SlideShare a Scribd company logo
1 of 13
1
RunningHead:PORTRIATOF CYBER SEXUAL PREDATOR
Portraitof a CyberSexual Predator
Donna L. LaPalm
RegisUniversity
2
PORTRAITOF A CYBER SEXUAL PREDATOR
PedophilesandHebophiles Online
The proceedingmaterial depictsthe characteristicsof anonline sexual predator,bothin
criminological theory,anddiagnostically.The male,orfemalethatperpetratesthese crimesagainstthe
victimwhichinthiscase is a child—bothprepubescent,andthroughadolescenceisthe topicof this
expose.Cyberspace isnotonlya measure inwhichtheygaincontrol overtheirvictims,itisfrequently
whatfurtherperpetuatestheirverydangerous, andlethal behaviorswhichare directedatourchildren.
Variancesinmethodsare beingutilizedtoachievewhat theycame trollingthe information
superhighwayfor:sex withminors.These criminalscome indroves, andthey support, andassistone
anotherintheirdeviate endeavors.More oftenthannot—these individuals orgroupsfeel entitledto
theirprivacy,even withtheircrimesagainst childrenbeingperpetrated Theiramendmentrightsare just
as palpable forthem,astheyare foryou andI—noncyberworldcriminals iswhatis withintheir
reasoning.
First AmendmentRights
“Congressshall make nolawrespectinganestablishmentof religion,or prohibitingthe free
exercise thereof,orabridgingthe freedomof speech,orof the press”(Hickey,2008, p. 160). “In spite of
these valiantdeclarations,there havealwaysbeenrestraintsonspeechandwritingwithbothpractical
and legal supports”(Hickey,2008,p. 160). However,the firstamendmentdoesnotallow someone to
shoutfire ina crowdedtheatre”inorderto wreakhavoc on the unsuspectedvictim(Hickey,2008; p
161). Ergo, the necessityforthisportionof the introduction;perpetratorsof deviatesexual behavior
online believe orevenproclaimthattheiramendmentrightsare beinghamperedbythese legal sanction
againstthemviewing,trading,orpostingnregardsto childpornographyor anyforumas it relatesto
thiscrime.
3
PORTRAITOF A CYBER SEXUAL PREDATOR
So whatdoesthe individual behindthe keyboardlooklike,ordresslike?Ishe or she a green
fangtoothedmonster,ora red devil withapitchforkand a tail?He or she is quite the opposite of
cartoonishdepictionsof thisevilthatisperpetratedonline.
He,or she can be as normal as you or I—oras strange as one can fantasize aboutthe inthe dark
cornersof one’smind.Theyare newspapercarriers,the elderly,theyare younger,theyare the society’s
lowly…theyare bankers,candle stickmakers,beggarsandthieves. Eithergendercanbe a cybercriminal
inthismanner,althoughthe male populationismostcommon.Variancesinage,race,creed,and
faith/religiousdenominationoccurwiththese cybercriminals (Hickey,2008).
Paraphilias: PedophiliaandHebephilia
The AmericanPsychiatricAssociation[(APA)] (2000) cite the followingasitconcernsparaphilic
disorders:theyare recurrent,intensesexuallyarousingfantasies,urges,or behaviorsgenerally1)
involvingnonhumanobjects,2) sufferingorhumiliationof oneself,ora partner,3) childor
nonconsentingpersons-thatoccurforovera periodof six months(APA,2000).
Pedophilia.
Thisterm referstosexual activitywithaprepubescentchild(13yearsoldor younger);also,the
actor must be at least16 yearsold,and at least5 yearsolderthanthe victim(APA,2000). Some of these
perpetratorspreferfemales,andsome prefermale victims—yetanothersubsetprefereither-or-
genders.Forthose deviatesthatpreferfemalesvictims,theirage preference usuallyfallsbetween8-10
yearsold;for those preferringmale victimstheirvictimsare usuallyslightlyolder.Additionally,someof
these violatorsare attractedonlytochildrenandare referredtoasthe exclusive type,andthose that
are alsoattractedto both adultsandchildrenare callednonexclusive types(APA,2000).
Hebephilia.
4
PORTRAITOF A CYBER SEXUAL PREDATOR
A subtype of paraphilia/pedophile isknownasthe hebephile:itsimplydefinesthe male,or
female whodesiresare committingsexual actsagainst children—they preferthose thatare pubescent.
Age beginsnear14 yearsold,andis within adolescence age range (Frances,2011).
Profile ofan Online Sexual Predator
What isbehindthe thoughtprocess,andthe methodtotheirdeviate madness?Considerthe
followingconcepts:
1. Theyare lookingtoremainundetectedbyL.E.and remainanonymous.
2. The internetisusedashis,or her outlet.
3. Theyare betterat interactingwithchildrenthanthe child’sownparentsattimes.
4. Theyare people thatmayalsohave access offlinetoour childrenbecause of their
professions,orvolunteeractivities.
5. Theylurkthe internetchatroomsandare devotedto learningnonsexualtopicslike
sports,popularmusicetc.in order to sparka child’sinterests, gaintrust,and gain
control of the situation.
6. Theyknowhowto bondwithchildrenviacleverconversations, until the childbecomes
more opento talkto themin depth,thusleadingtosexuallyactivityeventually(FBI,
2011).
About anOffenders Childhood.
Approximatelytwothirdsof convictedsexual offender polledinaBritishPrisonstate thatthey
were victimizedbysexual abuse atleastone time duringtheirchildhood.Inyetaseparate poll within
the UnitedStates—90%of those whohad once beenincarceratedforchildsexual abuse,spoke about
maltreatmentthatoccurredintheiryouth: thisrangedanywhere fromneglecttosevere abuse.
Additionally,70%of those thatwere incarceratedatthe time of the study,reportexperiencingsexual
5
PORTRAITOF A CYBER SEXUAL PREDATOR
abuse as children.Furthermore—boysthatwere abusedinthismannerwere more frequentlyabusedby
female relatives,andwere more likelytobecome abusersthanthose abusedbymale relatives,or
outside of the familyrelationships(Thomas,Phillips,Carlson,Shieh,Kirkwood,Cabage,&Worley,2012).
In the proceedinglist,thereideasof whathave negativeexperiencesinachildsex offender’s
childhood,thathave beenreportedbythose thathave beenconvicted:
 Parental neglect
 Experienced,orwitnessedphysical violence
 Lack of material care
 Childhoodattachmentstoparentswere more secure withthe motherthanthe father
 Reporteddistressinadulthoodfromchildhoodcausingemotionalfocusedcoping
mechanisms(e.g.fantasy)
 Lowerself esteem
 Loneliness
 In apt social skills
 Some were fromtwoparenthomes
 Some lost/neverknownone parent
 Some had neglectful-alcoholicparents
 Many experiencedchildhoodtraumafromabandonment,neglect,andemotional-
physical abuse
 Didnot fitin school
 Longedfor missedchildhood
(Thomasetal.; 2012)
Whoviews ChildPornography?
Quayle (2011). Statesthe following:“Internetsex offenseshave accountedforroughlyone third
of all sex convictions”
As itis itcommonlyknown,the use of pornographyand itscontendercyberporn–they are not
an uncommon entity asitregards childsexual abuse.Some use the internettostalk,andcapture images
of children—while some arrange secretmeetingforabuse viathe use of the internet.Itall varies
dependingoneachcriminal.
Here are some factsregardingthe cyberperpetratorsandhis victimscitedbyQuayle (2011):
6
PORTRAITOF A CYBER SEXUAL PREDATOR
[T]hey“are more likelytooffendinthe company of a male andare highlylikelytohave
experiences bothchildhoodandadulthood victimizationsatthe handsof men,andare likely todisplay
some profounddisturbancesintheirabilitytoseekandmaintainappropriate adultintimate
relationships…relationships,personal perceptionof menandboysare relativelyimmature,profoundly
disturbed,andinextricablylinkedtotheiroffendingbehaviors(Quayle,2011; p. 392).
Althoughmales are vastlymore likelytocommitcrimesinthisarena—femaleactorsperpetrate
on occasion.Lastly—inthe subsequentdata,presentedwill be more characterizesof the cyber
pornographyperpetrator:
 99% appearto be male
 The majorityare Caucasian
 Over60% showedbeingsexuallystimulatedbywayof the penal erectionafterviewing
childpornography,opposedto otheradultsviewingchildpornography.
 Childpornographyoffenderswith anykindof priorcriminal historywere more likelyto
commita contact offense,oranykindof offense withintwo-twoandahalf yearsof
beginningtheircyberpornactivity.
They Stick Togetherin Cyber-Space
Althoughthe protection,of the actor’sfreedom(thatiswhytheyremainanonymous) istheir
secondarygoal outside of theirprimarygoal of trading,viewing,andbraggingabouttheirexploitswith
children—these cybercriminalsalsotendtohelpeachotheroutin variousfashions(FBI,2011).
Specifically,theygiveeachothertipsonhow to trade,receive,retrieve,and behave online.Also,they
provide general supportforone anotherinordertobolsterthe self-esteemof theirdeviatepeers.They
share directconnectionstootherswhoprefersubtypesof childpornography(forinstance,loversof
boys).The followingis anofficial,legitimatesite thatisdedicatedtothisparticularinterestfor
pedophiles:NAMBLA [(NorthAmericanMan/BoyLove Association)] (FBI,2011).
7
PORTRAITOF A CYBER SEXUAL PREDATOR
In a proverbial nutshell—the internetprofoundlyexasperatesthe patternbywhichthe
pedophiles progresswiththeirbehaviorstowardschildren.Before the internetconnectiontochildporn,
it wouldhave takenyearsforthe evolutionof the sexualpredatortogothrougheach stage:1) viewing
childporn,2) voyeurismof childreninperson,and3) physical contact witha child.The vastamountsof
available datafora cyberactor are profound.There are chatrooms,andforumsto helpforeach
variance intaste in victimizingchildren,andmore childpornographyavailable thancanbe stayedatop
of L.E. officials.Crime neversleeps,andthisone isnoexception.All of these avenuesare steadily, and
readilyavailable forthe perpetrator24hours a days,and sevendaysa week.Whatwasonce the
evolutionof adeviate,hasnowbecome anemergingpatternthatisbarelyhampered—simplybecause
of the WorldWide Web’savailabilityof anythingdesiredbythem.Theiraddictionismet,withjustclick
of the mouse,anda swipe, ora downloadof an applicationontheirsmartcell phones.
They Don’t Always Act Alone
“Last April a 10 year oldgirl wasinvitedtoa slumberpartyat the home of anotherlittle girl in
Greenfield,CA.Whatherparentsdidn’tknow:the friend’sfatherRonaldRiva,wasamemberof the
OrchidClub,an online groupof menwhometinpedophile chatroomsthatusedthe internettoswap
childpornographyandtrue life storiesof childmolestations“(FBI,2011; p1 ).
Thisunsuspectingchildwasmolestedbythe home owner—aparentwhose childinvitedher
overfor innocentfun.Unfortunately,he didnotactalone:one of hispeersfromthe Orchid Clubco-
committedthiscrime withhim,astheysexuallyabusedthisyounggirl all while beinglive broadcasted
for othermembersof the clubto witnesswhile thiswastakingplace.
ChildrenBecome Part of the Anonymity
8
PORTRAITOF A CYBER SEXUAL PREDATOR
Oftenaftera childhasbeengroomedbya cyber predator,before,during,orevenafterthe
sexual molestations--the childvictimprotectsthe anonymityof the perpetrator.There are secret
languagesthatmay be usedto doso:
 PAW,or PRW= parentsare watching
 PIR= parentsinroom
 POS= parentsovershoulder
 P911= parentemergency
 (L)MIRL= letsmeetinreal life
The issue withchildrenpossiblykeepingtheirperpetratorsunidentifiedisbecausepartlythey
may feel ashamed,orembarrassedsimplybecause theyhave experiencedaninterestinsexuality,or
evenbeingalittle curiousaboutwhatwastranspiringwiththemandthe criminal;thisistypicallymore
the case withteens (FBI,2011). Sometimeswithinthe actof engaginginthisdeviate-illicit
“relationship”,the childvictimmayturnoff the computerwhenanadultapproaches,ormove the
screeninanotherdirectioninordertoavoid detectionof the goingson,or the criminal himself (FBI,
2011).
Cyber Stalking:a Methodto Their Madness
“Stalkingaccordingtothe US Departmentof Justice involvesharassing,orthreatening
behaviorsthatan individual engagesinrepeatedly,suchasfollowingaperson,appearingata
person’shome orplace of business,makingharassingphonecalls,leavingwrittenmessagesor
objects,orvandalizingaperson’sproperty(ValdostaState University,2015).
Phasesof Stalking.
9
PORTRAITOF A CYBER SEXUAL PREDATOR
 Obsession:stagesof beingenthralledwithvictim
 InformationGathering:getsdetailsaboutthe victimfromlovedones,coworkers,finds
out theirusual where aboutetc.
 Harassment:positively,ornegativelyinteractionswiththeirtarget,suchas verbal abuse
or threatsfor negative--thepositivecanconsistof pursuingthe targetwithoutany
encouragement
 Violence:physical,andorsexual violence onthe victim
Sendingemails,illicitpicturesof himorherself,giftsto the child,orevencallingthemviathe
phone can all transpire withoutanyencouragementonthe child’sbehalf orpermission bythe minor
whatsoever (ValdostaState University,2015).
Subtypesof Cyber Stalking.
 Email Cyberstalking:initiatesrelationshipwithoutceasingorencouragement
 InternetCyberStalking:usedtovisitvictiminchatrooms,oraddingspyware totrack
theirmovesaroundthe WorldWide Web
 ComputerCyberStalking:mayassume control of the targetscomputerthrough
hacking,DOSattacks etc. (ValdostaState University,2015).
Addictionat It’s Worst
For the childcyberpredator—childpornographyistheirgototool,fixations,andtheir
addictionsfix.Theybecomeimmersedinalifestyleof activelyseekingouttheirprey,andgoing through
elaborate measurestoconceal theirfreedomsandprivacytoperpetrate theircrimes.CyberSex
Offendersdonothave one, ortwo victims—theyalwayscontinueonuntil the daythattheyare
captured.Sometimesincarnationdoesnotstopthe criminal fromseekingout,orevenstalkingchildren
10
PORTRAITOF A CYBER SEXUAL PREDATOR
online.Itisa rare occurrence that theycease withouthelp,warning,prisontime.Theyoftenhave
victimswhere the amountsfall intothe doubledigits (10,20, 30 etc.).Theirgoals,desires,thrivingis
hingeduponcatchingtheirprey—whichof course are underagedchildren,andsometimesinfantsare
usedinfor sexual pleasure.Age preferencesrange fromcriminal tocriminal.Some donotcare
regardlessof gender,race,orage—butgenerallytheydolike certainage rangesoverothers.
Cyberpornographyisrampart- therefore itisthe quickestfix ever-however,andwhateverthe
criminal chooses.Withone click,ordownloadtheymeettheirverymaladjustedcriminal needsatthe
expense of avictim(s). Thiscanbe instantaneous,opposedtowalkingtothe private sectionof anadult
bookstore andthumbingthroughthe specifiedsection.It’sthere,anditprotectsanonymity.Forthe
cybercriminal theyhave bothof whattheyneed,access24/7, and theyget to protecttheirobscurity.
ChildMolestationsthat have Transpired Offline because ofPornography
Were
Rearrested
for contact…
Admittedto Contact
Sexual Offenses
5.70%
55%
Contact Sexual OffensesBecause of ChildPorn
11
PORTRAITOF A CYBER SEXUAL PREDATOR
Seto(n.d.)
Recidivism
Seto(n.d.).
Committ New
Offenses After3
years
Committ Contact
Sexual Offenses After
3 years
4.60%
2%
Category 1 Category 2
AxisTitle
Axis Title
Recedivisms
Out of 9 Samples=2630 offenders total
Column1 Column2 After 3 years
12
PORTRAITOF A CYBER SEXUAL PREDATOR
Federal ChildPornography Offenders
*These Offendersasmentioned abovearemostunlikely to reoffend.
Seto(n.d.).
Employed Some Education
Marriedor Previously
Married
No Prior Criminal
Offenses
68%
58% 59%
53%
Category 1 Category 2 Category 3 Category 4
Characteristics of Those That view Childpornograhy:
Poll done by The Federal Bureauof Prisons
Column1 Column2 Column3
13
PORTRAITOF A CYBER SEXUAL PREDATOR
References
AmericanPsychiatricAssociation(2000). Paraphilias;SexualDisorders;Pedophile;Diagnosticand
Statistical ManualIV;
FBI (2011). Child Predators:TheOnline Threat Continuesto Grow;Retrievedfrom http://www.fbi.gov.
Frances,A.J.(2011). DSM5 Tries to Sneakin Hebephilia;DSM in Distress; Retrieved from
http://www.psychologytoday.com.
Hickey,T.J.(2008). Taking Sides:Clashing Viewsin Crime and Criminology;eighth edition;McGraw Hill;
NY.
Quayle,E.(2011). Pedophile,Child Pornography,and CyberPredators;c.46; RoutledgeHandbookof
DeviantBehavior;NY; Retrievedfromhttpp://www.google.com.
Thomas,S.P.;Phillips,K.;Carlson,K.;Shieh,F.;Kirkwood,E.; Cabage,L.;& Worley,L.(2012). Childhood
Experiences of Perpetratorsof Child SexualAbuse;Perspectivein Psychiatric Care;doi:10.1111/j
1744-6163.2012.00349x.
Seta,M. (n.d.). InternetFacilitated SexualOffending;c.4; Sex OffendersManagementand Planning;
Initiative of Officeof JusticePrograms;Retrievedfromhttp://www.smart.gov.
ValdostaState University(2015). Stalking and CyberStalking:Health Promotions; Retrievedfrom
http://www.valdosta.edu.

More Related Content

What's hot (8)

Digital Citizens
Digital CitizensDigital Citizens
Digital Citizens
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Online Piracy Paper
Online Piracy PaperOnline Piracy Paper
Online Piracy Paper
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 

Similar to Portrait of a Cyber Sexual Predator

Internet Pornography Addictionand Priestly FormationMediu.docx
Internet Pornography Addictionand Priestly FormationMediu.docxInternet Pornography Addictionand Priestly FormationMediu.docx
Internet Pornography Addictionand Priestly FormationMediu.docx
normanibarber20063
 
Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornography
hinpr18
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
forensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
forensicsnation
 
Improving our response to commercially sexually exploited youth - Peter Quall...
Improving our response to commercially sexually exploited youth - Peter Quall...Improving our response to commercially sexually exploited youth - Peter Quall...
Improving our response to commercially sexually exploited youth - Peter Quall...
National Alliance to End Homelessness
 

Similar to Portrait of a Cyber Sexual Predator (12)

Internet Pornography Addictionand Priestly FormationMediu.docx
Internet Pornography Addictionand Priestly FormationMediu.docxInternet Pornography Addictionand Priestly FormationMediu.docx
Internet Pornography Addictionand Priestly FormationMediu.docx
 
Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornography
 
sexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdfsexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdf
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
OMSI Science Pub - Sex, Relationships, and Technology
OMSI Science Pub - Sex, Relationships, and TechnologyOMSI Science Pub - Sex, Relationships, and Technology
OMSI Science Pub - Sex, Relationships, and Technology
 
Sexual promiscuity
Sexual promiscuitySexual promiscuity
Sexual promiscuity
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
Pan Cheshire CSE Protocol
Pan Cheshire CSE ProtocolPan Cheshire CSE Protocol
Pan Cheshire CSE Protocol
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Improving Our Response to Commercially Sexually Exploited Youth
Improving Our Response to Commercially Sexually Exploited YouthImproving Our Response to Commercially Sexually Exploited Youth
Improving Our Response to Commercially Sexually Exploited Youth
 
Improving our response to commercially sexually exploited youth - Peter Quall...
Improving our response to commercially sexually exploited youth - Peter Quall...Improving our response to commercially sexually exploited youth - Peter Quall...
Improving our response to commercially sexually exploited youth - Peter Quall...
 

Portrait of a Cyber Sexual Predator

  • 1. 1 RunningHead:PORTRIATOF CYBER SEXUAL PREDATOR Portraitof a CyberSexual Predator Donna L. LaPalm RegisUniversity
  • 2. 2 PORTRAITOF A CYBER SEXUAL PREDATOR PedophilesandHebophiles Online The proceedingmaterial depictsthe characteristicsof anonline sexual predator,bothin criminological theory,anddiagnostically.The male,orfemalethatperpetratesthese crimesagainstthe victimwhichinthiscase is a child—bothprepubescent,andthroughadolescenceisthe topicof this expose.Cyberspace isnotonlya measure inwhichtheygaincontrol overtheirvictims,itisfrequently whatfurtherperpetuatestheirverydangerous, andlethal behaviorswhichare directedatourchildren. Variancesinmethodsare beingutilizedtoachievewhat theycame trollingthe information superhighwayfor:sex withminors.These criminalscome indroves, andthey support, andassistone anotherintheirdeviate endeavors.More oftenthannot—these individuals orgroupsfeel entitledto theirprivacy,even withtheircrimesagainst childrenbeingperpetrated Theiramendmentrightsare just as palpable forthem,astheyare foryou andI—noncyberworldcriminals iswhatis withintheir reasoning. First AmendmentRights “Congressshall make nolawrespectinganestablishmentof religion,or prohibitingthe free exercise thereof,orabridgingthe freedomof speech,orof the press”(Hickey,2008, p. 160). “In spite of these valiantdeclarations,there havealwaysbeenrestraintsonspeechandwritingwithbothpractical and legal supports”(Hickey,2008,p. 160). However,the firstamendmentdoesnotallow someone to shoutfire ina crowdedtheatre”inorderto wreakhavoc on the unsuspectedvictim(Hickey,2008; p 161). Ergo, the necessityforthisportionof the introduction;perpetratorsof deviatesexual behavior online believe orevenproclaimthattheiramendmentrightsare beinghamperedbythese legal sanction againstthemviewing,trading,orpostingnregardsto childpornographyor anyforumas it relatesto thiscrime.
  • 3. 3 PORTRAITOF A CYBER SEXUAL PREDATOR So whatdoesthe individual behindthe keyboardlooklike,ordresslike?Ishe or she a green fangtoothedmonster,ora red devil withapitchforkand a tail?He or she is quite the opposite of cartoonishdepictionsof thisevilthatisperpetratedonline. He,or she can be as normal as you or I—oras strange as one can fantasize aboutthe inthe dark cornersof one’smind.Theyare newspapercarriers,the elderly,theyare younger,theyare the society’s lowly…theyare bankers,candle stickmakers,beggarsandthieves. Eithergendercanbe a cybercriminal inthismanner,althoughthe male populationismostcommon.Variancesinage,race,creed,and faith/religiousdenominationoccurwiththese cybercriminals (Hickey,2008). Paraphilias: PedophiliaandHebephilia The AmericanPsychiatricAssociation[(APA)] (2000) cite the followingasitconcernsparaphilic disorders:theyare recurrent,intensesexuallyarousingfantasies,urges,or behaviorsgenerally1) involvingnonhumanobjects,2) sufferingorhumiliationof oneself,ora partner,3) childor nonconsentingpersons-thatoccurforovera periodof six months(APA,2000). Pedophilia. Thisterm referstosexual activitywithaprepubescentchild(13yearsoldor younger);also,the actor must be at least16 yearsold,and at least5 yearsolderthanthe victim(APA,2000). Some of these perpetratorspreferfemales,andsome prefermale victims—yetanothersubsetprefereither-or- genders.Forthose deviatesthatpreferfemalesvictims,theirage preference usuallyfallsbetween8-10 yearsold;for those preferringmale victimstheirvictimsare usuallyslightlyolder.Additionally,someof these violatorsare attractedonlytochildrenandare referredtoasthe exclusive type,andthose that are alsoattractedto both adultsandchildrenare callednonexclusive types(APA,2000). Hebephilia.
  • 4. 4 PORTRAITOF A CYBER SEXUAL PREDATOR A subtype of paraphilia/pedophile isknownasthe hebephile:itsimplydefinesthe male,or female whodesiresare committingsexual actsagainst children—they preferthose thatare pubescent. Age beginsnear14 yearsold,andis within adolescence age range (Frances,2011). Profile ofan Online Sexual Predator What isbehindthe thoughtprocess,andthe methodtotheirdeviate madness?Considerthe followingconcepts: 1. Theyare lookingtoremainundetectedbyL.E.and remainanonymous. 2. The internetisusedashis,or her outlet. 3. Theyare betterat interactingwithchildrenthanthe child’sownparentsattimes. 4. Theyare people thatmayalsohave access offlinetoour childrenbecause of their professions,orvolunteeractivities. 5. Theylurkthe internetchatroomsandare devotedto learningnonsexualtopicslike sports,popularmusicetc.in order to sparka child’sinterests, gaintrust,and gain control of the situation. 6. Theyknowhowto bondwithchildrenviacleverconversations, until the childbecomes more opento talkto themin depth,thusleadingtosexuallyactivityeventually(FBI, 2011). About anOffenders Childhood. Approximatelytwothirdsof convictedsexual offender polledinaBritishPrisonstate thatthey were victimizedbysexual abuse atleastone time duringtheirchildhood.Inyetaseparate poll within the UnitedStates—90%of those whohad once beenincarceratedforchildsexual abuse,spoke about maltreatmentthatoccurredintheiryouth: thisrangedanywhere fromneglecttosevere abuse. Additionally,70%of those thatwere incarceratedatthe time of the study,reportexperiencingsexual
  • 5. 5 PORTRAITOF A CYBER SEXUAL PREDATOR abuse as children.Furthermore—boysthatwere abusedinthismannerwere more frequentlyabusedby female relatives,andwere more likelytobecome abusersthanthose abusedbymale relatives,or outside of the familyrelationships(Thomas,Phillips,Carlson,Shieh,Kirkwood,Cabage,&Worley,2012). In the proceedinglist,thereideasof whathave negativeexperiencesinachildsex offender’s childhood,thathave beenreportedbythose thathave beenconvicted:  Parental neglect  Experienced,orwitnessedphysical violence  Lack of material care  Childhoodattachmentstoparentswere more secure withthe motherthanthe father  Reporteddistressinadulthoodfromchildhoodcausingemotionalfocusedcoping mechanisms(e.g.fantasy)  Lowerself esteem  Loneliness  In apt social skills  Some were fromtwoparenthomes  Some lost/neverknownone parent  Some had neglectful-alcoholicparents  Many experiencedchildhoodtraumafromabandonment,neglect,andemotional- physical abuse  Didnot fitin school  Longedfor missedchildhood (Thomasetal.; 2012) Whoviews ChildPornography? Quayle (2011). Statesthe following:“Internetsex offenseshave accountedforroughlyone third of all sex convictions” As itis itcommonlyknown,the use of pornographyand itscontendercyberporn–they are not an uncommon entity asitregards childsexual abuse.Some use the internettostalk,andcapture images of children—while some arrange secretmeetingforabuse viathe use of the internet.Itall varies dependingoneachcriminal. Here are some factsregardingthe cyberperpetratorsandhis victimscitedbyQuayle (2011):
  • 6. 6 PORTRAITOF A CYBER SEXUAL PREDATOR [T]hey“are more likelytooffendinthe company of a male andare highlylikelytohave experiences bothchildhoodandadulthood victimizationsatthe handsof men,andare likely todisplay some profounddisturbancesintheirabilitytoseekandmaintainappropriate adultintimate relationships…relationships,personal perceptionof menandboysare relativelyimmature,profoundly disturbed,andinextricablylinkedtotheiroffendingbehaviors(Quayle,2011; p. 392). Althoughmales are vastlymore likelytocommitcrimesinthisarena—femaleactorsperpetrate on occasion.Lastly—inthe subsequentdata,presentedwill be more characterizesof the cyber pornographyperpetrator:  99% appearto be male  The majorityare Caucasian  Over60% showedbeingsexuallystimulatedbywayof the penal erectionafterviewing childpornography,opposedto otheradultsviewingchildpornography.  Childpornographyoffenderswith anykindof priorcriminal historywere more likelyto commita contact offense,oranykindof offense withintwo-twoandahalf yearsof beginningtheircyberpornactivity. They Stick Togetherin Cyber-Space Althoughthe protection,of the actor’sfreedom(thatiswhytheyremainanonymous) istheir secondarygoal outside of theirprimarygoal of trading,viewing,andbraggingabouttheirexploitswith children—these cybercriminalsalsotendtohelpeachotheroutin variousfashions(FBI,2011). Specifically,theygiveeachothertipsonhow to trade,receive,retrieve,and behave online.Also,they provide general supportforone anotherinordertobolsterthe self-esteemof theirdeviatepeers.They share directconnectionstootherswhoprefersubtypesof childpornography(forinstance,loversof boys).The followingis anofficial,legitimatesite thatisdedicatedtothisparticularinterestfor pedophiles:NAMBLA [(NorthAmericanMan/BoyLove Association)] (FBI,2011).
  • 7. 7 PORTRAITOF A CYBER SEXUAL PREDATOR In a proverbial nutshell—the internetprofoundlyexasperatesthe patternbywhichthe pedophiles progresswiththeirbehaviorstowardschildren.Before the internetconnectiontochildporn, it wouldhave takenyearsforthe evolutionof the sexualpredatortogothrougheach stage:1) viewing childporn,2) voyeurismof childreninperson,and3) physical contact witha child.The vastamountsof available datafora cyberactor are profound.There are chatrooms,andforumsto helpforeach variance intaste in victimizingchildren,andmore childpornographyavailable thancanbe stayedatop of L.E. officials.Crime neversleeps,andthisone isnoexception.All of these avenuesare steadily, and readilyavailable forthe perpetrator24hours a days,and sevendaysa week.Whatwasonce the evolutionof adeviate,hasnowbecome anemergingpatternthatisbarelyhampered—simplybecause of the WorldWide Web’savailabilityof anythingdesiredbythem.Theiraddictionismet,withjustclick of the mouse,anda swipe, ora downloadof an applicationontheirsmartcell phones. They Don’t Always Act Alone “Last April a 10 year oldgirl wasinvitedtoa slumberpartyat the home of anotherlittle girl in Greenfield,CA.Whatherparentsdidn’tknow:the friend’sfatherRonaldRiva,wasamemberof the OrchidClub,an online groupof menwhometinpedophile chatroomsthatusedthe internettoswap childpornographyandtrue life storiesof childmolestations“(FBI,2011; p1 ). Thisunsuspectingchildwasmolestedbythe home owner—aparentwhose childinvitedher overfor innocentfun.Unfortunately,he didnotactalone:one of hispeersfromthe Orchid Clubco- committedthiscrime withhim,astheysexuallyabusedthisyounggirl all while beinglive broadcasted for othermembersof the clubto witnesswhile thiswastakingplace. ChildrenBecome Part of the Anonymity
  • 8. 8 PORTRAITOF A CYBER SEXUAL PREDATOR Oftenaftera childhasbeengroomedbya cyber predator,before,during,orevenafterthe sexual molestations--the childvictimprotectsthe anonymityof the perpetrator.There are secret languagesthatmay be usedto doso:  PAW,or PRW= parentsare watching  PIR= parentsinroom  POS= parentsovershoulder  P911= parentemergency  (L)MIRL= letsmeetinreal life The issue withchildrenpossiblykeepingtheirperpetratorsunidentifiedisbecausepartlythey may feel ashamed,orembarrassedsimplybecause theyhave experiencedaninterestinsexuality,or evenbeingalittle curiousaboutwhatwastranspiringwiththemandthe criminal;thisistypicallymore the case withteens (FBI,2011). Sometimeswithinthe actof engaginginthisdeviate-illicit “relationship”,the childvictimmayturnoff the computerwhenanadultapproaches,ormove the screeninanotherdirectioninordertoavoid detectionof the goingson,or the criminal himself (FBI, 2011). Cyber Stalking:a Methodto Their Madness “Stalkingaccordingtothe US Departmentof Justice involvesharassing,orthreatening behaviorsthatan individual engagesinrepeatedly,suchasfollowingaperson,appearingata person’shome orplace of business,makingharassingphonecalls,leavingwrittenmessagesor objects,orvandalizingaperson’sproperty(ValdostaState University,2015). Phasesof Stalking.
  • 9. 9 PORTRAITOF A CYBER SEXUAL PREDATOR  Obsession:stagesof beingenthralledwithvictim  InformationGathering:getsdetailsaboutthe victimfromlovedones,coworkers,finds out theirusual where aboutetc.  Harassment:positively,ornegativelyinteractionswiththeirtarget,suchas verbal abuse or threatsfor negative--thepositivecanconsistof pursuingthe targetwithoutany encouragement  Violence:physical,andorsexual violence onthe victim Sendingemails,illicitpicturesof himorherself,giftsto the child,orevencallingthemviathe phone can all transpire withoutanyencouragementonthe child’sbehalf orpermission bythe minor whatsoever (ValdostaState University,2015). Subtypesof Cyber Stalking.  Email Cyberstalking:initiatesrelationshipwithoutceasingorencouragement  InternetCyberStalking:usedtovisitvictiminchatrooms,oraddingspyware totrack theirmovesaroundthe WorldWide Web  ComputerCyberStalking:mayassume control of the targetscomputerthrough hacking,DOSattacks etc. (ValdostaState University,2015). Addictionat It’s Worst For the childcyberpredator—childpornographyistheirgototool,fixations,andtheir addictionsfix.Theybecomeimmersedinalifestyleof activelyseekingouttheirprey,andgoing through elaborate measurestoconceal theirfreedomsandprivacytoperpetrate theircrimes.CyberSex Offendersdonothave one, ortwo victims—theyalwayscontinueonuntil the daythattheyare captured.Sometimesincarnationdoesnotstopthe criminal fromseekingout,orevenstalkingchildren
  • 10. 10 PORTRAITOF A CYBER SEXUAL PREDATOR online.Itisa rare occurrence that theycease withouthelp,warning,prisontime.Theyoftenhave victimswhere the amountsfall intothe doubledigits (10,20, 30 etc.).Theirgoals,desires,thrivingis hingeduponcatchingtheirprey—whichof course are underagedchildren,andsometimesinfantsare usedinfor sexual pleasure.Age preferencesrange fromcriminal tocriminal.Some donotcare regardlessof gender,race,orage—butgenerallytheydolike certainage rangesoverothers. Cyberpornographyisrampart- therefore itisthe quickestfix ever-however,andwhateverthe criminal chooses.Withone click,ordownloadtheymeettheirverymaladjustedcriminal needsatthe expense of avictim(s). Thiscanbe instantaneous,opposedtowalkingtothe private sectionof anadult bookstore andthumbingthroughthe specifiedsection.It’sthere,anditprotectsanonymity.Forthe cybercriminal theyhave bothof whattheyneed,access24/7, and theyget to protecttheirobscurity. ChildMolestationsthat have Transpired Offline because ofPornography Were Rearrested for contact… Admittedto Contact Sexual Offenses 5.70% 55% Contact Sexual OffensesBecause of ChildPorn
  • 11. 11 PORTRAITOF A CYBER SEXUAL PREDATOR Seto(n.d.) Recidivism Seto(n.d.). Committ New Offenses After3 years Committ Contact Sexual Offenses After 3 years 4.60% 2% Category 1 Category 2 AxisTitle Axis Title Recedivisms Out of 9 Samples=2630 offenders total Column1 Column2 After 3 years
  • 12. 12 PORTRAITOF A CYBER SEXUAL PREDATOR Federal ChildPornography Offenders *These Offendersasmentioned abovearemostunlikely to reoffend. Seto(n.d.). Employed Some Education Marriedor Previously Married No Prior Criminal Offenses 68% 58% 59% 53% Category 1 Category 2 Category 3 Category 4 Characteristics of Those That view Childpornograhy: Poll done by The Federal Bureauof Prisons Column1 Column2 Column3
  • 13. 13 PORTRAITOF A CYBER SEXUAL PREDATOR References AmericanPsychiatricAssociation(2000). Paraphilias;SexualDisorders;Pedophile;Diagnosticand Statistical ManualIV; FBI (2011). Child Predators:TheOnline Threat Continuesto Grow;Retrievedfrom http://www.fbi.gov. Frances,A.J.(2011). DSM5 Tries to Sneakin Hebephilia;DSM in Distress; Retrieved from http://www.psychologytoday.com. Hickey,T.J.(2008). Taking Sides:Clashing Viewsin Crime and Criminology;eighth edition;McGraw Hill; NY. Quayle,E.(2011). Pedophile,Child Pornography,and CyberPredators;c.46; RoutledgeHandbookof DeviantBehavior;NY; Retrievedfromhttpp://www.google.com. Thomas,S.P.;Phillips,K.;Carlson,K.;Shieh,F.;Kirkwood,E.; Cabage,L.;& Worley,L.(2012). Childhood Experiences of Perpetratorsof Child SexualAbuse;Perspectivein Psychiatric Care;doi:10.1111/j 1744-6163.2012.00349x. Seta,M. (n.d.). InternetFacilitated SexualOffending;c.4; Sex OffendersManagementand Planning; Initiative of Officeof JusticePrograms;Retrievedfromhttp://www.smart.gov. ValdostaState University(2015). Stalking and CyberStalking:Health Promotions; Retrievedfrom http://www.valdosta.edu.