Profiling the Child Molester



Similar documents
Boundaries: Protecting Children, Young People and Yourself from Technology Dangers

Child Molesters: A Behavioral Analysis

Child Exploitation Expanded Course Outline and Hourly Distribution For Two-Day, 16 Hour Course

D R A F T SENATE/HOUSE FILE BY (PROPOSED ATTORNEY GENERAL BILL)

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Caution: This chapter will focus on insight into the behavioral

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

ONLINE PREDATORS & PREDATORS

Oregon Sex Offender Assessment Scale Jackson County, Oregon. Sex Offender Assessment Attachment 1. Negative Scale (Increases Risk)

The Internet: A Breeding Ground for Online Pedophiles. An In Depth Analysis of Crimes Against Children Via the Internet. By: Robert B.

Child Safety on the Information Highway.

APPENDIX A GLOSSARY OF RELEVANT TERMINOLOGY

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

STUDENTS Children s Internet Protection Act, Pub. Law , codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250

RIVERVIEW SCHOOL DISTRICT

GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION

IN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney,

Long-term Impact Evaluation of Specialized Sex Offender Probation Programs In Lake, DuPage and Winnebago Counties

SOUTH CAROLINA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

GEORGIA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group

Forum on Public Policy

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

But Your Honor, I Didn t Possess Those Pictures; My Computer Did.

Affirmative Action Presentation

Sex Offenders in Maryland and the Impact of the Federal Sex Offender Registration and Notification Act

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY

Explanations given by child pornography offenders for their crimes

KENTUCKY STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases

PERSONNEL - Certified and Noncertified

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

How To Use The Blog Safely And Responsibly

1801 North Main Street Phone: Mitchell, SD Office Hours: M-F 8am-5pm Fax:

Online Safety for Middle and High School

HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention

Guidelines Applicability Guidelines Statements Guidelines Administration Management Responsibility... 4

Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries

S 0550 S T A T E O F R H O D E I S L A N D

Outsmarting On-line Predators. Christina Kilbourne

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

THE CIVIL RIGHTS RESTORATION PROCESS

Internet usage Policy

North Clackamas School District 12

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

An Act To Implement the Recommendations of the Human Trafficking Task Force Be it enacted by the People of the State of Maine as follows: PART A

COMPLAINT. AARON SPIVACK, being duly sworn, deposes and states. that he is a Special Agent with the Federal Bureau of

Select Florida Mandatory Minimum Laws

The Top Ten Of Public Computers And Their Perpetuation

SUMMARY OF PUBLIC LAW THE CAN-SPAM ACT OF 2003

Prepared by Daniel C. Préfontaine, Q.C., Director and Chief Executive Officer

If you have issues viewing or accessing this file contact us at NCJRS.gov.

SLIP OPINION NO OHIO-2340 DISCIPLINARY COUNSEL

Virginia Code Sections: Sexual Offenses

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

Online Safety How to Protect Yourself and Your Family

Online grooming: What changes with the new legislation?

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

Juvenile Sexual Offenders: An. Analytical View of Effective. Programming

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; (COLLECTIVELY BROADVOX )

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

A Safety Net for the Internet: Protecting Our Children by Daniel Armagh

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

Red Cloud Community Schools Acceptable Use and Internet Safety Policy

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender

How To Protect Children From Abuse

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY

GENERAL TERMS AND CONDITIONS OF SERVICE

PUBLIC LAW OCT. 30, 1998 PROTECTION OF CHILDREN FROM SEXUAL PREDATORS

YOUR AGENCY EMS Computer, Software, Network, and Internet Policy with Appropriateness of Use Guidelines

THE NATIONAL JUDICIAL COLLEGE

Bulletin. Federal Prosecution of Child Sex Exploitation Offenders, Bureau of Justice Statistics

Brian E. Oliver th Avenue SE, Unit 2 Minneapolis, MN (612) (cell) Personal E- Mail: brianeoliver@sbcglobal.

MINNETONKA PUBLIC SCHOOLS

FKCC AUP/LOCAL AUTHORITY

Public Law th Congress An Act

Acceptable Use Policy of UNWIRED Ltd.

RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT , INTERNET AND COMPUTER USE

VIRTUAL CHILD PORNOGRAPHY ON THE INTERNET: A VIRTUAL VICTIM?

Children on Campus In WVU Programs

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

2014 Chelsea s Law Impact Report A 12-Month Review of San Diego, Los Angeles, Orange, Riverside, and Sacramento Counties

State of North Carolina Department of Correction Division of Prisons

Beaumont Public Library Computer Usage Policies

Compiled by the Salt Lake County Children s Justice Center

Crimes Related to Sex Offender Registration

Child Abuse Prevention Toolkit

Terms and conditions of use

SEALING OF RECORDS. Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE. DAVID ROGER District Attorney

The webcast will begin shortly. Please stand by.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

2015 ANALYSIS AND RECOMMENDATIONS MONTANA

INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM

Current situation regarding our knowledge of paedophile activity in P2P networks

Transcription:

Profiling the Child Molester Presented by Robert Hugh Farley MS Farley International Consultant in Crimes against Children to the VIRTUS Program 10 South LaSalle Street Suite 1420 Chicago, IL USA 60603 Tel: 847-236-9134 Email: farleyintl@hotmail.com Web page: www.farleyintl.com 10 th Annual Conference for VIRTUS Program Coordinators Chicago, Illinois August 30, 2013

FBI WARNING 10 th Chicago Conference Profiling the Child Molester Federal law and international agreements provide severe penalties for the unauthorized recording, reproduction, distribution or exhibition of copyrighted materials. Criminal copyright infringement is investigated by the FBI and may constitute a felony with a maximum penalty of up to five years in prison and/or a $250,000.00 fine. Copyright 2010 2013 Farley international and Robert Hugh Farley MS All rights are reserved. Displayed for this sole Power Point presentation purposes only. Unauthorized recording or duplication is a violation of applicable laws. Download your copy of the seminar handout materials online at www.virtus.org Commanding Officer (Retired) Child Exploitation Unit Chicago, IL USA Public Perception of Child Sexual Abuse Investigations The stranger Child Sexual Abuse Crimes Child Sexual Abuse Within the family Child Sexual Exploitation Primarily outside the family Multiple victims Child pornography www.farleyintl.com 1

In order to successfully protect young people from child sexual abuse and child sexual exploitation you must become one with the child molester. You must not hate him or her, for in anger is carelessness and a lack of thoroughness. You must get inside the molester's mind. When you are one you can control the molester Child Sexual Abuse Crimes Opportunity Desire Children are perfect victims Federal Child Exploitation Strike Force Chicago, IL Pedophilia Prior to 1997 Protecting sexually abused children by: Conducting proactive undercover investigations Utilizing the U.S. Mail and newspaper or magazine ads Targeting and arresting child molesters who otherwise would not be identified Talking About the Child Molester DSM - V Pedophile Paraphilias Diagnostic system to bill insurance companies www.farleyintl.com 2

Paraphilia A paraphilia is a condition in which a person's sexual arousal and gratification depend on fantasizing about and engaging in sexual behavior that is atypical and extreme Defined by. Zoophilia Bestiality web-cam view Pedophilia DSM V FBI Profile for the Child Molester This Paraphilia is characterized by sexual activity with a child, usually age 13 or younger, or in the case of an adolescent, a child 5 years younger than the pedophile. 302.2 Pedophilia Situational Molester Not a true sexual preference for a child Preferential Molester True sexual preference for a child Special Agent Kenneth Lanning Quantico Behavioral Science Unit FBI Profile for the Child Molester (cont.) www.missingkids.com The purpose of this descriptive typology is not to gain insight or understanding about why child molesters have sex with children in order to help or treat them, but to recognize and evaluate how child molesters have sex with children in order to identify, arrest, and convict them www.farleyintl.com 3

NCJRS 800-851-3420 or www.ncjrs.gov www.reid.com Preferential Child Molester Characteristics Children are preferred sexual objects Life centers around this sexual preference Sexual interest in children is rationalized Sexual fantasies focus on kids Preferential Child Molester Characteristics (cont.) Touring Cyberspace Traditional Web or Surface Web Highly predictable pattern of behavior High sense of interpersonal skills with children Well developed technique in obtaining victims or has a method for legal access Quick to utilize modern technology The Internet. Standard browsers (Explorer, Safari ) World Wide Web (www) Usenet Newsgroups Internet Relay Chat (IRC). www.farleyintl.com 4

Child Molester Characteristics Child Exploitation History Situational Preferential Less intelligent More intelligent cunning Impulsive Compulsive need driven Thought motivated Fantasy motivated Spontaneous Planned scripted Sloppy mistakes Needy mistakes Pornography. Pornography Molester Rationalization Talking about Child Sexual Abuse Blaming Outside Factors I m the victim The Internet made me do it That child pornography stuff is everywhere. What will cause sexual excitement? Child Exploitation History Child pornography Child abuse images pthc preteen hardcore Child Molester Collections Very important Organized Permanent Concealed but not always Will share with others while looking for more The molester will never destroy the collection www.farleyintl.com 5

Motivation for the Molester Collection Elements of the Molester Collection Molesters are compulsive Never has enough Need for validation Sexual gratification Seduction tool Blackmail Medium of exchange Child erotica Child pornography Trophies Euphoric recall remembering how good it felt Child Erotica Defined - Any image, material or object relating to children that provides a sexual purpose for a given individual (Farley) Child Pornography Child Abuse Images Defined Visual depiction of a minor (under 18 years of age), that is or appears to be engaged in sexually explicit conduct or the lewd exhibition of the genitals Child Pornography Defenses These are all Real Pictures Are they real children? Original vs. Airbrushed pre-digital photos Morphing Photo shopping Pseudo photos www.farleyintl.com 6

Trophies Touring Cyberspace Traditional Web or Surface Web Remember the good old days before the Internet The Internet. Standard browsers (Explorer, Safari ) World Wide Web (www) Usenet Newsgroups Internet Relay Chat (IRC) You can also send email CHILD EROTICA David Hamilton, Jock Sturges, Sally Mann Case Illustrations www.farleyintl.com 7

Deep-Web or Invisible Web Un-indexed Portion of the Internet Internet Browsers Traditional Web World Wide Web - www IRC Newsgroups www.torproject.org Tor Browser www.rfarley.com Thank you! Farley International Robert Hugh Farley MS Consultant in Crimes against Children for VIRTUS 10 So. LaSalle Street, Suite 1420 Chicago, IL 60603 USA 847-236-9134 Email farleyintl@hotmail.com Web Page www.farleyintl.com www.farleyintl.com www.farleyintl.com 8