcement, attempting to determine what actually happened and the general public) ask ourselves if we have for criminal justice purposes. Therapists, how­ created an environment where victims are re­ ever, might also be interested in what really hap­ warded, listened to, comforted, and forgiven in pened in order to properly evaluate and treat direct proportion to the severity of their abuse. their patients. How and when to confront pa­ Are we encouraging needy or traumatized indi­ tients with skepticism is a difficult and sensitive viduals to tell more and more outrageous tales of problem for therapists. their victimization? Arewemakingupforcentu- / Any professional evaluating victims' allega­ ries of denial by now blindly accepting any alle-, tions of "ritual" abuse cannot ignore or routinely gation of child abuse no matter how absurd or' dismiss the lack of physical evidence (no bodies unlikely? Are we increasing the likelihoodt:h It or physical evidence left by violent murders); the rebellious, antisocial, or attention-seeking i tli­ difficulty in successfully committing a large-scale viduals will gravitate toward "satanism" by, ub­ conspiracy crime (the more people invol,ved in licizing it and overreacting to it? The overreac­ any crime conspiracy, the harder it is to get away tion to the problem can be worse than tl)e prob­ with it); and human nature (intragroup conflicts lem.

45 Appendix A

Protocols in Investigating Multi-Victim, Multi .. Offender Child Sexual Exploitation

Los Angeles County Inter-Agency Council on Child Roland Summit, M.D., Department of Mental Health Abuse and Neglect Deanne Tilton, Director, Inter-Agency Council on Child Protocols Developed by the Multi-Victim, Multi-Sus­ Abuse and Neglect pect Child Sexual Abuse Subcommittee, November Penny Weiss, Assistant Director, Inter-Agency Coun­ 1988 cil on Child Abuse and Neglect Paul Wolfe, Probation Department Acknowledgments The Interagency Council on Child Abuse and Neglect Introduci:ion (ICAN) is grateful to the members of the Multi-Victim, The Los Angeles County Inter-Agency Council on Multi-Suspect Child Sexual Abuse Subcommittee who Child Abuse and Neglect (lCAN) is a multidisciplinary contributed to the development of these protocols. body committed to coordinating and improving ser­ We especially wish to recognize Sergeant Beth vices for the prevention, identification, and treatment Dickinson and Detective Ron Waltman, Los Angeles of child abuse and neglect. ICAN has recognized that County Sheriff' s Departrr.ent, Child Abuse Detail, who, investigations of allegations of child abuse involving following their work on a special task force investigat­ multiple victims and/or multiple suspects (MV IMS) ing allegations of abuse in preschool settings, drafted present unique challenges for all agencies involved the outline on which these protocols are based. with these complicated cases. A particular thank you goes to the extraordinary Some of the common problems identified in MV I efforts of Tammy Moya, Los Angeles County Sheriff's MS cases have included the insufficient allocation of Department, Juvenile Investigations Bureau, for her resources to investigate the allegations in an expedient editing and typing of the guidelines. manner, inadequate training, confusion about who is in charge of the investigation, contamination of evi­ Multi-Victim, Multi-Suspect Child Sexual dence, and the overwhelming magnitude of the inves­ Abuse Subcommittee tigation. Many of these cases become even more Sergeant Beth Dickinson, Los Angeles Sheriff's De- difficult if the allegations arise in a preschool setting partment, Chairperson and involve very yo"ng children. Lieutenant Steve Day, Los Angeles Police Department Having identified these problem areas, lCAN Pam Dubin, Department of Children's Services members concluded that there was a critical need to Michael Durfee, M.D., Department of Health Services develop guidelines for conducting MV IMS investiga­ Lindejo Goldstein, State of California, Department of tions. Assuring that the confidentiality of the investi­ Social Services gation was not compromised was a primary consider­ Ada Jones, Department of Mental Health ation. It was also clear that the rights of victims and the Lieutenant Chuck Long, Los Angeles Police Depart­ rights of the alleged suspects must be preserved while ment conducting the investigation in an expedient manner. Detective Terry McWeeney, Suuth Gate Police Depart­ These guidelines recommend a team approach to mini­ ment mize the risk of contdmination, provide for more com­ Detective Kim Mitchell, Hermosa Beach Police prehensive and humane interviews with the victims, Department and assure that the overall investigation is more effec­ Stephanie Pearson, Ph.D., Child Sexual Abuse Crisis tively and efficiently carried out on behalf of the clill­ Center, Harbor I UCLA Medical Center dren and families involved in MV IMS cases. Karen Saywitz, Ph.D., Harbor IUCLA School of Medicine

47 Purpose of specialized experts who would be used by the team The purpose of this protocol is to establish guidelines for purposes of consultation. for a multidisciplinary task force approach to the in~ vestigation of child abuse involving multiple victims Duties and Responsibilities andlor multiple suspects. While this protocol can be The purpose of this section is to clarify each agency's used in any large~scale investigation involving child duties and responsibilities and to improve agency abuse, it is primarily designed for investigating allega~ coordination to reduce duplication of effort. By clarify­ tions of child abuse in settings such as preschools and ing the duties and responsibilities, the goal is to lessen other out~of-town care facilities. The ICAN Protocol is trauma to child victims, to minimize the number of further designed to ensure that investigations of sus­ interviewers and interviews, to prevent the abuse of pected child abuse occurring in these settings are done other potential victims, to increase the effectiveness of in a timely manner, are complete, and are coordinated prosecution, and to provide information to the in­ among the responsible agencies. These guidelines are volved agencies in a coordinated and efficient manner. to serve as an adjunct to the California Administrative Code, Title 11, Sections 930-930.8, "Guidelines for In­ Law Enforcement The primary responsibility for crimi­ vestigation of Child Abuse in Out-of-Home Care Fa­ nal investigations of serious abuse rests with law en­ cilities." The intent of this protocol is to encourage a forcement. The law enforcement agency should be in high degree of cooperation and coordination among charge of the investigation until such time as the alle­ all the agencies involved in the investigation, adminis­ gations are determined to be unsubstantiated, or the tration, and prosecution of these types of cases. allegations have been investigated and presented to the District Attorney for review for prosecution. The Definitions law enforcement agency should also be the one that Multiple victim cases are the types of child abuse allega­ coordinates the voluntary interagency investigation tions that arise in a setting where several children are team, making sure that all children identified as vic­ at risk of being victimized by one or more offenders. tims are referred for therapy and assistance either Examples of these are schools, preschools, organized through the child welfare agency or victim/witness youth groups, and out-of-home facilities such as group agency and Los Angeles County Mental Health De­ homes. These would include both licensed and unli­ partment. censed facilities. Multiple suspect cases are the types of child abuse District Attorney The primary agency responsible for allegations that arise where more than one suspect has the prosecution of substantiated allegations of child been named by children as having participated in or abuse, the District Attorney's Office, may also provide been aware of the abuse against one or more child(ren). assistance to the investigative team throughout the Examples of this would be sex ring participants, child tenure of the investigation by giving legal advice, pornographers, and other offenders who, with each helping to draft search warrants, observing interviews other's knowledge, engage in abusing children. of potential witnesses, and any other assistance deemed Investigative team is a team of law enforcement appropriate. investigators assigned to investigate criminal allega­ tions of child abuse involving multiple victims andl or Child Welfare Agency The county department ad­ multiple suspects. The size of the investigative team ministering children's services may be a part of the would vary depending on the scope and size of the investigative team in those instances where the cir­ investigation. cumstances of the case mandate their involvement, Voluntary interagency investigation team is a volun­ such as cllildren being abused by their parent or care­ tary association of law enforcement agencies, county taker. Its involvement would be to take the necessary welfare and I or probation departments, child place­ measures to ensure the safety of children who may ment agencies, and state or county licensing agencies require protective custody, to make placement recom­ established for the sharing of information and coordi­ mendations, and to coordinate the assessment and na tion of investigations of reports of child abuse occur­ interviews of children and adults with the appropriate ring in out-of-home care facilities. This voluntary law enforcement and licensing agencies. The involve­ investigative team could also consist of one or more ment of the child welfare agency in these types of MV I specialized medical practitioners and one or more MS investigations may involve being a part of the licensed therapists. Also, part of the team may consist investigative team for only a portion of the investiga­ tion, or throughout the duration of the investigation.

48 Licensing Agency The primary responsibility of the be a part of the investigative team for a portion or the licensing agency is to investigate allegations of child entire duration of the investigation. They will take the abuse, including general neglect, in a licensed out-of­ necessary steps to prepare children for investigative home care facility. The licensing agency shall coordi­ interviews or conduct evaluations in conjunction with nate its efforts with those of the law enforcement investigators, whicheveris determined to bein the best investigative team, as well as with the investigating interest of the children and the investigation. child protective agency. The licensing agency shall Licensed therapists with experience and training provide back-up assistance when appropriate and re­ in treating victims of child abuse may become a part of quested by the investigating law enforcement agency. the investigative team. Children may be referred to The licensing agency may be involved as a part of the these pre-identified therapists by the investigative team investigative team during all or part of the duration of for treatment as a result of their disclosing abuse or the investigation. The licensing agency is responsible being suspected as victims because of behavioral symp­ for taking appropriate administrative action involving toms. Therapists' treatment of children is considered any licensed facility which would include revocation confidential and need only be revealed to the investi­ or suspension of the license of the out-of-home care gative team when and if victims disclose additional facility and the investigation and prosecution of unli­ suspects or additional crimes. censed activity (regardless of the outcome of abuse Therapists who provide evaluations and/ or treat­ allegations). ment to victims and assist the investigative team shall do so in a manner that does not compromise the VictimlWitness Agency The victim/witness agency integrity of the investigation. (See Sample I, Letter to would be part of the investigative team in those in­ Therapist.) stances where children were identified as having been victims of child abuse. The victim/witness agency Investigative Guidelines representative would work with law enforcement; be The primary objective of the investigation is the pro­ a member of the voluntary interagency investigative tection of child(ren). Investigative personnel have the team; make referrals for medical examinations, thera­ responsibility to conduct an objective and unbiased peutic evaluations, and treatment; assist the family investigation and to consider the rights of the victims with processing applications for the Victim/Witness as well as the rights of the accused. Assistance Fund; and work with the victim and family The law enforcement investigative team or voluntary throughout the investigation and subsequent court interagency investigative team investigating allegations process. of abuse in out-of-home care facilities shall follow the guidelines set forth in California Administrative Code, Medical Practitioner The duties and responsibilities Title 11, Sections 930-930.8. of the medical practitioner(s) are to conduct the medi­ In addition to following state guidelines, theICAN cal examinations of the victims or suspected victims in Protocols established for Los Angeles County are de­ accordance with state guidelines and protocols for the signed to expand and enhance those guidelines by examination of suspected child abuse victims. They setting forth a model approach for conducting these are to fill out the appropriate state-mandated forms investigations as a team. The ICAN Protocols set forth and provide assistance to the investigative team in the procedures for assessment, investigation, and pros­ following manner: conduct medical exams, give ex­ ecution of multiple-victim, multiple-suspect investi­ pert opinion regarding the nature of abuse, coordinate gations of child abuse. examinations with the investigative team, and provide additional expertise to the team, as needed. Personnel Needs The lead investigative agency should make a timely assessment regarding the resources that Licensed Therapists The duties of licensed therapists should be assigned to an MV /MS investigation. If the with experience and training in evaluating victims of magnitude of the investigation indicates the involve­ child abuse will be to provide evaluations of suspected ment of numerous children, witnesses, and suspects, victims of abuse as requested by the investigative sufficient staff should be allocated to the investigation team. These pre-identified evaluators provide the team to assess the scope and magnitude of the problem. If with their findings in writing and fill out the mandated one child is disclosing abuse in a setting where there is forms upon receiving any disclosures from children the potential for larger numbers of children also to be wherein abuse is suspected. Licensed therapists may either victims or witnesses, many children must be interviewed in order to assess the siluation adequately.

49 Putting together a law enforcement investigative team The Investigation Process System for Communica­ or a volunteer interagency investigative team to make this tion with Parents If the alleged crimes have occurred assessment is the appropriate way to approach these outside the home, the investigative team must address ty pes of investigations in most cases. It is far more the concerns of the parents of the alleged victims. effective to gear up for amajorinvestigation by allocat­ ing sufficient resources to expeditiously determine the 1. Parents should be interviewed regarding magnitude of the problem than to attemptto assess the anybehavioralindicators of possible abuse situation with only one or two investigators. With they observed. (See Sample 4, Parents' proper resources, the risk assessment can be made in Questionnaire, and Sample 5, Letter to an expedient manner and, if the allegations prove to be Parents.) either unsubstantiated or contained within only a small 2. Parents should be interviewed regarding number of victims, the additional personnel can be the history oftheir child's contact with the returned to their normal duties. If the allegations alleged offender(s). appear to be substantiated and involve large numbers 3. Parents should be advised of the nature of of victims or suspects, the team would already be in the investigation, and their cooperation in place and set up to continue the investigation. the investigation should be sought. 4. Parents should be made aware of the im­ portance of keeping any information about Timeliness and Planning A team should be formed their child's disclosures confidential, es­ and strategies developed as soon as possible upon pecially from the media. learning that there are allegations of child abuse in­ 5. Parents should be kept informed of the volvingthepotentialformultiplevictimsandmultiple status of the investigation. This can be suspects. Team members should be brought together, done without giving out specific details briefed, and given initial assignments. Any indicated about the disclosures of other victims. search warrants and surveillances should be done 6. A liaison person should be selected to within the first 24 to 48 hours, if possible. meet, as needed, with the parents to keep them informed. Failure to do so may Coordination of the Investigation The most impor­ result in bappropriate sharing of infor­ tant aspect of a major investigation is to determine who mation, frustration over the lack of infor­ is in charge of the investigation. That responsibility mation, lack of cooperation or participa­ cannot be delegated. In a criminal investigation, the tion in the investigative process and, in agency in charge should be the law enforcement agency some cases, inappropriate attempts at in­ in whose jurisdiction the crime occurred. vestigation by the parents. (See Sample 2, Parents' Liaison.) Needs Assessment Phase I of the investigation con­ sists of assessing the risk to children currently in the System for Communication with the Children Only care, custody, or control of the alleged offender(s). investigators who have experience and training in This assessment must receive highest priority to deter­ child abuse and child interviews should be assigned mine how many children have been victims of or the task of interviewing children. Further, these inves­ witnesses to abuse, and to assess what evidence has tigators should also have received the POST-approved been collected and what additional evidence is needed. sexual assault investigation training per Penal Code If any of the children assessed in Phase I have been Section 13836 prior to being assigned to conduct these abused, then the investigation should progress to Phase interviews. II, where children who previously had exposure to the The room where child interviews are conducted alleged suspect would be interviewed to determine the should ideally contain child-sized furniture;investiga­ degree of victimization with those children. If the tive interviewing aids, such as drawing material, ana­ victims identified in Phase I are very young, it is tomical drawings and/or dolls; and other material especially important to determine if there are older designed to make a child comfortable. This room victims who can corroborate the younger victims' could also contain a one-way mirror so that the inter­ testimony. view can be monitored. The decision to use audiotapes

50 or videotapes to record these interviews should be sures only with their investigative counterpart, espe­ made on a case-by-case basis by the investigative team, cially during the early phases of the investigation. and in conjunction with consultation with the prosecutor's office. System for Communication with the Media Only the The investigative team should be aware that it is agency in charge of the investigation should be as­ more important to limit the number of interviewers signed the responsibility of issuing information to the than to limit the number of interviews. How many media. Other agencies that are a part of the voluntanj times each child is interviewed and by whom, how­ interagency investigative team should consult with the ever, will be an important issue should the case result agency in charge before issuing any statements to the in prosecution. Note: A therapeutic evaluation should media. not replace an investigative interview. There should be a specific unit within the investi­ Child investigative interviewers should have re­ gative agency, not directly part of the investigative ceived specialized training in child development is­ team that has responsibility for issuing statements to sues. The team may want to consider retaining the the press. assistance of a child development expert to assist and advise the interviewers on the special skills needed to interview very young children. (See Sample 7, Child Task Force Approach Interview Report.) The investigative team should include a supervisor / report approver whose duties consist of coordinating System for Communication with the Medical Com­ the investigation, assessing all the information that munity Medical professionals will generally not be comes from the individual interviews, and delegating involved in the everyday workings of the investigative additional investigative interviews to specific team team. When possible, not all the children in a major members, as needed. The team may include a crime case should be examined by the same medical evalua­ analyst to provide technical advice to the team. The tor. A medical evaluator should be assigned to each team would have several investigators, some of whom team and only evaluate children assigned to him or her would be designated as "child interviewers." If this is by that specific team. a voluntary interagency investigative team, then the in­ When more than one medical evaluator is used, vestigators' counterparts-i.e., licensing investigator, they should be selected from different centers and therapist, medical evaluator, etc.-would be assigned should not consult with each other about their find­ to separate investigators, and each would become a ings, especially in the very early stages of the separate team. investiga tion. Whatfollows is an example of the possible makeup If at all possible, the investigator should attempt to of the investigative team: obtain a child's previous medical history and records and provide them to the medical evaluator. (See Sample DISTRICT 6, Information for Parents.) ATTORNEY-LAW-ENFORCEMENT COMMANDING OFFICER System for Liaison with the Therapeutic Community I Therapists who assist or work with the investigative SU1'ERVISOI\IREPOKr APPjOVER team should be selected from different programs and should be assigned to work with separate teams. The investigators should monitor the evaluator's method- CRIME ANALYST 0logy in assessing children for sexual abuse to deter­ mine if the techniques used are compatible with the investigation's needs. Likewise, evaluators should TEAM! TEAM 2 TEAM 4 observe some investigative interviews in order to stay informed regarding the techniques used in those inter­ I I TT' I views. (See Sample 3, Therapist's Questionnaire.) CHILDREN CHILDREN CHILDREN CHILDREN Therapists should share information regarding disclo-

51 Itis importantthat all parties involved should only lenge to effective investigation. Because some of these share information regarding specific allegations from cases have been so spectacularly unusual and frighten­ children within their own team and upward to the ing, many such cases are now contaminated with team supervisor. The team supervisor should review prejudice and fear. An active lobby and criminal these specific allegations. li a child names other chil­ defense arguments have sometimes attempted to blame dren as victims or witnesses, the responsibility for agencies for creating false cases and abusing children interviewing those other children should be delegated with inappropriate investigative techniques. Without to another team who has received no information as to advance preparedness and clear protocols for investi­ the allega tions. The purpose of this is to minimize any gation, these cases can turn into that haunt contamination ,.)finformation so that disclosures come and confuse everyone involved. from children in a spontaneous manner. By using this A recent national survey regarding abuse in a system, contamination of information or inadvertent preschool setting [D. Finkelhor, L.M. Williams, N. leading questions will be minimized. lithe allegations Burns, and M. Kalinowski, Sexual Abuse in Day Care: A appear substantiated and the investigation continues, National Study (Final Report) (Durham, New Hamp­ it then becomes important to share some information shire: University of New Hampshire Family Research with all members of the investigative team, especially Laboratory, March 1988)] shows clearly the problems the law enforcement component. If the early disclo­ to be expected in such cases because of the radical sures were made in a manner free from contamination, difference between conventional sexual molestation the prosecutor can then argue that specific controls and multi-suspect cases. Of 270 validated cases of were used to eliminate that factor. sexual abuse in out-of-home case facilities, 83 percent involved a single suspect, usually male, with a typi­ Investigative Aids cally pedophilic MO. Those cases with more than one The investigative team should consider the use of suspect, 17 percent of the sample, were almost entirely charts, as well as the use of link analysis and Visual different, contradicting prior expectations and pro­ Investigative Analysis (V.LA.) charting to assist them moting disbelief, disagreement, and protective denial in recording pertinent information. The use of a com­ among parents, investigators, and the public alike. Yet puter programmed to accept and print out data in a these radical differences were common among almost relevant way should be utilized. Efficient clerical all of the multi-suspect cases, making that category the support should not be forgotten so that investigative most uniform and predictable of all. Following are the reports can be prepared in a timely manner. five factors that were most predictable, each of which Each law enforcement agency should establish a poses a threat to ordinary detection and investigation. list of experienced investigators and supervisors, both internally and externally, who can be called upon to Multiple Victims Cases averaged about 14 victims assist in a major case investigation. each, sometimes extending into the hundreds. The Each law enforcement agency should establish a number of so many silent victims with variations in list of qualified individuals within its community or timing and scope of disclosure makes for immense surrounding communities who can be utilized to assist logistical problems in moving quickly and document­ in a major case investigation. This would include ing properly all investigative interviews before the qualified medical practitioners, pre-identified evalua­ case is hopelessly burdened by cross-germination and tors, and therapists. discovery conflicts. The great number of parents re­ Each law enforcement agency should consider the quires organization and outreach to invite cooperation need to do cross-training of its own personnel, as well and confidentiality. The pressure to identify and pro­ as cross-training with other potential members of a tect the children immediately precludes the surveil­ voluntary interagency investigative team. This train­ lance and intelligence procedures necessary for con­ ing would consist of an explanation of each other's spiracy prosecution. roles, an explanation of the task force approach, legal requirements and restrictions, confidentiality, and other Female Suspects Although females are thought to specialized information deemed pertinent. comprise only 5 percent of child molesters in general, 40 percent of the perpetrators in daycare cases were Summary females. In multi-suspect cases, 91 percent implicated Cases of suspected child abuse in out-of-home care females, including 17 percent with no male suspects at facilities constitute a critical and unprecedented chal- all. Many authorities refuse to suspect females or to act

52 on clues implicating women. Children shared this children unable to remember or speak clearly to the disbelief and were more likely to report (and their reality of their experience. complaints much more likely to be believed) abuse by males than by females, and so their late reports of Disbelief and Interprofessional Conflict Multi-sus­ females compared to males focus suspicion on the pect cases,for all the reasons above, seem impossible to examining techniques, as if children were being talked handle without distrust, foot dragging, , into fairy tales. Children were also more likely to and sabotage within and between agencies that had retract complaints against females, so that charges learned to work together effectively in conventional tended to be dropped or acquitted. The women sus­ cases. Investigations, already shaky for the overburden pected in out-of-home settings were especially re­ of only circumstantial evidence, collapsed for want of spectable and well educated and, therefore, effectively mutual support among allies in the face of incredulity immune from suspicion, especially since the offenses and ridicule from adversaries. alleged were more hurtful, more penetrating, and often more bizarre than those expected from the typi­ cal male molester. Implications for Investigation Multi-victim, multi-suspect sexual abuse in out-of­ Pornography While pornography was alleged in less home care is unique in its devastation to families, to than 5 percent of the single-suspect categories, 67 public confidence, to child protective agencies, and to percent of multi-suspect cases described pornography the basic effectiveness of all systems of justice. It has production or viewing. Descriptions of pornography been painfully evident throughout the United States without confiscated material constitute "t) Ie fish that since 1984, yet most communities are now more di­ got away," tending to discredit witnesses and embar­ vided and less prepared for effective, coordinated rass investigators. investigation than before such abuse was discovered. Since material evidence is so crucial and so seldom Ritual Allegations of bondage, sadism, strange games, obtained, and since most multi-suspect cases will pro­ administration of drugs, ingestion of excrement, muti­ liferate into unexpected, unbelievable dimensions, and lation of animals, and even ceremonial murders oc­ since all hope of foundation for a proper investigation curred in 54 percent of multi-suspect cases. These may be lost as soon as such a case is publicized, bizarre allegations inspire disbelief in most listeners, everything depends on a pre-planned protocol and as well as a desperate urgency to validate grotesque advance teamwork, not only within each agency, but allegations by those who come to believe they are true. among the many agencies involved in these cases. The special and threats in such cases left

53 Sample 1 Sample 2 Letter to Therapist Parents' Liaison

01 ~ Dear ______.

Enclosed is a brief synopsis of the facts of the case under investigation involving (Victim's Name)

Please note that the information you have been provided is intended for therapeutic purposes only. Please do not discuss the contents of this synopsis with the children or other parents-other than to remind each individual child what the child has said to either me or the police officer The parents' liaison performs an informing role. Within did the initial interviews. !tis that you not tell one absolutely essential bounds established by the investigators, parents have a child what another child has told the police or you. It is important that, need and a right to know the general status of the investi­ before considering group therapy, the investigative team be consulted. gation. Only then can they make an appropriate assess­ ment on participation and nonparticipation. Prior to our leaving, we admonished the children about speaking to each other about what happened to them and what they have told their The liaison person performs a reassuring/supportive func­ therapist, me, or the police. We urge you to reiterate that warning when tion. He or she provides a sounding board and a bridge you speak with them. We have encouraged them to speak with you about with "the system" by providing a necessary outlet for what happened to them as individuals. We have also told them that the ventilating criticism of the system and clearing up confu­ reason they may want to speak with you is that it will make them feel sion and frustration. better. We emphasize this to you, as your contact with the children should be strictly therapeutic and not investigative. The liaison should make no attempt to persuade an unwill­ ing person to enter the investigation or participate in any We acknowledge and want to emphasize that your role is to help the way in the multi-victim, multi-suspect investigation. children work through their feelings about what happened to them and to make them feel better about their unfortunate experiences. The liaison does not perform an investigative function. A VOiding specifics will protect against a predictable com­ At this time, we would also like to thank you for providing both a plaint that the parents' liaison was a source of cross­ psychological and physical environment that allow the children to feel germination of information. comfortable enough to speak with us. It is our belief that, without you and the rapport you have developed with those children, we would not The liaison should avoid attempting to speculate about be in a position to prosecute this case properly. who the bad guys are and how things will go for them­ just do not do it! Please do not hesitate to call if you have any questions about the content of this letter or the information you have been provided.

Sincerely,

Investigator's Name Sample 3 Sample 4 Therapist's Questionnaire Parents' Questionnaire

(NAME OF AGENCY) DATE: FILE #

SUBJECT FACILITY: DATE & TIME ADDRESS: FILE # PARENT NAl\1E: DOB: THERAPIST INTERVIEWED: ADDRESS: SUBJECT: PRESCHOOL

VICTIM: NAME OF CHILD:

1. How long have you been treating victim? 1. Do you, as a parent, have any information regarding this case that you feel will be helpful?

2. Are you willing to have your child interviewed by a member of the 2. What specific information is he/she disclosing regarding Child Interviewing Team? abuse? 3. Would you confirm the time periods your child attended the Preschool?

4. Is your child seeing a therapist? If so, what is the name ofthe therapist? 3. Whom has the victim named as perpetrator(s)? 5. If your child is interviewed and gives the investigators information that can be used to prosecute suspects, hew do you feel about your 4. In your opinion, would this child be able to testify in court? child testifying?

Why? /Why Not? 6. Additional information:

5. Additional information: 7. Full name of you and your spouse and dates of birth:

en en ------.

Sample 4, continued Sample 4, continued

CJ1 0'\

8. Full names of your children and their dates of birth: 15. Have you ever registered a complaint regarding the care or supervi­ sion your child received while attending the subject facility?

If yes, to whom?

9. Dates, days of week, and times in subject daycare facility: Subject of complaint:

Names of persons providing care: 16. What is your overall opinion of your child's daycare?

17. Have you been contacted by any other agency (law enforcement, 10. What is the daycare facility's policy regarding visits by parents? children's services, etc.) with regard to daycare facilities?

18. Have your children attended other daycare facilities? 11. Have you ever made unannounced visits to the daycare facility? If yes, name of facility:

What did you observe? Dates, days of week, and times attended:

Names of persons providing care:

12. Do your children talk to you about their daycare?

How do they feel about it? 19. Do you wish to have an investigator contact you?

13. Do you know of any injuries or accidents involving staff or children Yes Prefer Not at the daycare facility? Home phone (

Work phone ( 1(. Do you question any of the facility's policies or procedures? Sample 5 Letter to Parents Sample 5, continued

Dear Parents:

We are writing this letter to you in an effort to obtain your cooperation and support in the ongoing investigation into allegations of sexual abuse occurring at the Preschool. We understand that you may have many concerns and fears and feel yourself placed in a difficult position regarding getting your family involved in this investigation. It is The (Name of Agencv) would m~e to interview your cIilld in important, however, that we work together to define the situation, to sort an effort to determine if your child witnessed or was a victim of fact from rumor, and to bring some kind of closure to this investigation­ abuse at Preschool. Our investiga tors are specialists either to exonerate or to make arrests and obtain criminal filings. To do so in the area of child sexual abuse; they are highly trained and requires your help. experienced. Most of them volunteered for this assignment due to their extreme concern over this problem. As you are probably aware, this investigation extends farther than to just those who have been formally charged thus far. In some cases, it may only Please be assured that cooperation in this ongoing investigation involve a few children; in others, such as the Preschool, does not menn you and your family will become involved in the the abuse appears to be more widespread and may include children who criminal justice system without your agreement. No team member attended as far back as . In these cases, it is only by will me charges on behalf of your child without your consent, talking to large numbers of cllildren that we can begin to get a clearer should he or she be determined to be either a victim or a witness. picture of the scope of the alleged abuse. A list of therapists who have agreed to do evaluations on children You may have already questioned your cIilld about any misconduct at his who attended Preschool will be provided upon or her preschool and received a negative response. request. Unfortunately, many children initially deny abuse to their parents. Some Please contactthe (Name of Agency) at (Telephone Number). reasons for this are: 1) itis the "parents" they were warned and threatened The team leader is . If unavailable, ask for any not to tell, and 2) it is the "parents" who have often warned them not to let member of the Team. anyone touch them, and they may feel tremendous self-blame and guilt surrounding any touching. Additional questioning by the parent places Sincerely, the child in the position of continuing to lie or admitting they lied if they initially denied abuse to you.

Many times, trained professional interviewers, who can be more objective in their interviewing, can elicit disclosures about misconduct in such a way as to unlock these secrets without traumatizing the child. Some children may disclose abuse in an initial interview; others may take a long time to disclose and require an established ongoing relationship of trust with an outside person, such as a therapist, or even several interviews with a trained law enforcement investigator.

CJl 'I Sample 6 Sample 7 Information for Parents Child Interview Report

01 00

MEDICAL EXAMINATIONS Date Time Started Time Finished

Rapport Building:

The dilemma of whether or not to have a child medically Interview: examined is one of the most difficult decisions parents may have to make. It is our desire to work with each parent in Location/Room: assisting them with accurate information to aid them in facing this situation. The policy of the (Name of Agency) regarding children having a medical sexual assault exami­ Persons Present/Location: nation is based on specific information surrounding your child's particular disclosures, acts reported to have oc­ curred, statements of other child witnesses, and the expe­ rience and opinion of the investigator assigned to assist Taped YIN Audio Video your family. All medical examinations are conducted by qualified experts who have received specialized training and experience in this field. The examinations are non­ Media Used: traumatic and conducted with sensitivity and privacy and are well-documented. Ifyou feel the to have your Dolls Drawings Puppets child seen by a physician prior to our recommendation to do so, please feel free to contact (Name of Team Leader) Other for a medical referral. Report Filed Y /N Investigator's Report Other

Miscellaneous:

~------~.~----- Appendix B

Macro-Case Investigations

Donna Pence Tennessee Bureau of Investigation Nashville, Temlessee

Introduction Abuse and exploitation of children in out-of-home exploited by defense attorneys. These attorneys will settings has been a phenomenon recognized by social try to convince the public jurors that "misguided zeal­ workers and law enforcement officials in the child ots" (i.e., the investigators) have for some reason fabri­ protective field. The long-held stereotype of the single cated, induced, or brainwashed this preposterous tale "stranger" offender who a lone victim is one into these hmocent children's minds. The primary that has increasingly proved to be unrealistic. Many of defense strategy that has emerged in many cases is to these out-of-home cases now being properly investi­ identify the investigators as the problem, gated show where there is a single offender, there will rather than the offender. By diverting attention away probably be multiple victims (possibly involving hun­ from the defendant, the attorney clouds the issue of dreds of children) and that a number of these offenders exactly who is on trial and what the issues really are. communicate and/or associate with others of like The defense's task then becomes to convince the jury interest. that it is more likely that one or possibly two well­ Some investigations may well involve multiple intentioned but inept investigators planted the story in offenders, multiple children, and multiple jurisdic­ the children's minds rather than face the reality of tions. These cases are the most complex and time large-scale methodical abuse of children. consuming that an investigator is likely to work. The To limit such strategies, investigators are cau­ necessity of handling this type of sihlation correctly tioned against relying exclusively on one or two prin­ I from its inception is of utmost importance. cipal investigators and are encouraged to establish two Media reporting on alleged sexual acts committed or more separate investiga tive teams and even involve against children in numerous out-of-home settings has multiple medical examiners when possible. The fewer elevated public and professional concern about the the workers, the greater the chance of challenge. investigative procedures followed as well as the safety of children in general. This media attention does not stop with the initial reporting of the complaint, but Investigative Teams and Design continues as the investigation progresses on into the As soon as the possibility of a macro-case becomes trial stages. The focus of such attention may prompt known, the original investigator should request that investigators to move more rapidly and prematurely additional personnel be assigned. These investigative than the case and caution would otherwise warrant. It teams should divide into separate units and act as is critical in the face of such media pressure that inves­ separate cells with absolutely no direct exchange of tigators proceed methodically and in an organized information among the different teams. The overall manner. In the final analysis, when confronted with investigation and the work of these cells should be such a case, an investigator must pause, plan, prepare, coordinated by a central team leader. and then proceed carefully. Each cell ohould be assigned a cluster of potential Another overriding concern is the avoidance of victims to hlterview. It is wise to divide the high-risk pitfalls that defense attorneys will later use to try to population into different clusters and consequently destroy your case. Such cases defy the public imagina­ different cells [ Corwin, Presentation atthe Invi­ tion (and sometimes even that of the professionals tational Forum onRitualisticAbuse of Children, Sacra­ investigating the case). This incredibility factoris easily mento, California, March 11, 1986]. The actual inter-

59

This investigative format would be followed as and confused about w hathas been disclosed and where long as the possibility of a macro-Ca1"2 continues. While the next step should lead. As always, the chain of it may not seem to be feasible to commit that many e .dence must be carefully observed. investigators to a single case, the probable outcome will be that, rather than have one or two investigators Parental Reactions tied up for an inordinately long period of time, several An important consideration is the reaction of the par­ investigators will finish the work in a short time. This ents of the child victims and parents 0f possible vic­ should help assure that interviews, medical examina­ tims. The mismanagement of the parents may be the tions, and the collection of physical evidence will be single most common mistake in these types of cases done in a timely fashion. and the most damaging to a successful investigation in The team coordinator should take the investiga­ the long run. The types of parental reactions which we tive information submitted to him or her and, with the have identified are described. below. aid of a charting specialist (where available) prepare association and/or flow charting of all the activities Overreacting This type of pa:;'ent has a child or chil­ and relationships which the interviewees provide. A dren who mayor may not be among those who are summary of each interview should be kept to list the abused. They feel that the current efforts of investiga­ name of the interviewee, the primary offender, other tors are inadequate anri that it is necessary for them to victims that the interviewee names, other offenders take the lead or augment the investigation. They may that the child names, potential witnesses, items of conduct repeated interviews with their own children physical evidence mentioned, and locations where the or other children using leading questions and "isn't it abuse occurred. The District Attorney's office should true?" questions that tell them what they expect or be kept abreast of this information in order to better want to hear. They may meet with other parents and determine when enough information exists to obtain pass information to them about what the other chil­ search warrants, at what locations, and what pieces of dren have said or done. Both of these activities can evidence are believed to be present. If multiple loca­ contaminate the evidence to the extent of invalidating tions have been exposed as abuse sights, the possibility statements taken from these children and their parents of simultaneous raids on these should be explored. at a later date. They might show the child(ren) photo­ Since the potential for removal or destruction of graphs of possible offenders or drive them to locations evidence exists, this part of the investigation should where the abuse might have occurred, thus rendering move as rapidly as legally possible. Once the word of later identification done under proper circumstances an investigation is out, past experience has shown that useless for prosecutorial purposes. They justify their the likelihood of finding evidence the children have actions by saying that they, as parents, are the only stated exists, or finding it in the SAME CONDITION ones really interested in the welfare of their child, and the children have described is ~·are. they want to make sure that it is all done properly and As mentioned earlier, different physicians who that the welfare of their child is taken into consider­ are trained in the examination of sexually abused ation. Another possibility is that the parents have had children should be utilized. Many of these cases will a sexual abuse issue in their background which is still require the use of specialized equipment in sophisti­ unresolved. cated techniques beyond the capabilities of local phy­ sicians. Again, if you have only one dudor performing Overprotective This parent has a child or children exams, particularly if medical evidence is discovered, who mayor may not be among those who have been then it is easy for the defense to challenge one abused in this situation. The typical presenting sign of physician's credentials, of exams, and this type is outright refusal to allow their child(ren) to exam findings. Regrettably, many communities have be interviewed at all. Some parents base this refusal on few options in this area. By recruiting a different the fact that they feel the child(ren) will be more physician for each team, you minimize the chances traumatized by the investigation and possible pros­ that this will happen as well as relieve a single physi­ ecution than they were by any type of abuse. If they cian of the responsibility of having to document and confirm behavioral factors that would tend to validate testify in a multitude of cases. the abuse, the rationale may be tha t the child is young By breaking down the numbers into manageable and it is best to let them forget the abuse rather than to blocks, workers are less likely to feel overwhelmed "dwell" on it.

61 Another factor that should be considered is the The primary damage this type of parent can do is to possibility of prior Child Protective Services (CPS) pressure the disclosing children into recanting. This contact with the family. These contacts might have type of pressure may be subtle (i.e., withdrawal of involved the refusing parent on sexual or physical affection when the child mentions abuse/ abuser); ver­ abuse or neglect charges. This past contact may have bal (i.e., "Reverend Jones did not really do those things­ alienated the parents towards CPS and/ or the police. you know that he is a wonderful man and would not No matter what their belief is on the possibility of hurt a little girl"); or physically abusive (i.e., hitting, abuse, they will refuse to cooperate. slapping, or confining the children when they talk Investigators should also not discount the possi­ about the abuse). bility that there is an abusive situation which currently One sign that the children are being pressured is exists in the home that the parent is afraid will come to that the children will recant on one offender and name light if someone interviews the child. several other individuals as abusers, such as investiga­ tors, physicians, etc., or will completely deny that the Retribution This parent has a child who has been a abuse occurred. Part 0f this disbelief may come from victim of the abuse under investigation. Thl::y are the issues mentioned under "Retribution," above. enraged and want immediate and forceful action; no delays are tolerated. They frequently inundate CPS Supportive This parent has a child who may have and law enforcement investigators with telephone been a victim of sexual abuse in the investigation.

calls and unannounced visitsl wanting progress re­ Their primary focus concerns the welfare of the child. ports. They are, for the most part, unfocused in their They are reliable about making sure appointments are anger and do not engage in the direct activities of the kept and supporting the goals of both the investigation overreacting parent. The primary damage this kind of and therapy. parent can do to a case is to go to the media and disclose The parents are cooperative and want to get at the that either a) the investigation exists, or b) there are huth. They may engage in questioning their child(ren) details of the case that investigators are keeping under or in taking the child to locations where the abuse wraps at this time. They may also turn against the occurred, but their motivation in doing so is to help investigators and publicly attack their efforts if they clarify what happened in their own minds rather than perceive that the investigation is not moving swiftly to assist with the investigation. If told that this is and the offenders are not in jail. Some of this rage may counterproductive, they will generally cease the ques­ be directed at investigators to cover the fact that the tionable behavior. They seem to have accepted that parent may be feeling guilt for perceiving either that events may have happened and are looking for ways to they failed to protect their child(ren) or they did not deal with it consh·uctively. recognize or listen to the signals the child may have Investigators will see parents in different modes of been sending regarding the abuse. The parents may reaction. In some cases these represent stages through feel impotent about their ability to prevent this event which parents must pass to deal with the trauma of from recurring. If they had trusted the offender(s), or their child being victimized; for others, however, in­ had had a or other relationship with the vestigators will see little or no movement toward offender, the parents may question their ability to healthy resolution. An effective investigation will judge people. All these possibilities may td.gger a deep address the issue with an eye toward moving parents anger that the parent(s) will misdirect. The possibility to the more supportive mode. Initially, it will fall to the that while being in this state the parent will kill or team coordinators to arrange for the proper environ­ attempt to injure the offender should not be discounted. ment for this process to begin. A suggested protocol would be to call a meeting of Nonbelieving This parent has a child who may not all parents whose children are in the possible victim have been a vicl:im of the abuse lmder investigation. population as soon as the initial validation of a case has They refuse, sometimes in the face of irrefutable evi­ been made. This can be done by sending letters to the dence, that any abuse actually took place or that the parents requesting a meeting (see ParentalNotification offender(s) accused had anything to do with the abuse. Letter at end of chapter). The purpose of this meeting Their denial is so great that they will even disregard is to tell the parents that an investigation is underway their children's statement about who the abusers were and that they are requested to cooperate. Concern for and the situations under which the abuse teok place. the children and their well-being is stressed. It is

62 appropriate to have one or more mental health practi­ • Resist the temptation to respond to media pres­ tioners who will assist you in leading this discussion. sure, and develop a strategy for all investigative Expect a variety of emotions at this meeting reflecting agencies O~I how to respond to media inquiries. the various ways parents react to such allegations. In The team coordinators should be responsible for some cases, parents may be distrustful of each other, designating one person to be a media contact. fearing that information shared will get back to the • Establish an investigative team large enough to alleged offender(s). The investigator leading the dis­ interview all possible victims properly and quickly. cussion should be clear on what will and can be dis­ Do not be afraid to ask for help in doing so. cussed and what cannot. Smaller parent gLOUPS can • Appoint a team leader and break the team into then be established to help the parents deal with the investigative cells, isolating the cells from each specific issues they may have and to keep them in­ other to avoid cross-contamination. formed of the progress of the investigation. a Expect the children to reveal the abuse slowly.

(> Chart and carefully document which child alleges Summary what activity: These cases get complex very In summary, the key points in successfully investigat­ quickly. ing a macro-case are the following: • Understand parental reaction and try to harness their energy so they will not work against you. • Plan carefully-but react quickly-particularly in regard to possible physical evidence.

Parent Notification Letter

Dear Parent:

The (Name of Law Enforcement Agency) and the Tennessee Department of Human Services, in cooperation with the District Attorney General, are investigating allegations of child sexual abuse at (Location of Abuse) . We understand your child may have some knowledge of the activities at (Location of Abuse) and is of great importance to the investigation. We realize such an investigation causes parents great concern and we want to meet with all those involved to explain the situation. We would like to ask you to come to (Location) at (Time) on (Day) , (Date) . We will provide you with as much information as we can at this meeting. We will also be contacting you regarding an interview with your child if we have not already done so.

We must ask you to resist the natural temptation to question your child l.'! discuss the investigation with others. It is our goal to accurately determine what, if anything, has happened, and that job could be complicated if you discuss the situation with others or interview your child before the trained investigators have an opportunity to do so. We hope you will be able to attend the meeting on (Date)

Sin<,erely,

63 References

Abel, Gel.e G., et al. "Self-Reported Sex Crimes Rush, Florence. The Best Kept Secret: Sexual Abuse of Non-incarcerated Paraphiliacs./I Journal of In­ of Children. New York: McGraw-Hill,1980. terpersonal Violence, 2, No.1 (March 1987). Sgroi, Suzanne M. Handbook of Clinical Interven­ Breiner, Sander J. Slaughter of the Innocents: Child tion in Child Sexual Abuse. Lexington, Massachu­ Abuse Thruugh the Ages .md Today. New York: setts: Lexington Books, 1982. Plenum Press, 1990. Sgroi, Suzanne M., ed Vulnerable Populations: Brunvand, Jan Harold. The Vanishing Hitchhiker. Evaluation and Treatment of Sexually Abused Chil­ New York: Norton, 19U. dren and Adult Survivors. Lexington, Massachu­ setts: Lexington Books, 1988. Burgess, Ann Wolbert. Child Pornography and Sex Rings. Lexington, Massachusetts: Lexington Siegal, Barry. A Death in White Bear Lake. New Books, 1984. York: Bantam, 1990.

Diagnostic and Statistical Manual of Mental Smith, Michelle, and Lawrence Pazder. Michelle Disorders. 3rded., rev. Washington, D.C.: Ameri­ Remembers. New York: Congdon and Lattis, 1980. can Psychiatric Association, 1987. "Stranger-Abduction Homicides of Children." Lanning, Kenneth V. Child Molesters: A Behav­ Juvenile Justice Bulletin. Washington, D.C.: U.S. ioral.Analysis. 2nd ed. Arlington, Virginia: Na­ Department of Justice, 1989. tional Center for Missing and Exploited Children, 1987. Stratford, Lauren. Satan's Underground. Eugene, Oregon: Harvest House, 1988. Mayer, Robert S. Satan's Children. New York: Putnam, 1991. Summit, Roland C. "The Child Sexual Abuse Accommodation Syndrome./I Child Abuse and I National Coalition on Television Violence Neglect, 7 (1983), pp. 1'77-93. (NCTV) News. Vol. 9, Nos. 6-7 (June-October 1988), p. 3. Terr, Lenore C. Too Scared to Cry: Psychic Trauma in Childhood. New York: Harper and Row, 1990. National Incidence Studies on Missing, Ab­ ducted, Runaway, and Thrownaway Children Timnik, Lois. " Poll." , in America. Washington, D.C.: U.S. Department August 25-26, 1985. of Justice, 1990. Whitcomb, Debra, et al. When the Victim Is a Rosenberg, Donna A. "Web of Deceit: A Litera­ Child. \i\lashington, D.C.: National Institute of tureReview of Munchau sen Syndrome by Proxy./I Justice, 1985. Child Abuse and Neglect, 11 (1987), pp. 547-563.

65 Additional Readings

Books

Bolton, Frank G. Jr., Larry A. Morris, and Ann E. Gil, Eliana. Treatment of Adult Survivors of Child MacEachron. Males At Risk. Newbury Park, Abuse. Walnut Creek, California: Launch Press, California: Sage Publications, 1989. 1988.

Burgess, Ann Wolbert, and Christine A. Grant. Goldstein, Seth 1. The Sexual Exploitation ofChil­ Children Traumatized in Sex Rings. Arlington, dren. New York: ":":'sevier, 1987. Virginia: National Center for Missing and Ex­ ploited Children, 1988. Hechler, David. The Battle and the Backlash. Lex­ ington, Massachusetts: D.C. Heath, 1988. Campagna, Daniel S., and Donald L. Poffenberger.. The Sexual Trafficking in Children. Hicks, Robert D. In Pursuit of Satan: The Police and Dover, Massachusetts: Auburn House, 1988. the Occult. Buffalo, New York: Prometheus Books, 1991. Ceci, Stephen J., David F. Ross, and Michael P. Toglia, eds. Perspectives on Children's Testimony. Hollingsworth,Jan. Unspeakable Acts. New York: New York: Springer-Verlag, 1989. Congdon and Weed, 1986.

Ceci, StephenJ.,MichaeIP. Toglia,and DavidF. Jones, Ernest. On the . New York: Ross, eds. Children's Eyewitness MemDry. New Grove Press, 1959. York: Springer-Verlag, 1987. Kendrick, Martyn. Anatomy of a Nightmare. Crewdsonl' John. By Silence Betrayed. Boston, Toronto: Macmillan of Canada, 1988. Massachusetts: Little, Brown, 1988. Lew, Mike. Victims No Longer. New York: Cunningham, Carolyn, and Kee MacFarlane. Nevraumont, 1988. When Children Molest Children. Orwell, Vermont: Safer Society Press, 1992. Lyons, Arthur. Satan Wants You. New York: I Mysterious Press, 1988. Doris, John, ed. The of Children's Recollections. Washington, D.C.: AInerican Psy­ MacFarland, Kee, and Jill Waterman. Sexual chological Association, 1991. Abuse of Young Children. New York: Guilford Press, 1986. Eco, Umberto. Foucault's Pendulum. Orlando, : Harcourt Brace Jovanovich, 1989. lVlacHovec, FrankJ. Cults and Personality. Spring­ field, Illinois: Charles C Thomas, 1989. Eth, Spencer, and Robert S. Pynoos, eds. Post­ Traumatic Stress Disorderin Children. Washington, Magid, Ken, and Carole A. McKelvey. High Risk. D.c.: American Psychiatric Association, 1985. Goldf.m, Colorado: M & M Publishing, 1987.

Finkelhor, David, and Linda Meyer Williams. Marron, Kevin. Ritual Abuse. Toronto: Nursery Crimes: Sexual Abuse in Day Care. Newburg Books, 1988. Park, California: Sage, 1988.

67 Mathews, Ruth, et al. Female Sexual Offenders: An Burgess, Ann Wolbert, Carol R. Hartman, and Exploratory Study. Orwell, Vermont: Safer Soci­ Susan J. Kelley. "Assessing Child Abuse: The ety Press, 1989. TRIADS Checklist" Journal of Psychosocial Nurs­ ing, 28, No.4 (1990), pp. 6-14. Melton,J. Gotdon. Encyclopedic Handbook ofCults in America. New York: Garland,1986. Cozolino, Louis J. "The Ritual Abuse of Chil­ dren: Implications for Clinical Practice and Re­ Miller, Alice. Thou Shalt Not Be Aware. New search." Journal of Sex Research, 26, No. 1 (Feb. York: Farrar, Straus, Giroux, 1984. 1989), pp. 131-38.

Porter, Eugene. Treating the Young Male Victim of DeYoung, Mary. "The Indignant Page: Tech­ Sexual Assault. Syracuse, New York: Safer Society niques of Neutralization in the Publications of Press, 1986. Pedophile Organizations." Child Abuse and Ne­ glect, 12 (1988), pp. 583-591. Richardson, James T., Joel Best, and David G. Bromley, eds. The Satanism Scare. New York: Farr, Vanessa L., and John C. Yuille. "Assessing Aldine de Gruyter, 1991. Credibility." Preventing Sexual Abuse,No. 1 (Win­ ter 1988). Romano, Linda J., and Anna T. Laslo. Child Sexual Assault: Confronting the Crisis. Alexandria, Ganaway, George K. "Historical Versus Narra­ Virginia: National Sheriffsl Association, 1989. tive Truth: Clarifying the Role of Exogenous Trauma in the Etiology of Multiple Personality Rossman, Parker. Sexual Experience Between Men Disorder and Its Varients." Dissociation, 2, No.4 and Boys. New York: , 1976. (1989), pp. 205-220.

Toth, Patricia, and Michael Whalen. Investiga­ Guinee, William. "Satanismin YellowwoodFor­ tion and Prosecution of Child Abuse. Alexandria, est: The Interdependence of Antagonistic World Virginia: American Prosecutors Research Insti­ Views." Indiana Folklore and Oral History, 16, No. tute, 1987. 1 (January-June 1987).

Wilson, Charles, and Susan Caylor Steppe. In­ Haynes-Seman, Clare, and Richard D. Kreigman. vestigating Sexual Abuse in Daycare. Washington, "Sexualized Attention: Normal Interaction or D.C.: Child Welfare League of America, 1986. Precursor to Sexual Abuse?" American Journal of Orthopsychiatry, 59, No.2 (April 1989).

Jones, David, and M.J. McGraw. "Reliable and Articles Fictitious Accounts of Sexual Abuse to Children." Journal of Interpersonal Violence, 2, No.1 (March Abel, Gene G., et al. "Multiple Paraphelic Diag­ 1987). noses Among Sex Offenders." Bulletin of American Academy of Psychiatry and Law, 16,No. 2 (1988), pp. Kelley, Susan. "Ritualistic Abuse of Children: 153-168. Dynamics and Impact." Cultic Studies Journal, 5, No.2 (1988), pp. 228-36. Broussard, Sylvia, and William G. Wagner. "Child Sexual Abuse: Who Is to Blame?" Child Abuse and Neglect, 12 (1988), pp. 563-69.

68 1------

Kelley, SusanJ. "Stress Responses of Children to Terr, Lenore C. "Psychic Trauma in Children and Sexual Abuse and Ritualistic Abuse in Day Care Adolescents." Psychiatric Clinics of , Centers." Journal of Interpersonal Violence, 4, No.4 8, No.4 (December 1985). (1989), pp. 502-513. Think Tank Report: Investigation of Ritualistic Lanning Kenneth V. "Satanic, Occult, Ritualistic Abuse Allegations. Huntsville, Alabama: Na­ Crime: A Law-Enforcement Perspective." Police tional Resource Center on Child Sexual Abuse, Chief (October 1989). 1989.

Vandermey, Brenda J. "The Sexual Victimiza­ Lloyd, David W. Ritual Child Abuse: Understand­ tion of Male Children: A Review of Previous ing the Controversies. Huntsville, Alabama: Na­ Research." Child Abuse and Neglect, 12 (1988), pp. tional Resource Center on Child Sexual Abuse, 61-72. 1989. Victor, Jeffrey S. "A Rumor-Panic about a Dan­ gerous Satanic Cult in New York." New Terr, Lenore C. "The Child Psychiatrist and the York Folklore, 15, Nos. 1-2 (Winter-Spring 1989). Child Witness: Traveling Companions by Neces­ sity, if Not by Design." Journal of the American Yates, Alayne, and Tim Musty. "Preschool Academy of Child Psychiatry, 25, No.4 (1986), pp. Children's Erroneous Allegations of Sexual Mo­ 462-72. lestation." American Journal of Psychiatry, 145, No. 8 (August 1988).

69 National Center for Missing and Exploited Children

The National Center for Missing and Exploited Children (NCMEC), established in 1984 as a private, nonprofit organization, serves as a clearinghouse of information on missing and exploited children; provides technical assistance to citizens and law enforcement agencies; offers training programs to law enforcement and social service professionals; distributes photographs and descriptions of missing children nationwide; coordinates efforts with the private sector; networks with non­ profit service providers and state clearinghouses on missing persons; and provides information on effective state legislation to ensure the protection of children per 42 USC 5771 and 42 USC 290.

A 24-hour, toll-free telephone line is open for those who have information on missing or exploited children: 1-800-843-5678/1-800-THE LOST. This number is available throughout the United States and Canada. The TDD line (for the hearing impaired) is 1-800-826-7653. The NCMEC business number is (703) 235-3900.

In Apri11990 NCMEC merged with the Adam Walsh Child Resource Centers (AWCRC). For information on the services offered by our branches operating under the AWCRC name, please call them directly in Southern California at (714) 898-4802, in South Florida at (407) 820-9000, in Upstate New York at (716) 461-1000, and in South Carolina at (803) 254-2326.

A number of publications addressing various aspects of the missing and exploited child issue are available free of charge in single copies by contacting the National Center for Missing and Exploited Children's Publications Department.

Printed on Recycled Paper

TM National Center for Missing and Exploited Children 2101 Wilson Boulevard, Suite 550 Arlington, Virginia 22201-3052 12-89-010-2 Child Sex Rings: A Behavioral Analysis

I Author's Preface I 1. Historical Overview I 2. Definitions I 3. Child Sex Rings II 4. Historical Child Sex Rings I 5. Multidimensional Child Sex Rings I 6. Investigating Multidimensional Child Sex Rings I Appendix A: Protocols in Investigating Multi-Victim, Multi-Offender Child Sexual Exploitation

I Appendix B: Macro-Case Investigations I References I Additional Readings