Profile
International Journal of Psychology & Behavior Analysis Volume 7 (2021), Article ID 7:IJPBA-179, 6 pages
https://doi.org/10.15344/2455-3867/2021/179
Mini Review
Risk Factors & Investigative Strategies for Sexual and Violent Predators

Scott Allen Johnson

Licensed Psychologist, USA
Scott A. Johnson, Licensed Psychologist, USA; E-mail: scott@forensicconsultation.org
19 May 2021; 13 July 2021; 15 July 2021
Johnson SA (2021) Risk Factors & Investigative Strategies for Sexual and Violent Predators. Int J Psychol Behav Anal 7: 179. doi: https://doi.org/10.15344/2455-3867/2021/179

Abstract

This article highlights important areas to consider and pay attention to when investigating sex crimes, especially focussed on those who have child victims. However, the information also pertains to any violent offender, though the focus of this article is on the child sexual predator. Use of the term “child porn” is necessary because much of the research utilizes that term. The term “Child Sexually Exploitive Material (CSEM)” includes child porn, but also includes any object or material that the individual finds sexually arousing. If the offender finds children’s underwear or pictures of clothed children sexually arousing, these are now part of the offender’s CSEM. It is important to understand that violent and sexual predators think in very similar ways and investigative strategies for sex offenders apply to any violent offender.

Offenders often have engaged in criminal behavior both related to and different from their current violent or sexual offense. Crossing boundaries, speeding, road rage, trespass, and other seemingly unrelated behaviors are common in the world of the violent offender and sexual offender. Some offenders are criminally sophisticated while others lack sophistication. Some offenders have effective communication skills and are able to groom victims while others lack social and communication skills and utilize direct coercion and/or physical force. Keep in mind that violent and sexual offenses occur within the offenders world and they are often violating the rights of others with partners, family, as well as with acquaintances and strangers.

It is important when reviewing the offender’s criminal history to obtain a police report and/or criminal complaint for every offense or police contact. This helps provide the details of the offender’s behavioral pattern which is often lost when plea bargains or dropped charges occur. It is impossible to understand the offender’s violent and exploitive history without understanding all of the details that occurred in prior offenses, which the criminal history only provides a very rudimentary outline. Even police contacts that did not result in arrest may provide valuable clues about the offender’s criminal sophistication. Lastly, the vast majority of sexual predators have years of engaging in offense behavior and have far more victims than they are ever caught for.

The information below represents areas for investigation that may often be overlooked.


1. Risk Factors

It should be noted that solicitor child molesters are equally as dangerous as contact offenders [1]. Those who solicit and those who engage in contact offenses utilized similar grooming and offense tactics. The online solicitor engages in sexually abusive and threatening behavior, thereby victimizing the online victim [2]. In addition, most child porn users and fantasy-driven solicitators appear to engage in actual sexual contact with the victims, again per selfreport of undetected offenses.

Those with previous criminal histories for child porn present with higher risk for contact sexual offenses [3]. The ability to groom suggests that the offender is comfortable with communicating with their victim and makes crossover to contact offenses highly likely, perhaps even early in the interaction with the victim [4,5,3,6-9]. The research further indicates that the production of images tends to be hands-on recording with the offender actively involved in the sexual activity [3,10]. Noncontact offenders tend to use grooming techniques to have their victim engage in sexual activity via webcam [7]. There does not appear to be any difference between online solicitation offenders and contact offenders in terms of dangerousness [1].

Solicitation offenders tended to range in age from 19-64, suggesting that older range of over 50 may not actually age-out of offending as once suspected [11]. Offenders tended to target victims within a close geographical proximity [11], which suggests their intent to meet with the victim in person and most made their sexual intentions clear immediately (approximately within first 35 minutes) [12-14,11].

The majority of offenders and victims exchanged pictures the first day [11]. This may help desensitize the victim to sexual material and activity. Most offenders appear to be contact driven versus fantasy driven [11], with over 80% initiating telephone and email contact with the victim. The online offender often chose victims who had sexual content in their profile, assessed the victim’s perceived neediness or submissiveness, focused on victims whose profiles contained the victim’s age, and when the victim had young-sounding usernames [15]. This suggests predatory behavior and strategic capabilities which are often underestimated with the solicitation offender. Many offenders are in contact with multiple victims at the same time [11]. Much of the grooming occurred to allow for contact within 3 days [16,11] whereas others take their time to develop the relationship [17,18]. This poses a concern that perhaps the majority of solicitation offenders are contact-driven versus fantasy-driven. On the other hand, perhaps the fantasy-driven offender more quickly moves to contact with the victim to address strengthened power and sexual motivations, which would make sense from a conditioning standpoint.

Internet behavior involving sexual grooming and production of child porn represent an escalation of viewing or possessing child porn because the offender is now communicating their sexual interests to others [4,3,19,20]. This may suggest a comfortability with the deviant sexual interest as well as a comfortability with engaging in contact offenses.

Child porn offenders with smaller collections of child porn (e.g., 50) represented the highest risk group for engaging in contact offenses [3,21]. This is in opposition to McCarthy [6] who found that the dual offenders had the largest child porn collection. Extreme child porn images are rarely found in the child porn offender’s collection, likely because the offender does not justify injuring the child [22].

Some have suggested that a porn collection involving child porn is a strong indicator of Pedophilia [23]. Offenders with child porn collections were more likely to demonstrate a pattern of sexual interest in children more so than contact offenders [23]. However, the presence of child porn cannot be the sole evidence to support a sexual preference for children. Some offenders have a sexual interest in children but not exclusively to children, often involving adults as well. Some of these offenders who have a stronger sexual preference for children versus adults are likely to demonstrate difficulties in their sexual relationships with adults. Some may engage in sexual contact with adults solely to access children [24]. For others, they may collect child porn out of curiosity or other nonsexual needs.

Sex offenders who reinforce their sexually deviant and nonsexual violent motivations through repeated viewing of deviant porn and child porn are at higher risk for sexual reoffense and contact offenses. This is supported by general learning theory and the concept of habituation and is supported in the literature for sexual offense behavior [25-33]. In fact, masturbating to erotica (anything that a person finds sexually arousing) that is in any way related to a deviant sexual attraction or sexual offense behavior should be banned by use and possession by the offender. The cognitive distortions (e.g., rationalizations and excuses) offenders use to maintain their deviant sexual arousal and deviant sexual behavior help maintain the problem and may serve as permission giving [34].

A small number of Internet only offenders downloaded more extreme pictures [35]. This may indicate increased impulsivity, more extreme and deviant thoughts, and may represent a progression toward contact offenses, though more research is needed.

Sexual preferences and sexual preoccupation appear to be underestimated in samples of detected offenders [36]. This is likely due to poor assessment and diagnostic procedures. Perhaps the limited information about the offender’s true sexual preference and paraphilias prevent accurate and appropriate diagnoses from being given. Some mental health and treatment professionals fail to provide all diagnoses the offender presents with and therefore an accurate picture is not available as to the breadth of the offender’s pathologies. Of course, lack of polygraph for assessment and treatment may result in having to rely on the offender’s words about their sexual preference and the degree of their sexual and psychological problems.

Most sexual offenses against children are vastly undetected and unreported [37]. This is likely due to the reliance of offender denials of having any or significantly more contact victims. Researchers and treatment professionals need to assess for all mental health diagnoses as well as utilize polygraph and sexual arousal/attraction testing protocol (e.g., plethysmography, visual reaction time). The research clearly indicates that most child porn only offenders indeed have multiple contact victims and that most contact offenders have far more victims than detected.

It has been proffered that use of child porn may help some control sexual deviance while for others facilitates acting on preexisting fantasies and urges [38]. However, viewing deviant material may stimulate existing fantasies and lower inhibition leading to contact offenses [38]. Repeated viewing of child porn and/or contact with other offenders may weaken resolve leading to contact offense [39]. Even finding child porn accidentally while searching for regular porn impacts potential for continued child porn use and perhaps to contact offenses [39]. It is not recommended that anyone that has a sexual interest in children or adolescents, or has engaged in contact behavior with a minor, continue to use child or adolescent porn. The argument that it may help quell deviant desires goes against logic, research, and learning theory. Practice makes perfect, continued use of any child porn (including adolescent porn) strengthens deviant arousal and deviant thinking.

The longer the sex offender spends in sex offender specific treatment, the more deviant fantasies they report [40]. The reason for this is unclear. Perhaps the offender becomes more aware of their fantasies while in treatment and therefore more openly acknowledges them; maybe the offender comes to believe that they are expected to have the deviant fantasies because treatment talks about and focusses on them; or maybe the fantasies are not likely to fade away.

2. Investigative Applications

  1. Never underestimate the significance of nuisance sex offenses as these offenses often are part of an offenders larger deviant scheme [41].
  2. Pay attention to any similarities between the nuisance offenses and actual sexual offense behavior [24].
  3. Always obtain a police report and/or criminal complaint for any police contact mentioned in the criminal history check [42]. Every police contact offers some information that helps illustrate the offender’s criminal sophistication and offense behavior history. Most have years of engaging in sexual and physically violent crimes but do not get caught. Even when caught, lack of evidence may result in no further investigation or no criminal charges being brought. The police reports and criminal history of every police contact highlight the offender’s violent history and escalation or offense behavior. Imagine during an interview, questioning the suspect about their prior behavior and they are not prepared or expecting that would have been brought-up.
  4. Pay attention to probation violations and any failed court orders including the use of alcohol, failing to report as directall indicating a willingness to ignore rules and to engage in potentially risky behavior. Offenders with a prior history of violation of conditional release were more likely to offend, violently and nonviolently [43].
  5. Grooming strategies used by online offenders and offline (contact) offenders are very similar. These are similar strategies used by contact offenders as well, not just those online [44].
  6. Offenders may spend more time establishing a relationship with male victims prior to meeting [45].
  7. Many of the offenders may not have any criminal history or no criminal sexual offense history. This does not make the offender any less dangerous, it simply means they likely have never been arrested or detected in the past.
  8. Of those offenders who had no prior sex offense convictions but admitted having undetected contact victims, they had the most victims [46].
  9. Many of the child porn offenders with the most contact offenses went undetected at least in part to their not having a criminal history and skills at grooming [41].
  10. For child porn cases, always investigate for contact offenses. Look into any contact they may have with children/minors, any position of power/authority they may have had with minors [41]. This should also include investigating the neighborhood they live in (e.g., playgrounds, churches, pools, schools) as the offender may hang around those areas watching children or engaging the children in activities. Child porn offenders with no prior sex offense convictions admitted having the most undetected victims, and their ability to remain undetected for so long requires special attention to investigate the offender’s life [46].
  11. Child porn only offenders are more likely to confess to police and admit the child porn possession. They do this to lessen the chance that law enforcement would further investigate and detect that they have contact victims [7].
  12. A high percentage of children sexually abused likely never report the sexual contact or may not do so until they are much older, reducing the likelihood of prosecution due to the time lapse [47].
  13. Always ask victims if the offender took pictures of them. If so, find the pictures and what was used to take the pictures or videos (cell phone, camera). The sexual behavior of the child is almost always recorded by the offender for sexual gratification and may also be used to blackmail and threaten the child into continued submission and compliance and secrecy [4,45,48-50]. In addition, the offender may use threats, intimidation, blackmail, bribes, gifts, seduction, and competition to gain victim compliance and secrecy [51,52].
  14. The offender may use threats, intimidation, blackmail, bribes, gifts, seduction, and competition to gain victim compliance and secrecy [51,52].
  15. Child porn offenders are likely to confess to possessing child porn; this is often misleading because by accepting a plea agreement, law enforcement is not likely to investigate for the presence of contact victims [24,46]. This is especially true when the offender is very anxious to plead guilty.
  16. Use of polygraphy during the investigative process yields more admissions of contact victims [53-57].
  17. It is estimated that likely 62% of child porn only cases would turn out to be contact offenses if polygraph is used [46]. Again, 40- 85% of child porn only offenders self-reported having undetected contact victims [53,58,59].
  18. Offenders demonstrate strategic capabilities in their assessment of potential victim, the specific grooming process, and their ability to coerce victim compliance and secrecy. This suggests predatory behavior and strategic capabilities which are often underestimated with the solicitation offender [15].
  19. Most solicitation offenders are likely contact-driven versus fantasy-driven given that most fantasy-driven offenders engage in contact offenses. Some take time to establish and develop a relationship with the victim whereas others move quickly to establish offline contact with victims, but most all eventually engage in contact offending [16,60,18,17,11].
  20. Listen carefull to how the offender justifies their deviant behavior (e.g., use of child porn, engaging with children whether sexual or nonsexual, how they defend any sexual contact with children). This helps to understand the offender’s rationalizations and justifications for engaging in the offense behavior.
  21. Many offenders are in contact with multiple victims at the same time [11].
  22. View any porn collection as a probable Practice and Premeditation process. Practice because the offender uses the porn to strengthen deviant sexual and/or aggressive fantasies and even rehearsing how to re-enact the fantasy in real-life. Premeditation because of the planning and fantasizing that occurs prior to initiating contact with the victim, especially when the themes or behaviors depicted in the porn matches the offenders’ offense behavior. In addition, pornography is often used by the offender to desensitize children and adolescents before sexually abusing them.
  23. For forensic mental health I recommend that any sex offense warrants a diagnosis of a Paraphilia. While several Paraphilias are provided in DSM-5, perhaps the most important is Paraphilia- Unspecified. To pair sex, sexual behavior, sexual arousal with love, respect, excitement is understandable. To engage in a sexual offense, regardless of age of victim, the opposite must be true. To be able to maintain sexual arousal with a nonconsenting partner, an unconscious partner, an animal, or any other deviant arousal, would be nearly impossible without some degree of acceptance for use of force, coercion, or to maintain sexual arousal and/or complete a sexual act despite victim resistance, pain, suffering, humiliation, young age, etc. The offender must have some degree of acceptance for engaging in deviant sexual behavior. When using Paraphilia-Unspecified, put into parenthesis the adjective that best describes the offender’s offense behavior (which in turn gives a picture of the offender’s thoughts and cognitive distortions), for example, “forced sex”, “rape”, “sex with an unconscious person”.

3. Limitations of the Available Research

One of the most difficult and frustrating issue that interferes with the accuracy of research is that limitations are always present. In the above literature review, several limitations are present.

  1. The data is based only on child porn users, contact offenders, and dual offenders who have been identified because of arrest, prosecution, and for some, involvement in sex offender specific treatment. Therefore the generalizability of the findings are limited only to those offenders who have been identified and apprehended [6].
  2. Much of the data was based on the self-report of the offender. This raises serious questions about the veracity of the offender’s claim. Some child porn offenders may deny that they have engaged in contact sexual offenses with children or adults despite having done so. The opposite is also true. Some offenders may admit to behaviors that they have not actually engaged in and may do so for a variety of reasons (e.g., impression management (e.g., to appear cooperative in treatment or with prosecution); psychological problems (e.g., wanting to appear more selfassured, powerful, or dangerous than they really are). Without polygraph, the offender’s claims are just that- claims of someone who has engaged in sexually deviant and/or violent behavior who is not likely to be totally honest.
  3. The follow-up period is often less than 3 years. This presents a significant problem because the offender remains at risk for violent and/or sexual reoffense for life. In addition, most recidivism studies rely on the offender’ self-report. Even if a criminal history check was made and no prior offense was detected, that may mean 1) they have not yet been caught; or 2) they did not yet reoffend or progress to contact offenses. Most of the child porn and contact offenders, like any other offender, have typically offended for years prior to being caught. It may be another 5-10 years before they offend or before they are again caught.
  4. Methodolgical problems were apparent in many of the studies [2]. Several of the studies have small sample sizes, making it difficult to generalize the findings. In fact, several studies were limited to 5 offenders and others far too few to allow adequate comparisons between offender typologies. Many of the studies, though well intentioned, failed to adequately define the population studied, that is, the specific type of sex offender they were studying. Many grouped all child sexual abusers into one category, failing to differentiate the child porn only offenders from online solicitation offenders (fantasy-only) or from those who engaged in contact offenses (contact- driven) as well as failed to differentiate the situational and preferential offenders. The literature is rich with differences in motivation and cognitive distortions between these groups. It is imperative to have clear working definitions.
  5. Several studies referred to groomers to include those who did not engage in the development of a relationships with the victim, which is in fact the process of grooming. Some offenders move immediately into soliciting sexual contact online or offline thereby skipping the grooming process altogether [61-63,50]. The process of grooming and the separate process of soliciation for sexual activity need to be clearly separated and defined. The grooming of the victim and the solicitation of sexual activity from the victim occur faster online than offline and can be difficult or confusing to separate [64,5].
  6. Some of the research on online predators often involves victims who were undercover investigators versus actual victims [16,65,13,50]. This presents some degree of difficulty in determining how a real victim may respond. Studies have found, however, that it is the groomer (offender), not the victim or decoy, that leads the conversation [2,66,11]. However, because decoy victims do not engage in online sexual behavior (e.g., masturbation, exchanging naked photos) they may turn the offender away [67,61]. If the offender believed that the victim was of legal age, they tended to proceed with sexual contact regardless of whether the victim was a decoy. This suggests that decoys or actual victims likely react in similar ways but have limitations of what they can and cannot do. Overall, reliable data is likely to be obtained.
  7. Understand the difference between child molester, pedophile, hebephilic, and ephebophilia [42]. A pedophile has a primary sexual attraction to prepubescent children (typically 12 and under). A hebephilic has a primary sexual attraction to early adolescents (approximately ages 11-14). A ephebophilic has a primary sexual attraction to late aged adolescents (approximately ages 15-19). Any of these three types of sexual abusers may engage in sexual contact with adults for primarily nonsexual needs, such as gaining access to children or for impression management (to appear “normal”) or because there are situational offenders. A child molester engages in sexual contact with children for nonsexual needs, and likely has no sexual attraction to children (a situational offender). They are primarily sexually attracted to adults and prefer to engage in sex with adults but will substitute a child sex partner when circumstances or needs arise.
  8. Some of the research included both fantasy-driven and contact-driven offenders therefore confusing the two different offending groups (e.g., counting both groups as one) with little differentiation of how the two distinct groups offended or differed from each other in the research summary.

The above represent important areas of consideration when investigating sex and other violent crimes. For those who supervise the offenders on probation or parole, it is imperative to always consider the above factors and be aware of indicators of the offender reoffending. The literature and research offer support for the above risk factors.

Obtaining a copy of police reports and/or criminal complaints from prior police interaction and convictions provide a plethora of information to use to get the offender off their alibi. Imagine the look of confidence on the offender’s face disappearing when confronted about prior similar offense behavior. Offenders do not typically expect that investigators will bring-up or even be aware of prior behavior related to the court offense behavior. In addition, almost every sexual and violent offender has prior run-ins with the law, though many of the charges are often dropped due to insufficient evidence or plea agreements for lesser charges.

Competing Interests

The author declare that there is no competing interests regarding the publication of this article.


References

  1. Wolak J, Finkelhor D (2013) Are crimes by online predators different from crimes by sex offenders who know youth in-person? J Adolesc Health 53: 736-741. [CrossRef] [Google Scholar] [PubMed]
  2. Broome LJ, Izura C, Lorenzo-Dus N (2018) A systematic review of fantasy driven vs. contact driven internet initiated sexual offences: Discrete or overlapping typologies? Child Abuse & Negl 79: 434-444. [CrossRef] [Google Scholar] [PubMed]
  3. Long, M. L., Alison, L. A., & McManus, M. A. (2013). Child pornography and likelihood of contact abuse: A comparison between contact child sexual offenders and non-contact offenders. Sex Abuse 25: 370-395. [CrossRef] [Google Scholar] [PubMed]
  4. Briggs P, Simon WT, Simonsen S (2011) An exploratory study of Internet initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse 23: 72-91. [CrossRef] [Google Scholar]
  5. Craven S, Brown S, Gilchrist E (2006) Sexual grooming of children: Review of literature and theoretical considerations. Journal of Sexual Aggression 12: 287-299. [CrossRef] [Google Scholar]
  6. McCarthy JA (2010) Internet sexual activity: A comparison between contact and non-contact child pornography offenders. Journal of Sexual Aggression 16: 181-195. [CrossRef] [Google Scholar]
  7. McManus MA, Long ML, Alison L, Almond L (2015) Factors associated with contact child sexual abuse in a sample of indecent image offenders. Journal of Sexual Aggression 21: 368-384. [CrossRef] [Google Scholar]
  8. Seto MC, Wood MJ, Babchishin KM, Flynn S (2012) Online solicitation offenders are different from child pornography and lower risk contact sexual offenders. Law and Human Behavior 36: 320-330. [CrossRef] [Google Scholar]
  9. Webb L, Craissati J, Keen S (2007) Characteristics of Internet child pornography offenders: A comparison with child molesters. Sexual Abuse 19: 449-465. [CrossRef] [Google Scholar]
  10. Laulik S, Allam J, Sheridan L (2007) An investigation into maladaptive personality functioning in internet sex offenders. Psychology, Crime and Law 13: 523-535. [CrossRef] [Google Scholar]
  11. Winters GM, Jeglic EL (2017) Stages of grooming: Recognizing potentially predatory behaviors of child molesters. Deviant Behavior 38: 724-733. [CrossRef] [Google Scholar]
  12. Kloess JA, Seymour-Smith S, Hamilton-Giachritsis CE, Long ML, Shipley D, et al. (2015) A qualitative analysis of offenders’ modus operandi in sexually exploitative interactions with children online. Sex Abuse 29: 563-591. [CrossRef] [Google Scholar] [PubMed]
  13. Marcum C (2007) Interpreting the intentions of internet predators: An examination of online predatory behavior. Journal of Child Sexual Abuse 16: 99-114. [CrossRef] [Google Scholar]
  14. Mitchell KJ, Finkelhor D, Wolak J (2005) The internet and family and acquaintance sexual abuse. Child Maltreat 10: 49-60. [CrossRef] [Google Scholar] [PubMed]
  15. XXXX
  16. Black PJ, Wollis M, Woodworth M, Hancock JT (2015) A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse Negl 44: 140-149. [CrossRef] [Google Scholar] [PubMed]
  17. van Dam C (2001) Identifying Child Molesters: Preventing Child Sexual Abuse by Recognizing the Patterns of Offenders. Binghamton, NY: The Haworth Press.
  18. McAlinden AM (2006) ‘Setting 'Em Up': Personal, familial and institutional grooming in the sexual abuse of children. Social & Legal Studies 15: 339-362. [CrossRef] [Google Scholar]
  19. Sullivan J (2002) The spiral of sexual abuse: A conceptual framework for understanding and illustrating the evolution of sexually abusive behaviour. NOTA News 41: 17-21.
  20. Sullivan J, Beech AR (2004) Assessing internet sex offenders. In M. Calder (Ed.), Child sexual abuse and the internet: Tackling the new frontier. Dorset: Russell House.
  21. Osborn J, Elliott IA, Middleton D, Beech AR (2010) The use of actuarial risk assessment measures with UK internet child pornography offenders. Journal of Aggression, Conflict and Peace Research 2: 16-24. [CrossRef] [Google Scholar]
  22. Carr J, Hilton Z (2009) Child Protection and self-regulation in the internet industry: The UK experience. Children and Society 23: 303-308. [CrossRef] [Google Scholar]
  23. Seto MC, Cantor JM, Blanchard R (2006) Child pornography offenses are a valid diagnostic indicator of pedophilia. J Abnorm Psychol 115: 610-615. [CrossRef] [Google Scholar] [PubMed]
  24. Lanning KV (2010) Child molesters: A behavioral analysis for Professionals Investigating the Sexual Exploitation of Children. National Center for Missing & Exploited Children. [Google Scholar]
  25. Abel GG, Becker JV, Cunningham-Rathner J (1984) Complications, consent, and cognitions in sex between children and adults. Int J Law Psychiatry 7: 89-103. [CrossRef] [Google Scholar] [PubMed]
  26. XXXX
  27. Burns DD (1989) The feeling good handbook. New York, NY: William Morrow and Co.
  28. Helmus L, Hanson RK, Babchishin KM, Mann RE (2013) Attitudes supportive of sexual offending predict recidivism: A meta-analysis. Trauma Violence Abuse 14: 34-53. [CrossRef] [Google Scholar] [PubMed]
  29. Mann RE, Marshall WL (2009) Advances in the Treatment of Adult Incarcerated Sex Offenders. In Beech AR, Craig LA, Browne KD, Assessment and treatment of sex offenders: A handbook. West Sussex: John Wiley & Sons.
  30. Neidigh L, Krop H (1992) Cognitive distortions among child sexual offenders. Child Abuse Negl 18: 208-215. [CrossRef] [Google Scholar] [PubMed]
  31. Ó Ciardha C, Gannon TA (2011) The cognitive distortions of child molesters are in need of treatment. Journal of Sexual Aggression, 17: 130-141. [CrossRef] [Google Scholar]
  32. Ó Ciardha C, Ward T (2013) Theories of cognitive distortions in sexual offending: What the current research tells us. Trauma Violence Abuse 14: 5-21. [CrossRef] [Google Scholar] [PubMed]
  33. Pollack NL, Hashmall JM (1991) The excuses of child molesters. Behavioral Sciences & the Law 9: 53-59. [CrossRef] [Google Scholar]
  34. Kettleborough DG, Meridan HL (2017) Gateway to offending behavior: Permission-giving thoughts of online users of child sexual exploitation material. Journal of Sexual Aggression 23: 19-32. [CrossRef] [Google Scholar]
  35. Aslan D, Edelmann R (2014) Demographic and offence characteristics: A comparison of sex offenders convicted of possessing indecent images of children, committing contact sex offences or both offences. Journal of Forensic Psychiatry and Psychology 25: 121-134. [CrossRef] [Google Scholar]
  36. Neutze J, Seto M, Schaefer GA, Mundt IA, Beier KM (2011) Predictors of child pornography offenses and child sexual abuse in a community of pedophiles and hebephiles. Sex Abuse 23: 212-242. [CrossRef] [Google Scholar] [PubMed]
  37. Lussier P, Cale J (2013) Beyond sexual recidivism: A review of the sexual criminal career parameters of adult sex offenders. Aggression and Violent Behavior 18: 445-457. [CrossRef] [Google Scholar]
  38. Quayle E, Taylor M (2002) Child pornography and the internet: Perpetuating a cycle of abuse. Deviant Behavior: An Interdisciplinary Journal 23: 331-361. [CrossRef] [Google Scholar]
  39. Houtepen JABM, Sijtsema JJ, Bogaerts S (2014) From child pornography to child sexual abuse: A review of child pornography offender characteristics and risks for cross-over. Aggression and Violent Behavior 19: 466-473. [CrossRef] [Google Scholar]
  40. Dandescu A, Wolfe R (2003) Considerations on fantasy use by child molesters and exhibitionists. Sexual Abuse: A Journal of Research and Treatment 15: 297-305. [CrossRef] [Google Scholar]
  41. Shelton J, Eakin J, Hoffer T, Muirhead Y, Owens J, et al. (2016) Online child sexual exploitation: An investigative analysis of offender characteristics and offending behavior. Aggression and Violent Behavior 30: 15-23. [CrossRef] [Google Scholar]
  42. Johnson SA (2019) Child porn offenders, solicitation offenders and child sexual abusers: What the literature has to say. Forensic Research Criminology International Journal 7: 202-235. [CrossRef] [Google Scholar]
  43. Eke AW, Seto MC, Williams J (2011) Examining the criminal history and future offending of child pornography offenders: An extended prospective follow‐up study. Law Hum Behav 35: 466-478. [CrossRef] [Google Scholar] [PubMed]
  44. Whittle HC, Hamilton-Giachritsis CE, Beech AR (2014) “Under his spell”: Victims’ perspectives of being groomed online. Social Sciences 3: 404-426. [CrossRef] [Google Scholar]
  45. Grosskopf A (2010) Online interactions involving suspected paedophiles who engage male children. Trends and Issues in Crime and Criminal Justice 403: 1-6. [Google Scholar]
  46. Owens JN, Eakin JD, Hoffer T, Muirhead Y, Shelton JLE, et al. (2016) Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases. Aggression and Violent Behavior 30: 3-14. [CrossRef] [Google Scholar]
  47. Smith DW, Letourneau EJ, Saunders BE, Kilpatrick DG, Resnick HS, et al. (2000) Delay of disclosure in childhood rape: Results from a national survey. Child Abuse and Neglect 24: 273-287. [CrossRef] [Google Scholar] [PubMed]
  48. Krone T (2005) Queensland police stings in online chat rooms. Trends & Issues in Crime and Criminal Justice 301: 1-6. [Google Scholar]
  49. Mitchell KJ, Finkelhor D, Wolak J (2007) Youth internet users at risk for the most serious online sexual solicitations. Am J Prev Med 32: 532-537. [CrossRef] [Google Scholar] [PubMed]
  50. O’Connell R (2003) A typology of cyber sexploitation and online grooming practices. Cyberspace Research Unit University of Central Lancashire. [View]
  51. Campbell AM (2009) False faces and broken lives: An exploratory study of the interaction behaviors used by male sex offenders in relating to victims. Journal of Language and Social Psychology 28: 428-440. [CrossRef] [Google Scholar]
  52. Sullivan J, Quayle E (2012) Manipulation styles of abusers who work with children. In M Erooga Creating safer organisations: Practical steps to prevent the abuse of children by those working with them. Chichester, UK: John Wiley.
  53. Bourke ML, Hernandez AE (2009) The “Butner Study” redux: A report of the incidence of hands-on child victimization by child pornography offenders. Journal of Family Violence 24: 183-191. [CrossRef] [Google Scholar]
  54. Bourke ML, Fragomeli L, Detar PJ, Sullivan MA, Meyle E, et al. (2015) The use of tactical polygraph with sex offenders. Journal of Sexual Aggression 21: 354-367. [CrossRef] [Google Scholar]
  55. Buschman J, Wilcox D, Krapohl D, Oelrich M, Hackett S, et al. (2010) Cyber sex offender risk assessment. An explorative study. Journal of Sexual Aggression 16: 197-209. [CrossRef] [Google Scholar]
  56. Heil P, English K (2009) Sex offender polygraph testing in the United States: Trends and controversies. Wiley Online Liberary. [CrossRef] [Google Scholar]
  57. Gannon TA, Wood JL, Pina A, Tyler N, Barnoux MFL, et al. (2013) An evaluation of mandatory polygraph testing for sexual offenders in the United Kingdom. Sex Abuse 26: 178-203. [CrossRef] [Google Scholar] [PubMed]
  58. Seto MC, Hanson KR, Babchishin KM (2011) Contact sexual offending by men with online sexual offenses. Sex Abuse 23: 124-145. [CrossRef] [Google Scholar] [PubMed]
  59. Merdian HL, Moghaddam N, Boer DP, Wilson N, Thakker J, et al. (2018) Fantasy-driven versus contact-driven users of child sexual exploitation material: Offender classification and implications for their risk assessment. Sex Abuse 30: 230-253. [CrossRef] [Google Scholar] [PubMed]
  60. Malesky LA Jr (2007) Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet. J Child Sex Abus 16: 23-32. [CrossRef] [Google Scholar] [PubMed]
  61. DeHart D, Dwyer G, Seto MC, Moran R, Letourneau E, et al. (2017) Internet sexual solicitation of children: A proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of Sexual Aggression 23: 77-89. [CrossRef] [Google Scholar]
  62. Lorenzo-Dus N, Izura C, Pérez-Tattam R (2016). Understanding grooming discourse in computer-mediated environments. Discourse, Context and Media 12: 40-50. [CrossRef] [Google Scholar]
  63. Lorenzo-Dus N, Izura C (2017) “cause ur special”: Understanding trust and complimenting behaviour in online grooming discourse. Journal of Pragmatics 112: 68-82. [CrossRef] [Google Scholar]
  64. McAlinden AM (2013) Grooming and the sexual abuse of children: Implications for sex offender assessment, treatment and management. Sexual Offender Treatment. [Google Scholar]
  65. de Santistebana P, del Hoyo J, Alcázar-Córcoles MA, Gámez-Guadix M (2018) Progression, maintenance, and feedback of online child sexual grooming: A qualitative analysis of online predators. Child Abuse Negl 80: 203-215. [CrossRef] [Google Scholar] [PubMed]
  66. Drouin M, Boyd RL, Hancock JT, James A (2017) Linguistic analysis of chat transcripts from child predator undercover sex stings. The Journal of Forensic Psychiatry and Psychology 28: 437-457. [CrossRef] [Google Scholar]
  67. Bergen E, Antfolk J, Jern P, Alanko K, Santtila P (2013) Adults’ sexual interest in children and adolescents online: A quasi-experimental study. International Journal of Cyber Criminology 7: 94-111. [Google Scholar]