SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Ringenberg TR, Seigfried-Spellar KC, Rayz J. Child Abuse Negl. 2024; 154: e106919.

Copyright

(Copyright © 2024, Elsevier Publishing)

DOI

10.1016/j.chiabu.2024.106919

PMID

38968759

Abstract

BACKGROUND: The increase in online enticement has led to law enforcement agencies engaging in more proactive policing through undercover chat sting operations.

OBJECTIVE: We aimed to identify the topics and communication strategies triggering suspicion in chats between law enforcement officers and offenders and why those topics do not result in suspicion in victim-offender conversations.

METHODS: We conducted a thematic analysis identifying: (1) how LEOs trigger suspicion, (2) how offenders communicate suspicion, (3) how LEOs attempt recovery from suspicion, and (4) how these triggers were present but did not trigger suspicion in victim-offender chats. We examined 20 LEO-offender chats and 20 victim-offender chats from US ICAC task forces.

RESULTS: We identified four themes that triggered suspicion: risk assessment by the LEO's persona, LEO avoidance measures, details related to the offense and evidence, and proof of identity of chat participants. Offender responses to triggers revealed three themes: discomfort navigating boundaries and uncertainty, risk identification, and risk mitigation. Themes for the LEO's responses to suspicion included: risk assessment for chatters, issues with technology, appeasement, and negative emotional reactions. Finally, juxtaposing triggers onto minor-offender chats yielded four themes: explicit boundary setting, victim risk assessment, deep relationship forming and disclosures, and technology issues.

CONCLUSION: This study has implications for law enforcement agencies seeking to reduce suspicion and risk assessment by offenders during internet sting operations.


Language: en

Keywords

Law enforcement; Thematic analysis; Child sexual exploitation; Internet stings; Online grooming; Solicitation of minors

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print