Skip to main content
Skip to content
Case File
efta-efta01728716DOJ Data Set 10Correspondence

EFTA Document EFTA01728716

Date
Unknown
Source
DOJ Data Set 10
Reference
efta-efta01728716
Pages
0
Persons
0
Integrity
No Hash Available
Loading PDF viewer...

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
Whatever the prosecutors' views of child pornography might be, it is important that they dearly communicate their criteria for prosecuting or not prosecuting a particular case. Some of the possible criteria to consider in a child- pornography case not involving production include amount of time and energy put into it by the subject size of the collection format (i.e., videotapes, magazines, digital images) sexual themes (e.g., sadism, urination, bondage) III age of the children portrayed or of the subject ■ percentage of child pornography in the total collection ■ amount of erotica or other paraphernalia collected quality of images ■ receipt, distribution, or both profit solicitation (i.e., requesting/encouraging others to produce) access to children (Le., teacher, coach, youth volunteer) III molestation of children (Le., past, present, or future) The prosecutive criteria should be communicated and consistent. If a case meets the set-forth criteria, the investigator should have a reasonable expectation the case will be prosecuted. The criteria, however, should be viewed as policy with some degree of flexibility. The policy should reflect what is usually done and not necessarily what is always done. In order to evaluate child pornography or determine what and how many prosecutive criteria it meets, investigators and prosecutors must have facts and details. Many of those fads and details are best obtained from executing a valid search warrant or obtaining a consent. to search. For some reason many prosecu- tors seem to believe that executing such a search warrant should be the final step in the investigation. They want all the answers to the evaluation and prosecutive criteria before the search when, in fad, many of the answers will come from the search itself. The execution of the search warrant and subsequent search should be viewed not as the last step, but simply one step in the investigation. Obviously there must be probable cause and/or consent to conduct such a search. 88 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728716 Use of Computers by Sex Offenders We have historically warned our children about the dangers associated with strang- ers, but often neglected to help them understand that sex offenders are often people they have come to know either in person or now online. Throughout his- tory nonfamily members who sexually exploit children have frequented the places where children gather. Schoolyards, parks, and malls have been prime contact places. Offenders have also used technological advancements (e.g., cameras, tele- phones, automobiles) to facilitate their sexual interests and behavior. Starting in the 1990s, home computers, online services, and the Internet have become new points of contact and technological tools. Although most of the offenders currently utilizing computers in their sexual victimization of children would generally be considered to be "acquaintance molesters," some might be family members and others might be strangers. Some of these offenders might also be sexually victimizing children without using com- puters. For example they may also be sexually abusing readily available children, including their own, or trafficking in or collecting child pornography in maga- zine, boolc, photograph, or videotape formats and utilizing the mail. Although it is the focus of this discussion, the focus of the investigation cannot be only on the computer. The computer is only a tool. Also, as the capabilities and availability of computers change, their role in the sexual victimization of children will also change. Some may wonder why a discussion of acquaintance molesters would include a section on the use of computers. That is because, like most acquain- tance molesters, individuals attempting to sexually exploit children through the use of computer online services or the Internet tend to gradually seduce their targets through the use of attention, affection, kindness, and gifts. They are behavior- ally like acquaintance molesters and best viewed as such for investigative and prevention purposes. They are often willing to devote considerable amounts of time, money, and energy to this process. They will listen to and empathize with the problems of children. They will be aware of the music, hobbies, and interests of children. Unless the victims are already engaged in sexually explicit computer conversation, offenders will usually lower any inhibitions by gradually introduc- ing the sexual context and content. Some offenders use the computer primarily to collect and trade child pornography, while others seek online contact with other offenders and children. Some do both. Offenders who do either or both with a computer can also do either or both without the computer. Children, especially adolescents, are often interested in and curious about sexu- ality and sexually explicit material. They will sometimes use their online access to actively seek out such material. They are moving away from the total control of parents and trying to establish new relationships outside the family. Sex offenders targeting children will use and exploit these characteristics and needs. Adoles- cents may also be attracted to and lured by online offenders closer to their age who, although not technically "pedophiles," may be dangerous. Illegal Sexual Activity Computer-related sexual exploitation of children usually comes to the attention of law enforcement as a result of individual/victim complaints, referrals from CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 89 EFTA01728717 commercial service providers, and inadvertent discovery during other investiga- tions. Increasingly, cases are being proactively identified as a result of undercover investigations that target high-risk computer sites or utilize other specialized tech- niques. Sexual activity involving the use of computers that is usually illegal and, therefore, the focus of law-enforcement investigations includes ■ producing or possessing child pornography ■ uploading and downloading child pornography ■ soliciting sex with "children" • In the vernacular of computer-exploitation investigators, those who traffic in online child pornography are known as "traders" and those who solicit sex with children online are known as "travelers." Using the computer to solicit sex with "children" could include communicating with actual children as well as with law- enforcement officers who are taking a proactive investigative approach and pretending to be children or pretending to be adults with access to children. After using the computer to make contact with the "child," other illegal activity could involve traveling to meet the child or having the child travel to engage in sexual activity. Cases involving adolescents using the computer to solicit sex with other ado- lescents and traffic in child pornography that portrays pubescent "children" are a problem area for the criminal-justice system especially the federal system. For purposes of illegal sexual activity and child pornography, the federal statutes and many local statutes define children or minors as individuals who have not yet reached their sixteenth or eighteenth birthdays. Such behavior, therefore, may be technically illegal, but may not be sexually deviant. Legal Sexual Activity Sexual activity involving the use of computers that may be of concern, but is usually legal includes ■ validating sexually deviant behavior and interests ■ reinforcing deviant arousal patterns ■ storing and sharing sexual fantasies ■ lying about one's age and identity ■ collecting adult pornography that is not obscene ■ disseminating "indecent" material, talking dirty "cyber-sex," and, provid- ing sex instructions ■ injecting oneself into the "problem" of computer exploitation of children to rationalize interests Although many might find much of this activity offensive and repulsive and special circumstances and specific laws might even criminalize some of it, it is for the most part legal activity. The investigation of chil • -sexual-exploitation cases involving computers requires knowledge of the technical, legal, and behavioral aspects of computer use. Because each of these areas is so complex, however, investigators must also iden- 90 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728718 tify experts and resources available to assist in these cases. Exploitation cases involving computers present many investigative challenges, but they also present the opportunity to obtain a great deal of corroborative evidence and investigative intelligence. This discussion will focus primarily on the dynamics of offender and victim behavior in the computer exploitation of children. Computer Offenders Offenders using computers to sexually exploit children tend to fall into the three broad categories of situational, prefer- ential, and miscellaneous "offenders." Situational Offenders Situational offenders include a ■ "normal" adolescent/adult - usually a typical adolescent searching online for pornography and sex or an impulsive/curious adult with newly found access to a wide range of pornography and sexual opportunities. ■ morally indiscriminate - usually a power/anger-motivated sex offender with a history of varied violent offenses. Parents, especially mothers, who make their children available for sex with individuals on the Internet would also most likely fit in this category ■ profiteers —with the lowered risk of identification and increased potential for profit, the criminal just trying to make easy money has returned to trafficking in child pornography. When situational-type offenders break the law, they can obviously be investigated and prosecuted, but their behavior is not as long-term, persistent, and predictable as that of preferential offenders. They are a more varied group. Exploitation cases involving computers present many investigative challenges, but they also present the opportunity to obtain a great deal of corroborative evidence and investigative intelligence. Preferential Offenders Preferential offenders include a ■ pedophile offender, as previously discussed, with a definite preference for children. diverse offender with a wide variety of paraphilic or deviant sexual interests, but no strong sexual preference for children. This offender was previously referred to in my original typology as the sexually indiscriminate. ■ latent individuals with potentially illegal, but previously latent sexual preferences who have more recently begun to criminally act out when their inhibitions are weakened after their arousal patterns are fueled and validated through online computer communication. The essential difference between the pedophile type -and diverse type of preferential offender is the strength of his sexual preference for -children. As pre- viously stated the pedophile type is primarily interested in sex with children that might, in some cases, involve othet sexual deviations or paraphilias. The diverse type is primarily interested in a variety of sexual deviations that might, in some cases, involve children. For example the pornography and erotica collection of • • CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 91 EFTA01728719 the diverse preferential offender will be more varied, usually with a focus on his particular sexual preferences or paraphilias and sometimes involve children, whereas a pedophile% collection will focus predominately on children and some- times involve other paraphilias. Searching a computer for this varied adult-theme pornography can sometimes be justified if it helps identify the person using the computer or is linked to and helps explain the victimization of children. If children are directly molested, the diverse offender is more likely to victimize pubescent children. More naive prepubescent children, however, are sometimes selected to minimize confronting possible challenges to or embarrassment over their deviant sexual interests. With an absence of prior criminal sexual activity, latent offenders present prob- lems concerning what prosecution and sentence is appropriate. A thorough investigation and good forensic psychological evaluation, possibly aided by the use of the polygraph or other deception-assessment devices, are helpful in evalu- ating such apparent "latent" offenders. Miscellaneous "Offenders" Miscellaneous "offenders" include ■ media reporters - individuals who erroneously believe they can go online and traffic in child pornography and arrange meetings with suspected child molesters as part of an authorized and valid news exposé. ■ pranksters - individuals who disseminate false or incriminating informa- tion to embarrass the targets of their "dirty tricks." ■ older "boyfriends" - individuals in their late teens or early twenties attempting to sexually interact with adolescent girls or boys. ■ overzealous civilians - members of society who go overboard doing their own private investigations into this problem. As will be discussed, investi- gators must be cautious of all overzealous civilians who offer their services in these cases. Although these miscellaneous "offenders" may be breaking the law, they are obviously less likely to be prosecuted. This category includes media reporters breaking the law as part of a bona-fide news story It does not include reporters, or any other professionals, who engage in such activity to hide or rationalize the fact that they have a personal interest in it. They would be situational or preferen- tial offenders. Media reporters frequently do not notify law enforcement of their "undercover" activity until it reaches a crisis point, and then they want law enforcement to respond immediately. Overzealous civilians could also include sex-offender therapists and researchers engaging in this type of activity. Only law-enforcement officers as part of official, authorized investigations should be conducting proactive investigation or downloading child pornography on a com- pute. No one should be uploading child pornography. It should be noted that federal law does allow an affirmative defense for the possession of child pornogra- phy only if less than three matters are possessed and it is promptly, in good faith and without retaining or allowing access to any other person, destroyed or reported to a law-enforcement agency that is afforded access to each depiction (18 U.S.C. § 2252(c)). As previously stated the test for those claiming professional use of child pornography should be twofold. Do they have a professional use for 92 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728720 the material, and were they using it professionally? Both standards must be met in order to seriously consider the claim. Using a computer to fuel and validate interests and behavior, facilitate interacting with child victims, or possess and traffic in child pornography usually requires the above-average intelligence and economic means more typical of prefer- ential sex offenders. The computer sex offenders'discussed here hate tended to be white males from a middle class or higher socioeconomic background. As computers and use of the Internet have become more commonplace, however, there are now increasing numbers of the more varied situational sex offenders. In computer cases, especially those involving proactive investigative techniques, it is often easier to determine the type of offender than in other kinds of child- sexual-exploitation cases. When attempting to make this determination, it is important to evaluate all available background information. The information noted below from the online computer activity can be valuable in- this assessment. This information can often be ascertained from the online service provider and through undercover communication, pretext contacts, informants, record checks, and other investigative techniques (e.g., mail cover, pen register, trash run, surveillance). ■ screen name ■ screen profile ■ accuracy of profile ■ length of time active ■ amount of time spent online ■ number of transmissions ■ number of files ■ number of files originated ■ number of files forwarded ■ number of files received ■ number of recipients ' ■ site of communication ■ theme of messages and that ■ theme of pornography A common problem in these cases is that it is often easier to determine a computer is being used than to determine who is using the computer. It is obvi- ously harder to conduct a background investigation when multiple people have access to the same computer. Pretext telephone calls can be useful in such situations. "Concerned Civilians" Many individuals who report information to the authorities about deviant sexual activity they have discovered on the Internet must invent clever excuses for how and why they came upon such material. They often start out pursuing their own sexual/deviant interests, but then decide to report to law enforcement either because it went too far, they are afraid authorities might have monitored them, or they need to rationalize their perversions as having some higher purpose or value. Rather than honestly admitting their own deviant interests, they make up elabo- rate explanations to justify finding the material. Some daim to be journalists; CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 93 EFTA01728721 researchers; or outraged, concerned members of society trying to protect a child or help law enforcement. In any case, what they find may still have to be investi- gated. If information from such "concerned civilians" is part of the basis for an expert's opinion in the warrant, there could be questions concerning its reliability and accuracy. Investigators must consider the true motivations of these "concerned civil- ian?' who report such activity. They may be individuals who, among other things, have ■ embellished and falsified an elaborate tale of perversion and criminal activity on the Internet based on their need to deny or rationalize their own deviant sexual interests ■ uncovered other people using the Internet to validate and reinforce bizarre, perverted sexual fantasies and interests (a common occurrence), but these other people are not engaged in criminal activity ■ uncovered other people involved in criminal activity One especially sensitive area for investigators is the preferential sex offender who presents himself as a concerned civilian reporting what he inadvertently "discovered" in cyberspace or requesting to work with law enforcement to search for child pornography and protect children. Other than the obvious benefit of legal justification for their past or future activity, most do this as part of their need to rationalize their behavior as worthwhile and gain access to children. When these offenders are caught, instead of recognizing this activity as part of their preferential pattern of behavior, the courts sometimes give them leniency because of their "good deeds." Preferential sex offenders who are also law-enforcement officers sometimes claim their activity was part of some well-intentioned, but unauthorized investigation. In the best-case scenario, these "concerned civilians" are well-intentioned, overzealous, and poorly trained individuals who are, therefore, more likely to make mistakes and errors in judgment that may jeopardize a successful prosecution. In the worst-case scenario these "concerned civilians" are pedophiles attempting to justify and get legal permission for their deviant sexual behavior. In any case, investigators should never sanction or encourage civilians to engage in "proactive investigation" in these cases. Investigators should always encourage civilians to immediately and honestly report any criminal activity they inadvert- ently discover online. The great appeal of a computer becomes obvious when one understands sex offenders especially the preferential sex offender. The computer could be a stand- alone system or one utilizing an online-service capability. Whether a system at work, a library, a cyber café, or home, the computer provides preferential sex offenders with an ideal means of filling their needs to ■ obtain and organize their collections, correspondence, and fantasy material ■ communicate with victims and other offenders ■ store, transfer, manipulate, and create child pornography ■ maintain business records 94 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728722 The sex offender using a computer is not a new type of criminal. It is simply a matter of modern technology catching up with long-known, well-documented behavioral needs. In the past they were probably among the first to obtain and use, for their sexual needs, new inventions such as the camera, telephone, auto- mobile, "instant" camera, and the video camera and recorder. Because of their traits and needs, they are willing to spend whatever time, money, and energy it takes to obtain, learn about, and use this technology. They are usually among the first to obtain and utilize any new technology that fills their needs. Organize Offenders use computers to organize their collections, correspondence, and fantasy material. Many preferential sex offenders in particular seem to be com- pulsive recordkeepers. A computer makes it much easier to store and retrieve names and addresses of victims and individuals with similar interests. Innumer- able characteristics of victims and sexual acts can be easily recorded and analyzed. An extensive pornography collection can be cataloged by subject matter. Even fantasy writings and other narrative descriptions can be stored and retrieved for future use. Such detailed records can be invaluable in determining the ages of children in pornography images, identifying additional victims, iden- tifying additional subjects, and proving intent. One problem the computer creates for law enforcement is determining whether computer text describing sexual assaults are fictional stories, sexual fan- tasies, diaries of past activity, plans for future activity, or current threats. This problem can be compounded by the fact that there are individuals who believe that cyberspace is a new frontier where the old rules of society should not apply. They do not want this "freedom" scrutinized and investigated. For general guid- ance in evaluating this material, in texts that are just fantasy, everything seems to go as planned or scripted with no major problems. Reality rarely works out so well. There is, however, no easy solution to this problem. Meticulous analysis, documentation, and investigation are the only answers. Communicate, Fuel, and Validate Many offenders are drawn to online computers to communicate and validate their interests and behavior. This validation is actually the most important and compelling reason that preferential sex offenders are drawn to the online com- puter. In addition to physical contact and putting a stamp on a letter or package, they can use their computer to exchange information and for validation. Through the Internet, national and regional online services, or specialized electronic bulle- tin boards, offenders can use their computers to locate individuals with similar interests. The computer may enable them to obtain active validation (i.e., from living humans) with less risk of identification or discovery. The great appeal of this type of communication is perceived anonymity and immediate feedback. They feel protected as when using the mail, but get immediate response as when meeting face-to-face. Like advertisements in "swinger magazines," computer online services are used to identify individuals of mutual interests concerning age, gender, and sexual preference. The offender may use an electronic bulletin board to which he has authorized access or illegally enter a system. The offender can also setup his own CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 95 EFTA01728723 underground online bulletin boards or Internet sites or participate surreptitiously or openly in those of others. In addition to adults with similar interests, offenders can sometimes get validation from the children they communicate with online. Children needing attention and affection may respond to an offender in positive ways. They may tell the offender he is a "great guy" and that they are grateful for his interest in them. They appreciate the fact that he is willing to listen to and nonjudgmentally discuss sex with them. In communicating with children, and in a few cases with adults, offenders can easily assume the identities of other adults and one or more children. Validation is also obtained from the fact that they are utilizing the same cuffing-edge technology used by the most intelligent and creative people in society. In their minds the time, technology, and talent it takes to engage in this activ- ity is proof of its value and legitimacy. Because of this validation process and the fueling of sexual fantasy with online pornography, I believe that some individuals with potentially illegal, but previously latent sexual preferences have begun to criminally "act out." Their inhibitions are weakened after their arousal patterns are fueled and vali- dated through online computer communication. This does not in any way suggest we should blame the computer and that offenders are not legally accountable for their behavior. As previously stated offenders' need forvalidation is the foundation on which proactive investigative techniques (e.g., stings, undercover operations) are built and the primary reason they work so often. Although their brains may tell them not to send child pornography or reveal details of past or planned criminal acts to a stranger they met online, their need for validation and to fulfill their sexual fantasies often compels them to do so. Because of [the] validation process and the fueling of sexual fantasy with online pornography, I believe that some individuals with potentially illegal, but previously latent sexual preferences have begun to criminally 'act out.' Their inhibitions are weakened after their arousal patterns are fueled and validated through online computer communication. Maintenance of Business Records Offenders who have turned their child pornography into a profit-making busi- ness use computers the same way any business uses them. Things such as lists of customers, dollar amounts of transactions, descriptions of inventory can all be recorded. on the computer. Because trafficking in child pornography by computer lowers the risks, there has been an increase in profit-motivated distribution. Child Pornography An offender can use a computer to transfer, manipulate, and even create child pornography. With the typical iffirne computer and modem, still images can eas- ily be digitally stored, transferred from print or videotape, and transmitted with each copy being as good as the original. Visual images can be stored on hard drives, floppy disks, CD-ROMs, or DVDs. With newer technology, faster modems, digital cameras, and more powerful computers, similar things can now be done with moving images. Increasingly available, high-speed Internet connec- 96 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728724 Lions are now making it possible to even transmit the most preferred child- pornography format—high-quality, lengthy moving images (e.g., videotape, films). The other invaluable modern inventions for pornographers, the video camera and recorder, are now being used with the computer. Real-time video images, multimedia images with motion and sound, and virtual-reality programs can pro- vide added dimensions to pornography. The data that is stored and transmitted can also be encrypted to deter detection. The ability to manipulate digital visual images can make it more difficult to determine the ages of the persons in them. Television commercials can now employ techniques to make it appear that Paula Abdul is dancing with Gene Kelly and John Wayne is talking to a drill sergeant. Halfway through the movie Forrest Gump, Lieutenant Dan's legs are no longer visible. With computer- graphics programs, images can easily be changed or "morphed." This is similar to the technology that is used to "age" the photographs of long-term missing children. Whatever the burden of proof, computers make evaluating questionable child pornography much easier. Rarely is the context of its possession and distribution (i.e., how it was produced, saved, and used) as well documented as in cases involving computers. With a computer, investigators and prosecutors can usually evaluate and consider ■ sources of the images ■ how it was traded ■ other material transmitted with the images ■ amount of material sent and/or received ■ overall themes of the images ■ use of zip files ■ directory and file names assigned by suspect ■ messages with the images ■ content of related chat (by far the most valuable) ■ manipulation of images Interact and Solicit Sex With Children Offenders can use the computer to troll for and communicate with potential vic- tims with minimal risk of being identified. The use of a vast, loose-knit network like the Internet can sometimes make identifying the actual perpetrator difficult. On the computer the offender can assume any identity or characteristics he wants or needs. Children from dysfunctional families and families with poor communi- cation are at significant risk for seduction. Older children are obviously at greater risk than younger children. Adolescent boys confused over their sexual orienta- tion are at particularly high risk of such contacts. By no reasonable definition can an individual with whom a child has regularly communicated online for months be called a "stranger," even if that individual has lied about his true identity. Many offenders, however, are reasonably honest about their identity and some even send recognizable photographs of themselves. They spend hours, days, weeks, and months communicating, including a lot of listening, with children. In the world of the Internet, someone you never met in person is not only not a stranger, but can be your "best friend." Warning potential CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 97 EFTA01728725 victims about online "predators" can communicate a false impression of the nature of the danger. The child can be indirectly "victimized" through conversation (e.g., "chat," "instant messages") and the transfer of sexually explicit information and material. The child can also be evaluated for future telephonic or face-to-face contact and direct victimization. The latest technology allows real-time group participation in child molestation by digital teleconferencing on a computer. After developing a relationship online, offenders who are arrested attempting to meet with children, or individuals they believe to be children, to engage in illegal sexual activity often claim that they were not really going to have "sex." They claim the discussed sex was just a fantasy or cyber sex, part of their under- cover "investigation," or a means of communicating with a troubled child. Some claim that because of their vast online experience they always knew that the per- son they were communicating with was really not a child. This is highly unlikely for a need-driven offender. In addressing these issues of intent, motivation, or knowledge, investigators must objectively weigh all of the offender's behavior (i.e., past history, honesty about identity, collection of pornography or erotica, nature of communications, who was notified about activity, overt actions taken). The idea that all communication about sex on the Internet is just fantasy or cyber sex is absurd and not consistent with the reality of many Internet relationships. Ultimately a judge or jury will decide this question of fact. Investigators must recognize that many of the children lured from their homes after online computer conversations are not innocents who were duped while doing their homework. Most are normal, curious, rebellious, or troubled adoles- cents seeking sexual information or contact. Society has to stop focusing on the naive belief that teenagers are "accidentally" getting involved. Most teenagers deliberately go to web sites such as "www.whiteftouse.com" to find pornography, not to find information about the president. Investigation will sometimes discover significant amounts of adult and child pornography and other sexually explicit material on the computer of the child victim. Investigation will sometimes discover that the child victim has made as many, if not more, mis- representations than the offender; nevertheless, they have been seduced and manipulated by a clever offender and usually do not fully understand or recog- nize what they were getting into. The child victim may, however, believe that the offender is a "true love" or rescuer with whom they want to have sex. Even if they do fully understand, the law is still supposed to protect them from adult sexual partners. Consent should not be an issue with child victims. Investigators must recognize and deal with these dynamics when interviewing these online child victims. (See the chapters titled "Acquaintance-Exploitation Cases," beginning on page 47, and "Investigating Acquaintance Sexual Exploitation" beginning on page 101.) Identified victims, even those whose abuse did not involve a computer, should be interviewed about their knowledge of the offender's use of a computer. In particular they may know details such as the offender's passwords. When law-enforcement officers are pretending to be children as part of authorized and approved proactive investigations, they must remember that the 98 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728726 number of potential offenders is proportional and the "appeal" of the case is inversely proportional to the "age" of the "victim." Because there are far more potential offenders interested in older children, pretending to be a 15- or 16-year- old will result in a larger online response. The resulting case, however, will have far less jury appeal. Pretending to be a 5- or 6-year-old is unrealistic. Most online undercover investigators claim to be 12, 13, or 14 years old. If you can effectively pretend to be a 12-year-old, it seems to make less sense to pretend to be a 13- or 14-year-old. One alternative used by many investigators is to pretend to be an adult with access to young children. Investigators must also remember that when pretending to be a boy online, the "relationship" usually moves a lot faster, and they must be prepared to take appropriate action faster. Because of delays in communicating details from proactive investigations, stale- ness is a common problem in computer-exploitation cases. It may take weeks or months for the details learned from an undercover Internet investigation in one part of the country to be disseminated to investigators with jurisdiction over the target computer in another part of the country. Obviously the best way to address the staleness of probable cause is to "freshen" it up with current investigation and information. As stated in the chapter titled "Collection of Child Pornography and Erotica," beginning on page 61, staleness can also be addressed with an "expert" search warrant, but before doing so prosecutors should do legal research and be aware of appellate decisions that support this approach. They should also be aware of Congressional "Finding" #12 in the Child Pornography Prevention Act of 1996 which states, "prohibiting the possession and viewing of child pornography will encourage the possessors of such material to rid themselves of or destroy the material...." I am not sure what this "finding" is based on, but it is contrary to what I have learned in my many years of studying preferential sex offenders and their demonstrated need to collect and po ts child pornography. It has been my experience that the true preferential sex offender will not rid himself of or destroy his collection simply because possessing it is illegal. Most importantly this finding is contrary to what is usually stated in such expert search warrants. Another way to address "staleness" is to recognize that the information in question may not be stale. It is a matter of differing opinion as to when the informational basis for probable cause in a computer case becomes stale. Some prosecutors say in days. Others say weeks, and most say months. I believe that the time interval varies based on the type of information. Because of characteris- tics of technology and human behavior, probable cause about information on a computer should not even be considered stale for at least one year. It is not easy to effectively delete the information on a computer even when you try. Further- more most people do not delete the information on a regular basis. Such editing of a computer is likely to occur less often than cleaning out the garage, attic, or basement. Because this is a common human characteristic, it should not require the opinion of an expert. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 99 EFTA01728727 Investigating Acquaintance Sexual Exploitation This chapter is intended to offer general guidelines on how to apply the previ- ously discussed behavioral dynamics to the investigation and prosecution of cases of sexual exploitation of children perpetrated by acquaintance molesters. Intrafamilial, child-sexual-abuse cases can be difficult to prove in a court of law. Frequently there is only the word of one child against that of an adult. This is, however, rarely the case in child-sexual-exploitation cases especially those involv- ing preferential sex offenders. With multiple victims, no one victim should have to bear the total burden of proof, and cases should rarely, if ever, be severed for prosecution. The best victims and cases should be selected for prosecution. It will be extremely difficult to convict a prominent, well-respected member of the com- munity based only on the testimony of one troubled, delinquent adolescent or one confused, naive young child. It is commonly accepted that child sexual victimization is a complex problem requiring the efforts and coordination of many agencies and disciplines. No one agency or discipline possesses the personnel, resources, training, skills, or legal mandate to deal effectively with every aspect of child maltreatment. In this context law enforcement interacts with a variety of professions and agencies dur- ing the investigation process. For example some offenders cross jurisdictional boundaries, and many violate a variety of state and federal laws when exploiting children. This often will mean working with other local, state, and 'federal law-enforcement agencies in multijurisdictional investigative teams and with pros- ecutors, social services, and victim assistance in multidisciplinary teams. This can be done as part of informal networking or a formal task force. The multidisciplinary approach not only is advantageous in avoiding duplication and making cases but is also in the best interests of the child victim. It may minimize the num- ber of interviews and court appearances and provide the victim with needed support. The team approach can also help investigators deal with the stress and isolation of this work by providing peer support. The multidisciplinary approach is mandated statutorily or authorized in the majority of states and under federal law (U.S. Department of Justice, 1993). Working together as part of a multidisciplinary team means coordination not abdication. Each discipline performs a function for which it has specific resources, training, and experience. Although each discipline must understand how its role contributes to the team approach, it is equally important that it understands the respective responsibilities and limitations of that role. For example child-protec- tion agencies usually cannot get involved in cases in which the alleged perpetrator is not a parent or caretaker (i.e., acquaintance molester). The team approach is a two-way street. Just as medical and psychological professionals are charged with evaluating and treating the abused or neglected child, law-enforcement investigators are responsible for conducting criminal With multiple victims, no one victim should have to bear the total burden of proof and cases should rarely; if ever, be severed for prosecution. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 101 EFTA01728728 investigations. Just as law-enforcement officers need to be concerned that their investigation• might further traumatize a child victim, therapists and physi- cians need to be concerned that their treatment techniques might hinder the investigation. The Law-Enforcement Perspective The law-enforcement perspective deals with criminal activity and legally defensible fact-finding. The process must, therefore, focus more on ■ admissible evidence of what happened than on emotional belief that some- thing happened ■ the accuracy than on the existence of repressed memory ■ objective than on subjective reality ■ neutral investigation than on child advocacy In their desire to convince society that child sexual victimization exists and children do not lie about it, some professionals interpret efforts to seek corrobora- tion for alleged sexual victimization as a sign of denial or disbelief. Corroboration, however, is essential. Investigators cannot just accept that something sexual hap- pened to a child and ignore the context details that are necessary if it is to be proven in a court of law. When the only evidence offered is the word of a child against the word of an adult, child sexual victimization can be difficult to prove in a court of law. It is not the job of law-enforcement officers to believe a child or any other victim or witness. The child victim should be carefully interviewed. The information obtained should be assessed and evaluated, and appropriate investigation should be conducted to corroborate any and all aspects of a victim's statement. The investigator should always be an objective fact-finder considering all possibilities and attempting to determine what happened with an open mind. As previously stated, in a valid case, the best and easiest way to avoid child-victim testimony in court is to build a case so strong that the offender pleads guilty. Most children, however, can testify in court if necessary. Emotion Versus Reason Regardless of intelligence and-education, and often despite common sense and evidence to the contrary, adults tend to believe what they want or need to believe. The greater the need, the greater the tendency. The extremely sensitive and emotional nature of child sexual exploitation makes this phenomenon a potential problem in these cases. For some no amount of training and education can overcome this zealotry. Some people seem to be incapable of becoming objective fact- finders in some sexual-victimization-of-children cases. Investigators must evaluate this tendency in other inter- veners and minimize it in themselves by trying to do their job in a rational, professional manner. In order to be effective interviewers, investigators must be both aware of and in control of their own feelings and beliefs about victims and offenders in child-sexual-exploitation cases. People in the United States tend to have ste- reotypical concepts of the innocence of children and malevolence of those who sexually victimize them. Most investigators now know that a child molester can look like anyone else and may even be someone we know and like. As previously discussed the stereotype of the child victim as a completely innocent Regardless of intelligence and education, and often despite common sense and evidence to the contrary, adults tend to believe what they want or need to believe. The greater the need, the greater the tendency. 102 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728729 little girl, however, is still with us and less likely to be addressed by lay people and even professionals. In reality child victims of sexual abuse and exploitation can be boys as well as girls, and not all victims are "angels" or even little." The idea that some children might enjoy certain sexual activity or behave like human beings and engage in sexual acts as a way of receiving attention, affection, gifts, and money is troubling for society and many investigators. . Depending on the nature of the abuse and techniques of the offender, investigators must understand that the victim may have many positive feelings for the offender and even resent law-enforcement intervention. The investigator must be able to discuss a wide variety of sexual activities, understand the victim's terminology, and avoid being judgmental. Not being judgmental is much more difficult with a delinquent adolescent engaged in homo- sexual activity with a prominent clergyman than with a sweet 5-year-old girl abused by a low-life" stranger. Inves- tigators often nonverbally communicate their judgmental attitude through gestures, facial expressions, and body lan- guage. Many investigators do a poor job of interviewing children because deep down inside they really do not want to hear the detailed answers. Another emotion-related problem that occurs frequently during subject and suspect interviews is the inability of some investigators to control or conceal their anger and outrage at the offender's behavior. They often want to spend as little time as possible with the offender. Occasionally investigators have the opposite problem and are confused that they have sympathetic feelings for the offender. Many investigators also find it difficult to discuss deviant sexual behavior calmly, objectively, nonjudgmentally, and in detail with anyone much less an alleged child molester or d child. An investigator who gets too emotionally involved in a case is more likely to make mistakes and errors in judg- ment. He or she might wind up losing a case and allowing a child molester to go free because the defendant's rights were violated in some way. The officer is also less likely to inter- view and assess a child victim properly and objectively. Investigators must learn to recognize and control these feelings. If they cannot, they should not be assigned to child- sexual-victimization cases or, at least, not to the interview phase. The idea that some children might enjoy certain sexual activity or behave like human beings and engage in sexual acts as a way of receiving attention, affection, gifts, and money is troubling for society and many investigators. The "Big-Picture" Approach Although this chapter cannot cover in detail the investiga- tion of all types of cases, it can serve to alert investigators to the "big-picture" approach to the sexual victimization of children. Investigators must stop looking at child sexual exploitation through a keyhole—focusing only on one act by one offender against one victim on one day. Law enforcement must "kick the door open" and take the "big- picture" approach—focusing on offender typologies, patterns of behavior, multiple acts, multiple victims, child pornography, and proactive techniques. Investigators must stop looking at child sexual exploitation through a keyhole—focusing only on one act by one offender against one victim on one day. Law enforcement must 'kick the door open' and take the .Big-picture' approach— focusing on offender typologies, patterns of behavior, multiple acts, multiple victims, child pornography, and proactive techniques. CHILD MOLEsihRS: A BEHAVIORAL ANALYSIS - 103 EFTA01728730 The "big-picture" approach starts with recognizing four basic but often ignored statements about child molesters. ■ child molesters sometimes molest multiple victims ■ intrafamilial child molesters sometimes molest children outside their families ■ sex offenders against adults sometimes molest children ■ other criminals sometimes molest children These elements are not always present or even usually present; nevertheless, their possibility should be incorporated into the investigative strategy. Offenders, unfortunately, often ignore neat categories of offenders and crime. A window peeper, an exhibitionist, or a rapist also can be a child molester. "Regular" criminals can also be child molesters. A child molester put on the FBI's "Ten Most- Wanted" list was later arrested for burglarizing a service station. Although most professionals now recognize that an intrafamilial child molester might victimize children outside his or her family and identifying other victims can be an effec- five way to corroborate an allegation by one victim, few seem to incorporate a search for additional victims into their investigative approaches. An acquaintance molester may also use marriage as a method of access to children. In numerous cases offenders have not been effectively prosecuted or contin- ued to operate for many years after first being identified because no one took the "big-picture" approach. Convicting an acquaintance child molester who is a "pillar of the community" is almost impossible based only on the testimony of one confused 5-year-old girl or one delinquent adolescent boy. Investigation, especially of preferential sex offenders, should never be "he said, he or she said," but "he said, they said." To stop the offender, law enforcement must get details; be willing to evaluate the allegations; conduct background investigation; docu- ment patterns of behavior; review records; identify other acts and victims; and, as soon as possible, develop probable cause for a search warrant. Simply interview- ing the child or obtaining the results of someone else's interview, asking the offender if he did it, polygraphing him, and then closing the case does not constitute a thorough investigation and is certainly. mot consistent with the "big- picture" approach. The "big-picture" investigative process consists of three phases. They are interview, assess and evaluate, and corroborate. These three phases do not always happen in this sequence and even may occur simultaneously or intermittently. This section will not include a detailed discussion of the latest research and specific techniques for interviewing children. (See Saywitz, Goodman, & Lyon, 2002). Only the law-enforcement perspective of child-victim interviewing and some general guidelines will be discussed here. Law-Enforcement Role For some the criminal investigation of child sexual victimization has evolved into using newly acquired interviewing skills to get children to communicate and then believing whatever they say. For others it has become letting someone else do the 104 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728731 interview and then blindly accepting the interviewer's opinions and assessments. Law-enforcement officers should take advantage of the skills and expertise of other disciplines in the interviewing process. If the primary purpose of an inter- view of a child is to gain investigative information, however, law enforcement must be actively involved. This involvement can range from actually doing the interview to carefully monitoring the process. Although there is nothing wrong with admitting shortcomings and seeking help, law enforcement should never abdicate its control over the investigative interview. The solution to the problem of poorly trained investigators is better training, not therapists and physicians independently conducting investigative interviews. Even if, for good reasons, an investigative interview is conducted by'or with a forensic interviewer, social worker, or therapist, law enforcement must be in control. The Disclosure/Reporting Continuum Before applying interviewing research, training, and skills, investigators first must attempt to determine where the child is on the disclosure/reporting continuum. This determination is essential to developing a proper interview approach that maximizes the amount of legally defensible information and minimizes allega- tions of leading and suggestive questioning. The disclosure process is set forth as a continuum because there can be many variations, combinations, and changes in situations involving the disclosure status of child victims. Training material and presentations often fail to consider and emphasize the determination of this dis- closure/reporting status prior to conducting a child-victim interview. At one end of the continuum are children who already have made voluntary and full disclosures to one or more people. These are generally the easiest children to interview. The child has made the decision to disclose, and the child has done so at least once. It is, of course, important to determine the length of time between the abuse and disclosure. At another point along the continuum are children► who have voluntarily decided to disclose but it appears have made only incomplete or partial reports. *For understandable reasons, some children fail to disclose, minimize, or even deny all or part of their victimization; however, not every child who discloses sexual victimization has more horrible details yet to be revealed. Further down the continuum are children whose sexual victimization was discovered rather than disclosed (e.g., recovered child pornography, medical evidence). This can often be the situation in cases in which child pornography or computer records are found. These interviews can be more difficult because these children have not decided to disclose and may not be ready to disclose. They also can be easier, however, because the investigator knows with some degree of certainty that the child was victimized. The interview can now focus more on determining additional details. At the far end of the continuum are children whose sexual victimization is only suspected. These may be the most difficult, complex, and sensitive inter- views. The investigator must weigh a child's understandable reluctance to talk about sexual victimization against the possibility that the child was not victim- ized. The need to protect the child must be balanced with concern about leading or suggestive questioning. This is often the situation in acquaintance-exploitation cases. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 105 EFTA01728732 Establishing Rapport and Clarifying Terms The interviewer's first task, with any age child, is to establish rapport. Investiga- tors should ask primarily open-ended questions that encourage narrative responses. It is hoped that this will set the stage for more reliable responses to investigative questions that follow. Part of developing rapport with victims of acquaintance molestation is to sub- tly communicate the message that the child is not at fault. If they think they are going to be judged, many children will deny their victimization and some may exaggerate it by alleging threats, force, and even abduction that did not occur to make the crime more socially acceptable. Although many of the same interview principles apply to the interview of adolescent victims, it can be far more difficult to develop rapport with an older child than with a younger child. Another critical task early in the interview is to clarify the suspected victim's terminology for various body parts and sexual activities. If this clarification is not achieved early on, much misunderstanding can occur. Similarly, although it is just as important to find out exactly what the adolescent victim means by the terms he or she uses for sexual activity, terms such as "head job" and "rim job" are not so readily acceptable as the 5-year-old's "pee-pee" and "weiner." The inter- view of an adolescent boy victim of sexual exploitation is extremely difficult at best. The stigma of homosexuality and embarrassment over victimization greatly• increase the likelihood that the victim may deny or misrepresent the sexual activity. The investigator must accept the fact that even if a victim discloses, the information is likely to be incomplete minimizing his involvement and responsi- bility and, in some cases, exaggerating the offender's. Videotaping The taping of victim interviews was once thought to be the ultimate solution to many of the problems involving child victim interviews and testimony. Many legislatures rushed to pass special laws allowing it. Aside from the constitutional issues, there are advantages and disadvantages to videotaping or audiotaping child victims' statements. The advantages include the ■ knowledge of exactly what was asked and answered ■ potential ability to reduce the number of interviews ■ visual impact of a videotaped statement ■ ability to deal with recanting or changing statements ■ potential to induce a confession when played for an offender who truly cares for the child victim The disadvantages include ■ the artificial setting created when people "play" to the camera instead of concentrating on communicating. ■ determining which interviews to record and explaining variations between them. ■ accounting for the tapes after the investigation. Copies are sometimes fur- nished with little control to defense attorneys and expert witnesses. Many are played at training conferences without concealing the identity of victims. ■ because there are conflicting criteria on how to conduct such an interview, each tape is subject to interpretation and criticism by "experts." 106 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728733 Many experts now feel that child-victim interviews must be videotaped in order to be assessed and evaluated properly Some judges and courts now require videotaping of child-victim interviews. Many people in favor of videotaping argue, "If you are doing it right, what do you have to hide?" When videotaping a victim interview, however, a piece of evidence is created that did not previously exist, and that evidence can become the target of a great deal of highly subjective scrutiny. Every word, inflection, gesture, and movement become the focus of attention rather than whether or not the child was molested. Unreliable informa- tion and false denials can be obtained from "perfect" interviews, and reliable information and valid disclosures can be obtained even from highly imperfect interviews. This fact can be lost in an excessive focus on how the interview was conducted. This in no way denies the fact that repetitive, suggestive, or leading interviews are real problems and can produce false or inaccurate information. Many videotaping advocates do not seem to recognize the wide diversity of circumstances and dynamics comprising sexual-victimization-of-children cases. Interviewing a 12-year-old boy who is suspected of having been molested by his coach is far different from interviewing a 9-yearold girl who has disclosed having been sexually abused by her father. Interviewing a runaway 15-year-old inner- city street prostitute is far different from interviewing a middle-class, 5-year-old kidnapped from her backyard by a child molester. Interviewing a Native Ameri- can child in a hogan without electricity on a remote reservation is far different from interviewing a white child in a specially designed interview room at a child advocacy center in a wealthy suburb. In addition videotape equipment can be expensive, and it can and does malfunction. Although some of the disadvantages can be reduced if the tapes are made during the medical evaluation, it is still my opinion that the disadvantages of taping generally outweigh the advantages. This is especially true of the interviews of adolescents who are only suspected of having been sexually exploited because of their known contact with an acquaintance child molester and have not previ- ously disclosed. Many experienced child-sexual-victimization prosecutors oppose the taping of child-victim statements, although special circumstances may alter this opinion on a case-by-case basis. One such special situation might be the interview of a child who is younger than the age of 7. Departments should be careful of written policies concerning taping. It is potentially embarrassing and damaging to have to admit in court that such interviews are usually taped but wasn't in this case. It is better to be able to say that such interviews usually aren't taped but was in a certain case because of some special circumstances that can be clearly articulated. In this controversy over videotaping, investigators should be guided by their pros- ecutors' expertise and preferences, legal or judicial requirements, and their own common sense. General Rules and Cautions Investigative interviews should always be conducted with an open mind and the assumption that there are multiple hypotheses or explanations for what is being described, alleged, or suspected. Investigative interviews should emphasize open- ended, age-appropriate questions that are hoped to elicit narrative accounts of events. All investigative interaction with victims must be documented carefully and thoroughly. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 107 EFTA01728734 The interview of an alleged or potential child victim as part of a criminal investigation should always be conducted as quickly as possible. It is important to interview as many potential victims as is legally and ethically possible. This is especially important in cases involving adolescent boy victims, most of whom will deny their victimization no matter what the investigator does. Unfortunately for victims, but fortunately for the investigative corroboration, men who victim- ize adolescent boys in my experience are the most persistent and prolific of all child molesters. The small percentage of their victims who disclose still may constitute a significant number. The investigation of allegations of recent activity from multiple young children should begin quickly with interviews of all potential victims being completed as soon as possible. The investigation of adult survivors' allegations of activity 10 or more years earlier presents other problems and should proceed, unless victims are at immediate risk, more deliberately with gradually increasing resources as corroborated facts warrant. Children rarely get the undivided attention of adults, even their parents, for a long period of time. Investigators must be cautious about subtly rewarding a child by allowing this attention to continue only in return for furnishing additional details. The investigator should make sure this necessary attention is unconditional. Interviews of children younger than 7 years of age are potentially problematic and should be done by investigators trained and experienced in such interviews. Because suggestibility is potentially a bigger problem in younger children, the ageossment and evaluation phase is especially important in cases involving these young victims and videotaping is more justified. 13 This part of the investigative process in child-sexual-victimization cases seems to have gotten lost. Is the victim describing events and activities that are consistent with law-enforcement-documented criminal behavior and prior cases, or are they more consistent with distorted media accounts and erroneous public perceptions of criminal behavior? Investigators should apply the "template of probability." Accounts of child sexual victimization that are more like books, television, and movies (e.g., big conspiracies, snuff films, child sex slaves, highly organized sex rings) and less like documented cases should be viewed with skepticism, but thoroughly investigated. It is the investigator's job to consider and investigate all possible explanations of events. In addition the information learned will be invaluable in counteracting the defense attorneys when they raise alternative explanations. The so-called "backlash" has had both a positive and negative impact on the investigation and prosecution of child-sexual-victimization cases. In a positive way it has reminded criminal-justice interveners of the need to do their jobs in a more professional, objective, and fact-finding manner. Most of the damage caused by the backlash actually is self-inflicted by well-intentioned child advocates. In a negative way it has cast a shadow over the validity and reality of child sexual victimization and influenced some to avoid properly pursuing cases (Laming, 1996). For many years the statement, "Children never lie about sexual abuse. If they have the details, it must have happened," almost never was questioned or 108 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728735 debated at training conferences. During the 1970s, there was a successful crusade to eliminate laws requiring corroboration of child-victim statements in child-sexual- victimization cases. It was believed that the way to convict child molesters was to have the child victims testify in court. If we believe them, the jury will believe them. Any chal- lenge to this basic premise was viewed as a threat to the progress made and denial that the problem existed. Both parts of this statement—"Children never lie about sexual abuse" and "If they have the details, it must have hap- pened" — are receiving much-needed reexamination; a process that is critical to the investigator's task of assessing and evaluating the alleged victim's statements. Children are not adults in little bodies. Children go through developmental stages that must be evaluated and understood. In many ways, however, children are no better or worse than other victims or witnesses of a crime. They should not be automatically believed or dismissed. "Children Never Us" The available evidence suggests that children rarely lie about sexual victimization, if a lie is defined as a statement deliberately and maliciously intended to deceive. If children in exploitation cases do lie, it may be because factors such as shame or embarrassment over the nature of the victimization increase the likelihood that they misrepresent the sexual activity. Seduced victims sometimes lie to make their victimization more socially acceptable or please an adult. Occasionally chil- dren lie because they are angry and want to get revenge on somebody. Some children, sadly, lie about sexual victimization to get attention and forgiveness. A few children may even lie to get money or as part of a lawsuit. This can sometimes be influenced by pressure from their parents. Objective investigators must con- sider and evaluate all these possibilities. It is extremely important to recognize, however, that because children might lie about part of their victimization does not mean that the entire allegation is necessarily a lie and they are not victims. As previously discussed acquaintance-exploitation cases often involve complex dynamics and numerous incidents that often make it difficult to say "it'• is all true or false. In addition just because a child is not lying does not mean he or she is making an accurate statement. Children might be telling you what they have come to believe happened to them, even though it might not be literally true. Other than lying, there are many possible alternative explanations for why victims might allege things that do not seem to be accurate. The ■ child might be exhibiting distortions in traumatic memory ■ child's account might reflect normal childhood fears and fantasy ■ child's account might reflect misperception and confusion caused by deliberate trickery or drugs used by perpetrators ■ child's account might be affected by suggestions, assumptions, and misinterpretations of overzealous interveners ■ child's account might reflect urban legends and shared cultural mythology Such factors, alone or in combination, can influence a child's account to be inaccurate without necessarily making it a "lie." Children are not adults in little bodies. Children go through developmental stages that must be evaluated and understood. In many ways, however, children are no better or worse than other victims or witnesses of a crime. They should not be automatically believed or dismissed. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 109 EFTA01728736 Of what victims allege some may be true and accurate misperceived or distorted screened or symbolic • "contaminated" or false The problem and challenge, especially for law enforcement, is to deter- mine which is which. This can be done only through evaluation and active investigation. The investigator must remember, however, that almost anything is possible. Just because an allegation sounds farfetched or bizarre does not mean it did not happen. The debate over the literal accuracy of grotesque allegations of ritual abuse has obscured the well-documented fact that there are child sex rings, bizarre paraphilias, and cruel sexual sadists. Even if only a portion of what these victims allege is factual, it still may constitute significant criminal activity. "If They Have the Details, It Must Have Happened" The second part of the basic statement also must be evaluated carefully. The details in question in some cases have little to do with sexual activity. Investigators must do more than attempt to determine how a child could have known about sex acts. Some cases involve determining how a child could have known about a wide variety of bizarre activity. Young, nonabused children usually might know little about sex, but they might "know" more than you realize about monsters, torture, kidnapping, and even murder. When considering a child's statement, investigators should remember that lack of sexual detail does not mean abuse did not happen. Some children are reluctant to discuss the details of what happened. In evaluating reported details it is also important to consider that victims might supply details of sexual or other acts using information from sources other than their own direct victimization. Such sources must be evaluated carefully and may include the items noted below. Personal Knowledge The victim might have personal knowledge of the activity, but not as a result of the alleged victimization. The knowledge could have come from participating in cultural practices; viewing pornography, sex education, or other pertinent material; witnessing sexual activity in the home; or witnessing the sexual victimization of others. It also could have come from having been sexually or physically abused by someone other than the alleged offender(s) and in ways other than the alleged offense. Other Children or Victims Young children today interact socially more often and at a younger age than ever before. Many parents are unable to provide possibly simple explanations for their children's stories or allegations because they were not with the children when the explaining events occurred. They do not know what videotapes their children might have seen, genies they might have played, and stories they might have been told or overheard. Some children are placed in daycare centers for 8, 10, or 12 hours a day, starting as young as 6 weeks of age. The children share experiences by playing house, school, or doctor. Bodily func- 110 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728737 Lions such as urination and defecation are a focus of attention for these young children. To a certain extent each child shares the experiences of all the other children. Children of varying ages are also sharing information and experiences on the Internet. The possible effects of the interaction of such children prior to the disclosure of the alleged abuse must be evaluated. Media The amount of sexually explicit, bizarre, or violence-oriented material avail- able to children in the modem world is overwhelming. This includes movies, videotapes, music, books, games, and CD-ROMs. Cable television, computers, the Internet, and the home VCR make all this material readily available to even young children. There are numerous popular toys and video games on the mar- ket with bizarre or violent themes. Suggestions and Leading Questions This problem is particularly important in cases involving children who are younger than the age of 7 and especially those stemming from custody/visitation disputes. This is not to suggest that custody/ visitation disputes usually involve sex-abuse allegations, but when they do and when the child in question is young, such cases can be difficult to evaluate. It is my opinion that most suggestive, leading questioning of children by interveners is done inadvertently as part of a good-faith effort to learn the truth. Not all interveners are in equal positions to potentially influence allegations by children. Parents and relatives are in the best position to subtly cause their children to describe their victimization in a certain way. They sometimes question children in a suggestive and accusatory style that casts doubt on the child's state- ments. In most cases, parents and relatives are well meaning and do not realize that their style of questioning might influence their child to make inaccurate or false statements. Family members sometimes misinterpret innocuous or ambigu- ous statements as evidence of sexual abuse. Children also might overhear their parents discussing the details of the case. They might be trying to prolong the rarely given undivided attention of an adult. Children often tell their parents what they believe their parents want or need to hear. For example a parent may be able to accept oral sex, but not anal sex. Some parents may need to believe that their child would engage in sex with an adult of the same gender only if confronted with overwhelming physical force. In one case a father gave law enforcement a tape recording to "prove" that his child's statements were spontaneous disclosures and not the result of leading, suggestive questions. The tape recording indicated just the opposite. Why, then, did the father voluntarily give it to law enforcement? Probably because he truly believed he was not influencing his child's statement—but he was. Usually well-meaning interveners have subtly as well as overtly rewarded some victims for furnishing certain details. Interveners who excessively or emotionally refer to the child's sexual victimization as "rape" may, for example, influence the child's version of events to conform to that view. Some "details" of a child's allega- tion even might have originated as a result of interveners making assumptions about or misinterpreting what the victim actually said. The interveners then repeat and possibly embellish these assumptions and misinterpretations, and even- tually the victims come to agree with or accept this "official" version of what happened. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - EFTA01728738 Therapists also can be in a good position to influence the allegations of chil- dren and adult survivors. Types and styles of verbal interaction useful in therapy might create significant problems in a criminal investigation. Some therapists may have beliefs about sexual abuse or be overzealous in their efforts to help children in difficult circumstances. It should be noted, however, that when a thera- pist does a poor investigative interview as part of a criminal investigation, it is the fault of the criminal-justice system that allowed it—not of the therapist who did it. Misperception and Confusion by the Victim Sometimes what seems unbelievable has a reasonable explanation. In one case a child's description of the apparently impossible act of walking through a wall turned out to be the very possible act of walking between the studs of an unfinished wall in a room under construction. In another case pennies in the anus turned out to be copper-foil-covered supposito- ries. The children might describe what they believe happened. It is not a lie, but neither is it an accurate account. It might be due to confusion deliberately caused by the offender or misperception inadvertently caused by youthful inexperience. Many young and some older children have little experience or frame of refer- ence for accurately describing sexual activity. They might not understand the difference between "in" and "on" or the concept of "penetration." Drugs and alcohol also might be used deliberately to confuse the victims and distort their perceptions. Education and Awareness Programs Some well-intentioned awareness and sex- education programs designed to prevent child sex abuse and child abduction or provide children with information about human sexuality may, in fact, unrealisti- cally increase fears and provide some of the details that children are telling interveners. Children may describe the often-discussed stranger abduction rather than admit they made an error in judgment and went voluntarily with an offender. The answer to this potential problem, however, is to evaluate the possi- bility, not to stop education and prevention programs. Areas of Evaluation As part of the assessment and evaluation of victim statements, it is important to determine how much time has elapsed between when the victim first made the disclosure and that disclosure was reported to law enforcement or social services. The longer the delay, the greater the potential for problems. The next step is to determine the number and purpose of all prior interviews of the victim concerning the allegations. The more interviews conducted before the investiga- tive interview, the greater the potential difficulties. Problems can also be created by interviews conducted by various interveners after the investigative interview(s). The investigator must dosely and carefully evaluate events in the victim's life before, during, and after the alleged victimization. Events occurring before the alleged exploitation to be evaluated might include ■ background of the victim ■ abuse or drugs in the home ■ pornography in the home ■ play, television, VCR, computer, and Internet habits 112 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728739 attitudes about sexuality in the home religious beliefs and training extent of sex education in the home cultural and subcultural attitudes and practices activities of siblings need or craving for attention childhood fears custody/visitation disputes victimization of or by family members interaction between victims family disputes or discipline problems Events occurring during the alleged exploitation to be evaluated include use of fear or scare tactics degree of trauma use of magic, deception, or trickery use of rituals use of drugs and alcohol use of pornography use, of grooming and seduction Events occurring after the alleged exploitation to be evaluated include disclosure sequence El other interviews • background of prior interviewers background of parents . comingling of victims type of therapy received cOntact by offender • shaine and guilt lawsuits Contagion Investigators must also evaluate possible contagion. Consistentstatements obtained from different 'interviews and multiple victims are powerful pieces of corroborative evidence—that is, as long as those statements were not "contami- nated." Investigation must evaluate both pre- and post-disclosine contagion and both victim and intervener contagion carefullys. Are the different victim state- ments consistent because they describe common experiences/events or reflect contamination ;Di shared cultural mythology? . • The sources of potential contagion are widespread. Victims can communicate with each Other both prior to and after their disclosuies. Interveners can commu- nicate with each :Other and the Victims. The team or c'ell concepts are attempts'to deal with.potential investigator..contitgion in multivictitn cases. The same Indi- viduals do not interview all the victims, and interviewers do not necessarily share information directly with each other (Laming, 1902b).. . tf. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 113 EFTA01728740 Documenting existing contagion and eliminating additional contagion is cru- cial to the successful investigation and prosecution of many cases. There is no way, however, to erase or undo contagion. The best you can hope for is to identify and evaluate it and attempt to explain it. Mental-health professionals requested to evaluate suspected victims must be carefully selected and evaluated. Once a case is contaminated and out of control, little can be done to salvage what might have been a prosecutable criminal violation. A few races have even been lost on appeal after a conviction because of contamination problems. In order to evaluate the contagion element, investigators must investigate these cases meticulously and aggressively. Whenever possible, personal visits should be made to all locations of alleged exploitation and the victims' homes. Events prior to the alleged exploitation must be evaluated carefully. Investigators might have to view television programs, movies, video games, computer games, and videotapes seen by the victims. In some cases it might be necessary to conduct a background investigation and evaluation of everyone who, officially or unofficially, interviewed the victims about the allegations prior to and after the investigative interview(s). Investigators must be familiar with the information about sexual victimiza- tion of children being disseminated in magazines, books, television programs, conferences, and the Internet. Every alternative way that a victim could have learned about the details of the activity must be explored, if for no other reason than to eliminate them and counter defense arguments. There may, however, be validity to these contagion factors. They might explain some of the "unbeliev- able" aspects of the case and result in the successful prosecution of the substance of the case. Consistency of statements becomes more significant if contagion is identified or disproved by independent investigation. Munchausen syndrome and munchausen syndrome by proxy are complex and controversial issues in child-victimization cases. No attempt will be made to discuss them in detail (see Feldman & Ford, 1994), but they are well-documented facts. Most of the published literature about them, however, focuses on their manifestation in the medical setting as false or self-inflicted illness or injury. They are also manifested in the criminal-justice setting as false or self-inflicted crime victimization. A child might allege sexual victimization to get attention or forgiveness. If parents would poison their children to prove an illness, they might sexually abuse their children to prove a crime and get attention. These are the unpopular but documented realities of the world. Recognizing their existence does not mean that child sexual victimization is any less real and serious. Summary of Evaluation and Assessment As much as investigators might wish otherwise, there is no simple way to deter- mine the accuracy of a victim's allegation. Investigators cannot rely on therapists, evaluation experts, or the polygraph as shortcuts to determining the facts. Many mental-health professionals might be good at determining that something trau- matic happened to a child, but determining exactly what happened is another matter. Mental-health professionals are now more willing to admit that they are unable to determine, with certainty, the accuracy of victim statements in these cases. There is no test or statement-analysis formula that will determine with ab- solute certainty how or whether a child was sexually abused. Although resources such as expert opinion, statement-validity analysis, phallometric devices (sexual- 114 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728741 arousal evaluation), voice-stress analysis, and the polygraph might be potentially useful as part of the evaluation process, none of them should ever be the sole criterion for pursuing or not pursuing an allegation of child sexual victimization. Law enforcement must proceed with the investigation and rely primarily on the corroboration process. The criminal-justice system must identify or develop and use fair and objec- tive criteria for evaluating the accuracy of allegations of child sexual victimization and filing charges against the accused. Just because it is possible does not mean it happened. The lack of corroborative evidence is significant when there should be corroborative evidence. With preferential sex offenders there is almost always corroborative evidence. Blindly believing everything in spite of a lack of logical evidence or simply ignoring the impossible or improbable and accepting the pos- sible is not good enough. If some of what the victim describes is accurate, some misperceived, some distorted, and some contaminated, what is the court sup- posed to believe? Until we come up with better answers, the court should be asked to believe what a thorough investigation can corroborate, understanding that physical evidence is only one form of corroboration. (See next section.) In those cases in which there simply is no corroborative evidence, the court may have to make its decision based on carefully assessed and evaluated victim testi- mony and the elimination of alternative explanations. As a general principle valid cases tend to get "better" and false cases tend to get "worse" with investigation. The techniques noted below are offered as ways to corroborate allegations of child sexual exploitation and avoid child-victim testi- mony in court. If child-victim testimony cannot be avoided, at least the victim will not bear the total burden of proof if these techniques are used. These tech- niques can, to varying degrees, be used in any child-sexual-victimization case, but the main focus here is on acquaintance molesters. The amount of corrobora- tive evidence available might depend on the type of case, sexual activity, and offender(s) involved. Corroboration might be more difficult in an isolated one- on-one case perpetrated by a situational sex offender and easier in a sex-ring case perpetrated by an acquaintance-preferential sex offender. Document Behavioral Symptoms of Sexual Victimization Because the behavioral and environmental indicators of child sexual victimiza- tion are set forth in so many publications elsewhere (see Myers & Stern, 2002), they will not be set forth here in detail. Developmentally unusual sexual knowledge and behavior, however, seem to be the strongest symptoms. The docu- mentation of these symptoms can be of assistance in corroboratirig child-victim statements. It must be emphasized, however, that these are only symptoms, and objective experts must carefully evaluate their significance in context. Many behavioral symptoms of child sexual victimization are actually symptoms of trauma, stress, and anxiety that could be caused by other events in the child's life. Almost every behavioral indicator of sexual victimization can be seen in nonabused children. Because of variables such as the type and length of abuse, the resiliency of the child victim, and society's response to the abuse, not all children react to being abused in the same way; therefore, just as the presence of behavioral symp- CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 115 EFTA01728742 toms does not prove that a child was sexually victimized, the absence of them does not prove that a child was not. The use of expert witnesses to introduce this evidence into a court of law is a complex legal issue that will also not be discussed here in detail (but see Myers & Stern, 2002). Mental-health professionals, social workers, child-protective ser- vice-workers, and law-enforcement investigators can be the source of such expert testimony regarding symptoms of sexual victimization. Experts might not be allowed to testify about the guilt and innocence of the accused but might be able to testify about the apparent validity of a case by explaining or offering opinions about the nature of the offense and its consistency with documented cases and offender/victim patterns of behavior. One commonly accepted use of such expert testimony is to impeach defense experts and rehabilitate prosecution witnesses after their credibility has been attacked by the defense. An expert might be able to testify concerning such symptoms to rebut defense allegations that the prosecution has no evidence other than the testimony of a child victim or child's disclosure is totally the result of leading and improper questioning. These and other possible uses of expert testimony should be discussed with the prosecutor of each case. Even if not admissible in court, the symptoms of sexual victimization still can be useful as part of investigative corroboration, par- ticularly when symptoms predate any disclosure. Ongoing research reveals that sexually abused girls also may experience physiological changes and symptoms (DeBellis, Lefter, Trickett, & Putnam, 1994). The investigative and prosecutive significance of these findings is unknown at this time. Document Patterns of Behavior Two patterns of behavior should be documented. They are victim and offender patterns. Victim Patterns By far the most important victim pattern of behavior to identify and document is the disclosure process. Investigators must verify, through active investigation, the exact nature and content of each disclosure, outcry, or state- ment made by the victim. Secondhand information about disclosure is not good enough. To whatever extent humanly possible the investigator should determine exactly when, where, to whom, in precisely what words, and why the victim disclosed. It can be important to determine why the child did not disclose sooner and why the child did disclose now. A well-documented, convincing disclosure, espe- cially a spontaneous one with no secondary gain, can be corroborative evidence. The fact that a victim does not disclose the abuse for years or recants previous disclosures might be part of a pattern of behavior that in fact helps to corroborate sexual victimization. The documentation of the secrecy, the sequence of disclo- sures, the recantation of statements, and the distortion of events can all be part of the corroboration process. More specific behavior patterns of seduced or cooperating victims are described in greater detail in the chapter titled "Acquaintance-Exploitation Cases" beginning on page 47. Offender Patterns Documenting offender patterns of behavior is one of the most important and overlooked steps in the corroboration process. Investigators must 116 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728743 make every reasonable effort to document offender patterns of behavior and attempt to determine the type of offender involved. Because their molestation of children is part of a long-term persistent pattern of behavior, preferential sex offenders are like human evidence machines. During their lifetime they leave behind a string of victims and collection of child pornog- raphy and erotica. In these cases a wealth of evidence is available to investigators and prosecutors. All they need to uncover it is an understanding of how to recognize these offenders and how these offenders operate and the full commit- ment of agency/department time and resources. Comparing the consistency between "what" is alleged to have happened and "who" is suspected of doing it is an important application of the offender typology. If a victim describes his or her . victimization as involving what clearly sound like the behavior patterns of a pref- erential sex offender, then'the fact that the alleged offender fits that pattern is corroborative. If he does not, there is an inconsistency that needs to be resolved. The inconsistency could be because the alleged "what" is inaccurate (e.g., dis- torted account from victim, insufficient details); the suspected "who" has been misevaluated (e.g., incomplete background, erroneous assessment); or the alleged "who" is innocent (e.g., suspect did not commit alleged crime). It is obviously better to convict a child molester based on his or her past behavior. If all else fails, however, prefer- ential child molesters usually can be convicted in the future based on their continuing molestation of children. (See the chapters titled "Definitions" [beginning on page 9] through "Use of Computers by Sex Offenders" [ending on page 99] for a complete discussion of these patterns.) Identify Adult Witnesses and Suspects Not all sexual victimization of children is "one-on-one." There are cases with multiple offenders and accomplices. One benefit of a multioffender case is that it increases the likelihood that there is a weak link in the group. Do not assume that accomplices will not cooperate with the investigation. The conspiracy model of building a case against one suspect and then using that suspect's testimony against others can be useful. Because of the need to protect potential child victims, however, the conspiracy model of investigation has limitations in child-sexual- victimization cases. Investigators and prosecutors cannot knowingly allow children to be molested as the case is built by "turning" suspects. Corroboration of a child victim's statement with adult-witness testimony, however, is an important and valuable technique. Because their molestation of children is part of a long- term persistent pattern of behavior, preferential sex offenders are like human evidence machines. Medical Evidence Whenever possible all children suspected of having been sexually victimized should be afforded a medical examination by a trained and competent physician (Jenny, 2002). The primary purpose of this examination is to assess potential injury, assess the need for treatment, and reassure the patient. A secondary purpose is to deter- mine the presence of any corroborating evidence of acute or chronic trauma. The Ability and willingness of medical doctors to corroborate child sexual victimiza- tion has improved greatly in recent years, primarily due to better training and the use of protocols, rape kits, the colposcope, toluidine blue dye, ultraviolet-light photography, and other such techniques. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS.- 117 EFTA01728744 When used with a camera the colposcope can document the trauma without additional examinations of the child victim. Positive laboratory tests for sexually transmitted d'seases can be valuable evidence especially in cases involving young children. Statements made to doctors by the child victim as part of the medical examination might be admissible in court without the child testifying. Law-enforcement investigators should be cautious of doctors who have been identified as child-abuse crusaders or always find —or never find—medical evidence of sexual victimization. Medical doctors should be objective scientists doing a professional examination. The exact cause of any anal or vaginal trauma needs to be evaluated carefully and scientifically. Also many acts of child sexual victimization do not leave any physical injuries that can be identified by a medical examination. In addition children's injuries can heal rapidly. Thus lack of medical corroboration does not mean that a child was not sexually victimized or it cannot be proven in court. Other Victims The simple understanding and recognition that a child molester might have other victims is one of the most important steps in corroborating an allegation of child sexual victimization. There is strength in numbers. If an investigation uncovers one or two victims, each will probably have to testify in court. If an investigation uncovers multiple victims, the odds are that none of them will testify because there will not be a trial. With multiple victims the only defense is to allege a flawed, leading investigation. Because of the volume of crime, limited resources, and lack of knowledge about the nature of the crime, many law-enforcement agencies are unable or unwilling to continue an investigation to find more than a couple of victims. If that is the case they must try to identify as many victims as possible. Other vic- tims are sometimes identified through publicity about the case. Consistency of statements obtained from multiple victims, independently interviewed, cart be powerful corroboration. With preferential acquaintance molesters, especially those who prefer boys, the potential for multiple victims can be overwhelming. If there area dozen dis- closing victims, a mountain of corroborative evidence, and an offender who is going to jail for many years, does the investigator have to continue to investigate until "all" the victims are found? As previously stated the U.S. Attorney General Guidelines for Victim and Witness Assistance indicates that U.S. Department of Jus- tice investigators and prosecutors are responsible for identifying and contacting all the victims of a crime (U.S. Department of Justice, 2000). The exact meaning of this statement is subject to interpretation, but common sense says a decision must be made based on a totality of the facts. Some unidentified victims may be in need of therapy and counseling. Some, however, may be doing fine and dredging up the victimization may cause more problems. Some victims may not know or realize that they are victims until informed by investigators. Can victims suffer the psychological consequences of being victimized if they do not know that they are victims? These are difficult issues with no easy answers. Investigators and prosecutors must think about these issues and make the best-informed decision. 118 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728745 Search Warrants The major law-enforcement problem with the use of search warrants in child- sexual-victimization cases is that they are not obtained soon enough. In many cases investigators have probable cause for a search warrant but don't know it. Because evidence can be moved, hidden, or destroyed so quickly, search warrants should be obtained as soon as legally possible. Waiting too long and developing, in essence, too much probable cause also might subject investigative agencies td • criticism or even lawsuits charging that this delay allowed additional victims to be molested. This is a potentially significant problem in sexual-exploitation cases. "What did you know and when did you know it" can become a big issue in defending an investigative response as correct and reasonable. Investigators often do not recognize the value and significance of child erotica, pedophile parapher- nalia, and other collateral evidence. (See the chapter titled "Collection of Child Pornography and Erotica" beginning on page 61.) As previously discussed the expertise of an experienced investigator and well- documented behavior patterns of preferential sex offenders sometimes can be used to add to the probable cause, expand the scope of the search, or address the legal staleness problem of old information. Such "expert" search warrants should be used only when necesnary and there is probable cause to believe the alleged offender fits the preferential pattern of behavior. Physical Evidence Physical evidence can be defined as objects that corroborate anything a child victim did, said, saw, heard, tasted, smelled, drew, or had done to him or her. It can be used to prove offender identity and type and location of activity. It could be items such as sheets, articles of clothing, sexual aids, lubricants, fingerprints, and documents. It also could be an object or sign on the wall described by a victim. If the victim says the offender ejaculated on a doorknob, ejaculate on the doorknob becomes physical evidence if found. If the victim says the offender kept condoms in the nightstand by his bed, they become physical evidence if found. An adult-pornography magazine with a page missing as described by the victim is physical evidence. Satanic occult paraphernalia is evidence if it corrobo- rates criminal activity described by the victim. Positive identification of a subject through deoxyribonucleic add (DNA) analysis of trace amounts of biological evi- dence left on a child or at a crime scene might result in a child victim not having to testify because the perpetrator pleads guilty. Child Pornography and Child Erotica Child pornography, especially that produced by the offender, is one of the most valuable pieces of corroborative evidence of child sexual victimization that any investigator can have. Many collectors of child pornography do not molest chil- i dren, and many child molesters do not possess or collect child pornography. Investigators should, however, always be alert for it. Child erotica can be defined as any material, relating to children, that serves a sexual purpose for a given indi- vidual. Some of the more common types of child erotica include drawings, fantasy writings, diaries, souvenirs, letters, books about children, psychological books on pedophilia, and ordinary photographs of children. It must be evaluated in the context in which it is found using good judgment and common sense. Child erotica is not as significant as child pornography, but it can be of value. (See CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 119 EFTA01728746 the chapter titled "Collection of Child Pornography and Erotica," beginning on page 61, for a detailed discussion of child pornography and erotica.) Computers Investigators must be alert to the rapidly increasing possibility that a child molester with the intelligence, economic means, or employment access might use a computer in a variety of ways as part of his sexual victimization of children. As computers have become less expensive, more sophisticated, and easier to operate, the potential for this abuse is growing rapidly. (See the chapter titled "Use of Computers by Sex Offenders," beginning on page 89, for a more detailed discussion on the use of computers.) Consensual Monitoring Consensual monitoring is a valuable but often underused investigative technique. It includes the use of body recorders and pretext telephone calls. Because of the legal issues involved and variations in state laws, use of .this technique should always be discussed with prosecutors and law-enforcement legal advisers. It is important to remember that children are not small adults and must never be endangered by investigators. The use of this technique with child victims pre- sents ethical issues as well as legal considerations. Its use with victims who have emotional problems or are in therapy, for example, should be carefully evaluated. Pretext telephone calls are. more suitable than body recorders with child victims but are obViously not appropriate in all cases. They might not be suitable for use with extremely young victims or victims who have developed a strong bond with the offender. Because victims who are seduced or compliant may feel pressured by parents or investigators to furnish a more socially acceptable, stereotypical version of their victimization, they may falsely pretend no such bond with the offender exists and/or feign a desire to have the offender arrested and prosecuted. If the child victim states one thing but feels differently, "participating" in the investigation in this way could lead to the child "tipping off" the alleged offender or more serious consequences for the child ranging from further victimization to suicide. The use of this technique usually should be discussed with the parents of a victim who is a minor. The parent, however, might not be trusted to be discreet about the use of this technique or even be a suspect in the investigation. Although there is the potential for further emotional trauma, many victims afterward describe an almost therapeutic sense of empowerment or return of control through their participation in pretext telephone calls. Investigators using the pretext telephone call should ensure that they have a telephone number that cannot be traced to law enforcement and method to verify the date and time of the calls. In addition to victims, investigators can also make such calls themselves by impersonating a wide variety of potentially involved or concerned individuals. Sometimes victims or their relatives or friends do the monitoring and recording on their own. Investigators need to check appropriate laws concerning the legality of such taping and admissibility of the material obtained. Consensual monitoring with body recorders is probably best reserved for use with undercover investigators and adult informants. Under no circumstance should an investigative agency produce or wind up with a videotape or audiotape 120 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728747 of the actual or simulated molestation of a child as part of an investigative technique; however, the child victim might be used to introduce the undercover investigator to the subject. Inappropriate responses obtained through consensual monitoring can be almost as damaging as outright admissions. When told by a victim over the telephone that law enforcement or a therapist wants to discuss the sexual relationship, "Let's talk about it later tonight" is an incriminating response by a suspect. Subject Confessions Getting a subject to confess obviously can be an effective way to corroborate child sexual victimization and avoid child-victim testimony in court. Unfortunately many investigators put minimal effort into subject interviews. Simply asking an alleged perpetrator if he molested a child does not constitute a proper interview. Any criminal investigator needs effective interviewing skills. In view of the stakes involved, child-sexual-victimization investigators must do everything reasonably possible to improve their skills in this area. Entire books and chapters have been written about interview techniques and strategies. In this limited space only a brief review of some basic interviewing issues will be offered. Investigators need to collect background information and develop an interview strategy before conducting a potentially important discussion with the alleged offender. Marty sexual offenders against children really want to discuss either their behavior or at least their rationalization for it If treated with profes- sionalism, empathy, and understanding, many of these offenders will make significant admissions. If the offender is allowed to rationalize or project some of the blame for his behavior onto someone or something else, he is more likely to confess. Most sex offenders will admit only what they can rationalize and that which has been discovered. Revealing some irrefutable "facts," therefore, can be an effective strategy. In a computer case this might involve showing him some of the chat logs of his online conversations. If investigators do not confront the sub- ject with all available evidence, the suspect might be more likely to minimize his acts rather than .totally deny them. Many child molesters admit their acts but deny the intent. A tougher approach can always be tried if the soft approach does not work. Investigators should consider noncustodial (i.e., no arrest), nonconfrontational interviews of the subject at home or work. Interviews during the execution of a search warrant also should be considered. Investigators should not overlook admissions made by the offender to wives, girlfriends, neighbors, friends, and even the media. The polygraph and other lie-detection devices can be valuable tools when used as part of the interview strategy by skilled interviewers. Their greatest value .is in the subject's belief that they will determine the truth of any statement he makes. Once used their value is limited by their lack of legal admissibility. The polygraph, or any lie-detection device, should never be the sole criterion for dis- continuing the investigation of child-sexual-victimization allegations. Surveillance Surveillance can be a time-consuming and expensive investigative technique. In some cases it also can be an effective technique. Time and expense can be reduced if the surveillance is not open-ended but is based on inside information CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 121 EFTA01728748 about the subject's activity. One obvious problem, however, is what to do when the surveillance team comes to believe that a child is being victimized. How much reasonable suspicion or probable cause does an investigator on physical or elec- tronic surveillance need to take action? If a suspected child molester simply goes into a residence with a child, does law enforcement have the right to intervene? What if the offender is simply paying the newspaper boy or watching television with a neighborhood child? These are important legal and ethical issues to con- sider when using this surveillance technique. Sometimes the surveillance may discover that the offender is making contact with children in violation of his parole. In spite of potential problems, surveillance is a valuable technique espe- cially in the investigation of multiple-victim-exploitation cases. 17,'"C-a -ff)arafhij The general investigative techniques just discussed are applicable in varying degrees to the acquaintance-exploitation cases involving multiple victims. The "bit-picture" approach is the key to the successful investigation and prosecution ' of these cases.' Multiple victims corroborated by child pornography, erotica, and other physical evidence make a powerful case likely to result in a guilty plea, no trial, and therefore no child-victim testimony. The techniques noted below apply primarily to the investigation of acquaintance-exploitation cases involving mul- tiple victims. Understanding the Seduction Process Most child victims in multiple-victim-exploitation cases were seduced or groomed over time. The seduction process was discussed in depth in the chapter titled "Acquaintance-Exploitation Cases" beginning on page 47. True understanding of this process must be incorporated into the investigation of these cases. After understanding the seduction process, the investigator must be able to communi- cate this understanding to the victim. This is the difficult part. An investigator once contacted me and described what sounded like a classic case involving an acquaintance-seduction preferential offender. The investigator stated, however, that his first disclosing victim, a 12-year-old boy, described being gagged and tied up by the offender. While this is certainly possible, it is not typical of such offenders. When asked when and how the victim furnished this information, the investigator admitted that it was after he had asked the boy why he did not scream or fight when the offender abused him sexually. By asking such questions in this way, the investigator is communicating to the • boy that the investigator has no insight into the nature of this crime nor an under- standing or acceptance of the subtle seduction of the boy. The investigator is back in the world of dirty old men in wrinkled raincoats jumping out from behind trees. Obviously the investigator did not understand that the molester was prob- ably the boy's best friend who seduced him with attention and affection. The victim realized that the investigator would not understand what happened, and so the boy "adjusted" the story and tried to explain with an excuse that the inves- tigator would accept and understand. The boy was suffering from the "say no, yell, and tell" guilt. I have given many presentations describing the dynamics of multiple-victim cases and seduction techniques of preferential child molesters (pedophiles). After 122 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728749 many of these presentations, adult male members of the audience have approached me in private and admitted that they were victimized as boys. Most stated they had never before told anyone of their victimization, but were now able to tell because they realized I understood the problem and that they were not the only ones so victimized. The key then to getting child victims who were compliant to disclose their victimization is to communicate subtly to them your understand- ing of the seduction process without engaging in repetitive, leading, or suggestive interviewing that might damage the reliability and credibility of the information obtained. After the first few victims disclose the others usually come forward more readily. Some individuals, however, may come forward and falsely claim to be victims in order to get attention, forgiveness, or part of a financial settlement in a civil law suit. All allegations must be thoroughly and objectively evaluated and investigated. Investigators and prosecutors must understand and learn to deal with the incomplete and contradictory statements of seduced victims of acquaintance molesters. The dynamics of their victimization must be considered. They are embarrassed and ashamed of their behavior and rightfully believe that society will not understand their victimization. Many younger child victims are most concerned about the response of their parents and often describe their victimiza- tion in ways they believe will please their parents. Adolescent victims are typically more concerned about the response of their peers. Investigators who have a stereo- typed concept of child-sexual-abuse victims or who are accustomed to interviewing younger children molested within their family will have a difficult time interviewing adolescents molested in a sex ring. Many of these victims will be troubled or even delinquent children from dysfunctional homes. Such victims should not be blindly believed, but should not be dismissed because the accused is a pillar of the community and they are delinquent or troubled. Such allegations should be objectively investigated. When attempting to identify potential victims in a multiple-victim-exploita- tion case, I recommend trying to start with victims who are about to or have just left the offender's "pipeline." The victim most likely to disclose would be one who has just left the ring and has a sibling or close friend about to enter the ring. The desire to protect younger victims from what they have endured is the strongest motivation for overcoming their shame and embarrassment. The next best choice would be a victim who has just entered the "pipeline." Before beginning the interview the investigator must understand that the victim may have many positive feelings for the offender and even resent law- enforcement intervention. Because of the bond with the offender, victims may even warn the offender. Even the occasional victim who comes forward and dis- closes may feel guilty and then warn the offender. They may even return to law enforcement with a hidden tape recorder to try to catch the investigator making inappropriate comments or utilizing improper interview techniques. Reluctance to disclose may be more due to affection for the offender than to fear of the offender. Time must be spent attempting to develop a working relationship with the victim. The investigator must be able to discuss a wide variety of sexual activity, understand the victim's terminology, and not be judgmental. Not being judgmental, as with developing rapport, may be much more difficult with a delin- CHILD MOLESTERS: A BEHAVIORAL ANALYSIS -123 EFTA01728750 quent adolescent who actively participated in his victimization. Investigators often nonverbally communicate their judgmental attitude unknowingly through gestures, facial expressions, and body language. In interviewing victims of acquaintance sexual exploitation, law enforcement should consider—in their own minds—pretending that the victim is a subject or suspect, and expect the victim to deny or minimize his or her acts. Some victims will continue to deny their victimization no matter what the interviewer says or does. Some children even deny victimization that the offender has admitted or other evidence discloses. Some will make admissions but minimize the quality and quantity of the acts. They may minimize their compliance and maximize the offender's involvement by claiming he drugged them, threatened them, had a weapon, or had even abducted them. Of course some of these allegations may be accurate and should be investigated. They are, however, not typical of acquain- tance-exploitation cases. Violence is most likely used to prevent disclosure. Sadistic preferential offenders may also use violence during sex, but this is rela- tively rare in cases involving seduction. As previously discussed these potential inaccuracies in the details of the allegations of seduced victims may explain some of the inconsistencies between the alleged "what" and suspected "who." The investigator must communicate to the victim that he or she is not at fault even though the victim did not say no, did not fight, did not tell, initiated the sex, or even enjoyed it. When the victim comes to believe that the investigator under- stands what he experienced, he or she is more likely to talk. Victims often reveal the details little by little, testing the investigator's response. The investigator must recognize and sometimes allow the victim to use face-saving scenarios when dis- closing victimization. For example such victims might claim they were confused, tricked, asleep, drugged, drunk, or tied up when they were not. Adolescents, who pose special challenges for the interviewer, use these face-saving devices most often. The investigator must accept the fact that even if a victim discloses the information is likely to be incomplete, minimizing his involvement and acts. Some of these victims simply do not believe they were victims. In the absence of some compelling special circumstance, the interview of a child possibly seduced by an acquaintance molester should never be conducted in the presence of parents. The presence of the parent increases the likelihood that the child will just deny or give the socially or parentally acceptable version of the victimization. This is especially true of younger victims. Investigators should also consider unannounced interviews of victims of acquaintance molesters. If all else fails the investigator can try the no-nonsense approach. No matter what the investigator does, most adolescent boy victims will deny they were victims. It is important, therefore, that as many potential victims as legally and ethically possible are interviewed. It is also possible that some troubled teenagers may exaggerate their victimization or even falsely accuse individuals. Allegations must be objectively investigated considering all possibilities. After disclosing, some victims will later recant or change their stories. The offender may also continue to manipulate the victims after investigation and disclosure. The offender may appeal to the victim's sympathy. He may make a feeble attempt at suicide to make the victims feel guilty or disloyal. Some offenders may threaten the victims with physical harm or disclosure of the black- mail material. Some offenders may bribe the victim and his family. Even after they disclose and testify in court, some victims then recant and claim they per- 124 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728751 jured themselves. Although in some cases the recantation may be valid, it is most likely the result of blackmail, feelings of guilt about the offender being in prison, or shame over their behavior. Some victims in acquaintance-child-exploitation cases disclose incomplete and minimized information about the sexual activity. This creates significant prob- lems for the investigation and prosecution of such cases. For instance when the investigator finally gets a victim to disclose the exploitation and abuse, the victim furnishes a version of his victimization that he or she swears is true. Subsequent investigation then uncovers additional victims, child pornography, or computer chat logs—directly conflicting with the first victim's story. A common example of this is that the victim admits the offender sucked his penis, but denies that he sucked the offender's penis. The execution of a search warrant then leads to the seizure of photographs of the victim sucking the offender's penis. Additional vic- tims may also confirm this, but then lie when they vehemently deny that they did the same thing. The allegations of multiple victims often conflict with each other. Each victim tends to minimize their behavior and maximize the behavior of other victims or the offender. Some victims continue to deny the activity even when confronted with the pictures. Today investigators must be especially careful in computer cases where easily recovered chat logs, records of communication, and visual images may directly contradict the socially acceptable version of events that the victim is now giving. Understanding the Preferential Molester Preferential sex offenders may be "pillars of the community" and are often described as "nice guys." They almost always have a means of access to children (e.g., marriage, neighborhood, occupation). Determining their means of access helps identify potential victims. Investigation should always verify the credentials of those who attempt to justify their acts as part of some "professional" activity. It must be understood, however, that just because an offender is a doctor, clergy member, or therapist, for example, does not mean he could not also be a child molester. As previously stated, because the molestation of children is part of a long- term persistent pattern of behavior, preferential child molesters are like human evidence machines. During their lifetime they leave behind a string of victims and collection of child pornography and erotica. The preferential child molester, therefore, can be thoroughly investigated and corroborative evidence easily found if investigators understand how to recognize him and how he operates—and if their departments give them the time and resources. Men sexually attracted to young adolescent boys are the most persistent and prolific child molesters known to the criminal-justice system. Depending on how one defines molestation, they can easily have dozens if not hundreds of victims in a lifetime. They usually begin their activity when they are teenagers themselves and continue throughout their lives as long as they are physically able. Many pedophiles spend their entire lives attempting to convince themselves and others that they are not evil sexual perverts, but good guys who love and nurture children. That is a major reason why they do such things as join organiza- tions where they can help troubled children and volunteer to search for missing children. Because so many of them have successfully hidden their activities for so CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 125 EFTA01728752 long, when identified and prosecuted they try to convince themselves that they will somehow continue to escape responsibility. This is why they often vehemently proclaim their innocence right up to the time of their trial. If, however, the inves- tigator and prosecutor have properly developed the case, preferential offenders almost always change their plea to guilty (See the chapter titled "After Identifica- tion" beginning on page 129.) Investigators and prosecutors should also be aware of offenders too eager to plead guilty. They may be hiding much more extensive or serious behavior that they hope will not be discovered by additional investigation. Proactive Approach Because this publication is available to the public, specific details of proactive investigative techniques will not be set forth. In general, however, proactive investigation involves the use of surveillance, mail covers, undercover corre- spondence, "sting" operations, reverse "sting" operations, and online computer operations. For example, when an offender who has been communicating with other offenders is arrested, investigators can assume his identity and continue the correspondence. It is not necessary for each law-enforcement agency to "reinvent the wheel." Federal law-enforcement agencies such as the U.S. Postal Inspection Service, U.S. Customs Service, the FBI, and some state and local departments have been using these techniques for years. Because child prostitution and the production and distribution of child pornography frequently involve violations of federal law, the U.S. Postal Inspection Service, U.S. Customs Service, and FBI all have intelligence information about such activity. It is recommended that any law- enforcement agency about to begin the use of these proactive techniques, especially those involving online Internet activity, contact nearby federal, state, and local law-enforcement agencies to determine what is already being done and what protocols and policies have been developed. Many areas of the country have organized task forces on sexual abuse, exploitation, and computer exploitation of children. Law-enforcement agencies must learn to work together in these proac- tive techniques, or else they may wind up "investigating" each other. Some child molesters also are actively trying to identify and learn about these proactive techniques. Investigators must give careful thought and consideration before utilizing a child in any way in any proactive investigation. Child safety and protection come first. As previously stated investigators should never put child pornogra- phy on the Internet or in the mail because of the harm of such uncontrolled circulation. The end does not justify the means. Investigators must also ensure that their undercover activity does not cross the line into entrapment or outra- geous government conduct. This is even more important if the investigator forwards his or her investigative "findings" to another law-enforcement agency for appropriate action. The proactive approach also includes the analysis of records and documents obtained or seized from offenders during an investigation. In addition to possibly being used to convict these offenders, such material can contain valuable 126 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728753 intelligence information about other offenders and victims. This material must be evaluated carefully in order not to over- or underestimate its significance. Establish Communication With Parents The importance and difficulty of this technique in extrafamilial cases cannot be overemphasized. Because the parents are not the alleged perpetrators their inves- tigative significance is different, not less than in intrafamilial cases. Parents should be advised of the general nature of the investigation. Investigators should also seek their cooperation and maintain ongoing communication with them. Not all parents react the same way to the alleged sexual victimization of their children. Some are supporthie and cooperative. Others overreact, and some even deny the victimization. Sometimes there is animosity and mistrust among parents with differing reactions. Some parents even rally to the support of the accused perpe- trator. Others want him immediately put in jail. Parents must be told that in the absence of some extraordinary circumstance investigators need to interview their children outside of their presence. In some cases departmental policy or the law may give parents the right to be present during the interview of their minor children. If that is the situation, every effort should be made to get parental and/or departmental permission to waive that right. If parents are present during the interviews, any information so obtained must be carefully assessed and evaluated with the understanding of the parents' potentially significant influence on their children's statements. Compromises involving one-way mirrors, video cameras, and out-of-eye-contact sitting posi- tions may be possible. Eventually parents will have to be told something about what their children disclosed. It is best if this happens after the information is obtained in a way that increases the likelihood of its accuracy and reliability. Parents should not be given the details of the disclosures of any other victims. Parents should be told of the importance of keeping the details of their child's disclosures confidential especially from the media and other parents. Parents should be interviewed regarding any behavioral indicators of possible abuse they observed and the history of their child's contact with the alleged offender. They must be reminded, however, that their child's credibility will be jeopardized when and if the information was obtained through repetitive or lead- ing questioning and/or turns out to be exaggerated, unsubstantiated, or false. To minimize these problems, within the limits of the law and without jeopardizing investigative, techniques, parents must be told on a regular basis how the case is progressing. 'Parents can also be assigned constructive things to do (e.g., lobbying for new legislation, working on awareness and prevention programs) to channel their energy, concern, and guilt. If the parents lose faith in law enforcement or the prosecutor and begin to interrogate their children and conduct their own investigation, the case may be lost forever. Parents from one case communicate the results of their "investiga- tion" with each other, and some have even contacted the parents in other cases. Such parental activity, however understandable, is an obvious source of potential contamination. In addition it must be remembered that children sexually exploited outside the home can also be sexually victimized inside the home. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 127 EFTA01728754 It is the job of the professional investigator to listen to all victims, assess and evaluate the relevant information, and conduct an appropriate investigation. Corroborative evidence exists more often than many investigators realize. Inves- tigators should remember that not all childhood trauma is abuse, and not all child abuse is a crime. There can be great frustration when, after a thorough investiga- tion, an investigator is convinced that something traumatic happened to the child victim but does not know with any degree of certainty exactly what happened, when it happened, or who did it. That is sometimes the price we pay for a crimi- nal-justice system in which people are considered innocent until proven guilty beyond a reasonable doubt. 128 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728755 After Identification When a child-molestation case is uncovered and an offender identified, there are certain fairly predictable reactions by the child molester. This is especially true of acquaintance molesters who are pedophiles or other types of preferential sex offenders. Knowledge and anticipation of these reactions will-help the investiga- tion and prosecution of such difficult cases. Denial Usually the first reaction of a child molester to discovery is complete denial. The offender may act shocked, surprised, or even indignant about an allegation of sexual activity with children. He may claim to know nothing about it or that he does not remember. He might admit to an act, but deny the intent was sexual gratification saying, "Is it a crime to hug a child?" He may imply that his actions were misunderstood, and a mistake has been made. Relatives, friends, neighbors, and coworkers may aid his denial. These associates may be uncooperative and even hinder investigation of the offender. In any case the investigator should anticipate and not be thrown off by strong initial denial by a suspect. Minimization If the evidence against him rules out total denial, the offender may attempt to minimize what he has done both in quantity and quality. He might claim that it happened on one or twoisolated occasions or he only touched or caressed the victim. He may be knowledgeable about the law and admit to acts that he knows are lesser offenses or misdemeanors. Some molesters minimize their activity by emphasizing the older age of their victims. Such victims might be referred to as "teens" rather than children. It is important to recognize that even seemingly cooperative victims may also minimize the quantity and quality of acts. If a cer- tain sexual act was performed 30 times, the victim might claim it happened only 5 times, and the offender might daim it happened only once or twice. Justification Many child molesters, especially preferential molesters, spend their lives attempt- ing to convince themselves that they are not immoral, sexual deviants, or criminals. They prefer to believe that they are high-minded, loving individuals whose behavior is misunderstood or politically incorrect at this time in history. They refer to themselves as "boy lovers" not child molesters. Plugging into this justification system is the key to interviewing such offenders. Rationalization usually involves trying to convince himself or others that the sexual activity with children was not harmful. Validation usually involves trying to convince himself or others that the sexual activity with children was beneficial. Child molesters frequently attempt to justify their behavior to law enforcement. They might claim that they care for children more than the children's parents do and what he does is beneficial to the child. They love to talk about starving, abused children in third-world countries. If he is the father or stepfather of the victim, he might claim the child is better off learning about sex from him. In other cases he CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 129 EFTA01728756 might claim to be under tremendous stress or have a drinking problem. He might claim he did not know how old a certain victim was. His efforts to justify his behavior often center on blaming the victim. This is probably the single most common rationalization of all child molesters. The offender may claim that the victim seduced him, wanted and initiated the sexual activity, enjoyed and needed the sexual activity, or is promiscuous or even a prostitute. In some cases it might even be true. They often go into great detail explaining the difference between "consenting" and forced sex with children. But such justification should have no meaning. A crime has still been committed. As previously stated the major legal difference between sex crimes committed against children and adults is that with child victims consent is not supposed to matter. Fabrication Some of the more clever child molesters come up with ingenious stories to explain their behavior. Many incest offenders claim to be providing sex edu- cation for their children. One father claimed he was teaching his daughter the difference between a "good touch" and "bad touch." These stories work even better for an acquaintance molester who is a profes- sional such as a clergy member, teacher, doctor, or therapist. One offender, a doctor, claimed he was conducting research on male-youth prostitution. A professor claimed he was conducting research on pedophilia and collecting and distributing child pornography for scientific research. A teacher said that his stu- dents had such a desperate need for attention and affection that they practically threw themselves at him and misunderstood his affection and response as sexual advances. A minister claimed he was doing research on adolescent growth. In another case a nursery-school operator, who had taken and collected thousands of photographs of young, nude or seminude children in his care, claimed they were not for sexual purposes; he simply admired the anatomy of children. Another offender claimed his sadomasochistic photographs of children were part of a child-discipline program. One offender claimed the children made a sexually explicit videotape without his knowledge and that he had kept it only to show their parents. Another offender claimed he was merely keeping the child warm in his bed on a cold night. A lawyer claimed his child-pornography collection was part of his legal research. Several offenders have recently claimed they are artists victimized by censorship and their collections are works of art protected by the First Amendment. Another offender claimed unwanted child pornography was sent to his computer, and he kept it because he is a compulsive pack rat. One offender claimed he had child pornography not because of a sexual interest, but because he liked to'collect "forbidden material." Investigators and prosecutors must be prepared to confront such stories and attempt to disprove them. Finding child pornography, child erotica, and. other collateral evidence in the possession of the offender and determining the context in which it was produced, obtained, maintained, and used are the most effective ways to do this. Attack It is important not to overlook this reaction of the identified child molester. It can be used many times during the investigation or prosecution. This reaction con- sists of attacking or going on the offensive. The pedophile may harass, threaten, or bribe victims and witnesses; attack the reputation and personal life of the 130 - CHILD MOLESTERS: A BEHAVIORAL ANALYSES EFTA01728757 investigating officer; attack the motives of the prosecutor; claim the case is selec- tive prosecution or a witch hunt; raise issues such as gay rights if the child victim is the same sex as the offender; and enlist the active support of parents, groups, and organizations. The investigator also must consider the possibility of physical violence. It would be a terrible mistake for any investigator or prosecutor to think that all child molesters are passive people who are easily intimidated. I am aware of several cases in which the arrested child molester was a paranoid survivalist with a mas- sive arsenal of weapons and explosives. In addition there are cases in which child molesters murdered their victims, including their own children, to keep them from disclosing the sexual victimization. Two different child molesters who had each killed several of their child victims stated that the only way society could have prevented the murders would have been to legalize sex between adults and children. They claimed that they killed their victims only to avoid identification. After Conviction After being convicted and sentenced to incarceration, some pedophiles may exhibit another reaction. This involves asking to speak to law-enforcement inves- tigators and claiming to have important information about more serious offenses against children. They might claim to know about organized child sex rings, child pornography, child prostitution, abduction of children, snuff films, satanic cults, or child murders. Some investigators are vulnerable to accept these claims because it is what they want or need to believe. Although this reaction is not as common as the others discussed here, there are numerous cases in which this has happened. In many of these cases the information furnished has turned out to be exaggerated, distorted, or patently false. Investigators have no choice but to investigate and check out such allegations because they might be partially or totally true. Investigators, however, must be skeptical and cautious in their response. Such stories should be carefully evaluated and assessed, and investiga- tors should consider an early use of the polygraph by an examiner experienced in interviewing child molesters. Suicide One other reaction should also be anticipated in certain cases. An offender, espe- cially from a middle-class background with no or one prior arrest, should be considered a high suicide risk at any time after arrest or conviction. The law- enforcement investigator should be prepared to be blamed for the offender's death. Because "macho" investigators are supposed to laugh and joke about losing a "statistic" when a child molester commits suicide, some investigators are ashamed or embarrassed because they had positive feelings for the offender and did not necessarily want him to die. Investigators need to remind themselves that they were doing their jobs by enforcing the law and suicide was the offender's deci- sion. The crucial issue for investigators is to try to ensure that the offender does not commit suicide while in their custody or kill or injure them or anyone else. A wide variety of criminals may react in similar ways when their activity is discovered or investigated. The reactions described above, however, have been seen in child molesters time and time again, particularly in preferential sex offenders. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 131 EFTA01728758 Many prosecutors attempt to increase or deny bond to acquaintance child molesters based on dangerousness to the community. I have been asked on numerous occasions to testify at such hearings that I know or believe that a par- ticular offender is a danger. Predicting future behavior is difficult. It often comes down to the simple fact that the best predictor of future behavior is past behavior. In these situations prosecutors rarely need an "expert" to speculate about the future. What they need is a dear and organized presentation of the facts. As pre- viously stated an offender's pornography and erotica collection is the single best indicator of what he wants to do. It is not necessarily the best indicator of what he did or will do. If such a collection has been recovered, it must be reviewed, analyzed, and synopsized. The prosecutor then needs to communicate to the judge or magistrate, community, and media what this and other evidence, not some expert's speculation, indicates the offender fantasizes about and wants to do. Pros- ecutors should resist the temptation to embellish, exaggerate, or speculate. For example if the collection included 30 pairs of children's underpants, that does not necessarily mean the offender molested or murdered these 30 children. He may have molested them and taken their underpants, fantasized about molesting them and taken their underpants, stolen the underpants without know- ing whose they were, or bought them. If you know or have evidence of how he obtained them, inform the judge of the facts. If you do not know, simply inform the judge of the facts such as that he had them, where he had them, and how many he had. The same would be true if the offender had narrative stories about having sex with children. If the offender has also demonstrated that he is clever, manipulative, and organized with specific sexual preferences, the judge needs to know the facts that support that. In essence inform the judge of the facts of the case. The judge then must decide if he or she is willing to release on bond a clever, manipulative individual who regularly fantasizes about having sex with and keeping the underpants of children in the community. The evaluation is based on evidence, not speculation. Some judges or magistrates, however, will not or cannot understand these facts. They have their minds made up and do not want to be confused by the facts. Many of these same dynamics also apply to sentencing hearings. In many ways acquaintance-sexual-exploitation cases, especially those involving preferential sex offenders, are "slam dunks" or "like shooting fish in a barrel." Defense attorneys may claim entrapment or outrageous government conduct and file motions to suppress evidence. Defendants will deny the charges and make bold, public statements about their innocence. If the case has been put together properly, however, when the dust settles, most of these offenders plead guilty. Confronted with overwhelming evidence, many child molesters prefer to plead guilty to charges with vague names (e.g., contributing to the delinquency of minors, lewd and lascivious conduct, indecent liberties) so that the public will not know what they really did. The last thing they want is all the details of their behavior to come out in open court. They work the best plea bargain they can, say they are guilty when the judge asks, and then tell everyone else why they are really not guilty. 132 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728759 This sometimes involves a plea of nolo contendere to avoid civil liability. The offender may make public statements that he is pleading guilty because he does not want to put the children through the trauma of having to testify or has no more money to defend himself. In some cases offenders claimed they pleaded guilty because they knew a jury would convict them, but they "could not remember committing the crime." This problem is compounded by the fact that it is possible, under the provisions of a U.S. Supreme Court decision (North Caro- lina a Alford, 400 U.S. 25, 1970), for an offender to plead guilty to a charge while at the same time not acknowledge that he committed the crime. Although it is understandable why a prosecutor might accept such a plea in some cases, its use prevents the offender from having to accept public responsibility for his behav- ior. He is able to plead in essence "guilty, but not guilty" and further confuse the child victim as to who is guilty and innocent. Another variation of this is that the child molester pleads not guilty by reason of insanity. If state insanity criteria allow it, he will claim he knew his acts were wrong, but he lacked the ability to conform his behavior to the law. The judge and jury will then be given the difficult task of differentiating between an irresist- ible impulse and an impulse not resisted. When other tactics fail the child molester may claim some type of mental illness. It is interesting to note that few child molesters admit mental illness until relatives, friends, or neighbors identify them; law enforcement identifies and arrests them; or other tactics fail and the courts convict them. If, as previously discussed, all pedophiles are not necessarily child molesters, then pedophilia alone cannot be the cause of their child molest- ing. Such mental-health defenses rarely work during a trial, but can be more effective at sentencing. The real battle then takes place at sentencing where sex offenders effectively play the "sick and sympathy" game. In this game the offender expresses deep regret and attempts to show he is a pillar of the community, a devoted family man, a military veteran, a churchgoer/leader, nonviolent, without prior arrests, and a victim of abuse with many personal problems. They get the courts to feel sorry for them by claiming they are hard-working "nice guys" or decorated career military men who have been humiliated and lost everything. In view of the fact that many people still believe in the myth that child molesters are evil weirdos or social misfits, this tactic can unfortunately be effective especially at sentencing. Many traits introduced by the offender as evidence of his good character (e.g., dedication to children, volunteer work, conducting child-sex-abuse prevention programs, offers to assist law enforcement) in fact contribute to his ability to access and seduce children and/or rationalize his behavior. In addition some seduced victims do not want the perpetrator prosecuted or sent to prison. At sentencing they may even write a letter to the judge indicating their "consent" in the sexual activity and expressing their love for the defendant. Should such a letter get the same consideration as a letter from a victim request- ing harsh punishment? Although convicted of a sex offense, they will sometimes produce forensic mental-health evaluations that will diagnose no sexual disorders. The diagnosis of numerous mental disorders such as depression, bipolar disorder, anxiety disor- der, obsessive-compulsive disorder (OCD), personality disorders, and "Internet addiction syndrome" is often introduced as mitigating circumstances for consid- eration in the sentencing phase of the case. If there is a diagnosis of one or more CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 133 EFTA01728760 sexual disorders, it is rarely disorders such as pedophilia or sadism and more often disorders such as addiction to pornography, hebephilia or ephebophilia, and other paraphilias. If the forensic evaluation of a defendant in a child-sexual-exploitation case does not include sexual disorders, especially pedophilia, among the diagnoses, the prosecutor should always determine exactly why they were not included. It is often based on the fact that the offender preferred pubescent children. One forensic evaluation I reviewed for a prosecutor stated that the defendant was not a pedophile because he had a sexual preference for "underage adults." Some- times the lack of a diagnosis of pedophilia is corroborative and may help the prosecution if admitted. If the allegations indicate the situational, nonpreferential selection of a child victim, the lack of pedophilia is consistent with the facts of the case. Interestingly in the guilt or innocence phase .of most cases few of these diagnoses would be admissible. All the persistent patterns of behavior used in the investigation and prosecu- tion may now be used by the defense prior to sentencing. The defense attorney now wants to talk about the unexplainable, bizarre, compulsive, reckless, bewil- dering, out-of-character behavior of the defendant. This is the proof that he is not bad, but has a "disorder." The defendant is not in the "heartland of offenders" (i.e., the typical offender that the law intended to target) and needs a lighter sen- tence (i.e., downward departure) and treatment Under the federal sentencing guidelines and United States v. McBroom, 124 F.3d 533 (3rd Cir. 1997), a certain amount of this nonsense can be considered by the courts in determining the appropriate sentence for a "nonviolent" offender. The courts would never give a bank robber a lighter sentence because he claimed he was driven by excessive greed.. If anything, he should get a longer sentence. Some argue that although these compulsive disorders might indicate that a defendant is more dangerous, he is somehow less culpable. Interestingly the DSM-W-TR states that activities such as "sexual behavior (e.g., paraphilias) when engaged in excessively' are not to be diagnostically considered compulsions "because the person usually derives pleasure from the activity and may wish to resist it only because of its deleterious consequences" (American Psychiatric Association, 2000). If paraphilic, compulsive, preferential sex offenders are not fully accountable for their behavior nor considered to be in the "heartland of offenders," there is not much sense in prosecuting most sexual-exploitation cases. For now that is the vast majority of the computer "traders" and "travelers" and other acquaintance molesters. See United States v. Motto, 70 F.Supp.2d 570 (ED. Pa. 1999), affirmed in United States v. Motto, 225 F.3d 651 (3r4 Cir. 2000). See also United States v. Stevens, 197 F.3d 1263 (941 Cir. 1998). When confronted with claims of mental disorders either at a trial or sentenc- ing, my advice to prosecutors is to assess .the items noted below. ■ was there a proper forensic evaluation? ■ is the diagnosis a recognized, valid condition? ■ is the diagnosis a "mental disease or defect" or mental disorder? ■ does the diagnosis have criminal-justice significance? ■ does the diagnosis address the criminal behavior charged? 134 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728761 There are potential conflicts of interest if a therapist who is also providing treatment to the defendant conducts a forensic evaluation. Poor forensic evalua- tions involve viewing the defendant as a patient who is called•by his first name and uncritically accepting the patient's version of events with minimal exposure to nonmedical evidence. Proper forensic evaluations involve viewing the defen- dant as a subject called by Mr. and his last name and comparing the subject's version of events with medical and nonmedical evidence (e.g., law-enforcement reports, crime-scene photographs, physical evidence). Proper forensic evaluations are also recorded verbatim and should be supplemented with techniques to iden- tify deception such as the polygraph and tests to measure sexual arousal to certain themes. Prosecutors should determine what type of forensic evaluation has taken place. The DSM-IV-TR contains the generally accepted mental diseases and disor- ders and their diagnostic criteria. Any alleged diagnosis should be compared against the DSM-IV-TR. Many highly publicized or convenient mental conditions (e.g., "Internet addiction syndrome," hebephilia) simply are not listed in the DSM-IV- TR. It is therefore harder to know their diagnostic criteria and professional acceptance. There is also a difference between serious mental diseases and the numerous other mental disorders also in the DSM-IV-TR. Mental diseases such as psychoses involve hallucinations, delusions, and the inability to distinguish fan- tasy from reality and are more likely to be considered by the courts. The vast array of mental disorders in the DSM-IV-TR usually has no criminal-justice significance. People may be depressed and suffering from anxiety disorder and still be completely accountable for their criminal behavior. People may in fact be bipolar, tortured by obsessive-compulsive disorder, and suffering from "Internet addiction syndrome," but none of that explains why they are downloading child pornography and trying to have sex with 13 year olds. "Internet addiction syn- drome" might be of some significance if someone were charged with spending 16 'hours a day on the Internet. Prosecutors also have the difficult choice of deciding whether to counter such claims with common sense, their own experts, or both. Investigators and prosecutors should be aware of a "Cautionary Statement" that appears on page xxxvii of the DSM-IV-TR (American Psychiatric Association, 2000) and reads in part It is to be understood that inclusion here, for clinical and research purposes, of a diagnostic category such as Pathological Gambling or Pedophilia does not imply that the condition meets legal or other nonmedical criteria for what constitutes mental disease, mental disorder, or mental disability. The clinical and scientific con- siderations involved in categorization of these conditions as mental disorders may not be wholly relevant to legal judgments, for example, that take into account such issues as individual responsi- bility, disability determination, and competency [Emphasis added] Sentencing of acquaintance molesters who present as "intrafamilial" molest- ers can be a special problem. Many professionals have stereotypical views about incest offenders and what the courts should do with them. Many believe that they should be placed in diversion programs and constitute a minimal risk to the CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 135 EFTA01728762 community. This might be true much of the time, but it is not true all the time. A compulsive preferential sex offender who, as part of a long-term pattern of behavior, used marriage as a method of access to a child he molested, should be dealt with differently than an impulsive situational sex offender who, as part of an isolated pattern of behavior, molested his daughter. Many interveners are not aware of or do not recognize the difference. Of course, if they are mentally ill, they need treatment and not a jail term. Although engaging in sexual activity is a basic, fundamental, and normal human need, sex offenders are seemingly more likely to be considered "sick" and in need of treatment than other criminals. If the behavior of a child molester is considered the result of a mental illness, however, then it must dut of necessity be treated as a "contagious" disease that is, at best, difficult to cure. Courts most often consider this "sicicriess" even after the defendant has been found guilty and criminally responsible. Courts must carefully evaluate the seriousness of the offenses and effectiveness of any proposed treatment. Treatment and punishment are riot mutually exclusive. Some sex offenders seem to be motivated to seek treatment only when it is a substitute for incarcera- tion. Do the evidence and facts of the case indicate that prim to identification the child molester' had recognized the Kum of his sexual behavior and wanted to stop it, ordo they indicate he had spent considerable time and energy attempting to rationalize and justify his gehavior? Punishment is about the past and serious- ness of the offense. Treatment is about the future and desire to reduce recidivism. Since the vast majority of sex offenders will not be serving a life sentence, pros- ecutors must give some thought to treatment issues. The most effective approach is usually some combination of punishment and treatment. Punishment com- municates the seriousness and demonstrates the consequences of the offending behavior. Treatment can reduce recidivism arid protect children. Most cases call for both. 136 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728763 Accountability for any treatment is an important issue for prosecutors to consider. This is best achieved when the criminal-justice system maintains some control over the treatment through incarceration, probation, and parole. The crimi- nal-justice system needs to be aware if the defendant fails to cooperate in or terminates the treatment and if the therapist significantly alters the understood and agreed-upon treatment. Drugs to reduce the sex drive have a chance of working only if the offender is taking them. When a convicted sex offender requests consideration for treatment and pre- sents defense expert witnesses, the prosecution has the right to ask questions • such as how was the diagnosis made, exactly what conditions are being treated, what kind of treatment is going to be used, what is the success rate for. this treat- ment, why does it fail, who measured the success rate, what is the measure of success? In many treatment programs the treatment is considered a success if the subject does not report reoffending or is not rearrested. Treatment for sex offend- ers who deny they have sexual disorders by therapists who agree with them is more difficult to evaluate. To paraphrase Rebecca Roe, a former prosecutor in King County, Wash- ington; some sex offenders can be treated and some cannot. The problem and challenge is to determine which is which. A proper, competent, and objective forensic evaluation of the defendant is an invaluable tool for the prosecutors in these cases. In evaluating treatment options within the criminal-justice system, prosecutors have the right to consider ■ willingness to submit to a thorough forensic evaluation including a polygraph ■ admission of guilt through a guilty plea (no Afford pleas) ■ acceptance of full responsibility for behavior with minimal excuses . ■ recognition of the harm of the criminal behavior with minimal evidence of attempts to rationalize and validate it (e.g. , NAMBLA material, claims he helped children) ■ consequences for offending—some punishment is doing the defendant a favor and helping his treatment CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 137 EFTA01728764 Investigative Difficulties I have observed three major problems that make the investigation of child sexual exploitation difficult for law-enforcement officers and the criminal-justice system. Some of these investigative difficulties are not unique to child-sexual-victimiza- tion cases, but only their impact on and relevance to such cases will be discussed here. The "Ideal" Victinf Children in general have certain characteristics that make them "ideal" victims from the offender's point of view. Some of these characteristics are listed below. Naturally Curious Children have a natural curiosity about the world around them. As they grow older they become increasingly curious about sex and develop an active sex drive. Por most children sex is a taboo subject about which they receive little accurate information especially from their parents. Most parents find it difficult to discuss sex with their children. A clever child molester, to lower children's inhibitions and gradually seduce them into sexual activity, can easily exploit this natural curiosity and the lack of available information. Easily Led by Adults Many parents specifically instruct their children to respect and obey adults. Children are aware that their very survival depends on these powerful adults. In addition to fulfilling the physical and emotional needs of children, adults are big- ger and stronger. Any adult child molester can simply exploit his or her size and adult status to influence and control a child's behavior. Some child molesters exploit their status as individuals such as stepfathers, guardians, volunteers, youth leaders, and counselors to entice children into sexual activity. Child molesters who do not have this added adult authority sometimes impersonate individuals who do. For example they may falsely claim to be law-enforcement officers and clergy members. Need for Attention and Affection This is by far the most significant characteristic of children that makes them ideal victims especially for the seduction-acquaintance child molester. Even when they are getting attention and affection at home, children still crave and need it from others in their lives. It is important to realize that all children, even those from "normal" homes and "good" families, are at risk from such seduction techniques. Although all children are at some risk, it seems that the child from a dysfunctional home, who is the victim of emotional neglect or has strong feel- ings of alienation, is most vulnerable. Many victims get to the point where they are willing to trade sex for the attention and affection they get from some child molesters. It is sad but true that in many ways some child molesters treat their victims better than the victim's own parents do. The seduction child molester exploits the child's need for attention and affection to his advantage; however, the child molester is usually willing to supply all this attention and affection only as long as the child meets his age preferences. When the child gets too "old," the attention and affection usually turn to neglect and rejection. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 139 EFTA01728765 Large numbers of children are being raised in single-parent families. This is an ideal situation for the seduction-acquaintance child molester. Many working parents are desperate for affordable daycare and readily available babysitters. Many parents are not only not suspicious of adults who want to spend time with their children, but they welcome them. Parents should at least be suspicious of indi- viduals who want to be together with their children for long periods of time. Beware of anyone who wants to be with your children more than you do. Need to Defy Parents Many children, especially when they reach adolescence, go through a rebellious period. The child molester can exploit this to his advantage. Children who are victimized as a result of disobeying parental guidelines or rules will be reluctant to admit their error and may misrepresent the nature of their victimization. This is especially true of adolescent boys. . Children as Witnesses Many children are not.believed when they report being sexually abused and may be subject to harassment in court. The truth is that children are not poor wit- nesses. Neither are they ideal witnesses. Although child witnesses have many of the same traits as adult witnesses, the criminal-justice system must make special allowances for the developmental stages of children. Information furnished by children must be evaluated and assessed like the information furnished by any other victim or witness. If possible, as an early step in this assessment, consider- ation should be given to having a young child victim or witness evaluated by an objective mental-health professional in order to determine the child's developmental progress. This information can be of assistance in evaluating the information and details furnished by the child; however, this is not always possible or practical. LO ivocy-ii i Any law-enforcement officer assigned to the investigation of child sexual exploi- tation should be a volunteer, even if reluctant at first, who has been carefully selected and trained in this highly specialized work. This kind of work is not for everyone. Investigators must decide for themselves if they can deal with it. Just as importantly the investigators working these cases must monitor themselves con- tinually. The strong emotional reactions provoked by this work and the isolation and prejudice to which they may expose the investigator can make this work "toxic" psychologically and socially. Law-enforcement officers investigating the sexual victimization of children must learn to cope with the stigma within law enforcement attached to sex crime and sexual- victimization-of-children investigations. Because there is so much ignorance about sex in•general and deviant sexual behavior specifically, fellow officers frequently joke about sex crime and vice investigators. This phenomenon is often most problematic for officers working child-sexual- exploitation cases especially in medium or small departments. Investigators frequently become isolated from their peer group because fellow officers do not want to hear about Any law-enforcement officer assigned to the investigation of child sexual exploitation should be a volunteer, even if reluctant at first, who has been carefully selected and trained in this highly specialized work. 140 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728766 child sexual exploitation. The "reward" for spending days reviewing seized child pornography and other collateral evidence is to become the brunt of jokes about their sexual interests. This is a problem that supervisors as well as individual investigators must recognize and address. Investigators must be alert to the early warning signs of overexposure or stress. By using appropriate humor, limiting exposure, main- taining good physical fitness, nurturing and seeking peer Support, and feelhig a sense of self-accomplishment, the investigator can turn a job perceived as "dirty" into a rewarding assignment. A more detailed discussion of this problem is con- tained in a book chapter titled "The Maligned Investigator of Criminal Sexuality" (tanning & Hazelwood, 2001). tsaiatatattituts1 As previously discussed in the "Introduction," society has a particularly difficult time dealing with cooperating child victims and acquaintance child molesters. There are also several organizations in this country and around the world that openly voice a far different attitude about adult sex with children. The Rene Guyon Society North American Man/Boy Love Association (NAMBLA), Pedophile Information Exchange (PIE), Child Sensuality Circle, the Pedo-Alert Network (PAN), and Lewis Carroll Collector's Guild are all examples of groups that at one time or another have openly advocated adult-child sex and changing the laws that make it a crime. These groups usually restrict their advocacy to "consenting" sexual activity with children and claim to be opposed to forced sex with children. Such groups move in and out of existence as active members come and go, but the attitudes persist. In spite of the attention that many of these organizations have received in the past, it is doubtful that they have had any significant impact on public opinion in general within the United States. Their greatest threat to society, other than the criminal acts of individual members, is as a source of support and validation for child molesters and pedophiles. These groups and the material they publish help child molesters justify their behavior. Many pedophiles are openly proud of their behavior. In her outstanding article, "The Indignant Page: Techniques of Neu- tralization in the Publications of Pedophile Organizations," Dr. Mary De Young identifies the three neutralization techniques of such pedophiles as denial of injury (no harm done to child victim); denial of the victim (child deserved or . brought on the behavior); and appeal to higher loyalty (insistence that behavior serves the interests of a higher principle such as liberation of children or artistic freedom) (De Young, 1988). To some extent the Internet has made such groups obsolete. One no longer needs to join NAMBLA to get active validation for a sexual attraction to children. People can go on the Internet anytime of the day and fmd hundreds of others willing to actively validate their commonly held perverted interests. Interestingly a few academics, mental-health professionals, and sexologists express similar views. These so-called "experts" on human sexual behavior some- times equate the existing laws that prohibit sex with children with laws that prohibit masturbation, fornication, and homosexuality. They advocate changing the laws so that children can choose their sexual partners freely, but under the guise of children's rights and freedom. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 141 EFTA01728767 Also law-enforcement investigators must be prepared to deal with the fact that the identification, investigation, and prosecution of many child molesters may not be welcomed by their communities—especially if the molester is a promi- nent individual. Individuals may protest, and community organizations may rally to the support of the offender and even attack the victims. City officials may apply pressure to halt or cover up the investigation. Many law-enforcement supervisors, prosecutors, judges, and juries cannot or do not want to deal with the details of deviant sexual behavior. They will do almost anything to avoid these cases. Some federal judges believe cases involving sexual exploitation of children belong in state, not federal court. Some people would like to believe that down- loading child pornography from the Internet is about "dirty" pictures that should be a private, not criminal matter. As has been repeatedly stated, sympathy for victims is inversely proportional to their age and sexual development. We often focus on adolescent victims when we want volume and impact, but we do little to address the nature of their victimization. We want to view them as innocent children when they are sexu- ally victimized, but then try them as fully accountable adults when they commit a violent crime. The greatest potential to worsen societal attitudes about child victims who comply in their sexual exploitation comes from societal attitudes about child offenders. If increasing numbers of younger and younger children are held fully accountable for their criminal behavior and tried in court as adults, it becomes harder and harder to argue that the "consent" of children of the same ages is irrelevant when they engage in sexual activity with adults. The final frustration for the law-enforcement officer often comes in the sentencing of a convicted child molester. There are serious sex offenses, such as murder, torture, and sadistic rape, which are generally dealt with severely by the criminal-justice system. And there are nuisance sex offenses, such as indecent exposure and window peeping, which are generally dealt with lightly by the crimi- nal-justice system. The problem is that the nonviolent sexual victimization of children involving seduction by acquaintance molesters is often dealt with as a nuisance offense. It is even worse if the "child" victim is actually an undercover law-enforcement officer who the offender only thought was a child. The bottom line is that society condemns child molestation in the abstract, but how it responds to individual cases depends on who the offender is, who the victim is, and whether the case fits their stereotypical ideas. 142 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728768 Summary Quotes: "The Cliff Notes" The essence of this publication can be summarized in the key quotes noted below. In general ... sexually victimized children need more people addressing their needs from the professional perspective and fewer from the personal and political perspectives. Page 2 'Referring to the same thing by different names and different things by the same name frequently creates confusion. Page 9 Sympathy for victims is inversely proportional to their age and sexual development. Page 12 Pedophiles span the full spectrum from saints to monsters. In spite of this fact, over and over again pedophiles are not recognized, investigated, charged, convicted, or sent to prison simply because they are 'nice guys.' Page 17 The purpose of this descriptive typology is not to gain insight or understanding about why child molesters have sex with children in order to help or treat them, but to recognize and evaluate how child molesters have sex with children in order to identify, arrest, and convict them. 'Page 29 Although a variety of individuals sexually abuse children, preferential-type sex offenders, and especially pedophiles, are the primary acquaintance sexual exploiters of children. Pagi7 Parents should beware of anyone who wants to be with their children more than they do. Page 41 Preferential child molesters seduce children much the same way adults seduce one another. Page 55 Child pornography, by itself, represents an act of sexual abuse or exploitation of a child and, by itself, does harm to that child. Page 62 The online computer and Internet ... have radically changed most of what could have been said about the possession and distribution of child pornography in the United states in the 1980s and early 1990s. Page 62 An offender's pornography and erotica collection is the single best indicator of what he wants to do. It is not necessarily the best indicator of what he did or will do. Page 85 CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 143 EFTA01728769 Exploitation cases involving computers present many investigative challenges, but they also present the opportunity to obtain a great deal of corroborative evidence and investigative intelligence. Page 91 Because of (the] validation process and the fueling of sexual fantasy with online pornography, I believe that some individuals with potentially illegal, but previously latent sexual preferences have begun to criminally 'act out.' Their inhibitions are weak- ened after their arousal patterns are fueled and validated through online computer communication. Page 96 With multiple victims, no one victim should have to bear the total burden of proof and cases should rarely, if ever, be severed for prosecution. Page 101 The idea that some children might enjoy certain sexual activity or behave like human beings and engage in sexual acts as a way of receiving attention, affection, gifts, and money is troubling for society and many investigators. Page 103 Investigators must stop looking at child sexual exploitation through a keyhole—focus- ing only on one act by one offender against one victim on one day. Law enforcement must 'kick the door open' and take the 'big-picture' approach—focusing on offender typologies, patterns of behavior, multiple acts, multiple victims, child pornography, and proactive techniques. Page 103 Children are not adults in little bodies. Children go through developmental stages that must be evaluated and understood. In many ways, however, children are no better or worse than other victims or witnesses of a crime. They should not be automatically believed or dismissed. Page 109 Because their molestation of children is part of a long-term persistent pattern of behavior, preferential sex offenders are like human evidence machines. Page 117 Any law-enforcement officer assigned to the investigation of child sexual exploitation should be a volunteer, even if reluctant at first, who has been carefully selected and trained in this highly specialized work. Page 140 Last and most importantly Regardless of intelligence and education, and often despite common sense and evidence to the contrary, adults tend to believe what they want or need to believe. The greater the need; the greater the tendency. Page 102 144 - CHILD MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728770 Appendix I: References American Psychiatric Association (2000). Diagnostic and statistical manual of men- tal disorders (4th ed). Text Revision. Washington, DC. Burgess, A.W. (Ed.) (1984). Child pornography and sex rings. Lexington, MA: Lexington Books. DeBellis, M., Lefter, L., Trickett, P., & Putnam, F. (1994). Urinary catecholamine excretion in sexually abused girls. Journal of the American Academy of Child and Adolescent Psychiatry, 33, 320-327. De Young, M. (1988). The indignant page: Techniques of neutralization in the publications of pedophile organizations. Child Abuse and Neglect, 12, 583- 591. Dietz, P.E. (1983). Sex offenses: Behavioral aspects. In S.H. Kadish et al. (Eds.), Encyclopedia of crime and justice. New York: Free Press. Feldman, M.D, & Ford, C.V. (1994). Patient or pretender. New York, NY: John Wiley & Sons. Hartman, C.R., Burgess, A.W., & Lanning, K.V. (1984). Typology of collectors. In Ann Wolbert Burgess (Ed.), Child pornography and sex rings (pp. 93-109). Lexington, MA: Lexington Books. Hazelwood, R.R., & Lanning, K.V. (2001). Collateral materials in sexual crimes. In R.R. Hazelwood & A.W. Burgess (Eds.), Practical aspects of rape investigation (3rd ed) (pp. 221-232). Boca. Raton, FL: CRC Press. Hazelwood, R.R., & Warren, J.I. (2001). The sexually violent offender: impulsive or ritualistic. In R.R. Hazelwood & A.W. Burgess (Eds.), Practical aspects of rape investigation (3rd ed) (pp. 97-113). Boca Raton, FL: CRC Press. Hunter, J.A. (2001). The sexual crimes of juveniles. In R.R. Hazelwood & A.W. Burgess (Eds.), Practical aspects of rape investigation (3rd ed) (pp. 401-419). Boca Raton, FL: CRC Press. Jenny, C. (2002). Medical issues in child sexual abuse. In Myers, J.E.B., Berliner, L., Briere, J., Hendrix, C.T., Jenny, C., & Reid, T.A. (Eds.), APSAC hand- book on child maltreatment (2nd ed) (pp. 235-248). Thousand Oaks, CA: Sage. Lanning, K.V. (1986). Child molesters: A behavioral analysis. Alexandria, VA: National Center for Missing & Exploited Children. Lanning, K.V. (1987). Child molesters: A behavioral analysis (2nd ed). Alexandria, VA: National Center for Missing & Exploited Children. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 145 EFTA01728771 Lanning, K.V. (19924. Child molesters: A behavioral analysis (3rd ed). Alexandria, VA: National Center for.Missing & Exploited Children. Lanning, K.V. (1992b). Child sex rings: A behavioral analysis (2nd ed). Alexandria, VA: National Center for Missing & Exploited Children. Lanning, K.V. (1992c). Investigator's guide to allegations of "ritual" child abuse. Quantico, VA: U.S. Department of Justice. Lanning, K.V., & Burgess, A.W. (1995). Child molesters who abduct. Alexandria, VA: National Center for Missing & Exploited Children. Laming, K.V. (1996). The "witch hunt," the "backlash," and professionalism. In The apsac advisor, V. 9-n.4, 8-11. Lanning, KV., & Hazelwood, RR. (2001). The maligned investigator of criminal sexuality. In R.R. Hazelwood & A.W. Burgess (Eds.), Practical aspects of rape investigation (3M ed) (pp. 243-257). Boca Raton, FL: CRC Press. Myers, J.E.B., & Stern, P. (2002). Expert testimony. In Myers, J.S.B., Berliner, L., Briere, J., Hendrix, C.T., Jenny C., & Reid, T.A. (Eds.), APSAC handbook on child maltreatment (2nd ed) (pp. 379402). Thousand Oaks, CA: Sage. Saywitz, K.J., Goodman, G.S., & Lyon, T.D. (2002). Interviewing children in and out of court Current research and practice implications. In Myers, J.E.B., Berliner, L., Briere, J., Hendrix, C.T., Jenny C, & Reid, T.A. (Ms.), APSAC handbook on child maltreatment (2nd ed) (pp. 349-378). Thousand Oaks, CA: Sage. U.S. Department of Justice (1993).. Joint-investigations of child abuse: Report of a symposium. Washington, DC. U.S. Department of Justice (2000). Attorney general guidelines for victim and witness assistance. Washington, DC. Warren, & Hislop, J. (2001). Female sex offenders: A typological and etiological overview. In R.R.' Hazelwood & A.W. Burgess (Eds.), Practical aspects of rape investigation (3rd ed) (pp. 421-434). Boca Raton, -FL: CRC Press. 146 - CHILo MOLESTERS: A BEHAVIORAL ANALYSES EFTA01728772 Appendix II: The Investigator's Basic Library . . The 10 publications noted below are recommended for inclusion in the basi0 iet!sr- envie library of a law-enfoitement investigator of sexual victimization of children. Goodman, GS., & Bottoms, B.L. (Eds.) (1993). Child victims, child witnes,ses: Understanding and improving testimony. New York: Guilford. Hazelwood, R.R.,;,& Burgess, A.W. (Eds.) (2001). Practical aspects of rape •• investigation (3rd ed). Boca Raton, FL: CRC Press. . Heger, A., .8r Emans, S.J. (1092). Evaluation.of the sexually abused child: ,A medical textbook and photographic atlas. New York: Oxford University Press. • . , Myers, J.B.B. (1998). Legal issues in child abuse and neglect practice (2nd ed). Thousand Oaks, CA: Sage. Myers; J.E.B., Berliner, L., Brie/Pe, J., Hendrix, CT., Jenny, C.; & Reid, T.A. (Eds.) (2002). APSAC handbook on-child maltreatment (2nd ed). Thoti- sand OakseCA: Sage, ., Ney, T.- (Ed.) (1995). True and false-allegations of child sexual abuse. New York: Brunner/Mazel. t Office of Juienile Justice and Delinquency Prevention, (1996-1999). Portable . guides to investigating child abuse. Washington DC: 0.S..Department of Justice. , Pence, D., & Wilson, C. (1994). Team investigation of child sexual abuse: The uneasy alliance. Thousand Oaks, CAf Sager s_ Poole, D., & Lamb, M.(1998). Investigative interviews of children,. Washington, • DC American Psychological Association. •. Stern, P. (1997). Preparing and presenting expert testimony in child abuse litigation. Thousand Oaks, CA: Sage. • • - 3. CHILD MOLESTERS: A BEHAVIORAL ANALYSIS - 147 EFTA01728773 National Center for Missing & Exploited Children The National Center for Missing &Exploited Children (NCMEC), established in 1984as a private, nonprofit organization, serves as a clearinghouse of information on missing and exploited children; provides technical assistance to individuals and law-enforcement agendes;offers training programs to law-enforcement and social-service professionals; distillates photographs and descriptions of missing children worldwide; coordinates child-protection efforts with the private sector; networks with nonprofit service providers and state clearinghouses onmissing- person cases; and provides information on effective legislation to help ensure the protection of children per 42 USC § 5771 and 42 USC § 5780. A 24-hour, toll-free telephone line is available for those who have information on missing and exploited children at1-800-THE-LOST (1-800-843-5678),This toll- free number is available throughout the United States and Canada. ibe toll-free number when dialing from Mexico is 001-800-843-5678, and the "phone free" number when dialing from Europe is 00-800-0843-5678. The CyberTipline is available for online reporting of these crimes at www.cybertipline.com. The TDDlineis 1-800-826-7653. TheNCMECbusiness number when dialing within the United States is 703-274-3900, and the facsimile number is 703-274-2200. The business number when dialing from any other country is 001-703-522-9320. For information on the services offered by our NCMEC branches, please call them directly in California at 714-508-0150, Florida at 561-848-1900, Kansas City at 816-756-5422, New York at 7-16-242-0900, and South Carolina at 803- 254-2326. A number of publications addressing various aspects of the missing- and exploited-child issue are available free of charge in single copies by contacting the National Center forMissing &Exploited Children's Publications Department. NATIONAL CENTER FOR MISSING 8z EXPLOITED .CH I LDR.EN Charles B. Wang International Children's Building 699 Prince Street Alexandria, Virginia 22314-3175 www.missingkids.com za Printed on Recycled Paper 148 - Ciao MOLESTERS: A BEHAVIORAL ANALYSIS EFTA01728774 Compliant Child Victims: Confronting an Uncomfortable Reality By Kenneth V. Lanning (FBI Retired) 2/6/02: A 41-year-old man was arrested at a shopping center on Monday night after a security guard allegedly saw him molesting a teenager in a mall restroom. County police said the man grabbed a 14-year-old boy about 6:00 p.m. Police said the boy was held in the restroom against his will. A security guard on his regular rounds walked into the restroom as the man was molesting the boy. The man was arrested and charged with abduction and forcible sodomy. 2/8/02: A 14-year-old boy who told police that he was molested in a mall restroom at a shopping center on Monday was charged with filing a false report after police determined that his contact .with the stranger was consensual (emphasis added). County police said yesterday that the boy • originally reported that he had been held in the restroom against his will and molested Detectives later learned that the boy was not abducted and agreed to the sexual contact. The man was arrested at the time and now faces charges of unlawful carnal knowledge after police dropped charges of abduction and forcible sodomy. 2/22/02: "A child does whatever it takes to be noticed, and if he can get more attention for bad behavior than for good behavior, he's going to behave badly." (Response concerning 4-year-old boy, Family Almanac, Style Section) 3/1/02! "California's highest court upheld a voter-approved measure that was designed to crack down on juvenile crime by, among other things, letting prosecutors decide whether to try children as adults." (The above narratives were adapted from articles that appeared in the Washington Post and are included here only to typify issues discussed and to stimulate discussion.) -REPRINT Published in the "APSAC Advisor" Volume 14, No 2 (Spring 2002) EFTA01728775 In this discussion, the term compliant will be used to describe those children who cooperate in or "consent" to their sexual victimization. Because children cannot legally consent to having sex with adults, this compliance should not in any way alter the fact that they are victims of serious crimes. The term compliant is being used because at this time I cannot think of a better one. For the sake of child victims and professional interveners, it is important to bring out into the open possible reasons for and the complexity and significance of this compliance. The sexual victimization of children involves varied and diverse dynamics. It can range from one-on-one intrafamilial abuse to multioffender/multivictim extrafamilial sex rings and from stranger abduction of toddlers to prostitution of teenagers. For many child advocates and professionals in the field (Le., police, prosecutors, social workers, physicians, therapists), the sexual victimization of children means one-on-one intrafamilial-sexual abuse. Although they are certainly aware of other forms of sexual victimization of children, when discussing the problem in general their "default setting" (Le., that which is assumed without an active change) always seems to be children molested by family members. For the public, however, the "default setting" seems to be stranger abduction. To them, child molesters for the most part are sexually perverted strangers who physically overpower children and violently force them into sexual activity. The often forgotten piece in the puzzle ofthe sexual victimization of children is acquaintance molestation. This seems to be the most difficult manifestation of the problem for society and even professionals to face. People seem more willing to accept a sinister stranger from a different location or father/stepfather from a different socioeconomic-background as a child-molester than a clergy member, next-door neighbor, law-enforcement officer, pediatrician, teacher, or volunteer with access to children. Society seems to have a problem dealing with any sexual-victimization case in which the adult offender is not completely "bad" or the child victim is not completely "good." The idea that child victims could simply behave like human beings and respond to the attention and affection of offenders by voluntarily and repeatedly returning to an offender's home is a troubling one. For example, it confuses us to see the victims in child pornography giggling or laughing. Pitfalls in Understanding the Compliant Child Victim The sexual victimization of children by family members and by "strangers" can, of course, involve compliant child victims. In my experience, however, this compliance occurs most often in cases involving children sexually victimized by adult acquaintances. In other words, stranger offenders can use trickery to initially lure their child victinis, but they tend to control them more through confrontation, threats of force, and physical force. Likewise, intrafamilial offenders tend to control their victims more through their private access and family authority. The concept of child compliance is obviously much harder to define and evaluate when the offender is a parent. In contrast, acquaintance child molesters, although sometimes violent, tend by nerasgity to control their victims through the grooming or seduction process. This process not only gains the victim's initial cooperation, but also decreases the likelihood of disclosure and increases the likelihood of ongoing, repeated access. Acquaintance offenders with a preference for younger 2 ..... •••., • • e naenkuumn—bil— ne••••••• EFTA01728776 r victims (younger than age 12) are more likely to also have to spend time seducing the potential victim's parents or caretakers to gain their trust and confidence. An acquaintance molester who uses violence is easily identified and likely to be quickly reported to law enforcement, but an acquaintance molester who seduces his victims can sometimes go unreported for 30 years or more. The greater the skill in selecting and seducing vulnerable victims, the more successful the acquaintance molester. For this discussion, the determination of who is an "acquaintance" child molester will be based more on the process and dynamics of the child victimization and less on the technical relationship between the offender and child victim. An offender who is a stepfather, for example, might be an acquaintance molester who used "marriage" just to gain access to children. One of the unfortunate outcomes of society's preference for the "stranger-danger" concept -has.a.direct impact on intervention into many acquaintance-sexual-exploitation cases. It is what I call, "say no, yell, and tell" guilt. This is the result of societal attitudes and prevention programs that focus only on "unwanted" sexual activity and tell potential child victims to avoid sexual abuse by saying no, yelling, and telling. This technique might work with the stranger lurking behind a tree, but children who are seduced and actively participate in their victimization, however, often feel guilty and blame themselves because they did not do what they were "supposed" to do. These seduced and, therefore, compliant victims may sometimes feel a need to describe their victimization in more socially acceptable but inaccurate ways that relieve them of this guilt. Advice to prevent sexual exploitation of children by adult acquaintances is very complex and difficult to .implement. How do you warn children about offenders who may be their teachers, coaches, clergy members, or neighbors and whose only distinguishing characteristics are that they will treat the children better than most adults, listen to their problems and concerns, and fill their emotional, physical, and sexual needs? Will parents, society, and professionals understand when the victimization is discovered or disclosed? Much prevention advice simply does not distinguish to which types of sexual victimization it applies. The right to say "no" and "good touch/bad touch" would be applied differently to a stranger, parent, teacher or physician. Children at an early age learn to manipulate their environment to get what they want. Almost all children seek attention and affection. Children, especially adolescents, are often interested in and curious about sexuality and sexually explicit material. In today's world, they will sometimes use their computer and online acres to actively seek out such material. They are moving away from the total control of parents and trying to establish new relationships outside the family. In almost all criminal cases I know of where an adolescent left home to personally met with an adult they had first met online, they did so voluntarily in the hope they were going to have sex (not to get help with their homework) with someone they felt they knew and who cared about them. In spite of this reality, prevention material dealing with online child safety continues to repeatedly warn only about not talking to strangers and advise children to tell their parents if someone they meet online makes them feel uncomfortable. Is it realistic or even accurate to suggest that someone you regularly bommunicate with for weeks or months is a "stranger" just because you have not met them in person? Further, ask any adult what was the number one thing on their mind when they were 3 EFTA01728777 adolescents and the answer is always the same: sex. Yet parents seem to want to believe their children are asexual and, I suppose, children want to believe their parents are asexual. Both halves of this problem must be recognized, understood, and addressed if these cases are going to be effectively investigated, prosecuted, and prevented. We must understand that the offenders often are "nice guys" who typically sexually exploit children by befriending and seducing them. Equally important, we must also understand that the child victims are human beings with needs, wants, and desires. Child victims cannot be held to idealistic and superhuman standards of behavior. Their frequent cooperation in their victimization must be viewed as an understandable human characteristic that should have little or no criminal-justice significance. • In theory, the law recognizes the developmental limitations ofchildren and affords them with special protection. The repeated use, however, of terms such as rape, sexual violence, assault, attack sexually violent predator, and unwanted sexual activity, when discussing or inquiring about the sexual exploitation of children assumes or implies in the minds of many that all child victims resist sexual advances by adults and are then overpowered by coercion, trickery, threats, weapons, or physical force. Although cases with these elements certainly exist, when adults and children have sex, lack of "consent" can exist simply because the child is legally incapable of giving it. Whether or not the child resisted, said no, and was overpowered are, therefore, not necessarily elements in determining if a crime has occurred. Understanding this is especially problematic for the public (i. e., potential jurors) and professionals (Le., physicians, therapists) who lack specialized training in criminal law and may not rely on strict legal analysis, The saderealiW is,nonetheless, that such victim behavior does have significance in the perception of society and in the "real world" of the criminal justice system. Society's lack of understanding and acceptance of the reality ofcompliant child victims often results in the following: I. Victims failing to disclose and even denying their victimization 2. Incomplete, inaccurate, distorted victim disclosures when they do happen 3. Lifetime of victim shame, embarrassment, and guilt 4. Offenders being able to have numerous victims over an extended period of time 5. Ineffective prevention programs that also make the first four problems even worse This discussion intends to caste some light on the issue and encourage dialogue to address and improve this situation for the benefit of the victims and interveners. Although society has become increasingly more aware of the problem of the acquaintance molester and related problems, such as child pornography and the use of computers, a voice still persists that calls the public to focus only on "stranger danger" and calls many child-abuse professionals to focus only on intrafamilial sexual abuse. This narrow focus often leads to a misperception of the entire spectrum of the sexual victimization of children. 4 4m0 •Iim• 0••••••••• ••••••••• % re • •• ••••• %M. •••••I • •std EFTA01728778 Mixed Definitions Referring to the same thing by different names and different things by the same name frequently creates confusion. For example, the same 15-year-old individual Can be referred to as a baby,child,youthjuvenik,minor,adolescent,adult, or (as in one forensic psychological evaluation) underage adult. A father who coerces, a violent abductor, an acquaintance who seduces, a child- pornography collector, or an older boyfriend can all be referred to as a child molester or pedophile. Terms such as sexual exploitation of children and youth or sexual exploitation of children and adolescents imply that a youth or an adolescent is not a child. At what age does a child become a youth or adolescent? If such a person is sexually victimized, is that considered youth molestation or sexual abuse of adolescents? There clearly can be a conflict between the law and society's viewpoint when it comes to defining a child. Many people using the term sexual abuse of children have a mental image of children 12 or younger. The main problem, therefore, is often with the 13- to 17-year-old age group. Those are the child victims who most likely look, act, and have sex drives like adults, but who may or may not be considered children under some laws and by society. There can be national, cultural, and ethnic variations in attitudes about who is a child. Pubescent teenagers can be viable sexual targets of a much larger population of sex offenders. Unlike one-on-one intrafamilial sexual abuse in which the victim is most often a young female, in many acquaintance sexual-exploitation cases the victim is a.boy between the ages of 10 and 16. Adolescents ere frequently considered and counted by child advocates as children in order to emphasize the large scope of the child-victimization problem. But then, little or nothing said or done about addressing the problem seems to apply to the reality of adolescent victims. If adolescents are considered child victims of sexual exploitation, then their needs, interests, and desires must be realistically recognized and understood when addressing the problem. Legal definitions of who is considered a child or minor vary from state-to-state and even statute-to-statute when dealing with adolescent victims. During a prosecution, the definition can even vary from count-to-count in the same indictment. The age of the child may determine whether certain sexual activity is a misdemeanor or felony and what degree felony. To legally determine who is a child, investigators and prosecutors turn to the law. That is, the penal code will legally define who is a child or minor. But they must still deal with their own perceptions as well as those of other professionals, juries, and society as a whole. In general, a child will be defined for this discussion as someone who has not yet reached his or her eighteenth birthday. One of the problems in using this broad, but sentimentally appealing, definition of a child is that it lumps together individuals who may be more unlike than alike. In fact 16 year olds may be socially and physically more like 26- year-old young adults than like 6-year-old children. EFTA01728779 " vs.\ • Issues About Age of Consent In the early 1980s, an infamous case involved a judge who sentenced an adult convicted of child molestation to a minimal sentence because the judge felt the 5-year-old victim was "sexually promiscuous." Society and professionals were outraged and demanded that the judge be removed from the bench. The sad reality is that most people were outraged for the wrong reason—because they thought it was impossible for a 5-year-old child to be sexually promiscuous. Although not typical or probable, it is possible. Of course, this is more likely the result of some maltreatment, not the cause. Instead, we should have been outraged because it makes no difference whether or not the 5-year-old child was sexually promiscuous, a fact that in no way lessens the offender's crime of responsibility. If you change the case slightly and make the victim 9 years old, does that make a difference? Most people would probably say no. If you change it again and make the victim 12 years old, many people would still say it makes no difference, but might want to see a picture of the victim. If you change it again and make the victim 13, 14, 15, or 16 years old, the response of society and the law would vary greatly. For example, those interested in minimizing such sexual activity might emphasize referring to the victims as minors rather than as children. In sex crimes, the fundamental legal difference between victimization of an adult and a child is the issue of consent. In cases of sexual activity between adults, with a few rare exceptions, a lack of consent must be established for there to be a crime. In sexual activity between children and adults, a crime can exist even if the child cooperates or "consents." But the reality of age of consent is not so simple. Age of consent can vary depending on the type of sexual activity and individual involved. At what age can a child do the following: consent to get married; engage in sexual activity; appear in sexually explicit visual images; or leave home to have sex with an unrelated adult without parental permission? Federal case law seems to suggest that the consent of a 14-year-old who crosses state lines after running off and having sex with a 40-year-old man she met on the Internet is a valid defense for the kidnapping charge, but not for the sexual assault charge. At what age can an adolescent consent to have sex with a relative, a teacher, a coach, an employer, or a 21-year-old boyfriend or girlfriend? In the United States, society and criminal investigators and prosecutors seem to have a preference for sexual victimization cases where the victim, adult or child, clearly does not consent. Among lack of consent cases, the least preferred are cases where the victim could not consent because of self-induced use of drugs or alcohol. Cases where the victim was just verbally threatened are next, followed by cases where a weapon was displayed. For purposes of ease of proof, the most preferred lack-of-consent cases are those where the victim has visible physical injuries or is, sad to say, dead. Many compliant child victims may inaccurately claim they were asleep, drink, drugged, or abducted in part to meet these lack of consent criteria and in part to avoid embarrassment. 6 • •••••••••••wr.......... “aaWnea••• M me.... a., w • • a....•• sus/v.0 •••• •••• • •••••••••• saw* " Id- WIC% re PM1:••••••••••••...0•11.0nr• EFTA01728780 1 Sexual-victimization cases in which the child victim is not forced or threatened and cooperates or "consents" are more troubling and harder for society and investigators to deal with. If such victims were adults, there usually would not even be a crime. Although "consent" is supposed to be irrelevant in child-sexual-victimization cases, there are unspoken preferences in these cases as well. The most preferred are consent cases where the victim can explain that the cooperation was due to some general fear or ignorance aboui the nature of the activity. That is, the child was afraid to tell or did not understand what was happening. The next most preferred are cases where the child was tricked, duped, or indoctrinated. If the offender was an authority figure, this "brainwashing" concept is even more appealing. Next on this preference scale are the cases in which the victim was willing to trade "sex" for attention and affection. Much less acceptable are cases in which the child willingly traded sex for material rewards (e.g., clothes, shoes, trips) or money (Le., prostitution). Almost totally unacceptable are cases in which the child engaged in the sexual activity with an adult because the child enjoyed the sex. In fact, it is almost a sacrilege to even mention such a possibility. These societal and criminal-justice preferences prevail in spite of the fact that almost all human beings trade sex for attention, affection, privileges, gifts, or money. Although any of these reasons for compliance are possible, many seduced child victims inaccurately claim they were afraid, ignorant, or indoctrinated in part to meet these societal preferences for cooperation and in part to avoid embarrassment. Many victims are most concerned over disclosure of and therefore more likely to deny engaging in sex for money, bizarre sex acts, homosexual acts in which they were the active participant, and sex with other children. A young adolescent boy appearing on a television talk show focusing on the topic of sexual victimization of child athletes by their adult coaches was asked by the host why the abuse went on for so long without him telling anyone. The boy, who had been nonviolently seduced by his coach, answered that he was frightened of his coach. Although seemingly inconsistent with the facts, everyone gladly accepted and applauded his answer. What would have been the reaction of the television host and the audience had the boy provided more plausible answers, such as he did not tell because by having sex with the coach he got to play more or because he enjoyed the sex? Such answers are reasonable and perfectly understandable and should not change the fact that the boy was the victim of a crime. Maybe anticipation of society's response and not the molester is what most "frightened" the boy into not telling sooner. Any of the above scenarios in various combinations are certainly possible. A child might cooperate in some sexual acts and be clearly threatened or forced into others. All are crimes. The offender, the victim, or the intervener may perceive what constitutes compliance differently. Investigators and prosecutors always need to attempt to determine what actually happened, not attempt to confirm their preconceived beliefs about sexual victimization of children. Most acquaintance-exploitation cases involve these seduced or compliant victims. Although applicable statutes and investigative or prosecutive priorities may vary, individuals investigating sexual-exploitation cases must generally start from the premise that the sexual activity is not the 7 Nwu..w • NT • Y" AWPIC•It.41 EFTA01728781 fault of the victim even if the child • Did not say "no" Did not fight • Actively cooperated • Initiated the contact • Did not tell • Accepted gifts or money Enjoyed the sexual activity Investigators and prosecutors must also remember that many children, especially those victimized through the seduction process, often Trade sex for attention, affection; or gifts Are confused over their sexuality and feelings Are embarrassed and guilt-ridden over their activity Describe their victimization in socially acceptable ways Minimize their responsibility and maximize the offender's • Deny or exaggerate their victimization All these things do not mean the child is not a victim. What they do mean is that children are human beings with human needs. Society, however, seems to prefer to believe that children are pure and innocent. Child abuse conferences often have subtitles such as "Betrayal of Innocence." Bags with children's endearing crayon drawings on them* are distributed to attendees to carry handout material. The FBI's national initiative on computer exploitation of children is named "Innocent Images." This preference for idealistic innocence persists in spite of the fact that anyone who has spent time with children, even infants and toddlers, knows they quickly and necessarily learn to manipulate their environment to get what they want. Many children have only a vague or inaccurate concept of "sex." They are seduced and manipulated by clever offenders and usually do not fully understand or recognize what they were getting into. Even if they do seem to understand, the law is still supposed to protect them froth adult sexual partners. Consent should not be an issue with child victims. Sympathy for victims is, however, inversely proportional to their age and sexual development. The dynamics of these "consenting" victim patterns of behavior can be explained to the court by an education expert witness as in United States v. Romero (7th Cir. 1999). The ability to make these explanations, however, is being undermined by the fact that children, at an age when they cannot legally choose to have sex with an adult partner, can choose to have an abortion without their parents' permission or be charged as adults when they commit certain crimes. Can the same 15-year-old be both a "child" victim and an "adult" offender in the criminal-justice system? 8 EFTA01728782 Offender-Victim Bond Because victims of acquaintance exploitation usually have been carefully seduced and often do not realize or believe they are victims, they repeatedly and voluntarily return to the offender. Society and the criminal-justice system have a difficult time understanding this. If a neighbor, teacher, or clergy member molests a boy, why does he "allOw" it to continue and not immediately report it? Most likely he may not initially realize or believe he is a victim. Some victims are simply willing to trade sex for attention, affection, and gifts and do not believe they are victims. The sex itself might even be enjoyable, and the offender may be treating them better than anyone else ever has. But, they may come to realize they are victims when the offender ends the relationship. Then they recognize that all the attention, affection, and gifts were just part of a plan to use and exploit them. This may be the final blow for a troubled child who has had a difficult life. Many ofthese victims never disclose their victimization. Younger children may believe they did something "wrong' or "bad" and are afraid of getting into trouble. Older children may be more ashamed and embarrassed. Victims not only do not disclose, but they often strongly deny if happened when confronted. In one case, several boys took the stand and testified concerning the high moral character of the accused molester. When the accused molester changed his plea to guilty, he admitted that the boys who testified on his behalf were also among his victims. In my experience, the most common reasons that compliant victims do not disclose are: stigma of homosexuality, lack of societal understanding, presence-of positive-feelings for the • offender, embarrassment or fear over their victimization, or the belief they are not really victims. Because most of the offenders are male, the stigma of homosexuality is a serious problem for male victims. Although being seduced by a male child molester does not nernssrily make a boy a homosexual, the victims do not understand this. If a victim does disclose, he risks significant ridicule by his peers and lack of acceptance by his family. These seduced or compliant child victims obviously do sometimes disclose, often because the sexual activity is discovered (e.g., abduction by offender, recovered child pornography, overheard conversations) or suspected (e.g., statements of other victims, association with known sex offender, proactive investigation), after which an intervener confronts them. Others disclose because the offender misjudged them, got too aggressive with them, or is seducing a younger sibling or their close friend. Compliant victims sometimes come forward and report because they are angry with the offender for "dumping" them. They might be jealous that the offender found a new, younger victim. They sometimes disclose because the abuse has ended, not to end the abuse. In addition some compliant victims do not want the perpetrator prosecuted or sent to prison. At sentencing, they may even write a letter to the judge indicating their "consent" in the sexual activity and expressing their love for the defendant. Should such a letter get the same consideration as a letter from a victim requesting harsh punishment? 9 vufraiNe EFTA01728783 Children Never Lie? The available evidence suggests that children rarely lie about sexual victimization, if a lie is defined as a statement deliberately and maliciously intended to deceive. If children in these cases do lie, it may be because factors such as shame or embarrassment over the nature of the victimization increase the likelihood that they misrepresent the sexual activity. Seduced victims sometimes lie to make their victimization more socially acceptable or to please an adult's concept of victimization. Occasionally children lie because they are angry and want to get revenge on somebody. Some children, sadly, lie about sexual victimization to get attention and forgiveness. A few children may even lie to get money or as part of a lawsuit. This can sometimes be influenced by pressure from their parents. Objective investigators must consider and evaluate all these possibilities. It is extremely important to recognize, however, that because children might lie about part of their victimization does not mean that the entire allegation is necessarily a lie and they are not victims. Acquaintance-exploitation cases often involve complex dynamics and numerous incidents that often make it difficult to say an allegation is all true or all false. An important part of the evaluation and assessment of allegations of sexual victimization of children is comparing the consistency of allegations: 1) among what multiple victims allege to have happened and 2) between what is alleged and who is suspected of doing it is. If a victim describes his or her victimization as involving what clearly sound like the behavior patterns of a certain type of sex offender, then the fact that the alleged offender fits that pattern is corroborative. If he does not, there is an inconsistency that needs to be resolved. The inconsistency could be because the alleged what is inaccurate (e.g., distorted account from victim, insufficient details), the suspected who has been misevaluated (e.g., incomplete background, erroneous assessment), or the alleged who is innocent (e.g., suspect did not commit alleged crime). In my experience, distorted accounts from victims are frequently caused or influenced by various interveners (e.g., therapists, physicians, parents, law enforcement) who are unwilling to nonjudgmentally accept the realty of the nature of the actual molestation of children. Instead, they influence, pressure, or lead the children to describe the victimization in a way that fits their agenda or needs and in the process destroy the prosecutive potential of a valid case. Understanding the Seduition Process Most compliant child victims were courted, groomed, or seduced over time by an adult. True understanding of this process must be incorporated into the intervention of these cases. For example, pediatricians or therapists who only discuss forced or unwanted sexual activity with their patients are potentially missing a significant area of sexual victimization of children. Because a child wanted to have sex with an adult, does not mean it is not abuse and a crime. After understanding the seduction process, the intervener must be able to conununicate this understanding to the victim. This is the difficult part. Interveners need to be careful about asking questions that communicate ajudgment about the 10 ‘mas4,4",“0".•,“WiAlindYlen• EFTA01728784 ..t nature of the victimization (e.g., How scared were you? When did he threaten you? Is it hard to remember such terrible things?). If why questions are asked (e.g., Why didn't you immediately tell? Why didn't you resist? Why did you return to the offender? Why are you smiling in this photograph?), every effort should be made to communicate to the victim that any truthful answer is acceptable, including "because I enjoyed it." Interveners must understand and learn to deal with the incomplete and contradictory statements of seduced victims of acquaintance molesters. The dynamics of their victimization must be considered. Any behavior of victims must be understood and evaluated in the context of the entire process. Compliant victims are embarrassed and ashamed of their behavior and correctly believe that society will not understand their victimization. Many younger child victims are most concerned about the response of their parents and often describe their victimization in ways they believe will please their parents. Adolescent victims are typically also concerned about the response of their peers. Victims and their families from higher socioeconomic backgrounds may be even more concerned about the public embarrassment of any disclosure. Interveners who have a stereo- typed concept ofchild-sexual-abuse victims or who are accustomed to interviewing younger children molested within their family will have a difficult time interviewing adolescents seduced by an acquaintance. Many of these victims will be street-wise, troubled, or even delinquent children from dysfunctional homes. Such victims should not be blindly believed, but should not be dismissed because the accused is a pillar of the community and they are delinquent or troubled. Such allegations should be objectively investigated and evaluated. Some victims will continue to deny their victimization no matter what the interviewer says or does. Some children even deny victimization that the offender has admitted or other evidence clearly discloses. Some will make admissions but minimize the quality and quantity of the acts. They may minimize their compliance and maximize the offender's involvement by claiming he drugged them, threatened them, had a weapon, or had even abducted them. Of course some of these allegations may be accurate and should be investigated. They are, however, not typical of acquaintance-exploitation cases. Violence is most likely used to prevent disclosure. Sadistic offenders may also use violence during sex, but this is relatively rare in cases involving seduction. As previously mentioned, these potential inaccuracies in the details of the allegations of seduced victims may explain some of the inconsistencies between the alleged what and the suspected who. The intervener must communicate to the victim that he or she is not at fault even though the victim did not say "no," did not fight, did not tell, initiated the sex, or even enjoyed it. When the victim comes to believe that the intervener understands what he experienced, he or she is more likely to talk. Victims often reveal the details little by little, testing the intervener's response. The intervener must recognize and sometimes allow the victim to use face-saving scenarios when disclosing victimization. As stated, such victims might claim they were confused, tricked, asleep, drugged, drunk, or tied up when they were not. Adolescents, who pose special challenges for the interviewer, use these face-saving devices most often. The intervener must accept the fact that even if a victim discloses, the information is likely to be incomplete, minimizing his or her involvement and acts. Some of these victims simply do not believe they were victims. 11 *CaMAPIP' EFTA01728785 In the absence of some compelling special circumstance or requirement, the interview of a child possibly seduced by an acquaintance molester should never be conducted in the presence of parents. The presence of the parent increases the likelihood that the child will just deny or give the socially or parentally acceptable version of the victimization. This is especially true of younger victims. Some victims in acquaintance-child-exploitation cases disclose incomplete and minimized information about the sexual activity that is contradicted by further investigation. This creates significant problems for the investigation and prosecution of such cases. For instance, when the investigator finally gets a victim to disclose the exploitation and abuse, the victim furnishes a version of his victimization that he or she swears is true. Subsequent investigation then uncovers additional victims, child pornography, or computer chat logs and other-records--directly conflicting with the first victim's story. A common example of this is that the victim admits the offender sucked his penis, but denies that he sucked the offender's penis. The execution of a search warrant then leads to the seizure of photographs of the victim sucking the offender's penis. Additional victims may also confirm this, but then lie when they vehemently deny that they did the same thing. The allegations of multiple victims often conflict with each other. Each victim tends to minimize their behavior and maximize the behavior of other victims or the offender. Some victims continue to deny the activity even when confronted with the pictures. Today, investigators must be especially careful in computer cases where easily recovered chat logs, records of communication, and visual images may directly contradict the socially acceptable version of events that the victim is now giving. In my experience, the primary reason compliant child victims furnish these false and misleading details about their victimization is their correct recognition that society does not understand or accept the reality of their victimization. This happens so often that distorted and varying details in such cases are almost corroboration for the validity of the victimization. Can We Come To Conclusions? The typical adolescent, especially a boy, is easily sexually aroused, sexually curious, sexually inexperienced, and somewhat rebellious. All these traits combine to make the adolescent one of the easiest victims of sexual seduction. It takes almost nothing to get an adolescent boy sexually aroused. An adolescent boy with emotional and sexual needs is simply no match for an experienced 50-year-old man with an organized plan. Yet, ndult offenders who seduce them, and the society that judges them, continue to claim that these victims "consented." The result is a victim who feels responsible for what happened and embarrassed about his actions. Once a victim is seduced, each successive sexual incident becomes easier and quicker. Eventually the child victim may even take the initiative in the seduction. Some victims come to realize that the offender has a greater need for this sex than they do, and this gives them great leverage against the offender. The victims can use sex to manipulate the offender or temporarily withhold sex until they get things they want. A few victims even blackmail the offender especially if he is married or a pillar of the community. Although all of this is 12 r . ••••••••••• EFTA01728786 unpleasant and inconsistent with our idealistic views about children, when adults and children have "consensual" sex the adult is always the offender, and the child is always the victim. Consent should be an issue only for adult victims. As has been stated, sympathy for victims is inversely proportional to their age and sexual development. We often focus on adolescent victims when we want volume and impact, but we do little to address the nature of their victimization. We want to view them as innocent children when they are sexually victimized, but then try them as fully accountable adults when they commit a violent crime. The greatest potential to worsen societal attitudes about child victims who comply in their sexual exploitation comes from societal attitudes about child offenders. If increasing numbers of ever younger children are held fully accountable for their criminal behavior and tried in court as adults, it becomes harder and harder to argue that the "consent" of children of the same ages is irrelevant when they engage in sexual activity with adults. The reality of compliant child victims is subtly and discreetly dealt with everyday in this country by investigators, prosecutors, judges, juries, and others. Some professionals feel that this controversy is best dealt with by overtly pretending that it really does not exist. They believe that to explicitly admit or discuss it would be harmful to child victims. Many would certainly object to the use of a term or label like compliant child victim. I believe, however, that this reality must be openly recognized, discussed, and addressed. We cannot continue to hold increasing numbers of ever younger juveniles accountable as adults for their criminal behavior and simultaneously argue that their consent to engage in sexual behavior does not matter. I have come to believe the best way to deal with the problem is to change, not fuel, people's unrealistic expectations about the sexual victimization of children. The criminal sexual assault of an adult is, by definition, almost always violent. The criminal sexual assault of a child may or may not be violent. Unfortunately, too many lay people and even professionals hearing terms such as sexual assault or rape in the sexual victimization of children seek out or expect evidence of physical violence. In this discussion, I have focused primarily on the problems (i.e., false denials, delayed disclosures, incomplete and inaccurate details, etc.) that compliant child victims present for the criminal justice system. I believe, however, such victims also present considerable problems and challenges for therapists, physicians, social workers, and other professionals. Awareness and prevention programs that focus on recognizing evil sexual "predators" and "pedophiles" and on advising victims to say "no," yell, and tell are not only ineffective in preventing compliant victimization, but they also make the problem worse. Such programs decrease the likelihood of victim disclosure and increase the shame and guilt of such victims. In almost every case involving compliant child victims that I have evaluated, true victims have had to distort varying aspects of their victimization in statements to parents, investigators, therapists, physicians, attorneys, and the court. Each subsequent statement often requires increasing deceptions to defend the previous ones. What axe the long-term emotional and psychological consequences for child victims who are exposed to prevention and awareness programs that seem to deny the reality of their victimization or who must distort, misrepresent, and lie about what actually happened to them in order to have it accepted as "real" victimization? 13 e.:0•Anciro•.: w....••••••••••• EFTA01728787

Related Documents (6)

Dept. of JusticeAug 22, 2017

17 August 1 through August 15 2016_Redacted.pdf

JAN 1 2 3 4 7a to 12p 0 4 0 7 1p to 5p 1 3 0 5 6p to 12a 2 0 1 10 1a to 6a 0 0 0 0 AVER 1 2 0 6 total  3 7 1 22 Year to date searches 5 7 12 9 4 8 32 6 26 8 3 2 10 39 7 18 7 8 0 8 33 763 8 18 5 3 2 7 28 9 4 4 0 0 2 8 10 0 0 0 0 0 0 11 12 3 1 0 4 16 12 13 16 23 20 17 3 2 0 7 10 12 39 49 Jan 14 15 16 17 11 20 4 1 19 15 3 0 3 7 0 0 0 0 0 4 8 11 2 1 33 42 7 5 Month Average 18 7 9 1 0 4 17 19 20 21 9 22 14 11 16 9 9 2 1 0 0 4 7 10 7 29 40 28 190.75 22 14 13 1 0 7 28 23 24 25 26 27 28 4 0

1793p
Court UnsealedDepositionJul 21, 2025

P009111-071325-001-265

March 19, 2025 Mr. Russell Brown Executive Director Washington Association of Prosecuting Attorneys 206 10th Ave SE Olympia WA 98501 Subject: Update - Potential Disclosures concerning Government Witness – CVEO 1 Leonardo J. Bobadilla, Badge Number X807 Dear Mr. Brown: On April 17, 2024, the Washington State Patrol (WSP) provided notification regarding the above￾named employee: “It is alleged CVEO 1 coerced and/or assaulted his ex-girlfriend. It is also alleged CVEO 1 engaged in acts of child

265p
Court UnsealedDepositionApr 17, 2025

P008817-033125-008-259

September 19, 2023 Mr. Russell Brown Executive Director Washington Association of Prosecuting Attorneys 206 10th Ave SE Olympia WA 98501 Subject: Potential Disclosures concerning Government Witness – Sergeant Derek O. Anderson, Badge Number 145 Dear Mr. Brown: The Washington State Patrol (WSP) Office of Professional Standards initiated an administrative investigation for the following allegation(s): “It is alleged Sergeant stopped the complainant due to his race. It is further alleged Sergean

252p
Court UnsealedDepositionApr 17, 2024

P007796-031024-001-463

P007796-031024-000001 P007796-031024-000002 P007796-031024-000003 P007796-031024-000004 P007796-031024-000005 Serial Number Date Obs Time Citation Operator Last Name Operator Agency Code BrAC 1 IR BrAC 1 EC ES IR ES EC BrAC 2 IR BrAC2 EC Sts ARKC-0062 9/24/2018 20:07:00 1826701771 FETTER, ARTHUR R 0270400 0.268 0.274 0.085 0.089 0.273 0.273 0 ARKC-0062 10/16/2018 00:46:00 1828900025 FETTER, ARTHUR R 0270400 0.117 0.12 0.086 0.089 0.118 0.119 0 ARKC-0060 10/18/2018 17:38:00 1829101593

463p
Court UnsealedDepositionFeb 5, 2026

P009747-020326-001-335

March 19, 2025 Mr. Russell Brown Executive Director Washington Association of Prosecuting Attorneys 206 10th Ave SE Olympia WA 98501 Subject: Update - Potential Disclosures concerning Government Witness – CVEO 1 Leonardo J. Bobadilla, Badge Number X807 Dear Mr. Brown: On April 17, 2024, the Washington State Patrol (WSP) provided notification regarding the above￾named employee: “It is alleged CVEO 1 coerced and/or assaulted his ex-girlfriend. It is also alleged CVEO 1 engaged in acts of child

335p
DOJ Data Set 10OtherUnknown

EFTA01728716

72p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.