The LondonChild Sexual ExploitationOperating Protocol3rd EditionJune 2017
The London Child Sexual Exploitation Operating initions83.Types of Child Sexual Exploitation94.Accountability and organisational responsibility135.Identifying Child Sexual Exploitation146.Reporting suspicions of Child Sexual Exploitation – multi-agency responsibilities167.Multi-agency meeting structure188.Victims and families269.Missing children2910. Investigations3111. Tactical options in Child Sexual Exploitation investigations35AppendicesAppendix A Child Sexual Exploitation warning signs – ‘SAFEGUARD’36Appendix B Child Sexual Exploitation flowchart37Appendix C Child Sexual Exploitation – multi-agency referral pathway38Appendix D Police reporting pathway and category levels39Appendix E Police flags and outcome codes40Appendix F Multi-agency sexual exploitation meeting42Appendix G Police meetings45Appendix H Engagement with young people46Appendix I Tactical options and legislation47Appendix J Best practice for a Child Sexual Exploitation investigation593rd Edition June 20173
The London Child Sexual Exploitation Operating ProtocolAbbreviationsACROACPO (Association of Chief Police Officers) Criminal Records OfficeAPPAuthorised Professional PracticeASBAnti-Social BehaviourASWAllocated Social WorkerBCUBorough Command UnitBOCU(Police) Borough Operational Command UnitCAIDChild Abuse Image DatabaseCAITChild Abuse Investigation TeamCAWNChild Abduction Warning NoticeCCTVClosed Circuit TelevisionCEOPChild Exploitation & Online Protection CentreCFT(Police) Criminal Finance TeamCP proceduresLondon Child Protection ProceduresCPNCommunity Protection NoticeCPSCrown Prosecution AuthorityCRIS(Metropolitan Police) Crime Report Information SystemCSCChildren’s Social CareCSEChild Sexual ExploitationDBSDisclosure and Barring ServiceDCIDetective Chief InspectorDETSDetails of investigation pages within a Police Crime ReportDIDetective InspectorDWPDepartment for Work and PensionsEPOEmergency Protection OrderESBEmpress State Building – Police building near Earls Court, LondonGAINGovernment Agency Intelligence NetworkIATInitial Assessment TeamIIOCIndecent Images of ChildrenIOMIntegrated Offender ManagementIRCImmigration Removal CentresISVAIndependent Sexual Violence AdvisorsLALocal AuthorityLACLooked after childLSCBLocal Safeguarding Children BoardMAPPAMulti-Agency Public Protection Arrangements43rd Edition June 2017
The London Child Sexual Exploitation Operating ProtocolMARACMulti-Agency Risk Assessment ConferenceMASEMulti-Agency Sexual Exploitation (meeting/process)MASHMulti-Agency Safeguarding HubMerlin PACMerlin Pre-Assessment Checklist – process foridentifying needs of children for referral to CSCMETMetropolitan PoliceMPC(Police) Missing Person CoordinatorMPSMetropolitan Police ServiceNCANational Crime AgencyNGONon-Governmental OrganisationNPTNeighbourhood Policing TeamNRMNational Referral MechanismNTACNational Technical Assistance CentreOCU(Police) Operational Command UnitPACEPolice and Criminal Evidence Act (1984)PNCPolice National ComputerPOCProduct of ConceptionPPOPolice Protection OrderPRParental ResponsibilityPSPOPublic Spaces Protection OrderQAQuality AssuranceRARA(Police) Risk assessment framework – Remove, Avoid, Reduce, AcceptRIPARegulation of Investigatory Powers Act (2000)SC&O17Metropolitan Police Sexual Offences,Exploitation & Child Abuse CommandSET(Police) Sexual Exploitation TeamSHPOSexual Harm Prevention OrderSPOCSingle point of contactSROSexual Risk OrderTfLTransport for LondonUKUnited KingdomVictim IDVictim identificationVOLTVictim, offender, location, themes. Mnemonicused for the gathering of key informationVRIVisually recorded interview (also referred to as an ABE)XRYTechnical process by which the police candownload mobile phone handset dataYOTYouth Offending Team3rd Edition June 20175
The London Child Sexual Exploitation Operating Protocol1IntroductionThis document sets out the operating protocol for safeguarding and protecting thewelfare of children from Child Sexual Exploitation (CSE). This police-led, multiagency document is designed to complement and not replace the London ChildProtection Procedures (www.londoncp.co.uk) and other statutory guidance. It outlineshow, through our partnerships, we: assess, challenge and provide an enhanced,effective service to reduce the harm and threats posed to children and youngpeople from CSE; and target offenders to prevent and disrupt criminal activity.This protocol is non-statutory and has been produced to help practitioners, local leadersand decision makers who work with children and families to identify CSE and take appropriateaction in response. This includes the management, disruption and prosecution of perpetrators.Aimszz To identify children at risk ofbeing sexually exploited.zz To ensure a child-centred approach,action will be focused on the child’sneeds. This includes consideration ofchildren with particular vulnerabilitiesor sensitivities, and the fact thatchildren do not always acknowledgewhat may be an exploitative or abusivesituation. Sexually-exploited childrenare children in need of services underthe Children Act 1989 and 2004. Theyare also children in need of protection.zz To ensure the safeguarding and welfareof children and young people who are, ormay be, at risk from sexual exploitation.zz To work collaboratively to ensure thatchildren and young people at risk ofbeing sexually exploited are safeguarded.zz To provide timely and effectiveinterventions with children andfamilies to safeguard thosevulnerable to sexual exploitation.6zz To apply pro-active problem solvingto address the risks associated withvictims, offenders, locations andthemes (VOLT).zz To take action against those intent onabusing and exploiting children andyoung people by prosecutingand disrupting perpetrators.zz To raise awareness and providepreventative education for the welfareof children and young people who are,or may be, sexually exploited.PrinciplesThe principles underpinning a multi-agencyresponse to the sexual exploitation ofchildren and young people include:zz CSE is a form of Child Sexual Abusezz sexually exploited children shouldbe treated as victims of abuse, notas offenders;zz sexual exploitation includes sexual,3rd Edition June 2017
The London Child Sexual Exploitation Operating Protocolphysical and emotional abuse and,in some cases, neglect;zz children do not make informed choicesto enter or remain in sexual exploitation,but do so from coercion, enticement,manipulation or desperation;zz young people who are, or at risk of,being sexually exploited will havevarying levels of needs. They may havemultiple vulnerabilities and thereforean appropriate multi-agency responseand effective coordinationand communication is essential;zz law enforcement must direct resourcesagainst the coercers and sex abusers,who are often adults, but could also bethe child’s peers. However, it needsto be recognised that these peersmay also be victims themselves;zz sexually exploited children are children inneed of services under the Children Act1989 and 2004. They are also childrenin need of immediate protection.3rd Edition June 20177
The London Child Sexual Exploitation Operating Protocol2DefinitionsChild Sexual ExploitationCSE is a form of child sexual abuse that affects both boys and girls. Sexual abusemay involve physical contact, including assault by penetration (e.g. rape or oralsex) or non-penetrative acts such as masturbation, kissing, rubbing and touchingoutside clothing. It may include non-contact activities, such as involving childrenin the production of sexual images, forcing children to look at sexual images orwatch sexual activities, encouraging children to behave in sexually inappropriateways, or grooming a child in preparation for abuse (including via the internet).The definition of child sexual exploitation is as follows:Child sexual exploitation is a form of child sexual abuse. It occurs wherean individual or group takes advantage of an imbalance of power to coerce,manipulate or deceive a child or young person under the age of 18 into sexualactivity (a) in exchange for something the victim needs or wants, and/or (b) forthe financial advantage or increased status of the perpetrator or facilitator. Thevictim may have been sexually exploited even if the sexual activity appearsconsensual. Child sexual exploitation does not always involve physical contact;it can also occur through the use of technology.Department of Education, February 2017. Child sexual exploitation: Definitionand a guide for practitioners, local leaders and decision makers working toprotect children from child sexual exploitation, available at: nition-of-child-sexual-exploitation83rd Edition June 2017
The London Child Sexual Exploitation Operating Protocol3Types of Child Sexual ExploitationIt is accepted that the methods that perpetrators use to sexually exploit youngpeople do change and may not neatly fit into any of the models outlined below.These examples are provided in order to gain a better understanding of someof the challenges young people face and the way offenders operate.Peer-on-peer exploitationYoung people can be sexually exploitedby people of a similar age as well as adults.Research is increasingly demonstrating thata significant number of sexually exploitedyoung people have been abused by theirpeers and a London Councils report in 2014found that peer-on-peer exploitation was themost frequently identified form of CSE inLondon. Young people can be exploited bytheir peers in a number of ways. In somecases, young women and young men whohave been exploited themselves, by adults orpeers, will recruit other young people to beabused. In other instances, sexual bullying inschools and other social settings can resultin the sexual exploitation of young peopleby their peers. Sexual exploitation alsooccurs within and between street gangs,where sex is used in exchange for safety,protection, drugs and simply belonging.For 16 and 17-year-olds who are in abusiverelationships, what may appear to be a caseof domestic abuse may also involve sexualexploitation. In all cases of peer-on-peerexploitation, a power imbalance will stillinform the relationship, but this inequalitywill not necessarily be the result of an agegap between the abuser and the abused.Relationship modelHere the offender befriends and grooms ayoung person into a ‘relationship’ and then3rd Edition June 2017coerces or forces them to have sexwith friends or associates. The abusermay be significantly older thanthe victim, but not always.Online CSEChildren and young people have grownup in a digital world which has improvedpeople’s lives in many ways, such as givingus multiple methods to communicate andshare information. It is a constantly changingand dynamic world that is now an essentialpart of a young person’s life. However, thesefreedoms also create new risks – accordingto the Child Exploitation and OnlineProtection Centre (CEOP), a significantnumber of CSE offences take placeonline. These offences include deceivingchildren into producing indecent images ofthemselves and engaging in sexual chatonline or sexual activity over a webcam.Children and young people at risk ofharm online may not have any previousvulnerabilities that are often associatedwith being victims of sexual abuse andexploitation. This means that they are lesslikely to be identified as they might not bepreviously known to the authorities. Dueto the nature of online activity, the currentlyaccepted indicators of possible sexualexploitation, such as going missing orschool absence, may not be displayed,and the first parents may know that9
The London Child Sexual Exploitation Operating Protocoltheir child has been a victim of sexualexploitation is when the police contact thefamily. Children and young people oftendo not see the dangers of sharing intimateimages of themselves to strangers. Theinternet creates a false feeling of securityand diminishes inhibitions that wouldexist offline. The anonymous nature ofthe internet allows perpetrators to adoptfalse personas and build trust via onlineconversations. Children and young peoplecan fail to realise that they lose controlof uploaded images, falsely believing theproperties of social media applications willprotect them. This leads to risks of blackmailand coercion against the child. Additionally,the Global Positioning System coordinatesof where a digital image was createdcan be identified using free-to-downloadsoftware packages, potentially leading aperpetrator to a child. These factors canlead to any and all of the following risks:zz online grooming and child abuse;zz access to age-inappropriate content;zz bullying and cyberbullying;zz personal information beingobtained by perpetrators; andzz talking to strangers or people whomisrepresent themselves.Youth-produced sexual imageryidentified in schoolsSharing photos and videos online is part ofdaily life for many people, enabling themto share their experiences, connect withfriends and record their lives. The increasein speed and ease of sharing imagery hasled to concerns about young people creatingand sharing sexual imagery of themselves.This can expose them to risks, particularlyif the images are shared further, includingembarrassment, bullying and an increasedvulnerability to sexual exploitation.If a young person has shared imageryconsensually, such as when in a romanticrelationship or as a joke, or there is nointended malice, it is usually appropriatefor the school to manage the incidentinternally. In contrast, any incident with10aggravating factors, such as a young personsharing someone else’s imagery withoutconsent and with malicious intent, shouldgenerally be referred to the police.The police must record and investigatethese cases and this will result in seizureof devices and interviews with youngpeople. Schools should confiscate devicesif they suspect there is sexual imageryon them, but they should not view theimages and instead accept what is beingreported. Such devices should be turnedoff, secured and the police notified.The College of Policing published detailedguidance in November 2016 on police actionin relation to youth-produced sexual imagery:zz This guidance seeks to support lawenforcement professionals to respondin a proportionate way to reports ofchildren (under 18-year-olds) possessing,sharing or generating indecent imageryof themselves or other children. Thisactivity may constitute an indecentimage offence and be illegal underthe Protection of Children Act 1978and Criminal Justice Act 1998.zz Most offences involving sexual activitywith children will require a full criminalinvestigative response, e.g. in thepresence of exploitation, coercion, aprofit motive or adults as perpetrators.Offences involving self-generatedimages or images obtained with consentby other children may be dealt withdifferently. Forces may, for example,consider that suitably experienced firstresponders, safer school officers orneighbourhood teams can provide anappropriate response, thereby avoidingstigmatizing children or causing themunnecessary fears and concerns. Forpolice purposes, the recently introduced‘outcome 21’ provides for forces toresolve crimes with the appropriatecontextual factors in a proportionateand effective way.zz In deciding whether criminal justiceprocesses are necessary andproportionate, forces will wish toconsider the long-term impact of3rd Edition June 2017
The London Child Sexual Exploitation Operating Protocolinvestigation and prosecution, suchas labelling a child a ‘sex offender’and potential disclosure as part ofa Disclosure and Barring Service(DBS) process. Chief constableshave discretion to consider whetherbehaviour covered in this paper shouldbe disclosed on a DBS enhanced check,as for other non-conviction information.zz Police need to work with schoolsto educate children on the risks ofexchanging imagery, to engage asappropriate during investigations, andunderstand schools’ powers to deleteimages. The link below provides furtherguidance in relation to these issues ineducation keeping-children-safe-in-education--2Gangs and groupsYoung people associated with gangs areat a high risk of sexual exploitation. Sexualviolence among peers is commonplaceand it is used as a means of power andcontrol over others, most commonlyyoung women. Young people affectedby, or associated with, gangs are athigh risk of sexual exploitation andviolence, and require safeguarding.The Office of the Children’s Commissionerhas defined CSE in gangs and groupsin its 2013 report. This includes:zz Gangs – mainly comprising men andboys aged 13 to 25, who take part inmany forms of criminal activity (e.g. knifecrime or robbery) who can engage inviolence against other gangs, and whohave identifiable markers, e.g. a territory,a name, or (sometimes) clothing.zz Groups – involves people who cometogether in person or online for thepurpose of setting up, coordinatingand/or taking part in the sexualexploitation of children in either anorganised or opportunistic way.Sexual exploitation is used in gangs to:zz exert power and control over members;3rd Edition June 2017zz initiate young people into the gang;zz exchange sexual activity forstatus or protection;zz entrap rival gang members by exploitinggirls and young women; andzz inflict sexual assault as aweapon in conflict.County linesCounty lines typically involve an inner-citycriminal gang travelling to smaller locationsto sell drugs. The group will use a singletelephone number for customers orderingdrugs, operated from outside the area,which becomes their ‘brand’. Unlikeother criminal activities where telephonenumbers are changed on a regular basis,these telephone numbers have value soare maintained and protected.The gangs tend to use a local property,generally belonging to a vulnerableperson, as a base for their activities. Thisis often taken over by force or coercion,and in some instances victims haveleft their homes in fear of violence.Perpetrators employ various tactics toevade detection, including rotating gangmembers between locations so theyare not identified by law enforcement orcompetitors, and using women and childrento transport drugs in the belief that they areless likely to be stopped and searched.CSE can also be seen in these types ofcases and every effort should be takento identify those young people that arealso being sexually exploited as well asbeing coerced into other criminal behaviour.This could constitute an offence oftrafficking either for sexual exploitation orcriminal exploitation, and a crime reportand National Referral Mechanism (NRM)referral should be made and investigated.These situations will often becomeapparent to professionals when youngpeople are located after missing episodesoutside the London area, where thereis no apparent reason for them beingin that location and having no apparentmeans to have travelled there.11
The London Child Sexual Exploitation Operating ProtocolOrganised/networked sexualexploitation or traffickingYoung people (often connected) arepassed through networks, possibly overgeographical distances, between townsand cities, where they may be forced/coerced into sexual activity with multiplemen. Often this occurs at ‘parties’ orbrothels, and young people who areinvolved may recruit others into thenetwork. Some of this activity isdescribed as serious organised crimeand can involve the organised ‘buyingand selling’ of young people by offenders.Organised exploitation varies fromspontaneous networking betweengroups of offenders, to more seriousorganised crime where young peopleare effectively ‘sold’.Children are known to be trafficked forsexual exploitation, and this can occuracross and within local authority (LA)boundaries, regions and acrossinternational borders.Famili
Child sexual exploitation is a form of child sexual abuse. It occurs where . In other instances, sexual bullying in schools and other social settings can result in the sexual exploitation of young people by their peers. Sexual exploitation also occurs within and between street gangs,
May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)
Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .
On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.
̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions
Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have
Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được
Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. Crawford M., Marsh D. The driving force : food in human evolution and the future.
Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. 3 Crawford M., Marsh D. The driving force : food in human evolution and the future.