Skip to main content
Skip to content
Case File
efta-01728622DOJ Data Set 10Other

EFTA01728622

Date
Unknown
Source
DOJ Data Set 10
Reference
efta-01728622
Pages
94
Persons
0
Integrity

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
t-t-Xe-crrS C vista kainsht) EFTA01728622 NATIONAL V* CENTER FOR MISSING & EXPLOITED .0 H I L D R E N Q p) Office of Juvenile Justice and Delinquency Prevention Office of ascot Programs • U.S. Departmanc of Jost'« Child Molesters: A Behavioral Analysis For Law-Enforcement Officers Investigating the Sexual Exploitation of Children by Acquaintance Molesters In cooperation with the EFTA01728623 Child Molesters: A Behavioral Analysis For Law-Enforcement Officers Investigating the Sexual Exploitation of Children by Acquaintance Molesters Fourth Edition September 2001 Kenneth V. Lanning Former Supervisory Special Agent Federal Bureau of Investigation (FBI) Copyright© 2001 National Center for Missing & Exploited Children. All rights reserved. The National Center for Missing & Exploited Children (NCMEC), a national clearinghouse and resource center, is funded under Cooperative Agreement #98-MC-CX-K002 from the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. Points of view or opinions in this book are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice, U.S. Department of Treasury, nor National Center for Missing & Exploited Children. National Center for Missing & Exploited Children• is a registered service mark of the National Center for Missing & Exploited Children. EFTA01728624 Dedication This publication is dedicated to child victims of sexual exploitation and the organization that allowed me to devote most of my 30-year career as a Special Agent to fighting crimes against children. To the Federal Bureau of Investigation I also dedicate this publication to my wife and children, without whose support for all these years I could not have maintained my objectivity and balance. To Kathy, Melissa, and Rick ll - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728625 Kenneth V. Lanning, M.S., FBI (Retired) Mr. Lanning is a 30-year veteran of the FBI who spent 20 years in the Behavioral Science Unit and National Center for the Analysis of Violent Crime at the FBI Academy in Quantico, Virginia. He is a founding member of the Board of Direc- tors of the American Professional Society on the Abuse of Children (APSAC) and current member of the Advisory Board of the Association for the Treatment of Sexual Abusers (ATSA). He is the 1990 recipient of the Jefferson Award for Research from the University of Virginia, 1996 recipient of the Outstanding Pro- fessional Award from APSAC, and 1997 recipient of the FBI Director's Award for Special Achievement for his career accomplishments in connection with missing and exploited children. He has testified on seven occasions before the U.S. Con- gress and many times as an expert witness in state and federal courts. He has consulted on thousands of cases involving deviant sexual behavior and the sexual victimization of children. He has authored numerous articles and publications including one monograph titled Child Molesters: A Behavioral Analysis and another titled Child Sex Rings: A Behavioral Analysis that have been widely dis- tributed by the National Center for Missing & Exploited Children (NCMEC). He has made numerous presentations at major national and regional conferences on the sexual victimization of children, child abuse and neglect, and missing and exploited children and has lectured before and trained thousands of criminal- justice and mental-health professionals. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 111 EFTA01728626 Acknowledgments In addition to the unfailing support of my family and the Federal Bureau of Investigation, this publication would not be possible without the support and assistance of many colleagues who, over the past 30 years, helped me commit this body of experience to paper in a way that I hope will continue to be a critical tool for law-enforcement officers and prosecutors on the "front line" who investigate and prosecute cases involving the sexual victimization of children. Special thanks for their assistance with this edition of Child Molesters: A Behavioral Analysis go to Lucy Berliner of the Flarbomiew. Center for Sexual Assault & Traumatic Stress in Seattle, Washington; Cindy Lent and Linda Krieg of the FBI; and John Rabun, Ruben Rodriguez, Dan Armagh, Marsha Gilmer- Tullis, Terri Delaney, Kay Larson, Catherine Delaney, Sue Carruthers, Susanne Lappin, and Sheila Chapman-Panizza of the National Center for Missing & Exploited Children in Alexandria, Virginia. i‘f - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728627 Table of Contents Introduction...1 Caution...1 Overview...2 Stranger banger...3 Intrafamilial Child Sexual Abuse...4 Acquaintance Child Molestation...4 Definitions...9 Need...9 Defining the Termp Used...10 Sexual Victimization of Children...10 Sexual Exploitation of Children...10 Sexual Aetivity...10 Child...12 Paraphilia...12 MO and Ritual...13 . Child Molester...14 Pedophile...15 Law-Enforcement.Typology..,19 . Child Molester Vertus Pedophile...19. Needs, of Law Enforcement...20 Old Thpology...21 New Typology...22 Situational-Type Child Molesters-25 Preferential-Type Child Molesters...26 Who Cares?...29 . • Problem Areas...31 Combination Offenders...al Nuisance Sex Offenders...31 Importance...32 •Evaluation...33 Multiple Offenders...34 Incest Cases...34 Female Offenders...35 . Adolescent ,Offenders...36 Identifying:Preferential Sex Offenders...37 Overview...37 Preferential Sek Offenders...38 ,• Characteristics...38 .• • "True" Pgdophiles...39: Application...44 •.• • . , Exaggerated Example...44 Profiling? %.45 •• Acquaintance-Exploitation Cases (forMerly titled( "C*1d Bex.Rings")...47 Overview...47 - Dynamics of Cases...48 "Experts"...48 Risk to Other Children.. A8 r. CHILD MOLESTERS: A BulAVIORAL ANALYSIS- V EFTA01728628 Role of Parents...48 Disclosure Continuum Status...49 Multiple Victims...49 Multiple Offenders...49 Gender of the Victim...49 Sexual Exploitation Versus Sexual Abuse Cases...49 Types of Multiple-Victim Cases...50 "Historical" Multiple-Victim Cases...51 Overview...51 Characteristics...51 Age of Consent...52 Offender Strategies...54 Control...54 The Seduction Process...5,5 Operation of Cases Involving Multiple Child Victims...57 Offender-Victim Bond...58 High-Risk Situations...59 Collection of Child Pornography and Erotica...61 Coltection...01 Child Pontography...62 Commercial Versus Homemade...63 Technical Versus Simulated...64 Child Erotica...65 . Published Material Relating to Children...66 • Unpublished Material Relating to Children...67 Pictures, Photographs, and Videotapes of Children...68 Souvenirs and Trophies...68 Miscellaneous...68 Motivation for Collection...69 Use of Collectioo...70 Characteristics of Collection...71 Important...71 Constant...71 • Organized...71 Permanent...72 Con4ealed...72 Shared.,.72 Thekole of Law Enforcement...72 Value of Brotica...73 Evaluation of Child Porhography...74 Determining Age...74 Identifying Child Pornography and Erotica Victims...75' Sexually Explicit Conduct and Lasciviousness...76 Hypothetical Example...80 Evaluation Criteria...81 ' • Guilty Kntswledge,..83' "Expert" Search Warrants...84 Child Pornographer or Molester?...85 Investigative and Prosecutive Priorities...87 Vi - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS V{ 4 ;lc*. EFTA01728629 Use of Computers by Sex Offenders...89 Overview...89 Illegal Sexual Activity...89 Legal Sexual Activity...90 Understanding Behavior...90 Computer Offenders...91 Situational .Offenders...91 Preferential Offenders...91 Miscellaneous "Offenders"...92 "Concerned Civilians"...93 Use of Computers...94 Organize...95 Communicate, Fuel, and Validate...95 Maintenance of Business Records...96 Child Pornography...96 Interact and Solicit Sex With Children...97 Staleness of Probable Cause...99 Investigating Acquaintance Sexual Exploitation..4.01 Overview...101 The Law-Enforcement Perspective...102. r Emotion Versus Reason...102 The "Big-Picture" Approach...103 Interview...104 Law-Enforcement Role...104 The Disclosure/Reporting Continuum...105 Establishing Rapport and Clarifying Terms...106 •• Videotaping...106 General Rules and Catitions..,1-07 Assess and Evaluate...108 "Children Never Lie"...109 "If They Have the Details, It Must Have Happened"...110 Areas of Evaluation...112 Contagion...113 Summary of Evaluation and Assessment...114 Corroborate...115 Document Behavioral. Symptoms of Sexual Victimization...115 Document Patterns of Behavior...116 Identify Adult Witnesses end Suspects...117 Medical Evidence...117 Other Victims...118 Search Warrants...119 Physical Evidence...119 Child Pornography and Child Erotica...119 Computers...120 Consensual Monitoring...120 Subject Confessions...121 Surveillance...121 Investigating Multiple-Victim Cases...122 Understanding the Seduction Process...122 CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - Vii EFTA01728630 Understanding the Preferential Molester...125 Proactive Approach...126 Establish Communication With Parents...127 Conclusion...128 After Identification...129 Pedophile Defenses...129 Denial...129 Minimization...129 Justification...129 Fabrication...130 Attack...130 After Conviction...131 Suicide...131 Bond Hearing...132 Sentencing Issues...132 Treatment...136 Investigative Difficulties...139 The "Ideal" Victim...139 Naturally Curious...139 Easily Led by Adults...139 Need for Attention and Affection...139 Need to Defy Parents...140 Children as Witnesses...140 Maligned Investigator...140 Societal Attitudes...141 Summary Quotes: "The Cliff Notes"...143 Appendix I: References...14S Appendix II: The Investigator's Basic Library...147 viii - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728631 Introduction V. N. The sexual victimization of children involves varied and diverse dynamics. It can range from one-on-one intrafamilial abuse to multioffender/multivictim extrafamilial sex rings and from stranger abduction of toddlers to prostitution of teenagers. This discussion will focus primarily on sexual exploitation of children perpetrated by "acquaintance molesters." This and other related terms will be defined and insight will be provided into the behavioral patterns of offenders and victims in such cases. The goal of this publication is to describe, in plain language, the behavioral dynamics of these cases. Because of the complexity of human behavior, these dynamics will often be described on a continuum rather than as either/or catego- ries. It is not intended to be a detailed, step-by-step investigative manual, nor does it offer rigid standards for the investigation. The material presented here may not be applicable to every case or circumstance. Although these investigative techniques may be utilized in other cases of sexual victimization of children, they are intended to be applied primarily to the investigation of molestation of chil- dren by adult acquaintances. Many real-world constraints, including lack of time and personnel, make following all the techniques discussed here impossible. General principles described in earlier chapters will be restated, reinforced, or summarized as they are applied in later chapters. In the interest of readability, children alleging sexual abuse or who are sus- pected of being sexually exploited will sometimes be referred to as "victims," even though their victimization may not have been proven in a court of law. This shorthand should not blur the fact that investigators are expected to keep an open mind and maintain complete objectivity. Although females can and do molest children, offenders will generally be referred to by the pronoun "he." The information in this publication and its application are based on my education, training, and more than 27 years of experience studying the criminal aspects of deviant sexual behavior and interacting with investigators and prosecutors. Although I understand that data is not the plural of anecdote, the information and opinions are based primarily on the totality of my acquired knowl- edge and expertise. My database is the thousands of cases on which I have consulted or studied. Its validity is the fact that its application has worked for all these many years. I have great confidence in its behavioral accuracy and reliability. Its legal acceptance and application, however, must be carefully evaluated by investigators and prosecutors based on departmental policy, rules of evidence, and current case law. This publication is intended to be a practical behavioral analysis. with application to the criminal-justice system. It is not intended to be a precise legal analysis with technical legal definitions. The use of terms also utilized in mental health (e.g., impulsive, compulsive, pedophilia) is not meant to imply a psychiatric diagnosis or lack of legal responsibility. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - EFTA01728632 In order to understand and investigate allegations of what constitutes "acquain- tance" molestation, it is important to have a historical perspective of society's general attitudes about sexual victimization of children. A brief synopsis of these attitudes in the United States is provided here in order to give a context to this discussion. That context, hopefully, will help investigators better understand some of the problems and investigative difficulties encountered in these cases. In the United States, society's historical attitude about sexual victimization of children can generally be summed up in one word: denial. Most people do not want to hear about it and would prefer to pretend that such victimization just does not occur. Today, however, it is difficult to pretend that it does not happen. Stories and reports about child sexual abuse and exploitation are daily occur- rences. Investigators dealing with sexual victimization of children must recognize and learn to address this denial. They must try to overcome it and encourage society to address, report, and prevent the sexual victimization of children. A complex problem such as the sexual victimization of children can be viewed from the three major perspectives of personal, political, and professional. The personal perspective encompasses the emotional—how the issues affect individual needs and wants. The political perspective encompasses the practical—how the issues affect getting elected, obtaining funding or pay, and attaining status and power. The professional perspective encompasses the rational and objective— how the issues affect sexually victimized children and what is in their best interest. Often these perspectives overlap or are applied in combination. Because most of us use all three, sometimes which perspective is in control may not be clear. The personal and political perspectives tend to domi- nate emotional issues like sexual victimization of children. The personal and political perspectives are reality and will never go away. In fact many positive things can and have been achieved through them (e.g., attention, adequate fund- ing, equipment, manpower). In general, however, sexually victimized children need more people addressing their needs from the professional perspective and fewer from the per- sonal and political perspectives. In their zeal to overcome denial or influence opinion, some individuals allow the personal or political perspectives to dominate by exaggerating or misrepre- senting the problem. Presentations and literature with poorly documented or misleading claims about one in three children being sexually molested, the $5 billion child pornography industry, organized child slavery rings, and 50,000 stranger-abducted children are still common. The documented facts in the United States are bad enough and need no embellishment. True professionals, when communicating about the problem, should clearly define their terms and then consistently use those definitions unless indicating otherwise. Professionals should understand and cite reputable and scientific studies, noting the sources of information. Operational definitions for terms (e.g., child, pedophile, sexual exploitation) used in cited research should be dearly expressed and not mixed to distort the findings. Once someone is caught using distorted or misleading infor- mation and labeled an extremist, people may not listen to what he or she says no In general ... sexually victimized children need more people addressing their needs from the professional perspective and fewer from the personal and political perspectives. 2 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728633 matter how brilliant or profound. When the exaggerations and distortions are discovered, the credibility of those people and the issue are diminished. "Stranger Danger" Especially during the 1950s and 1960s the primary focus in the limited literature and discussions on sexual victimization of children was on "stranger danger" — the dirty old man in the wrinkled raincoat approaching an innocent child at play: If one could not totally deny the existence of child sexual victimization, one could describe the victimization in simplistic terms of good and evil. The investigation and prevention of this "stranger danger" are more dear-cut. We immediately know who the good and bad guys are, what they look like, and that the danger is external. During this time the FBI distributed a poster that epitomized this attitude. It showed a man, with his hat pulled down, lurking behind a tree with a bag of candy in his hands. He was waiting for a sweet little girl walking home from school alone. At the top it read, "Boys and Girls, color the page, memorize the rules." At the bottom it read, "For your protection, remember to turn down gifts from strangers, and refuse rides offered by strangers." The poster clearly contrasts the evil of the offender with the goodness of the child victim. When confronted with such an offender the advice to the child is simple and dear—say no, yell, and tell. The myth of the typical child molester as the dirty old man in the wrinkled raincoat has been reevaluated based on what we have learned about the kinds of people who sexually victimize children. The fact is child molesters can look like anyone else and even be someone we know and like. The other part of this myth, however; is still with us, and it is far less likely to be discussed. It is the myth of the typical child victim as a completely innocent young girl walking down the street minding her own business. It may be more important to confront this part of the myth than the part about the evil offender especially when addressing the sexual exploitation of children and acquaintance child molesters. Child victims can be boys as well as girls, and older as well as younger. Not all child victims are "little angels." They are, however, human beings. Society seems to have a problem dealing with any sexual-victimization case in which the adult offender is not completely "bad" or the child victim is not completely "good." The idea that child victims could simply behave like human beings and respond to the attention and affection of offenders by voluntarily and repeatedly returning to an offender's home is a troubling one. It confuses us to see the victims in child pornography giggling or laughing. At professional confer- ences on child sexual abuse, child prostitution is rarely discussed. It is the form of sexual victimization of children most unlike the stereotype of the innocent vic- tim. Child prostitutes, by definition, participate in and sometimes initiate their victimization. Child prostitutes and the participants in exploitation cases involv- ing multiple victims are frequently boys. A therapist once told me that a researcher's data on child molestation were "misleading" because many of the child victims in question were child prostitutes. This seems to imply that child prostitutes are not "real" child victims. Whether or not it seems fair, when adults and children have sex, the child is always the victim. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 3 EFTA01728634 Although no longer the primary focus of sexual-victimization-of-children literature and training, stranger danger still maintains a disproportionate concern for society. Intrafamilial Child Sexual Abuse During the 1970s and 1980s society began to learn more about the sexual victim- ization of children. In my opinion this was primarily as a result of the women's movement. We began to realize that someone they know who is often a relative — a father, stepfather, uncle, grandfather, older brother, or even a female family member—sexually molests most children. Some mitigate the difficulty of accept- ing this by adopting the view that only family members of socioeconomic groups other than their own commonly engage in such behavior. It quickly became apparent that warnings about not taking gifts or rides from strangers were not good enough to realistically try to prevent most child sexual abuse. Consequently we began to develop prevention programs based on more complex concepts such as "good touching" and "bad touching," the "yucky" feeling, and the child's right to say no. These are not the kinds of things that can be easily and effectively communicated in 50 minutes to hundreds of kids of varying ages packed into a school auditorium. These are difficult issues, and pre- vention programs must be carefully developed and evaluated. By the 1980s child sexual abuse for many professionals had become almost synonymous with incest, and incest meant father-daughter sexual relations; therefore, the focus of child-sexual-abuse intervention and investigation turned to one-on-one, father-daughter incest. Even today a large portion of training materials, articles, and books on this topic refer to child sexual abuse only in terms of intrafamilial, father-daughter incest. Incest is, in fact, sexual relations between individuals of any age too closely related to marry. It need not, however, necessarily involve an adult and a child, and it goes beyond child sexual abuse. But more importantly child sexual abuse goes beyond father-daughter incest. Intrafamilial incest between an adult and child may be the most common form of child sexual victimization, but it is not the only form. The progress of the 1970s and 1980s in recognizing that child sexual vic- timization was not simply a result of "stranger danger" was an important breakthrough in dealing with society's denial. The battle, however, is not over. The persistent voice of society luring us back to the simpler concept of "stranger danger" never seems to go away. Acquaintance Child Molestation Today, for many child advocates and professionals in the field (Le., prosecutors, social workers, investigators) the sexual victimization of children still means one- on-one intrafamilial sexual abuse. Although they are certainly aware of other forms of sexual victimization of children, when discussing the problem in general their "default setting" that which is assumed without an active change) always seems to go back to children molested by family members. For the public the "default setting" seems to be stranger abduction. To them child molesters are sick perverts who physically overpower children and violently force them into sexual activity. 4 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728635 The often forgotten piece in the puzzle of the sexual victimization of children is acquaintance molestation. This seems to be the most difficult manifestation of the problem for society and the law to face. People seem more willing to accept a sinister stranger from a different location or father/stepfather from a different socioeconomic background as a child molester than a clergy member, next-door neighbor, law-enforcement officer, pediatrician, teacher, or volunteer with direct access to children. The acquaintance molester, by definition, is one of us. He is not just an external threat. We cannot easily distinguish him from us or identify him by physical traits. These kinds of molesters have always existed, but society and the criminal7justice system have been reluctant to accept the reality of these cases. When such an offender is discovered in our midst, a common response has been to just move him out of our midst, perform damage control, and then try to forget about it. Sadly one of the main reasons that the criminal-justice system and public were forced to confront the problem of acquaintance molestation was the preponderance of lawsuits arising from the negligence of many prominent organizations. One of the unfortunate outcomes of society's preference for the "stranger-danger" concept has a direct impact on the investigation of many acquaintance-exploitation cases. It is what I call, "say no, yell, and tell" guilt. This is the result of societal attitudes and prevention programs that tell potential child victims to avoid sexual abuse by saying no, yelling, and telling. This might work with the stranger lurking behind a tree. Children who are seduced and actively participate in their victimization, however, often feel guilty and blame themselves because they did not do what they were "supposed" to do. These seduced and, therefore, compliant victims may feel a need to sometimes describe their victimiza- tion in more socially acceptable but inaccurate ways that relieve them of this guilt. Except for child prostitution, most sexual-exploitation-of-children cases in the United States involve acquaintance molesters who rarely use physical force on their victims. Advice to prevent sexual exploitation of children by adult acquaintances is complex and more difficult to implement. How do you warn children about pedophiles who may be their teachers, coaches, clergy members, or neighbors and whose only distinguishing characteristics are that they will treat the children better than most adults, listen to their problems and concerns, and fill their emo- tional and physical needs? Will parents, society, and the criminal-justice system understand when the victimization is discovered or disclosed? Much prevention advice simply does not distinguish to which types of sexual victimization it applies. The right to say "no" would be applied differently to a stranger, parent, or teacher. Although stranger, intrafandlial, and acquaintance child molesters have been described here as seemingly separate and distinct offenders, reality is not so simple. Who is a stranger, a family member, or an acquaintance should all be viewed on a continuum. The concept of who exactly is a "stranger" is not always clear-cut and obvious. It can range from someone never seen before and unknown, to someone seen but nameless, to someone named but unknown, to someone named and slightly known, to someone known from the Internet but never seen, and anyone in between. Every acquaintance offender started as a "stranger" the first time he met any potential child victim. In addition an offender molesting children to whom CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 5 EFTA01728636 he is an acquaintance can also molest children to whom he is a stranger. He might utilize the services of a child prostitute who may or may not know him. The "intrafamilial" molester can range from the biological father, to the stepfather, to mom's live-in boyfriend, to mom's roommate. An intrafamilial offender can molest children other than his own. He may be either a stranger or an acquain- tance to these additional victims. Most acquaintance child molesters use their occupations, hobbies, neighborhoods, or online computers to gain access to child victims; however, in addition to or in lieu of these methods, some romance or marry women who already have children. Such molesters may technically be intrafamilial offenders, but dynamically they are not. An acquaintance molester can be a neighbor the child sees every day or friend the child regularly communi- cates with on the Internet but sees for the first time when they finally meet in person. In this publication the determination of who is an "acquaintance" child molester, therefore, will be based more on the process and dynamics of the child victimization and less on the technical relationship between the offender and child victim. Stranger offenders can use trickery to initially lure their child victims, but tend to control them more through confrontation, threats of force, and physical force. Intrafamilial offenders tend to control their victims more through their private access and family authority. Acquaintance child molesters, although some- times violent, tend to control their victims through the grooming or seduction process. This process not only gains the victim's initial cooperation, but also decreases the likelihood of disclosure and increases the likelihood of ongoing, repeated access. Acquaintance offenders with a preference for younger victims (younger than 12) are more likely to also have to spend time seducing the potential victim's parents or caretakers to gain their trust and confidence. An acquaintance molester who uses violence is more likely to be quickly reported to law enforcement. An acquaintance molester who seduces his victims can some- times go unreported for 30 years or more. The acquaintance child molester might get involved in "abduction," usually by not allowing a child he knows and has seduced to return home. He may wind up abducting or not returning this child easily linked to him because he wants or needs the child all to himself away from a judgmental society Such missing chil- dren often voluntarily go with the offender. Abducting or running away with a child with whom you can be linked is a high-risk criminal behavior. Investigators can more easily identify this abductor and, therefore, find the missing child. Peers who are acquaintances also sexually victimize many adolescents. In order for sexual activity between peers to be a prosecutable crime, it would usually have to involve lack of consent in some form. This is a significant and overlooked problem. The focus of this publication, however, will not include ado- lescents sexually victimized by acquaintances who are peers. The sexual victimization of children by family members and "strangers" are serious and significant problems. This publication, however, will focus on the problem of sexual exploitation of children by adult acquaintances. It will provide insight into the two sides of• this relatively common, but poorly understood, type 6 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728637 of child victimization. The first side involves understanding the predatory, serial, and usually extrafamilial, acquaintance offenders who sexually exploit children through seduction and/or the collection, creation, or distribution of child pornog- raphy. With increasing frequency such offenders are also using online computers and traveling to underdeveloped countries to facilitate their sexual activity with children. The second side involves understanding the child victims as human beings with needs, wants, and desires. Child victims cannot be held to idealistic and superhuman standards of behavior. Their frequent cooperation in their victim- ization must be viewed as an understandable human characteristic that should have no criminal-justice significance. In theory the law recognizes their develop- mental limitations and affords them with special protection. The repeated use, however, of terms such as "rape," "sexual violence," "assault," "attack," "sexually violent predator," and "unwanted sexual activity," when discussing or inquiring about the sexual exploitation of children assumes or implies in the minds of many that all child victims resist sexual advances by adults and are then overpowered by coercion, threats, weapons, or physical force. Although cases with these elements certainly exist, when adults and children have sex, lack of "consent" can exist simply because the child is legally incapable of giving consent. Whether or not the child resisted, said no, and was overpowered are, therefore, not necessar- ily elements in determining if a crime has occurred. Understanding this is especially problematic for the public (i.e., potential jurors) and professionals (i.e., physicians, therapists) who lack specialized training in criminal law and may not rely on strict legal analysis. Both halves of this form of sexual exploitation of children must be recognized, understood, and addressed if these cases are going to be effectively investigated and prosecuted. The sad reality is, however, that such behavior does have significance in the perception of society and "real world" of the courtroom. Society's lack of understanding and acceptance of the reality of acquaintance molestation and exploitation of children often results in ■ failure to disclose and even denial of victimization ■ incomplete, inaccurate, distorted disclosures when they do happen ■ lifetime of victim shame, embarrassment, and guilt ■ offenders with numerous victims over an extended period of time ■ ineffective prevention programs that also make the first four problems even worse This publication hopes to address and improve this situation for the benefit of the victims, investigators, and prosecutors. While society has become increas- ingly more aware of the problem of the acquaintance molester and related problems such as child pornography, the voice calling the public to focus only on "stranger danger" and many child-abuse professionals to focus only on intrafamilial sexual abuse still persists. Sexual-exploitation cases involving acquaintance molesters present many investigative challenges, but they also present the oppor- tunity to obtain a great deal of corroborative evidence and get solid convictions. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 7 EFTA01728638 Definitions In the last chapter a variety of terms were used and deliberately left undefined in order to make a point. Many of these terms are thought to be basic and are, therefore, frequently not defined. Both nonprofessionals and professionals use them regularly. Seeming disagreements and differences of opinion are often the result of con- fusion over definition. Some say that pedophiles can be treated, and others claim that they cannot. Some say there is a connection between missing children and child pornography, and others say there is not. Some people say that communi- ties should be notified when sex offenders move into a neighborhood, others say it is an unproductive violation of privacy. This is not simply a matter of a differ- ence of opinion. Referring to the same thing by different names and different things by the same name frequently creates con- fusion. For example the same 15-year-old individual can be referred to as a(n) "baby," "child," "youth," "juvenile," "minor," "adolescent," "adult," or (as in one forensic psychological evaluation) "underage adult." A father who coerces, a violent abductor, an acquaintance who seduces, a child-pornography collector, or an older boyfriend can all be referred to as a "child molester" or "pedophile." In written and spoken communication definitions are crucial to understand- ing. The problem is that when we use basic or common terms, we rarely define them. What is the difference between the sexual.abuse of children and sexual exploitation of children? What is the difference between child molestation and child rape? What does it mean to someone who reads in the newspaper that a child was the victim of "indecent assault," a child was "sodomized," or an offender was convicted of "indecent liberties" with a child? Terms such as "sexual exploitation of children and youth" or "sexual exploita- tion of children and adolescents" imply that a youth or an adolescent is not a child. At what age does a child become a youth or adolescent? If such a person is sexually victimized, is that considered youth molestation or sexual abuse of adolescents? Although many recognize the importance of definitions, a major problem is the fact that many terms do not have one universally accepted definition. They have different meanings on different levels to different disciplines. For example the dictionary or lay person's definition of a "pedophile" is not the same as the psychiatric definition in the Diagnostic and Statistical Manual of Mental Disorders, 4th edition, Text Revision, commonly referred to as the DSM-IV-TR (American Psychiatric Association, 2000). Legal definitions may not be the same as societal attitudes. The definition problem is most acute when professionals from different disciplines come together to work or communicate abOut the sexual vic- timization of children. Definition are less important when investigating and prosecuting cases and more important when discussing, researching, and writing about the nature and scope of a problem. This publication is an example of the latter. Referring to the same thing by different names and different things by the same name frequently creates confusion. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 9 EFTA01728639 The important point, then, is not that these terms have or should have only one definition but that people using the terms should communicate their defini- tions, whatever they might be and then consistently use those definitions. In order to alert investigators to potential confusion and clarify the intended meaning, below is a discussion of some key terms as used in this publication. luorkTP, Sexual Victimization of Children The term sexual victimization of children is used as the broadest term to encom- pass all the ways in which a child can be sexually victimized. Under this umbrella term are the wide variety of forms of sexual victimization such as sexual abuse of children, sexual exploitation of children, sexual assault of children, and sexual abduction of children. Many professionals do not deal with or realize the wide diversity of ways that children can be sexually victimized. More importantly they may not recognize how these forms of victimization are alike and unalike. Sexual Exploitation of Children The term sexual exploitation of children is difficult to precisely define. This diffi- culty is usually addressed by giving examples instead of a definition. It means different things to different people. For some it implies a commercial or mon- etary element in.the victimization. For many, including the United States federal government, it often implies sexual victimization of a child perpetrated by some- one other than a family member or legal guardian. It is contrasted with the term "sexual abuse" of children, which is used most often to refer to one-on-one intrafamilial abuse. As used in this publication sexual exploitation of children refers to forms of victimization involving significant and complex dynamics that go beyond an offender; a victim, and a sexual act. It includes victimization involving sex rings, child pornography, the use of computers, sex tourism, and child prostitution. Other than child prostitution, the exploitation does not necessarily involve com- mercial or monetary gain. In fact, in the United States, child pornography and sex-ring activity most often result in a net financial loss for offenders. Cns of sexual exploitation of children may involve intrafamilial offenders and victims although this is not typical. Depending on definitions it could be argued that all sexually abused children are exploited, but not all sexually exploited children are abused. For example a child who has been surreptitiously photographed in the nude has been sexually exploited but not necessarily sexually abused. Child prostitution is a significant and often ignored aspect of sexual exploitation. Due to its complexity and the narrow focus of this publication, child prostitution will not be discussed here in any detail. This should in no way be interpreted as meaning that child prostitution is not a serious problem or form of sexual victimization and exploitation of children. Sexual Activity Defining "sexual activity" is not as easy as many people think. Is a sex crime determined by the motivation for the acts or specific acts performed? Sexual victimization of children can run the gamut of "normal" sexual acts from fon- dling to intercourse; however, looking solely at the nature of the acts performed 10 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728640 does not necessarily solve the problem. Seemingly "sexual" behaviors (i.e., vagi- nal or anal intercourse) can be in the service of nonsexual needs and may, in fact, be more motivated by power and/or anger. This is why it is often said that rape, a crime involving obvious sexual activity, is not a sex crime but a crime of violence. Obviously such acts may still be considered sexual assaults by the law even if they were motivated by nonsexual needs. Sex can also include deviant sexual acts involving behavior such as sadomas- ochism, bondage, urination, and defecation. A sexual act for one person might not be a sexual act for another, or it might not be illegal. Some would argue, therefore, that a sex crime is one motivated by sexual gratification. Some acts can be sexual acts if you can prove the intent or motivation of the individual. Are kissing, hugging, or appearing naked in front of a child sexual acts? Are giving a child an enema, taking a child's rectal temperature, having a child spit in a cup, or cutting a child's hair sexual acts? Are a physical examination by a doctor, hands-on wrestling instructions by a coach, or photographing a child playing dead sexual acts? It is common for child molesters when interviewed to admit their acts but deny the intent (i.e., "I was demonstrating a wrestling hold with the child." "I was taking measurements for a study on adolescent growth." "It was part of an initiation ceremony."). All these acts could be sexual acts if you could prove the intent was for sexual gratification. Seemingly "nonsexual" behavior can be in the service of sexual needs. How does an investigator prove intent or motivation? Can a crime have more than one motivation? Can we determine motivation from the offender? We know that offenders are more reluctant to admit sexual motives than other types of motives (i.e., profit, revenge, anger, power). Does the offender always know his motivation? Potential ways to address this problem will be discussed later in this publication. It is important for investigators to realize that some acts may not be crimes even if they can prove they were done for sexual gratification. Photographing children on the playground, tape recording the belching of boys, or listening to children urinate in a public bathroom can be sexual acts for some individuals, but they are most likely not crimes. Other acts involve societal and cultural judgments. Do allowing children to watch adults have sex or gain access to pornography constitute child sexual abuse or child neglect? Should artists, photographers, and therapists have special privi- leges under child-pornography statutes? Can a high-quality artistic photograph taken with an expensive camera and printed on expensive paper still be child pornography? Is it child abuse to ask a child to reenact sexual abuse the child has described? Is it a crime to photograph the reenactment? Is bunting a child's geni- tals with a lit cigarette physical abuse, sexual abuse, or both? Does it ever matter? Yes, the specific motivation might have important investigative or prosecutive significance in some cases. Investigators and prosecutors obviously must look to the law to determine what is a sex offense and the elements of the offense. Some states allow wider latitude in looking at motivation to determine what is a sex crime. In any case, when evaluating the significance and relevance of offender behavior and children's allegations, investigators should always consider both the activity and its motivation. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - II EFTA01728641 Child There clearly can be a conflict between the law and society when it comes to defining a child. Sympathy for victims is inversely proportional to their age and sexual development. Many people using the term sexual abuse of children have a mental image of children 12 or younger. The main problem, therefore, is with the 13- to 17-year-old age group. Those are the child victims who most likely look, act, and have sex drives like adults, but who may or may not be considered children under some laws and by society. Pubescent teenagers can be viable sexual targets of a much larger population of sex offenders.. Unlike one-on-one intrafamilial sexual abuse in which the victim is most often a young female, in many sexual-exploitation cases the victim is a boy between the ages of 10 and 16. Under federal law a sexually explicit photograph of a mature-looking, 16-year-old girl or boy is legally child pornography. Such photographs are not, however, what most people think of when they think of child por- nography. This again reflects the problem of definitions. Arguments about child pornography, such as whether it is openly sold or of interest only to pedophiles, may be primar- ily the result of confusion over its definitions. Adolescents are frequently considered and counted by child advocates as children in order to emphasize the large scope of the child-victimization prob- lem. But then little or nothing said or done about addressing the problem seems to apply to the reality of adolescent victims. If adolescents are considered child victims of sexual exploitation, then their needs, interests, and desires must be realistically recognized and understood when addressing the problem. Legal definitions of who is considered a child or minor vary from state-to- state and even statute-to-statute when dealing with adolescent victims. During a prosecution the definition can even vary from count-to-count in the same indict- ment. The age of the child may determine whether certain sexual activity is a misdemeanor or felony and what degree felony. Issues such as whether the victim consented or whether the offender was a guardian or caretaker can have impor- tant legal significance. Sixteen year olds may be able to consent to have sex with the man down the street, but not with their father or schoolteacher. It is unclear to me how the law evaluates consent when dealing with a 14-year-old boy seduced by a 55-year-old adult. The easiest way for an adult to have sex with a child and come under no legal scrutiny is to marry the child. The age and circum- stances under which a child can marry an adult also vary from state-to-state. To determine who is a child, investigators and prosecutors must again turn to the law. The penal code will legally define who is a child or minor. But they must still deal with their own perceptions as well as those of the jury and society as a whole. In general a child will be defined here as someone who has not yet reached his or her eighteenth birthday. One of the problems in using this broad, but sen- timentally appealing, definition of a child is that it lumps together individuals who may be more unlike than alike. In fact 16 year olds may be socially and physically more like 26-year-old young adults than 6-year-old children. Sympathy for victims is inversely proportional tb their age and sexual development. Paraphilia Paraphffias are psychosexual disorders defined for clinical and research purposes in the Diagnostic and Statistical Manual of Mental Disorders, 4th edition, Text 12 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728642 Revision (DSM-IV-TR)(Arrterican Psychiatric Association, 2000). They are defined there as recurrent, intense, and sexually arousing fantasies, urges, or behaviors that generally involve nonhuman objects, the suffering or humiliation of oneself or one's partner, or children or other nonconsenting persons and that occur over a period of at least six months. Better known and more common paraphilias include exhibitionism (exposure), fetishism (objects), frotteurism (rubbing), pedophilia (child), sexual masochism (self pain), sexual sadism (partner pain), and voyeurism (looking). Less known and less common paraphilias include scatologia (talk), necrophilia (corpses), partialism (body parts), zoophilia (animals), coprophilia (feces), klismaphilia (enemas), urophilia (urine), infantilism (baby), hebephilia (female youth), ephebophilia (male youth), and theoretically many others. In the real world each of the paraphilias typically has slang names (e.g., "big baby" "golden showers," "S&M"); an industry that sells related paraphernalia and props (e.g., restraining devices, dolls, adult-sized baby clothing); a support network (e.g., North American Man/Boy Love Association or NAMBLA, Diaper Pail Fraternity Internet newsgroups and that rooms); and a body of literature (e.g., pornography, newsletters). In fact the paraphilias are the organizational framework or the "Dewey Decimal System" of pornography, obscenity, adult bookstores, and Internet sex chat rooms. Individuals can and frequently do have more than one of these paraphilias. Paraphilias are psychosexual disorders and not types of sex crimes. They may or may not involve criminal activity. Individuals suffering from one or more of these paraphilias can just engage in fantasy and masturbate, or they can act out their fantasies legally (e.g., with consenting adult partners or objects), or they can act out their fantasies illegally (e.g., with nonconsenting partners or underage part- ners). It is their choice. In addition not everyone committing a sex offense has a paraphilia. Their behavior patterns may be criminal, but not fit the specific diag- nostic criteria of a paraphilia. MO and Ritual On an investigative level the presence of paraphilias often means highly repetitive and predictable behavior patterns focused on specific sexual interests that go well beyond a "method of operation" (MO). The concept of an MO—something done by an offender because it works and will help hint get away with the crime—is well known to most investigators. MO usually involves patterns of behavior intended to ensure success, protect identity, and facilitate escape. An MO is fueled by thought and deliberation. Most offenders change and improve their MO over time and with experience. The repetitive behavior patterns of some sex offenders can and do involve some MO, but are more likely to also involve the less-known concept of sexual ritual. Sexual ritual is the repeated engaging in an act or series of acts in a certain manner because of a sexual need; that is, in order to become fully aroused and/or gratified, a person must engage in the act in a certain way. If repeated often enough during sexual activity, some aspects of the MO of sex offenders can; through . behavioral conditioning, become part of the sexual ritual. Other types of ritual behavior can be motivated by psychological, cultural, or spiritual needs or some combination. Unlike an MO, ritual is necessary to the offender but not to the successful commission of the crime. In fad, instead of facilitating the crime, ritual CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 13 EFTA01728643 often increases the odds of identification, apprehension, and conviction because it causes the offender to make need-driven mistakes. Sexual ritual and its resultant behavior are determined by erotic imagery, are fueled by fantasy, and can often be bizarre in nature. Most important to investiga- tors, offenders find it difficult to change and modify their psychological, cultural, spiritual, or sexual ritual, even when their experience tells them they should or they suspect law-enforcement scrutiny. The ritual patterns of sex offenders have far more significance as prior and subsequent like acts than the MO of other types of offenders. Understanding sexual ritual is the key to investigating certain sex offenders. The courts in this country have, however, been slow to recognize and understand the difference between MO and ritual. From an investigative point of view it is not always easy to distinguish between MO and ritual. Every morning putting on your shoes and socks is a noncriminal/nonsexual example of MO. It serves a practical, functional purpose. Every morning putting on your right sock, then your right shoe, hopping once, then putting on your left sock, then your left shoe is a noncriminal/nonsexual example of ritual. It serves only a psychological need. Depending on the offender's intention, blindfolding or tying up a victim could be either MO or ritual. Tying up someone so they cannot resist or escape is MO. Tying up someone for sexual gratification is called bondage and is ritual. The ability to interpret this distinction is in the detailed analysis of the behavior. Investigators must, therefore, keep an open mind and continually accumulate and evaluate even the small details of offender physical, sexual, and verbal behavior. Child Molester The term child molester is fairly common and used by professionals and nonpro- fessionals alike including law-enforcement officers. Although Webster's New World Dictionary defines molest as "annoy, interfere with, or meddle with so as to trouble or harm," it has generally come to convey sexual activity of some type with children. In spite of its common usage, it is surprising how many different images and variations of meanings the term child molester has for different individuals. For many it brings to mind the image of the dirty old man in a wrinkled raincoat hanging around a school playground with a bag of candy waiting to lure little children. For some the child molester is a stranger to his victim and not a father having sex with his daughter. For others the child molester is one who exposes himself to or fondles children without engaging in vaginal or anal intercourse. Still others believe the child molester is a nonviolent offender. Some differentiate between nonviolent child "molesters" who coax or pressure the child into sexual activity and violent child "rapists" who overpower or threaten to harm their vic- tims. Most would probably not apply the term child molester to a man who utilizes the services of an adolescent prostitute. For law-enforcement officers the term child molester is more likely to conform to various legal definitions of sexual molestation set forth in the penal code. For the purposes of this publication a child molester will be defined as a significantly older individual who engages in any type of sexual activity with indi- viduals legally defined as children. When using only the term "child molester," no distinctions will be made between male and female, single and repeat offend- ers, or violent and nonviolent offenders. No distinctions will be made as to whether 14 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728644 the child victims are prepubescent or pubescent, known or unknown, related or unrelated to the offender. Finally no distinctions will be made based on the type of sexual activity engaged in by the offender. Although such distinctions may have important legal and evaluation significance, they have no bearing on whether or not an individual is labeled a child molester. In this publication a child molester is simply a significantly older individual who engages in illegal sexual activity with children. How much older is "significantly older"? Clearly, in many cases, the dynam- ics of the case may be more important than simply the chronological age of the individuals. There are, however, some working guidelines. The rule of thumb that psychiatrists and others use is that there must be an age difference of five years. There are, however, cases in which the age difference is less than five years and yet the sexual behavior seems to fit the power-abuse dynamics of child sexual exploitation. There are also cases in which the age difference is greater than five years, but the behavior does not seem to fit the dynamics. One of the most difficult cases to evaluate is that involving a younger and an older adolescent—for example a 13-year-old girl and a 19-year-old boy. It is more than five years' differ- ence, but is it child sexual exploitation? What does the law say? What does society say? As previously stated the focus of this publication will not include adolescents sexually victimized by acquaintances who are dearly peers. A central theme of this publication is to emphasize the "big-picture" approach to investigation. In short a reported case of a 12-year-old child molester requires an investigation of more than just the reported crime. Many people have the idea that the cycle of abuse only means that child victims grow up and become adult offenders. It can also mean that the same individual is both a victim and offender at the same time. For example say that a man sexually molests a 13-year-old boy. The 13-year-old boy goes home and molests his 7-year-old brother. The 7-year- old brother then molests the baby his mother is babysitting. The investigation of the last activity should lead back to the first crime. Pedophile Although the use of the term child molester is commonplace, publicity and aware- ness concerning sexual victimization of children has resulted in increasing use of the term pedophile. In the DSM-IV-TR, pedophilia is classified as a paraphilia, one of the psychosexual disorders. It is important for investigators to understand that the DSM-IV-TR diagnostic criteria for pedophilia require that there be recurrent, intense, and sexually arousing fantasies, urges, or behaviors involving prepubes- cent children, generally age 13 or younger. The absence of any of the key criteria could technically eliminate the diagnosis. For example an individual who has a strong preference for and repeatedly engages in sex with large numbers of 14 year olds could correctly be evaluated by a mental-health professional as not a pedophile. In spite of this some mental-health professionals continue to apply the term to those with a sexual preference for pubescent teenagers. In addition reach- ing puberty is a complex phenomenon that does not occur overnight or during everyone's thirteenth year. The terms hebephilia and ephebophilia (i.e., sexual preference for pubescent children) are not specifically mentioned in the DSM-IV-TR and are used far less often, even by mental-health professionals. They are, however, being increasingly used in forensic evaluations submitted to the court by defendants attempting to CHILD MPLESTERS: A BEHAVIORAL ANALYSIS - 15 EFTA01728645 minimize their sexual behavior with teenagers. If you can be a hebephile, then you can have a mental disorder but not be a pedophile, and you may be able to confuse the court. Although sexual attraction to pubescent children by adults has the obvious potential for criminal activity, it does not necessarily constitute a sexual perversion as defined by psychiatry. Technically pedophilia is a psychiatric diagnosis that can be made only by qualified psychologists or psychiatrists. For many, therefore, the word is a diagnostic term, not a legal one. At one time the term pedophile was almost exdusively.used by mental-health professionals. Today many people, including the media, routinely refer to those who sexually abuse children as pedophiles. The term pedophile is also being used more and more by law enforcement and prosecutors. It has even entered their slang usage—with some talking about investigating a "pedo case" or being assigned to a "pedo squad." Although people in the United States most often pronounce the "ped" in "pedophilia" as the "ped" in "pedestrian" <from the Latin for foot), the correct pronunciation is "ped" as in "pediatrician" (from the Greek for child). This increasing use has to some degree brought this term outside the exclu- sive purview of psychiatric diagnosis. Just as someone can refer to another as being "paranoid" without implying a psychiatric diagnosis or assuming psychiat- ric expertise, a social worker, prosecutor, or law-enforcement officer can refer to an individual who has sexually victimized a child as a pedophile. Webster's New Collegiate Dictionary contains a good layperson's definition for pedophilia: "sexual perversion in which children are the preferred sexual object." For the purposes of this publication the term "pedophile" when used will be defined as a significantly older individual who prefers to have sex with individu- als legally considered children. Pedophiles are individuals whose erotic imagery and sexual fantasies focus on children. They do not settle for child victims, but; in fact, dearly prefer to have sex with children. The law, not puberty, will deterniine who is a child. 16 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728646 It is important to realize that to refer to someone as a pedophile is to say only that the individual has a sexual pref- erence for children. It says little or nothing about the other aspects of his character and personality. To assume that someone is not a pedophile simply because he is nice, goes to church, works hard, is kind to animals, helps abused children, reports finding child pornography on the Internet to law enforcement, and/or searches for missing children is absurd. Pedophiles span the full spectrum from saints to monsters. In spite of this fact, over and over again pedophiles are not recognized, investigated, charged, con- victed, or sent to prison simply because they are "nice guys." One of the best indicators of the continuing lack of under- standing of the nature of pedophilia is that the media and society still view as a contradiction the fact that someone could be a caring, dedicated teacher (e.g., clergy member, coach, doctor, children's volunteer) and sexually victimize a child in his care. The vast majority of dedicated school- teachers are not pedophiles, but many pedophiles who become schoolteachers are dedicated teachers. It is also important to recognize that while pedophiles prefer to have sex with children, they can and do have sex with adults. Adult sexual relationships are more difficult for some pedophiles than for others. Some pedophiles have sex with adults as part of their effort to gain or continue their access to preferred children. For example one might have occasional sex with a single mother to ensure continued access to her children. Pedophiles span the full spectrum from saints to monsters. In spite of this fact, over and over . again pedophiles are not recognized, investigated, ' charged, convicted, or sent to prison simply because they are 'nice guys.' CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 17 EFTA01728647 Law-Enforcement Typology C PS ell IlW1S There is still confusion, even among professionals, with regard to the terms child molester and pedophile. For many the terms have become synonymous. For them the word pedophile is just a fancy term for a child molester. The public, the media, and many child-abuse professionals frequently use the terms interchange- ably and simplistically refer to all those who sexually victimize children as pedophiles. There is no single or uniform definition for the word "pedophile." As previously stated, for mental-health professionals, it is a psychiatric diagnosis with specific criteria. Labeling all child molesters as pedophiles is, however, confusing. There are dear differences between the types of individuals who sexually abuse children, and law-enforcement officers handling these cases need to understand that and make such distinctions when appropriate. Not all pedophiles are child molesters. A child molester is an individual who sexually molests children. A pedophile might have a sexual preference for chil- dren and fantasize about having sex with them, but if he does not act on that preference or those fantasies, he is not a child molester. Whether or not a person acts on deviant sexual fantasies and urges may be influenced by other factors such as personality traits, the severity of psychosocial stressors, personal inhibi- tions, substance abuse, or opportunities. Inhibiting factors such as guilt, moral beliefs, or fear of discovery may limit or reduce the sexual activity with children. Some pedophiles might act out their fantasies in legal ways by simply talking to or watching children and later masturbating. Some might have sex with dolls and mannequins that resemble children. Some pedophiles might act out their fantasies in legal ways by engaging in sexual activity with adults who look (small statured, flat-chested, no body hair), dress (children's underwear, school uniform), or act (immature, baby talk) like young children. Others may act out child fan- tasy games with adult prostitutes. A difficult problem to detect and address is that of individuals who act out their sexual fantasies by socially interacting with chil- dren (i.e., in-person or via an online computer), or by interjecting themselves into the child-sexual-abuse or exploitation "problem" as overzealous child advocates (i.e., cyber vigilantes). It is almost impossible to estimate how many pedophiles exist who have never molested a child. What society can or should do with such individuals is an interesting area for discussion but beyond the role of inves- tigators or prosecutors. People cannot be arrested and prosecuted just for their fantasies. Not all child molesters are pedophiles. A pedophile is an individual who prefers to have sex with children. A person who prefers to have sex with an adult partner may, for any number of reasons, decide to have sex with a child. Such reasons might include simple availability, opportunity, curiosity, or a desire to hurt a loved one of the molested child. The erotic imagery and sexual fantasies of such individuals are not necessarily recurrent, intense, and focused on children; therefore, these people are not pedophiles. Are child molesters with adolescent victims pedophiles? Is an individual who collects both child and adult pornography a pedophile? Is everyone using a com- puter to facilitate having sex with children or trafficking in child pornography a pedophile? Many child molesters are, in fact, pedophiles, and many pedophiles CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 19 EFTA01728648 are child molesters. But they are not necessarily one and the same. Often it may be unclear whether the term is being applied with its diagnostic or some other definition. Most investigators and prosecutors are not qualified to apply the term with its diagnostic meaning. Distinctions between the types of child molesters, however, can have important and valuable implications for the law-enforcement investigation of sexual exploitation of children. Most classification systems for child molesters were developed for and are used primarily by psychiatrists and psychologists evaluating and treating them. These systems and the DSM-IV-TR diagnostic system usually require that the offender be identified and available for evaluation. This publication will set forth a model for law enforcement that places sex offenders along a motivational con- tinuum and into several patterns of behavior. These categories are not intended for use by mental-health professionals or clinicians. They are intended for use by law-enforcement officers and prosecutors in evaluating cases and developing the evidence needed to identify, arrest, and convict child molesters. If the investigat- ing officer already has enough evidence to convict a child molester, then it may be of little importance whether or not the molester is a pedophile or any other category of offender. But if the investigator is still attempting to develop incriminat- ing evidence, such distinctions can be invaluable. Even if there is enough evidence to convict a child molester, the fact that a molester is a certain type of sex offender could still be important in evaluating the potential for additional child victims and other types of criminal behavior. A3P raircirl-nif When the only evidence offered is the word of a child against the word of an adult, child sexual victimization can be difficult to prove in a court of law. More- over, many factors combine to make testifying in court difficult and possibly traumatic for children. Children seduced by acquaintance molesters are particu- larly ashamed, embarrassed, or guilt-ridden about their victimization. They often have conflicted feelings about the offender and may find it particularly difficult to confront him in court. Despite some recent advances that make such testimony easier for the child victim or witness, the primary objective of every law-enforce- ment investigation of child sexual abuse and exploitation should be to prove a valid case without child-victim testimony in court. Obviously, in a valid case, the best and easiest way to avoid child-victim testimony in court is to build a case that is so strong that the offender pleads guilty. Failing that most children can testify in court if necessary, and the additional evidence bolsters their testimony. Frequently there is more evidence available than the investigator realizes. Much of this evidence can be identified and located only if the investigator has a solid under- standing of offender motivations, behavior patterns, and the different kinds of child molesters. There is one answer to the questions investigators most commonly ask about child molesters such as "What is the best way to interview them?" "Do they collect child pornography?" "How many victims do they have?" "Can they be reliably polygraphed?' "Can they be treated?" "Can I use an expert search war- 20 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728649 yketrentP-8(270til 6,141. 07 rant?" "Should the community be notified if one lives in the area?" The answer to all these questions is—"It depends." It depends on what kind of child molester you have. Understanding and documenting offender patterns of behavior is one of the most important and overlooked steps in the assessment and corroboration of cases. If investigators and prosecutors accept the fact that there are different kinds of child molesters and those differences can have criminal-justice signifi- cance, then they need a cl ssification system or typology to label and distinguish among them. Obtaining the kind of comprehensive, accurate, and reliable infor- mation necessary to effectively apply a typology, however, is far more difficult than developing a typology. Law enforcement has frequently accepted offender categories and character- istics developed by therapists and criminologists. These typologies, such as the DSM-IV-TR, primarily serve the needs of mental-health professionals and have limited application to those of law enforcement. These typologies are usually developed after data collection from offenders after arrest or conviction and often reflect unsubstantiated information about prearrest behavior. It is the prearrest or preidentification behavior of child molesters that is of most value to law enforcement. In addition law enforcement usually does not have the luxury of having a known, confessed offender in front of them. Law enforcement and prosecutors need a typology that can be applied before the perpetrator is identified or case is proven in court. Too often the terms child molester and pedophile are simplisti- cally used interchangeably or without defining them. As previously stated not all child molesters are pedophiles, and there is a definite need for a law-enforcement typology to clear up the confusion. rilitt i. A -r consulting on hundreds of cases in my work at the FBI Academy and not finding a typology that fit law-enforcement needs, I decided to develop my own typology of child molesters for criminal-justice professionals. I deliberately avoided all use of diagnostic terminology (e.g., pedophile, psychopath, antisocial-person- ality disorder) and used instead descriptive terms. After developing the basic categories, I consulted with Dr. Park Dietz, a forensic psychiatrist. Similarly Dr. Dietz advised that in his work he sometimes divided sex offenders into the two broad categories of situational and preferential (Dietz, 1983). His concept was totally consistent with my new typology. With his permission I then incorporated the use of these descriptive terms into my typology and expanded on his ideas. Child Molesters: A Behavioral Analysis :(311t•tiltrilit9, Regressed Table 1 Sexually Indiscriminate CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 21 EFTA01728650 My original typology of child molesters was developed in the mid-1980s and published and widely disseminated by the National Center for Missing & Exploited Children (NCMEC) in a monograph titled Child Molesters: A Behav- ioral Analysis (Lanning, 1986). It was revised in April 1987 (Lanning, 1987) and again in December 1992 (Lanning, 1992a). It divided child molesters into two categories (Situational or Preferential) and into seven patterns of behavior. In the years that followed, I presented this typology at training conferences all over the world, and I applied it to and continued to learn from thousands of cases. (See Table 1.) I a I T Y P Although:ay old typology was still useful, its limitations gradually became evident to me. I realized that complex human behavior did not easily fit into neat little boxes. I, therefore, slowly began to revise it, and it has been updated by the typology presented here. This newer typology places all sex offenders, not just child molesters, along a motivational continuum (Situational to Preferential) instead of into one of two categories. It is a continuum, not one or the other. The patterns are not necessarily mutually exclusive. Because an offender is motivated predominately by deviant sexual needs, does not mean he cannot also be moti- vated by some nonsexual needs. Offenders can demonstrate both situational and preferential motives and behavior patterns, but with usually one more dominant. Offenders must be placed along the continuum based on the totality of known facts. It is a motivational continuum and motivation can be difficult to determine. Motivation is most often evaluated and determined by behavior patterns as well as other indicators and evidence. (See Table 2.) At one end of the continuum are the more "situational" sex offenders. Although they can be smart and rich, they tend to be less intelligent and more likely from lower socioeconomic groups. Their criminal sexual behavior tends to be in the service of basic sexual needs (Le., "hominess" and lust) or nonsexual needs (i.e., power and anger). Their sexual behavior is often opportunistic and impulsive, but primarily thought-driven. They are more likely to consider the risks involved in their behavior, but often make stupid or sloppy mistakes. If they collect pornography, it is often violent in nature, reflecting their power and anger needs. Their thought-driven criminal sexual behavior tends to focus on general victim characteristics (e.g., age, race, gender) and their perception of them- selves as entitled to the sex. Much of their criminal behavior is intended to simply obtain and control their victims. Their verbal skills are usually low and they are more likely to use physical violence to control victims. They are more likely to have a history of varied crimes against both person and property. Their sex crimes are usually either spontaneous or planned. Their victims tend to be targeted based primarily on availability and opportunity. They are more likely to use practical tools (e.g., weapons, lock picks, gloves, masks) and learn from and then modify their criminal sexual behavior. Their patterns of criminal sexual behavior are more likely to involve the previously discussed concept of method of operation. 22 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728651 Motivation Continuum Biological/Physiological Sexual Needs awl Power/Anger Nonsexual Needs PsychosexuaUDeviant miamsseinam Sexual Needs (Not one or the other, but a continuum) Situational Sex Offender (>More Likely) Preferential Sex Offender (>More Likely) Less Intelligent Lower Socioeconomic Status Personality Disorders Such As Antisocial/Psychopathy Narcissistic Schizoid Varied Criminal Behavior . . . Violent Pornography Impulsive Considers Risk Sloppy Mistakes Thought-Driven Spontaneous or Planned • Availability • Opportunity • Tools • Learning MO Patterns of Behavior • Works • Dynamic More Intelligent Higher Socioeconomic Status Paraphilias Such As Pedophilia Voyeurism Sadism Foctisledorirninal Behavior - . . . _ Theme Pornography Compulsive Considers Need Needy fvlistakes' Fantasy-Driven Script:: AtiitRion, Rehearsal Props Critique Ritual Patterns of Behavior Need Static Table 2 CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 23 EFTA01728652 Situational-type sex offenders victimizing children do not have a true sexual preference for children. They may molest them, however, for a wide variety of situational reasons. They are more likely to view and be aroused by adult pornog- raphy, but might engage in sex with children in certain situations. Situational sex offenders frequently molest readily available children they have easy access to such as their own or those they may live with or have control over. Pubescent teenagers are high-risk, viable sexual targets. Younger children may also be targeted because they are weak, vulnerable, or available. Morally indiscriminate situational offenders may select children, especially adolescents, simply because they have the opportunity and think they can get away with it. Social misfits may situationally select child victims out of insecurity and curiosity. Others may have low self-esteem and use children as substitutes for preferred adults. At the other end of the motivation continuum are the more "preferential" sex offenders. Although they can be unintelligent and poor, they tend to be more intelligent and more likely from higher socioeconomic groups. Their criminal sexual behavior tends to be in the service of deviant sexual needs known as paraphilias. This behavior is often persistent and compulsive and is primarily fantasy-driven. Their erotic imagery creates and repeated fantasy over time then fuels the needs. They are more likely to consider these needs rather than the risks involved and therefore make "needy" mistakes that often seem almost stupid. When they collect pornography and related paraphernalia, it usually focuses the themes of their paraphilic preferences. Their fantasy-driven behavior tends to focus not only on general victim characteristics and their entitlement to sex, but also on their paraphilic preferences including specific victim preferences; their relationship to the victim (i.e., teacher, rescuer, mentor); and their detailed scenario (i.e.; education, rescue, journey) (Hazelwood & Warren, 2001). Their crimi- nal sexual behavior is rooted in their sexual fantasies and need to turn fantasy into reality. Their verbal skills are usually high, and they are less likely to use physical violence to control victims. They are more likely to have a history of primarily sex offenses. Their sex crimes usually stem from a fantasy-fueled and elaborate script that is far more detailed and elaborate (i.e., dialogue, exact sequence, clothing) than the "plan" of a situational-type sex offender or common criminal. They tend to "audition" their potential victims, selecting them primarily based on their simi- larity to and consistency with that script. There can be a lengthy "rehearsal" or grooming process leading up to the victimization. They are more likely to use fantasy "props" (i.e., fetish items, costumes, toys) and critique the activity, but not necessarily learn from or then modify their criminal sexual behavior. Their patterns of behavior are more likely to involve the previously discussed concept of ritual. As this descriptive term implies, preferential-type sex offenders have specific sexual preferences or paraphilias. For instance those with a preference for chil- dren could be called "pedophiles." Those with a preference for peeping could be called voyeurs, and those with a preference for suffering could be called sadists. But one of the purposes of this typology is to limit the use of these diagnostic terms for investigators and prosecutors. Preferential-type sex offenders are more likely to view, be aroused by, and collect theme pornography. A pedophile would be just one example or subcategory of a preferential sex offender. A preferential sex offender whose sexual preferences do not include children, and is therefore not a pedophile, cart still sexually victimize children. 24 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728653 As previously stated this new typology is a continuum. A preferential sex offender can have some of the motives and behavior patterns of a situational sex offender and vice versa. It is a matter of degree. For example in one case an offender who was a schoolteacher had a child-pornography videotape mailed to him at the school where he worked. The "smart" thing to do would have been to take it home and view it in privacy; however, the teacher took it to a videocassette recorder (VCR) at the school for immediate viewing. This was a fantasy-driven, "needy" mistake typical of preferential sex offenders. To make it worse he forgot to move a switch, and the tape was shown on numerous moni- ton around the school leading to his identification. This was a "sloppy" mistake. Although this typology continuum will be applied here primarily to child molesters, it can be applied to any sex offender. Nuisance sex offenders (e.g., window peepers, fetish burglars, obscene telephone callers, flashers) are the sex offenders most likely to exhibit predominately preferential motives and patterns. Child molesters are more evenly distributed between offenders exhibiting pre- dominately preferential and situational motives and patterns. Offenders who rape adults are the sex offenders most likely to exhibit predominately situational motives and patterns. In my opinion this is why one hears it said so often that rape is not about sex and is not really a sex crime. In spite of this common and "politically correct" view, some rapists are preferential-type sex offenders and for them rape is primarily about sex. One rarely hears it said, however, that child molesting is not about sex or not a sex crime. This is most likely due to the fact that more child molesters exhibit preferential patterns of sexual behavior and do not use physical force or violence to control their victims. Situational-Type Child Molesters The situational-type child molester does not usually have compulsive-paraphilic sexual preferences including a preference for children. He may, however, engage in sex with children for varied and sometimes complex reasons. For such a child molester, sex with children may range from a "once-in-a-lifetime" act to along- term pattern of behavior. The more long-term the pattern, the further down the continuum he may move. He will exhibit more and more of the behavior pat- terns of the preferential-type offender. The situational-type molester usually has fewer child victims. Other vulnerable individuals, such as the elderly, sick, or disabled, may also be at a risk of sexual victimization by him. For example the situational-type child molester who sexually abuses children in a daycare center might leave that job and begin to sexually abuse elderly people in a nursing home. Situational offenders are not "better" than nor as "bad" as preferential offenders; they are just' ifferent. Within this category at least three major patterns of behav- ior emerge. These regressed, morally indiscriminate, and inadequate patterns are described below. Regressed Such an offender usually has low self-esteem and poor coping skills; he turns to children as a sexual substitute for the preferred-peer sex partner. Pre- cipitating stress may play a bigger role in his molesting behavior. His main victim criterion seems to be availability, which is why many of these offenders molest their own children. His principal method of operation is to coerce the child into having sex. This type of situational child molester may or may not collect child or adult pornography. If he does have child pornography it will usually be the "best CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 25 EFTA01728654 kind" from an investigative point of view—homemade photographs or videos of the child he is molesting. Morally Indiscriminate For this offender the sexual victimization of children is simply part of a general pattern of abuse in his life. He is a user and abuser of people. He abuses his wife, friends, and coworkers. He lies, cheats, or steals whenever he thinks he can get away with it. He molests children for a simple reason—"Why not?" His primary victim criteria are vulnerability and opportu- nity. He has the urge, a child is available, and so he acts. He typically uses force, lures, or manipulation to obtain his victims. He may abduct his victims using trickery or physical force. Although his victims frequently are strangers or acquaintances, his victims can also be his own children or those of his live-in girlfriend. An incestuous father (or mother) might be this morally indiscriminate offender. Because he is an impulsive person who lacks conscience, he is an espe- cially high risk to molest pubescent children. Such acts may be criminal but not necessarily sexually deviant. He frequently collects detective magazines or adult pornography of a violent nature. He may collect some child pornography espe- cially that which depicts pubescent children. Even when his child victims are acquaintances, he may still use threats and force to overpower or control those victims. Inadequate This pattern of behavior is difficult to precisely define and includes those suffering from psychoses, eccentric personality disorders, mental retarda- tion, and senility. In layperson's ternis he is the social misfit, the withdrawn, the unusual. He might be the shy teenager who has no Mends of his own age or eccentric loner who still lives with his parents. Although most such individuals are harmless, some can be child molesters and, in a few cases, even child killers. This offender seems to become sexually involved with children out of insecurity or curiosity. He finds children to be nonthreatening objects with whom he can explore his sexual interests. The child victim could be someone he knows or a random stranger. In some cases the child victim might be a "stranger" selected as a substitute for a specific adult, possibly a relative of the child, whom the offender is afraid of approaching directly. Often his sexual activity with children is the result of built-up impulses. Some of these individuals find it difficult to express anger and hostility, which then builds until it explodes—possibly against their child victim. Because of mental or emotional problems, some might fake out their frustration in cruel sexual torture. His victims, however, could be among the elderly as well as children—anyone who appears helpless at first sight. He might collect pornography, but it will most likely be of adults. Almost any child molester might be capable of violence or even murder to avoid identification. In spite of a few notable exceptions, most of the sexually motivated child murderers profiled and assessed by the FBI have involved situ- ational-type child molesters who display morally indiscriminate and inadequate patterns of behavior. Low social competence seems to be the most significant risk factor in why a child molester might abduct his victims (Laming, 1995). Preferential-Type Child Molesters Preferential-type child molesters have definite sexual inclinations. For many that preference includes children, and they are the ones it would be most appropriate 26 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728655 to refer to as pedophiles. Some preferential-type sex offenders without a prefer- ence for children do, however, molest children. They might do so in order to carry out their bizarre sexual fantasies and preferences with young less threaten- ing, less judgmental, and highly vulnerable victims. Some of these offenders' sexual activity with children may involve deviant acts they are embarrassed or ashamed to request or do with a more experienced adult partner they actually prefer. Such offenders, even if they do not have a sexual preference for children, would still be preferential sex offenders and, therefore, engage in similar patterns of behavior. Those with a definite preference for children (i.e., pedophiles) have sexual fantasies and erotic imagery that focus on children. They have sex with children not because of some situational stress or insecurity but because they are sexually attracted to and prefer children. They have the potential to molest large numbers of child victims. For many of them their problem is not only the nature of the sex drive (attraction to children), but also the quantity (need for frequent and repeated sex with children). They usually have age and gender preferences for their victims. Their sexual preference for children may also be accompanied by other paraphilic preferences. (See the chapter titled "Problem Areas" beginning on page 31.) Preferential-type child molesters seem to prefer more boy than girl victims. Within this category at least four major patterns of behavior emerge. The seduction, introverted, sadistic, and diverse patterns are described below. Seduction This pattern characterizes the offender who engages children in sexual activity by "seducing" them—grooming them with attention, affection, and gifts. Just as one adult courts another, he seduces children over a period of time by gradually lowering their sexual inhibitions. His victims arrive at the point where they are willing to trade "sex" for the attention, affection, and other benefits they receive from the offender. Offenders with a preference for younger children might also spend time "seducing" the parent(s). When victimizing such young children, the sex is often made part of a game or horseplay and usually not completely understood as real sex by the children. Most of these offenders are simultaneously involved with multiple victims. (See the chapter titled "Acquaintance-Exploita- tion Cases" beginning on page 47.) This may include a group of children in the same class at school, scout troop, or neighborhood. The characteristic that seems to make this individual a master seducer of children is his ability to identify with them. He knows how to talk to children but, more importantly, he knows how to listen to them. His adult status and authority are also an important part of the seduction process. All children are at risk from such seduction, but offenders frequently select as targets children who are from dysfunctional homes or victims of emotional or physical neglect. The biggest problem for this child molester is not how to obtain child victims but how to get them to leave after they are too old. This child molester is likely to use threats and physical violence only to avoid identification and disclosure or prevent a victim from leaving before he is ready to "dump" the victim. The majority of acquaintance child molesters fall into this pattern of behavior.. Introverted This pattern of behavior characterizes the offender whose preferences include children but he lacks the interpersonal skills necessary to seduce them. He, therefore, typically engages in a minimal amount of verbal communication with his victims and usually molests strangers or especially young children. He is CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 27 EFTA01728656 like the old stereotype of the child molester in that he is more likely to hang around playgrounds and other areas where children congregate, watching or engaging them in brief sexual encounters. He may expose himself to children or make obscene telephone calls to children. He may utilize the services of a child prostitute, travel to a foreign country, or use the Internet to communicate with children. Unable to figure out any other way to gain access to a child, he might even marry a woman and have his own children, very likely molesting them from the time they are infants. He is similar to the inadequate situational-type child molester, except that he has more definite deviant sexual preferences, and his selection of children as victims is more predictable. His victims could be acquaintances, but he is far less likely to be simultaneously involved with multiple child victims. Sadistic This pattern of behavior characterizes the offender whose sexual prefer- ences predominately include the need to inflict psychological or physical pain or suffering on his victims in order to be aroused or gratified. He is aroused by his victim's response to the infliction of pain or suffering. He typically uses lures or force to gain access to his victims. He is more likely than other preferential-type child molesters to abduct and even murder his victims. In order to escape detec- tion, a sexual sadist, even one with extraordinary interpersonal skills, may try to abduct victims who are not acquaintances and to whom he cannot be linked. There have been some cases where seduction acquaintance molesters have become sadistic molesters. It is not known whether the sadistic needs developed late or were always there and surfaced for some reason (i.e., inhibitions overcome, sadistic interests fueled and validated on the Internet). Once a sadistic offender engages in severe sexual sadism with an acquaintance child victim, it is difficult to prevent disclosure and escape identification without killing or otherwise dis- posing of the victim. In any case it is fortunate that sadistic child molesters do not appear to be large in number. Diverse This pattern was called the "sexually indiscriminate" in my old typology and was under the situational-child-molester category. Although the general pattern was always preferential, the molestation of the child was situational and described as such in the old typology. Because so many of these varied sexual- behavior patterns are preferential, however, they are more clearly described as such in this new typology. Although the previously described morally indiscriminate offender can also be a sexual experimenter, this diverse offender differs in that he often appears to be discriminating in his behavior eiccept when it comes to sex. He is the "try- sexual" —willing to try anything sexual that he prefers. While he may have dearly defined paraphilic or sexual preferences such as bondage, peeping, fetishism—he has no strong sexual preference for children. The sadistic offender could be included in this category, but his criminal sexual behavior is so significant that it merits its own category. The basic motivation of this diverse offender in victimiz- ing children is often sexual experimentation. His main criteria for including children may be that they are new or less threatening. He usually involves chil- dren in his previously existing sexual interests and activity. Such offenders may victimize children as part of some humiliating, taboo, or forbidden sex. It is important to realize that these children may be his own or ones he has gained 28 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728657 access to through "marriage." Although much of his paraphilic sexual activity with adults may not be criminal, such an individual may provide his children to other adults or use the children of other adults as part of group sex, spouse-swap- ping activity, or even as part of some bizarre rituaL He may be involved in Internet communication with a woman who he encourages to have sex with her children as part of their "kinky" sex and let him watch online or send him the visual images. karlibatcacesiiii The purpose of this descriptive typology is not to gain insight or understanding about why child molesters have sex with children in order to help or treat them, but to recognize and evaluate how child molesters have sex with children in order to identify, arrest, and convict them. Things such as what evidence to look for, whether there are additional victims, how to identify those victims, and how to interview a suspect depend on the type of child molester involved. There are many advantages to the use of this criminal-justice, descriptive typology. If there is a need to distinguish a certain type of sex offender, this typol- ogy provides a name or label instead of just calling them "these guys." The label is professional in contrast to referring to them as "perverts," "sickos," or worse. Because the terms are descriptive (not diagnostic) and probative (not prejudicial), they may be more acceptable in reports, search warrants, and testimony by crimi- nal-justice professionals. For example the currently popular term "predator" might be considered too prejudicial for some court testimony. The continuum concept also better addresses the complexity of and changes in human behavior. Using the term "preferential sex offender" instead of "preferential child molester," addresses the issue of applying it to offenders who collect child pornography without physically molesting children. The one term, preferential sex offender, eliminates the need for investigators and prosecutors to distinguish between child- pornography collectors and child molesters, between pedophiles and hebephiles, and among numerous other paraphilias. How to recognize and identify such offenders will be discussed shortly. Investigators might argue that it is their job to investi- gate individuals who violate the law, and whether or not that offender is a pedophile or preferential sex offender is of little importance to them. There is no legal requirement to determine that a subject or suspect in a case is a pedo- phile or preferential-type sex offender. Often it is irrelevant to the investigation or prosecution. There are, however, dear differences between the types of individuals who sexually victimize children, and investigators and prosecutors han- dling these cases sometimes need to make such distinctions. The terms situational and preferential sex offender are merely descriptive labels to be used only to identify, for investigative and prosecutive purposes, a certain type of offender. The terms do not appear in the DSM-IV-TR, and they are not intended to imply or be used for a clinical diagnosis. Although there is not a "profile" that will determine if someone is a child molester, preferential sex offenders tend to engage in highly predictable and rec- The purpose of this descriptive typology is not to gain insight or understanding about why child molesters have sex with children in order to help or treat them, but to recognize and evaluate how child molesters have sex with children in order to identify, arrest, and convict them. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 29 EFTA01728658 ognizable behavior patterns. The potential evidence available as a result of the long-term, persistent, and ritualized behavior patterns of many sexual exploiters of children makes these cases almost "investigators' heaven." Need-driven behavior leads to bewildering mistakes. For example why would a reasonably intelligent individual do such things as use his computer at work to download child pornography, deliver his computer filled with child pornography for repair, send his film with child pornography on it to a store to be developed, appear in child-pornography images he is making, discuss engaging in serious criminal activity with a "stranger" he met on the Internet, transmit identifiable photographs of himself to such an individual, maintain incriminating evidence knowing investigators might soon search his home or computer, give inves- tigators permission to search his home or computer knowing it contains incriminating evidence, give investigators the names of victims or former victims as character references, agree to be interviewed without his lawyer? Many investigators like to jokingly refer to such behavior as examples of "crimi- nal stupidity" Defense attorneys might argue that such behavior indicates their clients are innocent, lack criminal intent, or are not criminally responsible. Why else would an intelligent individual do something so obviously "stupid"? Such behavior does not necessarily mean the offender is stupid; insane, or not crimi- nally re.sponsible. Another explanation is much more probable—it is need-driven. The fantasy- or need-driven behavior of preferential sex offenders has little to do with thinking. It is what makes preferential sex offenders so vulnerable to proac- tive investigations even though the techniques used have been well publicized. If necessary an expert could be used to educate the court concerning certain pat- terns of behavior. The use of such an expert was upheld in United States v. Romero, 189 F.3d, 576 (7" Cir. 1999). 30 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728659 Problem Areas In applying any typology the law-enforcement officer must recognize the diffi- culty of attempting to put complex human behavior into neat categories. There are few absolutes in human behavior. The words "always" and "never" rarely apply, except to say there will always be exceptions and difficulties. One of the biggest problems with any diagnostic or classification system is taking the time to carefully and properly apply it. Because of lack of training or heavy work loads, investigators, social workers, and prosecutors frequently do not take the time to adequately evaluate offender patterns of behavior. Split-second decisions and stereotypes often determine how an alleged perpetrator is classified and investigated. The law-enforcement typology described in the chapter titled "Law-Enforcement Typology" (beginning on page 19) involves placing sex offenders along a motivational continuum (Situational to Preferential) instead of into one of two categories and then child molesters into seven subcategories of patterns of behavior. As previously stated these patterns of behavior are not necessarily mutually exclusive. o et a on A pedophile might have other psychosexual disorders, personality disorders, or psychoses or may be involved in other types of criminal activity. A pedophile's sexual interest in children might be combined with other sexual deviations (paraphilias), which include indecent exposure (exhibitionism), peeping (voyeur- ism), obscene telephone calls (scatologia), exploitation of animals (zoophilia), urination (urophilia), defecation (coprophilia), binding (bondage), baby role- playing (infantilism), infliction of pain (sadism, masochism), and real or simulated death (necrophilia). The pedophile is interested in sex with children that might, in some cases, involve other sexual deviations. The morally indiscriminate or diverse-type child molester is interested in a variety of sexual deviations that might, in some cases, involve children. There are cases in which pedophiles are also psychopathic con artists, paranoid survivalists, or even serial killers. One particularly difficult offender to deal with is the morally indiscrimi- nate pedophile. If an offender has a sexual preference for children and at the same time has no conscience, there is no limit to how he might sexually victimize chil- dren. He does not have to spend a lot of time validating his behavior. Such an offender is more likely to abduct or murder children. While his preferential sexual interest in children affects his victim selection, however, most of his behavior is determined by a stunning lack of conscience. He is best viewed as a morally indis- criminate offender and should be investigated and interviewed as such. When an offender seems to fit into more than one pattern of behavior, it is best to choose the broadest or most comprehensive one. The word "nuisance" is an unfortunate but descriptive term commonly applied to sex offenses that occur frequently and are viewed as causing little or no harm (i.e., financial loss or physical injury). Examples with which most investigators are familiar include window peepers (voyeurism), flashers (exhibitionism), and CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 31 EFTA01728660 obscene callers (scatologia). Nuisance sex offenders are often linked to the sexual paraphilias. As previously stated nuisance sex offenders are the sex offenders most likely to exhibit predominately preferential motives and patterns. These cases, therefore, are highly solvable if the cases can be captured and linked and the patterns and rituals can be identified. They are usually given a low priority and not solved because ■ most incidents are not reported to law enforcement ■ when they are reported they are either not recorded or recorded in a way that makes retrieval difficult ■ little, if any, manpower and resources are committed to the investigation ■ law-enforcement agencies frequently do not communicate and cooperate with each other concerning these cases ■ the crimes often involve minor violations of the law Importance Investigators dealing with the sexual exploitation of children need to be inter- ested in and concerned about nuisance sex offenses because of progression, substitution, assessment and evaluation, and corroboration. Progression Sex offenders can progress in types of victims; types of acts; frequency, intensity, skill of crimes; and physical and emotional harm to a victim. Many sex offenders progress in gaining confidence and acting out their deviant sex fantasies by moving from inanimate objects to paid adult partners (prostitutes) to compliant adult partners and then to crime victims who are fun- ny members, acquaintances, or strangers. Although prostitution is a crime, the acting-out behavior is usually criminal only when the victims are children or nonconsenting adults. The violence used by sex offenders can also progress. They can progress to violence and in violence. Their sexual violence can be part of general aggression or true sexual sadism. It can be incidental to the sex crime or an integral part of it. Almost any sex offender can become violent to avoid discovery or identification. If the sex offender's preference includes children (i.e., pedophilia), this progression can obviously lead to child victims. Nuisance sex offenses with child victims can be part of the evolving process of a pedophile developing his criminal skills and overcoming inhibitions. The nuisance offenses with the child victims can also be because the pedophile has other paraphilias and a sexual interest in these particular behaviors (i.e., indecent exposure, obscene calls, peeping) with children. Substitution Many preferential sex offenders who commit these nuisance sex offenses do not have a sexual preference for children but often select child victims because they are ashamed and embarrassed over their deviant sexual preferences or because the children are more vulnerable and less intimidating. Some of them select children as victims when the true target or victim is a relative of the child or someone linked to the child in some way. This indirect victimiza- tion is even more likely if the child victim is especially young and incapable of understanding and providing the anticipated reaction to the "nuisance" sexual behavior (i.e., obscene notes and photographs, indecent exposure). 32 - CI-MD Maness: A BEHAVIORM. ANALYSIS EFTA01728661 Assessment and Evaluation Understanding the paraphilias and considering both the activity and its motivation are an important part of assessing and evaluating the significance and relevance of offender behavior and children's allegations. This can be useful when child victims describe what sounds like bizarre activity involving things such as urine, feces, enemas, bondage, and playing dead. It is often said at child-abuse conferences that when a young child talks about "pee pee" coming out of an offender's penis, they are actually referring to semen. If the offender is into urophilia, however, the child may in fad be referring to urine, and it is still sexual activity. A few child-sexual-abuse experts decided that the only explanation for allegations of this type was that the offenders were "satanists." The only paraphilia that many professionals dealing with child sexual abuse have heard of is pedophilia. Knowledge of this kind of behavior can also assist in evaluat- ing narrative material found in the possession or on the computer of child molesters. Even noncriminal behavior related to sexual preferences can and should be used to assess and evaluate allegations of child sexual victimization. When children are the victims of this unusual, bizarre sexual activity, it is still sometimes considered to be a "nuisance" sex offense. (See below.) Corroboration Understanding the paraphilias and nuisance sex offenses can some- times help investigators prove intent, identify prior and subsequent like acts, and recognize collateral evidence in sexual-exploitation-of-children cases. Because a high percentage of nuisance sex offenders are preferential sex offenders, they engage in similar patterns of predictable and persistent sexual behavior and are vulnerable to the same investigative techniques discussed in this publication. These techniques can be used to help prove the sexual motivation of some of these poorly understood nuisance sex offenses as well as evaluating their possible connection to sexual-exploitation-of-children cases. Evaluation Some "nuisance" sex offenses against children are more common than others. Some of the more bizarre ones that I have dealt with over the years include an offender engaging in behaviors for sexual gratification such as stealing soiled dia- pers being worn by a baby; photographing children wearing diapers; squirting children with a water piitol filled with semen; listening to children urinate in a school .bathroom; videotaping cheerleaders at a football game; having parents send photographs of their children getting an enema; playing the master/servant game by having children rest their feet on his prone body; tape recording boys belching; window peeping at his own children; urinating on prostitutes, girlfriends, and his own child; masturbating to videotapes of children's autopsies; having children spit in cups; buying soiled underwear from adolescent boys; and solicit- ing body fluids from boys on the Internet. The investigative priority of these types of crimes can change rapidly when it is discovered that the offender carries the human immunodeficiency virus (HIV) or is entering homes in the middle of the night. In many of these cases it is difficult to prove the sexual motivation unless one understands preferential sex offenders. Some are still not considered sex crimes or not crimes at all, even if one can prove the sexual motivation. A big investigative issue in nuisance sex offenses is always the question of progression to more serious offenses. Some nuisance sex offenders progress little over the years in their criminal sexual behavior. Some progress to more serious CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 33 EFTA01728662 sex crimes, and some move back and forth. Many investigators consider the pos- sibility that a nuisance sex offender might progress to more serious crimes in the future, but they ignore the possibility that he already has. When evaluating nuisance sex offenders, investigators should consider focus, escalation, theme, and response to identification. The fact that a nuisance sex offender moves from victims meeting general criteria to specific victims is a potential danger sign. Escalation over time is also a danger sign. Escalation can be evaluated only when there are multiple offenses. Because of the low priority of the cases enumerated above, this can be difficult to do. The cases that the investi- gator believes are the first, second, and third may actually be the tenth, sixteenth, and twenty-second. Investigators should also consider the theme of the nuisance sex offenses. Not all obscene calls or indecent exposures are the same. As will be discussed later in this publication, specific details, not general labels, are needed. Lastly, in evaluating dangerousness, investigators should consider the nuisance sex offender's reaction to identification. Did he become violent and aggressive? Is he indifferent to or aroused by the response of his victims? Is he cooperative? Whatever their personal feelings, investigators will almost always get more infor- mation, details, and admissions from these offenders when they treat them with respect, dignity, and empathy. When investigations involve multiple offenders, the investigator must recognize that the subjects involved could include different kinds of molester patterns. The staff at a daycare center where children are being molested might include inadequate, seduction, morally indiscriminate, or any other combination of the previously discussed situational and preferential sex offenders. A religious group involved in sexually abusing children might include morally indiscriminate, diverse, inadequate, and sadistic patterns of behavior. The behavior of the indi- viduals involved must be carefully evaluated in order to develop appropriate investigative and interview strategies. An important application of this typology is the simple recognition that not all child molesters are the same. Not all child molesters are pedophiles. Not all child molesters are passive, nonaggressive people. Child molesters can look like every- one else and are motivated by a wide variety of influences. There is no single investigative or interview technique to deal with all of them. • It is commonly accepted that incestuous fathers are typically regressed child molesters who molest only their own children, do not collect child pornography, and are best dealt with in noncriminal treatment programs. This may be true some of the time, maybe even most of the time, but it is not true all of the time. There are cases in which the incestuous father is a seduction or introverted pref- erential-type child molester (i.e., pedophile) who "married" simply to gain access to children. In many cases he has molested children outside the marriage or children in previous "marriages." The possibility that an incestuous father might molest children outside the home or commit other sex offenses seems to be beyond the comprehension of many child-abuse professionals. Even when they intellectually admit the possibility, their professional actions indicate otherwise. 34 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728663 Such individuals frequently look for women who already have children who meet their age and gender preferences. Their marriages or relationships usually last only as long as there are children in the victim preference range. In today's more liberal society, such an offender frequently no longer marries the woman, but simply moves in with her and her children. On some occasions they merely befriend the mother and do not even pretend romantic interest in her, but only express a desire to be a "father figure" for her children and help with expenses. Another technique is to marry a woman and adopt children or take in foster children. The last and least desirable stratagem he uses is to have his own chil- dren. This is the least desirable method because it requires the offender to have frequent sex with his wife, and then there are few guarantees that the baby will be of the preferred sex. In order to engage in sexual relations with his wife, the true pedophile must create a fantasy. To aid in this fantasy some pedophiles have their wives dress, talk, or behave like children. After the birth of a baby of the preferred sex, such pedophiles may terminate or greatly reduce sexual relations with their wives. Of course these facts are difficult for the law-enforcement investigator to learn. Most wives or even ex-wives would be embarrassed to admit these sexual problems. Some a -wives or ex-girlfriends might even exaggerate or embellish such infor- mation. Although such offenders are technically intrafamilial molesters, they are more properly and effectively investigated and prosecuted as acquaintance molesters. Many incestuous fathers and live-in boyfriends, however, are morally indis- criminate individuals whose sexual abuse of children is only a small part of their problems. They have no real sexual preference for children, but sexually abuse the available children because they can. They sometimes victimize the children in the home because they are competition for mom's attention and time. They can be cunning, manipulative individuals who can convincingly deny the allegations against them or, if the evidence is overwhelming, claim they need "help with their problem." Their personality disorder is more serious than even pedophilia and probably more difficult to treat. Where do female child molesters fit into this typology? The answer is unknown at this time. I have not consulted on a sufficient number of cases involving female offenders to properly include.them in this typology Although certainly a minor- ity of cases, I believe that the sexual victimization of children by females is far more prevalent than most people believe. Many people view sex between an older woman and acquaintance adolescent boy not as molestation but as a "rite of passage." Furthermore sexual activity between women and young children is difficult. to identify. Females are the pri- mary caretakers in our society and can dress, bathe, change, examine, and touch children with little suspicion. Many of the cases involving alleged sexual abuse in daycare centers involve female offenders. The apparent sexual activity in some of these cases may in fact be physical abuse directed at sexually significant body parts (e.g., genitals, nipples). There are many cases in which females actively participate in the sexual abuse of children with an adult male accomplice. Sometimes the female assumes the role CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 35 EFTA01728664 of "teaching" the child victim about sexual activity. In other cases the female appears to be motivated by more serious emotional and psychological problems. It is.rare to find a case, however, in which a female offender fits the dynamics of the preferential-type child molester. This may be due to the fact that preferential molesting (i.e., multiple victims, paraphilias, theme pornography) has been defined from a male-sexual-behavior perspective. This is an area that still needs additional research and study. For additional information on female sex offenders see "Female Sex Offenders: A Typological and Etiological Overview" (Warren & Hislop, 2001). dolesce Another area that has received increased attention involves adolescent offenders. In past years adolescent child molesters were usually dismissed with "boys will be boys" or "he's just going through a stage." Adolescent child molesters can fit any- where along the continuum and into any of the patterns of behavior described in this book. Frighteningly, though, many cases involving adolescent child molest- ers seem to fit the morally indiscriminate pattern of behavior. These adolescent offenders must be carefully evaluated for proper intervention and treatment when- ever possible. In addition adolescent (and even younger) sex offenders should always be viewed as past or current victims of sexual victimization in the broadest sense. This might also include psychological sexual abuse, inappropriate exposure to sexually explicit material, and the repeated or inappropriate witnessing of adult sexual activity. Recognizing and then investigating this victimization can lead to the identification of additional offenders and victims. The sexual abuse of younger children by an older child should always be viewed as a possible indication that the older child was also sexually victimized. As previously stated this publication will not address the issue of children, especially adolescents, sexually victimized by peers. For additional information on adolescent sex offenders see "The Sex Crimes of Juveniles" (Hunter, 2001). .11 EFTA01728665 Identifying Preferential Sex Offenders ((Wirier zt Although a variety of individuals sexually abuse children, preferential-type sex offenders, and especially pedophiles, are the primary acquaintance sexual exploiters of children. A preferential-acquaintance child molester might molest 10, 50, hundreds, or even thousands of children in a lifetime, depending on the offender and how broadly or narrowly child molestation is defined. Although pedophiles vary greatly, their sexual behavior is repetitive and highly predictable. Knowledge of these sexual-behavioral patterns or characteristics is extremely valu- able to the law-enforcement investigator. These highly predictable and repetitive behavior patterns make cases involving preferential-type offenders far easier to investigate than those involving situational-type offenders. An important step in investigating cases of sexual exploitation of children by adult acquaintances is to recognize and identify, if present, the highly predictable sexual-behavioral patterns of preferential sex offenders or pedophiles. It is important that investigators continually attempt to place a suspected acquaintance child molester along the motivational continuum. If the investigation iden- tifies enough of these patterns, many of the remaining ones can be assumed; however, no particular number constitutes "enough." A few may be enough if they are especially sig- nificant. Most of these indicators mean little by themselves, but as they are identified and accumulated through investigation, they can constitute reason to believe a cer- tain offender is a preferential sex offender. One does not have proof beyond a reasonable doubt, but "probable cause" exists. A classification system or typology to determine the type of offender with whom one is dealing cannot be applied unless the most complete, detailed, and accurate information possible is obtained. In order to properly evaluate the sig- nificance of any offender or victim behavior, investigators must have and be able to professionally process the details of that behavior. The fact that a suspect was previously convicted of "sodomizing" or engaging in "indecent liberties" With a child is almost meaningless if the details (i.e., verbal, physical, and sexual behavior) of the crime are not available and known. Law-enforcement reports that sanitize or describe, in politically correct terms, an offender's language and sexual behavior are almost worthless in evaluating sex offenses. This is one reason why investigators who cannot easily and objectively communicate about regular and deviant sex have problems dealing with sex crimes. The investigator must understand that doing a background investigation on a suspect means more than obtaining the date and place of birth and credit and criminal checks. School, juvenile, military, medical, driving, employment, bank, sex-offender and child-abuse registry, sex-offender assessment, computer, and prior investigative records can all be valuable sources of information about an offender. Relatives, friends, associates, current and former sex partners can be identified and interviewed. Other investigative techniques (e.g., mail cover, pen Although a variety of individuals sexually abuse children, preferential-type sex offenders, and especially pedophiles, are the primary acquaintance sexual exploiters of children. CHRD MOLESTERS -ArBE.SMAIANALIMIS - 37 EFTA01728666 register, trash run, surveillance) can also be used. Indicators and counter indica- tors must be identified and evaluated. n1- 346.7a01:01 g.QC9) Characteristics A preferential sex offender can usually be identified by the behaviors noted below. Long-Term and Persistent Pattern of Behavior begins pattern in early adolescence is willing to commit time, money, and energy commits multiple offenses makes ritual- or need-driven mistakes Specific Sexual Interests manifests paraphilic preferences (may be multiple) focuses on defined sexual interests and victim characteristics centers life around preferences rationalizes sexual interests Well-Developed Techniques evaluates experiences lies and manipulates, often skillfully has method of access to victims is quick to use modern technology (e.g., computer, video) for sexual needs and purposes Fantasy-Driven Behavior collects theme pornography collects paraphernalia (i.e., souvenirs, videotapes) records fantasies acts to turn fantasy into reality Investigators must not over- nor underreact to reported allegations. They must understand that not all acquaintance molesters are stereotypical "pedophiles" who fit some common profile. Keeping an open mind and objectively attempting to determine the type of offender involved can be useful in minimizing embarrass- ing errors in judgment and developing appropriate interview, investigative, and prosecutive strategies. For example the fact that preferential offenders as part of sexual ritual are more likely to commit similar multiple offenses, make need- driven mistakes, and compulsively collect pornography and other offense-related paraphernalia can be used to build a stronger case. Information about legal paraphilic behavior (i.e., with consenting adults, objects, theme adult pornogra- phy) can and should be used to evaluate any offender suspected of being involved in criminal sexual behavior. This type of information is most readily available in cases involving the use of online computers. 38 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728667 "True" Pedophiles A high percentage of acquaintance child molesters are preferential sex offenders who have a true sexual preference for children (Le., pedophiles). In addition to the behavior patterns of preferential sex offenders set forth above, these pedo- phile-type preferential offenders often exhibit many indicators of their particular preference for children. These indicators will assist the investigator in identifying these pedophiles. It must be again stated and emphasized that the indicators alone mean little. Their significance and weight come as they are accumulated and come to form a pattern of behavior. If the investigator determines the existence of enough of these indicators, there is probable cause to believe the individual is a pedophile-type preferential sex offender. I generally recommend that investigators and prosecutors minimize the official use (i.e., reports, court documents, press releases) of the term "pedophile." Rarely is it necessary to assert even for investigative or prosecutive purposes that an offender is specifically a "pedophile." Below are the possible indicators of a sexual preference for children. Sexual Abuse in Background Although most victims of child sexual abuse do not become offenders, research indicates that many offenders are former victims. It might be worth the investigator's time and effort to determine, if possible, whether a suspect had ever ban sexually victimized as a child and, more importantly, what was the nature of the victimization (i.e., age it occurred, relationship with offender, acts performed). Limited Social Contact as Teenagers The pedophile's sexual preference for children usually begins to manifest itself in early adolescence; therefore, during his teenage years he may have exhibited little sexual interest in people his own age. Since so much teenage socialization revolves around dating, he will often be described as quiet or a loner. This situation will become more apparent as he moves through the teenage years. A 13 year old's sexual interest in a 12-year-old is harder to identify as problematic. As with several of these indicators, this fact alone means little if anything. Premature Separation From Military If an individual was dishonorably discharged for molesting children, there is not much doubt about the significance. It was far more common, though, for this type of individual to be prematurely separated from the military with no specific reason given or available. The military, like most organizations, was frequently interested only in getting rid of such indi- viduals and not necessarily in prosecuting them. Fortunately this attitude seems to be changing. Frequent and Unexpected Moves When they are identified, pedophiles are fre- quently "asked" to leave town by someone in authority', by the parent of one of the victims, or by an employer. They were "caught," but not arrested or convicted. Although getting better, this is still a common way to deal with the problem. The result is that pedophiles frequently show a pattern of living in one place for several years with a good job and then suddenly, and, for no apparent reason, moving and changing jobs. Chances are the investigator will find no offi- cial record of what happened. The pedophile will usually have an explanation for CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 39 EFTA01728668 the move, but it probably will not reflect the true circumstances. This moving pattern can sometimes be determined from examination of drivers' license records. Prior Arrests In some cases pedophiles have previously been arrested for child molestation or sexual abuse. Certainly such an arrest record is a major indicator particularly if the arrest goes back many years or is repeated. Investigators must also be alert to the fact that pedophiles may have arrest records for actions that do not appear to involve sexual activity. These might include impersonating a law- enforcement officer, writing bad checks, violating child-labor laws, trespassing, or other violations that may indicate a need to check further. Any arrest of an adult in the company of a child not his own should be evaluated with suspicion. The investigator should attempt to get all possible details, including copies of the reports concerning the arrests, in order to evaluate their significance properly. Multiple Victims Molesting numerous child victims of similar characteristics is a strong indicator that the offender is a pedophile. More importantly, if other factors indicate that the offender is a pedophile, then a concerted effort should be made to identify the multiple victims. If you know of only one victim, but have reason to believe the offender is a pedophile, then begin looking for the other victims. For instance teacher who is a suspected pedophile molests one child in his class, the chances are high that he has molested or attempted to molest other children in the class as well as children in all the other classes he has taught. This is also true of incest offenders suspected of being pedophiles. Planned, Repeated, or High-Risk Attempts Bold and repeated attempts to obtain children or molest them that have been carried out in a cunning and skillful manner (i.e., neighbor beginning seduction in front of child's parents, teacher molesting children during class in a room full of students) are a strong indication that the offender is a pedophile. Older Than 25, Single, Never Married By itself this indicator means nothing. It has significance only when combined with several other indicators. Because they have a sexual preference for children, pedophiles often have some degree of difficulty in performing sexually with adults; therefore, they frequently are not married or are married for only brief periods of time. Some pedophiles, though, do enter into marriage for specific reasons, and these have been and will be discussed again. Lives Alone or With Parents This indicator is closely related to the above. Again, by itself, it has little meaning. The fact that some man lives alone does not mean he is a pedophile. The fact that an individual who possesses many of the other traits discussed here and also lives alone or with his parents might be significant. Limited Dating Relationships If Not Married A man who lives alone, has never been married, and does not date adults should arouse suspicion if he possesses other characteristics discussed here. If Married, "Special" Relationship With Spouse When they do many, pedophiles often marry either a strong, domineering woman or a weak, passive woman- 40 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728669 child. In any case they will marry a woman who does not have high sexual expectations or needs. A woman married to a pedophile may not realize that her husband is a pedophile, but she does know he has a "problem" —a sexual- performance problem. Because she may blame herself for this problem and because of the private nature of people's sex lives, most wives will usually not reveal this information to an investigator; however, a wife, ex-wife, or girlfriend should always be considered as possible sources of information concerning the sexual preferences of an offender. Pedophiles sometimes marry for convenience or cover. Pedophiles marrying to gain access to children was previously discussed and is further discussed below. Excessive Interest in Children How much interest is exces- sive? This is a difficult question. The old adage, "If it sounds too good to be true, maybe it is" may apply here. If someone's interest in children seems too good to be true, maybe it is. This is not proof that someone is a pedophile, but it is a reason to be suspicious. It becomes more significant when this excessive interest is combined with other indicators discussed here. Parents should beware of anyone who wants to be with their children more than they do. Associates and Circle of Friends are Young In addition to sexual activity, pedophiles frequently socialize with children and get involved in youth activities. They may hang around schoolyards, arcades, shopping centers— any place that children frequent. Their young "friends" may be male, female, both sexes, very young, or teenagers, all depending on the age and gender preferences of the pedophile. Limited Peer Relationships Because they cannot share the most important part of their life, their sexual interest in children, with most adults, pedophiles may have a limited number of close adult friends. Only other pedophiles will validate their sexual behavior. If a suspected pedophile has a dose adult friend, the possibility that the friend is also a pedophile must be considered. Today pedophiles can use the Internet to easily find hundreds of individuals who share and support their sexual interest in children. Parents should beware of anyone who wants to be with their children more than they do. Age and Gender Preference Most pedophiles prefer children of a certain sex in a certain age range. In contrast to situational-type child molesters, "true" pedophiles seem to be more likely to prefer boys. The older the age preference of the pedo- phile, the more exdusive the gender preference. Pedophiles attracted to toddlers are more likely to molest boys and girls indiscriminately. A pedophile attracted to teenagers is more likely to prefer either boys or girls exclusively. The preferred age bracket for the child can also vary. One pedophile might prefer boys 8 Lo 10, while another might prefer boys 6 to 12. A pedophile's age preference might not even correspond exactly with the legal definitions of a child or minor. For example a pedophile might prefer sexual partners 13 to 19. How old a child looks and acts is more important than actual chronological age. A 13-year-old child who looks and acts like a 10-year-old child could be a potential victim target for a molester preferring 8 to 10 year olds. For the introverted preferential molester, how old the child looks is more important than how old the child acts. Puberty CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 41 EFTA01728670 seems to be an important dividing line for many pedophiles. This is only an age and gender preference, however, and not an exclusive limitation. Any individual expressing a strong desire to care for, adopt, or gain access to only a child of a very specific sex and age, other than an infant, should be viewed with significant suspicion. Refers to Children as "Clean," "Pure," "Innocent," "Impish," or Objects Pedciphiles sometimes have an idealistic view of children that is expressed in their language and writing. Others sometimes refer to children as if they were objects, projects, or possessions. "This kid has low mileage," and "I've been working on this project for six months" are typical comments. Skilled at Identifying Vulnerable Victims Some pedophiles can watch a group of children for a brief period of time and then select a potential target. More often than not the selected child turns out to be from a dysfunctional home or the victim of emotional or physical neglect. This skill is developed through practice and experience. Identifies With Children (Better Than With Adults) Pedophiles usually have the ability to identify with children better than they do with adults—a trait that makes most pedophiles master seducers of children. They especially know how to listen to children. Many pedophiles are described as "pied pipers" who attract children. This ability often helps them become exceptionally good teachers, coaches, or youth volunteers. This skill is particularly useful in befriending children on the Internet. Access to Children This is one of the most important indicators of a pedophile. The pedophile will almost always have a method of gaining access to children. Other than simply hanging around places children congregate, pedophiles some- times marry or befriend women simply to gain access to their children. They are more than happy to help with chores around the house and be a father figure or babysitter for the children. Pedophiles are frequently the, nice guys" in the neigh- borhood who like to entertain the children after school or take them on clay or weekend trips. Also a pedophile may seek employment where he will be in con- tact with children (e.g., teacher, camp counselor, babysitter, school-bus driver) or where he can eventually specialize in dealing with children (e.g., physician, den- tist, clergy member, photographer, social worker, law-enforcement officer). The pedophile, with or without a spouse, may adopt children or become a foster par- ent. He may become one or more of many types of volunteers who works directly with children. The pedophile may operate a business that hires adolescents. In one case a pedophile married, had a daughter, and molested her. He was the "nice guy" in the neighborhood who had the neighborhood girls over to his house for parties, at which he molested them. He was a coach for a girls' softball team, and he molested the players. He was a dentist who specialized in child patients, and he molested them. Activities With Children, Often Excluding Other Adults The pedophile is always try- ing to get children into situations where there are no other adults, other than 42 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728671 other pedophiles, present. On a scout hike he might suggest the fathers go into town for a beer. He will "sacrifice" and stay behind with the boys. Seduces With Attention, Affection, and Gifts This is the most common technique used by pedophiles. They literally seduce the children by befriending, talking to, listening to, paying attention to, spending time with, and buying gifts for them. If you understand this courtship process, it should not be difficult to understand why some child victims develop positive feelings for the offender. Many people can understand why an incest victim might not report his or her father, but they cannot understand why a victim not related to dye offender does not immediately report molestation. There are many reasons for a victim not immediately report- ing molestation (e.g., fear, blackmail, embarrassment, confusion), but the results of the seduction process are often ignored or not understood at all. Skilled at Manipulating Children In order to be involved in simultaneous sexual relations with multiple victims, a pedophile must know how to manipulate chit-. dren. The pedophile uses seduction techniques, competition, peer pressure, child and group psychology, motivation techniques, threats, and blackmail. The pedo- phile must continuously recruit children into and move children out of the ring without his activity being disclosed. Part of the manipulation process is lowering the inhibitions of the children. A skilled pedophile who can get children into a situation where they must change clothing or stay with him overnight will almost always succeed in seducing them. Not all pedophiles possess these skills. For example an introverted pedophile typically lacks these abilities. (See chapter titled "Acquaintance-Exploitation Cases" beginning on page 47.) Hobbles and Interests Appealing to Children This is another indicator that must be considered for evaluation only in connection with other indicators. Pedophiles might collect toys or dolls, build model planes or boats, or perform as downs or magicians to attract children. A pedophile interested in older children might have a "hobby" involving alcohol, drugs, or pornography. Shows Sexually Explicit Material to Children Any adult who shows sexually explicit material to children of any age should be viewed with suspicion. This is generally part of the seduction process in order to lower inhibitions. A pedophile might also encourage or allow children to call a dial-a-porn service or use the Internet to access sexually explicit material. He might send them such material via a computer as part of this process. Youth-Oriented Decorations in House or Room Pedophiles attracted to teenage boys might have their homes decorated the way a teenage boy would. This might include items such as toys, games, stereos, and posters of "rock stars." The homes of some pedophiles have been described as shrines to children or as miniature amusement parks. Photographing of Children This includes photographing children fully dressed. One pedophile bragged that he went to rock concerts with 30 or 40 rolls of film in order to photograph young boys. After developing the pictures he fantasized about having sex with the boys. Such a pedophile might frequent playgrounds, youth CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 43 EFTA01728672 athletic contests, child beauty pageants, or child exercise classes with his camera (i.e., 35mm, "instant," video, digital). Collecting Child Pornography or Erotica This is one of the most significant charac- teristics of pedophiles, discussed in detail in the chapter titled "Collection of Child Pornography and Erotica" beginning on page 61. If, after evaluating the indicators, law-enforcement investigators have reason to suspect that a particular subject or suspect is a pedophile, investigators should utilize the three most important indicators to their investigative advantage. These three indicators are access to children, multiple victims, and collection of child pornography or erotica. The investigator must attempt to identify additional victims to strengthen the case against the offender. The more victims identified, the less likely that any of them will have to testify in court. But, even more importantly, as soon as legally possible the investigator must obtain a warrant to search for child pornography or erotica, which is invaluable as evidence. There is a certain urgency in this because the more interviews conducted to obtain the needed probable cause for a search warrant, the greater the chance the pedophile will learn of the investiga- tion and move or hide his collection. Child pornography, especially that produced by the offender, is one of the most valuable pieces of evidence of child 'sexual victimization that any investigator can have. The effects on a jury of viewing seized child pornography are devastating to the defendant's case. The investigator must also attempt to develop a good interview strategy based on knowledge of the preferential offender's need to rationalize and justify his behavior. Knowing the kind of offender being investigated can help determine investi- gative and prosecutive strategy. For example it might be useful in ■ anticipating and understanding need-driven mistakes ■ comparing consistency of victim statements with offender characteristics ■ developing offender and victim interview strategies ■ determining the existence, age, and number of victims ■ recognizing where and what kind of corroborative evidence might be found ■ utilizing an expert search warrant ■ addressing staleness ■ proving intent ■ determining appropriate charging and sentencing ■ evaluating dangerousness at a bond hearing ■ assessing the admissibility of prior and subsequent like acts ■ explaining behavior patterns to a jury ■ determining suitability for treatment options ■ notifying the community Exaggerated Example An investigation determines that a suspect is a 50-year-old single male who does volunteer work with troubled boys; has two prior convictions for sexually 44 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728673 molesting young boys in 1974 and 1986; has an expensive state-of-the-art home computer; has an online "screen" name of "Boy lover"; has at least one online profile that describes himself as a 14-year-old; has for the last 5 years daily spent many hours online in chat rooms and the "alksex.preteen" newsgroup justifying and graphically describing his sexual preference for and involvement with young boys; and brags about his extensive pornography collection while uploading hundreds of child-pornography files all focusing on preteen boys in bondage to dozens of individuals all over the world. If such a determination were relevant to the case, these facts would constitute more than enough probable cause to believe this suspect is a preferential sex offender. Profiling? It should be noted that the above-described applications of this typology have little, if anything, to do with "profiling." As used by the FBI's Behavioral Science Unit and National Center for the Analysis of Violent Crime, the term "profiling" refers to analyzing the criminal behavior of an unknown subject and arriving at ' likely personality and behavioral characteristics of that offender. It has nothing to do with cases in which a particular suspect is identified. In addition this typology is not intended to be used in a court of law to prove that someone is guilty of child molestation because he or she fits a certain "pro- file." It would be inappropriate and improper to claim that because someone has certain traits and characteristics, we know with certainty that he or she is a child molester and should therefore be convicted. The level of proof necessary to take action on information is dependent on the consequences of that action. The level of proof necessary to convict somebody in a court of law and incarcerate him is very high: proof beyond a reasonable doubt. Applying this typology, however, in the ways discusied here (e.g., to evaluate allegations, develop interview strategies, address staleness of probable cause, assess prior and subsequent like acts, educate juries, compare consistency) has less direct and immediate severe consequences for a suspected offender. Any additional evidence obtained from applying this typology can hopefully be used in court. Even if an expert educates a jury about certain patterns of behavior, the jury still decides how it applies, if it applies, and if the evidence constitutes proof beyond a reasonable doubt. The expert is not giving an opinion about the guilt of the accused. (See United States v. Romero, 189 F.3d 576 (7th Cir. 1999).) In essence the criminal investigative analysis involved in applying this typology to the investigation of acquaintance-molestation cases consists of deter- mining and assessing the details (i.e., verbal, physical, and sexual behavior) of "what" happened, evaluating and deciding "why" it happened, and then com- paring that' to the known behavioral characteristics of "who" is suspected for consistency. As previously stated there is not one "profile" that will determine if someone is a child molester. But there are some child molesters who tend to engage in highly predictable and recognizable behavior patterns. The potential evidence available as a result of the long-term, persistent, and ritualized behavior patterns of many preferential sex offenders makes the understanding and recog- nition of these patterns important and useful to investigators and prosecutors in legally appropriate ways. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 45 EFTA01728674 Acquaintance-Exploitation Cases This chapter, formerly titled "Child Sex Rings," discusses cases in which multiple children are sexually exploited by acquaintances. The majority of offenders who simultaneously sexually victimize multiple children are acquaintance child molesters, and most acquaintance child molesters who victimize multiple chil- dren are preferential sex offenders. Recognizing, understanding, and managing these dynamics are crucial to the proper investigation and prosecution of these cases. Cases involving multiple child victims are sometimes referred to as child sex rings. Many people have extreme and stereotypical ideas of what a child sex ring is. They believe it must involve organized groups buying and selling children and shipping them around the country or the world for sexual purposes. In this publication the term child sex ring is simply defined as one or more offend- ers simultaneously involved sexually with several child victims. Because of the stereotypical images conjured up by the term, however, its use will be kept to a minimum. Acquaintance-exploitation cases with multiple victims need not have a com- mercial component or mean group sex. Although that has happened in some cases, it is more likely that the offender is sexually interacting with the children one at a time. The offender more than likely has sex with other children before terminating the sexual relationship with prior victims. The activity can involve any of the wide range of "sexual" behaviors discussed in this publication. The various child victims being molested during a certain period of time usually know each other but may or may not know that the offender is having sex with the other children. Some may believe they are the only ones having a "special" rela- tionship with the offender. Other victims may actually witness the sexual activity of the offender with other children. Offenders may have favorite victims that they treat differently than the other victims. Acquaintance-exploitation cases with multiple victims need not involve highly structured or organized groups such as organized crime, satanic cults, or pedo- phile organizations. In Child Pornography and Sex Rings, Dr. Ann W. Burgess set forth the dynamics of child sex rings (Burgess, 1984). Dr. Burgess's research iden- tified three types of child sex rings. They are solo, transition, and syndicated. In the solo ring the offender keeps the activity and photographs completely secret. Each ring involves one offender and multiple victims. In the transition ring offenders begin to share their experiences, pornography, or victims. Photographs and letters are traded, and victims may be tested by other offenders and eventu- ally traded for their sexual services. In the syndicated ring a more structured organization recruits children, produces pornography, delivers direct sexual ser- vices, and establishes an extensive network of customers. In the United States even the syndicated-type rings rarely have a hierarchical structure with a clear chain of command. They are more likely to be informal networks of individuals who share a common sexual interest and will betray each other in a minute if it helps their criminal case. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 47 EFTA01728675 ases ren are exploited by acquaintances have many dynamics different from "typical" intrafamilial-abuse cases. "Experts" Many of the nation's experts on the "sexual abuse of children" have little or no experience dealing with acquaintance-exploitation cases especially those involving multiple victims. Almost all their experience is with one-on-one, intrafamilial-incest cases. The investigation of acquaintance-exploitation cases requires specialized knowledge and techniques. The intervention model for deal- ing with one-on-one, intrafamilial-child sexual abuse has only limited application when dealing with multiple-victim, extrafamilial, child-sexual-exploitation cases. Risk to Other Children Preferential sex offenders are more likely to have multiple victims. Those who focus on intrafamilial abuse rarely think of the danger to other children in the community because, in their minds, intrafamilial offenders molest only their own children. In one case that I was asked to evaluate a military officer had sexually molested his own daughter from shortly after birth to shortly before her seventh birthday. He was convicted and sent to prison. After several years he was released and returned to live with his wife and. daughter. When I describe this case during a presentation, most people operating only from the intrafamilial perspective of child sexual abuse react with disgust or outrage at the notion that the offender is back in the home with the victim. Although that is of some concern to me, it is minor compared with my concern for other young female children in the com- munity where the offender now lives. Having reviewed and analyzed the offender's behavior patterns and extensive collection of child pornography and erotica, I know a greaideal about the sexual fantasies and desires of this clearly preferential sex offender. His daughter is now too old to be a preferred sexual partner, and any young female child in the neighborhood fitting his preferences is at significant risk of victimization. If neighborhood children were molested, he would be both an intrafamilial and acquaintance offender. How and when to notify the community of this possible risk to other children is a difficult and important judgment call by investigators. The need to protect society must be weighed against the rights of the accused and opportunity to obtain reliable evidence. Investigators must carefully consider what and how much information can be disseminated to the public. Do you notify everyone in the neighborhood, only parents of high-risk victims, only parents who had contact with the suspected offender, or only parents of children allegedly molested? Alerting parents too soon or improperly can result in destroying the life of an innocent individual, vigilante "justice," and contamination of a valid case. Role of Parents The role of the child victim's parents is a third major difference between acquain- tance-exploitation cases and intrafamilial-child sexual abuse. In intrafamilial cases there is usually an abusing and a nonabusing parent. In such cases a nonabusing mother may protect the child, pressure the child not to talk about the abuse, or persuade the child to recant the story so that the father does not go to jail. Dealing with these dynamics is important and can be difficult. 48 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728676 Since parents are usually not the abusers in these acquaintance cases, their role is different. It is a potentially serious mistake, however, to underestimate the importance of that role. Their interaction with their victimized child can be cru- cial to the case. If the parents pressure or interrogate their children or conduct their own investigation, the results can be damaging to the proper investigation of the case. It is also possible that a child sexually exploited by an acquaintance also was or is being sexually, physically, or psychologically abused at home. Disclosure Continuum Status When investigators interview children in intrafamilial cases the victim has usually already disclosed the abuse to someone. In cases involving sexual exploitation by acquaintances the children interviewed usually have not previously disclosed• their victimization. They are most likely being interviewed only because the victimiza- tion was discovered or a suspected or known sex offender had access to them. These types of interviews are extremely difficult and sensitive. Multiple Victims There is frequently interaction among the multiple victims in acquaintance- exploitation cases. In intrafamilial cases the sexual activity is usually a secret that the victim has discussed with no one until disclosure takes place. In a child sex ring there are multiple victims whose interactions, before and after discovery, must be examined and evaluated. Multiple Offenders Interaction among multiple offenders is another major difference. Offenders some- times communicate with each other and trade information and material. Offender interaction is an important element in the investigation of these cases. The exist- ence of multiple offenders can be an investigative difficulty, but it can also be an advantage. The more offenders involved, the greater the odds that there is a "weak link" who can be used to corroborate the alleged abuse. Gender of the Victim The gender of the victim is another major difference between intrafamilial- and extrafamilial-sex cases. Unlike intrafamilial sexual abuse, in which the most com- mon reported victim is a young female, in acquaintance-exploitation cases an adolescent boy victim is common. Because so many investigators and prosecutors have more training and experience dealing with intrafamilial, child-sex-abuse cases, a synopsis of this comparison with acquaintance-exploitation cases can be usefuL (See Table 3.) This contrast is only a typical tendency. There are always exceptions and many variations. Child-sexual-abuse cases tend to be "intrafamilial." They are more likely to involve situational sex offenders who often coerce a small number of usually younger, female victims into sexual activity. The offenders are less likely to collect child pornography or erotica. They tend to rationalize their sexual activity with children as not being harmful. When investigators interview victims in these earns, the children have usually first disclosed or reported the abuse to someone else. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 49 EFTA01728677 Family members frequently pressure the child to keep the family "secret" and either not report or recant it once reported. In general there is usually less cor- roborative evidence. Almost by definition, acquaintance-exploitation cases tend to be "extrafamilial." As previously mentioned, however, some true "acquaintance" molesters gain access to their victims through marriage. Acquaintance-exploitation cases are more likely to involve preferential sex offenders who seduce a large number of victims, often older, male victims, into sexual activity. The offenders are more likely to collect child pornography or erotica. They tend to validate their sexual activity with children as good or beneficial to the victims. When investigators in these cases interview victims, the children have usually not disclosed the exploitation, and victimization is only suspected. Family members frequently "interrogate" the child about the exploitation, pressuring the child to describe the victimization 'n a more socially "acceptable" way. In general there is usually more corroborative evidence. Comparison (> Child Sexual Abuse More) (< Less) Child Sexual Exploitation > "Intrafamilial" > "Extrafamilial" . . . . > Situational Offenders > Preferential Offenders > Female Victims > Male Victims < Years of Age > Years of Age < Number of Victims > Number of Victims > Coercion > Seduction > "DisclosurelReport Interviews > Suspicion Interviews > Family Secrecy > Family "Interrogation" . .. , . _ > Rationalization > Validate Behavior < Child Pornography . > Child Pornography < Erotica > Child Erotica < Evidence > Evidence Table 3 ;Types. of MultiOgNiptirp Cas,Ssi After many years of evaluating and analyzing child-sexual-exploitation cases involving multiple victims, I have identified two major patterns or types. They are historical and multidimensional. These terms were adopted because they give a descriptive and generic name to each type of case yet avoid such loaded labels as "traditional," "ritualistic," or "satanic" child sexual abuse and exploita- tion. The dynamics and characteristics of the far more common "historical" 50 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728678 multiple-victim cases are described below. The highly controversial dynamics and characteristics of multidimensional cases will not be discussed in this publi- cation. Those seeking such information should obtain a copy of the monograph titled Investigator's Guide to Allegations of "Ritual" Child Abuse from the FBI's National Center for the Analysis of Violent Crime (NCAVC) at the FBI Academy, Quantico, Virginia (tanning, 1992c). Investigative techniques specific to these "historical" multiple-victim cases are described in more detail in the chapter titled "Investigating Acquaintance Sexual Exploitation" beginning on page 101. Overview "Historical" multiple-victim cases can involve a daycare center, a school, a scout troop, a little league team, or neighborhood children. Although viewed predomi- nately as acquaintance-exploitation cases, they can also involve marriage as a method of access to children, intrafamilial molestation of children, and the use of family children to attract other victims. There is much we know about this kind of case. The information is well docu- mented by law-eriforcement investigation and based on my involvement in many hundreds of corroborated cases for more than 25 years. The investigation of these cases can be challenging and time-consuming. Once a law-enforcement agency understands the dynamics and is willing to commit the manpower and resources, however, it can be easier in these cases to obtain convictions than in one-on-one, intrafamilial cases. Characteristics Acquaintance-exploitation cases with multiple child victims have the general char- acteristics described below. Male Offenders As many as 95 percent or more of the offenders in these cases are male. Even in those few cases where there is a female offender, she will most likely have one or more male accomplices who are the ringleaders. Preferential Sex Offenders Most of the offenders in these cases are true pedophiles or other preferential sex offenders. (See the chapter titled "Law-Enforcement Typology" beginning on page 19.) Most of the preferential molesters will be in the seduction pattern of behavior. The main characteristics of preferential-type child molesters are multiple victims, access to children, and collection of child pornography and/or erotica. These offenders will almost always be acquaintances of the victims. Male Victims More than half of the victims in these cases are male. Many of these males are boys between the ages of 10 and 16. Sexual Motivation Although pedophiles frequently claim that sex is only a small part of their "love" for children, the fact is that when the sexual attraction is gone, the relationship is essentially over. If it were not for the time spent having sex, they would not be spending the other time with the child. Their primary reason CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 51 EFTA01728679 for interacting with the children is to have sex. This is not to say, however, that sex is their only motivation. Some pedophiles truly care about children and enjoy spending time with them. Child Pornography and Child Erotica Pedophiles almost always collect child pornography and/or erotica. Child pornography can be defined as the sexually explicit visual depiction of a minor including sexually explicit photographs, nega- tives, slides, magazines, movies, videotapes, or computer disks. Child erotica (pedophile paraphernalia) can be defined as any material, relating to children, that serves a sexual purpose for a given individual. Some of the more common types of child erotica include toys, games, computers, drawings, fantasy writings, diaries, souvenirs, sexual aids, manuals, letters, books about children, psychological books on pedophilia, and ordinary photographs of children. (See the chapter titled "Collection of Child Pornography and Erotica," beginning on page 61, for a detailed discussion of child pornography and erotica.) Control Through Seduction Child molesters control their victims in a variety of ways. In acquaintance-exploitation cases with multiple victims, they control them primarily through the seduction or "grooming" process. They seduce their victims with attention, affection, kindness, gifts, and money until they have low- ered the victims' inhibitions and gained their cooperation and "consent." The nature of this seduction is partially dependent on the developmental stages, needs, and vulnerabilities of the targeted child victims. Offenders who prefer younger child victims are more likely to first "seduce" their parents and then rely more on techniques involving fun, games, and play to manipulate the children into sex. Those who prefer older child victims are more likely to take advantage of normal time away from their family and then rely more on techniques involving ease of sexual arousal, rebelliousness, and curiosity to manipulate the children into sex. These seduced and compliant victims are less likely to disclose their victimization and more likely to voluntarily return to be victimized again and again. There was an amous case in the early 1980s involving ajudge who sentenced a convicted child molester to a minimal sentence because the judge felt the 5-year- old victim was sexually promiscuous. Society was outraged and demanded that the judge be removed from the bench. The sad reality is that most people were outraged for the wrong reason—because they thought it was impossible for a 5- year-old child to be sexually promiscuous. Although not typical or probable, it is possible for such a child to be "sexually promiscuous." Of course this is the result of abuse, not the cause. It should, however, make no difference whether or not the 5-year-old child was sexually promiscuous. It in no way lessens the offender's crime or responsibility. If you change the case slightly and make the victim 9 years old, does that make a difference? Most people would probably say no. If you change it again and make the victim 12 years old, many people would still say it makes no difference, but might want to see a picture of the victim. If you change it again and make the victim 13, 14, 15, or 16 years old, the response of society and the law would vary greatly. In sex crimes the fundamental legal difference between victimization of an adult and a child is the issue of consent, With sexual activity between adults, with 52 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728680 a few rare exceptions, there must be a lack of consent in order for there to be a crime. With sexual activity between children and adults, there can be a crime even if the child cooperates or "consents." But the reality of age of consent is not so simple. Age of consent can vary depending on the type of sexual activity and indi- vidual involved. At what age can a child consent to get married, engage in sexual activity, appear in sexually explicit visual images, or leave home to have sex with an unrelated adult without parental permission? Federal case law seems to sug- gest that the consent of a 14-year-old who crosses state lines after running off and having sex with a 40-year-old man she met on the Internet is a valid defense for the kidnapping charge, but not for the sexual assault charge. At what age can an adolescent consent to have sex with a relative, a teacher, a coach, an employer, or a 21-year-old boyfriend? In the United States, society and criminal investigators seem to have a prefer- ence for sexual-victimization cases where the victim, adult or child, dearly does not consent. Among lack-of-consent eases, the least preferred are cases where the victim could not consent because of self-induced use of drugs or alcohol. Cases where the victim was just verbally threatened are next, followed by cases where a weapon was displayed. For purposes of ease of proof, the most preferred lack-of- consent cases are those where the victim has visible physical injuries or is, sad to say, dead. Many seduced child victims may inaccurately claim they were asleep, drunk, drugged, or abducted in part to ■ meet the lack of consent criteria ■ avoid embarrassment Sexual-victimization cases where the child victim is not forced or threatened and cooperates or "consents" are more troubling and harder for society and investigators to deal with. Although "consent" is supposed to be irrelevant in child-sexual-victimization cases, there are "unspoken" preferences in these cases as well. The most preferred are cases where the victim can explain that the cooperation was due to fear or ignorance. The child was afraid to tell or did not understand what was happening. Fear seems to work more effectively as a tactic with younger victims. The next most preferred are cases where the child was tricked, "duped," or "indoctrinated." If the offender was an authority, figure, this "brainwashing" concept is even more appealing. Next are the cases where the victim was willing to trade sex for attention and affection. Much less acceptable are cases where the child willingly traded sex for material rewards or money (Le., prostitution). Almost unacceptable are cases where the child engaged in the sexual activity with an adult because the child enjoyed the sex. It is almost a sacrilege to even mention such a possibility. These societal and criminal-justice preferences prevail in spite of the fact that almost all human beings trade sex for attention, affection, privileges, gifts, or money. Many seduced child victims may inaccu- rately claim they were afraid, ignorant, or indoctrinated in part to ■ meet the societal preferences for cooperation ■ avoid embarrassment Any of the above scenarios in various combinations are certainly possible. A child might cooperate in some sexual acts and be dearly threatened or forced into others. All are crimes. Investigators and prosecutors should always attempt to CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 53 EFTA01728681 determine what actually happened, not to confirm their preconceived beliefs about sexual victimization of children. Most acquaintance-exploitation cases involve these seduced or compliant victims. Although applicable statutes and investigative or prosecutive priorities may vary, officers investigating sexual-exploitation cases must generally start from the premise that the sexual activity is not the fault of the victim even if the child ■ did not say no ■ did not fight ■ actively cooperated ■ initiated the contact ■ did not tell ■ accepted gifts or money ■ enjoyed the sexual activity Investigators must also remember that many children, especially those victimized through the seduction process, often ■ trade sex for attention, affection, or gifts ■ are confused over their sexuality and feelings ■ are embarrassed and guilt-ridden over their activity ■ describe victimization in socially acceptable ways ■ minimize their responsibility and maximize the offender's ■ deny or exaggerate their victimization All these things do not mean the child is not a victim. What they do mean is that children are human beings with human needs. Society seems to prefer to believe that children are pure and innocent. Even the FBI's national initiative on computer exploitation of children is named "Innocent Images." Many children are seduced and manipulated by clever offenders and usually do not fully understand or recognize what they were getting into. Even if they do seem to understand, the law is still supposed to protect them from adult sexual partners. Consent should not be an issue with child victims. Sympathy for victims is, however, inversely proportional to their age. As with poorly understood offender patterns of behavior, the dynamics of these "consenting" victim patterns of behavior can be explained to the court by an education expert witness as in United States v Romero, 189 F.3d 576 (7°' Cir. 1999). The ability to make these explana- tions, however, is being undermined by the fact that children at an age when they cannot legally choose to have sex with an adult partner can choose to have an abortion without their parents' permission or be charged as adults when they commit certain crimes. Can the same 15-year-old be both a "child" and an "adult" in the criminal-justice system? Control Maintaining control is important in the operation of a case with multiple child victims. It takes a significant amount of ability, cunning, and interpersonal skill to 54 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728682 maintain a simultaneous sexual relationship with multiple partners. It is espe- cially difficult if you have the added pressure of concealing illegal behavior. In order to operate a child sex ring, an offender must know how to control and manipulate children. As stated above, control is maintained primarily through attention, affection, and gifts—part of the seduction pro- cess. Preferential child molesters seduce children much the same way adults seduce one another. This technique is no great mystery. Between two adults or two teenagers it is simply called dating. The major difference, however, is the disparity between the adult authority of the child molester and vulnerability of the child victim. It is especially unfair if the child molester is a prestigious authority figure (i.e., teacher, law-enforcement officer, clergy member, youth volunteer) and the child is an easily sexually aroused, curious, rebellious adolescent or an easily confused, naive, trusting young child. As previously stated these techniques must also be adjusted for the varying developmental stages, needs, and vulnerabilities of children of different ages. Preferential child molesters seduce children much the same way adults seduce one another. The Seduction Process The seduction process begins when the preferential child molester sees a poten- tial victim who fits his age, gender, and other preferences. It may be a 6-year-old girl or a 14-year-old boy. Child molesters, however, can and do have sex with children and sometimes adults who do not fit their preferences. A child molester may be experimenting or unable to find a child who fits his preference. Child molesters who prefer adolescent boys sometimes become involved with adoles- cent girls as a method of arousing or attracting the boys. The offender's next step in the seduction process is to gather information about the potential victim. This may involve nothing more than a 10-minute spot evalu- ation of the child's demeanor, personality, dress, and financial status. Through practice, many child molesters have developed a real knack for spotting the vul- nerability in each victim. Other preferential child molesters may have access to school, medical, mental-health, or court records. These records could be valuable in determining a child's interests or vulnerabilities. Almost any child can be seduced, but the most vulnerable children tend to be those who come from dys- functional homes or are victims of emotional neglect. The seduction process takes place over time. The offender who is operating a sex ring has many other victims. He is willing to put in the time it takes to seduce a child. It may take a few minutes or years. Some molesters may even start groom- ing a potential victim long before the child has reached his age preference. In addition to seducing his child victims, sex-ring operators often "seduce" the victim's parents, gaining their trust and confidence, so that they will allow him free access to their children. A favorite target victim is a child living with a single mother. He may offer to babysit or watch her children after school. The .offender will sometimes pretend romantic interest in the mother or express a desire to be a father figure or mentor for her child. He may even marry her or move in with her. The relationship with the mother can be used as a cover for his CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 55 EFTA01728683 interest in children, and her child can be used as bait to lure or gain access to other children. For example most parents would not be reluctant to allow their child to go on an overnight trip with the "father" of one of their child's friends. In this case, however, the man in question is not the child's father or even the stepfa- ther. He is just a man who lives with the mother. Some offenders legally adopt or become the legal guardian 'of potential victims. Once a molester has put in the time and effort to seduce a child, he will be reluctant to give up access to the child until he is finished with the child. The true pedophile often possesses an important talent in the seduction pro- cess: his ability to identify with children. He knows the "in" video games, toys, television shows, movies, music, computers, and Internet sites. He is skilled at recognizing and then temporarily filling the emotional and physical needs of chil- dren. This is why such offenders can be the Big Brother of the Year, the most popular teacher, or the best soccer coach. They are sometimes described as "pied pipers" who simply attract children. This is not to say that in some cases children will not sense that some adult is "weird" or has a "problem" before other adults or parents recognize it. Parents who desperately want their children to get good grades, become star athletes, get into modeling or show business, have an adult male role model, or have a good babysitter, may actually push their children to these offenders. The essence of the seduction process is the offender providing attention, affection, and gifts to the potential victim. Gifts and financial incentives are important, especially for kids from lower socioeconomic backgrounds, but atten- tion and affection are the real key. How do you tell a child not to respond to attention and affection? All children crave it, but especially children who are not getting it at home. Moreover, because the offender is interested only in short- term gain, he may allow his victims to "break the rules" — play basketball or football in the house, make a mess, swim without a bathing suit, view pornogra- phy, drink alcohol, use drugs, drive a car, or go to bars or restaurants known to have physically well-endowed female staff. The homes of many preferential child molesters are miniature amusement parks filled with games, toys, computers, and athletic equipment appealing to children of their age preference. The typical adolescent, especially a boy, is easily sexually aroused, sexually curious, sexually inexperienced, and somewhat rebellious. All these traits combine to make the adolescent boy the easiest victim of this seduction. It takes almost nothing to get an adolescent boy sexually aroused. An adolescent boy with emotional and sexual needs is simply no match for an experienced 50-year-old man with an organized plan. Yet adult offenders who seduce them, and the soci- ety that judges them, continue.to claim that these victims "consented." The result is a victim who feels responsible for what happened and embarrassed about his actions. Once a victim is seduced, each successive sexual incident becomes easier and quicker. Eventually the child victim may even take the initiative in the seduction. The next step in the seduction process is the lowering of inhibitions. It is easy to be judgmental toward victims when you look at only the end product of their seduction. At the, beginning of the relationship the child is looking for friendship, emotional support, a job, or just some fun. The lowering of sexual inhibitions is usually done so gradually and skillfully that the victim does not realize he or she 56 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728684 is a victim until it is too late. It may begin with simple affection such as a pat, hug, or kiss on the cheek. Sexual activity can begin with conversation about sex. The activity can progress to fondling while wrestling, playing hide-and-seek in the dark, playing strip poker, swimming nude in the pool, drying the child with a towel, massaging an injury, giving a back rub, tickling, playing a physical game, or cuddling in bed. The introduction of photography or video cameras during this process is common. Innocent pictures progress to pictures of the "fun and games" or playing movie star/model that then progress to pictures of the nude or partially nude child that then escalate into more sexually explicit pictures. Adult pornography is frequently left out for the children to "discover." A collection of adult pornography is effective in sexually arousing and lowering the inhibitions of adolescent boys. This is the primary reason why preferential child molesters collect adult pornography. Some of them may even attempt to use this collection as proof that they do not have a sexual preference for children. Alcohol and drugs are also used, especially with adolescent boys, to lower inhibitions. By the time the victims realize what is going on, they are in the middle of it and ashamed of their complicity. They did not "say no, yell, and tell." Much of this process can even take place online with a computer without even meeting in person. Most preferential child molesters usually woik toward a situation in which ' the child has to change clothing, spend the night, or both. If the child molester achieves either of these two objectives, the success of the seduction is almost assured. The objective of changing clothes can be accomplished by such ploys as squirting with the garden hose, turning up the heat in the house, exercising, tak- ing a bath or shower, physical examination of the child, or swimming in a pool. Spending the night with the child is the best way for the sexual activity to progress Some victims come to realize that the offender has a greater need for this sex than they do, and this gives them great leverage against the offender. The victims can use sex to manipulate the offender or temporarily withhold sex until they get things they want. A few victims even blackmail the offender especially if he is married or a pillar of the community. Although all of this is unpleasant and incon- sistent with our idealistic views about children, when adults and children have "consensual" sex the adult is always, the offender, and the child is always the victim. Consent is an issue only for adults. Operation of Cases Involving Multiple Child Victims The ongoing sexual victimization of multiple children is dynamic and ever changing. It is like a pipeline. At any given moment there are victims being recruited, seduced, molested, and let go or "dumped." For most acquaintance offenders it is easy to recruit, seduce, and molest the victims, but it is difficult to let the victims go without their turning against the offender and disclosing the abuse. The offenders control the victims once they are in the pipeline through a com- bination of bonding, competition, and peer pressure. Most children, especially adolescent children, want to be a part of some peer group. Any offender operat- ing a sex ring has to find a way to bind the victims together. Some offenders use an existing structure such as a scout troop, sports team, or school dub. Other offenders create their own group such as a magic dub,. computer dub, or reli- gious group. Some offenders just make up a name and establish their own rules CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 57 EFTA01728685 and regulations. They may call themselves the "88 Club" or the "Winged Serpents." Some offenders have used religion, satanism, and the occult as a bond- ing and controlling mechanism. Competition, sometimes focusing on sexual acts, is also an effective control technique. Victims may compete over who can do an act first or longest. A series of sexual acts may result in some special reward or recognition. The offender may use peer-pressure to control his victims, and the children will enforce the rules on each other. No victim wants to be the one to ruin it for anyone else, and each victim may think he or she is the offender's "favorite." All these techniques simply capitalize on the developmental needs of children of different ages. Violence, threats of violence, and blackmail are most likely used by the offender when pushing a victim out or attempting to hold onto a still-desirable victim who wants to leave. Sexually explicit notes, audiotapes, videotapes, and photographs are effective insurance for a victim's silence. Victims worried about disclosure of illegal acts such as substance abuse, joyriding, petty thefts, and van- dalism are also subject to blackmail. Many victims, however, are most concerned over disclosure of and therefore more likely to deny engaging in sex for money, bizarre sex acts, homosexual acts in which they were the active participant, and sex with other child victims. In child sex rings not only does the offender have sex with the child but, in some cases, the children have sex with each other. While children may report that they were forced by the offender to perform cer- tain acts with him, they find it hard to explain sexual experiences with other children; therefore, they frequently deny such. activity. One offender told me that if you select your victims and seduce them "properly" the secret takes care of itself. When trying to push a victim out the end of the pipeline, the offender may pass the child to another pedophile who prefers older children. The victim now enters a new pipeline as a "pre-seduced" victim. "Dumping". the child can also be made easier and safer if the child is promoted to another grade or school, moves onto another level of scouting or sports, or moves out of the neighborhood. Offender-Victim Bond Because victims of acquaintance exploitation usually have been carefully seduced and often do not realize they are victims, they repeatedly and voluntarily return to the offender. Society and the criminal-justice system have a difficult time understanding this. If a boy is molested by his neighbor, teacher, or clergy mem- ber, why does he "allow" it to continue? Most likely he may not initially realize he is a victim. Some victims are simply willing to trade sex for attention, affection, and gifts and do not believe they are victims. The sex itself might even be enjoy- able. The offender may be treating them better than anyone has ever treated them. They may come to realize they are victims when the offender pushes them out. Then they recognize that all the attention, affection, and gifts were just part of the master plan to use and exploit them. This may be the final blow for a troubled child who has had a difficult life. Most of these victims never disclose their victimization. Younger children may believe they did something "wrong" or "bad" and are afraid of getting into trouble. Older children may be more ashamed and embarrassed. Many victims not only do not disclose, but they strongly deny it happened when confronted. In one case several boys took the stand and testified concerning the high moral character of 58 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728686 the accused molester. When the accused molester changed his plea to guilty, he admitted that the boys who testified for him were also victims. In another case a 16-year-old victim tried to murder the man who had sexually exploited him but still denied he was sexually victimized. He pled guilty rather than use the abuse as a mitigating circumstance and publicly admit he had engaged in sexual activity with a man. He privately admitted his victimization to a prosecutor, but said he would always publicly deny it. The most common reasons that victims do not disclose are stigma of homo- sexuality, lack of societal understanding, presence of positive feelings for the offender, embarrassment or fear over their. Nictimization, or do not believe they are victims. Since most of the offenders are male, the stigma of homosexu- ality is a serious problem for male victims. Although being seduced by a male child molester does not necessarily make a boy a homosexual, the victims do not understand this. If a victim does disclose, he believes that he is risking significant ridicule by his peers and lack of acceptance by his family. These seduced or compliant child victims obviously do sometimes disclose. Such victims often disclose because the sexual activity is discovered (e.g., abduc- tion, recovered child pornography, overheard conversations) or suspected (e.g., statements of other victims, association with known sex offender, proactive investigation) and they are then confronted. Others disclose because the offender misjudged them, got too aggressive with them, or is seducing a younger sibling or dose friend of theirs. Victims sometimes come forward and report because they are angry with the offender for "dumping" them. They might be jealous that the offender found a younger victim. They disclose because the abuse has ended, not to end the abuse. A particular aspect of this offender-victim bond is especially troubling for the criminal-justice system. Some older child victims, when being pushed out, or while still in the pipeline, may assist the offender in obtaining new victims. They still want to trade sex for attention, affection, gifts, or money, but their sexual worth has diminished in value. They have to come up with something else of value. They then become the bait to lure other victims. Such recruiters or "gradu- ate" victims can and should be considered subjects of investigation. Their offenses, however, should be viewed in the context of their victimization and the child sex ring. High-Risk Situations There are certain high-risk situations that arise in investigating acqtiaintance- exploitation cases. Unfortunately certain youth organizations inadvertently provide the child molester with almost everything necessary to operate a child sex ring. A scouting organization, for example, fulfills the offender's needs for access to children of a specific age or gender, a bonding mechanism to ensure the cooperation and secrecy of victims, and opportunities to spend the night with a victim or have a victim change clothing. The bonding mechanism of the scouts is especially useful to the offender. Loyalty to the leader and group, competition among boys, a system of rewards and recognition, and indoctrina- tion through oaths and rituals can all be used to control, manipulate, and motivate victims. Leaders in such organizations, especially those who are not the parents of children involved, should be carefully screened and closely monitored. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 59 EFTA01728687 Another high-risk situation involves high-status authority figures. As stated above, child molesters sometimes use their adult authority to give them an edge in the seduction process. Adults with an added authority (e.g., teachers, camp counselors, coaches, religious leaders, law-enforcement officers, doctors, judges) present even greater problems in the investigation of these cases. Such offenders are in a better position to seduce and manipulate victims and escape responsibil- ity. They are usually believed when they deny any allegations. In such cases the law-enforcement investigator must always incorporate understanding of the seduction process into interviews, take the "big-picture" approach, and' try to find multiple victims or recover child pornography or erotica in order to get A conviction. (See the chapter titled "Investigating Acquaintance Sexual Exploita- tion" beginning on page 101.) The most difficult case of all involves a subject who has an ideal occupation for any child molester: a therapist who specializes in treating troubled children. This offender need only sit in his office while society preselects the most vulner- able victims and brings them to him. The victims are by definition "troubled" and unlikely to be believed if they do make an allegation. In addition such thera- pists, especially if they are psychiatrists or physician's assistants, can claim that certain acts of physical touching were a legitimate part of their. examination or treatment. They may also claim to be conducting-research -on child development or sexual victimization. Again such a case could probably be proven only through the identification of patterns of behavior, multiple victims, and the recovery of child pornography or erotica. Fortunately for law enforcement in the United States, but unfortunately for children in the United States, such offenders almost always have highly predictable behavior patterns, multiple victims, and child-pornogra- phy and erotica collections. 60 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728688 Collection of Child Pornography and Erotica Law-enforcement investigations have verified that preferential sex offenders in general almost always collect theme pornography and paraphernalia related to their sexual preferences. Preferential sex offenders without a preference for children can have extensive collections. Such offenders will collect images and paraphernalia focusing primarily on their particular sexual preferences or paraphilias rather than predominantly on children. Child pornography will usu- ally be only a small portion of their potentially large and varied collection with the children often portrayed in their paraphilic interests. Pedophiles almost always collect predominately child pornography or erotica. Situational-type child molesters might also collect pornography but not with the high degree of predictability of the preferential sex offender. The pornogra- phy they do have will often be of a violent and degrading nature. In the child pornography collected by situational sex offenders and nonpedophile-preferen- tial sex offenders, the children might be dressed up (i.e., stockings, high heels, makeup) to look like adults or be pubescent teenagers. Situational sex offenders might collect pornography or erotica of a predominately violent theme but prob- ably will not save the same material year after year. Investigators should always consider the possibility that any child molester might collect child pornography or erotica; however, it is almost a certainty with the pedophile type. Especially for preferential-type sex offenders, collection is the key word here. It does not mean that they merely view pornography. They save it. It comes to define, fuel, and validate their most cherished sexual fantasies. They typically collect things such as books, magazines, articles, newspapers, photographs, nega- tives, slides, movies, albums, digital images, drawings, audiotapes, videotapes and equipment, personal letters, diaries, clothing, sexual aids, souvenirs, toys, games, lists, paintings, ledgers, photographic and computer equipment all relating to their preferences in a sexual, scientific, or social way. Not all preferential sex offenders collect all these items, and their collections can vary significantly in size and scope. Factors that formerly seemed to influence the size of an offender's collection included socioeconomic status, living arrangements, and age. Better educated and more affluent offenders tended to have larger collections. Offenders whose living or working arrangements gave them a high degree of privacy tended to have larger collections. Because collections are accumulated over time, older offenders tended to have larger collections. Today, however, the computer has changed all of this. Almost anyone with an online computer can, in a relatively short time and at minimal expense, have a large collection of theme pornography especially child pornography. A short time ago it would have taken years at great expense to accumulate such a collection. In a computer the collection can also be easily hidden from family and friends. With an online computer a 20-year-old, blue-collar worker living with his parents can have a collection as large as a 55- year-old executive living alone in a mansion. The older, more affluent offender, however, is more likely to have more of his collection not on the computer. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 61 EFTA01728689 Child pornography, by itself, represents an act of sexual abuse or exploitation of a child and, by itself, does harm to that child. Preferential sex offenders with the economic means pre- viously converted parts of their collections to videotape when that technology became available. They converted their books, magazines, photographs, and movies to video- tape. For a seemingly ever-decreasing price, an offender could have his own video camera and two video recorders, which gave him the capability to produce and duplicate obscene material or child pornography with little fear of discovery. Although videotape still has a significant appeal, an ever-increasing portion of most collections is now being digitally stored or duplicated on computers and disks. iatillaiPeLsialiawat ita What the pedophile collects can be divided into two categories. They are child pornography and child erotica. Child pornography can be behaviorally, not legally, defined as the sexually explicit reproduction of a child's image and includes sexually explicit photographs, negatives, slides, magazines, movies, vid- eotapes, and computer disks. In essence it is, or was, the permanent record of the sexual abuse or exploitation of an actual child. Child pornography, by itself, rep- resents an act of sexual abuse or exploitation of a child and, by itself, does harm to that child. The online computer and Internet, however, have radically changed most of what could have been said about the possession and distribution of child pornography in the United States iri the 1980s and early 1990s. Legal definitions of the term "child pornography" vary from state-to-state and under federal law. Under most definitions child pornography usually involves a visual depiction (not the written word) of a child (a minor as defined by statute) that is sexually explicit (not neces- sarily obscene unless required by state law). The federal child-pornography law (18 U.S.C.A. § 2256) defines a child or minor as someone who has not yet reached his or her eighteenth birthday. In contrast to adult pornography, but consistent with the gender preference of many pedophiles, there is a high percentage of boys in child pornography. Because true child pornography once was hard to obtain, some pedophiles have or had only child erotica in their collections (see discussion of child erotica beginning on page 65); however, because of online computers, child pornography is now more readily available in the United States than it has been since the late 1970s. Child pornogra- phy is so readily available on the Internet, it is possible to store a collection in cyberspace and download it anytime one wants to view it. Because it represents his sexual fan- tasies (e.g., age and gender preferences, desired sexual acts) the collection of any child molester should be carefully examined and evaluated. Previous research I conducted with Drs. Carol R. Hartman and Ann W. Burgess identified four kinds of child-pornography collectors. They are "closet," The online computer and Internet ... have radically changed most of what could have been said about the possession and distribution of child pornography in the United States in the 1980s and early 1990s. 62 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728690 "isolated," "cottage," and "commercial" (Hartman, Burgess, & Lanning, 1984). The "closet collector" keeps his collection a secret and is not actively involved in molesting children. Materials are usually purchased discreetly through commer- cial channels. The "isolated collector" is actively molesting children as well as collecting child pornography or erotica. Fear of discovery overrides his need for active validation and causes him to keep his activity a secret between only himself and his victims. His collection may include pictures of his victims taken by him as well as material from other sources. The "cottage collector" shares his collection and sexual activity with other individuals. This is usually done primarily to vali- date his behavior, and money or profit is not a significant factor. Photographs, videotapes, and "war stories" are swapped. and traded with other child molesters, and sometimes, unknowingly, with undercover investigators. The "commercial collector" recognizes the monetary value of his collection and sells his duplicates to other collectors. Although profit is an important motive, these individuals are usually active sexual molesters themselves. It is important to recognize that the patterns identified in this research predated widespread public use of the Internet. As with most forms of human behavior it is probably best to view the behav- ior of collecting child pornography on a continuum. It ranges from those who "just" collect to those who collect and noncriminally interact with children to those who collect and actively seek validation for their interests to those who collect and swap, trade, or sell child pornography to those who collect and pro- duce child pornography to those who collect and molest children to those who collect and abduct children. All possibilities must be considered and evaluated. With the exception of technical child pornography (see discussion beginning on page 64), the primary producers, distributors, and consumers of child pornogra- phy in the United States are child molesters, pedophiles, and sexual deviants. Child pornography is not a multibillion-dollar industry run by organized crime or satanic cults. With the advent of the Internet, however, it does appear that profit-motivated, child-pornography distribution has returned and is growing. Commercial Versus Homemade Child pornography can be divided into two subcategories. They are commercial and homemade. Commercial child pornography is that which is produced and intended for commercial sale. Because of strict federal and state laws today, there is no place in the United States where commercial child pornography is knowingly openly sold. What child pornography is now being commercially dis- tributed in the United States is most often sold on the Internet. For other than Internet distribution, the risks are usually too high for the strictly commercial dealer or common criminal. Because of their sexual and personal interests, how- ever, preferential sex offenders are more willing to take those risks. Their motive goes beyond just profit. In the United States it is primarily a cottage industry run by pedophiles and child molesters. Some commercial child pornography being distributed in the United States was smuggled in from foreign countries by pedophiles. Commercial child pornography is more readily available in foreign countries. United States citizens, however, seem to be the main customers for much of this material. Some offenders collect their commercial child pornogra- phy in ways (e.g., photographs of pictures in magazines, pictures cut up and mounted in photo albums, names and descriptive information written below, homemade labels on commercial videotapes, scanned into a computer) that make CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 63 EFTA01728691 it appear to be homemade child pornography. If necessary, highly experienced investigators and forensic laboratories could be of assistance in making distinctions between homemade and commercially produced child pornography. Contrary to what its name implies, the quality of homemade child pornogra- phy can be as good if not better than the quality of any commercial pornography. The pedophile has a personal interest in the product. Homemade simply means it was not originally produced 'primarily for commercial sale. Although.commercial child pornography is not openly sold in "brick and mortar" stores anywhere in this country, homemade child pornography is continually produced, swapped, and traded in almost every community in the United States primarily via the Internet. Although rarely found in "adult" bookstores, child pornography is frequently found in the homes and offices, especially on the computers, of doctors, lawyers, teachers, clergy members, and other apparent pillars of the com- munity. There is, however, a connection between commercial and homemade child pornography. Sometimes homemade child pornography is sold or winds up in commercial child-pornography magazines, movies, and videos or uploaded on the Internet. The same pictures are reproduced and circulated again and again. With rapidly increasing frequency, more and more of both commercial and home- made child pornography is found in digital format on computers and disks. In this format there is no loss of quality when it is reproduced. This actually increases the odds of finding child pornography in any investigation. Again the Internet has tended to blur the distinction between commercial and homemade child pornography. Technical Versus Simulated In understanding the nature of child pornography, investigators must also recognize the distinction between technical and simulated child pornography. As previously stated the federal child-pornography law (18 U.S.C.A. § 2256) defines a child as anyone younger than the age of 18; therefore, a sexually explicit photograph of a pubescent, mature looking 15-, 16-, or 17-year-old girl or boy is what I call technical child pornography. Technical child pornography does not look like child pornography, but it is. The production; distribution; and, in some cases, possession of this child pornography could and should be investigated under appropriate child-pornography statutes. Technical child pornography is an exception to much of what we say about child pornography. It often is pro- duced, distributed, and consumed by individuals who are not child molesters or pedophiles; is more openly sold in stores and distributed around the United States; and more often portrays females than males. In essence, because it looks like adult pornography, it is more like adult pornography. On the other hand, sexually explicit photographs of 18-year-old or older males or females may not legally be child pornography, but, if the person portrayed in such material is young looking, dressed youthfully, or made up to look young, the material could be of interest to pedophiles. This is what I call simulated child pornography. Simulated child pornography looks like child pornography, but may not be. (See discussion below.) It is designed to appeal to the pedophile but it usually is not legally child pornography because the individuals portrayed are older than 18. This illustrates the importance and sometimes the difficulty in proving the age of the child in the photographs or videotapes. Particularly difficult is pornography portraying underage children pretending to be overage 64 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728692 models pretending to be underage children and "virtual" child pornography that is created with computer software that does not involve the depiction of actual children. The ability to manipulate digital visual images with a computer can make it more difficult to determine the ages of the persons in them. Computer-manipu- lated and, soon, computer-generated visual images of individuals who appear to be, but are not, children engaging in sexually explicit conduct may call into question the basis for highly restrictive (i.e., possession, advertising) child- _pornography laws. In an attempt to deal with this problem, the Child Pornography Prevention Act (CPPA) of 1996, 18 U.S.C.A. § 2252A, expanded the federal definition of "child pornography" to include not only a sexually explicit visual depiction using a minor, but also any visual depiction that "has been created, adapted, or modified to appear (emphasis added) that an identifi- able minor is engaging in sexually explicit conduct." This expanded definition, in essence, federally criminalizes simulated child pornography. Although this new law makes prosecution of cases involving manipulated computer images easier, it also means that it is no longer possible in every case to argue that child pornogra- phy is the permanent record of the abuse or exploitation of an actual child. The significance of being able to make that argument will be discussed shortly. This law is currently being challenged in a variety of cases and jurisdictions, and the U.S. Supreme .Court will ultimately establish its constitutionality. If this law is found unconstitutional, only existing obscenity laws may apply to such manipulated/simulated child pornography. With other than simulated and/or virtual child pornography, it could be effec- tively argued that• child pornography requires a child to be victimized. A child had to be sexually exploited to produce the material. Children used in pornogra- phy are desensitized and conditioned to respond as sexual objects. They are frequently ashamed of their portrayal in such material. They must deal with the permanency, longevity, and circulation of such a record of their sexual victimization. Some types of sexual activity can be repressed and hidden from public knowledge. When this happens child victims can imagine that some day the activity will be over, and they can make a fresh start. Many children, espe- cially adolescent boys, vehemently deny their involvement with a pedophile. But there is no denying or hiding from a sexually explicit photograph or videotape. The child in a photograph or videotape is young forever, and the material can be used over and over again for years. Some children have even committed crimes in attempts to retrieve or destroy the permanent records of their molestation. The fact that none of these points can be argued about simulated child pornography greatly weakens the jury and sentencing appeal of cases prosecuted under that portion of the 1996 CPPA. PaitpAgfurcrolt@i") In addition to theme pornography, preferential sex offenders are also highly likely to collect other paraphernalia related to their sexual interests. Focusing on child molesters, in the early 1980s I started calling this other material "child erotica." In Child Molesters: A Behavioral Analysis (fanning, 1986), I defined it as "any mate- rial, relating to children, that serves a sexual purpose for a given individual." It is 'a broader, more encompassing, and more subjective term than child pornogra- phy. It includes things such as fantasy writings, letters, diaries, books, sexual aids, CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 65 EFTA01728693 souvenirs, toys, costumes, drawings, and nonsexually explicit visual images. Such child erotica might also be referred to as "pedophile paraphernalia." This type of material is usually not illegal to possess or distribute. Because of the diversity of material that could be considered "child erotica," there was no way to develop a comprehensive itemization; therefore, I divided it into categories defined by its nature or type. These categories are published mate- rial, unpublished material, pictures, souvenirs and trophies, and miscellaneous. (See Laming, 1992a.) Later my partner of many years, former FBI Special Agent Roy Hazelwood, applied the same concept to sexual sadists (also preferential sex offenders) and called this type of material "collateral evidence." Hazelwood, however, divided it by its purpose or use such as educational, intro- spective, and intelligence. Hazelwood's term was probably better because, for many professionals, the term "erotica" implies only a sexual use for the mate- rial. Many investigators had begun using the term "child erotica" to refer only to visual images of naked children that were not considered pornography. These two different approaches were eventually reconciled in a book chapter by Hazelwood and Lanning titled, "Collateral Materials in Sexual Crimes" (Hazelwood & Laming, 2001). For investigative purposes child erotica or collateral evidence can be divided into the categories noted below. Published Material Relating to Children • Examples of this include books, magazines, articles, or videotapes dealing typically with any of the areas noted below. ■ child development ■ sex education ■ child photography ■ sexual abuse of children ■ incest ■ child prostitution ■ missing children ■ investigative techniques ■ legal aspects ■ access to children ■ sexual disorders ■ pedophilia ■ man-boy love ■ personal ads ■ detective magazines ■ "men's" magazines ■ nudism ■ ' erotic novels ■ cataloga/broChures ■ Internet Listings of foreign sex tours, guides to nude beaches, and material on spon- soring orphans or needy children provide them with infbrmation about access to 66 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS t .• • EFTA01728694 children. Detective magazines saved by pedophiles usually contain stories about crimes against children. The "men's" magazines collected may have articles about sexual victimization of children. The use of adult pornography to lower inhibi- tions is discussed elsewhere in this publication. Theme adult pornography may help to prove the offender's interest in similar paraphilic behavior involving children. Although the pocassion of information on missing children should be carefully investigated to determine possible involvement in abduction, most pedophiles collect this material to help rationalize their behavior as child "lovers," not abductors. Personal ads include those in "swinger" magazines; video maga- zines, newspapers, and on the Internet. These ads may mention "family fun," "family activity" "European material," "youth training," "unusual and bizarre," "better life," and "barely legal." Sites on the Internet are somewhat less likely to use this "code" language. Erotic novels may contain stories about sex with chil- dren but without sexually explicit photographs. They may contain sketches or drawings. Materials concerning current or proposed laws dealing with sex abuse; arrested, convicted, or acquitted child molesters; or investigative techniques used by law enforcement are common. Unpublished Material Relating to Children Examples include items such as personal letters audiotapes diaries fantasy writings manuscripts financial records ledgers telephone and address books pedophile manuals newsletters and bulletins directories adult pornography computer chat electronic mail (E-mail) Any or all of this material could be on a computer or floppy disk. Much of it can now be obtained on the Internet. Directories usually contain information on where to locate children. Pedophile support groups, such as the North American Man/Boy Love Association (NAMBLA) and other similar support groups, distrib- ute newsletters and bulletins. Ledgers and financial records might include canceled checks used to pay victims or purchase erotica or pornography and details of credit-card transactions. Manuscripts are writings of the offender in formats suitable for real or imagined publication. Logs of computer chat and E- mail can be especially valuable to investigators. Because it may help to prove the offender's paraphilic interests involving children, theme adult pornography should be considered as possible collateral evidence. Any of this material could be encoded to make evaluation more difficult. Codes could range from simple sub- stitution and invented symbols to more complicated encryption. H N...1O].!-...,[•FL:s: A - 67 EFTA01728695 Pictures, Photographs, and Videotapes of Children Examples include children found in ■ photography, art, or sex-education books ■ photography albums, displays, collages ■ candid shots ■ photocopies of photographs or pictures ■ drawings and tracings ■ posters and paintings ■ advertisements ■ children's television programs or videos ■ cut-and-paste pictures ■ computer-manipulated images ■ digitally encoded images on computer or compact disks, read-only memory (CD-ROMs) Cut-and-paste involves creating new pictures by cutting and pasting parts of old ones. This can be done more easily with a computer and the right software. Seized videotapes should always be viewed or scanned in their entirety because a variety of material, including hard-core child pornography, could be on any one tape. Some pedophiles cut out pictures of children from magazines and put them in albums as if they were photographs. Such visual images of children can be obtained on the Internet and stored on hard drives, floppy disks, CD-ROMs, or digital video discs (DVDs). Souvenirs and Trophies Examples may include the mementos of children such as ■ photographs of "victims" ■ articles of clothing ■ jewelry and personal items ■ audio- and videotapes and computer files ■ letters and notes ■ charts and records This material all relates to real or fantasy "victims." Photographs of "victims" collected by pedophiles are often labeled or marked. Charts and records might include astrology, growth; or biorhythm charts. Audiotapes, letters, and notes collected for souvenir purposes are usually from past child victims and discuss what the two did together and how much the victims like the offender. These communications can now be made and stared on a computer. Personal items could even include victims' fingernails, hair, or underWeir. Miscellaneous This category can include-items used in. seducing children such as ■ cohiputers and peripheral ecluiphieht II sexual aids ■ toys, games, and dolls ■ costumes 68 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728696 ■ child- or youth-oriented decorations ■ video, film, and digital photography equipment ■ alcohol and drugs Costumes include those worn by the offender and children. Toys, games, drugs, and alcohol can all be used as part of the seduction process to lower inhibitions. Dolls of varying sizes and types can also be used for simulated and autoerotic sexual activity. The photography equipment may be hidden in such a way as to surreptitiously record children performing acts such as going to the bathroom or undressing. Computers constitute a potential gold mine of evidence and will be discussed in more detail in the chapter titled "Use of Computers by Sex Offend- ers" beginning on page 89. ' I It is difficult to know with certainty why preferential sex offenders collect theme pornography and related paraphernalia. There may be as many reasons as there are offenders. Collecting this material may help them satisfy, deal with, or rein- force their compulsive, persistent sexual fantasies. Some child erotica is collected as a substitute for preferred but unavailable or illegal child pornography. Collecting may also fulfill needs for validation. Many preferential sex offend- ers collect academic and scientific books and articles on the nature of their paraphilic preferences in an effort to understand and justify their own behavior. For the same reason pedophiles often collect and distribute articles and manuals written by pedophiles in which they attempt to justify and rationalize their behavior. In this material pedophiles share techniques for finding and seducing children and avoiding or dealing with the criminal-justice system. Preferential sex offenders get passive validation from the books and articles they read and collect. Many preferential sex offenders swap pornographic images the way boys swap baseball cards. As they add to their collections they get strong reinforcement from each other for their behavior. The collecting and trading process becomes a com- mon bond. Preferential sex offenders get active validation from other offenders, some victims, and occasionally from undercover law-enforcement officers oper- ating "sting" operations. The Internet makes getting active validation easier than ever before. Fear of discovery or identification causes some offenders to settle only for passive validation. The need for validation may also partially explain why some preferential sex offenders compulsively and systematically save the collected material. It is almost as though each hour spent on the Internet and each communication and image is evidence of the value and legitimacy of their behavior. For example one offender sends another offender a letter or E-mail enclosing photographs and describing his sexual activities with children. At the letter's or E-mail's conclusion he asks the recipient to destroy the letter or E-mail because it could be damaging evidence against him. Six months later law enforcement finds the letter or E-mail—care- fully filed as part of the offender's organized' collection. Offenders' need for validation is the foundation on which proactive investigative techniques (e.g., stings, undercover operations) are built, and it is also the primary reason they work so often. In a letter or during Internet correspondence an offender states CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 69 EFTA01728697 that he suspects the recipient is an undercover law-enforcement officer and asks for assurances that the recipient is not. The recipient who is in fact an undercover officer sends a reply assuring the offender that he is not. The offender accepts his 'word and then proceeds to send child pornography and make incriminating state- ments. Although their brains may tell them not to send child pornography or reveal details of past or planned criminal acts to someone they met online, their need for validation often compels them to do so. They believe what they need to believe. Some of the theme pornography and erotica collected by preferential sex offenders is saved as a souvenir or trophy of the relationships with victims. All child victims will grow up and become sexually unattractive to the pedophile. In a photograph, however, a 9-year-old child stays young forever. This is one reason why many pedophiles date and label their pictures and videotapes of children. Images and personal items become trophies and souvenirs of their relationships— real or fantasized. The offenders' needs to validate their behavior and have souvenirs of their relationships are the motivations most overlooked by investigators when evaluat- ing the significance of the pornography and erotica collections of pedophiles and other preferential sex offenders. Although the reasons preferential sex offenders collect pornography and erotica are conjecture, we can be more certain as to how this material is used. Study and law-enforcement investigations have identified certain criminal uses of the material by pedophiles. Child pornography and erotica are used for the sexual arousal and gratifica- tion of pedophiles. They use child pornography the same way other people use adult pornography—to feed sexual fantasies. Some pedophiles only collect and fantasize about the material without acting out the fantasies, but for others the arousal and fantasy fueled by the pornography is only a prelude to actual sexual activity with children. A second use of child pornography and erotica is to lower children's inhibi- tions. A child who is reluctant to engage in sexual activity with an adult or pose for sexually explicit photographs can sometimes be convinced by viewing other children having "fun" participating in the activity. Peer pressure can have a tremendous effect on children. If other children are involved, the child might be led to believe that the activity is acceptable. When the pornography is used to lower inhibitions, the children portrayed will usually appear to be having a good time. Books on human sexuality, sex education, and sex manuals are also used to lower inhibitions. Children accept what they see in books, and many pedophiles have used sex education books to prove to children that such sexual behavior is acceptable. Adult pornography is also used, particularly with adolescent boy victims, to arouse them or lower inhibitions. A third major use of child pornography collections is blackmail. If a pedophile already has a relationship with a child, seducing the child into sexual activity is only part of the plan. The pedophile must also ensure that the child keep the secret. Children are often most afraid of pictures being shown to their 70 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728698 friends. Pedophiles use many techniques to blackmail; one of them is through photographs taken of the child. If the child threatens to tell his or her parents or the authorities, the existence of sexually explicit photographs can be an effective silencer. A fourth use of child pornography and erotica is as a medium of exchange. Some pedophiles exchange images of children for other images or access to telephone numbers of other children. The quality and theme of the material determine its value as an exchange medium. Rather than paying cash for access to a child, the pedophile may exchange a small part, usually duplicates, of his collection. Digital images on a computer make the production of duplicates, equal in quality to the original, easier than ever. The younger the child and more bizarre the acts, the greater the value of the pornography. A fifth use of the collected material is profit. Some people involved in the sale and distribution of child pornography are not pedophiles; they are profiteers. In Contrast most pedophiles seem to collect child erotica and pornography for rea- sons other than profit. Some pedophiles may begin nonprofit trading, which they pursue until they accumulate certain amounts or types of images, which are then sold to distributors for reproduction in commercial child-pornography maga- zines or made available on the Internet for downloading. Others combine their pedophilic interests with their profit motive. Some collectors have their own photographic reproduction equipment. Thus the image of a child taken with or without parental knowledge by a neighborhood pedophile in any community in the United States can wind up in a commercial child-pornography magazine or on the Internet with worldwide distribution. Important The preferential sex offender's collection is usually one of the most important things in his life. He is willing to spend considerable time and money on it. Most pedophiles make no profit from their collections. After release from prison many pedophiles attempt to get their collections back. State and federal laws banning its mere possession will most likely prevent the return of the child pornography. But unless denial is made a condition of treatment, probation, or parole, the child erotica may have to be returned. Constant No matter how much the preferential sex offender has, he never has enough. He rarely throws anything away. If law enforcement has evidence that an offender had a collection 5 or 10 years ago, chances are he still has the collection now— only it is larger. This is a significant characteristic to consider when evaluating the staleness of information used to obtain a search warrant. Organized The preferential sex offender usually maintains detailed, neat, orderly records. There are exceptions, but the collections of many offenders are carefully orga- nized and maintained. As will be discussed, many of these offenders now use computers for this purpose. CHILD MOL RS: A BEHAVIORAL ANALYSIS - 71 EFTA01728699 Permanent The preferential sex offender will try to find a way to keep his collection. He might move, hide, or give his collection to another offender if he believes law enforcement is investigating him. Although he might, he is not likely to destroy the collection because it is his life's work. In some cases he might even prefer that law enforcement seize and keep it intact in an evidence room where he might retrieve at least some of it when released from prison. One offender is known to have willed his' collection to a fellow pedophile. Another offender, knowing he would never get his child pornography back, still requested to go to the prosecutor's office to put his magazines in covers and dividers so they would not be damaged. Concealed Because of the hidden or illegal nature of the preferential sex offender's activity, he is concerned about the security of his collection. But this must always be weighed against his access to the collection. It does him no good if he cannot get to it. Where offenders hide their collections often depends on their living arrangements. If living alone or with someone aware of his illegal preferences, the collection will be less well concealed. It might be in a trunk, box, cabinet, bookcase, out in the open, or on a computer. The pornography might be better hidden than the erotica. If living with family members or others not aware of his activity, it will be better concealed. The collection might be found behind a false panel, in the ductwork, under insulation, or on a password-protected computer. The collection is usually in the pedophile's home, but it could be in an automobile or a camper, at his place of business, in a safety deposit box, or in a rented storage locker. The most difficult location to find is a secret place in a remote rural area. The investigator should search any area that is under the control of the offender. Again, computer technology has changed much of this. Computers and various types of disks make it possible to hide illegal and incriminating material in "plain sight." Shared The preferential sex offender frequently has a need or desire to show and tell others about his collection. He is seeking validation for all his efforts. The investigator can use this need to his or her advantage by showing interest in' the collection during any interview of an offender. The offender might appreciate the opportunity to brag about how much time, effort, and skill went into his collection. This need can also be exploited during proactive or undercover investigations. Investigators should not expect to find child pornography or erotica in all or even most cases involving the sexual victimization of children. It can be found in intrafamilial cases. It is most often found in cases involving preferential sex offenders especially pedophiles. Investigators can always attempt to get a warrant to search based on reliable case-specific information that a particular suspect pos- sesses child pornography or other evidence of criminal behavior. During any investigation of child sexual victimization the possible presence of child pornography and erotica must be explored. For law-enforcement officers 72 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728700 the existence and discovery of a child-erotica or child-pornography collection can be of invaluable assistance to the investigation of any case involving the sexual victimization of children. Obviously child pornography itself is usually evidence of criminal violations. Child pornography should always be viewed as both a violation of the law and possible corroboration of child sexual victimization. The investigation of child molestation should always consider the possibility that there might be child pornography. The investigation of child pornography should always consider the possibility that there might be child molestation. Few law-enforcement officers would ignore or fail to seize sexually explicit child pornography found during a search. But, over and over again, officers ignore and leave behind the child erotica and collateral evidence. In some cases even adult pornography can be child erotica and, therefore, of investigative interest. Although not as significant or damaging as child pornography, child erotica is valuable evidence of intent and a source of valuable intelligence information. The ledgers, diaries, letters, books, souvenirs, adult pornography, or nonsexually explicit images of children that can be part of a child-erotica collection can be used as supportive evidence. The recognition and evaluation of the significance of this type of material requires insight, common sense, and good judgment. The investigative experience of some law-enforcement officers dealing with pornography is often limited to commercial pornography distributed by indi- viduals motivated by monetary profit. The direct connection between the pornography and sex crimes is rarely a factor in these kinds of cases. In an investigation narrowly focused only on the pornography or obscenity violations, officers might have legal problems justifying the seizure of child erotica and col- lateral evidence found when executing a search warrant or consent to search. In an investigation more broadly focused on child pornography and its role in the sexual exploitation of children by child molesters, however, officers should recog- nize the evidentiary value of child erotica. If the facts of the case justify it, this relationship between child pornography and the sexual exploitation of children can be set forth in the affidavit for a search warrant. Both the child pornography and erotica should be seized as evidence when found in such cases. Child pornog- raphers are sometimes child molesters. The photograph of a fully dressed child may not be evidence of a pornography violation, but it could be evidence of an offender's sexual involvement with children. Because child erotica usually is not illegal to possess, the legal basis for its seizure must be carefully considered. If there is doubt about the legality of the seizure, its presence should be noted and, if possible, photographed or video- taped. As with child pornography, this type of material is increasingly being stored on computers and floppy disks. The investigative and prosecutive value of such "child erotica" or "collateral evidence" is for the purposes of ■ intelligence - insight into the scope of the offender's activity; names, ad- dresses, and pictures of additional victims; dates and descriptions of sexual activity; names, addresses, telephone numbers, and admissions of accom- plices and other offenders; and descriptions of sexual fantasies, background information, and. admissions of the subject are frequently part of a child- erotica collection. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 73 EFTA01728701 ■ intent - it can be useful in proving that an offender's activity with a child or collection of visual images of children was for sexual gratification. It can be part of the context used to evaluate child pornography (i.e., shed.light on the distinction between innocent nudity and lascivious exhibition of the genitals). ■ bond - it can be used at a bond hearing to help indicate the nature of the subject's sexual fantasies and interests and his potential dangerousness. ■ guilty plea - the seizure and documentation of such material negates many common defenses and increases the likelihood of a guilty plea. ■ sentencing - even if not admissible at trial, it can be introduced at the time of sentencing to demonstrate the full scope of the defendant's behav- ior and interests. Child erotica must be evaluated in the context in which it is found. Although many people might have some similar items in their home, it is only the pedo- phile who collects such material for sexual purposes as part of his seduction of and fantasies about children. Many people have a mail-order catalog in their home, but only a pedophile has albums full of children's underwear ads he clipped and saved from past catalogs. The law-enforcement investigator must use good judgment and common sense. Possession of an album filled with pictures of the suspect's own fully dressed children probably has no significance. Possession of 15 albums filled with pie- hires of fully dressed children unrelated to the suspect probably has significance. Possession of his own children's underwear in their dresser probably is normal. Possession of a suitcase full of little girls' underwear probably is suspicious. Pos- session of a few books about child development or sex education on a bookshelf probably has no significance. Possession of dozens of such books together in a box probably is significant. Possession of numerous books, magazines, articles, or newspaper clippings about the sexual development and abuse of children or about pedophilia in general can be used as evidence of intent at a subsequent trial. It is difficult to disprove the claim of a wrestling coach that his touching was legitimate athletic training or the claim of a teacher that his or her touching was normal, healthy affection. This difficult task can be made easier if law enforcement has seized a child-erotica collection that includes items such as a diary or fantasy writ- ings describing the sexual stimulation experienced when touching a child to demonstrate a wrestling hold or fondling a student. valuation, o .ti:;)73HNI. ;it&ttqk Determining Age Proving that the person in a sexually explicit image is a child or minor can some- times be difficult. With young, clearly prepubescent victims, the trier of fact can make the determination based simply on looking at the images. Pediatricians or pediatric endocrinologists can be brought in as experts to evaluate the sexual development of the persons portrayed in the visual images. Such doctors cannot determine a precise age, but can testify to the probability that the person por- trayed is younger than a certain age. Although they can use something called the 74 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728702 Tanner Scale or their own sexual-maturation scale to describe the stages of sexual development, correlation to age must be based on the doctor's own clinical expe- riences. This might have to include experience with specific races and ethnic groups. Often the quality and angle of the visual images make such a determina- tion by even a qualified doctor difficult or impossible. In addition, even if still a minor, once the person portrayed has entered the last stage of sexual develop- ment, it may be impossible for any doctor to reliably testify that the individual is younger than 18 years of age. One obvious, but often difficult, way to prove the age of the person in the image is to identify the person and determine the date the image was created. This is usually easier if the offender is the producer of the child pornography. (See section below for further discussion on identifying victims.) Sometimes newly recovered images can be matched with old identified images in which the age of the child has already been determined or proven. Markings and notations made by the offender on or near the images or the computer file names can be useful in justifying seizure if not as proof in court. As previously stated the ability to manipulate digital visual images has made it even more difficult in computer camas to prove that the person in the sexually explicit image is a child or minor. (See the chapter titled "Use of Computers by Sex Offenders," beginning on page 89, for further discussion of the issue of computer manipulation of images.) Identifying Child Pornography and Erotica Victims Every effort should be made to attempt to identify the children, even those fully dressed, in photographs or videotapes found in the possession of a pedophile. This is especially true if these items appear to have been produced by the offender himself. The children in the pornography were sexually abused or exploited. The children in the erotica images are possibly, but not necessarily, victims. This identification must be done discreetly in order to avoid potential public embar- rassment to the children, whether or not they were sexually victimized. School yearbooks can occasionally be useful in identifying children. Sometimes the pedophile makes the identification unbelievably easy by labeling his photographs with names, descriptions, addresses, dates, and even sex acts performed. This is good lead information, but it is not always accurate. Many offenders exaggerate their sexual exploits or misidentify children in their fantasy material. In most child-pornography cases, especially computer cases, investigators and prosecutors are dealing with subjects who possess, receive (download), or distrib- ute (upload) the images, and not the producers of the images. To what extent should investigators go to try to identify the children in the seized images? Some of the images seized have repeatedly been seen by experienced investigators, and others have never been seen before. Some were produced years ago, and others seem to have been recently made. Some of the images portray children who have been identified in another- investigation, but that fact may not be known in a current investigation. Some images portray children smiling and laughing, and other images portray children in apparent agony. Some images appear to have been produced by the offender, and others appear to have only been received. Some images seem to portray children from other countries, and other images seem to portray children from the United States. Some images portray toddlers, and others portray teenagers. Many images are still photographs, but a growing number are moving images. How do any of these variables affect an obligation to CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 75 EFTA01728703 try to identify the children in the images? How do investigators and to what extent is it possible to identify them? These are difficult questions with no simple answers. The U.S. Attorney General Guidelines for Victim and Witness Assistance indicates that U.S. Depart- ment of Justice investigators and prosecutors are responsible for identifying and contacting all the victims of a crime (U.S. Department of Justice, 2000). Although the Guidelines state, "what constitutes a sufficient effort to identify, notify, and assist crime victims will necessarily vary with the facts of a particular violation," I am not sure exactly how this applies to child-pornography cases. An informed decision must be made based on a totality of the facts. The policy concerning identification of children in these images must be defensible and consistent. As of now there is no easily retrievable national database of identified child pornography against which newly recovered images can be compared. It is extremely difficult and impossibly time-consuming to positively identify children in pornography by comparing the images to photographs of missing children. It is important for investigators to realize that most of the children from the United States who are in prepubescent child pornography were not abducted into sexual slavery. They were most likely seduced into posing for these pictures or videos by an offender they probably knew. They were never abducted chil- dren. The children in child pornography are frequently smiling or have neutral expressions on their faces because they have been seduced into the activity after having had their inhibitions lowered by clever offenders. In some cases their own parents took the pictures or made them available for others to take the pictures. Children in pubescent or technical child pornography, however, are more likely to be missing children especially runaways or thrownaways being exploited by morally indiscriminate pimps, profiteers, or pedophiles. One cannot.arbitrarily try to identify a child by putting his or her face on the popular television show "America's Most Wanted: America Fights Back" and thereby announce to the country that the child has been sexually exploited. The benefit of doing so must outweigh the potential harm to the child portrayed. The circumstances under which children from other countries are exploited in child pornography is more varied, and they are obviously more difficult to identify. When the children portrayed in child-pornography or child-erotica images are identified and located, care and thought must be given to how and if they will be confronted with this information. Some children may not even know that they had been photographed. Others are so embarrassed and ashamed they may claim that they were drugged or asleep or may vehemently deny that the images actually portray them. Dates identifiable on material in the images (i.e., television viewing guide, magazine, adult pornography) may place the sexual activity within a time period or the statute of limitations. Sexually Explicit Conduct and Lasciviousness Most people have photographs of children somewhere in their homes, and many people also possess photographs of naked children. Under most state statutes and the current federal law (18 U.S.C.A. § 2256), pictures of children portraying simple nudity are not generally considered sexually explicit or obscene. The federal law requires at least "lascivious exhibition of the genitals or pubic area" to be consid- ered sexually explicit and therefore to constitute child pornography. How then can an investigator evaluate the possible significance of photographs of naked 76 - (Ain a Mk A I I i IAV:t ua.. EFTA01728704 children and other questionable photographs of children found in the possession of a suspected offender during a search? According to federal law, sexually explicit conduct means actual or simulated sexual intercourse including vaginal, oral, and anal; bestiality; masturbation; sadistic or masochistic abuse; or lascivious exhibition of the genitals or pubic area of any person. In some cases the child may not need to be naked in order for the depiction to be covered by this definition. Legal definitions of sexually explicit conduct are not necessarily synonymous with behavioral definitions. For example visual images of children engaged in a wide variety of conduct portraying and appealing to paraphilic sexual interests (e.g., getting an enema, wearing diapers, playing dead, urinating, wearing socks) may not meet legal definitions of sexually explicit conduct. As indicated above, current federal law (18 U.S.C.A. § 2256) chooses to specifically recognize only three of the many paraphilias (i.e., sadism, masochism, bestiality) as constituting sexually explicit conduct. The producing and collecting of child pornography and erotica visual images could also be considered possible indicators of the paraphilia voyeurism. It is important to understand that the lasciviousness often mentioned in child- pornography cases is not in the child's mind or even necessarily the photographer's, but in the mind of each producer, distributor, and collector of the material. This discussion of "lasciviousness" is not intended to be an exhaustive legal analysis of the issue. It is intended only to increase a common-sense understanding of this complex legal issue. This understanding is subject to change by more recent appellate court decisions. Some grossly explicit visual depictions of children clearly and obviously are always child pornography. The conduct portrayed is so sexually explicit that the visual depiction stands on its own. This might include a photograph of a man inserting his erect penis in a young girl's vagina. Some visual depictions of chil- dren, no matter the context or use, do not meet the minimum legal threshold and are never child pornography. This might include hundreds of photographs of children fully dressed in clothing ads from store catalogs, videotapes of children in television programs or commercials, or photographs of children's feet or shoes (i.e., partialistn, fetishism) that an offender collected for sexual arousal and/or paraphilic interest. Such material might constitute child erotica and still be of evidentiary value. Some visual depictions of children, however, may or may not be child pornography depending on the totality of facts. Such "sometimes" child pornography might include photographs of children naked or in their under- wear. Often investigators and prosecutors want to make a decision about the nature of a visual depiction of a child based only on looking at it. The difference between simple nudity (e.g., innocent family photographs, works of art, medical images) and the lascivious exhibition of the genitals, I believe, is often not in the visual depiction itself but in the context. Interpreting the meaning of "lascivious" has been an ongoing problem for investigators, prosecutors, and the courts. The appellate courts seem to be in agree- ment that ■ although the meaning of the term is less readily discernible than other types of defined sexually explicit conduct, it is not unconstitutionally vague or overbroad ■ the terms "lewd" and "lascivious" are virtually interchangeable ■ the standard for lascivious is clearly less than that for obscenity ■ whether a :'yen visual de • lotion is lascivious is a question of fact CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 77 EFTA01728705 The major area of controversy focuses on the question of wherein does the "lasciviousness" in question lie. There appear to be only three possibilities. They are in the ■ child portrayed ■ photographer/producer ■ recipient/collector The courts seem to be in clear agreement that the lasciviousness is not neces- sarily a characteristic of the child portrayed (first bullet above). In fact, other than attorneys defending child pornographers, some of the few lawyers taking a pub- lic position that the child must be acting or posing lasciviously were the U.S. Department of Justice attorneys in their 1993 brief to the Supreme Court con- cerning United States v. Knox, 510 U.S. 939 (1993) (case below, U.S. v. Knox, 977 F.2d 815 (3rd Cir. 1992)). Their opinion was ridiculed by the U.S. Congress, experts in the field, the public, and it was eventually rejected in United States v. Knox, 32 R3d 733 (3rd Cir. 1994). The lasciviousness of the photographer/producer (second bullet above), how- ever, is the area where the appellate courts have focused most of their attention and decisions. It appears that evidence the creator of the image intended to •elidt a sexual response in the viewer greatly increases the likelihood that the material in question will be found to be lascivious. The often-cited criteria set forth in United States v. Wiegand, 812 F.2d 1239, 1243-45 (9* Cir. 1987) and United States v. Dost, 636 F. Supp. 828, 832 (S.D. Cal. 1986) are primarily an attempt to determine this lascivious intent of the photographer by only examining the visual depictions themselves. Determining intent can be difficult if the photographer or circum- stances of production are unknown. The courts state, however, that this "analysis is qualitative and no single factor is dispositive." (See e.g. Knox, 32 F.3d at 746.) This focus on the intent of the photographer is most obvious in United States v. ?Ward, 885 F.2d 117, 124 (3rd Cir. 1989). In its decision the court even states that it is ignoring the dear evidence that the defendant, who was not the photog- rapher, was in fact amused by the material in question. Id. at 125. The court states, "child pornography is not created when the pedophile derives sexual enjoyment from an otherwise innocent photo" and "we must, therefore, look at the photograph, rather than the viewer." Id. The significance of this decision must be viewed with the knowledge that the pictures in question were not available for the jury or court to view. It is the possible lasciviousness in the recipient/collector (third bullet above) of child pornography where there is the greatest controversy and confusion. This is especially problematic in view of the fact that mere possession of child pornogra- phy is a federal offense, and the defendant in most computer child-pornography prosecutions is not the photographer/producer of the material. There is also the legal issue of what constitutes "production" of child pornog- raphy. It certainly goes beyond just the photographer who took the picture. In United States v. Cross, 928 F.2d 1030, 1042-43 (11* Cir. 1991), the court stated, "...photographs [of nude children]...qualified as 'lewd' within meaning of the child pornography statute, even though children were not portrayed as sexually 78 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728706 coy or inviting, and even though the professional photographer who had been tricked into taking photographs did not knowingly or intentionally exhibit chil- dren in lewd poses; photographs displayed preadolescent girls fully nude from frontal view, and were arranged by defendant in order to be used to satisfy his sexual interests or those of other pedophiles." The court also found that corre- spondence with the codefendant was of considerable probative value in proving the defendant's intent to create and market child pornography. Id. at 1047-48. The court also found that the codefendant actively participated in the scheme by processing and modifying these photographs in order to render them suitable for commercial distribution, and photographs of nude children were arranged by the defendant in order to be used to satisfy the sexual interests of himself and other pedophiles. During the commission of all these offenses the defendant himself was in custody in the state penitentiary. The court also upheld expert testimony about "whether Cross obtained the photos with the intention of using them to produce and distribute child pornography." Id. at 1050. If the court in the Cross decision had followed the Willard case, which it cited, and looked only at the photographs and photographer, they could not have found them to be lewd (lascivious). Without knowing the total facts of the case, which cannot be ascertained by just looking at the photographs, most courts and individuals would consider many of the photographs in the Cross case to be "innocent nudes" or art. How does the law apply to individuals who "modify" the images originally produced by someone else? The facts in United States. v. Arvin, 900 F.2d 1385, 1391 (9th Cir. 1990), involve a defendant who was not the photographer. The court in Arvin mentions the criteria for lasciviousness of "captions on the pictures." Id. This determination seems to dearly imply that factors not in the picture or modifications made to it after it was taken can be considered in deter- mining its lascivious nature. The importance of such subsequent modifications to existing images is one of the primary focuses of the CPPA of 1996. Does the individual who makes such modifications become the producer? What if the modifier/producer and the intended viewer are the same person? In Knox the court states, "we adhere to the view that 'lasciviousness' is an inquiry that the finder of fact must make using the Dost factors and any other relevant factors given the particularities of the case, which does -not involve an inquiry concerning the intent of the child subject" (32 F.3d at 747). The court in Knox also mentions the defendant's handwritten description on the outside of the film boxes as evidence that Knox was aware that the videotapes contained sexually oriented materials designed to sexually arouse a pedophile. Id. at 754. The intent of the "collector" is also referred to in United States v. Lamb, 945 E Supp. 441, 450 (N.D.N.Y. 1996), where, in discussing affirmative defenses it states, "this court presumes that Special Agent Ken Lanning, who according to the affidavits in the search warrants in this case is an expert in the field of child por- nography and pedophilia, could not be subject to prosecution consonant with the First Amendment for violations of this statute, even if he literally transgressed its boundaries in the writing of his book, Child Pornography and Sex Rings." In United States v. Hilton, 167 F.3d 61, 75 (1° Cir. 1999), the court states that "a jury must decide based on the totality of circumstances." CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 79 EFTA01728707 There is an understandable reluctance to admit that some visual depictions of children may or may not be child pornography depending on the totality of the facts. Looking only at the visual depiction of the child, however, often does not resolve the issue. What then is the difference between simple nudity and art and what the law describes as lewd or lascivious exhibition of the genitals or pubic area? Because I am not a lawyer, I am not sure that I totally understand the subtleties of what the appellate courts have said about this issue. Some of it even appears to be contradictory. But after more than 20 years of studying this area, I am sure of what investigators, prosecutors, and the courts should say and what common sense demands. The court in Knox concluded by stating that "we reject any contention, whether implied by the government or not, that the child subject must be shown to have engaged in the sexually explicit conduct with a lascivious intent" (32 F.3d at 747).. In my opinion the government caused this "error," in part, by a cold, analytical examination of words on a page instead of a reasonable interpretation of them based on some understanding of the nature of the crime and intent of the statute to protect children and prosecute those who sexually exploit them. Hypothetical Example To synopsize this controversy, consider this set of hypothetical facts based on several actual cases. A mother or father innocently photographs their naked 1-year-old daughter getting out of the bathtub, they send the film to the store to be developed, and they then put the returned print in the family album with all the other photographs of their child's life. Under these circumstances, in their family album, this photograph showing the child's genitals is dearly not child pornography. Unknown to them, however, a pedophile working at the store made an extra print of the photograph, took it home, and put it in one of his photo albums containing hundreds of other similar photographs of naked little girls he had previously stolen after they were turned in for developing. Printed in big letters on the cover of this album are the words "Hot Lolitas." In the album, below the photograph of this naked 1-year-old, is a handwritten caption indicating how sexually aroused the pedophile gets when he looks at this picture. Above this photograph he has added a "balloon" with words indicating that the child wants to have sex with him. There are also semen stains on the pages. He has modified some of the other photographs by cropping out the children's faces or adding sexual characteristics/activity with a marker or pen. Can the exact same picture of the naked 1-year-old girl getting out of the tub that was an innocent nude in her family's album now be considered child por- nography in the possession of this pedophile? Can it be child pornography if the original photographer/producer did not intend to elicit a sexual response in the viewer? Do we evaluate the potential lascivious nature of it by looking only at the picture? Does the theft of the photograph, the surrounding materials in the albums, or the modifications to the picture play a role in this decision? Is lascivi- ous interest on the part of the collector of no importance? If prosecutors believe such a photograph cannot be considered child pornography, are they prepared to publicly say so? It seems like a waste of time to attempt to determine if a ques- tionable photograph is child pornography only by staring at it and applying the 80 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728708 Dost/Wiegand criteria when so many other details concerning its existence are available. Evaluation Criteria The essence of the Dost, Wiegand, Arvin, Cross, and Knox decisions seems to correctly be that the material in question must be evaluated in context on a case- by-case basis. When the totality of facts is known, I have never seen a case where there was any doubt whether a visual depiction of a child was simple nudity (i.e., innocent family photograph, work of art, medical research, image for sex therapy) or lascivious exhibition of the genitals. Those claiming there is a doubt are often attempting to cover up sexual exploitation of children by creating a smokescreen to confuse the issue. I know of no investigators or prosecutors in the United States with so little work that they would use child-pornography laws to try and convict true professionals who utilize this material in a professional way or normal par- ents who simply have photographs of their nude, young children. It is inappropriate and wrong for investigators or prosecutors, based only on viewing visual images of children's genitals, to state such material is not child pornography. It may be appropriate and correct, however, for investigators or prosecutors, based only on viewing such images, to state that the material does not meet their investigative or prosecutive criteria. Assuming it meets the minimum legal criteria, potential child pornogra- phy must always be evaluated in the total context in which it is discovered, and it must be objectively investigated. As previously discussed the evaluation criteria for visual images produced by a subject may be different from those for visual images received or downloaded by a subject. One subject could have in his collec- tion both images he produced and images he obtained from others. The problem is that while courts sometimes rule that borderline material should be evaluated in context, other times they rule that the context material is inadmissible because its prejudicial value outweighs its probative value. The criteria noted below are offered for the evaluation of such photographs. As used' here the term photograph includes any visual depiction such as nega- tives, prints, slides, movies, videotapes, and digital computer images. The criteria can also be used to evaluate child erotica. How They Were Produced/Obtained Because photographs are well taken and have artistic value or merit does not preclude the possibility that they are sexually explicit. Because someone is a professional photographer or artist does not pre- dude the possibility that he or she has a sexual interest in children. The lascivious exhibition of the genital or pubic area is characteristic of the photographer or collector, not the child, in order to satisfy his voyeuristic needs and sexual interest. Pedophiles are more likely to use trickery, bribery, or seduction to take their photographs of children. They sometimes photograph children under false pre- tenses, such as leading them or their parents to believe that modeling or acting jobs might result. Some 'offenders even hide and surreptitiously photograph children. One pedophile hid above the ceiling of a boys' locker room and photographed toys through a moved ceiling tile. Many pedophiles even collect photographs of children who are complete strangers to them. They take these pictures at swimming meets, wrestling matches, child beauty pageants, parks, CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 81 EFTA01728709 parades, rock concerts, and other events open to the public. These photographs are usually of children of a certain age and gender. Pedophiles are also more likely to take and possess photographs that focus on certain parts of a child's anatomy of particular sexual interest to a certain offender. In some photographs the children may be involved in stiange or bizarre behav- ior, such as pretending to be dead or simulating unusual sex acts. In one case a pedophile photographed young boys with painted bondage-like markings on their bodies. Investigators should make every effort to determine the circumstances under which recovered photographs were taken in order.to evaluate their investigative significance as child pornography. Any photograph that can be linked to abuse or exploitation has a greater chance of being found sexually explicit by the courts. The sequence in which the photographs were taken, which can sometimes be determined from the negatives, can be an important part of the evaluation. Recovered videotapes must be listened to as well as observed to evaluate their significance. As previously stated many offenders did not "produce" any or many of the photographs in their collections. For these recipient/collectors how, when, where, why, and with what they obtained their photographs is important. The fact that the offender knowingly purchased, traded, exchanged, or downloaded the pho- tographs in a sexually explicit context or setting is significant. This is most easily determined in online-computer cases. The fact that the offender used false pre- tenses or theft to obtain the photographs could also be significant. How They Were Saved Investigators should consider factors such as the location where the images were found, labels on the images, package markings, modifica- tions, and computer file names. Volume is also a significant factor here. Pedophiles are more likely to have large numbers of photographs of children. One pedophile had 27 large photo albums filled with pictures of children partially or fully dressed. They are more likely to have their photographs carefully organized, cataloged, and mounted in binders or albums. These may be photographs they cut out of magazines, catalogs, or newspapers. Sometimes sexually explicit captions are written above, below, or on the pictures. Photographs are frequently marked with the children's names and ages and the dates taken. Sometimes they are also marked with the children's addresses, physical descriptions, and even the sexual acts they performed. Most people who have photographs of their naked children or grandchildren save them as a small part of a wide collection. The pedophile who collects photographs of children is more likely to have hundreds of such photographs together, and all the children portrayed will be of the same general age. There will be few, if any, photographs of these same children when they are older. The pedophile offender is also more likely to have enlargements or carefully arranged groupings of these photographs— even arranged on the wall as a kind of shrine to children. Some material may be placed where child victims will have easy access to it. Because this context is potentially so important, investigators should carefully observe and meticulously document for future testimony how the offender saved such photographs and where they recovered them. Prosecutors must ensure that jurors understand the pedophile's collection of photographs of naked children is not the same as those saved by some normal parents and relatives. 82 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728710 How They Were Used Pedophiles often use these photographs to help seduce and lower the inhibitions of children. Pictures of naked children could be used to convince children to remove their clothing. Investigators should attempt to determine how the offender used such material in his interaction with children. In addition investigators should attempt to determine if the offender sold, traded, or pandered this material. The way the photographs were advertised is important in evaluating their significance. Computer chat logs and E-mail messages provide invaluable insight into the context of how the images were used. In one case the defendant was claiming that many of the images of children found on his computer were actually works of art or innocent nudes. The pros- ecutor presented the computer evidence showing the sexually explicit nature of how, where, and with what the images in question were obtained and also argued the importance of context as set forth in Arvin, Cross, and Kitox. The defendant quickly realized his claims were absurd and changed his plea to guilty. Guilty Knowledge When caught with child pornography, offenders come up with a wide variety of responses. Some deny any knowledge and ask for their lawyer Most, however, come up with a vast array of explanations and excuses. They claim they did not know they had it or did not know it was child pornography. Some claim that as law-enforcement officers, lawyers, doctors, therapists, or researchers they had a professional use for the material. Some claim they are artists and that the images in question are works of art. Some claim they were conducting investigations as concerned members of society. A few claim to have no sexual interest in the mate- rial. They downloaded it out of curiosity or inadvertently received it and kept it because they are compulsive "pack rats." On some occasions such claims might be valid. Should professionals such as law-enforcement officers, lawyers, doctors, therapists, researchers, artists, and photographers have special privileges under child-pornography statutes? Can a high-quality photograph taken with an expensive camera and printed on expen- sive paper still be child pornography? Can a medical or colposcope photograph of a child's genitals still be child pornography? Whether particular visual images are child pornography and certain individu- als who "use" them should be immune from prosecution are two separate, but related issues. Some images can be child pornography depending on who has them and how they are being used. A medical photograph depicting the circum- cision of a male infant's genitals shown by a physician to a medical-school class learning this technique or a colposcope slide of a female child's genitals shown by a physician to other doctors at a child-abuse training conference are not child pornography. The same photograph pandered on the Internet by the same physi- cian to a newsgroup focusing on the sexual torture of the genitals or collected by the same physician in a sexually explicit album with graphic captions underneath are child pornography. In the second scenario the physician's unprofessional use of the photograph is a significant factor in both whether or not the image is con- sidered child pornography and he should be prosecuted. The test for those claiming professional use should be twofold. Do they have a professional use for the material, and were they using it professionally? Both standards must be met in order to seriously consider the claim. Not every artist, professional photographer, therapist, law-enforcement officer, and lawyer has a CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 83 EFTA01728711 professional use for sexually explicit images of children. If such individuals do have a professional use for the images, but are also showing them to neigh- borhood children, masturbating with them, or trading them on the Internet in sexually oriented newsgroups they can and should be prosecuted. The possibilities concerning a child portrayed in pornography and subject's state of mind are the sexually explicit image was ▪ •of a child, but the subject believed it was not a child ■ not of an actual child, but the subject believed it was a child ■ of a child, and the subject believed it was a child ■ of a child, and the subject knew it was a child The government certainly has to prove that the offender believed the individual portrayed is a child and, therefore, the possibility outlined in the first bullet above should not result in conviction. Although the controversial CPPA of 1996 may not always require it (the possibility outlined in the second bullet above), a case has far greater appeal if the government can also prove the image portrays an actual child and the subject believed it (the possibility outlined in the third bullet above). Under most statutes, the third bullet above should be the standard. The burden to prove that the subject knew with certainty the individual por- trayed is an actual child, the possibility outlined in the fourth bullet above, is an impossibly difficult and absurd standard especially in an Internet-collector case. If required it would essentially only allow the prosecution of production cases. "Expert" Search Warrants One controversial and misunderstood application of an offender typology is its use in so-called "expert" search warrants. In such search warrants an expert's opinion is included in the affidavit to address a particular deficiency. The expert's opinion is usually intended to ■ address legal staleness problems ■ expand the nature and scope of the search for erotica-type material or more than one location) or ■ add to the probable cause Addressing staleness and expanding the scope of the search are probably the most legally defensible uses of such opinions. Using the expert's opinion as part of the probable cause, however, is much more legally questionable and should be done only in full awareness of the potential judicial consequences. In spite of the legal uncertainties of its application, there is little behavioral doubt that probable cause to believe that a given individual is a preferential sex offender is, by itself, probable cause to believe that the individual collects pornography or- paraphernalia related to his preferences, which may or may not include child pornography. If it is used, the expert's opinion should be the smallest possible percentage of the probable cause. As the portion of the probable cause based upon the expert's opinion increases, the expectation of a much more closely scru-• • tinized, critical review should increase. The affidavit should set forth only those offender characteristics necessary to address a specific deficiency. For example if the expert opinion is needed only to 84 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728712 address staleness, the only trait that matters is the tendency to add to and the unlikeliness to discard collected pornography and erotica. The expert's opinion concerning other behavioral traits could be used to justify searching a storage locker or computer at work. It could also be used to justify searching for related paraphernalia or videotapes. Not all offenders who might traffic in child pornography have these traits; therefore, the affidavit must set forth the reasons for the expert's conclusion that the subject of the search is among the particular groui, of offenders with the stated characteristics. The informational basis for the expert's opinion must be reliable, sufficient, and documented. The information must be from reliable sources and in sufficient quantity and quality to support the belief. Details concerning the information must be meticulously recorded and retrievable especially if it is the basis for a warrant sought by another agency or department. At this point it is useful to have a name for "these guys" with these distinctive characteristics. Although investigators have frequently called them "pedophiles" or "child-pornography collectors," the term preferential sex offender is recom- mended for the reasons previously stated. Expert search warrants describing highly predictable offender characteristics should be used only for subjects exhibiting preferential sexual-behavior patterns. The characteristics, dynamics, and techniques (i.e., expert search warrant) discussed concerning preferential sex offenders should be considered with any of the preferential-type offenders. It is usually unnecessary to distinguish which type of preferential offender is involved. If the available facts do not support the belief that the subject is a preferential sex offender and deficiencies in the warrant cannot be addressed in other ways, investigators can always attempt to get a consent to search. Believe it or not, many sex offenders, especially preferential offenders, will give such consent. This is often true even if they have child pornography and other incriminating evidence in their home or computer. Their need to explain and validate their behavior overcomes their fear of discovery. Whenever possible affidavits for search warrants should. be based on reliable, case-specific facts. Because of legal uncertainties, expert search warrants should be used only when absolutely necessary. They should not be a replace- ment for reasonable investigation. When such warrants are used, the affidavit must reflect the specific facts and details of the case in question. Boilerplate warrants, "ponies," or "go-bys" should be avoided. It is also best if the expert used is part of the investigation or from the local area. Regional or national experts should be used only when a local expert is unavailable. An offender's pornography and erotica collection is the single best indicator of what he wants to do. It is not necessarily the best indicator of what he did or will do. An o -4 • er s pomograp y and erotica co lection is the single best indicator of what he wants to do. It is not necessarily the best indicator of what he did or will do. Not all collectors of child pornography physically molest children, and not all molesters of children collect child pornography. Not all children depicted in child pornography have been sexually abused. For example some have been surrepti- tiously photographed while undressing or bathing, and others have been CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 85 EFTA01728713 manipulated or tricked into posing nude or exhibiting their genitals. Depending on the use of the material, however, all can be considered exploited. For this reason even those who "just" receive or collect child pornography produced by others play a role in the sexual exploitation of children, even if they have not physically molested a child. This issue is most apparent in the plea bargaining and sentencing of offenders charged with possessing, receiving (downloading), or distributing (uploading) child pornography with no evidence of child molesting. Some defense attorneys want to argue that his client "just" collected preexisting images from the Internet and did nothing but type and click a mouse. Some prosecutors want to counter that by claiming that looking at child pornography "turns your brain to mush" and all collectors are or will become child molesters. I have been asked to testify to this on numerous occasions. Testifying on this issue is problematic for me because I have been viewing child pornography myself for more than 20 years and have never molested, or had the urge to molest, a child. I am also aware of no real research that unequivocally supports this position. In fact anecdotal evidence based on actual cases investigated by federal law enforcement currently suggests that the majority of child-pornography collectors are not active molesters. This anecdotal evidence has some real limitations, but the fact remains that some significant portion of child-pornography collectors do not appear to be molesting children. Maybe they might in the future, but such conjecture is difficult to argue in court. In the absence of evidence of molestation, simply informing the court of the fact that the defendant fantasizes about such activity is the most reasonable approach. Zealotry, however well intended, still fuels "backlash" and damages credibility. The "backlash" is a subjective, judgmental term used by some child advocates to label and characterize those who are repeatedly critical of official intervention into the problem of sexual victimization of children. The "backlash" tends to excessively focus on specific examples of professionals exaggerating or distorting the problem of child sexual victimization and the criminal-justice sys- tem pursing "false" and "unfounded" allegations (tanning, 1996). The possibility that a child molester is collecting child pornography or child-pornography collector is molesting children should always be aggressively investigated; however, collecting child pornography should be viewed as signifi- cant criminal behavior by itself. Molesting children is not an element of the offense. Child pornography does harm in and of itself. The issue should be the harm it does to the child portrayed, not to the viewer. Victims must live with the longevity and circulation of these images for the rest of their lives. The best proof of this is the reaction of the victims and their families when they learn the images have been put into circulation or uploaded to the Internet. Child pornography has traditionally been defined as the permanent record of the abuse or exploitation of an actual child; however, the CPPA of 1996 changed the definition for certain cases. The importance of this statement now becomes obvious. Without this traditional definition, it becomes more difficult, but not impossible, to argue why child-pornography collecting should be considered a "significantly punishable" offense. The argument that images without "real" chil- dren could be used to lower the inhibitions of and seduce children by itself may be insufficient to justify the seriousness of the mere possession or collec- tion of such images. Because many items such as candy bars can be used for the same purpose and we do not outlaw them, arguments about the seriousness of 86 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728714 such images must be expanded to also include the fact that virtual child pornog- raphy fuels and validates the sexual fantasies of child molesters and pedophiles, potentially harms nondepicted children, and can be traded for images involving "real" children. Unlike items such as candy bars, virtual child pornography has no socially redeeming value. Collecting child pornography validates the behavior of and provides incen- tive for those who do produce it. The number of "hits" on a site almost always measures status and success on the Internet. Every time individuals download child pornography on the Internet, they are leaving an implied message behind that the material has value, and they will be back to get more. Since there is a limited amount of existing material, at some point someone has to produce new images. Offenders who "just" traffic in child pornography are committing serious violations of the law that do not necessarily require proving that they are also child molesters. If it is relevant and the facts support it, such individuals can be considered preferential sex offenders because such behavior is an offense. Some ' offenders who traffic in child pornography, especially the diverse-preferential sex offender, may have significant collections of adult pornography as well. In some cases they may even have far more adult pornography than child pornography. Such offenders may not be "pedophiles," but can still be preferential sex offend- ers with many similar behavior patterns. I a thIgi r!A 2 .Taft Many investigators and prosecutors do not like child-pornography cases. Some do everything they can to deny the problem and avoid these cases. Some federal investigators and prosecutors (also some federal judges and federal law-enforce- ment administrators) do not believe that child-pornography cases are the business of the federal courts. Many prosecutors are up-front and honest about their feelings. Others, however, avoid these cases by sending investigators on impossible stalling missions to "bring them the broomstick of the wicked witch." Instead of declining unwanted cases, they avoid them by asking for more and more evidence without ever really intending to prosecute. Part of this problem is due to distorted and exaggerated information dissemi- nated at "professional" training conferences. Some seem to feel that investigating and prosecuting child pornography is a divine mission from God to save the moral character of the country. This motivates some investigators and prosecutors, but turns off many others. It enables many to argue that these cases are about a religious agenda rather than enforcing the law. Investigators and prosecutors should have an objective and rational under- standing of the nature of child pornography. There is no legal requirement that collectors of it be physically molesting children, making money, part of orga- nized crime, or totally "evil" sexual predators. There is no legal requirement that the children portrayed in it be abducted, suffering in pain, nonconsentirtg, or totally "good" victims. Investigators and prosecutors must be able to professionally deal with the subject matter of deviant sexual behavior. This usually requires a willingness to view at least a reasonable quantity of the images being prosecuted. It is hard for investigators, prosecutors, judges, and juries to make legal decisions about something they refuse to look at CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 87 EFTA01728715

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.