Escolar Documentos
Profissional Documentos
Cultura Documentos
e20
ORIGINAL ARTICLE
JANIS WOLAK, J.D., DAVID FINKELHOR, Ph.D., AND KIMBERLY MITCHELL, Ph.D.
Figure 1. Description of N-JOV stratified national sample and dispositions of mail survey. *Eleven agencies (1%) were ineligible because they lacked
jurisdiction to investigate Internet sex crimes against minors. These were mostly small towns that relied on county or other agencies to conduct criminal
investigations. **Fifty-four agencies (⬍ 1%) were ineligible because they lacked jurisdiction to investigate Internet sex crimes against minors.
adapted version of the “total design” mail survey cases. (The term “identified” victims denotes victims
methodology [10]. We used first class mail to send that were identified and contacted by law enforce-
surveys, personalized cover letters, and business ment in the course of the investigation.) For agencies
reply envelopes to the heads of the agencies in the with between 4 and 15 cases, approximately half of
sample. Then, at intervals of between 2 and 4 weeks, the cases that did not have identified victims were
we sent reminder postcards, followed by second and randomly selected for follow-up interviews. In agen-
third mailings of the survey to the heads of agencies cies that reported more than 15 cases, approximately
that had not responded. The overall response rate one-quarter of the cases with no identified victims
was 88% (see Figure 1). were randomly selected. In some agencies, we could
not find out which cases had identified victims, so
we sampled from all cases, using the sampling
Phase 2 Telephone Interview Sample procedure described above.
In response to the mail survey, 385 agencies reported Telephone interviewers contacted and obtained
a total of 1723 cases ending in arrests involving consent from a key investigator or otherwise
Internet sex crimes against minors. The second phase knowledgeable person for each case. Six trained
consisted of interviews with law enforcement inves- interviewers completed 630 detailed telephone in-
tigators to gather information about case, offender, terviews between October 2001 and July 2002. Of
and victim characteristics. the 1723 cases reported by law enforcement in
We designed a sampling procedure that took into response to the mail survey, 37% were not selected
account the number of cases reported by an agency, for the sample; and 16% of cases were ineligible
so we would not unduly burden respondents in (see Table 1). Ineligible sampled cases were not
agencies with many cases. If an agency reported replaced in the sample because one study goal was
between one and three Internet-related cases, we to estimate annual numbers of arrests, for which
conducted follow-up interviews for every case. we used statistical weighting procedures that re-
Eighty-five percent of the responding agencies were quired nonreplacement. The original 630 com-
in this group. For agencies that reported more than pleted interviews were reduced to 612 cases after
three cases, we conducted interviews for all cases we determined that 18 interviews duplicated other
that involved identified victims and sampled other completed interviews.
424.e14 WOLAK ET AL JOURNAL OF ADOLESCENT HEALTH Vol. 35, No. 5
Subsample Used in this Study The Phase 2 telephone interview instrument con-
Internet sex crimes against minors include a di- sisted of multiple sections, some of which were used
verse range of offenses [11]. The group examined in each interview and others whose use depended on
in this article comprises Internet-initiated cases, the facts of the case. In the interviews about Internet-
defined as cases in which offenders met identified initiated cases, a Preliminary Section screened cases
victims online (n ⫽ 129). Seventy-three percent of for eligibility, an Online Meeting Section collected
these Internet-initiated offenses were completed information about the Internet-initiated crime, and
crimes involving sexual assault or the production Offender and Victim Sections gathered data about
of child pornography. The remaining offenses the demographic, family, emotional, and behavioral
were attempted crimes. We refer to the alleged characteristics of the offender and victim. The inter-
perpetrators as “offenders,” however, not all were view included over 130 questions, many with sub-
convicted. At the time of data collection, 77% of questions, but the numbers of questions used varied
offenders had pled guilty or been convicted; considerably based on the facts of each case. Most
charges had been dropped against 4% and case interviews took between 30 and 45 minutes to com-
outcomes were pending or unknown against 19%. plete.
The interviewers attended a 2-day training session
led by the researchers that provided extensive details
about the background, purpose, and instrumentation
Instrumentation of the study, and they participated in a series of
The mail survey instrument asked if respondent practice and pilot interviews. The two chief research-
agencies had made any arrests between July 1, 2000 ers reviewed the data collection regularly to monitor
and June 30, 2001 for crimes that involved the for consistency.
attempted or completed sexual exploitation of a The study was conducted with the approval of the
minor in which the offender and victim first met on University of New Hampshire Institutional Review
the Internet. It also screened for other types of Board and complied with confidentiality regulations
Internet-related sex crimes. If respondents had such mandated for research funded by the U.S. Depart-
cases, we asked them to list the case numbers and the ment of Justice.
names of the investigating officers for each case they
reported. The survey took about 5 minutes to com-
plete for agencies that had no cases to report, but Variables
completion time varied for agencies with relevant We asked respondents to describe victims in terms of
cases. gender, age, race, household income and educational
November 2004 INTERNET-INITIATED SEX CRIMES 424.e15
level, and type of community. When we established rooms included sites oriented to teens, to specific
that a crime involved a victim who met an offender geographic locations, to dating and romance, to gays,
over the Internet, we asked respondents a series of and in a few cases, to sexual encounters between
questions about the characteristics and dynamics of adults and minors. Offenders who met victims on-
the crime, including offender characteristics; how the line in venues other than chat rooms appeared to use
victim and offender met online; whether the offender profiles posted by victims. One offender targeted his
was deceptive about age, sexual motives or other victim by searching profiles for the word “flirt.”
aspects of identity; whether a face-to-face meeting Another found a victim’s birth date in her profile and
took place; what illegal acts occurred; whether the sent her an electronic birthday card to initiate the
crime involved coercion or force; the nature of any acquaintance.
bond between offender and victim, and other details. Most offenders took time to develop relationships
with victims. Sixty-four percent communicated on-
line with victims for more than 1 month. Most cases
Statistical Analysis evolved into multiple forms of contact, including
Four weights were constructed to reflect the complex more than one kind of online interaction. Seventy-
sample design. First, each case was given a sampling nine percent included telephone conversations; 48%
weight to account for the probability of selection in of offenders sent pictures online to victims; and 47%
both the mail survey and telephone interview sam- sent or offered gifts or money. Gifts ranged from
ples. The sampling weights were adjusted for agency small tokens like jewelry and teddy bears to items
nonresponse, case level nonresponse, duplication of like clothing, cell phones, and digital cameras. Inves-
cases among agencies, and for arrests by one federal tigators described victims in half of the cases as being
agency that did not participate in case level inter- in love with or having feelings of close friendship
views. Second, primary sampling unit weights were toward offenders.
created to account for clustering within each of the
three sampling frames. Third, stratification weights
The Role of Deception
were computed based on the different sampling
strategies for each frame. Finally, finite population Although most of the offenders were much older
correction factors accounted for the sampling being than their victims, deception about these large age
conducted without replacing ineligible cases. We differences was a rare feature of these crimes. Only
conducted weighted descriptive analyses using In- 5% of offenders represented themselves online as
tercooled STATA 7.0 statistical software (StataCorp, peers of victims by claiming they were age 17 or
College Station, TX). younger. In some of these cases, the offenders started
off saying they were teens, but later introduced that
they were older. Another 25% of offenders shaved a
Results few years off their true ages, but still presented
themselves as much older than their young targets.
Demographic Characteristics of Victims and
For example, men who were 45 told victims they
Offenders
were 35.
Victims in Internet-initiated cases were predomi- Deception about sexual motives was also uncom-
nantly young teens (see Table 2). Seventy-six percent mon. Although 21% of offenders hid or misrepre-
were between 13 and 15 years old; 1% was age 12; sented their motives, most of these deceivers were
none were younger than 12; 75% of victims were open about wanting sex from their victims. Accord-
girls. ing to respondent investigators, most misrepresenta-
Ninety-nine percent of offenders were male. Al- tions involved insincere promises of love and ro-
most all of the cases with male victims involved male mance. However, some cases involved more
offenders. The offenders were much older than their fundamental deceptions. A few offenders posed as
victims; 76% were age 26 or older; 47% were more “friends” and then assaulted their victims, and a
than 20 years older than their victims. small number devised more elaborate ploys, for
example luring girls by claiming to run modeling or
casting agencies. Nonetheless, most offenders openly
Where and How Online Relationships Arose sexually solicited victims. Eighty percent brought up
Most first encounters between offenders and victims sexual topics during online communications with
(76%) happened in online chat rooms. The chat victims. Twenty percent engaged in cybersex with
424.e16 WOLAK ET AL JOURNAL OF ADOLESCENT HEALTH Vol. 35, No. 5
photography ranged from nude Polaroid pictures to because in most cases they had communicated exten-
hidden cameras secretly recording an offender’s sex sively with victims, both online and off before they
acts with a victim. In some cases, offenders con- actually met in person. Offenders used these interac-
vinced victims to take sexually explicit pictures of tions to establish romantic or otherwise close rela-
themselves or friends for the benefit of the offender. tionships before they first met victims face-to-face.
In summary, most Internet-initiated sex crimes
involved teenagers too young to consent to sexual
intercourse that were described by respondents as in Implications for Prevention
love with or close to the offenders they had met These dynamics have important implications for
online. These were nonforcible crimes, committed by prevention. Current prevention materials about In-
men who were much older than their victims. The ternet safety emphasize the dangers of deception.
victims knew they were interacting with adults who They stress that adolescents should not trust people
were interested in them sexually. The length and they meet online and urge them to avoid meeting
variety of communications and multiple face-to-face strangers and giving out personal information on-
meetings in most cases indicate that many victims line. Although these may be useful messages to
viewed their interactions with much older adult prevent some forms of victimization, they do not
offenders as desired relationships. address the dynamics of the Internet sexual exploi-
tation found in a majority of actual cases.
Discussion The data suggest that a major challenge for pre-
vention is the population of young teens who are
Confronting an Inaccurate Stereotype willing to enter into voluntary sexual relationships
The prevalent image of Internet sex crimes against with adults whom they meet online. This is a reality
minors is of strangers who are pedophiles and who that health and prevention educators, law enforce-
deceive and lure unsuspecting children, frequently ment officials and parents may be reluctant to con-
over long distances, into situations where they can be front. But effective prevention requires public and
forcibly abducted or sexually assaulted. However, private acknowledgment of what actually happens
this nationally representative sample of Internet- in these cases.
initiated cases known to law enforcement suggests a
different predominant scenario with different impli-
cations for prevention. Education and Awareness
First, the offenders in these crimes do not appear Appropriate prevention messages can be targeted to
to be pedophiles. Pedophilia is a sexual deviation the general audience of adolescents [13]. One avenue
involving sexual attraction to prepubescent children is to educate teenagers directly about why such
[12]. The victims in these cases were young adoles- relationships are a bad idea. Young teens may not be
cents. Ninety-nine percent were age 13 to 17, and fully aware that the adults in these relationships are
none were younger than 12. committing crimes and can go to jail. They have
Second, although they undoubtedly manipulated probably not considered the publicity, embarrass-
juveniles in a variety of ways, the offenders in these ment, and life disruption likely to accompany a
Internet-initiated crimes did not generally deceive public revelation of such a relationship. They may
victims about being older adults who were interested benefit from understanding the manipulations that
in sexual relationships. Victims usually knew this adult offenders engage in, and from understanding
before their first face-to-face encounters with offend- that adults who care about their well-being would
ers. not propose sexual relationships or involve them in
Third, with a few frightening and dangerous risky encounters. They should be informed of why
exceptions, the majority of offenders did not use such romances end quickly, even when not discov-
force or coercion to sexually abuse their victims and ered, and how frequently the offenders have other
did not abduct them. Victims, who were predomi- partners. They should know that corresponding with
nantly young teenagers, typically agreed to meet adults trolling for teenage partners can encourage
these adults, knowing of their sexual interest. They offenders and endanger other youth, even when
engaged in sexual intercourse, or other sexual activ- relationships are confined to the Internet. They need
ity, with the adults, often on multiple occasions. to be told bluntly that any sexual pictures they pose
Fourth, it is misleading to characterize the offend- for may end up on the Internet or as evidence in a
ers in these cases as “strangers” to their victims, courtroom.
November 2004 INTERNET-INITIATED SEX CRIMES 424.e19
This aspect of adolescent sexual behavior has adults online who initiate sexual relationships in the
implications for parents and professionals, too. In guise of helping teens sort out these issues. Better
addition to monitoring for unhealthy online relation- efforts to direct young people to trustworthy sources of
ships with adults, parents and professionals working help from physicians, school personnel, mental health
with children need to discuss the reality and inad- agencies, and support organizations may forestall
visability of these relationships. Because one quarter some of these offenses.
of the victims were 13-year-olds, these discussions
need to start in earliest adolescence. “Compliant” or “statutory” victims. Moreover, those
who provide services to adolescent victims need to
understand that their clients may view these relation-
Vulnerable Populations ships quite differently than law enforcement, mental
Poor relationships with parents. Some adolescents health practitioners, and other adults. Some practitio-
may be particularly susceptible to Internet overtures ners and law enforcement investigators have begun to
from adults looking for young sexual partners. Ad- pay more specific attention to adolescent victims of
olescent girls who report a high degree of conflict Internet-initiated and other nonforcible or statutory sex
with their parents, boys who report low parental crimes [14,15]. These victims, sometimes referred to as
monitoring, and adolescents of both sexes who are “compliant” or “statutory victims,” may actively coop-
troubled with depression and related problems are erate with offenders and develop strong sexual and
more likely than other youth to form close online emotional attachments to them. These youth may not
relationships with people they meet online [7]. These see themselves as victims and may resist cooperating
youth may constitute a susceptible population. Con- with investigators. Traditional medical and mental
sequently, prevention efforts must account for the health protocols for handling child sexual abuse vic-
fact that some of the most vulnerable adolescents tims may not prepare practitioners to deal with adoles-
may be estranged from their parents or have parents cents who are victims of nonforcible sex crimes. Train-
who are not monitoring their behavior. In these ing and protocols should be reviewed to assure that
cases, prevention education could be aimed at those adolescent victims are treated appropriately and
that may assume roles of confidant. For example, compassionately.
teens involved in these relationships may confide in
friends. Prevention educators should urge young
people to protect their friends by revealing these
relationships, when necessary. Limitations
First, because most sex crimes against minors are
Loneliness and depression. Also, practitioners en-
never reported to the police [16 –18] and many of
gaged in efforts to identify and treat depressed
those known to law enforcement do not culminate in
adolescents need to be aware that some depressed
arrest [19], this sample cannot be said to represent
youth may be turning to the Internet to ameliorate
the characteristics of all Internet-initiated victimiza-
their loneliness. Questions about Internet use and
online relationships should be part of protocols for tions that occurred during the period of the study,
working with depressed young people. Young teens but only those that ended in the arrest of an offender.
who are lonely or depressed or who have difficult Second, some errors and biases may have been
relationships with their parents may be more vulner- introduced because we interviewed law enforcement
able to harmful effects of Internet-initiated sexual investigators. We regarded these respondents as the
relationships with adults, as well as to the relation- best sources for in-depth information about the na-
ships themselves. ture of Internet-initiated crimes because their profes-
sional responsibilities require them to gather inten-
Gay or questioning boys. The findings from this sive information about these cases. However, the
study that a quarter of the relationships involved information they provided could be biased by train-
teenage boys with adult men highlights another group ing, professional attitudes, or the adversarial nature
worthy of special prevention initiatives: teenagers rec- of their roles in some of these cases.
ognizing themselves as homosexual or questioning Finally, our findings were somewhat limited by
their sexual orientation. Such youth, using the Internet the small sample size, and a larger sample would
to seek out contacts and information about homosexu- have allowed for a more nuanced analysis of find-
ality and sexual orientation, may be vulnerable to ings.
424.e20 WOLAK ET AL JOURNAL OF ADOLESCENT HEALTH Vol. 35, No. 5