DOJ-OGR-00005876.jpg
833 KB
Extraction Summary
7
People
0
Organizations
1
Locations
3
Events
1
Relationships
5
Quotes
Document Information
Type:
Legal document
File Size:
833 KB
Summary
This document is a page from a legal filing, likely an expert report, that analyzes the grooming tactics of child sex offenders by reviewing academic literature. It cites studies from 1989, 1995, and 2004 to describe how offenders identify vulnerable children and use methods like attention, bribery, and coercion to gain trust and access. The text details specific strategies, such as becoming welcome in a child's home, offering gifts, and targeting children who seem needy or easy to manipulate.
People (7)
| Name | Role | Context |
|---|---|---|
| N. Bennett | Author |
Listed at the top of the page as an author of the article being discussed.
|
| W. O'Donohue | Author |
Listed at the top of the page as an author of the article being discussed.
|
| Elliott | Researcher |
Cited for a 1995 study where he and colleagues interviewed 91 child sex offenders about their strategies.
|
| Conte | Researcher |
Cited for a 1989 study with Wolf and Smith where they interviewed 26 offenders about their crimes.
|
| Wolf | Researcher |
Cited for a 1989 study with Conte and Smith where they interviewed 26 offenders about their crimes.
|
| Smith | Researcher |
Cited for a 1989 study with Conte and Wolf where they interviewed 26 offenders about their crimes.
|
| Shakeshaft | Researcher |
Cited for a 2004 review of literature about sexual abuse involving teachers.
|
Timeline (3 events)
2004
Shakeshaft conducted a review of literature about sexual abuse involving teachers, noting factors in victim selection.
Locations (1)
| Location | Context |
|---|---|
|
Mentioned as a place where 33% of offenders in a study worked on becoming welcome.
|
Relationships (1)
Offender
→
Predatory/Grooming
→
Victim (child)
The document describes how offenders identify vulnerable children and use strategies like offering attention, bribery (gifts, outings), and coercion to build trust and create opportunities for abuse.
Key Quotes (5)
"needy"Source
— Offenders in Conte, Wolf, and Smith (1989) study
(Describing a characteristic of a vulnerable child.)
DOJ-OGR-00005876.jpg
Quote #1
"quiet"Source
— Offenders in Conte, Wolf, and Smith (1989) study
(Describing a characteristic of a vulnerable child.)
DOJ-OGR-00005876.jpg
Quote #2
"look for a kid who is easy to manipulate. They will go along with anything you say. I would approach them by being friendly, letting them think I was someone they could confide in and talk to"Source
— An offender in the Conte et al. (1989) study
(Describing the tactic used to identify and approach a vulnerable child.)
DOJ-OGR-00005876.jpg
Quote #3
"influenced by the compliance of the student and the likelihood of secrecy"Source
— Shakeshaft
(Quoted from her 2004 literature review, explaining factors in victim selection by teachers.)
DOJ-OGR-00005876.jpg
Quote #4
"play"Source
— A sex offender interviewed by Conte and colleagues (1989)
(Stated as one of the specific methods used prior to sexual contact.)
DOJ-OGR-00005876.jpg
Quote #5
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein document