<<

U.S. Department of Justice Office of Justice Programs Office for Victims of Crime

D ECEMBER 2001

Internet Crimes Against Children Message From the Director Today, computers are prevalent in busi- Children have always been vulnerable ew computer technology presents nesses, homes, schools, libraries, and to victimization.Their trusting natures complex challenges for law even airports. The World Wide Web pro- and naivete make them perfect targets for perpetrators—both people they enforcement agencies and victim vides instant access to news, reference N know and those they don’t.As children service providers. These professionals information, shopping, banking, stock grow into adolescents, they remain vul- must protect users as they con- trading, auctions, and travel information nerable to victimization.Youth are often duct investigations, secure evidence, and reservations. People routinely use the curious and eager to try new things. identify and apprehend offenders, and Internet to take college courses, play Many youth struggle with issues of help child victims and their families. games, listen to music, and view videos. rebellion and independence and seek Based on the knowledge and experience Chat rooms and e-mails are now replac- attention and affection from people out- of those working with child victims, this ing telephones as our favorite means of side the home, often by using comput- ers.Today, an estimated 10 million Bulletin focuses attention on child vic- long-distance communication. children are using the Internet. By 2005, tims of Internet-based crimes, highlight- approximately 77 million kids will be ing the challenges for law enforcement The proliferation of computer technology online.With so many children online, personnel and victim service providers, obviously has enhanced our lives in today’s predators can easily find and examining who the child victims are, many ways, such as enabling improved exploit them. For predators, the and determining how best to respond to productivity and efficiency at work, Internet is a new, effective, and more these victims’ needs and the needs of school, and home. Anyone with access anonymous way to seek out and groom their families. to a computer and modem now has children for criminal purposes such as unparalleled recreational and educational producing and distributing child pornog- raphy, contacting and children opportunities. for the purpose of engaging in sexual Introduction acts, and exploiting children for sexual Unfortunately, criminals are also using tourism for personal and commercial he growth of technology has modern technology—to prey on inno- purposes. changed our lives dramatically. cent victims. Computers and the Internet Computers were viewed as a luxury have made the predator’s job easier. The nature of Internet crimes presents T complex new challenges for law or even an extravagance 30 years ago. Historically, child predators found their enforcement agencies and victim service We relied on television, newspapers, victims in public places where children providers with regard to investigating and radio as primary sources of news tend to gather—schoolyards, play- crimes, collecting evidence, identifying and information. Cables, modems, grounds, and shopping malls. Today, with and apprehending offenders, and and online services were virtually so many children online, the Internet nonexistent. Continued on page 2 OVC Bulletin

45 million, and by 2005 to 77 million.2 at greater risk because they often use the Continued from page 1 With so many youth online and vulnera- computer unsupervised and are more like- assisting child victims and their families. ble to predators, it is extremely important ly to engage in online discussions of a For example, victims and perpetrators for parents, law enforcement officials, personal nature. Some victims become are often separated geographically, prosecutors, and victim service providers unwitting participants as they actively which may hamper investigation efforts. to know as much as possible about participate in chat rooms, trade e-mail Also, victims are often ashamed and Internet crimes against children so they messages, and send pictures online. reluctant to come forward, which makes can prevent victimization and prosecute Troubled or rebellious teens who are seek- identifying offenders difficult.These chal- offenders. ing emancipation from parental authority lenges are being addressed by federal can be susceptible to Internet predators. and local law enforcement agencies, but there is still much to learn about pre- The risk of victimization is greater for venting, identifying, and investigating Children as Targets emotionally vulnerable youth who may Internet-based crimes against children. of Internet Crimes— be dealing with issues of sexual identity. These young people may be willing to This Bulletin is based on the experi- Who Is Vulnerable? engage in conversation that is both titil- ences of professionals now working with child victims of Internet crimes and raditionally, both intrafamilial lating and exciting but appears innocent their families. It highlights some of the offenders and strangers have found and harmless. Unfortunately, Internet challenges law enforcement and victim that young children and teenagers interactions that initially appear innocent service professionals face in addressing T can gradually lead to sexually explicit are perfect targets for criminal acts Internet crimes against children and conduct.3 focuses attention on child victims of because they are often trusting, naive, these crimes by examining who they are curious, adventuresome, and eager for and how best to respond to their needs attention and affection. However, the and the needs of their families. most attractive factor to predators is that Types of Internet children and teenagers historically have Victimization John W. Gillis not been viewed as credible witnesses. Director Today, the danger to children is even nternet crimes are often thought of as greater because the Internet provides victimless. Nothing could be further from the truth. Children and teenagers provides predators a new place— predators anonymity. Whether the vic- I can and do become victims of Internet cyberspace—to target children for crimi- timization occurs in person or over the crimes. Predators contact teenagers and nal acts. This approach eliminates many Internet, the process is the same—the children over the Internet and victimize of the risks predators face when making perpetrator uses information to target a them by contact in person. child victim. For example, the predator may initiate an online friendship with a ■ Enticing them through online con- young person, sharing hobbies and inter- tact for the purpose of engaging ests. This may lead to the exchange of Scope of the Problem them in sexual acts. gifts and pictures. Just like the traditional he sheer number of young people predator who targets children in person, ■ Using the Internet for the produc- using computers today makes our the usually is willing to concern for them well founded. tion, manufacture, and distribution T spend considerable time befriending and of child pornography. Recent years have seen a great increase in grooming a child. The predator wants to access to and use of the Internet. By the build the child’s trust, which will allow ■ Using the Internet to expose youth end of 1998, more than 40 percent of all the predator to get what he or she to child pornography and encourage American homes had computers, and 25 ultimately wants from the child. them to exchange pornography. percent had Internet access.1 This trend is expected to continue. Children and Although no family is immune to the ■ Enticing and exploiting children for teenagers are one of the fastest growing possibility that their child may be exploit- the purpose of sexual tourism (travel groups of Internet users. An estimated 10 ed and harassed on the Internet, a few with the intent to engage in sexual million kids are online today. By the year factors make some children more vulnera- behavior) for commercial gain 2002, this figure is expected to increase to ble than others. Older children tend to be and/or personal gratification. 2 Internet Crimes Against Children

Unique discovered by law enforcement during an ■ Aggressive sexual solicitation: investigation. The presumed anonymity Sexual solicitations involving offline Characteristics of of Internet activities often provides a false contact with the perpetrator through sense of security and secrecy for both the mail, by telephone, or in person, or perpetrator and the victim. attempts or requests for offline everal characteristics distinguish contact. Internet crimes from other crimes S committed against children: Youth Internet ■ Unwanted exposure to sexual mate- rial: When online, opening e-mail, Physical contact between the child and Safety Survey or opening e-mail links, and not the perpetrator does not need to occur lthough it was clear that young peo- seeking or expecting sexual material, for a child to become a victim or for a ple are using the Internet in ever- being exposed to pictures of naked crime to be committed. Innocent pictures increasing numbers, no research people or people having sex. or images of children can be digitally A existed on how many youth encounter ■ transformed into pornographic material unwanted sexual solicitations and expo- : Threats or other offen- and distributed across the Internet with- sure to sexual material and harassment sive content (not sexual solicitation) out the victims’ knowledge. online. To obtain a clearer picture of sent online to the youth or posted the scope of the problem, the National online for others to see. The Internet provides a source for Center for Missing & Exploited Children repeated, long-term victimization of a The survey also explored Internet safety (NCMEC) provided funding to Dr. child that can last for years, often with- practices used by youth and their families, David Finkelhor, Director of the Crimes out the victim’s knowledge. Once a what factors may put some youth more at Against Children Research Center at child’s picture is displayed on the risk for victimization than others, and the the University of New Hampshire, to Internet, it can remain there forever. families’ knowledge of how to report conduct a research survey in 1999 on Images can stay on the Internet indefi- online solicitations and harassment. Internet victimization of youth. His nitely without damage to the quality of research provides the best profile of this the image. Statistical Findings problem to date. The survey results offered the following These crimes transcend jurisdictional Crimes Against Children Research statistical highlights:5 boundaries, often involving multiple vic- Center staff interviewed a nationally rep- tims from different communities, states, resentative sample of 1,501 youth, aged ■ One in 5 youth received a sexual and countries. The geographic location 10 to 17, who used the Internet regularly. approach or solicitation over the of a child is not a primary concern for “Regular use” was defined as using the Internet in the past year. perpetrators who target victims over the Internet at least once a month for the Internet. Often, perpetrators travel hun- ■ One in 33 youth received an aggres- past 6 months on a computer at home, at dreds of miles to different states and sive sexual solicitation in the past school, in a library, at someone else’s countries to engage in sexual acts with year. This means a predator asked a home, or in some other place. children they met over the Internet. young person to meet somewhere, Many of these cases involve local, state, Survey Areas called a young person on the phone, federal, and international law enforce- and/or sent the young person corre- ment entities in multiple jurisdictions. The survey looked at four types of spondence, money, or gifts through online victimization of youth, which the U.S. Postal Service. Many victims of Internet crimes do Finkelhor4 defined as not disclose their victimization or even ■ One in 4 youth had an unwanted ■ realize that they have been victims of a Sexual solicitation and approaches: exposure in the past year to pictures crime. Whereas children who experience Requests to engage in sexual of naked people or people having physical or sexual abuse may disclose activities or sexual talk or to give sex. the abuse to a friend, teacher, or parent, personal sexual information that many victims of Internet crimes remain were unwanted or, whether wanted ■ One in 17 youth was threatened or anonymous until pictures or images are or not, made by an adult. harassed in the past year. 3 OVC Bulletin

■ Most young people who reported an age characteristically targeted by problem, the characteristics of its victims these incidents were not very dis- pedophiles. Although the youth stopped and perpetrators, its impact on children, turbed about them, but a few found most solicitations by leaving the Web and strategies for prevention and them distressing. site, logging off, or blocking the sender, intervention. the survey confirmed current thinking ■ Only a fraction of all episodes was that some youth are particularly vulnera- reported to authorities such as the ble to online advances. Information and police, an Internet service provider, or a hotline. Most youth reported not being distressed Intervention by sexual exposures online. However, a Resources ■ About 25 percent of the youth who significant 23 percent reported being very National Center for Missing & encountered a sexual approach or or extremely upset, 20 percent reported Exploited Children solicitation told a parent. Almost being very or extremely embarrassed, and 40 percent of those reporting an 20 percent reported at least one symptom The National Center for Missing & unwanted exposure to sexual of stress. These findings point to the need Exploited Children is a comprehensive material told a parent. for more research on the effects on youth resource for families, victim service of unwanted exposure to sexual materials practitioners, and law enforcement per- ■ Only 17 percent of youth and 11 and the indicators of potentially exploita- sonnel. NCMEC is supported by the U.S. percent of parents could name a spe- tive adult-youth relationships. Department of Justice’s Office of Juvenile cific authority, such as the Federal Justice and Delinquency Prevention Bureau of Investigation (FBI), The large number of solicitations that (OJJDP) and functions as a clearinghouse CyberTipline, or an Internet service went unreported by youth and families and resource center for collecting and provider, to which they could report was of particular interest. This underre- distributing information about missing, an Internet crime, although more porting is attributed to feelings of embar- runaway, and sexually exploited children, indicated they were vaguely aware of rassment or guilt, ignorance that the including exploitation resulting from such authorities. incident was a reportable act, ignorance Internet solicitations. In partnership of how to report it, and perhaps resigna- with the U.S. Postal Inspection Service, ■ In households with home Internet tion to a certain level of inappropriate U.S. Customs Service, and FBI, NCMEC access, one-third of parents said they behavior in the world. operates the CyberTipline, an online had filtering or blocking software on form for reporting suspected child their computers. Possibly due to the nature and small sam- sexual exploitation (www.missingkids.com/ ple size of the survey, there were no cybertip), and the Child Pornography Other Findings 6 reported incidences of traveler cases. The Tipline (1–800–843–5678). Through the The survey results confirm what is survey also revealed no incidences of Cyber Tipline and the telephone hotline, already known: although the Internet is completed Internet seduction or sexual NCMEC a wonderfully fun and educational tool, exploitation, including trafficking of child it can also be very dangerous. According pornography. Despite the findings of this ■ Receives reports 24 hours a day, 7 to the survey, one in five youth who survey, law enforcement agencies report days a week, of child sexual exploi- regularly use the Internet received sexual increasing incidents of Internet crimes tation and the production and solicitations or approaches during a 1- against children. distribution of pornography on the year period. The survey also found that Internet. Calls to the toll-free Child offenses and offenders are more diverse Recommendations Pornography Tipline can be received than previously thought. In addition Among the many findings of from the United States, Canada, to pedophiles, other predators use the Finkelhor’s survey, the most significant is Mexico, and the United Kingdom. Internet. Nearly half (48 percent) of the that we are only beginning to realize the ■ offenders were other youth, and one- extent of the complex and increasingly Receives reports of offenses such fourth of the aggressive episodes were ini- prevalent phenomenon of Internet-based as child pornography, child sex tiated by females. Further, 77 percent of crimes against children. We have much tourism, online enticement of targeted youth were age 14 or older—not to learn about the magnitude of the children for sexual acts, and child

4 Internet Crimes Against Children

sexual molestation (outside the fam- work on child victimization issues. You justice system, the child victim, and the ily). Analysts review each report and can obtain more information on this and family in terms of resources, travel, and provide information to investigating other law enforcement programs from the court appearances. law enforcement agencies. OJJDP Web site at ojjdp.ncjrs.org/ programs/programs.html. Challenges ■ Provides leads on child exploitation Child victimization on the Internet is cases to appropriate law enforcement Federal Bureau of Investigation a complex matter. The full impact of such authorities and agencies. The FBI has established the Innocent victimization on children is not com- Images program to focus specifically pletely understood. Family dynamics NCMEC case managers work directly on computer-facilitated child sexual often play a significant role in children’s with law enforcement personnel, offering exploitation. Each FBI Field Division has denial of a crime and their willingness to technical assistance, resources, informa- designated two Crimes Against Children participate in the investigation and prose- tion, and advice on child sexual exploita- Coordinators to work with state and local cution. A child’s ability to acknowledge tion. NCMEC also has developed law enforcement officials to investigate and accept the crime can be linked to specialized training programs, materials, and prosecute cases that cross jurisdic- family values, peer pressure, and feelings and curricula designed for law enforce- tional boundaries. OVC has placed a vic- of guilt, shame, and embarrassment. ment personnel. Training is available at tim witness coordinator in the Innocent Denial and recantation can be common little or no cost to local jurisdictions Images program to focus greater attention among children who unwittingly partici- through OJJDP. For more information on on the needs of child victims. pated in the crime. Because of these current programs, call 1–800–843–5678. issues, the greatest challenges facing law Internet Crimes Against U.S. Postal Inspection Service enforcement and victim service profes- Children Task Force Program The U.S. Postal Inspection Service sionals are to identify the victims, protect protects children online by monitoring their privacy, and serve them without fur- In 1998, the Missing Children’s the transmission of child pornography ther victimization. Program of OJJDP initiated its Internet through the mail. Increased amounts of Crimes Against Children (ICAC) task Until more knowledge is gathered about pornography are being sent through U.S. force program, a national effort to combat Internet crime and its effects on victims, mail as more illicit Web sites emerge the threat of offenders who use the law enforcement and victim service pro- advertising child pornographic material Internet to sexually exploit children. fessionals will continue working on for sale. In response, the U.S. Postal Through this program, state and local law Internet child exploitation using the tac- Inspection Service is tracking down these enforcement agencies can acquire the tics and standard approaches that have materials. In addition, the U.S. Customs skills, equipment, and personnel resources proved effective for working with other Service Cyber Smuggling Center moni- to respond effectively to ICAC offenses. types of child victims. These tactics and tors the illegal generation, importation, The program encourages law enforcement approaches are discussed below. and proliferation of child pornography. agencies to develop specialized multijuris- dictional, multiagency responses to pre- For Children vent, interdict, investigate, and prosecute ■ Ensure that the interview is con- Internet crimes against children. As of The Future ducted with developmentally appro- mid-2000, 30 ICAC task forces were par- he future holds many challenges for priate language. A child’s ability to ticipating in the ICAC task force pro- those fighting Internet crimes relate to concepts and receive mes- gram. Each task force is composed of against young people. Cases involv- sages varies depending on his or her federal, state, and local law enforcement T stage of development. The inter- ing Internet crimes against children are personnel; federal and local prosecution complex and labor intensive for both the viewer must assess the child’s devel- officials; local educators; and service police and prosecutors. The time between opmental level and adapt the providers such as mental health profes- victimization and arrest can be lengthy. interview accordingly. sionals. These task forces serve as valu- These cases are usually multijurisdiction- ■ able regional resources for assistance al, which presents challenges in the Ensure that the interview is con- to parents, educators, prosecutors, law investigation and prosecution of a case ducted in a culturally sensitive enforcement personnel, and others who and can present problems for the criminal manner with culturally appropriate 5 OVC Bulletin

language. Determine which words control over the situation—provide Notes the child is comfortable with. Is an choices, no matter how small, and interpreter needed? If so, use a pro- help him or her prepare for the court 1. Falling Through the Net: Defining the fessional interpreter and not a family process. Consider requesting a Digital Divide, July 8, 1999, National member. Family members inadver- guardian ad litem to represent and Telecommunications and Information tently may interject their interpreta- support the child throughout the Administration, U.S. Department of tions into the translation and may legal process. Make the child famil- Commerce. prejudice the child’s account. iar with the courtroom environment. A properly prepared child may find 2. Statistics, ProtectKids.org, ■ Be patient with victims. At first, active involvement in the case www.protectkids.org/statistics.htm. many victims will deny their in- empowering. volvement. However, with contin- 3. Magid, Lawrence, 1992, Child Safety on ued support and encouragement, the For the Family the Information Highway (pamphlet), child victim usually will divulge and ■ Internet crimes against children National Center for Missing & Exploited discuss the victimization. impact the entire family. Family Children. members may feel guilty for not pro- ■ 4. Finkelhor, David, Kimberly J. Mitchell, Avoid duplicative interviews when tecting their child more effectively. and Janis Wolak, 2000, Online Victim- possible. Multiple interviewers and They also may feel anger or shame ization: A Report on the Nation’s Youth, interviews tend to confuse and about their child’s involvement in National Center for Missing & Exploited intimidate children, especially the crime. Family members are sec- Children: Arlington, VA. younger ones, and may revictimize ondary victims and need to be the child and produce inconsistent offered support and information to 5. Ibid. victim statements. Joint or taped help them understand the nature interviews minimize the number of of these crimes and know how to 6. A traveler case is when an adult travels interviews required and maintain better handle their often conflicting to meet and have sex with a youth he or consistent phrasing of questions. feelings. she met on the Internet. ■ If the victim is from another juris- ■ Assist families victimized by Internet 7. Turman, K.M., and K.L. Poyer, 1998, diction, work with victim witness crime who require travel and lodging Child Victims and Witnesses: A Handbook staff in that community to ensure arrangements related to the legal for Criminal Justice Professionals, Office that victim services are provided. proceedings, such as depositions for Victims of Crime, U.S. Department and hearings. ■ Do not show surprise or shock. of Justice: Washington, DC. Remember, the youth is probably ■ Prepare the family for media and already feeling guilt, shame, or press coverage. Be sensitive to the For Further embarrassment about what occurred. privacy needs of the victim and fam- ily. Will the victim’s name appear in Information ■ Be honest with the child about what any public documents? If so, can he or she can expect from the inves- NCJRS Publications these documents be sealed if the tigation and prosecution of the case family so desires? The following publications are avail- and about any future contact he or able to professionals who work with child she may have with the perpetrator. ■ Help the family understand what victims and child witnesses. To obtain their child is experiencing so they copies free of charge from the National ■ Talk to the child victim about a vic- can help the child and feel some Criminal Justice Reference Service tim impact statement and restitution sense of control over the situation.7 (NCJRS), call 1–800–851–3420 or log if the case will be prosecuted and if on to www.puborder.ncjrs.org. it is developmentally appropriate. Regardless of the child’s age, find ways to give him or her a sense of

6 Internet Crimes Against Children

A Parent’s Guide to Internet Safety (pam- NCMEC Publications CyberTipline: Your Resource for Reporting phlet). 1998. Washington, DC: Federal the Sexual Exploitation of Children. To obtain free single copies of the fol- Bureau of Investigation, U.S. Department National Center for Missing & Exploited lowing publications, call the National of Justice. (See full text online at Children. (NCMEC order #13.) Center for Missing & Exploited Children www.fbi.gov/library; also published in at 1–800–THELOST (1–800–843–5678) Compiler Vol. 19(1), Summer 1999, pp. Finkelhor, David, Kimberly J. Mitchell, or make your request online at 14–17.) and Janis Wolak. Online Victimization: www.missingkids.org. There may be a A Report on the Nation’s Youth. 2000. Child Sexual Exploitation: Improving charge for additional copies. National Center for Missing & Exploited Investigations and Protecting Victims: A Children. (NCMEC order #62. First copy A Guide for Internet Service Providers To Blueprint for Action. 1995. Washington, free; each additional copy, $3.) Assist Law Enforcement in Combating Child DC: Office of Juvenile Justice and Exploitation (Fact Sheet). 1998. National Delinquency Prevention and Office for Additional Reading Center for Missing & Exploited Children. Victims of Crime, U.S. Department of Guidelines intended to show how Armagh, Daniel. “A Safety Net for the Justice. Internet service providers (ISPs) can Internet: Protecting Our Children.” Juvenile Justice 5(1) 1998, pp. 9–15. Federal Resources on Missing and Exploited assist law enforcement in reducing child Washington, DC: Office of Juvenile Children: A Directory for Law Enforcement victimization in cyberspace. (NCMEC Justice and Delinquency Prevention, and Other Public and Private Agencies. order #58.) U.S. Department of Justice. 1997. Washington, DC: Federal Agency Magid, Lawrence. Teen Safety on the Task Force for Missing and Exploited Information Highway (pamphlet). 1998. Child Sexual Exploitation: Improving Children, Office of Juvenile Justice National Center for Missing & Exploited Investigations and Protecting Victims: A and Delinquency Prevention, U.S. Children. Safety tip for families whose Blueprint for Action. 1995. Washington, Department of Justice. teenagers use computer online services. DC: Office of Juvenile Justice and Delinquency Prevention and Office for Lanning, Kenneth A. “Cyber (English version, NCMEC order #57. Victims of Crime, U.S. Department ‘Pedophiles’: A Behavioral Perspective.” Spanish version, NCMEC order #59. First of Justice. The APSAC Advisor. Special Issue: 50 copies free; each additional copy, 10¢.) Children and the Internet. Newton, MA: ——. Child Safety on the Information National Crime Prevention Council. American Professional Society on the Highway (pamphlet). 1992. National Cybersafe Kids: A Parents’ Guide (pam- Abuse of Children. Vol. 11(4), Center for Missing & Exploited Children. phlet). 1999. Washington, DC: Bureau of Winter 1998. Safety tips for families whose elementary Justice Assistance, U.S. Department of Justice. (Available online at Saywitz, Karen J., and Kathleen Coulborn school-aged children use computer online www.ncpc.org/10adu12.htm.) Faller. Interviewing Child Witnesses and services. (English version, NCMEC order #03. Spanish version, NCMEC order #06. Victims of Sexual Abuse (Portable Guide). What’s My Job in Court? An Answer and First 50 copies free; each additional copy, 1996. Washington, DC: Office of Activity Book for Kids Who Are Going to 10¢.) Juvenile Justice and Delinquency Court. 1998. Washington, DC: Victim Prevention, U.S. Department of Justice. Cyberspace Strategy. 1998. National Witness Assistance Unit, U.S. Attorney’s Office for the District of Columbia, U.S. Turman, K.M., and K.L. Poyer. Child Center for Missing & Exploited Children. Department of Justice. Request copies of Victims and Witnesses: A Handbook for An issue brief that sets forth NCMEC’s this book by calling 202–514–7130. Criminal Justice Professionals. 1998. strategy to keep children safe on the information highway. Washington, DC: Office for Victims of Whitcomb, D., and J. Eastin. Joining Crime, U.S. Department of Justice. Forces Against Child Sexual Exploitation: Models for a Multijurisdictional Team Approach. 1998. Washington, DC: Office for Victims of Crime, U.S. Department of Justice.

7 OVC Bulletin

Organizations Preparation of this document was For more information, contact the supported by the Office for Victims of following organizations: Acknowledgments Crime, Office of Justice Programs, U.S. Department of Justice. The opinions, find- Office for Victims of Crime OVC gratefully acknowledges Helen ings, conclusions, and recommendations U.S. Department of Justice Connelly, an independent consult- expressed in this document are those of 810 Seventh Street NW., Eighth Floor ant, who conducted the original the author and do not necessarily repre- Washington, DC 20531 research for this project. Ms. sent the official position or policies of the U.S. Department of Justice. Phone: 202–616–3575 Connelly identified and interviewed Fax: 202–514–6383 many of the key sources used in this The Office for Victims of Crime is a com- World Wide Web: www.ojp.usdoj.gov/ovc/ Bulletin. OVC also gratefully ponent of the Office of Justice Programs, acknowledges the National Center which also includes the Bureau of Justice Office for Victims of Crime Resource for Missing & Exploited Children for Assistance, the Bureau of Justice Statistics, Center (OVCRC) its generous help. In particular, OVC the National Institute of Justice, and the P.O. Box 6000 thanks John Rabun for his comments Office of Juvenile Justice and Delinquency Prevention. Rockville, MD 20849–6000 and suggestions during the review Phone: 1–800–627–6872 or process and for helping OVC get This document was originally published in 301–519–5500 timely access to Dr. David Finkelhor’s May 2001 and reprinted in December (TTY 1–877–712–9279) study findings for inclusion in this 2001. World Wide Web: www.ncjrs.org Bulletin. E-mail: [email protected]

National Center for Missing & Exploited Children (NCMEC) Charles B. Wang International Children’s Building 699 Prince Street Alexandria, VA 22314–3175 Phone: 703–274–3900 Fax: 703–274–2222 World Wide Web: www.missingkids.org

NCJ 184931

U.S. Department of Justice PRESORTED STANDARD Office of Justice Programs POSTAGE & FEES PAID Office for Victims of Crime DOJ/OVC PERMIT NO. GÐ91 Washington, DC 20531

Official Business Penalty for Private Use $300