Компьютерно-техническая экспертиза
Главная Библиотека Библиотека Книги Investigating Child Exploitation and Pornography : The Internet, Law and Forensic Science

Книги

Investigating Child Exploitation and Pornography : The Internet, Law and Forensic Science

Investigating Child Exploitation and Pornography : The Internet, Law and Forensic Science By Eoghan Casey & Monique Ferraro Hardcover / October 2004 / 0121631052 Table of Contents the Authors Preface Acknowledgments SECTION I THE INFLUENCE OF TECHNOLOGY 1. Overview 1.1 Background 1.2 History of Child Sexual Exploitation 1.3 Child Pornography 1.4 Technology and Child Exploitation 1.5 Technology and Preferential Sex Offenders 1.6 Development of Child Pornography Law 1.7 International: The United Nations Convention on the Rights of the Child 1.8 Conclusion References 2. Internet Applications 2.1 IP Addresses and Domain Name System 2.2 E-Mail 2.3 E-Groups and Mailing Lists 2.4 List Serves 2.5 Newsgroups, Discussion Boards, and Bulletin Boards 2.6 Web Sites 2.7 Chat Rooms and Internet Relay Chat 2.8 Instant Messaging 2.9 Web Cameras and Videophones 2.10 File Transfer Protocol (FTP) 2.11 Peer-to-Peer (P2P) 2.12 Conclusion Resources 3. Cyber Victims 3.1 Victimology 3.2 How to Protect Children Online 3.3 Conclusion References Internet Resources 4. Cyber Offenders 4.1 The Online Sexual Predator 4.2 The Child Molester 4.3 Modus Operandi: How Online Child Molester Operates 4.4 Signature and the Online Child Molester 4.5 Profiling the Child Molester 4.6 The Subculture of Child Pornography 4.7 Conclusion References 5. Sources of Digital Evidence 5.1 Open Computer Systems 5.2 Embedded Computer Systems 5.3 Communication Systems 5.4 Peripheral Devices References SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION 6. Undercover Operations 6.1 Self-Protection 6.2 Using Personal Equipment 6.3 Setting Up Internet and Telephone Connections 6.4 Using Online Undercover Identities 6.5 Conducting an Online Investigation 6.6 Documenting Predisposition of the Suspect to Commit a Crime 6.7 Preparing for a Meeting or Search 6.8 Agencies and Resources 6.9 Conclusion References Internet Resources 7. Collecting and Preserving Evidence on the Internet 7.1 Preserving Evidence on the Internet 7.2 Finding Evidence on the Internet 7.3 Collecting Remote Evidence References 8. Tracking on the Internet 8.1 Attribution and Continuity of Offense 8.2 Tracking Internet Activities 8.3 Overcoming Challenges to Attribution References 9. Search and Seizure in Cyberspace I: Drafting Warrants and Warrantless Searches 151 9.1 Search Warrant Drafting 9.2 Search Warrants in General 9.3 Child Pornography Sent via the Internet—Search Warrant for Internet Account 9.4 Enticement of a Minor 9.5 Grooming Evidence 9.6 The Affidavit—Probable Cause 9.7 Arrest Warrants 9.8 Warrantless Searches 9.9 Conclusion References 10. Search and Seizure in Cyberspace II: Executing the Search 10.1 Search Warrants 10.2 Evidence Handling 10.3 Obtaining a Second Warrant 10.4 Executing Internet Service Provider Search Warrants 10.5 Conducting Preliminary Interviews 10.6 No Knock Warrants 10.7 Privileged Documents and Communications 10.8 The Privacy Protection Act 10.9 Returning Seized Items References SECTION III FORENSIC EXAMINATION OF DIGITAL EVIDENCE 11. Overview of the Examination Process 11.1 Examination 11.2 Analysis and Reconstruction 11.3 Challenges to Admissibility References 12. Servers and Networks 12.1 Identification and Seizure 12.2 Preservation 12.3 Examination and Analysis References SECTION IV THE LAW OF INTERNET CHILD SEXUAL EXPLOITATION 13. Child Pornography 13.1 Evolution of Child Pornography Law Post-Ferber 13.2 Possessing Child Pornography Can Be Prohibited 13.3 The Child Pornography Protection Act and the Free Speech Coalition Challenge 13.4 Morphed Images 13.5 Virtual Child Pornography 13.6 Conclusion References 14. Pre-Trial 14.1 Introduction 14.2 Charging in Computer-Assisted Child Exploitation Cases 14.3 Case Law Concerning Charging Decisions 14.4 What Constitutes Possession. 14.5 Multiple Computer Users 14.6 Plea Bargaining Considerations 14.7 Selection of Evidence 14.8 How Much Is Enough. 14.9 Enticing a Minor to Engage in Sexual Activity 14.10 Presenting Evidence 14.11 Conclusion Reference 15. Trial 15.1 Selecting the Jury 15.2 Young Victims/Witnesses 15.3 Expert Witnesses 15.4 Dissecting the Digital Forensics Expert’s Report 15.5 Defending the Charge 15.6 Conclusion References 16. Final Thoughts 16.1 Setting Up an Online Child Exploitation Unit 16.2 Locating Resources for Investigators and Prosecutors 16.3 Looking Forward Reference Index

Прикрепленные файлы

Оценить статью:
Рейтинг статьи: 2