Cargando…

Investigating child exploitation and pornography : the internet, the law and forensic science /

Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Intern...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ferraro, Monique Mattei
Otros Autores: Casey, Eoghan, McGrath, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier/Academic Press, ©2005.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • COVER
  • CONTENTS
  • ABOUT THE AUTHORS
  • PREFACE
  • ACKNOWLEDGMENTS
  • SECTION I THE INFLUENCE OF TECHNOLOGY
  • 1. OVERVIEW
  • 1.1 BACKGROUND
  • 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION
  • 1.3 CHILD PORNOGRAPHY
  • 1.4 TECHNOLOGY AND CHILD EXPLOITATION
  • 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS
  • 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW
  • 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD
  • 1.8 CONCLUSION
  • REFERENCES
  • 2. INTERNET APPLICATIONS
  • 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM
  • 2.2 E-MAIL
  • 2.3 E-GROUPS AND MAILING LISTS
  • 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS
  • 2.5 WEB SITES
  • 2.6 CHAT ROOMS AND INSTANT MESSAGING
  • 2.7 WEB CAMERAS AND VIDEOPHONES
  • 2.8 FILE TRANSFER PROTOCOL (FTP)
  • 2.9 PEER-TO-PEER (P2P)
  • 2.10 CONCLUSION
  • RESOURCES
  • 3. CYBER VICTIMS
  • 3.1 VICTIMOLOGY
  • 3.2 HOW TO PROTECT CHILDREN ONLINE
  • 3.3 CONCLUSION
  • REFERENCES
  • INTERNET RESOURCES
  • 4. CYBER OFFENDERS
  • 4.1 THE ONLINE SEXUAL PREDATOR
  • 4.2 THE CHILD MOLESTER
  • 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE
  • 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER
  • 4.5 PROFILING THE CHILD MOLESTER
  • 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY
  • 4.7 CONCLUSION
  • REFERENCES
  • 5. SOURCES OF DIGITAL EVIDENCE
  • 5.1 OPEN COMPUTER SYSTEMS
  • 5.2 EMBEDDED COMPUTER SYSTEMS
  • 5.3 COMMUNICATION SYSTEMS
  • 5.4 PERIPHERAL DEVICES
  • REFERENCES
  • SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION
  • 6. UNDERCOVER OPERATIONS
  • 6.1 SELF-PROTECTION
  • 6.2 USING PERSONAL EQUIPMENT
  • 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS
  • 6.4 USING ONLINE UNDERCOVER IDENTITIES
  • 6.5 CONDUCTING AN ONLINE INVESTIGATION
  • 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME
  • 6.7 PREPARING FOR A MEETING OR SEARCH
  • 6.8 AGENCIES AND RESOURCES
  • 6.9 CONCLUSION
  • REFERENCES
  • INTERNET RESOURCES
  • 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET
  • 7.1 PRESERVING EVIDENCE ON THE INTERNET
  • 7.2 FINDING EVIDENCE ON THE INTERNET
  • 7.3 COLLECTING REMOTE EVIDENCE
  • REFERENCES
  • 8. TRACKING ON THE INTERNET
  • 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE
  • 8.2 TRACKING INTERNET ACTIVITIES
  • 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION
  • REFERENCES
  • 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES
  • 9.1 SEARCH WARRANT DRAFTING
  • 9.2 SEARCH WARRANTS IN GENERAL
  • 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT
  • 9.4 ENTICEMENT OF A MINOR
  • 9.5 GROOMING EVIDENCE
  • 9.6 THE AFFIDAVIT-PROBABLE CAUSE
  • 9.7 ARREST WARRANTS
  • 9.8 WARRANTLESS SEARCHES
  • 9.9 CONCLUSION
  • REFERENCES
  • 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH
  • 10.1 SEARCH WARRANTS
  • 10.2 EVIDENCE HANDLING
  • 10.3 OBTAINING A SECOND WARRANT
  • 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR.