Professional Documents
Culture Documents
By
June 2023
CHAPTER I
THE PROBLEM AND ITS BACKGROUND
Introduction
Adults connecting with children online with the intention of pressuring them into
engaging in illegal sex is the first step in crimes against minors that are made possible
There are problems with online predators in chat rooms, instant messaging,
Internet forums, social networking sites, mobile devices, and even gaming consoles.
Because they provide access for them to communicate with victims covertly, these
online spaces entice predators (Wolak, Janis, David et. al., 2013). Additionally, due to
concerns about children's privacy, there is a lack of sufficient, trustworthy data on the
percentage of minors that share personal information online (Dobler, Elizabeth, Johnson
et al., 2017). Additionally, the anonymity of online chats causes minors to become less
reserved, which increases their comfort level and likelihood to engage in harmful
behaviors (Dombrowski, Stefan, Gischlar et al., 2007). Predators can utilize this to their
advantage by manipulating their victims into giving in to their sexual advances (Dobler,
2017). When manipulating minors for the first time, it's common to expose them to
sexual behavior, show them pornography, and ask for and receive sexually explicit
information and images (Lanning, Kenneth, 2005). Most of the time, this online
predatory activity does not result in offline interaction (Wolak, Janis, David et. al.,
2013).
In addition, Syder (2005) noted that while predators will employ a variety of
techniques to meet their prey, the majority of real-world in-person encounters do not
entail deception. And offenders frequently enlist the help of kids, luring victims to meet
asserts that youngsters who are lonely or have low self-esteem are frequently the
targets of internet predators. Online predators can present as someone very different
from who they really are. Some of those online are elderly people acting like children.
Some predators are also teenagers or young adults. Private chat sessions in chat rooms
are one way predators interact with kids. Because they could be looking for approval
and camaraderie that they aren't finding offline, children with learning and thinking
challenges are particularly vulnerable. Furthermore, they might not know how to end
middle-aged man living alone, without a job, and spending all of his time online "luring"
young children and teenagers (Diana, 2006). However, this "normal" stereotype may be
deceptive and may actually make it more difficult for parents to protect their kids from
predators online. Only three traits have been discovered to be strongly linked to
internet predators: Nearly 100% of them are male, 91% are white and non-Hispanic,
Children who go online have easy access to friends, family, and complete
strangers, which can put them in serious danger. Online predators find it simple to prey
on kids who interact and converse with strangers. Online, where they may hide their
identities and move at will, predators have quick and anonymous access to youngsters.
Often, we have an idea of sexual predators lurking about schoolyards or hiding behind
bushes checking out their potential victims, but in actuality, today's predators hunt for
victims while huddling behind a computer screen, taking advantage of the anonymity
the Internet gives. Online predators are skilled in playing back emotionally what they
Finding and chasing a child is viewed by predators as a game and a hunt. To get
the child to feel comfortable enough to share personal information, it takes a lot of
effort and patience over several months to tear down barriers. We call this procedure
any number of techniques, including fishing, mirroring, luring, and fishing. When a child
seducing the child with gifts. Some kids will use the Internet to satisfy their emotional
needs when they're depressed, idle, or lonely. Since these kids are especially
susceptible to "grooming," they need to internalize the value of keeping their personal
information safe.
The objective of a predator is to seduce and influence a child into thinking that
they value your child more than his or her parents or other family members. A child's
trusted parent or guardian may be emotionally replaced in the child's mind by a fictional
online identity that a child's Internet predator has created. The tragedy of Internet
victims is that in addition to suffering bodily and psychological trauma, many of them
willingly met their "fictitious companion," which leaves them with emotions of remorse
and shame.
that they had been solicited for pictures of their private parts. 11 percent of those
polled stated they have been approached with offers of cash or gifts in exchange for
gifts in exchange for meeting up in person to engage in sexual activity, while 13%
claimed to have faced threats or been subjected to blackmail. In the preceding year,
another 13% of respondents reported that sexual photographs of them had been
disseminated without their consent, and 17% reported that they had been forced to
discuss sex.
The way people communicate with one another has changed as a result of the
online, especially with the younger generations (Wolak, Mitchell, & Finkelhor, 2003).
obtain access to young people with the intention of sexually abusing them are a major
concern when it comes to the interactions that young people create online
(Dombrowski, LeMasney, Ahia, & Dickson, 2004). More than 77 million kids use the
Internet, and sexual predators may use it to access them, according to the U.S.
Department of Justice.
experienced by the victims, how they coped up, and the recommended preventive
THEORETICAL FRAMEWORK
The social interaction theory served as the theoretical framework for this study.
This theory explains the ways how people engage with one another. According to social
interaction theory, people’s social behaviors are determined by the social pressures they
encounter. What this means is that behavior is partly created in response to our
Self-Control Theory suggests that people develop personal traits that control
individuals’ inability to refrain from crime. This latent trait, also identified as self-control,
In this study, the concept of Social Interaction Theory and Self-Control Theory
will be observed. The researchers will have to establish the connection between society,
norms, and values with the actions and perceptions of a victim of Online Predators
This study seeks to determine the different measures to prevent being preyed by Online
Predators.
2. What are the challenges faced by the respondents after being victimized by
2.1 Physical
2.2 Mental
2.3 Emotional
2.4 Social Aspect
Online predators are one of the most common problems in our society. It should
be given enough time to talk and deal about it. The generalization of this present study
would be a great contribution to identify prevention and control about online predators.
For the government, upon reading the study, it can help them to provide
For the parents, to educate and prevent their children from being victimized by
online predators.
For young people of this generation, the results of this research will
strengthen the needs and learning of the young generation about prevention and
process. Thus, for further researchers, the output of this study will also provide them
insights on what are lacking such that new findings will evolve.
Online Predators and are now fully coped up and currently living in the City of Ilagan,
Isabela. Moreover, the respondents have been purposely selected by which the study
DEFINITION OF TERMS
To better understand the study, the following terms were defined operationally:
Claws. As used in this study, this refers to a word that denotes painfully jolting
Deceit. As used in this study, this refers to false statements made with knowledge
that they are false with the intent to deceive a person receiving the statements, and the
liar expects the party receiving the statements to trust and rely on them.
Explicit. As used in this study, this refers to a fully revealed or conveyed without
Keeping off. As used in this study, this refers to stop or prevent (someone or
Minors. As used in this study, this refers to an individual who is not yet of legal age to
become an adult
Online Predators. As used in this study, this refers to internet users known as "online
predators" prey on children and teenagers for sexual and violent ends. Inappropriate
exposure of information and images, child grooming, sexual activity, online harassment,
Prey. As used in this study, this refers to a person who is helpless or unable to escape
attack: victim.
and unfounded assumption about all individuals or things that share a certain trait.
The purpose of this literature review was to assess and analyze the prevention
and control found to address the research problem: the danger of online predators.
This thematic review will incorporate online historical data to support the research
problem. With the use of the historical information, children and society can become
Foreign Studies
Those who commit traditional crimes are the same people who commit
cybercrimes. This remains to be true when looking at sex offenders, sexual predators,
cyberbullies, and the crimes that they commit (PGI, 2016). The Internet offers ample
opportunities for sex offenders, sexual predators, and cyberbullies to hide. Often
Internet and social media users do not know whom they are talking to, making it easy
for predators and cyberbullies to find their victim (Rodriguez, 2016). Statistics show that
one out of seven teenagers receive requests for sexual content including, photos and
videos during their online activity (Department of Justice (DOJ) Document, 2014).
However, cyberbullying statistics show that 42 percent of teens in the United States
report being cyberbullied (No Bullying, 2016). These statistics show that not only are
everyday crimes such as fraud and burglary facilitated by the Internet, but also so are
sexual and nonsexual acts of abuse committed by online sexual offenders, sexual
Internet predators are finding new ways to prey on the vulnerabilities of youth in
chat rooms and lure them into sexual activities. This study will examine three chat room
transcripts between adult predators and adult volunteers of the group "Perverted
underlying meanings behind the words and actions of the predators and how they
affect potential victims. The purpose of this article is to provide insight to the reader of
the increased amount of child sexual abuse on the Internet, the often-blatant tactics
used by online predators to pursue this abuse, and how they are continuing to
we examined whether visiting chat rooms, using ICQ, using the Internet for general
Internet activity choice influenced later relationship quality in both best friendships and
romantic relationships. Using instant messaging (ICQ) was positively associated with
most aspects of romantic relationship and best friendship quality. In contrast, visiting
chat rooms was negatively related to best friendship quality. Using the Internet to play
games and for general entertainment predicted decreases in relationship quality with
best friends and with romantic partners. These findings reflect the important and
Online predators often pretend to be someone that they are not. Predators
commonly disguise themselves as teenagers when they are online. Many children feel
embarrassed and scared if they fall for predators’ tricks. In these cases, children
typically do what the predator asks of them, so they can avoid telling their parents what
13-year-old boy and began talking to a 12-year-old girl (DOJ, 2017a). The girl sent
nude pictures of herself to Perez, who in masquerading as the boy asked the girl to do.
Predators commonly pretend to be around the same age of the child to make the child
In the study of Wolak (2016) indicates that the stereotype of the Internet
“predator” who uses trickery and violence to assault children is largely inaccurate. Most
Internet-initiated sex crimes involve adult men who use the Internet to meet and
seduce young adolescents into sexual encounters. Most such offenders are charged
with crimes, such as statutory rape, that involve non forcible sexual activity with victims
who are too young to consent to sexual intercourse with adults. Numbers suggest that
Internet-initiated sex crimes account for a salient but small proportion of all statutory
rape offenses and a relatively low number of the sexual offenses committed against
adolescent interests in romance and sex, some youths may be particularly at risk. This
group includes boys who are gay or questioning their sexual orientations; youths with
histories of sexual or physical abuse; and those who frequent chatrooms, talk online to
unknown people about sex, or engage in patterns of risky off- or online behavior.
Although there is little research about online child molesters, they appear to occupy a
restricted range on the spectrum of the sex offender population and include few true
programs for youths, thoughtful treatment for victims, and continued research. As
access to interactive Internet technologies broadens with the introduction and spread of
wireless and handheld technologies, such as cell phones and personal organizers, youth
Internet use could become harder to monitor, and accurate descriptions of and
Foreign Literature
The Internet provides sexual offenders and sexual predators easy access to a
large pool of potential teenage victims. There have been cases where teenage boys
have been the target and some cases where teenage girls have been the target.
According to the FBI, and the National Center for Missing and Exploited Children, 76
percent of sextortion cases online involved females, and 11 percent of the victims were
male, with the average age of victims being 15 years old (Rodriguez, 2015). Predators
tend to target females more than males. Predators also look for a specific group of
people to target as well; predators look for specific traits in their targets, and potential
victims. Predators look for those who seem to be lonely, have low self-esteem, or are
having trouble in their life, whether the trouble is at school, home, or in their social life.
Finally, predators look for someone who is looking for someone to talk to (Rodriguez,
2015). Predators often look for teens who are more likely to comply with sexual
requests by looking for those who are already posting provocative photos and sexual
Many online child molesters use online communications to establish trust and
confidence in their victims, who typically are adolescents. Often, they introduce talk of
sex and then arrange to meet the adolescents in person for sexual encounters. In 89%
of cases with face-to-face meetings, offenders had sexual intercourse, oral sex, or
another form of penetrative sex with victims. Only 5% of meetings involved violent
offenses, mostly rape or attempted rape, while 16% involved coercion (i.e., victims
were pressured into having sex or doing sexual things that they did not want to do),
not all of which happened during the first meeting.6 Some victims (40%) who attended
face-to-face meetings were given illegal drugs or alcohol, exposed to adult or child
few cases (3%) involved brief abductions that happened in the course of sexual
assaults, and 29% of victims who attended face-to-face meetings with offenders were
face meetings as runaways. Another 5% who were reported missing had lied about
with a friend. Most offenders took time to develop relationships with victims.
Investigators described victims in half of the cases as being in love with or having
communicated online with victims for more than 1 month before in-person meetings;
79% had telephone conversations; 48% sent pictures online to victims; and 47% sent
or offered gifts or money. Romantic and sexual involvements with adults during early
and mid-adolescence are associated with a range of negative outcomes and may result
Research has linked high teen-pregnancy rates to youths who have sex with older
partners. Young adolescents with older partners also have high rates of coerced
intercourse. Finally, early sexual activity itself is related to a range of risk behaviors,
from unprotected sex with multiple partners to substance abuse and delinquency.
Engaging in these activities bodes ill for youths in terms of mental health and academic
that sexual pictures of themselves may be circulating online, if they complied with
A general definition of a sex offender is someone who the state can criminally
charge with a sex crime, or a person who has pled guilty to a sex crime. A sex offender
is a person who is a onetime offender. New York State requires that a person found
guilty or charged with luring a child, rape, forceful touching, kidnapping, and sex
After a sex offender is released from prison, the offender is required to register as a sex
offender. The purpose of this registry is to provide information about that offender to
the local communities and law enforcement agencies. The registry is a list of offenders,
where the offenders live, and why they are considered a sex offender (The United
States Department of Justice, 2015). If a sex offender does not update their
information on the registry, for example if he or she moves and they do not report it,
he or she can be found guilty of a federal crime (The United States Department of
Justice, 2015). Other consequences of becoming a registered sex offender are that the
person may have trouble finding a place to live, the offender is not allowed to
participate in any activity that involves children, and the person is limited to what they
can and cannot do on the Internet (The Umansky Law Firm, 2017). Some states such
or charged with the taking of nude photos of oneself, if that person is a minor. Thirteen
states in the US require someone to become a registered sex offender if they go to the
bathroom in public (Fuchs, 2013). Taking a nude photo of oneself as a minor and
going to the bathroom in public are actions that people may not realize, if charged with
and found guilty, would require them to become registered sex offenders (Fuchs,
2013).
While there are current cases of sexual abuse through the Internet and social
media, some cases date back to the early 2000’s (Jaffe, 2007). As technology
tracking online predators makes it easier for predators to get away with abuse
facilitated through the Internet and social media (Hernandez, 2012). With the creation
of the Internet and social media came a new type of sexual predator known as a
traveler. A traveler is a person who utilizes the Internet and social media to groom
their victim and then travels to meet them (Hernandez, 2012). Grooming is when the
sex offender or sexual predator gains the trust of their victim in order to gain access
and one on one time with the victim in the future. Before the Internet and social
media, when an offender or predator wanted access to a child, the offender often had
to gain the trust of the adults around the child as well (Candian Centre for Child
Protection, 2014). With the creation of the Internet, predators no longer have to gain
the trust of the adults around the children, because children are often allowed Internet
According to Jacqueline Vickery, there are other urgent concerns about young
people's online experiences besides porn, predators, and peers. We need to turn our
material obstacles prevent low-income and other marginalized young people from the
positive, community-building, and creative experiences that are possible online. Vickery
explains that cautionary tales about online risk have shaped the way we think about
technology and youth. She analyzes the discourses of risk in popular culture,
journalism, and policy, and finds that "harm-driven" expectations, based on a privileged
the other hand, based on evidence and lived experience, produce discourses that
acknowledge the practices and agency of young people rather than seeing them as
passive victims who need to be protected. Vickery first addresses how the discourses of
risk regulate and control technology, then turns to the online practices of youth at a
low-income, minority-majority Texas high school. She considers the participation gap
and the need for schools to teach digital literacies, privacy, and different online learning
ecologies. Finally, she shows that opportunity-driven expectations can guide young
people's online experiences in ways that balance protection and agency. (S. Craig
Watkins, 2017)
Nearly 24 million youth, ages 10 through 17, were online regularly in 1999. Large
numbers of young people, when on the Internet, are encountering sexual solicitations
they do not want, sexual material they did not seek, and people who threaten and
harass them. A national survey described in this paper and administered to 1,501 young
people, ages 10 through 17, confirms many of these stories. It represents the first
scientifically based window into the risk’s youth face on the Internet, particularly
and young people are addressing matters of danger and protection on the Internet, and
suggests that although these unpleasant experiences affect a large number of youths,
few families do much about it. The report questions how to temper some of the
drawbacks of the Internet to protect young people, and highlights the need for public
and private initiatives to raise awareness and provide solutions. It suggests that
strategies to respond to the problem would aim to reduce offensive behavior, better
shield young people from its likely occurrence, increase the level of reporting, and
provide more help to youth and families to protect them from any consequences.
Children and young people encounter a range of risks on the internet relating to
behaviour, especially when this leads to offline meetings, as has giving out personal
information online. This article, based on the ‘UK Children Go Online’ survey, seeks to
communication patterns and online behaviour/skills. Findings show that older teens
this seems not to put them more at risk. It was found that children's offline social
being predicted by different patterns of off- and online characteristics. There are weak
teens may take fewer risks online, including a lower likelihood of meeting online friends
offline. Multiple regression analyses show that those children and teens who are less
satisfied with their lives and who have become more frequent and skilled internet users
are more likely to value the internet as a communicative environment in which they feel
more confident than they do offline, particularly in relation to the potential for
anonymous communication. Since this in turn leads some into risky activities, the
The publicity about online “predators” who prey on naive children using trickery
and violence is largely inaccurate. Internet sex crimes involving adults and juveniles
more often fit a model of statutory rape—adult offenders who meet, develop
sexual assault or pedophilic child molesting. This is a serious problem, but one that
appropriate prevention strategies that target youths directly and acknowledge normal
adolescent interests in romance and sex are needed. These should provide younger
adolescents with awareness and avoidance skills while educating older youths about the
pitfalls of sexual relationships with adults and their criminal nature. Particular attention
should be paid to higher risk youths, including those with histories of sexual abuse,
sexual orientation concerns, and patterns of off- and online risk taking. Mental health
practitioners need information about the dynamics of this problem and the
characteristics of victims and offenders because they are likely to encounter related
sexual solicitation and ways in which to protect youth from sexual predators who use
the Internet. Although the Internet has many positive aspects, one of the most
pernicious aspects is its potential use for online sexual predation. The Internet
relatively anonymous environment. This article reviews the general strategies of sexual
perpetrators and their characteristics, as well as the online strategies and characteristics
of the cyber sexual predator. Information on how to protect children from this crime
provided. A description of the relevant laws as they relate to online solicitation and
Chat rooms and social networking websites are places where internet predators
often go to solicit teens for sex. According to Bower (2008), most online sex offenders
are adults who contact vulnerable 13- to 17-year-olds and seduce them into sexual
relationships. Teenagers are often seeking gratification via the internet, and adults may
take advantage. User-generated media (UGM) like Facebook, MySpace and Twitter have
become tremendously popular over the last few years (Shao, 2009), and serve as teen
social gathering places to share photos and exchange gossip. According to Peter,
Valkenburg, Schouten and Alexander (2005), the internet is seen as a new social
sense of self-worth are played out in a virtual world. An influential tradition in media
research, UGM presents media use in terms of the gratification or psychological needs
of the individual (Shao, 2009). This new social environment is growing both in the
United States and worldwide and has become woven into the everyday activity of most
teens. For example, OfCom (2013) report that 68% of children between the ages of 12
and 15 are social networkers, and 93% of 5 to 15 yearolds use the internet. The
probability that they are likely to meet a predator becomes increasingly common as
children enter their teenage years (Shannon, 2008), and the internet is increasingly
becoming the method which predators use to meet teen victims (Nissley, 2008). For
relationships with adolescents online and often enter chat rooms to meet them. Further,
11% children aged between 9 and 16 had observed sexual images on the internet
during the previous year (National Society for Prevention of Cruelty to Children, 2013).
Educational strategies that target 13- to 17-year-olds directly and acknowledge normal
adolescent interests in romance and sex are needed (Wolak et al., 2010). The rising
popularity of the internet and the ever-increasing amount of time adolescents spend
online pose challenges to parents who want to protect their teenage children from
excessive internet use (van den Eijnden et al., 2010). Social networking sites offer
anonymity for both the teenager and the predator, which may decrease inhibition for
chat rooms and lure them into sexual activities. This study will examine three chat room
transcripts between adult predators and adult volunteers of the group “Perverted
underlying meanings behind the words and actions of the predators and how they
affect potential victims. The purpose of this article is to provide insight to the reader of
the increased amount of child sexual abuse on the Internet, the often-blatant tactics
used by online predators to pursue this abuse, and how they are continuing to
suggests that predators engage in a grooming process with their victims. Grooming
consists of three main stages: friendship and relationship forming, risk assessment and
exclusivity, and sexual. This thesis examines whether predators utilized different
patterns of language use across each of the stages that can be identified through
computerized text analysis. The transcripts of 43 convicted predators were spliced into
three equal sections according to word count and a computerized text analysis was
performed to look at the different types of language that are expected in each stage
based on grooming. The results reveal that predator language differs significantly
throughout the three stages of grooming, and that the grooming stages can predict
language patterns that are used most frequently in each stage. The theoretical and
practical implications of these findings are discussed in terms of grooming theory and
the use of computerized text analysis to identify predators and educate youth.
According to Kang (2016), Sexual exploitation of adolescents has been a long-
standing moral and legal challenge. Recent technological developments such as Social
Networking Sites have expanded the potential risk for exploitation, as the increased
autonomy and privacy presented by the digital revolution aids adolescents’ attempt to
fulfill their sexual curiosities, build relationships, and seek sensation. Online offenders
also take advantage of the functions provided by the Social Networking Sites as they
them directly. As a result, online sexual exploitation through Social Networking Sites
typologies of offenders. As one victim’s experience of sexual solicitation will differ from
other victims, it is impossible and even detrimental to adopt a universal legal response
to such cases. The chapter proposes legal reform that considers the offender–victim
analysing the relative size of invertebrate predators and anurans. More than 100
vertebrate predators were identified (in more than 200 reports) and classified as
predators was compared with the relative size of the anurans, showing an increase in
the relative size of the prey when predators used special predatory tactics. The number
of species and the number of families of anurans that were preyed upon did not vary
with the size of the predator, suggesting that prey selection was not arbitrary and that
energetic constraints must be involved in this choice. The relatively low predation
strategies of its species. This compounding review can be used as the foundation for
that it is more comfortable to share personal information via the Internet than in a face-
result in victimization where youth are solicited and groomed by sex offenders to
participate in sexual and other harmful acts either on- or offline. Prior research indicates
that certain factors place some youth more at risk for being victimized online in
comparison to their peers (Mitchell, Finkelhor, & Wolak, 2001). Professionals in school
or health settings are likely to encounter adolescents who have been victimized online;
however, not all of these professionals routinely assess for risky online behaviors or
previous victimizations when working with teens (Wells, Mitchell, Finkelhor, & Becker-
Blease, 2006). In addition, these professionals may feel unprepared to address issues
related to online victimization and Internet safety (Finn & Kerman, 2004) as there is
limited information available in general on how to assist youth and their families with
Internet safety issues (see Rosen, 2007; Wolak et al., 2008). The purpose of this
chapter is to review the risk factors associated with online victimization as well as
describe the protective factors that promote Internet safety and prevent online
and contact minors for sexual exploitation. Yet little is known about how these
individuals select their online victims. In order to gain a better understanding of this
contact sex offenses against minors they communicated with via the Internet, was
examined. Three-fourths of the participants monitored chat room dialogue and almost
discussed.
Sanchez (2017) suggest that this may be a consequence of younger adults, who
came of age online, being more likely to seek out victims on the Internet than in other
venues. Alternatively, it seems possible that the Internet, and in particular the advent of
social networking, has simply increased the prevalence of social contacts between teens
and college-age adults, who may in turn be more likely to think of each other as peers,
even when the law does not. Cutting against that hypothesis is the finding that
themselves as being teens as well. Still, the overarching finding is that neither the
Internet nor social networking sites pose unusual dangers for minors. As has always
been the case, the underaged are most likely to be the victims of sex crimes
perpetrated by acquaintances and family members, even if such cases are seldom
rooms for teens and reported that she found explicit sexual exchanges, joking about
physical violence and assaults, aggression, and disturbing exchange involving racial
prejudice. Even as a passive bystander that did not participate in the “chats,” she
received several instant messages making sexual advances. Chat rooms that were not
monitored were especially worrisome, but even those that were monitored were not
always successful at censuring that kind of material. For example, she learned that
teens used codes such as “A/S/L” (age, sex, location) to provide information that would
not have been allowed. And, although the chat rooms were supposed to be for teens,
there was no way to know how young or old any of the participants were. The common
stereotype of the online predator is that of a middle-aged man with no job who lives
alone and whose day is consumed with “luring” young children and teenagers through
the internet. But how accurate is this stereotype? Studies such as the National Juvenile
Online Victimization Study have attempted to answer this question as well as identify
other characteristics associated with online predators. Studies have found that this
“typical” stereotype can be misleading and can actually hinder parents from protecting
Local Literature
According to UNICEF (2019) The Philippines is one of the top global sources of
child sex abuse materials. In 2018 alone, 600,000 sexualized photos of Filipino children
were bartered and traded. The Philippine Kids Online Survey found that 90 percent of
Filipino children can access the Internet whenever they want or need to, and 59
Online predators are making money by exploiting Filipino children. In a public bulletin
reported suspicious transactions worth P113 million related to child pornography in the
first half of 2020, almost double the P65.8 million reported in 2019.
According to the CRC (2020) with the advent of rapid expansion and
become more exposed to various ICT platforms, making them even more vulnerable to
online sexual exploitation. ICT devices such as smartphones, laptops, and tablets make
online-negotiated and facilitated operations very much accessible and affordable for
pimps or sex predators. In most cases, sex predators use social media sites, dating
sites, and classified advertisement sites to transact OSEC. OSEC offenders normally use
internet communications such as instant messages, e-mail, and chatrooms to meet and
develop intimate relationships with their victims. In most cases, those who are likely to
be child victims of OSEC are children who are not protected from inappropriate
materials circulating on the internet, which makes them more at risk and vulnerable to
online sexual solicitation and priming. Moreover, child victims of OSEC in most cases
come from poor dysfunctional families, broken homes, have absentee parents, are
children of overseas foreign workers (OFWs), have parents with poor parenting
practice, and parents who are engaged in criminal activities and vice like substance
abuse and addiction. Child victims who come from these types of parents or families
usually lack guidance, support, and nurturing from their parents, families, and
into the trade. These include consumerism, materialism, media influences, and peer
pressure.
two warrants to disclose computer data (WCDC) ordering social media giant Facebook
and video platform YouTube to disclose information and other content posted on a
page allegedly promoting sexual exploitation. Based on the warrants issued on July 20
and 28, a cybercrime court in Manila ordered the two platforms to preserve data of the
accounts linked to the page 'Usapang Diskarte' which would be used as evidence by the
ACG's Women and Children Cybercrime Protection Unit (WCCPU) in the filing of a case
against the page's operator. The warrants have already been endorsed by the court to
pursuant to the rule on cybercrime warrants issued by the Supreme Court. The page
‘Usapang Diskarte’ is allegedly filled with content promoting sexual abuse and
to a group of sexual predators.The page's profane contents, which include tips on how
to lure a minor to have sex with an older person, drew flak from netizens who
demanded the takedown of its illicit videos circulating online. Meanwhile, ACG director
Brig. Gen. Joel Doria encouraged netizens who may have information about ‘Usapang
Diskarte’ and people who felt they were abused by its viral posts to come forward and
The Internet can be a risky place, especially for children or minors. Before the
Covid-19 pandemic, concerned parents had a tough time keeping their kids off the
Internet. When home quarantines were mandated and classes moved online, the
Press: “Study: Philippines a global hot spot for online child abuse.” The United Nations
International Children’s Emergency Fund has confirmed that the Philippines has become
the global epicenter of the live-stream sexual abuse trade, and many of the victims are
children.
The Philippine Long Distance Telephone Co. Inc. (PLDT) and its wireless unit
children's internet use as a precaution against online sexual predators. PLDT and Smart
Stakeholder Management Executive Jose Rosete said in a statement that the internet,
computers and gadgets can be dangerous as the youth are vulnerable to sexual
predators online. Rosete said that alarmingly, the Philippines is now the biggest supplier
of child sexual abuse materials online based on data from international sources. Citing
mobile gaming as an example, he said it has become easy for sexual predators to lure
young gamers into doing seemingly harmless acts, like showing themselves half-naked
in exchange for game tokens, badges and upgrades. He added that more than half of
The DOJ has vowed to crack down on online sexual predators that victimize
minors in the country. “We are aware of the rising number of online sex trafficking in
the country. We will not tolerate this as a nation. We need to go after these online
sexual predators because they continue to pose a threat to the future of this nation,”
Marcos told reporters on Aug. 23. A Philippine foundation reported 202,605 cases of
online child abuse during lockdowns in 2020 compared to 76,251 cases reported in
2019. “Online sexual abuse and exploitation of children is a silent pandemic". “More
children are at risk from online sexual abuse and exploitation amid the Covid-19
pandemic as family’s resort to easy money due to deepening poverty, while children are
still not allowed to leave homes,” according to a report by the Save the Children Fund.
It said the Covid-19 pandemic was no longer “just a health crisis” but “a child rights
crisis” that must be addressed by state authorities. “Online sexual abuse and
exploitation of children is a silent pandemic that has permanent, and devastating effects
on children’s mental health and psychosocial well-being,” it said adding that parents
and other adults should provide the necessary support and guidance to help protect
children.
The Philippines has become the global epicenter of live stream sexual abuse,
(UNICEF) in 2016. UNICEF’s findings showed that 80% (8 out of 10) of children in the
Philippines are vulnerable to being victims of online sexual abuse or bullying. It was
also found that 2.5% of children in the country have had their nude bodies or sexual
following a spike in online child sex abuse across the country amid the coronavirus
pandemic. Presidential Spokesperson Harry Roque made this remark after the United
increase in reports of online child abuse materials from March to May when the country
was in a strict lockdown. He said he would relay the report to the Philippine National
exploitation of children (Osec), according to a study released in May. The IJM defines
Osec as the production, for the purpose of online publication or transmission, of visual
depictions (e.g., photos, videos, live streaming) of the sexual abuse or exploitation of a
minor for a third party who is not in the physical presence of the victim, in exchange for
the Philippines: Analysis and Recommendations for Governments, Industry and Civil
Society,” 64 percent of Philippine Osec cases from 2010-2017 started with referrals
from international law enforcement agencies, and over this period, the Philippines
received a whopping 76 percent of all referrals of Osec cases made by international law
received 237 referrals. Mexico was a far second with 27 referrals; followed by Brazil,
19; India, 18; Thailand, five; Romania, four; and Cambodia, three, according to the
study led by the IJM in partnership with the US Department of State Office to Monitor
and Combat Trafficking in Persons, and the Philippine Inter-agency Council Against
Trafficking. Most of the international referrals involved customers from the United
States (31 cases), Sweden (11 cases), Australia (seven cases), and the United Kingdom
(four cases). There were also customers from Canada, Ireland, the Netherlands,
cheap broadcast-capable mobile devices and internet access, and strong money
remittance infrastructure were seen as factors that enabled traffickers to get into the
business of directing or committing the contact abuse of children for the remote viewing
of foreign clients.
Philippines – Authorities have filed charges against a suspected online predator
for allegedly abusing more than two dozen children in Iligan, a city where the rate of
such crime has been described as alarming. Police on Tuesday, October 25, identified
the suspect as Rafman Sultan Gara, a 27-year-old man from Marawi City who used the
name Agila Gara on Facebook and other social media platforms. Iligan prosecutors
approved the filing of a case against Gara for violation of Republic Act 11930 or the
Exploitation Materials Act before a regional court. Iligan police chief Colonel Dominador
Estrada said evidence seized from Gara showed that he exploited and abused at least
29 children.
Local Studies
This study looks into the phenomenon of OSAEC in the Philippines, from the
child’s exposure and rescue, to the reporting and prosecution of cases, and the
intervention provided to the child. The study objectives were classified into four main
areas: a) child victims, b) offenders, c) private sector, and d) case resolution and
management. This was done to produce a data-driven guide for policy makers and
various stakeholders who are invested in preventing and combatting the said
phenomenon. The different institutions and agencies that respond and cater to the child
victim survivors and their families may also apply the research team’s recommendations
CHAPTER III
population frame and sampling techniques used for the interview. Finally, this chapter
will provide a detailed explanation of the selected mode of analysis used and data
collection method.
RESEARCH DESIGN
In this study, the researchers utilized a qualitative design in which data is not
countable. Qualitative research method was developed in the social sciences to enable
behaviors and the belief of the respondents. Since the purpose of this study is to
understand the experiences and how the victims coped up after being victimized, we
The respondents in this research will be the victims of online predators which
suffers different types of harassment via online. Snowball sampling was used in this
study, a non-probability technique where the current research participants are asked to
assist the researchers in identifying other potential subjects who has the same
This research took place in City of Ilagan, Isabela where some victims of online
interviewees; this approach facilitates faster interviews that can be more easily
respondent answers. The aim of this qualitative research interview is to explain and
interpret the meanings of central themes in the subjects' experiences. The primary goal
Initially, the researchers consulted the research adviser and composed a letter
consisting of permission requesting the conduct of the study was passed to the
research instructor upon the permission of the Research Director and the Dean of the
department of CCJE in order to start the study. Then, communicated and made a letter
for the respondents and to the individuals who was involved in conducting the study to
ask for their agreement in participating to the study. After obtaining the respondent’s
consent, the researchers formulated open-ended questions and seeks approval from the
research adviser. All information gathered was kept confidential as promised to the
respondents. Lastly, after the gathering and collection of data from the respondents,
the researchers preceded to the interpretation and canalization of data where all data
TREATMENT OF DATA
We have interpreted our data with the use of prescriptive analysis for it is the
most advanced form of analysis, as it combines all of your data and analytics, then
outputs a model prescription: What action to take and works to analyze what action to
take in multiple scenarios, predict the outcome of each, and decide which is the best
course of action based on the findings. It can be very helpful and essential especially
because our research is about Online Predators and on how to prevent and control it.
ETHICAL CONSIDERATIONS
For ethical considerations, the researchers carried out the study with the
approval of the research adviser and the Dean of the Department. Since the study will
tackle about the respondent’s private life, all participants reported their written
acceptance regarding their voluntary participation and that they were free to withdraw
from it at any point and for any reason. Next to this, participants were fully informed
regarding the objectives of the study, while they were reassured that their answers
were treated as confidential and used only for academic purposes and only for the
confidentiality, they will be identified and referred using pseudonyms, so that their real
names wouldn’t be disclosed. Except from the above, participants were not harmed or
abused, both physically and psychologically, during the conduction of the research. In
A. BOOKS
Blais, J.J., Craig, W.M., Pepler, D. et al. Adolescents Online: The Importance of Internet
(2008). https://doi.org/10.1007/s10964-007-9262-7
Call, M. E., & Burrow-Sanchez, J. J. (2010). Identifying risk factors and enhancing
https://www.igi-global.com/chapter/identifying-risk-factors-
enhancingprotective/39296
Charles, A. T., (2017). The Abuse of Teenagers by Online Predators Facilitated Through
Dombrowski, S. C., LeMasney, J. W., Ahia, C. E., & Dickson, S. A. (2004). Protecting
73. https://doi.org/10.1037/0735-7028.35.1.65
Dombrowski, Stefan C.; Gischlar, Karen L.; Durst, Theo (May 1, 2007). "Safeguarding
young people from cyber pornography and cyber sexual predation: a major
dilemma of the internet". Child Abuse Review. Oxford, England: Wiley. 16 (3):
153–170. doi:10.1002/car.939
Troup-Leasure, Karyl; Snyder, Howard N. (August, 2005). "Statutory rape known to law
Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2010). Online “predators” and
0828.1.S.13
Wolak, J., finkelhor, d., Mitchell, K., & Ybarra, M. (2008). Online Predators and Their
https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/amp%20final.pdf
B. JOURNALS
Baghurst, T., Alexande, R., & Tapp, T. (2014). Ways To Protect Students from Online
Livingstone, S., & Helsper, E. J. (2007). Taking risks when communicating on the
https://www.tandfonline.com/doi/abs/10.1080/13691180701657998
Malesky Jr, L. A. (2007). Predatory online behavior: Modus operandi of convicted sex
https://www.tandfonline.com/doi/abs/10.1300/J070v16n02_02
https://eric.ed.gov/?id=EJ841197
Toledo, L. F., Ribeiro, R. S., & Haddad, C. F. (2007). Anurans as prey: an exploratory
Zoology, 271(2), 170-177.
https://zslpublications.onlinelibrary.wiley.com/doi/abs/10.1111/j.1469-
7998.2006.00195.x
Vickery j., (2018, September 11). Worried about The Wrong Things. Youth, Risk, and
https://mitpress.mit.edu/9780262536219/
Wolak, Janis; Finkelhor, David (2013, December 1). "Are Crimes by Online Predators
Adolescent Health. San Diego, California: Society for Adolescent Health and
Medicine. doi:10.1016/j.jadohealth.2013.06.010
Grooming. https://ecommons.cornell.edu/handle/1813/23125
Yang, L. K. (2016). Protecting youth from dangerous media: online predators.
In Adolescents, rapid social change, and the law (pp. 75-92). Springer, Cham.
https://link.springer.com/chapter/10.1007/978-3-319-41535-2_4
C. Internet Sources
children-from-online-predators/
Caliwan, C. L. (2022). ACG secures ‘cyber warrants’ vs. FB page promoting sexual
https://www.pna.gov.ph/articles/1182450
sex-predators/98531
Cuerto, F. S. (2022). PH youth prey for online sexual predators. Retrieved on December
prey-for-online-sexual-predators/1869476
Gotinga (2022) Study finds 2 million kids in this country may have been targets of
https://www.vice.com/en/article/pkp5pn/sexual-abuse-online-the-philippines
https://kidshealth.org/en/parents/net-safety.html
Kelly (2014) 9 Ways to Protect Your Child from Online Predators. Retrieved on
protect-your-child-from-online-predators
Kruat (2022) Children and Grooming/ Online Predators. Retrieved on November 28,
grooming-online-predators.html
Lim, C. A. (2020). Filipino children most appealing to global online sex predators.
children-most-appealing-global-152600302.html?
guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_refe
rrer_sig=AQAAADzwvCWo2u95tNP9NluJOeCpg5dzQRihM_56ySbY-
IKsrEKIA5UNRx5WxcFwta5rkvRY1k_-nZH-1djcUD6msKH4OHKVL-
stPeES746Zd0bXrecmArYeVCRztbjb6nN2IvX0ZwM7sHMZaLXTkG8B-
uIRcYP4OKM3eXgZk9oviEW1
Manos, M. (2020). Iligan cops file charges vs. man for alleged online sexual abuse of 29
kids/
Muscato (2021) Social Interaction Theory, Social Roles and Presentation of Self.
interaction-theory-social-roles-the-presentation-of-self.html#:~:text=According
%20to%20social%20interaction%20theory,surroundings%2C%20specifically
%20our%20social%20groups.
Sanchez, J. (2009). Study: online sexual predators not like popular perception.
https://arstechnica.com/tech-policy/2009/04/study-tracks-changing-profile-of-
online-sexual-predators/
Tarroja, M. C., et al (2019). National Study on Online Sexual Abuse and Exploitation of
https://www.unicef.org/philippines/media/2601/file/National%20Study%20on
%20Online%20Sexual%20Abuse%20and%20Exploitation%20of%20Children
%20in%20the%20Philippines%20-%20Executive%20Summary.pdf
Uy, A. M. (2020). Philippinis: Online Child Sexploitation Hotspot. Retrieved on
child-sexploitation-hotspot
modern-face-of-human-trafficking/
Zuckerman (2006) Online Predators: What do we know and What can we do? Retrieved
know-can/