Week 10-Internet Sex Offences Flashcards
What is Technology-assisted CSA? (Hamilton et al., 2017)
Different forms of offending in young peoples’ own words:
1. Offline CSA shared with and viewed by others via technology
2. Peer CSA committed via technology or offline shared with others in the victim’s peer group
3. Offline CSA commissioned via technology
4. Offline sexual blackmail
5. Technology assisted sexual blackmail
6. Technology assisted grooming
7. Sexual activity bought from a young person via technology
8. Sexual images created consensually but shared non-consensually
What crimes have been legislated?
- Inciting a child to engage in sexual activity (Section 10 Sexual Offences Act, 2003)
- Engaging in sexual activity in the presence of a child (Section 11 Sexual Offences Act, 2003)
- Causing or inciting child prostitution or
pornography (Section 48 Sexual Offences Act, 2003) - Arranging or facilitating the commission of a child sex offence (Section 14 Sexual Offences Act, 2003)
- Meeting a child under the legal age of 16 following sexual grooming (Section 15 Sexual Offences Act, 2003)
- Sexual communication with a child (Section 67 Serious Crime Act 2015)
What is the role of the internet: Has the internet helped contribute to the ISO
problem?
-It has facilitated ISOs by providing new ways of committing offences.
- The internet provides an affordable,
anonymous and accessible means through which people can explore deviant
sexual interests. - Anonymity contributes to an ‘online
disinhibition’ effect (Suler, 2004) - It can facilitate an interest in children
through access to indecent images,
access to children and it provides a
supportive environment for some
offenders (Durkin, 1997, Beech, Elliot, Birgden & Findlater, 2008).
What is the scope of the problem:
IIOC
- Interpol (2008) database contained over
520.000 IIOC. UK ChildBase 807.525
unique still images in 2009 (Quayle &
Jones, 2011) - Difficult to estimate number of adults
interested in accessing/producing images:
– Take/distribute: 12.993 offences;
Possession: 1.398 offences.
– (Home Office, 2010-2011) - Estimated 50,000 individuals involved in
IIOC offences in the UK (CEOP, 2013)
What’s Technology-assisted Child Sexual Abuse? (CSA) (Hamilton et al., 2017)
Different forms of offending in young peoples’ own words
1. Offline (In world) CSA shared with and viewed by others via technology
2. Peer CSA committed via technology or offline shared with others in the victim’s peer group
3. Offline CSA commissioned via technology
4. Offline sexual blackmail
5. Technology assisted sexual blackmail
6. Technology assisted grooming
7. Sexual activity bought from a young person via technology
8. Sexual images created consensually but shared non-consensually
What are current Legislations making CSA illegal?
- Inciting a child to engage in sexual activity (Section 10 Sexual Offences Act, 2003)
- Engaging in sexual activity in the presence of a child (Section 11 Sexual Offences Act, 2003)
- Causing or inciting child prostitution or
pornography (Section 48 Sexual Offences Act, 2003) - Arranging or facilitating the commission of a child sex offence (Section 14 Sexual Offences Act, 2003)
- Meeting a child under the legal age of 16 following sexual grooming (Section 15 Sexual Offences Act, 2003)
- Sexual communication with a child (Section 67 Serious Crime Act 2015)
This list is not exhaustive
What is the role of the internet: Has the internet helped contribute to the ISO
problem?
-It has facilitated ISOs by providing new ways of committing offences.
- The internet provides an affordable,
anonymous and accessible means
through which people can explore deviant
sexual interests. - Anonymity contributes to an ‘online
disinhibition’ effect (Suler, 2004) - It can facilitate an interest in children
through access to indecent images,
access to children and it provides a
supportive environment for some
offenders (Durkin, 1997, Beech, Elliot,
Birgden & Findlater, 2008) (some would argue that the internet creates more sex offenders as they may initially never have this interest rather an addiction to porn). - For some, internet sex offending fulfills some form of social deficits meaning they become more withdrawn (a vicious cycle). Additionally these offenders can seek each other out online and provides advice on how to avoid being caught
What is the scale of the problem: Indecent Images Of Children (IIOC)
- Interpol (2008) database contained over
520.000 IIOC. UK ChildBase 807.525
unique still images in 2009 (Quayle &
Jones, 2011) - Difficult to estimate number of adults
interested in accessing/producing images:
– Take/distribute: 12.993 offences;
Possession: 1.398 offences.
– (Home Office, 2010-2011) - Estimated 50,000 individuals involved in
IIOC offences in the UK (CEOP, 2013)
What is the scale of the problem: Grooming
- Sexual offences, including those against
children, are massively under-recorded
(ONS, 2015). - One UK study reported that 2.1% of police
cases in the UK each year relate to online
grooming (Gallagher, Fraser, Christmann
& Hodgson, 2006). - Of a total of 2,391 reports received by the
public, 64% related to grooming, making it
the most reported activity to CEOP (CEOP, 2010) (i.e., more people experience grooming than anticipated)
What is the Overall Scope of the Problem?
- Around 12% of children aged 11-16 years old have received sexual messages online in the past 12 months (Livingstone et al, 2010; 2011)
- Most common victims of online grooming (and subsequent offline offending) are adolescent females aged 13-17 years (e.g. Katz, 2013; Wolak, Finkelhor & Mitchell, 2004) but increasingly younger ages of children are being effected as younger ages access technology (Barnardo’s, 2011).
- Links to vulnerability (i.e., risk factors) – mental health, previous victimisation, social deprivation, in care, learning difficulties (e.g. Jonsson et al, 2019, Euser et al, 2013) – though have to also consider all children are at risk (i.e., there is no defining characteristic of who becomes a victim)
- Of 400 counselling sessions in relation to
grooming, 82% of victims did not consider
themselves a victim of CSE (Child Line, 2012) (part of this is the belief that they are in a relationship and have had sex with them several times - so may not want to cooperate with police investigation)
Simple calculation: 453,450 children in
ENGLAND alone
- Giles & Alison (2021) estimate there are
between 2,365-5,991 males with paedophila and 12,218-30,952 males with hebephilia who are likely contact offenders. - Combined socio-economic burden from
these persons could amount to £236-£597
million (incident costs) increasing to £2.9-
£7.3 billion (lifetime costs) - Total economic burden of national pool of
IIOC offenders (N=50,000; CEOP,2013)=£113 million- £5.6 billion
What is the Overall Scope of the Problem? (Giles et al., 2024; Hamilton et al., 2017)
- Worrying picture beginning to emerge that
online only abuse just as harmful to
victims than offline abuse. - Technology provides additional routes to
access young people to abuse, and to
manipulate and silence them (i.e., it is very pervasive as these offenders can harass or message these individuals as many times they want any time in the day) - Additional elements for young people to
contend with; control, permanence,
blackmail (The worst threat with blackmail is that any image of them will be shared; so many hide from fear that it has been released), revictimisation and self blame. - Some professionals noted that victims are
more often ‘blamed’, seen as participated
in the abuse or do not see it as abuse when it is offline (i.e., that they had a choice and a say in saying no to this)
What are the Research Approaches in IIOC?
- Wide range of academic papers examining
characteristics of offenders such as
sociodemographic characteristics, criminal records, personality, motivation and cognitions, life experiences, access to children and use of technology (c.f. Long et al, 2016) - How groups differ (IIOC only, contact only, dual offenders; e.g. Babchishin et al, 2014)
- As a diagnostic tool for paedophilia (See Seto, 2018)
- Content of images (Tejeiro et al, 2020)
- Offender views (Winder and Gough, 2010)
Limitations:
-How do you really know which group an individual belongs to?
-Detected versus undetected offenders? (+ those who have been caught may not have been caught for other offences)
-Cannot access indecent images for
research purposes + research is quite limited (so how do we know what we know about offenders is 100% accurate?)
What is ‘Online Grooming’?
‘……….a series of explicit or implicit goal-
directed behaviours that together share the
intention of preparing a target individual,
where his or her compliance and/or
submission is advantageous and/or
necessary for the specific purpose of
achieving an unlawful or exploitative goal’
(Elliott, 2015).
What is involved in the grooming process from the offender’s perspective?
- Offenders deliberately enter chat rooms geared towards children, they review online profiles and postings by children to identify potential victims (Malesky, 2007).
- Quayle et al. (2014) rapid skill acquisition for online groomers in terms of selecting technologies and learning how to target and approach children. They engage in several interactions simultaneously.
- Victim choice: - accessibility, opportunity and vulnerability (O’Connell, 2003)
- Victim choice:- try to choose those who mention sex or are sexually curious, vulnerable or ‘appear submissive’, and young sounding screen name e.g. Jenny13 (Malesky, 2007; Quayle et al, 2014). They don’t always tend to have a type and open their net wide for anyone willing to communicate back
- They will communicate with victims in a variety of ways (Wolak et al, 2004) 15