online child sex exploitation sexting and grooming
Post on 24-Apr-2023
1 Views
Preview:
TRANSCRIPT
UNIVERSITY OF DERBY, COMPUTER FORENSICS AND INVESTIGATION,
BSC (HONS)
Online Child Sex
ExploitationSexting and Grooming
Aisha Raja 2014
This research document reviews the ways in which the internet is
being used in relation to child sex exploitation specifically Sexting
and Grooming. It will evaluate what measures are in place protecting
children and what could be done to further prevent children becoming
victims in the future.
Page 1
ContentsAcknowledgment..............................................................3
Abbreviations...............................................................4
Abstract....................................................................5
Introduction................................................................7
Chapter One: Child sexual Exploitation.....................................8
Investigating Child Sex Exploitation......................................9
Chapter Two: Sexting and grooming..........................................11
The Problem of Sexting...................................................13
Dealing with sexting.....................................................15
Chapter Three: Online Grooming.............................................18
Where and How Grooming Occurs............................................18
Grooming cases...........................................................20
Grooming Statistics......................................................21
Chapter Four: Legal System and the Victims.................................22
Current Laws and Practices...............................................23
Conclusion.................................................................25
Hypothesis.................................................................28
Works Cited................................................................30
Bibliography...............................................................35
Page 3
Acknowledgment
There is one person who has been my rock throughout my time at
University and all through every aspect of my life, this is my Sister.
I am truly honoured and privileged to have such a wonderful woman in
my life. She has not only been there for me when all seemed hopeless,
but has also been there as a point of strength and encouragement for
me from start to finish. I am truly indebted to her.
To my daughters who have endured my tears and happiness throughout
this process, who have stood by me and encouraged me, offering their
first hand experiences as teenage girls growing up in a technological
era. I love you both eternally and am proud to have wonderful and
intelligent daughters.
Special thanks go to my youngest daughter. Her steadfast ability to
not only motivate me to complete this paper, but also her excellent
proof reading and research skills aided me invaluably. If not for her
dedication and support this paper would have not been completed to
such a standard. Thank you so much darling.
I would like to offer a huge thank you to my friend and esteemed noble
Nathalie. Without her outstanding support and skills, I may have never
regained my perseverance to conclude this paper and certainly not with
such quality.
My dissertation manager Jo Drummond-Child, her knowledge and patience
have been invaluable to me. Her support in the completion of this
dissertation has seen it through to production.
Page 4
A very big thank you goes in particular to Phil Lawson and all the
tech guys, who have been there over the past 7 years, not only as
friends but also for all my technical woes, of which there have been
many.
Last, but certainly not least, all those who have kindly contributed
their time and knowledge in the production of this dissertation. Many
thanks to you all!
Page 5
Abbreviations
CEOP - Child Exploitation and Online Protection
CHAMS - Children's and Adolescent Mental Health Service
COPINE - Combating Paedophile Information Networks in Europe
CPS - Crown Prosecution Service
CSE - Child Sex Exploitation
IWF- Internet Watch Foundation
NSPCC - National Society for the Prevention of Cruelty to Children
NWG - UK National Working Group for Sexually Exploited Children
Ofcom - Office of Communications
SAP - Sentencing Advisory Panel
SGII - Self Generated Indecent Images
UK – United Kingdom
Page 6
Abstract
Child Sex Exploitation (CSE) is by no means a new problem but one
that has been around since the dawn of man. The problem is a
protracted one, yet it is one which imagination can not over-step the
reality. Nor is it something possible to negate through our inability
to answer postulation that is in itself the problem. CSE can not be
targeted as a problem of a particular society, class or country;
rather it is a worldwide issue and present within every society in
every class in every country.
At the beginning of this dissertation, my intention was to
exemplify how the internet and digital devices were being used as a
tool by perpetrators to groom and exploit children of all ages, into
performing sexual acts for adult gratification. Moreover, how children
themselves were also using these devices to ‘sext’ one another.
Emphasis was being placed on how these acts could in some way be
monitored and ultimately be prevented from taking place in the first
instance through detection, monitoring and eventual incarceration of
those involved in committing such crimes as CSE and the creation and
distribution of child abuse images.
However, since completing this dissertation, opinions have altered
extensively; not only in reference to the requirements of what are
needed to prevent CSE, sexting and grooming, but also in relation to
the perpetrators, victims and the way in which society, law enforcers
and support services perceive and deal with these acts.
Page 7
It is justifiable to suggest that the internet has certainly been a
catalyst in the ability to exploit children in many ways. Also, how
it is being used as a tool and resource to sexually exploit children,
not only by the perpetrators but by the children themselves is a
prurient apprehension of our time. This dissertation will analyse and
examine the way in which the internet is being used to conduct such
acts. Notwithstanding, online grooming, sexting and other significant
modes, there must be the consideration in terms of the current laws
surrounding online CSE. In looking at the whole situation one can
begin to build an overview regarding the preventative measures needed
and further protective measures required to ensure fewer children are
becoming victims of such exploitation, whether this be consented or
not.
As the late Nelson Mandela said; ‘Education is the most powerful weapon which
you can use to change the world.’ (good reads, 2014)
Page 8
Significantly, then, the research methodology used in this
dissertation will be qualitative, based on the collection of laws and
data already surrounding this topic. Findings will include current and
ongoing research into this area which has been carried out by
organisations such as: CEOP (Child Exploitation and Online
Protection); NSPCC (National Society for the Prevention of Cruelty to
Children) amongst other respected organisations. Furthermore,
information based on my personal experience from the time spent as a
Childline Councillor will also be used.
Page 9
Introduction This dissertation will endeavour to compare and contrast case
studies and victim reports. That is to say, drawing upon the
preventative measures of law enforcement agencies as well as
government and charitable organisations. Additionally, emphasis is
placed upon research to investigate the preventative measures which
are/could be used in order to tackle the problems surrounding CSE,
sexting and grooming. A definitive example may be such measures as
specialised mobile devises for children, internet service providers
(ISP) monitoring unlawful usage, better educational programs to
children, parents and child welfare organisations, as well as better
reform programs for those found guilty, or those who desire to present
themselves as having an issue with paedophilia and wish to seek help.
Therefore, on this basis, it would also be beneficial to review
how the law is keeping up with such an egregious problem and evaluate
if improvements could be made in this area. Poignantly, then a more
pertinent question would be to ask what kind of changes? As it
currently stands there are no specific laws clearly stating the
legislative stance on sexting. To my mind, the laws currently
governing this area are; Sexual Offences Act 2003, Protection of
Children Act 1978 and the Criminal Justice Act 1988. It is with a
great lassitude that we find ourselves in such a judicial quagmire
regarding the rights of children in 2014.
Page 10
Chapter One : Child sexual Exploitation
Before we can understand what Child Sexual Exploitation is, we
first need to ascertain what it means. According to the UK National
Working Group for Sexually Exploited Children (NWG), the statutory
guidance definition of Child Sex Exploitation in the United Kingdom
is:
‘Sexual exploitation of children and young people under the age of 18 involves
exploitative situations, contexts and relationships where young people (or a third person
or persons) receive ‘something’ (e.g. food, accommodation, drugs, alcohol, cigarettes,
affection, gifts, money) as a result of them performing, and/or others performing on
them, sexual activities. Child sexual exploitation can occur through the use of technology
without the child’s immediate recognition; for example being persuaded to post sexual
images on the Internet/mobile phones without immediate payment or gain. In all cases,
those exploiting the child/young person have power over them by virtue of their age,
gender, intellect, physical strength and/or economic or other resources. Violence,
coercion and intimidation are common, involvement in exploitative relationships being
characterised in the main by the child or young person’s limited availability of choice
resulting from their social/economic and/or emotional vulnerability.’ (HM
Goverment, 2009)
In understanding the position of NWG, in terms of child sex
exploitation (CSE), one comes to contemplate the means by which
children are used in a sexual nature, more often than not to generate
money, power, or to place the exploiter into a certain class giving
them an assured status. A subsection of CSE is Sexting and Grooming.
NSPCC states that sexting can in itself be broken down into
subcategories such as ‘Camming’, where in sexual acts take place via
Page 11
live video over an internet connection, ‘Revenge Porn’, a term used
for photographs or video footage uploaded to the internet without the
subject's permission and usually without their knowledge (The Week,
2013) and ‘Cybersex’, sexual activity carried out or engaged in using
a computer. (NSPCC, 2014) That said, any act that involves visually
depicting a child classed as a minor, engaging in a sexual act is
deemed to be CSE. (Sexual Offences Act 2003 c. 42. Indecent
photographs of children. s46)
The computer misuse Act 1990, governs those who use their digital
devises in order to commit crimes. This gives rise to the nature in
which computers, digital devices and more importantly the internet has
become a big part of everyday life for most people, especially over
the past two decades. Mobile phones have developed into mini
computers in our pockets, so much so and with such success that many
people no longer need their computers, they only require an up-to-date
smart phone. This mobility of communication leads us to consider
further ways in which children can and do become victims of CSE.
Predominately groomers now have the access to sit within view of the
child they are grooming, while staying connected to them via their
mobile devices, all the while the child may never know of the
perpetrators presence. Likewise, increasingly chat hosts are
incorporating location tracking. A child can easily be located if they
fail to disable this function on their mobile device. Coupled
together, a child’s mobile device can lead them to be placed in a
vulnerable state, without the child even realising its own
vulnerability.
Page 12
It is in a report conducted by CEOP, where it was announced they
received 8,000 reports of indecent images of children being shared
during 2013. The irreducible specificity that included 70,000 still
images and video media, (CEOP, 2013) along with the report by, The
Office of National Statistics who recorded that in 2013, 36 million
adults in the UK were accessing the internet on a daily basis. This
equates to 73% of the population. (Office for National Statistics,
2013) Imagination can not over-step the reality in terms of the
enormity in recognising the real and apparent issue at hand. In order
for these images to have been produced, a child must have been abused.
Investigating Child Sex Exploitation
When investigating such crimes as CSE, investigators may locate
files and data on the computer’s hard drive or other digital storage
units containing valuable information regarding the user’s actions and
behaviour, which may offer prosecutors meaningful forensic evidence
and aid in prosecution. However, proving who was inputting or
receiving the information on said device can still be complicated to
prove and have seen many cases collapse. (Shinder, 2011) Such as in
the case of Constable Brian Stevens who was Jessica Chapman’s family
liaison officer during the investigation of her murder. Constable
Brian Stevens was charged with possession of indecent images after
data was found on his personal computer. However, since Constable
Stevens offered an alibi regarding his whereabouts at the time the
images were viewed and/or attained, coupled with a catalogue of errors
in relation to the computer forensic expert hired by the Crown
Prosecution Service, this case fell apart. Cases such as these
highlight the significance that computer forensics plays in the
Page 13
detection and prosecution of CSE related crimes. Again we find
ourselves addressing a particular lacuna in the law surrounding the
digital age we live in.
Over the past two decades CSE has become prevailing in our society.
This could be factored to the ways in which the media such as
television and news press chooses to cover such cases. However, it
could be due to the ease at which indecent images of children can be
taken and shared via the internet and mobile devices. Together with
children’s increased willingness to take indecent images and share
them, data can now be distributed via the internet and children are
more than happy to provide said images as it becomes a social norm to
do so. (Greer, 2014)
Society, which includes the victims themselves, are becoming more
aware of the importance of reporting such acts; likewise law
enforcement agencies are better prepared to deal with such cases. In
turn feedback and reports are aiding child protection teams to put
improved measures into place which in turn may further discourage
online predators in the future. One instance of these measures is
that of the ‘Underwear Rule’. The concept was devised by NSPCC amidst
the allegations made during the Jimmy Saville case. Simply, it is a
means by which adults can teach children about sexual privacy: ‘if it
is covered by your underwear it is private to you’. The slogan PANTS
is used to represent: Privates are private, Always remember your body
belongs to you, No means no, Talk about secrets that upset you, Speak
up, someone can help. Although In the case of Jimmy Saville, no
charges will be brought upon him, as he would not be able to defend
any charges. Looking into the case and how the system failed, can
Page 14
offer an insight into how to get it right in the future, preventing a
case like this reoccurring.
Since the coverage of the historic case of the late Jimmy Saville
and other high profile arrests amidst operation YewTree, which
involved investigations into historic sexual abuse of both children
and young adults, those among others, Rolf Harris, Stuart Hall and Max
Clifford, who have all subsequently been charged and sentenced in
relation to sexual abuse carried out decades ago. It is following
these and other high profile cases that the topic of CSE has become
more widely discussed and extensively investigated. (CEOP, 2013)
Although much has been learned from these cases, it is my belief that
much still needs to be considered before we can protect more children
who are still becoming victims unnecessarily.
Page 15
Chapter Two: Sexting and grooming
Although still predominantly based on mobile devices to attempt to
ensure privacy, sexting has evolved and is now a widely practiced act,
especially among teenagers and young adults. The act of sexting is the
act of sending sexual messages, written, live or recorded (i.e. video)
which depicts sexual content. This ranges from descriptive writing of
a sexual nature through to pictures, video of penetrative sexual acts,
self-masturbation and all sexual matters in-between. (Bourne, 2014)
Sexting can be accomplished in many ways using applications such as;
Skype video chat, also known as “Camming”, MMS messenger, e-mail, text
message, YouTube, or via social networking website such as Facebook.
(CEOP, 2012)
A study carried out by UK Safer Internet Centre and Plymouth
University, which engaged with one hundred and twenty 13-14 year olds
and thirty 10-11 year olds concluded that, 13 and 14 year olds
consider sexting to be a routine act to partake in. It was suggested
that 40% of 14 to 16years old said they or their friends had received
an explicit message. They also concluded that young people are mostly
unwilling to seek adult help in relation to sexting due to the fear of
being judged. Having said that the consensus between young people is
that, information relating to pornography and Self Generated Indecent
Images (SGII) should be taught in schools. (Phippen, 2012) Although
many organisations are now working with the education systems in order
to bring awareness to this problem, there is still much improvement
needed in this approach. Many children and adults are still unaware of
how best to use the technology they have, moreover sex education,
Page 16
including the dangers presented online and on mobile devices, should
be made compulsory in order to ensure the message is getting to those
who need it the most. Many cultural and religious communities living
worldwide are still unwilling to allow their children to be educated
in regards to sex. This lack of knowledge only serves to place the
child at a disadvantage. This in turn can be used as a means by which
sexual predators can use to their advantage, leaving children
vulnerable to attack.
The earliest known printed description of Sexting was that made by
Yvonne Roberts in 2005 in her publication, “The One and Only”, Sunday
Telegraph, 2005. (Adams, 2010) Yvonne Roberts brought together the
words “Sex” and “texting” to create the word sexting to symbolise the
sending of sexual messages via text message. (Adams, 2010) Since 2005,
Yvonne has written much on the subject of sexting and in 2014 wrote an
article in the Guardian, where she once again highlights the ongoing
issues surrounding sexting and our overall inability to control the
situation. Within her article she refers to sexting as being, “a
modernised version of playing doctors and nurses”. (Roberts, 2014)
This statement really can be pondered on as the age of; “you show me
yours and I’ll show you mine” truly has progressed. Some may say ‘it’s
all just a bit of harmless fun, a couple of teenagers in “love” are
sending semi naked or naked pictures of themselves over their
electronic devices’. Is this really the best way for children to
discover each other in a sexual manner? Others may view that sexting
is an evolution from what would have ordinarily been held behind the
“bike sheds” years previously. However, when it was behind the bike
sheds, had the question arose to get a camera out and take pictures,
would the offer to show still have been available?
Page 17
There is not just one way to ‘sext’ and there is far from one
reason why one would feel the need to ‘sext’. Some may ‘sext’ as a
means of flirting between boyfriend and girlfriend or lovers; others
may send ‘sext’ in order to gain attention from many. The worst case
scenario would be sending indecent images under duress. Thankfully
Sexting is still predominantly practiced between consenting
participants who are known to one another. If however, children are
sending indecent images in a grooming situation, the social acceptance
changes dramatically. Groomers are now using sexting as a tool of
coercion to not only gain sexual images of their victims but to then
use those images as a means of blackmail or intimidation.
Although not true of all cases, many cases of grooming incorporate
the request for the child or children to send indecent images; this
then falls under the realms of Sexting but also under the category of
child abuse images. (Sexual Offences Act 2003, 2003) The standard
terminology used to define Sexting is “Self Generated Indecent
Images”. (SGII) (CEOP, 2012) The act of Sexting can inadvertently lead
to grooming, it is this close relationship between these acts where
the decision was made to incorporate both Sexting and grooming into
this study, to highlight not only the dangers that predators pose upon
our children but also the dangers that our children pose upon
themselves.
The internet can be used as a very powerful tool with much
expediency; one could be for the resource of educational knowledge,
another could be as a means of manipulation by adults toward children
for sexual gratification. CSE can lead to mixed feelings of affection,
fear, anxiety and much more besides. While working for Childline, it
Page 18
became very apparent that many of the children felt obligated in some
way towards their abuser, while at the same time knowing that what was
happening to them was wrong. It is this entrapment and inability to
deal with the situation which may lead many children into an array of
mixed feelings regarding their situation. The grooming process can
sometimes end up taking president in a child’s life, often during a
time when they feel most vulnerable due to age, social upbringing,
hormonal changes, family or social disintegration. This mix of
feelings and inability to deal with the situation, can not only be
perilous for the child in question but can also on the other hand be
very alluring to some children, which in turn can be just as adverse
if not more so. This allurement can lead the child to feelings of
acceptance towards the abuse they are suffering and in some cases vie
on the side of their abuser over their family and friends or others
offering support .
The Problem of Sexting
More children are now Sexting and ‘Camming’ from their own digital
devices and have the freedom to do this wherever and whenever they see
fit. In the UK today children younger than 5 years old are being given
unsupervised access to many digital devices. (Holloway, 2013) Ofcom
have a duty of responsibility under the Communications Act 2003 s14
(6) (a), to research the promotion of media and report on their
findings. Based on a number of “Children’s Media Literacy Audits”,
(Ofcom, 2012) Ofcom gained information regarding children aged 5 to 15
years. It was reported in 2012 that; Children aged 12 to 15 years,
spent the most time online, equating to 17.1 hours per week on
average, which was a rise from 2011, where children of the same age
Page 19
spent 14.9 hours per week. The study goes on to state that Smartphone
ownership had also increased among children aged 5 to 15 years. In
2012 mobile phone ownership among this age group was 28%, an 8%
increase from 2011. The highest smart phone ownership was among 12 to
15 year olds, which saw a 21% increase from the previous year.
Smartphone ownership from the age of 12 years heavily outweighed non
Smartphone owners of this age group. (Ofcom, 2012) This study
highlights the prevalence at which children now have unprecedented
access to the internet and by which means.
Ofcom also referred to Facebook accounts owned by children aged
between 5 and 15 years. 22% of children aged 8 to 11 years admitted to
owning a Facebook account, with another study from 2011 showing 43% of
9 to 12 year olds in the UK, admitted to having a Facebook account,
although this figure may be much higher. (BBC, 2011)This is despite
Facebook having an age restriction of 13 years and over. It goes on to
highlight that 80% of children between 12 and 15 in the UK owned a
Facebook account and on average had 286 friends associated with their
accounts. These “friends” could be anyone from a school friend or
family member, through to a complete stranger. 81% of children between
8 and 11 years and 93% of children between 12 and 15 years said they
felt more confident online. It is due to this heightened confidence
levels, which allow children to converse with strangers more easily
and candidly. (Ofcom, 2012)
Statistics show that many parents believe their children know more
about how to use a computer than they do. (Reisinger, 2011) Parents
also consider that having trust for their child and supervising them
is sufficient to not having parental controls in place. Many parents
Page 20
of children aged 5 to 11 years said they did not need to install
parental controls as the felt they adequately monitored their child,
whereas parents of 12 to 15 years said they would trust their child.
(Ofcom, 2012) This often means that parents and careers awareness to
the need for parental controllers, coupled with their own
understanding of the capabilities of such controls and to the danger
their children face on-line, means they are not always aware anything
needs to be done to prevent this harm. This is certainly more
prevalent in parents who themselves have limited knowledge of
technology. (Ofcom, 2012)
NSPCC have many resources and regularly amalgamate with educational
authorities on teaching children regarding sexting and wider sexual
issues. Part of the NSPCCs stance when informing children of the
dangers of sexting is that, ‘if you would not want your parents,
teachers or friends to see it, even if you trust the person, then do
not send it over the internet’. (NSPCC, 2014) Once an image or message
is sent via digital media, it is extremely difficult if not impossible
to retract that data. Moreover, once sent, the sender has no further
control of what happens to the image. IWF (Internet Watch Foundation)
have come together with CEOP and UK police forces in order to
facilitate the removal of extreme indecent images from the internet
and servers (IWF, 2014). However this removal is only subject to
extreme cases. For those wishing to remove a topless picture of
oneself from the internet, this course of action would not be
available. Some have been successful in removing images by applying
directly to the owner of the server it was found on. On the whole many
images distributed via the internet may never be found by the subject
within the image, so therefore would not be indicated as needing to be
Page 21
removed. For most people attempting to retract any digital image, the
process ends up being a futile one and the images will remain on the
internet indefinitely.
On the one hand children may be willing to send these images and
messages to one another, and as mentioned it could seem like harmless
fun associated to the natural process of sexual development. However,
should the relationship between the sender and recipient change at a
later date, would those images still be in trusted hands? This is a
question that will regularly go unanswered at the time of pressing the
send key. Sadly all too often these messages and images are later
being used as a means of what has become known as, ‘Revenge Porn’.
This more often than not is when what would ordinarily have been
private and intimate images, meant only to be viewed by the person it
was sent to, later appears elsewhere on the internet of via text
messages for all to see. This is just one way in which consented
sexting can become problematic.
One of the most highlighted cases of what can happen when sexting
goes wrong is the story of the Canadian teenager, Amanda Todd. After
meeting an anonymous male via Facebook, Amanda was groomed by this man
over a period of one year before being persuaded by him into taking
pictures of her topless and sending them to him on Facebook. Following
this, the groomer distributed Amanda’s naked picture to her friends
and family via social media. After police alerted Amanda and her
family to what had occurred, Amanda fell into a spiral of depression
and anxiety, turning to drugs, alcohol and promiscuous sex for
comfort. Amanda made an emotional video on YouTube, days before taking
her own life, highlighting the traumas her groomer had put her
Page 22
through. So is sexting harmless fun or a misunderstood act of risk
taking which in the worst case scenario could lead to death? Certainly
in the case of Amanda Todd, her story portrays just how bad sexting
can become and that it can lead to feelings of such despair that
suicide seems to be the only escape.
Obviously not all cases of sexting will become so problematic,
however allowing our children to not only run this risk but to
facilitate allowing them to ‘sext’ is not only pertinent of our care
upon them but also shortcoming in our duties as adults as well as
questionable within the law.
Dealing with sexting
First we need to ask, whose responsibility is it to deal with the
issue of Sexting? Sexting is a social issue, which anyone can not only
participate in but become victim to if they do partake. Parents,
carers and teachers would usually be the first people in a child’s
life to notice any significant changes regarding the child’s behaviour
or demeanour. Unfortunately these changes are often attributed to
normal adolescent development, so, much of the time will be missed
until it is too late and we are only able to look back in hindsight.
However, hindsight is where we can begin to learn. In monitoring what
we missed in the past and implementing that into a check system,
asking the right questions and looking out for changes in children, it
may be possible to devise a quick and simple check box system that
both parents and teachers can use as warning signs to alert them to
the possibility of requiring a referral to a more specialist team.
Page 23
Certainly more research needs to be put in place in order to
implement a strategy of prevention that can be used when an adult
believes a child may be a possible victim of CSE. Since the children
are often unaware of the dangers they are placing themselves in, this
includes the possibility of the child not disclosing full information,
if indeed they were asked about their on-line and mobile activities.
This can sometimes place adults in a situation where they simply are
not provided with enough information which to act upon. It is for this
reason better education and research needs to be implemented to alert
children to these dangers in the first instance. Accessible resources
and constantly reiterated knowledge need to be available to children
and carers. This will offer both child and carer better opportunity of
prevention.
Many websites already use word monitoring to block certain words
from being used on their sites. Club Penguins, a popular child’s
social networking and games site for instance, will not allow the
child to type swearwords or use inappropriate language between one
another. Why then can we not channel this technology into mobile
devices in order to block certain messages, keywords or even monitor
picture transfers in order to protect our children from sexting and
grooming?
In developing phones that are age appropriate, will allow parents
the opportunity to make the choice to give a child a phone that has
been purposely blocked to the dangers on-line or telephonically,
without fully restricting the internet completely, or to continue to
allow open access. Phones could come with parental settings pre-loaded
onto the start up menu of the device, such as; Norton, DNS Angle,
Page 24
Bitdefender, KuruPira Web Filter or Windows Live Family to mention a
few. (Williams, 2013) These could then be set up at the time of
preparing the phone for first use. These settings could be linked to
the parent’s phone or email address, allowing reports to be sent
directly to them. Many parents are just not tech savvy enough to
install them independently. Parental controls also require a level of
monitoring, whereas if the mobile device was simply unable to access
certain areas, or blocked what it thought to be inappropriate, then
carers and children alike could go about their day with much less fear
of intrusion via their mobile devices.
The company “1stFone” is the first of its kind to have brought out
a child friendly mobile phone. The phone is currently fitted with a
number of large buttons which the parent or carers can pre set to call
certain numbers. The phone is suitable for children between 3 and 7
years of age, but has also had interest from families with disabled
children due to its ease of use. At present the phone does not support
internet access. Granted this would not be what a teenager would
choose, but is moving forward in highlighting that children do use
phones and there is a market for child friendly phones to be made
available. Such technology may even find a place among the elderly
members of our society also.
Ann Coffey MP for Stockport has made several attempts to appeal for
change in legislation relating to the matters of sexting and grooming.
She has called upon mobile phone companies to take a greater stance in
child safety and its relevance to mobile phone use, by asking them to
have greater responsibility in such things as awareness advertising
and education on the matters relating to sexting and grooming. Ms
Page 25
Coffey states that; in Manchester alone two schools every week are
turning to online safety groups in order to seek help and support
regarding incidents of sexting. She goes on to makes a valid point
stating that children want to push the boundaries when they are most
socially and sexually aware and that they want to experiment and make
their own way into independence. However with the current technology
the risk children are putting themselves into poses real danger and
real threat to their well being. (Parliament.uk, 2012)
Sexting is not just an issue between teenagers; primary schools are
becoming more prevalent in reporting cases of Sexting within their
children. This equates to children under the age of 11 years old
taking, sending or receiving indecent images of oneself or receiving
indecent images of others.
In my mind and from my experience, sexting is a real issue that
society is just not taking seriously enough. The age and prevalence at
which children are now sexting, is getting out of control and needs to
be addressed as a matter of urgency. More awareness throughout society
needs to be had in order for us to focus on rectifying these issues.
Page 26
Chapter Three: Online Grooming
There are a number of methods groomers use in order to groom
children. Some will work very quickly; others may take their time
sometimes grooming children over a number of years. (CEOP, 2012) Often
the relationship between the groomer and the child will be formed
purely online in the first instance. Groomer’s often send fictional
pictures of themselves to their victims to mask their age or gender,
while their victim’s often reply with factual images. Once the groomer
has attained the child’s trust they may attempt to infiltrate the
child’s security network. This may be through separation from family
and friends or via penetration of their technical security by means of
attaining passwords, personal information or via social networking
sites. These methods of collecting data on the child is also known as
“doxing” which is when personal information on the subject is
collected and used by the groomer to build an over view on the child’s
personal situation and circumstance. Predators build on this
information then assemble the data received like a jigsaw puzzle.
Groomers will then use this information to isolate the child from
their normal surroundings or to blackmail children into sending sexual
images, which they would ordinarily be unwilling to reveal. This kind
of grooming is classed as non contact sexual abuse. The ways in which
non contact sexual abuse and physical sexual abuse are accomplished by
groomers is very similar and follows a pattern of manipulation,
persuasion and threats to get the child to comply. (CEOP, 2012) Male
groomers may also pose as a female child to gain the trust of their
victims and vice versa, as in the case of Alicia Kozakiewicz (Schultz,
2009) whose groomer and eventual abductor, posed as a 14 year old girl to
Page 27
attain her trust. In some cases groomers even go as far as to pay other
children to befriend their victims in order to groom them. Such as in the
Rochdale Grooming case which saw numerous teenage girls being groomed,
sexually abused and trafficked by a number of men in and around Rochdale,
England. (QC, justice response to child sexual abuse: time for anational consensus, 2013)
Where and How Grooming Occurs
The internet has provided a platform for users to become “keyboard
warriors” and has created a virtual world where we can be whatever and
whoever we wish to be. This virtual world can be difficult for an
adult to navigate, for a child the internet can be an even more
daunting experience at times. A child’s naivety and willingness to
please or be pleased will often outweigh all other senses when it
comes to acting in ways they know to be wrong.
Adults will often get their children digital devices to aid them in
their studies, or to keep in touch with friends, ensuring they can be
socially active without leaving the relative safety of their own
homes. Girls are more likely than boys to have a negative sexual
encounter while online, with a 23% vs. 10% ratio, making the dangers
very real. (Ofcom, 2012) Parents and carers often worry about letting
their children out onto the street, just in case they fall prey to
some kind of harm. However, the same harm we are protecting children
from in the real world is lurking in their digital devices and this
harm is there 24/7. (Metropolitan Police Service, 2014)
The chances of your child being dragged into a car and led to a
life of doom, is less likely than your child being approached by an
Page 28
online predator. In the real world most men do not walk around with
their genitals on show, in this virtual world, easy to access sex
sites are just a click away and viewing male and female genitalia is
easy. Here you can browse page after page of inappropriate content
including sexual activities taking place live, many of which are
interactive. A child can chat and interact with these people as they
see fit, they can do it while adults are in the house just behind a
closed door. This ability to be in secure surroundings with
familiarity, gives children a false sense of security leading them to
do things they would not otherwise do face to face. (Metropolitan
Police Service, 2014) Children have a natural fascination with sex and
their own sexuality, especially around the time of puberty, which
seems to be getting apparent much earlier than many would expect. It
is this natural curiosity that will lead children to these sites.
Online chatting using mobile digital devices and computers has
become more popular over the past decade and for children it has
become a way of life. However, online predators will infiltrate chat
sites, such as Facebook, MSN and OMEGLE as well as mobile chat such as
BBM, (Blackberry Messenger) KiK and WhatsApp, using these in order to
groom children. Many social networking sites now have restrictions as
to the age at which a user can become a member. (Facebook, 2013)
Facebook has an age restriction of 13 years, however as we have
already seen, many children under the age of 13 have Facebook
accounts. Likewise OMEGLE has an age limit 13 years, but upon
accessing this live chat and live video medium, there is an area on
the front page that gives the user direct and unlimited access to the
18+ area. (Omegle, 2014) Upon entering the 18+ area it is instantly
clear to see that many of the users are under 18 and the context of
Page 29
the site is extremely sexual in nature, with many users displaying
varying grades of nudity and performing sexual act such as
masturbation and penetrative sex. An obvious lack of monitoring is
present on this site, due to the fact that children as young as 12 and
possibly younger are interacting via live webcam with adult strangers.
Unlike Facebook, which has fairly stringent monitoring guidelines,
open chat sites likened to OMEGLE, tend to be preferred by online
predators due to the lack of monitoring. (NSPCC, 2014) It is
children’s natural curiosity that will often bring them to such sites
as OMEGLE, and it is this same curiosity that leads them to believe
that sexting is normal. Some do not even believe what they are doing
is sexting at all.
With sites such as OMEGLE displaying such outward exhibits of
sexual activity, which are being accessed by children so readily, it
leaves us wondering why sites such as this have not yet been closed.
It is important that we overcome the laws relating to freedom of
speech and expression, in order that they do not infringe on the laws
governing and protecting our children.
Predators are not just skilled in grooming children, but will often
groom family and friends of the child also. If the groomer is known to
the family, this may be achieved face to face. However, this can also
be achieved via the internet using various method of manipulation on
both the child and their carers. This can leads both the child and the
adult into a false sense of security and trust. (Laurel House, 2012)
Many predators will use false details such as age and appearance,
in order to relate better with the child. The predator may alter these
lies should an offline meeting become possible with their victim, so
Page 30
as not to startle the child on first contact. If this abuse should
become physical, it is likely that the child will have been
conditioned in such a manner that, despite them believing the act to
be wrong they will participate regardless. Some children also feel an
overwhelming love for their abuser and at times believe that it is
themselves that want a sexual relationship to occur. Other victims may
have been blackmailed into a physical relationship, being led to
believe that if they do not comply with the wishes of their abuser
that something terrible will happen. (CEOP, 2013) It is due to this
grooming process that many children not only feel obligated to comply
with their abusers requests, but much of the time are not even aware
they are being abused. (Laurel House, 2012)
Grooming cases
In November 2006 Adrian Ringland, 36, from Ilkeston Derbyshire, was
sentenced to 10 years in prison after using his computer to send
Trojan viruses to teenage girls computers between the age of 13 and 16
years, which would enable him to remotely take control of their
systems. Ringland would tell the girls he was sending them a picture
of himself, but when they opened it the Trojan would allow him to take
control of their computer remotely. He would then use this control to
blackmail the girls into sending him naked pictures. Police were
alerted after a Canadian girl, Ringland was grooming, complained to
her parents. He was tracked and after his first court appearance, and
was ordered not to have any computers at his home address during the
police investigation. However, during the investigation police called
back to his address to find that a 14 year old girl he had been
grooming regularly was in his bed. Ringland pleaded guilty to three
Page 31
counts of blackmail, six counts of making indecent photographs of
children, two counts under the Computer Misuse Act (unauthorised
modification of computer material) and one count of indecency with a
child. (The Crown Prosecution Service, 2006)
(Cowan, 2006) During sentencing, Russell Tyner, Crown Prosecution
Service stated:
"Adrian Ringland is a sexual predator who employed high tech methods to control and
victimise adolescent girls. By invading their homes through their computers, he was able
to instil such fear and alarm that his victims felt helpless to resist his sinister threats and
sexual demands”. (The Crown Prosecution Service, 2006)
Grooming Statistics
Recent studies carried out by CEOP show that in 2012, 1145 reports
of online grooming were received, of which 7% were in relation to
attempts made to meet offline with a child. This equates to
approximately 80 children. (CEOP, 2013) Figures also show that this
was a dramatic drop from 2011 wherein 12% of children were approached
to meet offline. (CEOP, 2013)
Despite this decline in figures, statistics show that in 2011, 91%
of children in the UK had access to the internet at home, equating to
approximately 10.5 million children. (CEOP, 2013) With 11.6 million
children under the age of 16 residing in the UK and 10.5 million under
16s having access to the internet from home, even if only 1% were to
be targeted, this would still leave a potential of 105.6 thousand
children being susceptible to grooming and possible physical sexual
assault. Put into context, this seems a small number in relation to
Page 32
the population; however, it equates to a great number of children
being left vulnerable to potential online grooming or physical abuse.
Children are not always groomed by those residing in the child’s
country. (CEOP, 2013) In 2010 CEOP launched an investigation named,
Operation Hattie. This was in response to the growing number of
reports being received in relation to online grooming. The
investigation took twenty months to complete and spanned twelve
countries worldwide. In December 2012 it was found that two brothers,
resident of Kuwait, had targeted 110 children worldwide for online
grooming. 78 of these children were UK residents. The brothers had
encouraged these children to perform sexual acts online. Fortunately
there was no evidence to suggest the brothers had met with any of
their victims. Finally in 2012 and as a direct result of Operation
Hattie, the brothers were convicted. (CEOP, 2013)
Chapter Four: Legal System and the Victims
Keir Starmer QC, former director of public prosecutions, is an avid
participant when it comes to seeking out the rights of victims of
sexual abuse, both in children and adults. In recent years he has
fought tirelessly to see changes in how our judicial system deals with
victims of sexual crimes as well is how perpetrators are dealt with in
accordance with their crimes. His most recent actions are to advise
the Labour Party through the newly elected task force called ‘Victims’
Taskforce’ which will endeavour to tackle the issues of victim rights
and the Law as well as making it mandatory for those working with
children to report suspicion of sexual abuse. (LabourPress, 2013)
Page 33
One fundamental point that Keir Starmer QC makes is that of how
victims of sexual crimes are handled. Currently the process of
reporting the crime, through to reliving it in a court situation, to
the possibility of having to come face-to-face with your abuser can
and often do put victims off reporting a crime in the first instance,
not only for the trauma that this can cause in its own right but
through fears such as not being believed; as in the case of Frances
Andrade, 59. Mrs Andrade took her own life during a court hearing
while testifying against her former music teacher Michael Brewer,
having sexually abused her as a teenager. Mrs Andrade was denied
psychiatric support during her hearing, through fear that it would
distort her testimony. Before the case came to a conclusion, Mrs
Andrade was questioned by Mr Brewers’ Solicitor in regards to her
validity and the question of her truthfulness relating to the
allegation. This was too much for Mrs Andrade to take and she
committed suicide days before the verdict was announced. This goes to
highlight how the judicial system can simply become unbearable for
some victims. (Walker, 2013)
We also need to consider how the CPS may handle the case. If it is
believed that the victim lacks credibility as a witness, due to
alcohol, drug use or the fact they returned voluntarily to their
abuser in some situations, much of the time the prosecution team will
not precede with the case in the same manner, in some circumstances
this has seen cases being dismissed completely. (QC, The criminal justice response to child sexual abuse: time for a national consensus,2013)
Page 34
The system as it stands is very difficult for an adult to handle,
now put yourself in a child shoes! Let us imagine that we are that
child. Just our ability to come to the realisation and taking in the
magnitude that something wrong may have happened to us, is often too
much for a child to handle and this fear is prior to the child having
disclosed there abuse to a third party. Now imagine that you have to
replay this scenario over and over again to a number of different
adults, each time reliving what has happened. Adults find this a scary
scenario to imagine. While volunteering at Childline, I was often
faced with children disclosing their deepest secrets to me. Many only
did this as they knew it would go no further than that call. Just
being on the phone with them gave me a sense of how these children
felt about what they were facing and should they have had to go that
step further, that fear would have amplified greater.
In an ideal world once a child makes an acquisition of abuse, they
should immediately be placed with a key worker who will be there for
them from start to finish and act as their voice in all circumstances.
However in the real world, this is not yet available. The child may
speak to one or many social workers, specialist police, solicitors,
CHAMS, (Children's and Adolescent Mental Health Service) teachers,
therapists, parents and the list goes on. In making our legal system
more approachable to victims of sexual crime, may in itself see an
increase in victims coming forward to report such crimes.
Current Laws and Practices
One of the main concerns the legal system faces when it comes to
sexting, is that of the age and the nature of how the sender of the
Page 35
‘sext’ is being depicted. In accordance with the Protection of
Children Act 1978 and the Criminal Justice Act 1988, when children are
sending naked or semi naked pictures of themselves to others, this
falls under the realms of Child Abuse Images. Anyone under the age of
18 who engages in sexting by means of creating sexually explicit
photos or video have potentially created an image of child abuse.
Should they send such images to a third party, this would be deemed as
distribution of a child abuse image, furthermore the recipient would
then be deemed to be in possession of a child abuse image. (Childnet
International, 2014) However, currently there is no definitive law
governing the act of Sexting.
Law enforcement agencies across the UK now use a classification
process called the “COPINE” (Combating Paedophile Information Networks
in Europe) and “SAP” (Sentencing Advisory Panel) scale which was
developed at the University of Cork in the late 1990s. The scales are
used to monitor and class the illegal images of children that are
received by enforcement agencies. This allows the agencies to classify
images in levels relating to the seriousness of said images. It also
allows the agencies to quickly match similar images to those already
stored on the database. (fighting for kids, 2014)
Sentencing offender’s courts use the SAP scale which was taken from
the original COPINE scale, as a guide to the severity of misconduct.
These set out a protocol for the acts involved; however, further
classification is also used to determine the age of the person or
persons within the image(s). Further classification is required for
children under the age of 13 years, children aged 13 to 15 years and
children aged 16 to 17 years. (fighting for kids, 2014) In the case of
Page 36
Sexting, no person under the age of 18 in the UK has yet been
prosecuted for distributing child Sex abuse images taken via SGII.
In regards to Sexting, the question of content should be considered
in any case. There have been cases in the past such as that of Brooke
Shields. (Shields vs Gross, 1983)When Miss Shields was 10 years old a
controversial picture was taken of her posing naked in the bathtub.
Years later Miss Shields launched a court case against Mr Gross in
relation to the rights of ownership of the picture, which she failed
to win rights to. (Revoir, 2009)
In UK law, consent is defined as;
‘If a person ‘agrees by choice and has the freedom and capacity to make that choice’.’The
laws of each UK country also allow for a range of circumstances which may affect a
person’s capacity to freely consent, such as when they are asleep or have been subject to
threats or violence.” (Sexual Offences Act 2003, 2003)
The law surrounding at what age a child is able to consent to a
photograph being taken is very vague in UK law. The law surrounding
child abuse images however is slightly clearer. What the courts need
to decide is, whether or not a picture of naked child is deemed to be
child abuse. (Victoria Leagal Aid, 2014)
Despite there being numerous laws protecting our children from sex
crimes, there is still much room for improvement in relation to
sexting. Child Abuse Images and CSE including online grooming are
illegal throughout most of the world. However, it still occurs on an
enormous scale. Recently The Telegraph newspaper covered a story
relating to a legal loophole concerning grooming. It was found that
Page 37
despite the act being deemed illegal, people could still prepare and
distribute documents and manuals on how to groom children affectively.
Just like manuals on how to build bombs has now become illegal under
the reformed “Terrorism Act 2002”, government leaders are also looking
towards ensuring documents relating to child sexual acts are also
outlawed. Under the “Coroners and Justice Act 2009 s62” (Coroners and
Justice Act 2009, 2009), it is illegal to possess images of Child Sex
Abuse. However, it is not yet illegal to distribute manuals online of
how to carry out grooming and other CSE acts. Prime minister, Mr David
Cameron is reported to have stated:
‘It’s completely unacceptable that there’s a loophole in the law which allows paedophiles
to write and distribute these disgusting documents.’ ‘I want to ensure we do everything
we can to protect children — and that's why I’m making them illegal.’ (Hope, 2014)
In criminalising written child abuse manuals that do not contain
images, could go some way to further limiting the ability to carry out
the act in the first instance. (Hope, 2014)
The NSPCC have highlighted the problem associated with UK laws in
relation to sexting. In 2014 the NSPCC website launched a petition,
‘Flaw in the Law’, and raising awareness to the current the issues
facing UK laws and how they are failing to protect our children. To
support their argument the NSPCC have highlighted what they call
‘crazy laws’ such as; it is illegal to handle salmon in a suspicious
circumstances, also, it is illegal to carry a plank along a pavement,
however, it is not yet illegal for an adult to send sexual messages to
a child. This clearly highlights the issues currently facing our
outdated legal systems and the laws which it upholds.
Page 38
Conclusion
It seems no one really knows how best to eliminate CSE conducted
using the internet, or in real life. However, it is a topic that many
feel needs more attention and action.
Sexting is a social problem that has become out of control,
regardless of whether these images fall into the wrong hands or not.
It is my view that this problem is one that is misunderstood by both
parents and children alike and only those that have had the misfortune
to be effected by the dangers of Sexting can truly understand the
magnitude of the problem. Unfortunately by this point, the people in
question are dubious to talk about their ordeals due to the
embarrassment and humiliation that Sexting can cause. We should not be
allowing our children to take and distribute sexual explicit images
and send them via the Internet to others so candidly. With more
stringent laws governing this area of child protection, the act of
Sexting can in some way be controlled or at least monitored.
Better educational resources need to be available to both children
and their carers to fully highlight the dangers and inform them not
only on how to protect themselves but also how to monitor online
activity of their child. By implementing better educational recourses
to children, parents and child welfare organisations including
schools, much more can be done to protect our children against the
dangers of Sexting, grooming and CSE. In educating society on the
problems that could occur and providing improved recourses to those
affected can go a long way in not only preventing sexual abuse in the
Page 39
first instant but in supporting those who have been abused. As Francis
Bacon said “Knowledge is Power” (Henery, 1950)
It is very difficult to monitor your child's online behaviour when
all you rely on is trust and visual monitoring of the child's computer
usage. Teenagers and young adults will often feel threatened by this
kind of monitoring and in turn rebel against it by setting up user
accounts without the knowledge of their parents or carers. One way for
parents to bypass what the child may deem as ‘spying’ could be to talk
to their children on a more personal basis to establish a trusting
relationship. The only way that this can be successful is, if the
parents are educated enough in order to speak with their children on
the matter of Sexting grooming and CSE. This only goes to reiterate
the fact that both child and carers need better educational resources
with regard to computers, digital devices and the dangers that lie
within them.
Many parents of teenagers and young adults did not grow up in a
generation where technology was readily available. It is my belief
many adults have a sense of ignorance and lack of understanding
towards computing in general. It is this ignorance and lack of
knowledge which is leading adults into a false sense of security in
believing they can monitor their child's online safety. In fact many
adults of this generation really do not understand or are even aware
of what their children get up to online. Many teachers will tell you
that, when they approach a parent regarding their child's behaviour;
the parents will often become guarded stating ‘my child is not like
that’. These further highlights the importance of awareness within
society in regards to Sexting, Grooming and CSE. Without this
Page 40
awareness, preventing CSE will continue to be very difficult to
achieve.
No matter how we attempt to protect our children or methods that
are put in place, online CSE is still rife and seems to be getting
worse. With an ever increasing demand for technology to be better and
faster, giving us easier and more simplified means by which to
communicate, we may be setting the stage, inadvertently making it
easier for crimes such as these to take place. Much research is still
required in this area in order to find ways by which we can reduce CSE
significantly, with the hope of one day eradicating it for good.
Current UK legislation governing the act of Sexting, are
practically non-existent given the prevalence that children are
Sexting one another. This does not lessen the fact that if a child
sends a naked picture of themselves to another person whilst under the
age of consent, that they are partaking in sending indecent child
abuse images. If the age of consent for having sexual intercourse is
16 years old, then should there not also be an age of consent to
govern the age at which a child or young person can send consensual
images of a sexual nature? It is for this reason UK laws should be
reviewed and considered as a matter of urgency, in order to keep up
with the change in times.
With appropriate advertising and education there is a means to an
end in regards to child sex crimes, all it takes is for society to
pull together in ensuring these crimes are no longer deemed as “not
our problem”. Whether we have children or not or even if we believe it
will never happen to us, together we should stand in saying that this
crime is unacceptable.
Page 41
Hypothesis
Previously in this paper we have broached on the subject of how
parents can proactively take steps to protect their children online.
Careful monitoring and using software that will block certain sites,
is a big step forward in protecting children from falling prey to
online grooming and viewing inappropriate material. However, not only
is this easier said than done, but why should we be required to feel
the need to do this in the first instance?
Many social network sites have now been set up bringing awareness
to preventing CSE. CEOP was specifically set up in order to monitor
and tackle online child abuse and now works in partnership with many
companies including; NSPCC, Microsoft, BT, Virgin Media, Crime
stoppers as well as, local, national and international police forces
to prevent CSE. CEOP have been able to collate and research much
information relating to the subject. Using a holistic approach, CEOP
builds on this knowledge to structure strategies and expertise,
constructing better ways with which to tackle child abuse both online
and off. (CEOP, 2014)
Since the devices that children are using are enabling them to
access sexual content meant specifically for adults, more attention
and emphasis needs to be placed on making it extremely difficult for
children to continue to access these areas freely. Although parental
controls can and do work, they only do so if they are set up on the
device requiring protection and are monitored. In making devices age
appropriate would overcome the issue of having to monitor online
behaviour via installable software alone. In development of age
Page 42
appropriate devices, society could be one step closer to beating the
predators. If they can not reach our children then they can not fulfil
their urges to abuse them.
If software could be developed to monitor and trace online
crimes such as grooming or predatory behaviour, and implement this at
the highest level, it could be possible to use this to send reports to
lower level ISPs (Internet Service Providers), who in turn could
report the incidence or at best block the interaction at the source.
In doing so, such crimes could be quickly and easily targeted in order
to prevent an attack. (BBC, 2003) Childbase is software that was
developed in 2012 by IBM in order to provide a multi division program
capable of collecting and monitoring data. (IBM, 2013) Such software
could be developed to target certain activities across the networks
and be used on the existing infrastructures to collate reports and
further aid investigators. (IBM, 2013) If successful a capture and
treatment program could be implemented to not only catch abusers but
to then work with them to rehabilitate and treat the health issues
that led them to commit the crime in the first instance.
Another approach would be to enforce all search engines to install
search filters preventing people from viewing this data in the first
instance. The main problem here would be that many would just change
the name to something more innocent, in order to fool the filter.
However, face recognition software could be further developed to spot
indecent images or content. (BBC, 2003) If this technology was coupled
with the COPINE database, in order to register unique codes on each
picture known to be in circulation, tracing the pictures online and
removing them could become possible. This in turn would lessen the
Page 43
amount of images available. In minimizing the amount of data available
to view would make it difficult for paedophiles to fulfil their
wishes. Two possible outcomes to this would be that the perpetrator
gives up, or that real world attacks become more prevalent in order to
meet supply and demand.
Finally, by enforcing greater sentences, not only upon child sex
offenders but also on children who have chosen to have underage sex,
should install greater powers leading to deterrents. In this scenario
those children who chose to break the law and have sexual
relationships before the age of consent, could be punished for doing
so. This may also go some way to preventing under age pregnancies.
Obviously if a child has been forced to have sex by means of abuse,
they would not be considered suitable for punishment. With the rate of
teenage pregnancies ever increasing, despite laws already being in
place to prevent this, perhaps more should be done to punish such law
breakers. This may in turn act as a deterrent to both the child and
the abuser. In many Far East countries, the penalty for theft is to
have your hand chopped off. By no means would a suggestion so extreme
be considered or even commended. However if an underage mother who
became pregnant by choice, were required to perform public services in
order to pay for her crime, or if those found guilty of child abuse at
any level, were to be given a much greater sentence, then this may be
enough deter them from committing the act in the first instance.
Page 44
Works CitedAdams, M. T. (2010). Inquiry Into Cyber-Safety . Queensland: BoysTown.
BBC. (2013, 05 03). April Jones case: Mother's last moments with missing girl. Retrieved 06
06, 2014, from BBC News Wales: http://www.bbc.co.uk/news/uk-wales-mid-wales-
22394636
BBC. (2013, 09 16). April Jones: Remains to be released after coroner ends hearing. Retrieved
06 06, 2014, from BBC Wales: http://www.bbc.co.uk/news/uk-wales-24105518
BBC. (2003, 07 24). Childbase: Ask the experts. Retrieved 06 18, 2014, from BBC
News: http://news.bbc.co.uk/1/hi/talking_point/3091009.stm
BBC. (2011, 04 19). Many under-13s 'using Facebook'. Retrieved 10 26, 2014, from
BBC News Technology: http://www.bbc.co.uk/news/technology-13129150
BBC News. (2013, 11 05). Meet Sweetie, the girl catching online predators. Retrieved 06
17, 2014, from BBC News: http://www.bbc.co.uk/news/world-europe-24819538
Bourne, H. (2014, 06 13). http://www.thesite.org/sex-and-relationships/having-sex/safe-
sexting-and-webcam-sex-3335.html. Retrieved 06 15, 2014, from The Site:
http://www.thesite.org/sex-and-relationships/having-sex/safe-sexting-and-
webcam-sex-3335.html
CEOP. (2013, 02 04). ALARMING NEW TREND IN ONLINE SEXUAL ABUSE. Retrieved 06 16,
2014, from CEOP Commands:
http://ceop.police.uk/Media-Centre/Press-releases/2013/ALARMING-NEW-TREND-IN-
ONLINE-SEXUAL-ABUSE/
CEOP. (2014). Partners and Supporters. Retrieved 06 17, 2014, from CEOP Command:
http://ceop.police.uk/partnerships/
CEOP. (2012). Threat Assessment of Child Sexual Exploitation and Abuse. London: CEOP.
CEOP. (2013). Threat Assessment of Child Sexual Exploitation and Abuse. London: Child
Exploitation and Online Protection Centre.Page 46
Childnet International. (2014, 01 17). Sexting and the Law. Retrieved 11 04,
2014, from Childnet: http://www.childnet.com/blog/sexting-and-the-law
Coroners and Justice Act 2009. (2009). Coroners and Justice Act 2009. Retrieved 06
17, 2014, from Legislation.gov.uk:
http://www.legislation.gov.uk/ukpga/2009/25/section/62
Cowan, R. (2006, 11 10). Jail for paedophile who terrorised via internet. Retrieved 11 05,
2014, from The Guardian:
http://www.theguardian.com/technology/2006/nov/10/viruses.security
Facebook. (2013, 11 15). Statement of Rights and Responsibilities. Retrieved 04 16,
2014, from Facebook: https://www.facebook.com/legal/terms
fighting for kids. (2014, 05 25). The COPINE scale. Retrieved 05 25, 2014, from
fighting for kids: http://ffkfightingforkids.weebly.com/the-copine-scale.html
good reads. (2014, 03 29). Nelson Mandela quotes. Retrieved 03 29, 2014, from
goodreads.com: http://www.goodreads.com/author/quotes/367338.Nelson_Mandela
Greer, C. (2014). News Media, Victims and Crime. Retrieved 11 06, 2014, from
Sagepub: http://www.uk.sagepub.com/stout/greer_news_media%20-
%20vic_crime_soc.pdf
Henery, J. (1950). Knowledge Is Power: Francis Bacon and the Method of Science. Totem
Books.
HM Goverment. (2009). Safeguarding Safeguarding ChildrenChildren and Young People from
Sexual Exploitation Exploitation . London: HM Goverment.
Holloway, D. G. (2013). Zero to Eight. Young children and their internet use. London: The
London School of Economics and Political Science.
Home Office. (2007). Departmental Report 2007. London: Home Office.
Hope, C. (2014, 04 27). Cameron to close legal loophole that lets paedophiles download child
grooming manuals. Retrieved 06 17, 2014, from The Telegraph:
Page 47
http://www.telegraph.co.uk/news/politics/10791387/Cameron-to-close-legal-
loophole-that-lets-paedophiles-download-child-grooming-manuals.html
IBM. (2013). i2 Enterprise Intelligence Analysis. Retrieved 06 18, 2014, from IBM:
http://www-03.ibm.com/software/products/en/enterprise-intelligence-analysis
IWF. (2014, 11 15). Police. Retrieved 11 15, 2014, from IWF:
https://www.iwf.org.uk/partnerships/police
LabourPress. (2013, 12 27). Keir Starmer to advise Labour on first Victims’ Law. Retrieved
11 06, 2014, from LabourPress:
http://press.labour.org.uk/post/71354241522/keir-starmer-to-advise-labour-on-
first-victims-law
Laurel House. (2012). Sexual Offender Tactics and Grooming. Retrieved 06 16, 2014,
from Laural House: http://laurelhouse.org.au/?page_id=36
legislation.gov.uk. (2003). Sexual Offences Act 2003.
legislation.gov.uk. (2008). Sexual Offences Act 2003. Retrieved 06 17, 2014, from
legislation.gov.uk: http://www.legislation.gov.uk/ukpga/2003/42/section/72
Lewis, M. G. (2012). A LEGAL FRAMEWORK FOR COMBATING CHILD SEX TOURISM.
UNODC Regional Centre for East Asia and the Pacific UN Conference Centre (pp. 1 - 5). Bangkok
: United Nations Office on Drugs and Crime.
Metropolitan Police Service. (2014). Get the facts. Retrieved 06 10, 2014, from
Internet Safty: http://safe.met.police.uk/internet_safety/get_the_facts.html
Ministry of Justice, Home Office & the Office for National Statistics .
(2013). An Overview of Sexual Offending in England and Wales . London: Ministry of
Justice, Home Office & the Office for National Statistics.
NSPCC. (2014). Child grooming. Retrieved 06 16, 2014, from NSPCC:
http://www.nspcc.org.uk/help-and-advice/for-parents/keeping-your-child-safe/
grooming/child-grooming_wda101191.html
Page 48
NSPCC. (2013, 02). Child sex offender disclosure scheme. Retrieved 06 12, 2014, from
NSPCC: http://www.nspcc.org.uk/Inform/research/briefings/sex-offender-
disclosure-scheme_wda94183.html
NSPCC. (2014, 10 17). Child sexual exploitation. Retrieved 10 17, 2014, from NSPCC:
http://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/child-
sexual-exploitation/
NSPCC. (2014, 10 26). Childline. Retrieved 10 26, 2014, from Sexting:
http://www.childline.org.uk/explore/onlinesafety/pages/sexting.aspx
NSPCC. (2014, 04). Statistics on child sexual abuse. Retrieved 06 09, 2014, from
nspcc.org.uk:
http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/
statistics_wda87833.html
Ofcom. (2012). Children and Parents: Media Use and Attitudes Report . London: Ofcom.
Office for National Statistics. (2013, 08 08). Internet Access - Households and
Individuals, 2013. Retrieved 01 29, 2014, from Office for National Statistics:
http://www.ons.gov.uk/ons/rel/rdit2/internet-access---households-and-
individuals/2013/index.html
Omegle. (2014). Retrieved 06 16, 2014, from Omegle.com:
http://www.omegle.com/
Parliament.uk. (2012, 04 25). Westminster Hall. Retrieved 11 11, 2014, from
www.parliament.uk: http://www.parliamentlive.tv/Main/Player.aspx?
meetingId=10606&st=10:58:20
Phippen, P. A. (2012). New research lifts the lid on ‘sexting’ attitudes and practices amongst
teenagers. Plymouth : UK Safer Internet Centre & Plymouth University.
QC, K. S. (2013, 03 06). justice response to child sexual abuse: time for a national consensus.
Retrieved 11 11, 2014, from CPS:
Page 49
http://www.cps.gov.uk/news/articles/the_criminal_justice_response_to_child_se
xual_abuse_-_time_for_a_national_consensus/
QC, K. S. (2013, 03 06). The criminal justice response to child sexual abuse: time for a national
consensus. Retrieved 11 07, 2014, from CPS:
http://www.cps.gov.uk/news/articles/the_criminal_justice_response_to_child_se
xual_abuse_-_time_for_a_national_consensus/
Revoir, P. (2009, 10 01). Tate removes the picture of 10-year-old Brooke Shields after police
pornography probe. Retrieved 05 24, 2014, from mail online:
http://www.dailymail.co.uk/news/article-1216924/Brooke-Shields-nude-10-year-
old-Tate-Modern-display-nude-giant-pornographic-images.html
Roberts, Y. (2014, 08 03). From private passions to sexting: how Britain's sex life has gone
public. Retrieved 10 24, 2014, from The Guardian:
http://www.theguardian.com/lifeandstyle/2014/aug/03/sex-lives-go-public-
sexting-joy-of-sex-film-sex-tapes
Schultz, D. W. (2009, 01 27). Alicia Kozakiewicz Testimony on Sex Predators online.
Retrieved 10 29, 2014, from YouTube: https://www.youtube.com/watch?
v=vGdldKxPock
Sexual Offences Act 2003. (2003). Sexual Offences Act 2003. Retrieved 06 18, 2014,
from Legislation.gov.uk:
http://www.legislation.gov.uk/ukpga/2003/42/section/74
Sexual Offences Act 2003. (2003). Sexual Offences Act 2003. Retrieved 06 18, 2014,
from Legislation.gov.uk:
http://www.legislation.gov.uk/ukpga/2003/42/section/74
Shields vs Gross, 58 N.Y.2d 338 (1983) (Court of Appeals of the State of New
York 02 16, 1983).
Shinder, D. (2011, 01 26). What makes cybercrime laws so difficult to enforce. Retrieved
06 14, 2014, from Tech Republic: http://www.techrepublic.com/blog/it-
Page 50
security/what-makes-cybercrime-laws-so-difficult-to-enforce/
The Crown Prosecution Serevice. (2008). Jurisdiction. Retrieved 06 17, 2014, from
The Crown Prosecution Serevice:
http://www.cps.gov.uk/legal/h_to_k/jurisdiction/#b01
The Crown Prosecution Service. (2006, 11 09). Internet blackmailer sentenced for forcing
girls to pose naked. Retrieved 11 05, 2014, from CPS:
http://www.cps.gov.uk/news/latest_news/164_06/index.html
Victoria Leagal Aid. (2014, 04 10). Sexting and child Pornography. Retrieved 06 17,
2014, from Victoria Leagal Aid: http://www.legalaid.vic.gov.au/find-legal-
answers/sex-and-law/sexting-and-child-pornography
Walker, P. (2013, 02 10). Frances Andrade killed herself after being accused of lying, says
husband. Retrieved 11 16, 2014, from The Guardian:
http://www.theguardian.com/uk/2013/feb/10/frances-andrade-killed-herself-
lying
Williams, M. (2013, 03 25). Best free parental control software: 9 programs to keep your kids
safe. Retrieved 06 07, 2014, from techradar.com:
http://www.techradar.com/news/software/applications/best-free-parental-
control-software-9-programs-to-keep-your-kids-safe-1140315
Page 51
BibliographyAdams, M. T. (2010). Inquiry Into Cyber-Safety . Queensland: BoysTown.
Bacon, B. (2007, 07 17). Stolen Innocence: Inside the Shady World of Child Sex Tourism.
Retrieved 06 17, 2014, from abc News:
http://www.seniorreligion.com/new_page_332.htm
BBC. (2013, 05 03). April Jones case: Mother's last moments with missing girl. Retrieved 06
06, 2014, from BBC News Wales: http://www.bbc.co.uk/news/uk-wales-mid-wales-
22394636
BBC. (2013, 09 16). April Jones: Remains to be released after coroner ends hearing. Retrieved
06 06, 2014, from BBC Wales: http://www.bbc.co.uk/news/uk-wales-24105518
BBC. (2003, 07 24). Childbase: Ask the experts. Retrieved 06 18, 2014, from BBC
News: http://news.bbc.co.uk/1/hi/talking_point/3091009.stm
BBC. (2011, 04 19). Many under-13s 'using Facebook'. Retrieved 10 26, 2014, from
BBC News Technology: http://www.bbc.co.uk/news/technology-13129150
BBC News. (2013, 11 05). Meet Sweetie, the girl catching online predators. Retrieved 06
17, 2014, from BBC News: http://www.bbc.co.uk/news/world-europe-24819538
Biddle, S. (2011, 10 06). Where Did the Word "Sexting" Come From? Retrieved 06 15,
2014, from Gizmodo: http://gizmodo.com/5810722/where-did-the-word-sexting-
come-from
Bourne, H. (2014, 06 13). http://www.thesite.org/sex-and-relationships/having-sex/safe-
sexting-and-webcam-sex-3335.html. Retrieved 06 15, 2014, from The Site:
http://www.thesite.org/sex-and-relationships/having-sex/safe-sexting-and-
webcam-sex-3335.html
Cambridgeshire & Peterborough Probation Trust. (2013). Multi-Agency Public
Protection Arrangements – MAPPA. Retrieved 06 17, 2014, from Cambridgeshire &
Page 52
Peterborough Probation Trust: http://cppt.org.uk/multi-agency-public-
protection-arrangements-mappa/
CEOP. (2013, 02 04). ALARMING NEW TREND IN ONLINE SEXUAL ABUSE. Retrieved 06 16,
2014, from CEOP Commands:
http://ceop.police.uk/Media-Centre/Press-releases/2013/ALARMING-NEW-TREND-IN-
ONLINE-SEXUAL-ABUSE/
CEOP. (2014). Partners and Supporters. Retrieved 06 17, 2014, from CEOP Command:
http://ceop.police.uk/partnerships/
CEOP. (2012). Threat Assessment of Child Sexual Exploitation and Abuse. London: CEOP.
CEOP. (2013). Threat Assessment of Child Sexual Exploitation and Abuse. London: Child
Exploitation and Online Protection Centre.
Childnet International. (2014, 01 17). Sexting and the Law. Retrieved 11 04,
2014, from Childnet: http://www.childnet.com/blog/sexting-and-the-law
Click Orlando. (2013, 03 15). Woman, 28, accused of making child pornography.
Retrieved 06 05, 2014, from clickorlando.com:
http://www.clickorlando.com/Woman-28-accused-of-making-child-pornography/
19341692
Coroners and Justice Act 2009. (2009). Coroners and Justice Act 2009. Retrieved 06
17, 2014, from Legislation.gov.uk:
http://www.legislation.gov.uk/ukpga/2009/25/section/62
Cowan, R. (2006, 11 10). Jail for paedophile who terrorised via internet. Retrieved 11 05,
2014, from The Guardian:
http://www.theguardian.com/technology/2006/nov/10/viruses.security
Defence for Children - ECPAT the Netherlands . (2013). Protection of children against
Protection of children against. Hooglandes : Defence for Children - ECPAT the
Netherlands .
Page 53
Encyclopedia of Children and Childhood in History and Society. (2008).
Pedophilia. Retrieved 05 30, 2014, from Encyclopedia of Children and Childhood
in History and Society: http://www.faqs.org/childhood/Pa-Re/Pedophilia.html
et.al, J. W. (2003). Normative Sexual Behaviour of African American Children.
In J. Bancroft, Sexual Development in Childhood (pp. 243-246). Bloomington: Indiana
University Press.
Evans, N. (2013, 05 30). April Jones trial: CCTV shows Mark Bridger hours before schoolgirl
vanished - and being taken into custody. Retrieved 06 06, 2014, from Mirror:
http://www.mirror.co.uk/news/uk-news/april-jones-trial-cctv-shows-1922625
Facebook. (2013, 11 15). Statement of Rights and Responsibilities. Retrieved 04 16,
2014, from Facebook: https://www.facebook.com/legal/terms
Federal Research Division. (2009). INTERNET CRIMES AGAINST CHILDREN. Washington:
NCJRS.
fighting for kids. (2014, 05 25). The COPINE scale. Retrieved 05 25, 2014, from
fighting for kids: http://ffkfightingforkids.weebly.com/the-copine-scale.html
Geoghegan, T. (2003, 04 29). Are there women paedophiles? Retrieved 06 17, 2014,
from BBC News Magazine: http://news.bbc.co.uk/1/hi/magazine/8022861.stm
Gibb, M. N. (2014, 11 07). Sexting:Written question - 213267. Retrieved 11 09, 2014,
from Parliament.UK: http://www.parliament.uk/business/publications/written-
questions-answers-statements/written-question/Commons/2014-11-04/213267
Gillespie, P. A. (2009, 12 11). child nudity. CL and J criminal law and justice weekly .
good reads. (2014, 03 29). Nelson Mandela quotes. Retrieved 03 29, 2014, from
goodreads.com: http://www.goodreads.com/author/quotes/367338.Nelson_Mandela
Goode, S. (2014, 06 12). How can we prevent child abuse if we don't understand paedophilia?
Retrieved 06 17, 2014, from The Independant:
Page 54
http://www.independent.co.uk/voices/comment/im-the-biggest-football-fan-you-
know--and-im-a-woman-what-of-it-9533062.html
Greer, C. (2014). News Media, Victims and Crime. Retrieved 11 06, 2014, from
Sagepub: http://www.uk.sagepub.com/stout/greer_news_media%20-
%20vic_crime_soc.pdf
Henery, J. (1950). Knowledge Is Power: Francis Bacon and the Method of Science. Totem
Books.
Higgins, C. (2009, 11 30). Tate modern removes naked Brook Shields picture after please visit.
Retrieved 05 26, 2014, from The Guardian:
http://www.theguardian.com/artanddesign/2009/sep/30/brooke-shields-naked-
tate-modern
HM Goverment. (2009). Safeguarding Safeguarding ChildrenChildren and Young People from
Sexual Exploitation Exploitation . London: HM Goverment.
Holloway, D. G. (2013). Zero to Eight. Young children and their internet use. London: The
London School of Economics and Political Science.
Home Office. (2007). Departmental Report 2007. London: Home Office.
Hope, C. (2014, 04 27). Cameron to close legal loophole that lets paedophiles download child
grooming manuals. Retrieved 06 17, 2014, from The Telegraph:
http://www.telegraph.co.uk/news/politics/10791387/Cameron-to-close-legal-
loophole-that-lets-paedophiles-download-child-grooming-manuals.html
Hornby, M. (2013, 05 10). Mark Bridger 'was emotional wreck' when arrested over April Jones.
Retrieved 06 06, 2014, from The Independent:
http://www.independent.co.uk/news/uk/crime/mark-bridger-was-emotional-wreck-
when-arrested-over-april-jones-8611307.html
How To Geek. (2014). Who Provides Internet Service for My Internet Service Provider?
Retrieved 06 17, 2014, from How to geek: http://www.howtogeek.com/123599/who-
provides-internet-service-for-my-internet-service-provider/
Page 55
IBM. (2013). i2 Enterprise Intelligence Analysis. Retrieved 06 18, 2014, from IBM:
http://www-03.ibm.com/software/products/en/enterprise-intelligence-analysis
IWF. (2014, 11 15). Police. Retrieved 11 15, 2014, from IWF:
https://www.iwf.org.uk/partnerships/police
Jr, a. g. (2011, 05 19). National starch strategy conference on combating
child exploitation. San Jose, California.
Judicary of England and Wales. (2013). SENTENCING REMARKS OF MR JUSTICE GRIFFITH
WILLIAMS. Manchester: Judicary of England and Wales.
Kolvin, P. I. (2001). Cycle of child sexual abuse: links between being a
victim and becoming a perpetrator. Brittish Journal of Psychiarty , 179.
LabourPress. (2013, 12 27). Keir Starmer to advise Labour on first Victims’ Law. Retrieved
11 06, 2014, from LabourPress:
http://press.labour.org.uk/post/71354241522/keir-starmer-to-advise-labour-on-
first-victims-law
Laurel House. (2012). Sexual Offender Tactics and Grooming. Retrieved 06 16, 2014,
from Laural House: http://laurelhouse.org.au/?page_id=36
legislation.gov.uk. (2003). Sexual Offences Act 2003.
legislation.gov.uk. (2008). Sexual Offences Act 2003. Retrieved 06 17, 2014, from
legislation.gov.uk: http://www.legislation.gov.uk/ukpga/2003/42/section/72
Lewis, M. G. (2012). A LEGAL FRAMEWORK FOR COMBATING CHILD SEX TOURISM.
UNODC Regional Centre for East Asia and the Pacific UN Conference Centre (pp. 1 - 5). Bangkok
: United Nations Office on Drugs and Crime.
Lighting Their Way Home. (2014, 01 08). JONATHAN AND SARAH ADLETA – BABIES BEING
CONCEIVED JUST TO BE SEXUALLY TORTURED. Retrieved 06 05, 2014, from Lighting Their
Way Home : http://lightingtheirwayhome.wordpress.com/2013/11/02/jonathan-and-
Page 56
sarah-adleta-babies-being-conceived-just-to-be-sexually-tortured-cca0097-
updated-11-02-2013/
Metropolitan Police Service. (2014). Get the facts. Retrieved 06 10, 2014, from
Internet Safty: http://safe.met.police.uk/internet_safety/get_the_facts.html
Microsoft. (2014). Age-based guidelines for kids' Internet use. Retrieved 06 17, 2014,
from Microsoft Safety & Security Center:
http://www.microsoft.com/security/family-safety/childsafety-age.aspx
Miller, M. (2014, 11 04). Sexting:Written question - 213267. Retrieved 11 09, 2014,
from Parliament.UK: http://www.parliament.uk/business/publications/written-
questions-answers-statements/written-question/Commons/2014-11-04/213267
Ministry of Justice, Home Office & the Office for National Statistics .
(2013). An Overview of Sexual Offending in England and Wales . London: Ministry of
Justice, Home Office & the Office for National Statistics.
Montaldo, C. (2014). Profile of a Pedophile. Retrieved 06 11, 2014, from About.com
Crime: http://crime.about.com/od/sex/p/pedophile.htm
Moore, P. H. (2014, 01 08). Pre-Nuptial Child Sex Pact Demon Jonathan Adleta Sentenced to
Two Life Terms. Retrieved 06 05, 2014, from All Things Crime:
http://www.allthingscrimeblog.com/2014/01/08/pre-nuptial-child-sex-pact-
demon-jonathan-adleta-sentenced-to-two-life-terms/
National Organisation for the Treatment of Abusers. (2014, 04). NOTA
Individualised Treatment Resourse. NOTA News , pp. 1-32.
NSPCC. (2014). Child grooming. Retrieved 06 16, 2014, from NSPCC:
http://www.nspcc.org.uk/help-and-advice/for-parents/keeping-your-child-safe/
grooming/child-grooming_wda101191.html
NSPCC. (2013, 02). Child sex offender disclosure scheme. Retrieved 06 12, 2014, from
NSPCC: http://www.nspcc.org.uk/Inform/research/briefings/sex-offender-
disclosure-scheme_wda94183.html
Page 57
NSPCC. (2014, 10 17). Child sexual exploitation. Retrieved 10 17, 2014, from NSPCC:
http://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/child-
sexual-exploitation/
NSPCC. (2014, 10 26). Childline. Retrieved 10 26, 2014, from Sexting:
http://www.childline.org.uk/explore/onlinesafety/pages/sexting.aspx
NSPCC. (2014, 04). Statistics on child sexual abuse. Retrieved 06 09, 2014, from
nspcc.org.uk:
http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/
statistics_wda87833.html
Ofcom. (2012). Children and Parents: Media Use and Attitudes Report . London: Ofcom.
Office for National Statistics. (2013, 08 08). Internet Access - Households and
Individuals, 2013. Retrieved 01 29, 2014, from Office for National Statistics:
http://www.ons.gov.uk/ons/rel/rdit2/internet-access---households-and-
individuals/2013/index.html
Omegle. (2014). Retrieved 06 16, 2014, from Omegle.com:
http://www.omegle.com/
Oxford Dictionaries. (2014, 05 30). Pedophile. Retrieved 05 30, 2014, from
Oxford Dictionaries:
http://www.oxforddictionaries.com/definition/american_english/pedophile
Papadopoulos, D. L. (2014, 02 04). NSPCC Google Hangout for the Underwear
Rule campaign. (J. Evans, Interviewer)
Papp, D. S. (1997). The Information Age: An Anthology on Its Impact and Consequences .
London: CCRP Publication Series .
Parliament.uk. (2012, 04 25). Westminster Hall. Retrieved 11 11, 2014, from
www.parliament.uk: http://www.parliamentlive.tv/Main/Player.aspx?
meetingId=10606&st=10:58:20
Page 58
Phippen, P. A. (2012). New research lifts the lid on ‘sexting’ attitudes and practices amongst
teenagers. Plymouth : UK Safer Internet Centre & Plymouth University.
QC, K. S. (2013, 03 06). justice response to child sexual abuse: time for a national consensus.
Retrieved 11 11, 2014, from CPS:
http://www.cps.gov.uk/news/articles/the_criminal_justice_response_to_child_se
xual_abuse_-_time_for_a_national_consensus/
QC, K. S. (2013, 03 06). The criminal justice response to child sexual abuse: time for a national
consensus. Retrieved 11 07, 2014, from CPS:
http://www.cps.gov.uk/news/articles/the_criminal_justice_response_to_child_se
xual_abuse_-_time_for_a_national_consensus/
Reisinger, D. (2011, 11 15). Kids have 'adult' tech skills; parents don't know it. Retrieved
06 17, 2014, from CNET: http://www.cnet.com/uk/news/kids-have-adult-tech-
skills-parents-dont-know-it/
Revoir, P. (2009, 10 01). Tate removes the picture of 10-year-old Brooke Shields after police
pornography probe. Retrieved 05 24, 2014, from mail online:
http://www.dailymail.co.uk/news/article-1216924/Brooke-Shields-nude-10-year-
old-Tate-Modern-display-nude-giant-pornographic-images.html
Roberts, Y. (2014, 08 03). From private passions to sexting: how Britain's sex life has gone
public. Retrieved 10 24, 2014, from The Guardian:
http://www.theguardian.com/lifeandstyle/2014/aug/03/sex-lives-go-public-
sexting-joy-of-sex-film-sex-tapes
RYAN C. W. HALL, M. A. (2007). Definition, Characteristics of Offenders,
Recidivism, Treatment Outcomes, and Forensic Issues. A Profile of Pedophilia , 457-
471.
Schultz, D. W. (2009, 01 27). Alicia Kozakiewicz Testimony on Sex Predators online.
Retrieved 10 29, 2014, from YouTube: https://www.youtube.com/watch?
v=vGdldKxPock
Page 59
Sexual Offences Act 2003. (2003). Sexual Offences Act 2003. Retrieved 06 18, 2014,
from Legislation.gov.uk:
http://www.legislation.gov.uk/ukpga/2003/42/section/74
Sexual Offences Act 2003. (2003). Sexual Offences Act 2003. Retrieved 06 18, 2014,
from Legislation.gov.uk:
http://www.legislation.gov.uk/ukpga/2003/42/section/74
Shields vs Gross, 58 N.Y.2d 338 (1983) (Court of Appeals of the State of New
York 02 16, 1983).
Shinder, D. (2011, 01 26). What makes cybercrime laws so difficult to enforce. Retrieved
06 14, 2014, from Tech Republic: http://www.techrepublic.com/blog/it-
security/what-makes-cybercrime-laws-so-difficult-to-enforce/
South Eastern CASA. (2012, 03 09). Trauma responses in children. Retrieved 06 12,
2014, from South Eastern CASA South Eastern CASA:
http://www.secasa.com.au/pages/trauma-responses-in-children/
The Crown Prosecution Serevice. (2008). Jurisdiction. Retrieved 06 17, 2014, from
The Crown Prosecution Serevice:
http://www.cps.gov.uk/legal/h_to_k/jurisdiction/#b01
The Crown Prosecution Service. (2006, 11 09). Internet blackmailer sentenced for forcing
girls to pose naked. Retrieved 11 05, 2014, from CPS:
http://www.cps.gov.uk/news/latest_news/164_06/index.html
The National Archives. (1978, 07 20). Protection of Children Act 1978. Retrieved 10
17, 2014, from Ledislation.gov.uk:
http://www.legislation.gov.uk/ukpga/1978/37
Tickle, L. (2012, 08 22). How police investigators are catching paedophiles online.
Retrieved 06 17, 2014, from The Gaurdian: http://www.theguardian.com/social-
care-network/2012/aug/22/police-investigators-catching-paedophiles-online
Page 60
Topping, A. (2014, 02 20). Historic sex case prosecutions will continue, vows chief prosecutor.
Retrieved 06 05, 2014, from The Gardian:
http://www.theguardian.com/law/2014/feb/20/historic-sex-case-prosecutions-
continue-cps
Victoria Leagal Aid. (2014, 04 10). Sexting and child Pornography. Retrieved 06 17,
2014, from Victoria Leagal Aid: http://www.legalaid.vic.gov.au/find-legal-
answers/sex-and-law/sexting-and-child-pornography
Wadhwa, V. (2014, 04 15). Laws and Ethics Can’t Keep Pace with Technology. Retrieved 06
17, 2014, from MIT Technology Review:
http://www.technologyreview.com/view/526401/laws-and-ethics-cant-keep-pace-
with-technology/
Walker, P. (2013, 02 10). Frances Andrade killed herself after being accused of lying, says
husband. Retrieved 11 16, 2014, from The Guardian:
http://www.theguardian.com/uk/2013/feb/10/frances-andrade-killed-herself-
lying
Whitby, P. (2011). Is Your Child Safe Online? In P. Whitby, Is Your Child Safe
Online? (p. 5). Richmond: Crimson Publishing.
Williams, M. (2013, 03 25). Best free parental control software: 9 programs to keep your kids
safe. Retrieved 06 07, 2014, from techradar.com:
http://www.techradar.com/news/software/applications/best-free-parental-
control-software-9-programs-to-keep-your-kids-safe-1140315
Page 61
top related