Lightfoot, J. W.2016-09-302016-09-302016Lightfoot, J. W. (2016). Law Enforcements’ Perceptions and Preparedness to Address Child Exploitation Via Hacking. Statesboro, GA: Georgia Southern University, 66 pp.http://digitalcommons.georgiasouthern.edu/cgi/viewcontent.cgi?article=2500&context=etdhttp://hdl.handle.net/11212/2957Throughout recorded history, children have been subjected to sexual exploitation. Child predators and pedophiles often take great risk and go to extreme lengths to sexually exploit a child. With technological advancements many individuals became globalized and connected with the invention of the computer, the internet and its attributes. However, child predators quickly took note of the vulnerability of children as they begin to groom them online. The problem quickly evolved as the Deep (Dark) Web and encryption were created. This put great stress upon law enforcement entities as locating and combating these predators became exhausting tasks. It’s most often that these predators evolve quicker than law enforcement. Most recently, the use of hacking has become a successful tool in a child predator’s arsenal. To better understand this new phenomena, this study will focus on interviewing local, state, and federal law enforcement agents on detection, combating, prevention and direction of this problem. The results suggests that child predator hacking is a very rare crime. In fact, only one of the five officers interviewed for this study had experienced child predator hacking. Instead, child predators use easier techniques such as grooming and manipulation as children are naïve and are consensually giving the child predators explicit material. However, there is still a possibility that child predator hackers were successfully able to blackmail the child and there the crime will go unreported. (Author Abstract)en-USchild abusecyber crimeprevalencepreventionresearchLaw Enforcements’ Perceptions and Preparedness to Address Child Exploitation Via HackingArticle