Internet predator
   HOME

TheInfoList



OR:

Online predators are individuals who commit
child sexual abuse Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whet ...
that begins or takes place on the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
.


Conceptions

Internet-facilitated crimes against minors involve deceit and begin with adults communicating with children over the Internet with the goal of coercing them into illegal sexual activity. Sometimes the sexual abuse happens face to face.
Chat rooms The term chat room, or chatroom (and sometimes group chat; abbreviated as GC), is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology, ranging from ...
,
instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and tri ...
,
Internet forums An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporar ...
, social networking sites,
cell phones A mobile phone, cellular phone, cell phone, cellphone, handphone, hand phone or pocket phone, sometimes shortened to simply mobile, cell, or just phone, is a portable telephone that can make and receive calls over a radio frequency link whi ...
, and even
video game console A video game console is an electronic device that outputs a video signal or image to display a video game that can be played with a game controller. These may be home consoles, which are generally placed in a permanent location connected to ...
s have issues with online predations. These online areas attract predators because they allow them to have access to make contact with victims without drawing attention. In addition, there is insufficient reliable data concerning the number of minors sharing personal information online due to children's privacy issues. Also, the anonymity of online conversations leads to the
disinhibition In psychology, disinhibition is a lack of restraint manifested in disregard of social conventions, impulsivity, and poor risk assessment. Disinhibition affects motor, instinctual, emotional, cognitive, and perceptual aspects with signs and sympto ...
of minors, making them feel more comfortable and more likely to engage in risky behaviors. This allows predators to use manipulation to put their targets into situations where they will comply with the predator's sexual demands. Initial manipulation often involves introducing the minors to sexual activity, showing them pornography, and requesting sexually explicit information and pictures. This online predatory behavior does not often lead to actual or attempted offline contact, but it could. Even though it is the mainstream view that predators will use distinct tactics to meet victims, most actual in-person meetings do not involve any deception. In fact, the minors are usually complicit with perpetrators often using promises of love and romance to seduce victims to meet.


Laws

In Australia, the
murder of Carly Ryan Carly Ryan (31 January 1992 – 20 February 2007) was an Australian schoolgirl who was befriended online and then murdered by a serial paedophile, 50-year-old Garry Francis Newman. The case, which highlighted the emerging phenomena of catfishing ...
in February 2007 led to public opinion pressure which eventually resulted in nationwide legal changes, nicknamed "Carly's Law", being made in 2017 to help protect minors online. Ryan, aged 15, was a victim of online grooming and predatory behaviour, which was considered unique at the time, given that Ryan was the first person in Australia killed by an online predator. In the U.S., some risks involving online predatory behavior are addressed by the
Children's Internet Protection Act The Children's Internet Protection Act (CIPA) is one of a number of bills that the United States Congress proposed to limit children's exposure to pornography and explicit content online. Background Both of Congress's earlier attempts at restri ...
, which was passed in 2000. This law required schools and libraries to install filtering and blocking software, to keep students away from obscene and harmful materials and individuals online. A bill called HR 5319 or the "
Deleting Online Predators Act of 2006 The Deleting Online Predators Act of 2006"http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.5319:" (DOPA) is a bill (H.R. 5319) brought before the United States House of Representatives on May 9, 2006 by Republican Pennsylvania Representative (R-P ...
" (DOPA) was later introduced, intensifying the provisions of CIPA. , the bill was effectively defeated. Some individuals have also initiated actions against laws designed to protect children. '' Doe v. Shurtleff'', 628 F.3d 1217 (10th Cir. 2010), was a
United States Court of Appeals for the Tenth Circuit The United States Court of Appeals for the Tenth Circuit (in case citations, 10th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * District of Colorado * District of Kansas * Distr ...
case assessing the constitutionality o
Utah Code Ann. § 77-27-21.5
a law that requires sex offenders to register their internet identifiers with the state in order to "assist in investigating kidnapping and sex-related crimes, and in apprehending offenders". In this case, a convicted
sex offender A sex offender (sexual offender, sex abuser, or sexual abuser) is a person who has committed a sex crime. What constitutes a sex crime differs by culture and legal jurisdiction. The majority of convicted sex offenders have convictions for crim ...
, appearing anonymously as
John Doe John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used when the true name of a person is unknown or is being intentionally concealed. In the context of law enforcement in the United States, such names are ofte ...
, appealed
decision
by the U.S. District Court for the District of Utah to
vacate A vacated judgment (also known as vacatur relief) makes a previous legal judgment legally void. A vacated judgment is usually the result of the judgment of an appellate court, which overturns, reverses, or sets aside the judgment of a lower court. ...
an order enjoining the enforcement of Utah Code Ann. § 77-27-21.5.


Criticism

Cases involving
stalking Stalking is unwanted and/or repeated surveillance by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. The term ...
, violence, abduction, rape and/or murder are very rare. Most online sex offenders are young adults who target teens and seduce victims into sexual relationships. They take time to develop the trust and confidence of teens, so the teens see these relationships as romances or sexual adventures. Nearly 75 percent of victims who met offenders face-to-face did so more than once. Most of these offenders are charged with crimes such as
statutory rape In common law jurisdictions, statutory rape is nonforcible sexual activity in which one of the individuals is below the age of consent (the age required to legally consent to the behavior). Although it usually refers to adults engaging in sexual ...
for non-forcible sexual contact as the victims are, by law, too young to consent. The youth most vulnerable to online sex offenders have histories of sexual or physical abuse, family problems, and tendencies to take risks both on- and offline. A 2007 study found no cases of minors being targeted by Internet predators on the basis of information they had posted on
social media Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social me ...
. The research that concluded the statistic that "1 in 5 children are sexually solicited online" is being questioned.


See also

*
Child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
*
Computer crime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
*
Catfishing Catfishing is a deceptive activity in which a person creates a fictional persona or fake identity on a social networking service, usually targeting a specific victim. The practice may be used for financial gain, to compromise a victim in so ...
*
Child grooming Child grooming is befriending and establishing an emotional connection with a minor under the age of consent, and sometimes the child's family, to lower the child's inhibitions with the objective of sexual abuse. Child grooming is also regularly ...
* FBI *
Cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
*
Cyberstalking Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, thre ...
*
Immigration and Customs Enforcement The U.S. Immigration and Customs Enforcement (ICE) is a federal law enforcement agency under the U.S. Department of Homeland Security. ICE's stated mission is to protect the United States from the cross-border crime and illegal immigration tha ...
(ICE) * Fantasy defense *
National Crime Agency The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom. It is the UK's lead agency against organised crime; human, weapon and drug trafficking; cybercrime; and economic crime that goes across regional and in ...
(NCA) *
Pedophilia Pedophilia ( alternatively spelt paedophilia) is a psychiatric disorder in which an adult or older adolescent experiences a primary or exclusive sexual attraction to prepubescent children. Although girls typically begin the process of puberty ...
*
Relationship between child pornography and child sexual abuse A range of research has been conducted examining the link between viewing child pornography and perpetration of child sexual abuse, and much disagreement persists regarding whether a causal connection has been established. Perspectives fall into one ...
*
Stranger A stranger is a person who is unknown to another person or group. Because of this unknown status, a stranger may be perceived as a threat until their identity and character can be ascertained. Different classes of strangers have been identified ...
*''
To Catch a Predator ''To Catch a Predator'' is an American reality television series in the television news magazine program ''Dateline NBC'' featuring confrontations with host Chris Hansen, partly filmed with a hidden camera, of adult men arriving at a sting h ...
''


References


External links


netsmartz.org
{{DEFAULTSORT:Online Predator Child sexual abuse Cybercrime Online child abuse