Sexual Offenders Contacting Children Online: an Examination of Transcripts of Sexual Grooming

Total Page:16

File Type:pdf, Size:1020Kb

Sexual Offenders Contacting Children Online: an Examination of Transcripts of Sexual Grooming Journal of Sexual Aggression An international, interdisciplinary forum for research, theory and practice ISSN: 1355-2600 (Print) 1742-6545 (Online) Journal homepage: http://www.tandfonline.com/loi/tjsa20 Sexual offenders contacting children online: an examination of transcripts of sexual grooming Georgia M. Winters, Leah E. Kaylor & Elizabeth L. Jeglic To cite this article: Georgia M. Winters, Leah E. Kaylor & Elizabeth L. Jeglic (2017) Sexual offenders contacting children online: an examination of transcripts of sexual grooming, Journal of Sexual Aggression, 23:1, 62-76, DOI: 10.1080/13552600.2016.1271146 To link to this article: https://doi.org/10.1080/13552600.2016.1271146 Published online: 16 Jan 2017. Submit your article to this journal Article views: 1054 View Crossmark data Citing articles: 6 View citing articles Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=tjsa20 JOURNAL OF SEXUAL AGGRESSION, 2017 VOL. 23, NO. 1, 62–76 http://dx.doi.org/10.1080/13552600.2016.1271146 Sexual offenders contacting children online: an examination of transcripts of sexual grooming Georgia M. Wintersa,b, Leah E. Kaylorb,c and Elizabeth L. Jeglicb aThe Graduate Center, City University of New York, New York, NY, USA; bPsychology Department, John Jay College of Criminal Justice, New York, NY, USA; cDepartment of Psychology, Saint Louis University, Saint Louis, MO, USA ABSTRACT ARTICLE HISTORY The present study investigated transcripts of adults sexually grooming Received 25 January 2016 decoy victims on the Internet. One hundred transcripts were coded for Revised 3 December 2016 offender characteristics, victim characteristics, and dynamics of the Accepted 6 December 2016 conversation. The results revealed that all of the offenders were male, KEYWORDS most of whom believed they were communicating with an adolescent Sexual abuse; internet sex female. The sexual intentions of the offenders were made clear, with the crimes; sexual grooming; majority introducing sexual content early on into the conversation. The online grooming; child sexual length of the contact ranged from one day to nearly one year, abuse suggesting that the duration of the online grooming process may vary significantly. The majority of offenders also communicated with the decoy victim over the telephone and attempted to arrange an in-person meeting, many within short periods of time. Implications for prevention and future research are discussed. Originally airing in 2004, the television program To Catch a Predator captured the public’s attention by broadcasting encounters between sexual predators and law enforcement officers who were posing as children online. Such media coverage has heightened public attention to the dangers of sexual predators targeting children on the Internet (Hansen, 2006). Sexual solicitation of minors online involves an adult requesting a minor to engage in sexual conversations or activities via the Internet (Mitchell, Finkelhor, & Wolak, 2001). Adults who sexually solicit minors online may engage in sexual grooming behaviours, whereby an offender prepares a child for sexual abuse (Craven, Brown, & Gilchrist, 2006). Sexual grooming online involves an individual attempting to contact a minor with the goal of some form of sexually inappropriate behaviour (eg cybersexual activity, child pornography, arranging an in-person meeting for the purpose of sexual contact; Staks- rud 2013). Although the perpetrator has reached out to the potential victim, the minor may not respond to the initiation of conversation. The use of the Internet to identify and target victims is a relatively new phenomenon, but one that has a wide reach. Currently almost all young people (97%) in the United States between the ages of 12 and 18 use the Internet (Ybarra, Leaf, & Diener-West, 2004). A national telephone survey found that as many as 12% of males and 27% of females between the ages of 10 and 17 reported being sexually solicited online (Ybarra et al., 2004), suggesting that children are increasingly receiving sexual solicitations on the Internet (Child Exploitation and Online Protection Centre, 2010). Over the past two decades, there has been an increase in awareness for professionals and the public alike about the use of the Internet to facilitate child sexual abuse (Beech, Elliott, Birgden, & Findlater, 2008). However, there is still much to be understood in terms of the characteristics of the offenders and their conversations with poten- tial victims. CONTACT Georgia M. Winters [email protected], [email protected] © 2017 National Organisation for the Treatment of Abusers JOURNAL OF SEXUAL AGGRESSION 63 Offenders of online sexual grooming Sexual grooming typically describes the process whereby an offender manipulates a minor into a situ- ation where sexual abuse can be more readily committed, while also preventing future disclosure (van Dam, 2001; Wyre, 2000). Importantly, there has yet to be a universal definition of the term given difficulties determining where the process begins and ends, as well as the variety of behaviours that could be involved depending on the offender, the victim, and the context (Gillespie, 2002). While sexual grooming is not a new concept, the Internet has given potential offenders new opportunities to sexually exploit children (Gillespie, 2002), by providing the offender with anonymity and easy access to victims (Cooper, 1998). Offenders use the Internet to manipulate potential victims by intro- ducing sex talk, exposing the child to pornography, or asking victims to view or perform sexual activi- ties (Lanning, 2005). Further, offenders may have the goal of arranging a meeting with the child to engage in in-person sexual acts. One way these Internet offenders locate children and initiate con- versations with potential victims is through online chat rooms (Malesky, 2007). These online offenders may use sexual grooming behaviours to sexually solicit minors on these Internet platforms. Of the 2391 public reports of inappropriate online sexual behaviours in the UK between 2009 and 2010, 64% involved sexual solicitation of minors (Child Exploitation and Online Protection Centre [CEOP], 2010). It should be noted that groups, such as CEOP, have raised awareness of these issues and facili- tate reporting of these crimes, which may help explain why online solicitation has been deemed a significant social problem in recent years. Overall, it appears that sexual solicitation of children is one of the most frequently reported sexually inappropriate behaviours on the Internet. While researchers have long been investigating contact sexual offenders, online sexual offenders have been considered a relatively new phenomenon (Craven, Brown, & Gilchrist, 2007). Carr (2004) argued that individuals who groom children via the Internet are qualitatively different than those who engage in in-person grooming. Babchishin, Hanson, and Hermann (2011) conducted a meta- analysis comparing online (eg child pornography, luring children through the Internet) and offline sexual offenders. The meta-analysis revealed that online offenders were more likely to be Caucasian and younger than in-person offenders. In terms of psychological variables, online offenders showed greater empathy for victims, higher sexual deviancy, and lower impression management. A content analysis of online grooming transcripts also revealed that while online sexual offenders use similar tactics for in-person grooming, the overall process may differ in order and timing (Black, Wollis, Woodworth, & Hancock, 2015). Wolak and Finkelhor (2013) investigated whether Internet-related offenses differed from in-person crimes by conducting in-depth phone interviews with a national sample of law enforcement investigators regarding their cases. Contrary to other research, these authors concluded there is little evidence to suggest that offenders who communicate with victims online were different or more dangerous than those committing offenses in-person and both groups used similar tactics in their offense process. Researchers have been interested in how offenders locate and target their online victims in order to better understand the offense process. Child molesters who engage in in-person grooming tend to select victims based on physical attractiveness, ease of access, and perceived vulnerabilities (Lanning, 2010; McAlinden, 2006; Olson, Daggs, Ellevold, & Rogers, 2007). Similarly, while it is unclear whether physical attractiveness plays a role in the selection process, research has shown that online perpetra- tors may select victims based on accessibility, opportunity, and the child’s perceived vulnerabilities (Malesky, 2007;O’Connell, 2003). Malesky (2007) examined the online activity of 31 convicted sexual offenders who had communicated with a minor via the Internet and found that the majority monitored and visited chat rooms geared toward minors and a half of this sample reviewed profiles to identify potential victims. These online offenders chose a victim based on the presence of sexual content in the minor’s profile, perceived neediness or submissiveness of the child, the child explicitly stating their age in their profile, and the use of young-sounding usernames. Once the victim is selected, the offender begins to engage the child in conversation. At that point, online offenders tend to immediately state their gender, age, and location (Marcum, 2007). 64 G.M.WINTERSETAL. A meta-analysis of studies examining online
Recommended publications
  • Criminal Hiv Transmission Statutes and Covert Online Investigations: a Due Process Analysis
    CRIMINAL HIV TRANSMISSION STATUTES AND COVERT ONLINE INVESTIGATIONS: A DUE PROCESS ANALYSIS Joseph Payne* TABLE OF CONTENTS Introduction .................................. ............... 326 I. History of the Disease-Social, Medical, and Legal Developments ............................................. 328 A. Historical Background of the Disease and Legislative Responses ..................................... ........ 328 1. Political Background of Criminal HIV Transmission Statutes ..................................... ........ 329 2. Current National Landscape of Criminal HIV Transmission Statutes............................. ............... 330 B. Social Consequences of Criminal HIV Transmission Statutes 331 C. Medical Developments Since Criminal HIV Transmission Statutes Were Enacted.................................334 1. Antiretroviral Therapy, Post-exposure Prophylaxis, and Pre- exposure Prophylaxis ............................ ..... 334 2. Continued Risks Associated with Inadequate or Non-existent Treatment ............................................... 336 D. Legal Developments Since Criminal HIV Transmission Statutes Were Enacted ............................. 338 II. Criminal HIV Transmission Statutes in the Age of Online Dating and Undercover Policing.................................. 340 A. Online Dating and Communication ................ ..... 340 B. Policing in the Digital Age...................... ........ 342 * J.D. candidate, class of 2018, Columbia Law School; B.S., B.A. (Hons) 2014, American University. The author would
    [Show full text]
  • Internet Sting Operations and Attempt Liability Audrey Rogers Pace Law School
    University of Richmond Law Review Volume 38 | Issue 2 Article 4 1-2004 New Technology, Old Defenses: Internet Sting Operations and Attempt Liability Audrey Rogers Pace Law School Follow this and additional works at: https://scholarship.richmond.edu/lawreview Part of the Computer Law Commons, Criminal Law Commons, Criminal Procedure Commons, Evidence Commons, and the Internet Law Commons Recommended Citation Audrey Rogers, New Technology, Old Defenses: Internet Sting Operations and Attempt Liability, 38 U. Rich. L. Rev. 477 (2004). Available at: https://scholarship.richmond.edu/lawreview/vol38/iss2/4 This Article is brought to you for free and open access by the Law School Journals at UR Scholarship Repository. It has been accepted for inclusion in University of Richmond Law Review by an authorized editor of UR Scholarship Repository. For more information, please contact [email protected]. NEW TECHNOLOGY, OLD DEFENSES: INTERNET STING OPERATIONS AND ATTEMPT LIABILITY Audrey Rogers * I. INTRODUCTION Internet sting operations to catch adults preying on children have grown as exponentially as the public's use of the Internet. These operations typically involve an adult law enforcement offi- cer posing as a child for Internet contact with a would-be defen- dant.1 Defendants caught in a sting are charged with attempt be- cause by use of the sting operation, law enforcement has * Associate Professor of Law, Pace Law School. B.S., 1977, State University of New York at Albany; J.D., 1980, St. John's University School of Law. Many thanks to Mavis Ronayne and Jill Grinham for their invaluable research assistance. Thanks also to my col- leagues at Pace Law School for their suggestions and comments.
    [Show full text]
  • New Jersey's Adult Internet Luring Statute
    NEW JERSEY’S ADULT INTERNET LURING STATUTE: AN APPROPRIATE NEXT STEP? 1 JOHN W. LOMAS, JR. ABSTRACT New Jersey recently enacted legislation prohibiting the use of the Internet to lure or entice someone to a location with the purpose of committing a crime with or against that person or some other person. Most states have similar laws pertaining to pedophiles, but this is the first adult Internet luring statute. State measures to regulate the Internet, even in the context of criminal justice, will likely face constitutional challenge since the Internet has become such a critical vehicle for both protected speech and interstate commerce. Furthermore, while the use of the Internet in the commission of crimes against other persons is a new phenomenon, it is unclear whether new laws are the best solution, or whether other responses such as equipping police and investigators with more resources and training to properly enforce existing law would be more effective. This iBrief analyzes the issues New Jersey will face with its statute and the issues other states should be aware of when considering similar legislation. INTRODUCTION ¶1 Public service announcements on the radio, crime drama television shows, stories from the local news – the Internet predator threat to children has been thoroughly publicized through these and many other types of media.2 Responding to this threat, many states have enacted laws prohibiting the use of the Internet to communicate with children in a sexual manner.3 Many of these laws prohibit luring or enticing children via the 1 J.D. Candidate, 2006, Duke University School of Law; M.P.P.
    [Show full text]
  • Aardweg,Gerard J
    TERMINOLOGIA PSICOLOGIA - BRASIL AARDWEG,GERARD J. M. VAN DEN ABANDONO DA PSICOTERAPIA USE Desistencia do tratamento ABANDONO DA TERAPIA USE Desistencia do tratamento ABANDONO DO TRATAMENTO USE Desistencia do tratamento ABELHAS BT Insetos Esp.: ABEJAS Ing.: BEES ABLACAO USE Lesoes ABLACAO CEREBRAL USE Lesoes cerebrais ABORDAGEM DE TRATAMENTO INTERDISCIPLINAR SN Combinacao de duas ou mais disciplinas na prevencao, diagnostico, tratamento ou reabilitacao de disturbios fisicos ou mentais. UF Abordagem de tratamento multidisciplinar BT Tratamento RT Pesquisa interdisciplinar RT Psicologia da saude RT Terapia multimodal Esp.: ABORDAJE DE TRATAMIENTO MULTIDISCIPLINARIO Ing.: INTERDISCIPLINARY TREATMENT APPROACH ABORDAGEM DE TRATAMENTO MULTIDISCIPLINAR USE Abordagem de tratamento interdisciplinar ABORDAGEM DE TRATAMENTO MULTIMODAL USE Terapia multimodal ABORDAGEM DE TRATAMENTO MULTIMODAL SN Uso de diferentes tecnicas terapeuticas baseadas nos principios teoricos extraidos de uma especialidade ou de uma disciplina medica ou psicologica. Compare com ABORDAGEM DE TRATAMENTO INTERDISCIPLINAR. USE Terapia multimodal ABORTO UF Aborto espontaneo UF Aborto induzido UF Aborto provocado BT Cirurgia RT Controle da natalidade RT Planejamento familiar Esp.: ABORTO Ing.: ABORTION ABORTO ESPONTANEO USE Aborto ABORTO INDUZIDO USE Aborto ABORTO PROVOCADO USE Aborto ABRAHAM, KARL, 1877-1925 ABRAHAM, NICOLAS, 1919-1975 ABREVIATURAS E SIGLAS Esp.: ABREVIATURAS Y ACRONIMOS Ing.: ABBREVIATIONS. ACRONYMS ABREVIATURAS E SIGLAS - DICIONARIOS Esp.: ABREVIATURAS Y ACRONIMOS - DICCIONARIOS Ing.: ABBREVIATIONS. ACRONYMS - DICIONARIES ABRIGOS Esp.: ABRIGOS Ing.: SHELTERS ABSTRACAO SN Processo que consiste em selecionar ou isolar um determinado aspecto conceitual a partir de um todo concreto. BT Pensamento NT Imagem RT Pensamento divergente Esp.: ABSTRACCION Ing.: ABSTRACTION ABUSO DA CRIANCA SN Abuso de criancas ou adolescentes em ambiente familiar, institucional ou qualquer outro ambiente.
    [Show full text]
  • CHAPTER 4 CHAPTER 5 Internet Sex Offending and the Online Sting
    CHAPTER 45 Internet Sex Offending and the Online Sting Richard G. Wright One of the most diffi cult struggles in American society is maintaining a constant balance between individual privacy and public safety. In our democratic, diverse, pluralistic society, we have the freedom to think our own thoughts, practice our beliefs, and ponder about various possibilities. The problem arises when our thoughts and beliefs encourage behaviors that fl irt with criminality. In this clash, we turn to our policy makers to enact criminal laws that are supposed to refl ect a moral consensus. In the 21st century, much of American life has moved online. Parts of our fi nances, higher education, health information, and social circles have moved online. Naturally, for many people, part of their online persona includes their sexuality. From seeking information about safe sex, pregnancy, infertility, and healthy sexual practices, as well as fetishes and support groups, people use the Internet to explore (and in some cases extend) their sexuality. This can lead to a confl ict between one’s online sexual desires and one’s private sexual practices. This chapter analyzes numerous issues with Internet sex stings (ISS). ISS are tools used by the law enforcement to arrest adults who are interested in having sex with minors. Despite the seemingly simplistic intent of ISS (to arrest online predators before they assault a child), this practice is quite complex. There are those who use the Internet for deviant sexual purposes. Some of these men and women go online with the intent to solicit a minor for an in-person sexual assault (also known as contact offending).
    [Show full text]
  • Analysis of the Special Investigative Counsel Report and the Crimes of Gerald A
    Analysis of the Special Investigative Counsel Report and the Crimes of Gerald A. Sandusky & Education Guide to the Identification and Prevention of Child Sexual Victimization James T. Clemente February 2013 TABLE OF CONTENTS I. The SIC Mandate and Conclusions................................................................................. 6 II. How the SIC Got It Wrong .............................................................................................. 6 III. Behavioral Dynamics of Acquaintance Child Sex Offenders ....................................... 7 A. Preferential Child Sex Offenders............................................................................ 8 B. “Nice-Guy” Acquaintance Offenders..................................................................... 8 C. Grooming ................................................................................................................ 9 D. Compliant Victimization......................................................................................... 9 E. “Conspiracy of Silence” Surrounding Child Sexual Victimization...................... 10 F. How Offenders Use These Complicated Dynamics to Their Advantage ............. 11 G. The Case of Richard Taus..................................................................................... 14 IV. Analysis of the SIC Findings.......................................................................................... 15 A. Analysis of 1998 Incident ....................................................................................
    [Show full text]
  • Perspectives
    California Coalition on Sexual Offending (CCOSO) Quarterly Newsletter Perspectives Winter 2014 / 2015 What is Internet Sex Offenders—Horse of a Different Color CCOSO? Elaine Brady, Ph.D., MFT, CAS, CSAT-S CCOSO is a recognized leader in providing expertise, The Internet has spawned a growing have acted upon if it had not been for the training, education, phenomenon of “virtual” and “pseudo” Internet, resulting in what came to be and legislative pedophiles that do not match the known as the “fantasy guidance in traditional or “classic” pedophile profile defense” (Yamagami, 2000). These cases treatment, (e.g., they had no prior history of appear to suggest that successful forensic management and psychiatric issues, criminal behavior or evaluation of Internet Sex Offenders research related to sexual interest in minors). Alarmingly, (ISO’s) may hinge on one’s ability to sexual offending. the FBI reported a 2,000% increase in the understand the addictive qualities of the CCOSO and its number of cases involving sex crimes Internet and on one’s ability to explain chapters strengthen against children as a result of online how that addictive process inexorably local and statewide contact (e.g. Internet Sex Offenders - draws some individuals into illicit agencies and ISOs) between the years 1996 to 2007 behavior. professionals to (Department of Commerce and Justice, enhance community 2012), years corresponding to the rapid Young (2000, 2004) first introduced the safety. “penetration” of computers and the term virtual pedophiles and offered a Internet into American households (U.S. model for differential diagnosis between Census Bureau, 2014). this group and classic pedophiles.
    [Show full text]
  • Conspiracy and the Fantasy Defense: the Strange Case of the Cannibal Cop
    EK IN PRINTER FINAL (DO NOT DELETE) 1/26/2015 8:11 PM Notes CONSPIRACY AND THE FANTASY DEFENSE: THE STRANGE CASE OF THE CANNIBAL COP KAITLIN EK† ABSTRACT In the notorious “Cannibal Cop” case, New York police officer Gilberto Valle was accused of conspiring to kidnap, kill, and eat various women of his acquaintance. Valle claimed a “fantasy defense,” arguing that his expression represented not conspiracy agreement, but fantasy role-play. His conviction and subsequent acquittal raised questions about the freedom of speech, thoughtcrime, and the nature of conspiracy law. Because the essence of conspiracy is agreement, it falls into the category of crimes in which pure speech is the actus reus of the offense. This Note argues that as a result, conspiracy cases in which the fantasy defense is implicated pose special due-process and First Amendment dangers, and concludes that these dangers can be mitigated by a strengthened overt-act requirement. INTRODUCTION “Gil Valle’s fantasy is about seeing women executed. The fantasies that he is engaging in are about seeing women sexually assaulted, executed and left for dead. That’s not a fantasy that is OK.” – Randall W. Jackson, Assistant United States Attorney, in closing argument.1 The headlines sound like something out of a schlocky slasher flick: “‘Cannibal’ Cop Plotted to Eat 100 Women: Feds,”2 “NYPD Copyright © 2015 Kaitlin Ek. † Duke University School of Law, J.D. expected 2015; University of Nebraska, B.A. 2011. Many thanks to Professor Lisa Griffin for her invaluable advice and support. Thanks also to the staff of the Duke Law Journal for their thoughtful comments and editing.
    [Show full text]
  • Internet Pornography and Child Exploitation
    Internet Pornography and Child Exploitation In This Issue November Introduction.................................................... 1 2006 By Drew Oosterbaan Volume 54 Number 7 Federal Jurisdiction in Child Pornography Cases. .................... 3 By Alexandra Gelber United States Department of Justice Establishing Federal Jurisdiction in Child Prostitution and Sex Tourism Executive Office for United States Attorneys Cases.......................................................... 8 Washington, DC 20530 By Wendy Waldron and Alexandra Gelber Michael A. Battle Director Ensuring Convictions Through Successful Search Warrants........... 1 9 Contributors' opinions and By Sherri A. Stephan statements should not be considered an endorsement by How Computer Forensics can Dramatically Improve a Case........... 2 4 EOUSA for any policy, program, or service. By Steven J. Grocki and Lam D. Nguyen The United States Attorneys' Bulletin is published pursuant to Obtaining Foreign Evidence in Child Sex Tourism Cases.............. 3 0 28 CFR § 0.22(b). By Wendy Waldron and Michael I. Yoon The United States Attorneys' Bulletin is published bimonthly by the Executive Office for United Providing Victim-Centered Services to Prostituted Youth.............. 3 7 States Attorneys, Office of Legal By Myesha K. Braden Education, 1620 Pendleton Street, Columbia, South Carolina 29201. Helping Child Victims and Witnesses Present Effective Testimony...... 4 2 Managing Editor By Kayla Bakshi and Darcy Katzin Jim Donovan Program Manager Prosecuting Obscene Representations of the Sexual Abuse of Children.. 4 9 Nancy Bowman By Sara E. Flannery and Damon A. King Law Clerk Kevin Hardy Internet Address www.usdoj.gov/usao/ reading_room/foiamanuals. html Send article submissions and address changes to Program Manager, United States Attorneys' Bulletin, National Advocacy Center, Office of Legal Education, 1620 Pendleton Street, Columbia, SC 29201.
    [Show full text]
  • Advance Sheets Court of Appeals
    263 N.C. App.—No. 1 Pages 1-413 263 N.C. App.—No. 1 ADVANCE SHEETS OF CASES ARGUED AND DETERMINED IN THE COURT OF APPEALS OF Pages 1-413 NORTH CAROLINA JUNE 30, 2020 MAILING ADDRESS: The Judicial Department P. O. Box 2170, Raleigh, N. C. 27602-2170 COMMERCIAL PRINTING COMPANY PRINTERS TO THE SUPREME COURT AND THE COURT OF APPEALS THE COURT OF APPEALS OF NORTH CAROLINA Chief Judge LINDA M. McGEE Judges WANDA G. BRYANT PHIL BERGER, JR. DONNA S. STROUD HUNTER MURPHY CHRIS DILLON JOHN S. ARROWOOD RICHARD D. DIETZ ALLEGRA K. COLLINS JOHN M. TYSON TOBIAS S. HAMPSON LUCY INMAN REUBEN F. YOUNG VALERIE J. ZACHARY CHRISTOPHER BROOK Former Chief Judges GERALD ARNOLD SIDNEY S. EAGLES, JR. JOHN C. MARTIN Former Judges WILLIAM E. GRAHAM, JR. PATRICIA TIMMONS-GOODSON J. PHIL CARLTON ROBIN E. HUDSON BURLEY B. MITCHELL. JR. ERIC L. LEVINSON WILLIS P. WHICHARD JAMES A. WYNN, JR. CHARLES L. BECTON BARBARA A. JACKSON ALLYSON K. DUNCAN CHERI BEASLEY SARAH PARKER CRESSIE H. THIGPEN, JR. ELIZABETH G. McCRODDEN ROBERT C. HUNTER ROBERT F. ORR LISA C. BELL JACK COZORT SAMUEL J. ERVIN, IV MARK D. MARTIN SANFORD L. STEELMAN, JR. JOHN B. LEWIS, JR. MARTHA GEER CLARENCE E. HORTON, JR. LINDA STEPHENS JOSEPH R. JOHN, SR. J. DOUGLAS McCULLOUGH ROBERT H. EDMUNDS, JR. WENDY M. ENOCHS JAMES C. FULLER ANN MARIE CALABRIA K. EDWARD GREENE RICHARD A. ELMORE RALPH A. WALKER MARK A. DAVIS ALBERT S. THOMAS, JR. ROBERT N. HUNTER, JR. LORETTA COPELAND BIGGS ALAN Z. THORNBURG Clerk DANIEL M. HORNE, JR.
    [Show full text]
  • Child Molesters: a Behavioral Analysis for Professionals Investigating the Sexual Exploitation of Children
    Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children In cooperation with the Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children Fifth Edition 2010 Kenneth V. Lanning Former Supervisory Special Agent Federal Bureau of Investigation (FBI) Copyright © 2010 National Center for Missing & Exploited Children®. All rights reserved. This manual is provided for informational purposes only and does not constitute legal advice or professional opinion on specific facts. Information provided in this manual may not remain current or accurate, so recipients should use this manual only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. This project was supported by Grant No. 2010-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. National Center for Missing & Exploited Children®, 1-800-THE-LOST®, Child Victim Identification Program®, and CyberTipline® are registered trademarks of the National Center for Missing & Exploited Children. Dedication This publication is dedicated to child victims of sexual exploitation and the organization that allowed me to devote most of my 30-year career as a Special Agent to fighting “crimes against children.” To the Federal Bureau of Investigation I also dedicate this publication to my wife and children, without whose support for all these years I could not have maintained my objectivity and balance.
    [Show full text]
  • Internet Sting Operations and Attempt Liability
    Pace University DigitalCommons@Pace Pace Law Faculty Publications School of Law 1-1-2004 New Technology, Old Defenses: Internet Sting Operations and Attempt Liability Audrey Rogers Elisabeth Haub School of Law at Pace University Follow this and additional works at: https://digitalcommons.pace.edu/lawfaculty Part of the Criminal Law Commons Recommended Citation Audrey Rogers, New Technology, Old Defenses: Internet Sting Operations and Attempt Liability, 38 U. Rich. L. Rev. 477 (2004), http://digitalcommons.pace.edu/lawfaculty/317/. This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace Law Faculty Publications by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. NEW TECHNOLOGY, OLD DEFENSES: INTERNET STING OPERATIONS AND ATTEMPT LIABILITY Audrey Rogers * Internet sting operations to catch adults preying on children have grown as exponentially as the public's use of the Internet. These operations typically involve an adult law enforcement offi- cer posing as a child for Internet contact with a would-be defen- dant.' Defendants caught in a sting are charged with attempt be- cause by use of the sting operation, law enforcement has * Associate Professor of Law, Pace Law School. B.S., 1977, State University of New York at Albany; J.D., 1980, St. John's University School of Law. Many thanks to Mavis Ronayne and Jill Grinham for their invaluable research assistance. Thanks also to my col- leagues at Pace Law School for their suggestions and comments. 1. The Federal Bureau of Investigation ("FBIn) started the Innocent Images National Initiative in 1995 to stop child sex exploitation through the Internet.
    [Show full text]