U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Understanding and Investigating Child Sexual Exploitation

NCJ Number
162427
Author(s)
K Lanning; R H Farley
Date Published
August 1997
Length
28 pages
Annotation
This guide indicates the sexual victimization of children is perpetrated by family members, acquaintances, and strangers; encompasses pornography, sex rings, and prostitution; and primarily involves preferential sex offenders who victimize children by operating child sex and pornography rings.
Abstract
Preferential sex offenders tend to be predatory serial offenders and can usually be identified by long-term and persistent behavior patterns, specific sexual interests, and fantasy-driven behavior. They often suffer from paraphilias, psychosexual disorders that involve recurrent, intense, and sexually arousing fantasies and from sexual urges and behaviors that usually involve nonhuman objects, the humiliation of oneself or one's partner, and children or other nonconsenting persons. In child sex ring and pornography cases, offenders typically control their victims by seducing them with attention, affection, kindness, and gifts until they have lowered the victim's inhibitions and gained his or her cooperation and consent. Because of their bond with the offender, victims frequently resent law enforcement intervention and may even warn the offender. The investigation of child sexual exploitation cases involving multiple victims molested by preferential offenders is usually complex and difficult. Guidelines are presented for interviewing victims and offenders, investigating offenders, recovering child exploitation evidence, obtaining expert search warrants, and conducting an effective prosecution. Special procedures to follow when investigating child sexual exploitation cases involving computers are noted, and types of offenders who engage in child pornography using computers are identified. An investigator's checklist for interviewing victims of preferential sex offenders is included. 6 references