SlideShare a Scribd company logo
+
Grooming and Pedophile
Crime
Computer Law and Ethics
Michael Heron
+
Introduction
 There are dark and unpleasant corners of the internet where crimes occur.
 One of the darkest of these are those parts whereby child abuse is perpetrated.
 Getting a true handle on the scale of the problem is complicated by media
attention.
 It is difficult to tell if the attention given to the issue is proportionate to the scale of
the issue.
 Systemic reviews on the topic suggest that the prevalence estimates
range from 8-31% for girls and from 3-17% for boys.
 Where ‘abuse’ is defined as any kind of sexual contact between an adult and a
child.
 Issues of forced intercourse have an average prevalence of 9% for girls
and 3% for boys.
+
The scale of the problem
 Any prevalence is too high, but estimating the true extent of the
issue is complicated by several factors.
 Media attention
 Differences in study measures
 Differences in study analysis
 Differences in study definitions.
 Difference in methodology
 In the majority of child abuse cases, the perpetrator is a family
member or someone close to the child.
 Specific percentages vary from country to country, but typically
range from 80-90%.
+
The scale of the problem
 Between 2009 and 2010, around 23,000 incidents were recorded
by UK police regarding child sexual abuse.
 With between 2300 and 4600 of these involving strangers.
 ‘Stranger danger’ is real but disproportionate attention results misguided
attention.
 Online interactions with children follow a somewhat different
profile.
 The Child Exploitation and Online Protection Centre in 2011 recorded
1,145 cases of online grooming last year.
 In England and Wales there were 310 recorded offences of sexual
grooming.
 Again, reliable studies are difficult to find.
 Many incidents simply go unreported.
+
Grooming
 The phrase ‘grooming’ has come to mean the act of gaining the
trust of a child with the intention of facilitating some form of
exploitation.
 Usually sexual, but other exploitations exist.
 In the United Kingdom, several laws cover grooming:
 Sexual Offences Act 2003 (England and Wales)
 Protection of Children and Prevention of Sexual Offenses (Scotland)
Act 2005
 These make it a crime to befriend children through any means
with the intention of meeting and harming them.
 Under the Sexual Offences Act, the maximum sentence is 10 years
imprisonment.
+
Grooming and the Internet
 The extent to which underage internet users are contacted by
online predators is again difficult to gauge.
 Estimates put it at around 20% of regular users of chat rooms and
online discussion sites.
 Around six out of ten children aged three to seventeen use the
internet at home.
 The large majority of contacts do not progress beyond initial
exploratory attempts.
 The process is highly structured and managed, exploiting
psychology to normalise the prospect of sexual contact.
+
Grooming and the Internet
 The majority of sexual contact stemming from internet
grooming is conducted online.
 In only 7% of reported cases do perpetrators attempt to meet the
child offline (as of 2012).
 Such abuse is conducted via webcams, instant messenger
applications and social networking sites.
 Contact follows a pattern of escalation.
 Friendly initial contact
 Evolution of psychological manipulation
 Threats/Intimidation
 Blackmail
+
Grooming and the Internet
 Perpetrators make use of information gathered during initial
discussions to gain access to online social resources.
 Webmail / Social Network details
 The target is then coerced into obeying the perpetrator if they
want to get access to their accounts back.
 In the meantime, access to address books and friends lists
allows for a wider net to be cast amongst social networks.
 Perpetrators can act as like friends to get initial contact.
 This foothold can then be used to solicit or trick further targets out of
passwords, or into giving up identifying ‘forgotten your password’
type information.
+
A Typical Progression
 The following is given in an Action for Children report on the
topic as a typical progression:
 Predator meets child in an internet chat-room.
 Experienced, long-term predators will already have established
community presence, and may be considered one of the
‘community elders’
 The predator will identify children in the desired age range by
interests, writing patterns and topics of discussion.
 They will then promote attention on that child, asking their opinion
directly during chats with an intention of building a ‘special
friendship’
 This then leads to an invitation for one to one private chatting which
then becomes an exclusive interaction away from the chat room.
+
A Typical Progression
 Once in the private chat room, the discussion will follow a
particular direction.
 Prompt disclosure and then build a fake rapport by creating ‘me too’
revelations.
 Focus on current trends in clothes, music, sport and street talk.
 To begin with, the conversation will be wholesome and the
predator will make the attempt to come across as a ‘nice person’
 The private conversation becomes the key lever point to evolve
contact opportunities.
 Emails
 Text messages
 Voice contact
+
Methods of Contact
 Any method is an appropriate one if it allows secrecy.
 Incidents have been recorded where predators have:
 Sent children mobile phones
 Paid for children’s top up credit so parents don’t become
suspicious
 Setting up free-phone numbers for children to call.
 These don’t appear on fixed land line telephone bills.
 Several key pieces of information are needed by the predator.
 Where the child’s computer is
 Who uses it
 What kind of monitoring is in place
+
Progression
 The initial part of the grooming process is to build trust and
lower defences, as well as identify risks to the predator.
 If a child indicates any kind of knowledge of ‘safe behaviour online’,
it will normally result in the predator backing off.
 It also makes it less likely that children will report suspicious
behaviour.
 This then ‘softens’ the target for an escalation of psychological
tricks.
 Positive reinforcement
 Normalising of non-normal interactions
 Sabotage of confidence
+
Progression
 At some point, the relationship will begin to exhibit sexual qualities.
 Often beginning relatively benignly as an attempt to normalise the relationship
and serve as a lever to further interactions.
 ‘Gradualisation’ of sexual content is handled by testing the boundaries of the
interaction
 As time progresses, many such relationships evolve to incorporate the
sharing and discussion of explicit pornographic material.
 Including material involving children, again for the purposes of normalising the
interactions.
 As children are coerced into performing for the predator, it becomes more
difficult for them to extricate themselves from the situation.
 The performing of activities becomes blackmail material.
+
Progression
 Children are commonly coerced into:
 Watching sexual acts live via web cams
 Watch pornographic videos
 Listen to audio files
 This then sets the stage for a progression into direct participation.
 Sexually explicit text conversations
 Creation and sending of sexually explicit material
 Phone sex
 While only a minority of cases progress into actual physical sexual
abuse, the psychological damage associated with the above is
considerable.
+
Predator Patience
 It is important that predators are patient with their targets,
because of the ease with which an online relationship can be
terminated.
 To counteract this risk, it is not uncommon for predators to be
grooming several children at once.
 If one breaks off contact, there are others lined up.
 Too much attention, or attention that is too intense too quickly
also raises the risk of disclosure.
 And in turn the risk of being caught by the authorities.
+
Sexual Offences Act 2003
 Section 15 of the Sexual Offences Act covers the criminalisation of
these activities.
 A person aged 18 or over (A) commits an offence if—
 (a)A has met or communicated with another person (B) on at least
two occasions and subsequently—
 (i)A intentionally meets B,
 (ii)A travels with the intention of meeting B in any part of the world
or arranges to meet B in any part of the world, or
 (iii)B travels with the intention of meeting A in any part of the world,
 (b)A intends to do anything to or in respect of B, during or after the
meeting mentioned in paragraph (a)(i) to (iii) and in any part of the
world, which if done will involve the commission by A of a relevant
offence,]
 (c)B is under 16, and
 (d)A does not reasonably believe that B is 16 or over.
+
Patrick Green
 In February 2000, Patrick Green made contact with a twelve
year old girl in an internet chat room.
 Initial contact led to email exchanges over a two month period.
 This in turn led to regular mobile phone discussions.
 Green used emotional manipulation to convince his target that
he was in love with her, and intensified his connection through
relentless emails and text messages.
 Initial requests for a meeting were refused, but the girl’s resolve
gradually wore away and she agreed to meet him in a public
place.
+
Patrick Green
 Green arrived by car, identified himself, and then drove her
away to his flat many miles away.
 Four meetings were arranged in quick succession before the
girl broke down and told everything to her mother.
 Green was also working on another underage girl, and drove
hundreds of miles to be able to commit similar assaults.
 Some of his contacts were conducted using his workplace
computer. Colleagues tipped off police after accidentally
discovering some disturbing emails.
 Green was sentenced to 5 years imprisonment for sexual
assault and possession of child pornography.
+
Conspiracy and Grooming
 There are upon occasion organised conspiracies aimed at systematically
grooming children for abuse.
 The nature of conspiracy legislation adds additional complexities to analysing
or prosecuting.
 The Criminal Law Act 1977 criminalises conspiracies:
 S1 - If a person agrees with any other person or
persons that a course of conduct will be pursued
which, if the agreement is carried out in accordance
with their intentions either,
a. will necessarily amount to or involve the commission of any
offence or offences by one or more of the parties to an
agreement or
b. would do so but for the existence of facts which render the
commission of the offence or any of the offences
impossible.
+
Conspiracy
 It is a conspiracy if two or more individuals agree to perform an
indictable or summary offence.
 This includes if they don’t know each other or have no way of
identifying each other.
 There are several limitations.
 It is not a conspiracy if individuals are married.
 It is not a conspiracy is one of the individuals is a child.
 If another person in an agreement is the intended victim.
 A famous example of the third of these is Armin Meiwes, the
German cannibal who secured the consent of his victim.
+
International Grooming
 An international investigation recently resulted in the conviction of
two brothers living in Kuwait.
 They had targeted 110 children worldwide, including 78 in the UK.
 Mohammed Khalaf Al Ali Alhamadi and his brother Yousef were
jailed for five years in December 2012.
 They worked exclusively online, tricking children into disclosing
passwords and then forcing them to perform sex acts on webcams.
 Often this footage is recorded and then added to the common
stock available online of child pornography.
 Around a third of explicit footage shared online involves children under
15.
 CEOP worked with Kuwaiti officials to try and convict in their native
country.
+
International Grooming
 The global nature of the internet makes exclusively online
grooming activities difficult to track.
 The Tor project serves to create an open and anonymous network
running atop the internet and is popular for transmitting material too
sensitive for the internet proper.
 Lolita City for example is a child pornography site accessible only
through the Tor network.
 It contained around 100 gigabytes of child pornography.
 The ‘dark net’ of the internet means much activity is conducted
‘away from prying eyes’
 Members only boards
 Password protected servers
+
International Grooming
 These are important issues for protecting children against the
risks of grooming.
 Technical savvy can complicate the task even further:
 It is difficult to track savvy pedophiles
 Where they can be tracked to is not necessarily where they
actually are.
 The accounts they have on various sites can be difficult to link
due to IP ranges, anonymisation and such.
 The best defence is education, although services such as
CEOPs work incredibly hard across international borders to
limit the risks online.
+
Group discussion questions
 Television entertainment shows such as To Catch a Predator serve
to publicise the issue.
 What are the ethics of such shows?
 What are the implications for public perception of the issue?
 How far is such entrapment justified given the risks?
 How might the volunteers acting as children identify likely sexual
predators?
 To what extent should law enforcement be permitted to participate in
entertainment shows like this?
 How might internet predators be identified using the tools a
computer expert might have available at their disposal?
 How might a technically savvy internet predator cover their tracks,
and how might this be undone?

More Related Content

Similar to ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
truyenthong_vng
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
Alexander Berta
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
malissa_1041
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
Erickson Martinez
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
102009
102009102009
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
Sage Lewis
 

Similar to ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online (20)

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
cyberworld
cyberworld cyberworld
cyberworld
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
102009
102009102009
102009
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullyingppt
CyberbullyingpptCyberbullyingppt
Cyberbullyingppt
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 

More from Michael Heron

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game Accessibility
Michael Heron
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconduct
Michael Heron
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS Framework
Michael Heron
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility Support
Michael Heron
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and Autership
Michael Heron
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interaction
Michael Heron
 
SAD04 - Inheritance
SAD04 - InheritanceSAD04 - Inheritance
SAD04 - Inheritance
Michael Heron
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
Michael Heron
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - Textures
Michael Heron
 
GRPHICS06 - Shading
GRPHICS06 - ShadingGRPHICS06 - Shading
GRPHICS06 - Shading
Michael Heron
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)
Michael Heron
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)
Michael Heron
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical Representation
Michael Heron
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D Graphics
Michael Heron
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
Michael Heron
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art Appreciation
Michael Heron
 
2CPP18 - Modifiers
2CPP18 - Modifiers2CPP18 - Modifiers
2CPP18 - Modifiers
Michael Heron
 
2CPP17 - File IO
2CPP17 - File IO2CPP17 - File IO
2CPP17 - File IO
Michael Heron
 
2CPP16 - STL
2CPP16 - STL2CPP16 - STL
2CPP16 - STL
Michael Heron
 
2CPP15 - Templates
2CPP15 - Templates2CPP15 - Templates
2CPP15 - Templates
Michael Heron
 

More from Michael Heron (20)

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game Accessibility
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconduct
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS Framework
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility Support
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and Autership
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interaction
 
SAD04 - Inheritance
SAD04 - InheritanceSAD04 - Inheritance
SAD04 - Inheritance
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - Textures
 
GRPHICS06 - Shading
GRPHICS06 - ShadingGRPHICS06 - Shading
GRPHICS06 - Shading
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical Representation
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D Graphics
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art Appreciation
 
2CPP18 - Modifiers
2CPP18 - Modifiers2CPP18 - Modifiers
2CPP18 - Modifiers
 
2CPP17 - File IO
2CPP17 - File IO2CPP17 - File IO
2CPP17 - File IO
 
2CPP16 - STL
2CPP16 - STL2CPP16 - STL
2CPP16 - STL
 
2CPP15 - Templates
2CPP15 - Templates2CPP15 - Templates
2CPP15 - Templates
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online

  • 1. + Grooming and Pedophile Crime Computer Law and Ethics Michael Heron
  • 2. + Introduction  There are dark and unpleasant corners of the internet where crimes occur.  One of the darkest of these are those parts whereby child abuse is perpetrated.  Getting a true handle on the scale of the problem is complicated by media attention.  It is difficult to tell if the attention given to the issue is proportionate to the scale of the issue.  Systemic reviews on the topic suggest that the prevalence estimates range from 8-31% for girls and from 3-17% for boys.  Where ‘abuse’ is defined as any kind of sexual contact between an adult and a child.  Issues of forced intercourse have an average prevalence of 9% for girls and 3% for boys.
  • 3. + The scale of the problem  Any prevalence is too high, but estimating the true extent of the issue is complicated by several factors.  Media attention  Differences in study measures  Differences in study analysis  Differences in study definitions.  Difference in methodology  In the majority of child abuse cases, the perpetrator is a family member or someone close to the child.  Specific percentages vary from country to country, but typically range from 80-90%.
  • 4. + The scale of the problem  Between 2009 and 2010, around 23,000 incidents were recorded by UK police regarding child sexual abuse.  With between 2300 and 4600 of these involving strangers.  ‘Stranger danger’ is real but disproportionate attention results misguided attention.  Online interactions with children follow a somewhat different profile.  The Child Exploitation and Online Protection Centre in 2011 recorded 1,145 cases of online grooming last year.  In England and Wales there were 310 recorded offences of sexual grooming.  Again, reliable studies are difficult to find.  Many incidents simply go unreported.
  • 5. + Grooming  The phrase ‘grooming’ has come to mean the act of gaining the trust of a child with the intention of facilitating some form of exploitation.  Usually sexual, but other exploitations exist.  In the United Kingdom, several laws cover grooming:  Sexual Offences Act 2003 (England and Wales)  Protection of Children and Prevention of Sexual Offenses (Scotland) Act 2005  These make it a crime to befriend children through any means with the intention of meeting and harming them.  Under the Sexual Offences Act, the maximum sentence is 10 years imprisonment.
  • 6. + Grooming and the Internet  The extent to which underage internet users are contacted by online predators is again difficult to gauge.  Estimates put it at around 20% of regular users of chat rooms and online discussion sites.  Around six out of ten children aged three to seventeen use the internet at home.  The large majority of contacts do not progress beyond initial exploratory attempts.  The process is highly structured and managed, exploiting psychology to normalise the prospect of sexual contact.
  • 7. + Grooming and the Internet  The majority of sexual contact stemming from internet grooming is conducted online.  In only 7% of reported cases do perpetrators attempt to meet the child offline (as of 2012).  Such abuse is conducted via webcams, instant messenger applications and social networking sites.  Contact follows a pattern of escalation.  Friendly initial contact  Evolution of psychological manipulation  Threats/Intimidation  Blackmail
  • 8. + Grooming and the Internet  Perpetrators make use of information gathered during initial discussions to gain access to online social resources.  Webmail / Social Network details  The target is then coerced into obeying the perpetrator if they want to get access to their accounts back.  In the meantime, access to address books and friends lists allows for a wider net to be cast amongst social networks.  Perpetrators can act as like friends to get initial contact.  This foothold can then be used to solicit or trick further targets out of passwords, or into giving up identifying ‘forgotten your password’ type information.
  • 9. + A Typical Progression  The following is given in an Action for Children report on the topic as a typical progression:  Predator meets child in an internet chat-room.  Experienced, long-term predators will already have established community presence, and may be considered one of the ‘community elders’  The predator will identify children in the desired age range by interests, writing patterns and topics of discussion.  They will then promote attention on that child, asking their opinion directly during chats with an intention of building a ‘special friendship’  This then leads to an invitation for one to one private chatting which then becomes an exclusive interaction away from the chat room.
  • 10. + A Typical Progression  Once in the private chat room, the discussion will follow a particular direction.  Prompt disclosure and then build a fake rapport by creating ‘me too’ revelations.  Focus on current trends in clothes, music, sport and street talk.  To begin with, the conversation will be wholesome and the predator will make the attempt to come across as a ‘nice person’  The private conversation becomes the key lever point to evolve contact opportunities.  Emails  Text messages  Voice contact
  • 11. + Methods of Contact  Any method is an appropriate one if it allows secrecy.  Incidents have been recorded where predators have:  Sent children mobile phones  Paid for children’s top up credit so parents don’t become suspicious  Setting up free-phone numbers for children to call.  These don’t appear on fixed land line telephone bills.  Several key pieces of information are needed by the predator.  Where the child’s computer is  Who uses it  What kind of monitoring is in place
  • 12. + Progression  The initial part of the grooming process is to build trust and lower defences, as well as identify risks to the predator.  If a child indicates any kind of knowledge of ‘safe behaviour online’, it will normally result in the predator backing off.  It also makes it less likely that children will report suspicious behaviour.  This then ‘softens’ the target for an escalation of psychological tricks.  Positive reinforcement  Normalising of non-normal interactions  Sabotage of confidence
  • 13. + Progression  At some point, the relationship will begin to exhibit sexual qualities.  Often beginning relatively benignly as an attempt to normalise the relationship and serve as a lever to further interactions.  ‘Gradualisation’ of sexual content is handled by testing the boundaries of the interaction  As time progresses, many such relationships evolve to incorporate the sharing and discussion of explicit pornographic material.  Including material involving children, again for the purposes of normalising the interactions.  As children are coerced into performing for the predator, it becomes more difficult for them to extricate themselves from the situation.  The performing of activities becomes blackmail material.
  • 14. + Progression  Children are commonly coerced into:  Watching sexual acts live via web cams  Watch pornographic videos  Listen to audio files  This then sets the stage for a progression into direct participation.  Sexually explicit text conversations  Creation and sending of sexually explicit material  Phone sex  While only a minority of cases progress into actual physical sexual abuse, the psychological damage associated with the above is considerable.
  • 15. + Predator Patience  It is important that predators are patient with their targets, because of the ease with which an online relationship can be terminated.  To counteract this risk, it is not uncommon for predators to be grooming several children at once.  If one breaks off contact, there are others lined up.  Too much attention, or attention that is too intense too quickly also raises the risk of disclosure.  And in turn the risk of being caught by the authorities.
  • 16. + Sexual Offences Act 2003  Section 15 of the Sexual Offences Act covers the criminalisation of these activities.  A person aged 18 or over (A) commits an offence if—  (a)A has met or communicated with another person (B) on at least two occasions and subsequently—  (i)A intentionally meets B,  (ii)A travels with the intention of meeting B in any part of the world or arranges to meet B in any part of the world, or  (iii)B travels with the intention of meeting A in any part of the world,  (b)A intends to do anything to or in respect of B, during or after the meeting mentioned in paragraph (a)(i) to (iii) and in any part of the world, which if done will involve the commission by A of a relevant offence,]  (c)B is under 16, and  (d)A does not reasonably believe that B is 16 or over.
  • 17. + Patrick Green  In February 2000, Patrick Green made contact with a twelve year old girl in an internet chat room.  Initial contact led to email exchanges over a two month period.  This in turn led to regular mobile phone discussions.  Green used emotional manipulation to convince his target that he was in love with her, and intensified his connection through relentless emails and text messages.  Initial requests for a meeting were refused, but the girl’s resolve gradually wore away and she agreed to meet him in a public place.
  • 18. + Patrick Green  Green arrived by car, identified himself, and then drove her away to his flat many miles away.  Four meetings were arranged in quick succession before the girl broke down and told everything to her mother.  Green was also working on another underage girl, and drove hundreds of miles to be able to commit similar assaults.  Some of his contacts were conducted using his workplace computer. Colleagues tipped off police after accidentally discovering some disturbing emails.  Green was sentenced to 5 years imprisonment for sexual assault and possession of child pornography.
  • 19. + Conspiracy and Grooming  There are upon occasion organised conspiracies aimed at systematically grooming children for abuse.  The nature of conspiracy legislation adds additional complexities to analysing or prosecuting.  The Criminal Law Act 1977 criminalises conspiracies:  S1 - If a person agrees with any other person or persons that a course of conduct will be pursued which, if the agreement is carried out in accordance with their intentions either, a. will necessarily amount to or involve the commission of any offence or offences by one or more of the parties to an agreement or b. would do so but for the existence of facts which render the commission of the offence or any of the offences impossible.
  • 20. + Conspiracy  It is a conspiracy if two or more individuals agree to perform an indictable or summary offence.  This includes if they don’t know each other or have no way of identifying each other.  There are several limitations.  It is not a conspiracy if individuals are married.  It is not a conspiracy is one of the individuals is a child.  If another person in an agreement is the intended victim.  A famous example of the third of these is Armin Meiwes, the German cannibal who secured the consent of his victim.
  • 21. + International Grooming  An international investigation recently resulted in the conviction of two brothers living in Kuwait.  They had targeted 110 children worldwide, including 78 in the UK.  Mohammed Khalaf Al Ali Alhamadi and his brother Yousef were jailed for five years in December 2012.  They worked exclusively online, tricking children into disclosing passwords and then forcing them to perform sex acts on webcams.  Often this footage is recorded and then added to the common stock available online of child pornography.  Around a third of explicit footage shared online involves children under 15.  CEOP worked with Kuwaiti officials to try and convict in their native country.
  • 22. + International Grooming  The global nature of the internet makes exclusively online grooming activities difficult to track.  The Tor project serves to create an open and anonymous network running atop the internet and is popular for transmitting material too sensitive for the internet proper.  Lolita City for example is a child pornography site accessible only through the Tor network.  It contained around 100 gigabytes of child pornography.  The ‘dark net’ of the internet means much activity is conducted ‘away from prying eyes’  Members only boards  Password protected servers
  • 23. + International Grooming  These are important issues for protecting children against the risks of grooming.  Technical savvy can complicate the task even further:  It is difficult to track savvy pedophiles  Where they can be tracked to is not necessarily where they actually are.  The accounts they have on various sites can be difficult to link due to IP ranges, anonymisation and such.  The best defence is education, although services such as CEOPs work incredibly hard across international borders to limit the risks online.
  • 24. + Group discussion questions  Television entertainment shows such as To Catch a Predator serve to publicise the issue.  What are the ethics of such shows?  What are the implications for public perception of the issue?  How far is such entrapment justified given the risks?  How might the volunteers acting as children identify likely sexual predators?  To what extent should law enforcement be permitted to participate in entertainment shows like this?  How might internet predators be identified using the tools a computer expert might have available at their disposal?  How might a technically savvy internet predator cover their tracks, and how might this be undone?