skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 214167 Add to Shopping cart Find in a Library
Title: Use of Computers in the Sexual Exploitation of Children, Second Edition
Series: OJJDP Portable Guides to Investigating Child Abuse
Author(s): Daniel S. Armagh; Nick L. Battaglia
Corporate Author: Office of Juvenile Justice and Delinquency Prevention
US Dept of Justice
United States of America
Date Published: December 2006
Page Count: 40
Sponsoring Agency: Juvenile Justice Clearinghouse/NCJRS
Rockville, MD 20849
NCJRS Photocopy Services
Rockville, MD 20849-6000
Office of Juvenile Justice and Delinquency Prevention
Washington, DC 20531
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America

Juvenile Justice Clearinghouse/NCJRS
P.O. Box 6000
Rockville, MD 20849
United States of America
Type: Handbook
Format: Document
Language: English
Country: United States of America
Annotation: This guide provides information to law enforcement officers regarding child predators who use the internet to exploit children and best practices for investigations involving computer evidence.
Abstract: Key areas under examination in this guide are (1) understanding the behavior of child predators; (2) understanding how child predators use computers; (3) understanding how to investigate cases involving computers; and (4) understanding the legal consideration in the use of search warrants. The first section examines the behavior of child predators and illustrates how the behavior of child predators typically evolves in four stages: (1) awareness of sexual interest in children; (2) sexual fantasizing and stimulation; (3) stalking children; and (4) child molestation. Child predators use computers for collecting child pornography, communicating with other child predators, finding potential victims, and for soliciting children for sexual activity. The investigation of cases involving computer evidence is complex and often takes considerable resources. Guidelines are presented that offer advice on handling issues of jurisdiction, technical expertise and other human resources, and equipment. Once these issues have been dealt with, investigators must establish the context of the child sexual exploitation. Investigators are advised to obtain the most complete, detailed, and accurate information possible on the situation under examination. Investigators should establish that the suspect owns or has access to a computer and uses it for child sexual exploitation. The type and location of the computer should be established along with probable cause that the suspect used the computer for criminal activities. Basic questions to ask victims, witnesses, and suspects are offered followed by steps for obtaining a search warrant. Advice for handling and analyzing computer systems is presented, which recommend that investigators work closely with the prosecuting attorney and access experts for the computer forensics work. Finally, the many legal considerations for using search warrants to gather computer evidence are enumerated, from drafting the affidavit of probable cause to conducting a search without a warrant. Supplemental readings and relevant organizations are listed. Resources
Main Term(s): Child abuse investigations; Computer evidence
Index Term(s): Child Exploitation; Child Pornography; Crimes against children
Note: Due to the sensitive nature of this work, it is not available online.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.