<<

Quick Reference ChildChild SexualSexual ExploitationExploitation For Healthcare, Social Services, and Law Enforcement Professionals

G.W. Medical Publishing, Inc. St. Louis www.gwmedical.com i CONTENTS IN BRIEF CHAPTER 1: OVERVIEW...... 1

CHAPTER 2: VICTIMS AND OFFENDERS ...... 17

CHAPTER 3: ...... 45

CHAPTER 4: OF CHILDREN ...... 57

CHAPTER 5: CYBER-ENTICEMENT AND INTERNET TRAVELERS ...... 69

CHAPTER 6: AND ...... 85

CHAPTER 7: MEDICAL ISSUES ...... 109

CHAPTER 8: PRINCIPLES OF INVESTIGATION ...... 159

CHAPTER 9: INVESTIGATING ...... 173

CHAPTER 10: INVESTIGATING THE PROSTITUTION OF CHILDREN . . . . 195

CHAPTER 11: INVESTIGATING CYBER-ENTICEMENT ...... 199

CHAPTER 12: LEGAL ISSUES SPECIFIC TO PORNOGRAPHY CASES . . . . . 227

CHAPTER 13: LEGAL CONSIDERATIONS IN PROSTITUTION CASES . . . . 237

CHAPTER 14: LEGAL APPROACHES TO INTERNET CASES ...... 247

CHAPTER 15: SUPPORT SERVICES FOR PROSTITUTED CHILDREN . . . . . 271

CHAPTER 16: AMBER ALERT...... 291

CHAPTER 17: FAITH-BASED AND RURAL COMMUNITIES...... 297

CHAPTER 18: RECOMMENDED ACTIONS ...... 305

INDEX ...... 319

iii Quick Reference ChildChild SexualSexual ExploitationExploitation For Healthcare, Social Services, and Law Enforcement Professionals

Sharon W. Cooper, MD, FAAP Angelo P. Giardino, MD, PhD, MPH, FAAP Adjunct Associate Professor of Pediatrics Medical Director University of North Carolina School Texas Children’s Health Plan of Medicine Associate Clinical Professor of Pediatrics Chapel Hill, North Carolina Baylor College of Medicine Clinical Assistant Professor of Pediatrics Attending Physician Uniformed Services University of Children’s Assessment Center Health Sciences Texas Children’s Hospital Bethesda, Maryland Houston, Texas Chief, Developmental & Forensic Pediatric Nancy D. Kellogg, MD Service, Womack Army Medical Center Professor of Pediatrics Fort Bragg, North Carolina University of Texas Health Science Center at Instructor, National Center for Missing & San Antonio Exploited Children Medical Director Alexandria, Virginia Childsafe Richard J. Estes, DSW, ACSW Medical Director Professor Christus Santa Rosa Center for Miracles Chair, Concentration in Social and Victor I. Vieth, JD Economic Development Director Director, International Programs NDAA’s Child Abuse Programs University of Pennsylvania School of National Child Protection Training Center Social Work Winona State University Philadelphia, Pennsylvania Winona, Minnesota

G.W. Medical Publishing, Inc. St. Louis www.gwmedical.com v FOREWORD In my career as a prosecutor, and now as a congressman, I have seen tremendous improvements in our nation’s response to cases of child maltreatment. In most communities today, multidisciplinary teams work together for the best interests of children. Many elected district attorneys, sheriffs, and police chiefs have developed specialized units to respond to cases of child abuse. Perhaps the most important development is the Children’s Advocacy Center program. Children’s Advocacy Centers (CACs) are child- friendly facilities where children can be interviewed sensitively and receive medical and psychological services. As a district attorney, I had the privilege of starting the nation’s first CAC. As a member of Congress, I championed support for my National Children’s Advocacy Center in Huntsville, Alabama, and also for the National Children’s Alliance, a coalition of CACs from across the nation that is head- quartered in Washington, DC. Today there are hundreds of CACs in every part of our country. Through the work of many organizations and training centers, thousands of frontline professionals are trained annually in the art and science of handling child protection cases. In the specific area of child sexual exploitation, this quick reference will provide them a wealth of information that can be accessed from any location. We cannot, however, rest on our laurels. Commercial exploitation of children is a global problem that impacts every community in the , and there is some evidence to suggest that these children are just as likely to come from rural and suburban communities as urban centers. Additionally, modern technology poses a new threat to our children. It is increasingly easy for perpetrators to exploit children through the Internet, to create and disseminate child pornography, and to solicit children for illicit purposes. I want to commend the frontline investigators, prosecutors, medical and mental health professionals, and other child advocates who are in

xi Foreword the trenches daily trying to spare children from every form of exploita- tion. It is for them that this book is written. You labor long hours for little pay or honor on behalf of someone else’s children. Please know that your selfless dedication is not unnoticed. Indeed, your heroism is an inspiration to us all.

Congressman Robert E. “Bud” Cramer, Jr. Member of the US House of Representatives (1999-present) Founder of the Children’s Advocacy Center movement

xii FOREWORD It is common to hear pronouncements from public figures that children are society’s most important and treasured assets. To an overwhelming majority, this concept is fundamentally true. To a marginal and deviant minority, however, children are viewed as a commodity to be traded, imported, and exported like any other piece of merchandise. Parents and professionals need help combating the alarming growth of child exploitation, and this book is a valuable tool in the fight to protect our children from predators who would use them for financial gain or prurient reasons. The information in Child Sexual Exploitation Quick Reference was contributed by individuals who represent a wide array of backgrounds, disciplines, and perspectives. Some speak from distant lands that are growing ever closer with the ease of air travel and where youths are being sold to travelers seeking to indulge their perverse needs with someone else’s children. Some voices are actually electronic particles from cyberspace delivering images of unspeakable abuse to our home and office computers. The 2-volume set from which this quick reference is derived is the most comprehensive text on this subject that I have seen, and it represents the efforts of an impressive collection of premier investi- gators, judicial participants, child protection agency personnel, and clinicians. This quick reference maintains the same quality of research and is invaluable for frontline professionals who deal with the victims and perpetrators of child sexual exploitation.

Robert M. Reece, MD Clinical Professor of Pediatrics Tufts University School of Medicine Visiting Professor of Pediatrics Dartmouth Medical School Editor, The Quarterly Update

xiii PREFACE When the concept of mass communication began with Gutenberg’s printing press in the 14th century, its purpose was to disperse informa- tion and promote new ideas. Seven centuries later, the Internet has expanded upon the original purpose of the printing press and now threatens the deception and entrapment of our most vulnerable resource: children. As methods of victimization have become more innovative, sophisticated, and elusive, professionals are challenged in their efforts to prevent, detect, intervene, and treat children that fall victim to online predators. Knowledge of Internet crimes against children has been primarily limited to media coverage of the topic. This text serves to separate fact from fiction and to dispel several myths and misconceptions, including the belief that prostituted youths typically market themselves by choice and can easily escape from this form of abuse. To the uninformed, it is inconceivable that children and youths are often sold from within their own homes, that the Internet is used in numerous capacities to make such arrangements, and that Internet cafés present a nearly untraceable means of making the deal. Online solicitation has become an increasing threat to children. Many naïve children and youths unwittingly receive unwanted sexual solicitations and may be enticed to leave their homes and families to meet online predators; such encounters may end tragically in sexual or physical assault, abduction, or murder. Images of abuse can now be taken and disseminated with Web cameras, mobile/cellular phones, and video iPods. What was slavery and in the past has now become human trafficking for forced labor and sexual exploitation. These crimes continue to escalate worldwide. Investigations of high profile cases of sexual exploitation have resulted in an organized response to sex tourists, child pornographers, and pimps of prostituted children. Guidelines on how to identify and respond to sexual exploitation situations are listed clearly in this quick reference for law enforcement, medical, and social science professionals who work with victims and offenders directly.

xv Preface

From a child maltreatment perspective, this groundbreaking work provides comprehensive and diverse information on this contem- porary, yet daunting and misunderstood, form of child abuse. As the Internet, the “printing press” of the 21st century, has opened new doors for the worldwide exchange of information and ideas, so too has it opened a Pandora’s box of opportunities for criminals who victimize children and youths. At present, the knowledge of Internet crimes against children is fragmented, scant, and discipline specific. This text is a step toward comprehension, effective intervention, and the multidisciplinary coordination of frontline investigations of crimes involving exploited children. It will open your eyes and your mind to a new dark side of child abuse that we can no longer afford to ignore.

Sharon W. Cooper, MD, FAAP Richard J. Estes, DSW, ACSW Angelo P. Giardino, MD, PhD, MPH, FAAP Nancy D. Kellogg, MD Victor I. Vieth, JD

xvi CONTENTS IN DETAIL CHAPTER 1: OVERVIEW Physical Abuse ...... 1 ...... 3 Social Influences ...... 3 Definitions ...... 4 Victims...... 5 Offenders ...... 8 Forms of Child Sexual Exploitation ...... 8 Pornography ...... 9 Prostitution ...... 10 Other ...... 10 Factors Influencing Child Sexual Exploitation ...... 10 Consequences of Child Sexual Exploitation...... 11 For the Child/Adolescent ...... 11 For Society...... 11 References ...... 12 CHAPTER 2: VICTIMS AND OFFENDERS Victims ...... 17 Targeted Characteristics of Children/Adolescents ...... 18 Protective Traits ...... 19 Effects of Childhood Sexual Abuse ...... 20 Effects of Prostitution ...... 20 Consequences of Pornography ...... 20 Effects of Trauma on Adult Survivors of Child Sexual Exploitation ...... 21 Childhood Sexual Abuse and Later Prostitution ...... 24

xvii Contents in Detail

Offenders ...... 24 ...... 25 ...... 27 General Information ...... 27 Common Characteristics of Pedophiles ...... 29 Other Paraphilias ...... 31 (Bestiality) ...... 31 Fetishism ...... 31 Urophilia, , and ...... 32 Sadism and Hyperdominance ...... 32 Picquerism ...... 33 ...... 33 Recruitment Process ...... 33 Grooming ...... 34 Types of Exploitation ...... 35 In the Home ...... 35 Not in the Home...... 35 On the Internet (Pornography)...... 36 Trafficking ...... 37 References ...... 39

CHAPTER 3: CHILD PORNOGRAPHY Background...... 45 Definitions ...... 46 Range of Images ...... 47 Speech Issues ...... 48 Forms and Uses ...... 49 Process ...... 52 Effects...... 53 On Users of Pornography ...... 53 Damage to Children...... 55 References ...... 55 xviii Contents in Detail

CHAPTER 4: PROSTITUTION OF CHILDREN Definitions ...... 58 Risk Factors...... 59 Attitudes and Beliefs...... 59 Environmental Factors...... 59 Victim Issues ...... 60 Infantilization of Prostitution ...... 61 Effects...... 61 Consequences of Sexual Exploitation ...... 61 Consequences of Dating Violence ...... 62 Interactions With Social Services and Healthcare Professionals ...... 63 Interventions ...... 64 References ...... 65 CHAPTER 5: CYBER-ENTICEMENT AND INTERNET TRAVELERS Background Information ...... 69 Scope ...... 71 Definitions ...... 72 Risk Factors...... 74 Internet Components Used for Sexually Deviant and Illegal Activity ...... 76 Newsgroups ...... 76 E-Mail...... 77 Web Sites ...... 77 Chat Rooms ...... 77 Web Cameras, Mobile Phone Technology, and Social Networking Sites ...... 77 Process ...... 78 Locating Children to Molest...... 78 Internet’s Role in the Etiology of Child Sexual Abuse . . . . 78 Image Analysis...... 78 References ...... 80

xix Contents in Detail

CHAPTER 6: SEX TOURISM AND HUMAN TRAFFICKING Definitions ...... 85 Background Information ...... 86 Offenders ...... 87 Risk Factors...... 88 Victim Characteristics ...... 88 Environmental Influences ...... 88 Nigeria ...... 88 ...... 89 United States and ...... 90 Process ...... 90 Investigation ...... 94 Legal Status ...... 95 Interpol ...... 95 Legal Results for Offenders...... 101 Legal Results for Victims ...... 101 How to Obtain Help ...... 103 Steps to Take ...... 103 End , Child Pornography and for Sexual Purposes (ECPAT) Campaign . . . 104 References ...... 106 CHAPTER 7: MEDICAL ISSUES Principles of Care for Victims and Suspected Offenders . . . . 109 Obtaining History...... 109 Assessment ...... 110 Clinical Approach ...... 117 Assessing for Nongenital Injuries ...... 117 Assessing for Genital and Anal Injuries ...... 121 Documenting Injuries ...... 125 Diagnostic Testing ...... 128 STDs ...... 128 ...... 131 Substance Abuse Screening/Testing/Monitoring . . . . 131 Additional Laboratory Testing ...... 131 xx Contents in Detail

DNA Evidence Processing and Analysis ...... 131 Methods of DNA Analysis ...... 131 DNA Profiles Obtained...... 132 Collection and Storage of Specimens ...... 132 Treatment ...... 132 Follow-Up ...... 132 Normal Anatomy ...... 135 Normal Genitalia...... 136 Boys...... 136 Girls ...... 137 Differential Diagnosis of Genital Trauma ...... 139 Determining Age in Child Pornography ...... 141 Musculoskeletal Development ...... 141 Dental Maturation ...... 142 Assessment of a Child’s Ethnicity...... 142 Assessing Toddler Pornography...... 143 Sexual Maturation ...... 144 Injuries Specific to the Sexual Exploitation of Children . . . . 145 Diagnosing ...... 145 Diagnosing Physical Injuries ...... 145 Management ...... 147 Acute Visible Injuries...... 147 Acute Internal Injuries ...... 148 To Reproductive Organs ...... 148 To Bony Pelvis ...... 148 Psychiatric Emergencies ...... 149 Sadistic Abuse of Infants/Toddlers ...... 149 Forensic Evidence Collection ...... 150 Assessments...... 150 Standards and Guidelines ...... 151 Measures Used ...... 151 References ...... 154 CHAPTER 8: PRINCIPLES OF INVESTIGATION Preliminary Investigation by First Responders ...... 159

xxi Contents in Detail

Subsequent Investigative Process ...... 161 Preparation...... 161 Character Traits of Investigators ...... 162 Investigative Goals ...... 162 Physical Evidence ...... 163 The Interview Process ...... 165 The Victim ...... 165 The Suspect...... 166 When Investigations Fail ...... 168 Investigative Agencies ...... 169 US Postal Inspection Service ...... 169 Exploited Child Unit ...... 169 Law Enforcement Partnerships ...... 172 Reference ...... 172 CHAPTER 9: INVESTIGATING CHILD PORNOGRAPHY Medical Analysis in Pornography ...... 173 Victim Identification Analysis...... 173 Gender ...... 174 Ethnicity ...... 175 Age...... 177 Evidence...... 179 Proper Handling ...... 179 Eliminate the Risk of Possible Courtroom Confusion or Exclusion of Evidence ...... 179 Eliminate the Risk of Further Exploitation of the Victim 185 Receipt of Evidence ...... 185 Receipt of Photographs and Videos ...... 186 Receipt of Computer-Based Evidence...... 186 The Prosecutorial Remedies and Other Tools to end the Exploitation of Children Today (PROTECT) Act . . . 187 Videotape Evidence ...... 188 Inserted Pornographic Vignettes ...... 189 Unusual Angles Shown in the Video ...... 189 Partial Image of a Perpetrator ...... 189 xxii Contents in Detail

Multiple Subjects in a Video ...... 190 Information About Child Seduction ...... 191 Shown on a Videotape ...... 191 Photographs and Published Materials as Evidence . . . . . 191 Written Child Pornography ...... 193 Child Images ...... 193 Role of Postal Inspectors ...... 194 References ...... 194 CHAPTER 10: INVESTIGATING THE PROSTITUTION OF CHILDREN Gathering Evidence ...... 195 Investigative Approaches...... 196 Victim Interviews ...... 196 Coordination of Efforts ...... 198 Search and Seizure of Computer Evidence...... 198 Disposition of Suspects and Victims ...... 198 References ...... 198 CHAPTER 11: INVESTIGATING CYBER-ENTICEMENT Principles of Investigation ...... 199 The Investigative Process ...... 200 Identifying Suspects and Potential Internet Crime Areas . . . 200 Investigative Task Force ...... 200 Purpose and Members ...... 200 Locating Evidence ...... 204 World Wide Web ...... 205 Structure ...... 205 Hypertext Transfer Protocol ...... 205 Problems Investigators Confront ...... 206 Information Helpful to Investigators ...... 206 Internet Relay Chat ...... 207 Electronic Mail ...... 208 Usenet Newsgroups ...... 209 File Transfer Protocol ...... 210

xxiii Contents in Detail

Web-Based Chat (WBC) ...... 210 Messengers ...... 211 Peer-to-Peer Networks ...... 211 Online Service Providers (OSPs)...... 212 Internet Protocol Address Tracing ...... 213 Importance of Time ...... 213 Other Technical Challenges ...... 214 Undercover Technique...... 215 Other Investigative Tools ...... 216 Hotlines ...... 217 References ...... 218 Appendix 26-1: Glossary of Internet-Related Terms . . . . . 218 CHAPTER 12: LEGAL ISSUES SPECIFIC TO PORNOGRAPHY CASES Regulating Child Pornography ...... 227 Compelling State Interests ...... 227 Narrow Definition ...... 228 Legal Issues Specific to Computer Evidence ...... 229 Medical Expert Testimony...... 229 Types of Expert Witness Testimony ...... 230 Elements of Testimony ...... 231 Summary Opinion ...... 232 References ...... 232 CHAPTER 13: LEGAL CONSIDERATIONS IN PROSTITUTION CASES Laws and Penalties...... 237 Trial Considerations...... 238 Charging and Pretrial Decisions ...... 238 Jury Selection ...... 239 Opening Statement ...... 240 Case in Chief...... 240 Closing Argument ...... 242 Sentencing ...... 242 xxiv Contents in Detail

Juvenile Court Issues ...... 243 International Resources for Child Sex Tourism Cases . . . . . 245 References ...... 246 CHAPTER 14: LEGAL APPROACHES TO INTERNET CASES Search and Seizure Issues ...... 247 Search Warrants ...... 247 Background Information ...... 247 Probable Cause ...... 248 Drafting the Warrant ...... 248 Expert Opinion ...... 249 Additional Considerations in Describing Items to Be Seized ...... 249 Particularity ...... 250 Anticipatory Warrants ...... 251 Good Faith...... 251 Staleness ...... 252 Exceptions to Warrant Requirement ...... 252 Plain View Exception ...... 252 Consent Exception ...... 252 Exigent Circumstances Exception...... 253 Private Searches ...... 254 Probation and Parole Searches ...... 254 Charging and Pretrial Considerations ...... 254 Defining Child Pornography ...... 254 Proving Scienter ...... 255 Statutes of Limitation Issues ...... 255 Jurisdiction...... 255 Number of Counts and Images to Charge ...... 255 Additional and/or Alternative Charges...... 256 Victim Issues ...... 256 Discovery Issues ...... 256 Authentication of Recovered Data for Accuracy ...... 256 Computer Evidence ...... 256 The Recovery Process ...... 257

xxv Contents in Detail

Challenges to Foundation Must Have Foundation . . . . 257 Validation of Computer Forensic Tools...... 258 Daubert/Frye Standard ...... 258 Computer Forensics as an Automated Process...... 258 Expert Witness Testimony ...... 259 Direct Examination ...... 260 Pretrial Evidentiary Hearing ...... 260 Presentation of Computer Evidence ...... 260 Best Evidence Rule ...... 261 “Original” Electronic Evidence ...... 261 EnCase Tools ...... 262 Evidence File Format ...... 262 Chain-of-Custody Documentation ...... 263 Jury Selection ...... 263 The Underlying Crime ...... 264 Computers and Computer Evidence ...... 264 Government Regulation of the Internet ...... 265 Diffusing Potential Defenses ...... 265 Meeting Untrue Defenses ...... 266 Mistaken Identity ...... 266 Defeating Hacker/Intrusion Defenses ...... 267 Proof of Real Versus Computer-Generated Images and Age Issues ...... 267 Lack of Intent ...... 268 Internet Addiction ...... 269 Accident ...... 269 Deleted Computer Images ...... 269 Mere Viewing ...... 269 First Amendment ...... 269 References ...... 270 CHAPTER 15: SUPPORT SERVICES FOR PROSTITUTED CHILDREN Scope of the Problem ...... 271 Barriers to Leaving Prostitution ...... 272 xxvi Contents in Detail

Exiting the Sex Trade Lifestyle ...... 272 Successful Exiting and Healing ...... 273 Stages of Exiting and Healing Groups ...... 273 Governmental Programs...... 274 Healthcare Settings ...... 275 Ambulatory Care Clinics...... 275 Emergency Care Facilities ...... 276 Mental Health Clinics ...... 276 Juvenile Detention Facilities ...... 276 Initial Assessment of Victim ...... 277 Psychiatric Assessment ...... 277 Major Depressive Disorders and Posttraumatic Stress Disorder ...... 277 Developmental, Behavioral, and Emotional Assessment . . 278 Attention-Deficit/Hyperactivity Disorder ...... 278 Conduct Disorder...... 279 Intermediate and Long-Term Community and Mental Health Support ...... 279 Goals of Long-Term Therapy ...... 280 Special Issues for Boys ...... 283 Safety Issues ...... 284 Specific Therapeutic Approaches ...... 284 Visual Cues...... 284 Family History and Family Genograms ...... 284 Long-Term Prognosis ...... 284 Screening Programs ...... 286 Safety Planning ...... 287 Principles of Good Practice ...... 287 References ...... 288 CHAPTER 16: AMBER ALERT Role of National AMBER Alert Coordinator ...... 292 Abduction of Infants ...... 293 Strategy for AMBER Coordination ...... 293 Child Lure Prevention ...... 294

xxvii Attempted Nonfamily Abductions...... 295 National Incidence Study of Missing, Abducted, , and Thrownaway Children in America...... 295 References ...... 296 CHAPTER 17: FAITH-BASED AND RURAL COMMUNITIES Faith-Based Communities...... 297 Areas of Conflict...... 297 The Cost...... 299 Recommendations ...... 299 Rural Communities ...... 302 Approaches...... 302 References ...... 303 CHAPTER 18: RECOMMENDED ACTIONS Advertising and Media Influences ...... 305 Children’s Advertising Review Unit ...... 306 Let Kids Be Kids...... 307 Dads and Daughters ...... 308 Pediatricians ...... 308 Reintegration ...... 311 International Conventions/Protocols ...... 312 Preventive Measures ...... 312 Foster Care Issues ...... 312 Measures to Reduce Child Abuse Incidence ...... 312 Measures to Reduce Child ...... 314 Recommendations for Rehabilitation Programs ...... 314 Recommendations for Evaluating and Treating Internet- Related Sex Offenders ...... 315 References ...... 316 INDEX ...... 319 Quick Reference ChildChild SexualSexual ExploitationExploitation For Healthcare, Social Services, and Law Enforcement Professionals

G.W. Medical Publishing, Inc. St. Louis www.gwmedical.com xxix 1 Chapter

OVERVIEW Sharon W. Cooper, MD, FAAP Richard J. Estes, DSW, ACSW V. Denise Everett, MD, FAAP Marcia E. Herman-Giddens, PA, DrPH Aaron Kipnis, PhD Mary Anne Layden, PhD Ingrid Leth, Former Senior Adviser, UNICEF Linnea W. Smith, MD Neil Alan Weiner, PhD

PHYSICAL ABUSE — Reports of child abuse and neglect in the United States have risen steadily (Sedlak & Broadhurst, 1996) and have doubled in the latter half of the 1990s. — Over 1 million children suffer moderate injuries each year; about 160 000 are severely injured; and over 1000 die from parental abuse or neglect. — 1 in 50 US children is physically abused (US Dept of Health & Human Services [USDHHS], 1993). — Almost 80% of perpetrators are parents; other relatives account for an additional 10%. — The average age of abused children is 7 years; the average age of abusers is 31 years. — Most of the children who are murdered, seriously injured, physi- cally abused, or medically neglected are boys, especially boys with disabilities (Sobsey et al, 1997).

1 Child Sexual Exploitation: Quick Reference

— Rates of maltreatment: 1. Are lowest among children who live with both biological parents (Blankenhorn, 1995). 2. Are slightly higher when divorced fathers have custody. 3. Are highest among children with single mothers, particularly when a nonbiological man lives in the house (Margolin, 1992). 4. Are almost 7 times higher among children whose families have an annual income less than $15 000, compared to children whose families have greater income levels. 5. Reflect greatest statistical risk of abuse or neglect for boys of single mothers who have young children and are living below level as well as children of alcoholic and drug-addicted parents of both genders (Horn, 1998). — Results of abuse: 1. Victims can experience academic, emotional, and economic failure (Burton et al, 1994). 2. Child victims tend to have early difficulty in school. 3. Abused boys are more likely to drink more, abuse more drugs, and suffer more juvenile arrests at earlier ages than nonabused boys (Cooley-Quille et al, 1995). 4. Abused boys are 3 times more likely to become aggressive and violent (Gilligan, 1996; Smith & Thornberry, 1995). 5. Boys’ violence toward abusive caregivers often leads to long-term incarceration. 6. In over 60% of all murders committed by teenaged boys, the victims are adult men or family members who are abusing them (Dawson & Langan, 1994). 7. Boys abused by mothers are more likely to abuse their spouses when adults. 8. Women abused by spouses are more at risk for abusing boys, completing the cycle of violence.

2 2 Chapter

VICTIMS AND OFFENDERS Det Sgt Joseph S. Bova Conti, BA Lt William D. Carson, MA, SPSC Peter I. Collins, MCA, MD, FRCP(C) Richard J. Estes, DSW, ACSW James A. H. Farrow, MD, FSAM Mary Anne Layden, PhD Ethel Quayle, BA, MSc, PsychD Linnea W. Smith, MD Max Taylor, PhD, C. Forensic Neil Alan Weiner, PhD

— Children may be recruited anywhere there is inadequate adult supervision (eg, malls, entertainment arcades, carnivals, tourist attrac- tions, concerts, and clubs). — Offenders groom and then seduce the child or adolescent with promises of wealth, luxury, designer clothing, expensive vehicles, or an exciting life. VICTIMS — Children are perfect victims: innocent, trusting, and easy prey for predators. — Vulnerability, lack of parental supervision and family involvement, and societal influences increase susceptibility. — Child sexual exploitation (CSE) victims are often silent or respond with feigned confidence when confronted. — Most CSE victims are forced into prostitution, drugs, or pornog- raphy (Table 2-1).

17 Child Sexual Exploitation: Quick Reference

Table 2-1. Underage Victim Terms: Lolita and

Lolita, in the parlance of child sexual exploitation, denotes a female who is, or appears to be, a . It functions as a code word alerting consumers of child pornography with underage females without otherwise drawing the attention of the public with explicit or graphic terms. This term was derived from the book of the same name by Vladimir Nabokov in which the adult character is sexually attracted to a 13-year-old girl named Lolita. Chickenhawk is a slang term for underage male victims of sexual exploitation.

TARGETED CHARACTERISTICS OF CHILDREN/ADOLESCENTS — Alone, troubled, desperate, and unsupervised — Prepubescent (Note that prepubescence varies because children develop and reach at different ages.) — Not in school but still want the money and material items of the peer group — Have older sister or other relative involved in prostitution — Have various associated factors, including intrafamilial prostitution and/or pornography production — Live with relative or friend because parents are seperated, divorced, or dead — Parents are drug addicts, alcoholics, or compulsive gamblers — Live in , with parents relying on them for income — Victims of sexual, physical, or emotional abuse — Homeless, runaways, street youths (Table 2-2) — Lacking the inner strength and aggressiveness to survive on the streets — Vulnerable to manipulation — Counterculture youths or those with a bad attitude (rebellious or sarcastic), though this can be unattractive to offenders

18 3 Chapter

CHILD PORNOGRAPHY Duncan T. Brown, Esq Peter I. Collins, MCA, MD, FRCP(C) Sharon W. Cooper, MD, FAAP Shyla R. Lefever, PhD Ethel Quayle, BA, MSc, PsychD Max Taylor, PhD, C. Forensic Psychology Bruce Watson, LLB, CA

BACKGROUND — Child pornography is a photographic record of child sexual abuse. Pornographic images of an actual child cannot be created without sex- ually exploiting and molesting the child. — Synthetic pornography involves computer-generated images that may combine a child’s face with an adult body or vice versa or may combine several children so images are not of a single identifiable child. — Pornography’s purpose is . 1. Used to lower children’s natural resistance to performing sexual acts. 2. Used as an instruction manual to teach children behaviors that are foreign to them. — Pornography is routinely described as the earliest and most con- sistent commercial success on the Internet. 1. Child pornography and pedophiliac activity are particularly dangerous to children when the materials and activities are online. 2. The combination of children’s natural innocence and sense of security makes them vulnerable to victimization (see Chapter 2, Victims and Offenders).

45 Child Pornography Chapter 3

Table 3-1. The COPINE Typology of Abusive Images of Children

LEVEL DESCRIPTION 1 Indicative (nonerotic/nonsexualized images) 2 Nudist (naked or semi-naked children in legitimate settings) 3 Erotica (surreptitious images showing underwear/nakedness) 4 Posing (deliberate posing suggesting sexual content) 5 Erotic posing (deliberate sexual provocative posing) 6 Explicit erotic posing (emphasis on genital area) 7 Explicit sexual activity not involving adult 8 Assault (involving adult) 9 Gross assault (penetrative assault involving adult) 10 Sadistic/bestiality (sexual images involving pain or animals)

Adapted from Taylor et al, 2001.

Table 3-2. The UK Court of Appeals Sentencing Guidelines Scale Derived From the COPINE Typology

LEVEL DESCRIPTION 1 COPINE levels 5 and 6 2 COPINE level 7 3 COPINE level 8 4 COPINE level 9 5 COPINE level 10

Adapted from Taylor et al, 2001.

RANGE OF IMAGES — Range lies along a continuum. — Range is expressed as a degree or level of victimization.

47 INDEX A AAP. See American Academy of Pediatrics Abuse. See Child abuse; Child sexual abuse detection, 62 images COPINE typology, 47t definition, 46 trading/collecting/producing, relationship, 36, 48f information, questions (usage), 112t-113t rates, 3 Abuse Assessment Screen, 286, 286t Accident, defense, 269 Accidental touching, 34 Acquaintance rape, 62 Acquired immunodeficiency syndrome (AIDS), risk, 60 , 26t Actions, recommendations, 305 Actus reus (criminal act) evidence, 163 Acute internal injuries, management, 148-149 Acute visible injuries, management, 147 ADHD. See Attention-deficit/hyperactivity disorder Adolescents anal penetration, history, 124 anal-penile penetration, 124f, 127f brain, development, 71 child sexual exploitation, consequences, 11 hymenal clefts, 127f lateral decubitus position, 124f long-term sexual activity, history, 127f prone knee-chest position, 124f, 127f protective traits, 19-20 substance abuse, CRAFFT screening test, 121t

319 Child Sexual Exploitation: Quick Reference

targeted characteristics, 18-19 victims, uncomplicated STDs (management), 133t, 134t Adult psychological disorders, 24t Adult survivors, trauma (effect), 21-24 Adults, mistrust, 272 Advertising influences, 305-311 African ancestry, facial characteristics, 176t Age identification/analysis, 177-179 issues, 267-268 Aggressive solicitations, definition, 72 AIDS. See Acquired immunodeficiency syndrome Alienation, definition, 58 AMBER Alert, 291 coordinator, role, 292-293 notification process, 291 AMBER coordination, strategy, 293-294 AMBER network, creation, 294 Ambulatory care clinics, 275 American Academy of Pediatrics (AAP), involvement, 308-311 American Association of Child and Adolescent Psychiatrists, recommendations, 308-311 American Registry of Internet Numbers (ARIN), 213, 218 Amphetamines, usage/withdrawal (symptoms), 120t Anal injuries assessment, 121-125 penetration, 126 Anal opening, laxity/scar tissue (observation), 124f Anal sphincter dilatation, 127f Anatomy, normal appearance, 135-145 Annular hymen, 138f Anthroposcopy, usage, 143 Anticipatory warrants, 251 Anti-virus software, 218 APNIC. See Asian-Pacific Network Information Center Apotemnophilia, 26t ARIN. See American Registry of Internet Numbers Arrangers/investors, 37t ASEAN. See Association of Southeast Asian Nations Ashcroft v Free Speech Coalition, 266 Asian ancestry, facial characteristics, 176t Asian-Pacific Network Information Center (APNIC), 213, 218-219

320 Index

Asphyxiophilia, 26t Assault victims nongenital injuries, 122t physical examination, conducting (objectives), 116t Assessment. See Anal injuries; Behavioral assessment; Developmental assessment; Emotional assessment; Genital injuries; Psychiatric assessment; Sex offenders; Toddlers clinical approach, 117-118, 121-125 positions, 121-123 team, observation/documentation, 111t usage, 110, 115-118, 121-132 Association for the Treatment of Sexual Abusers (ATSA), standards, 151 Association of Internet Hotline Providers in Europe (INHOPE), 217-218 Association of Southeast Asian Nations (ASEAN) Regional Think Tank, 105, 245 Travellers Code, 105 ATSA. See Association for the Treatment of Sexual Abusers Attention-deficit/hyperactivity disorder (ADHD), 278 Attorneys, roles. See Cyber-enticement Autoassassinophilia, 26t Autoerotic , 77 Automatic consultation, usage, 99t Autonepiophilia, 26t B Background witness, 230-231 Bacterial vaginitis, prophylactic treatment, 133t, 134t Bacterial vaginosis, 130 Bad kids, regard, 59 Bandwidth, 219 Behavioral assessment, 278-279 Best Evidence Rule, 261, 262 Bestiality. See Zoophilia , 26t Bony pelvis, acute internal injuries, 148-149 Borderline personality disorder, 24 Borderline touching, 34 Boys genitalia, normal appearance, 136 prostitution, issues, 283-284 sexual abuse, reporting (absence), 34

321 Child Sexual Exploitation: Quick Reference

Broadband, 219 Browser, 219 C Cable modem, 204, 219 Canada sex tourism, 90 trafficking, legal approaches, 97t Car Relax Alone Forget Friends Trouble (CRAFFT) screening test, 121t Caretaker missing, 296 CASA. See Court-appointed special advisor ccTLD. See Country code top-level domain Centers for Disease Control and Prevention (CDC), 129 Centers for Medicaid and Medicare Services, 287 Chain-of-custody documentation, 263 Channel, 219 Charging. See Prostitution cases considerations. See Internet cases Charm school cases, 58 Chat rooms definition, 72, 219 usage, 77 Chickenhawk, 18t Child abuse images, trading/collecting/producing (relationship), 48f incidence, reduction (measures), 312-314 jurisdiction, 255 victims, safety. See Congregations Child lure prevention, 294-295 Child molesters, 28 Child pornography, 45 age, determination, 141-142 background, 45-46 collection, 46, 177 damage, 55 danger, 45 defense, 266 defining, 254 definition, 4 narrow, 228 depiction, 193

322 Index

distribution, 228 effects, 53-55 evidence, 179-193 handling, recommendations, 185t forms, 49-52 images, range, 47-48 investigation, 173 jurisdiction, 255 legislation, 11t-12t local cases, 170 process, 52-53 questions, pertinence, 232t regulation, 227-338 speech issues, consideration, 48-49 state interests, 227-228 terminology, 46-47 trafficking, 76 uses, 49-52 written, 193 Child Pornography Evidence Guide, 170 Child prostitution attitudes, 59 beliefs, 59 computer evidence, search/seizure, 198 definition, 57 definitions, terminology, 58-59 effects, 61-64 efforts, coordination, 198 environmental factors, 59-60 evidence, gathering, 195 factors, 57t federal laws, 238 interventions, 64 investigation, 195, 197t investigative approaches, 196 psychosocial factors, 5t risk factors, 59-61 suspects, disposition, 198 victims disposition, 198 interviews, 196-197 issues, 60

323 Child Sexual Exploitation: Quick Reference

Child protective services (CPS), 63 mistrust, 298 notification, 275 problems, 297 Child Recognition & Identification System, 170 Child sex abusers, 86 Child sex tourism cases, international resources, 245-246 definition, 85-86 Child sexual abuse, 3 accommodation syndrome expert, 241 acts, consideration, 9t definition, 4 diagnosis, 229 effects, 20 etiology, Internet (role), 78 history, case elements, 232t prostitution, relationship, 24 presence, 62 preventive measures, 312 uncomplicated STDs, management, 133t, 134t Child sexual exploitation (CSE) adult survivors, trauma (effects), 21-24 consequences, 11-12, 61 definition, 4 exploiters, categories, 35-36 factors, 10-11 forms, 8-10 frequency, 9 industry victims adult psychological disorders, 24t beliefs, 22t coping strategies, 23t missing life skills, 23t investigation, experience, 247 local cases, 170 preventive measures, 312 terminology, 4 trafficking functionaries, involvement, 37t-38t types, 35-37 victims, 17

324 Index

Child Victim Identification Project, 170 Child Wise Tourism Program, 105 Children abusive images, COPINE typology, 47t attorney, role, 243t child pornography, damage, 55 child sexual exploitation, consequences, 11 domestic trafficking, definition, 85 erotica, 193-194 ethnicity, assessment, 142-143 graphic images/descriptions, 48 homelessness, reduction (measures), 314 location, molestation, 78 molestation cases, physical/forensic evidence, 250t online victimization, minimization techniques, 201t-202t protection, Interpol (tools), 98t-99t protective traits, 19-20 reintegration, 311 seduction, information, 192 sensory memory, 231 sex social influences, 3 trafficking, 90, 103 sexual exploitation, injuries, 145-147 targeted characteristics, 18-19 victims context. See Trafficking uncomplicated STDs, management. See Sexual abuse Children’s Advertising Review Unit, 306-307 Chlamydia, prophylactic treatment, 133t, 134t Child Wise Tourism, 245 Circumcision, types. See Female circumcision Cleft, healing, 127f Clinically identified paraphilias, examples, 26t-27t Club drugs, usage/withdrawal (symptoms), 120t Cocaine, usage/withdrawal (symptoms), 119t Code of Conduct, 246 CODIS. See Combined DNA Index System Collector syndrome, 75-76 Combating Paedophile Information Networks in Europe (COPINE), 46 stages, 173

325 Child Sexual Exploitation: Quick Reference

typology. See Children usage. See UK Court of Appeals Sentencing Guidelines Scale Combined DNA Index System (CODIS), 131 Commercial sexual exploitation of children (CSEC) definition, 4 factors, 6t-7t Communication, occurrence, 52 Community clinics, usage, 279-280 Compliance, necessity, 110 Compliant victim, 35, 75, 77, 196 Compliant victimization, 71 Computer evidence. See Internet cases legal issues, 229 search/seizure, 198 Computer forensics, 199 examiners, roles, 203 process automation, 258-259 tools, validation, 258-259 Computer images, deletion (defense), 269 Computer systems, usage, 98t Computer-based evidence, receipt, 186-187 Computer-based images, documentation, 187 Computer-generated images, proof/defense, 267-268 Conduct disorder, 279 Congregations child abuse victim safety, 301t domestic violence victim safety, 301t Consent exception, 252 Coordinators, roles, 203 COPINE. See Combating Paedophile Information Networks in Europe Coping behaviors, 21 Coprophilia, 26t, 32 Counseling, 281-282 Country code top-level domain (ccTLD), 206 definition, 219 Court-appointed special advisor (CASA), role, 243t Courtroom confusion, risk (elimination). See Evidence CPS. See Child protective services CRAFFT. See Car Relax Alone Forget Friends Trouble CRC. See Cyclical Redundancy Check Crescentic hymen, 138f

326 Index

Crew members, 38t Criminal act. See Actus reus Criminal activity, 69 Criminal intent. See Mens rea CSE. See Child sexual exploitation CSEC. See Commercial sexual exploitation of children Cuff-like hymen, 138f Current viewing time (VT), 151-153 Cyber addictions, 69 Cyberawareness, 71 Cyber-enticement, 69 attorneys, roles, 203 background information, 69-71 complainants, 201t definitions, terminology, 72-74 evidence, location, 204-205 Internet crime areas, identification, 200 investigation, 199 investigative process, 200 investigative task force, 200-205 purpose/members, 200, 203-204 investigators, 201t process, 78-79 risk factors, 74-76 scope, 71-72 suspects, identification, 200 task force, roles, 203f , definition, 72 Cyberspace, 219 CyberTipline, 169-170 historical searches, 171 Cyclical Redundancy Check (CRC), 263 D Dads and Daughters, 308 Data, authentication/accuracy, 256-260 Data entry, usage, 99t Dating violence consequences, 62-63 definition, 58-59 Daubert/Frye standard, 258

327 Child Sexual Exploitation: Quick Reference

Debt collectors, 38t Deciduous teeth. See Primary teeth Defenses, meeting. See Untrue defenses Definitive diagnosis, requirement, 149 Dental maturation, 142, 177-178 Deoxyribonucleic acid (DNA) evidence processing/analysis, 131-132 profiles, obtaining, 132 Depressants, usage/withdrawal (symptoms), 120t Depression development, 61 rates, 20 risk, increase, 276 Developmental assessment, 278-279 Diagnostic testing, 128-131. See also Pregnancy; Sexually transmitted diseases Diaper Pail Fraternity, 31-32 Digital Subscriber Line (DSL), definition, 220 Direct examination. See Internet cases Disclosure, method/content, 231 Discovery issues. See Internet cases Disinhibitory function, 78 DNA. See Deoxyribonucleic acid Docket load, 239 Documentation. See Assessment; Chain-of-custody documentation; Computer-based images; Injuries Domain name, definition, 219 Domain name system (DNS), definition, 219 Domestic trafficking, definition, 85 Domestic violence victim safety, 301t Dominance. See Hyperdominance Double silencing, 55 Download, 220 Drugs abuse problems, 11 questions, 113t usage, symptoms, 119t-120t withdrawal, symptoms, 119t-120t DSL. See Digital Subscriber Line E ECPAT. See End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes

328 Index

Ecstasy, usage/withdrawal (symptoms), 120t ECU. See Exploited Child Unit Ego control, 285 E-groups, 52 Electronic archiving, usage, 99t Electronic evidence. See Internet cases Electronic mail (e-mail), 208-209 definition, 72, 220 information, alteration, 208 services, 209 usage, 77, 204 Emergency care facilities, 276 Emotional assessment, 278-279 Emotional sexual abuse, 9t EnCase tools. See Internet cases usage, 216 Encryption, definition, 220 End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes (ECPAT) campaign, 104-106 End Child Prostitution in Asian Tourism campaign, 245 Enforcers, 38t Entrapment, claim (advantage), 268 Environmental factors, 5, 59-60 Environmental influences. See Sex tourism Enzyme-linked immunosorbent assay test, 129-130 , 30 Erotica images. See Children defining, legal criteria, 192 Ethanol, usage/withdrawal (symptoms), 119t Ethnic groups, facial characteristics, 176t Ethnicity assessment. See Children identification/analysis, 175-177 Ethnicity, assessment. See Children European ancestry, facial characteristics, 176t Evaluating witness, 231 Evidence. See Videotape collection. See Forensic evidence collection courtroom confusion, risk (elimination), 179, 185 destruction, fear, 254

329 Child Sexual Exploitation: Quick Reference

examples, 164t exclusion, risk (elimination), 179, 185 file format, 262-263 gathering, 195 handling, 179, 185-188 location. See Cyber-enticement photographs, usage, 192-193 published materials, usage, 192-193 receipt, 185-188 search/seizure, 198 technical challenges, 214 usage, 163-165 Examination procedures, 116 Exceptions, warrant requirement, 252-254 Exclusive pedophiles, 30 Exhibitionism, 9t, 26t. See also Autoerotic exhibitionism Exigent circumstances exception, 253-254 Exiting groups, stages, 273-274 Exiting stages. See Prostitution; Sex trade lifestyle Expert opinion, usage. See Search warrants Expert witness testimony. See Internet cases types, 230-231 Exploitation. See Child sexual exploitation Exploited Child Unit (ECU), 169-171 Internet searches, technical assistance services, 171t-172t publications, 172t Technical Assistance Services, 171 technical expertise, 171t training, 172t Extrafamilial pimps, involvement, 58 Extrafamilial support, 285 Extremist ideologies, advancements, 69 F Faith-based communities, 297-301 circumstances, 297 conflict, areas, 297-298 cost, 299 personal safety, instruction, 300t recommendations, 299-300 Family

330 Index

cohesions, 285 genograms, 284 history, 284 situations, 5 therapy, usage, 282-283 violence, 282 Fantasy stories, 79 Fecal incontinence, difficulty, 127f Federal Bureau of Investigation (FBI) Innocent Images Task Force, 256 Web site, screen capture/HTML source code, 207 Federal child pornography legislation, 11t-12t Federal Rule of Evidence 901(a), 257 Federal Rule of Evidence 901(b)(9), 260 Federal Rules of Evidence, 261 Female development, Tanner stages, 183f Female circumcision, 139 types, 140f Female genitalia, normal appearance, 140f Female public hair development, Tanner stages, 182f Fetish, definition, 31 Fetishism, 26t, 31-32 File extensions, display, 215-216 File name extension, 220 File Transfer Protocol (FTP), 210 definition, 220 usage, 204t Firewall, 220 First Amendment defense problems, 266 protection, 193 First responders. See Preliminary investigation First-degree injuries, management, 147 Forced labor, 102-103 Forensic evidence, 250t collection, 110, 150 , 31 Foster care, issues, 312 Foster homes, short-term placements, 284 Freon, usage/withdrawal (symptoms), 120t FTP. See File Transfer Protocol

331 Child Sexual Exploitation: Quick Reference

G Gammahydroxybutyrate (GHB), usage/withdrawal (symptoms), 120t Gasoline, usage/withdrawal (symptoms), 120t Gateway, 205, 220 Gender, identification/analysis, 174-175 Generic top-level domain (gTLD), definition, 220 Genital injuries, 147 assessment, 121-125 position, 121-123 Genital trauma, differential diagnosis, 139-141 Genitalia, normal appearance, 136-141 GHB. See Gammahydroxybutyrate Girls, genitalia (normal appearance), 137-139 Global travelers, definition, 73 Glue, usage/withdrawal (symptoms), 120t Gonorrhea, 128 prophylactic treatment, 133t, 134t Good faith exception, 251-252 Good practice, principles. See Prostituted children Governmental organizations (GOs), 104-105 Graphical image file, bit-stream copy, 261 Grooming, 34-35 steps. See Victims Group sessions, usage, 282 gTLD. See Generic top-level domain Guardian ad litem, role, 243t Guides, 38t Guilt, shame (contrast), 162 H Habituation, definition, 72 Hacker/intrusion defenses, defeating, 267 Hallucinogens, usage/withdrawal (symptoms), 119t-120t Hare Psychopathy Checklist, 153 Header, 220 HEADSS. See Home, Education/employment, Activity, Drugs, Sexuality, /depression screen Healing groups, stages, 273-274 Healthcare professionals, interaction, 63-64 settings. See Prostituted children

332 Index

Hebephilia, 30 Hematoma, 126f Hemolytic streptococcus infection. See Secondary Group A beta hemolytic streptococcus infection Hemorrhage, control, 147 Hepatitis, 129-130 prophylactic treatment, 133t, 134t Heroin, usage/withdrawal (symptoms), 119t Herpes simplex virus (HSV) type 1, 128f Herpes simplex virus (HSV) type 2 lesions, 128f prophylactic treatment, 133t, 134t High-guard stance, 143 Hispanic ancestry, facial characteristics, 176t Historical sources, availability, 111t History obtaining, 109-110, 111t interviewer advice, 114t-115t physical examination, overlap, 233f HIV. See Human immunodeficiency virus Home, Education/employment, Activity, Drugs, Sexuality, Suicide/depression screen (HEADSS), interview, 114t Home exploitation, 35 Homeless youths, typology. See Homelessness, reduction (measures), 314 Host, 220 Hosting, 220 Hotlines, 217-218 HPV. See Human papillomavirus HSV. See Herpes simplex virus HTML. See HyperText Markup Language HTTP. See HyperText Transfer Protocol Human dentition, chronology, 180t-181t Human immunodeficiency virus (HIV), 130 prophylactic treatment, 133t, 134t risk, 60 test, 129 Human papillomavirus (HPV) infection, 130 lesions, 130f prophylactic treatment, 133t, 134t

333 Child Sexual Exploitation: Quick Reference

Human service resources, 274 Human trafficking, 85 background information, 86-87 definitions, terminology, 85-86 help, retrieval process, 103-106 investigation, 94-95 legal status, 95-103 offenders, 87-88 process, 90-94 risk factors, 88-90 Hustlers/escorts, self-reference, 196 Hymen isolated clumps, 127f types, 138f Hymenal clefts, 127f Hymenal findings, 137 Hymenal folds, lesions (obscuration), 130f Hymenal tear, 126f Hymenal tissue, absence, 127f Hyperdominance, 32 Hyperlinks definition, 72 inclusion, 77 HyperText Markup Language (HTML) definition, 221 source code, 207f HyperText Transfer Protocol (HTTP), 205-206, 221 Hypnotics, usage/withdrawal (symptoms), 120t I IANA. See Internet Assigned Numbers Authority ICANN. See Internet Corporation for Assigned Names and Numbers ICQ, 221 ICT. See Information and communication technology Illegal activity, Internet components (usage), 76-78 Images. See Abuse; Child abuse; Pseudo images analysis, 78-79 deletion, defense, 269 documentation, 187 erotica, defining, 192 proof/defense, 267-268

334 Index

range, 47-48 trading history, 54f IMAP. See Internet Message Access Protocol Immigration & Refugee Protection Act (IRPA), 97t Immobilization, option, 149 Imperforate hymen, 138f Incest, display, 192 Individual counseling, 281-282 Inducement, 268 Industry victims. See Child sexual exploitation Infantaphilia, 30 Infantilization, 61 Infants abduction, 293 sadistic abuse, 149 Information and communication technology (ICT), definition, 4 Informational sources, availability, 111t Informers, 38t Inhalants, usage/withdrawal (symptoms), 120t INHOPE. See Association of Internet Hotline Providers in Europe Injuries. See Anal injuries; Assault victims; Genital injuries; Visible injuries classification, 146 diagnosis. See Physical injuries documentation, 125-126 management, 147-149. See also Acute internal injuries; Acute visible injuries Innocent Images Task Force, 256 Instant message, 221 Intelligence analysts, roles, 203 Intent. See Lack of intent element, absence (defense problems), 265 Intercourse, physical force (usage), 271 Intermediate support. See Prostituted children International conventions/protocols, 312 International green notices, usage, 98t International yellow notices, usage, 98t Internet, 221 access, 70 addiction, defense, 269 , 194 components, usage, 76-78 crime areas, identification, 200

335 Child Sexual Exploitation: Quick Reference

CSE complaints, 200 exploitation, 36 gateway, 205 government regulation, 265 hotlines, 217-218 images, trading history, 54f investigations, time (importance), 213-214 investigative tools, 216-218 pedophilia, 69 role. See Child sexual abuse services, usage, 204t technical challenges, 214 undercover technique, 215-216 usage, 79 Internet Assigned Numbers Authority (IANA), definition, 221 Internet cases best evidence rule, 261 charges, additions/alternatives, 256 charging/pretrial considerations, 254-256 computer evidence, 256-257, 264-265 presentation, 260-261 computer forensic tools, validation, 258-259 counts, number, 255 defenses, diffusion, 265-266 direct examination, 260-263 electronic evidence, 261-262 EnCase tools, 262-263 expert witness testimony, 259-260 foundation, challenges, 257 images, charging, 255 jury selection, 263-266 legal approaches, 247 pretrial evidentiary hearing, 260 recovered data, authentication/accuracy, 256-260 recovery process, 257 underlying crime, 264 victims discovery issues, 256 issues, 256 Internet Corporation for Assigned Names and Numbers (ICANN), 204, 221 Internet Message Access Protocol (IMAP), 221

336 Index

Internet Protocol (IP), 204, 221 address, 208, 221-222 tracing, 213 Internet Relay Chat (IRC), 52, 207-208, 222 usage, 204t Internet Service Provider (ISP), 204, 222 contacts, 172t logs, 213 server space allocation, 207 Internet travelers, 69 background information, 69-71 definitions, terminology, 72-74 process, 78-79 risk factors, 74-76 scope, 71-72 Internet-related sex offenders, evaluation/treatment recommendations, 315-316 Internet-related terms, 218-225 Interpol lobbying efforts, 100 posters, 98t role. See Sex tourism tools, 98t-99t Interstate travelers, definition, 73 Interview process, 112t-113t, 165-168. See also Suspects; Victims Interviewers, roles, 203 Interviewing, advice, 167t Intimate partner violence (IPV), definition, 58 Intrastate travelers, definition, 73 Investigation failure, 168-169 first responders, 159-161 principles, 159 Investigative agencies, 169-172 Investigative approaches. See Child prostitution Investigative goals, 162-163 Investigative process, 161-168 preparation, 161-162 Investigators, character traits, 162 Involuntary servitude, 102 IP. See Internet Protocol IPV. See Intimate partner violence

337 Child Sexual Exploitation: Quick Reference

IRC. See Internet Relay Chat IRPA. See Immigration & Refugee Protection Act ISP. See Internet Service Provider J Jacob Wetterling Act, 94 Jacob Wetterling Foundation, listing, 292t Jimmy Ryce Center for Victims of Predatory Abduction, listing, 292t Johns, 61, 237 Joint Commission on the Accreditation of Healthcare Organizations, 287 Judge, role, 243t Jurisdiction, 199, 239, 255 Jury selection. See Internet cases; Prostitution cases Juvenile courts issues, 243-245 participants/roles, 243t Juvenile detention facilities, 276-277 Juvenile justice system, reporting (fear), 64 K Ketamine, usage/withdrawal (symptoms), 120t KlaasKids Foundation, 292t Klismaphilia, 26t, 32 L Laboratory testing, 131 Lack of intent, defense, 268 Laparoscopy, usage, 141, 148 Lateral decubitus position, 123 Law enforcement contacts, 171t officers, laxity, 86 partnerships, 172 resources, 274 testimony, 241 Let Kids Be Kids, 307-308 Life skills, absence, 23 Link, definition, 222 Local travelers, definition, 73 Lolita, 18t Long-term community support, 279-284 Long-term sexual activity, history, 127f

338 Index

Long-term therapy effectiveness, 281-283 goals, 280-283 Lovability, beliefs, 22t LSD, usage/withdrawal (symptoms), 119t-120t M Madams, involvement, 58 Male pubic hair/genitalia development, Tanner stages, 184f Maltreatment, rates, 2 Marginalization, definition, 58 Marijuana, usage/withdrawal (symptoms), 119t Masochism, 26t MDTs. See Multidisciplinary teams Media influences, 305-311 Medical evaluation, consideration, 197 Medical expert testimony, 229-231, 233, 234 Medical issues, 109 management, 147-149 Megan Nicole Kanka Foundation, listing, 292t Megan’s Law, 94 Mens rea (criminal intent) evidence, 163 Mental health clinics, 276 support, 179-184 Messengers, 211 usage, 204t Mexico sex tourism, 89 trafficking, legal approaches, 97t Mid-guard hand stance, 143 Miller v California, 227 Missing children, Interpol posters, 98t Mistaken identity debating, 266-267 defense problems, 265 Mobile phone technology, usage, 77-78 Modem, 204, 222. See also Cable modem Molestation age, 30f children, location, 78

339 Child Sexual Exploitation: Quick Reference

Molestation cases, physical/forensic evidence, 250t Molesters, 61 Money movers, 38t Morphing, 78 obviousness, 188 Morphophilia, 26t Multidisciplinary teams (MDTs), 298-299 involvement, 110, 161 Multiethnic background, 175 Musculoskeletal development, 141-142 Mysophilia, 27t N NAATs. See Nucleic acid amplification tests NAMBLA. See North American Man/Boy Love Association National AMBER Alert coordinator, role, 292-293 National Center for Missing & Exploited Children (NCMEC), 169, 293 listing, 292t National Health and Nutrition Examination Survey (NHANES), 144 National Incidence Study of Missing, Abducted, Runaway, and Thrownaway Children in America, 295-296 NCMEC. See National Center for Missing & Exploited Children Necrophilia, 27t, 33. See also Pseudonecrophilia Network, 222 Network News Transport Protocol (NNTP), 209, 222 Neuroses, risk (increase), 276 Newsgroups definition, 72, 222 postings, 209 usage, 76-77 NHANES. See National Health and Nutrition Examination Survey Nigeria, sex tourism, 88 NNTP. See Network News Transport Protocol No-knock warrant, 254 Nonexclusive pedophiles, 30 Nonfamily abductions, attempts, 295-296 Nongenital injuries, 122t North American Man/Boy Love Association (NAMBLA), 49-50 North Carolina Pediatric Society, 307-308 Nucleic acid amplification tests (NAATs), 129

340 Index

O Offenders, 8, 24-37 assessment, 150-153 care, principles, 109 legal results. See Trafficking relationship. See Victims development, absence, 35 sentencing guideline provisions, strengthening, 275 typologist, 241 Offending, classes, 51-52 Online infidelity, 69 Online Service Providers (OSPs), 204, 212-213, 222 Online sex rings, 50 Online victimization, minimization techniques, 201t-202t Opiates, usage/withdrawal (symptoms), 119t Opportunistic exploiters, 35 Orthopedic consultation, 149 OSPs. See Online Service Providers Osteometry, usage, 143 Outreach personnel, insufficiency, 272 Outside of home exploitation, 35 P P2P. See Peer-to-peer Paint thinner, usage/withdrawal (symptoms), 120t Paraphilias, 25-27 examples, 26t-27t, 31-33 types, 26t Parents, attorney (role), 243t Parole searches, exceptions, 254 , 27t Particularity. See Search/seizure Password, 222 Patrons, 237 PCP, usage/withdrawal (symptoms), 119t-120t PCR. See Polymerase chain reaction Pediatric Research in Office Settings (PROS), 144 Pedophiles. See Exclusive pedophiles; Nonexclusive pedophiles attraction, problem, 51 characteristics, 29-30 communication, assistance, 76

341 Child Sexual Exploitation: Quick Reference

Pedophilia, 26t, 27-30. See also Internet diagnosis, criteria, 28t general information, 27-29 Peer group behaviors, 283 Peer support, access, 273 Peer-to-peer (P2P), 222 networks, 211-212 usage, 204t Pelvic inflammatory disease (PID), 148 Perianal scarring, extensiveness, 127f Permanent teeth. See Secondary teeth Perpetrator, partial image, 189-190 Personal firewall, 223 Personal safety, instruction. See Faith-based communities Photographs receipt, 186 usage. See Evidence Physical abuse, 1-2 Physical evidence, 163-165, 250t Physical examination, 234 conducting, objectives, 116t history, overlap, 233f Physical examiner, checklist, 115t Physical injuries, 146 diagnosis, 145-147 Physical sexual abuse, 9t Physical sexual maturation, 178-179 Picquerism, 33 PID. See Pelvic inflammatory disease Pimps, 86 fear, 239 extrafamilial, 58 Plain view exception, 252 Point-of-presence (POP), 204, 223 Police bias/investigatory methods, defense problems, 265 Polly Klaas Foundation, listing, 292t Polygraphy, 153 Polymerase chain reaction (PCR), usage, 129 POP3. See Post Office Protocol Pornographic freedom, promotion, 50 Pornographic vignettes, insertion, 189

342 Index

Pornography. See also Child pornography advertising, purpose, 50-51 assessment. See Toddlers cases, legal issues, 227 child sexual exploitation, 9-10 consequences, 20-21 definition, 46 exploitation, 36 medical analysis, 173 users, effects, 53 Post Office Protocol (POP3), 223 Postal inspectors, role, 169 Posterior vestibule scar, 127f Posterior vestibule tear, bruising (inclusion), 126f Posttraumatic stress disorder (PTSD), 233t development, 61 increase, 24 risk, increase, 276 Power, beliefs, 22t Preadolescent patients, findings, 137-138 Predisposition, 268 Preferential child molesters, 28 Pregnancy diagnostic testing, 131 incidence, 61 testing, 63 Preliminary investigation, first responders, 159-161 Prescription drugs, usage/withdrawal (symptoms), 120t Pretext calls, 196 Pretrial considerations. See Internet cases Pretrial decisions. See Prostitution cases Pretrial evidentiary hearing. See Internet cases Primary teeth (deciduous teeth), human dentition (chronology), 180t Private searches, exceptions, 254 Privilege defense, problems, 266 Proactive approach, definition, 72 Probable cause, establishment, 248 Probation, exceptions, 254 Prone knee-chest position, 123 Propane, usage/withdrawal (symptoms), 120t PROS. See Pediatric Research in Office Settings

343 Child Sexual Exploitation: Quick Reference

Prosecutorial Remedies and Other Tools to end the Exploitation of Children Today (PROTECT) Act, 96t, 187-188, 275 Prosecutors, role, 242t Prostituted children good practice, principles, 287t-288t governmental programs, 274-275 healthcare settings, 275-279 intermediate support, 279-284 laws, 238 long-term community support, 279-284 long-term prognosis, 284-285 mental health support, 279-284 problem, scope, 271-274 safety planning, 287 screening programs, 286 support services, 271 therapeutic approaches, 284 victims, 197 visual cues, 284 Prostitution. See also Child prostitution boys, issues, 283-284 child sexual exploitation, 10 definition, 4 effects, 20 exiting barriers, 272 stages, 273-274 healing, 273 stages, 273-274 impact, 24 infantilization, 61 psychosocial factors, 5t relationship. See Child sexual abuse safety issues, 284 Prostitution cases case in chief, 240-241 charging, 238-239 closing argument, 242 jury selection, 239-240 laws/penalties, 237-238 legal considerations, 237

344 Index

opening statement, 240 pretrial decisions, 238-239 sentencing, 242-243 trials, considerations, 238-243 PROTECT. See Prosecutorial Remedies and Other Tools to end the Exploitation of Children Today Protective traits, 19-20 Protocol, 223 Pseudo images, 78 Pseudonecrophilia, 33 Psychiatric assessment, 277-278 Psychiatric emergencies, 149 Psychopathy, measure, 153 Psychosexual evaluations, information (obtaining), 152t Psychosocial factors, 5t PTSD. See Posttraumatic stress disorder Puberty changes, sequences (acceptance), 179 Pubic hair combings/pluckings, usage, 150 Public officials, corruption, 37t Public record database searches, 171t Published materials, usage. See Evidence R Radiographic studies, usage, 141 Rape. See Acquaintance rape diagnosis, 145 physical force, usage, 271 Reactive approach, definition, 72-73 Real images, proof/defense, 267-268 Recovered data, authentication/accuracy. See Internet cases Recruiters, 37t Recruitment process, 33 Regional Internet Registries (RIRs), 223 types, 213 Registrar for Internet Protocols in Europe (RIPE), 213, 223 Rehabilitation programs, recommendations, 314-315 Rehabilitative testimony, 230 Remailers definition, 73, 223 usage, 208 Reproductive organs, acute internal injuries, 148

345 Child Sexual Exploitation: Quick Reference

Request for Comments (RFC), 223 Reverse sting e-mails, 196 RIPE. See Registrar for Internet Protocols in Europe RIRs. See Regional Internet Registries Risk factors. See Child prostitution; Cyber-enticement; Internet travelers; Sex tourism; Trafficking Rohypnol, usage/withdrawal (symptoms), 120t Runaways, 19t Rural communities, 302 approaches, 302 circumstances, 297 S Sadism, 26t, 32 Sadistic abuse, 149 Sadistic toddler abuse, 177 School clinics, usage, 279-280 Scienter, proof, 255 Scotophilia, 27t Screen capture. See Federal Bureau of Investigation Screening programs. See Prostituted children Search warrants background information, 247-248 drafting, 248-249 expert opinion, usage, 249-250 necessity, 195 usage, 247-250 Search/seizure. See Child prostitution issues, 247-254 particularity, 250-251 Secondary Group A beta hemolytic streptococcus infection, 128f Secondary teeth (permanent teeth), human dentition (chronology), 180t-181t Second-degree injuries, management, 147 Sedatives, usage/withdrawal (symptoms), 120t Self-esteem, 233 erosion, 272 Self-help networks, 280 Septate hymen, 138f Serological testing, 130 Server, definition, 223 Sex exploiter, definition, 4

346 Index

Sex offenders assessments, 150-153 measures, usage, 151-153 standards/guidelines, 151 evaluation/treatment recommendations. See Internet-related sex offenders Sex questions, 113t Sex tourism, 85. See also Canada; Child sex tourism; Mexico; Nigeria; United States background information, 86-87 definition, 4 environmental influences, 88-90 help, retrieval process, 103-106 Interpol, role, 95, 99-100 investigation, 94-95 legal status, 95-103 offenders, 87-88 process, 90-94 risk factors, 88-90 terminology, 85-86 three-tier classification system, 91t victims, characteristics, 88 Sex trade lifestyle, exiting, 272-273 healing, 273 groups, 273-274 stages, 273-274 success, 273 Sexual abuse. See Child sexual abuse Sexual contact denial, 128f history, absence, 128f Sexual exploitation. See Child sexual exploitation Sexual exploitation industry victims. See Child sexual exploitation Sexual gratification, 75 Sexual industry victims. See Child sexual exploitation Sexual maturation, 144-145 Sexual molester, 237 Sexual trauma, victims (follow-up considerations), 135t Sexually deviant activity, Internet components (usage), 76-78 Sexually transmitted diseases (STDs) diagnostic testing, 128-130 follow-up, 132 infection, 148

347 Child Sexual Exploitation: Quick Reference

susceptibility, 11 test, 125, 132 treatment, 132 Sexually transmitted infections (STIs), 62-63 Shame, contrast. See Guilt Short-term therapy, availability, 271 Shoulder-to-hip ratio, 174 Simple Mail Transport Protocol (SMTP), 223 Situational runaways, 19t Skin diseases, 11 Snuff film, 32 Social influences, 3 Social networking sites, 223 usage, 77-78 Social services, interactions, 63-64 Social support networks, 280 Society, child sexual exploitation (consequences), 11 Source code, 207 Souvenir, definition, 31 Spam, 224 problem, 208 Specimens, collection/storage, 132 Speech issues, consideration. See Child pornography Spirituality, 285 Spoof, 224 usage, 208 Spray paint, usage/withdrawal (symptoms), 120t Staleness, relevance, 252 Statutes of limitations, issues, 255 STDs. See Sexually transmitted diseases Stigmatophilia, 27t Sting operations, 196 definition, 74 STIs. See Sexually transmitted infections Stop It Now (helpline), 106 Subpoenas, necessity, 195 Substance abuse, 282 coercion, 61 CRAFFT screening test, 121t problems, 11 Substantive testimony, 229-230

348 Index

Suicide questions, 113t risk, increase, 276 Summary opinion, 234 Supine frog-leg position, usage, 121-122 Supine knee-chest position, 123 Supine lithotomy position, 122 Surveillance, 195 Survival sex, homeless youths (typology), 19t Suspected offenders, care (principles), 109 Suspects disposition, 198 identification. See Cyber-enticement interview process, 166-168 Syphilis, prophylactic treatment, 133t, 134t System tray, 224 Systems youths, 19t T Tanner stages, 178, 182f-184f designations, avoidance, 145 TCP. See Transmission Control Protocol TEAMSTAT. See Tell Express Assure Medical Safety Test Access Timely Tear, healing, 127f Tell Express Assure Medical Safety Test Access Timely (TEAMSTAT) approach, 117-118 Testimony. See Law enforcement; Medical expert testimony; Rehabilitative testimony; Substantive testimony elements, 231-234 types, 230-231 Text-based child abuse accounts, 79 Thrownaway children, definition, 4 Thrownaways, 19t Time, importance. See Internet Toddlers gross motor skills, development stages, 178t photography, 177 pornography age identification/analysis, 177 assessment, 143-144 sadistic abuse, 149, 177

349 Child Sexual Exploitation: Quick Reference

Toluene, usage/withdrawal (symptoms), 120t Top-level domain (TLD), 224. See also Country code top-level domain; Generic top- level domain Total height ratio comparisons, 141-142 Tourism money, loss (fear), 87 Traffickers, 86 Trafficking, 37. See also Human trafficking children, victims (context), 92t definition, 4, 85, 100 functionaries, involvement, 37t-38t help, retrieval process, 103-106 investigation, 94-103 legal approaches, 96t-97t offenders, 87-88 legal results, 101 process, 90-94 risk factors, 88-90 terminology, 85-87 Trafficking in Persons and Worker Exploitation Complaint Line (USDOJ), 103 Trafficking victims, 88 assistance, 101t certification, 101t characteristics, 90-91 legal results, 101-103 Trafficking Victims Protection Act (TVPA), 93 requirements, 102 three-tier classification system, 91t Tranquilizers, usage/withdrawal (symptoms), 120t Transmission Control Protocol (TCP), 204, 224 Transporter providers/operators, 37t , 26t Trauma beliefs, 21 differential diagnosis. See Genital trauma effect, 21-24 follow-up considerations. See Sexual trauma Traveler. See Global travelers; Internet travelers; Interstate travelers; Intrastate travelers; Local travelers; Victims definition, 73 no-shows, definition, 74 Traveling, definition, 74

350 Index

Treponemal-specific test, 129 Trichomonas, prophylactic treatment, 133t, 134t Triolism, 27t Trojan, 224 Tr u s t absence, 282 beliefs, 22t T-visa benefits, 101t TVPA. See Trafficking Victims Protection Act U UC. See Undercover UK Court of Appeals Sentencing Guidelines Scale, COPINE typology (usage), 47t Uncomplicated STDs, management, 132, 113t, 134t Undercover (UC) technique, 215-216 Uniform Resource Locator (URL), 205, 224 Web site investigation, 206 United Nations Convention Against Transnational Organized Crime, 99 United States sex tourism, 90 trafficking, legal approaches, 96t-97t Untrue defenses, meeting, 266-269 Upload, 224 URL. See Uniform Resource Locator Urophilia, 27t, 32 US Constitution, protection, 193 US Postal Inspection Service (USPIS), 169 Usenet, definition, 224 Usenet newsgroups, 209 usage, 204t V Vaginal bleeding, 141 Vaginal gonorrhea, 128 Vaginal-penile penetration, 126f Venereal Disease Reference Laboratory, 129 Venereal warts, 130f Verbal sexual abuse, 9t Victims, 5, 17-24, 22t care, principles, 109 characteristics. See Sex tourism

351 Child Sexual Exploitation: Quick Reference

context. See Trafficking convenience, 239 coping strategies, 23t disposition. See Child prostitution exploitation, risk (elimination), 185 follow-up considerations, 135t grooming, steps, 34t health, 285 history, 240 obtaining, 111t identification, 240 analysis, 173-179 initial assessment, 277 interventions, 64 interview. See Child prostitution process, 165-166 issues. See Child prostitution; Internet cases legal results. See Trafficking victims offenders molestation age, 30f relationship, 17 physical examination, conducting (objectives), 116t preference, 167 safety. See Congregations selection, 167 specialists, roles, 204 support services, 292t term, usage (avoidance), 230 travelers, definition, 73-74 vaginal-penile penetration, 126f violence, 62-63 Videos angles, display, 189 multiple subjects, usage, 190-192 worksheet organization, example, 191f receipt, 186 Videotape evidence, 188-192 incest, display, 192 Violence. See Dating violence; Family; Intimate partner violence

352 Index

Virtual child pornography defense, 266 Virtual community, 225 Virus, 225 Visible injuries, 146 Visual cues. See Prostituted children Voice over IP (VoIP), 226 usage, 210 Voir dire, 263 conducting, 266 Volumetric plethysmograph, 151f , 9t, 26t VT. See Current viewing time W Warrants. See Anticipatory warrants; No-knock warrant; Search warrants requirements, exceptions, 252-254 WBC. See Web-based chat Web cameras (Web cams), 225 usage, 77-78 Web sites definition, 74, 225 multiple pages, 205 usage, 77 Web-based chat (WBC), 210-211 usage, 204t reform, impact, 10 Whois, 225 Witness convenience, 239 credibility, 239 interviews, 195 specialists, roles, 204 World Wide Web (WWW, Web), 205-207, 225 investigators information, helpfulness, 206 problems, 206 structure, 205 usage, 204t Worm, 225 Written child pornography, 193

353 Child Sexual Exploitation: Quick Reference

Y Youth Career Initiative, 246 Youths. See Systems youths commercial sexual exploitation, factors, 6t-7t typology. See Survival sex Z Zoophilia (bestiality), 27t, 31

354