13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TABLE 1: PARTICIPANT EVALUATIONS OF 2008 PROJECT SAFE CHILDHOOD CONFERENCE(N=939)Percent of FavorableResponses from participants“<strong>The</strong> conference program 100%was relevant to my needs.”“I would attend the 97%conference next year.”I would recommend the 97%conference to others in myfield.”Source: Fox Valley Technical CollegeThis program, which has been funded by the Department <strong>for</strong> many years, is critical to thecontinued success of the Department’s ef<strong>for</strong>ts to prevent <strong>and</strong> interdict child exploitation.H. <strong>Child</strong> <strong>Exploitation</strong> Computer ForensicsAs noted in the Threat Assessment, some of the most egregious <strong>and</strong> threatening childexploitation crimes are facilitated by the Internet <strong>and</strong> the use of computers <strong>and</strong> other digitalmedia. <strong>The</strong> <strong>for</strong>ensic analysis of the computers is the most important aspect of the investigation.Computer <strong>for</strong>ensic examinations that provide investigators <strong>and</strong> prosecutors the in<strong>for</strong>mation theyneed – a when they need it – are absolutely critical to the investigation <strong>and</strong> prosecution of theseserious crimes. Investigation of these crimes is not simple, however, due to the challenges thatever-advancing technology presents to law en<strong>for</strong>cement.Ensuring that timely <strong>and</strong> adequate computer <strong>for</strong>ensics analysis is provided in child exploitationinvestigations <strong>and</strong> prosecutions has become increasingly difficult. <strong>The</strong> sheer volume of theincrease of persons using computers <strong>and</strong> the Internet is one reason. <strong>The</strong> number of U.S.households having at least one computer rose from 22.9% in 1993 to 61.8% in 2003. It isestimated that today more than 80% of U.S. households have a computer. In 1997, thepercentage of households with Internet access was 18%. By 2009, that percentage had increasedto 68.7%. Additionally, it is increasingly easy <strong>and</strong> inexpensive <strong>for</strong> individuals to acquire <strong>and</strong>store large amounts of data. Digital media storage capacity has soared while the cost of storingthe data has plummeted. For example, the cost of storing one gigabyte of data in 1995 wasapproximately $1,000. By 2009, terabyte (1,000 gigabyte) hard drives <strong>for</strong> home use wereavailable <strong>and</strong> the cost to store one gigabyte of data approximately 10¢. Further, as described inthe Threat Assessment, the wide variety of ever-changing/evolving technologies being used byoffenders seriously challenge law en<strong>for</strong>cement’s ability to keep pace.1. State <strong>and</strong> Local Agencies<strong>The</strong> majority of computer <strong>for</strong>ensic examinations conducted in child exploitation investigationsare per<strong>for</strong>med by State <strong>and</strong> local law en<strong>for</strong>cement agencies. Of the more than 17,000 State,130

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!