{"title":"在佛罗里达州调查“针对儿童的网络犯罪”(ICAC)案件","authors":"Bob Breeden, J. Mulholland","doi":"10.1145/1141277.1141345","DOIUrl":null,"url":null,"abstract":"The purpose of this article is to highlight efforts by the Computer Crime Center at the Florida Department of Law Enforcement (FDLE) to prosecute ICAC cases under their jurisdiction. Section 1 presents an overview of the FDLE ICAC Initiative, a project funded by the Florida Department of Children and Families (DCF) with respect to: (i) project goals and objectives, (ii) agent/analyst training and deployment, (iii) collaboration with other law enforcement agencies, (iv) arrest rates, and (v) community education programs. Section 2 focuses on the Internet and how it is contributing to the rising incidence of sexual exploitation of children by online predators. In particular, this section underscores the computer's appeal for both the offender and the victim. Section 3 describes noteworthy cases that have been investigated by the FDLE Computer Crime Center. The first three sections provide the context for the last two sections which focus exclusively on the type of forensics required to successfully prosecute ICAC cases. In section 4, the main investigative steps are delineated. To illustrate how ICAC cases are handled, the article depicts the two main components of an investigation: First, subpoenas are issued, search warrants are served and executed, and then, once the evidence is acquired, law enforcement officials conduct a forensic exam on the computers and other digital evidence that may have been seized during an investigation. Finally, section 5 concludes with a set of recommendations on 'best practices' for prosecuting ICAC cases.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"494 1-2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida\",\"authors\":\"Bob Breeden, J. Mulholland\",\"doi\":\"10.1145/1141277.1141345\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this article is to highlight efforts by the Computer Crime Center at the Florida Department of Law Enforcement (FDLE) to prosecute ICAC cases under their jurisdiction. Section 1 presents an overview of the FDLE ICAC Initiative, a project funded by the Florida Department of Children and Families (DCF) with respect to: (i) project goals and objectives, (ii) agent/analyst training and deployment, (iii) collaboration with other law enforcement agencies, (iv) arrest rates, and (v) community education programs. Section 2 focuses on the Internet and how it is contributing to the rising incidence of sexual exploitation of children by online predators. In particular, this section underscores the computer's appeal for both the offender and the victim. Section 3 describes noteworthy cases that have been investigated by the FDLE Computer Crime Center. The first three sections provide the context for the last two sections which focus exclusively on the type of forensics required to successfully prosecute ICAC cases. In section 4, the main investigative steps are delineated. To illustrate how ICAC cases are handled, the article depicts the two main components of an investigation: First, subpoenas are issued, search warrants are served and executed, and then, once the evidence is acquired, law enforcement officials conduct a forensic exam on the computers and other digital evidence that may have been seized during an investigation. Finally, section 5 concludes with a set of recommendations on 'best practices' for prosecuting ICAC cases.\",\"PeriodicalId\":269830,\"journal\":{\"name\":\"Proceedings of the 2006 ACM symposium on Applied computing\",\"volume\":\"494 1-2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2006 ACM symposium on Applied computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1141277.1141345\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2006 ACM symposium on Applied computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1141277.1141345","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida
The purpose of this article is to highlight efforts by the Computer Crime Center at the Florida Department of Law Enforcement (FDLE) to prosecute ICAC cases under their jurisdiction. Section 1 presents an overview of the FDLE ICAC Initiative, a project funded by the Florida Department of Children and Families (DCF) with respect to: (i) project goals and objectives, (ii) agent/analyst training and deployment, (iii) collaboration with other law enforcement agencies, (iv) arrest rates, and (v) community education programs. Section 2 focuses on the Internet and how it is contributing to the rising incidence of sexual exploitation of children by online predators. In particular, this section underscores the computer's appeal for both the offender and the victim. Section 3 describes noteworthy cases that have been investigated by the FDLE Computer Crime Center. The first three sections provide the context for the last two sections which focus exclusively on the type of forensics required to successfully prosecute ICAC cases. In section 4, the main investigative steps are delineated. To illustrate how ICAC cases are handled, the article depicts the two main components of an investigation: First, subpoenas are issued, search warrants are served and executed, and then, once the evidence is acquired, law enforcement officials conduct a forensic exam on the computers and other digital evidence that may have been seized during an investigation. Finally, section 5 concludes with a set of recommendations on 'best practices' for prosecuting ICAC cases.