Rick Parsons Julie Goldstein
Rick Parsons Julie Goldstein
Rick Parsons Julie Goldstein
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Rick</strong> <strong>Parsons</strong><br />
<strong>Julie</strong> <strong>Goldstein</strong><br />
<strong>Parsons</strong>/ Honyara 2012
This course involves topic<br />
matters, pictures, videos<br />
and language that may be<br />
offensive to some.<br />
<strong>Parsons</strong>/ Honyara 2012
• Prevalence<br />
• Demographics (Who and Why)<br />
• How they do it<br />
• Cyber Sex Offender Supervision Model<br />
• Legal and Policy Issues<br />
<strong>Parsons</strong>/ Honyara 2012
• The Internet and Cyber Sex Offenders are still a<br />
new phenomenon<br />
• We have very limited information about this<br />
population.<br />
• There has been some research done on this<br />
population and there are numerous ongoing<br />
studies.<br />
• The findings are generally ruled by<br />
discrepancies and many of the studies have<br />
small samples or other issues.<br />
<strong>Parsons</strong>/ Honyara 2012
Estimated 2.2 Billion<br />
Internet Users in the World<br />
(Miniwatts Marketing<br />
Group: 2012)<br />
Estimated that<br />
between 50 to 100<br />
thousand individuals<br />
are involved in<br />
organized child<br />
pornography rings<br />
worldwide (Jenkins<br />
2001)<br />
About 90% of<br />
Children in the USA<br />
use computers<br />
(National Center for<br />
Educational Studies:<br />
2001)<br />
<strong>Parsons</strong>/ Honyara 2012
• In 2006, it was estimated that there was 264 million<br />
sexually explicit web pages (12% of total pages /<br />
60% of web traffic)<br />
• 20% Child Pornography<br />
• Estimated 1 million pornographic images of<br />
children on the internet with 200 new images being<br />
posted daily (Wellard 2001).<br />
• 2,755 Internet Domains contain CP Images (Elliott<br />
et al., 2009)<br />
• Between January and March of 2012, NCMEC<br />
received 71,201 tips for child pornography and<br />
1,151 tips for online enticement of children for<br />
sexual acts. (NCMEC 2012)<br />
<strong>Parsons</strong>/ Honyara 2012
• 20 billion dollar industry<br />
• Majority are images of girls (COPINE)<br />
• Approximately half of the images are children<br />
under age 9 (COPINE)<br />
• 80% arrested had images depicting penetration<br />
(NJOV)<br />
• 20% arrested had images depicting violence<br />
(NJOV)<br />
• Average movie is 8 minutes long (Taylor)<br />
• 81% only one child victim (Taylor)<br />
<strong>Parsons</strong>/ Honyara 2012
• White Male<br />
• Mean age of 38 (18-77 years old)<br />
• Educated and Employed<br />
FBI<br />
<strong>Parsons</strong>/ Honyara 2012
• Many self identified pedophiles admit they<br />
use child pornography (Riegel 2004)<br />
• Some self identified pedophiles use legal<br />
child images (Howitt, 1995)<br />
• Some contact offenders possess child<br />
pornography (Seto et al 2006)<br />
• Some contact offenders admit using CP<br />
prior to having a contact offense (Wheeler<br />
1997)<br />
• CP is indicative of Pedophilia (Seto et al,<br />
2006)<br />
• CP alone does not increase risk for a handson<br />
offense (Webb et al, 2007)<br />
<strong>Parsons</strong>/ Honyara 2012
• Seto found 12% known history of<br />
contact offending (2011)<br />
• Another study showed 35% of those<br />
arrested were active abusers.<br />
• BOP study showed that possibly 85%<br />
had actual hands-on sexual offending.<br />
• Meta Analysis indicates about 55%<br />
(Seto, Hanson et al.)<br />
<strong>Parsons</strong>/ Honyara 2012
Ken Lanning<br />
<strong>Parsons</strong>/Honyara 2011
• CAM Only offenders reoffend less often than<br />
those with prior offenses (Eke & Seto)<br />
• 7% recidivate with new CAM or new sexual<br />
offense (Seto)<br />
<strong>Parsons</strong>/ Honyara 2012
• CP Offenders<br />
• More fantasy oriented<br />
• Fewer cognitive distortions<br />
• More victim empathy<br />
• Less likely to engage in anti-social behavior<br />
• Higher sexual deviancy<br />
• More accepting of person responsibility<br />
• Less likely to miss treatment<br />
• Less likely to fail in the community<br />
• Have greater self-control and more psychological barriers<br />
to acting on their deviant interests than offline offenders<br />
Babchishin et al., 2011<br />
Elliott et al., 2009<br />
Webb et al, 2007.<br />
<strong>Parsons</strong>/ Honyara 2012
Relationship of Abuser to Child Percentage of Identified Victims<br />
Parent 27%<br />
Other Relative 10%<br />
Neighbor/ Family Friend 24%<br />
Babysitter / Coach 4%<br />
Guardian’s Partner 4%<br />
Online Enticement 14%<br />
Self-produced 11%<br />
Victims of Prostitution 2%<br />
Unknown to Child 4%<br />
Source: NCMEC<br />
<strong>Parsons</strong>/ Honyara 2012<br />
69%
Why They Do It Varies:<br />
Factors That Influence the Development of Sexually<br />
Abusive Behavior<br />
Situational,<br />
circumstantial<br />
Individual,<br />
motivational<br />
Developmental,<br />
environmental<br />
Socio-cultural<br />
Biological
Biological<br />
Factors<br />
Social<br />
Learning<br />
Factors<br />
Typical<br />
Manifestations<br />
for Online<br />
Offenders<br />
• Genetic & Evolutionary<br />
• Social, cultural, and physical environment<br />
and our role within these<br />
• Failure in self regulation (behaviors and<br />
emotions)<br />
• Interpersonal problems (difficulty relating<br />
to others)<br />
• Antisocial Thinking<br />
• Deviant Sexual Interest or Arousal<br />
Ward and Beech
<strong>Parsons</strong>/ Honyara 2012
• Three Reasons that Criminals Like Computers:<br />
• Remoteness from Crime Site<br />
• Data Encryption<br />
• Anonymity<br />
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
• Isolating – Easy to lose track of time,<br />
consequences, and real life relationships.<br />
• Interactive – Form pseudo relationships –<br />
approximate reality without risk of<br />
emotional vulnerability and intimacy. Fuels<br />
fantasy life.<br />
• Integral – Internet has become an integral<br />
part of life. Unable to avoid.<br />
• Imposing – A never ending supply of sexual<br />
material .<br />
• Inexpensive – From $0 to $40 a month one<br />
can access large amounts of sexual material.<br />
• Intoxicating – The above makes the internet<br />
intoxicating and difficult to resist.<br />
Multiplied since the reward is sex.<br />
<strong>Parsons</strong>/ Honyara 2012
• Create a permanent record for arousal and<br />
gratification<br />
• Lower children’s inhibitions<br />
• Validate and confirm the child sex offenders<br />
belief system<br />
• Blackmail victims and other co-offenders<br />
• Sell for profit or trade<br />
<strong>Parsons</strong>/ Honyara 2012
Type<br />
Features<br />
Browser<br />
Response to spam, accidental hit<br />
Private Fantasy Conscious creating of online text or images for private use<br />
Trawler<br />
Actively seeking CP using openly available browsers<br />
Non-secure Collector Actively seeking material often through P2P<br />
Secure Collector Actively seeking material through secure sites<br />
Groomer<br />
Cultivating an online relationship with children.<br />
Physical Abuser Abusing a child who may have been introduced online/<br />
Producer<br />
Records own abuse or that of others<br />
Distributer<br />
May distribute at any one of the above levels<br />
Krone, 2004<br />
<strong>Parsons</strong>/ Honyara 2012
Traders<br />
•Traffic and/or collect CP via digital media<br />
Travelers<br />
•Use the internet to manipulate and coerce<br />
children into meeting in person<br />
Traders-Travelers<br />
(Alexy et al., 2005)<br />
<strong>Parsons</strong>/ Honyara 2012
Situational<br />
“Normal” adolescent /<br />
adult – typical adolescent<br />
or curious male with<br />
newly found access to<br />
pornography<br />
Preferential<br />
Pedophile – preference for<br />
children. Collection will<br />
focus on children.<br />
Miscellaneous<br />
Media Reporters<br />
Morally Indiscriminate –<br />
this is a power / anger<br />
motivated SO with a<br />
history of violence.<br />
Sexually Indiscriminate –<br />
wide variety of sexual<br />
interest. Collection will be<br />
varied.<br />
Overzealous or concerned<br />
individuals<br />
Older “boyfriends”<br />
Profiteers –Profit<br />
motivated<br />
Latent – have potentially<br />
illegal, but latent sexual<br />
preferences.<br />
Pranksters<br />
FBI Study 10% FBI study 75% FBI Study 15%<br />
<strong>Parsons</strong>/ Honyara 2012 Lanning, 2001
• Periodically Prurient Offender<br />
• Fantasy Driven Offender<br />
• Direct Victimization Offender<br />
• Commercially Exploitation Offender<br />
Elliott and Beech 2009<br />
<strong>Parsons</strong>/ Honyara 2012
Recreational Users (80%)<br />
Discovery<br />
Sex Offenders<br />
Predisposed<br />
Lifelong<br />
Compulsives<br />
<strong>Parsons</strong>/ Honyara 2012
• Smallest group<br />
• Doesn’t fit traditional profile<br />
• “Clean” History (Sexual, Psychological, Family,<br />
etc.)<br />
• Often caught in sting operations<br />
KBSolutions.com<br />
<strong>Parsons</strong>/ Honyara 2012
• Internet triggers the tripwire<br />
• Internet sustains behavior<br />
• Good external controls<br />
• Reduced by Internet<br />
KBSolutions.com<br />
<strong>Parsons</strong>/ Honyara 2012
• Long term and persistent pattern of<br />
behavior<br />
• Begins pattern in early adolescence or earlier<br />
• Usually has a history of abuse<br />
• Ritualized and need driven behavior<br />
• Specific sexual interest<br />
• Has paraphilic preference/ may be multiple<br />
• Centers life around preferences<br />
<strong>Parsons</strong>/ Honyara 2012<br />
KBSolutions.com
Motivation to have sex with a child<br />
• Must want to have sex with a child because that is<br />
their sexual orientation; as a substitute; or to meet<br />
emotional needs.<br />
Overcome inhibitions<br />
• Sociopaths; denial; drugs / alcohol; high levels of<br />
stress; cognitive distortions, etc.<br />
Opportunity<br />
• Physical, emotional, or emotional separation<br />
Overcome resistance of the child<br />
• Grooming; physical force / fear; power /<br />
knowledge; need for attention, love, companionship<br />
Dr. David Finkelhor, Crimes Against Children Research Center<br />
<strong>Parsons</strong>/ Honyara 2012
• Very similar to contact offender grooming<br />
• Can range from seconds to months<br />
• Copies of chat can be very useful in<br />
supervision and treatment<br />
• Girls and boys between 14 – 17 are most likely<br />
to be groomed<br />
• University of Central Lancashire (England)<br />
identified five different stages of Internet<br />
Grooming<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Flattering a child<br />
into talking in a<br />
private chat room<br />
where they will be<br />
isolated. The child<br />
will often be asked<br />
for a non-sexual<br />
picture of themselves.<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Exclusivity<br />
• Sex Talk<br />
• Badguy: a/s/l<br />
• Victim: 12 f phila u<br />
• Badguy: 24 m dc<br />
• Victim: what u do<br />
• Badguy: trainer at a<br />
gym<br />
• Victim: do you have<br />
lots of<br />
muscles<br />
• Badguy: yes. I workout<br />
every day. Do<br />
u do sports<br />
• Victim: I play soccer<br />
not that good<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Flattering a child<br />
into talking in a<br />
private chat room<br />
where they will be<br />
isolated. The child<br />
will often be asked<br />
for a non-sexual<br />
picture of themselves.<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Exclusivity<br />
• Sex Talk<br />
• Badguy: why you say<br />
that sure u r<br />
good<br />
• Victim: I rarely get to<br />
play<br />
• Badguy: coach must not<br />
be good<br />
• Victim: he is mean and<br />
yells<br />
• Badguy: does not know<br />
how good u r<br />
• Victim: I am a little<br />
slow<br />
• Badguy: r u in shape do<br />
u have a pic<br />
• Victim: I will send<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Asking the child<br />
what problems they<br />
have to create an<br />
illusion of being their<br />
best friend.<br />
• Risk Assessment<br />
• Exclusivity<br />
• Sex Talk<br />
• Badguy: why do you think<br />
boys are jerks<br />
• Victim: all they do is<br />
tease people<br />
• Badguy: boys get better<br />
when older<br />
• Victim: you seem nice<br />
• Badguy: i was like them<br />
• Victim: I doubt it<br />
• Badguy: do u like any<br />
boys<br />
• Victim: kinda like this<br />
one<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Asking the child<br />
what problems they<br />
have to create an<br />
illusion of being their<br />
best friend.<br />
• Risk Assessment<br />
• Exclusivity<br />
• Sex Talk<br />
• Badguy: did u ever try to<br />
talk to him<br />
• Victim: no – he is dating<br />
my friend<br />
• Badguy: is she a good<br />
friend<br />
• Victim: yes, she is my bff<br />
• Badguy: have you ever<br />
told her<br />
• Victim: no – I don’t want<br />
to tell her<br />
• Badguy: a bff should be<br />
able to tell<br />
anything<br />
• Victim: I know<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Asking the child<br />
about the location of<br />
their computer and<br />
who else has access<br />
to it in order to<br />
assess the risk of<br />
being detected.<br />
• Exclusivity<br />
• Sex Talk<br />
• Badguy: how are ur<br />
parents<br />
• Victim: they r divorced<br />
• Badguy: sucks - who do<br />
u live with<br />
• Victim: mom – dad on<br />
weekends<br />
• Badguy: r they cool<br />
• Victim: dads k – mom<br />
a bitch<br />
• Badguy: do they know u<br />
chat<br />
• Victim: mom works<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Asking the child<br />
about the location of<br />
their computer and<br />
who else has access<br />
to it in order to<br />
assess the risk of<br />
being detected.<br />
• Exclusivity<br />
• Sex Talk<br />
• Badguy: what time she<br />
get home<br />
• Victim: around 6<br />
• Badguy: who watches u<br />
• Victim: home alone<br />
• Badguy: no bothers or<br />
sisters<br />
• Victim: older brother<br />
lives w dad<br />
• Badguy: does mom<br />
kick u off<br />
computer<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Exclusivity<br />
• Building up a sense of<br />
mutual love and trust<br />
with the child,<br />
suggesting they can<br />
discuss “anything”.<br />
• Sex Talk<br />
• Badguy: I like chatting<br />
with u<br />
• Victim: so do i<br />
• Badguy: do u chat with<br />
others<br />
• Victim: some<br />
• Badguy: who I<br />
thought I was<br />
your guy<br />
• Victim: u r<br />
• Badguy: always here 4<br />
u<br />
• Victim: I know<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Exclusivity<br />
• Building up a sense of<br />
mutual love and trust<br />
with the child,<br />
suggesting they can<br />
discuss “anything”.<br />
• Sex Talk<br />
• Badguy: how r u today<br />
• Victim: pissed at bff<br />
• Badguy: why<br />
• Victim: nothing<br />
• Badguy: u would tell<br />
me if u loved<br />
me<br />
• Victim: she was a<br />
bitch<br />
• Bad guy: what she do<br />
• Victim: told people a<br />
secret<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Exclusivity<br />
• Sex Talk<br />
• Engaging the child in<br />
explicit<br />
conversations and<br />
requesting sexually<br />
explicit pictures from<br />
them. At this stage<br />
the pedophile will<br />
usually try to arrange<br />
a meeting with the<br />
child.<br />
• Badguy: where a bra<br />
• Victim: sometimes<br />
• Badguy: what size<br />
• Victim: a <br />
• Badguy: sure they nice<br />
• Victim: not big like<br />
friends<br />
• Badguy: not big is ok<br />
• Victim: just saying<br />
that<br />
<strong>Parsons</strong>/ Honyara 2012
• Friendship<br />
• Forming a Relationship<br />
• Risk Assessment<br />
• Exclusivity<br />
• Sex Talk<br />
• Engaging the child in<br />
explicit<br />
conversations and<br />
requesting sexually<br />
explicit pictures from<br />
them. At this stage<br />
the pedophile will<br />
usually try to arrange<br />
a meeting with the<br />
child.<br />
• Badguy: I mean it – got<br />
a pic<br />
• Victim: of my boobs<br />
• Badguy: send a pic and<br />
I will tell u<br />
• Victim: not sure<br />
• Badguy: u can trust me<br />
• Victim: u r my bff – I<br />
feel so strange<br />
• Badguy: l will be<br />
honest<br />
• Victim: hold on<br />
<strong>Parsons</strong>/ Honyara 2012
• A/S/L/P<br />
• CUL<br />
• F2F<br />
• FYEO<br />
• ILU<br />
• KPC<br />
• LNK<br />
• NIFOC<br />
• PAW<br />
• WTGP<br />
• Age/Sex/Location/Picture<br />
• See you later<br />
• Face to face<br />
• For your eyes only<br />
• I love you<br />
• Keeping parents clueless<br />
• Love and kisses<br />
• Nude in front of computer<br />
• Parents are watching<br />
• Want to go private
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/Honyara 2011
<strong>Parsons</strong>/Honyara 2011
http://chatroulette.com/<br />
BE WARNED-YOU WILL SEE THINGS THAT<br />
YOU DO NOT WANT TO SEE!<br />
But…so you get a sense of what it is, I found an<br />
investigative report, that’s a bit less dirty…let’s<br />
watch!<br />
http://abcnews.go.com/GMA/video/talkstrangers-chat-roulette-9827740
The Internet…<br />
• Accessing someone’s<br />
computer directly<br />
• Operation Fair Play<br />
and Operation<br />
Roundup identified<br />
over 20 million IP<br />
addressed offering CP<br />
files<br />
• Accounts for 76% of<br />
the traffic on the<br />
internet<br />
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
Term Definition Term Definition<br />
Twinks<br />
Lolita<br />
R@Gold<br />
HC<br />
BL<br />
Family Fun<br />
Pubescent Boys<br />
Pubescent Girls<br />
Ray Gold’s Collection<br />
Hard Core<br />
Boy Love<br />
Incest<br />
Asparagus<br />
LL Collection<br />
MCLT<br />
PTHC<br />
D&D<br />
RBV<br />
Prepubescent Boys<br />
Lolita Love Collection<br />
My Collection of Lolita<br />
and Teens<br />
Pre-teen Hard Core<br />
Dads and Daughters<br />
Real Boy Videos<br />
<strong>Parsons</strong>/ Honyara 2012
• A 1962 film directed by Stanly<br />
Kubrick<br />
•Based on a novel written by Vladimir<br />
Nabokov<br />
•Plot:<br />
•A professor rents a room from a<br />
widowed mother after he meets<br />
her daughter who is nicknamed<br />
Lolita. In the book she is 9 years<br />
old. She is 14 in the movie.<br />
•He falls in love with Lolita and<br />
subsequently marries the mother.<br />
•The mother is hit by a car after<br />
she finds a diary detailing his<br />
feelings towards her daughter.<br />
•He takes her from hotel to hotel<br />
across the US and they start a<br />
sexual relationship.<br />
•She gets sick and subsequently<br />
leaves him.<br />
<strong>Parsons</strong>/Honyara 2011
• Invisible<br />
• Web Pages are not “visible” to web crawling<br />
programs<br />
• Underground “secret” content<br />
• Uses the Tor Network:<br />
▫ A network run by volunteers with the intention of<br />
maintaining users’ anonymity<br />
▫ *.onion instead of *.com<br />
▫ Regular browser can’t access the material<br />
▫ Bit coins are used 1 Bitcoin=$9
CHILD PORN
An assortment<br />
of drugs
A<br />
Hitman
What can you find on the “Deep<br />
Web”<br />
A Fake ID<br />
and much,<br />
much more!
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
• Technology is always changing<br />
• Software<br />
• Hardware<br />
• Officer / agent needs to have computer<br />
knowledge / ongoing training<br />
• Nothing works on everything<br />
• Time<br />
• Multiple computer access / wireless<br />
• Multiple users<br />
• Safety<br />
<strong>Parsons</strong>/ Honyara 2012
• Caseloads capped at 35 offenders.<br />
• Ongoing Training needed (including travel<br />
and per diem funding). Webinars should<br />
also be utilized.<br />
• Judicial (Judges) need to be trained.<br />
*Remote Computer Monitoring: Managing Sex Offenders’ Access to the Internet,<br />
By Richard LaMagna and Marc Berejka. The Journal of Offender Monitoring, 2009.<br />
<strong>Parsons</strong>/Honyara 2011
Ron Rossmeisl<br />
36 year old / male<br />
Talking Sexually with a 15 year<br />
old female on the Internet<br />
and attempted to set up a meeting.<br />
Father found out and called police.<br />
Arrested and Convicted:<br />
Sexual Abuse of Children<br />
5 years probation
• Lives alone<br />
• Into tattoos (at least 8<br />
total)<br />
• Into piercings<br />
(including 15 on<br />
penis)<br />
• Computer Specialist<br />
for Insurance<br />
Company<br />
<strong>Parsons</strong>/Honyara 2011
• Admits to offense, but states that it was only<br />
fantasy. He never wanted to actually have<br />
contact with female.<br />
• Sex Offender Unit (1x a week)<br />
• In Sex Offender Group Therapy<br />
• Regular polygraphs (all passed)<br />
• No problems noted accept house very<br />
cluttered. Repairs computers as a hobby.<br />
• Moved to general supervision in 2004<br />
<strong>Parsons</strong>/Honyara 2011
• Ron tells therapist that he received a letter in<br />
the mail asking if he wanted any child<br />
pornography. Ron thinks this is strange<br />
because he has never viewed child<br />
pornography.<br />
• Officer reads therapist’s notes and shows<br />
them to Supervisor.<br />
• Supervisor has officer call County<br />
Detectives since he feels that it appears to be<br />
Law Enforcement doing a “feeler” letter.<br />
<strong>Parsons</strong>/Honyara 2011
• County Detectives report that he has been<br />
chatting w/ undercover in adjoining county.<br />
• Screen names “ClosetFreakRon”; “pierced n<br />
tattoo”; and “athenashadow”<br />
• Has been unwilling to cross over to meeting<br />
with detectives.<br />
• They sent letter.<br />
• Based on information that APO provided, they<br />
were able to get search warrant.<br />
<strong>Parsons</strong>/Honyara 2011
• Chat w/ undercover detective: (12 yo<br />
female)<br />
• “you have a chest yet… nothing wrong<br />
with that…small is sexy to me…I would pay<br />
to see some small sexy ones…you’re a virgin<br />
and all right…ever flash…sorry it just<br />
sounds like you have a nice chest”<br />
• “ever think on giving a bj or being<br />
fingered…for 300 – could you put up with<br />
the pain if it did…like what if it was quick<br />
would you for 300 Like if it was no more<br />
than 5 minutes…would you”<br />
<strong>Parsons</strong>/Honyara 2011
• County<br />
Detectives w/<br />
Probation serve<br />
search warrant<br />
• Various items<br />
recovered,<br />
including 2<br />
computers and<br />
video tapes.<br />
<strong>Parsons</strong>/Honyara 2011
• Arrested and charged<br />
with Criminal<br />
Attempt to commit<br />
Corruption of Minors<br />
and Unlawful<br />
Communication w/<br />
Minor<br />
<strong>Parsons</strong>/Honyara 2011
• Video Tapes: Peeping Tom – videotaping<br />
neighbors, older teenagers getting dressed.<br />
• Computer: Various pornography, multiple<br />
fetishes, including child pornography (2<br />
year old)<br />
• Computer: Pictures of female teenagers (15<br />
year olds) in various stages of undress<br />
<strong>Parsons</strong>/Honyara 2011
• Admitted to online communication with<br />
minors. States he has never stopped doing the<br />
chats.<br />
• Admitted to viewing child pornography.<br />
• Admitted to taking pictures of teenage females.<br />
• Admitted to having sexual intercourse with<br />
one of the girls on two separate occasions.<br />
<strong>Parsons</strong>/Honyara 2011
• Plead and Stipulated<br />
• Combined sentence of<br />
3-6 years with a<br />
consecutive 4 year<br />
probation<br />
• SVP<br />
<strong>Parsons</strong>/Honyara 2011
Evidenced Based<br />
Practices<br />
Containment Model<br />
Risk Needs<br />
Responsivity<br />
Comprehensive<br />
Approaches to Sex<br />
Offender Management<br />
<strong>Parsons</strong>/ Honyara 2012
MEASURE RELEVANT PRACTICES<br />
Eight Guiding<br />
Principles for<br />
Risk/Recidivism<br />
Reduction<br />
ENGAGE ON-GOING<br />
SUPPORT IN COMM.<br />
INCREASE POSITIVE<br />
REINFORCEMENT<br />
SKILL TRAIN WITH<br />
DIRECTED PRACTICE<br />
TARGET<br />
INTERVENTION<br />
ENHANCE INTRINSIC<br />
MOTIVATION<br />
MEASUREMENT FEEDBACK<br />
RISK/NEED: ASSESS<br />
ACTUARIAL RISK<br />
<strong>Parsons</strong>/ Honyara 2012
Risk<br />
Needs<br />
Responsivity<br />
•Identify the offender’s risk<br />
level.<br />
•Match the level of services to<br />
this risk level.<br />
•Identify those changeable risk<br />
factors that are directly linked<br />
to the offending behavior.<br />
•Target these risk factors,<br />
called “criminogenic needs”.<br />
•Assess factors that will<br />
influence how the offender<br />
will respond<br />
•Match services to responsivity<br />
factors<br />
<strong>Parsons</strong>/ Honyara 2012
The Comprehensive Approach<br />
Investigation,<br />
Prosecution, and<br />
Disposition<br />
Registration and<br />
Notification<br />
Reentry<br />
Fundamental Principles<br />
Victim-centered<br />
Evidence-based<br />
Carried out by those with<br />
specialized knowledge<br />
Engaging of the public<br />
Collaborative<br />
Assessment<br />
Supervision<br />
Treatment<br />
<strong>Parsons</strong>/ Honyara 2012<br />
CSOM, 2004
A Comprehensive Approach to Sex Offenders:<br />
Focused on Victim and Community Safety<br />
Through the Internal and External Control of the<br />
Offender<br />
Supervision:<br />
Probation/Parole<br />
Agents --<br />
Monitor and limit<br />
activities<br />
Community:<br />
Law Enforcement;<br />
Polygrapher; and Offender’s<br />
Employer,<br />
Family, Friends<br />
Preventing the<br />
Sex<br />
Offender<br />
from committing<br />
future sexual<br />
assaults.<br />
<strong>Parsons</strong>/ Honyara 2012<br />
Specialized Sex Offender<br />
Treatment:<br />
Teaches self-control<br />
and reinforces<br />
accountability<br />
Victim Advocate:<br />
Assesses impact on<br />
victim(s) and potential<br />
victims
Assess<br />
External Controls<br />
Internal Controls<br />
Contain and Validate<br />
<strong>Parsons</strong>/ Honyara 2012
Assess<br />
<strong>Parsons</strong>/ Honyara 2012
• Information from investigation and arrest<br />
• Assessment of electronic media<br />
• Family, Friends, and Other Community<br />
Supports<br />
• Victim Advocate/ Victim<br />
• Assess Static, Dynamic, and Acute Factors<br />
<strong>Parsons</strong>/ Honyara 2012
• Read arrest reports<br />
• Talk with Investigating Officers<br />
• Get copy of the Chat<br />
• Use Questionnaire<br />
<strong>Parsons</strong>/ Honyara 2012
• For each questions, they check all that apply<br />
and they indicate which was primary.<br />
• What type of device did the offender use to<br />
store, trade, or view material<br />
• Computer, Cell Phone, Gaming, External, Other.<br />
• What type of media<br />
• Images, Video<br />
• Where did the offender obtain the material<br />
• E-mail, Chat, P2P, Self Produced, Newsgroups,<br />
Other.<br />
<strong>Parsons</strong>/ Honyara 2012
• Estimated number of Child Abusive Material<br />
• 1000<br />
• What percentage of the overall pornography was<br />
the illegal material<br />
• 75%<br />
• What age groups was represented in the illegal<br />
material<br />
•
• Type of images located (COPINE Scale)<br />
• Next slide<br />
• Were the child abusive material categorized<br />
into specific folders<br />
• If yes, explain<br />
• Did they alter any of the Child Abusive<br />
Material<br />
• If yes, explain<br />
• What other types of paraphilias were<br />
observed<br />
• Sadism; Bestiality; Voyeurism; Exhibitionism; other<br />
<strong>Parsons</strong>/ Honyara 2012
• Did the offender communicate with minors<br />
• If yes, explain<br />
• What were the offenders screen names or other<br />
identifying material<br />
• Do you have any suspicions of a hands-on<br />
victim<br />
• If yes, explain<br />
• Do you have any other concerns<br />
<strong>Parsons</strong>/ Honyara 2012
# Typology Description<br />
1 Indicative<br />
Pictures of children in underwear or bathing suites from normal sources but context or<br />
organization of pictures indicate inappropriateness<br />
2 Nudist<br />
Pictures of Naked children in nudist settings<br />
3 Erotica<br />
Photographs of children in safe areas showing either underwear or varying degrees of<br />
nakedness<br />
4 Posing<br />
Deliberately posed children (clothed or naked) that suggest sexual interest<br />
5 Erotic Posing<br />
Deliberately posed children (clothed or naked) in sexualized or provocative poses<br />
6 Explicit Erotic Posing<br />
Pictures emphasizing genital areas<br />
7 Explicit Sexual<br />
Activity<br />
Touching, self or mutual masturbation, oral sex, and intercourse of a child, not involving an<br />
adult<br />
8 Assault<br />
Child being subject to a sexual assault involving digital touching and an adult<br />
9 Gross Assault<br />
Pictures involve penetration, masturbation, oral sex with an adult<br />
10 Sadistic/Bestiality<br />
Child being bound, beaten or whipped or pictures of child involved with sexual act with an<br />
animal
• Interview Offender about any electronic media.<br />
• Search Electronic media<br />
• Electronic media incudes:<br />
• Computers<br />
• Tablets<br />
• Cell Phones<br />
• Gaming Counsels<br />
• Cameras<br />
• Plus anything else.<br />
<strong>Parsons</strong>/ Honyara 2012
• Do you have a computer<br />
• Does it have Internet access<br />
• Who else uses the computer<br />
• What do you usually do on the computer<br />
• How has using a computer helped you<br />
• How has using a computer caused problems in<br />
your life<br />
• What other computers have you used in the<br />
past<br />
• How else have you accessed the Internet<br />
<strong>Parsons</strong>/ Honyara 2012
• What type of sexual sites do you have<br />
bookmarked<br />
• How many hours a week do you spend on<br />
online for sexual pursuits<br />
• What type of sexual material / products have<br />
you paid for online<br />
• What different ways did you search or obtain<br />
sexual material online<br />
• How often have you participated in sexually<br />
related chats What chat rooms did you<br />
frequent<br />
<strong>Parsons</strong>/ Honyara 2012
• Who else knows about your sexual activity<br />
online Who have you hidden your activity<br />
from<br />
• How often do you masturbate while online<br />
• How often have you promised (yourself or<br />
others) to stop using the Internet<br />
• How often have you met someone in person<br />
that you met originally online<br />
• What type of problems has your sexual activity<br />
online caused you Relationships<br />
Employment<br />
<strong>Parsons</strong>/ Honyara 2012
• What types of sexual material have you posted or<br />
traded online<br />
• What ways have you hidden your sexual activity<br />
online<br />
• How often did you send pictures of yourself or use<br />
a webcam Nude<br />
• Who is on your buddy list<br />
• What are different ways that you have<br />
misrepresented yourself online<br />
• How has your online sexual behavior affected your<br />
offline sexuality<br />
<strong>Parsons</strong>/ Honyara 2012
• Do you have a cell phone<br />
• Does it have Internet/ texting/ ability to take<br />
pictures<br />
• What do you usually do on the cell phone<br />
• How has using a cell phone helped you<br />
• How has using a cell phone caused problems in<br />
your life<br />
• What type of things have you done sexually on<br />
the cellphone (including legal)<br />
<strong>Parsons</strong>/ Honyara 2012
• What kinds of games do you play (Role play,<br />
shooter, multiplayer games, etc.)<br />
• How many hours a week do you play<br />
• Do you talk to people about the games you<br />
play Do you play with friends at your house<br />
or at their house<br />
• Why do you think you have those types of<br />
games<br />
• Does gaming help you in any way (Stress)<br />
• Do you ever talk about your gaming in group<br />
<strong>Parsons</strong>/ Honyara 2012
• What gaming consoles do you have<br />
• Are the gamin consoles or handheld devices<br />
connected to the Internet<br />
• Do you use the gaming online networks<br />
• What are your screen names / game tags<br />
• Do you use the text-chat capabilities to talk with<br />
other players<br />
• Do you use the handset or chat/voice capabilities<br />
to talk with other players<br />
• Do you use cameras to video chat with other<br />
players<br />
<strong>Parsons</strong>/ Honyara 2012
• Has gaming ever caused issues in your life Do<br />
you have any concerns with a risk that it will<br />
lead to you violating probation<br />
• Have you used your gaming device to<br />
communicate with a minor Are there any<br />
minors on your buddy list<br />
• Have you ever used your device to store, view,<br />
or share pornography<br />
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/ Honyara 2012
Compliance Check<br />
Forensic Examination<br />
Why are you doing the search<br />
Do you think you are going to find anything<br />
What do you think you are going to find<br />
What do you plan to do if you find anything<br />
<strong>Parsons</strong>/Honyara 2011
• You are doing a non forensic search of a<br />
computer and you find CP.<br />
• Document what you are seeing and path<br />
• Pull the plug on machine<br />
• Document everything you did<br />
• Call LE contact / Bag-n- Tag<br />
<strong>Parsons</strong>/Honyara 2011
• Focus / concentration is on the computer<br />
• He/ she knows what is on the computer<br />
• “Just a sex offender” mentality<br />
• Serious consequences if you find something<br />
<strong>Parsons</strong>/Honyara 2011
• Many options available<br />
• Image Scan<br />
• Knoppix<br />
• SPADA<br />
• Pre-search<br />
• Marshall<br />
• Cofee<br />
• STOP<br />
• Field Search<br />
<strong>Parsons</strong>/Honyara 2011
• Aids in the assessment of risk and needs<br />
• Confirms other information received<br />
• Identifies past behavior and patterns<br />
• Identifies current behaviors and patterns<br />
• Assist in developing supervision and treatment<br />
targets<br />
• Assist is gauging supervision and treatment<br />
compliance and progress<br />
• Can identify violations or new criminal behavior<br />
• Some key red flags include…<br />
<strong>Parsons</strong>/ Honyara 2012
<strong>Parsons</strong>/Honyara 2011
<strong>Parsons</strong>/Honyara 2011
<strong>Parsons</strong>/Honyara 2011
<strong>Parsons</strong>/Honyara 2011
<strong>Parsons</strong>/Honyara 2011
<strong>Parsons</strong>/Honyara 2011
• “Eric sat on the floor and faced Geno making sure<br />
he wouldn’t see what was happening in case he<br />
woke up. I sat on his feet and studied the hair on<br />
his legs. I couldn’t believe that a 13 year old could<br />
have such hairy legs. I began licking his hair on<br />
his legs, moving my tongue all the way up his legs<br />
as far as I could go. I then removed his shorts and<br />
at the same time exposing his ….”<br />
<strong>Parsons</strong>/Honyara 2011
• Confirm information<br />
• Assess for other risks<br />
• Advise them of risks, triggers, conditions, etc.<br />
• Assess if they will support your supervision<br />
and containment.<br />
<strong>Parsons</strong>/ Honyara 2012
• Can be an incredible source of information<br />
including:<br />
• Cruising behavior<br />
• Grooming Behavior<br />
• Deviant sexual interest<br />
• Other Victims<br />
• Electronic Devices<br />
• Screen names/ gaming tags<br />
• Other Risks<br />
<strong>Parsons</strong>/ Honyara 2012
• More research is needed to establish if the same risk<br />
factors for offline apply to online sex offenders.<br />
• Initial research indicates that the some risk factors<br />
do apply<br />
• Some may not be relevant (i.e. stranger –vacquaintance)<br />
• Some may be unique (i.e. organized file system)<br />
• Some of the current risk instruments may work<br />
with this population, but there is currently no<br />
validated risk instrument that has been normed to<br />
this population.<br />
• University of Liverpool developed the Kent Internet<br />
Risk Assessment Tool (KIRAT) to assist police in<br />
targeting resources (May 2012).<br />
<strong>Parsons</strong>/ Honyara 2012<br />
Seto, Hanson, Babchishin<br />
December 2010
• Recommended that we look at the same risk<br />
factors as offline offenders to prioritize<br />
interventions:<br />
• Sexual Deviancy (e.g. pedophilia, sexual sadism)<br />
• Antisocial Orientation (e.g. psychopathy, antisocial<br />
attitudes, and beliefs)<br />
• Intimacy Deficits (e.g. poor social skills, emotional<br />
identification with children, loneliness)<br />
<strong>Parsons</strong>/ Honyara 2012<br />
Seto, Hanson, Babchishin<br />
December 2010
•Static<br />
• Unchangeable<br />
• Longer-term risk<br />
•Dynamic<br />
• Changeable<br />
• Shorter-term risk<br />
Dynamic<br />
Risk<br />
Factors<br />
Static<br />
Risk<br />
Factors<br />
Overall Risk Level<br />
<strong>Parsons</strong>/ Honyara 2012
Static<br />
unchangeable<br />
Dynamic<br />
changeable<br />
Non-Criminogenic<br />
not linked to offending<br />
Criminogenic<br />
closely linked to offending<br />
Acute<br />
rapidly changing<br />
Stable<br />
slowly changing<br />
<strong>Parsons</strong>/ Honyara 2012
Prior Sexual Offense<br />
Prior Hands-on Offense<br />
Grooming / Production<br />
Behaviors<br />
Care in building,<br />
maintaining, and<br />
categorizing their<br />
collection<br />
Treatment / Probation<br />
Failures<br />
Other Paraphilias<br />
<strong>Parsons</strong>/ Honyara 2012
Victim Access<br />
Sexual<br />
Preoccupation<br />
Sexual<br />
Attraction to<br />
Boys<br />
Relationship<br />
Instability/<br />
Dissatisfaction<br />
Impulsivity<br />
Emotional<br />
Regulation<br />
Problems<br />
Resistance to<br />
Treatment<br />
Intimacy and<br />
Social Skills<br />
Deficits<br />
<strong>Parsons</strong>/ Honyara 2012
• Age of offender<br />
• In a relationship<br />
• Number of images<br />
• Seriousness of images<br />
<strong>Parsons</strong>/ Honyara 2012
Assess Risk<br />
Develop External<br />
Controls<br />
<strong>Parsons</strong>/ Honyara 2012
• Specific sex offender rules and regulations for<br />
individuals with electronic media<br />
• Develop specific case plan based on risk<br />
assessment including approach goals<br />
• Monitor electronic media based on risk assessment<br />
• Random searches of electronic media based on risk<br />
assessment<br />
• Involve others to contain (treatment, family,<br />
friends, employers, polygraph, etc.)<br />
• Continue ongoing risk assessment<br />
<strong>Parsons</strong>/ Honyara 2012
Community<br />
Supports<br />
External Controls<br />
Internal Controls<br />
Computer<br />
Monitoring<br />
Treatment<br />
Computer<br />
Search<br />
Cognitive<br />
Behavioral<br />
Interventions<br />
Offender<br />
Accountability<br />
Cell Phone<br />
Polygraph<br />
Probation<br />
Parole<br />
Incarceration<br />
Gaming<br />
<strong>Parsons</strong>/ Honyara 2012
• Allows offenders to access Internet and develop<br />
responsible behaviors while in treatment and<br />
under supervision (skill practice)<br />
• Allows for graduated exposure to the Internet.<br />
• Allows them the opportunity to develop an<br />
understanding of their risky situations.<br />
• Allows treatment and probation to guide them<br />
through high risk situations.<br />
• Increases motivation for change.<br />
• The level of external controls (monitoring and<br />
searching) should be driven by the level of risk<br />
• Internet can actually reduce risk to reoffend<br />
<strong>Parsons</strong>/ Honyara 2012
• Encourages secret keeping<br />
• Avoidance is not an effective strategy<br />
• Social isolation / rejection<br />
• Loss of business or employment opportunities<br />
• Disconnect from the world<br />
• Unable to manage stress or boredom<br />
All can have an impact on Dynamic Risk Factors<br />
such as relationship stability, social rejection,<br />
loneliness, employment, etc.<br />
<strong>Parsons</strong>/ Honyara 2012
ACCEPTABLE<br />
• Specific purpose<br />
• Transparent<br />
• Healthy<br />
• Integrated with values<br />
• Integrated with society<br />
values<br />
NOT ACCEPTABLE<br />
• Minors likely to<br />
congregate<br />
• Social media<br />
• P2P<br />
• Web Cams<br />
<strong>Parsons</strong>/ Honyara 2012
• Denying Internet is less of a common practice.<br />
• To enforce the conditions of the Court.<br />
• There is a computer component to nearly every<br />
sexually motivated crime.<br />
• Although the Internet can be a resource for<br />
rehabilitation, it offers to satisfy the offenders’<br />
desires.<br />
• Monitoring provides a “window” into the<br />
offender’s mind that enhances overall<br />
supervision and containment.
Remote Monitoring-no risk to the officer<br />
Designed by Officers for Officers<br />
Exclusive to Probation/Parole/Pretrial<br />
Relationship w/ agency NOT offender<br />
Monitor offenders NOT kids or cheating spouses<br />
Technologies developed in-house<br />
Compliance with existing case law<br />
Partnership with officers<br />
Service and support
“the difference between real-time monitoring and a probation officer checking the<br />
log list at some later date at the user's house might have a potential impact on<br />
effective supervision because the latter option affords the user time and<br />
opportunity to circumvent the software.” – U.S. v. Balon, 2d Cir. 2004<br />
Real-time, Remote Monitoring:<br />
Provides officers with the ability intervene BEFORE a crime is<br />
committed, rather than a forensics after the fact<br />
Officers can identify high-risk activities before field visits and allocate<br />
resources based on information discovered<br />
Officers can review data from a remote and SAFE location<br />
Remote data capture prevents file manipulations and deletions<br />
With IPPC, Installs, Data Review, and Uninstalls can<br />
all be done from a REMOTE location
• Use Violation Controls to BLOCK words,<br />
categories, times of the day, and websites. Can<br />
be as controlled or open as you wish<br />
depending on the case. Can be changed at<br />
anytime.<br />
• Trigger R.I.S.K. and Screen Shots to highlight<br />
and take screen shots of specific words, sites, or<br />
applications. Use asterisks when appropriate<br />
and don’t over RISK broad words.
Let’s Log in
• IPPC generates weekly reports for officers each<br />
week to provide them with a snapshot of the<br />
internet activities of the monitored user.
Provides Leverage for Officers<br />
Installs are Controlled in the Field by Officers<br />
Installs Software to “Allow” or “Block” Internet<br />
Verifies Software Function (Check for Tampering)<br />
Extracts App Reports for “No Internet” Cases<br />
Manages and Controls Biometric Installations<br />
and serves an override device for biometric readers<br />
Note:<br />
• 2GB USB Device – Unlimited Use/1 year license<br />
• Open Toolkit Menu through My Computer (Run as<br />
Administrator)<br />
• Close Menu using the Safely Remove Hardware function<br />
• Check for updates on your IC Toolkit
Blocks Internet Access<br />
Sends Alerts on Communication<br />
Attempts to access the Internet<br />
Monitors Activities on the Machine<br />
Provides a No-Cost Alternative for Offenders<br />
The Internet Lockdown feature, available on the IC Toolkit, blocks<br />
all Internet communications regardless of how your offender attempts<br />
to connect to the Internet. This feature allows you to enforce “No-<br />
Internet” restrictions. You can now feel at ease that your offender is<br />
prevented from tapping into a neighbor’s unsecured wireless network<br />
or is using his laptop at an Internet café. Additionally, you can be<br />
immediately notified when your offender attempts to connect.
Helps Identify the Computer User<br />
Reduces the Likelihood of Account Sharing<br />
Provides Privacy for the Non-Supervised User<br />
Matches Data Points and Not Fingerprints<br />
The Biometric Integration feature, available as a plug-in to the IC Toolkit, adds<br />
another layer of verification and security to the existing technology by integrating a<br />
fingerprint scanner with the computer and Internet monitoring software. By using<br />
this feature, you can verify which user, accessing the monitored machine, was<br />
responsible for the Internet activity. For use with multi-user machines, such as in<br />
households and dormitories, it negates the “it wasn’t me” defense providing you<br />
with the assurance you need to present offender data to the courts. Additionally, it<br />
provides privacy protections for the non-supervised computer users by excluding<br />
their data from being monitored.
• No Camera: can’t take inappropriate pictures and store or<br />
transmit them;<br />
• No Internet : can’t browse or download inappropriate or<br />
illegal material;<br />
• Plans are fully managed by IPPC (NOT A WIRE TAP);<br />
• No Texting: can’t transmit or receive inappropriate or<br />
illegal material.<br />
T-Mobile Plan —$ 56.50/ month for unlimited minutes<br />
(includes taxes, fees, and surcharges)<br />
AT&T Plan—$79.50/month for unlimited minutes (includes<br />
taxes, fees, and surcharges)
Assess Risk<br />
Develop External<br />
Controls<br />
Develop Internal<br />
Controls<br />
<strong>Parsons</strong>/ Honyara 2012
Community<br />
Supports<br />
External Controls<br />
Internal Controls<br />
Computer<br />
Monitoring<br />
Treatment<br />
Computer<br />
Search<br />
Cognitive<br />
Behavioral<br />
Interventions<br />
Offender<br />
Accountability<br />
Cell Phone<br />
Polygraph<br />
Probation<br />
Parole<br />
Incarceration<br />
Gaming<br />
<strong>Parsons</strong>/ Honyara 2012
• Specific sex offender treatment<br />
• Take responsivity into account<br />
• Make your 15 minutes count<br />
• Offender accountability<br />
• Cognitive interventions<br />
• Develop protective factors / approach goals<br />
<strong>Parsons</strong>/ Honyara 2012
• Interventions should be delivered consistent<br />
with learning style<br />
• Many cyber sex offenders’ learning styles are more<br />
suited to visual, tactile or kinetic methods of<br />
learning.<br />
• They respond well to toys, film clips, books,<br />
music, diagrams, and movement.<br />
• How do you apply to probation<br />
Delmonico and Griffin<br />
<strong>Parsons</strong>/ Honyara 2012
• What are you doing to hold yourself<br />
accountable<br />
• How are you using the Internet Including<br />
times and how many hours.<br />
• How will I know your at risk of reoffending<br />
online<br />
• What are your high risk situations<br />
• Who do you chat / e-mail with How do you<br />
know them<br />
<strong>Parsons</strong>/ Honyara 2012
• Use assessment questions<br />
• Have them identify pro-social supportive<br />
individuals who are aware of their offense and<br />
that they can communicate with online.<br />
• Give them pro-social assignments, homework,<br />
assessments that they can do online.<br />
• Talk about what you are observing through the<br />
monitoring or from the search (issues and non<br />
issues)<br />
<strong>Parsons</strong>/ Honyara 2012
• Is it a SECRET<br />
• Anything that cannot pass public scrutiny will create the shame of<br />
a double life. Includes spouse, partner, significant others, and<br />
close friends.<br />
• Is it ABUSIVE to self or others<br />
• Anything that is exploitive or harmful to others or degrades<br />
oneself is unhealthy sexual behavior.<br />
• Is it used to avoid, or is it the source of, painful FEELINGS<br />
• If sexuality is used to alter moods or results in painful mood shifts,<br />
it is clearly unhealthy and maladaptive.<br />
• Is it EMPTY of a caring or committed relationship<br />
• Fundamental to the whole concept of healthy sexuality is the<br />
dimension of healthy human relationship and intimacy.<br />
• The SAFE Model can assist offenders in determining what is<br />
pro-social Internet behavior.<br />
<strong>Parsons</strong>/ Honyara 2012<br />
Sunset Psychological &<br />
Counseling Services
• Move computer (not in the bedroom / social area)<br />
and into high traffic area<br />
• Make environment/ screensavers more personal<br />
(family pictures or things that mean something to<br />
them)<br />
• Require screen names, email address identify who<br />
they are (No anonymity)<br />
• Have them maintain a log to monitor cycle<br />
(triggers for when the offend)<br />
• Use only when others are around (monitor visible)<br />
• Encourage positive computer usage and times<br />
• Develop internet health plan<br />
<strong>Parsons</strong>/ Honyara 2012<br />
(Delmonico and Griffin)
List behaviors that are always ok.<br />
List unhealthy internet<br />
activity (looking at certain<br />
types of images, times, sites,<br />
etc.)<br />
List behaviors that they are unsure<br />
of or ones that sometimes healthy<br />
and sometimes unhealthy (being<br />
alone, going on when bored, etc.)<br />
Delmonico and Griffin
• Long term stable employment<br />
• Relationships with co-workers and others<br />
acquaintances<br />
• Presence and use of adequate and<br />
appropriate social supports<br />
• Positive family relationships and support<br />
• Adequate and appropriate social skills<br />
• Healthy adult relationships<br />
<strong>Parsons</strong>/ Honyara 2012
• Justifying Offense Behavior<br />
• How did I know she was not over 18<br />
• Others do it<br />
• Misperceiving Consequences<br />
• There was no victims<br />
• It is just a picture<br />
• Devaluing and Blaming the Victim<br />
• She wanted to do it<br />
<strong>Parsons</strong>/ Honyara 2012
• [A] shadow... comes over her face if a stranger gives her<br />
an expected compliment. The pictures are still out<br />
there...<br />
• Now that she’s growing older and realizing the extent of<br />
the [I]nternet, she’s also beginning to grasp the darker<br />
side of the story— how many people see those same<br />
pictures as something to enjoy rather than abhor.<br />
• We have no way of knowing how many pedophiles used<br />
the pictures of her being tortured and degraded as an<br />
opportunity for personal gratification ...<br />
• I asked my daughter what she most wanted to ask of the<br />
judge. Her request: "Please, don’t let them pretend no<br />
one’s getting hurt."<br />
<strong>Parsons</strong>/Honyara 2011
Assess Risk<br />
Develop External Controls<br />
Develop Internal Controls<br />
Contain and Validate<br />
<strong>Parsons</strong>/ Honyara 2012
• Polygraph<br />
• Treatment<br />
• Police<br />
• Friends / Family<br />
• Community<br />
• Victim<br />
• Other offenders<br />
<strong>Parsons</strong>/Honyara 2011
• Since becoming an adult, have you had sexual<br />
contact with someone under the age of 18.<br />
• Since being placed on probation, have you<br />
viewed child pornography.<br />
• Since being placed on probation, have<br />
communicated electronically with a minor.<br />
• Since being placed on probation, have you<br />
accessed the internet on a unmonitored device.<br />
• Since being placed on probation, have you<br />
viewed images of pornography.<br />
<strong>Parsons</strong>/ Honyara 2012
• Verbal praise<br />
• Reduce filters or blocking<br />
• Increase allowable times<br />
• Approve special requests<br />
• Remove from electronic monitoring<br />
<strong>Parsons</strong>/ Honyara 2012
• Address in supervision<br />
• Refer information to treatment agency<br />
• Add filters and other internet controls<br />
• Utilize other sanctions<br />
• Add no computer condition<br />
• Pursue a violation of probation / parole<br />
• Pursue new criminal charges<br />
<strong>Parsons</strong>/ Honyara 2012
• Is no computer/ no Internet allowable<br />
• How will you handle cell phones Gaming<br />
Devices<br />
• Are you permitted to search<br />
• Which computers will you search<br />
• Who will do the searching and what tools will they use<br />
• When Do you need reasonable suspicion Stalking<br />
Horse<br />
• Does it matter who owns computer<br />
• What are you going to do if you find something Bag-ntag<br />
Who to call<br />
<strong>Parsons</strong>/ Honyara 2012
• Will you monitor computers<br />
• Who will you monitor<br />
• Multiple users<br />
• Work computers<br />
• How long<br />
• How often is data reviewed and to what extent<br />
• Will you restrict certain sites<br />
• Other filters / blocking<br />
<strong>Parsons</strong>/ Honyara 2012