Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science

Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science

Hardback

By (author) Monique Ferraro, By (author) Eoghan Casey

Currently unavailable
We can notify you when this item is back in stock

Add to wishlist
OR try AbeBooks who may have this title (opens in new window)

Try AbeBooks
  • Publisher: Academic Press Inc
  • Format: Hardback | 320 pages
  • Dimensions: 193mm x 246mm x 23mm | 1,089g
  • Publication date: 2 November 2004
  • Publication City/Country: San Diego
  • ISBN 10: 0121631052
  • ISBN 13: 9780121631055
  • Edition statement: New.
  • Sales rank: 1,261,447

Product description

Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this problem, or perhaps because of it, there are no published resources that bring together the complex mingling of disciplines and expertise required to put together a computer assisted child exploitation case. This work fills this void, providing police, prosecutors and forensic examiners with the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. The book will become an indispensable resource for those involved in the investigation, prosecution and study of computer-assisted child sexual exploitation. The book provides a history of child exploitation cases and studies, outlining the roles of technology in this type of crime and the evidence they can contain, and documenting new research performed by the authors. It details how successful undercover internet operations are conducted, how the associated evidence is collected, and how to use the evidence to locate and apprehend the offender. The heart of this work is a legal section, detailing all of the legal issues that arise in internet child exploitation cases. A forensic examination section presents evidentiary issues from a technical perspective and describes how to conduct a forensic examination of digital evidence gathered in the investigative and probative stages of a child exploitation case. Citations to related documents are provided for readers who want to learn more about certain issues. Actual case examples from computer assisted child exploitation cases are explored, at all times protecting the privacy of the victims while providing enough detail to educate the reader. In addition to providing guidance on the technical and legal aspects of child exploitation investigations, this work identifies and analyzes trends in this type of crime and helps readers understand the similarities and differences between child predators who take to the internet and predators who do not. Data from the thirty Internet Crimes Against Children (ICAC) Task Forces are compiled and reported to provide a deeper understanding of the types of cases, types of offenders and the level of danger they pose to themselves, their victims, and investigating officers. Also, sex offender data from the Offices of Attorneys General in the United States and similar offices in foreign countries are gathered to increase the study sample size, establish controls, and expand the scope of the research to outside of the United States. This is the first comprehensive title in this subject area. It will use real cases and examples of criminal behavior and the means to detect it. It provides guidelines for developing a Field Manual and a Checklist to supplement the investigation and legal process. It establishes a reliable system and legal, procedural-backed protocol by which to conduct an online sexual investigation and collect evidence.

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Eoghan Casey is an internationally recognized expert in data breach investigations and information security forensics. He is founding partner of CASEITE.com, and co-manages the Risk Prevention and Response business unit at DFLabs. Over the past decade, he has consulted with many attorneys, agencies, and police departments in the United States, South America, and Europe on a wide range of digital investigations, including fraud, violent crimes, identity theft, and on-line criminal activity. Eoghan has helped organizations investigate and manage security breaches, including network intrusions with international scope. He has delivered expert testimony in civil and criminal cases, and has submitted expert reports and prepared trial exhibits for computer forensic and cyber-crime cases. In addition to his casework and writing the foundational book Digital Evidence and Computer Crime, Eoghan has worked as R&D Team Lead in the Defense Cyber Crime Institute (DCCI) at the Department of Defense Cyber Crime Center (DC3) helping enhance their operational capabilities and develop new techniques and tools. He also teaches graduate students at Johns Hopkins University Information Security Institute and created the Mobile Device Forensics course taught worldwide through the SANS Institute. He has delivered keynotes and taught workshops around the globe on various topics related to data breach investigation, digital forensics and cyber security. Eoghan has performed thousands of forensic acquisitions and examinations, including Windows and UNIX systems, Enterprise servers, smart phones, cell phones, network logs, backup tapes, and database systems. He also has information security experience, as an Information Security Officer at Yale University and in subsequent consulting work. He has performed vulnerability assessments, deployed and maintained intrusion detection systems, firewalls and public key infrastructures, and developed policies, procedures, and educational programs for a variety of organizations. Eoghan has authored advanced technical books in his areas of expertise that are used by practitioners and universities around the world, and he is Editor-in-Chief of Elsevier's International Journal of Digital Investigation.

Table of contents

Section 1 The Influence of technology; Overview; Internet Applications; Cyber Victims; Cyber Offenders; Sources of Digital Evidence; Section 2 Investigating Internet Child Exploitation; Undercover Operations; Collecting and Preserving Evidence on the Internet; Collecting and Preserving Evidence on the Internet; Tracking on the Internet; Search and Seizure in Cyberspace I: Drafting Warrants and Warrantless Searches; Search and Seizure in Cyberspace II: Executing the Search; Section 3 Forensic Examination of Digital Evidence; Overview of the Examination Process; Servers and Networks; Section 4 The Law of Internet Child Sexual Exploitation; Child Pornography; Pre-Trial; Trial; Final Thoughts