Caution: This chapter will focus on insight into the behavioral
|
|
|
- Ashlyn Jordan
- 9 years ago
- Views:
Transcription
1 chapter 5 Cyber Pedophiles: A Behavioral Perspective Kenneth V. Lanning Caution: This chapter will focus on insight into the behavioral patterns of offenders in sexual exploitation of children cases involving computers. The information and its application are based on my education, training, and more than 27 years of experience studying the criminal aspects of deviant sexual behavior and interacting with investigators and prosecutors. Although I have great confidence in its behavioral accuracy and reliability, its legal acceptance and application must be evaluated by prosecutors based on agency policy, rules of evidence, and current case law. The use of terms in this chapter, which are also utilized in the mental health field (e.g., impulsive, compulsive, pedophilia), is not meant to imply a psychiatric diagnosis or lack of legal responsibility. The sexual victimization of children involves varied and diverse dynamics. It can range from one-on-one intrafamilial abuse to multioffender/multivictim extrafamilial sex rings and from stranger abduction of toddlers to prostitution of teenagers.
2 72 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective Paraphilias and Sexual Ritual Behavior Paraphilias are psychosexual disorders defined for clinical and research purposes in the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision, commonly referred to as the DSM-IV-TR (American Psychiatric Association, 2000). They are defined as recurrent, intense, sexually arousing fantasies, urges, or behaviors that generally involve (1) nonhuman objects, (2) the suffering or humiliation of oneself or one s partner, or (3) children or other nonconsenting persons, and that occur over a period of at least 6 months. Better known and more common paraphilias include the following: exhibitionism (exposure), fetishism (objects), frotteurism (rubbing), pedophilia (children), sexual masochism (self-pain), sexual sadism (partner pain), and voyeurism (looking). Less known and less common paraphilias include the following: scatologia (talk), necrophilia (corpses), partialism (body parts), zoophilia (animals), coprophilia (feces), klismaphilia (enemas), urophilia (urine), infantilism (babies), hebephilia (female youth), ephebophilia (male youth), and many others. 3 In the real world, each of the paraphilias typically has the following: 1. Slang names (e.g., big baby, golden showers, S&M) 2. An industry that sells related paraphernalia and props (e.g., restraining devices, gags, adult-size baby clothing) 3. A support network (e.g., North American Man/Boy Love Association [NAM- BLA], Diaper Pail Fraternity) 4. A body of literature (e.g., pornography) In fact, the paraphilias are the organizational framework or the Dewey Decimal System of pornography, obscenity, adult bookstores, and Internet sex chat rooms. Paraphilias are psychosexual disorders and not types of sex crimes. They may or may not involve criminal activity. Individuals suffering from one or more of these paraphilias can just engage in fantasy and masturbate, they can act out their fantasies legally (e.g., consenting adult partners, objects), or they can act out their fantasies illegally (e.g., nonconsenting partners, underage partners). It is their choice. Although any of the paraphilias could become elements of a computer child sexual exploitation case, pedophilia is the most obvious and the one best known to prosecutors dealing with these cases. It is important for prosecutors to understand that the diagnostic criteria for pedophilia require that there be recurrent, intense, and sexually 3 Adapted from Cyber Pedophile: A Behavioral Perspective, in Prosecuting Online Child Exploitation Cases, by James S. Peters (Ed.), U.S. Department of Justice, USA Books (2002).
3 Paraphilias and Sexual Ritual Behavior 73 arousing fantasies, urges, or behaviors involving prepubescent children, generally age13 years or younger. The absence of any of the key criteria could eliminate the diagnosis. For example, an individual with a strong preference for and repeatedly engaging in sex with large numbers of 14-year-olds could correctly be evaluated by a mental health professional as not being a pedophile. Nonetheless, some mental health professionals continue to apply the term to those with a sexual preference for pubescent teenagers. The terms hebephilia and ephebophilia are not specifically mentioned in the DSM- IV-TR and are rarely used, even by mental health professionals. They are, however, being increasingly used in forensic evaluations submitted to the court by defendants attempting to minimize their sexual behavior. Although sexual attraction to pubescent children by adults has the obvious potential for criminal activity, it does not necessarily constitute a sexual perversion as defined by psychiatry. On an investigative level, the presence of paraphilias often means highly repetitive and predictable behavior, focused on specific sexual interests, that goes well beyond a modis operandi or method of operation (MO). The concept of an MO a strategy used by an offender because it works and will help him or her get away with the crime is well known to most investigators. An MO is fueled by thought and deliberation. Most offenders change and improve their MO over time and with experience. The repetitive behavior patterns of some sex offenders do involve an MO, but are likely to also involve the less-known concept of sexual ritual. Sexual ritual is the repeated engaging in an act or series of acts in a certain manner because of a sexual need; that is, in order to become aroused and/or gratified, a person must engage in the act in a certain way. Some aspects of the MO of sex offenders can, if repeated often enough during sexual activity, become part of the sexual ritual. Other types of ritual behavior can be motivated by psychological, cultural, or spiritual needs. Unlike an MO, ritual is necessary to the offender but not to the successful commission of the crime. In fact, instead of facilitating the crime, ritual often increases the odds of identification, apprehension, and conviction because it causes the offender to make need-driven mistakes. Ritual and its resultant behavior are fueled by erotic imagery and fantasy and can be bizarre in nature. Most important to investigators, offenders find it difficult to change and modify ritual, even when their experience tells them they should or they suspect law enforcement scrutiny. The ritual patterns of sex offenders have far more significance than the MO of other types of offenders. Understanding sexual ritual is the key to investigating certain sex offenders. The courts in this country have, however, been slow to recognize and understand the difference between MO and ritual.
4 74 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective The Distinction Between a Pedophile and a Child Molester The general public, the media, and many child abuse professionals sometimes simplistically refer to all those who sexually victimize children as pedophiles. As discussed in Chapter 4, there is no single or uniform definition for the word pedophile. As previously stated, for mental health professionals, it is a diagnostic term referring to persons with recurrent, intense sexually arousing fantasies, urges, or behaviors involving prepubescent children. Technically, pedophilia is a psychiatric diagnosis that can only be made by qualified psychologists or psychiatrists. Therefore, for many, the word is a diagnostic term, not a legal one. What, then, is the difference between a child molester and a pedophile? For many, the terms have become synonymous. For them, the word pedophile is just a fancy term for a child molester. The media frequently make no distinction and use the terms interchangeably. The term pedophilia is being used more and more by law enforcement and prosecutors, especially in cases involving the use of computers. It has even entered their slang usage with some talking about investigating a pedo case or being assigned to a pedo squad. Although Americans most often pronounce the ped in pedophilia as ped, as in pedestrian (from the Latin for foot), the correct pronunciation is ped, as in pediatrician (from the Greek for child). Not all pedophiles are child molesters. A person suffering from any paraphilia can legally engage in it simply by fantasizing and masturbating. A child molester is an individual who sexually molests children. A pedophile might have a sexual preference for children and fantasize about having sex with them, but if he does not act this fantasy out, he is not a child molester. Some pedophiles might act out their fantasies in legal ways by simply talking to or watching children and later masturbating. Some might have sex with dolls and mannequins that resemble children. Some pedophiles might act out their fantasies in legal ways by engaging in sexual activity with adults who look like children (small stature, flat chest, no body hair), dress like children, or act like children (immature, baby talk). Others may act out child fantasy games with adult prostitutes. A difficult problem to detect and address is that of individuals who act out their sexual fantasies by socially interacting with children (e.g., in person or online) or by interjecting themselves into the child sexual abuse or exploitation problem as overzealous child advocates (e.g., cyber vigilantes). It is almost impossible to estimate how many pedophiles exist who have never molested a child. What society can, or should, do with regard to such individuals is an interesting area for discussion but beyond the role of prosecutors. People cannot be arrested for their fantasies. Conversely, not all child molesters are pedophiles. A pedophile is an individual who prefers to have sex with children. A person who prefers to have sex with an adult
5 Typology of Sex Offenders 75 partner may, for any number of reasons, decide to have sex with a child. Such reasons might include simple availability, curiosity, or a desire to hurt a loved one of the molested child. Because the sexual fantasies of such individuals do not necessarily focus on children, they are not pedophiles. Are child molesters with adolescent victims pedophiles? Are individuals who collect both child and adult pornography pedophiles? Is everyone using a computer to facilitate having sex with children, or trafficking in child pornography, a pedophile? Many child molesters are, in fact, pedophiles, and many pedophiles are child molesters. But they are not necessarily one and the same. Labeling all child molesters as pedophiles can be confusing. Often, it may be unclear whether the term is being applied with its diagnostic definition or with some other definition. Most investigators and prosecutors are not qualified to apply the term with its diagnostic meaning. I recommend that investigators and prosecutors minimize the use of the term pedophile. For the purposes of this discussion, the term pedophile, when used, will be defined as a significantly older individual who prefers to have sex with individuals legally considered children. Pedophiles are individuals whose erotic imagery and sexual fantasies focus on children. Rather than simply settling for child victims, they prefer to have sex with children. The law, not puberty, determines who is a child. A pedophile is just one example or subcategory of what I refer to as a preferential sex offender. The term preferential sex offender is merely a descriptive label used to identify, for investigative and prosecutive purposes, a certain type of offender. The term does not appear in the DSM-IV-TR, and it is not intended to imply or to be used for clinical diagnosis. It is important to realize that to refer to someone as a pedophile is to say only that the individual has a sexual preference for children. It says little or nothing about the other aspects of the person s character and personality. To assume that someone is not a pedophile simply because he or she is nice, goes to church, works hard, is kind to animals, and so on, is absurd. Pedophiles span the full spectrum in regard to public perception, from saints to monsters. Nonetheless, over and over again, pedophiles are not recognized, investigated, charged, convicted, or sent to prison simply because they are nice guys. Typology of Sex Offenders When distinctions between types of offenders need to be made, I recommend theuse of a descriptive typology developed for criminal justice purposes. This discussion will set forth such a typology. My original typology of child molesters was developed in the mid-1980s and was published and widely disseminated by the National Center for Missing and Exploited
6 76 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective Children (NCMEC) in a monograph entitled Child Molesters: A Behavioral Analysis. It was revised in April 1987 (2nd edition) and again in December 1992 (3rd edition). It divided child molesters into two categories (situational or preferential) and into seven patterns of behavior. Although still useful, this old typology has several limitations and has been updated by a new typology that places sex offenders, not just child molesters, along a motivational continuum (situational to preferential) instead of into one of two categories. Although motivation can often be difficult to determine, it is best evaluated by documenting behavior patterns. A detailed discussion of this newer typology was published by the NCMEC in September At one end of the continuum are the more situational sex offenders. They tend to be less intelligent and are overrepresented in lower socioeconomic groups. Their criminal sexual behavior tends to be in the service of basic sexual needs or nonsexual needs such as power and anger. Their behavior is often opportunistic and impulsive, but primarily thought-driven. They are more likely to consider the risks involved in their behavior but often make stupid or sloppy mistakes. If they collect pornography, it is often violent in nature, reflecting their power and anger needs. Their patterns of behavior are more likely to involve the previously discussed concept of the MO. Situational-type sex offenders victimizing children do not have a true sexual preference for children. They may molest them, however, for a wide variety of situational reasons. They are more likely to view and be aroused by adult pornography but might engage in sex with children in certain situations. Situational sex offenders frequently molest readily available children whom they have easy access to, such as their own children or those they may live with or have control over. Pubescent teenagers are high-risk, viable sexual targets. Younger children may also be targeted because they are weak, vulnerable, or available. Psychopathic situational offenders may select children, especially adolescents, simply because they have the opportunity and think they can get away with it. Social misfits may select children out of insecurity and curiosity. Others may have low self-esteem and use children as substitutes for preferred adults. At the other end of the motivation continuum are the more preferential sex offenders. They tend to be more intelligent and are overrepresented in higher socioeconomic groups. Their criminal sexual behavior tends to be in the service of deviant sexual needs known as paraphilias. This behavior is often scripted and compulsive and is primarily fantasy-driven. Repeated fantasy over time creates need. They are more likely to consider their needs and therefore make needy mistakes that often seem almost stupid. When they collect pornography and related paraphernalia, it usually focuses on the themes of their paraphiliac preferences. Their patterns of behavior are more likely to involve the previously discussed concept of ritual.
7 The Motivation Continuum 77 The Motivation Continuum As this descriptive term implies, preferential-type sex offenders have specific sexual preferences or paraphilias (see Table 5.1). Those with a preference for children could be called pedophiles, those with a preference for peeping could be called voyeurs, those with a preference for suffering could be called sadists, etc. But one of the purposes of this typology is to avoid these diagnostic terms. Preferential sex offenders are more likely to view, be aroused by, and collect theme pornography. Some preferential sex offenders without a preference for children do molest children in order to carry out their bizarre sexual fantasies and preferences with young, less threatening, less judgmental, and highly vulnerable victims. Some of these offenders sexual activity with children may involve acts they are embarrassed or ashamed to request or do with a preferred adult partner. Such offenders, even if they do not have a sexual preference for children, would still be preferential sex offenders and therefore engage in similar patterns of behavior. Table 5.1 The Motivation Continuum Nonsexual Deviant Sexual ======== ============ ========== =========== Situational Sex Offender 1. Less intelligent 2. Lower socioeconomic status 3. Psychopathic behavior 4. Varied criminal behavior 5. Violent pornography 6. Impulsive Preferential Sex Offender 1. More intelligent 2. Higher socioeconomic status 3. Paraphilias 4. Focused criminal behavior 5. Theme pornography 6. Compulsive There are many advantages to using this criminal justice descriptive typology. If there is a need to distinguish a certain type of sex offender, this typology provides a name or label instead of just calling them these guys. The label is professional in contrast to referring to them as perverts or sickos or worse. Because the terms are descriptive, not diagnostic, and probative, not prejudicial, they may be more acceptable in reports, search warrants, and testimony by criminal justice professionals. For example, the currently popular term predator might be considered too prejudicial for court testimony. The continuum concept also better addresses the complexity of and changes in human behavior. Using the term preferential sex offender instead of preferential child molester addresses the issue of applying it to offenders who collect child pornography without physically molesting children. The one term, preferential sex
8 78 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective offender, eliminates the need for investigators and prosecutors to distinguish between child pornography collectors and child molesters, between pedophiles and hebephiles, and among numerous other paraphilias. How to recognize and identify such offenders will be discussed shortly. Prosecutors might argue that it is their job to prosecute individuals who violate the law and that whether or not that offender is a pedophile or a preferential sex offender is of little importance to them. There is no legal requirement to determine that a subject or suspect in a case is a pedophile or preferential sex offender. Often it is irrelevant to the investigation or prosecution. There are, however, clear differences between the types of individuals who sexually victimize children, and prosecutors handling these cases sometimes need to make such distinctions. Although there is not a single profile that will determine if someone is a child molester, preferential sex offenders tend to engage in highly predictable and recognizable behavior patterns. The potential evidence available as a result of the long-term, persistent, and ritualized behavior patterns of many sexual exploiters of children make these cases almost a prosecutor s heaven. Need-driven behavior leads to bewildering mistakes. Why would a reasonably intelligent individual use his computer at work to download child pornography, deliver his computer filled with child pornography for repair, send his film with child pornography on it to a store to be developed, appear in child pornography images he is making, discuss engaging in serious criminal activity with a stranger he met on the Internet, transmit identifiable photographs of himself to such an individual, maintain incriminating evidence knowing investigators might soon search his home or computer, give investigators permission to search his home or computer knowing it contains incriminating evidence, agree to be interviewed, and so forth? Defense attorneys might argue that such behavior indicates that their clients are innocent, lack criminal intent, or are not criminally responsible. Why else would an intelligent individual do something so obviously stupid? Such behavior does not necessarily mean the offender is insane or not criminally responsible. Another explanation is much more probable the behavior is need-driven. The fantasy- or need-driven behavior of preferential sex offenders has little to do with thinking. As a father cautioned his son in the movie A Bronx Tale, it is more a matter of the little head telling the big head what to do. Their need is what makes preferential sex offenders so vulnerable to proactive investigations even though the techniques used have been well publicized. If necessary, an expert could be used to educate the court concerning certain patterns of behavior. The use of such an expert was upheld in United States v. Romero, 189 F.3d 576 (7th Cir. 1999).
9 Computer Offenders 79 Prosecutors should be aware of a Cautionary Statement that appears on page xxxvii of the DSM-IV-TR and reads in part as follows: It is to be understood that inclusion here, for clinical and research purposes, of a diagnostic category such as Pathological Gambling or Pedophilia (emphasis added) does not imply that the condition meets legal or other nonmedical criteria for what constitutes mental disease, mental disorder, or mental disability. The clinical and scientific considerations involved in categorization of these conditions as mental disorders may not be wholly relevant to legal judgments, for example, that take into account such issues as individual responsibility, disability determination, and competency. Computer Offenders Offenders using computers to sexually exploit children tend to fall into three broad categories: 1. Situational offenders: a. Normal adolescent/adult: Usually a typical adolescent searching online for pornography and sex or an impulsive/curious adult with newly found access to a wide range of pornography and sexual opportunities. b. Morally indiscriminate offender: Usually a power/anger-motivated sex offender with a history of varied violent offenses. Parents, especially mothers, who make their children available for sex with individuals on the Internet would also most likely fit in this category. c. Profiteer: The criminal just trying to make easy money. With the lowered risk of identification and increased potential for profit, these individuals have returned to trafficking in child pornography. When situational offenders break the law, they can obviously be investigated and prosecuted, but their behavior is not as long-term, persistent, and predictable as that of preferential offenders. They are a more varied group. 2. Preferential offenders: a. Pedophile: Offender, as previously discussed, with a definite preference for children. b. Diverse offender: Offender with a wide variety of paraphiliac or deviant sexual interests, but no strong sexual preference for children. This offender was previously referred to in my typology as the sexually indiscriminate.
10 80 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective c. Latent offender: Individual with potentially illegal but previously latent sexual preferences who has more recently begun to criminally act out when inhibitions are weakened after arousal patterns are fueled and validated through online computer communication. The essential difference between the pedophile type and the diverse type of preferential offender is the strength of the individual s sexual preference for children. The pedophile type is primarily interested in sex with children that might, in some cases, involve other sexual deviations or paraphilias. The diverse type is primarily interested in a variety of sexual deviations that might, in some cases, involve children. For example, the pornography and erotica collection of the diverse preferential offender will be more varied, usually with a focus on the individual s particular sexual preferences or paraphilias (sometimes involving children), whereas a pedophile s collection will focus predominately on children (sometimes involving paraphilias). If children are being victimized, the diverse offender is more likely to directly molest pubescent children. More naive prepubescent children, however, are sometimes selected to minimize possible challenges to, or embarrassment over, the offender s deviant sexual interests. With an absence of prior criminal sexual activity, latent offenders present problems in determining the appropriate prosecution and sentence. A thorough investigation and a good forensic psychological evaluation, possibly aided by the use of the polygraph or other deception assessment devices, are helpful in evaluating such apparent latent offenders. 1. Miscellaneous offenders: a. Media reporters: Individuals who erroneously believe they can go online and traffic in child pornography and arrange meetings with suspected child molesters as part of an authorized and valid news exposé. b. Pranksters: Individuals who disseminate false or incriminating information to embarrass the targets of their dirty tricks. c. Older boyfriends: Individuals in their late teens or early 20s attempting to sexually interact with adolescent girls or boys. d. Overzealous citizens: Individuals who go overboard doing their own private investigations into this problem. As will be discussed, investigators must be cautious of all overzealous citizens offering their services in these cases. Although these miscellaneous offenders may be breaking the law, they are obviously less likely to be prosecuted. This category includes media reporters breaking the law as part of a bona fide news story. It does not include reporters, or any other professionals, who engage in such activity to hide or rationalize the fact that they have a personal interest in child pornography. They would be situational or preferential offenders.
11 Recognizing Preferential Sex Offenders 81 Overzealous citizens could also include sex offender therapists and researchers engaging in this type of activity. Only law enforcement officers, as part of official, authorized investigations, should be conducting proactive investigation or downloading child pornography on a computer. It should be noted that federal law does allow an affirmative defense for the possession of child pornography, but only if (1) less than three items are possessed and (2) the material is promptly and in good faith, and without retaining or allowing access to any person, destroyed or reported to a law enforcement agency that is afforded access to each depiction (18 U.S.C.A. 2252(c)). The test for those claiming professional use for child pornography should be twofold: First, do they have a professional use for the material? Second, were they using it professionally? Both standards must be met in order to seriously consider the claim. Although a variety of individuals sexually victimize children, preferential sex offenders, for now, are the primary sexual exploiters of children. They tend to be serial offenders who prey on children through the operation of child sex rings and/or the collection, creation, or distribution of child pornography. Using a computer to fuel and validate interests and behavior, to facilitate interacting with child victims, or to possess and traffic in child pornography usually requires the above-average intelligence and economic means more typical of preferential sex offenders. The computer sex offenders discussed here have tended to be white males from a middle-class or higher socioeconomic background. As computers and use of the Internet have become more commonplace, however, there are now increasing numbers of the more varied situational sex offenders. Recognizing Preferential Sex Offenders An important step in investigating sexual exploitation of children is to recognize and utilize, if present, the highly predictable sexual behavior patterns of these preferential sex offenders. If the investigation identifies enough of these patterns, many of the remaining ones can be assumed. However, no particular number constitutes enough. A few may be enough if they are especially significant. Most of these indicators mean little by themselves, but as they are identified and accumulated through investigation, they can constitute reason to believe a suspect is a preferential sex offender. You cannot determine the type of offender with whom you are dealing unless you have the most complete, detailed, and accurate information possible. The investigator must understand that doing a background investigation on a suspect means more than obtaining the date and place of birth and credit and criminal checks. School, juvenile, military, medical, driving, employment, bank, sex offender and child abuse registry,
12 82 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective sex offender assessment, computer, and prior investigative records can all be valuable sources of information about an offender. A preferential sex offender can usually be identified by the following characteristics: 1. Long-term and persistent pattern of behavior a. Begins pattern in early adolescence b. Is willing to commit time, money, and energy c. Commits multiple offenses d. Makes ritual or need-driven mistakes 2. Specific sexual interests a. Manifests paraphiliac preferences (may be multiple) b. Focuses on defined sexual interests and victim characteristics c. Centers life around preferences d. Rationalizes sexual interests 3. Well-developed techniques a. Evaluates experiences b. Lies and manipulates, often skillfully c. Has method of access to victims d. Is quick to use modern technology (e.g., computer, video) for sexual needs and purposes 4. Fantasy-driven behavior a. Collects theme pornography b. Collects paraphernalia, souvenirs, videotapes, etc. c. Records fantasies d. Acts to turn fantasy into reality Prosecutors must not over- or underreact to reported allegations. They must understand that not all computer offenders are stereotypical pedophiles who fit some common profile. Keeping an open mind and objectively attempting to determine the type of offender involved can be useful in minimizing embarrassing errors in judgment and developing appropriate interview, investigative, and prosecutive strategies. For example, knowing that preferential offenders as part of sexual ritual are more likely to commit similar offenses, make need-driven mistakes, and compulsively collect pornography and other offense-related paraphernalia could be used to build a stronger case. In computer cases, especially those involving proactive investigative techniques, it is often easier to determine the type of offender than in other kinds of child sexual exploitation cases. When attempting to make this determination, it is important to
13 Recognizing Preferential Sex Offenders 83 evaluate all available background information. The following information from the online computer activity can be valuable in this assessment. This information can often be ascertained from the online service provider and through undercover communication, pretext contacts, informants, record checks, and other investigative techniques (e.g., mail cover, pen register, trash run, surveillance). Screen name Number of files originated Screen profile Number of files forwarded Accuracy of profile Number of files received Length of time active Number of recipients Amount of time spent online Site of communication Number of transmissions Theme of messages and chat Number of files Theme of pornography A common problem in these cases is that it is often easier to determine the computer being used than to determine who is using the computer. It is obviously harder to do a background investigation when multiple people have access to the computer. Pretext phone calls can be very useful in such situations. Case Study: An Exaggerated Example of Computer Pornography An investigation determines that a suspect is a 50-year-old single male who does volunteer work with troubled boys. He has two prior convictions for sexually molesting young boys in 1974 and 1986, has an expensive state-of-theart home computer, has a main screen name of Boylover, and one screen profile that describes him as a 14 year old. For the last 5 years he has daily spent many hours online in chat rooms and in the alt.sex.preteen newsgroup justifying and graphically describing his sexual preference for and involvement
14 84 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective with young boys and brags about his extensive pornography collection. Furthermore, he uploads hundreds of child pornography files, all focusing on preteen boys in bondage. If such a determination were relevant to the case, these facts would constitute more than sufficient probable cause to believe this suspect is a preferential sex offender. Knowing the kind of offender with whom you are dealing can go a long way in determining investigative and prosecutive strategy. For example, this knowledge might be useful in: 1. Anticipating and understanding need-driven mistakes 2. Evaluating the consistency of victim statements 3. Developing offender and victim interview strategies 4. Determining the existence, age, and number of victims 5. Recognizing where and what kind of corroborative evidence might be found 6. Proving intent 7. Determining appropriate charging and sentencing 8. Assessing the admissibility of prior like acts 9. Evaluating dangerousness at a bond hearing, etc. 10. Explaining behavior patterns to a jury 11. Determining suitability for treatment options 12. Addressing staleness 13. Utilizing an expert search warrant Expert Search Warrants Most computer exploitation cases involve searching homes, offices, and computers for child pornography and other related evidence. One controversial and misunderstood application of an offender typology is its use in so-called expert search warrants. In such search warrants, an expert s opinion is included in the affidavit to address a particular deficiency. The expert s opinion is usually intended for any of the following reasons: 1. Addressing legal staleness problems 2. Expanding the nature and scope of the search (e.g., for erotica-type material or for more than one location) 3. Adding to the probable cause
15 Expert Search Warrants 85 Addressing staleness and expanding the scope of the search are probably the most legally defensible uses of such opinions. Using the expert s opinion as part of the probable cause, however, is much more legally questionable and should only be done in full awareness of the potential judicial consequences. Despite the legal uncertainties of its application, there is little behavioral doubt that probable cause to believe that a given individual is a preferential sex offender is, by itself, probable cause to believe that the individual collects some type of pornography or paraphernalia related to his or her preferences (which may or may not include child pornography). If it is used, the expert s opinion should be the smallest possible percentage of the probable cause. As the portion of the probable cause based upon the expert s opinion increases, the expectation of a much more closely scrutinized, critical review should increase. The affidavit should set forth only those offender characteristics necessary to address a specific deficiency. For example, if the expert opinion is needed only to address staleness, the only trait that matters is the tendency to add to and the unlikeliness to discard collected pornography and erotica. The expert s opinion concerning other behavioral traits could be used to justify searching a storage locker or a computer at work or searching for related paraphernalia or videos. Not all offenders who might use a computer to traffic in child pornography have these traits. Therefore, the affidavit must set forth the reasons for the expert s conclusion that the subject of the search is among the particular group of offenders with the stated characteristics. The informational basis for the expert s opinion must be reliable, sufficient, and documented. The information must be from reliable sources and in sufficient quantity and quality to support the belief. Details concerning the information must be meticulously recorded and retrievable, especially if it is the basis for a warrant sought by another agency or department. As stated earlier, it is useful to have a name for these guys with these distinctive characteristics. Although investigators have frequently called them pedophiles or child pornography collectors, the term preferential sex offender is recommended. Expert search warrants describing highly predictable offender characteristics should only be used for subjects exhibiting preferential sexual behavior patterns. The characteristics, dynamics, and techniques (e.g., expert search warrant) discussed concerning preferential sex offenders should be considered with any of the preferential types of computer offenders (e.g., pedophile, diverse, or latent). It is usually unnecessary to distinguish which type of preferential offender is involved. Whenever possible, affidavits for search warrants should be based on reliable, casespecific facts. Because of legal uncertainties, expert search warrants should be used only when absolutely necessary. They should not be a replacement for reasonable investiga-
16 86 CHAPTER 5 / Cyber Pedophiles: A Behavioral Perspective tion. When such warrants are used, the affidavit must reflect the specific facts and details of the case in question. Boilerplate warrants, or go-bys, should be avoided. It is also best if the expert used is part of the investigation or from the local area. Regional or national experts should be used only when a local expert is unavailable. Staleness of Probable Cause Because of delays in communicating details from proactive investigations, staleness is a common problem in computer exploitation cases. It may take weeks or months for the details learned from an undercover Internet investigation in one part of the country to be disseminated to investigators with jurisdiction over the target computer in another part of the country. Obviously, the best way to address the staleness of probable cause is to freshen it up with current investigation and information. As stated previously, staleness can also be addressed with an expert search warrant. Before doing so, prosecutors should do legal research and be aware of appellate decisions that support this approach. They should also be aware of Congressional Finding 12 in the Child Pornography Prevention Act of 1996 that states, prohibiting the possession and viewing of child pornography will encourage the possessors of such material to rid themselves of or destroy the material. I am not sure what this finding is based on, but it is contrary to my many years of experience studying preferential sex offenders and contrary to what is usually stated in such expert search warrants. Another way to address staleness is to recognize that the information in question may not be stale. It is a matter of differing opinion as to when the informational basis for probable cause becomes stale. Some prosecutors say in days, others say weeks, but most say months. I believe that the time interval varies based on the type of information. Because of characteristics of technology and human behavior, probable cause about information on a computer should not be considered stale for at least 1 year. It is not easy to effectively delete the information on a computer, even when you try. Furthermore, most people do not delete the information on a regular basis. Such editing of a computer is likely to occur less often than cleaning out the garage, attic, or basement. Because this is a common human characteristic, it should not require the opinion of an expert. Concerned Citizens Assisting Law Enforcement Many individuals who report information to the authorities about deviant sexual activity that they have discovered on the Internet must invent clever excuses for how and why they came upon such material. They often start out pursuing their own sexual/deviant
17 Concerned Citizens Assisting Law Enforcement 87 interests but then decide to report to the police either because it went too far because they are afraid they might have been monitored by authorities or because they need to rationalize their perversions as having some higher purpose or value. Rather than honestly admitting their own deviant interests, they make up elaborate explanations to justify finding the material. Some claim to be journalists, researchers, or outraged, concerned citizens trying to protect a child or help the police. In any case, what they find may need to be investigated. If information from such concerned citizens is part of the basis for an expert s opinion in the warrant, there could be questions about its reliability. Investigators must consider the following when these concerned citizens report such activity: 1. The reporters, motivated by a need to rationalize or deny their deviant sexual interests, have embellished and falsified an elaborate tale of perversion and criminal activity on the Internet. 2. The reporters, regardless of their true motivations, have uncovered others who are using the Internet to validate and reinforce bizarre, perverted sexual fantasies and interests (a common occurrence) but who are not engaged in criminal activity. 3. The reporters, regardless of their true motivations, have uncovered others involved in criminal activity. One especially sensitive area for investigators is the possibility of preferential sex offenders who present themselves as concerned citizens reporting what they inadvertently discovered in cyberspace or requesting to work with law enforcement to search for child pornography and to protect children. Other than the obvious benefit of legal justification for their past or future activity, most do this as part of their need to rationalize their behavior as worthwhile and to gain access to children. When these offenders are caught, instead of recognizing this activity as part of their preferential pattern of behavior, the courts sometimes give them leniency because of their good deeds. Preferential sex offenders who are also law enforcement officers sometimes claim their activity was part of some well-intentioned but unauthorized investigation.
Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group
Seto 1 Child Pornography Offender Characteristics and Risk to Reoffend Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group Prepared for the United States Sentencing Commission Draft dated February
Results. Contact sexual crimes based on PSI and self-report after SOTP participation
Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex
Oregon Sex Offender Assessment Scale Jackson County, Oregon. Sex Offender Assessment Attachment 1. Negative Scale (Increases Risk)
Oregon Sex Offender Assessment Scale Jackson County, Oregon Sex Offender Assessment Attachment 1 OFFENDER SID Negative Scale (Increases Risk) 1. History of sexual crimes...-10 2. *History of sex offense
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Boundaries: Protecting Children, Young People and Yourself from Technology Dangers
Boundaries: Protecting Children, Young People and Yourself from Technology Dangers Presented by Robert Hugh Farley MS Farley International Consultant in Crimes against Children for the VIRTUS Program 10
Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)
April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between
Sexual Assault of a Child VOIR DIRE QUESTIONS
ATTORNEYS Sexual Assault of a Child VOIR DIRE QUESTIONS 1. What are your feelings or opinions about criminal defense attorneys? 2. Have you ever had a bad experience with a criminal defense attorney? If
ONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
United States Court of Appeals
United States Court of Appeals FOR THE EIGHTH CIRCUIT No. 09-1408 United States of America, * * Appellee, * * Appeal from the United States v. * District Court for the * District of Minnesota. Aaron Jay
Long-term Impact Evaluation of Specialized Sex Offender Probation Programs In Lake, DuPage and Winnebago Counties
Long-term Impact Evaluation of Specialized Sex Offender Probation Programs In Lake, DuPage and Winnebago Counties Prepared for the The Illinois Criminal Justice Information Authority By: Loretta J. Stalans,
Information for Crime Victims and Witnesses
Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)
SPECIAL OPTIONS SERVICES PROGRAM UNITED STATES PRETRIAL SERVICES AGENCY EASTERN DISTRICT OF NEW YORK
SPECIAL OPTIONS SERVICES PROGRAM UNITED STATES PRETRIAL SERVICES AGENCY EASTERN DISTRICT OF NEW YORK February 4, 2013 1 I. Introduction The Special Options Services (SOS) Program was established in the
Maricopa County Attorney s Office Adult Criminal Case Process
The following is a brief description of the process to prosecute an adult accused of committing a felony offense. Most misdemeanor offenses are handled by municipal prosecutors; cases involving minors
Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now
Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be
Iowa County Attorneys Association
Iowa County Attorneys Association Hoover State Office Building 1 st Floor Des Moines, Iowa 50319 Telephone: (515) 281-5428 Fax: (515) 281-4313 STATEMENT ON SEX OFFENDER RESIDENCY RESTRICTIONS IN IOWA December
Juvenile Sexual Offenders: An. Analytical View of Effective. Programming
Juvenile Sexual Offenders: An Analytical View of Effective Programming Lee Hyman Volume 4 No. 2 Fall 2007 Abstract The following paper reviews the little discussed topic of juvenile sexual offenders as
SEALING OF RECORDS. Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE. DAVID ROGER District Attorney
SEALING OF RECORDS Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE DAVID ROGER District Attorney NOTICE: This Website contains instructions for using the Clark County District
Child Molesters: A Behavioral Analysis
Child Molesters: A Behavioral Analysis For Law Enforcement Officers Investigating Cases of Child Sexual Exploitation In cooperation with the Federal Bureau of Investigation Child Molesters: A Behavioral
Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench
Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W
CSE Case Law Report October 2011
CSE Case Law Report October 2011 October 1 9, 2011 State Supreme Courts Stephens v. State, 716 S.E.2d 154 (Ga. Oct. 3, 2011). Jury Instructions Probation Conditions Defendant was convicted in the trial
64th Legislature AN ACT GENERALLY REVISING LAWS REGARDING SEX OFFENDER REGISTRATION; REQUIRING THE
64th Legislature HB0088 AN ACT GENERALLY REVISING LAWS REGARDING SEX OFFENDER REGISTRATION; REQUIRING THE OFFENDER TO PROVIDE E-MAIL ADDRESSES AND SOCIAL MEDIA SCREEN NAMES WHEN REGISTERING; REQUIRING
The rights of crime victims in Maryland. The role and responsibilities of Law Enforcement
The rights of crime victims in Maryland The role and responsibilities of Law Enforcement Prepared by the Governor s Office of Crime Control & Prevention and the Maryland State Board of Victim Services
Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act
Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act The Canadian Resource Centre for Victims of Crime is a national, non-profit
Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick
Understanding Consent to Sexual Activity Public Legal Education and Information Service of New Brunswick NO means NO Understanding Consent to Sexual Activity This pamphlet provides information on what
RESTRAINING ORDERS IN MASSACHUSETTS Your rights whether you are a Plaintiff or a Defendant
RESTRAINING ORDERS IN MASSACHUSETTS Your rights whether you are a Plaintiff or a Defendant Prepared by the Mental Health Legal Advisors Committee October 2012 What is a restraining order? A restraining
Where can I get help after a sexual assault?
Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone
KENTUCKY STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES
KRS KRS 531.010. Definitions. As used in this chapter: (1) "Distribute" means to transfer possession of, whether with or without consideration. (2) "Matter" means any book, magazine, newspaper, or other
Indecent photographs of children
Sexual Offences Guideline Consultation 251 Possession of indecent photograph of child Criminal Justice Act 1988 (section 160) Triable either way Maximum: 5 years custody Offence range: Community order
SORNA Substantial Implementation Review State of Delaware
SORNA Substantial Implementation Review State of Delaware The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking
TRIAL DEFENSE SERVICE FACT SHEET Rights as a Suspect
TRIAL DEFENSE SERVICE FACT SHEET Rights as a Suspect 1. YOUR RIGHTS AS A SUSPECT a. This information paper describes your rights if you are suspected of committing a criminal offense. You should become
Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender
Adam Walsh Child Protection and Safety Act Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Signed into law by George W. Bush on July 27, 2006 Creates a
How To Explain Your Criminal History In Florida
KNOW YOUR RECORD What Teens Should Know About Their Delinquency Record Law Office of Julianne M. Holt Public Defender, Thirteenth Judicial Circuit of Florida 700 East Twiggs Street, Fifth Floor P.O. Box
TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW
TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW FEBRUARY 24, 2010 THANK YOU SENATOR DURBIN AND MEMBERS OF THE COMMITTEE FOR INVITING ME
Title 15 CRIMINAL PROCEDURE -Chapter 23 ALABAMA CRIME VICTIMS Article 3 Crime Victims' Rights
Section 15-23-60 Definitions. As used in this article, the following words shall have the following meanings: (1) ACCUSED. A person who has been arrested for committing a criminal offense and who is held
Glossary. To seize a person under authority of the law. Police officers can make arrests
Criminal Law Glossary Arrest Charge Convicted Court Crime/Offence Crown Attorney or Prosecutor Criminal Custody Guilty Illegal Innocent Lawyer To seize a person under authority of the law. Police officers
CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?
THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never
ABUSE, NEGLECT, SELF- NEGLECT & EXPLOITATION OF VULNERABLE ADULTS
ABUSE, NEGLECT, SELF- NEGLECT & EXPLOITATION OF VULNERABLE ADULTS INDEX CODE: 1810 EFFECTIVE DATE: 01-29-09 Contents: I. Purpose II. Definitions III. Investigative Procedures IV. Protective Services V.
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.
Criminal Justice System Commonly Used Terms & Definitions
Criminal Justice System Commonly Used Terms & Definitions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Accused: Acquittal: Adjudication: Admissible Evidence: Affidavit: Alford Doctrine: Appeal:
How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases
How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases John Matthew Fabian, PSY.D., J.D. The purpose of this article is to present how forensic
Assessing capacity to consent and to give evidence
Assessing capacity to consent and to give evidence Dr Theresa Joyce Estia Centre; South London & Maudsley NHS Trust, London, UK This presentation will consider 4 topics Assessing capacity to consent to
Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews
Massachusetts Major City Chiefs Best Practices in Eyewitness Identification and the Recording of Suspect Interviews September 2010 Introduction In December 2009 the Boston Bar Association published Getting
PREA COMPLIANCE AUDIT INSTRUMENT INTERVIEW GUIDE FOR SPECIALIZED STAFF. Community Confinement Facilities August 11, 2014
Community Confinement Facilities August 11, 2014 GUIDELINES FOR AUDITORS: SPECIALIZED STAFF INTERVIEWS Selecting specialized staff for interview: Per the instructions for random staff interviews, the auditor
Georgia Accountability Court Adult Felony Drug Court. Policy and Procedure Manual
Georgia Accountability Court Adult Felony Drug Court Policy and Procedure Manual Contents Policy and Procedure Manual: Adult Felony Drug Court Overall purpose...3 Mission Statement...4 Adult Drug Court
Domestic Violence. (b) Assaulting, attacking, beating, molesting, or wounding a named individual.
Domestic Violence Domestic Violence is one of the 12 factors of the best interests test set forth at MCLA 722.23. The best interest factors were modified in 1993 to include domestic violence as factor
STATE OF OHIO. DEPARTMENT OF REHABILITATION RELATED ACA STANDARDS: EFFECTIVE DATE: AND CORRECTION February 19, 2011 I. AUTHORITY
STATE OF OHIO SUBJECT: PAGE 1 OF 7. Specialized Assessments and Screenings NUMBER: 67-MNH-16 RULE/CODE REFERENCE: SUPERSEDES: AR 5120-11-03, 07, 21 67-MNH-16 dated 01/13/10 ORC 5120.031; 5120.032; 5120.033
Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/
Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would
Alabama s Mandatory Child Abuse and Neglect Reporting Law
CODE OF ALABAMA TITLE 26. INFANTS AND INCOMPETENTS. CHAPTER 14. REPORTING OF CHILD ABUSE OR NEGLECT. 26-14-1. Definitions. For the purposes of this chapter, the following terms shall have the meanings
MINNESOTA JUDICIAL TRAINING UPDATE
MINNESOTA JUDICIAL TRAINING UPDATE CRIMINAL VOIR DIRE QUESTIONS ASKED BY THE COURT THE MN SUPREME COURT TASK FORCE ON JURY SELECTION HAS RECOMMENDED THAT JUDGES BE MORE PROACTIVE IN ASKING INITIAL QUESTIONS
IN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney,
S. AMANDA MARSHALL, OSB #95347 United States Attorney District of Oregon STACIE F. BECKERMAN, OSB #06239 Assistant United States Attorney [email protected] 1000 S.W. Third Ave., Suite 600 Portland,
UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DANNY TEAGUE, Defendant-Appellant. No. 10-10276 D.C. No. 1:05-cr-00495- LJO-1 OPINION
WHAT IS MY ROLE AS THE LAWYER FOR A JUVENILE CLIENT?
WHAT IS MY ROLE AS THE LAWYER FOR A JUVENILE CLIENT? First Defense Volunteers go to the Police Station on all calls involving minors, including misdemeanors. This requirement includes cases where the child
San Francisco s Successful Strategies: Prevention Services for Girls and the First Offender Prostitution Program Norma Hotaling
Norma Hotaling is the founder and Executive Director of SAGE (Standing Against Global Exploitation), Inc., a nonprofit organization in San Francisco that helps former prostitutes live healthy lives. Before
FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry
FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry 830 West Jefferson Street 850-644-1234 VICTIMS' RIGHTS BROCHURE YOUR RIGHTS AS A VICTIM OR WITNESS: ------- We realize that for many persons,
Investigating Child Abuse and Neglect Fact Sheet
Investigating Child Abuse and Neglect Fact Sheet Our Legal Responsibilities When Butler County Children Services receives a report saying a child has been abused or neglected, the law requires us to: Find
STATE OF ARIZONA, Appellee, ROY MATTHEW SOVINE, Appellant. No. 1 CA-CR 14-0094
NOTICE: NOT FOR PUBLICATION. UNDER ARIZONA RULE OF THE SUPREME COURT 111(c), THIS DECISION DOES NOT CREATE LEGAL PRECEDENT AND MAY NOT BE CITED EXCEPT AS AUTHORIZED. IN THE ARIZONA COURT OF APPEALS DIVISION
How will I know if I have to give evidence in court?
Being a Witness What is a witness? A witness is a person who is required to come to court to answer questions about a case. The answers a witness gives in court are called evidence. Before giving evidence,
As used in this chapter, the following words shall, unless the context clearly requires otherwise, have the following
Page 1 Massachusetts General Laws Annotated Currentness Part IV. Crimes, Punishments and Proceedings in Criminal Cases (Ch. 263-280) Title II. Proceedings in Criminal Cases (Ch. 275-280) Chapter 278A.
Criminal Code (Child Pornography and Abuse) Amendment Bill 2004
1 Criminal Code (Child Pornography and Abuse) Explanatory Notes General Outline Short Title The short title of the Bill is the Criminal Code (Child Pornography and Abuse). Policy Objectives of the Legislation
JUVENILE ADJUDICATIVE COMPETENCE INTERVIEW (JACI)* General Guidance
JUVENILE ADJUDICATIVE COMPETENCE INTERVIEW (JACI)* General Guidance 1. Obtain information about youth s abilities in 12 areas relevant for competence to stand trial. 2. Explore youth s answers and explanations
State Enactments Imposing Restrictions on Sex Offenders, especially as related to contact with children. February 2006
State Enactments Imposing Restrictions on Sex Offenders, especially as related to contact with children February 2006 The following are laws that broadly impose restrictions and penalties on sex offenders.
MINNESOTA S EXPERIENCE IN REVISING ITS JUVENILE CODE AND PROSECUTOR INPUT IN THE PROCESS September 1997
MINNESOTA S EXPERIENCE IN REVISING ITS JUVENILE CODE AND PROSECUTOR INPUT IN THE PROCESS September 1997 In 1991, Minnesota began a major effort to substantially revise the laws governing our juvenile justice
Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?
Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person
Community Legal Information Association of PEI, Inc. Sexual Assault
Community Legal Information Association of PEI, Inc. Sexual Assault As an adult in Canada, you have the right to choose when or if you engage in sexual activity. Sexual activity without your consent is
Domestic Violence: Can the Legal System Help Protect Me?
Domestic Violence: Can the Legal System Help Protect Me? What is domestic violence? Domestic violence is a pattern of physically and/or emotionally abusive behavior used to control another person with
Explanations given by child pornography offenders for their crimes
Journal of Sexual Aggression (July 2010), Vol. 16, No. 2, pp. 169180 Explanations given by child pornography offenders for their crimes Michael C. Seto, 1 * Lesley Reeves 2 & Sandy Jung 3 1 Royal Ottawa
SORNA Substantial Implementation Review State of Tennessee
September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
DESCRIPTION OF FORENSIC POPULATION
SERVICES FOR FORENSIC CLIENTS GENERAL LEGAL RIGHTS CHAPTER 13 DESCRIPTION OF FORENSIC POPULATION The forensic program for the State of Missouri is designed to provide services to all circuit courtordered
Victims of Crime the help and advice that s available
Details about Victim Support Your local Victim Support Scheme is: Victims of Crime the help and advice that s available You can also contact the Victim Supportline on: 0845 30 30 900 Or, if you prefer,
7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ
7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ 7.1 Victim of a crime What are my rights if I have been the victim of a crime? As a victim of crime, you have the right to report that crime to
The Witness and the Justice System in Alberta
The Witness and the Justice System in Alberta Introduction This booklet provides basic information about appearing as a witness in the courts of Alberta. It is designed to explain your role as a witness,
Purpose of the Victim/Witness Unit
Purpose of the Victim/Witness Unit The Victim/Witness Assistance Division of the Lake County State s Attorney s Office was formed to serve the needs of people like you. The division is meant to ensure
Issue Brief. Arizona State Senate ARIZONA SEX OFFENDER REGISTRATION AND NOTIFICATION INTRODUCTION ADAM WALSH ACT. November 23, 2009.
Arizona State Senate Issue Brief November 23, 2009 Note to Reader: The Senate Research Staff provides nonpartisan, objective legislative research, policy analysis and related assistance to the members
Criminal Investigation CRJ141. Matthew McCarty
Criminal Investigation CRJ141 Matthew McCarty Chapter 1 Criminal Investigation: An Overview CSI Effect The exaggerated depiction of how television forensic science operates, creating a phenomenon in which
BRYCE A. FETTER ORLANDO JUVENILE CHARGES ATTORNEY
BRYCE A. FETTER ORLANDO JUVENILE CHARGES ATTORNEY People make mistakes, especially young people. Juvenile lawyer Bryce Fetter believes children should get a second chance through rehabilitation rather
An Act To Implement the Recommendations of the Human Trafficking Task Force Be it enacted by the People of the State of Maine as follows: PART A
PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. An Act To Implement the Recommendations
My name is Michelle Tupper. I am an attorney with Dickstein Shapiro and a board
Testimony of E. Michelle Tupper Board Member, DC Lawyers for Youth Dickstein Shapiro LLP Department of Corrections Oversight Hearing before the D.C. Council October 29, 2007 Members of the Council, good
NC General Statutes - Chapter 15A Article 17 1
SUBCHAPTER III. CRIMINAL PROCESS. Article 17. Criminal Process. 15A-301. Criminal process generally. (a) Formal Requirements. (1) A record of each criminal process issued in the trial division of the General
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
How To Get Your Criminal History From The Justice Department
Criminal Records & Employment 1. What exactly is a criminal record? YOUR LEGAL RIGHTS A criminal record, formally known as a summary criminal history, or more commonly known as a rap sheet, is a list of
APPENDIX A GLOSSARY OF RELEVANT TERMINOLOGY
APPENDIX A GLOSSARY OF RELEVANT TERMINOLOGY Abel Assessment Adam Walsh Act Anonymizer BitCoin (see Digital Currency) Bulletin Board System (BBS) Chat/Chatting Developed by Gene Abel, M.D., the Abel Assessment
18 Questions and Answers for Advising Potential PPOE Students
18 Questions and Answers for Advising Potential PPOE Students Question 1: Is a felony conviction always a bar to peace officer licensure in Minnesota? Answer: Yes. According to MN Rules a felony conviction
Introduced by Representative Gardner AN ACT
State of Arizona House of Representatives Forty-third Legislature Second Regular Session REFERENCE TITLE: psychiatric security review board Introduced by Representative Gardner AN ACT Amending sections
The Rights of Crime Victims in Texas
The Rights of Crime Victims in Texas 1 Housekeeping Please turn off cell phones and pagers or place in a silent mode. Questions can be answered in presentations or during break. 2 Constitutional Rights
CRIMINAL LAW AND VICTIMS RIGHTS
Chapter Five CRIMINAL LAW AND VICTIMS RIGHTS In a criminal case, a prosecuting attorney (working for the city, state, or federal government) decides if charges should be brought against the perpetrator.
PARENT GUIDE TO THE JUVENILE COURT CHIPS PROCESS
PARENT GUIDE TO THE JUVENILE COURT CHIPS PROCESS INTRODUCTION This booklet has been prepared to help parents gain a better understanding of what to expect in Juvenile Court CHIPS proceedings (Chapter 48
BEADLE COUNTY PROCEDURES AND POLICIES FOR PROSECUTION OF SEXUAL ASSAULT CASES
BEADLE COUNTY PROCEDURES AND POLICIES FOR PROSECUTION OF SEXUAL ASSAULT CASES I. Policy Statement A. Overview South Dakota prosecutors have made significant strides in the prosecution of sexual assault
Anti-human trafficking manual for criminal justice practitioners. Module 11
Anti-human trafficking manual for criminal justice practitioners Module 11 11 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Anti-human trafficking manual for criminal justice practitioners Module 11:
Code of Alabama Title 26. Infants and Incompetents. Chapter 14. Reporting of Child Abuse or Neglect. ALA.CODE 26-14-2. 26-14-1. Definitions.
ALA.CODE 26-14-1 26-14-1. Definitions. For the purposes of this chapter, the following terms shall have the meanings respectively ascribed to them by this section: (1) ABUSE. Harm or threatened harm to
Morgan County Prosecuting Attorney Debra MH McLaughlin
Morgan County Prosecuting Attorney Debra MH McLaughlin Directions: From Fairfax Street Entrance, Enter Main Door, turn Right through door, up the narrow staircase. Office is at top of steps. (Old Circuit
A Guide for Larimer County Parents
Services Child Protection A Guide for Larimer County Parents This booklet was prepared by the Program Committee of the Larimer County Child Advocacy Center in consultation with the Larimer County Department
