Você está na página 1de 4

Draftedby:

LieutenantJoshMoulin:CentralPointPoliceDepartment,CommanderSouthernOregonHighTech
CrimesTaskForce
DeputyDistrictAttorneyJ.AdamPeterson:JacksonCountyDistrictAttorneysOffice,Prosecutor
SouthernOregonHighTechCrimesTaskForce

ForensicInterviewerCariDickson:JacksonCountyChildrenAdvocacyCenter
TechnologyFacilitatedCrimesAgainstChildren

AprotocolfortheJacksonCountyChildAbuseMultiDisciplinaryTeam

JacksonCountyMDTTechnologyFacilitatedCrimesAgainstChildrenProtocol 2
JACKSONCOUNTYMULTIDISCIPLINARYTEAM(MDT)

TECHNOLOGYFACILITATEDCRIMESAGAINSTCHILDRENPROTOCOL
Purpose

The purpose of this protocol is to assist law enforcement officers and Department of Human
Services investigators with criminal investigations of child abuse that involve technology
facilitatedcrimesagainstchildren.

Technology facilitated crimes require the investigator to have full knowledge of how these
crimes canbe committed and thetechnical savvy to be aware of appropriate questions to ask
during a forensic interview of a child. This protocol is designed to create standards regarding
when a member of the Southern Oregon HighTech Crimes Task Force (SOHTCTF) may be
contactedtoprovideassistanceandconsultationtotheinterviewer.

The overall goal of this protocol is to use the expertise of hightech crime investigators
combinedwithchildabuseinvestigatorstoobtainthebestevidence,makingprosecutionsmore
effective and providing the best outcome possible for child victims in these often complex
cases.

TechnologyFacilitatedCrimesDefined

Thisprotocolcoversincidentswherethechildvictimhasbeensexuallyexploitedviaelectronic
means and/or the suspected perpetrator used technology to facilitate the crimes committed
against the victim. Technology facilitated crimes against children could include, but are not
limitedtothefollowingexamples:

A child compelled to take nude images of themselves with digital cameras,
cellularphonesorotherelectronicdevicesandtransmitthoseimages(Sexting);
A child used in a display of sexually explicit conduct in accordance with ORS
163.670(manufacturingofchildpornography);
A child who is groomed through the use of technology, for example a child
shownimagesofadultorchildpornographyonanelectronicdevice;
A child who is the victim of physical or sexual abuse and the child met the
suspectonline(travelercases);
VictimsofInternetluringcasesinaccordancewithORS167.057;and
Victims of online sexual corruption cases in accordance with ORS 163.432 and
163.433.


JacksonCountyMDTTechnologyFacilitatedCrimesAgainstChildrenProtocol 3
Protocol

This protocol may become effective when a child abuse investigator from law enforcement or
DHS receives a report of child abuse and determines the case was facilitated by technology.
The following incidents may necessitate the notification of the Southern Oregon HighTech
CrimesTaskForcetoassistwiththecaseinvestigation:

1. If the investigator has reason to believe the child was used in the creation of sexually
explicitimagesorvideos;
2. Incaseswherethevictimdoesnotknowtheidentityofthesuspectexceptforanemail
address,screenname,chatroomidentifierorotherInternetmoniker;
3. Incaseswheretechnologyplayedasignificantroleinthevictimizationofthechildsuch
asInternetluring,grooming,ortheuseofchildpornography;
4. Incasesthatnecessitateshowingavictimanimageorvideoofchildsexualabuseinthe
courseofaninterview.

IntheabovecasesamemberoftheSOHTCTF willrespondandassistintheforensicinterview
of the child in a support role. The SOHTCTF investigator will listen to the interview and assist
withthedevelopmentofquestionsaswellasanyothertechnicalaspectsoftheinvestigationas
neededorrequested.

When making arrangements for the interview, investigators should notify the CAC intake
coordinator that the case is a technologyfacilitated crime and request the SOHTCTF be
notified.TheintakecoordinatorwillnotifytheSOHTCTFCommandertogetataskforceofficer
assignedtoassist.

SOHTCTF investigators can also provide assistance in identifying suspects or additional victims
through the use of technology as well as conducting forensic examinations of digital evidence
andconsultationoninvestigativestrategiesinvolvingtechnologyfacilitatedcrimes.

In cases that technology is used to facilitate a crime against a child, but does not meet the
recommended notification of the SOHTCTF outlined above, investigators can always request
theassistanceoftheSOHTCTFusingtheirdiscretion.ItshouldbenotedthattheSOHTCTFhas
limited resources to investigate technologyfacilitated crimes. Investigative priority will be
giventoparticipatingandcontributinglawenforcementagencies.

ShowingImagesorVideosofChildSexualAbusetoaVictim

Certain cases may necessitate an investigator show a victim an image or video of child sexual
abuse.Thedecisiontoshowavictimanimageorvideoofthemselvesbeingsexuallyabusedor
engaged in sexual conduct should be carefully considered. Investigators must weigh the
potential to further victimize the child by showing the image or video against the possibility
that showing the image to the victim may assist in the investigation and further protect the
child.

JacksonCountyMDTTechnologyFacilitatedCrimesAgainstChildrenProtocol 4

If the decision is made to show a victim an image or video of child sexual abuse care must be
taken to question the victim first in order to establish a proper foundation for showing the
image or video to them. The investigator should obtain as much detail as possible about the
imageorvideoandthecircumstancessurroundingitsuseorcreation.Thisinformationshould
besoughtthroughquestioningthatisnotleading,ageappropriateandinaccordancewiththe
OregonInterviewGuidelines.

Ifthedecisionhasbeenmadetoshowanimageorvideotoachildinaninterview,itmustbe
done in conjunction with law enforcement. Generally, the SOHTCTF will be responsible for
locatingtheimagewhileperformingaforensicexaminationofdigitalevidence.Oncetheimage
or video is selected, the SOHTCTF will attempt to sanitize it as much as possible. A sworn
memberoftheSOHTCTFwillberesponsibleforthecareandcustodyofanychildsexualabuse
image or video by bringing it to the advocacy center and remaining on the premises until the
image or video is no longer needed. The SOHTCTF member does not necessarily have to
presentittothechildbeinginterviewed,butcanmaintainvisualcustodyofthecontrabandvia
theinhousecamerasystem.

The investigator may request the SOHTCTF member to be present in the interview to assist in
the interview, especially to discuss additional images or videos located or specific questions
regardingtechnologyfacilitatedcrimes.

VictimsusedintheCreationofChildSexualAbuseImages

Incaseswhereachildvictimwasusedinthecreationofimagesorvideosofsexualabuse,the
parent(s)/guardian(s) of that child shall be notified of the discovery of such media, unless the
parent/guardianissuspectedastheoffender.Pursuanttothisprotocol,thoseimagesshallbe
sent to the National Center for Missing and Exploited Childrens (NCMEC) Child Victim
IdentificationProgram.Theparent/guardian,ifnotasuspectintheinvestigation,shallalsobe
notified of this program and provided with the informational pamphlet regarding this process
bytheChildrensAdvocacyCenterstaff.

Você também pode gostar