EFTA01728622
EFTA01728716 DataSet-10
EFTA01728788

EFTA01728716.pdf

DataSet-10 72 pages 34,891 words document
P17 P22 V14 V13 D6
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (34,891 words)
Whatever the prosecutors' views of child pornography might be, it is important that they dearly communicate their criteria for prosecuting or not prosecuting a particular case. Some of the possible criteria to consider in a child- pornography case not involving production include • amount of time and energy put into it by the subject • size of the collection • format (i.e., videotapes, magazines, digital images) • sexual themes (e.g., sadism, urination, bondage) III age of the children portrayed or of the subject ■ percentage of child pornography in the total collection ■ amount of erotica or other paraphernalia collected • quality of images ■ receipt, distribution, or both • profit • solicitation (i.e., requesting/encouraging others to produce) • access to children (Le., teacher, coach, youth volunteer) III molestation of children (Le., past, present, or future) The prosecutive criteria should be communicated and consistent. If a case meets the set-forth criteria, the investigator should have a reasonable expectation the case will be prosecuted. The criteria, however, should be viewed as policy with some degree of flexibility. The policy should reflect what is usually done and not necessarily what is always done. In order to evaluate child pornography or determine what and how many prosecutive criteria it meets, investigators and prosecutors must have facts and details. Many of those fads and details are best obtained from executing a valid search warrant or obtaining a consent. to search. For some reason many prosecu- tors seem to believe that executing such a search warrant should be the final step in the investigation. They want all the answers to the evaluation and prosecutive criteria before the search when, in fad, many of the answers will come from the search itself. The execution of the search warrant and subsequent search should be viewed not as the last step, but simply one step in the investigation. Obviously there must be probable cause and/or consent to conduct such a search. 88 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728716 Use of Computers by Sex Offenders We have historically warned our children about the dangers associated with strang- ers, but often neglected to help them understand that sex offenders are often people they have come to know either in person or now online. Throughout his- tory nonfamily members who sexually exploit children have frequented the places where children gather. Schoolyards, parks, and malls have been prime contact places. Offenders have also used technological advancements (e.g., cameras, tele- phones, automobiles) to facilitate their sexual interests and behavior. Starting in the 1990s, home computers, online services, and the Internet have become new points of contact and technological tools. Although most of the offenders currently utilizing computers in their sexual victimization of children would generally be considered to be "acquaintance molesters," some might be family members and others might be strangers. Some of these offenders might also be sexually victimizing children without using com- puters. For example they may also be sexually abusing readily available children, including their own, or trafficking in or collecting child pornography in maga- zine, boolc, photograph, or videotape formats and utilizing the mail. Although it is the focus of this discussion, the focus of the investigation cannot be only on the computer. The computer is only a tool. Also, as the capabilities and availability of computers change, their role in the sexual victimization of children will also change. Some may wonder why a discussion of acquaintance molesters would include a section on the use of computers. That is because, like most acquain- tance molesters, individuals attempting to sexually exploit children through the use of computer online services or the Internet tend to gradually seduce their targets through the use of attention, affection, kindness, and gifts. They are behavior- ally like acquaintance molesters and best viewed as such for investigative and prevention purposes. They are often willing to devote considerable amounts of time, money, and energy to this process. They will listen to and empathize with the problems of children. They will be aware of the music, hobbies, and interests of children. Unless the victims are already engaged in sexually explicit computer conversation, offenders will usually lower any inhibitions by gradually introduc- ing the sexual context and content. Some offenders use the computer primarily to collect and trade child pornography, while others seek online contact with other offenders and children. Some do both. Offenders who do either or both with a computer can also do either or both without the computer. Children, especially adolescents, are often interested in and curious about sexu- ality and sexually explicit material. They will sometimes use their online access to actively seek out such material. They are moving away from the total control of parents and trying to establish new relationships outside the family. Sex offenders targeting children will use and exploit these characteristics and needs. Adoles- cents may also be attracted to and lured by online offenders closer to their age who, although not technically "pedophiles," may be dangerous. • Illegal Sexual Activity Computer-related sexual exploitation of children usually comes to the attention of law enforcement as a result of individual/victim complaints, referrals from CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 89 EFTA01728717 commercial service providers, and inadvertent discovery during other investiga- tions. Increasingly, cases are being proactively identified as a result of undercover investigations that target high-risk computer sites or utilize other specialized tech- niques. Sexual activity involving the use of computers that is usually illegal and, therefore, the focus of law-enforcement investigations includes ■ producing or possessing child pornography ■ uploading and downloading child pornography ■ soliciting sex with "children" • In the vernacular of computer-exploitation investigators, those who traffic in online child pornography are known as "traders" and those who solicit sex with children online are known as "travelers." Using the computer to solicit sex with "children" could include communicating with actual children as well as with law- enforcement officers who are taking a proactive investigative approach and pretending to be children or pretending to be adults with access to children. After using the computer to make contact with the "child," other illegal activity could involve traveling to meet the child or having the child travel to engage in sexual activity. Cases involving adolescents using the computer to solicit sex with other ado- lescents and traffic in child pornography that portrays pubescent "children" are a problem area for the criminal-justice system especially the federal system. For purposes of illegal sexual activity and child pornography, the federal statutes and many local statutes define children or minors as individuals who have not yet reached their sixteenth or eighteenth birthdays. Such behavior, therefore, may be technically illegal, but may not be sexually deviant. Legal Sexual Activity Sexual activity involving the use of computers that may be of concern, but is usually legal includes ■ validating sexually deviant behavior and interests ■ reinforcing deviant arousal patterns ■ storing and sharing sexual fantasies ■ lying about one's age and identity ■ collecting adult pornography that is not obscene ■ disseminating "indecent" material, talking dirty "cyber-sex," and, provid- ing sex instructions ■ injecting oneself into the "problem" of computer exploitation of children to rationalize interests Although many might find much of this activity offensive and repulsive and special circumstances and specific laws might even criminalize some of it, it is for the most part legal activity. The investigation of chil • -sexual-exploitation cases involving computers requires knowledge of the technical, legal, and behavioral aspects of computer use. Because each of these areas is so complex, however, investigators must also iden- 90 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728718 tify experts and resources available to assist in these cases. Exploitation cases involving computers present many investigative challenges, but they also present the opportunity to obtain a great deal of corroborative evidence and investigative intelligence. This discussion will focus primarily on the dynamics of offender and victim behavior in the computer exploitation of children. Computer Offenders Offenders using computers to sexually exploit children tend to fall into the three broad categories of situational, prefer- Exploitation cases involving ential, and miscellaneous "offenders." computers present many investigative challenges, Situational Offenders but they also present the Situational offenders include a ■ "normal" adolescent/adult - usually a typical opportunity to obtain a great adolescent searching online for pornography and sex deal of corroborative evidence or an impulsive/curious adult with newly found and investigative intelligence. access to a wide range of pornography and sexual opportunities. ■ morally indiscriminate - usually a power/anger-motivated sex offender with a history of varied violent offenses. Parents, especially mothers, who make their children available for sex with individuals on the Internet would also most likely fit in this category ■ profiteers —with the lowered risk of identification and increased potential for profit, the criminal just trying to make easy money has returned to trafficking in child pornography. When situational-type offenders break the law, they can obviously be investigated and prosecuted, but their behavior is not as long-term, persistent, and predictable as that of preferential offenders. They are a more varied group. Preferential Offenders Preferential offenders include a ■ pedophile offender, as previously discussed, with a definite preference for children. • • diverse offender with a wide variety of paraphilic or deviant sexual interests, but no strong sexual preference for children. This offender was previously referred to in my original typology as the sexually indiscriminate. ■ latent individuals with potentially illegal, but previously latent sexual preferences who have more recently begun to criminally act out when their inhibitions are weakened after their arousal patterns are fueled and validated through online computer communication. The essential difference between the pedophile type -and diverse type of preferential offender is the strength of his sexual preference for -children. As pre- viously stated the pedophile type is primarily interested in sex with children that might, in some cases, involve othet sexual deviations or paraphilias. The diverse type is primarily interested in a variety of sexual deviations that might, in some cases, involve children. For example the pornography and erotica collection of CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 91 EFTA01728719 the diverse preferential offender will be more varied, usually with a focus on his particular sexual preferences or paraphilias and sometimes involve children, whereas a pedophile% collection will focus predominately on children and some- times involve other paraphilias. Searching a computer for this varied adult-theme pornography can sometimes be justified if it helps identify the person using the computer or is linked to and helps explain the victimization of children. If children are directly molested, the diverse offender is more likely to victimize pubescent children. More naive prepubescent children, however, are sometimes selected to minimize confronting possible challenges to or embarrassment over their deviant sexual interests. With an absence of prior criminal sexual activity, latent offenders present prob- lems concerning what prosecution and sentence is appropriate. A thorough investigation and good forensic psychological evaluation, possibly aided by the use of the polygraph or other deception-assessment devices, are helpful in evalu- ating such apparent "latent" offenders. Miscellaneous "Offenders" Miscellaneous "offenders" include ■ media reporters - individuals who erroneously believe they can go online and traffic in child pornography and arrange meetings with suspected child molesters as part of an authorized and valid news exposé. ■ pranksters - individuals who disseminate false or incriminating informa- tion to embarrass the targets of their "dirty tricks." ■ older "boyfriends" - individuals in their late teens or early twenties attempting to sexually interact with adolescent girls or boys. ■ overzealous civilians - members of society who go overboard doing their own private investigations into this problem. As will be discussed, investi- gators must be cautious of all overzealous civilians who offer their services in these cases. Although these miscellaneous "offenders" may be breaking the law, they are obviously less likely to be prosecuted. This category includes media reporters breaking the law as part of a bona-fide news story It does not include reporters, or any other professionals, who engage in such activity to hide or rationalize the fact that they have a personal interest in it. They would be situational or preferen- tial offenders. Media reporters frequently do not notify law enforcement of their "undercover" activity until it reaches a crisis point, and then they want law enforcement to respond immediately. Overzealous civilians could also include sex-offender therapists and researchers engaging in this type of activity. Only law-enforcement officers as part of official, authorized investigations should be conducting proactive investigation or downloading child pornography on a com- pute. No one should be uploading child pornography. It should be noted that federal law does allow an affirmative defense for the possession of child pornogra- phy only if less than three matters are possessed and it is promptly, in good faith and without retaining or allowing access to any other person, destroyed or reported to a law-enforcement agency that is afforded access to each depiction (18 U.S.C. § 2252(c)). As previously stated the test for those claiming professional use of child pornography should be twofold. Do they have a professional use for 92 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728720 the material, and were they using it professionally? Both standards must be met in order to seriously consider the claim. Using a computer to fuel and validate interests and behavior, facilitate interacting with child victims, or possess and traffic in child pornography usually requires the above-average intelligence and economic means more typical of prefer- ential sex offenders. The computer sex offenders'discussed here hate tended to be white males from a middle class or higher socioeconomic background. As computers and use of the Internet have become more commonplace, however, there are now increasing numbers of the more varied situational sex offenders. In computer cases, especially those involving proactive investigative techniques, it is often easier to determine the type of offender than in other kinds of child- sexual-exploitation cases. When attempting to make this determination, it is important to evaluate all available background information. The information noted below from the online computer activity can be valuable in- this assessment. This information can often be ascertained from the online service provider and through undercover communication, pretext contacts, informants, record checks, and other investigative techniques (e.g., mail cover, pen register, trash run, surveillance). ■ screen name ■ screen profile ■ accuracy of profile ■ length of time active ■ amount of time spent online ■ number of transmissions ■ number of files ■ number of files originated ■ number of files forwarded ■ number of files received ■ number of recipients ' ■ site of communication ■ theme of messages and that ■ theme of pornography A common problem in these cases is that it is often easier to determine a computer is being used than to determine who is using the computer. It is obvi- ously harder to conduct a background investigation when multiple people have access to the same computer. Pretext telephone calls can be useful in such situations. • "Concerned Civilians" Many individuals who report information to the authorities about deviant sexual activity they have discovered on the Internet must invent clever excuses for how and why they came upon such material. They often start out pursuing their own sexual/deviant interests, but then decide to report to law enforcement either because it went too far, they are afraid authorities might have monitored them, or they need to rationalize their perversions as having some higher purpose or value. Rather than honestly admitting their own deviant interests, they make up elabo- rate explanations to justify finding the material. Some daim to be journalists; CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 93 EFTA01728721 researchers; or outraged, concerned members of society trying to protect a child or help law enforcement. In any case, what they find may still have to be investi- gated. If information from such "concerned civilians" is part of the basis for an expert's opinion in the warrant, there could be questions concerning its reliability and accuracy. Investigators must consider the true motivations of these "concerned civil- ian?' who report such activity. They may be individuals who, among other things, have ■ embellished and falsified an elaborate tale of perversion and criminal activity on the Internet based on their need to deny or rationalize their own deviant sexual interests ■ uncovered other people using the Internet to validate and reinforce bizarre, perverted sexual fantasies and interests (a common occurrence), but these other people are not engaged in criminal activity ■ uncovered other people involved in criminal activity One especially sensitive area for investigators is the preferential sex offender who presents himself as a concerned civilian reporting what he inadvertently "discovered" in cyberspace or requesting to work with law enforcement to search for child pornography and protect children. Other than the obvious benefit of legal justification for their past or future activity, most do this as part of their need to rationalize their behavior as worthwhile and gain access to children. When these offenders are caught, instead of recognizing this activity as part of their preferential pattern of behavior, the courts sometimes give them leniency because of their "good deeds." Preferential sex offenders who are also law-enforcement officers sometimes claim their activity was part of some well-intentioned, but unauthorized investigation. In the best-case scenario, these "concerned civilians" are well-intentioned, overzealous, and poorly trained individuals who are, therefore, more likely to make mistakes and errors in judgment that may jeopardize a successful prosecution. In the worst-case scenario these "concerned civilians" are pedophiles attempting to justify and get legal permission for their deviant sexual behavior. In any case, investigators should never sanction or encourage civilians to engage in "proactive investigation" in these cases. Investigators should always encourage civilians to immediately and honestly report any criminal activity they inadvert- ently discover online. The great appeal of a computer becomes obvious when one understands sex offenders especially the preferential sex offender. The computer could be a stand- alone system or one utilizing an online-service capability. Whether a system at work, a library, a cyber café, or home, the computer provides preferential sex offenders with an ideal means of filling their needs to ■ obtain and organize their collections, correspondence, and fantasy material ■ communicate with victims and other offenders ■ store, transfer, manipulate, and create child pornography ■ maintain business records 94 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728722 The sex offender using a computer is not a new type of criminal. It is simply a matter of modern technology catching up with long-known, well-documented behavioral needs. In the past they were probably among the first to obtain and use, for their sexual needs, new inventions such as the camera, telephone, auto- mobile, "instant" camera, and the video camera and recorder. Because of their traits and needs, they are willing to spend whatever time, money, and energy it takes to obtain, learn about, and use this technology. They are usually among the first to obtain and utilize any new technology that fills their needs. Organize Offenders use computers to organize their collections, correspondence, and fantasy material. Many preferential sex offenders in particular seem to be com- pulsive recordkeepers. A computer makes it much easier to store and retrieve names and addresses of victims and individuals with similar interests. Innumer- able characteristics of victims and sexual acts can be easily recorded and analyzed. An extensive pornography collection can be cataloged by subject matter. Even fantasy writings and other narrative descriptions can be stored and retrieved for future use. Such detailed records can be invaluable in determining the ages of children in pornography images, identifying additional victims, iden- tifying additional subjects, and proving intent. One problem the computer creates for law enforcement is determining whether computer text describing sexual assaults are fictional stories, sexual fan- tasies, diaries of past activity, plans for future activity, or current threats. This problem can be compounded by the fact that there are individuals who believe that cyberspace is a new frontier where the old rules of society should not apply. They do not want this "freedom" scrutinized and investigated. For general guid- ance in evaluating this material, in texts that are just fantasy, everything seems to go as planned or scripted with no major problems. Reality rarely works out so well. There is, however, no easy solution to this problem. Meticulous analysis, documentation, and investigation are the only answers. Communicate, Fuel, and Validate Many offenders are drawn to online computers to communicate and validate their interests and behavior. This validation is actually the most important and compelling reason that preferential sex offenders are drawn to the online com- puter. In addition to physical contact and putting a stamp on a letter or package, they can use their computer to exchange information and for validation. Through the Internet, national and regional online services, or specialized electronic bulle- tin boards, offenders can use their computers to locate individuals with similar interests. The computer may enable them to obtain active validation (i.e., from living humans) with less risk of identification or discovery. The great appeal of this type of communication is perceived anonymity and immediate feedback. They feel protected as when using the mail, but get immediate response as when meeting face-to-face. Like advertisements in "swinger magazines," computer online services are used to identify individuals of mutual interests concerning age, gender, and sexual preference. The offender may use an electronic bulletin board to which he has authorized access or illegally enter a system. The offender can also setup his own CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 95 EFTA01728723 underground online bulletin boards or Internet sites or participate surreptitiously or openly in those of others. In addition to adults with similar interests, offenders can sometimes get validation from the children they communicate with online. Children needing attention and affection may respond to an offender in positive ways. They may tell the offender he is a "great guy" and that they are grateful for his interest in them. They appreciate the fact that he is willing to listen to and nonjudgmentally discuss sex with them. In communicating with children, and in a few cases with adults, offenders can easily assume the identities of other adults and one or more children. Validation is also obtained from the fact that they are utilizing the same cuffing-edge technology used by the most Because of [the] validation intelligent and creative people in society. In their minds the process and the fueling time, technology, and talent it takes to engage in this activ- of sexual fantasy with ity is proof of its value and legitimacy. Because of this online pornography, I validation process and the fueling of sexual fantasy with online pornography, I believe that some individuals with believe that some individuals potentially illegal, but previously latent sexual preferences with potentially illegal, have begun to criminally "act out." Their inhibitions are but previously latent sexual weakened after their arousal patterns are fueled and vali- dated through online computer communication. This does preferences have begun not in any way suggest we should blame the computer and to criminally 'act out.' that offenders are not legally accountable for their behavior. Their inhibitions are As previously stated offenders' need forvalidation is the weakened after their foundation on which proactive investigative techniques (e.g., stings, undercover operations) are built and the primary arousal patterns are fueled reason they work so often. Although their brains may tell and validated through online them not to send child pornography or reveal details of past computer communication. or planned criminal acts to a stranger they met online, their need for validation and to fulfill their sexual fantasies often compels them to do so. Maintenance of Business Records Offenders who have turned their child pornography into a profit-making busi- ness use computers the same way any business uses them. Things such as lists of customers, dollar amounts of transactions, descriptions of inventory can all be recorded. on the computer. Because trafficking in child pornography by computer lowers the risks, there has been an increase in profit-motivated distribution. Child Pornography An offender can use a computer to transfer, manipulate, and even create child pornography. With the typical iffirne computer and modem, still images can eas- ily be digitally stored, transferred from print or videotape, and transmitted with each copy being as good as the original. Visual images can be stored on hard drives, floppy disks, CD-ROMs, or DVDs. With newer technology, faster modems, digital cameras, and more powerful computers, similar things can now be done with moving images. Increasingly available, high-speed Internet connec- 96 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728724 Lions are now making it possible to even transmit the most preferred child- pornography format—high-quality, lengthy moving images (e.g., videotape, films). The other invaluable modern inventions for pornographers, the video camera and recorder, are now being used with the computer. Real-time video images, multimedia images with motion and sound, and virtual-reality programs can pro- vide added dimensions to pornography. The data that is stored and transmitted can also be encrypted to deter detection. The ability to manipulate digital visual images can make it more difficult to determine the ages of the persons in them. Television commercials can now employ techniques to make it appear that Paula Abdul is dancing with Gene Kelly and John Wayne is talking to a drill sergeant. Halfway through the movie Forrest Gump, Lieutenant Dan's legs are no longer visible. With computer- graphics programs, images can easily be changed or "morphed." This is similar to the technology that is used to "age" the photographs of long-term missing children. Whatever the burden of proof, computers make evaluating questionable child pornography much easier. Rarely is the context of its possession and distribution (i.e., how it was produced, saved, and used) as well documented as in cases involving computers. With a computer, investigators and prosecutors can usually evaluate and consider ■ sources of the images ■ how it was traded ■ other material transmitted with the images ■ amount of material sent and/or received ■ overall themes of the images ■ use of zip files ■ directory and file names assigned by suspect ■ messages with the images ■ content of related chat (by far the most valuable) ■ manipulation of images Interact and Solicit Sex With Children Offenders can use the computer to troll for and communicate with potential vic- tims with minimal risk of being identified. The use of a vast, loose-knit network like the Internet can sometimes make identifying the actual perpetrator difficult. On the computer the offender can assume any identity or characteristics he wants or needs. Children from dysfunctional families and families with poor communi- cation are at significant risk for seduction. Older children are obviously at greater risk than younger children. Adolescent boys confused over their sexual orienta- tion are at particularly high risk of such contacts. By no reasonable definition can an individual with whom a child has regularly communicated online for months be called a "stranger," even if that individual has lied about his true identity. Many offenders, however, are reasonably honest about their identity and some even send recognizable photographs of themselves. They spend hours, days, weeks, and months communicating, including a lot of listening, with children. In the world of the Internet, someone you never met in person is not only not a stranger, but can be your "best friend." Warning potential CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 97 EFTA01728725 victims about online "predators" can communicate a false impression of the nature of the danger. The child can be indirectly "victimized" through conversation (e.g., "chat," "instant messages") and the transfer of sexually explicit information and material. The child can also be evaluated for future telephonic or face-to-face contact and direct victimization. The latest technology allows real-time group participation in child molestation by digital teleconferencing on a computer. After developing a relationship online, offenders who are arrested attempting to meet with children, or individuals they believe to be children, to engage in illegal sexual activity often claim that they were not really going to have "sex." They claim the discussed sex was just a fantasy or cyber sex, part of their under- cover "investigation," or a means of communicating with a troubled child. Some claim that because of their vast online experience they always knew that the per- son they were communicating with was really not a child. This is highly unlikely for a need-driven offender. In addressing these issues of intent, motivation, or knowledge, investigators must objectively weigh all of the offender's behavior (i.e., past history, honesty about identity, collection of pornography or erotica, nature of communications, who was notified about activity, overt actions taken). The idea that all communication about sex on the Internet is just fantasy or cyber sex is absurd and not consistent with the reality of many Internet relationships. Ultimately a judge or jury will decide this question of fact. Investigators must recognize that many of the children lured from their homes after online computer conversations are not innocents who were duped while doing their homework. Most are normal, curious, rebellious, or troubled adoles- cents seeking sexual information or contact. Society has to stop focusing on the naive belief that teenagers are "accidentally" getting involved. Most teenagers deliberately go to web sites such as "www.whiteftouse.com" to find pornography, not to find information about the president. Investigation will sometimes discover significant amounts of adult and child pornography and other sexually explicit material on the computer of the child victim. Investigation will sometimes discover that the child victim has made as many, if not more, mis- representations than the offender; nevertheless, they have been seduced and manipulated by a clever offender and usually do not fully understand or recog- nize what they were getting into. The child victim may, however, believe that the offender is a "true love" or rescuer with whom they want to have sex. Even if they do fully understand, the law is still supposed to protect them from adult sexual partners. Consent should not be an issue with child victims. Investigators must recognize and deal with these dynamics when interviewing these online child victims. (See the chapters titled "Acquaintance-Exploitation Cases," beginning on page 47, and "Investigating Acquaintance Sexual Exploitation" beginning on page 101.) Identified victims, even those whose abuse did not involve a computer, should be interviewed about their knowledge of the offender's use of a computer. In particular they may know details such as the offender's passwords. When law-enforcement officers are pretending to be children as part of authorized and approved proactive investigations, they must remember that the 98 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728726 number of potential offenders is proportional and the "appeal" of the case is inversely proportional to the "age" of the "victim." Because there are far more potential offenders interested in older children, pretending to be a 15- or 16-year- old will result in a larger online response. The resulting case, however, will have far less jury appeal. Pretending to be a 5- or 6-year-old is unrealistic. Most online undercover investigators claim to be 12, 13, or 14 years old. If you can effectively pretend to be a 12-year-old, it seems to make less sense to pretend to be a 13- or 14-year-old. One alternative used by many investigators is to pretend to be an adult with access to young children. Investigators must also remember that when pretending to be a boy online, the "relationship" usually moves a lot faster, and they must be prepared to take appropriate action faster. Because of delays in communicating details from proactive investigations, stale- ness is a common problem in computer-exploitation cases. It may take weeks or months for the details learned from an undercover Internet investigation in one part of the country to be disseminated to investigators with jurisdiction over the target computer in another part of the country. Obviously the best way to address the staleness of probable cause is to "freshen" it up with current investigation and information. As stated in the chapter titled "Collection of Child Pornography and Erotica," beginning on page 61, staleness can also be addressed with an "expert" search warrant, but before doing so prosecutors should do legal research and be aware of appellate decisions that support this approach. They should also be aware of Congressional "Finding" #12 in the Child Pornography Prevention Act of 1996 which states, "prohibiting the possession and viewing of child pornography will encourage the possessors of such material to rid themselves of or destroy the material...." I am not sure what this "finding" is based on, but it is contrary to what I have learned in my many years of studying preferential sex offenders and their demonstrated need to collect and po ts child pornography. It has been my experience that the true preferential sex offender will not rid himself of or destroy his collection simply because possessing it is illegal. Most importantly this finding is contrary to what is usually stated in such expert search warrants. Another way to address "staleness" is to recognize that the information in question may not be stale. It is a matter of differing opinion as to when the informational basis for probable cause in a computer case becomes stale. Some prosecutors say in days. Others say weeks, and most say months. I believe that the time interval varies based on the type of information. Because of characteris- tics of technology and human behavior, probable cause about information on a computer should not even be considered stale for at least one year. It is not easy to effectively delete the information on a computer even when you try. Further- more most people do not delete the information on a regular basis. Such editing of a computer is likely to occur less often than cleaning out the garage, attic, or basement. Because this is a common human characteristic, it should not require the opinion of an expert. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 99 EFTA01728727 Investigating Acquaintance Sexual Exploitation This chapter is intended to offer general guidelines on how to apply the previ- ously discussed behavioral dynamics to the investigation and prosecution of cases of sexual exploitation of children perpetrated by acquaintance molesters. Intrafamilial, child-sexual-abuse cases can be difficult to prove in a court of law. Frequently there is only the word of one child against that of an adult. This is, however, rarely the case in child-sexual-exploitation cases especially those involv- ing preferential sex offenders. With multiple victims, no one victim should have to bear the total burden of proof, and cases should rarely, if ever, be severed for prosecution. The best victims and cases should be selected for prosecution. It will be extremely difficult to convict a prominent, well-respected member of the com- munity based only on the testimony of one troubled, delinquent adolescent or one confused, naive young child. It is commonly accepted that child sexual victimization is a complex problem requiring the efforts and coordination of many agencies and disciplines. No one agency or discipline possesses the personnel, resources, training, skills, or legal mandate to deal effectively with every aspect of child maltreatment. In this context law enforcement interacts with a variety of professions and agencies dur- ing the investigation process. For example some offenders cross jurisdictional boundaries, and many violate a variety of state and federal laws when exploiting children. This often will mean working with other local, state, and 'federal law-enforcement agencies in multijurisdictional investigative teams and with pros- ecutors, social services, and victim assistance in multidisciplinary teams. This can be done as part of informal networking or a formal task force. The multidisciplinary approach not only is advantageous in avoiding duplication and making cases but is also in the With multiple victims, no one best interests of the child victim. It may minimize the num- victim should have to bear ber of interviews and court appearances and provide the the total burden of proof and victim with needed support. The team approach can also help investigators deal with the stress and isolation of this cases should rarely; if ever, work by providing peer support. The multidisciplinary be severed for prosecution. approach is mandated statutorily or authorized in the majority of states and under federal law (U.S. Department of Justice, 1993). Working together as part of a multidisciplinary team means coordination not abdication. Each discipline performs a function for which it has specific resources, training, and experience. Although each discipline must understand how its role contributes to the team approach, it is equally important that it understands the respective responsibilities and limitations of that role. For example child-protec- tion agencies usually cannot get involved in cases in which the alleged perpetrator is not a parent or caretaker (i.e., acquaintance molester). The team approach is a two-way street. Just as medical and psychological professionals are charged with evaluating and treating the abused or neglected child, law-enforcement investigators are responsible for conducting criminal CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 101 EFTA01728728 investigations. Just as law-enforcement officers need to be concerned that their investigation• might further traumatize a child victim, therapists and physi- cians need to be concerned that their treatment techniques might hinder the investigation. The Law-Enforcement Perspective The law-enforcement perspective deals with criminal activity and legally defensible fact-finding. The process must, therefore, focus more on ■ admissible evidence of what happened than on emotional belief that some- thing happened ■ the accuracy than on the existence of repressed memory ■ objective than on subjective reality ■ neutral investigation than on child advocacy In their desire to convince society that child sexual victimization exists and children do not lie about it, some professionals interpret efforts to seek corrobora- tion for alleged sexual victimization as a sign of denial or disbelief. Corroboration, however, is essential. Investigators cannot just accept that something sexual hap- pened to a child and ignore the context details that are necessary if it is to be proven in a court of law. When the only evidence offered is the word of a child against the word of an adult, child sexual victimization can be difficult to prove in a court of law. It is not the job of law-enforcement officers to believe a child or any other victim or witness. The child victim should be carefully interviewed. The information obtained should be assessed and evaluated, and appropriate investigation should be conducted to corroborate any and all aspects of a victim's statement. The investigator should always be an objective fact-finder considering all possibilities and attempting to determine what happened with an open mind. As previously stated, in a valid case, the best and easiest way to avoid child-victim testimony in court is to build a case so strong that the offender pleads guilty. Most children, however, can testify in court if necessary. Emotion Versus Reason Regardless of intelligence and-education, and often despite common sense and evidence to the contrary, adults tend to believe what Regardless of intelligence they want or need to believe. The greater the need, the and education, and often greater the tendency. The extremely sensitive and emotional despite common sense and nature of child sexual exploitation makes this phenomenon evidence to the contrary, a potential problem in these cases. For some no amount of training and education can overcome this zealotry. Some adults tend to believe what people seem to be incapable of becoming objective fact- they want or need to believe. finders in some sexual-victimization-of-children cases. The greater the need, the Investigators must evaluate this tendency in other inter- veners and minimize it in themselves by trying to do their greater the tendency. job in a rational, professional manner. In order to be effective interviewers, investigators must be both aware of and in control of their own feelings and beliefs about victims and offenders in child-sexual-exploitation cases. People in the United States tend to have ste- reotypical concepts of the innocence of children and malevolence of those who sexually victimize them. Most investigators now know that a child molester can look like anyone else and may even be someone we know and like. As previously discussed the stereotype of the child victim as a completely innocent 102 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728729 little girl, however, is still with us and less likely to be addressed by lay people and even professionals. In reality child victims of sexual abuse and exploitation can be boys as well as girls, and not all victims are "angels" or even little." The idea that some children might enjoy certain sexual activity or behave like human beings and engage in sexual acts as a way of receiving attention, affection, gifts, and money is troubling for society and many investigators. . Depending on the nature of the abuse and techniques of the offender, investigators must understand that the The idea that some children victim may have many positive feelings for the offender and even resent law-enforcement intervention. The might enjoy certain sexual investigator must be able to discuss a wide variety of sexual activity or behave like human activities, understand the victim's terminology, and avoid beings and engage in sexual being judgmental. Not being judgmental is much more acts as a way of receiving difficult with a delinquent adolescent engaged in homo- sexual activity with a prominent clergyman than with a attention, affection, gifts, and sweet 5-year-old girl abused by a low-life" stranger. Inves- money is troubling for society tigators often nonverbally communicate their judgmental and many investigators. attitude through gestures, facial expressions, and body l
ℹ️ Document Details
SHA-256
c2224ada26d91da460ef706ebd8e243dcf4c6fddddfcd07956928ede6b48733b
Bates Number
EFTA01728716
Dataset
DataSet-10
Document Type
document
Pages
72

Comments 0

Loading comments…
Link copied!