skip navigation


Abstract Database

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

To download this abstract, check the box next to the NCJ number then click the "Back To Search Results" link. Then, click the "Download" button on the Search Results page. Also see the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 190038 Add to Shopping cart Find in a Library
Title: Protecting Children Online Unit Commander/Policy Training
Corporate Author: Office of Juvenile Justice and Delinquency Prevention
US Dept of Justice
United States of America

National Ctr for Missing and Exploited Children
United States of America

Fox Valley Technical College
United States of America
Date Published: 1999
Page Count: 1168
Sponsoring Agency: Fox Valley Technical College
Appleton, WI 54912-2277
National Ctr for Missing and Exploited Children
Alexandria, VA 22314-3175
NCJRS Photocopy Services
Rockville, MD 20849-6000
Office of Juvenile Justice and Delinquency Prevention
Washington, DC 20531
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America

Fox Valley Technical College
1825 N. Bluemound Drive
P.O. Box 2277
Appleton, WI 54912-2277
United States of America
Document: PDF
Type: Instructional Material
Format: Document
Language: English
Country: United States of America
Annotation: This manual contains module materials for police unit commanders enrolled in a 3-day training seminar (November 7-9, 1999) on policies and procedures for the management of investigations of crimes against children perpetrated through the Internet.
Abstract: The first module provides instruction on the nature of the growing problem of computer crimes against children. The presentation includes an overview of how sex offenders use personal computers and the Internet to assist them in their sexual abuse and exploitation of children. Case examples are used to illustrate how computers are used to store, manufacture, and distribute child pornography and solicit children for sexual contact. The second module provides unit commanders with information on how computer technology has changed and how it facilitates the commission of some crimes. The instruction covers the basics of computer technology, so as to facilitate communication with investigators regarding investigative techniques and evidence. The third module familiarizes unit commanders with the concept of computer networks and online communications. The Internet and how it works is described, with attention to how the Internet is used to exploit children. The fourth module provides instruction in organizational and management concepts for the creation and oversight of programs designed to protect children online. Case management principles are examined, and students receive instruction in their responsibilities in managing specialized units and programs. The fifth module provides an overview of investigative techniques, methods, and actual case scenarios, so as to assist a unit commander in managing a complex, technical child exploitation investigation. The sixth module provides students with a comprehensive overview of privacy issues, search-and-seizure issues, and legal exposure associated with the investigation and prosecution of computer-assisted sexual exploitation of children. The final module identifies and explains the resources that can be used in the effective investigation of computer crimes against children.
Main Term(s): Police policies and procedures
Index Term(s): Child molesters; Child Pornography; Child Sexual Abuse; Computer evidence; Computer hardware systems; Computer related crime; Computer software; Computer training; Evidence collection; Investigative techniques; Police computer training; Police management training; Sex offenses
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.