Church Executive SEPT / OCT 2019 DIGITAL ISSUE | Page 29

Preferential offender The preferential offender might be male or female and may have an age-appropriate partner, but prefers a child as a sexual partner. Not just any child; typically, a child of a particular gender and age range. The preferential offender has no visual profile — he or she looks like you and me. Jerry Sandusky and Larry Nassar, for example, are preferential offenders; neither was identified as a risk by a visual profile. The preferential offender represents over 90% of the problem. This explains a commonly accepted statistic: that 90% of children are victimized by someone they know and trust. The preferential offender is the problem in ministry contexts, but ministry protocols related to child sexual abuse risk are designed to protect children from the abduction offender — the snatch and grab scenarios. Because the preferential offender has no visual profile, he or she must be recognized by behavior, known as the grooming process. “Sadly, most ministries continue to build the wrong fence. For the sake of our children, it’s time to get to work building the right fence.” The grooming process The grooming process of the preferential offender involves two significant efforts: grooming the child and grooming the gatekeepers. It includes patterns of identifiable behavior, including: • Gaining access to children within an age and gender of preference • Selecting a specific child (or children) • Introducing nudity and sexual touch • Keeping the child quiet to ensure secrecy Grooming the child Grooming of the child will vary depending on the child’s age, gender and situation. When the targeted child is a teen male, common grooming behaviors will include pornography, alcohol, marijuana and horseplay. If the targeted child is a teen girl, common grooming behaviors will include texting, social media communication and sexual discussion. If the targeted child is under 8, common grooming behaviors will include tickling and forms of playful touch, gravitating toward places of isolation. Grooming the gatekeeper A gatekeeper is anyone responsible for protecting a child: parents, teachers, youth workers, coaches or babysitters. The preferential offender works hard to appear helpful, trustworthy and responsible to disarm a child’s gatekeepers. Why? Molesters are looking for trusted time alone to groom a child for sexual touch. Both Sandusky and Nassar were effective at grooming children and gatekeepers. Neither had past criminal convictions, both would have passed a criminal background check, and neither had a visual profile. Conversely, if program leaders had understood the grooming process of the preferential offender, both Sandusky and Nassar would have been identified as a serious risk several years — and several victims — earlier. What now? For any church leader, the first step in addressing child sexual abuse risk is self- critical analysis. Ministry leaders must shake off the delusion that this is an insignificant issue or someone else’s problem, or that this risk is effectively addressed by criminal background checks and a child check- in system. Conservative studies indicate that less than 10% of sexual abusers will encounter the criminal justice system, ever. The child check-in system will not negate or identify the behaviors of the preferential offender. By clearly understanding the actual risk, ministry leaders are better prepared to protect children in their care. The next article will explore the grooming process of the preferential offender, and describe an effective safety system addressing the risk of child sexual abuse in ministry programs — the foundational elements of the right fence. Is there any good news in this? Yes. The offender’s grooming process is predictable — and what is predictable is preventable. Next Article: CHILD SEXUAL ABUSE IN MINISTRY The Grooming Process and an Effective Safety System Kimberlee Norris and Gregory Love are partners in the Fort Worth, Texas law firm of Love & Norris [ https://www.lovenorris.com ] and founders of MinistrySafe [ https://ministrysafe. com ], providing child sexual abuse expertise to ministries worldwide. After representing victims of child sexual abuse for more than two decades, Love and Norris saw recurring, predictable patterns in predatory behavior. MinistrySafe grew out of their desire to place proactive tools into the hands of ministry professionals. Love and Norris teach the only graduate-level course on Preventing Sexual Abuse in Ministry as Visiting Faculty at Dallas Theological Seminary. Why ‘the list’ fails Criminal Background Checks — No Silver Bullet Less than 10% of sexual abusers will encounter the criminal justice system, ever. More than 90% of abusers have no record to find; and they know it. Further, getting and understanding criminal records that do exist continues to challenge ministry leaders. Child Check-In Systems The effectiveness of a child check- in system can only be evaluated when ministry leaders understand the difference between the abduction offender and the preferential offender. A ministry’s child check-in system might be effective related to the abduction offender, who constitutes 4-5% of the risk. Generally, a child check-in system is useless as it relates to the preferential offender — who represents over 90% of the risk. Further, the child check-in system is completely ineffective in reducing the risk of peer-to-peer sexual abuse. Policies & Procedures Policies are what you DO, not what you SAY you do. Policies and procedures are the written expression of what is and is not appropriate behavior in a ministry program. If a ministry leader does not understand the preferential offender, it is unlikely that he or she is familiar with the grooming process of the preferential offender. To effectively address child sexual abuse risk, policies must clearly identify and prohibit grooming behaviors within the ministry program. CHURCH EXECUTIVE.COM | 29