Skip to main content

Protecting Children from the Risk of Harm? A Critical Review of the Law’s Response(s) to Online Child Sexual Grooming in England and Wales

  • Chapter
  • First Online:
Minding Minors Wandering the Web: Regulating Online Child Safety

Part of the book series: Information Technology and Law Series ((ITLS,volume 24))

Abstract

The increased utilisation and integration of communication via online communication technology in society has facilitated opportunities for individuals to gain access to children for sexual abuse. This chapter analyses the growing recognition of the prevalence of online child sexual grooming in a context that explores how online communication can accelerate progression through the grooming stages, with a view to establishing to what extent these forms of communication have increased the potential risk of harm to children. Ultimately, this chapter demonstrates that online technology makes it easier for individuals to groom children and thus increases the chances of successfully grooming a child, i.e. gaining access for sexual abuse. The principal aim of this chapter is to explore the current limitations of Section 15 of the UK Sexual Offences Act 2003 (SOA) in relation to grooming. The analysis will emphasise that the exemption of the early stages of the grooming process from the offence’s scope has exacerbated the lack of clarity and understanding about this phenomenon. The chapter will also consider two particular examples of grooming, which fall outside Section 15’s scope. First, the discussion will focus on ‘third party grooming’. The second example relates to an arrangement to meet a child in the ‘virtual world’. For instance, a groomer may gain the child’s trust by befriending him/her, which could then result in an arranged virtual meeting via webcam. This chapter will consider the potential risk of harm these virtual meetings pose to children, whilst also drawing attention to the possibility of this grooming behaviour being caught by other statutory provisions under the SOA. It will be argued that judicial support for the utilisation of other offences under the SOA for targeting grooming behaviour underplays the government’s rationale for and relevance of Section 15 offence in providing a greater level of protection to children from grooming behaviour.

Jamie-Lee Mooney is a Lecturer in Law at the University of Liverpool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Online communication will be referred to in this analysis as opposed to communication via the ‘Internet’, as online communication encompasses all modern communication processes that use Internet mediums in order to work. It is acknowledged that this excludes text messages from the scope of this analysis but includes email, chat rooms, social networking sites, games consoles (live), 3G technology, websites and message boards.

  2. 2.

    Wolak et al. 2008, p. 111.

  3. 3.

    ‘Grooming’ will be referred to throughout the analysis, unless otherwise stated, it should be taken to mean online child sexual grooming.

  4. 4.

    As will be shown, this abuse could take place ‘online’ or ‘offline’.

  5. 5.

    Ost 2003, p. 150.

  6. 6.

    E.g. The Taskforce on Child Protection on the Internet and Childnet International.

  7. 7.

    Re Attorney General’s Reference (No. 41 of 2000) [2001] 1 Cr. App. R. (S) 372.

  8. 8.

    See Sect. 16.4.1.

  9. 9.

    Gillespie 2006, p. 412.

  10. 10.

    See Sect. 16.4.1.

  11. 11.

    Durkin 1997, pp. 14–18.

  12. 12.

    Ost 2009, p. 3.

  13. 13.

    Gillespie 2004, p. 239.

  14. 14.

    Craven et al. 2006, p. 289 and Ost 2009, p. 32.

  15. 15.

    Craven et al. 2006, pp. 291–292.

  16. 16.

    See Finkelhor 1984. Also see Suler 2004, p. 321.

  17. 17.

    Elliot et al. 1995, p. 584.

  18. 18.

    Ost 2009, p. 35. Also see Pryor 1999, as cited in Robertiello and Terry 2007, p. 512.

  19. 19.

    Gillespie 2008, p. 59.

  20. 20.

    Quale and Taylor 2003, p. 93.

  21. 21.

    McAlinden 2006, p. 347.

  22. 22.

    Hare and Hart 1993, pp. 104–115. As referenced by Craven et al. 2006, p. 298.

  23. 23.

    Craven et al. 2006, p. 297.

  24. 24.

    BBC News 2010. Available at http://news.bbc.co.uk/1/hi/england/cornwall/8652124.stm; Dorsetpolice.uk 2006, ‘Teenage victim warns others after Internet grooming’. Available at www.dorset.police.uk/default.aspx?page=3644.

  25. 25.

    Ost 2009, pp. 49–51.

  26. 26.

    McAlinden 2006, p. 346.

  27. 27.

    BBC News 2011b. Available at www.bbc.co.uk/news/uk-england-tees-15642789.

  28. 28.

    [2007] EWCA Crim 1411.

  29. 29.

    Webster et al. 2012, p. 17. Available at www.europeanonlinegroomingproject.com/wp-content/file-uploads/European-Online-Grooming-Project-Final-Report.pdf.

  30. 30.

    Online game console users can create graphical representations of themselves that are visible to other users. Users are able to customise age, gender, hairstyle, body shape, clothing and even behaviour (See new technology for Xbox Kinect Avatar).

  31. 31.

    See O’Connell 2003. Available at http://image.guardian.co.uk/sys-files/Society/documents/2003/07/24/Netpaedoreport.pdf.

  32. 32.

    ‘CEOP target ‘anonymous’ online child sex offenders’ CEOP Media Centre. Available at http://ceop.police.uk/Media-Centre/Press-releases/2012/CEOP-target-anonymous-online-child-sex-offenders/.

  33. 33.

    ‘Protecting Children Online’, ISIS Forensics. Available at http://isis-forensics.com/childprotection/.

  34. 34.

    ‘Teach Online Safety’, Staysafeonline.org. Available at http://staysafeonline.org/teach-online-safety/landing/.

  35. 35.

    Ost 2009, p. 76.

  36. 36.

    Most common examples: Facebook, Bebo, Twitter and MySpace.

  37. 37.

    Craven et al. 2006, p. 296.

  38. 38.

    Palmer 2004, p. 27.

  39. 39.

    BBC News 2011a. Available at www.bbc.co.uk/news/uk-england-derbyshire-15735519.

  40. 40.

    Davidson and Martellozzo 2005. Available at http://westminsterresearch.wmin.ac.uk/1737/1/Davidson_Martellozzo_2005_final.pdf, p. 6.

  41. 41.

    See ABC News 2012, http://abcnews.go.com/blogs/headlines/2012/03/facebook-shuts-down-most-beautiful-teen-page/.

  42. 42.

    Herald Sun 2012. Available at www.heraldsun.com.au/technology/photograph-uploads-put-kids-at-risk/story-fn7celvh-1226331243923.

  43. 43.

    Foursquare is downloadable Smartphone app with over 25 million users worldwide that allows users to share their location with others.

  44. 44.

    See: https://www.facebook.com/about/location.

  45. 45.

    See Sect. 16.4.1.

  46. 46.

    Webwise 2006, www.webwise.ie/article.aspx?id=4526.

  47. 47.

    BBC News 2011c. Available at www.bbc.co.uk/news/uk-england-somerset-16215914.

  48. 48.

    Salter 1995, p. 74.

  49. 49.

    Otherwise known as ‘Sexting’ which involves the sharing of sexually suggestive/explicit messages or images electronically.

  50. 50.

    ‘The Guardian 2011. Available at www.guardian.co.uk/uk/2011/jun/07/nursery-worker-admits-raping-toddler.

  51. 51.

    Ost 2009, p. 80.

  52. 52.

    BBC News 2011d. Available at www.bbc.co.uk/news/uk-scotland-glasgow-west-14929227.

  53. 53.

    ‘Sexting and Sexual Grooming’, House of Commons, Hansard, 25 April 2012, Col. 279–281WH.

  54. 54.

    Howitt 1995, p. 176.

  55. 55.

    BBC News 2006b. Available at http://news.bbc.co.uk/1/hi/wales/south_west/5159190.stm.

  56. 56.

    Gillespie 2008, p. 19.

  57. 57.

    ThinkUknow XXXX. Available at https://www.thinkuknow.co.uk/parents/parentsguide/.

  58. 58.

    Black Berry Messenger.

  59. 59.

    The Telegraph 2012. Available at www.telegraph.co.uk/news/uknews/crime/9327534/Child-abuse-taking-place-in-every-town-village-and-hamlet-in-England.html.

  60. 60.

    Grubin 1998, p. 15.

  61. 61.

    Ost 2009, p. 49.

  62. 62.

    Davidson and Martellozzo 2005.

  63. 63.

    In R v. Gray, the child had ‘Robbie’s’ mobile number stored in her phone as ‘hubby’.

  64. 64.

    Gillespie 2001, p. 435.

  65. 65.

    Hansard 2003. Available at www.publications.parliament.uk/pa/ld200203/ldhansrd/vo030401/text/30401-28.htm.

  66. 66.

    McAlinden 2006, p. 347.

  67. 67.

    The Criminal Justice and Immigration act 2008, c.4, sch 15, para 1, extended the scope of Section 15 to include a groomer arranging to meet a child following grooming and also a child travelling to an arranged meeting with a groomer.

  68. 68.

    Home Office 2002, Protecting the Public’, para 54.

  69. 69.

    My emphasis.

  70. 70.

    Ormerod 2011, p. 342.

  71. 71.

    R v. G [2010] EWCA Crim 1693.

  72. 72.

    There are multiple reasons for a perpetrator not being able to abuse the child. E.g. the child does not go to the meeting; the meeting gets interrupted or the child alerts others of meeting. This is not an exhaustive list.

  73. 73.

    See Guidance to Part 1 of the Sexual Offences Act 2003, Home Office, p. 17.

  74. 74.

    Sexual Offences Act: Explanatory Notes 2004: para 29.

  75. 75.

    Ost 2009, p. 76.

  76. 76.

    E.g. content is not unambiguously of a sexual nature.

  77. 77.

    Other difficulties regarding the offence as it relates to all forms of CSG are discussed by Gillespie 2008, p. 61.

  78. 78.

    CEOP, Thinkuknow Parents Quiz answers. Available at https://www.thinkuknow.co.uk/Parentsold/quiz_answers/.

  79. 79.

    CEOP, Thinkuknow, Internet Safety Film ‘Where’s Klaus? Available at https://www.thinkuknow.co.uk/Parentsold/film/.

  80. 80.

    Elliot et al. 1995, p. 584.

  81. 81.

    ‘BBC News 2012a. Available at www.bbc.co.uk/news/uk-england-17993003.

  82. 82.

    R v. Mohammed [2006] EWCA Crim 1107—The victim had severe learning difficulties and behavioural problems.

  83. 83.

    Berliner and Conte 1990, p. 35.

  84. 84.

    Ost 2009, p. 76.

  85. 85.

    E.g. do not have access to the Internet or is under parental control.

  86. 86.

    [2010] EWCA Crim 1233. Although no online communication was used in the commission of the offence, the point that groomers can target younger children via third parties remains valid. Also see: R v. Connolly [2007] EWCA Crim 1880 where the defendant used text messaging to contact a friend of a third party and subsequently was charged with two counts of engaging in sexual activity with a child and one count of causing or inciting a child to engage in sexual activity against both the third party and her friend.

  87. 87.

    In R v. LB the appellant was charged with the S.14 offence because sexual abuse had occurred. See R v. Harrison [2005] EWCA Crim. 3458. However, the case still illustrates how third party grooming can be used to gain access to subsequent victims.

  88. 88.

    Arranging or facilitating the commission of a child sex offence.

  89. 89.

    R v. Harrison [2005] EWCA Crim. 3458.

  90. 90.

    See BBC News 2012b. Available at www.bbc.co.uk/news/uk-england-manchester-17914138.

  91. 91.

    Hansard 2003 at para 27. See also McAlinden 2006, p. 342.

  92. 92.

    Ost 2009, p. 3.

  93. 93.

    Home Office 2002, ‘Protecting the Public’, para 54. Available at www.archive2.official-documents.co.uk/document/cm56/5668/5668.pdf.

  94. 94.

    See Hansard 2003.

  95. 95.

    See O’Connell 2003.

  96. 96.

    Haddon and Livingstone 2012. Available at www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/PerspectivesReport.pdf.

  97. 97.

    Haddon and Livingstone 2012, p. 3.

  98. 98.

    Davidson et al. 2012. Available at www.europeanonlinegroomingproject.com/wp-content/file-uploads/EOGP-Literature-Review.pdf, p. 8.

  99. 99.

    Gillespie 2008, p. 60.

  100. 100.

    See ‘About Skype’ at http://about.skype.com/.

  101. 101.

    NY Daily News, 2012. Available at http://articles.nydailynews.com/2012-05-10/news/31659087_1_sexual-exploitation-child-skype.

  102. 102.

    BBC News 2012c. Available at www.bbc.co.uk/news/magazine-16505791.

  103. 103.

    Ost 2009, p. 77.

  104. 104.

    BBC News 2006a. Available at http://news.bbc.co.uk/1/hi/england/derbyshire/6133360.stm.

  105. 105.

    Ost 2009, p. 90.

  106. 106.

    The Criminal Justice and Immigration act 2008, c.4, sch 15, para 1.

  107. 107.

    UK signed the convention 05/05/2008. Convention entered into force 1 December 2009. Also see Directive 2011/92/EU of European Parliament and of the Council of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography and replacing the Council Framework Decision 2004/68/JHA.

  108. 108.

    Ost 2009, p. 72.

  109. 109.

    Although space limits discussion, the following amendment could be proposed: Following Section 15 (a)(iii) insert: (iv) A arranges to meet B in order to gain access to another child (C), or (v) A arranges or facilitates the use of a webcam to communicate with B, for the purpose of obtaining sexual gratification. However, it is noted that the latter provision might perhaps be too broad, as it could catch ‘innocent’, non-harmful conversations with B via a webcam if A obtains sexual gratification from these.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jamie-Lee Mooney .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 © T.M.C. Asser Press, The Hague, The Netherlands, and the author(s)

About this chapter

Cite this chapter

Mooney, JL. (2014). Protecting Children from the Risk of Harm? A Critical Review of the Law’s Response(s) to Online Child Sexual Grooming in England and Wales. In: van der Hof, S., van den Berg, B., Schermer, B. (eds) Minding Minors Wandering the Web: Regulating Online Child Safety. Information Technology and Law Series, vol 24. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-005-3_16

Download citation

Publish with us

Policies and ethics

Societies and partnerships