skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 170021 Add to Shopping cart Find in a Library
Title: Use of Computers in the Sexual Exploitation of Children
Series: OJJDP Portable Guides to Investigating Child Abuse
Author(s): D S Armagh; N L Battaglia; K V Lanning
Corporate Author: Office of Juvenile Justice and Delinquency Prevention
US Dept of Justice
United States of America
Date Published: 1999
Page Count: 32
Sponsoring Agency: National Institute of Justice/NCJRS
Rockville, MD 20849
NCJRS Photocopy Services
Rockville, MD 20849-6000
Office of Juvenile Justice and Delinquency Prevention
Washington, DC 20531
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Type: Instructional Material
Format: Document
Language: English
Country: United States of America
Annotation: This guide provides information on the computer-based techniques used by child molesters to exploit child users of the internet and to traffick in child pornography; this is followed by instruction in the techniques investigators can use to identify such offenders and collect the evidence necessary to obtain their conviction.
Abstract: As used in this guide, the term "child sexual exploitation" refers to forms of sexual victimization of children that involve pornography, sex rings, or prostitution. Traditionally, online computer services have been oriented toward adults, but an increasing number of children are logging on to commercial services, private bulletin boards, and the Internet through schools and in their homes. This increased access to computer technology puts children at greater risk of sexual exploitation. Criminals involved in the sexual exploitation of children use the computer as a convenient tool to enter the homes of their victims, correspond with one another, and exchange depictions of illicit activities with child victims. After discussing the ways in which offenders use computers to victimize children sexually, types of such computer offenders are profiled. This is followed by a review of investigative guidelines for such offenses and offenders. A pre-investigative checklist for law enforcement agencies focuses on jurisdiction, expertise, equipment, time/personnel, and follow-up. Guidelines then describe what to do and what not to do when investigating child exploitation through the use of computer systems. Topics discussed include establishing the context, obtaining a search warrant, handling computer equipment, analyzing a computer system, and the protection of the integrity of evidence. A separate section of the guide discusses legal considerations in the use of search warrants. 17 notes, 3 supplemental readings, a list of resource organizations, and a description of the Internet Crimes Against Children Program of the Office of Juvenile Justice and Delinquency Prevention
Main Term(s): Juvenile victims
Index Term(s): Child molesters; Child Pornography; Child Sexual Abuse; Computer crime investigative Training; Computer related crime; Criminal methods; Investigative techniques
Note: Due to the sensitive nature of this work, it is not available online.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.