DOJ-OGR-00005876.json 7.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. {
  2. "document_metadata": {
  3. "page_number": "9",
  4. "document_number": "397-1",
  5. "date": "10/29/21",
  6. "document_type": "court document",
  7. "has_handwriting": false,
  8. "has_stamps": false
  9. },
  10. "full_text": "Case 1:20-cr-00330-PAE Document 397-1 Filed 10/29/21 Page 9 of 43\n964\nN. Bennett and W. O'Donohue\n\non the victims and ask them what techniques their abusers used prior to the abuse. It is important to note that in this article, examples of grooming with different genders of perpetrator and genders of victim are not readily distinguished. This is primarily due to the fact that the grooming literature reviewed did not always provide statistics about which grooming behaviors were used on boys versus girls. In addition, most of the grooming literature reviewed discussed male offenders.\n\nIdentifying Potential Victims\n\nElliott and colleagues (1995) interviewed 91 child sex offenders about the strategies they used when committing their offenses. They found that 33% of the offenders explicitly worked on becoming welcome in the child's home and 18% offered incentives or threatened their victims to recruit other children and then gave bribes to the recruits.\n\nConte, Wolf, and Smith (1989) interviewed 26 offenders about their crimes. They found that offenders often admitted to being able to identify what they considered a vulnerable child—often one who was \"needy\" and seemed \"quiet.\" For example, one offender stated that his tactic was to \"look for a kid who is easy to manipulate. They will go along with anything you say. I would approach them by being friendly, letting them think I was someone they could confide in and talk to\" (Conte et al., 1989, p. 298).\n\nIn her review of literature about sexual abuse involving teachers, Shakeshaft (2004) noted that selection of a victim is \"influenced by the compliance of the student and the likelihood of secrecy\" (p. 32). Teachers usually look to victimize students whom they have control over. Shakeshaft also identified factors that make a child vulnerable to educator sexual abuse, such as problems at home with parents, lack of confidence, and participation in other risky behavior. However, it also must be remembered that nonoffending adults could see the same needs in these vulnerable children and want to help them in legitimate ways. Thus the child's vulnerability and needs cannot be a sufficient condition for defining grooming.\n\nThe Use of Attention, Bribery, and Coercion\n\nElliott and colleagues (1995) found that 53% of the offenders in their sample offered to play games, teach a sport, or teach how to play a musical instrument. Forty-six percent gave bribes, took the child for an outing, or drove the child home. Thirty percent admitted to using affection and love to gain the child's trust. Forty-six percent of the offenders used gifts as bribes in exchange for sexual favors.\n\nThe offenders interviewed by Conte and colleagues (1989) also claimed they used bribery and coercive strategies prior to sexual contact. For example, one sex offender stated that his specific methods included \"play,\n\nDOJ-OGR-00005876",
  11. "text_blocks": [
  12. {
  13. "type": "printed",
  14. "content": "Case 1:20-cr-00330-PAE Document 397-1 Filed 10/29/21 Page 9 of 43",
  15. "position": "header"
  16. },
  17. {
  18. "type": "printed",
  19. "content": "964",
  20. "position": "header"
  21. },
  22. {
  23. "type": "printed",
  24. "content": "N. Bennett and W. O'Donohue",
  25. "position": "header"
  26. },
  27. {
  28. "type": "printed",
  29. "content": "on the victims and ask them what techniques their abusers used prior to the abuse. It is important to note that in this article, examples of grooming with different genders of perpetrator and genders of victim are not readily distinguished. This is primarily due to the fact that the grooming literature reviewed did not always provide statistics about which grooming behaviors were used on boys versus girls. In addition, most of the grooming literature reviewed discussed male offenders.",
  30. "position": "main content"
  31. },
  32. {
  33. "type": "printed",
  34. "content": "Identifying Potential Victims",
  35. "position": "main content"
  36. },
  37. {
  38. "type": "printed",
  39. "content": "Elliott and colleagues (1995) interviewed 91 child sex offenders about the strategies they used when committing their offenses. They found that 33% of the offenders explicitly worked on becoming welcome in the child's home and 18% offered incentives or threatened their victims to recruit other children and then gave bribes to the recruits.",
  40. "position": "main content"
  41. },
  42. {
  43. "type": "printed",
  44. "content": "Conte, Wolf, and Smith (1989) interviewed 26 offenders about their crimes. They found that offenders often admitted to being able to identify what they considered a vulnerable child—often one who was \"needy\" and seemed \"quiet.\" For example, one offender stated that his tactic was to \"look for a kid who is easy to manipulate. They will go along with anything you say. I would approach them by being friendly, letting them think I was someone they could confide in and talk to\" (Conte et al., 1989, p. 298).",
  45. "position": "main content"
  46. },
  47. {
  48. "type": "printed",
  49. "content": "In her review of literature about sexual abuse involving teachers, Shakeshaft (2004) noted that selection of a victim is \"influenced by the compliance of the student and the likelihood of secrecy\" (p. 32). Teachers usually look to victimize students whom they have control over. Shakeshaft also identified factors that make a child vulnerable to educator sexual abuse, such as problems at home with parents, lack of confidence, and participation in other risky behavior. However, it also must be remembered that nonoffending adults could see the same needs in these vulnerable children and want to help them in legitimate ways. Thus the child's vulnerability and needs cannot be a sufficient condition for defining grooming.",
  50. "position": "main content"
  51. },
  52. {
  53. "type": "printed",
  54. "content": "The Use of Attention, Bribery, and Coercion",
  55. "position": "main content"
  56. },
  57. {
  58. "type": "printed",
  59. "content": "Elliott and colleagues (1995) found that 53% of the offenders in their sample offered to play games, teach a sport, or teach how to play a musical instrument. Forty-six percent gave bribes, took the child for an outing, or drove the child home. Thirty percent admitted to using affection and love to gain the child's trust. Forty-six percent of the offenders used gifts as bribes in exchange for sexual favors.",
  60. "position": "main content"
  61. },
  62. {
  63. "type": "printed",
  64. "content": "The offenders interviewed by Conte and colleagues (1989) also claimed they used bribery and coercive strategies prior to sexual contact. For example, one sex offender stated that his specific methods included \"play,",
  65. "position": "main content"
  66. },
  67. {
  68. "type": "printed",
  69. "content": "DOJ-OGR-00005876",
  70. "position": "footer"
  71. }
  72. ],
  73. "entities": {
  74. "people": [
  75. "N. Bennett",
  76. "W. O'Donohue",
  77. "Elliott",
  78. "Conte",
  79. "Wolf",
  80. "Smith",
  81. "Shakeshaft"
  82. ],
  83. "organizations": [],
  84. "locations": [],
  85. "dates": [
  86. "10/29/21",
  87. "1995",
  88. "1989",
  89. "2004"
  90. ],
  91. "reference_numbers": [
  92. "1:20-cr-00330-PAE",
  93. "397-1",
  94. "DOJ-OGR-00005876"
  95. ]
  96. },
  97. "additional_notes": "The document appears to be a court document related to a case involving child sex offenders. The text discusses the strategies used by offenders to groom their victims and the factors that make a child vulnerable to abuse. The document is well-formatted and easy to read, with clear headings and paragraphs."
  98. }