
The nature of the different types of sexual offending against children
Online sexual offending against children is an ambiguous and controversial phenomenon, as it is include various behaviours, such a grooming, sharing indecent images of children (IIOC) or contacting other offenders with similar interest. Also, the role of the technology is argued amongst professionals, if it is a tool or an influencing and creative force that produced a new type of criminal. As the majority of young people use the Internet, it provide a wide range of opportunity for the offenders to contact their potential victims (Ybarra et al., 2004). According to the Child Exploitation and Online Protection Centre (2010), it has been an increase in sexual solicitations towards children in recent years online. Furthermore, the public and experts also became more aware of the issue, however there are many areas, such as the characteristics of the perpetrators, their communications, practices and risk factors that needs to be studied and researched further (Beech et al., 2008).
In term of risks, in regards of sexual offending against children there are several such as age, gender, sexual preference, ACEs (Felitti et al., 1998), relationships and digital behaviours. Adolescents (age between 13 and 17) spend more time online unsupervised than children (12 and below), use more social networking and messaging sites and more likely to be involved in risky sexual activities, therefore they are much higher at risk for online sexual offending (Baumgartner et al., 2010; Mitchell et al., 2007; Vaala and Bleakley, 2015). According to Wurtele (2012), it is easier to get sexual compliance from adolescents due to their attention seeking, inexperience, naivety and curiosity about sex and relationships. In regard of gender, girls are the majority of the victims of online sexual offences, which mirrors offline victimisation. Boys, on the other hand – as they are more likely to engage in risky sexual behaviour – are victimised online on a higher rate. LGBTQ+ minorities also at risk, as they often visit sex/gender related sites and online communities (Baumgartner et al., 2010; Jonsson et al., 2014; Wolak et al., 2009, 2010). Furthermore, teenagers with ACEs, history of abuse, mental health issues, loneliness, and with bad relationship with their parents are more likely to seek company online. Spending more time on the Internet without supervision may lead and increase the risk of victimisation (Mitchell et al., 2007; Wolak et al., 2010). In regard of risky behaviours online by children, such as visiting adult sites and chatrooms, engaging profanity, using sexually provocative language and nicknames and sexting are considerable factors of online sexual solicitation (Baumgartner et al., 2010; Wolak et al., 2010; Malesky, 2007).
There are two main types of online sexual offending, such as online grooming and proliferation of indecent images of children (IIOC). These cyber enabled crimes, compare to their traditional equivalent are operating a much wider scale through various forms of information communications technology (ICT).
Proliferation of indecent images of children (IIOC)
Defining ‘indecent’ could be quite challenging due the ambiguous nature of the notion: Protection of Children Act 1978 and Criminal Justice Act 1988 describes IIOC as still and moving images of an abused and/or exploited children. Before the Internet the possession, distribution and production of these images were quite a rare occurrence. According to Middleton (2009) images of child abuse multiplied due the development of technology, which also reduced the cost and detection such activities and increased their availability. In 2005, one third of all sexual offences were internet related in England and Wales, which is nearly five times increase since 1999 (Home Office, 2006). According to the Child Exploitation and Online Protection Centre (CEOP, 2012), possessing and managing IIOC are considered risky behaviour, which may also lead additional (physical) abuse. Pseudo images (digitally constructed photos) are also problematic, as they are artificially manipulated for instance a child’s face inserted on a woman’s body or the IIOC entirely built by an application therefore involve ‘no real victims’ (Quayle and Taylor, 2003; Davidson et al., 2010).
Online grooming:
This form of offence against children is defined as a process in which by the offender prepares the victim and the environment for the purposes of the abuse, for instance getting the child’s trust and compliance, also obfuscating the crime itself (Craven et al., 2006). O’Connell (2003) models online grooming as process made of the offender’s efforts regarding accessibility, opportunity and vulnerability. This research identified seven stages in this process, such as: friendship and relationship forming; risk assessment; exclusivity; sexual; fantasy re-enactment, and damage limitation. Furthermore, according to Bryce (2010) offenders and their activities are frequently overlap, for instance producers, consumers and distributors of IIOC are involved in several forms of exploitation and abuse simultaneously.
Types of offenders:
According to Bryce (2010) online offenders are not share many characteristics, except being male. On the contrary, Babchishin’s (2011) meta-analysis of online sex offenders indicates they are high likely to be young, single, jobless, Caucasian and high intelligence, also with no criminal record (Webster et al., 2012). The study categorised these criminals as intimacy seeking, adaptable and hyper sexualised offenders. In contrast, in a 2007 paper Howitt and Sheldon revealed that offenders often in a relationship and have children themselves. In regards to cover their online activities, offenders use various level of protection to hide their identity, communications and IIOC. Carr (2004) have found only a quarter of the offenders she interviewed used some kind of security measure, however nowadays more and more technology available for criminals (Tor for example) to hide their activities.
Strengths and weaknesses of policing/prevention strategies in regard sexual offending against children
In recent years, information and communication technologies (ICT), especially mobile phones, internet has become essential to adolescents’. ICTs provide a platform for education, entertainment, networking, also it could be a valuable resource for the disadvantaged and marginalised youth (Guan and Subrahmanyam, 2009). However, as ICT become more common, the risk it presents also become more extensive, such as invasion of privacy, cyberbullying, online grooming, sexting, dating abuse, and proliferation of IIOC (Zweig et al., 2013).
Prevention
To answer these cyber-enabled crimes, several prevention strategies, programs, guidelines and methods have been implemented. Several websites (such as https://www.nspcc.org.uk) has been created in order to inform parents and children in regards the risk and dangers online, and provide advice how to avoid them. They advise and warn about risky websites and behaviours, how to protect ones privacy and identity, offline communication and potential steps a parent can do to prevent victimisation.
In regards to sexting via mobile phones, there are numerous educational campaigns exist to raise the issues and consequences of such activity. However, as they focusing mainly sexting amongst children, they disregard such communication between adult and children, which is quite problematic. Overall, the existence of these online-safety related sites is a positive thing, however their usefulness, efficiency and impact is not known entirely (Wurtele et al., 20016).
Role of the Parents
According to Wildsmith et al. (2013) good relationship between parents and their children significantly reduce the risk of online victimisation. Furthermore, parental supervision also a protective element in relation to online safety (Whittle et al., 2013). As we discussed in the previous section, there are several online-safety website available for parents if they wish to access relevant material. However, these resources often amplify the risks online, such as kidnappings or sexting (Vaala and Bleakey, 2015), also they recommend to supervise and limit their children’s activity online and use protective applications. While these practices work with young children, adolescents are not limited to use one ‘safe’ device. In regard of sharing personal information, which is not directly related to online sexual offending (Finkelhol, 2014), it is highly recommended not to share on social media. Furthermore, there are few issues in regards prevention methods through parents, such as lack of knowledge or device at home, barriers to articulate and discuss a sensitive subject or existing domestic struggle. These factors exaggerate the risks of online sexual offending, therefore these children should be able access external help and support, through schools and other institutions.
Schools’ role in online safety
Another line of defence and prevention lies within the classroom, where information regarding ICT risks can be thought. They can provide a qualified personnel and the technology to deliver internet safety education to the children and allow class debate and discussion about online threats, prevention and virtual etiquette. Moreover, there are online education programmes, like iKeepSafe but they mainly focus on ‘panic driven’ advice and ‘untested assumptions’ in regard internet safety and victimisation (Finkelhor, 2014). Although, these initiatives have the tendency of victim blaming and sexist communication (Dobson and Ringrose, 2016). As these efforts focus on prevention, legal advice also should be given just as how to recognise online and offline sexual offences and how to respond to them appropriately (Wolak et al., 2009; Wolak and Finkelhor, 2013, Wurtele, 2012). However, adolescents instead of reporting online related sexual offending to authorities, they more likely to share it with their peers according to Katz (2013) and Whittle (2014). In reflection above, we can assert that education plays a critical role in prevention of online solicitation, however adolescents should be involved in a much greater degree, in cooperation with ICT actors and law-enforcement agencies.
Policing, Technology and Policy
Technology enabled crimes against children, such as online grooming or IIOC, however it also provide methods to prevent such crimes. Government and Law Enforcement bodies, like the Hi-Tech Crime Unit (HTCU), the Police Central e-Crime Unit (PCeU) and Home Office’s Centre for Applied Science (CAST) are working together to develop technological solutions to answer challenges of the Police, such as preventing online child abuse or investigate it (Lilley, 2016). Furthermore, Police use ‘forensic investigation tools’ (Association of Chief Police Officers, 2007) and search engines have embedded algorithms to reduce accessibility to IIOC through their platforms (Steel, 2015). The acknowledgement of unique strategies regarding online sex offenders become prevalent during UK’s first significant investigation of IIOC (Operation Ore) in 1999. In 2004, the National Probation Service for England and Wales considered banning sex offenders using ICT. In 2007, the Home Office recognised that issues regarding protection of children needs to be addressed according to ICT developments. They suggested policies with mandatory email registration, polygraph test and tagging for registered sex offenders. By 2010, these plans were discussed in the mainstream media (Beckford and Stokes, 2010) and tracking email addresses’ of sex offenders has been stopped due Human Right concerns. The notion of limiting offenders’ access online content has been tried in 2011, and the Court of Appeal stated:
‘A blanket prohibition on computer use or internet access is impermissible. It is disproportionate because it restricts the defendant in the use of what is nowadays an essential part of everyday living for a large proportion of the public, as well as a requirement of much employment’ (Regina v Smith (2011) EWCA Crim 1772)
Therefore, law enforcement agencies were required to utilise and develop alternative crime prevention methods in order to accommodate the legal, technological and professional requirements.
Situation specific crime prevention
Situational crime prevention theories in practice using ICTs to limit the offender’s ability to access IIOC (Taylor and Quayle, 2016). However this approach has its own limitations, such as the ‘hidden’ nature of the crime, the offender’s technological capability and the Internet itself, where the crime takes place. For instance, a monitoring software allows authorities to notice any wrongdoing, collect evidence and act immediately if necessary. However, offenders could avoid this detection with an unknown device for the authorities. Furthermore, resources of the Police are finite, therefore it needs to be optimised and existing technical and legal challenges to be resolved in order to apply successfully this prevention strategy (Lilley, 2016).
Non-situational crime prevention
This form of approach does not require a computer or other device with Internet connection as it is a more direct approach. Using tag (electronic monitoring) to monitor and track sex offenders, might deter, but not prevent someone to commit a crime. On the other hand, tagging could be an effective way to supervise low risk offenders and reduce reoffending, which may be a cost effective alternative to imprisonment (Padgett et al., 2006; National Audit Office, 2006). Apart from Gies et al. (2012) study, which shows that even high risk sex offenders comply more and offend less likely when monitored, there are limited research on this topic, especially in regard to reoffending, deterrence, effectiveness and how this technology alters the offenders’ behaviour (Criminal Justice Joint Inspection, 2012). Polygraph also can be used to observe sex offenders compliance and it can increase the quality of criminal history convicted offenders’ provide (Grubin et al., 2004). Conversely, the use of this technique has been critiqued by academics that it is ‘coercive’ and consent is ‘illusory’ (Bull et al., 2004), also it disrupts offenders’ rehabilitation (Wilcox, 2013).
Conclusion
In this limited version of Rapid Evidence Assessment (REA) cyber-enabled crimes, such as sexual offending against children and relevant policing/prevention strategies were evaluated. Within these topics, this paper focused on indecent images of children (IIOC), online grooming, the types of offenders, several prevention methods and techniques, legal and technological challenges. In terms of procedure and narrowing the available material, this REA used articles published in the US, UK and EU between 2010 and 2020, including all research methods. These literature were identified mainly in Web of Science and in Edinburgh Napier University LibrarySearch engine.
Technological developments influenced criminality and victimisation in the last two decades, creating new type of crimes, risks and challenges for authorities. Online sexual offending against children is one of these cyber-crimes, which gained attention from the public and academics considerably. Two main theme emerged in regard this offence: grooming and proliferation of indecent images. Both of these, target children where and when they are most vulnerable, unsupervised, having difficulties and/or unaware of the risks they taking. In regards the offenders, this scooping of articles have found several inconsistencies in their characteristics, such as their background and relationships. Furthermore, prevention methods of these offences are multi-agency, technology, legislation and resource dependent, with different level of success rate. Also, these approaches are often not well researched, therefore we don’t know much about their impact and efficiency on criminal behaviour and reoffending. Overall, this simplified REA have found that online sexual offences are prevalent and serious threats to children, but law enforcement agencies and legislative bodies aware of this issue and taking preventive measures. However, the sensitive and hidden nature of this type of crimes, also because the several legal and technological issues present, it is challenging to paint an accurate picture on this criminal activity, therefore it is more difficult to prevent it.

