Saturday, April 19, 2008

CSAM & Predators - Investigating Internet crimes against children: Seeking a new law enforcement paradigm

Dr. Frank Kardasz

Originally written: April 14, 2008, Revised: August 22, 2008

Abstract

For the first time in history, law enforcement officers in the 21st century possess proactive methods to identify and bring to justice those who sexually abuse minors. In years past, law enforcement had to wait for reports of child abuse before investigations could begin. But today, using innovative undercover techniques and the Internet, investigators can proactively seek out and apprehend offenders. Although this is one of the greatest advancements in the history of the enforcement of crimes against children, investigators still cannot take full advantage of the innovations. 

This work explores some of the stakeholders in the cyber-struggle and the troubling reasons that more resources are not devoted to the growing problem. The paper explores legal, systemic, societal and psychological hurdles related to Internet crimes against children and suggests a new law enforcement paradigm that better recognizes such crimes.

Introduction

The Internet opened an uninhibited world of wild digital wonder to our generation. Cyberspace offers terrific opportunities for education, commerce, entertainment and information exchange. Sadly, a troubling dark side to the World Wide Web exists where improved law enforcement efforts are needed. The quiet collision of young people and sex offenders on the Internet has resulted in a desperate but sometimes purposefully ignored cyber-struggle for the protection of children. 

Those who abuse minors make extensive use of computers and the Internet. Better law enforcement is urgently needed. Law enforcement officers in the 21st century possess proactive undercover methods to identify and bring to justice those who sexually abuse minors. In the past, police had wait for reports of child abuse before investigations could begin. But today, using undercover techniques and the Internet, investigators can seek out and identify abusers. Although these are the greatest advancements in the history of crimes against children, law enforcement still cannot take full advantage of the innovations.

Proactive undercover methods can identify those who lure and entice minors towards sexual abuse. Undercover officers posing as minors have been very successful in identifying hundreds of offenders who have also committed contact “hands-on” offenses against real victims (Kardasz, April 25, 2008). 

Investigative operations can also identify those who traffic images and videos depicting the sexual exploitation of minors. Possessors of unlawful images are also often found to also be “hands-on” contact abusers. Surprising studies of incarcerated federal prisoners by Hernandez and Bourke (November 2000) indicated that a significant number of possessors of unlawful images were also contact offenders. Sophisticated investigative methods exist that can identify possessors of unlawful images (Koch, April 15, 2008, Software tracks child porn traffickers online). Increased investigative efforts into unlawful images will also result in an increase in the identification of molesters.

This work explores some of the stakeholders in the cyber-struggle and the troubling reasons that more resources are not devoted to the problem. The paper explores legal, systemic, societal and psychological hurdles related to Internet crimes against children and suggests a new law enforcement paradigm that better recognizes such crimes.

Constitutional Conflicts

The Commerce Clause of the US Constitution (Article I, Section 8, and Clause 3) has been interpreted as giving some authority over the Internet to Congress. Legislators are understandably reticent to tread on the First Amendment freedoms provided by the Internet. Efforts to safeguard cyberspace are sometimes perceived as costly by the business community and draconian “snooping” by free-speech advocates (McCullagh, April 14, 2006). At risk are the under-represented Fourteenth Amendment due process rights of children who have no socioeconomic power.

Those who assert Constitutional protections should review the words of Thomas Jefferson. Perhaps in anticipation of the Internet, he wrote (July 10, 1810),

I am not an advocate for frequent changes in laws and constitutions, but laws and institutions must go hand in hand with the progress of the human mind. As that becomes more developed, more enlightened, as new discoveries are made, new truths discovered and manners and opinions change, with the change of circumstances, institutions must advance also to keep pace with the times. We might as well require a man to wear still the coat which fitted him when a boy as civilized society to remain ever under the regimen of their barbarous ancestors.

Jefferson refers to the discovery of “new truths.” One of the new truths discovered in the exploration of cyberspace is that the Internet is a conduit of both good and evil. Jefferson may have opined that constitutionally protected rights to free expression are in question when they permit the rights of children to be horribly violated. Perhaps the free expression rights that protect offenders require review and controls. Progressive human minds invented computers and the Internet. Deviant human minds invented ways to misuse cyberspace. A middle ground favoring public safety must be found.

It is unlikely that the legal quagmire of conflicting rights will be resolved anytime soon. Until effective safeguards are in place, minors who become victims of Internet sex offenders are not receiving the equal protection and due processes guaranteed under the Fourteenth Amendment of the Constitution. More work is needed to resolve these constitutional conflicts.

Unlawful Images 

Internet crimes involving unlawful images of the sexual abuse of children are now widespread and the number of images and videos available via cyberspace is probably incalculable. A Congressional study in 2006 identified several key factors that contributed to the proliferation of child pornography on the Internet. First, and perhaps most problematic according to the study, is the sheer number of child abuse images on the Internet. United States law enforcement sources estimated approximately 3.5 million known child pornography images online (U.S. House of Representatives, January 2007). 

The exact number of child pornography web sites is also difficult to determine. In the year 2001, the National Center for Missing and Exploited Children's CyberTipline received more than 24,400 reports of child pornography. Five years later, at the beginning of 2006, that number had climbed to more than 340,000. (National Center, March 15, 2006). 

In 2008, during a 30 day period in February and March, offenders in Arizona were observed using one small avenue of the Internet to traffic 15,220 unlawful images (Kardasz, March 25, 2008). The Internet has fueled a tremendous and immeasurable increase in the amount of child pornography being produced, trafficked and possessed worldwide.  

Luring and Enticement Curious and unsuspecting adolescents visit the Internet each day seeking friendship and information but sometimes instead encounter sexual deviance and menacing predators. One study showed that one in seven youngsters received unwanted sexual solicitations and that 4% received aggressive solicitations involving a stranger who wanted to meet in person (Wolak, Mitchell & Finkelhor, 2006. p.1). 

In luring/enticement cases involving actual teens, few of the minors who are victimized ever report the crimes. Victimized teens are often too embarrassed to notify law enforcement and fearful of their parents’ wrath for disobeying rules against communicating with strangers online. Sometimes a teen returns home after secretly meeting an Internet stranger without his or her parents ever discovering the illicit tryst. 

In 2002, an Arizona Internet Crimes Against Children (ICAC) Task Force undercover officer posing online as a young girl was contacted by a man who requested a meeting for sex. When the man went to the location where he believed that he would meet the minor he was arrested. Investigators learned that the offender had previously met two girls whom he had victimized and to whom he had given sexually transmitted diseases. In their shame, the girls had never notified their parents of the crimes. The girls' distraught parents only learned of the offenses when detectives informed them of the suspects’ confessions (Phoenix Police Department, Report No. 2002-2233604). 

 In some cases, a child's natural curiosity leads them to Internet places where they do not belong, and with sad results.Beginning at the age of 13, a California boy was repeatedly victimized by offenders who met him via the Internet after first seeing his image on a web cam. The boy suffered sexual abuses at the hands of the men who had first contacted him online. Some of the boys Internet acquaintances had assisted him in operating commercial pornography websites featuring sexual images and videos of himself (Eichenwald, December 19, 2005). 

In many cases, the teens who are lured by sexual predators will never come forward due to fear or a misplaced sense of guilt. A few of them, like 13 year old Kasie Woody of Arkansas (Family Life, October 12, 2004), and 13 year old Christina Long of Connecticut (CBS News, May 21, 2002), were forever silenced by Internet sexual predators who lured them via the Internet, sexually victimized them and killed them. 

Child prostitution is also being facilitated via the Internet. Pimps use message boards and social networking sites to find customers seeking to engage in paid sex acts with minors. In January 2007, Cook County Illinois police arrested three adults who used Craigslist, a free Internet advertising site, to offer the sexual services of girls as young as 14 years old. The illegal prostitution business resulted in profits of tens of thousands of dollars for the pimps. Undercover officers investigated and solved the case by responding to postings on Craigslist (Gutierrez, January 11, 2007). 

In the past, child molesters were characterized as often lurking near school yards. Folklore held that child molesters frequented school yards because that is where the children were. The Internet is the new proverbial schoolyard. Cyberspace provides a ready hunting-ground for those who seek children. 

The Internet is an extraordinarily important part of the daily lives of millions of young people. For some youngsters cyberspace is more influential than school, family or religion. In March 2008, an Internet-obsessed Arizona teenager became so attached to a popular social networking site that when his father revoked his computer privileges he shot and killed him (Walsh, March 05, 2008).

Internet social networking sites are places in cyberspace where subscribers may post personal information about themselves and share the information with others. Children and adults use social networking sites to communicate and to make friends. A study in 2006 estimated that 55% of young people have established online profiles in one or more of the dozens of social networking sites (PEW, January 1, 2007). 

Most social networking sites are free and permit users to register without providing information about the users’ true identities or whereabouts. The sites are well suited for molesters who can pose as harmless mentors while disguising their true intent. There have been many incidents of registered sex offenders who have created online profiles portraying themselves as inoffensive individuals seeking romance without reference to their malevolent pasts (Kardasz, Internet social networking sites. 2007). 

Proactive undercover “sting” investigations often lead to the apprehension of Internet sexual predators. Undercover officers posing as teens are often solicited by cyberspace acquaintances who offer to participate in sex acts. Unfortunately, a very few law enforcement agencies have personnel devoted to proactive investigations of offenders who lure and entice minors.  

Disenfranchised Youth are Perfect Victims 

Children and teens are disenfranchised from social and political power. They are unable or unwilling to express their needs for Internet safety. Some children who become the victims of child pornography offenses are too young to phone 911 for police assistance. They cannot call their elected official and they are often too intimidated by the offender to ever tell anyone. 

Helpless child victims of some sex offenders cannot summon the assistance of law enforcement. Some victims of child pornographers are too young to formulate words or use a telephone. The evidence of a child's victimization is invisible to the general public and the crimes are often unreported. Because crimes against children are not publicly apparent, law enforcement agencies may marginalize the problems and give the crimes lower priority than other offenses. Consequently, relatively few law enforcement resources are devoted to the problems of children. 

Funding for Internet crime investigations is relatively small. Most police departments have many more traffic cops than crimes against children investigators. Abominations against children are mostly committed in private locations. The offenses do not create the conspicuous noise of gunfire or a car crash. The crimes do not have the noticeable smell of smoke from a fire and cannot be seen from the street like graffiti or broken windows so there is little public attention drawn to the crimes. Offenders know that children are easily intimidated into silence and often cannot communicate well enough to be understood by authorities. For offenders, disenfranchised children are perfect victims partly because the crimes are invisible to law enforcement and children are powerless.  

Internet Service Providers 

Internet service providers (ISP) are the unwitting facilitators of Internet crimes against children. ISP’s provide offenders with the connections to the web that allows crimes to occur. Without a cyberspace connection provided by an ISP, Internet crime would impossible. Some conscientious ISP’s are taking helpful steps to provide crime prevention education information to users but more assistance to law enforcement is needed. 

Other unwitting persons who benefit from Internet services include businesses who advertise on web sites for the purpose of drawing buyers to their products. Some businesses have been surprised to learn that their advertising banners have appeared on web pages featuring child pornography. Some of the responsibility for cyberspace safety and enforcement also lies with those who benefit from advertising on the Internet. 

Most ISP's charge a fee for service and individual subscribers often pay with credit cards. The subscription and payment process provides a path for law enforcement to use subpoenas or search warrants to trace back to a subscriber by following the money trail. The subpoena and search warrant response process can be time-consuming for both law enforcement and the ISP's. Delays in the response process can stall law enforcement investigative efforts. When an ISP does not retain subscriber data, the investigation sometimes ends. 

In 1998, a federal law was passed (Cornell Law School, 2007) requiring ISP's to report child pornography to the National Center for Missing and Exploited Children (NCMEC). By 2002, thousands of reports were flooding into NCMEC from those ISP's that chose to comply with the law. Those reports were subsequently sent to federal, state and local agencies for investigation. The large number of reports quickly overwhelmed the small staffs of those few agencies that employed investigators who had the technical expertise needed to investigate Internet crimes. Investigators began to complain that ISP's were sometimes failing to respond in a timely manner to subpoenas or search warrants requesting subscriber information. Investigators noted that in some cases, ISP's retained no information whatsoever, leaving investigations to a dead end. 

A small survey of law enforcement investigators in 2006 showed that the number one need of those who investigate Internet crimes against children was for improved responses from Internet service providers. At Congressional hearings in 2006, law enforcement officers requested improved data retention by ISP's (Kardasz, April 6, 2006). Representative Ed Whitfield from Kentucky responded to the request by saying, "I absolutely think that is an idea worth pursuing. If those files were retained for longer periods of time, it would help in the uncovering and prosecution of these crimes." When news of the request for improved data retention reached the Internet industry, some in the field denied that there was a problem and expressed reluctance about the idea to preserve data. The idea was subsequently mis-characterized as unnecessary government intervention in attempts to "snoop" and pry into private citizens’ lives (McCullagh, April 14, 2006). 

The need for ISP's to retain data and to respond quickly to legal process from law enforcement is a critical need for investigators of Internet crimes. Lack of response to law enforcement subpoenas and search warrants can have dire consequences for victims and stall or end law enforcement investigations before an offender can be identified (Kardasz, February 12, 2008). 

Special Agent Flint Waters of the Wyoming Internet Crimes Against Children Task Force testified before a Congressional Subcommittee that in one case, an ICAC investigator intercepted the Internet transmission of a video showing the rape of a two-year-old child and traced the video to a computer somewhere in Colorado. When the investigator approached the Internet Service Provider, Comcast, to request the customer information for the Internet protocol address, Comcast replied that it had not retained the customer records for that address. As of the date of the hearing (April, 2006), to Mr. Waters’ knowledge, the child in the video had not been identified (U.S. House of Representatives, January, 2007). 

Internet service providers, credit card companies, social networking sites, gaming sites, providers of chat rooms, e-mail services and those who advertise in Cyberspace are all among the facilitators who are caught in the middle of the Internet crime problem. The providers tacitly assent to Internet crime while profiting from subscribers and advertisers. Providers should logically bear some of the responsibility for correcting the problems. In the same way that automobile manufacturers begrudgingly gave way, after thousands of roadway deaths, to regulations mandating vehicle safety, ISP's must provide improved Internet safety before the annual number of Internet crimes matches the annual number of vehicular accidents. 

For Internet service providers, preserving information and providing it to law enforcement in response to legal process is an unwanted and unprofitable chore. As the tragedies associated with some ISP's reluctance to preserve and provide information gain increased attention, public pressure and legislative action may dictate that ISP's work harder to help law enforcement officers identify the suspects associated with Internet crimes. Eventually, reluctant ISP's will be unable to turn a blind eye to the crimes and might be forced to become partners in justice instead of facilitators of injustice.  

Politics and Mute Constituents 

Children can easily become a political afterthought because they do not make financial contributions to political campaigns and they do not vote. Teens cannot organize and hire influential lobbyists to represent them before legislators. Minors are the mute and powerless constituents of well-intentioned elected officials who are unknowingly blind to their victimization.

Media and Unlawful Images 

In cases involving unlawful images and videos, the crimes against children facilitated by the Internet are sometimes so horrible that the news media is unable or unwilling to fully describe the incidents. Adding to the dilemma is the fact that unlawful images are themselves contraband and cannot be released for public viewing. When written in text the dispassionate descriptions of unlawful images use statutory legalese to explain the criminal sex acts involved. The pedantic written descriptions of the images and videos can never fully convey the abominations suffered by the victims.  

Media and Luring/Enticement 

Well intentioned media organizations in partnership with cybervigilante groups and sometimes with the cooperation of law enforcement have conducted undercover sting operations targeting Internet sexual predators (MSNBC, 2008). Such operations present unique and unusual challenges to law enforcement (Kardasz, March 17, 2008). The sting operations do little to quell the onslaught of Internet predators and in some cases make the work of undercover officers more difficult. The cybervigilantes often make the offenders more wary as the predators later demand more proofs from UC officers, asking the officers to show that they are not with law enforcement or the media before completing the criminal act.  


 

Law Enforcement  

Uniformed crime reporting. 

The US Department of Justice (DOJ) Uniform Crime Reporting (UCR) service collects data describing the saturation of law enforcement officers within various regions of the US. In 2004 there were 675,734 sworn officers who provided law enforcement services to more than 278 million people nationwide (Dept. of Justice, FBI, 2004). The UCR also reports the number of officers per 1000 population in various regions of the US. Depending on the location, different areas of the US had between 1.8 and 5.5 officers per 1000 population. The DOJ does not gather statistics about the number of citizens who use the Internet and no information is reported in the UCR about the number of law enforcement officers engaged in battling offenders who use the Internet to victimize minors.

The National Incident-Based Reporting System (NIBRS) is ineffective in capturing statistics specifically related to Internet crimes against children. NIBRS does not have specific categories that capture Internet crimes against children (Finkelhor D., and Ormrod, R. December 2004). This tragic failure to collect data permits statistics-driven administrators to deny and ignore the existence of the problem.

Spending for enforcement. 

The Internet crime problem craves increased resources for law enforcement services, training and equipment. Unfortunately, resources for law enforcement functions of any kind are sometimes scarce. The competition for the limited available funds occurs in environments where agencies contend with one another for each slice of the budget. Knowledgeable advocates for children continually hope that more government dollars will be devoted to the enforcement of Internet crimes against children. In his 2006 testimony to Congress (April 6) Grier Weeks, Executive Director of the National Association to Protect Children said:

The federal government must get serious. We are losing this war, (against child pornography) and we are not supporting our troops on the front lines. Recent estimates of the size of the exploding global criminal market in child pornography are in the multi-billion dollar range. Yet by no objective measure can we claim to be serious or prepared as a nation about stopping what is being done to these children. The FBI’s Innocent Images National Initiative is funded at $10 million annually. By comparison, the Department of Housing and Urban Development just announced it was awarding more money than the entire Innocent Images budget to build 86 elderly apartment units in Connecticut and almost 7 times their budget on the homeless in Ohio. The administration has proposed 20 times the entire Innocent Images budget for abstinence-only education programs through the Department of Health and Human Services. The Department of Justice’s Internet Crimes Against Children (ICAC) Task Force program received about $14.5 in fiscal year 2006. That is less than one-fifth the amount proposed for a new initiative to help former prisoners reintegrate into society. Last year’s budget included $211 million for the Department of the Interior for “high-priority brush removal” and related projects. $14.5 million doesn’t clear much brush.

Offenders, the public and law enforcement. 

Crimes against children are particularly repugnant. Most people wish to mentally disassociate themselves from thoughts of dreadful abuse involving helpless children.

Law-enforcement investigators must deal with the fact that the identification, investigation, and prosecution of child molesters may not be welcomed by their communities—especially if the molester is a prominent person. Individuals may protest, and community organizations may rally to the support of the offender and even attack the victims. City officials may apply pressure to halt or cover up the investigation. Many law-enforcement supervisors, prosecutors, judges, and juries cannot or do not want to deal with the details of deviant sexual behavior. They will do almost anything to avoid these cases (Lanning, 2001, p. 142).

Crimes against children are the most reviled types of investigations for law enforcement officers. While respectful of the need to bring offenders to justice many officers say, “I could never work those kinds of crimes.” The true facts about the sexual victimization of minors is so psychologically distressing that few can emotionally tolerate being deeply involved in the investigations.  

Community based policing for invisible victims.  

Traditional law enforcement approaches based on community oriented policing theories are not applicable in the area of Internet crimes against children. In a community oriented policing services publication intended to guide police administrators in evaluating their local child pornography problem, writers Wortley and Smallbone (May 2006, p. 29) recommend a curious statistics-based method for analyzing the problem. The publication clumsily counsels administrators to understand their local problem by determining how many complaints related to child pornography have been investigated in their jurisdictions. Unfortunately, because the victims of crimes against children cannot complain, using the suggested methods to evaluate child pornography crimes based on local crime statistics is an invalid over-simplification. Unlike spectacular crimes and incidents involving crashes, explosions, shootings and widespread newsworthy bloodletting, the evil offenses against children are committed in dark and private places by offenders who often psychologically control or humiliate their victims into silence. The crimes are mostly unreported. Statistics will not reveal the true story.  

Federal and local law enforcement. 

Because of competing priorities, Internet crimes against children have received relatively little attention from federal law enforcement agencies. Since 2001, Federal efforts have focused appropriately on terrorism and border protection. The continuing war on illegal drugs is also a proper federal priority. Several enforcement efforts against Internet film piracy, copyright violations and file-shared music were mounted after demands by influential and well-heeled victims in the movie and music industry (Dept. of Justice, November 17, 2006). The slow response to cybercrime is partly due to the fact that Internet crimes are a relatively new phenomena. Crimes against children were only added to Federal law enforcement duties in the mid 1980s, and Internet crimes against children only began to rise in the late 1990s. Law enforcement is far behind the criminals in the war against illegal images. In April, 2008, when asked about the war on child pornography, FBI Director Mueller admitted to Rep. Trent Franks of Arizona, "We're losing" (Ryan, April 23, 2008).

Local law enforcement resources at the state, county and city levels are drawn to homicides, sex assaults, gangs, drugs, burglaries, property crimes and other offenses of legitimate local importance. Consequently, those who fight Internet crimes against children are often overlooked under funded and understaffed. Advocates for children agree that more funding for the enforcement of cybercrime is needed (Koch, April 15, 2008, Limited funds hinder child porn fight). As the issues become more apparent to the public and to lawmakers, perhaps funding will increase. Advanced training and investigative skills are required in order to conduct proactive investigations of Internet sexual offenders. Law enforcement investigators who are generalists and who must also carry caseloads involving other types of crimes are unable to conduct extensive undercover investigations involving Internet crimes against children. Consequently, few law enforcement agencies have staff who are devoted full time to proactive enforcement of Internet crimes against children.  

Law enforcement educators. 

Internet crimes against children are a troubling afterthought for many law enforcement agencies. Some agencies find it easier to mount Internet safety education efforts than to mount law enforcement effort aimed at arresting criminals. Internet safety education should not be confused with law enforcement. One large metropolitan police department in the US boasts 99 school resource officers trained to conduct Internet safety education in schools but has only two investigators to conduct proactive Internet enforcement efforts. Police are trained and paid to keep the peace and make arrests. Unfortunately, their true enforcement efforts are sometimes detoured into the unfamiliar world of education where they must be re-trained as teachers. Internet public safety education efforts are important but administrators should consider whether they want sworn employees to be educators or law enforcers.

Recommendations 

What can be done to improve law enforcement efforts towards apprehending Internet sexual predators and traffickers of unlawful images? How can funding be identified for more investigators to fight Internet crimes against children? Here are several suggestions.

  • Voluntary contributions from ISP’s customers
Citizen Internet users may be willing to designate a dollar from their monthly Internet service bill to be dedicated specifically towards the investigations of crimes against children. Those funds could then be used to hire and train more investigators dedicated specifically to the job of identifying and apprehending offenders who use the Internet to commit crimes against children.
  • Better statistics-gathering methods

Failure to capture the number of Internet crimes against children in the NIBRS system permits administrators to deny the existence of the problem. The system must be corrected to properly reflect the problem of Internet crimes.

  • More proactive investigators
Proactive investigations can lead to the apprehension of offenders before they commit "contact" crimes. More investigators are needed.
  • Basic law enforcement training
Law enforcement basic training academies need to recognize Internet threats by providing a block of instruction regarding Internet crimes against children for entry-level employees.
  • Permanent funding
Permanent funding sources specifically designated for the purpose of supporting proactive investigative (not citizen education) efforts should be designated. As of 2008, the successful Internet Crimes Against Children Task Force Program remained an optional Congressional earmark program with no guarantees of continuation. Federal agencies including the FBI, ICE, US Postal Service, US Marshalls Service and even the Secret Service are making increased efforts to assist in the efforts but more personnel and funding is needed.
  • Legislation
Internet Service Providers should be mandated to retain subscriber data and required to respond promptly to legal process from law enforcement.
  • Tax on Internet Service Providers
A luxury tax on Internet service providers. A small tax on Internet service providers with the proceeds dedicated towards supporting investigative (not citizen education) efforts towards apprehending Internet sex offenders.

Conclusion 

Child victims of Internet sex crimes cannot summon assistance the way other victims can. They cannot adjust agency manpower, set policy or change regulations for their benefit. They cannot notify their local elected official. They cannot form a citizen-action group and they cannot vote. All they can do is suffer and hope. Hope that someone will pick up the cause and summon the sustained resolve to overcome legal, systemic, societal and psychological hurdles to help them. 

No single entity can claim to be in command of the Internet. Cyberspace has no single location on which to plant a flag. The Internet is like a new planet and we are still the early inhabitants. Because the Internet is not made of brick and mortar, it is easy to abdicate or ignore responsibility for authority over cyberspace. It is easy to succumb to those who might argue against any restraint whatsoever over electronic communications. 

While the Web remains unmanageable, offenders have quickly planted their flags and taken full advantage of the global communities’ inability to control cyberspace. Law enforcement institutions must advance to keep pace with developments in cyberspace. Administrators should consider the number of Internet users and subscribers in various regions and consider deploying proactive Internet crime investigators based on Internet saturation ratios. 

Such considerations would represent a step towards a new paradigm in policing. The paradigm begins by recognizing the rights of children to be safe from offenders who use cyberspace to gratify their sexual desires. Undercover proactive investigative techniques must be improved. Instead of avoiding technology, we must embrace it for the purposes of protecting minors.  

References 

CBS News Web Site. (May 21, 2002). The two faces of a 13-year-old girl. Retrieved January 19, 2007 from http://www.cbsnews.com/stories/2002/05/31/ national/main510739.shtml 

Cornell Law School. (2007). #13032. Reporting of child pornography by electronic communication service providers. Cornell Law School Web site. LII Legal Information Institute. U.S. Code collection. Title 32, Chapter 132, Subchapter IV, #13032. Retrieved January 15, 2007 from http://www4.law.cornell.edu/uscode/html/uscode42/usc_sec_42_00013032----000-.html 

Department of Justice, FBI. (2004). Crime in the United States 2004. Law enforcement personnel. Retrieved April 15, 2008 from http://www.fbi.gov/ucr/cius_04/law_enforcement_personnel/index.html 

Department of Justice. (November 17, 2006). Raymond man sentenced in connection with Internet piracy scheme. Retrieved April 17, 2008 from http://seattle.fbi.gov/dojpressrel/2006/pr111706.htm 

Eichenwald, K. (December 19, 2005). Through his webcam, a boy joins a sordid online world. The New York Times.com. Retrieved January 15, 2007 from http://www.nytimes.com/2005/12/19/national/19kids.ready.html?ex=1292648400&en=aea51b3919b2361a&ei=5090 

Family Life Today. (October 12, 2004). Kacie Woody's Story. Radio interview with Rick Woody and Jerry Spurgers. Retrieved January 19, 2007 from http:// familylifetoday.com/fltoday/default.asp?id=7633

Finkelhor D., and Ormrod, R. (December 2004). Child pornography: Patterns from NIBRS. U.S. Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention. Retrieved December 28, 2007 from http://www.ncjrs.gov/pdffiles1/ojjdp/204911.pdf 

Gutierrez, T. (January 11, 2007). Online probe uncovers underage prostitution. ABC7chicago.cnews.com Web site. Retrieved January 20, 2007 from http://abclocal.go.com/wls/story?section=local&id=4928094. 

Hernandez, A.E. (November 2000). Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prison's Sex Offender Treatment Program: Implications for Internet Sex Offenders. Paper presented at the 19th Annual Research and Treatment Conference of the Association for the Treatment of Sexual Abusers, on file with the National Center for Missing and Exploited Children. Retrieved January 15, 2007 from http://www.kardasz.org/HernandezPrisonStudy.pdf 

Jefferson. T. (July 12, 1810). Letter to Samuel Kercheval. The Jefferson Monticello. Quotations on the Jefferson Memorial. Retrieved April 16, 2008 from http://www.monticello.org/reports/quotes/memorial.html

Kardasz. F. (February 12, 2008). Ongoing survey of law enforcement re: ISP's responses to subpoena and search warrant requests. Retrieved August 22, 2008 from http://kardasz.org/blog/2008/02/ongoing_survey_of_law_enforcem.html

Kardasz. F. (March 17, 2008). Cybervigilantes: Issues to consider. Retrieved April 12, 2008 from http://www.kardasz.org/Cybervigilantes.html Kardasz, F. (March 25, 2008). Contraband images in Arizona. Retrieved April 12, 2008 from http://kardasz.org/blog/2008/04/contraband_images_in_arizona.html 

 Kardasz, F. (April 25, 2008). Arizona: Internet crimes against children offenders. Retrieved April 14, 2008 from http://www.kardasz.org/Case_Studies.html Kardasz, F. (2007). Internet social networking sites. Message posted to http://www.kardasz.org/Case_Studies.html Message also posted to http://kardasz.blogspot.com/2008/03/contraband-images-in-arizona.html 

Kardasz, F. (April 6, 2006). Sexual exploitation of children over the Internet: What parents, kids and Congress need to know about child predators. Testimony before the U.S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Oversight and Investigations. Retrieved January 15, 2007 from http://www.kardasz.org/kardasz_testimony_040606.html 

Koch, W. (April 15, 2008). Limited funds hinder child porn fight. USA Today. Retrieved April 17, 2008 from http://www.usatoday.com/news/washington/2008-04-15-childporn-main_N.htm?POE=click-refer Koch, W. (April 15, 2008). Software tracks child porn traffickers online. USA Today. Retrieved April 17, 2008 from http://www.usatoday.com/news/nation/2008-04-15-childporn-side_N.htm?POE=click-refer 

Lanning, K.V. (September, 2001). Child molesters: A behavioral analysis. National Center for Missing and Exploited Children. 4th Ed. p. 86. Retrieved January 15, 2007 from http://www.missingkids.com/en_US/publications/NC70.pdf 

McCullagh, D. (April 14, 2006). ISP snooping gaining support. CNET News.com. Retrieved January 15, 2007 from http://news.com.co/ISP+snooping+gaining+support/2100-1028_3-6061187.html MSNBC. (2008). To catch a predator. Dateline NBC. Retrieved April 17, 2008 from http://www.msnbc.msn.com/id/10912603/ 

National Center for Missing and Exploited Children. (March 15, 2006). Financial and Internet industries to combat Internet child pornography: Child pornography fact sheet. NCMEC Web site. Retrieved January 15, 2007 from http://www.ncmec.org/missingkids/servlet/NewsEventServlet?LanguageCountry=en_US&PageId=2314 

PEW, Internet & American Life Project. (January 1, 2007). Social networking web sites and Teens: An overview. Reports Family, friends & Community. Retrieved January 15, 2004 from http://www.pewinternet.org/PPF/r/198/report_display.asp

Phoenix, Arizona Police Department. (2002). Phoenix Police Report no. 2002-2233604. Available from the Phoenix, Arizona Police Department Records and Identification Bureau. Phoenix Police Department web site, http://phoenix.gov/POLICE/pub1.html

Ryan, Jason. (April 23, 2008). Mueller: "We're Losing" the child porn war. FBI Director says task forces, more resources needed. ABC News (on-line). Retrieved August 22, 2008 from http://abcnews.go.com/TheLaw/FedCrimes/story?id=4712725

U. S. House of Representatives, Committee on Energy and Commerce. (January 2007). Sexual exploitation of children on the Internet: Bipartisan staff report for the use of the Committee on Energy and Commerce. 109th. Congress. Retrieved January 15, 2007 from http://72.14.253.104/search?q=cache:Lm4QGZZG5TEJ:burgess.house.gov/UploadedFiles/Subcommittee%2520on

Weeks, G. (April 6, 2006). Sexual Exploitation of Children Over the Internet: What Parents, Kids and Congress Need to Know About Child Predators. U.S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Oversight and Investigations. Retrieved January 15, 2007 from http://www.protect.org/newswire/pdf/PROTECTtestimony4-6-06.pdf

Wortley, R. & Smallbone, S. (May, 2006). Child pornography on the Internet. Problem-oriented guides for police problem-specific guides series. No. 41. U.S. Department of Justice, Office of Community Oriented Policing Services. Retrieved January 15, 2007

No comments:

Post a Comment

Thank you for your thoughtful comments.