3.2: The Progression of Sexual Abuse
- Page ID
- 215426
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)The Progression of Sexual Abuse
Unless the child sexual abuse is an isolated, often violent incident by someone unknown to the victim, the perpetrator will groom the victim in a slow but steady progression of sexual abuse. The purpose of this grooming is to allow the child to become comfortable and have “buy-in“ to the activities. Perpetrators often establish a sense of trust and that of playing games to entice the child to participate. They also establish hard and fast rules of secrecy.
The grooming may follow a progression similar to the following: (Crosson-Tower, pp. 126 to 127)
- Nudity (on the part of the adult).
- Disrobing (of the adult in front of the child).
- Genital exposure (by the adult).
- Observation of the child (bathing, dressing, or excreting).
- Kissing the child in a lingering, inappropriate manner.
- Fondling of the child’s thighs, buttocks, breasts and genitals.
- Masturbation (mutual or solitary).
- Oral stimulation of the penis, vulva or vaginal area.
- Digital penetration of the anus or vagina.
- Penile penetration of the vagina or anus.
- Rubbing of the perpetrator’s penis on the genital or rectal area, inner thighs, or buttocks of the child.
These acts and others often progress through six basic stages:
- Engagement phase (perpetrator elicits cooperation and plays on child’s need for human contact and affection, adult approval, enjoyment of games, and material rewards.)
- Pressured sex (enticement and entrapment are used as a way of making the child feel indebted or obligated. Bribery is often at play.)
- Forced sex (involves the threat of harm to others if the child does not cooperate, and threat of harm to the child. The child is seen as an object for use by the perpetrator.)
- Sexual interaction and secrecy phases (any range of sexual abuse may occur during this stage, but the perpetrator uses power to dominate, bribe, emotionally blackmail or threaten the child into keeping the secret and continuing the acts).
- Disclosure phase (may occur by the victim during childhood or years later.)
- Suppression phase (once the child has disclosed the victimization, he/she may be encouraged or compelled to recant or forget the abuse, because of what the realization might mean to others.) This phase does not always occur, but can be very harmful to the victim when it does.
The Frequency of Sexual Abuse on Children
"Sexual violence is a social and public health problem in the U.S. According to the National Intimate Partner and Sexual Violence Survey (NISVS), nearly 1 in 2 women and 1 in 5 men experienced sexual violence victimization other than rape at some point in their lives." (www.cdc.gov)
According to the National Children’s Advocacy center, approximately 1 in 10 children in the United States will be sexually abused before they turn 18. (www.nationalcac.org) In 2022, the World Health Agency estimated that 1 in 5 girls and 1 in 13 boys are sexually abused as children, world-wide (reported rates were slightly lower in Asian countries). Many of these children experience this abuse during early childhood (0-9 years of age). Statistics are incomplete, as not all sexual abuse cases are reported.
Computer technology has dramatically increased the incidence of child pornography. People can hide in their own homes and participate in pornography, unbeknownst to anyone else. This can lead to interaction with children over the Internet, and even to grooming of victims over time. Sometimes these victims are met in person and further abused. Children tend to feel more protected over the Internet than they should, because they are in their own home. This does not prevent them from becoming victims.
Image created in Canva and under no copyright
Child sexual abuse on the internet is massive and growing. In 2018, more than 45 million images of child pornography were reported to the National Center of Missing and Exploited children… nearly twice that of 2017. More than 60% of these featured children younger than 12 and included extreme acts of sexual violence. These children go through life fearing that they will be recognized by someone who witnessed their abuse online, and that people are still witnessing it as it lives on through the internet. The Canadian Centre for Child Protection found through research that 83% of young adults who had suffered online pornography child sexual abuse had thought about suicide. 60% had attempted suicide and 30% had been recognized by people who had seen their abuse material. (Julie Cordua, Ted Talk)
"shadow figure approaches" by Matt Henry photos is licensed under CC BY 2.0.
Another increasing situation which leads to extreme child sexual abuse is that of human trafficking. Young girls and boys are kidnapped daily and channeled into human trafficking rings and sex slave markets; sometimes these children are shipped around the world. We see the prevalence increase anytime there is a major sporting event (i.e. Super Bowl, World Series, Golf Tournament, etc.), concert or other event. In Seattle and other cities, communities are working to support, rescue and help with the recovery of these abused children. They work together with law enforcement to prosecute the abusers who enslave these children and those who purchase their services. They often work for years to rescue one child at a time. It is long, hard, and often dangerous work but to that child and their family, it is worth it. (A Powerful Strategy for Disrupting Child Trafficking).
Sexual abuse and sexual violence impacts families, neighborhoods, workplaces, schools and more. People can work together to prevent sexual violence by understanding and addressing the root causes. It starts with promoting social norms of respect for all.