Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 25, 2024 Mon

Time: 8:06 pm

Results for child grooming

13 results found

Author: Randhawa, Trisha

Title: Child Grooming:

Summary: In recent months a number of reports have been released that have brought child sexual abuse to the forefront of the public debate. In particular, the report by the Victorian Parliamentary Inquiry into the Handling of Child Sexual Abuse by Religious and Other Non-Government Organisations, Betrayal of Trust and the Department of Justice's Review of Sexual Offences: Consultation Paper, have led to calls for the introduction of a specific offence related to the grooming of children with the intent to sexually abuse them. Children are trusting and they rely on adults for love and support; when this trust is violated it has immeasurable impacts on their sense of self. The sexual abuse and rape of children is a crime that causes immense damage to a child across their entire life. The grooming of a child is a preparatory act essential to the subsequent crime of child sexual abuse - it is critical to recognise that the two elements are inextricably linked. Only through realising the importance of grooming as a stage in the sexual abuse of a child can effective interventions and preventative measures be implemented. The earlier abusive and grooming behaviours are detected, the less harm caused to the child. If the legislation is comprehensive, effective, and well implemented, police will be able to intervene at every stage of the child abuse process - from grooming, to encouragement, to actual abuse. The introduction of grooming legislation can only improve our ability to protect children. This report, completed as part of a Victorian Law Foundation grant awarded to Child Wise, is aimed at providing advice and guidance to legislators and practitioners as they consider the introduction of offences specifically targeting the grooming of a child.

Details: South Melbourne, VIC, AUS: Child Wise, 2013. 44p.

Source: Internet Resource: accessed August 17, 2015 at: http://childwise.blob.core.windows.net/assets/uploads/files/Grooming%20-%20Exploring%20the%20call%20for%20law%20reform%20-%20Child%20Wise%20(Web).pdf

Year: 2013

Country: Australia

URL: http://childwise.blob.core.windows.net/assets/uploads/files/Grooming%20-%20Exploring%20the%20call%20for%20law%20reform%20-%20Child%20Wise%20(Web).pdf

Shelf Number: 136443

Keywords:
Child Grooming
Child Sexual Abuse
Sex Offenses

Author: Palmer, Donald

Title: Final report: The role of organisational culture in child sexual abuse in institutional context

Summary: This report analyses the role that organisational culture plays in child sexual abuse in institutional contexts. It specifically considers how organisational culture can affect the perpetration and detection of child sexual abuse and the responses to child sexual abuse in institutional contexts. The report also develops suggestions for addressing child sexual abuse in institutional contexts that are based on its analysis. These suggestions are geared towards reducing the incidence of child sexual abuse, detecting abuse earlier and improving the responses to abuse in institutional contexts. Definitions employed in the analysis The report uses definitions of child sexual abuse and institutional contexts stipulated by the Royal Commission into Institutional Responses to Child Sexual Abuse that are broad in scope and largely consistent with definitions found in the literature. Child sexual abuse is defined as 'any act that exposes a child to, or involves a child in, sexual processes beyond his or her understanding or contrary to accepted standards' as well as 'actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child to lower the child’s inhibitions in preparation for sexual activity'. Institutional contexts are defined as 'any public or private body, agency, association, club, institution or other entity or group of entities of any kind' that provides services to children. The report uses a conception of organisational culture specified by the Royal Commission that is based on Palmer (2012). This conception understands culture to consist of content and form. Cultural content includes assumptions (most importantly, presumptions of fact regarding people's attitudes and behaviours), values and beliefs (most importantly, understandings regarding the virtue of alternative ways to think and act) and norms (expectations regarding how people should think and behave). Forms include artefacts and practices that symbolically convey cultural content. Methodology of the analysis The report’s analysis is based on two bodies of theory and research. It builds on a systematic search of literature on the role that culture plays in child sexual abuse in institutional contexts, which included 41 articles and books. It also builds on the author's knowledge of the role that culture plays in misconduct in and by organisations more generally, which is examined in his published and forthcoming works (Greve, Palmer & Pozner, 2010; Palmer, 2012; Palmer, 2013; Palmer & Feldman, 2013; Palmer, Smith-Crow & Greenwood, 2016; Palmer & Moore, 2016; Palmer forthcoming).

Details: Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse, 2016. 111p.

Source: Internet Resource: Accessed December 8, 2016 at: http://www.childabuseroyalcommission.gov.au/getattachment/c9d090b0-cc5a-4013-b78e-3591ad50db3d/The-role-of-organisational-culture-in-child-sexual

Year: 2016

Country: Australia

URL: http://www.childabuseroyalcommission.gov.au/getattachment/c9d090b0-cc5a-4013-b78e-3591ad50db3d/The-role-of-organisational-culture-in-child-sexual

Shelf Number: 144431

Keywords:
Child Grooming
Child Sexual Abuse
Juvenile Sex Offenders

Author: Saunders, Vicky

Title: Help-seeking needs and gaps for preventing child sexual abuse

Summary: The Royal Commission into Institutional Responses to Child Sexual Abuse (the Royal Commission) commissioned the Institute of Child Protection Studies at Australian Catholic University to carry out a research project, aiming to explore: the service needs and help-seeking behaviours of professionals, parents and community members concerned about the behaviour of an adult who is exhibiting potentially sexually harmful behaviour towards a child (including grooming, sexually inappropriate online behaviour and use of child pornography) the help-seeking needs and behaviours of professionals, parents and community members concerned about a child who is exhibiting potentially sexual, harmful behaviour the help-seeking needs and behaviours of individuals concerned that they may sexually harm or otherwise abuse a child the functions and effectiveness of existing services tasked with responding to the needs of these target groups, including the knowledge, skills and abilities required of practitioners responding to target groups' service needs. This research project will make an important contribution to informing the Royal Commission about how to better prevent child sexual abuse, including child sexual abuse in institutional contexts.

Details: Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse, 2017. 103p.

Source: Internet Resource: Accessed March 23, 2017 at: http://www.childabuseroyalcommission.gov.au/getattachment/59a45327-bcdd-41a8-a682-4bae997d87f6/Help-seeking-needs-and-gaps-for-preventing-child-s

Year: 2017

Country: Australia

URL: http://www.childabuseroyalcommission.gov.au/getattachment/59a45327-bcdd-41a8-a682-4bae997d87f6/Help-seeking-needs-and-gaps-for-preventing-child-s

Shelf Number: 144548

Keywords:
Child Grooming
Child Pornography
Child Protection
Child Sexual Abuse
Sex Offenders

Author: O'Leary, Patrick

Title: Grooming and child sexual abuse in institutional contexts

Summary: Recent efforts to clarify definitions of grooming in research reflect an increased awareness of the diverse range of settings in which grooming may occur, as well as the diverse range of targets and purposes of grooming techniques. Grooming can be defined as: The use of a variety of manipulative and controlling techniques; with a vulnerable subject; in a range of inter-personal and social settings; in order to establish trust or normalise sexually harmful behaviour; with the overall aim of facilitating exploitation and/or prohibiting exposure. (McAlinden, 2012, p.11) Grooming can involve a range of behaviours that seek to build trust with and increase access to a child, and cement the authority of the perpetrator and/or compliance of a child to perpetrate or continue to perpetrate child sexual abuse. Grooming and related techniques are difficult to identify and define. Grooming includes numerous techniques, many of which are not explicitly sexual or directly abusive in themselves (McAlinden, 2006). Some grooming techniques can co-exist with other regular behaviour or functions within an otherwise normal relationship with a child. Given this, a key difficulty in identifying grooming is that it consists of many discrete acts that, on their own, are not necessarily criminal or abusive (Bennett & O'Donohue, 2014), and is distinguishable only by the perpetrator's motivation to facilitate and/or conceal child sexual abuse. This paper provides an overview of key conceptual issues in the definition and understanding of grooming. It takes a narrative review approach to synthesising key literature, drawing on an understanding of perpetrator modus operandi. It identifies and discusses what is known about grooming, particularly as it relates to institutional child sexual abuse.

Details: Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse, 2017. 34p.

Source: Internet Resource: Accessed May 2, 2017 at: https://www.childabuseroyalcommission.gov.au/getattachment/b8c8cc19-ad65-44f5-951e-3b1705156da2/Grooming-and-child-sexual-abuse-in-institutional-c

Year: 2017

Country: Australia

URL: https://www.childabuseroyalcommission.gov.au/getattachment/b8c8cc19-ad65-44f5-951e-3b1705156da2/Grooming-and-child-sexual-abuse-in-institutional-c

Shelf Number: 145237

Keywords:
Child Grooming
Child Sexual Abuse
Corrections-Based Sexual Abuse
Institutional Abuse
Institutional Care

Author: Radford, Lorraine

Title: A review of international survey methodology on child sexual abuse and child sexual exploitation

Summary: This review was commissioned by the Centre of expertise on child sexual abuse to inform its work on improving data currently collected in England and Wales. Unlike previous reviews which have looked at findings on prevalence rates within and across different countries, this study looked at differences in self-report survey methodologies to research rates of victimisation and perpetration. The aims of the review were to: - identify methodologically different surveys undertaken in countries outside England and Wales that specifically focus on, or include, child sexual abuse (CSA) - identify questions used in surveys to assess the scale and nature of CSA - including any questions regarding child sexual exploitation (CSE), and those exploring abuse or grooming that takes place online - and comment on their relative effectiveness - explore the survey methods used, and identify what worked well in achieving a good response rate - explore the sampling strategies used, including any use of booster samples to reach underrepresented or identified vulnerable groups - identify questions, survey methods and sampling strategies used to explore potential and actual perpetration of CSA - discuss what identified good practice would be replicable in the UK context, and to what extent this would allow comparisons to be made across countries.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 66p.

Source: Internet Resource: Accessed February 22, 2018 at: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/

Year: 2018

Country: International

URL: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/

Shelf Number: 149212

Keywords:
Child Grooming
Child Pornography
Child Sex Offenders
Child Sexual Abuse
Child Sexual Exploitation
Computer Crimes
Internet Crimes
Sex Offender Treatment
Sex Offenders

Author: Davidson, Julia

Title: Enhancing Police and Industry Practice: EU Child Online Safety Project

Summary: This report draws together the findings from the European Child Online Safety Project which was funded by the European Commission ISEC fund. The project was led by Professor Julia Davidson Middlesex University, UK with partners from University of Tilburg, Netherlands; University of Kore, Enna, Italy; Cyberpsychology Research Centre, Royal College of Surgeons; and the Geary Institute, University College Dublin, Ireland; and FDE Institute of Criminology, Mantova, Italy. The project sought to draw together the evidence base on online offender and victim behaviour including: - online grooming; - possession, collection and distribution of indecent child images; - Identification of policing and industry best practice in prevention. The project also sought to promote cooperation between law enforcement and industry in developing and disseminating good practice models in the area of online CSA. Through collaboration, this will ultimately assist practitioners and professionals: - To develop effective prevention techniques; - In early detection and deterrence; - With the provision of valid and recent research. The project had three primary and interdependent objectives: 1. Link project specific risk characteristics with other risk factors for grooming, like risk-taking and sexual orientation concerns; 2. Creation of victim typologies of cyber-grooming to assist with identification of vulnerable individuals and groups; 3. Development of 'Best Practice' guidelines for industry and law enforcement in the identification and prevention of online childhood sexual abuse.

Details: 168p.

Source: Internet Resource: Accessed March 8, 2018 at: https://www.mdx.ac.uk/__data/assets/pdf_file/0017/250163/ISEC-report-FINAL.pdf

Year: 2017

Country: Europe

URL: https://www.mdx.ac.uk/__data/assets/pdf_file/0017/250163/ISEC-report-FINAL.pdf

Shelf Number: 149405

Keywords:
Child Grooming
Child Pornography
Child Protection
Child Sexual Abuse
Online Victimization
Social Media

Author: Independent Inquiry Into Child Sexual Abuse

Title: Child sexual abuse in custodial institutions: A rapid evidence assessment

Summary: Child sexual abuse (CSA) involves forcing or enticing a child or young person under the age of 18 to take part in sexual activities. It includes contact and non-contact abuse, child sexual exploitation (CSE) and grooming a child in preparation for abuse. As part of its work the Inquiry is undertaking an investigation into the extent of any institutional failures to protect children from sexual abuse and exploitation while in custodial institutions. The investigation will consider the nature and scale of child sexual abuse within the youth secure estate in addition to institutional responses to the sexual abuse of children in the youth secure estate. The rapid evidence assessment (REA) has been carried out to inform the investigation by reviewing the existing research evidence base. The REA explores the following: - Evidence related to the prevalence of child sexual abuse in custodial institutions; - Socio-demographic characteristics, both of victims and perpetrators; - The factors associated with failure to protect or act to protect children in the care of custodial institutions; - The nature of the safeguarding systems in place and how they have changed over the years; - Recommendations in the literature regarding how those systems may be improved to better protect children in custody from sexual abuse.

Details: London: The Independent Inquiry, 2018. 161p.

Source: Internet Resource: Accessed April 28, 2018 at: https://www.iicsa.org.uk/investigations

Year: 2018

Country: United Kingdom

URL: https://www.iicsa.org.uk/investigations

Shelf Number: 149946

Keywords:
Child Grooming
Child Sexual Abuse
Child Sexual Exploitation
Custodial Institutions
Juvenile Detention Centers
Juvenile Inmates

Author: Independent Inquiry Into Child Sexual Abuse

Title: Cambridge House, Knowl View and Rochdale: Investigation Report

Summary: This investigation report concerns child sexual abuse in Rochdale, relating to Cambridge House, Knowl View School and the late Cyril Smith. We are primarily concerned with the institutional responses of Rochdale Borough Council, the police and the Crown Prosecution Service. Smith first came to prominence as a local councillor, then Mayor and later as Member of Parliament from 1972 until his retirement in 1992. He died in 2010. Cambridge House was a hostel for working boys run by a voluntary organisation of which Smith was Honorary Secretary, and was open from 1962 to 1965. He had ready access to the boys living in the hostel, allegedly facilitating his sexual abuse of them under the guise of 'medical examinations' including, in most cases, of a boy's private parts. He also administered punishment for truancy, illness or absconding, which included spanking a bare bottom. He told police in a written statement in 1970 that at all times he was acting 'in loco parentis' to the boys, but we found it inexplicable that he thought his role permitted 'medical examinations' when he had no medical qualifications. He had considerable control over which boys were admitted to the hostel and, in general, showed a strong, perhaps unduly detailed, interest in children in care as his political career developed. This interest appeared to go unchallenged by the Council. Cyril Smith's prominence and standing in Rochdale allowed him to exert influence on others locally - in particular, to put pressure on them to keep quiet about any allegations of abuse. Although the Lancashire Constabulary investigation into Smith pursued the allegations robustly and diligently, the Director of Public Prosecutions advised that there should be no prosecution. It has been suggested that Smith or his supporters may have exerted improper influence on the Director of Public Prosecutions, but there is no evidence to support such an allegation. Valuable opportunities were, however, lost in 1998 and 1999 to charge and prosecute Smith during his lifetime, and for the complainants of his alleged abuse to seek justice. Smith's standing in public life increased, and in 1988 he was awarded a knighthood for his political services. It is clear that there were some frank discussions at the highest political level about the rumours in circulation about him, with no obvious concern for alleged victims. Rather, the concern was about what would be fair to Smith and whether the honours system might subsequently be brought into disrepute. We concluded that this demonstrated a considerable deference to power and an unwillingness to confront the possibility that a person of public prominence might be capable of perpetrating sexual abuse. Cyril Smith's links to Knowl View School in Rochdale led the Inquiry to a wider investigation of that school and allegations of sexual abuse by other individuals of children who lived there. It was the sexual abuse of children by others that became the focus of the Inquiry's investigation. We heard from complainants of sexual abuse who had been at Knowl View School in a period extending over 25 years, beginning in 1969. The evidence demonstrated that the children who attended the school had a range of complex needs, including learning disabilities, autism and mental health. Many had also suffered from adverse experiences in their family life and had already been abused. We concluded that, far from taking additional steps to protect these children, the school and other institutions had come to regard their sexual abuse while at Knowl View as almost expected, or as something that could not be prevented. The children's experience of the school was extremely poor at the most basic level of the fabric of the building, which bore no resemblance to a homely environment. Nor was the school safe, secure, caring or therapeutic. It was supposed to offer education and care, but in reality it offered neither in any way that could be seen as adequate, let alone nurturing. The institution failed in its basic function to keep children in its care safe from harm and, in particular, safe from sexual harm, both within and outwith the school. Child sexual abuse involving children from Knowl View occurred from its early years onwards. Within the school there was sexual abuse of boys by staff, and of younger boys by older ones. Sexual exploitation of some boys was also taking place in Rochdale town centre, in the public toilets and bus station, by men paying for sex. Some boys were also trafficked to other towns for that purpose. In a particularly shocking incident in 1990, Roderick Hilton, a known sex offender who had previously been convicted of sexually abusing a boy at Knowl View in 1984, gained access to the school and the boys over two nights, when he indecently assaulted at least one of them. Hilton was well known to the staff of the school, who did nothing over many years to deter him targeting the school. He was imprisoned in 1991 for a series of child sexual offences. Despite this, on his release from prison on licence, he continued to be a malign presence at the school, 'little' was done to stop Hilton's continued access to the grounds and buildings. For most of the school's existence, staff were at best complacent but arguably complicit in the abuse they knew to be taking place, and they must take their share of the blame for what was allowed to occur. It was our strong conclusion that Knowl View staff simply treated the sexual abuse between boys as 'normal', without differentiating between what was experimentation and what was coercive and intimidating. There was little evidence that the school appreciated the profound harm that peer-on-peer sexual abuse could cause. Sexual exploitation of children from the school at Smith Street public toilets was known about by the authorities from at least 1989. Indeed, some Social Services' staff could see the toilets from their offices, recognised some of the boys as children in care and were deeply suspicious of what was going on, although there was no apparent follow-up. The records of individual children convey a total lack of urgency on the part of the authorities to address the problem and treat the matters involved for what they were - serious sexual assaults. One boy's file recorded that he had contracted sexually transmitted hepatitis through 'rent boy' activities. We concluded that no one in authority viewed any of this as an urgent child protection issue. Rather, boys as young as 11 were not seen as victims, but as authors of their own abuse. Subsequent police show that the police did not turn a blind eye to the sexual exploitation of boys in Rochdale town centre. They knew children were being exploited in Smith Street toilets, but did not obtain sufficient evidence to prosecute. There is evidence of a willingness on the part of police officers to investigate. Nevertheless, the records that survive do not provide any satisfactory answer as to why police did not charge anyone, despite knowing the names of men involved and obtaining some disclosures from the boys who were victims. etc.

Details: London: The Independent Inquiry. 2018. 167p.

Source: Internet Resource: Accessed April 28, 2018 at: https://www.iicsa.org.uk/document/cambridge-house-knowl-view-and-rochdale-investigation-report-april-2018

Year: 2018

Country: United Kingdom

URL: https://www.iicsa.org.uk/document/cambridge-house-knowl-view-and-rochdale-investigation-report-april-2018

Shelf Number: 149947

Keywords:
Child Grooming
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation
Custodial Institutions
Juvenile Detention Centers
Juvenile Inmates

Author: Bentley, Holly

Title: How Safe are Our Children? The Most Comprehensive Overview of Child Protection in the UK: 2018

Summary: Technology is central to children's lives. In 2017, just over half of children aged 12 had at least one social media account, despite the minimum age requirements for many sites being 13. By age 13, that figure rises to nearly three-quarters. Today's children don't see the division between 'online' and 'offline' worlds. Social media is now a ubiquitous part of childhood, but alongside wonderful opportunities, it opens up an array of potential harms. For too long, social networks have been allowed to treat child safeguarding as an optional extra. We don't have the same protections in place online as offline, and the result is that children are exposed to unacceptable risks, in the spaces where they socialise, trust, and play. After a decade of inaction, the challenge we face is now immense, but not insurmountable. The scale and complexity of the online threat is growing. Most platforms have failed to integrate child safeguarding into their business models or the design of their platforms. Rapidly developing technology creates new opportunities to initiate, maintain and escalate abuse. As this year's How safe are our children? report makes clear, tackling these risks is now at the frontline in the fight for every childhood. What are the risks to children on social networks? Social media is part of the fabric of children's lives. Every moment, every experience is something to be captured online. Posts on social media aren't just a catalogue of 'real' life, they are an integral part of it. The ubiquity of social media carries many risks, from exposure to inappropriate and sexualised content, to the production and distribution of child abuse imagery, through to the growing scale of technology-facilitated grooming. Platforms provide new opportunities to initiate and facilitate abuse. With so many children using social networks, gaming and messaging sites, it means that today's children and young people are increasingly exposed to the threat of abuse or exploitation, from both adults and their peers Through the ease of access afforded by smartphones, groomers can target significant numbers of children, and quickly escalate and maintain their abuse. Groomers can readily move children into the shadows, moving children from well-known platforms to encrypted and hidden sites. New types of technology, notably livestreaming, provide new opportunities for abusers to control and coerce children into increasingly extreme forms of abuse. Self-generated imagery is a considerable issue, accounting for around a third of recent images removed by the Internet Watch Foundation (IWF). Although children do not perceive a difference between their online and offline worlds, evidence suggests that lowered inhibitions can mean that children comply with requests that they would not offline. Once a self-generated image has been taken, it opens the door for exploitation and blackmail (including to prevent disclosure). The impact of losing control over an image can be devastating, particularly when it is shared among peers' social networks, sent to family members, or shared much more widely. Social networks have consistently failed to address these problems - and it is clear that their unwillingness to do so has actively fuelled the scale and extent of the risks that children now face. Platforms have failed to build in adequate safeguarding protections, take steps to proactively tackle grooming, and to do enough to proactively tackle child sexual abuse imagery at source. Successive governments have also repeatedly failed to intervene, placing disproportionate weight on the claims made by industry. As a result, for over a decade, social networks have repeatedly failed to protect their child users.

Details: London: NSPCC, 2018. 88p.

Source: Internet Resource: Accessed June 21, 2018 at: https://www.nspcc.org.uk/globalassets/documents/research-reports/how-safe-children-2018-report.pdf?utm_source=Adestra&utm_medium=email&utm_content=How%20safe%20are%20our%20children%3F%20The%20most%20comprehensive%20overview%20of%20child%20protection%20in%20the%20UK.&utm_campaign=nitl-newsletter

Year: 2018

Country: United Kingdom

URL: https://www.nspcc.org.uk/globalassets/documents/research-reports/how-safe-children-2018-report.pdf?utm_source=Adestra&utm_medium=email&utm_content=How%20safe%20are%20our%20children%3F%20The%20most%20comprehensive%20overview%2

Shelf Number: 150628

Keywords:
Child Abuse
Child Exploitation
Child Grooming
Child Protection
Internet Crimes
Online Safety
Online Victimization
Social Media

Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Sexual Extortion and Nonconsensual Pornography

Summary: The rapid evolution of technology and the increasingly widespread use of the Internet, have changed the face of child sexual exploitation globally. Child sexual exploitation includes, but is not limited to: enticing, manipulating, or threatening a child into performing sexual acts in front of a webcam; grooming children online with the goal of sexually exploiting them; and distributing child sexual abuse material online.2 Sex offenders have become proficient in using technology to engage in child sexual abuse by utilizing the Internet as a vehicle to meet children in order to prepare them for sexual encounters, or even to target, manipulate, and lure them into sex trafficking. While the vulnerability of children to sexual predators is not new, the tools predators use and the language to describe various types of online child sexual abuse have changed remarkably. Two forms of online child sexual exploitation have emerged as pervasive threats to children's safety around the world: sexual extortion, commonly referred to as "sextortion," and nonconsensual pornography or nonconsensual sharing of intimate images, also often referred to as "revenge pornography."

Details: Alexandria, VA: The Centre, 2018.46p.

Source: Internet Resource: Accessed November 15, 2018 at: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Year: 2018

Country: International

URL: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Shelf Number: 153477

Keywords:
Child Grooming
Child Pornography
Child Protection
Child Sexual Exploitation
Online Child Sexual Abuse
Revenge Pornography
Sextortion
Social Media

Author: Maxim, Donald

Title: Online Child Exploitation Material - Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children's eSafety Commissioner

Summary: This report by the ANU Cybercrime Observatory provides an overview of three important areas for Child Exploitation Material (CEM): - The relationship between online and offline offending; - Horizon scanning - identifying emerging areas of CEM development; and - Current regulatory, educational and collaborative approaches to combatting CEM Each section provides an overview of the issue and further analysis of other key areas identified during the research phase. At the conclusion of each section, a brief annotated bibliography is available to provide insight into which sources may be useful for further investigation. Information for this report was derived from many and varied sources including but not limited to government agencies (national and international), non-governmental organisations, academic articles, law enforcement agencies, blogs, tech websites, product sites, online news articles and surveys. While investigating each area, the research team worked within the scope of online CEM and aimed to provide a substantial overview for each section by addressing some of the key points or emerging trends. However during the research phase several areas that were not initially considered for the report were later identified as key areas of development for online CEM (e.g. Virtual Reality and Applications). Accordingly these topics were also included in the report. The relationship between online and offline sexual offending is highly controversial and complex. It is clear that research is lacking in this area and current research presents insufficient evidence for establishing a causal relationship between online and offline offending. Apart from addressing some of the methodological limitations of research in this area, this section of the report also addresses how the internet or technological advances (e.g. Virtual Reality) may assist in the desistance of offending or exacerbate motivations to commit real life offenses. The second section presents several emerging issues in online CEM and aims to provide a brief but comprehensive insight into how these areas are developing. The various topics include live streaming, applications, online gaming, user-generated content, Darknet, hacking, phishing, emerging technology and Virtual Reality (VR). Some of these concepts are quite traditional (e.g. user-generated content) however it is the development of 'cyber' and 'technology', which frames them as emerging issues. Other topics (e.g. live streaming or VR) present new, unique challenges to combatting online CEM. Some topics include snapshots of current cases such as the Pokemon Go trend, the Australian schools online pornography website, and interactive VR brothels and their implications for CEM. The final section discusses trends and effectiveness of current regulatory, educational, and collaborative approaches to CEM. Regulatory methods include ISP and social media regulation, parental control tools, and the potential for app regulation is also briefly mentioned. Key educational approaches include online safety guides and training courses. Collaborative prevention measures include hotlines, the National Centre for Missing and Exploited Children (NCMEC), Child Rescue Coalition, and the Virtual Global Taskforce (VGT). While these CEM prevention methods have made notable differences in detection and removal of CEM the effectiveness of education of the public, generation of reports, self-reporting, and tracking of child predators remains empirically untested. Technology is continually evolving and it is difficult to predict or evaluate emerging issues. The research team found it challenging to identify substantial information that can be verified by current research. This was particularly the case when analysing cutting edge or new technology as well as evaluating the effectiveness of current prevention approaches. This report aims to provide a reference point for further analysis and research on the topics addressed. Challenges associated with the cyber sphere and the 'Internet of Everything' do not remain static. The degree of facilitation (e.g. Virtual Private Networks, digital currency) and convergence associated with online CEM are continuously evolving in step with changes in technology. The rapid rate of change is the key challenge for the development of effective prevention strategies. This was demonstrated while our research was underway. Innovation, usually an adaptation of existing software or technology that was not initially present was later identified as a key developing area in online CEM (e.g. Virtual Reality and software applications). The Pokemon Go craze, which quickly attracted malware and grooming is a good example of the misuse of a popular apps. The velocity and variety of new and emerging risks with potential impact on online CEM will require, as a priority, the means to monitor these developments. The increase and rapid distribution of user-generated content is especially concerning. One aspect, consensually shared or 'stolen' sexualized images has given rise to 'sextortion', which can be propagated with the development of 'apps' that can inadvertently enhance and facilitate online CEM. Equally concerning are the implications of Virtual Reality (VR). VR in combination with teledildonics (or 'cyberdildonics' products designed to realise remote sex) enables potential offenders to live out any of their sexual fantasies. The VR trend may motivate offenders to seek on-line or off-line victims. The effects of VR on the conduct of pedophiles remain unclear. We don't know whether VR will placate desires or erode social inhibitions. However, VR is likely to encourage some criminals to enhance their experience by incorporating live streaming of child sex abuse with the tactile experiences promised by such technologies. The prevention of online CEM depends entirely on knowing present and emerging risks. Effective counter-measures include deep web surveillance of CEM innovators, and the development of early warning systems, for example, SNS 'swarm' warning flags.

Details: Canberra: Australian National University, Cybercrime Observatory, 2016. 105p.

Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644

Year: 2016

Country: International

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644

Shelf Number: 154957

Keywords:
Child Grooming
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Cybercrime
Internet Crimes
Online Victimization
Pornography
Sex Offending
Sextortion

Author: Williams, Mike

Title: The NSPCC'S Protect and Respect Child Sexual Exploitation Programme: A Discussion of the Key Findings from Programme Implementation and Service Use

Summary: This report presents a discussion of the key findings from the evaluation of the NSPCC's Protect & Respect programme, which ran from June 2014 to November 2017. The Protect & Respect programme, provided support to children and young people affected by sexual exploitation, and included the following: - A group work service, where NSPCC practitioners did work with small groups of children and young people (numbering between 2 and 10) on a weekly basis over a period of one to two months. - Four different types of one-to-one service. One-to-one work involved an individual NSPCC practitioner doing work with a child or young person to support them on issues relating to exploitation. The four different services covered prevention, risk reduction, child protection and recovery. Work was sometimes done with carers and professionals who supported the child or young person. - The commissioning of research into child sexual exploitation. -- One piece of research, on the link between child sexual exploitation and neglect, was commissioned and completed during the evaluation period (Hanson, 2016). - An unpublished rapid evidence assessment was conducted on research on service delivery responses to child sexual exploitation published between 2006 and 2018 (Walker et al, 2019). In particular this report summarises and discusses: - The implementation of the Protect & Respect programme. - The findings from the group work service and the one-to-one service, which are detailed more fully in two separate accompanying reports (Williams, 2019a; 2019b). This introductory chapter sets the context to the report by: - Providing a note on the NSPCC's position on the use of child sexual exploitation films and the lessons that the NSPCC has learned over the course of the programme. - Providing a note on the NSPCC's position on children and young people's agency, the use of victim-blaming language and the lessons that the NSPCC has learned over the course of the programme. - Summarising recent policy developments in the area of sexual exploitation. - Looking at the evidence base for the effectiveness of professional responses and services in working on sexual exploitation. - Describing the NSPCC's recent involvement in working with sexual exploitation and the reasons for establishing the Protect & Respect programme. - Summarising the guidance provided to NSPCC managers and practitioners on providing the Protect & Respect programme. - Describing the evaluation methodology used. The description includes an account of how the focus of the evaluation changed over the course of the data collection period.

Details: London: NSPCC, 2019. 140p.

Source: Internet Resource: Accessed May 9, 2019 at: https://learning.nspcc.org.uk/media/1699/a-discussion-key-findings-from-programme-implementation-service-use.pdf

Year: 2019

Country: United Kingdom

URL: https://learning.nspcc.org.uk/media/1699/a-discussion-key-findings-from-programme-implementation-service-use.pdf

Shelf Number: 155708

Keywords:
child Abuse and Neglect
Child Grooming
Child Pornography
Child Protection
Child Sexual Abuse
Child Sexual Exploitation

Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Technology-Facilitated Child Sex Trafficking

Summary: Trafficking of children for sexual purposes, or child sex trafficking2, is defined internationally as: the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. Exploitation shall include, at a minimum, the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery, servitude or the removal of organs. The Internet and related technologies are increasingly becoming the predominant mechanism by which children are lured, entrapped, and forced into modern-day enslavement for sexual purposes. While child sex trafficking is not a new crime, the use of technology to facilitate this crime is. As the Internet is highly unregulated and provides anonymity, accessibility, and global reach, the use of technology by traffickers will likely become even more prevalent. In general, traffickers are criminals "who enable or partake in the trade and exploitation of human beings." Online traffickers use information and communications technologies (ICTs) to seek out vulnerable children, recruit victims, and advertise/sell victims to offenders through social media, messaging applications, online ads, and peer-to-peer file sharing servers with the intent to exploit the victims for profit. Using the Internet and related technologies, traffickers may lure victims by posting false job advertisements, promising fame or money, expressing love or praise, or threatening harm or death to the victim and/or their family. Traffickers may use social media platforms to gain trust and build relationships by showing admiration or desire for the child, acting as a friend, and eventually employing tactics such as manipulation, coercion, and control to lure them away from their homes and loved ones. Child sex traffickers may be strangers, but they can also be family members, friends, guardians, or acquaintances.10 Nearly half of all identified cases of child trafficking begin with some family member involvement and the extent of family involvement in the trafficking of children is up to four times higher than in cases of adult trafficking. The high demand for children for sexual purposes has generated such high profits that many organized crime groups are turning away from other illicit activities to devote their resources to the trafficking of minors. Human trafficking appeals to criminal organizations as "it is becoming increasingly easy and inexpensive to procure, move and exploit vulnerable girls." Additionally, the relatively low risk of detection and prosecution of technology-facilitated child sex trafficking compared to the risk associated with traditional, "in-person" forms of trafficking makes online sex trafficking an attractive illegal activity in which to engage. One child can generate a profit of several thousand dollars a day for traffickers and can be abused and sold repeatedly, unlike other forms of illicit trade like drug trafficking. The International Labour Organization (ILO) estimates that "globally, two-thirds of the profits from forced labour are generated by forced sexual exploitation, amounting to an estimated US$99 billion per year." Approximately 5.5 million children under the age of 18 are forced into labor, and it is estimated that more than one million are victims of forced sexual exploitation. With the growth of Internet usage, a child's risk of being targeted increases; “technology has lowered the bar of entry to the criminal world, which has had an expansive effect on the growth of modern slavery. Our challenge is that technology is taking slavery into a darker corner of the world where law enforcement techniques and capabilities are not as strong as they are offline." Strategies to address technology-facilitated child sex trafficking must address the misuse of ICTs to facilitate it and harness the potential of ICTs to combat it The world has seen an increase in international, regional, and national laws addressing cybercrime and human trafficking; however, international law is silent on several key issues - namely, the use of ICTs to: 1) recruit child sex trafficking victims; 2) advertise the sexual services of these victims; and 3) provide or receive payments or benefits from the sexual exploitation of children. To address these legal gaps, ideally international legislation should be enacted to include: - A uniform definition of technology-facilitated child sex trafficking; - Statutes punishing the use of ICTs to recruit child victims, advertise their sexual services, and send and receive payments for sexual exploitation of children; and - Requisite punishment. The Internet has global reach, which fuels the need for international legal cooperation to develop more stringent, overt laws to protect children from technology-facilitated child sex trafficking. While vast research exists regarding child sex trafficking broadly, this paper specifically focuses on: how and why technology is increasingly used to recruit, advertise, and send/receive payments for child sex trafficking; examining available international and regional legal instruments; reviewing a sampling of relevant national legislation; presenting model legislative language for consideration; and discussing the role of the technology and financial industries to deter traffickers from misusing their platforms to sexually exploit children. The report is further intended to support and promote the United Nations Sustainable Development Goals (SDGs), in particular SDG 16.220 on ending the abuse, exploitation, trafficking, and all forms of violence against and torture of children, and contribute to reaching the goals of the 2030 Agenda for Sustainable Development by demonstrating our organizational commitment, helping raise awareness of the issues, and promoting the rule of law at the national and international levels. Additionally, the report contributes to the Implementation and Enforcement of Laws strategy, the first of the seven INSPIRE strategies developed by the World Health Organization (WHO), in particular core indicators 3.1 through 3.6 (i.e., laws and policies, awareness of laws, review of legal and policy framework)22; and helps to implement the WePROTECT Global Alliance to End Child Sexual Exploitation Online Model National Response (MNR) - specifically capabilities 2 (Research, Analysis and Monitoring) and 3 (Legislation) under Policy and Governance23.

Details: Alexandria, VA: The Centre, 2018. 50p.

Source: Internet Resource: Accessed May 10, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Year: 2018

Country: International

URL: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Shelf Number: 155745

Keywords:
Child Grooming
Child Pornography
Child Prostitution
Child Protection
Child Sexual Exploitation
Child Trafficking
Forced Labor
Modern Slavery
Online Child Sexual Abuse
Revenge Pornography
Sextortion
Social Media