Online predator

File:West Midlands Police.png poster informing children about how to respond to online predators]]

{{Short description|Person who commits child sexual abuse via the Internet}}

Online predators are individuals who commit child sexual abuse that begins or takes place on the Internet.

Conceptions

Internet-facilitated crimes against minors involve deceit and begin with adults communicating with children over the Internet with the goal of coercing them into illegal sexual activity. Sometimes the sexual abuse happens face to face.{{cite web|url=http://library.thinkquest.org/06aug/01158/home.html|title=Internet Safety: Keeping It Real|publisher=Oracle Thinkquest|access-date=2012-12-23|archive-date=2013-08-01|archive-url=https://web.archive.org/web/20130801224836/http://library.thinkquest.org/06aug/01158/home.html|url-status=dead}}{{cite web|url=http://www.ahaparenting.com/parenting-tools|title=[CONTENT] - Parenting Tips|website=www.ahaparenting.com|access-date=12 October 2017}}

Chat rooms, instant messaging, Internet forums, social networking sites, cell phones, and even video game consoles have issues with online predations.{{cite web|url=http://www.Microsoft.com/protect/family/guidelines/predators.mspx |title=Online Predators: Help minimize the risk|publisher= Microsoft Corporation |date=24 September 2008}}{{cite web| last = Williams| first = Pete| author-link = Pete Williams (journalist)| title = MySpace, Facebook attract online predators

| website = NBC News| date = February 3, 2006| url = https://www.nbcnews.com/id/wbna11165576| access-date = December 8, 2006 }}{{cite web| last = Burt| first = David| author-link = David Burt (filtering advocate)| title = Playstation Pedophiles| website = Filtering Facts| date = March 16, 2009| url = http://filteringfacts.org/2009/03/16/playstation-pedophiles/| access-date = March 16, 2009| quote = [G]aming consoles such as PlayStation, Wii, and Xbox have become Internet-enabled, interactive devices. This provides an opportunity for pedophiles to befriend and groom minors.| url-status = dead| archive-url = https://web.archive.org/web/20090405143950/http://filteringfacts.org/2009/03/16/playstation-pedophiles/| archive-date = 2009-04-05}}{{cite web|url=http://www.drphil.com/slideshows/slideshow/4954/|title=Dr. Phil.com|website=www.drphil.com|access-date=12 October 2017}} These online areas attract predators because they allow them to have access to make contact with victims without drawing attention.{{Cite journal|date=December 1, 2013|title=Are Crimes by Online Predators Different From Crimes by Sex Offenders Who Know Youth In-Person?|journal=Journal of Adolescent Health|publisher=Society for Adolescent Health and Medicine|location=San Diego, California|volume=53|issue=6|pages=736–741|doi=10.1016/j.jadohealth.2013.06.010|pmid=23890773|issn=1054-139X|last1=Wolak|first1=Janis|last2=Finkelhor|first2=David|doi-access=free}} In addition, there is insufficient reliable data concerning the number of minors sharing personal information online due to children's privacy issues.{{Cite book|url=https://books.google.com/books?id=tuI2DwAAQBAJ&q=%22online+predator%22+united+states+children%27s+internet+protection+act&pg=PT134|title=Teaching the Language Arts: Forward Thinking in Today's Classrooms|last1=Dobler|first1=Elizabeth|last2=Johnson|first2=Denise|last3=Wolsey|first3=Thomas DeVere|date=January 23, 2017|publisher=Routledge|location=Abingdon, England|isbn=9781351667050|language=en}} Also, the anonymity of online conversations leads to the disinhibition of minors, making them feel more comfortable and more likely to engage in risky behaviors.{{Cite journal|last1=Dombrowski|first1=Stefan C.|last2=Gischlar|first2=Karen L.|last3=Durst|first3=Theo|date=May 1, 2007|title=Safeguarding young people from cyber pornography and cyber sexual predation: a major dilemma of the internet|journal=Child Abuse Review|publisher=Wiley|location=Oxford, England|language=en|volume=16|issue=3|pages=153–170|doi=10.1002/car.939|issn=1099-0852}} This allows predators to use manipulation to put their targets into situations where they will comply with the predator's sexual demands. Initial manipulation often involves introducing the minors to sexual activity, showing them pornography, and requesting sexually explicit information and pictures.{{Cite journal|last=Lanning|first=Kenneth|date=2005|title=Compliant Child Victims: Confronting an Uncomfortable Reality|journal=ASPAC Advisor|pages=14}} This online predatory behavior does not often lead to actual or attempted offline contact, but it could.

Even though it is the mainstream view that predators will use distinct tactics to meet victims, most actual in-person meetings do not involve any deception. In fact, the minors are usually complicit with perpetrators often using promises of love and romance to seduce victims to meet.{{cite journal|first1=Karyl|last1=Troup-Leasure|first2=Howard N.|last2=Snyder|title=Statutory rape known to law enforcement|journal=Juvenile Justice Bulletin|publisher=Office of Juvenile Justice and Delinquency Prevention|location=Washington, D.C.|date=August 2005}}

= Laws =

In Australia, the murder of Carly Ryan in February 2007 led to public opinion pressure which eventually resulted in nationwide legal changes, nicknamed "Carly's Law", being made in 2017 to help protect minors online.{{Cite web|url=https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd1617a/17bd100|title=Criminal Code Amendment (Protecting Minors Online) Bill 2017|website=www.aph.gov.au|language=en-AU|access-date=2018-08-23}} Ryan, aged 15, was a victim of online grooming and predatory behaviour, which was considered unique at the time, given that Ryan was the first person in Australia killed by an online predator.{{Cite web|url=https://www.pressreader.com/australia/the-australian-womens-weekly/20170907/281857233682330|title=My little girl was killed by an internet predator|newspaper=Australian Woman's Weekly|date=September 7, 2017|access-date=August 23, 2018}}{{Cite news|url=https://casefilepodcast.com/case-91-carly-ryan/|title=Case 91: Carly Ryan – Casefile: True Crime Podcast|date=August 4, 2018|work=Casefile: True Crime Podcast|access-date=August 23, 2018|language=en-US}}

In the U.S., some risks involving online predatory behavior are addressed by the Children's Internet Protection Act, which was passed in 2000.{{Cite book|title=Avoiding Predators Online|last=Spivet|first=Bonnie|publisher=The Rosen Publishing Group, Inc|year=2011|isbn=9781448864119|location=New York City|pages=19}} This law required schools and libraries to install filtering and blocking software, to keep students away from obscene and harmful materials and individuals online.{{Cite web|url=http://www.cybercrimejournal.com/catherineijccvol1is2.htm|title=International Journal of Cyber Criminology- Catherine Marcum|website=www.cybercrimejournal.com|access-date=2019-05-22|archive-date=2019-05-25|archive-url=https://web.archive.org/web/20190525175341/http://www.cybercrimejournal.com/catherineijccvol1is2.htm|url-status=dead}} A bill called HR 5319 or the "Deleting Online Predators Act of 2006" (DOPA) was later introduced, intensifying the provisions of CIPA.{{Cite web|url=https://www.technewsworld.com/story/50812.html|title=The Pandora's Box of Social Networking|last=Evans|first=Meryl|date=May 31, 2006|website=TechNewsWorld|access-date=May 22, 2019}} {{asof|2007}}, the bill was effectively defeated.{{cite journal|first=Don|last=Essex|title=From Deleting Online Predators to Educating Internet Users|journal=Young Adult Library Services|publisher=Young Adult Library Services Association|location=Chicago, Illinois|volume=7|issue=3|date=Spring 2009|pages=36–45}}

Some individuals have also initiated actions against laws designed to protect children. Doe v. Shurtleff, 628 F.3d 1217 (10th Cir. 2010), was a United States Court of Appeals for the Tenth Circuit case assessing the constitutionality of [https://web.archive.org/web/20111228045556/http://le.utah.gov/~code/TITLE77/htm/77_27_002105.htm Utah Code Ann. § 77-27-21.5], a law that requires sex offenders to register their internet identifiers with the state in order to "assist in investigating kidnapping and sex-related crimes, and in apprehending offenders".{{cite court|litigants=Doe v. Shurtleff |opinion=628 F.3d 1217 |court=10th Cir. |date=2010 |url=https://caselaw.findlaw.com/us-10th-circuit/1542620.html}}{{cite web|url=http://le.utah.gov/~code/TITLE77/htm/77_27_002105.htm|title=Utah Code Ann. § 77-27-21.5|access-date=12 October 2017|url-status=dead|archive-url=https://web.archive.org/web/20111228045556/http://le.utah.gov/~code/TITLE77/htm/77_27_002105.htm|archive-date=28 December 2011}} In this case, a convicted sex offender, appearing anonymously as John Doe, appealed a [http://docs.justia.com/cases/federal/district-courts/utah/utdce/1:2008cv00064/66539/59/0.pdf?1270223573 decision] {{Webarchive|url=https://web.archive.org/web/20140104205529/http://docs.justia.com/cases/federal/district-courts/utah/utdce/1:2008cv00064/66539/59/0.pdf?1270223573 |date=2014-01-04 }} by the U.S. District Court for the District of Utah to vacate an order enjoining the enforcement of Utah Code Ann. § 77-27-21.5.

Criticism

Cases involving stalking, violence, abduction, rape and/or murder are very rare. Most online sex offenders are young adults who target teens and seduce victims into sexual relationships. They take time to develop the trust and confidence of teens, so the teens see these relationships as romances or sexual adventures. Nearly 75 percent of victims who met offenders face-to-face did so more than once. Most of these offenders are charged with crimes such as statutory rape for non-forcible sexual contact as the victims are, by law, too young to consent. The youth most vulnerable to online sex offenders often have histories of sexual or physical abuse, family problems, and tendencies to take risks both on- and offline.{{citation needed|date=March 2023}} A 2007 study found no cases of minors being targeted by Internet predators on the basis of information they had posted on social media. The research that concluded the statistic that "1 in 5 children are sexually solicited online"{{cite web|url=http://www.attorneygeneral.gov/uploadedfiles/crime/cybersafety.pdf|title=Pennsylvania attorney general: cybersafety|access-date=12 October 2017|archive-date=5 April 2014|archive-url=https://web.archive.org/web/20140405045132/http://www.attorneygeneral.gov/uploadedFiles/Crime/cybersafety.pdf|url-status=dead}} is being questioned.{{cite web|url=http://interviews.slashdot.org/article.pl?sid=08/02/26/1322248 |title=Spreading "1 in 5" Number Does More Harm Than Good|website=Slashdot|date=February 26, 2008}}

See also

References

{{Reflist}}