Search This Blog

Wednesday, December 26, 2018

Child pornography

From Wikipedia, the free encyclopedia

Child pornography is pornography that exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a child (also known as child sexual abuse images) or it may be simulated child pornography. Abuse of the child occurs during the sexual acts or lascivious exhibitions of genitals or pubic areas which are recorded in the production of child pornography. Child pornography may use a variety of media, including writings, magazines, photos, sculpture, drawing, cartoon, painting, animation, sound recording, film, video, and video games.
 
Laws regarding child pornography generally include sexual images involving prepubescents, pubescent or post-pubescent minors and computer-generated images that appear to involve them. Most possessors of child pornography who are arrested are found to possess images of prepubescent children; possessors of pornographic images of post-pubescent minors are less likely to be prosecuted, even though those images also fall within the statutes.

Producers of child pornography try to avoid prosecution by distributing their material across national borders, though this issue is increasingly being addressed with regular arrests of suspects from a number of countries occurring over the last few years. The prepubescent pornography is viewed and collected by pedophiles for a variety of purposes, ranging from private sexual uses, trading with other pedophiles, preparing children for sexual abuse as part of the process known as "child grooming", or enticement leading to entrapment for sexual exploitation such as production of new child pornography or child prostitution. Children themselves also sometimes produce child pornography on their own initiative or by the coercion of an adult.

Child pornography is illegal and censored in most jurisdictions in the world. Ninety-four of 187 Interpol member states had laws specifically addressing child pornography as of 2008, though this does not include nations that ban all pornography. Of those 94 countries, 58 criminalized possession of child pornography regardless of intent to distribute. Both distribution and possession are now criminal offenses in almost all Western countries. A wide movement is working to globalize the criminalization of child pornography, including major international organizations such as the United Nations and the European Commission.

Terminology

Warning Banner for Operation Protect Our Children
 
In the 2000s, use of the term child abuse images increased by both scholars and law enforcement personnel because the term "pornography" can carry the inaccurate implication of consent and create distance from the abusive nature of the material. A similar term, child sexual abuse material, is used by some official bodies, and similar terms such as "child abuse material", "documented child sexual abuse", and "depicted child sexual abuse" are also used, as are the acronyms CAM and CAI. The term "child pornography" retains its legal definitions in various jurisdictions, along with related terms such as "indecent photographs of a child" and others. In 2008, the World Congress III against the Sexual Exploitation of Children and Adolescents stated in their formally adopted pact that "Increasingly the term 'child abuse images' is being used to refer to the sexual exploitation of children and adolescents in pornography. This is to reflect the seriousness of the phenomenon and to emphasize that pornographic images of children are in fact records of a crime being committed."

Interpol and policing institutions of various governments, including among others the United States Department of Justice, enforce child pornography laws internationally. Since 1999, the Interpol Standing Working Group on Offenses Against Minors has used the following definition:
Child pornography is the consequence of the exploitation or sexual abuse perpetrated against a child. It can be defined as any means of depicting or promoting sexual abuse of a child, including print and/or audio, centered on sex acts or the genital organs of children.

Child sexual abuse in production and distribution

Children of all ages, including infants, are abused in the production of pornography. The United States Department of Justice estimates that pornographers have recorded the abuse of more than one million children in the United States alone. There is an increasing trend towards younger victims and greater brutality; according to Flint Waters, an investigator with the federal Internet Crimes Against Children Task Force, "These guys are raping infants and toddlers. You can hear the child crying, pleading for help in the video. It is horrendous." According to the World Congress against Commercial Sexual Exploitation of Children, "While impossible to obtain accurate data, a perusal of the child pornography readily available on the international market indicates that a significant number of children are being sexually exploited through this medium."

The United Kingdom children's charity NCH has stated that demand for child pornography on the Internet has led to an increase in sex abuse cases, due to an increase in the number of children abused in the production process. In a study analyzing men arrested for child pornography possession in the United States over a one-year period from 2000 to 2001, 83% had pornographic images of prepubescent children and 80% had images graphically depicting sexual penetration. 21% had images depicting violence such as bondage, rape, or torture and most of those involved images of children who were gagged, bound, blindfolded, or otherwise enduring sadistic sex. 39% had child-pornography videos with motion and sound. 79% also had images of nude or semi-nude children, but only 1% possessed such images alone. Law enforcement found that 48% had more than 100 graphic still images, and 14% had 1,000 or more graphic images. 40% were "dual offenders," who sexually victimized children and possessed child pornography.

A 2007 study in Ireland, undertaken by the Garda Síochána, revealed the most serious content in a sample of over 100 cases involving indecent images of children. In 44% of cases, the most serious images depicted nudity or erotic posing, in 7% they depicted sexual activity between children, in 7% they depicted non-penetrative sexual activity between adults and children, in 37% they depicted penetrative sexual activity between adults and children, and in 5% they depicted sadism or bestiality.

Masha Allen was adopted at age 5 from the former Soviet Union by an American man who sexually abused her for five years and posted the pictures on the Internet. She testified before the United States Congress about the anguish she has suffered at the continuing circulation of the pictures of her abuse, to "put a face" on a "sad, abstract, and faceless statistic," and to help pass a law named for her. "Masha's Law," included in the Adam Walsh Child Protection and Safety Act passed in 2006, includes a provision which allows young people 18 and over to sue in civil court those who download pornographic images taken of them when they were children. "Downloading" includes viewing without explicitly saving images; many successful prosecutions are completed using residual images left on the viewer's computer.

Relation to child molestation and abuse

Experts differ over any causal link between child pornography and child sexual abuse, with some experts saying that it increases the risk of child sexual abuse, and others saying that use of child pornography reduces the risk of offending. A 2008 American review of the use of Internet communication to lure children outlines the possible links to actual behaviour regarding the effects of Internet child pornography.

According to one paper from the Mayo Clinic of the U.S.A. based on case reports of those under treatment, 30% to 80% of individuals who viewed child pornography and 76% of individuals who were arrested for Internet child pornography had molested a child. As the total number of those who view such images can not be ascertained, the ratio of passive viewing to molestation remains unknown. The report also notes that it is not possible to define the progression from computerized child pornography to physical acts against children. Several professors of psychology state that memories of child abuse are maintained as long as visual records exist, are accessed, and are "exploited perversely."

A study by Wolak, Finkelhor, and Mitchell states that "rates of child sexual abuse have declined substantially since the mid-1990s, a time period that corresponds to the spread of CP online. . . . The fact that this trend is revealed in multiple sources tends to undermine arguments that it is because of reduced reporting or changes in investigatory or statistical procedures. . . . [T]o date, there has not been a spike in the rate of child sexual abuse that corresponds with the apparent expansion of online CP."

Typology

In the late 1990s, the COPINE project ("Combating Paedophile Information Networks in Europe") at University College Cork, in cooperation with the Paedophile Unit of the London Metropolitan Police, developed a typology to categorize child abuse images for use in both research and law enforcement. The ten-level typology was based on analysis of images available on websites and internet newsgroups. Other researchers have adopted similar ten-level scales.[48] In 2002 in the UK, the Sentencing Advisory Panel adapted the COPINE scale to five levels and recommended its adoption for sentencing guidelines, omitting levels 1 to 3 and recommending that levels 4 to 6 combine as sentencing level 1 and that the four levels from 7 to 10 each form an individual severity level, for a total of 5 sentencing stages.

The COPINE Scale
1 Indicative Non-erotic and non-sexualised pictures showing children in their underwear, swimming costumes from either commercial sources or family albums. Pictures of children playing in normal settings, in which the context or organisation of pictures by the collector indicates inappropriateness.
2 Nudist Pictures of naked or semi-naked children in appropriate nudist settings, and from legitimate sources.
3 Erotica Surreptitiously taken photographs of children in play areas or other safe environments showing either underwear or varying degrees of nakedness.
4 Posing Deliberately posed pictures of children fully clothed, partially clothed or naked (where the amount, context and organization suggests sexual interest).
5 Erotic Posing Deliberately posed pictures of fully, partially clothed or naked children in sexualised or provocative poses.
6 Explicit Erotic Posing Pictures emphasising genital areas, where the child is either naked, partially clothed or fully clothed.
7 Explicit Sexual Activity Pictures that depict touching, mutual and self-masturbation, oral sex and intercourse by a child, not involving an adult.
8 Assault Pictures of children being subject to a sexual assault, involving digital touching, involving an adult.
9 Gross Assault Grossly obscene pictures of sexual assault, involving penetrative sex, masturbation or oral sex, involving an adult.
10 Sadistic/Bestiality a. Pictures showing a child being tied, bound, beaten, whipped or otherwise subject to something that implies pain.
b. Pictures where an animal is involved in some form of sexual behaviour with a child.

Proliferation

Internet proliferation

Philip Jenkins notes that there is "overwhelming evidence that [child pornography] is all but impossible to obtain through nonelectronic means." The Internet has radically changed how child pornography is reproduced and disseminated, and, according to the United States Department of Justice, resulted in a massive increase in the "availability, accessibility, and volume of child pornography." The production of child pornography has become very profitable and is no longer limited to paedophiles.

Digital cameras and Internet distribution facilitated by the use of credit cards and the ease of transferring images across national borders has made it easier than ever before for users of child pornography to obtain the photographs and videos. The NCMEC estimated in 2003 that 20% of all pornography traded over the Internet was child pornography, and that since 1997 the number of child pornography images available on the Internet had increased by 1500%.

In 2007, the British-based Internet Watch Foundation reported that child pornography on the Internet is becoming more brutal and graphic, and the number of images depicting violent abuse has risen fourfold since 2003. The CEO stated "The worrying issue is the severity and the gravity of the images is increasing. We're talking about prepubescent children being raped." About 80 percent of the children in the abusive images are female, and 91 percent appear to be children under the age of 12. Prosecution is difficult because multiple international servers are used, sometimes to transmit the images in fragments to evade the law. Some child pornographers also circumvent detection by using viruses to illegally gain control of computers on which they remotely store child pornography. In one case, a Massachusetts man was charged with possession of child pornography when hackers used his computer to access pornographic sites and store pornographic pictures without his knowledge. The U.S. Court of Appeals for the Tenth Circuit has ruled that if a user downloads child pornography from a file sharing network and possesses it in his "shared folder" without configuring the software to not share that content, he can be charged with distributing child pornography.

Regarding internet proliferation, the U.S. Department of Justice states that "At any one time there are estimated to be more than one million pornographic images of children on the Internet, with 200 new images posted daily." They also note that a single offender arrested in the U.K. possessed 450,000 child pornography images, and that a single child pornography site received a million hits in a month. Further, that much of the trade in child pornography takes place at hidden levels of the Internet, and that it has been estimated that there are between 50,000 and 100,000 paedophiles involved in organised pornography rings around the world, and that one third of these operate from the United States. 

One massive international child pornography ring was centered in the Netherlands. In the largest ever operation of its kind, police in 30 countries arrested 184 suspects and identified 486 others. Dutch authorities arrested 37-year-old Israeli-born Dutch citizen Amir Ish-Hurwitz, founder and owner of the internet forum Boylover.net, the center of the ring. At its peak, the forum had more than 70,000 members around the world.

In 2008, the Google search engine adapted a software program in order to faster track child pornography accessible through their site. The software is based in a pattern recognition engine.

Collector behavior and motives

Viewers of child pornography who are pedophiles are particularly obsessive about collecting, organizing, categorizing, and labeling their child pornography collection according to age, gender, sex act and fantasy. According to FBI agent Ken Lanning, "collecting" pornography does not mean that they merely view pornography, but that they save it, and "it comes to define, fuel, and validate their most cherished sexual fantasies." An extensive collection indicates a strong sexual preference for children, and if a collector of child pornography is also a pedophile, the owned collection is the single best indicator of what he or she wants to do. The National Society for the Prevention of Cruelty to Children describes researchers Taylor and Quayle's analysis of pedophile pornography collecting:
The obsessive nature of the collecting and the narrative or thematic links for collections, led to the building of social communities on the internet dedicated to extending these collections. Through these "virtual communities" collectors are able to downgrade the content and abusive nature of the collections, see the children involved as objects rather than people, and their own behaviour as normal: It is an expression of 'love' for children rather than abuse.
These offenders are likely to employ elaborate security measures to avoid detection. The US DOJ notes that "there is a core of veteran offenders, some of whom have been active in pedophile newsgroups for more than 20 years, who possess high levels of technological expertise," also noting that pedophile bulletin boards often contain technical advice from child pornography users' old hands to newcomers."

A 1986 U.S. Senate report found that motives for people's collecting child pornography include arousal and gratification; validation and justification of pedophile behavior; to show the images to children to lower their inhibitions to engage in sex; preservation of an image of a child at the age of sexual preference; blackmail of depicted individuals; a medium of exchange and communication with other child pornography consumers; and profit. A 2012 U.S. Sentencing Commission report found that child pornography offenders, while "much more likely to be sexually aroused by children than contact sex offenders or the general population", can also have non-sexual motives for collecting child pornography, including initial curiosity, compulsive collecting behaviors, avoidance of stress and dissatisfaction with life, and an ability to create a new and more socially successful identity (within an online community). Some offenders find collecting child pornography enjoyable regardless of whether the images are sexually exciting to them; their interest is in assembling complete sets and organizing the material as a pastime, analogously to what a stamp collector might do.

Child sex tourism

Sex tourists created one source of child pornography that is distributed worldwide. Most of the victims of child sex tourism reside in the developing countries of the world. In 1996, a court in Thailand convicted a German national of child molestation and production of pornography for commercial purposes; he was involved in a child pornography ring which exploited Thai children. A sizable portion of the pornography seized in Sweden and in the Netherlands in the 1990s was produced by sex tourists visiting Southeast Asia. INTERPOL works with its 190 member countries to combat the problem, and launched its first-ever successful global appeal for assistance in 2007 to identify a Canadian man, Christopher Paul Neil, featured in a series of around 200 photographs in which he was shown sexually abusing young Vietnamese and Cambodian children.

Organized crime

Organized crime is involved in the production and distribution of child pornography, which is found as a common element of organized crime profiles. Organized into groups to produce and distribute pornography, they are often called "sex rings." In 2003, an international police investigation uncovered a Germany-based child pornography ring involving 26,500 suspects who swapped illegal images on the Internet in 166 different countries. In a 2006 case, US and international authorities charged 27 people in nine states and three countries in connection with a child pornography ring that US federal authorities described as "one of the worst" they have discovered. The assistant secretary for Immigration and Customs Enforcement added that the case reflected three larger trends that are becoming more common in child pornography rings. One is the increasing prevalence of "home-grown" pornographic images that are produced by predators themselves, and include live streaming video images of children being abused, not just the circulation of repeated images. Another trend is the growing use of sophisticated security measures and of peer-to-peer networking, in which participants can share files with one another on their computers rather than downloading them from a web site. The group used encryption and data destruction software to protect the files and screening measures to ensure only authorized participants could enter the chat room. A third trend is the increasingly violent and graphic nature of the images involving the abuse of younger children.

According to Jim Gamble, CEO of the Child Exploitation and Online Protection Centre, around 50 per cent of sites showing children being abused are operated on a pay-per-view basis. "The people involved in these sites often aren't doing it because they're deviant by nature. They're doing it because they're business people. It's risk versus profits. We need to reduce the profit motivation." The CEOPP was established in 2006, and targets the finances of organised criminal gangs selling images of child abuse.

The majority of child pornography seized in the United States is not produced or distributed for profit, and there is little evidence that organized criminals operating with a profit motivation are a major source of child pornography's international dissemination.

Laws

History

In the United States, the first federal law to ban the for-profit production and distribution of child pornography was the Protection of Children Against Sexual Exploitation Act of 1977. In response to New York v. Ferber, 458 U.S. 747 (1982), a U.S. Supreme Court decision allowing the prohibition of child pornography even if it did not meet the obscenity standard established in Miller v. California, Congress passed the Child Protection Act of 1984, broadening the definition of child pornography and criminalizing nonprofit child pornography trafficking. The 1986 Meese Report found that child pornography was a cause of serious harm; this led to the passage of the Child Sexual Abuse and Pornography Act of 1986, which increased penalties for repeat offenders.

The U.S. Supreme Court decision Osborne v. Ohio, 495 U.S. 103 (1990), ruled that the U.S. Constitution allowed prohibition of child pornography possession. The Court noted that at the time of the decision, 19 U.S. states had laws on their books prohibiting child pornography possession. As of 2015, all 50 U.S. states had such laws. Provisions of the Child Pornography Prevention Act of 1996 that banned virtual child pornography were struck down in Ashcroft v. Free Speech Coalition, 535 U.S. 234 (2002). Congress passed several laws increasing the penalties for child pornography offenses, so that from 1997 to 2007, the mean sentence of child pornography offenders increased from 20.59 months to 91.30 months of confinement, an increase of 443%. In 2003, Congress passed the PROTECT Act, authorizing lifetime terms of federal supervised release for child pornography offenders; since U.S. Sentencing Guidelines recommend imposing the maximum term of supervised release for all sex offenders, this means that a lifetime term of supervised release is recommended for all child pornography offenders. 

Federal prosecutions of child sex exploitation offenders.png

During 2006, 3,661 suspects were referred to U.S. attorneys for child sex exploitation offenses. Child pornography constituted 69% of referrals, followed by sex abuse (16%) and sex transportation (14%). In 2006, the median prison sentence imposed was greatest for sex abuse offenses (70 months) followed by child pornography (63 months) and sex transportation (60 months). The median sentenced for sex transportation was 60 months in 2006 and 1996. The median sentence increased from 44 to 70 months for sex abuse and from 15 to 63 months for child pornography. In comparison, median prison terms for drug and weapon offenders remained stable and increased for violent offenses.

A bill named Internet Safety Act, intended to stop child pornography and protect children from online predators by requiring Internet service providers to keep track of data pertaining to users that were assigned a temporarily assigned network address, was introduced in 2009 but was finally not enacted.
In fiscal year 2010, the average term of supervised release for non-production offenders was approximately 20 years; the average term of supervised release for offenders sentenced under the production guideline was nearly 27 years.

International coordination of law enforcement

Investigations include the 1999 Operation Cathedral which resulted in multi-national arrests and 7 convictions as well as uncovering 750,000 images with 1,200 unique identifiable faces being distributed over the web; Operation Amethyst which occurred in the Republic of Ireland; Operation Auxin which occurred in Australia; Operation Avalanche; Operation Ore based in the United Kingdom; Operation Pin; Operation Predator; the 2004 Ukrainian child pornography raids; and the 2007 international child pornography investigation. A three-year Europol investigation, dubbed Operation Rescue, based on the activities of boylover.net, a popular pedophile chat room, netted over 150 arrests and the rescue of 230 children in 2011. The principal of boylover.net, Israeli-born Dutch citizen Amir Ish-Hurwitz, was jailed 17 March 2011 in the Netherlands. Hundreds of additional suspects remain at large.

Even so, the UK based NSPCC said that worldwide an estimated 2% of child pornography websites still had not been removed a year after being identified.

One of the primary mandates of the international policing organization Interpol is the prevention of crimes against children involving the crossing of international borders, including child pornography and all other forms of exploitation and trafficking of children.

The USA Department of Justice coordinates programs to track and prosecute child pornography offenders across all jurisdictions, from local police departments to federal investigations, and international cooperation with other governments. Efforts by the Department to combat child pornography includes the National Child Victim Identification Program, the world's largest database of child pornography, maintained by the Child Exploitation and Obscenity Section of the United States Department of Justice and the National Center for Missing and Exploited Children (NCMEC) for the purpose of identifying victims of child abuse. Police agencies have deployed trained staff to track child pornography files and the computers used to share them as they are distributed on the Internet, and they freely share identifying information for the computers and users internationally.

In Europe the CIRCAMP Law Enforcement project is aimed at reducing the availability of abusive material on the Web, combining traditional police investigative methods and Police/Internet industry cooperation by blocking access to domains containing such files. The result is country specific lists according to national legislation in the participating countries. This police initiative has a worldwide scope in its work but is partly financed by the European Commission

When child pornography is distributed across international borders, customs agencies also participate in investigations and enforcement, such as in the 2001–2002 cooperative effort between the United States Customs Service and local operational law enforcement agencies in Russia. A search warrant issued in the USA by the Customs Service resulted in seizing of computers and email records by the Russian authorities, and arrests of the pornographers.

In spite of international cooperation, less than 1 percent of children who appear in child pornography are located by law enforcement each year, according to Interpol statistics.

Google announced in 2008 that it is working with NCMEC to help automate and streamline how child protection workers sift through millions of pornographic images to identify victims of abuse. Google has developed video fingerprinting technology and software to automate the review of some 13 million pornographic images and videos that analysts at the center previously had to review manually.

The FBI has begun posting hyperlinks on the Internet that purport to be illegal videos of minors having sex, and then raiding the homes of anyone willing to click on them.

In October 2011, hacking collective Anonymous announced they began taking down child pornography websites on the darknet in a vigilante move, and released alleged user names on a pastebin link.

National and international law

Child pornography laws provide severe penalties for producers and distributors in almost all societies, usually including incarceration, with shorter duration of sentences for non-commercial distribution depending on the extent and content of the material distributed. Convictions for possessing child pornography also usually include prison sentences, but those sentences are often converted to probation for first-time offenders.

In 2006, the International Centre for Missing & Exploited Children (ICMEC) published a report of findings on the presence of child pornography legislation in the then-184 INTERPOL member countries. It later updated this information, in subsequent editions, to include 196 UN member countries. The report, entitled “Child Pornography: Model Legislation & Global Review,” assesses whether national legislation:
(1) exists with specific regard to child pornography; (2) provides a definition of child pornography; (3) expressly criminalizes computer-facilitated offenses; (4) criminalizes the knowing possession of child pornography, regardless of intent to distribute; and (5) requires ISPs to report suspected child pornography to law enforcement or to some other mandated agency.
ICMEC stated that it found in its initial report that only 27 countries had legislation needed to deal with child pornography offenses, while 95 countries did not have any legislation that specifically addressed child pornography, making child pornography a global issue worsened by the inadequacies of domestic legislation. The 7th Edition Report found that still only 69 countries had legislation needed to deal with child pornography offenses, while 53 did not have any legislation specifically addressing the problem. Over seven years of research from 2006–12, ICMEC and its Koons Family Institute on International Law and Policy report that they have worked with 100 countries that have revised or put in place new child pornography laws.

A 2008 review of child pornography laws in 187 countries by the International Centre for Missing & Exploited Children (ICMEC) showed that 93 had no laws that specifically addressed child pornography. Of the 94 that did, 36 did not criminalize possession of child pornography regardless of intent to distribute. This review, however, did not count legislation outlawing all pornography as being "specific" to child pornography. It also did not count bans on "the worst forms of child labor." Some societies such as Canada and Australia have laws banning cartoon, manga, or written child pornography and others require ISPs (Internet Service Providers) to monitor internet traffic to detect it.

The United Nations Optional Protocol on the Sale of Children, Child Prostitution and Child Pornography requires parties to outlaw the "producing, distributing, disseminating, importing, exporting, offering, selling or possessing for the above purposes" of child pornography. The Council of Europe's Cybercrime Convention and the EU Framework Decision that became active in 2006 require signatory or member states to criminalize all aspects of child pornography. Article 34 of the United Nations Convention on the Rights of the Child (UNCRC) stated that all signatories shall take appropriate measures to prevent the exploitative use of children in pornographic performances and materials.

Artificially generated or simulated imagery

Simulated child pornography produced without the direct involvement of children in the production process itself includes modified photographs of real children, non-minor teenagers made to look younger (age regression), fully computer-generated imagery, and adults made to look like children. Drawings or animations that depict sexual acts involving children but are not intended to look like photographs may also be regarded as child pornography.

Sexting and filming among minors

Sexting is sending, receiving, or forwarding sexually explicit messages, photographs, or images, primarily between mobile phones, of oneself to others (such as dating partners or friends). It may also include the use of a computer or any digital device. Such images may be passed along to others or posted on the Internet. In many jurisdictions, the age of consent is lower than the age of majority, and a minor who is over the age of consent can legally have sex with a person of the same age. Many laws on child pornography were passed before cell phone cameras became common among teenagers over the age of consent and sexting was understood as a phenomenon. Teenagers who are legally able to consent to sex, but under the age of majority, can be charged with production and distribution of child pornography if they send naked images of themselves to friends or sex partners of the same age. The University of New Hampshire’s Crimes Against Children Research Center estimates that 7 percent of people arrested on suspicion of child pornography production in 2009 were teenagers who shared images with peers consensually. Such arrests also include teenage couples or friends with a small age disparity, where one is a legal adult and the other is not. In some countries, mandatory sentencing requires anybody convicted of such an offense to be placed on a sex offender registry. The vast majority of underage sexual images are produced by adults, however, and adults often solicit underage teenagers to share the images.

Legal professionals and academics have criticized the use of child pornography laws with mandatory punishments against teenagers over the age of consent for sex offenses. Florida cyber crimes defense attorney David S. Seltzer wrote of this that "I do not believe that our child pornography laws were designed for these situations ... A conviction for possession of child pornography in Florida draws up to five years in prison for each picture or video, plus a lifelong requirement to register as a sex offender."

In a 2013 interview, assistant professor of communications at the University of Colorado Denver, Amy Adele Hasinoff, who studies the repercussions of sexting has stated that the "very harsh" child pornography laws are "designed to address adults exploiting children" and should not replace better sex education and consent training for teens. She went on to say, "Sexting is a sex act, and if it's consensual, that's fine [...] Anyone who distributes these pictures without consent is doing something malicious and abusive, but child pornography laws are too harsh to address it."

In April 2018, The Daily Telegraph reported that of the sexually explicit images of children and teenagers (11 to 15 year-olds) found on the Internet, 31% were made by children or teenagers from November 2017 to February 2018, with 40% in December 2017; 349 cases in January 2017 and 1717 in January 2018. The images were made by children or teenagers photographing or filming each other or as selfies, without adults present or coercing, by unwittingly imitating adult pornographic or nude images or videos (including of celebrities) that they had found on the Internet. The report said that pedophiles trawled for and amassed such images.

Controversy

In 2010, workers in the United States Department of Defense were found to have downloaded child pornography that caused administrative issues, but the department declined to investigate the incident.

Abusive power and control

From Wikipedia, the free encyclopedia

Abusive power and control (also controlling behavior, coercive control and sharp power) is the way that an abusive person gains and maintains power and control over another person, as a victim, in order to subject that person to psychological, physical, sexual, or financial abuse. The motivations of the abuser are varied, such as personal gain, personal gratification, psychological projection, devaluation, envy or just for the sake of it as the abuser may simply enjoy exercising power and control.
Controlling abusers use tactics to exert power and control over their victims. The tactics themselves are psychologically and sometimes physically abusive. Control may be helped through economic abuse thus limiting the victim's actions as they may then lack the necessary resources to resist the abuse. The goal of the abuser is to control and intimidate the victim or to influence them to feel that they do not have an equal voice in the relationship.

Manipulators and abusers control their victims with a range of tactics, including positive reinforcement (such as praise, superficial charm, flattery, ingratiation, love bombing, smiling, gifts, attention), negative reinforcement, intermittent or partial reinforcement, psychological punishment (such as nagging, silent treatment, swearing, threats, intimidation, emotional blackmail, guilt trips, inattention) and traumatic tactics (such as verbal abuse or explosive anger).

The vulnerabilities of the victim are exploited with those who are particularly vulnerable being most often selected as targets. Traumatic bonding can occur between the abuser and victim as the result of ongoing cycles of abuse in which the intermittent reinforcement of reward and punishment creates powerful emotional bonds that are resistant to change and a climate of fear. An attempt may be made to normalise, legitimise, rationalise, deny, or minimise the abusive behaviour, or blame the victim for it.

Isolation, gaslighting, mind games, lying, disinformation, propaganda, destabilisation and divide and rule are other strategies that are often used. The victim may be plied with alcohol or drugs to help disorientate them.

Certain personality types feel particularly compelled to control other people.

Personality psychology

In the study of personality psychology, certain personality disorders display characteristics involving the need to gain compliance or control over others:

Control freaks

Control freaks are often perfectionists defending themselves against their own inner vulnerabilities in the belief that if they are not in total control they risk exposing themselves once more to childhood angst. Such persons manipulate and pressure others to change so as to avoid having to change themselves, and use power over others to escape an inner emptiness. When a control freak's pattern is broken, the controller is left with a terrible feeling of powerlessness but feeling their pain and fear brings them back to themselves.

In terms of personality-type theory, control freaks are very much the Type A personality, driven by the need to dominate and control. An obsessive need to control others is also associated with antisocial personality disorder.

Psychological manipulation

Braiker identified the following ways that manipulators control their victims:
Manipulators may have:
  • a strong need to attain feelings of power and superiority in relationships with others
  • a want and need to feel in control
  • a desire to gain a feeling of power over others in order to raise their perception of self-esteem.

Emotional blackmail

Emotional blackmail is a term coined by psychotherapist Susan Forward, about controlling people in relationships and the theory that fear, obligation and guilt (FOG) are the transactional dynamics at play between the controller and the person being controlled. Understanding these dynamics are useful to anyone trying to extricate from the controlling behavior of another person, and deal with their own compulsions to do things that are uncomfortable, undesirable, burdensome, or self-sacrificing for others.

Forward and Frazier identify four blackmail types each with their own mental manipulation style:

Type Examples
Punisher's threat Eat the food I cooked for you or I'll hurt you.
Self-punisher's threat Eat the food I cooked for you or I'll hurt myself.
Sufferer's threat Eat the food I cooked for you. I was saving it for myself. I wonder what will happen now?
Tantalizer's threat Eat the food I cooked for you and you just may get a really yummy dessert.

There are different levels of demands - demands that are of little consequence, demands that involve important issues or personal integrity, demands that affect major life decisions, and/or demands that are dangerous or illegal.

Silent treatment

The silent treatment is sometimes used as a control mechanism. When so used, it constitutes a passive-aggressive action characterized by the coupling of nonverbal but nonetheless unambiguous indications of the presence of negative emotion with the refusal to discuss the scenario triggering those emotions and, when those emotions' source is unclear to the other party, occasionally the refusal to clarify it or even to identify that source at all. As a result, the perpetrator of the silent treatment denies the victim both the opportunity to negotiate an after-the-fact settlement of the grievance in question and the ability to modify his/her future behavior to avoid giving further offense. In especially severe cases, even if the victim gives in and accedes to the perpetrator's initial demands, the perpetrator may continue the silent treatment so as to deny the victim feedback indicating that those demands have been satisfied. The silent treatment thereby enables its perpetrator to cause hurt, obtain ongoing attention in the form of repeated attempts by the victim to restore dialogue, maintain a position of power through creating uncertainty over how long the verbal silence and associated impossibility of resolution will last, and derive the satisfaction that the perpetrator associates with each of these consequences.

Love bombing

The expression has been used to describe the tactics used by pimps and gang members to control their victims, as well as to describe the behavior of an abusive narcissist who tries to win the confidence of a victim.

Mind games

One sense of mind games is a largely conscious struggle for psychological one-upmanship, often employing passive–aggressive behavior to specifically demoralize or dis-empower the thinking subject, making the aggressor look superior; also referred to as "power games".

In intimate relationships, mind games can be used to undermine one partner's belief in the validity of their own perceptions. Personal experience may be denied and driven from memory; and such abusive mind games may extend to denial of the victim's reality, social undermining, and the trivializing of what is felt to be important. Both sexes have equal opportunities for such verbal coercion, which may be carried out unconsciously as a result of the need to maintain one's own self-deception.

Divide and conquer

A primary strategy the narcissist uses to assert control, particularly within their family, is to create divisions among individuals. This weakens and isolates them, making it easier for the narcissist to manipulate and dominate. Some are favoured, others are scapegoated. Such dynamics can play out in a workplace setting.

Background

The power and control "wheel" was developed in 1982 by the Domestic Abuse Program in Minneapolis to explain the nature of abuse, to delineate the forms of abuse used to control another person, and to educate people with the goal of stopping violence and abuse. The model is used in many batterer intervention programs, and is known as the Duluth model. Power and control is generally present with violent physical and sexual abuse.

Control development

Often the abusers are initially attentive, charming and loving, gaining the trust of the individual that will ultimately become the victim, also known as the survivor. When there is a connection and a degree of trust, the abusers become unusually involved in their partner's feelings, thoughts and actions. Next, they set petty rules and exhibit "pathological jealousy". A conditioning process begins with alternation of loving followed by abusive behavior. According to Counselling Survivors of Domestic Abuse, "These serve to confuse the survivor leading to potent conditioning processes that impact on the survivor's self-structure and cognitive schemas." The abuser projects responsibility for the abuse on to the victim, or survivor, and the denigration and negative projections become incorporated into the survivor's self-image.

Traumatic bonding occurs as the result of ongoing cycles of abuse in which the intermittent reinforcement of reward and punishment creates powerful emotional bonds that are resistant to change.

Gain trust
Overinvolvement
Petty rules and jealousy
Manipulation, power and control
Traumatic bonding
The potential abuser is attentive, loving, charming >

The abuser becomes overly involved in the daily life and use of time >

Rules begin to be inserted to begin control of the relationship. Jealousy is considered by the abuser to be "an act of love" >

The victim is blamed for the abuser's behavior and becomes coerced and manipulated >

Ongoing cycles of abuse can lead to traumatic bonding

Tactics

Tactics of violent and non-violent relationships
Power and control in violent relationships
Controlling abusers use multiple tactics to exert power and control over their partners. According to Jill Cory and Karen McAndless-Davis, authors of When Love Hurts: A Woman's Guide to Understanding Abuse in Relationships: Each of the tactics within the power and control wheel are used to "maintain power and control in the relationship. No matter what tactics your partner uses, the effect is to control and intimidate you or to influence you to feel that you do not have an equal voice in the relationship."

Coercion and threats

A tool for exerting control and power is the use of threats and coercion. The victim may be subject to threats that they will be left, hurt, or reported to welfare. The abuser may threaten that they will commit suicide. They may also coerce them to perform illegal actions or to drop charges that they may have against their abuser. Strangulation, a particularly pernicious abusive behavior in which the abuser literally has the victim’s life in his hands, is an extreme form of abusive control. Sorenson and colleagues have called strangulation the domestic violence equivalent of waterboarding, which is widely considered to be a form of torture.

At its most effective, the abuser creates intimidation and fear through unpredictable and inconsistent behavior. Absolute control may be sought by any of four types of sadists: explosive, enforcing, tyrannical, or spineless sadists. The victims are at risk of anxiety, dissociation, depression, shame, low self-esteem and suicidal ideation.

Intimidation

Abused individuals may be intimidated by the brandishing of weapons, destruction of their property or other things, or use of gestures or looks to create fear. For example, threatening to use a gun or simply displaying the weapon is a form of intimidation and coercive control.

Economic abuse

An effective means of ensuring control and power over another is to control their access to money. One method is to prevent the abusee from getting or retaining a job. Controlling their access to money can also be done by withholding information and access to family income, taking their money, requiring the person to ask for money, giving them an allowance, or filing a power of attorney or conservatorship, particularly in the case of economic abuse of the elderly.

Emotional abuse

Emotional abuse include name-calling, playing mind games, putting the victim down, or humiliating the individual. The goals are to make the person feel bad about themselves, feel guilty or think that they are crazy.

Isolation

Another element of psychological control is the isolation of the victim from the outside world. Isolation includes controlling a person's social activity: who they see, who they talk to, where they go, and any other method to limit their access to others. It may also include limiting what material is read. It can include insisting on knowing where they are and requiring permission for medical care. The abuser exhibits hypersensitive and reactive jealousy.

Minimizing, denying and blaming

The abuser may deny the abuse occurred to attempt to place the responsibility for their behavior on the victim. Minimizing concerns or the degree of the abuse is another aspect of this control.

Using children and pets

Children may be used to exert control by the abuser threatening to take the children or making them feel guilty about the children. It could include harassing them during visitation or using the children to relay messages. Another controlling tactic is abusing pets.

Using privilege

Using "privilege" means that the abuser defines the roles in the relationship, makes the important decisions, treats the individual like a servant and acts like the "master of the castle".

In the workplace

A power and control model has been developed for the workplace, divided into the following categories:
  • overt actions
  • covert actions
  • emotional control
  • isolation
  • economic control
  • tactics
  • restriction
  • management privilege

Bullying

An essential prerequisite of bullying is the perception, by the bully or by others, of an imbalance of social or physical power.

Workplace psychopaths

The authors of the book Snakes in Suits: When Psychopaths Go to Work describe a five phase model of how a typical workplace psychopath climbs to and maintains power:
  1. Entry – psychopath will use highly developed social skills and charm to obtain employment into an organisation. At this stage it will be difficult to spot anything which is indicative of psychopathic behaviour, and as a new employee you might perceive the psychopath to be helpful and even benevolent.
  2. Assessment – psychopath will weigh you up according to your usefulness, and you could be recognised as either a pawn (who has some informal influence and will be easily manipulated) or a patron (who has formal power and will be used by the psychopath to protect against attacks)
  3. Manipulation – psychopath will create a scenario of "psychopathic fiction" where positive information about themselves and negative disinformation about others will be created, where your role as a part of a network of pawns or patrons will be utilised and you will be groomed into accepting the psychopath's agenda.
  4. Confrontation – the psychopath will use techniques of character assassination to maintain his/her agenda, and you will be either discarded as a pawn or used as a patron
  5. Ascension – your role as a patron in the psychopath's quest for power will be discarded, and the psychopath will take for himself/herself a position of power and prestige from anyone who once supported them.

Caring professions

According to anti-bullying author and activist Tim Field, bullies are attracted to the caring professions, such as medicine, by the opportunities to exercise power over vulnerable clients, and over vulnerable employees and students.

Institutional abuse

Institutional abuse is the maltreatment of a person (often children or older adults) from a system of power. This can range from acts similar to home-based child abuse, such as neglect, physical and sexual abuse, and hunger, to the effects of assistance programs working below acceptable service standards, or relying on harsh or unfair ways to modify behavior.

Human trafficking

The use of coercion by perpetrators and traffickers involves the use of extreme control. Perpetrators expose the victim to high amounts of psychological stress induced by threats, fear, and physical and emotional violence. Tactics of coercion are reportedly used in three phases of trafficking: recruitment, initiation, and indoctrination. During the initiation phase, traffickers use foot-in-the-door techniques of persuasion to lead their victims into various trafficking industries. This manipulation creates an environment where the victim becomes completely dependent upon the authority of the trafficker. Traffickers take advantage of family dysfunction, homelessness, and history of childhood abuse to psychologically manipulate women and children into the trafficking industry.

The goal of a trafficker is to turn a human being into a slave. To do this, perpetrators employ tactics that can lead to the psychological consequence of learned helplessness for the victims, where they sense that they no longer have any autonomy or control over their lives. Traffickers may hold their victims captive, expose them to large amounts of alcohol or use drugs, keep them in isolation, or withhold food or sleep. During this time the victim often begins to feel the onset of depression, guilt and self-blame, anger and rage, and sleep disturbances, PTSD, numbing, and extreme stress. Under these pressures, the victim can fall into the hopeless mental state of learned helplessness.

Children are especially vulnerable to these developmental and psychological consequences of trafficking because they are so young. In order to gain complete control of the child, traffickers often destroy physical and mental health of the children through persistent physical and emotional abuse. Stockholm syndrome is also a common problem for girls while they are trafficked, which can hinder them from both trying to escape, and moving forward in psychological recovery programs.

Oppression

Oppression is the exercise of authority or power in a burdensome, cruel, or unjust manner.

Zersetzung

The practice of repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation, including personal relationships of the target, for which the Stasi relied on its network of informal collaborators, (in German inoffizielle Mitarbeiter or IM), the State's power over institutions, and on operational psychology. Using targeted psychological attacks the Stasi tried to deprive a dissident of any chance of a "hostile action".

Serial killers

The main objective for one type of serial killer is to gain and exert power over their victim. Such killers are sometimes abused as children, leaving them with feelings of powerlessness and inadequacy as adults. Many power- or control-motivated killers sexually abuse their victims, but they differ from hedonistic killers in that rape is not motivated by lust (as it would be with a lust murder) but as simply another form of dominating the victim. Ted Bundy is an example of a power/control-oriented serial killer. He traveled around the United States seeking women to control.

Law

In December 2015, controlling or coercive behavior in an intimate or family relationship was made illegal in England and Wales.

Brainwashing

From Wikipedia, the free encyclopedia

A July 2012 protest in Hong Kong against the "brainwashing" aspect of moral and national education

Brainwashing (also known as mind control, menticide, coercive persuasion, thought control, thought reform, and re-education) is the concept that the human mind can be altered or controlled by certain psychological techniques. Brainwashing is said to reduce its subject’s ability to think critically or independently, to allow the introduction of new, unwanted thoughts and ideas into the subject’s mind, as well as to change his or her attitudes, values, and beliefs.

The concept of brainwashing was originally developed in the 1950s to explain how the Chinese government appeared to make people cooperate with them. Advocates of the concept also looked at Nazi Germany, at some criminal cases in the United States, and at the actions of human traffickers. It was later applied by Margaret Singer, Philip Zimbardo and some others in the anti-cult movement to explain conversions to some new religious movements and other groups. This resulted in scientific and legal debate with Eileen Barker, James Richardson, and other scholars, as well as legal experts, rejecting at least the popular understanding of brainwashing.

Other views have been expressed by scholars including: Dick Anthony, Robert Cialdini, Stanley A. Deetz, Michael J. Freeman, Robert Jay Lifton, Joost Meerloo, Daniel Romanovsky, Kathleen Taylor, Louis Jolyon West, and Benjamin Zablocki. The concept of brainwashing is sometimes involved in legal cases, especially regarding child custody; and is also a theme in science fiction and in criticism of modern political and corporate culture. Although the term appears in the fifth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) of the American Psychiatric Association brainwashing is not accepted as scientific fact.

China and the Korean War

The Chinese term xǐnăo (洗脑,literally "wash brain") was originally used to describe the coercive persuasion used under the Maoist government in China, which aimed to transform "reactionary" people into "right-thinking" members of the new Chinese social system. The term punned on the Taoist custom of "cleansing/washing the heart/mind" (xǐxīn,洗心) before conducting ceremonies or entering holy places.

The Oxford English Dictionary records the earliest known English-language usage of the word "brainwashing" in an article by newspaperman Edward Hunter, in Miami News, published on 24 September 1950. Hunter was an outspoken anticommunist and was said to be a CIA agent working undercover as a journalist. Hunter and others used the Chinese term to explain why, during the Korean War (1950-1953), some American prisoners of war (POWs) cooperated with their Chinese captors, even in a few cases defected to their side. British radio operator Robert W. Ford and British army Colonel James Carne also claimed that the Chinese subjected them to brainwashing techniques during their war-era imprisonment.

The U.S. military and government laid charges of brainwashing in an effort to undermine confessions made by POWs to war crimes, including biological warfare. After Chinese radio broadcasts claimed to quote Frank Schwable, Chief of Staff of the First Marine Air Wing admitting to participating in germ warfare, United Nations commander Gen. Mark W. Clark asserted:
Whether these statements ever passed the lips of these unfortunate men is doubtful. If they did, however, too familiar are the mind-annihilating methods of these Communists in extorting whatever words they want .... The men themselves are not to blame, and they have my deepest sympathy for having been used in this abominable way.
Beginning in 1953, Robert Jay Lifton interviewed American servicemen who had been POWs during the Korean War as well as priests, students, and teachers who had been held in prison in China after 1951. In addition to interviews with 25 Americans and Europeans, Lifton interviewed 15 Chinese citizens who had fled after having been subjected to indoctrination in Chinese universities. (Lifton's 1961 book Thought Reform and the Psychology of Totalism: A Study of "Brainwashing" in China, was based on this research.) Lifton found that when the POWs returned to the United States their thinking soon returned to normal, contrary to the popular image of "brainwashing."

In 1956, after reexamining the concept of brainwashing following the Korean War, the U.S. Army published a report entitled Communist Interrogation, Indoctrination, and Exploitation of Prisoners of War, which called brainwashing a "popular misconception". The report states "exhaustive research of several government agencies failed to reveal even one conclusively documented case of 'brainwashing' of an American prisoner of war in Korea."

Popularization


In George Orwell's 1949 dystopian novel Nineteen Eighty-Four the main character is subjected to imprisonment, isolation, and torture in order to conform his thoughts and emotions to the wishes of the rulers of Orwell's fictional future totalitarian society. Orwell's vision influenced Hunter and is still reflected in the popular understanding of the concept of brainwashing. Written about the same time, J.R.R. Tolkien’s The Lord of the Rings also addressed brainwashing, although in a fantasy setting. The science fiction stories of Cordwainer Smith (written from the 1940s until his death in 1966) depict brainwashing to remove memories of traumatic events as a normal and benign part of future medical practice.

In the 1950s many American films were filmed that featured brainwashing of POWs, including The Rack, The Bamboo Prison, Toward the Unknown, and The Fearmakers. Forbidden Area told the story of Soviet secret agents who had been brainwashed through classical conditioning by their own government so they wouldn't reveal their identities. In 1962 The Manchurian Candidate (based on the 1959 novel by Richard Condon) "put brainwashing front and center" by featuring a plot by the Soviet government to take over the United States by use of a brainwashed presidential candidate. The concept of brainwashing became popularly associated with the research of Russian psychologist Ivan Pavlov, which mostly involved dogs, not humans, as subjects. In The Manchurian Candidate the head brainwasher is Dr. Yen Lo, of the Pavlov Institute.

Mind control remains an important theme in science fiction. Terry O'Brien comments: "Mind control is such a powerful image that if hypnotism did not exist, then something similar would have to have been invented: the plot device is too useful for any writer to ignore. The fear of mind control is equally as powerful an image." A subgenre is corporate mind control, in which a future society is run by one or more business corporations that dominate society using advertising and mass media to control the population's thoughts and feelings.

American governmental research

For twenty years starting in the early 1950s, the United States Central Intelligence Agency (CIA) and the United States Department of Defense conducted secret research, including Project MKUltra, in an attempt to develop practical brainwashing techniques; the results are unknown. CIA experiments using various psychedelic drugs such as LSD and Mescaline drew from Nazi human experimentation.

Criminal and civil cases

In 1974, Patty Hearst, a member of the wealthy Hearst family, was kidnapped by the Symbionese Liberation Army, a left-wing militant organization. After several weeks of captivity she agreed to join the group and took part in their activities. In 1975, she was arrested and charged with bank robbery and use of a gun in committing a felony. Her attorney, F. Lee Bailey, argued in her trial that she should not be held responsible for her actions since her treatment by her captors was the equivalent of the alleged brainwashing of Korean War POWs. (See: diminished responsibility.) Hearst was found guilty, but her “brainwashing defense” brought the topic to renewed public attention in the United States, as did the 1969 to 1971 case of Charles Manson, who was said to have brainwashed his followers to commit murder and other crimes.

Bailey developed his case in conjunction with psychiatrist Louis Jolyon West and psychologist Margaret Singer. They had both studied the experiences of Korean War POWs. In 1996 Singer published her theories in her best-selling book Cults in Our Midst. In 2003, the brainwashing defense was used unsuccessfully in the defense of Lee Boyd Malvo, who was charged with murder for his part in the D.C. sniper attacks. Some legal scholars have argued that the brainwashing defense undermines the law’s fundamental premise of free will.

Italy has had controversy over the concept of plagio, a crime consisting in an absolute psychological—and eventually physical—domination of a person. The effect is said to be the annihilation of the subject's freedom and self-determination and the consequent negation of his or her personality. The crime of plagio has rarely been prosecuted in Italy, and only one person was ever convicted. In 1981, an Italian court found that the concept is imprecise, lacks coherence, and is liable to arbitrary application. By the twenty-first century, the concept of brainwashing was being applied "with some success" in child custody and child sexual abuse cases. In some cases "one parent is accused of brainwashing the child to reject the other parent, and in child sex abuse cases where one parent is accused of brainwashing the child to make sex abuse accusations against the other parent" (possibly resulting in or causing parental alienation).

In 2003, forensic psychologist Dick Anthony said that "no reasonable person would question that there are situations where people can be influenced against their best interests, but those arguments are evaluated on the basis of fact, not bogus expert testimony." In 2016, Israeli anthropologist of religion and fellow at the Van Leer Jerusalem Institute Adam Klin-Oron said about then-proposed "anti-cult" legislation:
In the 1980s there was a wave of ‘brainwashing’ claims, and then parliaments around the world examined the issue, courts around the world examined the issue, and reached a clear ruling: That there is no such thing as cults…that the people making these claims are often not experts on the issue. And in the end courts, including in Israel, rejected expert witnesses who claimed there is "brainwashing."

Anti-cult movement

In the 1970s, the anti-cult movement applied the concept of brainwashing to explain seemingly sudden and dramatic religious conversions to various new religious movements (NRMs) and other groups they considered cults. News media reports tended to support the brainwashing view and social scientists sympathetic to the anti-cult movement, who were usually psychologists, developed revised models of mind control. While some psychologists were receptive to the concept, sociologists were for the most part skeptical of its ability to explain conversion to NRMs.

Philip Zimbardo defined mind control as, "the process by which individual or collective freedom of choice and action is compromised by agents or agencies that modify or distort perception, motivation, affect, cognition or behavioral outcomes," and he suggested that any human being is susceptible to such manipulation. Another adherent to this view, Jean-Marie Abgrall was heavily criticized by forensic psychologist Dick Anthony for employing a pseudo-scientific approach and lacking any evidence that anyone's worldview was substantially changed by these coercive methods. On the contrary, the concept and the fear surrounding it was used as a tool for the anti-cult movement to rationalize the persecution of minority religious groups.

Eileen Barker criticized the concept of mind control because it functioned to justify costly interventions such as deprogramming or exit counseling. She has also criticized some mental health professionals, including Singer, for accepting expert witness jobs in court cases involving NRMs. Her 1984 book, The Making of a Moonie: Choice or Brainwashing? describes the religious conversion process to the Unification Church (whose members are sometimes informally referred to as Moonies), which had been one of the best known groups said to practice brainwashing. Barker spent close to seven years studying Unification Church members. She interviewed in depth or gave probing questionnaires to church members, ex-members, "non-joiners," and control groups of uninvolved people from similar backgrounds, as well as parents, spouses, and friends of members. She also attended numerous church workshops and communal facilities. Barker writes that she rejects the "brainwashing" theory, because it explains neither the many people who attended a recruitment meeting and did not become members, nor the voluntary disaffiliation of members.

James Richardson observed that if the new religious movements had access to powerful brainwashing techniques, one would expect that they would have high growth rates, yet in fact most have not had notable success in recruitment. Most adherents participate for only a short time, and the success in retaining members is limited. For this and other reasons, sociologists of religion including David Bromley and Anson Shupe consider the idea that "cults" are brainwashing American youth to be "implausible." In addition, Thomas Robbins, Massimo Introvigne, Lorne Dawson, Gordon Melton, Marc Galanter, and Saul Levine, amongst other scholars researching NRMs, have argued and established to the satisfaction of courts, relevant professional associations and scientific communities that there exists no generally accepted scientific theory, based upon methodologically sound research, that supports the concept of brainwashing as advanced by the anti-cult movement.

Benjamin Zablocki responded that brainwashing is not "a process that is directly observable," and that the "real sociological issue" is whether "brainwashing occurs frequently enough to be considered an important social problem", and that Richardson misunderstands brainwashing, conceiving of it as a recruiting process, instead of a retaining process, and that the number of people who attest to brainwashing in interviews (performed in accordance with guidelines of the National Institute of Mental Health and National Science Foundation) is too large result from anything other than a genuine phenomenon. Zablocki also pointed out that in the two most prestigious journals dedicated to the sociology of religion there have been no articles "supporting the brainwashing perspective," while over one hundred such articles have been published in other journals "marginal to the field." He concludes that the concept of brainwashing has been unfairly blacklisted.

American Psychological Association on brainwashing

In 1983, the American Psychological Association (APA) asked Singer to chair a taskforce called the APA Task Force on Deceptive and Indirect Techniques of Persuasion and Control (DIMPAC) to investigate whether brainwashing or coercive persuasion did indeed play a role in recruitment by NRMs.  It came to the following conclusion:
Cults and large group awareness trainings have generated considerable controversy because of their widespread use of deceptive and indirect techniques of persuasion and control. These techniques can compromise individual freedom, and their use has resulted in serious harm to thousands of individuals and families. This report reviews the literature on this subject, proposes a new way of conceptualizing influence techniques, explores the ethical ramifications of deceptive and indirect techniques of persuasion and control, and makes recommendations addressing the problems described in the report.
On 11 May 1987, the APA's Board of Social and Ethical Responsibility for Psychology (BSERP) rejected the DIMPAC report because the report "lacks the scientific rigor and evenhanded critical approach necessary for APA imprimatur", and concluded that "after much consideration, BSERP does not believe that we have sufficient information available to guide us in taking a position on this issue."

Human trafficking

Kathleen Barry, co-founder of the United Nations NGO, the Coalition Against Trafficking in Women (CATW), in her 1979 book Female Sexual Slavery prompted international awareness of human sex trafficking. In his 1986 book Woman Abuse: Facts Replacing Myths Lewis Okun reported that: “Kathleen Barry shows in Female Sexual Slavery that forced female prostitution involves coercive control practices very similar to thought reform.” In their 1996 book, Casting Stones: Prostitution and Liberation in Asia and the United States, Rita Nakashima Brock and Susan Brooks Thistlethwaite report that the methods commonly used by pimps to control their victims "closely resemble the brainwashing techniques of terrorists and paranoid cults."

Some of the techniques used by traffickers include feigning love and concern for the victims' well-being to gain trust before beginning to track, manipulate and control the entire life of the victim, including environment, relationships, access to information and daily activities, promises of lucrative employment or corrupt marriage proposals, debt bondage, kidnapping, induced drug dependency and fear tactics such as threats about law enforcement, deportation, and harm to friends or family members. Physical captivity, shame, Stockholm Syndrome, traumatic bonding and fear of arrest can contribute to victims’ inability to seek assistance.

Other areas and studies

Russian historian Daniel Romanovsky, who interviewed survivors and eyewitnesses in the 1970s, reported on what he called "Nazi brainwashing" of the people of Belarus by the occupying Germans during the Second World War, which took place through both mass propaganda and intense re-education, especially in schools. Romanovsky noted that very soon most people had adopted the Nazi view that the Jews were an inferior race and were closely tied to the Soviet government, views that had not been at all common before the German occupation.

Joost Meerloo, a Dutch psychiatrist, was an early proponent of the concept of brainwashing. ("Menticide" is a neologism coined by him meaning: "killing of the mind.") Meerloo's view was influenced by his experiences during the German occupation of his country and his work with the Dutch government and the American military in the interrogation of accused Nazi war criminals. He later emigrated to the United States and taught at Columbia University. His best-selling 1956 book, The Rape of the Mind, concludes by saying:
The modern techniques of brainwashing and menticide—those perversions of psychology—can bring almost any man into submission and surrender. Many of the victims of thought control, brainwashing, and menticide that we have talked about were strong men whose minds and wills were broken and degraded. But although the totalitarians use their knowledge of the mind for vicious and unscrupulous purposes, our democratic society can and must use its knowledge to help man to grow, to guard his freedom, and to understand himself. 
Scholars have said that modern business corporations practice mind control to create a work force that shares common values and culture. Critics have linked "corporate brainwashing" with globalization, saying that corporations are attempting to create a worldwide monocultural network of producers, consumers, and managers. Modern educational systems have also been criticized, by both the left and the right, for contributing to corporate brainwashing. In his 1992 book, Democracy in an Age of Corporate Colonization, Stanley A. Deetz says that modern "self awareness" and "self improvement" programs provide corporations with even more effective tools to control the minds of employees than traditional brainwashing.

In his 2000 book, Destroying the World to Save It: Aum Shinrikyo, Apocalyptic Violence, and the New Global Terrorism, Robert Lifton applied his original ideas about thought reform to Aum Shinrikyo and the War on Terrorism, concluding that in this context thought reform was possible without violence or physical coercion. He also pointed out that in their efforts against terrorism Western governments were also using some mind control techniques, including thought-terminating clichés.

In her 2004 popular science book, Brainwashing: The Science of Thought Control, neuroscientist and physiologist Kathleen Taylor reviewed the history of mind control theories, as well as notable incidents. She suggests that persons under its influence have more rigid neurological pathways, and that can make it more difficult to rethink situations or be able to later reorganize these pathways. Reviewers praised her book for its clear presentation, while some criticized it for oversimplification.

Operator (computer programming)

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Operator_(computer_programmin...