A Plan for Internet Pedophile Investigation

Pedophile Investigation

Today, children are becoming increasingly adept users of the Internet, where they are attracted to online games and social networks. With Wi-Fi and mobile Internet, access to the network is always there – day and night. Basically, they benefit from the connection: they do their homework, communicate with their peers, share content with them, and edit videos. The perpetrators get to know children through social networks, lifestream channels, and online games and obtain personal information, photos, or videos from them. Then individuals begin to threaten to distribute this content, demanding to send money or photos and videos with sexual images. In the latter case, minors themselves begin to produce child pornography; in the EU, this phenomenon was given the term “sexting.” A plan must be developed to investigate and capture criminals who engage in online pedophilia to protect children.

Causes of Internet Crimes

One of the consequences of mass computerization was crimes in the field of computer information. The integration of modern information technologies into almost all areas of human activity has led to the fact that “traditional” crimes are committed with the help of computer tools and systems (Sandt, 2021). Computer technology, in particular, is used to promote and create sexual content with children unaware of it. This should be regarded as Internet pedophilia, which should be punished by law. However, the methods used by the investigation will differ from the traditional ones.

Types of Evidence

Computer information in relation to the process of proof can be defined as factual data processed by a computer system and transmitted via telecommunication channels, as well as available for perception, on the basis of which, in the manner prescribed by law, circumstances are established that are important for the correct resolution of a criminal or civil case (Sandt, 2021). Sources of computer information are machine printouts, drives on magnetic, optical, and other media, a database (fund) of computer RAM, or a permanent storage device. In other words, in addition to the reviews of real people, such evidence will be considered evidence.

Useful Tools for Investigation

To increase the effectiveness of the investigation, it is necessary to identify and presume the ways in which the suspect committed the crime. Presumably, the attacker uses methods of unauthorized access, namely, connecting to a legitimate user’s line via the Internet, through weaknesses in the system protection, in case of a system breakdown, or under the guise of a legitimate user (Sandt, 2021). At the same time, there is also the possibility of contact with children through correspondence, video, and audio calls, which will be displayed in the history of the computer. In addition, despite the fact that scammers tend to clear their browser history and have a dynamic IP, which greatly complicates their search, there are databases. In other words, regardless of the actions of the individual, the vast majority of providers and Internet services store user history on servers to which fraudsters do not have access (Nelson et al., 2018). Therefore, this can be interpreted as the first source of certain evidence to which the investigation can turn.

Personality of Pedophile

The personality of the offender is distinguished by a number of features:

  • Clearly formulates any professional task but is often characterized by chaotic behavior in everyday life;
  • Has developed formal-logical thinking, which often fails in real life (Nelson et al., 2018);
  • Strives for accuracy, clarity, and unambiguity in the language, constantly asks clarifying questions and asks again, which irritates the interlocutor (Nelson et al., 2018);
  • Constantly uses computer jargon that is hard to understand for the uninitiated.

Computer criminals, who are part of the group of potential Internet pedophiles, are already fully formed individuals with high professional and sustainable criminal skills, as well as certain life experiences. The acts committed by them are of a conscious mercenary nature, while measures are being taken to counteract the disclosure of the crime. Crimes that are serial, multi-episode in nature are necessarily accompanied by concealment actions (Nelson et al., 2018). These are usually highly qualified specialists with higher mathematical, engineering, or economic education who are members of organized criminal groups and communities that are technically well-equipped (Sandt, 2021). Professionals in the field of new information technologies represent a particular danger in terms of committing crimes in the field of computer information. The totality of the knowledge gained allows to form of certain features of the criminal, which significantly narrows the circle of suspects.

Features of the Tactics of Investigative Actions Aimed at Collecting Computer Information

Before the start of the search, measures are taken to prevent damage or destruction of information:

  • Monitoring of uninterrupted power supply of computers at the time of inspection;
  • All unauthorized persons are removed from the territory where the search is being carried out, and access to it is terminated (Sandt, 2021);
  • Those who remain on the territory are deprived of access to computer equipment and power supplies;
  • Explosives, flammable, caustic substances, extraneous sources of radiation, and other objects and equipment that can lead to a computer failure are evacuated at the facility.

It is advisable to conduct a search with the participation of a specialist in the field of forensic computer and technical expertise and a forensic specialist since handprints are often found on computer tools, as well as handwritten and printed documents. It is advisable to invite qualified computer users as witnesses (Sandt, 2021). The most important conditions for success, in this case, are: collecting information about the object of the inspection or search; drawing up a plan for an inspection or search with a detailed regulation of the tasks of each participant; determination of the composition of the investigative-operational group; providing the operational group with the necessary technical means.

The essential step is to interrogate the system administrator and find out which operating systems are installed on each of the computers, what software is used, and request all the necessary data for examination. For a successful search, the factor of surprise is of particular importance. Otherwise, the suspect can quickly destroy the materials incriminating him located in the computer or on magnetic media (Sandt, 2021). If it is known that the computers are organized in a local area network, if possible, the investigator should locate all the computing devices connected to this network. In this case, a group search is carried out simultaneously in all rooms where computer facilities are installed.

The working stage of the search includes an overview and a detailed stage. At the review stage, the investigator corrects and replenishes the data on the object and fixes areas that require special attention (Sandt, 2021). In these places, there may have been computers or portable computers connected, which at the time of the investigative action, may be located elsewhere or hidden. At this stage, the distribution of objects between the search participants is specified.

Bank Details and Obtaining a Warrant

Separately, it is worth making a plan to contact the bank since it is known that the fraudster has access to credit data. Firstly, it is the responsibility of bank employees to control and collect information on the actions performed with the card, including the time and address. Secondly, there are video cameras in ATMs that allow getting the appearance of a criminal (Sandt, 2021). Thirdly, the bank always cooperates with the investigation when presenting a warrant. The investigator can obtain this right by drawing up an act on a criminal offense, documents on permission to conduct a case, and the presence of suspects and victims in the case under consideration (Muraski, 2007). When such a search warrant is issued by the department, professionals are entitled to have access to any information related to the case.

References

Muraski, M.K.A. J. (2007). Investigating high-tech crime, vitalsource for Kaplan University. Pearson Learning Solutions.

Nelson, B., Phillips, A., and Steuart, C. (2018). Guide to computer forensics and investigations. Cengage Learning.

Sandt, E. H. A. (2021). The deviant security practices of cyber crime. Brill.

Cite this paper

Select style

Reference

StudyCorgi. (2022, December 17). A Plan for Internet Pedophile Investigation. https://studycorgi.com/a-plan-for-internet-pedophile-investigation/

Work Cited

"A Plan for Internet Pedophile Investigation." StudyCorgi, 17 Dec. 2022, studycorgi.com/a-plan-for-internet-pedophile-investigation/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'A Plan for Internet Pedophile Investigation'. 17 December.

1. StudyCorgi. "A Plan for Internet Pedophile Investigation." December 17, 2022. https://studycorgi.com/a-plan-for-internet-pedophile-investigation/.


Bibliography


StudyCorgi. "A Plan for Internet Pedophile Investigation." December 17, 2022. https://studycorgi.com/a-plan-for-internet-pedophile-investigation/.

References

StudyCorgi. 2022. "A Plan for Internet Pedophile Investigation." December 17, 2022. https://studycorgi.com/a-plan-for-internet-pedophile-investigation/.

This paper, “A Plan for Internet Pedophile Investigation”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.