"Our Little Secret": pinpointing potential predators

The word “Paedophilia” has come a long way from its Greek origin of child-companionship to a Mental Disorder, Social Taboo and Criminal Offence. Various laws are in place to help control such behaviour, protect the vulnerable and restrain related criminal offences. However, enforcement of such laws has become a significant challenge with the advent of social media creating a new platform for this old crime. This move necessitates consideration of approaches that are suited to this new platform and the way in which it affects the Cycle of Entrapment. This paper reviews definitions of, and features of, paedophilia and other related –philias, and sexual offences against children, and seeks through the understanding of these to determine where specific detection approaches are effective. To this end, we present our own detection approach which is geared towards predatory behaviours, which can be a precursor to sexual offences against children, and which directly references this Cycle of Entrapment. Our approach has shown early promise with an F1 score of 0.66 for training data but only achieving 0.48 for testing data on a collection of chat logs of sexual predators. The results were later improved to achieve an F1 score of 0.77 for train and 0.54 for test data based on the approach.

[1]  Carlo Strapparava,et al.  SemEval-2007 Task 14: Affective Text , 2007, Fourth International Workshop on Semantic Evaluations (SemEval-2007).

[2]  H S Pennypacker,et al.  On Behavioral Analysis , 1981, The Behavior analyst.

[3]  Shlomo Argamon,et al.  Automatically profiling the author of an anonymous text , 2009, CACM.

[4]  Anthony McEnery,et al.  Rethinking language pedagogy from a corpus perspective. , 2000 .

[5]  Paolo Rosso,et al.  On the Impact of Sentiment and Emotion Based Features in Detecting Online Sexual Predators , 2012, WASSA@ACL.

[6]  K. Lanning Child molesters: A behavioral analysis , 2001 .

[7]  John Yearwood,et al.  Detection of child exploiting chats from a mixed chat dataset as a text classification task , 2011, ALTA.

[8]  Fabio Crestani,et al.  Overview of the International Sexual Predator Identification Competition at PAN-2012 , 2012, CLEF.

[9]  R. C. Hall,et al.  A profile of pedophilia: definition, characteristics of offenders, recidivism, treatment outcomes, and forensic issues. , 2007, Mayo Clinic proceedings.

[10]  Rachel O’Connell Cyberspace A TYPOLOGY OF CHILD CYBERSEXPLOITATION AND ONLINE GROOMING PRACTICES , 2003 .

[11]  Nick Pendar,et al.  Toward Spotting the Pedophile Telling victim from predator in text chats , 2007, International Conference on Semantic Computing (ICSC 2007).

[12]  April Kontostathis,et al.  Learning to Identify Internet Sexual Predation , 2011, Int. J. Electron. Commer..

[13]  Bor-Luen Chiang,et al.  Differential manifestations of prepubescent, pubescent and postpubescent pediatric patients with systemic lupus erythematosus: A retrospective study of 96 Chinese children and adolescents , 2012, Pediatric Rheumatology.

[14]  Ioannis Mavridis,et al.  Utilizing document classification for grooming attack recognition , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[15]  K. Lanning,et al.  Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Ch , 2013 .

[16]  Walter Daelemans,et al.  Conversation Level Constraints on Pedophile Detection in Chat Rooms , 2012, CLEF.

[17]  Craig H. Martell,et al.  Topic Detection and Extraction in Chat , 2008, 2008 IEEE International Conference on Semantic Computing.

[18]  Elizabeth Fast,et al.  Pedophilia and sexual offending against children: Theory, assessment and intervention by Michael C. Seto, PhD, 2007, ISBN: 1-4338-0114-0 , 2010 .

[19]  Lee Gillam,et al.  Deception detection: dependable or defective? , 2014, Social Network Analysis and Mining.

[20]  George M. Mohay,et al.  Challenges of automating the detection of paedophile activity on the Internet , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[21]  Lee Gillam,et al.  Quite Simple Approaches for Authorship Attribution, Intrinsic Plagiarism Detection and Sexual Predator Identification , 2012, CLEF.

[22]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[23]  H. Snyder,et al.  Sexual Assault of Young Children as Reported to Law Enforcement: Victim, Incident, and Offender Characteristics. A NIBRS Statistical Report. , 2000 .

[24]  Louise Ellison Cyberstalking : Tackling harassment on the Internet , 2003 .

[25]  Christopher J. Fox,et al.  A stop list for general text , 1989, SIGF.

[26]  Patrick Juola,et al.  An Overview of the Traditional Authorship Attribution Subtask , 2012, CLEF.

[27]  James W. Pennebaker,et al.  Linguistic Inquiry and Word Count (LIWC2007) , 2007 .

[28]  L. Olson,et al.  Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication , 2007 .

[29]  David Finkelhor,et al.  Explanations of pedophilia: A four factor model , 1986 .

[30]  Paul Rayson,et al.  Supporting Law Enforcement in Digital Communities through Natural Language Analysis , 2008, IWCF.

[31]  Osma Suominen,et al.  Elements of a National SemanticWeb Infrastructure--Case Study Finland on the Semantic Web , 2007 .

[32]  Thorsten Joachims,et al.  Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.

[33]  Brian H. Spitzberg,et al.  Obsessive relational intrusion, coping, and sexual coercion victimization , 2001 .

[34]  Marshall C. Yovits,et al.  Ohio State University , 1974, SGAR.

[35]  Carla Van Dam,et al.  The Socially Skilled Child Molester: Differentiating the Guilty from the Falsely Accused , 2006 .

[36]  J. Wolak,et al.  Online Victimization of Youth : Five Years Later. , 2006 .

[37]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[38]  Leslie Haddon,et al.  EU kids online II: final report 2011 , 2011 .

[39]  D. Segal Diagnostic and Statistical Manual of Mental Disorders (DSM-IV-TR) , 2010 .

[40]  Janis Wolak,et al.  Online victimization: A report on the nation’s youth. , 2000 .

[41]  K. Durkin Misuse of the Internet by Pedophiles: Implications for Law Enforcement and Probation Practice , 2002 .

[42]  Robert Dickey,et al.  Pedophilia, Hebephilia, and the DSM-V , 2009, Archives of sexual behavior.