Investigating child exploitation and pornography :: the internet, the law and forensic science /
Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Intern...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier/Academic Press,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this pro. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1417552654 9781417552658 008047876X 9780080478760 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm56938933 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 041109s2005 ne ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OCLCO |d UX0 |d MERUC |d IDEBK |d E7B |d REDDC |d OCLCQ |d OCLCF |d UKDOC |d OCLCQ |d AGLDB |d NLE |d OCL |d IQW |d X#7 |d OCLCQ |d ITD |d WY@ |d LUE |d MIH |d RCC |d VNS |d VTS |d OCLCQ |d TOF |d REC |d OCLCQ |d STF |d G3B |d PUG |d K6U |d VLY |d OCLCO |d OCLCQ |d OCL |d YDX |d INARC |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 259477968 |a 441788367 |a 647498585 |a 932055359 |a 1038642973 |a 1052104958 |a 1344458979 | ||
020 | |a 1417552654 |q (electronic bk.) | ||
020 | |a 9781417552658 |q (electronic bk.) | ||
020 | |a 008047876X |q (electronic bk.) | ||
020 | |a 9780080478760 |q (electronic bk.) | ||
020 | |z 0121631052 |q (alk. paper) | ||
020 | |z 9780121631055 | ||
035 | |a (OCoLC)56938933 |z (OCoLC)259477968 |z (OCoLC)441788367 |z (OCoLC)647498585 |z (OCoLC)932055359 |z (OCoLC)1038642973 |z (OCoLC)1052104958 |z (OCoLC)1344458979 | ||
037 | |a 9780080478760 |b Ingram Content Group | ||
043 | |a n-us--- | ||
050 | 4 | |a HV6626.5 |b .F47 2005eb | |
072 | 7 | |a SEL |x 001000 |2 bisacsh | |
072 | 7 | |a FAM |x 001010 |2 bisacsh | |
082 | 7 | |a 362.76 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Ferraro, Monique Mattei. |0 http://id.loc.gov/authorities/names/no2004122067 | |
245 | 1 | 0 | |a Investigating child exploitation and pornography : |b the internet, the law and forensic science / |c Monique Mattei Ferraro, Eoghan Casey ; Michael McGrath, contributor. |
260 | |a Amsterdam ; |a Boston : |b Elsevier/Academic Press, |c ©2005. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR. | |
520 | |a Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this pro. | ||
650 | 0 | |a Child abuse. |0 http://id.loc.gov/authorities/subjects/sh85023348 | |
650 | 0 | |a Child pornography. |0 http://id.loc.gov/authorities/subjects/sh85023536 | |
650 | 0 | |a Child pornography |x Law and legislation |z United States. | |
650 | 0 | |a Obscenity (Aesthetics) |z United States. | |
650 | 0 | |a Internet |x Law and legislation |z United States. | |
650 | 2 | |a Child Abuse |0 https://id.nlm.nih.gov/mesh/D002649 | |
650 | 6 | |a Enfants dans la pornographie |x Droit |z États-Unis. | |
650 | 6 | |a Obscénité |z États-Unis. | |
650 | 6 | |a Internet |x Droit |z États-Unis. | |
650 | 6 | |a Enfants |x Violence envers. | |
650 | 6 | |a Enfants dans la pornographie. | |
650 | 7 | |a SELF-HELP |x Abuse. |2 bisacsh | |
650 | 7 | |a FAMILY & RELATIONSHIPS |x Abuse |x Child Abuse. |2 bisacsh | |
650 | 7 | |a Obscenity (Aesthetics) |2 fast | |
650 | 7 | |a Internet |x Law and legislation |2 fast | |
650 | 7 | |a Child pornography |x Law and legislation |2 fast | |
650 | 7 | |a Child abuse |2 fast | |
650 | 7 | |a Child pornography |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Casey, Eoghan. | |
700 | 1 | |a McGrath, Michael. | |
758 | |i has work: |a Investigating child exploitation and pornography (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGPYHcRDwC9gRHXVRcqrVP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Ferraro, Monique Mattei. |t Investigating child exploitation and pornography. |d Amsterdam ; London : Elsevier/Academic Press, ©2005 |w (DLC) 2004557574 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=117170 |3 Volltext |
938 | |a 123Library |b 123L |n 44422 | ||
938 | |a ebrary |b EBRY |n ebr10128118 | ||
938 | |a EBSCOhost |b EBSC |n 117170 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 100813 | ||
938 | |a YBP Library Services |b YANK |n 2352508 | ||
938 | |a YBP Library Services |b YANK |n 2586122 | ||
938 | |a Internet Archive |b INAR |n investigatingchi0000ferr | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm56938933 |
---|---|
_version_ | 1816881621488369665 |
adam_text | |
any_adam_object | |
author | Ferraro, Monique Mattei |
author2 | Casey, Eoghan McGrath, Michael |
author2_role | |
author2_variant | e c ec m m mm |
author_GND | http://id.loc.gov/authorities/names/no2004122067 |
author_facet | Ferraro, Monique Mattei Casey, Eoghan McGrath, Michael |
author_role | |
author_sort | Ferraro, Monique Mattei |
author_variant | m m f mm mmf |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6626 |
callnumber-raw | HV6626.5 .F47 2005eb |
callnumber-search | HV6626.5 .F47 2005eb |
callnumber-sort | HV 46626.5 F47 42005EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR. |
ctrlnum | (OCoLC)56938933 |
dewey-full | 362.76 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 362 - Social problems and services to groups |
dewey-raw | 362.76 |
dewey-search | 362.76 |
dewey-sort | 3362.76 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07347cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm56938933 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">041109s2005 ne ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UX0</subfield><subfield code="d">MERUC</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">REDDC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">NLE</subfield><subfield code="d">OCL</subfield><subfield code="d">IQW</subfield><subfield code="d">X#7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ITD</subfield><subfield code="d">WY@</subfield><subfield code="d">LUE</subfield><subfield code="d">MIH</subfield><subfield code="d">RCC</subfield><subfield code="d">VNS</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TOF</subfield><subfield code="d">REC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">G3B</subfield><subfield code="d">PUG</subfield><subfield code="d">K6U</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">YDX</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">259477968</subfield><subfield code="a">441788367</subfield><subfield code="a">647498585</subfield><subfield code="a">932055359</subfield><subfield code="a">1038642973</subfield><subfield code="a">1052104958</subfield><subfield code="a">1344458979</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1417552654</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781417552658</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008047876X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478760</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0121631052</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780121631055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56938933</subfield><subfield code="z">(OCoLC)259477968</subfield><subfield code="z">(OCoLC)441788367</subfield><subfield code="z">(OCoLC)647498585</subfield><subfield code="z">(OCoLC)932055359</subfield><subfield code="z">(OCoLC)1038642973</subfield><subfield code="z">(OCoLC)1052104958</subfield><subfield code="z">(OCoLC)1344458979</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9780080478760</subfield><subfield code="b">Ingram Content Group</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6626.5</subfield><subfield code="b">.F47 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SEL</subfield><subfield code="x">001000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">FAM</subfield><subfield code="x">001010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">362.76</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferraro, Monique Mattei.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004122067</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Investigating child exploitation and pornography :</subfield><subfield code="b">the internet, the law and forensic science /</subfield><subfield code="c">Monique Mattei Ferraro, Eoghan Casey ; Michael McGrath, contributor.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier/Academic Press,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this pro.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Child abuse.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85023348</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Child pornography.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85023536</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Child pornography</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Obscenity (Aesthetics)</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Child Abuse</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D002649</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enfants dans la pornographie</subfield><subfield code="x">Droit</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Obscénité</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Droit</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enfants</subfield><subfield code="x">Violence envers.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enfants dans la pornographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SELF-HELP</subfield><subfield code="x">Abuse.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">FAMILY & RELATIONSHIPS</subfield><subfield code="x">Abuse</subfield><subfield code="x">Child Abuse.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Obscenity (Aesthetics)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Child pornography</subfield><subfield code="x">Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Child abuse</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Child pornography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McGrath, Michael.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Investigating child exploitation and pornography (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGPYHcRDwC9gRHXVRcqrVP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ferraro, Monique Mattei.</subfield><subfield code="t">Investigating child exploitation and pornography.</subfield><subfield code="d">Amsterdam ; London : Elsevier/Academic Press, ©2005</subfield><subfield code="w">(DLC) 2004557574</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=117170</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">44422</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10128118</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">117170</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">100813</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2352508</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2586122</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">investigatingchi0000ferr</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocm56938933 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:37Z |
institution | BVB |
isbn | 1417552654 9781417552658 008047876X 9780080478760 |
language | English |
oclc_num | 56938933 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier/Academic Press, |
record_format | marc |
spelling | Ferraro, Monique Mattei. http://id.loc.gov/authorities/names/no2004122067 Investigating child exploitation and pornography : the internet, the law and forensic science / Monique Mattei Ferraro, Eoghan Casey ; Michael McGrath, contributor. Amsterdam ; Boston : Elsevier/Academic Press, ©2005. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR. Crime scenes associated with child sexual exploitation and trafficking in child pornography were once limited to physical locations such as school playgrounds, church vestibules, trusted neighbors' homes, camping trips and seedy darkly lit back rooms of adult bookstores. The explosion of Internet use has created a virtual hunting ground for sexual predators and has fueled a brisk, multi-billion dollar trade in the associated illicit material. Approximately half of the caseload in computer crimes units involves the computer assisted sexual exploitation of children. Despite the scale of this pro. Child abuse. http://id.loc.gov/authorities/subjects/sh85023348 Child pornography. http://id.loc.gov/authorities/subjects/sh85023536 Child pornography Law and legislation United States. Obscenity (Aesthetics) United States. Internet Law and legislation United States. Child Abuse https://id.nlm.nih.gov/mesh/D002649 Enfants dans la pornographie Droit États-Unis. Obscénité États-Unis. Internet Droit États-Unis. Enfants Violence envers. Enfants dans la pornographie. SELF-HELP Abuse. bisacsh FAMILY & RELATIONSHIPS Abuse Child Abuse. bisacsh Obscenity (Aesthetics) fast Internet Law and legislation fast Child pornography Law and legislation fast Child abuse fast Child pornography fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Casey, Eoghan. McGrath, Michael. has work: Investigating child exploitation and pornography (Text) https://id.oclc.org/worldcat/entity/E39PCGPYHcRDwC9gRHXVRcqrVP https://id.oclc.org/worldcat/ontology/hasWork Print version: Ferraro, Monique Mattei. Investigating child exploitation and pornography. Amsterdam ; London : Elsevier/Academic Press, ©2005 (DLC) 2004557574 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=117170 Volltext |
spellingShingle | Ferraro, Monique Mattei Investigating child exploitation and pornography : the internet, the law and forensic science / Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR. Child abuse. http://id.loc.gov/authorities/subjects/sh85023348 Child pornography. http://id.loc.gov/authorities/subjects/sh85023536 Child pornography Law and legislation United States. Obscenity (Aesthetics) United States. Internet Law and legislation United States. Child Abuse https://id.nlm.nih.gov/mesh/D002649 Enfants dans la pornographie Droit États-Unis. Obscénité États-Unis. Internet Droit États-Unis. Enfants Violence envers. Enfants dans la pornographie. SELF-HELP Abuse. bisacsh FAMILY & RELATIONSHIPS Abuse Child Abuse. bisacsh Obscenity (Aesthetics) fast Internet Law and legislation fast Child pornography Law and legislation fast Child abuse fast Child pornography fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85023348 http://id.loc.gov/authorities/subjects/sh85023536 https://id.nlm.nih.gov/mesh/D002649 |
title | Investigating child exploitation and pornography : the internet, the law and forensic science / |
title_auth | Investigating child exploitation and pornography : the internet, the law and forensic science / |
title_exact_search | Investigating child exploitation and pornography : the internet, the law and forensic science / |
title_full | Investigating child exploitation and pornography : the internet, the law and forensic science / Monique Mattei Ferraro, Eoghan Casey ; Michael McGrath, contributor. |
title_fullStr | Investigating child exploitation and pornography : the internet, the law and forensic science / Monique Mattei Ferraro, Eoghan Casey ; Michael McGrath, contributor. |
title_full_unstemmed | Investigating child exploitation and pornography : the internet, the law and forensic science / Monique Mattei Ferraro, Eoghan Casey ; Michael McGrath, contributor. |
title_short | Investigating child exploitation and pornography : |
title_sort | investigating child exploitation and pornography the internet the law and forensic science |
title_sub | the internet, the law and forensic science / |
topic | Child abuse. http://id.loc.gov/authorities/subjects/sh85023348 Child pornography. http://id.loc.gov/authorities/subjects/sh85023536 Child pornography Law and legislation United States. Obscenity (Aesthetics) United States. Internet Law and legislation United States. Child Abuse https://id.nlm.nih.gov/mesh/D002649 Enfants dans la pornographie Droit États-Unis. Obscénité États-Unis. Internet Droit États-Unis. Enfants Violence envers. Enfants dans la pornographie. SELF-HELP Abuse. bisacsh FAMILY & RELATIONSHIPS Abuse Child Abuse. bisacsh Obscenity (Aesthetics) fast Internet Law and legislation fast Child pornography Law and legislation fast Child abuse fast Child pornography fast |
topic_facet | Child abuse. Child pornography. Child pornography Law and legislation United States. Obscenity (Aesthetics) United States. Internet Law and legislation United States. Child Abuse Enfants dans la pornographie Droit États-Unis. Obscénité États-Unis. Internet Droit États-Unis. Enfants Violence envers. Enfants dans la pornographie. SELF-HELP Abuse. FAMILY & RELATIONSHIPS Abuse Child Abuse. Obscenity (Aesthetics) Internet Law and legislation Child pornography Law and legislation Child abuse Child pornography United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=117170 |
work_keys_str_mv | AT ferraromoniquemattei investigatingchildexploitationandpornographytheinternetthelawandforensicscience AT caseyeoghan investigatingchildexploitationandpornographytheinternetthelawandforensicscience AT mcgrathmichael investigatingchildexploitationandpornographytheinternetthelawandforensicscience |