Online Child Predators: Does Internet Society Make Predation Easy?

Online Child Predators: Does Internet Society Make Predation Easy?

Gráinne Kirwan (Dun Laoghaire Institute of Art, Design and Technology, Ireland) and Andrew Power (Dun Laoghaire Institute of Art, Design and Technology, Ireland)
Copyright: © 2012 |Pages: 20
DOI: 10.4018/978-1-61350-350-8.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Chapter Preview

Top

Background

Sophie is fifteen years old, and has recently started using social networking websites. She received a friend request from Jim, a boy who she does not know. His profile says that he is sixteen years old, and lives in the next town. Jim is actually a twenty-seven year old man from a different country. Sophie notices that he is listed as a friend of some of her schoolmates, so she accepts his friend request as she does not want to seem rude. Jim starts to send her private messages, and as he looks quite cute in his profile, Sophie feels flattered. The messages start to turn sexual in nature, and Jim asks her to send him photographs of her in her underwear. Sophie has never had a boyfriend, and she is not sure what to do, but Jim persuades her that it is normal to swap sexy photos. She takes the photo and sends it to him, and he replies that she is very beautiful, but that it would be even better if she was naked. After a little more persuasion she sends him a photo of herself completely naked. Over time his demands become more and more difficult for Sophie to accept. Eventually Jim asks her to use a webcam, saying that he wants to watch her carry out sexual acts on herself in real time. Sophie feels very uncomfortable at this request and refuses. Jim starts to get very angry, he calls her a tease, and says that if she does not comply to his requests, he will put her naked photo on his profile so that all of her friends will see it. She consults her friends for advice about Jim, and then realises that they do not know him either – they accepted his friend request without knowing who he was. Although she is very embarrassed, Sophie tells her parents the whole story. Her parents then report the issue to the police.

George is a twenty-two year old man with paedophilic tendencies. He spends a lot of time on the internet searching for suitable teenage girls to approach. He finds a profile of Judy on a social networking website. Judy is fourteen years old and lives locally. She seems a little shy, and does not have many friends on the website. George makes contact with her, and he does not hide the fact that he is much older than her. Soon they are in contact several times a day, and as the relationship progresses, George starts to discuss various sexual activities and fantasies with her. She seems receptive to his ideas, so George eventually feels confident enough to suggest meeting up in real life. Judy agrees, and they set a date for the next day at her house, as she says her parents will be out at work. She tells him to bring the sex toys that he has mentioned in his messages. When George arrives at the house, he is arrested. Judy was actually a thirty-four year old undercover police officer. The sex toys that he brought with him were used as evidence that he intended to engage in sexual activity with an underage girl.

The scenarios mentioned above are both entirely fictional, but are based on mostly typical events that can occur during online child predatory events. As will be outlined later in the chapter, most victims are adolescents rather than younger children, and most are female. Many involve discussion of sexual activities in advance of physical meetings, and a gradual ‘grooming’ of the youth to prepare them for a sexual encounter. The reporting of the events to the police in the first scenario is unusual however, as it is likely that most cases of online child predation never come to the attention of the authorities. The terms used to describe the events and individuals involved in these attacks are sometimes confusing, however, and so it is important that these are appropriately defined.

Complete Chapter List

Search this Book:
Reset