Description |
1 online resource |
Physical Medium |
polychrome |
Description |
text file |
Bibliography |
Includes bibliographical references and index. |
Contents |
Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Child abuse.
|
|
Child abuse. |
|
Child pornography.
|
|
Child pornography. |
Genre/Form |
Electronic books.
|
Added Author |
Casey, Eoghan.
|
|
McGrath, Michael, MD.
|
Other Form: |
Print version: Ferraro, Monique Mattei. Investigating child exploitation and pornography. Amsterdam ; London : Elsevier/Academic Press, ©2005 (DLC) 2004557574 |
ISBN |
1417552654 (electronic book) |
|
9781417552658 (electronic book) |
|
008047876X (electronic book) |
|
9780080478760 (electronic book) |
|
0121631052 (alkaline paper) |
|