This document provides an in-depth profile of cyber sexual predators. It describes that these individuals can appear normal but use the internet and anonymity to groom and abuse children. Their motivations often stem from past abuse and mental health issues. The document outlines common tactics like gaining trust online before arranging to meet in person. It also discusses how predators collaborate and rationalize their actions. Overall, the profile shows how the internet enables and exacerbates predatory behaviors against children.
2. 2
PORTRAITOF A CYBER SEXUAL PREDATOR
PedophilesandHebophiles Online
The proceedingmaterial depictsthe characteristicsof anonline sexual predator,bothin
criminological theory,anddiagnostically.The male,orfemalethatperpetratesthese crimesagainstthe
victimwhichinthiscase is a child—bothprepubescent,andthroughadolescenceisthe topicof this
expose.Cyberspace isnotonlya measure inwhichtheygaincontrol overtheirvictims,itisfrequently
whatfurtherperpetuatestheirverydangerous, andlethal behaviorswhichare directedatourchildren.
Variancesinmethodsare beingutilizedtoachievewhat theycame trollingthe information
superhighwayfor:sex withminors.These criminalscome indroves, andthey support, andassistone
anotherintheirdeviate endeavors.More oftenthannot—these individuals orgroupsfeel entitledto
theirprivacy,even withtheircrimesagainst childrenbeingperpetrated Theiramendmentrightsare just
as palpable forthem,astheyare foryou andI—noncyberworldcriminals iswhatis withintheir
reasoning.
First AmendmentRights
“Congressshall make nolawrespectinganestablishmentof religion,or prohibitingthe free
exercise thereof,orabridgingthe freedomof speech,orof the press”(Hickey,2008, p. 160). “In spite of
these valiantdeclarations,there havealwaysbeenrestraintsonspeechandwritingwithbothpractical
and legal supports”(Hickey,2008,p. 160). However,the firstamendmentdoesnotallow someone to
shoutfire ina crowdedtheatre”inorderto wreakhavoc on the unsuspectedvictim(Hickey,2008; p
161). Ergo, the necessityforthisportionof the introduction;perpetratorsof deviatesexual behavior
online believe orevenproclaimthattheiramendmentrightsare beinghamperedbythese legal sanction
againstthemviewing,trading,orpostingnregardsto childpornographyor anyforumas it relatesto
thiscrime.
3. 3
PORTRAITOF A CYBER SEXUAL PREDATOR
So whatdoesthe individual behindthe keyboardlooklike,ordresslike?Ishe or she a green
fangtoothedmonster,ora red devil withapitchforkand a tail?He or she is quite the opposite of
cartoonishdepictionsof thisevilthatisperpetratedonline.
He,or she can be as normal as you or I—oras strange as one can fantasize aboutthe inthe dark
cornersof one’smind.Theyare newspapercarriers,the elderly,theyare younger,theyare the society’s
lowly…theyare bankers,candle stickmakers,beggarsandthieves. Eithergendercanbe a cybercriminal
inthismanner,althoughthe male populationismostcommon.Variancesinage,race,creed,and
faith/religiousdenominationoccurwiththese cybercriminals (Hickey,2008).
Paraphilias: PedophiliaandHebephilia
The AmericanPsychiatricAssociation[(APA)] (2000) cite the followingasitconcernsparaphilic
disorders:theyare recurrent,intensesexuallyarousingfantasies,urges,or behaviorsgenerally1)
involvingnonhumanobjects,2) sufferingorhumiliationof oneself,ora partner,3) childor
nonconsentingpersons-thatoccurforovera periodof six months(APA,2000).
Pedophilia.
Thisterm referstosexual activitywithaprepubescentchild(13yearsoldor younger);also,the
actor must be at least16 yearsold,and at least5 yearsolderthanthe victim(APA,2000). Some of these
perpetratorspreferfemales,andsome prefermale victims—yetanothersubsetprefereither-or-
genders.Forthose deviatesthatpreferfemalesvictims,theirage preference usuallyfallsbetween8-10
yearsold;for those preferringmale victimstheirvictimsare usuallyslightlyolder.Additionally,someof
these violatorsare attractedonlytochildrenandare referredtoasthe exclusive type,andthose that
are alsoattractedto both adultsandchildrenare callednonexclusive types(APA,2000).
Hebephilia.
4. 4
PORTRAITOF A CYBER SEXUAL PREDATOR
A subtype of paraphilia/pedophile isknownasthe hebephile:itsimplydefinesthe male,or
female whodesiresare committingsexual actsagainst children—they preferthose thatare pubescent.
Age beginsnear14 yearsold,andis within adolescence age range (Frances,2011).
Profile ofan Online Sexual Predator
What isbehindthe thoughtprocess,andthe methodtotheirdeviate madness?Considerthe
followingconcepts:
1. Theyare lookingtoremainundetectedbyL.E.and remainanonymous.
2. The internetisusedashis,or her outlet.
3. Theyare betterat interactingwithchildrenthanthe child’sownparentsattimes.
4. Theyare people thatmayalsohave access offlinetoour childrenbecause of their
professions,orvolunteeractivities.
5. Theylurkthe internetchatroomsandare devotedto learningnonsexualtopicslike
sports,popularmusicetc.in order to sparka child’sinterests, gaintrust,and gain
control of the situation.
6. Theyknowhowto bondwithchildrenviacleverconversations, until the childbecomes
more opento talkto themin depth,thusleadingtosexuallyactivityeventually(FBI,
2011).
About anOffenders Childhood.
Approximatelytwothirdsof convictedsexual offender polledinaBritishPrisonstate thatthey
were victimizedbysexual abuse atleastone time duringtheirchildhood.Inyetaseparate poll within
the UnitedStates—90%of those whohad once beenincarceratedforchildsexual abuse,spoke about
maltreatmentthatoccurredintheiryouth: thisrangedanywhere fromneglecttosevere abuse.
Additionally,70%of those thatwere incarceratedatthe time of the study,reportexperiencingsexual
5. 5
PORTRAITOF A CYBER SEXUAL PREDATOR
abuse as children.Furthermore—boysthatwere abusedinthismannerwere more frequentlyabusedby
female relatives,andwere more likelytobecome abusersthanthose abusedbymale relatives,or
outside of the familyrelationships(Thomas,Phillips,Carlson,Shieh,Kirkwood,Cabage,&Worley,2012).
In the proceedinglist,thereideasof whathave negativeexperiencesinachildsex offender’s
childhood,thathave beenreportedbythose thathave beenconvicted:
Parental neglect
Experienced,orwitnessedphysical violence
Lack of material care
Childhoodattachmentstoparentswere more secure withthe motherthanthe father
Reporteddistressinadulthoodfromchildhoodcausingemotionalfocusedcoping
mechanisms(e.g.fantasy)
Lowerself esteem
Loneliness
In apt social skills
Some were fromtwoparenthomes
Some lost/neverknownone parent
Some had neglectful-alcoholicparents
Many experiencedchildhoodtraumafromabandonment,neglect,andemotional-
physical abuse
Didnot fitin school
Longedfor missedchildhood
(Thomasetal.; 2012)
Whoviews ChildPornography?
Quayle (2011). Statesthe following:“Internetsex offenseshave accountedforroughlyone third
of all sex convictions”
As itis itcommonlyknown,the use of pornographyand itscontendercyberporn–they are not
an uncommon entity asitregards childsexual abuse.Some use the internettostalk,andcapture images
of children—while some arrange secretmeetingforabuse viathe use of the internet.Itall varies
dependingoneachcriminal.
Here are some factsregardingthe cyberperpetratorsandhis victimscitedbyQuayle (2011):
6. 6
PORTRAITOF A CYBER SEXUAL PREDATOR
[T]hey“are more likelytooffendinthe company of a male andare highlylikelytohave
experiences bothchildhoodandadulthood victimizationsatthe handsof men,andare likely todisplay
some profounddisturbancesintheirabilitytoseekandmaintainappropriate adultintimate
relationships…relationships,personal perceptionof menandboysare relativelyimmature,profoundly
disturbed,andinextricablylinkedtotheiroffendingbehaviors(Quayle,2011; p. 392).
Althoughmales are vastlymore likelytocommitcrimesinthisarena—femaleactorsperpetrate
on occasion.Lastly—inthe subsequentdata,presentedwill be more characterizesof the cyber
pornographyperpetrator:
99% appearto be male
The majorityare Caucasian
Over60% showedbeingsexuallystimulatedbywayof the penal erectionafterviewing
childpornography,opposedto otheradultsviewingchildpornography.
Childpornographyoffenderswith anykindof priorcriminal historywere more likelyto
commita contact offense,oranykindof offense withintwo-twoandahalf yearsof
beginningtheircyberpornactivity.
They Stick Togetherin Cyber-Space
Althoughthe protection,of the actor’sfreedom(thatiswhytheyremainanonymous) istheir
secondarygoal outside of theirprimarygoal of trading,viewing,andbraggingabouttheirexploitswith
children—these cybercriminalsalsotendtohelpeachotheroutin variousfashions(FBI,2011).
Specifically,theygiveeachothertipsonhow to trade,receive,retrieve,and behave online.Also,they
provide general supportforone anotherinordertobolsterthe self-esteemof theirdeviatepeers.They
share directconnectionstootherswhoprefersubtypesof childpornography(forinstance,loversof
boys).The followingis anofficial,legitimatesite thatisdedicatedtothisparticularinterestfor
pedophiles:NAMBLA [(NorthAmericanMan/BoyLove Association)] (FBI,2011).
7. 7
PORTRAITOF A CYBER SEXUAL PREDATOR
In a proverbial nutshell—the internetprofoundlyexasperatesthe patternbywhichthe
pedophiles progresswiththeirbehaviorstowardschildren.Before the internetconnectiontochildporn,
it wouldhave takenyearsforthe evolutionof the sexualpredatortogothrougheach stage:1) viewing
childporn,2) voyeurismof childreninperson,and3) physical contact witha child.The vastamountsof
available datafora cyberactor are profound.There are chatrooms,andforumsto helpforeach
variance intaste in victimizingchildren,andmore childpornographyavailable thancanbe stayedatop
of L.E. officials.Crime neversleeps,andthisone isnoexception.All of these avenuesare steadily, and
readilyavailable forthe perpetrator24hours a days,and sevendaysa week.Whatwasonce the
evolutionof adeviate,hasnowbecome anemergingpatternthatisbarelyhampered—simplybecause
of the WorldWide Web’savailabilityof anythingdesiredbythem.Theiraddictionismet,withjustclick
of the mouse,anda swipe, ora downloadof an applicationontheirsmartcell phones.
They Don’t Always Act Alone
“Last April a 10 year oldgirl wasinvitedtoa slumberpartyat the home of anotherlittle girl in
Greenfield,CA.Whatherparentsdidn’tknow:the friend’sfatherRonaldRiva,wasamemberof the
OrchidClub,an online groupof menwhometinpedophile chatroomsthatusedthe internettoswap
childpornographyandtrue life storiesof childmolestations“(FBI,2011; p1 ).
Thisunsuspectingchildwasmolestedbythe home owner—aparentwhose childinvitedher
overfor innocentfun.Unfortunately,he didnotactalone:one of hispeersfromthe Orchid Clubco-
committedthiscrime withhim,astheysexuallyabusedthisyounggirl all while beinglive broadcasted
for othermembersof the clubto witnesswhile thiswastakingplace.
ChildrenBecome Part of the Anonymity
8. 8
PORTRAITOF A CYBER SEXUAL PREDATOR
Oftenaftera childhasbeengroomedbya cyber predator,before,during,orevenafterthe
sexual molestations--the childvictimprotectsthe anonymityof the perpetrator.There are secret
languagesthatmay be usedto doso:
PAW,or PRW= parentsare watching
PIR= parentsinroom
POS= parentsovershoulder
P911= parentemergency
(L)MIRL= letsmeetinreal life
The issue withchildrenpossiblykeepingtheirperpetratorsunidentifiedisbecausepartlythey
may feel ashamed,orembarrassedsimplybecause theyhave experiencedaninterestinsexuality,or
evenbeingalittle curiousaboutwhatwastranspiringwiththemandthe criminal;thisistypicallymore
the case withteens (FBI,2011). Sometimeswithinthe actof engaginginthisdeviate-illicit
“relationship”,the childvictimmayturnoff the computerwhenanadultapproaches,ormove the
screeninanotherdirectioninordertoavoid detectionof the goingson,or the criminal himself (FBI,
2011).
Cyber Stalking:a Methodto Their Madness
“Stalkingaccordingtothe US Departmentof Justice involvesharassing,orthreatening
behaviorsthatan individual engagesinrepeatedly,suchasfollowingaperson,appearingata
person’shome orplace of business,makingharassingphonecalls,leavingwrittenmessagesor
objects,orvandalizingaperson’sproperty(ValdostaState University,2015).
Phasesof Stalking.
9. 9
PORTRAITOF A CYBER SEXUAL PREDATOR
Obsession:stagesof beingenthralledwithvictim
InformationGathering:getsdetailsaboutthe victimfromlovedones,coworkers,finds
out theirusual where aboutetc.
Harassment:positively,ornegativelyinteractionswiththeirtarget,suchas verbal abuse
or threatsfor negative--thepositivecanconsistof pursuingthe targetwithoutany
encouragement
Violence:physical,andorsexual violence onthe victim
Sendingemails,illicitpicturesof himorherself,giftsto the child,orevencallingthemviathe
phone can all transpire withoutanyencouragementonthe child’sbehalf orpermission bythe minor
whatsoever (ValdostaState University,2015).
Subtypesof Cyber Stalking.
Email Cyberstalking:initiatesrelationshipwithoutceasingorencouragement
InternetCyberStalking:usedtovisitvictiminchatrooms,oraddingspyware totrack
theirmovesaroundthe WorldWide Web
ComputerCyberStalking:mayassume control of the targetscomputerthrough
hacking,DOSattacks etc. (ValdostaState University,2015).
Addictionat It’s Worst
For the childcyberpredator—childpornographyistheirgototool,fixations,andtheir
addictionsfix.Theybecomeimmersedinalifestyleof activelyseekingouttheirprey,andgoing through
elaborate measurestoconceal theirfreedomsandprivacytoperpetrate theircrimes.CyberSex
Offendersdonothave one, ortwo victims—theyalwayscontinueonuntil the daythattheyare
captured.Sometimesincarnationdoesnotstopthe criminal fromseekingout,orevenstalkingchildren
10. 10
PORTRAITOF A CYBER SEXUAL PREDATOR
online.Itisa rare occurrence that theycease withouthelp,warning,prisontime.Theyoftenhave
victimswhere the amountsfall intothe doubledigits (10,20, 30 etc.).Theirgoals,desires,thrivingis
hingeduponcatchingtheirprey—whichof course are underagedchildren,andsometimesinfantsare
usedinfor sexual pleasure.Age preferencesrange fromcriminal tocriminal.Some donotcare
regardlessof gender,race,orage—butgenerallytheydolike certainage rangesoverothers.
Cyberpornographyisrampart- therefore itisthe quickestfix ever-however,andwhateverthe
criminal chooses.Withone click,ordownloadtheymeettheirverymaladjustedcriminal needsatthe
expense of avictim(s). Thiscanbe instantaneous,opposedtowalkingtothe private sectionof anadult
bookstore andthumbingthroughthe specifiedsection.It’sthere,anditprotectsanonymity.Forthe
cybercriminal theyhave bothof whattheyneed,access24/7, and theyget to protecttheirobscurity.
ChildMolestationsthat have Transpired Offline because ofPornography
Were
Rearrested
for contact…
Admittedto Contact
Sexual Offenses
5.70%
55%
Contact Sexual OffensesBecause of ChildPorn
11. 11
PORTRAITOF A CYBER SEXUAL PREDATOR
Seto(n.d.)
Recidivism
Seto(n.d.).
Committ New
Offenses After3
years
Committ Contact
Sexual Offenses After
3 years
4.60%
2%
Category 1 Category 2
AxisTitle
Axis Title
Recedivisms
Out of 9 Samples=2630 offenders total
Column1 Column2 After 3 years
12. 12
PORTRAITOF A CYBER SEXUAL PREDATOR
Federal ChildPornography Offenders
*These Offendersasmentioned abovearemostunlikely to reoffend.
Seto(n.d.).
Employed Some Education
Marriedor Previously
Married
No Prior Criminal
Offenses
68%
58% 59%
53%
Category 1 Category 2 Category 3 Category 4
Characteristics of Those That view Childpornograhy:
Poll done by The Federal Bureauof Prisons
Column1 Column2 Column3
13. 13
PORTRAITOF A CYBER SEXUAL PREDATOR
References
AmericanPsychiatricAssociation(2000). Paraphilias;SexualDisorders;Pedophile;Diagnosticand
Statistical ManualIV;
FBI (2011). Child Predators:TheOnline Threat Continuesto Grow;Retrievedfrom http://www.fbi.gov.
Frances,A.J.(2011). DSM5 Tries to Sneakin Hebephilia;DSM in Distress; Retrieved from
http://www.psychologytoday.com.
Hickey,T.J.(2008). Taking Sides:Clashing Viewsin Crime and Criminology;eighth edition;McGraw Hill;
NY.
Quayle,E.(2011). Pedophile,Child Pornography,and CyberPredators;c.46; RoutledgeHandbookof
DeviantBehavior;NY; Retrievedfromhttpp://www.google.com.
Thomas,S.P.;Phillips,K.;Carlson,K.;Shieh,F.;Kirkwood,E.; Cabage,L.;& Worley,L.(2012). Childhood
Experiences of Perpetratorsof Child SexualAbuse;Perspectivein Psychiatric Care;doi:10.1111/j
1744-6163.2012.00349x.
Seta,M. (n.d.). InternetFacilitated SexualOffending;c.4; Sex OffendersManagementand Planning;
Initiative of Officeof JusticePrograms;Retrievedfromhttp://www.smart.gov.
ValdostaState University(2015). Stalking and CyberStalking:Health Promotions; Retrievedfrom
http://www.valdosta.edu.