We have located links that may give you full text access.
Are you a cop?: Identifying suspicion in online chat operations with online groomers.
Child Abuse & Neglect 2024 July 4
BACKGROUND: The increase in online enticement has led to law enforcement agencies engaging in more proactive policing through undercover chat sting operations.
OBJECTIVE: We aimed to identify the topics and communication strategies triggering suspicion in chats between law enforcement officers and offenders and why those topics do not result in suspicion in victim-offender conversations.
METHODS: We conducted a thematic analysis identifying: (1) how LEOs trigger suspicion, (2) how offenders communicate suspicion, (3) how LEOs attempt recovery from suspicion, and (4) how these triggers were present but did not trigger suspicion in victim-offender chats. We examined 20 LEO-offender chats and 20 victim-offender chats from US ICAC task forces.
RESULTS: We identified four themes that triggered suspicion: risk assessment by the LEO's persona, LEO avoidance measures, details related to the offense and evidence, and proof of identity of chat participants. Offender responses to triggers revealed three themes: discomfort navigating boundaries and uncertainty, risk identification, and risk mitigation. Themes for the LEO's responses to suspicion included: risk assessment for chatters, issues with technology, appeasement, and negative emotional reactions. Finally, juxtaposing triggers onto minor-offender chats yielded four themes: explicit boundary setting, victim risk assessment, deep relationship forming and disclosures, and technology issues.
CONCLUSION: This study has implications for law enforcement agencies seeking to reduce suspicion and risk assessment by offenders during internet sting operations.
OBJECTIVE: We aimed to identify the topics and communication strategies triggering suspicion in chats between law enforcement officers and offenders and why those topics do not result in suspicion in victim-offender conversations.
METHODS: We conducted a thematic analysis identifying: (1) how LEOs trigger suspicion, (2) how offenders communicate suspicion, (3) how LEOs attempt recovery from suspicion, and (4) how these triggers were present but did not trigger suspicion in victim-offender chats. We examined 20 LEO-offender chats and 20 victim-offender chats from US ICAC task forces.
RESULTS: We identified four themes that triggered suspicion: risk assessment by the LEO's persona, LEO avoidance measures, details related to the offense and evidence, and proof of identity of chat participants. Offender responses to triggers revealed three themes: discomfort navigating boundaries and uncertainty, risk identification, and risk mitigation. Themes for the LEO's responses to suspicion included: risk assessment for chatters, issues with technology, appeasement, and negative emotional reactions. Finally, juxtaposing triggers onto minor-offender chats yielded four themes: explicit boundary setting, victim risk assessment, deep relationship forming and disclosures, and technology issues.
CONCLUSION: This study has implications for law enforcement agencies seeking to reduce suspicion and risk assessment by offenders during internet sting operations.
Full text links
Related Resources
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app
All material on this website is protected by copyright, Copyright © 1994-2025 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.
By using this service, you agree to our terms of use and privacy policy.
Your Privacy Choices
You can now claim free CME credits for this literature searchClaim now
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app