SlideShare a Scribd company logo
1 of 12
Download to read offline
FORCED CRIMINALITY AND
EXPLOITATION OF CHILDREN
Dr. Olivier Peyroux – Sociologist
Indicators of exploitation and
child trafficking
 Juvenile delinquents are not aware of being used or
exploited, most of the time they believe to be part of
a family or peer business.
 They trust their exploiters.
 Speechs are stereotyped.
 The amount of money stolen doesn’t fit the life and
appearence of the minor (about 12000
euros/month).
 Family doesn’t show even when the minor is jailed.
 The offences all have very similar process as if they
were rehearsed.
General overview on the criminal
groups using minors
 A precise geographical origin limited to a few
neighbourhoods or to a narrow number of towns
 A family and community basis used for the psychological
hold/influence of the victims,
 A modus operandi specific to each group (theft by the
AutomatedTeller Machines or ATMs, theft of mobile
phones, pick pocketing using fake petitions etc.),
 Ramifications in differentWestern European countries
fostering children movements or transfers.
3
Tandarei
Using the system’s failures
 Failing to register the births
 Aliases
 Fake filiations and cloning identity
 Regular children movement in otherWestern
European countries
5
Focus on 2 children groups who are
forced to commit crimes in France,
Spain, Italy, Germany, Norway
 Exploited in Paris from 2009 and in Spain and
Italy from 2005
 From Constanta andTandarei (Romania)
 Around 70 children boys and girls, 10 to 16 years
old
 Pick-pocketing, mobile phones theft, ATM theft
6
Structuring & Recruitment
 Family base 15 (Constanta) to 50 families
(Tandarei)
 No hierarchy structure, oportunistic alliances
(Constanta)
 Families including in the network by a camata
system or “taxes” (Tandarei)
 Girls are more vulnerable (no school, early
mariage)
 Daughters in law are the most exploited
7
Twisted codes around marriage
customary
 The profitability of the young girl is a preponderant
criterion in the choice of the bride
 The dowry loses its symbolical value and becomes a
“price of the bride”, sometimes as high as 10,000
euro
 The family in law converts symbolically the money
paid at the marriage ceremony into a debt that must
pay back through stealing activities.
 If a girl is promised to an in-law family, and the word
of her father is not kept, the Stabor (traditional
court) meets and important sums of money must be
paid as compensation by the family of the young
girl.
8
Boys position
 The pressures imposed on them are not as high
as those imposed on the girls
 They help or survey their wives with phone
stealing or ATMs theft
 Presence of enslavement situation for boys
coming from violent families
9
Factors determining minors to ask
for protection
 Mistreatment,
 Low level of personal benefits,
 The daughters in-law have no possibility to
grow-up their children; most of the time, the
child is entrusted to relatives in Romania;
 Several young girls who married very early fell in
love with other boys who pushes them to break
up with their husbands and so with their in-law
families in order to live a teenager’s life.
 A high quantity of stolen mobile phones
demanded from them or high quantity of money
 The absence of perspective within the
organisation. 10
INITIATIVES TO PROTECT CHILD
VICTIMS IN EUROPE
 Victim identification system in the UK is
disconnected from the opening of a police
investigation
 - improving process of indentification (602 minors 2013)
 - forms of child exploitation covered are not limited to
sexual exploitation
 - Changing our view onTHB (1st nationality are britain)
 UE database for victims ofTHB
 Facilitating access to the status of victim (Ity art.13
and art.18)
 Simplifying the referrals procedure, innovative
responses and specialised centres,(NL)
 Guardianship (Bl)
 Educational approach and multidisciplinary work
Olivier Peyroux
Sociologist
olivier.peyroux@gmail.com

More Related Content

Viewers also liked

Viewers also liked (15)

Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking
 
Muraszkiewicz
MuraszkiewiczMuraszkiewicz
Muraszkiewicz
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beings
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickers
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-trace
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODC
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus Workshop
 
key note
key notekey note
key note
 
IOM Presentation
IOM Presentation IOM Presentation
IOM Presentation
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...
 
FRA presentation
FRA presentation FRA presentation
FRA presentation
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human trafficking
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removal
 

Similar to Forced criminality and exploitation of children

Telephonefraudportsmouth 140609091651-phpapp01
Telephonefraudportsmouth 140609091651-phpapp01Telephonefraudportsmouth 140609091651-phpapp01
Telephonefraudportsmouth 140609091651-phpapp01
kannanchirayath
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
maefq
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
veilma
 

Similar to Forced criminality and exploitation of children (20)

Human Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to KnowHuman Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to Know
 
Preventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abusePreventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abuse
 
Telephone fraud Frankfurt October 2014
Telephone fraud Frankfurt October 2014Telephone fraud Frankfurt October 2014
Telephone fraud Frankfurt October 2014
 
Dmst educational power_point_presentation
Dmst educational power_point_presentationDmst educational power_point_presentation
Dmst educational power_point_presentation
 
Social Work Conference Lecture presentation 0417
Social Work Conference Lecture presentation 0417Social Work Conference Lecture presentation 0417
Social Work Conference Lecture presentation 0417
 
Telephonefraudportsmouth 140609091651-phpapp01
Telephonefraudportsmouth 140609091651-phpapp01Telephonefraudportsmouth 140609091651-phpapp01
Telephonefraudportsmouth 140609091651-phpapp01
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
 
County Lines Fact sheet - A quick guide to what you need to know
County Lines Fact sheet - A quick guide to what you need to knowCounty Lines Fact sheet - A quick guide to what you need to know
County Lines Fact sheet - A quick guide to what you need to know
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
 
CHILD TRAFFICKING
CHILD TRAFFICKINGCHILD TRAFFICKING
CHILD TRAFFICKING
 
Crossing Borders: International Dimensions of Sex Offending
Crossing Borders: International Dimensions of Sex OffendingCrossing Borders: International Dimensions of Sex Offending
Crossing Borders: International Dimensions of Sex Offending
 
CSE Presentation
CSE PresentationCSE Presentation
CSE Presentation
 
Sex trafficking Chayla Weaver
Sex trafficking Chayla WeaverSex trafficking Chayla Weaver
Sex trafficking Chayla Weaver
 
Child trafficking
Child traffickingChild trafficking
Child trafficking
 
Child trafficking
Child traffickingChild trafficking
Child trafficking
 
Catch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyCatch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st Century
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
C6 Prevention of sexual exploitation of children starts with knowledge on vul...
C6 Prevention of sexual exploitation of children starts with knowledge on vul...C6 Prevention of sexual exploitation of children starts with knowledge on vul...
C6 Prevention of sexual exploitation of children starts with knowledge on vul...
 
Essay On Juvenile Offenders
Essay On Juvenile OffendersEssay On Juvenile Offenders
Essay On Juvenile Offenders
 

Recently uploaded

6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
SS A
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
nyabatejosphat1
 

Recently uploaded (20)

Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 

Forced criminality and exploitation of children

  • 1. FORCED CRIMINALITY AND EXPLOITATION OF CHILDREN Dr. Olivier Peyroux – Sociologist
  • 2. Indicators of exploitation and child trafficking  Juvenile delinquents are not aware of being used or exploited, most of the time they believe to be part of a family or peer business.  They trust their exploiters.  Speechs are stereotyped.  The amount of money stolen doesn’t fit the life and appearence of the minor (about 12000 euros/month).  Family doesn’t show even when the minor is jailed.  The offences all have very similar process as if they were rehearsed.
  • 3. General overview on the criminal groups using minors  A precise geographical origin limited to a few neighbourhoods or to a narrow number of towns  A family and community basis used for the psychological hold/influence of the victims,  A modus operandi specific to each group (theft by the AutomatedTeller Machines or ATMs, theft of mobile phones, pick pocketing using fake petitions etc.),  Ramifications in differentWestern European countries fostering children movements or transfers. 3
  • 5. Using the system’s failures  Failing to register the births  Aliases  Fake filiations and cloning identity  Regular children movement in otherWestern European countries 5
  • 6. Focus on 2 children groups who are forced to commit crimes in France, Spain, Italy, Germany, Norway  Exploited in Paris from 2009 and in Spain and Italy from 2005  From Constanta andTandarei (Romania)  Around 70 children boys and girls, 10 to 16 years old  Pick-pocketing, mobile phones theft, ATM theft 6
  • 7. Structuring & Recruitment  Family base 15 (Constanta) to 50 families (Tandarei)  No hierarchy structure, oportunistic alliances (Constanta)  Families including in the network by a camata system or “taxes” (Tandarei)  Girls are more vulnerable (no school, early mariage)  Daughters in law are the most exploited 7
  • 8. Twisted codes around marriage customary  The profitability of the young girl is a preponderant criterion in the choice of the bride  The dowry loses its symbolical value and becomes a “price of the bride”, sometimes as high as 10,000 euro  The family in law converts symbolically the money paid at the marriage ceremony into a debt that must pay back through stealing activities.  If a girl is promised to an in-law family, and the word of her father is not kept, the Stabor (traditional court) meets and important sums of money must be paid as compensation by the family of the young girl. 8
  • 9. Boys position  The pressures imposed on them are not as high as those imposed on the girls  They help or survey their wives with phone stealing or ATMs theft  Presence of enslavement situation for boys coming from violent families 9
  • 10. Factors determining minors to ask for protection  Mistreatment,  Low level of personal benefits,  The daughters in-law have no possibility to grow-up their children; most of the time, the child is entrusted to relatives in Romania;  Several young girls who married very early fell in love with other boys who pushes them to break up with their husbands and so with their in-law families in order to live a teenager’s life.  A high quantity of stolen mobile phones demanded from them or high quantity of money  The absence of perspective within the organisation. 10
  • 11. INITIATIVES TO PROTECT CHILD VICTIMS IN EUROPE  Victim identification system in the UK is disconnected from the opening of a police investigation  - improving process of indentification (602 minors 2013)  - forms of child exploitation covered are not limited to sexual exploitation  - Changing our view onTHB (1st nationality are britain)  UE database for victims ofTHB  Facilitating access to the status of victim (Ity art.13 and art.18)  Simplifying the referrals procedure, innovative responses and specialised centres,(NL)  Guardianship (Bl)  Educational approach and multidisciplinary work