Contents
Acknowledgements
Executive Summary &
    Key Recommendations
Introduction
Background to Work
    with Perpetrators
Methodology
Findings
Conclusions &     Recommendations
References
Appendices