Investigating Child Exploitation and Pornography

The Internet, Law and Forensic Science

Nonfiction, Social & Cultural Studies, Social Science, Pornography, Reference & Language, Law, Forensic Science
Cover of the book Investigating Child Exploitation and Pornography by Monique M. Ferraro, Eoghan Casey, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Monique M. Ferraro, Eoghan Casey ISBN: 9780080478760
Publisher: Elsevier Science Publication: November 2, 2004
Imprint: Academic Press Language: English
Author: Monique M. Ferraro, Eoghan Casey
ISBN: 9780080478760
Publisher: Elsevier Science
Publication: November 2, 2004
Imprint: Academic Press
Language: English
Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this problem, or perhaps because of it, there are no published resources that bring together the complex mingling of disciplines and expertise required to put together a computer assisted child exploitation case.
This work fills this void, providing police, prosecutors and forensic examiners with the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. The book will become an indispensable resource for those involved in the investigation, prosecution and study of computer-assisted child sexual exploitation.

The book provides a history of child exploitation cases and studies, outlining the roles of technology in this type of crime and the evidence they can contain, and documenting new research performed by the authors. It details how successful undercover Internet operations are conducted, how the associated evidence is collected, and how to use the evidence to locate and apprehend the offender. The heart of this work is a legal section, detailing all of the legal issues that arise in Internet child exploitation cases. A forensic examination section presents evidentiary issues from a technical perspective and describes how to conduct a forensic examination of digital evidence gathered in the investigative and probative stages of a child exploitation case.
Citations to related documents are provided for readers who want to learn more about certain issues. Actual case examples from computer assisted child exploitation cases are explored, at all times protecting the privacy of the victims while providing enough detail to educate the reader.
In addition to providing guidance on the technical and legal aspects of child exploitation investigations, this work identifies and analyzes trends in this type of crime and helps readers understand the similarities and differences between child predators who take to the Internet and predators who do not. Data from the thirty Internet Crimes Against Children (ICAC) Task Forces are compiled and reported to provide a deeper understanding of the types of cases, types of offenders and the level of danger they pose to themselves, their victims, and investigating officers. Also, sex offender data from the Offices of Attorneys General in the United States and similar offices in foreign countries are gathered to increase the study sample size, establish controls, and expand the scope of the research to outside of the United States.

- The first comprehensive title in this subject area
- It will use real cases and examples of criminal behavior and the means to detect it.
- Provides guidelines for developing a Field Manual and a Checklist to supplement the investigation and legal process
- Establishes a reliable system and legal, procedural-backed protocol by which to conduct an online sexual investigation and collect evidence



View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this problem, or perhaps because of it, there are no published resources that bring together the complex mingling of disciplines and expertise required to put together a computer assisted child exploitation case.
This work fills this void, providing police, prosecutors and forensic examiners with the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. The book will become an indispensable resource for those involved in the investigation, prosecution and study of computer-assisted child sexual exploitation.

The book provides a history of child exploitation cases and studies, outlining the roles of technology in this type of crime and the evidence they can contain, and documenting new research performed by the authors. It details how successful undercover Internet operations are conducted, how the associated evidence is collected, and how to use the evidence to locate and apprehend the offender. The heart of this work is a legal section, detailing all of the legal issues that arise in Internet child exploitation cases. A forensic examination section presents evidentiary issues from a technical perspective and describes how to conduct a forensic examination of digital evidence gathered in the investigative and probative stages of a child exploitation case.
Citations to related documents are provided for readers who want to learn more about certain issues. Actual case examples from computer assisted child exploitation cases are explored, at all times protecting the privacy of the victims while providing enough detail to educate the reader.
In addition to providing guidance on the technical and legal aspects of child exploitation investigations, this work identifies and analyzes trends in this type of crime and helps readers understand the similarities and differences between child predators who take to the Internet and predators who do not. Data from the thirty Internet Crimes Against Children (ICAC) Task Forces are compiled and reported to provide a deeper understanding of the types of cases, types of offenders and the level of danger they pose to themselves, their victims, and investigating officers. Also, sex offender data from the Offices of Attorneys General in the United States and similar offices in foreign countries are gathered to increase the study sample size, establish controls, and expand the scope of the research to outside of the United States.

- The first comprehensive title in this subject area
- It will use real cases and examples of criminal behavior and the means to detect it.
- Provides guidelines for developing a Field Manual and a Checklist to supplement the investigation and legal process
- Establishes a reliable system and legal, procedural-backed protocol by which to conduct an online sexual investigation and collect evidence



More books from Elsevier Science

Cover of the book Calmodulin and Signal Transduction by Monique M. Ferraro, Eoghan Casey
Cover of the book Amniote Origins by Monique M. Ferraro, Eoghan Casey
Cover of the book Theory of Simple Liquids by Monique M. Ferraro, Eoghan Casey
Cover of the book Population Limitation in Birds by Monique M. Ferraro, Eoghan Casey
Cover of the book Techniques of Functional Analysis for Differential and Integral Equations by Monique M. Ferraro, Eoghan Casey
Cover of the book Progress in Optics by Monique M. Ferraro, Eoghan Casey
Cover of the book Numerical Methods for Roots of Polynomials - Part II by Monique M. Ferraro, Eoghan Casey
Cover of the book The Best Damn Exchange, SQL and IIS Book Period by Monique M. Ferraro, Eoghan Casey
Cover of the book Theory and Modeling of Dispersed Multiphase Turbulent Reacting Flows by Monique M. Ferraro, Eoghan Casey
Cover of the book Annual Reports on NMR Spectroscopy by Monique M. Ferraro, Eoghan Casey
Cover of the book The Zebrafish: Disease Models and Chemical Screens by Monique M. Ferraro, Eoghan Casey
Cover of the book Progress in Optics by Monique M. Ferraro, Eoghan Casey
Cover of the book Handbook of Modern Pharmaceutical Analysis by Monique M. Ferraro, Eoghan Casey
Cover of the book The Rhizosphere by Monique M. Ferraro, Eoghan Casey
Cover of the book Mission-Critical Microsoft Exchange 2000 by Monique M. Ferraro, Eoghan Casey
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy