Child Exploitation Expanded Course Outline and Hourly Distribution For Two-Day, 16 Hour Course



Similar documents
SORNA Substantial Implementation Review State of Delaware

Standards for Investigating Child Abuse and Neglect (CA/N) Reports (Levels 1, 2, 3)

HOUSE BILL lr2902 A BILL ENTITLED. Criminal Injuries Compensation Board Human Trafficking Victims

role in that system. Class discussion and debate will be encouraged. Semester Instructional Unit I

Evidence Checklist FOR IMMIGRANT VICTIMS APPLYING FOR THE CRIME VICTIM VISA (U VISA) 1

SORNA Substantial Implementation Review State of Tennessee

How To Report Child Abuse

Sample Language and Definitions of Prohibited Conduct for a School s Sexual Misconduct Policy

DOMESTIC VIOLENCE Guidelines on Police Response Procedures in Domestic Violence Cases

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

Boundaries: Protecting Children, Young People and Yourself from Technology Dangers

How To Report Abuse In Martha Maryland

Filing a Form I-751 Waiver of the Joint Filing Requirement of the Petition to Remove Conditions on Residence

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

Illinois DCFS Flowchart How to Report Suspected Child Abuse or Neglect

Information Security Law: Control of Digital Assets.

Austin Independent School District Police Department Policy and Procedure Manual

The Emergency Protection for Victims of Child Sexual Abuse and Exploitation Act

SCHOOL DISTRICT NO. 53 (Okanagan Similkameen) POLICY

5. The Model Strategies and Practical Measures are aimed at providing de jure and de

COMMUNITY RELATIONS 4411 Page 1 of 5

FACT SHEET: PROJECT SAFE CHILDHOOD

HIPAA PRIVACY NOTICE PLEASE REVIEW IT CAREFULLY

The purpose of this policy is to support a comprehensive and collaborative approach to responding to child abuse and neglect by:

Department of Human Services CHILD WELFARE PROTOCOL

Gerald Caplan s Preventive Psychiatry

COMPARATIVE SYSTEMS SUBCOMMITTEE ISSUE ASSESSMENT- DEFENSE OF SEXUAL ASSAULT CASES

NEW HAMPSHIRE E SCHOOL BOARDS ASSOCIATION Theodore E. Comstock, Executive Director Barrett M. Christina, Staff Attorney

Students. Reporting Child Abuse or Neglect

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

JAN (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any

Checklist for Campus Sexual Misconduct Policies

WHAT HAPPENS NEXT? A guide to the NORTH DAKOTA CHILD PROTECTION SERVICES. This guide is made available by

2010 REVISIONS TO GEORGIA SEX OFFENDER LAW: A SUMMARY OF KEY PROVISIONS OF HB 571 FOR MEMBERS OF THE WHITAKER V. PERDUE CLASS

The rights of crime victims in Maryland. The role and responsibilities of Law Enforcement

APPENDIX A. Part 1 ANNOTATED CODE OF MARYLAND FAMILY LAW TITLE 5 CHILDREN

MINDY FLETCHER SOLOMON (954)

ABUSE, NEGLECT, SELF- NEGLECT & EXPLOITATION OF VULNERABLE ADULTS

Policy on Sexual Assault, Stalking, Dating Violence, and Domestic Violence

UNUSUAL INCIDENTS ABUSE AND NEGLECT

Children s Hearings (Scotland) Act asp 1

Interviewing Child Victims of Maltreatment Including Physical and Sexual Abuse

Oregon Sex Offender Assessment Scale Jackson County, Oregon. Sex Offender Assessment Attachment 1. Negative Scale (Increases Risk)

PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Cash Assistance Program for Immigrants (CAPI) Program Guide Letter No. 8

California Child Abuse and Neglect Reporting Law

New Housing Rights for Victims of Domestic Violence, Rape, Sexual Assault and Stalking

Adult Protective Services

Optional Protocol on the sale of children, child prostitution and child pornography

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations

On the Record: Police record checks - recognizing impacts, stigma and establishing best practices. Police Records Check Coalition

Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act

OFFENCE CLASS I-V, SEX OFFENDER REGISTRATION & DNA PROFILE CODES Assault with intent to murder.

INSTRUCTIONS FOR COMPLETING THE U VISA CERTIFICATION FORM

414 MANDATED REPORTING OF CHILD NEGLECT OR PHYSICAL OR SEXUAL ABUSE

HIPAA NOTICE TO PATIENTS

ADDRESSING POLICE MISCONDUCT

ATTACHMENT A TO FORMAL ATTORNEY GENERAL OPINION HIPAA PRIVACY MATRIX DISCLOSURES TO LAW ENFORCEMENT

DEPARTMENT OF CORRECTIONS

MASTERS DEGREE IN CRIMINAL JUSTICE

Investigating Child Abuse and Neglect Fact Sheet

Convictions Policy. Private Hire & Hackney Carriage Driver Licences

DOMESTIC VIOLENCE INDEX CODE: 1603 EFFECTIVE DATE:

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Youth Protection Training

Human Services 105 South 5 th Street, Suite 203h Olivia, MN

EXECUTIVE SUMMARY. Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule: A Guide for Law Enforcement

AGENCY ROLES FOR INVESTIGATING SUSPICIOUS CHILD DEATHS AND SERIOUS INJURIES

New Horizons Regional Education Centers (C&T) Pacing Guide

Anxiety Treatment Center, LLC

Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL Phone Fax

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

PRIVACY BREACH POLICY

AN ACT RELATIVE TO BULLYING IN SCHOOLS.

REPORTING REQUIREMENTS

Suggested List of Issues to Country Report Task Force on the United States. December 17, Center for Constitutional Rights

Alabama s Mandatory Child Abuse and Neglect Reporting Law

OBJECTIVES CRIMINAL PROCESS- PROSECUTING ATTORNEY S OFFICE NAVIGATING THE CRIMINAL AND CIVIL PROCESS IN CHILD ABUSE AND NEGLECT CASES

PART 50 BEHAVIOUR ORDERS

MODEL POLICY REPORTING CHILD ABUSE AND NEGLECT FOR SCHOOL OFFICIALS IN DUPAGE COUNTY

Federal Bureau of Investigation s Integrity and Compliance Program

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.

Transcription:

1 Child Exploitation Expanded Course Outline and Hourly Distribution For Two-Day, 16 Hour Course Learners: Approximately 35 In-Service Police Officers from various California Law Enforcement agencies Length of Instruction Two 8-Hour Days: 16 Hours Total Objective: The student will learn how to identify a case involving a child predator vs a child molester. The dynamics and characteristics of the Victims and Predators and be able to successfully investigate the case. Day One: 0800-1200: Introductions A. Video - Chicken Hawk (NAMBLA) B. Introduction & Course Objectives i. History/Background including video ii. History of International and Local cases C. Definitions i. Child Molester ii. Child Predator iii. Myso-Pedophile D. What is a Child Predator Investigation? i. Multiple Victims crimes occurring within or connected to Institutional Environments ii. Premeditation or use of seduction techniques iii. Multiple Suspects iv. Pornography involved v. Motivation vi. Prostitution Pornography A. Types of pornography video and picture examples i. Adult ii. Commercial

2 iii. Bestiality iv. Snuff v. Child Pornography vi. Morphed Pornography vii. Child Erotica B. Case law i. US vs Miller ii. US vs Kurrey iii. US vs Ferber iv. Stogner vs California C. Associated Criminal Violation i. California state Law II. US Federal Law Scenario (Is this a crime?) Practical with class. Followed by group discussion Day One: 1300-1700: Characteristics A. Characteristics of Victim i. Physically and mentally less developed ii. Curious about sex iii. Defy parents iv. Friendship with Suspect v. Less credible than suspect B. Dynamics of Victimization i. Crime committed in private place ii. Often no physical or medical evidence iii. Abuse is not an isolated incident iv. Child receives benefit/pleasure v. Usually no witnesses C. Problems with Investigation i. Children are perfect victims ii. Dynamics of victimization iii. Disclosure Process iv. Interviewing of Children v. Backlash D. Characteristics of a Child Predator i. Adult male ii. Works in wide range of occupations iii. Relates better to children iv. Sexual/age preference v. May seek employment or volunteer around children

3 vi. vii. Frequently collect photographs of children Collect child erotica and child pornography E Developmental Stages of a Child Predator i. Awareness ii. Fantasy iii. Stalking iv. Molest Computer Exploitation of Children A. The Internet i. What is the Internet? ii. Who polices the Internet? iii. The tool of Child Predators B. Video- Cybercops Internet Investigations of Child Predators on Line C. Techniques used by Predators on Line iv. language used v. check profiles vi. asks for personal information vii. request pictures viii. telephone contact ix. meeting/molest Investigative Guidelines A. How to locate additional victims and the evidence i. Establish the crime ii. Establish the Suspects shows the characteristics iii. Search Warrants iv. Seizure of evidence v. Location of additional evidence B. Pretext Phone Calls including Interception Laws i. Definition ii. Thinking outside of the box iii. Interception laws 631 & 633 PC iv. Practical Considerations v. Victim Preparation C. Audio example of pretext. i. Discussion of case ii. Problems with recording iii. Presentation at court

4 D. Law enforcement - who can help i. Local Contacts ii. Federal Contacts iii. Local and Federal Training Human Trafficking A. Video i. Federal Public Service Announcements ii. International cases iii. San Jose cases B. What is Human trafficking i. Definition ii. Role of Law enforcement iii. Victims of Human Trafficking iv. Child Victims v. Identifying the Crime of Human Trafficking Closing video. The 11 th Commandment by Colin Raye Day 2 Hour: 0800-1100 1. FOURTH AMENDMENT AND COMPUTERS A. Review of Computer as closed container 2. Federal Law ALL LAW ENFORCEMENT LIABILITY IS PERSONAL A. Electronic Communication Privacy Act 1. Liability Issues regarding contact with Internest Service Providers 2. Administrative Subpoeanas 3. Court Orders 4. Search Warrants 5. Remedies B. Privacy Protection Act 1. Liability Issues 2. Work Product Doctrine 3. Protected Material 4. Commingled Evidence 5. Remedies

5 C. Patriot Act 1. Liability Issues 2. Search Warrant authorization 3. Electronic Evidence 4. Internet Service Provider required disclosures 5. Internet Service Provider voluntary disclosures 6. Remedies D. Cable Communication Privacy Act 1. Liability Issues 2. Search warrant issues 11:00-12:00 Lunch 13:00-13:30 3. Search Warrants A. Review of Probable Cause B. Staleness Issues in Child Pornography Search Warrants C. Training and Experience D. Most Common Mistakes E. Drafting Issues/Drafting Hints and Assistance F. Hypotheticals using case law 13:30-14:00 4. Consent A. Consent Basics B. Consent Computer Specific C. Private Search Issues 14:00-15:30 5. Child Pornography A. Identification B. Definition C. Legal issues regarding identification of real/virtual images D. Legal issues regarding proof of age E. Legal issues proving child Erotica F. Proving clothed children as child pornography G. Review of California Child Pornography case law 15:30-17:00 6. California Statute and Case Review of Child Sexual Exploitation Law and Defenses A. Child Pornography B. Harmful Matter over the Internet C. Solicitation D. Defenses

Facilities, Materials, Personnel Needed: Class time is from 0800-1700 hours Flip Chart Flip Chart Stand Laptop Computer (Powerpoint Presentation) Speakers Computer Image Projector Handout Packets All Audio/Visual Media is in WAV/MPEG format to be played through Computer Image Projector via attached Stereo Speakers: 6