Lawless Space Theory for Online Child Sexual Exploitation Material Offending

Deterrence, treatment and legal responses to online child sexual exploitation material (CSEM) offenders is enhanced by the joint consideration of technological behaviours and cognitions. CSEM offenders choose an environment based on both psychosocial needs and utility, and in turn that environment shapes future behaviour and reinforces cognitive distortions. This paper introduces lawless space theory, which posits that offenders will primarily choose and utilize a perceived lawless space that best meets their psychosexual needs in the most frictionless way; habituation and differential association in the lawless space will reduce the perceived risk; normalization will increase comfort in a particular lawless space, increasing friction costs that must be overcome to switch technologies; and additional countermeasures will only be implemented by offenders to reduce perceived risk and lower cognitive dissonance, but not at the expense of utility. The theory offers explanatory power for the lifecycle of a lawless space, the use of legacy spaces in the presence of objectively more capable options, the simultaneous use of multiple spaces to meet different psychosexual needs, and the adoption of new technologies by offenders. Additionally, the gateway choice and progression of lawless space usage informs investigations, risk assessments, and deterrence efforts and provides behavioural treatment targets.

[1]  Chad M. S. Steel,et al.  Collecting and viewing behaviors of child sexual exploitation material offenders. , 2021, Child abuse & neglect.

[2]  E. Quayle Prevention, disruption and deterrence of online child sexual exploitation and abuse , 2020, ERA Forum.

[3]  Sarah Paquette,et al.  A Billion Distorted Thoughts: An Exploratory Study of Criminogenic Cognitions Among Men Who Sexually Exploit Children Over the Internet , 2020, International journal of offender therapy and comparative criminology.

[4]  Susan M. Hughes,et al.  Experimental Evidence for Sex Differences in Sexual Variety Preferences: Support for the Coolidge Effect in Humans , 2020, Archives of Sexual Behavior.

[5]  Chad M.S. Steel,et al.  An integrative review of historical technology and countermeasure usage trends in online child sexual exploitation material offenders , 2020, Digit. Investig..

[6]  Chad M. S. Steel,et al.  A systematic review of cognitive distortions in online child sexual exploitation material offenders , 2020, Aggression and Violent Behavior.

[7]  J. Prichard,et al.  Why internet users’ perceptions of viewing child exploitation material matter for prevention policies , 2020 .

[8]  Sarah Paquette,et al.  Offense-Supportive Cognitions Expressed by Men Who Use Internet to Sexually Exploit Children: A Thematic Analysis , 2020, International journal of offender therapy and comparative criminology.

[9]  L. Epstein,et al.  Choice is relative: Reinforcing value of food and activity in obesity treatment. , 2020, The American psychologist.

[10]  Jürgen L. Müller,et al.  Are There Any Biomarkers for Pedophilia and Sexual Child Abuse? A Review , 2020, Frontiers in Psychiatry.

[11]  W. Smid,et al.  Mixed Emotions: An Incentive Motivational Model of Sexual Deviance , 2019, Sexual abuse : a journal of research and treatment.

[12]  T. Ward Why theory matters in correctional psychology , 2019, Forensische Psychiatrie, Psychologie, Kriminologie.

[13]  E. Quayle,et al.  Deterrence of Online Child Sexual Abuse and Exploitation , 2019 .

[14]  E. Stevens,et al.  Polytobacco use and risk perceptions among young adults: The potential role of habituation to risk. , 2019, Addictive behaviors.

[15]  M. Seto The Motivation-Facilitation Model of Sexual Offending , 2019, Sexual abuse : a journal of research and treatment.

[16]  Rick Brown,et al.  What is the profile of child exploitation material offenders? , 2018 .

[17]  F. Fortin,et al.  Sexual Interests of Child Sexual Exploitation Material (CSEM) Consumers: Four Patterns of Severity Over Time , 2018, International journal of offender therapy and comparative criminology.

[18]  M. Seto,et al.  Are There Early Risk Markers for Pedophilia? A Nationwide Case-Control Study of Child Sexual Exploitation Material Offenders , 2018, Journal of sex research.

[19]  Gareth Millington BROKEN WINDOWS , 2018, Faculty Brat.

[20]  Ross M. Bartels,et al.  Child Sexual Exploitation Materials Offenders: A Review , 2018 .

[21]  Campbell Wilson,et al.  Criminal motivation on the dark web: A categorisation model for law enforcement , 2018, Digit. Investig..

[22]  Ross M. Bartels,et al.  Distorted cognition related to male sexual offending: the multi-mechanism theory of cognitive distortions (MMT-CD) , 2018 .

[23]  James F. Popham Microdeviation: Observations on the Significance of Lesser Harms in Shaping the Nature of Cyberspace , 2018 .

[24]  Paul Watters,et al.  Investigating Malware Epidemiology and Child Exploitation Using Algorithmic Ethnography , 2018, HICSS.

[25]  Ronald V. Clarke,et al.  Introduction: Criminology, Routine Activity, and Rational Choice , 2017 .

[26]  R. Wheat,et al.  Habituation reverses fear-based ecological effects in brown bears (Ursus arctos) , 2016 .

[27]  A. Beech,et al.  The Integrated Theory of Sexual Offending–Revised , 2016 .

[28]  Guido Caldarelli,et al.  Echo Chambers: Emotional Contagion and Group Polarization on Facebook , 2016, Scientific Reports.

[29]  Kieron O'Hara,et al.  Discovering credit card fraud methods in online tutorials , 2016, OnSt '16.

[30]  Juston Moore,et al.  Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. , 2016, Child abuse & neglect.

[31]  Theodore Wilson,et al.  CAN RATIONAL CHOICE BE CONSIDERED A GENERAL THEORY OF CRIME? EVIDENCE FROM INDIVIDUAL‐LEVEL PANEL DATA , 2016 .

[32]  E. R. Leukfeldt,et al.  Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis , 2016 .

[33]  Bernard Gallagher,et al.  Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A Review , 2015 .

[34]  Christian Laier,et al.  Neuroscience of Internet Pornography Addiction: A Review and Update , 2015, Behavioral sciences.

[35]  Paul N. Joseph,et al.  Men Ejaculate Larger Volumes of Semen, More Motile Sperm, and More Quickly when Exposed to Images of Novel Women , 2015 .

[36]  Chad M. S. Steel,et al.  Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms. , 2015, Child abuse & neglect.

[37]  Max Taylor Criminogenic qualities of the Internet , 2015 .

[38]  James V. Ray,et al.  Correlates and Moderators of Child Pornography Consumption in a Community Sample , 2014, Sexual abuse : a journal of research and treatment.

[39]  Ethel Quayle,et al.  Rapid skill acquisition and online sexual grooming of children , 2014, Comput. Hum. Behav..

[40]  R. A. Hill,et al.  Human observers impact habituated samango monkeys’ perceived landscape of fear. , 2014 .

[41]  Stefan Bogaerts,et al.  From child pornography offending to child sexual abuse: A review of child pornography offender characteristics and risks for cross-over , 2014 .

[42]  R. Imhoff,et al.  Sexual Disinhibition Under Sexual Arousal: Evidence for Domain Specificity in Men and Women , 2014, Archives of sexual behavior.

[43]  Joel H Kramer,et al.  Anatomical correlates of reward-seeking behaviours in behavioural variant frontotemporal dementia. , 2014, Brain : a journal of neurology.

[44]  Da-Yu Kao,et al.  Rational Choice Observation of Malware Authors in Taiwan , 2014, PAISI.

[45]  Leigh Harkins,et al.  Online Child Sexual Exploitation , 2014, Trauma, violence & abuse.

[46]  Brian Neil Levine,et al.  Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. , 2014, Child abuse & neglect.

[47]  Michel Cukier,et al.  RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM , 2014 .

[48]  Clement Guitton,et al.  A review of the available content on Tor hidden services: The case against further development , 2013, Comput. Hum. Behav..

[49]  Kathryn C. Seigfried-Spellar,et al.  Does deviant pornography use follow a Guttman-like progression? , 2013, Comput. Hum. Behav..

[50]  C. Cheung,et al.  Understanding factors associated with online piracy behaviour of adolescents , 2013 .

[51]  Jeannie R. Albrecht,et al.  Measurement and analysis of child pornography trafficking on P2P networks , 2013, WWW.

[52]  Nigel Shadbolt,et al.  Why forums?: an empirical analysis into the facilitating factors of carding forums , 2013, WebSci.

[53]  Raphael Cohen-Almagor,et al.  Online Child Sex Offenders: Challenges and Counter‐Measures , 2013, SSRN Electronic Journal.

[54]  Brandon C. Welsh,et al.  The capable guardian in routine activities theory: A theoretical and conceptual reappraisal , 2013 .

[55]  Monique Ernst,et al.  Nucleus accumbens, thalamus and insula connectivity during incentive anticipation in typical adults and adolescents , 2013, NeuroImage.

[56]  A. Beech,et al.  The Psychological Profiles of Internet, Contact, and Mixed Internet/Contact Sex Offenders , 2013, Sexual abuse : a journal of research and treatment.

[57]  Sandy Jung,et al.  Child Pornography Offending Seen Through Three Theoretical Lenses , 2012 .

[58]  Daniel G. Goldstein,et al.  Beyond nudges: Tools of a choice architecture , 2012 .

[59]  R. Wortley,et al.  Situational Prevention of Child Abuse in the New Technologies , 2012 .

[60]  M. Seto,et al.  Examining the Criminal History and Future Offending of Child Pornography Offenders: An Extended Prospective Follow-up Study , 2011, Law and human behavior.

[61]  Stefan Savage,et al.  An analysis of underground forums , 2011, IMC '11.

[62]  Ruth M. Krebs,et al.  Novelty increases the mesolimbic functional connectivity of the substantia nigra/ventral tegmental area (SN/VTA) during reward anticipation: Evidence from high-resolution fMRI , 2011, NeuroImage.

[63]  Melissa Hamilton The Efficacy of Severe Child Pornography Sentencing: Empirical Validity or Political Rhetoric? , 2011 .

[64]  J. Wolak,et al.  Child Pornography Possessors: Trends in Offender and Case Characteristics , 2011, Sexual abuse : a journal of research and treatment.

[65]  George E. Higgins Value and Choice: Examining Their Roles in Digital Piracy , 2011 .

[66]  C. Watts,et al.  Pornography addiction: A neuroscience perspective , 2011, Surgical neurology international.

[67]  P. Erdberg,et al.  Exploring the Impact of Child Sex Offender Suicide , 2010, Journal of Family Violence.

[68]  K. Pitchers,et al.  ΔFosB in the nucleus accumbens is critical for reinforcing effects of sexual reward , 2010, Genes, brain, and behavior.

[69]  Clay Shields,et al.  Forensic investigation of peer-to-peer file sharing networks , 2010, Digit. Investig..

[70]  J. McCarthy,et al.  Internet sexual activity: A comparison between contact and non-contact child pornography offenders , 2010 .

[71]  K. Pitchers,et al.  Neuroplasticity in the Mesolimbic System Induced by Natural Reward and Subsequent Reward Abstinence , 2010, Biological Psychiatry.

[72]  R. Thaler,et al.  Choice Architecture , 2010 .

[73]  M. Seto Child Pornography Use and Internet Solicitation in the Diagnosis of Pedophilia , 2010, Archives of sexual behavior.

[74]  D. Glasgow,et al.  The potential of digital evidence to contribute to risk assessment of internet offenders , 2010 .

[75]  Chad M. S. Steel Web-Based Child Pornography: Quantification and Qualification of Demand , 2009, Int. J. Digit. Crime Forensics.

[76]  Eric P. Chiang,et al.  Estimating the Willingness to Pay for Digital Music , 2009 .

[77]  Marie Eneman,et al.  Counter-Surveillance Strategies Adopted By Child Pornographers , 2009, Int. J. Technol. Hum. Interact..

[78]  Chad M. S. Steel Child pornography in peer-to-peer networks. , 2009, Child abuse & neglect.

[79]  A. Beech,et al.  Understanding online child pornography use: Applying sexual offense theory to internet offenders , 2009 .

[80]  Danielle M. Reynald,et al.  The Future of Newman's Defensible Space Theory , 2009 .

[81]  E. Quayle,et al.  Criminogenic qualities of the Internet in the collection and distribution of abuse images of children , 2008 .

[82]  L. Marson Neurologic and neuroendocrinologic responses during orgasm: What do we know? , 2008 .

[83]  T. Gannon,et al.  Cognitive distortions in child sex offenders: An overview of theory, research & practice , 2008, Journal of forensic nursing.

[84]  A. Beech,et al.  The Internet and child sexual offending: A criminological review , 2008 .

[85]  Andrew Caplin,et al.  Dopamine, Reward Prediction Error, and Economics , 2008 .

[86]  B. Sales,et al.  Self-Regulation and the Etiology of Sexual Deviance: Evaluating Causal Theory , 2008, Violence and Victims.

[87]  D. Lester,et al.  Psychological Tensions Found in Suicide Notes: A Test for the Strain Theory of Suicide , 2008, Archives of suicide research : official journal of the International Academy for Suicide Research.

[88]  J. Wolak,et al.  Defining Child Pornography: Law Enforcement Dilemmas in Investigations of Internet Child Pornography Possession 1 , 2007 .

[89]  William R. King,et al.  A meta-analysis of the technology acceptance model , 2006, Inf. Manag..

[90]  George Loewenstein,et al.  The Heat of the Moment: The Effect of Sexual Arousal on Sexual Decision Making , 2006 .

[91]  R. Wortley,et al.  Applying situational principles to sexual offenses against children , 2006 .

[92]  J. Ludwig,et al.  Broken Windows: New Evidence from New York City and a Five-City Social Experiment , 2005 .

[93]  Y. Jewkes,et al.  Policing the filth: The problems of investigating online child pornography in England and Wales , 2005 .

[94]  G. Palk,et al.  Habituation of deviant sexual arousal in sex offenders: The role of cognitive processes , 2004 .

[95]  Younghwa Lee,et al.  The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..

[96]  Eric J. Johnson,et al.  The Construction of Preference: Do Defaults Save Lives? , 2006 .

[97]  Peter Kirsch,et al.  Anticipation of reward in a nonaversive differential conditioning paradigm and the brain reward system: an event-related fMRI study , 2003, NeuroImage.

[98]  Richard J. Siegert,et al.  Toward a comprehensive theory of child sexual abuse: A theory knitting perspective , 2002 .

[99]  E. Quayle,et al.  Paedophiles, Pornography and the Internet: Assessment Issues , 2002 .

[100]  E. Quayle,et al.  child pornography and the internet: perpetuating a cycle of abuse , 2002 .

[101]  Michael D. Mehta,et al.  Pornography in Usenet: A Study of 9, 800 Randomly Selected Images , 2001, Cyberpsychology Behav. Soc. Netw..

[102]  Brian Knutson,et al.  Anticipation of Increasing Monetary Reward Selectively Recruits Nucleus Accumbens , 2001, The Journal of Neuroscience.

[103]  D. Muller Criminal Profiling , 2000, Crime and Behaviour.

[104]  Wrg Hillier,et al.  Crime and urban layout: the need for evidence , 2000 .

[105]  S. M. Hudson,et al.  The Construction and Development of Theory in the Sexual Offending Area: A Metatheoretical Framework , 1998 .

[106]  F. Weiss,et al.  Ethanol anticipation enhances dopamine efflux in the nucleus accumbens of alcohol-preferring (P) but not Wistar rats. , 1996, Behavioural pharmacology.

[107]  R. Hirschman,et al.  Sexual Aggression against Children , 1992 .

[108]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[109]  Jennings Bryant,et al.  SHIFTING PREFERENCES IN PORNOGRAPHY CONSUMPTION , 1986 .

[110]  Donald A. Dewsbury,et al.  Effects of novelty of copulatory behavior: The Coolidge effect and related phenomena. , 1981 .

[111]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[112]  N. Feather MOWRER'S REVISED TWO-FACTOR THEORY AND THE MOTIVE-EXPECTANCY-VALUE MODEL. , 1963, Psychological review.

[113]  Chad M. S. Steel,et al.  TECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS , 2022, Journal of Digital Forensics, Security and Law.

[114]  J. Ogloff,et al.  Enhancing evidence-based treatment of child sexual abuse material offenders: The development of the CEM-COPE Program , 2020 .

[115]  Elizabeth I. Olowookere,et al.  Youth identity, peer influence and internet crime participation in Nigeria : a reflection , 2016 .

[116]  R. K. Hanson,et al.  Online Child Pornography Offenders are Different: A Meta-analysis of the Characteristics of Online and Offline Sex Offenders Against Children , 2015, Archives of sexual behavior.

[117]  Chantal A. Hermann,et al.  Viewing Child Pornography: Prevalence and Correlates in a Representative Community Sample of Young Swedish Men , 2015, Archives of sexual behavior.

[118]  Dustin Bessette,et al.  Communication, Technology, and Cyber Crime in Sub-Saharan Africa , 2015 .

[119]  C. Jeffery Criminal Behavior and Learning Theory , 2013 .

[120]  A. Beech,et al.  Understanding the Emergence of the Internet Sex Offender: How Useful are Current Theories in Understanding the Problem? , 2012 .

[121]  Laurence Alison,et al.  Child pornography offenders: towards an evidenced-based approach to prioritizing the investigation of indecent image offences , 2011 .

[122]  Anthony R. Beech,et al.  The integrated theory of sexual offending , 2006 .

[123]  E. Quayle,et al.  Sex offenders, internet child abuse images and emotional avoidance: The importance of values. , 2006 .

[124]  Meighan E. O’Roeardon Internet Jurisdiction : The International Perspective , 2004 .

[125]  Ethel Quayle,et al.  Model of Problematic Internet Use in People with a Sexual Interest in Children , 2003, Cyberpsychology Behav. Soc. Netw..

[126]  R. Akers,et al.  Social Learning and Social Structure: A General Theory of Crime and Deviance. , 2000 .

[127]  C McMaster,et al.  Cognitive dissonance in tobacco smokers. , 1991, Addictive behaviors.

[128]  W. Marshall,et al.  An Integrated Theory of the Etiology of Sexual Offending , 1990 .

[129]  Baruch Fischhoff,et al.  The psychometric study of risk perception , 1986 .

[130]  G. Abel,et al.  Complications, consent, and cognitions in sex between children and adults. , 1984, International journal of law and psychiatry.