01.01.2015 Views

Rick Parsons Julie Goldstein

Rick Parsons Julie Goldstein

Rick Parsons Julie Goldstein

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Rick</strong> <strong>Parsons</strong><br />

<strong>Julie</strong> <strong>Goldstein</strong><br />

<strong>Parsons</strong>/ Honyara 2012


This course involves topic<br />

matters, pictures, videos<br />

and language that may be<br />

offensive to some.<br />

<strong>Parsons</strong>/ Honyara 2012


• Prevalence<br />

• Demographics (Who and Why)<br />

• How they do it<br />

• Cyber Sex Offender Supervision Model<br />

• Legal and Policy Issues<br />

<strong>Parsons</strong>/ Honyara 2012


• The Internet and Cyber Sex Offenders are still a<br />

new phenomenon<br />

• We have very limited information about this<br />

population.<br />

• There has been some research done on this<br />

population and there are numerous ongoing<br />

studies.<br />

• The findings are generally ruled by<br />

discrepancies and many of the studies have<br />

small samples or other issues.<br />

<strong>Parsons</strong>/ Honyara 2012


Estimated 2.2 Billion<br />

Internet Users in the World<br />

(Miniwatts Marketing<br />

Group: 2012)<br />

Estimated that<br />

between 50 to 100<br />

thousand individuals<br />

are involved in<br />

organized child<br />

pornography rings<br />

worldwide (Jenkins<br />

2001)<br />

About 90% of<br />

Children in the USA<br />

use computers<br />

(National Center for<br />

Educational Studies:<br />

2001)<br />

<strong>Parsons</strong>/ Honyara 2012


• In 2006, it was estimated that there was 264 million<br />

sexually explicit web pages (12% of total pages /<br />

60% of web traffic)<br />

• 20% Child Pornography<br />

• Estimated 1 million pornographic images of<br />

children on the internet with 200 new images being<br />

posted daily (Wellard 2001).<br />

• 2,755 Internet Domains contain CP Images (Elliott<br />

et al., 2009)<br />

• Between January and March of 2012, NCMEC<br />

received 71,201 tips for child pornography and<br />

1,151 tips for online enticement of children for<br />

sexual acts. (NCMEC 2012)<br />

<strong>Parsons</strong>/ Honyara 2012


• 20 billion dollar industry<br />

• Majority are images of girls (COPINE)<br />

• Approximately half of the images are children<br />

under age 9 (COPINE)<br />

• 80% arrested had images depicting penetration<br />

(NJOV)<br />

• 20% arrested had images depicting violence<br />

(NJOV)<br />

• Average movie is 8 minutes long (Taylor)<br />

• 81% only one child victim (Taylor)<br />

<strong>Parsons</strong>/ Honyara 2012


• White Male<br />

• Mean age of 38 (18-77 years old)<br />

• Educated and Employed<br />

FBI<br />

<strong>Parsons</strong>/ Honyara 2012


• Many self identified pedophiles admit they<br />

use child pornography (Riegel 2004)<br />

• Some self identified pedophiles use legal<br />

child images (Howitt, 1995)<br />

• Some contact offenders possess child<br />

pornography (Seto et al 2006)<br />

• Some contact offenders admit using CP<br />

prior to having a contact offense (Wheeler<br />

1997)<br />

• CP is indicative of Pedophilia (Seto et al,<br />

2006)<br />

• CP alone does not increase risk for a handson<br />

offense (Webb et al, 2007)<br />

<strong>Parsons</strong>/ Honyara 2012


• Seto found 12% known history of<br />

contact offending (2011)<br />

• Another study showed 35% of those<br />

arrested were active abusers.<br />

• BOP study showed that possibly 85%<br />

had actual hands-on sexual offending.<br />

• Meta Analysis indicates about 55%<br />

(Seto, Hanson et al.)<br />

<strong>Parsons</strong>/ Honyara 2012


Ken Lanning<br />

<strong>Parsons</strong>/Honyara 2011


• CAM Only offenders reoffend less often than<br />

those with prior offenses (Eke & Seto)<br />

• 7% recidivate with new CAM or new sexual<br />

offense (Seto)<br />

<strong>Parsons</strong>/ Honyara 2012


• CP Offenders<br />

• More fantasy oriented<br />

• Fewer cognitive distortions<br />

• More victim empathy<br />

• Less likely to engage in anti-social behavior<br />

• Higher sexual deviancy<br />

• More accepting of person responsibility<br />

• Less likely to miss treatment<br />

• Less likely to fail in the community<br />

• Have greater self-control and more psychological barriers<br />

to acting on their deviant interests than offline offenders<br />

Babchishin et al., 2011<br />

Elliott et al., 2009<br />

Webb et al, 2007.<br />

<strong>Parsons</strong>/ Honyara 2012


Relationship of Abuser to Child Percentage of Identified Victims<br />

Parent 27%<br />

Other Relative 10%<br />

Neighbor/ Family Friend 24%<br />

Babysitter / Coach 4%<br />

Guardian’s Partner 4%<br />

Online Enticement 14%<br />

Self-produced 11%<br />

Victims of Prostitution 2%<br />

Unknown to Child 4%<br />

Source: NCMEC<br />

<strong>Parsons</strong>/ Honyara 2012<br />

69%


Why They Do It Varies:<br />

Factors That Influence the Development of Sexually<br />

Abusive Behavior<br />

Situational,<br />

circumstantial<br />

Individual,<br />

motivational<br />

Developmental,<br />

environmental<br />

Socio-cultural<br />

Biological


Biological<br />

Factors<br />

Social<br />

Learning<br />

Factors<br />

Typical<br />

Manifestations<br />

for Online<br />

Offenders<br />

• Genetic & Evolutionary<br />

• Social, cultural, and physical environment<br />

and our role within these<br />

• Failure in self regulation (behaviors and<br />

emotions)<br />

• Interpersonal problems (difficulty relating<br />

to others)<br />

• Antisocial Thinking<br />

• Deviant Sexual Interest or Arousal<br />

Ward and Beech


<strong>Parsons</strong>/ Honyara 2012


• Three Reasons that Criminals Like Computers:<br />

• Remoteness from Crime Site<br />

• Data Encryption<br />

• Anonymity<br />

<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


• Isolating – Easy to lose track of time,<br />

consequences, and real life relationships.<br />

• Interactive – Form pseudo relationships –<br />

approximate reality without risk of<br />

emotional vulnerability and intimacy. Fuels<br />

fantasy life.<br />

• Integral – Internet has become an integral<br />

part of life. Unable to avoid.<br />

• Imposing – A never ending supply of sexual<br />

material .<br />

• Inexpensive – From $0 to $40 a month one<br />

can access large amounts of sexual material.<br />

• Intoxicating – The above makes the internet<br />

intoxicating and difficult to resist.<br />

Multiplied since the reward is sex.<br />

<strong>Parsons</strong>/ Honyara 2012


• Create a permanent record for arousal and<br />

gratification<br />

• Lower children’s inhibitions<br />

• Validate and confirm the child sex offenders<br />

belief system<br />

• Blackmail victims and other co-offenders<br />

• Sell for profit or trade<br />

<strong>Parsons</strong>/ Honyara 2012


Type<br />

Features<br />

Browser<br />

Response to spam, accidental hit<br />

Private Fantasy Conscious creating of online text or images for private use<br />

Trawler<br />

Actively seeking CP using openly available browsers<br />

Non-secure Collector Actively seeking material often through P2P<br />

Secure Collector Actively seeking material through secure sites<br />

Groomer<br />

Cultivating an online relationship with children.<br />

Physical Abuser Abusing a child who may have been introduced online/<br />

Producer<br />

Records own abuse or that of others<br />

Distributer<br />

May distribute at any one of the above levels<br />

Krone, 2004<br />

<strong>Parsons</strong>/ Honyara 2012


Traders<br />

•Traffic and/or collect CP via digital media<br />

Travelers<br />

•Use the internet to manipulate and coerce<br />

children into meeting in person<br />

Traders-Travelers<br />

(Alexy et al., 2005)<br />

<strong>Parsons</strong>/ Honyara 2012


Situational<br />

“Normal” adolescent /<br />

adult – typical adolescent<br />

or curious male with<br />

newly found access to<br />

pornography<br />

Preferential<br />

Pedophile – preference for<br />

children. Collection will<br />

focus on children.<br />

Miscellaneous<br />

Media Reporters<br />

Morally Indiscriminate –<br />

this is a power / anger<br />

motivated SO with a<br />

history of violence.<br />

Sexually Indiscriminate –<br />

wide variety of sexual<br />

interest. Collection will be<br />

varied.<br />

Overzealous or concerned<br />

individuals<br />

Older “boyfriends”<br />

Profiteers –Profit<br />

motivated<br />

Latent – have potentially<br />

illegal, but latent sexual<br />

preferences.<br />

Pranksters<br />

FBI Study 10% FBI study 75% FBI Study 15%<br />

<strong>Parsons</strong>/ Honyara 2012 Lanning, 2001


• Periodically Prurient Offender<br />

• Fantasy Driven Offender<br />

• Direct Victimization Offender<br />

• Commercially Exploitation Offender<br />

Elliott and Beech 2009<br />

<strong>Parsons</strong>/ Honyara 2012


Recreational Users (80%)<br />

Discovery<br />

Sex Offenders<br />

Predisposed<br />

Lifelong<br />

Compulsives<br />

<strong>Parsons</strong>/ Honyara 2012


• Smallest group<br />

• Doesn’t fit traditional profile<br />

• “Clean” History (Sexual, Psychological, Family,<br />

etc.)<br />

• Often caught in sting operations<br />

KBSolutions.com<br />

<strong>Parsons</strong>/ Honyara 2012


• Internet triggers the tripwire<br />

• Internet sustains behavior<br />

• Good external controls<br />

• Reduced by Internet<br />

KBSolutions.com<br />

<strong>Parsons</strong>/ Honyara 2012


• Long term and persistent pattern of<br />

behavior<br />

• Begins pattern in early adolescence or earlier<br />

• Usually has a history of abuse<br />

• Ritualized and need driven behavior<br />

• Specific sexual interest<br />

• Has paraphilic preference/ may be multiple<br />

• Centers life around preferences<br />

<strong>Parsons</strong>/ Honyara 2012<br />

KBSolutions.com


Motivation to have sex with a child<br />

• Must want to have sex with a child because that is<br />

their sexual orientation; as a substitute; or to meet<br />

emotional needs.<br />

Overcome inhibitions<br />

• Sociopaths; denial; drugs / alcohol; high levels of<br />

stress; cognitive distortions, etc.<br />

Opportunity<br />

• Physical, emotional, or emotional separation<br />

Overcome resistance of the child<br />

• Grooming; physical force / fear; power /<br />

knowledge; need for attention, love, companionship<br />

Dr. David Finkelhor, Crimes Against Children Research Center<br />

<strong>Parsons</strong>/ Honyara 2012


• Very similar to contact offender grooming<br />

• Can range from seconds to months<br />

• Copies of chat can be very useful in<br />

supervision and treatment<br />

• Girls and boys between 14 – 17 are most likely<br />

to be groomed<br />

• University of Central Lancashire (England)<br />

identified five different stages of Internet<br />

Grooming<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Flattering a child<br />

into talking in a<br />

private chat room<br />

where they will be<br />

isolated. The child<br />

will often be asked<br />

for a non-sexual<br />

picture of themselves.<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Exclusivity<br />

• Sex Talk<br />

• Badguy: a/s/l<br />

• Victim: 12 f phila u<br />

• Badguy: 24 m dc<br />

• Victim: what u do<br />

• Badguy: trainer at a<br />

gym<br />

• Victim: do you have<br />

lots of<br />

muscles<br />

• Badguy: yes. I workout<br />

every day. Do<br />

u do sports<br />

• Victim: I play soccer<br />

not that good<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Flattering a child<br />

into talking in a<br />

private chat room<br />

where they will be<br />

isolated. The child<br />

will often be asked<br />

for a non-sexual<br />

picture of themselves.<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Exclusivity<br />

• Sex Talk<br />

• Badguy: why you say<br />

that sure u r<br />

good<br />

• Victim: I rarely get to<br />

play<br />

• Badguy: coach must not<br />

be good<br />

• Victim: he is mean and<br />

yells<br />

• Badguy: does not know<br />

how good u r<br />

• Victim: I am a little<br />

slow<br />

• Badguy: r u in shape do<br />

u have a pic<br />

• Victim: I will send<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Asking the child<br />

what problems they<br />

have to create an<br />

illusion of being their<br />

best friend.<br />

• Risk Assessment<br />

• Exclusivity<br />

• Sex Talk<br />

• Badguy: why do you think<br />

boys are jerks<br />

• Victim: all they do is<br />

tease people<br />

• Badguy: boys get better<br />

when older<br />

• Victim: you seem nice<br />

• Badguy: i was like them<br />

• Victim: I doubt it<br />

• Badguy: do u like any<br />

boys<br />

• Victim: kinda like this<br />

one<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Asking the child<br />

what problems they<br />

have to create an<br />

illusion of being their<br />

best friend.<br />

• Risk Assessment<br />

• Exclusivity<br />

• Sex Talk<br />

• Badguy: did u ever try to<br />

talk to him<br />

• Victim: no – he is dating<br />

my friend<br />

• Badguy: is she a good<br />

friend<br />

• Victim: yes, she is my bff<br />

• Badguy: have you ever<br />

told her<br />

• Victim: no – I don’t want<br />

to tell her<br />

• Badguy: a bff should be<br />

able to tell<br />

anything<br />

• Victim: I know<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Asking the child<br />

about the location of<br />

their computer and<br />

who else has access<br />

to it in order to<br />

assess the risk of<br />

being detected.<br />

• Exclusivity<br />

• Sex Talk<br />

• Badguy: how are ur<br />

parents<br />

• Victim: they r divorced<br />

• Badguy: sucks - who do<br />

u live with<br />

• Victim: mom – dad on<br />

weekends<br />

• Badguy: r they cool<br />

• Victim: dads k – mom<br />

a bitch<br />

• Badguy: do they know u<br />

chat<br />

• Victim: mom works<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Asking the child<br />

about the location of<br />

their computer and<br />

who else has access<br />

to it in order to<br />

assess the risk of<br />

being detected.<br />

• Exclusivity<br />

• Sex Talk<br />

• Badguy: what time she<br />

get home<br />

• Victim: around 6<br />

• Badguy: who watches u<br />

• Victim: home alone<br />

• Badguy: no bothers or<br />

sisters<br />

• Victim: older brother<br />

lives w dad<br />

• Badguy: does mom<br />

kick u off<br />

computer<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Exclusivity<br />

• Building up a sense of<br />

mutual love and trust<br />

with the child,<br />

suggesting they can<br />

discuss “anything”.<br />

• Sex Talk<br />

• Badguy: I like chatting<br />

with u<br />

• Victim: so do i<br />

• Badguy: do u chat with<br />

others<br />

• Victim: some<br />

• Badguy: who I<br />

thought I was<br />

your guy<br />

• Victim: u r<br />

• Badguy: always here 4<br />

u<br />

• Victim: I know<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Exclusivity<br />

• Building up a sense of<br />

mutual love and trust<br />

with the child,<br />

suggesting they can<br />

discuss “anything”.<br />

• Sex Talk<br />

• Badguy: how r u today<br />

• Victim: pissed at bff<br />

• Badguy: why<br />

• Victim: nothing<br />

• Badguy: u would tell<br />

me if u loved<br />

me<br />

• Victim: she was a<br />

bitch<br />

• Bad guy: what she do<br />

• Victim: told people a<br />

secret<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Exclusivity<br />

• Sex Talk<br />

• Engaging the child in<br />

explicit<br />

conversations and<br />

requesting sexually<br />

explicit pictures from<br />

them. At this stage<br />

the pedophile will<br />

usually try to arrange<br />

a meeting with the<br />

child.<br />

• Badguy: where a bra<br />

• Victim: sometimes<br />

• Badguy: what size<br />

• Victim: a <br />

• Badguy: sure they nice<br />

• Victim: not big like<br />

friends<br />

• Badguy: not big is ok<br />

• Victim: just saying<br />

that<br />

<strong>Parsons</strong>/ Honyara 2012


• Friendship<br />

• Forming a Relationship<br />

• Risk Assessment<br />

• Exclusivity<br />

• Sex Talk<br />

• Engaging the child in<br />

explicit<br />

conversations and<br />

requesting sexually<br />

explicit pictures from<br />

them. At this stage<br />

the pedophile will<br />

usually try to arrange<br />

a meeting with the<br />

child.<br />

• Badguy: I mean it – got<br />

a pic<br />

• Victim: of my boobs<br />

• Badguy: send a pic and<br />

I will tell u<br />

• Victim: not sure<br />

• Badguy: u can trust me<br />

• Victim: u r my bff – I<br />

feel so strange<br />

• Badguy: l will be<br />

honest<br />

• Victim: hold on<br />

<strong>Parsons</strong>/ Honyara 2012


• A/S/L/P<br />

• CUL<br />

• F2F<br />

• FYEO<br />

• ILU<br />

• KPC<br />

• LNK<br />

• NIFOC<br />

• PAW<br />

• WTGP<br />

• Age/Sex/Location/Picture<br />

• See you later<br />

• Face to face<br />

• For your eyes only<br />

• I love you<br />

• Keeping parents clueless<br />

• Love and kisses<br />

• Nude in front of computer<br />

• Parents are watching<br />

• Want to go private


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/Honyara 2011


<strong>Parsons</strong>/Honyara 2011


http://chatroulette.com/<br />

BE WARNED-YOU WILL SEE THINGS THAT<br />

YOU DO NOT WANT TO SEE!<br />

But…so you get a sense of what it is, I found an<br />

investigative report, that’s a bit less dirty…let’s<br />

watch!<br />

http://abcnews.go.com/GMA/video/talkstrangers-chat-roulette-9827740


The Internet…<br />

• Accessing someone’s<br />

computer directly<br />

• Operation Fair Play<br />

and Operation<br />

Roundup identified<br />

over 20 million IP<br />

addressed offering CP<br />

files<br />

• Accounts for 76% of<br />

the traffic on the<br />

internet<br />

<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


Term Definition Term Definition<br />

Twinks<br />

Lolita<br />

R@Gold<br />

HC<br />

BL<br />

Family Fun<br />

Pubescent Boys<br />

Pubescent Girls<br />

Ray Gold’s Collection<br />

Hard Core<br />

Boy Love<br />

Incest<br />

Asparagus<br />

LL Collection<br />

MCLT<br />

PTHC<br />

D&D<br />

RBV<br />

Prepubescent Boys<br />

Lolita Love Collection<br />

My Collection of Lolita<br />

and Teens<br />

Pre-teen Hard Core<br />

Dads and Daughters<br />

Real Boy Videos<br />

<strong>Parsons</strong>/ Honyara 2012


• A 1962 film directed by Stanly<br />

Kubrick<br />

•Based on a novel written by Vladimir<br />

Nabokov<br />

•Plot:<br />

•A professor rents a room from a<br />

widowed mother after he meets<br />

her daughter who is nicknamed<br />

Lolita. In the book she is 9 years<br />

old. She is 14 in the movie.<br />

•He falls in love with Lolita and<br />

subsequently marries the mother.<br />

•The mother is hit by a car after<br />

she finds a diary detailing his<br />

feelings towards her daughter.<br />

•He takes her from hotel to hotel<br />

across the US and they start a<br />

sexual relationship.<br />

•She gets sick and subsequently<br />

leaves him.<br />

<strong>Parsons</strong>/Honyara 2011


• Invisible<br />

• Web Pages are not “visible” to web crawling<br />

programs<br />

• Underground “secret” content<br />

• Uses the Tor Network:<br />

▫ A network run by volunteers with the intention of<br />

maintaining users’ anonymity<br />

▫ *.onion instead of *.com<br />

▫ Regular browser can’t access the material<br />

▫ Bit coins are used 1 Bitcoin=$9


CHILD PORN


An assortment<br />

of drugs


A<br />

Hitman


What can you find on the “Deep<br />

Web”<br />

A Fake ID<br />

and much,<br />

much more!


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


• Technology is always changing<br />

• Software<br />

• Hardware<br />

• Officer / agent needs to have computer<br />

knowledge / ongoing training<br />

• Nothing works on everything<br />

• Time<br />

• Multiple computer access / wireless<br />

• Multiple users<br />

• Safety<br />

<strong>Parsons</strong>/ Honyara 2012


• Caseloads capped at 35 offenders.<br />

• Ongoing Training needed (including travel<br />

and per diem funding). Webinars should<br />

also be utilized.<br />

• Judicial (Judges) need to be trained.<br />

*Remote Computer Monitoring: Managing Sex Offenders’ Access to the Internet,<br />

By Richard LaMagna and Marc Berejka. The Journal of Offender Monitoring, 2009.<br />

<strong>Parsons</strong>/Honyara 2011


Ron Rossmeisl<br />

36 year old / male<br />

Talking Sexually with a 15 year<br />

old female on the Internet<br />

and attempted to set up a meeting.<br />

Father found out and called police.<br />

Arrested and Convicted:<br />

Sexual Abuse of Children<br />

5 years probation


• Lives alone<br />

• Into tattoos (at least 8<br />

total)<br />

• Into piercings<br />

(including 15 on<br />

penis)<br />

• Computer Specialist<br />

for Insurance<br />

Company<br />

<strong>Parsons</strong>/Honyara 2011


• Admits to offense, but states that it was only<br />

fantasy. He never wanted to actually have<br />

contact with female.<br />

• Sex Offender Unit (1x a week)<br />

• In Sex Offender Group Therapy<br />

• Regular polygraphs (all passed)<br />

• No problems noted accept house very<br />

cluttered. Repairs computers as a hobby.<br />

• Moved to general supervision in 2004<br />

<strong>Parsons</strong>/Honyara 2011


• Ron tells therapist that he received a letter in<br />

the mail asking if he wanted any child<br />

pornography. Ron thinks this is strange<br />

because he has never viewed child<br />

pornography.<br />

• Officer reads therapist’s notes and shows<br />

them to Supervisor.<br />

• Supervisor has officer call County<br />

Detectives since he feels that it appears to be<br />

Law Enforcement doing a “feeler” letter.<br />

<strong>Parsons</strong>/Honyara 2011


• County Detectives report that he has been<br />

chatting w/ undercover in adjoining county.<br />

• Screen names “ClosetFreakRon”; “pierced n<br />

tattoo”; and “athenashadow”<br />

• Has been unwilling to cross over to meeting<br />

with detectives.<br />

• They sent letter.<br />

• Based on information that APO provided, they<br />

were able to get search warrant.<br />

<strong>Parsons</strong>/Honyara 2011


• Chat w/ undercover detective: (12 yo<br />

female)<br />

• “you have a chest yet… nothing wrong<br />

with that…small is sexy to me…I would pay<br />

to see some small sexy ones…you’re a virgin<br />

and all right…ever flash…sorry it just<br />

sounds like you have a nice chest”<br />

• “ever think on giving a bj or being<br />

fingered…for 300 – could you put up with<br />

the pain if it did…like what if it was quick<br />

would you for 300 Like if it was no more<br />

than 5 minutes…would you”<br />

<strong>Parsons</strong>/Honyara 2011


• County<br />

Detectives w/<br />

Probation serve<br />

search warrant<br />

• Various items<br />

recovered,<br />

including 2<br />

computers and<br />

video tapes.<br />

<strong>Parsons</strong>/Honyara 2011


• Arrested and charged<br />

with Criminal<br />

Attempt to commit<br />

Corruption of Minors<br />

and Unlawful<br />

Communication w/<br />

Minor<br />

<strong>Parsons</strong>/Honyara 2011


• Video Tapes: Peeping Tom – videotaping<br />

neighbors, older teenagers getting dressed.<br />

• Computer: Various pornography, multiple<br />

fetishes, including child pornography (2<br />

year old)<br />

• Computer: Pictures of female teenagers (15<br />

year olds) in various stages of undress<br />

<strong>Parsons</strong>/Honyara 2011


• Admitted to online communication with<br />

minors. States he has never stopped doing the<br />

chats.<br />

• Admitted to viewing child pornography.<br />

• Admitted to taking pictures of teenage females.<br />

• Admitted to having sexual intercourse with<br />

one of the girls on two separate occasions.<br />

<strong>Parsons</strong>/Honyara 2011


• Plead and Stipulated<br />

• Combined sentence of<br />

3-6 years with a<br />

consecutive 4 year<br />

probation<br />

• SVP<br />

<strong>Parsons</strong>/Honyara 2011


Evidenced Based<br />

Practices<br />

Containment Model<br />

Risk Needs<br />

Responsivity<br />

Comprehensive<br />

Approaches to Sex<br />

Offender Management<br />

<strong>Parsons</strong>/ Honyara 2012


MEASURE RELEVANT PRACTICES<br />

Eight Guiding<br />

Principles for<br />

Risk/Recidivism<br />

Reduction<br />

ENGAGE ON-GOING<br />

SUPPORT IN COMM.<br />

INCREASE POSITIVE<br />

REINFORCEMENT<br />

SKILL TRAIN WITH<br />

DIRECTED PRACTICE<br />

TARGET<br />

INTERVENTION<br />

ENHANCE INTRINSIC<br />

MOTIVATION<br />

MEASUREMENT FEEDBACK<br />

RISK/NEED: ASSESS<br />

ACTUARIAL RISK<br />

<strong>Parsons</strong>/ Honyara 2012


Risk<br />

Needs<br />

Responsivity<br />

•Identify the offender’s risk<br />

level.<br />

•Match the level of services to<br />

this risk level.<br />

•Identify those changeable risk<br />

factors that are directly linked<br />

to the offending behavior.<br />

•Target these risk factors,<br />

called “criminogenic needs”.<br />

•Assess factors that will<br />

influence how the offender<br />

will respond<br />

•Match services to responsivity<br />

factors<br />

<strong>Parsons</strong>/ Honyara 2012


The Comprehensive Approach<br />

Investigation,<br />

Prosecution, and<br />

Disposition<br />

Registration and<br />

Notification<br />

Reentry<br />

Fundamental Principles<br />

Victim-centered<br />

Evidence-based<br />

Carried out by those with<br />

specialized knowledge<br />

Engaging of the public<br />

Collaborative<br />

Assessment<br />

Supervision<br />

Treatment<br />

<strong>Parsons</strong>/ Honyara 2012<br />

CSOM, 2004


A Comprehensive Approach to Sex Offenders:<br />

Focused on Victim and Community Safety<br />

Through the Internal and External Control of the<br />

Offender<br />

Supervision:<br />

Probation/Parole<br />

Agents --<br />

Monitor and limit<br />

activities<br />

Community:<br />

Law Enforcement;<br />

Polygrapher; and Offender’s<br />

Employer,<br />

Family, Friends<br />

Preventing the<br />

Sex<br />

Offender<br />

from committing<br />

future sexual<br />

assaults.<br />

<strong>Parsons</strong>/ Honyara 2012<br />

Specialized Sex Offender<br />

Treatment:<br />

Teaches self-control<br />

and reinforces<br />

accountability<br />

Victim Advocate:<br />

Assesses impact on<br />

victim(s) and potential<br />

victims


Assess<br />

External Controls<br />

Internal Controls<br />

Contain and Validate<br />

<strong>Parsons</strong>/ Honyara 2012


Assess<br />

<strong>Parsons</strong>/ Honyara 2012


• Information from investigation and arrest<br />

• Assessment of electronic media<br />

• Family, Friends, and Other Community<br />

Supports<br />

• Victim Advocate/ Victim<br />

• Assess Static, Dynamic, and Acute Factors<br />

<strong>Parsons</strong>/ Honyara 2012


• Read arrest reports<br />

• Talk with Investigating Officers<br />

• Get copy of the Chat<br />

• Use Questionnaire<br />

<strong>Parsons</strong>/ Honyara 2012


• For each questions, they check all that apply<br />

and they indicate which was primary.<br />

• What type of device did the offender use to<br />

store, trade, or view material<br />

• Computer, Cell Phone, Gaming, External, Other.<br />

• What type of media<br />

• Images, Video<br />

• Where did the offender obtain the material<br />

• E-mail, Chat, P2P, Self Produced, Newsgroups,<br />

Other.<br />

<strong>Parsons</strong>/ Honyara 2012


• Estimated number of Child Abusive Material<br />

• 1000<br />

• What percentage of the overall pornography was<br />

the illegal material<br />

• 75%<br />

• What age groups was represented in the illegal<br />

material<br />


• Type of images located (COPINE Scale)<br />

• Next slide<br />

• Were the child abusive material categorized<br />

into specific folders<br />

• If yes, explain<br />

• Did they alter any of the Child Abusive<br />

Material<br />

• If yes, explain<br />

• What other types of paraphilias were<br />

observed<br />

• Sadism; Bestiality; Voyeurism; Exhibitionism; other<br />

<strong>Parsons</strong>/ Honyara 2012


• Did the offender communicate with minors<br />

• If yes, explain<br />

• What were the offenders screen names or other<br />

identifying material<br />

• Do you have any suspicions of a hands-on<br />

victim<br />

• If yes, explain<br />

• Do you have any other concerns<br />

<strong>Parsons</strong>/ Honyara 2012


# Typology Description<br />

1 Indicative<br />

Pictures of children in underwear or bathing suites from normal sources but context or<br />

organization of pictures indicate inappropriateness<br />

2 Nudist<br />

Pictures of Naked children in nudist settings<br />

3 Erotica<br />

Photographs of children in safe areas showing either underwear or varying degrees of<br />

nakedness<br />

4 Posing<br />

Deliberately posed children (clothed or naked) that suggest sexual interest<br />

5 Erotic Posing<br />

Deliberately posed children (clothed or naked) in sexualized or provocative poses<br />

6 Explicit Erotic Posing<br />

Pictures emphasizing genital areas<br />

7 Explicit Sexual<br />

Activity<br />

Touching, self or mutual masturbation, oral sex, and intercourse of a child, not involving an<br />

adult<br />

8 Assault<br />

Child being subject to a sexual assault involving digital touching and an adult<br />

9 Gross Assault<br />

Pictures involve penetration, masturbation, oral sex with an adult<br />

10 Sadistic/Bestiality<br />

Child being bound, beaten or whipped or pictures of child involved with sexual act with an<br />

animal


• Interview Offender about any electronic media.<br />

• Search Electronic media<br />

• Electronic media incudes:<br />

• Computers<br />

• Tablets<br />

• Cell Phones<br />

• Gaming Counsels<br />

• Cameras<br />

• Plus anything else.<br />

<strong>Parsons</strong>/ Honyara 2012


• Do you have a computer<br />

• Does it have Internet access<br />

• Who else uses the computer<br />

• What do you usually do on the computer<br />

• How has using a computer helped you<br />

• How has using a computer caused problems in<br />

your life<br />

• What other computers have you used in the<br />

past<br />

• How else have you accessed the Internet<br />

<strong>Parsons</strong>/ Honyara 2012


• What type of sexual sites do you have<br />

bookmarked<br />

• How many hours a week do you spend on<br />

online for sexual pursuits<br />

• What type of sexual material / products have<br />

you paid for online<br />

• What different ways did you search or obtain<br />

sexual material online<br />

• How often have you participated in sexually<br />

related chats What chat rooms did you<br />

frequent<br />

<strong>Parsons</strong>/ Honyara 2012


• Who else knows about your sexual activity<br />

online Who have you hidden your activity<br />

from<br />

• How often do you masturbate while online<br />

• How often have you promised (yourself or<br />

others) to stop using the Internet<br />

• How often have you met someone in person<br />

that you met originally online<br />

• What type of problems has your sexual activity<br />

online caused you Relationships<br />

Employment<br />

<strong>Parsons</strong>/ Honyara 2012


• What types of sexual material have you posted or<br />

traded online<br />

• What ways have you hidden your sexual activity<br />

online<br />

• How often did you send pictures of yourself or use<br />

a webcam Nude<br />

• Who is on your buddy list<br />

• What are different ways that you have<br />

misrepresented yourself online<br />

• How has your online sexual behavior affected your<br />

offline sexuality<br />

<strong>Parsons</strong>/ Honyara 2012


• Do you have a cell phone<br />

• Does it have Internet/ texting/ ability to take<br />

pictures<br />

• What do you usually do on the cell phone<br />

• How has using a cell phone helped you<br />

• How has using a cell phone caused problems in<br />

your life<br />

• What type of things have you done sexually on<br />

the cellphone (including legal)<br />

<strong>Parsons</strong>/ Honyara 2012


• What kinds of games do you play (Role play,<br />

shooter, multiplayer games, etc.)<br />

• How many hours a week do you play<br />

• Do you talk to people about the games you<br />

play Do you play with friends at your house<br />

or at their house<br />

• Why do you think you have those types of<br />

games<br />

• Does gaming help you in any way (Stress)<br />

• Do you ever talk about your gaming in group<br />

<strong>Parsons</strong>/ Honyara 2012


• What gaming consoles do you have<br />

• Are the gamin consoles or handheld devices<br />

connected to the Internet<br />

• Do you use the gaming online networks<br />

• What are your screen names / game tags<br />

• Do you use the text-chat capabilities to talk with<br />

other players<br />

• Do you use the handset or chat/voice capabilities<br />

to talk with other players<br />

• Do you use cameras to video chat with other<br />

players<br />

<strong>Parsons</strong>/ Honyara 2012


• Has gaming ever caused issues in your life Do<br />

you have any concerns with a risk that it will<br />

lead to you violating probation<br />

• Have you used your gaming device to<br />

communicate with a minor Are there any<br />

minors on your buddy list<br />

• Have you ever used your device to store, view,<br />

or share pornography<br />

<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/ Honyara 2012


Compliance Check<br />

Forensic Examination<br />

Why are you doing the search<br />

Do you think you are going to find anything<br />

What do you think you are going to find<br />

What do you plan to do if you find anything<br />

<strong>Parsons</strong>/Honyara 2011


• You are doing a non forensic search of a<br />

computer and you find CP.<br />

• Document what you are seeing and path<br />

• Pull the plug on machine<br />

• Document everything you did<br />

• Call LE contact / Bag-n- Tag<br />

<strong>Parsons</strong>/Honyara 2011


• Focus / concentration is on the computer<br />

• He/ she knows what is on the computer<br />

• “Just a sex offender” mentality<br />

• Serious consequences if you find something<br />

<strong>Parsons</strong>/Honyara 2011


• Many options available<br />

• Image Scan<br />

• Knoppix<br />

• SPADA<br />

• Pre-search<br />

• Marshall<br />

• Cofee<br />

• STOP<br />

• Field Search<br />

<strong>Parsons</strong>/Honyara 2011


• Aids in the assessment of risk and needs<br />

• Confirms other information received<br />

• Identifies past behavior and patterns<br />

• Identifies current behaviors and patterns<br />

• Assist in developing supervision and treatment<br />

targets<br />

• Assist is gauging supervision and treatment<br />

compliance and progress<br />

• Can identify violations or new criminal behavior<br />

• Some key red flags include…<br />

<strong>Parsons</strong>/ Honyara 2012


<strong>Parsons</strong>/Honyara 2011


<strong>Parsons</strong>/Honyara 2011


<strong>Parsons</strong>/Honyara 2011


<strong>Parsons</strong>/Honyara 2011


<strong>Parsons</strong>/Honyara 2011


<strong>Parsons</strong>/Honyara 2011


• “Eric sat on the floor and faced Geno making sure<br />

he wouldn’t see what was happening in case he<br />

woke up. I sat on his feet and studied the hair on<br />

his legs. I couldn’t believe that a 13 year old could<br />

have such hairy legs. I began licking his hair on<br />

his legs, moving my tongue all the way up his legs<br />

as far as I could go. I then removed his shorts and<br />

at the same time exposing his ….”<br />

<strong>Parsons</strong>/Honyara 2011


• Confirm information<br />

• Assess for other risks<br />

• Advise them of risks, triggers, conditions, etc.<br />

• Assess if they will support your supervision<br />

and containment.<br />

<strong>Parsons</strong>/ Honyara 2012


• Can be an incredible source of information<br />

including:<br />

• Cruising behavior<br />

• Grooming Behavior<br />

• Deviant sexual interest<br />

• Other Victims<br />

• Electronic Devices<br />

• Screen names/ gaming tags<br />

• Other Risks<br />

<strong>Parsons</strong>/ Honyara 2012


• More research is needed to establish if the same risk<br />

factors for offline apply to online sex offenders.<br />

• Initial research indicates that the some risk factors<br />

do apply<br />

• Some may not be relevant (i.e. stranger –vacquaintance)<br />

• Some may be unique (i.e. organized file system)<br />

• Some of the current risk instruments may work<br />

with this population, but there is currently no<br />

validated risk instrument that has been normed to<br />

this population.<br />

• University of Liverpool developed the Kent Internet<br />

Risk Assessment Tool (KIRAT) to assist police in<br />

targeting resources (May 2012).<br />

<strong>Parsons</strong>/ Honyara 2012<br />

Seto, Hanson, Babchishin<br />

December 2010


• Recommended that we look at the same risk<br />

factors as offline offenders to prioritize<br />

interventions:<br />

• Sexual Deviancy (e.g. pedophilia, sexual sadism)<br />

• Antisocial Orientation (e.g. psychopathy, antisocial<br />

attitudes, and beliefs)<br />

• Intimacy Deficits (e.g. poor social skills, emotional<br />

identification with children, loneliness)<br />

<strong>Parsons</strong>/ Honyara 2012<br />

Seto, Hanson, Babchishin<br />

December 2010


•Static<br />

• Unchangeable<br />

• Longer-term risk<br />

•Dynamic<br />

• Changeable<br />

• Shorter-term risk<br />

Dynamic<br />

Risk<br />

Factors<br />

Static<br />

Risk<br />

Factors<br />

Overall Risk Level<br />

<strong>Parsons</strong>/ Honyara 2012


Static<br />

unchangeable<br />

Dynamic<br />

changeable<br />

Non-Criminogenic<br />

not linked to offending<br />

Criminogenic<br />

closely linked to offending<br />

Acute<br />

rapidly changing<br />

Stable<br />

slowly changing<br />

<strong>Parsons</strong>/ Honyara 2012


Prior Sexual Offense<br />

Prior Hands-on Offense<br />

Grooming / Production<br />

Behaviors<br />

Care in building,<br />

maintaining, and<br />

categorizing their<br />

collection<br />

Treatment / Probation<br />

Failures<br />

Other Paraphilias<br />

<strong>Parsons</strong>/ Honyara 2012


Victim Access<br />

Sexual<br />

Preoccupation<br />

Sexual<br />

Attraction to<br />

Boys<br />

Relationship<br />

Instability/<br />

Dissatisfaction<br />

Impulsivity<br />

Emotional<br />

Regulation<br />

Problems<br />

Resistance to<br />

Treatment<br />

Intimacy and<br />

Social Skills<br />

Deficits<br />

<strong>Parsons</strong>/ Honyara 2012


• Age of offender<br />

• In a relationship<br />

• Number of images<br />

• Seriousness of images<br />

<strong>Parsons</strong>/ Honyara 2012


Assess Risk<br />

Develop External<br />

Controls<br />

<strong>Parsons</strong>/ Honyara 2012


• Specific sex offender rules and regulations for<br />

individuals with electronic media<br />

• Develop specific case plan based on risk<br />

assessment including approach goals<br />

• Monitor electronic media based on risk assessment<br />

• Random searches of electronic media based on risk<br />

assessment<br />

• Involve others to contain (treatment, family,<br />

friends, employers, polygraph, etc.)<br />

• Continue ongoing risk assessment<br />

<strong>Parsons</strong>/ Honyara 2012


Community<br />

Supports<br />

External Controls<br />

Internal Controls<br />

Computer<br />

Monitoring<br />

Treatment<br />

Computer<br />

Search<br />

Cognitive<br />

Behavioral<br />

Interventions<br />

Offender<br />

Accountability<br />

Cell Phone<br />

Polygraph<br />

Probation<br />

Parole<br />

Incarceration<br />

Gaming<br />

<strong>Parsons</strong>/ Honyara 2012


• Allows offenders to access Internet and develop<br />

responsible behaviors while in treatment and<br />

under supervision (skill practice)<br />

• Allows for graduated exposure to the Internet.<br />

• Allows them the opportunity to develop an<br />

understanding of their risky situations.<br />

• Allows treatment and probation to guide them<br />

through high risk situations.<br />

• Increases motivation for change.<br />

• The level of external controls (monitoring and<br />

searching) should be driven by the level of risk<br />

• Internet can actually reduce risk to reoffend<br />

<strong>Parsons</strong>/ Honyara 2012


• Encourages secret keeping<br />

• Avoidance is not an effective strategy<br />

• Social isolation / rejection<br />

• Loss of business or employment opportunities<br />

• Disconnect from the world<br />

• Unable to manage stress or boredom<br />

All can have an impact on Dynamic Risk Factors<br />

such as relationship stability, social rejection,<br />

loneliness, employment, etc.<br />

<strong>Parsons</strong>/ Honyara 2012


ACCEPTABLE<br />

• Specific purpose<br />

• Transparent<br />

• Healthy<br />

• Integrated with values<br />

• Integrated with society<br />

values<br />

NOT ACCEPTABLE<br />

• Minors likely to<br />

congregate<br />

• Social media<br />

• P2P<br />

• Web Cams<br />

<strong>Parsons</strong>/ Honyara 2012


• Denying Internet is less of a common practice.<br />

• To enforce the conditions of the Court.<br />

• There is a computer component to nearly every<br />

sexually motivated crime.<br />

• Although the Internet can be a resource for<br />

rehabilitation, it offers to satisfy the offenders’<br />

desires.<br />

• Monitoring provides a “window” into the<br />

offender’s mind that enhances overall<br />

supervision and containment.


Remote Monitoring-no risk to the officer<br />

Designed by Officers for Officers<br />

Exclusive to Probation/Parole/Pretrial<br />

Relationship w/ agency NOT offender<br />

Monitor offenders NOT kids or cheating spouses<br />

Technologies developed in-house<br />

Compliance with existing case law<br />

Partnership with officers<br />

Service and support


“the difference between real-time monitoring and a probation officer checking the<br />

log list at some later date at the user's house might have a potential impact on<br />

effective supervision because the latter option affords the user time and<br />

opportunity to circumvent the software.” – U.S. v. Balon, 2d Cir. 2004<br />

Real-time, Remote Monitoring:<br />

Provides officers with the ability intervene BEFORE a crime is<br />

committed, rather than a forensics after the fact<br />

Officers can identify high-risk activities before field visits and allocate<br />

resources based on information discovered<br />

Officers can review data from a remote and SAFE location<br />

Remote data capture prevents file manipulations and deletions<br />

With IPPC, Installs, Data Review, and Uninstalls can<br />

all be done from a REMOTE location


• Use Violation Controls to BLOCK words,<br />

categories, times of the day, and websites. Can<br />

be as controlled or open as you wish<br />

depending on the case. Can be changed at<br />

anytime.<br />

• Trigger R.I.S.K. and Screen Shots to highlight<br />

and take screen shots of specific words, sites, or<br />

applications. Use asterisks when appropriate<br />

and don’t over RISK broad words.


Let’s Log in


• IPPC generates weekly reports for officers each<br />

week to provide them with a snapshot of the<br />

internet activities of the monitored user.


Provides Leverage for Officers<br />

Installs are Controlled in the Field by Officers<br />

Installs Software to “Allow” or “Block” Internet<br />

Verifies Software Function (Check for Tampering)<br />

Extracts App Reports for “No Internet” Cases<br />

Manages and Controls Biometric Installations<br />

and serves an override device for biometric readers<br />

Note:<br />

• 2GB USB Device – Unlimited Use/1 year license<br />

• Open Toolkit Menu through My Computer (Run as<br />

Administrator)<br />

• Close Menu using the Safely Remove Hardware function<br />

• Check for updates on your IC Toolkit


Blocks Internet Access<br />

Sends Alerts on Communication<br />

Attempts to access the Internet<br />

Monitors Activities on the Machine<br />

Provides a No-Cost Alternative for Offenders<br />

The Internet Lockdown feature, available on the IC Toolkit, blocks<br />

all Internet communications regardless of how your offender attempts<br />

to connect to the Internet. This feature allows you to enforce “No-<br />

Internet” restrictions. You can now feel at ease that your offender is<br />

prevented from tapping into a neighbor’s unsecured wireless network<br />

or is using his laptop at an Internet café. Additionally, you can be<br />

immediately notified when your offender attempts to connect.


Helps Identify the Computer User<br />

Reduces the Likelihood of Account Sharing<br />

Provides Privacy for the Non-Supervised User<br />

Matches Data Points and Not Fingerprints<br />

The Biometric Integration feature, available as a plug-in to the IC Toolkit, adds<br />

another layer of verification and security to the existing technology by integrating a<br />

fingerprint scanner with the computer and Internet monitoring software. By using<br />

this feature, you can verify which user, accessing the monitored machine, was<br />

responsible for the Internet activity. For use with multi-user machines, such as in<br />

households and dormitories, it negates the “it wasn’t me” defense providing you<br />

with the assurance you need to present offender data to the courts. Additionally, it<br />

provides privacy protections for the non-supervised computer users by excluding<br />

their data from being monitored.


• No Camera: can’t take inappropriate pictures and store or<br />

transmit them;<br />

• No Internet : can’t browse or download inappropriate or<br />

illegal material;<br />

• Plans are fully managed by IPPC (NOT A WIRE TAP);<br />

• No Texting: can’t transmit or receive inappropriate or<br />

illegal material.<br />

T-Mobile Plan —$ 56.50/ month for unlimited minutes<br />

(includes taxes, fees, and surcharges)<br />

AT&T Plan—$79.50/month for unlimited minutes (includes<br />

taxes, fees, and surcharges)


Assess Risk<br />

Develop External<br />

Controls<br />

Develop Internal<br />

Controls<br />

<strong>Parsons</strong>/ Honyara 2012


Community<br />

Supports<br />

External Controls<br />

Internal Controls<br />

Computer<br />

Monitoring<br />

Treatment<br />

Computer<br />

Search<br />

Cognitive<br />

Behavioral<br />

Interventions<br />

Offender<br />

Accountability<br />

Cell Phone<br />

Polygraph<br />

Probation<br />

Parole<br />

Incarceration<br />

Gaming<br />

<strong>Parsons</strong>/ Honyara 2012


• Specific sex offender treatment<br />

• Take responsivity into account<br />

• Make your 15 minutes count<br />

• Offender accountability<br />

• Cognitive interventions<br />

• Develop protective factors / approach goals<br />

<strong>Parsons</strong>/ Honyara 2012


• Interventions should be delivered consistent<br />

with learning style<br />

• Many cyber sex offenders’ learning styles are more<br />

suited to visual, tactile or kinetic methods of<br />

learning.<br />

• They respond well to toys, film clips, books,<br />

music, diagrams, and movement.<br />

• How do you apply to probation<br />

Delmonico and Griffin<br />

<strong>Parsons</strong>/ Honyara 2012


• What are you doing to hold yourself<br />

accountable<br />

• How are you using the Internet Including<br />

times and how many hours.<br />

• How will I know your at risk of reoffending<br />

online<br />

• What are your high risk situations<br />

• Who do you chat / e-mail with How do you<br />

know them<br />

<strong>Parsons</strong>/ Honyara 2012


• Use assessment questions<br />

• Have them identify pro-social supportive<br />

individuals who are aware of their offense and<br />

that they can communicate with online.<br />

• Give them pro-social assignments, homework,<br />

assessments that they can do online.<br />

• Talk about what you are observing through the<br />

monitoring or from the search (issues and non<br />

issues)<br />

<strong>Parsons</strong>/ Honyara 2012


• Is it a SECRET<br />

• Anything that cannot pass public scrutiny will create the shame of<br />

a double life. Includes spouse, partner, significant others, and<br />

close friends.<br />

• Is it ABUSIVE to self or others<br />

• Anything that is exploitive or harmful to others or degrades<br />

oneself is unhealthy sexual behavior.<br />

• Is it used to avoid, or is it the source of, painful FEELINGS<br />

• If sexuality is used to alter moods or results in painful mood shifts,<br />

it is clearly unhealthy and maladaptive.<br />

• Is it EMPTY of a caring or committed relationship<br />

• Fundamental to the whole concept of healthy sexuality is the<br />

dimension of healthy human relationship and intimacy.<br />

• The SAFE Model can assist offenders in determining what is<br />

pro-social Internet behavior.<br />

<strong>Parsons</strong>/ Honyara 2012<br />

Sunset Psychological &<br />

Counseling Services


• Move computer (not in the bedroom / social area)<br />

and into high traffic area<br />

• Make environment/ screensavers more personal<br />

(family pictures or things that mean something to<br />

them)<br />

• Require screen names, email address identify who<br />

they are (No anonymity)<br />

• Have them maintain a log to monitor cycle<br />

(triggers for when the offend)<br />

• Use only when others are around (monitor visible)<br />

• Encourage positive computer usage and times<br />

• Develop internet health plan<br />

<strong>Parsons</strong>/ Honyara 2012<br />

(Delmonico and Griffin)


List behaviors that are always ok.<br />

List unhealthy internet<br />

activity (looking at certain<br />

types of images, times, sites,<br />

etc.)<br />

List behaviors that they are unsure<br />

of or ones that sometimes healthy<br />

and sometimes unhealthy (being<br />

alone, going on when bored, etc.)<br />

Delmonico and Griffin


• Long term stable employment<br />

• Relationships with co-workers and others<br />

acquaintances<br />

• Presence and use of adequate and<br />

appropriate social supports<br />

• Positive family relationships and support<br />

• Adequate and appropriate social skills<br />

• Healthy adult relationships<br />

<strong>Parsons</strong>/ Honyara 2012


• Justifying Offense Behavior<br />

• How did I know she was not over 18<br />

• Others do it<br />

• Misperceiving Consequences<br />

• There was no victims<br />

• It is just a picture<br />

• Devaluing and Blaming the Victim<br />

• She wanted to do it<br />

<strong>Parsons</strong>/ Honyara 2012


• [A] shadow... comes over her face if a stranger gives her<br />

an expected compliment. The pictures are still out<br />

there...<br />

• Now that she’s growing older and realizing the extent of<br />

the [I]nternet, she’s also beginning to grasp the darker<br />

side of the story— how many people see those same<br />

pictures as something to enjoy rather than abhor.<br />

• We have no way of knowing how many pedophiles used<br />

the pictures of her being tortured and degraded as an<br />

opportunity for personal gratification ...<br />

• I asked my daughter what she most wanted to ask of the<br />

judge. Her request: "Please, don’t let them pretend no<br />

one’s getting hurt."<br />

<strong>Parsons</strong>/Honyara 2011


Assess Risk<br />

Develop External Controls<br />

Develop Internal Controls<br />

Contain and Validate<br />

<strong>Parsons</strong>/ Honyara 2012


• Polygraph<br />

• Treatment<br />

• Police<br />

• Friends / Family<br />

• Community<br />

• Victim<br />

• Other offenders<br />

<strong>Parsons</strong>/Honyara 2011


• Since becoming an adult, have you had sexual<br />

contact with someone under the age of 18.<br />

• Since being placed on probation, have you<br />

viewed child pornography.<br />

• Since being placed on probation, have<br />

communicated electronically with a minor.<br />

• Since being placed on probation, have you<br />

accessed the internet on a unmonitored device.<br />

• Since being placed on probation, have you<br />

viewed images of pornography.<br />

<strong>Parsons</strong>/ Honyara 2012


• Verbal praise<br />

• Reduce filters or blocking<br />

• Increase allowable times<br />

• Approve special requests<br />

• Remove from electronic monitoring<br />

<strong>Parsons</strong>/ Honyara 2012


• Address in supervision<br />

• Refer information to treatment agency<br />

• Add filters and other internet controls<br />

• Utilize other sanctions<br />

• Add no computer condition<br />

• Pursue a violation of probation / parole<br />

• Pursue new criminal charges<br />

<strong>Parsons</strong>/ Honyara 2012


• Is no computer/ no Internet allowable<br />

• How will you handle cell phones Gaming<br />

Devices<br />

• Are you permitted to search<br />

• Which computers will you search<br />

• Who will do the searching and what tools will they use<br />

• When Do you need reasonable suspicion Stalking<br />

Horse<br />

• Does it matter who owns computer<br />

• What are you going to do if you find something Bag-ntag<br />

Who to call<br />

<strong>Parsons</strong>/ Honyara 2012


• Will you monitor computers<br />

• Who will you monitor<br />

• Multiple users<br />

• Work computers<br />

• How long<br />

• How often is data reviewed and to what extent<br />

• Will you restrict certain sites<br />

• Other filters / blocking<br />

<strong>Parsons</strong>/ Honyara 2012

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!