CALiO Search

Use of Computers in the Sexual Exploitation of Children. 2nd ed.

Show simple item record

dc.contributor.author Armagh, Daniel S.,Battaglia, Nick L.
dc.date.accessioned 2019-05-10T16:19:01Z
dc.date.available 2019-05-10T16:19:01Z
dc.date.issued 2006
dc.identifier.citation Armagh, Daniel S.,Battaglia, Nick L. (2006). Use of Computers in the Sexual Exploitation of Children. 2nd ed. Washington: U.S. Office of Justice Programs. en_US
dc.identifier.uri https://library.childwelfare.gov/cwig/ws/library/docs/gateway/Blob/57618.pdf?r=1&rpp=25&upp=0&w=NATIVE%28%27SIMPLE_SRCH+ph+is+%27%27juvenile%27%27%26%27%27stalking%27%27%27%29&m=4&order=native%28%27year%2FDescend%27%29  
dc.identifier.uri http://hdl.handle.net/11212/4335
dc.description.abstract Key areas under examination in this guide are (1) understanding the behavior of child predators; (2) understanding how child predators use computers; (3) understanding how to investigate cases involving computers; and (4) understanding the legal consideration in the use of search warrants. The first section examines the behavior of child predators and illustrates how the behavior of child predators typically evolves in four stages: (1) awareness of sexual interest in children; (2) sexual fantasizing and stimulation; (3) stalking children; and (4) child molestation. Child predators use computers for collecting child pornography, communicating with other child predators, finding potential victims, and for soliciting children for sexual activity. The investigation of cases involving computer evidence is complex and often takes considerable resources. Guidelines are presented that offer advice on handling issues of jurisdiction, technical expertise and other human resources, and equipment. Once these issues have been dealt with, investigators must establish the context of the child sexual exploitation. Investigators are advised to obtain the most complete, detailed, and accurate information possible on the situation under examination. Investigators should establish that the suspect owns or has access to a computer and uses it for child sexual exploitation. The type and location of the computer should be established along with probable cause that the suspect used the computer for criminal activities. Basic questions to ask victims, witnesses, and suspects are offered followed by steps for obtaining a search warrant. Advice for handling and analyzing computer systems is presented, which recommend that investigators work closely with the prosecuting attorney and access experts for the computer forensics work. Finally, the many legal considerations for using search warrants to gather computer evidence are enumerated, from drafting the affidavit of probable cause to conducting a search without a warrant. Supplemental readings and relevant organizations are listed. (Author abstract) en_US
dc.language.iso en en_US
dc.publisher U.S. Office of Justice Programs en_US
dc.subject child abuse en_US
dc.subject cybercrime en_US
dc.subject internet en_US
dc.subject grooming en_US
dc.subject manipulation en_US
dc.subject solicitation en_US
dc.subject guidelines en_US
dc.subject best practices en_US
dc.title Use of Computers in the Sexual Exploitation of Children. 2nd ed. en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search


Browse

My Account