1 Child Exploitation Expanded Course Outline and Hourly Distribution For Two-Day, 16 Hour Course Learners: Approximately 35 In-Service Police Officers from various California Law Enforcement agencies Length of Instruction Two 8-Hour Days: 16 Hours Total Objective: The student will learn how to identify a case involving a child predator vs a child molester. The dynamics and characteristics of the Victims and Predators and be able to successfully investigate the case. Day One: 0800-1200: Introductions A. Video - Chicken Hawk (NAMBLA) B. Introduction & Course Objectives i. History/Background including video ii. History of International and Local cases C. Definitions i. Child Molester ii. Child Predator iii. Myso-Pedophile D. What is a Child Predator Investigation? i. Multiple Victims crimes occurring within or connected to Institutional Environments ii. Premeditation or use of seduction techniques iii. Multiple Suspects iv. Pornography involved v. Motivation vi. Prostitution Pornography A. Types of pornography video and picture examples i. Adult ii. Commercial
2 iii. Bestiality iv. Snuff v. Child Pornography vi. Morphed Pornography vii. Child Erotica B. Case law i. US vs Miller ii. US vs Kurrey iii. US vs Ferber iv. Stogner vs California C. Associated Criminal Violation i. California state Law II. US Federal Law Scenario (Is this a crime?) Practical with class. Followed by group discussion Day One: 1300-1700: Characteristics A. Characteristics of Victim i. Physically and mentally less developed ii. Curious about sex iii. Defy parents iv. Friendship with Suspect v. Less credible than suspect B. Dynamics of Victimization i. Crime committed in private place ii. Often no physical or medical evidence iii. Abuse is not an isolated incident iv. Child receives benefit/pleasure v. Usually no witnesses C. Problems with Investigation i. Children are perfect victims ii. Dynamics of victimization iii. Disclosure Process iv. Interviewing of Children v. Backlash D. Characteristics of a Child Predator i. Adult male ii. Works in wide range of occupations iii. Relates better to children iv. Sexual/age preference v. May seek employment or volunteer around children
3 vi. vii. Frequently collect photographs of children Collect child erotica and child pornography E Developmental Stages of a Child Predator i. Awareness ii. Fantasy iii. Stalking iv. Molest Computer Exploitation of Children A. The Internet i. What is the Internet? ii. Who polices the Internet? iii. The tool of Child Predators B. Video- Cybercops Internet Investigations of Child Predators on Line C. Techniques used by Predators on Line iv. language used v. check profiles vi. asks for personal information vii. request pictures viii. telephone contact ix. meeting/molest Investigative Guidelines A. How to locate additional victims and the evidence i. Establish the crime ii. Establish the Suspects shows the characteristics iii. Search Warrants iv. Seizure of evidence v. Location of additional evidence B. Pretext Phone Calls including Interception Laws i. Definition ii. Thinking outside of the box iii. Interception laws 631 & 633 PC iv. Practical Considerations v. Victim Preparation C. Audio example of pretext. i. Discussion of case ii. Problems with recording iii. Presentation at court
4 D. Law enforcement - who can help i. Local Contacts ii. Federal Contacts iii. Local and Federal Training Human Trafficking A. Video i. Federal Public Service Announcements ii. International cases iii. San Jose cases B. What is Human trafficking i. Definition ii. Role of Law enforcement iii. Victims of Human Trafficking iv. Child Victims v. Identifying the Crime of Human Trafficking Closing video. The 11 th Commandment by Colin Raye Day 2 Hour: 0800-1100 1. FOURTH AMENDMENT AND COMPUTERS A. Review of Computer as closed container 2. Federal Law ALL LAW ENFORCEMENT LIABILITY IS PERSONAL A. Electronic Communication Privacy Act 1. Liability Issues regarding contact with Internest Service Providers 2. Administrative Subpoeanas 3. Court Orders 4. Search Warrants 5. Remedies B. Privacy Protection Act 1. Liability Issues 2. Work Product Doctrine 3. Protected Material 4. Commingled Evidence 5. Remedies
5 C. Patriot Act 1. Liability Issues 2. Search Warrant authorization 3. Electronic Evidence 4. Internet Service Provider required disclosures 5. Internet Service Provider voluntary disclosures 6. Remedies D. Cable Communication Privacy Act 1. Liability Issues 2. Search warrant issues 11:00-12:00 Lunch 13:00-13:30 3. Search Warrants A. Review of Probable Cause B. Staleness Issues in Child Pornography Search Warrants C. Training and Experience D. Most Common Mistakes E. Drafting Issues/Drafting Hints and Assistance F. Hypotheticals using case law 13:30-14:00 4. Consent A. Consent Basics B. Consent Computer Specific C. Private Search Issues 14:00-15:30 5. Child Pornography A. Identification B. Definition C. Legal issues regarding identification of real/virtual images D. Legal issues regarding proof of age E. Legal issues proving child Erotica F. Proving clothed children as child pornography G. Review of California Child Pornography case law 15:30-17:00 6. California Statute and Case Review of Child Sexual Exploitation Law and Defenses A. Child Pornography B. Harmful Matter over the Internet C. Solicitation D. Defenses
Facilities, Materials, Personnel Needed: Class time is from 0800-1700 hours Flip Chart Flip Chart Stand Laptop Computer (Powerpoint Presentation) Speakers Computer Image Projector Handout Packets All Audio/Visual Media is in WAV/MPEG format to be played through Computer Image Projector via attached Stereo Speakers: 6