Skip to main content
Skip to content
Case File
efta-efta01718723DOJ Data Set 10Correspondence

EFTA Document EFTA01718723

Date
Unknown
Source
DOJ Data Set 10
Reference
efta-efta01718723
Pages
0
Persons
0
Integrity
No Hash Available
Loading PDF viewer...

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
(Adapted from pp. 37-45) Child Molesters: A Behavioral Analysis For Law-Enforcement Officers Investigating the Sexual Exploitation of Children by Acquaintance Molesters Fourth Edition September 2001 Former upervisory pecta. gent Federal Bureau of Investigation (FBI) Copyright O 2001 National Center for Missing & Exploited Children. All rights reserved. Points of view or opinions in this book are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice, U.S. Department of Treasury, norNational Center for Missing & Exploited Children. EFTA01718723 IDENTIFYING PREFERENTIAL SEX OFFENDERS OVERVIEW Although a variety of individuals sexually abuse children, preferential-type sex offenders, and especially pedophiles, are the primary acquaintance sexual exploiters of children. .A preferential-acquaintance child molester might molest 10, SO, hundreds, or even thoussinds children in a lifetime, depending on the offender and how broadly or narrowly child molestation is defined. Although pedophiles vary greatly, their sexual behavior is repetitive and highly predictable. Knowledge of these sexual-behavioral patterns or characteristics is extremely valuable to the law enforcement inirestigator. These highly predictable and repetitive behavior patterns make cases involving preferential-type offenders far easier to investigate than those involving situational-type offenders. An important step in investigating cases of sexual exploitation of children by adult acquaintances is to recognize and identify, if present, the highly predictable sexual- behavior patterns of preferential sex offenders or pedophiles. It is important that investigators continually attempt to place a suspected acquaintance child molester along the motivational continuum. If the investigation identifies enough of these patterns, many of the remaining ones can be assumed; however, nopirticular number constitutes "enough." A few may be enough if they are especially significant Most of these indicators mean little by themselves, but as they are identified and accumulated through investigation, they can constitute reason to believe a certain offender is a preferential sex offender. One does not have proof beyond a reasonable doubt, but "probable cause" exists. A classification system or typology to determine the type of offender with whom one is dealing cannot be applied unless the most complete, detailed, and accurate information possible is obtained. In order to properly evaluate the significance of any offender or victim behavior, investigators must have and be able to, professionally process the details of that behavior. The fact that a suspect was previously convicted of "sodomizing" or engaging in "indecent liberties" with a child is almost meaningless if the details (i.e., verbal, physical and sexual behavior) of the crime are not available and known. Law-enforcement reports that sanitize or describe, in politically correct terms, an offender's language and sexual behavior are almost worthless in evaluating sex offenses. This is one reason why investigators who cannot easily and objectively communicate about regular and deviant sex have problems dealing with sex crimes. The investigator must understand that doing a background investigation on a suspect means more than obtaining the date and place of birth and credit and criminal checks. School, juvenile, military, medical, driving, employment, bank, sex-offender and child-abuse registry, sex-offender assessment, computer, and prior investigative records can all be valuable sources of information about an offender. Relatives, friends, associates, and current and former sex partners can be identified and interviewed. Other investigative techniques (e.g., mail cover, pen register, trash run, surveillance) can also be used. Indicators and counter indicators must be identified and evaluated. 2 EFTA01718724 2 1F 1 Child Molesters: A Behavioral Analysis by (FBI Retired) CAC Consultants Fredericksburg, VA Understanding behavioral dynamics and recognizing behavioral evidence can often be as important as child interviewing or the collection and preservation of physical evidence in the investigation of sexual victimization of children cases. The amount and kind of corroborative evidence available and recovered might depend on a behavioral understanding of the type of case, type of sexual activity, and type of offender(s) and victim(s) involved. Documenting offender patterns of behavior is an important, and often overlooked, part of developing effective interview strategies, assessing and evaluating information, and attempting to corroborate allegations. This presentation will set forth a descriptive investigative typology that evaluates sex offenders along a motivational continuum. The continuum of intrafamilial, stranger, and acquaintance child molestation cases will also be discussed. It is presented from a law enforcement perspective for a multidisciplinary audience. Content: Pedophile vs. Child Molester Situational to Preferential Motivation Importance of details Collection of child pornography and erotica Understanding need-driven mistakes Proving intent Recognizing prior like acts Objectives: 1. To communicate the importance and value of recognizing that there are different types of child molesters and sex offenders. 2. To provide a descriptive typology for classifying sex offenders for criminal justice purposes. 3. To illustrate the application of this typology to sex offenders in order to assist in formulating criminal justice strategy. Ckt ic (en4.1( lbs n- to-L4-4/ ASP) ba•••• ei Mt O; wilts .e.-4n 1iC foi ff ;rdirdejt 411, CC1/4 •••• 141 EFTA01718725

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.