Original article
Are Crimes by Online Predators Different From Crimes by Sex Offenders Who Know Youth In-Person?

https://doi.org/10.1016/j.jadohealth.2013.06.010Get rights and content

Abstract

Purpose

We examined cases in which sex offenders arrested for Internet-related crimes used the Internet for sexual communications with minors, comparing crimes by offenders who met victims online to those by offenders who knew victims in-person prior to the offense.

Methods

We collected data from a national sample of law enforcement agencies (n = 2,653) about arrests in 2009 for Internet-related sex crimes against minors, conducting detailed telephone interviews with investigators about individual cases. This paper examines a subset of arrest cases that included the use of online sexual communications (online-meeting offenders, n = 143; know-in-person/online offenders, n = 139).

Results and Conclusions

Compared with know-in-person/online offenders, online-meeting offenders were less likely to have criminal backgrounds and more likely to use online communications to deceive victims. However, deception was a factor in a minority of cases and was also used by some know-in-person/online offenders. The majority of cases in both groups involved statutory rape (i.e., nonforcible illegal sexual activity with underage youth) or noncontact offenses such as child pornography production or sexual solicitation of a minor. We conclude that crimes by online-meeting offenders should not be treated as different or more dangerous than those by know-in-person/online offenders who use online sexual communications. Rather, prevention efforts should educate about the nature of statutory rape and related noncontact offenses. The primary message should be that it is criminal for adults to make sexual overtures to minors, online or offline, no matter what their relationship to the youth.

Section snippets

Methods

We surveyed a stratified national sample of 2,653 law enforcement agencies by mail asking if they had made arrests for Internet-related child sexual exploitation crimes during 2009. Then we conducted detailed telephone interviews with investigators about specific cases reported in the mail surveys.

Results

In 2009, there were an estimated 1,490 arrests for Internet-related sex crimes against minors that included online sexual communications with victims (95% confidence interval (CI): 1,330–1,649). An estimated 672 arrests were for crimes by online-meeting offenders (95% CI: 564–781); an estimated 817 were for crimes by know-in-person/online offenders (95% CI: 710–925).

Acknowledgments

This project was funded by Grant No. 2009-SNB-90001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. The total amount of federal funding is $825,704. Points of view or opinions in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice.

We are grateful to the many law enforcement investigators who participated in this research and to the

References (26)

  • H. Whittle et al.

    A review of online grooming: Characteristics and concerns

    Aggression Violent Behav

    (2013)
  • L. Berliner et al.

    The process of victimization: The victims' perspective

    Child Abuse Negl

    (1990)
  • D.A. Hines et al.

    Statutory sex crime relationships between juveniles and adults: A review of social scientific research

    Aggression Violent Behav

    (2007)
  • J.G. Noll et al.

    Association of maltreatment with high-risk Internet behaviors and offline encounters

    Pediatrics

    (2013)
  • J. Davidson et al.

    Characteristics of the Internet for criminal child sexual abuse by online groomers

    Criminal Justice Stud

    (2011)
  • K.V. Lanning

    Compliant child victims: Confronting an uncomfortable reality

    APSAC Advisor

    (2002)
  • I.R. Berson

    Grooming cybervictims: The psychological effects of online exploitation for youth

    J Sch Violence

    (2003)
  • S.C. Dombrowski et al.

    Safeguarding young people from cyber pornography and cyber sexual predation: A major dilemma of the Internet

    Child Abuse Rev

    (2007)
  • Federal Bureau of Investigation. A parent's guide to Internet safety. Available at:...
  • R. Williams et al.

    Identifying sexual grooming themes used by Internet sex offenders

    Deviant Behav

    (2013)
  • J. Wolak et al.

    Trends in arrests of “online predators.”

    (2009)
  • J. Wolak et al.

    Online “predators” and their victims: Myths, realities and implications for prevention and treatment

    Am Psychol

    (2008)
  • K. Troup-Leasure et al.

    Statutory rape known to law enforcement

    (2005 Aug)
  • Cited by (43)

    • A scoping review of child grooming strategies: pre- and post-internet

      2022, Child Abuse and Neglect
      Citation Excerpt :

      In the offline environment, grooming began to take on a technological component. Offline offenders sent explicit messages over email or text and used a series of apps to maintain communication with the victim (Henschel & Grant, 2019; Wolak & Finkelhor, 2013). To varying degrees, technology became a component of most ongoing child sexual abuses (Dowdell et al., 2011; Wolak & Finkelhor, 2013).

    • A systematic review of fantasy driven vs. contact driven internet-initiated sexual offences: Discrete or overlapping typologies?

      2018, Child Abuse and Neglect
      Citation Excerpt :

      Sixteen percent (n = 18) of contact cases in Wolak et al.’s (2004) study involved coercion, and 9% (n = 9) in Wolak and Finkelhor (2013). It is unclear precisely how many cases in Wolak and Finkelhor (2013) study involved offline contact, however the authors note that a considerable number did not commit an offline offence. Two studies found no evidence of coercion in contact cases (Barber & Bettez, 2014; Grosskopf, 2010).

    View all citing articles on Scopus

    Conflicts of interest: We know of no potential conflicts of interest. The study sponsor was not involved in the design or implementation of the research or in any aspect of this paper.

    View full text