U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Protecting Children Online Unit Commander/Policy Training

NCJ Number
190038
Date Published
1999
Length
1168 pages
Annotation
This manual contains module materials for police unit commanders enrolled in a 3-day training seminar (November 7-9, 1999) on policies and procedures for the management of investigations of crimes against children perpetrated through the Internet.
Abstract
The first module provides instruction on the nature of the growing problem of computer crimes against children. The presentation includes an overview of how sex offenders use personal computers and the Internet to assist them in their sexual abuse and exploitation of children. Case examples are used to illustrate how computers are used to store, manufacture, and distribute child pornography and solicit children for sexual contact. The second module provides unit commanders with information on how computer technology has changed and how it facilitates the commission of some crimes. The instruction covers the basics of computer technology, so as to facilitate communication with investigators regarding investigative techniques and evidence. The third module familiarizes unit commanders with the concept of computer networks and online communications. The Internet and how it works is described, with attention to how the Internet is used to exploit children. The fourth module provides instruction in organizational and management concepts for the creation and oversight of programs designed to protect children online. Case management principles are examined, and students receive instruction in their responsibilities in managing specialized units and programs. The fifth module provides an overview of investigative techniques, methods, and actual case scenarios, so as to assist a unit commander in managing a complex, technical child exploitation investigation. The sixth module provides students with a comprehensive overview of privacy issues, search-and-seizure issues, and legal exposure associated with the investigation and prosecution of computer-assisted sexual exploitation of children. The final module identifies and explains the resources that can be used in the effective investigation of computer crimes against children.