U.S. Department of Justice Office of Justice Programs Office for Victims of Crime D ECEMBER 2001 Internet Crimes Against Children Message From the Director Today, computers are prevalent in busi- Children have always been vulnerable ew computer technology presents nesses, homes, schools, libraries, and to victimization.Their trusting natures complex challenges for law even airports. The World Wide Web pro- and naivete make them perfect targets for perpetrators—both people they enforcement agencies and victim vides instant access to news, reference N know and those they don’t.As children service providers. These professionals information, shopping, banking, stock grow into adolescents, they remain vul- must protect Internet users as they con- trading, auctions, and travel information nerable to victimization.Youth are often duct investigations, secure evidence, and reservations. People routinely use the curious and eager to try new things. identify and apprehend offenders, and Internet to take college courses, play Many youth struggle with issues of help child victims and their families. games, listen to music, and view videos. rebellion and independence and seek Based on the knowledge and experience Chat rooms and e-mails are now replac- attention and affection from people out- of those working with child victims, this ing telephones as our favorite means of side the home, often by using comput- ers.Today, an estimated 10 million Bulletin focuses attention on child vic- long-distance communication. children are using the Internet. By 2005, tims of Internet-based crimes, highlight- approximately 77 million kids will be ing the challenges for law enforcement The proliferation of computer technology online.With so many children online, personnel and victim service providers, obviously has enhanced our lives in today’s predators can easily find and examining who the child victims are, many ways, such as enabling improved exploit them. For predators, the and determining how best to respond to productivity and efficiency at work, Internet is a new, effective, and more these victims’ needs and the needs of school, and home. Anyone with access anonymous way to seek out and groom their families. to a computer and modem now has children for criminal purposes such as unparalleled recreational and educational producing and distributing child pornog- raphy, contacting and stalking children opportunities. for the purpose of engaging in sexual Introduction acts, and exploiting children for sexual Unfortunately, criminals are also using tourism for personal and commercial he growth of technology has modern technology—to prey on inno- purposes. changed our lives dramatically. cent victims. Computers and the Internet Computers were viewed as a luxury have made the predator’s job easier. The nature of Internet crimes presents T complex new challenges for law or even an extravagance 30 years ago. Historically, child predators found their enforcement agencies and victim service We relied on television, newspapers, victims in public places where children providers with regard to investigating and radio as primary sources of news tend to gather—schoolyards, play- crimes, collecting evidence, identifying and information. Cables, modems, grounds, and shopping malls. Today, with and apprehending offenders, and and online services were virtually so many children online, the Internet nonexistent. Continued on page 2 OVC Bulletin 45 million, and by 2005 to 77 million.2 at greater risk because they often use the Continued from page 1 With so many youth online and vulnera- computer unsupervised and are more like- assisting child victims and their families. ble to predators, it is extremely important ly to engage in online discussions of a For example, victims and perpetrators for parents, law enforcement officials, personal nature. Some victims become are often separated geographically, prosecutors, and victim service providers unwitting participants as they actively which may hamper investigation efforts. to know as much as possible about participate in chat rooms, trade e-mail Also, victims are often ashamed and Internet crimes against children so they messages, and send pictures online. reluctant to come forward, which makes can prevent victimization and prosecute Troubled or rebellious teens who are seek- identifying offenders difficult.These chal- offenders. ing emancipation from parental authority lenges are being addressed by federal can be susceptible to Internet predators. and local law enforcement agencies, but there is still much to learn about pre- The risk of victimization is greater for venting, identifying, and investigating Children as Targets emotionally vulnerable youth who may Internet-based crimes against children. of Internet Crimes— be dealing with issues of sexual identity. These young people may be willing to This Bulletin is based on the experi- Who Is Vulnerable? engage in conversation that is both titil- ences of professionals now working with child victims of Internet crimes and raditionally, both intrafamilial lating and exciting but appears innocent their families. It highlights some of the offenders and strangers have found and harmless. Unfortunately, Internet challenges law enforcement and victim that young children and teenagers interactions that initially appear innocent service professionals face in addressing T can gradually lead to sexually explicit are perfect targets for criminal acts Internet crimes against children and conduct.3 focuses attention on child victims of because they are often trusting, naive, these crimes by examining who they are curious, adventuresome, and eager for and how best to respond to their needs attention and affection. However, the and the needs of their families. most attractive factor to predators is that Types of Internet children and teenagers historically have Victimization John W. Gillis not been viewed as credible witnesses. Director Today, the danger to children is even nternet crimes are often thought of as greater because the Internet provides victimless. Nothing could be further from the truth. Children and teenagers provides predators a new place— predators anonymity. Whether the vic- I can and do become victims of Internet cyberspace—to target children for crimi- timization occurs in person or over the crimes. Predators contact teenagers and nal acts. This approach eliminates many Internet, the process is the same—the children over the Internet and victimize of the risks predators face when making perpetrator uses information to target a them by contact in person. child victim. For example, the predator may initiate an online friendship with a ■ Enticing them through online con- young person, sharing hobbies and inter- tact for the purpose of engaging ests. This may lead to the exchange of Scope of the Problem them in sexual acts. gifts and pictures. Just like the traditional he sheer number of young people predator who targets children in person, ■ Using the Internet for the produc- using computers today makes our the online predator usually is willing to concern for them well founded. tion, manufacture, and distribution T spend considerable time befriending and of child pornography. Recent years have seen a great increase in grooming a child. The predator wants to access to and use of the Internet. By the build the child’s trust, which will allow ■ Using the Internet to expose youth end of 1998, more than 40 percent of all the predator to get what he or she to child pornography and encourage American homes had computers, and 25 ultimately wants from the child. them to exchange pornography. percent had Internet access.1 This trend is expected to continue. Children and Although no family is immune to the ■ Enticing and exploiting children for teenagers are one of the fastest growing possibility that their child may be exploit- the purpose of sexual tourism (travel groups of Internet users. An estimated 10 ed and harassed on the Internet, a few with the intent to engage in sexual million kids are online today. By the year factors make some children more vulnera- behavior) for commercial gain 2002, this figure is expected to increase to ble than others. Older children tend to be and/or personal gratification. 2 Internet Crimes Against Children Unique discovered by law enforcement during an ■ Aggressive sexual solicitation: investigation. The presumed anonymity Sexual solicitations involving offline Characteristics of of Internet activities often provides a false contact with the perpetrator through Cybercrimes sense of security and secrecy for both the mail, by telephone, or in person, or perpetrator and the victim. attempts or requests for offline everal characteristics distinguish contact. Internet crimes from other crimes S committed against children: Youth Internet ■ Unwanted exposure to sexual mate- rial: When online, opening e-mail, Physical contact between the child and Safety Survey or opening e-mail links, and not the perpetrator does not need to occur lthough it was clear that young peo- seeking or expecting sexual material, for a child to become a victim or for a ple are using the Internet in ever- being exposed to pictures of naked crime to be committed. Innocent pictures increasing numbers, no research people or people having sex. or images of children can be digitally A existed on how many youth encounter ■ transformed into pornographic material unwanted sexual solicitations and expo- Harassment: Threats or other offen- and distributed across the Internet with-
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages8 Page
-
File Size-