SlideShare a Scribd company logo
1 of 24
+
Grooming and Pedophile
Crime
Computer Law and Ethics
Michael Heron
+
Introduction
 There are dark and unpleasant corners of the internet where crimes occur.
 One of the darkest of these are those parts whereby child abuse is perpetrated.
 Getting a true handle on the scale of the problem is complicated by media
attention.
 It is difficult to tell if the attention given to the issue is proportionate to the scale of
the issue.
 Systemic reviews on the topic suggest that the prevalence estimates
range from 8-31% for girls and from 3-17% for boys.
 Where ‘abuse’ is defined as any kind of sexual contact between an adult and a
child.
 Issues of forced intercourse have an average prevalence of 9% for girls
and 3% for boys.
+
The scale of the problem
 Any prevalence is too high, but estimating the true extent of the
issue is complicated by several factors.
 Media attention
 Differences in study measures
 Differences in study analysis
 Differences in study definitions.
 Difference in methodology
 In the majority of child abuse cases, the perpetrator is a family
member or someone close to the child.
 Specific percentages vary from country to country, but typically
range from 80-90%.
+
The scale of the problem
 Between 2009 and 2010, around 23,000 incidents were recorded
by UK police regarding child sexual abuse.
 With between 2300 and 4600 of these involving strangers.
 ‘Stranger danger’ is real but disproportionate attention results misguided
attention.
 Online interactions with children follow a somewhat different
profile.
 The Child Exploitation and Online Protection Centre in 2011 recorded
1,145 cases of online grooming last year.
 In England and Wales there were 310 recorded offences of sexual
grooming.
 Again, reliable studies are difficult to find.
 Many incidents simply go unreported.
+
Grooming
 The phrase ‘grooming’ has come to mean the act of gaining the
trust of a child with the intention of facilitating some form of
exploitation.
 Usually sexual, but other exploitations exist.
 In the United Kingdom, several laws cover grooming:
 Sexual Offences Act 2003 (England and Wales)
 Protection of Children and Prevention of Sexual Offenses (Scotland)
Act 2005
 These make it a crime to befriend children through any means
with the intention of meeting and harming them.
 Under the Sexual Offences Act, the maximum sentence is 10 years
imprisonment.
+
Grooming and the Internet
 The extent to which underage internet users are contacted by
online predators is again difficult to gauge.
 Estimates put it at around 20% of regular users of chat rooms and
online discussion sites.
 Around six out of ten children aged three to seventeen use the
internet at home.
 The large majority of contacts do not progress beyond initial
exploratory attempts.
 The process is highly structured and managed, exploiting
psychology to normalise the prospect of sexual contact.
+
Grooming and the Internet
 The majority of sexual contact stemming from internet
grooming is conducted online.
 In only 7% of reported cases do perpetrators attempt to meet the
child offline (as of 2012).
 Such abuse is conducted via webcams, instant messenger
applications and social networking sites.
 Contact follows a pattern of escalation.
 Friendly initial contact
 Evolution of psychological manipulation
 Threats/Intimidation
 Blackmail
+
Grooming and the Internet
 Perpetrators make use of information gathered during initial
discussions to gain access to online social resources.
 Webmail / Social Network details
 The target is then coerced into obeying the perpetrator if they
want to get access to their accounts back.
 In the meantime, access to address books and friends lists
allows for a wider net to be cast amongst social networks.
 Perpetrators can act as like friends to get initial contact.
 This foothold can then be used to solicit or trick further targets out of
passwords, or into giving up identifying ‘forgotten your password’
type information.
+
A Typical Progression
 The following is given in an Action for Children report on the
topic as a typical progression:
 Predator meets child in an internet chat-room.
 Experienced, long-term predators will already have established
community presence, and may be considered one of the
‘community elders’
 The predator will identify children in the desired age range by
interests, writing patterns and topics of discussion.
 They will then promote attention on that child, asking their opinion
directly during chats with an intention of building a ‘special
friendship’
 This then leads to an invitation for one to one private chatting which
then becomes an exclusive interaction away from the chat room.
+
A Typical Progression
 Once in the private chat room, the discussion will follow a
particular direction.
 Prompt disclosure and then build a fake rapport by creating ‘me too’
revelations.
 Focus on current trends in clothes, music, sport and street talk.
 To begin with, the conversation will be wholesome and the
predator will make the attempt to come across as a ‘nice person’
 The private conversation becomes the key lever point to evolve
contact opportunities.
 Emails
 Text messages
 Voice contact
+
Methods of Contact
 Any method is an appropriate one if it allows secrecy.
 Incidents have been recorded where predators have:
 Sent children mobile phones
 Paid for children’s top up credit so parents don’t become
suspicious
 Setting up free-phone numbers for children to call.
 These don’t appear on fixed land line telephone bills.
 Several key pieces of information are needed by the predator.
 Where the child’s computer is
 Who uses it
 What kind of monitoring is in place
+
Progression
 The initial part of the grooming process is to build trust and
lower defences, as well as identify risks to the predator.
 If a child indicates any kind of knowledge of ‘safe behaviour online’,
it will normally result in the predator backing off.
 It also makes it less likely that children will report suspicious
behaviour.
 This then ‘softens’ the target for an escalation of psychological
tricks.
 Positive reinforcement
 Normalising of non-normal interactions
 Sabotage of confidence
+
Progression
 At some point, the relationship will begin to exhibit sexual qualities.
 Often beginning relatively benignly as an attempt to normalise the relationship
and serve as a lever to further interactions.
 ‘Gradualisation’ of sexual content is handled by testing the boundaries of the
interaction
 As time progresses, many such relationships evolve to incorporate the
sharing and discussion of explicit pornographic material.
 Including material involving children, again for the purposes of normalising the
interactions.
 As children are coerced into performing for the predator, it becomes more
difficult for them to extricate themselves from the situation.
 The performing of activities becomes blackmail material.
+
Progression
 Children are commonly coerced into:
 Watching sexual acts live via web cams
 Watch pornographic videos
 Listen to audio files
 This then sets the stage for a progression into direct participation.
 Sexually explicit text conversations
 Creation and sending of sexually explicit material
 Phone sex
 While only a minority of cases progress into actual physical sexual
abuse, the psychological damage associated with the above is
considerable.
+
Predator Patience
 It is important that predators are patient with their targets,
because of the ease with which an online relationship can be
terminated.
 To counteract this risk, it is not uncommon for predators to be
grooming several children at once.
 If one breaks off contact, there are others lined up.
 Too much attention, or attention that is too intense too quickly
also raises the risk of disclosure.
 And in turn the risk of being caught by the authorities.
+
Sexual Offences Act 2003
 Section 15 of the Sexual Offences Act covers the criminalisation of
these activities.
 A person aged 18 or over (A) commits an offence if—
 (a)A has met or communicated with another person (B) on at least
two occasions and subsequently—
 (i)A intentionally meets B,
 (ii)A travels with the intention of meeting B in any part of the world
or arranges to meet B in any part of the world, or
 (iii)B travels with the intention of meeting A in any part of the world,
 (b)A intends to do anything to or in respect of B, during or after the
meeting mentioned in paragraph (a)(i) to (iii) and in any part of the
world, which if done will involve the commission by A of a relevant
offence,]
 (c)B is under 16, and
 (d)A does not reasonably believe that B is 16 or over.
+
Patrick Green
 In February 2000, Patrick Green made contact with a twelve
year old girl in an internet chat room.
 Initial contact led to email exchanges over a two month period.
 This in turn led to regular mobile phone discussions.
 Green used emotional manipulation to convince his target that
he was in love with her, and intensified his connection through
relentless emails and text messages.
 Initial requests for a meeting were refused, but the girl’s resolve
gradually wore away and she agreed to meet him in a public
place.
+
Patrick Green
 Green arrived by car, identified himself, and then drove her
away to his flat many miles away.
 Four meetings were arranged in quick succession before the
girl broke down and told everything to her mother.
 Green was also working on another underage girl, and drove
hundreds of miles to be able to commit similar assaults.
 Some of his contacts were conducted using his workplace
computer. Colleagues tipped off police after accidentally
discovering some disturbing emails.
 Green was sentenced to 5 years imprisonment for sexual
assault and possession of child pornography.
+
Conspiracy and Grooming
 There are upon occasion organised conspiracies aimed at systematically
grooming children for abuse.
 The nature of conspiracy legislation adds additional complexities to analysing
or prosecuting.
 The Criminal Law Act 1977 criminalises conspiracies:
 S1 - If a person agrees with any other person or
persons that a course of conduct will be pursued
which, if the agreement is carried out in accordance
with their intentions either,
a. will necessarily amount to or involve the commission of any
offence or offences by one or more of the parties to an
agreement or
b. would do so but for the existence of facts which render the
commission of the offence or any of the offences
impossible.
+
Conspiracy
 It is a conspiracy if two or more individuals agree to perform an
indictable or summary offence.
 This includes if they don’t know each other or have no way of
identifying each other.
 There are several limitations.
 It is not a conspiracy if individuals are married.
 It is not a conspiracy is one of the individuals is a child.
 If another person in an agreement is the intended victim.
 A famous example of the third of these is Armin Meiwes, the
German cannibal who secured the consent of his victim.
+
International Grooming
 An international investigation recently resulted in the conviction of
two brothers living in Kuwait.
 They had targeted 110 children worldwide, including 78 in the UK.
 Mohammed Khalaf Al Ali Alhamadi and his brother Yousef were
jailed for five years in December 2012.
 They worked exclusively online, tricking children into disclosing
passwords and then forcing them to perform sex acts on webcams.
 Often this footage is recorded and then added to the common
stock available online of child pornography.
 Around a third of explicit footage shared online involves children under
15.
 CEOP worked with Kuwaiti officials to try and convict in their native
country.
+
International Grooming
 The global nature of the internet makes exclusively online
grooming activities difficult to track.
 The Tor project serves to create an open and anonymous network
running atop the internet and is popular for transmitting material too
sensitive for the internet proper.
 Lolita City for example is a child pornography site accessible only
through the Tor network.
 It contained around 100 gigabytes of child pornography.
 The ‘dark net’ of the internet means much activity is conducted
‘away from prying eyes’
 Members only boards
 Password protected servers
+
International Grooming
 These are important issues for protecting children against the
risks of grooming.
 Technical savvy can complicate the task even further:
 It is difficult to track savvy pedophiles
 Where they can be tracked to is not necessarily where they
actually are.
 The accounts they have on various sites can be difficult to link
due to IP ranges, anonymisation and such.
 The best defence is education, although services such as
CEOPs work incredibly hard across international borders to
limit the risks online.
+
Group discussion questions
 Television entertainment shows such as To Catch a Predator serve
to publicise the issue.
 What are the ethics of such shows?
 What are the implications for public perception of the issue?
 How far is such entrapment justified given the risks?
 How might the volunteers acting as children identify likely sexual
predators?
 To what extent should law enforcement be permitted to participate in
entertainment shows like this?
 How might internet predators be identified using the tools a
computer expert might have available at their disposal?
 How might a technically savvy internet predator cover their tracks,
and how might this be undone?

More Related Content

What's hot

The digital age of marketing
The digital age of marketingThe digital age of marketing
The digital age of marketingTennycut
 
Chapter 16 advertising, sales promotion & public relations
Chapter 16   advertising, sales promotion & public relationsChapter 16   advertising, sales promotion & public relations
Chapter 16 advertising, sales promotion & public relationsMohammed Manamba
 
Chap15 The Internet And Interactive Media
Chap15 The Internet And Interactive MediaChap15 The Internet And Interactive Media
Chap15 The Internet And Interactive MediaPhoenix media & event
 
Consumer behavior models
Consumer behavior modelsConsumer behavior models
Consumer behavior modelsHarsh Arora
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issueskarthik indrajit
 
BB Chapter Six: Outlet Selection and Purchase
BB Chapter Six: Outlet Selection and PurchaseBB Chapter Six: Outlet Selection and Purchase
BB Chapter Six: Outlet Selection and PurchaseBBAdvisor
 
Start Garden: Defining Your Target Customer
Start Garden: Defining Your Target CustomerStart Garden: Defining Your Target Customer
Start Garden: Defining Your Target CustomerEmily Gremel
 
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...Eyad Almasri
 
important Organizational buying behavior
 important Organizational buying behavior  important Organizational buying behavior
important Organizational buying behavior aarati jadhav
 
Advertising management Introduction
Advertising management IntroductionAdvertising management Introduction
Advertising management Introductionsudheer kumar
 
Belch 10e ch17_ppt
Belch 10e ch17_pptBelch 10e ch17_ppt
Belch 10e ch17_pptkpatric
 
Chapter 1 Consumer Behavior Its Origins And Strategic Applications
Chapter 1 Consumer Behavior Its Origins And Strategic ApplicationsChapter 1 Consumer Behavior Its Origins And Strategic Applications
Chapter 1 Consumer Behavior Its Origins And Strategic ApplicationsAvinash Kumar
 
Chapter 1 introduction to e-commerce
Chapter 1   introduction to e-commerceChapter 1   introduction to e-commerce
Chapter 1 introduction to e-commerceKanSol
 
Principles Of Internet Marketing
Principles Of Internet MarketingPrinciples Of Internet Marketing
Principles Of Internet Marketingkameran
 

What's hot (20)

The digital age of marketing
The digital age of marketingThe digital age of marketing
The digital age of marketing
 
Chapter 16 advertising, sales promotion & public relations
Chapter 16   advertising, sales promotion & public relationsChapter 16   advertising, sales promotion & public relations
Chapter 16 advertising, sales promotion & public relations
 
Industrial marketing
Industrial marketingIndustrial marketing
Industrial marketing
 
Green marketing
Green marketingGreen marketing
Green marketing
 
Chap15 The Internet And Interactive Media
Chap15 The Internet And Interactive MediaChap15 The Internet And Interactive Media
Chap15 The Internet And Interactive Media
 
Consumer behavior models
Consumer behavior modelsConsumer behavior models
Consumer behavior models
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
BB Chapter Six: Outlet Selection and Purchase
BB Chapter Six: Outlet Selection and PurchaseBB Chapter Six: Outlet Selection and Purchase
BB Chapter Six: Outlet Selection and Purchase
 
Start Garden: Defining Your Target Customer
Start Garden: Defining Your Target CustomerStart Garden: Defining Your Target Customer
Start Garden: Defining Your Target Customer
 
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
 
important Organizational buying behavior
 important Organizational buying behavior  important Organizational buying behavior
important Organizational buying behavior
 
An Introduction to Sales Management
An Introduction to Sales ManagementAn Introduction to Sales Management
An Introduction to Sales Management
 
Chapter14
Chapter14Chapter14
Chapter14
 
Advertising management Introduction
Advertising management IntroductionAdvertising management Introduction
Advertising management Introduction
 
Belch 10e ch17_ppt
Belch 10e ch17_pptBelch 10e ch17_ppt
Belch 10e ch17_ppt
 
Market research
Market research Market research
Market research
 
PR Lecture 1
PR Lecture 1PR Lecture 1
PR Lecture 1
 
Chapter 1 Consumer Behavior Its Origins And Strategic Applications
Chapter 1 Consumer Behavior Its Origins And Strategic ApplicationsChapter 1 Consumer Behavior Its Origins And Strategic Applications
Chapter 1 Consumer Behavior Its Origins And Strategic Applications
 
Chapter 1 introduction to e-commerce
Chapter 1   introduction to e-commerceChapter 1   introduction to e-commerce
Chapter 1 introduction to e-commerce
 
Principles Of Internet Marketing
Principles Of Internet MarketingPrinciples Of Internet Marketing
Principles Of Internet Marketing
 

Similar to ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 

Similar to ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online (20)

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
cyberworld
cyberworld cyberworld
cyberworld
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
102009
102009102009
102009
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullyingppt
CyberbullyingpptCyberbullyingppt
Cyberbullyingppt
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 

More from Michael Heron

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMichael Heron
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconductMichael Heron
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkMichael Heron
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility SupportMichael Heron
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and AutershipMichael Heron
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interactionMichael Heron
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityMichael Heron
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - TexturesMichael Heron
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)Michael Heron
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)Michael Heron
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationMichael Heron
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsMichael Heron
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsMichael Heron
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationMichael Heron
 

More from Michael Heron (20)

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game Accessibility
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconduct
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS Framework
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility Support
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and Autership
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interaction
 
SAD04 - Inheritance
SAD04 - InheritanceSAD04 - Inheritance
SAD04 - Inheritance
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - Textures
 
GRPHICS06 - Shading
GRPHICS06 - ShadingGRPHICS06 - Shading
GRPHICS06 - Shading
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical Representation
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D Graphics
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art Appreciation
 
2CPP18 - Modifiers
2CPP18 - Modifiers2CPP18 - Modifiers
2CPP18 - Modifiers
 
2CPP17 - File IO
2CPP17 - File IO2CPP17 - File IO
2CPP17 - File IO
 
2CPP16 - STL
2CPP16 - STL2CPP16 - STL
2CPP16 - STL
 
2CPP15 - Templates
2CPP15 - Templates2CPP15 - Templates
2CPP15 - Templates
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online

  • 1. + Grooming and Pedophile Crime Computer Law and Ethics Michael Heron
  • 2. + Introduction  There are dark and unpleasant corners of the internet where crimes occur.  One of the darkest of these are those parts whereby child abuse is perpetrated.  Getting a true handle on the scale of the problem is complicated by media attention.  It is difficult to tell if the attention given to the issue is proportionate to the scale of the issue.  Systemic reviews on the topic suggest that the prevalence estimates range from 8-31% for girls and from 3-17% for boys.  Where ‘abuse’ is defined as any kind of sexual contact between an adult and a child.  Issues of forced intercourse have an average prevalence of 9% for girls and 3% for boys.
  • 3. + The scale of the problem  Any prevalence is too high, but estimating the true extent of the issue is complicated by several factors.  Media attention  Differences in study measures  Differences in study analysis  Differences in study definitions.  Difference in methodology  In the majority of child abuse cases, the perpetrator is a family member or someone close to the child.  Specific percentages vary from country to country, but typically range from 80-90%.
  • 4. + The scale of the problem  Between 2009 and 2010, around 23,000 incidents were recorded by UK police regarding child sexual abuse.  With between 2300 and 4600 of these involving strangers.  ‘Stranger danger’ is real but disproportionate attention results misguided attention.  Online interactions with children follow a somewhat different profile.  The Child Exploitation and Online Protection Centre in 2011 recorded 1,145 cases of online grooming last year.  In England and Wales there were 310 recorded offences of sexual grooming.  Again, reliable studies are difficult to find.  Many incidents simply go unreported.
  • 5. + Grooming  The phrase ‘grooming’ has come to mean the act of gaining the trust of a child with the intention of facilitating some form of exploitation.  Usually sexual, but other exploitations exist.  In the United Kingdom, several laws cover grooming:  Sexual Offences Act 2003 (England and Wales)  Protection of Children and Prevention of Sexual Offenses (Scotland) Act 2005  These make it a crime to befriend children through any means with the intention of meeting and harming them.  Under the Sexual Offences Act, the maximum sentence is 10 years imprisonment.
  • 6. + Grooming and the Internet  The extent to which underage internet users are contacted by online predators is again difficult to gauge.  Estimates put it at around 20% of regular users of chat rooms and online discussion sites.  Around six out of ten children aged three to seventeen use the internet at home.  The large majority of contacts do not progress beyond initial exploratory attempts.  The process is highly structured and managed, exploiting psychology to normalise the prospect of sexual contact.
  • 7. + Grooming and the Internet  The majority of sexual contact stemming from internet grooming is conducted online.  In only 7% of reported cases do perpetrators attempt to meet the child offline (as of 2012).  Such abuse is conducted via webcams, instant messenger applications and social networking sites.  Contact follows a pattern of escalation.  Friendly initial contact  Evolution of psychological manipulation  Threats/Intimidation  Blackmail
  • 8. + Grooming and the Internet  Perpetrators make use of information gathered during initial discussions to gain access to online social resources.  Webmail / Social Network details  The target is then coerced into obeying the perpetrator if they want to get access to their accounts back.  In the meantime, access to address books and friends lists allows for a wider net to be cast amongst social networks.  Perpetrators can act as like friends to get initial contact.  This foothold can then be used to solicit or trick further targets out of passwords, or into giving up identifying ‘forgotten your password’ type information.
  • 9. + A Typical Progression  The following is given in an Action for Children report on the topic as a typical progression:  Predator meets child in an internet chat-room.  Experienced, long-term predators will already have established community presence, and may be considered one of the ‘community elders’  The predator will identify children in the desired age range by interests, writing patterns and topics of discussion.  They will then promote attention on that child, asking their opinion directly during chats with an intention of building a ‘special friendship’  This then leads to an invitation for one to one private chatting which then becomes an exclusive interaction away from the chat room.
  • 10. + A Typical Progression  Once in the private chat room, the discussion will follow a particular direction.  Prompt disclosure and then build a fake rapport by creating ‘me too’ revelations.  Focus on current trends in clothes, music, sport and street talk.  To begin with, the conversation will be wholesome and the predator will make the attempt to come across as a ‘nice person’  The private conversation becomes the key lever point to evolve contact opportunities.  Emails  Text messages  Voice contact
  • 11. + Methods of Contact  Any method is an appropriate one if it allows secrecy.  Incidents have been recorded where predators have:  Sent children mobile phones  Paid for children’s top up credit so parents don’t become suspicious  Setting up free-phone numbers for children to call.  These don’t appear on fixed land line telephone bills.  Several key pieces of information are needed by the predator.  Where the child’s computer is  Who uses it  What kind of monitoring is in place
  • 12. + Progression  The initial part of the grooming process is to build trust and lower defences, as well as identify risks to the predator.  If a child indicates any kind of knowledge of ‘safe behaviour online’, it will normally result in the predator backing off.  It also makes it less likely that children will report suspicious behaviour.  This then ‘softens’ the target for an escalation of psychological tricks.  Positive reinforcement  Normalising of non-normal interactions  Sabotage of confidence
  • 13. + Progression  At some point, the relationship will begin to exhibit sexual qualities.  Often beginning relatively benignly as an attempt to normalise the relationship and serve as a lever to further interactions.  ‘Gradualisation’ of sexual content is handled by testing the boundaries of the interaction  As time progresses, many such relationships evolve to incorporate the sharing and discussion of explicit pornographic material.  Including material involving children, again for the purposes of normalising the interactions.  As children are coerced into performing for the predator, it becomes more difficult for them to extricate themselves from the situation.  The performing of activities becomes blackmail material.
  • 14. + Progression  Children are commonly coerced into:  Watching sexual acts live via web cams  Watch pornographic videos  Listen to audio files  This then sets the stage for a progression into direct participation.  Sexually explicit text conversations  Creation and sending of sexually explicit material  Phone sex  While only a minority of cases progress into actual physical sexual abuse, the psychological damage associated with the above is considerable.
  • 15. + Predator Patience  It is important that predators are patient with their targets, because of the ease with which an online relationship can be terminated.  To counteract this risk, it is not uncommon for predators to be grooming several children at once.  If one breaks off contact, there are others lined up.  Too much attention, or attention that is too intense too quickly also raises the risk of disclosure.  And in turn the risk of being caught by the authorities.
  • 16. + Sexual Offences Act 2003  Section 15 of the Sexual Offences Act covers the criminalisation of these activities.  A person aged 18 or over (A) commits an offence if—  (a)A has met or communicated with another person (B) on at least two occasions and subsequently—  (i)A intentionally meets B,  (ii)A travels with the intention of meeting B in any part of the world or arranges to meet B in any part of the world, or  (iii)B travels with the intention of meeting A in any part of the world,  (b)A intends to do anything to or in respect of B, during or after the meeting mentioned in paragraph (a)(i) to (iii) and in any part of the world, which if done will involve the commission by A of a relevant offence,]  (c)B is under 16, and  (d)A does not reasonably believe that B is 16 or over.
  • 17. + Patrick Green  In February 2000, Patrick Green made contact with a twelve year old girl in an internet chat room.  Initial contact led to email exchanges over a two month period.  This in turn led to regular mobile phone discussions.  Green used emotional manipulation to convince his target that he was in love with her, and intensified his connection through relentless emails and text messages.  Initial requests for a meeting were refused, but the girl’s resolve gradually wore away and she agreed to meet him in a public place.
  • 18. + Patrick Green  Green arrived by car, identified himself, and then drove her away to his flat many miles away.  Four meetings were arranged in quick succession before the girl broke down and told everything to her mother.  Green was also working on another underage girl, and drove hundreds of miles to be able to commit similar assaults.  Some of his contacts were conducted using his workplace computer. Colleagues tipped off police after accidentally discovering some disturbing emails.  Green was sentenced to 5 years imprisonment for sexual assault and possession of child pornography.
  • 19. + Conspiracy and Grooming  There are upon occasion organised conspiracies aimed at systematically grooming children for abuse.  The nature of conspiracy legislation adds additional complexities to analysing or prosecuting.  The Criminal Law Act 1977 criminalises conspiracies:  S1 - If a person agrees with any other person or persons that a course of conduct will be pursued which, if the agreement is carried out in accordance with their intentions either, a. will necessarily amount to or involve the commission of any offence or offences by one or more of the parties to an agreement or b. would do so but for the existence of facts which render the commission of the offence or any of the offences impossible.
  • 20. + Conspiracy  It is a conspiracy if two or more individuals agree to perform an indictable or summary offence.  This includes if they don’t know each other or have no way of identifying each other.  There are several limitations.  It is not a conspiracy if individuals are married.  It is not a conspiracy is one of the individuals is a child.  If another person in an agreement is the intended victim.  A famous example of the third of these is Armin Meiwes, the German cannibal who secured the consent of his victim.
  • 21. + International Grooming  An international investigation recently resulted in the conviction of two brothers living in Kuwait.  They had targeted 110 children worldwide, including 78 in the UK.  Mohammed Khalaf Al Ali Alhamadi and his brother Yousef were jailed for five years in December 2012.  They worked exclusively online, tricking children into disclosing passwords and then forcing them to perform sex acts on webcams.  Often this footage is recorded and then added to the common stock available online of child pornography.  Around a third of explicit footage shared online involves children under 15.  CEOP worked with Kuwaiti officials to try and convict in their native country.
  • 22. + International Grooming  The global nature of the internet makes exclusively online grooming activities difficult to track.  The Tor project serves to create an open and anonymous network running atop the internet and is popular for transmitting material too sensitive for the internet proper.  Lolita City for example is a child pornography site accessible only through the Tor network.  It contained around 100 gigabytes of child pornography.  The ‘dark net’ of the internet means much activity is conducted ‘away from prying eyes’  Members only boards  Password protected servers
  • 23. + International Grooming  These are important issues for protecting children against the risks of grooming.  Technical savvy can complicate the task even further:  It is difficult to track savvy pedophiles  Where they can be tracked to is not necessarily where they actually are.  The accounts they have on various sites can be difficult to link due to IP ranges, anonymisation and such.  The best defence is education, although services such as CEOPs work incredibly hard across international borders to limit the risks online.
  • 24. + Group discussion questions  Television entertainment shows such as To Catch a Predator serve to publicise the issue.  What are the ethics of such shows?  What are the implications for public perception of the issue?  How far is such entrapment justified given the risks?  How might the volunteers acting as children identify likely sexual predators?  To what extent should law enforcement be permitted to participate in entertainment shows like this?  How might internet predators be identified using the tools a computer expert might have available at their disposal?  How might a technically savvy internet predator cover their tracks, and how might this be undone?