online sexual solicitation of minors: an analysis of the average

Transcription

online sexual solicitation of minors: an analysis of the average
ONLINE SEXUAL SOLICITATION OF MINORS:
AN ANALYSIS OF THE AVERAGE
PREDATOR, HIS VICTIMS, WHAT IS
BEING DONE AND CAN BE DONE TO
DECREASE OCCURRENCES OF VICTIMIZATION
Elana T Jacobs*
INTRODUCTION
1.
BACKGROUND ........................................
A.
B.
II.
B.
...............
Specialized Government Programs.
i. Investigative Assistance ....................
ii. Training Assistance ...............
........
iii. Awareness/Preventative Initiatives .............
Independent Efforts to Prevent Online Enticement and
Exploitation of Children..............
.........
i. Investigative Assistance ....................
ii. Training Assistance ..................
.....
iii. Awareness/Preventative Initiatives ............
......
iv. Self-Policing ......................
LEGISLATION .........................................
A.
B.
IV.
Identifying Characteristicsof Online Predatorsand
...............................
Their Victims
Negative Implications of Currentand Future
TechnologicalAdvances........................
SOCIETAL RECOURSE: PREVENTION PROGRAMS ........
A.
III.
..............................................
Levels of Punishment and the Distinction Between
Online Communications and Real-World Contact ....
...........................
Statutory Discretion
i. Monetary Fines as Punishment..............
RECOMMENDATIONS .
.................................
CONCLUSION .................................................
506
508
508
511
513
514
515
516
517
518
518
518
520
521
526
527
529
532
533
536
* Candidate for J.D., 2012, Benjamin N. Cardozo School of Law. I want to thank the
CPLPEJ editorial board for all of the help provided throughout the publishing process. Additionally, I want to extend my utmost thanks to, and appreciation for, my family: the dedication,
passion, and motivation that I am most commonly known for is a direct result of great parenting
and a fabulous support system. Mom, Dad, Cara and Melanie, I dedicate this Note to you.
505
506
CARDOZO PUB. LAW POLICY &'ETHICS j
[[Vol. 10:505
INTRODUCTION
The Internet is a revolutionary tool in the world of academia, social networking, and global progress. Its expansive nature has the ability
to connect all users, virtually eliminating geographical distances and enabling individuals to connect in real-time. As of March 31, 2011, it was
determined that slightly more 245,000,000 United States citizens, accounting for 78.3% of the nation's population, engage in Internet usage.' The United States is responsible for 90.1% of Internet users in
North America, and this percentage is constantly growing. 2 According
to the National Juvenile Online Victimization (N-JOV) Study,3 Internet
use by United States youth, which includes individuals ranging in age
from twelve to seventeen-years-old, increased from 73% in 2000 to 93%
in 2006. Furthermore, overall individual Internet use has increased
151.6% since 2000.' The Internet has undergone vast expansion and
has become a large part of modern-day society.7
While the advantages of the Internet are vast, there remain disadvantages as well. The Internet's interconnectivity serves as a virtual playground for unseemly behavior.' Online solicitation of sexual relations
1 Internet Usage and PopulationStatistics in North America, INTERNET WORLD STATS, http:/
/www.internetworldstats.com/statsl4.htm (last updated Mar. 22, 2012).
2 Id
3 DAVID FINKELHOR, KIMBERLY MITCHELL & JANIS Woue, NATIONAL JUVENILE ONLINE VIcTIMIzATION (N-JOV) STUDY: TRENDS IN ARRESTS OF "ONLINE PREDATORS" (2009)
[hereinafter N-JOV STUDY]. The study "collected information from a national sample of law
enforcement agencies about the prevalence of arrests for and characteristics of online sex crimes
against minors." Id. at 1. The research was conducted in two waves: July 1, 2000 through June
30, 2001 and January 1, 2006 to December 31, 2006. Id. Both waves involved a "two-phase
process of mail surveys followed by telephone interviews." Id. The final data set consisted of
"1,633 completed case-level interviews." Id.
4 Id.
Internet Usage and Population Statistics in North America, supra note 1.
Paola Di Blasio, Luca Milani & Dania Osualdella, Quality of InterpersonalRelationships
and Problematic Internet Use in Adolescence, 12 CYBER PSYCHOL. & BEHAV. 681 (2009) ("The
Internet in the last 15 years has grown exponentially.").
7 ROBERT D'OVIDIO & ROBERT J. O'LEARY, ONLINE SEXUAL EXPLOITATION OF CHILDREN, available at www.nga.org/files/live/sites/NGAlfiles/pdfl0703ONLINECHILD.PDF
("[C]hildren ... increasingly rely on the Internet for education, entertainment, and socialization."); see Krista L. Blaisdell, Protectingthe Playgroundsof the 21st Century: Analyzing Computer
and Internet Restrictionsfr Internet Sex Offenders, 43 VAL. U. L. REv. 1155 (2009).
8 Arthur Bowker & Michael Gray, The Cybersex Offender and Children, FBI L. ENFORCEMENT BULL. (FBI, Washington, D.C.), Mar. 2005, at 12, available at http://www.fbi.gov/statsservices/publications/law-enforcement-bulletin/2005-pdfs/mar051eb.pdf ("Because of the capabilities that computers offer criminals lurking in the Internet's shadows, these individuals are
particularly threatening to the community."); D'OVIDIO & O'LEARY, supra note 7, at 4 ("The
5
6
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
507
has become a common activity. Some solicitation is done innocently,
through dating websites and group chat rooms. However, other forms
are more ominous, such as the solicitation of sex from a specific,
targeted group: minors. In fact:
Online sexual solicitation is a form of sexual harassment that occurs in
cyberspace (in other words, in all electronic forms of communication
such as the Internet and text messaging). Incidents of online sexual
solicitation include exposure to pornography; being asked to discuss
sex online and/or do something sexual; or requests to disclose personal
information. This can start when an adult or peer initiates an online
nonsexual relationship with a child or adolescent, builds trust, and
seduces him into sexual acts. 9
Given the expansive nature of the Internet and the drastically negative
impact it may have on victimized youth, online sexual solicitation has
become a common problem. More specifically, "the law enforcement
community increasingly faces situations involving explicit chat discussions and other disturbing online activities that victimize minors."1 o
However, since the Internet has so many wonderful and educational
features," it is against society's best interest to ban young users from
engaging in Internet use altogether. Moreover, it is unrealistic that such
a ban would be enforceable. Therefore, allowing youth to use the Internet means that it must be patrolled in a different way.
Children and teenagers are impressionable, and turning a blind eye
to the increased existence of online sexual solicitation would be harmful.
Currently, privately and publicly funded programs are in place, all with
global reach of the Internet facilitates new social relationships by easily connecting people who
are geographically distant.").
9 Kate Fogarty, Teen Safety in Cyberspace, U. FLA. IFAS EXTENSION, http://edis.ifas.ufl.edul
pdffiles/FY/FY84800.pdf (last visited Apr. 27, 2012).
50
Bowker & Gray, supra note 8; Online Child Pornography/ChildSexual ExploitationInvesti-
gations, FBI, http://www.fbi.gov/stats-services/publications/innocent-images-1 (last visited Apr.
27, 2012) [hereinafter FBI INNOCENT IMAGES NATIONAL INITIATIVE] ("Between the fiscal years
1996 and 2007, there was a 2062 percent increase in the number of [Innocent Images National
Initiative] cases opened ... through the FBI."); U.S. DEP'T OF JUSTICE, THE NATIONAL STRATEGY FOR CHILD EXPLOITATION PREVENTION AND INTERDICTION:
A
REPORT TO CONGRESs
30
(2010) [hereinafter REPORT TO CONGRESS).
11 See History, The History of Computers, and the Historyof Computers in Education, CAUFORST. U.,
2012).
NIA
LONG BEACH,
http://www.csulb.edul-murdock/histofcs.html
(last visited Jan. 7,
508
CARDOZO PUB. LAW POLICY &'ETHICS J
[Vol. 10:505
the same goal of promoting safe Internet practices.1 Additionally, individual states have created statutes punishing sexual offenders who use
the Internet as a means of targeting their prey. 13 While helpful, there is
still more than can be done; additional protections must be put in place.
Namely, broadening the standards of what constitutes online solicitation
and toughening the punishments for those who break the law.
Part I of this Note details the negative elements of the Internet,
through an introduction of characteristics of the average Internet
predator and his common victim. Part II explores the Internet's unique
characteristics and the modern advances in mobile technology that enable such individuals to interact, as well as the subsequent stages of interaction that typically occur leading up to a physical rendezvous. Part
III specifies the many ways society attempts to counteract online enticement. Three main methods are explored: (1) creation and implementation of specialized government agencies; (2) independent efforts to
educate youth, parents, and law enforcement; and (3) current legislation
aimed at enhancing punishment of offenders. The Note then explores
mechanisms for punishment, analyzing the disconnect between the vast
forms of prevention and some of the more lenient methods of punishment. Finally, Part IV examines the government's plan for punishment
in the future, and offers a recommendation for implementing changes to
the sentencing guidelines.
I.
A.
BACKGROUND
Identifying Characteristicsof Online Predators and Their .Victims
The overwhelming majority of offenders are white,14 adult 5
males.' 6 In recent years though, there has been an increase in young
adult predators,17 mainly in the eighteen to twenty-five-year-old"' age
12 See infra Part III for examples.
13 See infra Part III.
14 D'OVIDIo & O'LEAuy, supra note 7, at 6 ("Predators are overwhelmingly white."); NJOV STUDY, supra note 3, at 5 ("Most [offenders] were white, non-Hispanic.").
15 Most Internet Sex Offenders Aim At Teens, Not Young Children, Study Shows, Sci. DAILY
(Feb. 19, 2008), http://www.sciencedaily.com/releases/2008/02/080218185101.htm ("[M]ost
online sex offenders are adults who target teens and seduce victims into sexual relationships.").
16 D'OVIDIO & O'LEARY, supra note 7, at 6 ("Males are more likely than females to sexually
exploit children in cyberspace."); N-JOV STUDY, supra note 3, at 5 ("[Virtually all offenders
(99 percent) were male.").
17 According to the University of New Hampshire Crimes Against Children Research
Center, predators are sex offenders who seek out victims through the Internet. David Finkelhor,
Kimberly Mitchell & Janis Wolak, "InternetPredator"Stereotypes Debunked in New Study, Am.
2012]
ONLINE SEXUAL SOLICITATION OFMINORS
509
range.' 9 Offenders vary in profession, oftentimes working in fields least
expected, such as law enforcement, religion, the military, and education.2 0 Online enticement takes place through various interaction sites,
most prominent of which are chat rooms, instant messenger programs,
and e-mail. 2 1 Over time, as social networking websites have gained recognition and use has become more widespread and commonplace, offenders have begun to initiate sexual advances through social networking
websites as well.2 2
PYSCHOL. Ass'N (Feb. 18, 2008), http://www.apa.org/news/press/releases/2008/02/sex-offender.
aspx.
18 D'OVIDIo & O'LEARY, supra note 7, at 7 ("Predators ... were not always adults . . . at
times youth fell victim to exploitation by other youth."); N-JOV STUDY, supra note 3, at 6 ("A
larger percentage of those arrested for online predation in 2006 were young adults, ages 18 to 25
. ... [Tihe percentage of offenders in that age range increased from 23 percent in 2000 to 40
percent in 2006.").
19 N-JOV STUDY, supra note 3, at 6 (suggesting that this increase in predatory behavior in
the specified age group is a "consequence of the coming of age of the first cohort of youth to
grow up with the Internet. Adults ages 18 to 25 may be more likely than older adults to use the
Internet when engaging in deviant behavior" and therefore, explains why "this increase in young
adult offenders does not correspond to any overall increase in sex criminality within this age
group suggested by other sources.").
20 Press Release, Federal Bureau of Investigation Crimes Against Children Unit, Operation
Candyman (Mar. 17, 2002), http://www.fbi.gov/news/pressrel/press-releases/operationcandyman ("Individuals identified as subjects in 'Operation Candyman' include Little League
coaches, a teacher's aide, a guidance counselor, school bus driver, foster care parent and professionals in the medical, educational, military and law enforcement fields."); RICHARD G.
WRIGHT, SEX OFFENDER LAWS: FAILED POLICIES, NEW DIRECTIONs 118 (2009); see CHRIS
HANSEN, To CATCH A PREDATOR: PROTECTING YOUR KIDS FROM ONLINE ENEMIES ALREADY IN YOUR HOME 8 (2007); see Raymond E. Foster, Former Referee Convictedfor Attempted
Enticement of a Minor, CRiM. JUST. NEWS (Apr. 23, 2010), http://criminal-justice-on-
line.blogspot.com/2010/04/enticement-of-minor.html
("Rockett was formerly employed as a
volleyball referee and coach.").
21 See D'OVIDIO & O'LEARY, supra note 7, at 5; N-JOV STUDY, supra note 3, at 4; see also
FBI INNOCENT IMAGES NATIONAL INITIATIVE, supra note 10. According to the FBI:
By using chat rooms, children can chat for hours with unknown individuals, often
without the knowledge or approval of their parents. Investigation revealed that computer-sex offenders utilized the chat rooms to contact children, since children do not
know whether they are chatting with a 14-year-old or a 40-year-old. Chat rooms offer
the advantage of immediate communication around the world and provide the
pedophile with an anonymous means of identifying and recruiting children into sexually illicit relationships.
Id.
22 Real Stories Project, PERVERTED JUSTICE, http://www.perverted-justice.com/ (last visited
Apr. 13, 2012). On May 25, 2010, "[a] 22 year old North Carolina registered sex offender was
arrested for raping a 13 year old girl he met through Facebook." Id. On May 24, 2010, "[a] 26
year old Texas man was arrested for sexually assaulting a 13 year old girl. During the investiga-
CARDOZO PUB. LAW POLICY er ETHICS J1
510
[Vol. 10:505
Surprisingly, few individuals arrested for online enticement are registered sex offenders.23 It is heavily suspected that this disconnect is
related to the perception of anonymity. Predators communicating online, rather than in person, are more likely to experience reduced inhibitions and therefore, "predilections towards sexually exploiting children
[that have not surfaced in person] might be more pronounced in computer-mediated environments. "24 It has become apparent that "computers and the Internet have not only changed the nature of child sexual
exploitation, but have affected the types of people who fall victim to and
commit such crimes." 25 The perceived anonymity afforded to Internet
users diminishes traditional relationship boundaries, such as age, class,
and race. 26 As a result of the faceless nature of the Internet, individuals
form relationships that would otherwise not occur in a real-world setting; youth who were taught to stay away from strangers on the street
might not have their guard up against the same strangers who appear
online.2 7
The same freeing sense of anonymity is the very reason that many
youth are drawn to the Internet, and especially those individuals who
are more likely to become victims. "Adolescents appear to be particularly attracted by the technologies of communication, which offer them
the opportunity to interact with others while maintaining anonymity
and to experience a sense of community and social acceptance."2 8 Adolescents who experience more difficulty making friends in real-world situations are increasingly likely to gravitate towards the Internet;
timorous, reclusive adolescents will sooner maintain interpersonal relationships with strangers they meet online than will outgoing, affable
individuals. 2 9 Although reclusive adolescents typically have lower selfesteem and have trouble making friends, the Internet affords them the
opportunity to socialize and meet new people in an easier fashion.o
There is a direct relationship between an individual's level of loneliness
tion police learned that the man had sexually assaulted at least five other girls. He met his
victims on Facebook and MySpace." Id.; see also N-JOV STUDY, supra note 3, at 4.
23 N-JOV STUDY, supra note 3, at 2 ("Few of those arrested for online predators were registered sex offenders (4%).").
. 24 D'OvIDIo & O'LEARY, supra note 7, at 6.
25 Id. at 4.
26 Id
27 Id.; FBI INNOCENT IMAGES NATIONAL INITIATIVE, supra note 10.
28 Di Blasio, Milani & Osualdella, supra note 6, at 681.
29
Id
30 D'Ovioo & O'LEARY, supra note
7, at 5.
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
511
and their likelihood of encountering a negative consequence of Internet
usage. 3 1
Regardless, although personality plays a role, demographics are the
most significant indicator of who is most likely to be targeted as a victim. Specifically, females are considerably more likely to be the recipient of online enticement than males. 3 2 Furthermore, age plays a large
role. It is often adolescents that are targeted, rather than young children.33 The N-JOV Study indicated that in both 2000 and 2006, the
majority of victims of online enticement were between thirteen and fifData collected by other organizations since 2006 have
teen-years-old.
indicated that in recent years, the age group has slightly increased, including victims as old as seventeen." Comparisons done among adolescent Internet users have concluded that victimization is highest among
sixteen-year-olds. 36 The next most victimized age group, at 23%, is fifteen-year-olds, followed by seventeen-year-olds, comprising 17% of the
victims. 37
B.
Negative Implications of Current and Future Technological Advances
Adolescents are at risk not only because they are viewed as prey,
but additionally because there is little that parents and guardians can do
to protect them. The youth who are being targeted are more familiar
with the technology than their parents and guardians, which effectuates
a decomposition of an otherwise effective monitoring system. 38 Furthermore, the Internet has become more pervasive than previously
imagined, and is now available to users on portable devices, such as
laptop computers and cell phones.3 9 Currently, adolescents can access
31 See Scott E. Caplan, Relations Among Loneliness, Social Anxiety, and ProblematicInternet
Use, 10 CYBER PSYCHOL. & BEHAV. 234 (2007); REPORT TO CONGRESS, supra note 10, at 30
("Grooming typically begins with the selection of a child who exhibits desired behaviors or
psychological characteristics such as low self-esteem or family problems.").
32 D'OVIDIo & O'LEARY, supra note 7, at 5; N-JOV STUDY, supra note 3, at 4 ("Most
victims were girls, but boys were 16 percent of victims [in 2006], compared to 25 percent in
2000.").
33 Most Internet Sex Offenders Aim At Teens, supra note 15; N-JOV STUDY, supra note 3, at 2.
34 N-JOV STUDY, supra note 3, at 4.
35 D'OVIDIo & O'LEARY, supra note 7, at 5.
36 Id; see also Janelle Stecklein, New Yorker indicted in online-solicitation case, AMARILLO
GLOBE-NEWS (Aug. 27, 2010), http://amarillo.com/news/2010-08-27/new-yorker-indicted-online-solicitation-case.
37 D'OVIDIo & O'LFARY, supra note 7, at 5.
38
Id.
39
Id
512
CARDOZO PUB. LAW POLICY &rETHICSJ.
o 10:505
[Vol.
the Internet, send text and instant messages, and participate in chat
rooms, on-the-go; no longer immobilized by a stationary computer, cell
phones offer even more expansive connectivity and access to predators.4 0
Furthermore, with newer phones offering connective, interactive applications, the risks are expanded. Parents and guardians cannot keep up
with that level of mobility and are relatively powerless to protect their
children from online enticement.4 1 The fragile nature of those preyed
upon, and the inability of parents and guardians to protect them, is the
very reason the government must employ strict laws as punishment for
offenders, as a means of discouraging online enticement.
Online relationships often progress at a fast pace. It has been determined that when a predator makes a connection online, he first assesses whether the victim trusts him. 4 2 Once affirmed, "the relationship
is likely to spill over into the physical world,"43 which can range from
sending and receiving letters and/or gifts through the mail to telephone
calls. 4' The ensuing step is an in-person meeting.4 5 A meeting is likely
to result in a direct sexual encounter between the predator and the ado40 See Press Release, United States Dep't ofJustice, Rochester Sex Offender Pleads Guilty To
Online Enticement Of Two Minor Girls (Aug. 4, 2010), http://www.justice.gov/usao/nyw/
press/press-releases/FranklinDeCapuaPlea_8-4-10.pdf [hereinafter Rochester Sex Offender Press
Release]; see Theresa Mioli, Vidor Man Indicted For Online Solicitation, BEAUMONT ENTERPRISE
(Nov. 1, 2010), http://www.beaumontenterprise.com/default/article/Vidor-man-indicted-foronline-solicitation-816656.php.
41 See Rochester Sex Offender Press Release, supra note 40.
42 See D'OVIDIo & O'LEARY, supra note 7, at 2. See also REPORT TO CONGRESS, supra note
10, at 30.
43
REPORT TO CONGRESS, supra note 10, at 30.
44 D'OVIDo & O'LEARY, supra note 7, at 2; see also United States v. Dwinells, 508 F.3d 63
(1st Cir. 2007). Dwinells, a forty-year-old man, fostered. online relationships of a sexually explicit nature with three underage females (Maria, 14; Paige, 14; Ashley, 13). Id. He exchanged
photographs with Maria, and received a pair of her underwear after requesting it. Id. He made
similar requests to Paige and Ashley. Id. He spoke to all three about meeting in person, offering
to pay their travel expenses if they would visit him in Boston. Id. Unbeknownst to Dwinells,
the girls were fictional and in actuality, the online personalities were two law enforcement officials conducting sting operations. Id. The case reflects the average progression of online enticement: initial online contact, requests for physical contact, and requests for an in-person meeting.
See D'OVIDIO & O'LEARY, supra note 7, at 2.
45 D'OVIDIo & O'LEARY, supra note 7, at 1-2 ("Of particular concern for parents and
government officials is that the solicitations and ensuing adult/child relationships originating in
cyberspace can lead to a physical-world relationship where the child is sexually abused."). Data
from the National Center for Missing and Exploited Children 2005 survey of online child victimization show that twenty-three percent of youth who received an unwanted sexual solicitation
were asked by the predator to meet in-person. Id.
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
513
lescent victim. 6 It has been determined that one in twenty-five teenagers are recipients of sexual solicitations that include attempts to meet in
person.
In order to prevent this from occurring, it is best to halt the
relationship at its very inception, from the first contact made on the
Internet. This implication raises the following question: what is being
done to protect minors from online enticement?
II.
SOCIETAL RECOURSE: PREVENTION PROGRAMS
There have been three prominent lines of defense in the battle
against online enticement of minors: (1) independent efforts to educate
youth, parents, and law enforcement; (2) creation and implementation
of specialized government agencies; and (3) proposed legislation aimed
at enhancing punishment for offenders. Private functions and public
funding have increasingly merged together in recent years, "many private organizations receive financial support from the [United States] Department of Justice/Office of Justice Programs through earmark
appropriations designated by Congress or through participation in competitive grant funding programs."" This coordination is likely responsible for the overwhelming success of both these government agencies and
the pseudo-private efforts.
As a nation, we view the Internet as a necessary evil. Therefore in
order to maintain its existence in society, while combating its negative
side effects, the government and private organizations are willing to
fund preventative measures." Unfortunately, it appears as though that
tough attitude, fiercely opposing online enticement, is not reflected in
much of the current legislation surrounding sentencing guidelines for
offenders. There is a disconnect between the measures of prevention
and punishment. As a society, we spend money,"o time, and resources"
on education and prevention methods. We have created specialized task
46 Id. at 2 ("The obvious danger of an in-person meeting is direct sexual contact between
predator and victim.").
47 DAVID FINKELHOR, KIMBERLY MITCHELL & JANIS WOLAK, I IN 7 YOUTH: THE STATISTICS ABOUT ONLINE SEXUAL SOLICITATIONS 1 (2007).
48 D'OVIDIo & O'LEARY, supra note 7, at 2; REPORT TO CONGRESS, supra note 10, at 95.
49
See infra Part II.A-B.
50
Internet Crimes Against Children Task Force Program, U.S.
OF JUV. JUST. AND
DELINQUENCY
DEPARTMENT OF JUST., OFF.
PREVENTION, http://www.ojjdp.gov/programs/progsum-
mary.asp?pi=3 (last visited Feb. 28, 2012) [hereinafter DOjs ICACProgram] (noting that in the
2009 Fiscal Year, Internet Crimes Against Children received $75 million in funding).
51 See D'OVIDIo & O'LEARY, supra note 7, at 2; REPORT TO CONGRESS, supra note 10, at
41.
514
CARDOZO PUB. LAW POLICY &rETHICS J
[Vol. 10:505
forces dedicated to this particular societal harm, yet, when those measurements fail and the anticipated crime is committed, many state legislators take a soft stance on punishment. 52
A.
Specialized Government Programs
The government has taken a broad approach to regulating sex offenders. History reveals an impressive expansion of protections afforded
to the public with regard to sex offender statutes." In the wake of the
tragic abductions and murders of Adam Walsh5 ' and Etan Patz," the
country was exposed to a "fundamental weakness in [its] approach to
52
See supra Part III.B.
53 Blaisdell, supra note 7, at 1160-66.
Blaisdell states in relevant part:
In 1994, Congress passed the Jacob Wetterling Crimes Against Children and Sexually
Violent Offender Registration Act ("Wetterling Act"). This statute compelled states
to require persons convicted of sexual crimes against children or sexually violent
crimes to register with the government upon release from prison or placement on
parole. The statute applied to individuals convicted of sexual battery, kidnapping of a
child, production or distribution of child pornography, and sexual conduct with a
minor. Two years after Congress passed the Wetterling Act it enacted Megan's Law,
which made two significant changes to the privacy rights of registered sex offenders.
First, Megan's Law required private registry data to become public information, and
second, it required state and local law enforcement agencies to release relevant sex
offender information necessary to protect the public... . On July 27, 2006, President
George W. Bush signed the Adam Walsh Child Protection and Safety Act of 2006
('Walsh Act') for nationalized sex offender registration ... Title I of the Walsh Act
created [the Sex Offender Registration and Notification Act (SORNA)]. The law
established guidelines for state registries and mandated a nationwide sex offender registry along with tougher penalties for sex offenders who failed to register. In addition
to the National Guidelines, section 146(c) of SORNA established the Office of Sex
Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking
('SMART'). The SMART office is responsible for determining whether jurisdictions
have met all of the requirements of SORNA. SORNA governs all fifty states, the
District of Columbia, the five principal United States territories, and the federally
recognized Indian tribes that elect to function as registration jurisdictions. SORNA
requires the registration of every sex offender who engages in . . . a sexual act with a
child under the age of twelve. Along with requiring sex offenders to register, SORNA
also sets forth three tiers of sex offenders into which all sex offenders may be classified
... the overall purpose of SORNA is to protect the public by requiring sex offenders
who have been released from incarceration to report certain information and by also
requiring states to collect and disseminate this information to the public.
Id.
54 Police: 1981 Killing ofAdam Walsh Solved, MSNBC (Dec. 16, 2008, 8:29 PM), http://
www.msnbc.msn.com/id/28257294/ns/us-news-crime and-courts/t/police-killing-adam-walsh-
solved/#.TkmUW7_sXeg.
55 Anthony Bruno, The DisappearanceofEtan Patz, TRUTV, http://www.trutv.com/libraryl
crime/serialkillers/predators/etan-patzlindex.htm (last visited Feb. 28, 2012).
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
515
investigating multi-jurisdictional crimes."5 6 It was determined that "the
United States, with its fifty states and approximately 18,000 separate
state and local law enforcement agencies, had no established protocol for
inter-agency communication and cooperation around cases of missing
and endangered children."57 This was quickly remedied when President
Reagan announced the creation of the National Center for Missing and
Exploited Children.5 8 This swift response was not an isolated one; subsequent acts were passed updating the regulations regarding registration
of sex offenders.59 When the problem was identified, the nation reacted
by taking abrupt, effective steps to remedy the issue and diligently maintained a strong stance against predatory behavior aimed at minors.
In addition to legislation, agencies have been created to act both in
conjunction and as a supplement. These organizations and task forces
protect our nation's youth by serving three relatively interconnected
functions: investigative assistance, training assistance, and awareness/
preventative initiatives.
i.
Investigative Assistance
Investigating online enticement involves specialized training. "Investigations involving the online exploitation of children require law enforcement officers with a background in the seizure of electronic
evidence and digital forensic methodologies." 6 0 Additionally, "knowledge of the substantive and procedural laws pertaining to computer
crime and related investigative techniques is also essential to preparing a
workforce to fight the online sexual exploitation of children." 6 ' Therefore, as a means of investigative assistance, many government-sponsored
organizations offer training focusing specifically on seizing, obtaining,
and processing electronic evidence.
Internet Crimes Against Children (ICAC), housed within the
United States Department of Justice, has created a Task Force Program
(ICAC Task Force Program), which "helps state and local law enforcement agencies develop an effective response to cyber enticement and
child pornography cases. This help encompasses forensic and investiga56 REPORT TO CONGRESS, supra note
10, at 93; see D'Oviolo & O'LEIRY, supra note 7, at
2.
57 REPORT TO CONGRESS, supra note
10, at 93.
Id
59 See United States v. Dwinells, 508 F.3d 63 (1st Cir. 2007).
60 D'OVIDIO & O'LFARY, supra note 7, at 10.
58
61
Id
CARDOZO PUB. LAW POLICY r ETHICSJ.
516
[Vol. 10:505
tive components, training and technical assistance, victim services and
community education."6 2 The highly effective program has been a great
resource for government and law enforcement agencies.
Since the inception of ICAC in 1998, over 230,000 law enforcement officers, prosecutors, and other professionals have received training.6 ' The ICAC Task Force Program has trained individuals from the
United States as well as seventeen other countries. 5 The program has
seen great success, "since 1998, ICAC Task Forces have reviewed more
than 280,000 complaints of alleged child sexual victimization resulting
in the arrest of more than 30,000 individuals." 6
ii.
Training Assistance
ICAC provides expansive training assistance as well: The ICAC
Training and Technical Assistance Program. The program "was established to assist ICAC task forces with training and technical assistance." 67 There are a vast array of ICAC training providers: Girls
Educational and Mentoring Services, 8 the National District Attorneys
Association, 9 the National White Collar Crime Center,7 0 the Fox Valley
Technical College,7 1 the National Center for Missing and Exploited
Children, and the National Consortium for Justice Information and Statistics (SEARCH).72 SEARCH "provides training related to social
62
DOJs ICAC Program, supra note 50; see Rochester Sex Offender Press Release, supra note
40.
See DOJs ICAC Program, supra note 50.
Id.; see Rochester Sex Offender Press Release, supra note 40.
65 DOJs ICAC Program, supra note 50.
66 Id
67 Id
68 Id. ("Girls Educational and Mentoring Services provides training and technical assistance
to increase the capacity of ICAC task forces to combat interrelated forms of commercial sexual
exploitation of children.").
69 Id. ("The National District Attorneys Association provides training for prosecutors, including their two-part Unsafe Havens class (Part I focuses on pre-trial and investigation, while
Part II is an advanced trial advocacy course addressing jury selection through sentencing).").
70 Id.
("The National White Collar Crime Center provides training for law enforcement,
prosecutors, and other stakeholders in the ICAC program to improve investigative,
prosecutorial, and forensic capabilities; create and distribute guidelines, best practices, and investigative methodologies; and coordinate meetings with grantees and practitioners.").
71 Id. ("Fox Valley Technical College . . . provides training focused on investigative techniques and best practices for undercover operations to combat Internet crimes against children
and site-specific technical assistance to ICAC Task Forces.").
63
64
72
Id
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
517
networking sites, peer-to-peer file sharing, wireless networks, and cell
phone technology." 73
iii.
Awareness/Preventative Initiatives
The National Center for Missing and Exploited Children plays a
major, preventative role. "[P]ursuant to 42 U.S.C. § 5773(b)(1), [the
National Center for Missing and Exploited Children] operates the Congressionally-mandated Cyber Tipline and the Child Victim Identification Program."7 4 The Cyber Tipline is specifically intended to receive
tips relating to a violation of 18 U.S.C. § 2422(b), which makes illegal
the online enticement of children for sexual acts; the Code provides that
"it is a federal crime to use the Internet to knowingly persuade, induce,
entice, or coerce a child under the age of 18 to meet for sexual acts, or to
attempt to arrange such a meeting."7 5
Further preventative measures have been taken by the Innocent
Images National Initiative (IINI). IINI is an FBI initiative aimed at
addressing crimes related to the sexual exploitation of children by means
of computers and similar media.76 "IINI investigations involve the use
of highly sophisticated methods to identify subjects trying to evade law
enforcement detection by use of multiple layers of encryption and proxy
servers in other countries." 7 7
The FBI recently created a new facility to be used primarily by
IINI investigators for the forensic analysis of evidence from significant
cases nationwide.7 8 Regarding awareness initiatives, IINI teaches Internet safety by providing training through the FBI's Safe Online Street
Internet Challenge (S.O.S.), which is a national program designed to
teach students Internet safety and educate them on the conceivable dangers associated with the online community.7 9 An estimated 60,000 students have successfully participated in the S.O.S. program.o IINI's
S.O.S. program is a highly effective tool for providing awareness as to
the prevalence of Internet crimes.
73
Id.
74 REPORT TO CONGRESS, supra note
10, at 94.
75 18 U.S.C. § 2422(b) (2006).
76 REPORT TO CONGRESS, supra note
77
Id
78
Id at 43.
Id.
79
80 Id
10, at 42.
518
CARDOZO PUB. LAW POLICY cr ETHICS J
[Vol. 10:505
B. Independent Efforts to Prevent Online Enticement and Exploitation
of Children
Myriad programs and projects sponsored by and run through independent non-government agencies and organizations have come into effect, as various efforts are made to protect children from online
enticement. There are numerous organizations, many of which are notfor-profit, that offer investigative and training assistance."1 As for raising awareness, the media has done a great job bringing this issue to the
forefront and has raised awareness. "Much of this work [done by independent agencies] has [been] met with success and has ultimately raised
the awareness of law enforcement, policy makers, parents, and children
of the techniques used by Internet predators."82 Like the aforementioned government programs, these independent efforts involve investigation, training, awareness, and self-policing.
Investigative Assistance
i.
There are multiple "task forces and professional associations [that]
provide assistance to law enforcement agencies with investigations, forensic examinations, and operational policies related to the online exploitation of children."8 3 The International Association of Computer
Investigative Specialists (IACIS) is a prime example. IACIS is a not-forprofit, volunteer organization geared towards educating and subsequently training law enforcement in forensic computer science." The
task force is comprised of 800 members hailing from various countries
and governmental agencies. Members of the task force, in addition to
training, make themselves available to law enforcement for consultations
regarding electronic crime investigations.85
ii.
Training Assistance
It is typically left to non-governmental entities to provide training
for children, parents, and educators on how to engage in safe Internet
81 For example, INOBTR ("I Know Better"), a 501(c)(3) organization which is funded
through private sector sponsorship and government grants. About INOBTR, INOBTR, http://
www.inobtr.org/about/ (last visited Jan. 8, 2012).
82 D'OVIDIo & O'LEARY, supra note 7, at 7.
83 Id. at 9.
84 See INT'L Ass'N OF COMPUTER INVESTIGATIVE SPECIALISTS, http://www.iacis.info (last
visited Jan. 8, 2012).
85 D'OVIDIO & O'LEARY, supra note 7, at 10; see
TIVE SPECIALISTS, supra note 84.
INT'L AsS'N OF COMPUTER INVESTIGA-
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
519
practices." In 1994, Enough Is Enough (EIE)8 7 emerged as a national
leader, initiating the movement towards making the Internet a safer
place for adolescents."
EIE actively "confront[s] . . . sexual predation
with innovative initiatives and effective communications. "89
Various methods are employed by the myriad of organizations
dedicated to promoting web safety. Web Wise Kids, Inc., employs a
unique approach. The organization "offers fun, challenging and interactive simulations based on real-life criminal cases .
.
. to teach children
about Internet risks." 90 Catering to a more traditional method of youth
education, INOBTR ("I Know Better")" partnered with the government and private citizens to promote awareness and teach children, parents or guardians, and educators how to reduce the possibility of being a
victim of Internet crime. 92
In addition to directly training Internet users, some organizations
also train law enforcement officials. The High Technology Crime Investigation Association Internet Safety for Children Campaign (HTCIA)
created a program93 to train law enforcement professionals on how to
effectively convey Internet safety advice to both children and parents.
From its website," educators, parents, and law enforcement professionals can download Internet Safety Training Tips for targeted audiences. 6
The materials are tailored to specific age groups,97 and present important, age-appropriate messages for each group, as well as guidelines on
how to deliver the information, answer commonly asked questions, and
While the government does not run these organizations, it may provide funding to them.
REPORT TO CONGRESS, supra note 10, at 51.
86
87 Enough Is Enough is a non-partisan, non-profit organization. REPORT TO CONGRESS,
supra note 10, at 96.
88 1d
89 Id.
90 Id
91 INOBTR is a play on Internet slang and intended to be read as "I Know Better"-I NO
BTR. About INOBTR, INOBTR, http://www.inobtr.org/about/ (last visited Jan. 8, 2012).
92 REPORT TO CONGRESS, supra note 10, at 97.
93 Internet Safety for Children, INT'L HIGH TECH. CRIME INVESTIGATION ASS N, http://
www.htcia.org/isfc/ (last visited Jan. 8, 2012) (noting that HTCIA partnered with Hewett Packard, the United States Secret Service, LiveWWWires, NetSmartz, and the National Center for
Missing and Exploited Children to create this program).
94 D'OVIDIo & O'LFARY, supra note 7, at 12.
95
Internet Safety fr
96
Id.
Children, supra note 93.
97 Id. HTCIA breaks it down into four distinct categories: K-Grade 2, Grades 3-6, Middle
School (typically consisting of Grades 7-8, or Grades 6-9), and High School. Id.
520
CARDOZO PUB. LAW POLICY & ETHICS
[5
10:505
[Vol.
define certain terms. Also included are age-applicable contracts-an Internet Safety Pledge-for students to sign.98 A similar program, I-Safe,
"provides educators, law enforcement professionals, and parents with
training materials to promote a safe and responsible Internet experience
for children." 99
iii.
Awareness/Preventative Initiatives
Perhaps the most important, effective, and instrumental service
provided by independent agencies is that of promoting awareness.
Awareness leads to prevention. NetSmartz Workshop, 0 0 for example,
provides do-it-yourself programs that both children and parents can use
I-Safe, in addition to proto educate themselves on Internet safety.'
viding training materials, also provides extremely important online resources for adolescents in need. 1 0 2 I-Safe has a chat room dedicated to
the facilitation of open communication between inquisitive children and
I-Safe staff who can answer questions regarding online safety issues. 1 3
Similarly, WiredSafety engages in more than just training assistance.
WiredSafety has specialized information, targeted for parents,'o 4 law enforcement,' 0 kids, older age groups, including tweens and teens,10 6 and
victims.107 Furthermore, WiredSafety has a vast online library comprised of resources about Internet safety.'os The purpose of the library
is to provide both parents and educators with current news and information regarding the most recent dangers that children may be exposed to
while using the Internet. 0 9
9 8 Id
99 D'OVIDIo & O'LEARY, supra note 7, at 12.
100 NetSmartz Workshop: A Program of the National Centerfor Missing and Exploited Children,
NAT'L CENTER FOR MISSING AND EXPLOITED CHILD., http://origin.www.netsmartz.org/Parents
(last visited Apr. 13, 2012).
101 D'OVIDIO & O'LEARY, supra note 7, at 11.
102 Id at 12.
103 Id
104 Parents, WIREDSAFETY, www.wiredsafety.org/index.php?option=com_content&view=cat4
egory&layout=blog&id=45&Itemid=5 (last visited Jan. 8, 2012).
105 Law Enforcement, WIREDSAFETY, www.wiredsafery.orglindex.php?option=comcontent&
view=category&layout=blog&id=46&Itemid=56 (last visited Jan. 8, 2012).
106 WiredSafetys Youth Page, WIREDSAFETY, www.wiredsafety.org/index.php?option=com
content&view=category&layout=blog&id=38&Itemid=60 (last visited Jan. 8, 2012).
107 Victims, WIREDSAFETY www.wiredsafety.org/index.php?option=com-content&view=cate-
gory&layout=blog&id=57&Itemid=84 (last visited Jan. 8, 2012).
108 Id
109 Id
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
iv.
521
Self-Policing
The relationship between the Internet and sexual exploitation of
children has become very well known. While this was initially due to
increasing government support for the connectivity and sharing of information between jurisdictions, the issue has stayed on the minds of average citizens for one reason: the media. 1 o Often, the media calls our
attention to the negative consequences of the Internet by running news
stories on victims. At times however, the media highlights progress,
such as the recent attempts by social networking websites to self-monitor their content in order to provide users with the safest version of their
website. "
The well-known online community, Craigslist, has made headlines
in recent years due to its "erotic services"-turned-"adult services" section.'1 2 These newsworthy occurrences were typically negative, oftentimes relating to cases of prostitution and child exploitation. Craigslist's
CEO Jim Buckmaster worked closely with Craigslist's Director of Law
Enforcement Relations William Clinton Powell and Craigslist's Attor13
ney Elizabeth McDougall to take active steps to remedy the situation.
As a result, in 2008,
Craigslist . .. entered into an agreement with the National Center for
Missing and Exploited Children (NCMEC) and the Attorneys General of 40 states to enact measures that it claim[ed were] targeted towards fighting child exploitation ... the agreement [was] designed to
prevent the popular classifieds site from being used for human traf1
ficking, child exploitation, and 'other illegal activities."
110 D'OVID1O & O'LEARY, supra note 7, at 1; N-JOV STUDY, supra note 3, at 1; Christopher
Leibig, Virginia's Internet Solicitation Law: Mandatory sentences target virtual more than live
predators, ARLINGTON LAW & POL. EXAM'R (Oct. 29, 2009), http://www.examiner.com/lawand-politics-in-arlington/virginia-s-internet-solicitation-law-mandatory-sentences-target-virtualmore-than-live-predators.
I11 See Jacqui Cheng, Craigslist:adult services dead;good luck with otherguys, ARS TECHNICA
(Sept. 15, 2010), http://arstechnica.com/tech-policy/news/2010/09/craigslist-to-congress-adultservices-is-dead-good-luck-with-the-other-guys.ars [hereinafter Craigslist:Adult Services Dead].
112 Id
113 Id
114 Id; see Press Release, Connecticut Attorney General's Office, CT Attorney Gen., 39
Other States Announce Agreement With Craigslist, NCMEC To Crack Down On Erotic Ser4 2 44 8
vices Ad Content (Nov. 6, 2008), http://www.ct.gov/ag/cwp/view.asp?A=2795&Q= 7
[hereinafter Connecticut AG Press Release]; see Jacqui Cheng, Craigslistputsa dimmer on its redlight district, ARS TECHNICA (Nov. 6, 2008), http://arstechnica.com/tech-policy/news/2008/1 1/
craigslist-puts-a-dimmer-on-its-red-light-district.ars [hereinafter CraigslistPuts A Dimmer On Its
522
CARDOZO PUB. LAW POLICY & ETHICS J
[Vol. 10:505
The. agreement included the implementation of a more stringent
phone verification system and a requirement that the website start
charging fees for listings made in the red light district."' The public
heavily criticized the addition of a fee." 6 However, this criticism was
misguided, as the fee was not intended as a profit-making mechanism.
Rather, the fee was implemented to enable Craigslist to provide law enforcement with contact information retrieved from credit cards used in
instances of illegal enticement.' 17
Red-Light District]; see JointStatement with Attorneys General, CRAIGSLIST BLOG (Nov. 6, 2008),
http://blog.craigslist.org/2008/11/joint-statement-with-attorneys-general-ncmec/.
The forty
states mentioned are Arizona, Arkansas, Colorado, Connecticut, Delaware, Georgia, Hawaii,
Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Mississippi,
Montana, Nebraska, Nevada, New Hampshire, New Mexico, New Jersey, North Carolina,
North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, South
Dakota, Tennessee, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, and Wyoming. Also joining the agreement are the District of Columbia, the United States Virgin Islands, and Guam. Connecticut AG Press Release, supra.
'15 The Erotic Services-turned-Adult Services section of Craigslist was deemed the website's
red-light district based on the similarities it shared with other well-known areas bearing the same
name. See Monique Garcia & Robert Mitchum, Craigslist Ending 'Erotic Services' Ads, CHI.
TIuB. (May 13, 2009), http://articles.chicagotribune.com/2009-05-14/news/090513091 11
prostitution-services-section-shuts ("Craigslist is doing the right thing in eliminating its online
red light district with prostitution and pornography in plain sight.").
116 Craigslist.Adult Services Dead, supra note 111; Jacqui Cheng, Craigslistgives in, will shut
down Erotic Services section, ARS TECHNICA (May 13, 2009), http://arstechnica.com/tech-policy/news/2009/05/craigslist-gives-in-will-shut-down-erotic-services-section.ars
[hereinafter
CraigslistGives In]; CraigslistPuts A Dimmer On Its Red-Light District, supra note 114.
117 Connecticut AG Press Release, supra note 114 ("Under the agreement, Craigslist will
require that posters of erotic services ads give a working phone number and pay a fee with a valid
credit card. The site will provide the resulting information in response to law enforcement
subpoenas."); see Joint Statement with Attorneys General,supra note 114. It had been decided
that:
In addition to phone verification and other existing protective measures, [C]raigslist
will soon require credit card verification and a small fee per ad for posting in 'erotic
services', to further encourage compliance with site guidelines. Paid ads that violate
site guidelines will be removed without refund: The company intends to donate 100
percent of net revenue generated from the 'erotic services' category to charity, with net
revenue to be verified by an external auditor.
'Requiring credit card verification, and charging a fee to post in this category raises
accountability to a point where we expect few illicit ads will remain,' says [Craigslist
CEO Jim] Buckmaster. 'For those that do persist, telephone and credit card information will be available to law enforcement via subpoena. More than ever, those who
would misuse [C] raigslist to violate the law will find that [C]raigslist is a very inhospitable place.'
Id.
2012]
ONLINE SEXUAL SOLICITATION OFMINORS
523
When that measure was deemed ineffective, Craigslist effectuated
self-help: changing the section's name from "Erotic Services" to "Adult
Services" and revamping the criteria for the material present on the
site."' Powell implemented manual reviews of every listing."' 9 As a
result, Craigslist experienced a ninety percent drop in postings.1 2 0 In
addition to monitoring the content, Craigslist provides users with information on how to report suspected trafficking, it "features law enforcement hotlines, has specialized victim search interfaces for police, and
meets regularly with experts at nonprofits and law enforcement. "121
Craigslist's attempt to self-monitor the content on its website was twofold: it involved 1) filtering the content on the website itself and 2)
shedding light on the issue by posting warnings and information on
how to report problems.122 Craigslist has been praised for making tremendous strides in regards to self-policing, but nonetheless, was unable
to prevent its website from being used as a medium for sexual exploitation of minors via online solicitation.12 3 After coming to the realization
that despite implementing a plethora of safety precautions, Craigslist
still could not prevent all instances of solicitation, the website chose to
permanently remove its "Adult Services" section.12 4 Craigslist made a
valiant effort to police its own website, but ultimately, was unable to
ensure that even with careful monitoring there would not be any future
solicitation of minors. However, despite the undesirable resolution, the
incident did bring to light the role the media plays in raising awareness.
Another example of an independent organization raising awareness
is the well-known, and somewhat controversial television show, To Catch
a Predator. The show, an investigative series on Dateline NBC, although not the first mechanism to discover or pursue predators engaging in online solicitation, played a paramount role in bringing these
instances to the forefront of public awareness.12 5 As host Chris Hansen
explained:
118 Craigslist:Adult Services Dead, supra note 111.
119 Id.; see Craigslist Gives In, supra note 116.
CraigslistGives In, supra note 116.
121 Craigslist:Adult Services Dead, supra note 111.
122 See id; see CraigslistGives In, supra note 116; see CraigslistPutsA Dimmer On Its Red-Light
District, supra note 114.
123 Craigslist:Adult Services Dead, supra note 111.
124 Id
125
SANSEN,
supra note 20, at 1.
120
CARDOZO PUB. LAW POLICY &'rETHICS J
524
[Vol. 10:505
We were not the first news show to discover that predators pursued
kids online .
. .
. Advocacy groups, victims of computer predators,
and even so-called vigilante groups had been trying to expose this
years before the first 'To Catch a Predator' investigation aired. Local
law enforcement and the FBI had been doing stings in chat rooms
before we started. . . . [T]he reason why we chose to work with [Perverted Justice] in the beginning instead of with law enforcement is
because it allowed us to do real reporting on the subject of computer
predators. If we had simply watched an officer chat with a predator
and videotaped him being arrested when he showed up at a park to
meet a child, that would only be telling part of the story and would
not have given us much insight into the mind of a predator.
. .
. We
could get a pretty good sense of who the potential predators were
based on the extensive chat logs with decoys .
. .
. I would be able to
talk to these men face-to-face. I would hear their excuses and sometimes their confusions. Some would bolt as soon as they saw me.
Some would refuse to leave, demanding over and over that they not be
outed on national television. These confrontations are a critical part
of both exposing and understanding the problem. 12
The show is considered by many to be outrageous, and therefore, is
often discussed. Word of mouth is a powerful tool; people view the
television show, become upset, repulsed, or worried, and that triggers
individuals to take preventative measures. Parents are more likely to
discuss safety measures with their children, and to let them know that if
anything like that ever happens to them, they should report it. While
many believe the show paints a gloomy picture of our web-based secondary society, many others argue that it simply sheds light on the many
possibilities of what can happen when engaging in Internet use, and that
it raises societal awareness. The media, television in this instance, is a
powerful instrument, and with a program as captivating as To Catch a
Predator, audiences are drawn in.127 The more popular the show becomes, the more people are made aware of the potential consequences of
the Internet. The entire movement has been a positive one, bringing an
important societal harm into the limelight and fostering the growth of a
Id. at 1-3; PERVERTED JUSTICE, http://www.perverted-justice.com (last visited Nov. 30,
2010); see Matea Gold, NBC resolves lawsuit over 'To Catch a Predator'suicide,L.A. TIMES BLOG
(June 24, 2008, 3:35 PM), http://latimesblogs.latimes.com/showtracker/2008/06/nbc-resolvesla.html.
127 HANSEN, supra note 20, at 1 ("We did figure out how to expose it in an enterprising
way.").
126
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
525
vital watchdog organization, Perverted Justice. 1 28 Perverted Justice,
which currently boasts a 100% conviction rate, 1 2 9 which many equate to
a 100% success rate, would not have grown into the reliable watchdog
organization it currently is, and would not have such positive relations
with officers of the law, were it not for its connection to the show.13 0 To
Catch A Predatoris a vivid example of an independent entity-here, a
news anchor-presenting the real-life dangers associated with Internet
use. In doing so, Hansen enlisted the help of Perverted Justice, and
displayed their otherwise overlooked methods to the public.
However, some individuals blame the media, and this program in
particular, for making the issue of online solicitation too pervasive.
Some believe that the show "furthers the hysteria" surrounding the issue
of Internet predators. 13 ' This resonates with more reserved members of
society, analytical individuals who are overly cautious and believe that
little of what is shown on television is truthful, and that instead, the
issues are often exaggerated. Certain instances in the past give merit to
this theory. For example, "[i]n a speech [given by former Attorney General Alberto Gonzales] about a major initiative to combat the 'growing
problem' of Internet predators, he cited a statistic he attributed to To
Catch a Predator. Gonzales stated that approximately 50,000 such
would-be pedophiles were prowling the Internet at any given moment."l 3 2 However, the number had no factual basis. "When questioned about the statistic, Dateline claimed that it had gotten the
number 50,000 from a retired FBI agent who consulted with the show.
When .
.
. contacted, [the consultant] stated that he 'wasn't sure where
the number had come from.'" 3 3
Regardless of the minor inaccuracies, which are bound to surface
even within the most prestigious institutions, the show is a powerful
Id. at 3. Hansen explains that:
As [Perverted Justice] has evolved, it has gone from vigilante group to computer
128
watchdog group . . . it is now in demand from police and sheriffs departments
around the country. Now its mission has more to do with helping law enforcement
prosecute cases in court than merely posting the names of predators on its Web site.
Id.
129 Info For Police, PERVERTED JUSTICE, http://perverted-justice.com/index.php?pg=
policeinfo (last visited Jan. 8, 2012).
130 HANSEN, supra note 20, at 3.
131 Dara L. Schottenfeld, Witches and Communists and Internet Sex Offenders, Oh My: Why It
is Time To Call Off The Hunt, 20 ST. THOMAS L. REv..359, 370-71 (2008).
132 Id
133
Id
526
CARDOZO PUB. LAW POLICY & ETHICS J
[Vol. 10:505
tool in the war against online predators. To Catch a Predatorshowcases
the reality of whom children may be talking to online and the associated
dangers. It conveys an important underlying fact: these conversations
and meetings may not be harmless fun, but instead, may be instances of
illegal activity.
III.
LEGISLATION
There is no uniform penalty for online solicitation of sex from a
minor; rather, each state sets its own sentencing guidelines regarding
online enticement. 3 4 "Sentencing guidelines are part of an intricate
sentencing system and are exceedingly detailed and complex."35 As a
result, punishment varies greatly by jurisdiction. This disconnect
presents a loophole for criminals and can allow sexual deviants to escape
with lesser punishment than ordinarily expected.13 6 Under federal law,
online enticement is a felony punishable by a minimum prison term of
ten years and a maximum of life imprisonment. Yet typical state sentencing is significantly less harsh; some states allow for sentences of less
than one year, and may use misdemeanor classification.' 3 7 Many believe
this is a result of increased judicial discretion, begging the following
question: does increased judicial discretion regarding sentencing provide
a more lax punishment scale, or instead, implement a highly effective
system of penance?
Evidently, "[nilationally, the average sentence length has increased
for all crimes post-Booker," the case in which the United States Supreme
Court struck down a federal sentencing statute provision that required
federal district court judges to impose sentences within the range specified by the federal guidelines.1'" "[T]he average sentence length has also
increased for sexual exploitation offenses. Before the PROTECT Act
was enacted, the average sentence for Exploitation of a Minor was 146
134 Press Release, Nat'l Ctr. for Missing and Exploited Children, Punishment of Internet
Predators Varies Greatly By State (Dec. 6, 2006), http://www.missingkids.com/missingkids/servlet/NewsEventServiet?LanguageCountry=enUS&Pageld=2947 [hereinafter National Center
for Missing and Exploited Children Press Release].
135 Laura M. Klever, ReinvigoratedJudicialDiscretionAfier Booker: Burden Or Boon To Sexual
Exploitation Offenders?, II J. GENDER RACE & JUST. 93, 104 (2007) ("To impose a sentence,
the judge must identify the appropriate guideline range for the offense. This is accomplished by
determining two items: offense level and criminal history.").
136 Id
137 Id
138 Id
ONLINE SEXUAL SOLICITATION OF MINORS
2012]
527
months. Post-Booker, the average sentence . . . was 209 months. This
represents more than a forty percent increase in sentence length."1 3 9
However, the single similarity amongst the myriad state sentencing
guidelines is a general lack of severity; the punishments doled out by
many of the states are minor relative to the nature of the crime. Of
course, there are a number of jurisdictions that already have stern sentencing requirements, including Georgia, 40 Maine,'' and Montana,14 2
as well as the District of Columbia, which abides by the federal statute.1 3 However, the remaining states have undeniably looser standards.
The less restrictive sentencing guidelines employ one or more of the
following practices: they (1) permit misdemeanor penalties; (2) classify a
violation as a felony, "but grant judges statutory discretion to sentence
offenders to less than a year in prison";"' or (3) grant judges statutory
discretion to eliminate all prison time and, instead, punish offenders
with a monetary fine.' 4 5
A.
Levels of Punishment and the Distinction Between Online
Communications and Real-World Contact
Many states vary the level of punishment based on a fact-specific
inquiry, typically dividing culprits into two categories: 1) those who
made physical, real-world contact with a minor; and 2) those who instigated an online connection only.'4 6 This division is often indiscernible
to those outside the legal profession. Viewers of To Catch a Predator,for
example, are only witnessing the more grandiose violations, and give
little thought to those who engage in online communication with minors but take no steps to meet them in person.
139 Id.; United States v. Booker, 543 U.S. 220 (1995); 18 U.S.C. § 3553 (2006). As a result:
After the enactment of the PROTECT Act, judges settled back into their restricted
roles, albeit resentfully, as they essentially became fact-finders who simply determined
whether 'aggravating or mitigating facts that mattered to the Commissioners existed,
and plugged these findings into the formula provided in the Manual to reveal the
appropriate sentence.'
Klever, supra note 135, at 110.
140 GA. CODE ANN.
§ 16-12-100.2 (2011).
'4'
ME. REv. STAT. ANN. tit. 17-A,
142 MONT. CODE ANN. § 45-5-625
§ 282 (2011).
(2011).
143 National Center for Missing and Exploited Children Press Release, supra note 134; see
Klever, supra note 135, at 104.
144 National Center for Missing and Exploited Children Press Release, supra note 134.
145
Id.
146
See FLA.
STAT. ANN.
§ 847.0135 (West 2011).
528
CARDOZO PUB. LAW POLICY & ETHICS j
[Vol. 10:505
To Catch a Predatoris most widely known for the men who actually
show up at the decoy house to allegedly engage in sexual acts with a
person they believe to be a minor. Most people have no difficulty
grasping the idea that by arriving at that house, the men featured on
the show have demonstrated a clear intent to commit the underlying
crime against a minor. By actually leaving their own homes and making their way to the decoy house, the men have moved beyond the
mere preparation stage and have taken a substantial step toward the
commission of that crime. Most people do not realize, however, that
Internet luring statutes do not require men to actually show up at all.
Under these statutes, once someone has engaged in a sexually themed
online chat with a decoy posing as a minor, they have committed a
crime. The men who do not actually appear at the decoy house can
still be charged with the crime of attempted solicitation of a minor.1 7
It is reasonable to have a system that differentiates between offenders who set up and follow through with meetings, and offenders who do
not. The former should be punished more harshly. The most practical,
and legible, state statutes are those that clearly establish a difference between the two offenses. A prime example of such a statute is Florida's
SecComputer Pornography and Child Exploitation Prevention Act.'
tion 847.0135(3)(a) of the Act defines the type of activities that are
prohibited, which include the use of a computer to "seduce, solicit, lure,
or entice, or attempt to seduce, solicit, lure, or entice, a child or another
person believed by the person to be a child" to engage in any unlawful
sexual conduct. Thus, subsection (3) defines online enticement, and
declares that any person who engages in such acts "commits a felony of
the third degree."149 In clear contrast, subsection (4), entitled "traveling
to meet a minor," identifies the difference in the crimes:
Any person who travels any distance either within this state, to this
state, or from this state by any means, who attempts to do so, or who
causes another to do so or to attempt to do so for the purpose of
engaging in . . . unlawful sexual conduct with a child or with another
person believed by the person to be a child after using a computer
online service, Internet service, local bulletin board service, or any
other device capable of electronic data storage or transmission to: (a)
Seduce, solicit, lure, or entice or attempt to seduce, solicit, lure, or
147 Schottenfeld, supra note 131, at 377 (emphasis added).
148 FiA. STAT. ANN. § 847.0135.
149 Id. § 84 7.0135(3)(a).
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
529
entice a child or another person believed by the person to be a child,
to engage in . .. unlawful sexual conduct . .. commits a felony of the
second degree.1 5 o
The statute clearly distinguishes between solely online conduct and any
attempt at the physical manifestation of said conduct.
In Florida, both online solicitation and physical manifestation of
such solicitation are considered felonies. However, they differ in degree.' 5 ' This likely stems from controversy as to what constitutes engagement in inappropriate, sexually explicit conversations with minors,
and whether intent should play a role. On one end of the spectrum,
there is concern over the risk of chilling free speech by punishing people
without ascertaining their intent.152 Courts have been hesitant to assume intent where there has been none demonstrated, and instead look
solely at the inappropriate content itself. 53 This important consideration regarding the role of intent in distinguishing individuals who exclusively engage in online communication with minors from those who
actively seek out physical interactions dictates many of the current debates and laws.
B.
Statutory Discretion
Judicial discretion is a relatively controversial topic. When analyzing judicial discretion, it is important to look at the context it is coming
from. 4 "In a purely discretionary system, it would seem that there are
as many sentencing models as there are judges. This is one of the
strengths of a discretionary system-infinite adaptability-but from an
analytical standpoint, this is also a weakness."' 55 Proponents as well as
opponents of judicial discretion present strong, valid arguments. The
history of federal judicial discretion reflects society's polarization:
Judicial discretion has come nearly full circle in the past 100 years.
Judges first had nearly unbridled discretion to determine offenders'
sentences. However, as sentencing disparities became more prevalent,
Id. § 847.0135(4)(a).
151 See id. § 847.0135(3)-(4).
152 Schottenfeld, supra note 131, at 382-83.
153 Id. at 383.
150
154
ANDREW WISEMAN & MICHAEL CONNELLY, JUDICIAL DISCRETION AND SENTENCING
OUTCOMES: INCORPORATING DATA FROM THE COURTROOM
www.ncjrs.gov/pdfftlesl/nij/grants/223974.pdf.
155 Id
(2008), available at https://
530
CARDOZO PUB. LAW POLICY 6-ETHICS J.
[Vol. 10:505
the legislature took steps to limit judicial discretion. The Sentencing
Reform Act of 1984 was Congress'[s] second attempt at sweeping reform, followed by the Prosecutorial Remedies and Other Tools to End
the Exploitation of Children Today Act of 2003 (PROTECT Act).
Although judges retained little discretion after these two enactments,
the U.S. Supreme Court continued to curb judges' discretion in Jones
v. United States and Apprendi v. New Jersey before finally reinvigorating
judicial discretion in United States v. Booker.156
At present, offenders who are convicted in Delaware,' 5 7 Iowa,15 8
New York,' 5 9 or North Dakota, 16 o may, at the discretion of the presiding judge, spend less than one year in prison for the crime of online
enticement, despite the crime's classification as a felony. Similarly, the
statutes in the following states solely provide a maximum sentencing
requirement: Maryland, 6 1 Minnesota,16 2 Oklahoma,16 3 South Carolina,1 64 South Dakota, 65 and Wisconsin. 6 6 Therefore, individuals convicted in these states face no minimum sentencing requirement and
consequently could conceivably serve less than a year in jail.
Additionally, there are presently eight state statutes classifying
some form of online enticement as a misdemeanor.16 7 The current statutory guidelines in California," Michigan,' 6 9 North Dakota, 7 o Oregon, 17 ' Tennessee,1 72 Utah, 17 3 Vermont,17 4 and Washington17 5 present
156 Klever, supra note 135, at 96-97 (discussing Jones v. United States, 526 U.S. 227 (1999);
Apprendi v. New Jersey, 530 U.S. 466 (2000); United States v. Booker, 543 U.S. 220 (1995)).
157 DEL. CODE ANN. tit. 11, § 4205(e) (2011).
158 IOWA CODE ANN. § 902.9 (West 2011).
159 N.Y. PENAL LAW §§ 235.22, 70.00 (McKinney 2011).
160 N.D. CENT. CODE ANN. § 12.1-20-05.1 (West 2011).
161 MD. CODE ANN., CRIM. LAw
162 MINN. STAT. ANN. § 609.352
§
3-324 (West 2011).
(West 2011).
§ 1040.13a (West 2011).
164 S.C. CODE ANN. § 16-15-342 (2011).
165 S.D. CODIFIED LAws § 22-24A-5 (2011).
166 Wis. STAT. ANN. %5 939.50, 948.075 (West 2011); WISEMAN & CONNELLY, supra note
154 ("Due to the voluntary nature of sentencing guidelines in Wisconsin, judges are neither
required to follow the suggested guidelines nor submit completed worksheets. On average, only
20 percent of possible worksheets are submitted to the Sentencing Commission in a given
year.").
167 WISEMAN & CONNELLY, supra note 154.
168 CAL. PENAL CODE § 288.3 (West 2011); see also id. § 288.2; id. § 288a(b)(1); id
163 OKaA. STAT. ANN. tit. 21,
§ 311.1(a); id. § 311.2(a); id. § 311.4(a).
169 MICH. COMP.
LAws ANN. § 750.145d (West 2011).
170 N.D. CENT. CODE ANN.
171 OR. REv. STAT. ANN.
§
12.1-20-05.1 (West 2011).
§ 163.435 (West 2011).
2012]
ONLINE SEXUAL SOLICITATION OFMINORS
531
tiered options, which in certain specified instances permit an offense to
be considered a mere misdemeanor.
In New York, certain conduct, such as enticing a minor to engage
in sexual acts by depicting or describing sexual conduct during a computer-induced communication"" is classified as a class D felony. Section 70.00 of the New York Peial Law determines sentencing for the
commission of a felony; judges are provided with statutory discretion to
limit the sentence if they believe that the jury-determined punishment is
too harsh.177 The statute holds that the maximum prison term for a
Class D Felony is no more than seven years. 17" However, it neither
suggests nor requires a minimum sentencing term. Section 70.00(4)
provides an "alternative definite sentence for class D and E felonies."179
This section of the statute lays out an exception, maintaining that:
When a person, other than a second or persistent felony offender, is
sentenced for a class D or class E felony, and the court, having regard
to the nature and circumstances of the crime and to the history and
character of the defendant, is of the opinion that a sentence of imprisonment is necessary but that it would be unduly harsh to impose an
indeterminate or determinate sentence, the court may impose a definite sentence of imprisonment and fix a term of one year or less.' 8 o
Therefore, the decision to reduce the sentence is seemingly entirely up
to the court. There are no guidelines that judges are required or even
suggested to follow when making the discretionary determination that
an individual guilty of online enticement of a minor should serve less
172 TENN. CODE ANN.
173 UTAH CODE ANN.
174
VT. STAT. ANN. tit.
§ 39-13-528 (2011).
§ 76-4-401 (West 2011).
13,
176
177
%§ 2825,
2828 (2011).
(West 2011).
N.Y. PENAL LAw § 235.22 (McKinney 2011).
Id. § 70.00(4). In New York, alternative definite sentences exist for class D and E
175 WASH. REV. CODE ANN.
§ 9.68A.090
felonies:
When a person, other than a second or persistent felony offender, is sentenced for a
class D or class E felony, and the court, having regard to the nature and circumstances
of the crime and to the history and character of the defendant, is of the opinion that a
sentence of imprisonment is necessary but that it would be unduly harsh to impose an
indeterminate or determinate sentence, the court may impose a definite sentence of
imprisonment and fix a term of one year or less.
Id.
178
Id § 70.00(2)(d).
179
Id
180
Id.
CARDOZO PUB. LAW POLICY &'rETHICS J.
532
[Vol. 10:505
than a one year prison, sentence rather than up to seven years. Some
would argue that this could be unfair. This flexibility, and the uncertainty that follows, fails to send a powerful deterrent message to potential felons.'' As former Attorney General Alberto Gonzales once said,
"the ability of judges to exercise discretion 'threatens the progress we
have made in ensuring tough and fair sentences for federal
offenders.' "182
Monetary Fines as Punishment
i.
Maryland, 18 3 Michigan,18 4 Minnesota,18 5 North Dakota,'8 6
Oklahoma,'1 7 South Carolina,' 8 South Dakota, 8 9 Vermont,9'o Washington,' 9 1West Virginia,19 2 and Wisconsin' 9 3 judges are given statutory
discretion to sentence offenders to pay a simple fine in lieu of serving
time in prison. Further, in states such as Michigan, 9 4 Minnesota, 9 5
and Washington,' 9 6 the crime is categorized as a misdemeanor and the
penalty, if elected, may be a mere $5000 fine.
The current law in Michigan is a prime example of a state statute
that, in certain instances, will allow an offender to face misdemeanor
charges.' 9 7 In Michigan, a judge is permitted to send a defendant to jail
181 David Rosenzweig & Henry Weinstein, How Judges Will Use DiscretionIs the Big Question:
Analysts predict mostjurists will be cautious before departingfrom sentencingguidelines, L.A. TIMEs
(Jan. 13, 2005), http://articles.latimes.com/2005/jan/13/nation/na-impactl3 ("Since the federal
sentencing guidelines were adopted in 1987 to provide more uniformity in sentencing nationwide, many judges have complained that the rules place constraints on their -ability to make
refined decisions about punishment.").
182 NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS,
TRUTH
IN SENTENCING?,
THE GONZALES CASES 3 (2005), available at http://www.nacdl.org/WorkArea/DownloadAsset.
aspx?id=21909&libID=21879.
183 MD. CODE ANN.,
§ 609.352
185 MINN. STAT. ANN.
186 N.D. CENT. CODE ANN.
187 OKLA. STAT. ANN.
188 S.C. CODE ANN.
S.D.
§ 3-324 (West
§ 750.145d (West
CRIM. LAw
184 MICH. Comp. LAWS ANN.
2011).
2011).
(West 2011).
§ 12.1-20-05.1 (West 2011).
4
tit. 21, § 10 0.13a (West 2011).
§ 16-15-342 (2011).
§
22-24A-5 (2011).
§ 2825 (2011).
191 WASH. REv. CODE ANN. § 9.68A.090 (West 2011).
192 W. VA. CODE ANN. § 61-3C-14b (West 2011).
193 Wis. STAT. ANN. § 948.075 (West 2011).
194 MICH. Comp. LAws ANN. § 750.145d(2)(a) (West 2011).
195 MINN. STAT. ANN. § 609.352(4) (West 2011).
196 WASH. REV. CODE ANN. § 9.92.020 (West 2011).
197 MICH. Comp. LAws ANN. § 750.145d.
189
CODIFIED LAws
190 VT. STAT. ANN.
tit.
13,
20121
ONLINE SEXUAL SOLICITATION OF MINORS
533
for a prescribed time within the statutory guidelines, force payment of a
fine, or it can enforce both penalties.19" Therefore, a criminal in Michigan may pay a fine in lieu of serving jail time. In light of the extreme
amount of time and money society puts into preventing these crimes, it
seems unreasonable and inefficient that the punishment for actually
committing the crime is miniscule. It is hard to view a mere $5000 fine
as sufficient reparation.
IV.
RECOMMENDATIONS
State sentencing guidelines must be made more stringent. In order
for that to occur, the following must ensue: First, collection of empirical
data will help clarify how children have been, and are likely to be in the
future, subject to online solicitation. Next, increased awareness of the
current legislation and sentencing guidelines is necessary. Widespread
understanding of the advantages and disadvantages stemming from current legislation will allow for informed discussion on what improvements should be made in. the future. Lastly, sentencing guidelines
should be altered. The sentencing guidelines should be made more substantively similar to the federal sentencing guidelines. Furthermore,
they should be congruent with the level of care shown by the public
through independent agencies, and the government through national
agencies, organizations, and task forces.
The first step is to define the issue. It is difficult to determine the
actual number of instances of online solicitation since there are no solidified statistics.' 99 Oftentimes, adolescents do not report being
targeted.2 00 This can occur for a number of reasons; adolescents are
ashamed,20 1 they may not think it is an important issue, or they may be
unaware that there exists a mechanism for them to report it. 20 2 There198
Id
199 D'OVIDIO & O'LEARY, supra note
7, at 2 ("Unwanted online sexual solicitations are
rarely reported to a law enforcement agency . . . 56 percent of victims did not tell anyone,
including friends and parents of the solicitation they received online."); N-JOV STUDY, supra
note 3, at 1.
200 D'OVIDIO & O'LEARY, supra note 7, at 1.
201 Id ("Victimization research is likely hampered by the unwillingness of children to report
online encounters of a sexual nature for fear of embarrassment and parental scrutiny of future
Internet activity."); N-JOV STUDY, supra note 3, at 1, 9.
202 D'OVIDIO & O'LEARY, supra note 7, at 1 ("Data from a 2005 survey by the National
Center for Missing and Exploited Children on Internet crimes against children show that 65
percent of parents and 82 percent of children were not aware of where they could report an
unwanted online sexual encounter.").
534
CARDOZO PUB. LAW POLICY 6-ETHICS.
[[Vol. 10:505
fore, the pervasiveness of the problem remains unknown.2 0 3 "Gauging
the magnitude of the problem requires agreement at the national level
on the crimes that constitute online exploitation. [Moreover,] a centralized reporting structure should . . . be set up to enable aggregate assessments at the state and federal levels." 2 0 4 In order to move forward and
create more structured legislation, the government must first know what
exactly it is dealing with. This requires more accurate statistics. In an
effort to attain such statistics, the Cyber Tipline, which was created as a
mechanism for individuals to report instances of online enticement of
children for sexual acts, 2 0 5 should be extensively advertised, the responses aggregated, and the information disseminated. "We need a
sound, regularly updated research agenda to inform evidence-based education and prevention programs geared towards promoting child and
adolescent safety as the Internet and other communication technology
continue to evolve and proliferate." 2 0 6 Additionally, the United States
Department of Justice, in its 2010 report to Congress, admitted that,
"the Threat Assessment revealed a growing problem that will require
more investment in investigators, prosecutors, technology, tools, and research to search out and find offenders." 20 7 The Department of Justice
has lofty goals for the future, 208 as should the state legislatures.
204
Id.
Id. at 8.
205
REPORT TO CONGRESS, supra
203
206
note 10, at 94.
D'OVIDIO & O'LIRY, supra note 7, at 5; N-JOV
207 REPORT TO CONGRESS, supra
208
STuDY,
supra note 3, at 9.
note 10, at 137.
Id. at 137-38. It is explained that:
A multi-disciplinary approach to the problem is required because of the complexity of
the threats involved .. . . First, the Department will continue to partner closely with
state, local, tribal, and non- governmental entities, as well as other federal agencies and
the private sector to implement the National Strategy in a coordinated fashion. Second, the Department will build on the success of the Project Safe Childhood initiative. Third, the Department will increase its commitment to a leadership role in
finding a global solution to the transnational problem of the sexual exploitation of
children. Fourth, the Department will work toward improving the quality, effectiveness, and timeliness of computer forensic investigations and analysis. Fifth, the Department will increase its commitment to effective and sophisticated training for
prosecutors and investigators. Sixth, the Department will continue to partner with
Industry to develop objectives to reduce the exchange of child pornography. Seventh,
the Department will explore opportunities to increase the education and awareness of
federal, state, local and tribal judges of the difficult issues involved .in child sexual
exploitation.
Id.
2012]
ONLINE SEXUAL SOLICITATION OF MINORS
535
The second step is spreading awareness of the system currently in
place, including both its benefits as well as its flaws. Doing so will enlighten the public as to how it can help make the Internet a safer space.
It is important to recognize that the current system employed by the
United States in the fight against online enticement is comprised of
many layers. Firstly, there are preventative initiatives that teach children
and their parents how to safely browse the Internet and engage in harmless online interactions.2 09 The groups that lead these initiatives focus
on training educators and police officers on how to present the material
to the children, as well as teaching the children directly themselves.2 10
Furthermore, these groups, some of which are non-profit organizations
working for the common good and others of which are task forces created as subsidiaries of the federal government, also teach children the
importance of reporting any instances of inappropriate behavior and
where they can do so. 2 1 1
The next layer of protection, intended to punish those offenders
who break the law in order to prevent it from occurring again is left to
the states to implement.2 12 Each state has its own statute providing
punishment and sentencing guidelines and each state provides its own
system of recourse.2 1 3 Unfortunately, state statutes vary greatly, and despite much recent and proposed legislation, there are still states with
unnervingly slight punishments for offenders.2 1 4
The third and most important step to be taken once adequate data
has been obtained and awareness of the problem has risen should be to
tighten the sentencing guidelines. There should be congruence between
the efforts put into educating youth, finding the predators, and the imposition of punishment. A mere fine is not enough, nor is a misdemeanor sentence. These reprehensible crimes should have punishments
fitting to the crime.
Online enticement harms our youth, it is a clear detriment to our
society, and therefore, should be austerely punished. In recognition of
such, many states have proposed stricter legislation.2 1 5 It is important
See supra Part II.
See supra Part II.
211 See supra Part II.
212 See supra Part III.
213 See supra Part III.
214 See supra Part III.B.i.
215 See, e.g., GA. CODE ANN.
209
210
(2011); MONT. CODE ANN.
§
§
16-12-100.2 (2011); ME. REv. STAT. ANN. tit. 17-A, § 282
45-5-625 (2011).
536
CARDOZO PUB. LAW POLICY & ETHICS J1
[Vol. 10:505
that citizens of states employing looser standards write letters to their
representatives in support of the new legislation. Additionally, the national organizations aimed at awareness should inform all citizens of
these loose punishments and incorporate petitions to get tougher penalties on the books. As the Department of Justice recognizes, "[a] multidisciplinary approach to the problem is required because of the complexity of the threats involved. Solving this problem must include . . .
investigators and prosecutors, [as well as] social service providers, educators, medical professionals, academics, non-governmental organizations,
and members of industry, as well as parents and families." 2 1 6
CONCLUSION
.
The fact that one in twenty-five teenagers are recipients of sexual
solicitations, including attempts to meet in person, presents a drastic
problem for the nation's youth. 1 7 Teenagers should be able to peruse
the Internet and make use of instant message systems without falling
victim to sexual predators. The problem is especially concerning given
the direct correlation between a teenager's level of solitude, often caused
by low self-esteem and anti-social tendencies, and how much time they
spend online.2 1 8 Such teenagers face an increased likelihood of encountering an unwanted advance. 21 9 The problem does not end there, however. Due to the increased mobility of technology, teenagers are now
victimized via cell phones, both through text messages and Internet
applications.2 2 0
There is little parents can do. 2 2 1 However, preventative measure
must be taken, and as such, many prevention programs have sprung up.
Currently, government task forces exist that provide investigative and
training assistance, and that streamline awareness and preventative initiatives. 2 2 2 Furthermore, many independent efforts have been made, including self-policing. 223 However, state punishment guidelines remain
divergent, and without uniformity, they are less powerful. Additionally,
216
REPORT TO CONGRESS, supra note 10, at 137.
supra note 47, at 1.
217 FINKELHOR, MITCHELL & WoiAl,
218
219
220
221
222
223
Di Blasio, Milani & Osualdella, supra note 6, at 681.
Caplan, supra note 31.
D'OviDIo & O'LFARY, supra note 7, at 5.
Id
See supra Part II.A.
See supra Part II.B.
2012]
ONLINE SEXUAL SOLICITATION OFMINORS
537
many state sentencing guidelines do not call for harsh punishment. 2 24
Therefore, regardless of the myriad government and independent efforts, more must be done. The best course of action for the future is to
increase awareness, gather document statistics on the occurrence of such
crimes, and revamp state laws to intensify the punishment for convicted
predators.2 2 5 Increasing awareness will encourage more teenagers to
come forward and report any unwanted sexual advances. Additionally,
increasingly harsh punishments will serve as a more powerful deterrent.
The combination of both measures will result in a well-prepared, knowledgeable society that takes a strong stand against this unseemly behavior.
The more online enticement is made public, ways to prevent it are
taught and discussed, and the more publicized the harsh punishment is,
the less likely a predator is to believe it is possible to get away with the
activity. The bright side is that this horrible problem currently plaguing
the Internet-an otherwise genius invention-is solvable.
224
225
See supra Part IH.B.i
See supra Part IV.