COMPLETE CRITICAL LITERATURE REVIEW



Similar documents
Current situation regarding our knowledge of paedophile activity in P2P networks

Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Study of Self-Generated Sexually Explicit Images & Videos Featuring Young People Online

Explanations given by child pornography offenders for their crimes

Rehabilitation programs for young offenders: Towards good practice? Andrew Day. Forensic Psychology Research Group. University of South Australia

ONLINE PREDATORS & PREDATORS

How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases

USING INTERNET ARTIFACTS TO PROFILE A CHILD PORNOGRAPHY SUSPECT

FACT SHEET: PROJECT SAFE CHILDHOOD

Oregon Sex Offender Assessment Scale Jackson County, Oregon. Sex Offender Assessment Attachment 1. Negative Scale (Increases Risk)

SORNA Substantial Implementation Review State of Tennessee

Course Description. SEMESTER I Fundamental Concepts of Substance Abuse MODULE OBJECTIVES

California Sex Offender Management Board. Sex Offender Treatment Training Requirements

The European Online Grooming Project_

Indecent photographs of children

APPENDIX A GLOSSARY OF RELEVANT TERMINOLOGY

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Criminal Code (Child Pornography and Abuse) Amendment Bill 2004

Wilsthorpe Community School

Boundaries: Protecting Children, Young People and Yourself from Technology Dangers

Julia Davidson, PhD Professor of Criminology, Kingston University Safer Internet. Pl Keeping Children & Young People Safe Online, 3 rd International

1.1 Full name: Social Work Practitioner Youth Justice

Adolescent Sexual Offenders

STATE OF OHIO. DEPARTMENT OF REHABILITATION RELATED ACA STANDARDS: EFFECTIVE DATE: AND CORRECTION February 19, 2011 I. AUTHORITY

BABCP. Standards of Conduct, Performance and Ethics. British Association for Behavioural & Cognitive Psychotherapies

Executive Summary. 1. What is the temporal relationship between problem gambling and other co-occurring disorders?

Research Note RN 00/91 1 November 2000 DRUG COURTS

Sample Employee Network and Internet Usage and Monitoring Policy

Online grooming: What changes with the new legislation?

Chapter I: Introduction. Substance abuse is an enormous social problem in South Africa. The World Health

CRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations

Business Plan 2012/13

Questionnaire: Domestic (Gender and Family) Violence Interventions

CEOP Relationship Management Strategy

Juvenile Sexual Offenders: An. Analytical View of Effective. Programming

Sue R. (Chartered Clinical & Forensic Psychologist) B.Sc. (Hons.), M.Sc., D. Clin. Psychol. AFBPSs.

SECTION 4 I - CHILDREN & YOUNG PEOPLE WHO DISPLAY HARMFUL SEXUAL BEHAVIOUR. Introduction p. 2. Principles p. 2. Definition p. 3. Recognition p.

Sexual Offences Definitive Guideline DEFINITIVE GUIDELINE

A response to. Review of Criminal Damages and Criminal Injuries Compensation Schemes. Department of Justice. 13 March 2015

GUIDELINES SUBSTANCE ABUSE PREVENTION PROGRAMMES AND INTERVENTIONS IN STATE SCHOOLS MINISTRY FOR EDUCATION AND EMPLOYMENT

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Who's chatting to your kids?

GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY

Sibling Sexual Abuse

There s plenty of work { on the dark side!

Sentencing Guidelines Council Indecent images of children

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

Organising and planning services for people with a personality disorder

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

PEER-TO-PEER NETWORK

Statistics on Women in the Justice System. January, 2014

Client Intake Information. Client Name: Home Phone: OK to leave message? Yes No. Office Phone: OK to leave message? Yes No

SPECIAL OPTIONS SERVICES PROGRAM UNITED STATES PRETRIAL SERVICES AGENCY EASTERN DISTRICT OF NEW YORK

Acceptable Use Policy

Multisystemic Therapy With Juvenile Sexual Offenders: Clinical and Cost Effectiveness

Working with Local Criminal Justice Boards

Sexual Assault of People in Aged Care Settings: Towards a Better Understanding and Response

Inspecting e-safety in schools

Probation in England and Wales Systems for Delivering Effective Practice

SORNA Substantial Implementation Review State of Delaware

Criteria for a Children s Program

Operational indicators of trafficking in human beings

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Conduct Disorder: Treatment Recommendations. For Vermont Youth. From the. State Interagency Team

Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act

The Coalition s Policy to Enhance Online Safety for Children

Minnesota County Attorneys Association Policy Positions on Drug Control and Enforcement

Caution: This chapter will focus on insight into the behavioral

Optional Protocol on the sale of children, child prostitution and child pornography

Characteristics of OWI Offenders

Alcohol Consumption and Alcohol-Related Harms 2012

LCC xdsl Usage Policy

RISK ASSESSMENTS (ODARA) IN SPOUSAL / PARTNER VIOLENCE CASES FIRST ISSUED: DECEMBER 11, 2006 LAST SUBSTANTIVE REVISION: MARCH 19, 2009

Can the criminal justice system be made to operate equitably in relation to race?

Social Work Services and Recovery from Substance Misuse: A Review of the Evidence. Practitioners Guide

How To Deal With Social Media At Larks Hill J & I School

What will I study? Year One core modules currently include:

9. Children, Technology and Gambling

Transcription:

icop Identifying and Catching Originators in P2P Networks Safer Internet Project: SI- 2601002 COMPLETE CRITICAL LITERATURE REVIEW ABSTRACT This document provides a review on the role of P2P facilities in the sexual abuse of children. It is split into two sections, first providing general analysis of sexual offending against children, followed by an analysis of child sexual abuse over peer to peer networks. An updated version will also include analysis of the practitioner interviews that are being carried out. Document ID: icop 4.1 Deliverable/ Milestone No: D4.1 Work-package No: 4 Type: Report Dissemination: Public Status: COMPLETED Version: FINAL Date: November 2011 Author(s): Maggie Brennan, Sean Hammond Project Start Date: 01 June 2011 Duration: 2 years 1

Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. SEXUAL OFFENDING AGAINST CHILDREN... 4 2.1 PARAPHILIAS AND OFFENDING... 4 2.2 PAEDOPHILIA AND HEBEPHILIA... 4 2.3 FACILITATORY FUNCTIONS OF THE INTERNET... 6 3. PEER TO PEER NETWORKING... 10 3.1 THE SCALE AND NATURE OF CHILD ABUSE MEDIA EXCHANGE ON P2P SYSTEMS... 10 3.2 PARAPHILIC USE OF P2P FACILITIES... 14 3.3 P2P: CHALLENGES TO REGULATION AND ENFORCEMENT... 15 4. CONCULSIONS... ERROR! BOOKMARK NOT DEFINED. 5. BIBLIOGRAPHY... 21 2

1. Introduction Within the last three decades, the issue of child sexual abuse has received increased recognition both within professional and lay communities. It has gone from being a largely taboo issue to one of huge public concern. Fuelled by extensive media coverage, anxiety over child sexual abuse has continued to mount. However, despite the increased recognition child sexual abuse has received, not all aspects command equal attention and thus the focus of concern, both among academics and the general public, continue to shift (Taylor & Quayle, 2006). In recent years this focus of concern has shifted to a consideration of the role that the internet and Peer to Peer facilities play in the maintenance and exacerbation of sexual offences against children (Beech & Elliot, 2008; Krueger et al, 2009). The manufacture and exchange of child abuse imagery 1 has become a pressing concern to both law enforcement agencies and those tasked with the treatment and management of child sex offenders (Cooper, Delmonico and Burg 2000; Durkin, Forsyth & Quinn, 2006; Wortley et al, 2006; Adam, 2002). Nevertheless, while there is an abundant literature on the aetiology, presentation and treatment of contact sexual offenders, there is still a paucity of peer reviewed research on offenders using peer to peer facilities to further the abuse of children. Those psychological models that do exist tend to extrapolate from what is known of contact offenders (Beech 1998; Ward et al 1995). However, there is a growing awareness that this strategy misses important distinguishing features that distinguish internet and P2P offenders (Bates and Metcalf, 2007; Shapira et al, 2003; Quayle and Latapy 2008; Libertore et al 2010; Virtual Global Taskforce, 2011). This review attempts to draw together our current understanding of sexual offending as practiced via P2P networks and to identify some of the themes that may be relevant to the appraisal and apprehension of such offenders. 1 It is important to acknowledge the seriousness of the acts portrayed in sexual images and videos of children. While the term child pornography has been widely used in research, clinical practice and in the lay community for decades, the use of this expression is slowly but steadily declining, instead the preferred term child abuse imagery is coming into common usage. The argument against the term child pornography suggests that the phrase conjures up images of children posed provocatively for photographs, and undermines the seriousness of the abuse being recorded (Save the Children, 2006; CEOP, 2010; CIRCAMP, 2011). For the purposes of this review then, the term 'child abuse imagery' will be used preferentially, sometimes interchangeably with other appropriate alternatives such as 'child abuse media' (CAM) or child abuse images. 3

2. Sexual Offending Against Children Those with a sexual interest in children are an extremely heterogeneous group comprised of individuals from all racial, ethnic, age and socioeconomic groups (Beech, 1998, Hanson & Morton-Bourgon, 2005). Due to such heterogeneity, offenders do not typically fit into pre-specified stereotypes thus contributing to difficulty in detection (Blanchard, 1995). Nonetheless, there have been numerous attempts to classify child sexual offenders in the hope that greater specificity of sexual offender types would lead to greater understanding of each of the categories of offenders, if they are in fact distinct (Beech, 1998; Hall & Hall, 2007; Krone, 2004). One such attempt to classify sexual offenders of children is to view one subset of offenders as having a diagnosable psychiatric disorder. 2.1 Paraphilias and Offending The DSM-IV-TR (Diagnostic and Statistical Manual of Mental Disorders, 4th edition, text revision) (American Psychiatric Association, 2000) is a classification handbook compiling all known research on mental disorders and their symptoms, and is relied upon heavily in clinical psychology for research and diagnostic purposes. Paraphilias are defined as: "recurrent, intense sexually arousing fantasies, sexual urges, or behaviours generally involving: nonhuman objects, or the suffering or humiliation of oneself or one's partner, or children or other non-consenting persons." Paraphilias listed in the DSM include paedophilia, frotteurism, transvestic fetishism, sexual sadism, and paraphilia not-otherwise-specified (which includes less common fetishes such as necrophilia or zoophilia). Paraphilias of primary concern in the context of online sexual offending are paedophilia and hebephilia, although other paraphilic predilections (e.g. sexual sadism and bestiality) have been associated with the sexual abuse of children and engagement with child abuse imagery in online environments. These problematic paraphilias and their role in the commission of sexual offences within P2P facilities will comprise the main focus of this review. By problematic paraphilias we mean those which involve illegal and/or non-consensual activity. This is a deliberate attempt to maintain consistency with the approach taken by Hammond et al. (2009) given that the subsequent research tasks in this Work Package will involve work to extend models of problematic paraphilic behaviour in P2P facilities first developed under the MAPAP Project. 2.2 Paedophilia and Hebephilia Paedophila can be loosely defined as a sexual interest in prepubescent children. In terms of more formal clinical diagnostic criteria, it requires: 4

Over a period of at least six months, recurrent, intense sexually arousing fantasies, sexual urges or behaviours involving sexual activity with a prepubescent child or children The person has acted on these urges, or the sexual urges or fantasies cause marked distress or interpersonal difficulty The person is at least age 16 years and at least five years older than the child or children in Criterion A. (DSM-IV-TR, 2000). The DSM-IV definition also requires the clinician to specify if the individual is sexually attracted to males, to females or both. Finally, it must also be specified if the abuse is limited to incest, and if the paedophile is: Exclusive type (attracted only to children), Nonexclusive type (also attracted to adults). This definition expressly excludes individuals in late adolescence engaged in an ongoing sexual relationship with a 12 or 13 year old. While the term paedophilia is, by definition, a clinical diagnosis and not a criminal offence or legal term (Hall and Hall, 2007), it is popularly used as a general referent to denote any adult sexual interest or engagement with children, both prepubescent and pubescent (Goran-Svedin, 2010; ECPAT, 2008; Lanning, 2010). While it is generally accepted that many adults who sexually molest children are also paedophiles (APA, 2000; Hall & Hall, 2007; Seto 2009), it is important to note that a diagnosis of paedophilia may only be applied to individuals with preferential sexual interest in prepubescent children, necessarily excluding pubertal victims who also fall within socio-legal definitions of childhood. Furthermore, some paedophiles will not act on their predilections and commit sexual offences against children (Glaser, 1998; Schaefer et al. 2010; Basbaum, 2010). Finally, a proportion of those who do sexually offend against children (e.g. hebephiles who maintain a primary sexual interest in pubescent children) do not meet the threshold for a clinical diagnosis of paedophilia (Blaney and Millon, 2009). While less formally defined, hebephilia can be described as a sexual interest in pubescent children who are showing signs of developing secondary sexual characteristics but are not yet fully sexually mature (Cimbolic et al 1999; Blanchard et al, 2009). In lay terms, paedophilia and hebephilia are not normally distinguished from each other, and individuals who display sexual interest in those under age 16 are widely labelled paedophiles. The DSM - IV - TR categorises paedophilia as a paraphilic mental disorder, wherein paraphilias represent sexual fantasies, urges or behaviours involving subjects that are non-human, non-consenting or where the sexual activity involves suffering for one or both parties involved. At present, hebephilia is not recognized as a diagnosis in the DSM IV TR, and is incorporated into the definition of paedophilia in the ICD 10 (the World Health Organisation s International Classification of Diseases, 10th edition). Currently, an individual displaying hebephilic tendencies or behaviours may be classified under the DSM diagnosis of Paraphilia Not Otherwise Specified (APA, 2000). 5

As noted above, paedophilia is empirically associated with sexual offending, yet not all individuals with a paedophilic orientation are necessarily active sex offenders. This is an important point because individuals found in possession of images of child abuse will often claim that they are not contact offenders and seek to mitigate their offence by assuming that it is somehow victimless. In an analysis of self-report interview data, criminal records and other collateral information from child pornography offenders, Seto et al. (2006) found that 57% of the sample had had no identified sexual contact with children. While a proportion of this percentage may have had contact that was undisclosed, a later study supported the notion that a number of people experiencing sexual feelings towards children will never act on these feelings (Seto, 2009). In addition, Seto (2009) found that up to half of all convicted child molesters would not meet the diagnostic criteria for paedophilia. Motivations for non-paedophilic offenders are varied and include hypersexuality, absence of preferred sexual partners, disinhibition due to substance misuse etc. The distinction between opportunistic child sex offenders and paedophiles is an important one in terms of targeting treatment needs, as recidivism is more likely with paedophilic offenders (Seto, 2009). In earlier research, Seto, Cantor and Blanchard (2006) examined whether conviction for a sexual offence against a child victim constituted evidence of paedophilia. This study found that possession of child pornography was a far stronger indicator of paedophilia than was the commission of a sexual offence against a child/children. Seto and colleagues evidenced that possessors of child abuse imagery were three times more likely to be diagnosed as paedophiles when phallometrically assessed, than were those who had sexually victimized a child. One explanation offered by the authors was that some antisocial men may victimize children in lieu of a healthy sexual relationship with an ageappropriate peer. In contrast, men are more likely to seek and download pornography that specifically relates to their preferred interest. 2.3 Facilitatory functions of the Internet Cooper, Delmonico and Burg (2000) describe the attractiveness of the Internet as a triple A engine of anonymity, accessibility, and affordability. No other medium of communication brings together as many of these attractive features as the Internet. Information and validation were the two main functions of the Internet for paedophiles as identified by Durkin (1997). Organisations such as the North American Man/Boy Love Association (NAMBLA) have a strong presence on the Internet. (Durkin, Forsyth & Quinn, 2006). Newer websites such as GirlWiki and BoyWiki have also emerged in recent years and provide information through the model of the online encyclopaedia Wikipedia (Durkin et al., 2006). With powerful search engines and the abundance of child abuse-centred material online, accessing child pornography or finding like-minded individuals to contact has become a foolproof activity. The UK s Internet Watch Foundation Annual Report (IWF, 2007) detailed the presence of 2755 Internet sites, which were accessed and confirmed as hosting illegal child abuse images and were subsequently traced in 2007 alone. Most of these websites were described as commercial profit-making operations, and were identified following complaints from innocent Internet users who had stumbled across the illegal content. In addition, the report confirms that non-commercial online forums 6

created to share child abuse imagery still represent a significant phenomenon in offenders communicating this material to each other. Given the sheer volume of illegal and offensive material on the Internet, its capacity to transcend physical boundaries and jurisdictions and the opportunity for covert and anonymous operation online, it is virtually impossible to police such activity. The above IWF (2007) report outlines how websites hosting child abuse imagery frequently hop between host-company and country to avoid detection. One particular child pornography website known to the IWF had changed their host company six times across five different countries in a short space of time to evade authorities. Despite these problems however, practitioners are reporting an ever-increasing number of convicted Internet sex offenders being referred for assessment and to treatment programmes (O Brien & Webster, 2007). It is suggested by several authors that traditional sex offender treatment programmes are unsuitable for such individuals; not least because of the information sharing that occurs between contact and Internet child abusers (Hammond & Quayle, 2007; Quayle, Erooga, Wright, Taylor & Harbinson, 2006). Research carried out by Middleton, Elliot, Mandeville-Norden and Beech (2006) concluded that Internet offenders are as heterogeneous a group as other sex offenders such as rapists or child molesters. In addition, using Ward and Siegert s (2002) Pathways Model to offending, Middleton et al. found that a significant proportion of their sample of Internet offenders shared many psychological characteristics with contact abusers. Despite this finding, the authors concluded that given the large minority of their sample that did not display similar emotional deficits to contact offenders, the assumption that contact and Internet offenders can be treated together needs to be reassessed. Bates and Metcalf (2007) found similar results in a small comparison study of Internet and contact offenders in the UK. The authors conducted psychometric evaluations on 39 contact offenders and 39 individuals convicted of Internet offences and compared the outcomes for both groups. While the two groups were found to have similar general personality problems, the Internet offenders scored lower than contact abusers on measures of emotional loneliness and assertiveness, while displaying significantly higher rates of socially desirable responding. The latter finding demonstrates the tendency of Internet offenders to engage in techniques of impression management, and according to the authors may reflect their higher rates of education and employment in comparison to contact offenders. The two groups also had disparate results on scales measuring emotional congruence with children, sexualised attitudes toward children and empathy distortions (Bates & Metcalf, 2007). These measures reflect a variety of dynamic risk factors that can be targeted during treatment, and the dissimilarity between Internet and contact offenders may indicate that the groups require assessment and management that is tailored to address their divergent criminogenic needs. In an added effort to cater for the needs of this relatively new group, a specialised programme for treating Internet sex offenders has been introduced in the UK (i- SOTP, National Probation Service, 2006). This programme is suitable for male 7

offenders who have used the Internet to produce, distribute or download child abuse imagery. While the implementation of the i-sotp has attended to the potential problems of treating Internet offenders with non-specific sex offender treatment programmes, its efficacy in treating this category of offender has not yet been established. Therefore, in the current absence of published information about the effectiveness of treatment for Internet offenders, it is desirable to gather as much information as possible about those with a sexual interest in children who spend time online. Of course, paedophiles are not the only deviants who exploit the opportunities provided by the Internet to facilitate their interests, Wilson and Jones (2008, p. 108) comment that the Internet is perhaps the space that best affords and creates new opportunities for offending. The attraction the Internet holds for paedophiles is largely due to the opportunity it presents for hiding the stigmatised facets of their real life identities while at the same time allowing the creation of new identities that can be fantastic, fraudulent, exploitative or criminal (Jewkes & Sharp, 2003, p. 3). The space provided by the Internet can facilitate individuals exploration of aspects of their sexuality that must be obscured in real life due to the stigma attached. Cyberspace allows experimentation without censure for sexual deviants in a relatively safe, nonjudgemental and nameless environment, and the disembodied nature of online interaction means that people can act out their deviance without risking any threat to their real world status or identity. Durkin (1997) described the four main activities of online paedophiles. The first of these activities was trafficking child abuse imagery. In the decades preceding the Internet, dissemination of child abuse imagery was carefully managed through clandestine newsletters and together with the high financial costs incurred by collectors; the risks involved in obtaining it were substantial. However, the advent of online technologies has revolutionised the dynamics of child abuse image exchange not least in terms of accessibility of child abuse imagery. This factor is problematic as the widespread availability of child abuse imagery can promote trivialisation of this content and encourage further offending (Quayle, 2008). The second major function of the Internet for paedophilic offenders was to aid in locating child victims for contact abuse. While several authors (e.g. Fuselier, Durham & Wurtele, 2002; Calvert & Munsie-Benson, 1999; Berrick, 1988) have demonstrated the overestimation of stranger danger by the public, it remains true that the Internet has facilitated paedophiles in initiating contact with previously unknown children. In the United States, there has been an increase in online enticement and interstate travel for the purposes of child sexual abuse, and it is almost certainly the case that the Internet has played a part in the increase of this type of behaviour by facilitating the recruitment of victims (Durkin, 1997; USDOJ, 2010). This dynamic is also apparent in the UK: in its first year of operation, online grooming was the most frequently reported activity to the UK's Child Exploitation and Online Protection (CEOP) Centre, comprising 20% of all reported offences (CEOP, 2007). This trend has persisted in subsequent years, with grooming reports rising to 44% of all reported offending activity in the year 2008-2009 and remaining the most frequently 8

reported offending activity in 2009-2010; in this year grooming constituted 25% of all reports received by the centre (CEOP, 2009; 2010). Both of the remaining functions of the Internet for paedophiles relate to communication: with children and with each other. The Internet provides an environment where paedophiles can safely renegotiate their real identities and present themselves to children under assumed personas, e.g. as age-appropriate peers, in order to engage in sexually inappropriate chat with them. The virtual world also gives paedophiles the opportunity to engage with one another, through chat rooms, discussion forums and private email. This capability is particularly important for these offenders in that it facilitates the sharing of child abuse imagery and social cohesion (Taylor & Quayle, 2003). These four misuses of the Internet represent serious dangers for some children, and immediate positive reinforcement for offenders. The Internet has many significant advantages for deviants; it is impossible to censor and can be interactive in a way that the physical world is not for these groups. Going online opens up an arena for paedophiles to shape the way that they are presented to the world, which hitherto had been difficult to do and was most often overwhelmed or shouted down by society s conventional anti-paedophile stance. Popular depictions of sexual predators and online child sexual abuse are largely extreme and vilifying (Bury, 2010); the tabloid media in particular describe paedophiles as the most reviled of all offending groups. Yet the Internet can provide a stage from which paedophiles and deviants in general can regain control of how they are presented, rationalise attitudes and beliefs about their sexual orientation that are heavily marginalised in terrestrial contexts and redress the balance between themselves and the society in general. 9

3. Peer to Peer Networking 3.1 The scale and nature of child abuse media exchange on P2P systems Recent years have seen growing concerns about the role of P2P facilities in the sexual exploitation of children, notably as a medium for expeditious collection and distribution of child abuse media and with the potential to facilitate ready exposure of children to illicit and illegal sexual imagery (Dombroski et al, 2007; Congressional Committee on Government Reform, 2001; Greenfield, 2004; ECPAT, 2008). To a large extent, these concerns have had their impetus in a small but established body of evidence that points to an increasing problem in terms of the volume of child abuse media on P2P networks and the scale of attendant offending activity. We do not have definitive estimates of the number of individuals involved in the exchange of child abuse media on P2P networks (USDOJ, 2010). However, within the last decade a succession of reports have emerged from a range of sources, including government, law enforcement, industry and academia, collectively documenting a surge in the volume of child abuse media in circulation on P2P file sharing networks and an increase in the scale of associated offending activity (e.g. US General Accounting Office, 2003, US Federal Trade Commission, 2005; Baines, 2008; Choo et al., 2008; Fagundes, 2009; UNODC, 2010). Early reports from US law enforcement attest to the emergence of this problem in 2001, quickly succeeded by an exponential increase in the scale of child abuse media within P2P file sharing facilities. Between 2001 and 2002 Cybertipline, a hotline operated by the US National Center for Missing and Exploited Children, experienced a near-fivefold increase in the number of reports it received regarding the exchange of CAM on P2P networks from 156 reports in 2001 to 757 reports in 2002. By August of 2003, over 1,500 reports of such activity had been received (Pornography on the Internet, 2003). In 2009, the UK's Child Exploitation and Online Protection (CEOP) Centre (2009) documented a step-change in the way that offenders accessed child abuse media online it observed that the vast majority of CAM exchange reported to it in the preceding year took place on P2P networks. This trend continued in the year 2009-2010 when CEOP again identified P2P file sharing networks as the most popular facility for the distribution of child abuse media in this period 14% of all reports it received relating to the distribution of child abuse media cited P2P file sharing forums as the distribution method (CEOP, 2010). While data predicated on reports submitted to law enforcement offer valuable insights into the scale of the challenge P2P-mediated offences present to policing authorities, they are somewhat limited in that they only concern illegal materials and activities reported by law enforcement stakeholders or members of the public with sufficient awareness and inclination to act upon detection of such incidences. These estimates tell us little of the actual volume of child abuse media in circulation on P2P networks or the scale of associated offending activity. However, other approaches 10

have been taken in the analysis of P2P content and file sharing activity that provide some useful, preliminary indications of the scale of these issues within P2P facilities. Mehta, Best and Poon (2002) examined 507 pornographic video files sourced from the Gnutella network according to their categorisations, 3.7% of the examined video files exhibited paedophilic themes. While this figure constitutes a relatively small proportion of the erotic themes identified in the overall sample of pornographic videos, the authors claim that it represents both a sizeable and problematic number of illegal files being exchanged on the network given that millions of files were circulated through Gnutella during the study period. A rigorous image categorisation scheme was used in this study in order to ensure that imagery identified as paedophilic fell within the definitions of child pornography established within US and Canadian legal codes under this scheme, pedophilic imagery was identified as that which explicitly focused on the genital region of prepubertal children or which depicted prepubertal children engaged in sexual activity (see Mehta, 2001). Notwithstanding the authors' use of a conservative approach to the categorisation of paedophile content, it is not clear whether and to what extent hebephilic imagery (i.e. sexual images of pubertal children or those with apparent secondary sexual characteristics) featured in the sample of erotic videos. Therefore, it would appear that this analysis is somewhat restricted in terms of the insight it offers into the prevalence of illegal child abuse materials on the Gnutella network in that it excluded a distinct subset of child abuse media (featuring adolescents) that falls within many legal definitions of child pornography." In 2003, the US General Accounting Office together with the US Customs CyberSmuggling Center conducted an exploratory study of the scale of the problem of child abuse imagery in the Kazaa network its findings suggested that adult pornography and child abuse imagery were widely accessible on P2P networks. This study involved discrete analyses of pornographic imagery and filenames returned from searches using keywords known to be associated with child pornography (US General Accounting Office, 2003). Law enforcement officials from the Customs CyberCmuggling Center downloaded 312 image files identified in a search of the Kazaa network using three such keywords. Upon inspection of these files, 44% of this number were identified as illegal child pornography. The researchers conducted a series of further searches of the network using 12 keywords associated with illegal child abuse imagery and analysed over 1,200 returned titles and filenames in this case, it was determined that 42% of query hits were related to illegal child abuse imagery. While this has been identified as the most widely cited study of illegal child abuse imagery on P2P networks, having received significant media exposure, several criticisms have been levelled against aspects of its methodological approach (Steel, 2009). In the course of the filename analysis, files were identified as illegal child abuse imagery in the event that the title or filename contained one keyword indicating an underage subject and one with a sexual connotation (US General Accounting Office, 2003). However the rationale for the use of these categorisation criteria (e.g. consistency with file naming conventions used by P2P offenders) was not specified with the effect that these criteria appear somewhat arbitrary. Furthermore, no attempt was made to validate the findings of this categorisation 11

process by viewing the files in question and verifying their content. Finally Steel (2009) notes that the study only examined the supply of illegal child abuse imagery within P2P networks and did not examine user demand in this context. However a separate 2003 study did shed some light on scale of user demand for child abuse imagery in P2P networks. Palisade Systems conducted a relatively large study of user searches on the Gnutella network and collected 22 million search entries and requests over a three-week period. An analysis of 400,000 randomly selected user requests identified that 42% were specific to pornographic material, and 6% of requests were related to illegal images of children (Grabowski, 2003; Pornography on the Internet, 2003). In an effort to understand how ICT is utilised in the commission of offences involving child abuse media, Eneman (2006) examined the court and criminal investigation records of Swedish offenders convicted of such offences over a ten-year period. Eneman found that P2P networks were utilised by 42% of offenders, ranking them among the top three most popular methods used to facilitate child abuse media related offences. While other technologies (e.g. World Wide Web) were used by a greater proportion of the sample of convicted offenders, P2P offenders professed to have used these facilities to a far greater extent than other technologies given the opportunities P2P affords to access and distribute large volumes of files. In a similar vein, Wolak, Finkelhor and Mitchell (2011) conducted a large-scale, twowave longitudinal study in which they examined trends in technology use in the commission of child pornography offences drawing on a national sample of arrested child pornography possessors in the years 2000 and 2006. Their findings indicate a marked increase in offenders' use of P2P networks in the commission of child pornography offences over this six-year period in 2000, a mere 4% of the offender sample were P2P users; by 2006, 28% of offenders were found to have used P2P facilities in their engagement with child abuse imagery. One of the best available indicators of the scale of offending activity within P2P networks comes in the form of recent data derived from two major P2P monitoring operations led by US law enforcement. To date, the operational outcomes suggest that there has been a steady increase in levels of offending and attendant volumes of child abuse media in circulation on P2P networks. These operations, Fairplay instituted by the Wyoming Division of Criminal Investigations and RoundUp developed with federal support by the University of Massachusetts, identify the number of unique IP addresses involved in the sharing of child abuse media on a target P2P network and catalogue child abuse imagery exchanged over the system. According to the US Department of Justice, the operations have together provided the only known US data pertaining to the scale of offending activity over peer-to-peer networks. Since their inception (Fairplay in 2006 and RoundUp in 2009), over 20 million US and international IP addresses offering child abuse image and video files have been identified on monitored networks as well as Watchlists of 170,000 and 120,000 image files respectively (USDOJ, 2010). Notwithstanding the methodological caveats outlined above and the use of several less than rigorous approaches to the categorisation of illegal and illicit exchanges on 12

these networks, the available evidence supports the contention that vast quantities of child abuse imagery are now in circulation on P2P facilities. This factor, together with the apparent scale of attendant offending activity and the ease with which these materials may be accessed present a problem of non-trivial proportions (and a significant challenge) to those charged with combating illegal content and behaviour on P2P networks. While problems of scale are relatively well documented in the available literature, there is a dearth of formal knowledge on the nature and dynamics of child abuse image exchanges on P2P networks. Quayle and Latapy (2008) note that very little research has been conducted on user behaviour and file exchange on P2P systems in general and less still has been published about the form and extent of paedophilic exchanges in this context. Nonetheless, a handful of studies have been carried out in recent years which offer sparse, yet substantive first insights into the nature of child abuse media exchange in P2P networks and associated offending behaviours. One of the studies most relevant to this project is an attempt by Hughes, Walkerdine, Coulson and Gibson (2006) to establish whether or not sharing files of a pornographic nature was a behavioural norm on the Gnutella network. Gnutella is a large-scale, anonymous, unstructured and decentralized file-sharing protocol, similar to other peer-to-peer networks such as edonkey and Fastrack. Hughes et al. (2006) monitored the messages transmitted on the Gnutella network for a one month period in 2005 by connecting a modified peer to the network, which allowed the researchers to log all queries and query hits. This data was analysed to determine what type of material was being searched for by users, and what files were being subsequently shared across the network. The research was focused on explicitly illegal pornography, including child abuse, bestiality, rape and incest. Results of the research showed that an average of 1.6% of queries and 2.4% of query hits were related to illegal pornographic material. In a follow up study, Hughes et al. (2008) revisited this data to determine how much of this traffic related specifically to child sexual abuse and determined that approximately 1% of queries and 1.5% of query hits were child abuse-related. Although these are low percentages, they translate to a substantial number of requests and responses, given the conservative coding restrictions used by the researchers and the large volumes of material exchanged on the Gnutella network. Further results from the Hughes et al. (2006) study would seem to support the existence of a deviant subcommunity of Gnutella users, as 57% of those sending query hits for illegal sexual material did not share any other type of material such as music, photography or text on the network. This indicates that for 57% of the people who share illegal pornographic material, their sole purpose of using peer-to-peer networks is to search for and disseminate it. These insights were corroborated by the recent findings of one of the most comprehensive studies of child abuse image exchanges on P2P systems to date. In a large-scale analysis of P2P traffic on the Gnutella network, Steel (2009) identified that while a large proportion of this traffic was devoted to child abuse imagery, this material did not predominate content sought or exchanged on the network - here, 1% of all queries and 1.45% of all query hits related to child abuse image material, 13

consistent with the findings of the Hughes et al. (2008) study. Steel's (2009) study also furnished evidence of the operation of a distinct, deviant subcommunity on the Gnutella network. Like Hughes et al. (2006), Steel found that the vast majority of those of those searching for child abuse imagery used the Gnutella network to search for pornographic material only. A mere 5% of those who searched for child abuse imagery also searched for other non-pornographic materials such as music. Moreover, an examination of the query terms used by those searching for child abuse imagery suggested that this group demonstrated a sophisticated use of terminology particular to this subculture (Steel, 2009). One of the most striking results of the Steel study was that the most prevalent user query and top two most prevalent filenames returned as query hits on the Gnutella network were child pornography related. In a methodological departure from previous research, Steel proceed to mine user queries and query hits in order to investigate aspects of demand and supply in the context of child abuse media exchanges on the network, thereby offering a rounded insight into the nature of child abuse media exchanges and attendant user behaviours. For example, Steel observed that child pornographers tend to search for broader categories of this material using a smaller number of search terms when compared to other users who use longer search strings to source non-pornographic material such as songs or movies. This would suggest that those searching for illegal child abuse imagery maintain a preference for higher recall vs. precision and cast the search net wide when trawling P2P networks for child abuse material. Consequently, those distributing illegal child abuse image files on the network tended to use a higher number of file descriptors than the average user, in order to maximise the number of individuals who can find their files. Recent research by Wolak, Finkelhor and Mitchell (2011) is particularly useful in that they profiled child pornography possessors arrested in 2006 who used P2P networks in their engagement with CAM. Their analysis focused less on dynamics of illegal child abuse image exchanges in P2P networks and more so on the personal characteristics and image collections of those who use these networks in their engagement with CAI. Wolak et al. determined that there are marked differences in the type of child abuse imagery possessed by offenders who used P2P networks this cohort were more likely to possess images that depict children younger than three years of age, sexual penetration and violence. 3.2 Paraphilic use of P2P facilities Albeit that the knowledge base in relation to the nature of dynamics of P2P user behaviour is extremely limited (Makosiej et al, 2004) but it is clear that those with paedophilic, hebephilic and other problematic paraphilic predilections utilise these networks to seek out and distribute illegal images of children(e.g. Mehta et al 2002). In their exploration of how Gnutella network was used to distribute pornographic material, Mehta et al. (2002) monitored Gnutellameter, a website that captures data exchanged in Gnutella and generates summaries of keywords most commonly entered by its users. The authors identified pornographic imagery as one of the most commonly sought materials on the network with user searches displaying a strong 14

emphasis on pedophile and hebephile content. In the Steel (2009) study, the median age featured in the searches of users seeking out child abuse imagery was 13 years. This finding would suggest that those with hebephilic and pedophilic sexual interests use these networks to seek images of children of an age that corresponds with their particular interest. However, the majority (i.e. 76%) of those who engaged in agespecific searches of the network sought child abuse imagery featuring children between 11 and 16 years of age. This indicates that those of a hebephilic disposition most used this P2P network to seek out imagery that appealed specifically to their sexual preferences. Steel (2009) documented strong evidence that P2P networks are used as a mechanism to access and distribute materials appeal to those with problematic paraphilic predilections. A large overlap was apparent between violent themes and child abuse imagery in terms of the material offered on the network. Furthermore, significant overlaps between terms indicative of bestiality and child abuse imagery were observed in user search patterns - an analysis of queries for CAM on the Gnutella network determined that the terms Zoofila was most strongly associated with child abuse image search terms. The MAPAP project led by Mathieu Latapy explored material offered on the edonkey network and revealed a broad range of age-specific material and while a majority involved teenage children, indicating hebephilic interest, a substantial number of files exchanged contained images of very young children. Hammond et al., (2009) in their analysis of the MAPAP data examined paraphilic searches executed on P2P system over a one-week period (i.e. searches concerned with illegal or non-consensual sexual activity, such as paedophilia, hebephilia, bestiality, etc.). The largest proportion of problematic paraphilic searches on P2P networks were related to hebephilic content. Their analysis suggested that there is forcible evidence of quite discrete paraphilic sexual interests to be found in user search behaviours and returned filenames. 3.3 P2P: Challenges to Regulation and Enforcement The decentralized nature of peer-to-peer file sharing, open-access policies and its rate of growth makes its content extremely difficult to control (Parameswaran, Susarla and Whinston, 2001; Westlake et al 2011; Nielssen et al, 2011). In networks such as edonkey and Gnutella, there is no central server that can be traced and held accountable for any illegal content being shared, making the dissemination of child abuse imagery almost impossible to police. These inherent features of P2P systems coupled with general uncertainty around questions of how or whether P2P content should be managed has resulted in a situation where deviant subcommunities have flourished within these forums. For example, despite the expertise and success of the UK's Internet Watch Foundation in combating the problem of web-hosted child abuse imagery, they have no role in policing peer-to-peer traffic (IWF, 2009). In an early congressional testimony highlighting the growing problem of child abuse media exchange on P2P systems and attendant challenges to enforcement, the 15

National Centre for Missing and Exploited Children outlined several key features of P2P offending which simultaneously confound the interception of child abuse image exchange by law enforcement and facilitate ongoing offending behaviour. Firstly, there is no central database of files, organised network or centrally-held logs on P2P systems to record file sharing activity and support detection of problematic users. Similarly, most popular file sharing programmes are free so there is no subscriber information available to help determine a user's true identity. Furthermore, P2P systems are highly dynamic insofar as their content and users change rapidly, requiring investigators to be online in real-time or at the moment the offence occurs in order to make an expeditious interception. Finally, individuals from all over the world use P2P programmes so inter-jurisdictional challenges to detection and enforcement inevitably arise (Pornography on the Internet, 2003). These factors have cumulated in a series of considerable challenges to law enforcement, as documented in a recent testimony to U.S. Congress by Flint Waters, a Special Agent at Wyoming's Attorney General Division of Criminal Investigation. Waters' (2007) testimony traces a steady and significant growth in the number of P2P users trafficking in child abuse imagery. Notwithstanding law enforcement efforts to combat the exploitation of P2P networks by online sexual offenders over the preceding three-year period, Waters described a relentless increase in the scale of child sexual offending activity in P2P networks over a seven month period in 2007 almost 194,000 unique computers in the US were involved in the trafficking of child sexual abuse materials. According to this testimony, the impact of this growth on law enforcement's ability to respond to the problem of child sexual offending on P2P networks has been catastrophic as the magnitude of this problem has overwhelmed US law enforcement's forensic and investigative infrastructure. In the face of these challenges, several initiatives have been undertaken in an effort to address problems of illegal content and user behaviour in P2P systems. To date, a number of P2P vendors have entered alliances to combat the problem of sharing child abuse imagery (Borland, 2004). This initiative, launched by the Distributed Computing Industry Association is aimed at educating the public on the dangers of online child abuse and helping Internet users to report any suspect material they may come across. In 2004, the DCIA launched a new website entitled P2Ppatrol.com (Peer-to-Peer Parents and Teens React Online), which amongst other services, created a system of warning pop-up messages when a P2P user enters a search term known to be associated with child abuse imagery. However, by no means are all P2P networks part of such a coalition (Schell, Martin, Hung & Rueda, 2007). Cholez, Chrisment and Festor (2009) offer a solution to paedophile activity on the KAD network, which they call HAMACK (Honeynet Architecture against Malicious Content in KAD). The authors showed that placing 20 honeypeers closer than any other peer to a given file or search word allowed the researchers to control it. By attracting searches for, and responses to paedophile content, HAMACK can assess and control the paedophile behaviour from the initial query through to the final file download. In recent years, international law enforcement have widely adopted and deployed a series of P2P monitoring 16

mechanisms which identify users sharing child abuse media files on a target P2P protocol (e.g. Gnutella or BitTorrent). These monitors, e.g. RoundUp (Liberatore et al., 2010), Child Protection System/Peer Precision (Waters, 2007) and EspiaMule (Fagundes, 2009) have enjoyed some success in the context of operational deployment by law enforcement. However, Schell et al. (2007) warn that each P2P protocol has different methods of uploading and downloading material from the Internet, and that a detailed knowledge of such protocols is required before any P2P network is targeted for the removal of illegal content. As each network requires a different approach for censorship, any solution will have restricted applicability (e.g. being limited to one network) and will quickly become obsolete as offenders find new methods of distributing their material online. Schell et al. (2007) further noted that P2P systems are rapidly changing to include features of anonymity and strong encryption capability, and this will help them to potentially become a primary point of distribution for illegal abuse imagery in the near future. In the year that followed, CEOP (2008) documented an apparent wholesale move to the use of P2P technologies for the distribution of child abuse media; particularly to private networks and closed P2P environments which, unlike public P2P facilities, are resistant to law enforcement oversight and allow offenders to operate in relative anonymity. This factor, combined with functionalities that enable offenders to create and join groups based on a shared abusive interest, to chat and share vast quantities of child abuse imagery has resulted in a situation where the imagery shared within these forums is newer, more exclusive and sometimes made to order. Schell et al. (2007) observe that current methods for the removal of illegal material online are resource, and manpower-intensive, and thus are inefficient and ineffective long-term solutions to the vast problem of online sexual offending. Many convictions for internet sexual offences are the result of manual searches for child abuse imagery, undercover operations in online forums and removing illegal content following tip-offs from the public, or Internet Service Providers. While each approach enjoys certain success in its own right, scalable interventions which reduce resourceintensiveness will be critical going forward if the magnitude of online sexual offending is to be tackled in any meaningful way. Given the documented scale of this problem within P2P networks, these are key considerations that must be considered in the design of future P2P interventions. Liberatore, Erdely, Kerle, Levine and Shields (2010) observe that a primary goal of P2P investigations is to catch child abusers and help children that are being sexually victimised, rather than simply detecting and confiscating images in the context of possession offences. However noble, this objective is difficult to achieve in the policing of abstract P2P exchanges it is difficult for law enforcement to infer motivation or offence outcome from those behaviours that may be observed on P2P facilities such as file downloading and distribution. Moreover, it is sometimes the case that child abuse media files are monitored in isolation from other information 17

which can lead to false positives (e.g. the targeting of users who inadvertently download or distribute pornographic material). To date, the available interventions have not enabled law enforcement to address the scale of the P2P policing challenge, resourcing issues or to effectively monitor and identify high-value P2P offending targets. While there is no silver bullet, it is abundantly clear that a robust empirical knowledge base needs to be developed and maintained in relation to problematic paraphilic use of P2P facilities in order to address these requirements and help weight policing decisions toward the pursuit high-value targets and optimal deployment of police resources. This requirement is all the more urgent in the face of recent evidence that points to the emergence of private P2P systems as policing challenge that is considerable and growing, yet little understood. 18

4. Conclusions The examples above demonstrate the attempts being made in research to tackle the problem of sharing illegal child abuse imagery in P2P networks and highlight some of the obstacles to the effective policing of P2P networks. The icop project aims to add to this growing body of research and help to further efforts in policing P2P systems. This review of a sparse and rather disparate literature highlights the difficulty of profiling the typical P2P sex offender. Sexual offenders are heterogeneous in their motivations, behaviours and targets of interest. It is clear that the kinds of offenders of interest here do not fall neatly into the simple and static diagnostic classifications offered by the DSM or ICD. However, a number of themes do appear to be emerging as the research literature grows. Firstly, it is apparent that internet and P2P facilities serve as maintenance systems for deviant sexual interest, providing as they do masturbatory sources of reinforcement as well as a community of like minded others to enable validation and normalization of problematic interests. Of interest is the suggestion that P2P offenders seem to manifest more focused and extreme interests than other CAI users (Wolak et al, 2011). This is consistent with a more obsessive and targeted manifestation of deviance identified by Steel (2009) and suggested by the discrete paraphilic typologies identified by Hammond et al (2009). Whether, this interpretation of the data is born out in the long run is unclear but a plausible explanatory mechanism is that the P2P process, requiring the user to enter specific search terms produces a narrowing of the domain of interest. Masturbatory conditioning reinforces these choices funnelling the deviant interest into a highly specific and extreme form. In order to explore these possibilities further a number of potential strategies present themselves. Case studies may prove useful although these would necessitate a retrospective approach. Alternatively it may be possible to utilise longitudinal data in order to map idiosyncrasies featured in individual offending behaviours over time. Specifically we would wish to see whether a narrowing in search activity does indeed occur. The tentative taxonometric model proposed by Hammond et al (2009) may serve as a basis for such work. Such an approach should be consistent with Steel's (2009) recommendation that an analysis of the P2P behaviours of those seeking child abuse imagery as a function of time would be of interest. The value of such explorations would be primarily to mental health professionals for, while they may have limited application for apprehension, they do offer potential insights into the treatment and management of such offenders once they are caught. Nevertheless, a greater understanding of offending behaviour would clearly have longer term advantages to law enforcement. Wilson and Jones (2008), among others, showed that P2P networks operate to develop and refine deviant interests and this may serve to allow the emergence of 19

subcultures and communities that have a validating effect on the lone offender. Another avenue for research is to explore the group dynamics of these communities in order to help future targeting and intervention. This might involve the monitoring of new opportunities for proliferation of problematic paraphilic internet use e.g. private P2P networks. Steel (2009) argues that the dynamics of supply and demand on P2P networks need to be investigated as discrete but related facets of online offending in order to understand underlying factors such as offence motivation and behavioural dynamics of P2P offending. Determining the etiology and progression of these behaviours will help to support targeted interventions and narrow focus on offenders who present a real and ongoing physical risk to children. Quite apart from their value as research tools and methodologies in their own right these advances should also help to develop assessment and treatment strategies/police-led interventions such as covert internet investigation and monitoring of P2P networks. One of the great values of identifying and isolating paedophilic paraphilias in context of P2P systems resides in the fact that paedophilia is associated with recidivism and resistance to treatment. Sexual recidivism appears to be associated with two broad factors: deviant sexual interest and antisocial orientation (Hanson & Morton Bourgon 2005). Deviant sexual interest is indicated through an enduring attraction to sexual acts that are illegal, highly unusual or extreme. The work of Wolak et al (2011) indicates that P2P offenders appear to manifest greater extremes in their interests. Perhaps for the reasons mentioned above. The research reviewed here does have inherent limitations most notably the fact that it is limited to public P2P systems which may be readily surveilled. Unfortunately it provides only a secondary basis for understanding into file sharing and other sexually-deviant/paraphilic behaviours displayed in private P2P systems. These have become a significant challenge for law enforcement and so far the best we can do is try to generalize from our understanding of public services. At present even this understanding is sparse but ongoing projects such as icop aim to build upon current knowledge in order to further the work of law enforcement in the protection of children from technology assisted abuse. 20

5. Bibliography Adam, A. (2002). Cyberstalking and Internet pornography: Gender and the gaze. Ethics and Information Technology 4(2): 133-142. American Psychiatric Association. (2000) Diagnostic and Statistical Manual of Mental Disorders. 4th ed. Washington, DC: American Psychiatric Association; 2000. text revision (DSM-IV-TR). Baines, V. (2008). Online Child Sexual Abuse - The Law Enforcement Response. World Congress III against the Sexual Exploitation of Children and Adolescents. P. J. Doek. Rio de Janeiro. Basbaum, J. P. (2010). Inequitable sentencing for possession of child pornography: A failure to distinguish voyeurs from pederasts. Hastings LJ 61: 1281-1307. Bates, A. and Metcalf, C. A psychometric comparison of internet and non-internet sex offenders from a community treatment sample. Journal of Sexual Aggression, 13 (1), 2007, 11-20. Beech, A. R. (1998). A psychometric typology of child abusers. International Journal of Offender Therapy and Comparative Criminology, 42, 319-339. Beech, A. R., Elliott, I. (2008). The Internet and child sexual offending: A criminological review. Aggression and violent behavior 13(3): 216-228. Blanchard, G. T. (1995). The difficult connection: The therapeutic relationship in sex offender treatment. Brandon, VT: Safer Society Press. Blanchard, R., Lykins, A. D., Wherrett, D., Kuban, M. E., Cantor, J. M., Blak, T., Dickey, R., & Klassen, P. E. (2009). Pedophilia, hebephilia, and the DSM-V. Archives of Sexual Behavior, 38, 335 350. Blaney, P.H.; Millon, T. (2009). Oxford Textbook of Psychopathology (Oxford Series in Clinical Psychology) (2nd ed.). Oxford : Oxford University Press: Bryman, A. (2008). Social Research Methods. Oxford, Oxford University Press. Calvert J. F., Jr., & Munsie-Benson, M. (1999). Public opinion and knowledge about childhood sexual abuse in a rural community. Child Abuse & Neglect, 23(7), 671-682. Child Exploitation and Online Protection Centre (2009) CEOP Annual Review 2008-2009. ceop.police.uk/documents/ceop_annualreview_08-09.pdf Child Exploitation and Online Protection Centre (2010) CEOP Annual Review 2009-2010. ceop.police.uk/documents/ceop_annualreview_09-10.pdf Cholez, T., Chrisment, I, & Festor, O. (2009) Monitoring and Controlling Content Access in KAD, in International Conference on Communications.: IEEE, 05. http://hal.inria.fr/inria-00490347/en/ Choo, K. K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in organized crime 11(3): 270-295. Cimbolic, P., Wise, R. A., Rossetti, S., & Safer, M. (1999). Development of a combined objective ephebophile scale. Sexual Addiction & Compulsivity, 6, 253 266. 21

Coles, J. and N. Mudaly (2010). Staying safe: strategies for qualitative child abuse researchers. Child Abuse Review 19(1): 56-69. Cooper, A., Delmonico, D. & Burg, R. (2000). Cybersex users, abusers, and compulsives: New findings and implications. In A. Cooper (Ed.),Cybersex : The Dark Side of the Force, pp. 5-29. Philadelphia : Brunner : Routledge. Dombrowski, S. C., K. L. Gischlar, et al. (2007). Safeguarding young people from cyber pornography and cyber sexual predation: A major dilemma of the Internet. Child Abuse Review 16(3): 153-170. Durkin, K., Forsyth, C. J., & Quinn, J. F. (2006). Pathological Internet communities: A new direction for sexual deviance research in a post modern era. Sociological Spectrum, 26(6), 595 606. Durkin, K. F. (1997). Misuse of the internet by pedophiles: Implications for law enforcement and probation practice. Federal Probation, 61(3), 14-19. ECPAT (2008) ECPAT International Annual Report 2008-2008. Available at http://ecpat.net/ei/publications/annual_reports/ecpat_annual_report2007-2008.pdf Eneman, M. (2006) A critical study of ISP filtering of child pornography. Proceedings of the 14th European Conference on Information Systems, Gothenburg, Sweden http://is2.lse.ac.uk/asp/aspecis/20060154.pdf Fagundes, P. (2009) Fighting Internet Child Pornography The Brazilian Experience The Police Chief. September. www.policechiefmagazine.org/magazine/ Fuselier, D.A., Durham, R.L., & Wurtele, S.K. ( 2002). The child sexual abuser: Perceptions of college students and professionals. Sexual Abuse: A Journal of Research and Treatment, 14(3), 271-280. Glasser, M. (1998) On violence: a preliminary communication. International Journal of Psycho-Analysis, 79, 887 902. Göran-Svedin, C. (2010).Research evidence in to behavioural patterns which lead to becoming a victim of sexual abuse. In M. Ainsaar & L. Lööf (Eds.) Online behaviour related to child sexual abuse. The Robert Project. Council of the Baltic Sea States. Grabowski, S. (2003). "The Real Cost of Free Programs such as Instant Messaging and Peer-to-Peer File Sharing Applications." From http://www.sans.org/reading_room/whitepapers/protocols/real-cost-freeprograms-instant-messaging-peer-to-peer-file-sharing-applications_1155. Greenfield, P. M. (2004). Inadvertent exposure to pornography on the Internet: Implications of peer-to-peer file-sharing networks for child development and families. Journal of Applied Developmental Psychology 25(6): 741-750. Hall, R. C., & Hall, R. C. (2007). A Profile of Pedophilia: Definitions, Characteristics of Offenders, Recidivism, Treatment Outcomes, and Forensic Issues. Mayo Clinic Proceedings, 82 (4), 457-471. Hammond, S.M., Quayle, E. & Conlon A. (2007). Handbook for assessment and treatment of sex offenders. Irish Probation Service. Dublin. Hammond, S.M., Quayle, E. Kirakowski, J., O'Halloran, E. & Wynne, F. (2009) An 22

Examination of Problematic Paraphilic use of Peer to Peer Facilities. Measurement and Analysis of P2P Activity Against Paedophile Content project. http://antipaedo.lip6.fr Hanson, R.K., & Morton-Bourgon, K. (2005). The characteristics of persistent sexual offenders: A meta-analysis of recidivism studies. Journal of Consulting and Clinical Psychology, 73, 1154-1163. Hughes, D., Rayson, P., Walkerdine, J., Lee, K., Greenwood, P., Rashid, A., May- Chahal, C., Brennan, M. (2008) Supporting law enforcement in digital communities through natural language analysis. In proceedings of the 2nd International Workshop on Computational Forensics (IWCF 2008), Washington DC, USA, August 7-8, 2008. Lecture Notes in Computer Science 5158, pp. 122-134. http://dx.doi.org/10.1007/978-3-540-85303-9_12 Hughes, D., Walkerdine, J., Coulson, G. and Gibson, S. (2006) Peer-to-Peer: Is deviant behaviour the norm on P2P file-sharing networks? IEE Distributed Systems Online. 7 (2), 1-11. Internet Watch Foundation (2007). 2006 Annual Report. Available online from: http://www.iwf.org.uk/media/news.196.htm Jacobs, K. (2004). Pornography in small places and other spaces. Cultural Studies 160; 18(1): 67-83. Jewkes, Y. and K. Sharp (2003) `Crime, Deviance and the Disembodied Self: Transcending the Dangers of Corporeality', in Y. Jewkes (ed.) Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willan Publishing. Karagiannis, T., Broido, A, Brownlee, N., Claffy, K.C., Faloutsos, M. (2004) Is P2P dying or just hiding?, GLOBECOM 2004 Conference, IEEE Computer Society Press, Dallas, Texas, Krone T, (2004) A typology of online child pornography offending Trends and Issues in Crime and Criminal Justice (279) Australian Institute of Criminology http://www.aic.gov.au/publications/tandi2/tandi279.html Krueger, R. B., Kaplan, M.S. et al. (2009). Sexual and other axis I diagnoses of 60 males arrested for crimes against children involving the Internet. CNS spectrums 14(11): 623-631. Lanning K.V. (2010).Child Molesters: A Behavioural Analysis. Report No. NC70. US Department of Justice. www.missingkids.com/en_us/publications/nc70.pdf Liberatore, M., Erdely, R., Kerle, T., Levine, B. & Shields, C. (2010) Forensic Investigation of Peer-to-Peer File Sharing Networks. Proceedings of the DFRWS Annual Digital Forensics Research Conference. Portland OR Liberatore, M., Levine, B, & Shields C.. (2010). Strengthening forensic investigations of child pornography on P2P networks, Proceedings of the ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT). Philadelphia, PA Makosiej, P., G. Sakaryan, et al. (2004). Measurement study of shared content and user request structure in peer-to-peer Gnutella network, Citeseer. Mehta, M. D. (2001). Pornography in Usenet: A Study of 9,800 Randomly Selected Images. CyberPsychology & Behavior. 4(6): 695-703. 23

Mehta, M. D., Best, D. & Poon, N. (2002). Peer-to-Peer Sharing on the Internet: An analysis of how gnutella networks are used to distribute pornographic material. Canadian Journal of Law and Technology 1(1). Middleton, D., Elliott, I. A., Mandeville-Norden, R. & A. R. Beech (2006) An investigation into the applicability of the Ward and Siegert Pathways Model of child sexual abuse with Internet offenders. Psychology, Crime & Law, 12(6), 589-603. National Probation Service (2006) Internet Sex Offender Treatment Programme (i- SOTP). Ministry of Justice: London. http://www.ynyprobation.co.uk/files/i- SOTP.pdf Nielssen, O., O'Dea, J. et al. (2011). Child pornography offenders detected by surveillance of the Internet and by other methods. Criminal Behaviour and Mental Health 21(3): 215-224. O Brien, M.D. and Webster, S.D. The construction and preliminary validation of the Internet Behaviours and Attitudes Questionnaire (IBAQ). Sex Abuse, 19, 2007, 237-256. Parameswaran, M, Susarla, A. &. Whinston, A.B. (2001) P2P Networking: An Information Sharing Alternative, IEEE Computer, Vol. 34 (7), pp.31-37 Quayle, E. (2008). Internet offending. In D. R. Laws & W. O Donohue (Eds.), Sexual deviance (pp. 439-458). New York, NY: Guilford. Quayle E, Erooga M, Wright L, Taylor M, Harbinson D. (2006) Only Pictures? Therapeutic work with Internet sex offenders. Lyme Regis: Russell House Publishing Ltd. Quayle E., & Latapy, M. (2008) Current situation regarding our knowledge of paedophile activity in P2P networks. MAPAP Safer Internet Plus (ec.europa.eu/saferinternet) Schaefer G.A, Mundt I.A, Feelgood S, Hupp E, Neutze J, Ahlers C.J, Goecker D, Beier K.M. (2010) Potential and Dunkelfeld Offenders: Two Neglected Target Groups for Prevention of Child Sexual Abuse. International Journal of Law and Psychiatry. 33 (5), 154-163 Schell, B. H., Martin, M.V., Hung, P. & Rueda, L. (2007). Cyber child pornography: A review paper of the social and legal issues and remedies--and a proposed technological solution. Aggression and violent behavior 12(1): 45-63. Seto, M. C. (2009) Pedophilia. Annual Review of Clinical Psychology, 5, 391-407. Seto M. C., Cantor J. M. & R. Blanchard (2006) Child pornography offenses are a valid diagnostic indicator of pedophilia. Journal of Abnormal Psychology, 115, 610-615. Shapira, N. A., Lessig, M.C. et al. (2003). Problematic internet use: proposed classification and diagnostic criteria. Depression and Anxiety 17(4): 207-216. Steel, C. (2009). Child pornography in peer-to-peer networks. Child Abuse & Neglect 33(8): 560-568. Taylor, M. & Quayle, E. (2003). Child Pornography: An Internet Crime. Hove, UK: Brunner-Routledge. 24

Taylor, M. and E. Quayle (2006). The Internet and Abuse Images of Children: Search, Pre-criminal Situations and Opportunity. Crime prevention studies 19: 169. UNODC (2010) Twelfth United Nations Congress on Crime Prevention and Criminal Justice. Salvador, Brazil. US Department of Justice, (2010). The national strategy for child exploitation prevention and interdiction - A report to congress. Washington DC, US Federal Trade Commission (2005) Peer-to-Peer File-Sharing Technology:Consumer Protectionand Competition Issues. Staff Report. ftc.gov/reports/p2p05/050623p2prpt.pdf US General Accounting Office (2003) File-Sharing Programs: Peer-to-Peer Networks Provide Ready Access to Child Pornography. GAO-03-351, Feb 20, 2003 Virtual Global Taskforce (2011). P2P networks and child sexual abuse material, from http://www.virtualglobaltaskforce.com/2011/p2p-networks-and-childsexual-abuse-material/. Ward, T., Louden, K., Hudson, S. M., & Marshall, W. L. (1995). A descriptive model of the offense chain for child molesters. Journal of Interpersonal Violence, 10, 452-472. Ward, T. and Siegert, R.J. Toward a comprehensive theory of child sexual abuse: A theory knitting perspective. Psychology, Crime and Law, 8, 2002, 319-351. Waters, F. (2007). Challenges and Solutions for Protecting our Children from Violence and Exploitation in the 21st Century. Testimony to United States Senate Committee On The Judiciary Subcommittee On Crime And Drugs. judiciary.senate.gov/pdf/08-04-16waterstestimony.pdf Wilson, D. & Jones, T. (2008). In my own world : A case study of a paedophile s thinking and doing and his use of the Internet. The Howard Journal, 47 (2), 107-120. Westlake, B. G., Bouchard, M. et al. (2011). Finding the Key Players in Online Child Exploitation Networks. Policy & Internet 3(2): 6. Wolak, J., Finkelhor, D. & Mitchell, K.. (2011). Child pornography possessors: Trends in offender and case characteristics. Sexual Abuse: A Journal of Research and Treatment 23(1): 22. Wortley, R. K., Smallbone, S. et al. (2006). Child pornography on the internet, US Dept. of Justice, Office of Community Oriented Policing Services. 25