Hernandez (2000) conducted a study of the 90 volunteers, 54 men had been convicted of child pornography offences (possession and distribution). Findings – Of the 54 offenders, 29 (54%) had NO documented history of contact sexual crimes based on their pre-sentence reports. 79.6% of the offenders admitted to having prior contact sexual crimes after participation in the treatment program. 62% of the offenders who had no documented sexual crimes (based on reports) admitted to having undetected contact sexual crimes. In his overall study of 90 males (which also included offenders who had made contact with children over the Internet and planned to travel to meet them) 76% had contact sexual crimes. |
Of the 1294 individuals arrested by Postal Inspectors since 1997 for using the mail and the Internet to sexually exploit children, actual child molesters were identified in 36% of the cases. In 2001 78% of child exploitation cases investigated by Postal Inspectors involved computers as well as postal violations (Source: 2001 Annual Report of Investigations US Postal Inspections Service) |
Quayle/Taylor (2002) conducted interviews with 23 men – all convicted of child pornography offences: 86.9% had traded images. 13% had produced and traded images 4.4% had engaged in the Internet seduction of a child 47.8% had committed contact offences during the period of downloading. |
Researchers from the Lucy Faithfull Foundation (LFF), suggests that that up to 20% of a conservative estimate of 320,000 suspected UK paedophiles were women.. |
MAKING OR POSESSION CHILD ABUSE IMAGES |
Pornography of all types (including child abusive images) is available from numerous web sites, either for free or for a charge. The term ‘child pornography’ is fast becoming outdated when relating to indecent sexual images of children. In this training we use and promote the use of the term "Child Abuse Images" as a more accurate descritptive for the material that offenders use and distribute. "Making" a child abuse image may refer to the taking or recording of the image but may include downloading such images from the internet. "Posession" includes hard copies of images or holding digital images in any location or device. Images refers to still images and moving images i.e. video and can include "pseudo images". These are images of children that have been adpated or edited to be sexual in their nature. "Indecent Images of Children" has been extended to include drawings, cartoons, tracings etc depicitng sexual images of or involving children. |
GROOMING |
The term grooming is used generally in child safeguarding to refer to a process of accessing a target child and overcoming their resistance. The Criminal Offence of Child Grooming is somewhat more specific however: To be convicted for the offence of grooming the offender must have made contat with a child through any medium and made arrangements to meet the child for the pupropses of engaing in sexual activity with them. |
DISTRIBUTION OF CHILD ABUSE IMAGES |
This inevitably means communicating with other paedophiles to share images (still and moving images) of child abuse, engage in discussion about child sexual abuse and conspire to commit child sexual abuse. |
WEBSITES |
Individuals with shared interests can post information and files containing images to a specific group (e.g. usenet newsgroups and bulletin boards) that has an identifiable name, which generally indicates the nature of the subject matter (Carr 2001). Bulletin boards are mediums by which users can send and receive text, engage in conversations and both upload and download files (Durkin and Bryant 1995). |
THE DARK WEB |
In the mid 1990s, US military researchers created a technology that allowed intelligence operatives to exchange information completely anonymously. They called it 'Tor', which stands for 'The Onion Router'. As part of their strategy for secrecy, they released Tor into the public domain for anyone to use. Their reasoning was simple: the more people using the system, the harder it would be to separate the government's own messages from the general noise. Tor spread widely and today, is a critical part of the so-called 'dark web': a network of untraceable online activity and hidden websites, of which Tor hosts approximately 30,000. And that anonymity has attracted a huge range of people; all who want to keep their activities hidden. |
USENET GROUPS AND BULLETING BOARDS |
Individuals with shared interests can post information and files containing images to a specific group that has an identifiable name, which generally indicates the nature of the subject matter (Carr 2001). Bulletin boards enable users to send and receive text, engage in conversations and both upload and download files. |
COMMUNITY GROUPS / ONLINE COMMUNITIES |
These are more specialist communication tools of the Internet, which allows for groups to create invitation-only communities for special interest groups – such as paedophilia. Often such groups will have methods to screen applicants i.e. ensure that they are not law enforcement agents. Typically, someone wishing to join a group may be required to make a deposit of a large number of child abuse images befoer even being accepted. |
I.R.C. - INTERNET RELAY CHAT (CHATROOMS) |
Allows a person to chat in real time using text. Often used by children, they are used by child sex-offenders as a means of seeking out potential child victims. These adults will often pose as children in order to elicit personal information including sexual orientation. The offenders can also communicate with individuals who share their interests as a way of normalising their deviant beliefs. |
PEER-TO-PEER / DIRECT CLIENT-TO-CLIENT |
This process allows a user to access the data drive of another user in order to upload and download files. ‘Paedophiles can therefore be invited to ‘visit’ somebody else’s collection and take what material they want’ (Quayle and Taylor, 2001). |
DIRECT MESSAGING |
The capability and availability of a range of devices means that it is easier now than ever before to send text messages, images and videos as live communication. |