The European Online Grooming Project_



Similar documents
Julia Davidson, PhD Professor of Criminology, Kingston University Safer Internet. Pl Keeping Children & Young People Safe Online, 3 rd International

Online grooming: What changes with the new legislation?

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

E-Safety Issues and Online Safety

Speaker notes from Indigo Daya at the Borderline Personality Disorder What Works Conference, 2014.

Affirmative Action Presentation

Assessing capacity to consent and to give evidence

E-Safety Issues and Online Safety. Parents Evening

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International

E-Safety Issues and Online Safety

Online Safety for Middle and High School

CEOP Relationship Management Strategy

Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities. A Graphic Representation

Digital Citizenship Lesson Plan

Research to Practice Series

SOCIAL WORK PRACTICE AND DOMESTIC VIOLENCE

Internet Safety Guide for Parents

REDUCING SEXUAL RISK Lesson 1

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Online Abuse: Literature Review and Policy Context

How To Deal With Social Media At Larks Hill J & I School

Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group

Outsmarting On-line Predators. Christina Kilbourne

Social Networking Sites like Facebook, MSN

Listening and learning: improving support for victims in London

Internet Safety Fact Sheet Facts about Social Networking:

Victims of crime: Understanding the support you can expect

Cyber Crime ACC Crime

Council of Europe campaign to stop sexual violence against children

14/11/2014. Overview of violence and abuse in young people's relationships and peer groups. Identification and assessment

SCHOOL ONLINE SAFETY SELF REVIEW TOOL

the criminal justice system and child sex offences

REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS

Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities

CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)

September A Anti Bullying (Cyber Bullying) version 9

Your duties as a registrant. Standards of conduct, performance and ethics

Disclosure Scheme. The Domestic Violence. Keeping People Safe from Domestic Violence

The Victims Code: Young victims of crime: Understanding the support you should get

Reporting the crime to the police

Social Media Guidelines Resource

Guidelines for Preventing and Dealing with Bullying Issues

Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.

What s Going On to safeguard children and young people from sexual exploitation? : A data monitoring Tool

Common Facebook issues

Duty to report. However, duty-to-report is not well understood in terms of student safety in digital contexts.

WHOLE SCHOOL ANTI-BULLYING POLICY

Domestic Violence Law Reform The Victim s Voice Survey: Victim s Experience of Domestic Violence and the Criminal Justice System

9. Children, Technology and Gambling

Business Plan 2012/13

United Response. Overall rating for this service Good. Inspection report. Ratings. Overall summary. Is the service safe? Good

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick

Protecting Children. Information for families and carers involved in the child protection process

Southfields Academy: Safeguarding Principles

Support Worker. About the Service. Job Summary. Main duties

NSPCC s Share Aware Teaching Guidance

Catch Me If You Can is a movie based on a true story about a man named

Appendix 6.1. The Person Posing A Risk To Children Assessment Framework

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Cyberbullying in the UK: an evaluation of some intervention procedures

June Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants

A Guide for Childhood Sexual Abuse Survivors

SOCIAL NETWORKING SITES

A client s experience

COUNCIL OF EUROPE COMMITTEE OF MINISTERS. RECOMMENDATION No. R (90) 2 OF THE COMMITTEE OF MINISTERS TO MEMBER STATES

COUNSELING AFFILIATES SEXUAL ADDICTION TREATMENT PROGRAM GUIDELINES FOR WRITING A DISCLOSURE TO RELATIONSHIP PARTNERS

F36D 04 (LMC B1) Lead and manage provision of care services that respects, protects and

SCHOOLS SAFE 4 GIRLS - Questionnaire for schools

Example of a Child Protection Policy

nationalcarestandards

Staying Safe Online. A Practical Guide for Parents and Children.

I N F O R M A T I O N B U L L E T I N. Considerations for Sexual Assault Coordination

ONLINE PREDATORS & PREDATORS

Transcription:

The European Online Grooming Project_ Professor Julia Davidson Centre for Abuse & Trauma Studies, Kingston University, London. 5th International Conference Keeping Children and Young People Safe Online Warsaw, 20th-22nd September 2011

Presentation overview The European Online Grooming Project_ Project design Interview findings Young people online Safety, treatment & policy implications Next steps

European consortium UK Professor Julia Davidson, Kingston University Professor Antonia Bifulco, Kingston University Stephen Webster, National Centre for Social Research Belgium Professor Thierry Pham Italy Professor Vincenzo Caretti Norway Professor Petter Gottschalk

The European Online Grooming Project_ Largest study of online grooming to date Aims: to understand the different ways sexual offenders approach, communicate and groom young people online to empower policy makers, front line professionals, teachers, carers and young people to effectively manage online risks Funded by the EC SIP Running from June 2009 to December 2011

Scale of the Challenge 30 million US children used the Web in 2000 (Gottschalk, 2010); 2,660 incidents of inappropriate approaches and grooming reported by Centre for Exploited and Missing Children. UK data suggests approximately 1 in 5 young people receives a sexual solicitation or approach, with over two thirds unsupervised when using the Internet (Davidson & Martellozzo, 2008) CEOP data (11/2010) 6291 reports via the panic button in 2009, 66% related to online grooming. Increase in young people self-taken images in offender collections. CEOP Child Exploitation and Online Protection, UK

Research Context Evidence to date primarily focussed on indecent images (Seto & Eke 2005; O Brien & Webster 2007) Some studies report co-occurrence of contact sexual offences among indecent image offenders in prison or treatment (Wolak et al, 2005; Seto et al, 2006; Hernandez, 2000) but position not clear. We argue you cannot explain online grooming without understanding the offender computer young person interaction

Research Design Three interlinked research phases: Scoping interviews with stakeholders (police officers, treatment providers, industry specialists), analysis of police case-files and chatlogs ; development of theoretical model, literature review In-depth interviews with online groomers in the UK, Norway, & Belgium chat-logs from Italy Workshops with parents, teachers and young people Data analysed using Framework, case and theme based approach to analysis.

Online Groomers Findings

Sample Characteristics Convicted for grooming under UK and Norwegian legislation, identified through case files in Belgium, analysis of chatlogs in Italy. Mean age 35-44, all male offenders Majority above average IQ score (110+) Majority had indecent child images and had met the child Approximately 50% had access to a child Majority had no previous convictions Approximately 70% of the victims were aged 13-15 Vast majority of the victims were female

Who are online groomers? Like contact sexual offenders not a homogeneous group. Where they do seem to differ: high IQ but not a particularly high level of educational attainment IT competence seems to be primarily self taught, via workplace, observing family and online research Using full range of ICT hardware, chatrooms, social networking sites, file-sharing sites and game platforms to contact young people

The role of the Internet Victim scope, choice & access plenty of fish in the sea, you ll catch one eventually Addiction Tense if not online 7 hour per day chat Need to collect and classify more images Justification I m not hurting them, its just chat Everyone else is doing it File-sharing sites advertise indecent image Disinhibition Confidence Anonymity (on both sides) Gaining friends Normalising explicit sexual conduct Escalation Movement from images to webcams Images helped make real what was going on in my head

Grooming Features Vulnerability Situational Interpersonal Scanning Mapping Random Virtual presentation Identity Self Minor changes Other I never used my own identity, you changes names, you lay it on Contact Single & multiple encounters Varied timescale Diverse styles Desensitisation & Intensity Sex request You test them by saying are you this or that, if she s receptive you can go further Incentives Threats Outcomes Collect image Meet young person

Online Grooming: Preparation & Identity Preparation & Scanning I d always aim for someone with a sexy name because obviously, they d be into sex. I took time to learn about their lives and it was important to them. Then the common denominator became sex. Identity told to piss off by YP when presented as self. Changed profile to that of 17yr old lad-----stole picture of a lad and used that Sometimes it was trial and error. All real contact happened when I presented as a boy age 15-20. Would then switch to real identity after built up a rapport (so never a problem). Then could start using webcams.

Online Grooming: Initial Contact & Risk Management Initial Contact When first met a new contact would write everything down, the fact about her, a kind of log. I could then keep track, especially when I was communicating with so many at the same time I d get on their side and talk about music. So I was well up-to-date with all the teen, the chart stuff. So I knew all the names --- and groups and songs, and that was always a, a good progression. Risk Management basically what I d do if, if they wanted proof of how old I was, if I had a webcam I d click on it to connect and when it started to connect, I went [clicks fingers], switched it off. So, as if it was playing up. gave phone number when trusted or knew the young person. I d always just block out my number as well, obviously, so it didn t show up on theirs.

Online Grooming: Networking spoke to another sexual offender online for three months. Exchanged images and gave him things from the girls he was talking to. Came across other men. They said there were enough fish so you will find someone in the end.

Classifying online offenders Distorted Relationship Believe in mutual consent/love No images or network contact Longer contact process Own identity Physical meeting Ongoing abuse/multiole meetings Adaptable Offender Believe in own need and mature YP Minimal image collections, if any Tailored contact process to victim Own & tailored identities Hyper-Sexual Dehumanise YP Extensive image collections Extensive contact with other offenders Tailored/sexual identity Impersonal contact methods

Young People Online

Victims The project was focused on interviewing online groomers only. There was no direct contact with victims. Themes were included in the offender topic guide on the age and choice of victims, type of grooming approach, and victims response Although not a statistically drawn sample, the victims described by the online groomers in this research tended to be teenagers

Resilient Young People Evidence of safety messages getting through as offenders told by most to go away in no uncertain terms. It was not easy as young girls had been taught not to talk to guy s age 20 When presented own identity, was told piss off you nonce.

Victims: Research evidence Vulnerable young people high need for affection, attention, have difficult relationships with parents and difficult home lives. Seeking love on the internet. Believe they have a true relationship. Resist disclosure because want to continue the relationship. Risk-taking young people seeking adventure, disinhibited, feel in control. Less known about family risks. Open to blackmail not to disclose because their own behaviour is used as evidence by groomer of cooperation or seduction. Resilient young people fend off any approach they consider weird. Take on board safety messages. Come from more secure family backgrounds. Palmer, 2006, Davidson & Martelozzo, 2008

Vulnerability Dimensions: 1 Loneliness The girls were definitely insecure and lonely. Many of the girls lacked adult contact.they felt safe with me.. I always made time Self-harm Discussed by the young person and observed by the offender at physical meeting Self-esteem Young people feeling concerned about their body image and the groomer can exploit this mirroring compliments Concurrent sexual abuse She wanted attention in her life, she said she had lost her mum and her stepdad abused her. They had no hang ups- these were girls already being abused

Vulnerability Dimensions: 2 Offender adept at meeting these needs to the extent that they perceive the young person is in control of the encounter: She began to pester me to go online and talk to her She could walk away from me at any time and she new this They would ask me, they re re so convinced they re adults, in the end, who s the victim?

Disinhibited Online Risk-Takers Victim disinhibition involved using sexual screen names; using sexual chat; populating adult chat rooms; sending explicit images of self. Online groomers describe watching for and drawn to this behaviour: she said I d love to shag an older guy However, online confidence did not always mirror offline reality: she was really quiet when met, even after a few meetings she never really said anything she presented as womanly and mature but when we met I knew it was just a mask

Implications

Implications for Online Safety & Industry Consider online disinhibition in context of safety campaigns for YP, should there be a more targeted approach for vulnerable? Why are some YP more resilient, less likely to interact? Industry should work more proactively to raise awareness with young people, parents and educators. Appropriate online behaviour, ethical use, digital footprint level 1 images in offender collections. Consider how SNS might design out offender behaviour (grooming, networking, indecent image sharing). Is more specialist monitoring possible? Issue of harm in context of offender approach- all YP harmed at some level.

Public Health Problem Minimal contact Degree of harm to child offender meeting Tailored safety Programmes-Risk of victimisation Secure online environments Managing Online Grooming Collaborative approach: Education, criminal Justice, social work, NGOs, charities policy Awareness for parents & educators Offender Behaviour, Risk & Intervention

Next steps for the project Focus groups with young people around Europe Dissemination workshops with teachers and parents Final report December 2011 Comparison with EC SIP ROBERT victim data Publications- book & articles 2012

Further information www.european-online-grooming-project.com http://ec.europa.eu/information_society/activities/sip/index_en.htm Contact: j.davidson@kingston.ac.uk