Join us to learn about the new ICAC/iKeepSafe Incident Response Tool (IRT) for schools. You can help prevent and address technology related incidents by building a cooperative relationship with schools. This free resource helps schools with the steps of incident management, such as fact-finding, documentation, reporting and engaging the appropriate school officials and other stakeholders. Through collaboration with law enforcement and the use of this tool, schools can plan and prepare an effective and appropriate response to all types of technology related incidents, including cyberbullying, sexting, hacking, and threats of violence.
Many offenders who sexually abuse children also possess child pornography. In 2012, over 80% of men arrested for child sexual abuse were in possession of child pornography, with 60% having pornographic images or video of children under the age of five. In 2015, 25 million child sexual abuse files were reviewed by NCMEC, up from 450,000 in 2004. Offenders may use child pornography to groom or control their victims and may manufacture it to memorialize the event for later gratification. During this training, you will learn about the additional trauma victims experience when child pornography is involved. Explore investigative strategies that address the relationship between child sexual abuse and child pornography to supplement an investigation and corroborate victim statements. Gather the right tools and resources to investigate sexual abuse cases and produce the most comprehensive case outcomes.
Improve capabilities to conduct digital evidence preservation, collection, and analysis. Understand the role this type of digital evidence plays in child abduction, exploitation, and child sex trafficking cases.
Learn about the risks technology poses to youth surrounding sexual exploitation and abuse cases. Examine different types of offenders and the technology used to victimize children. Uncover social networking sites and applications used by children and offenders. Identify cyberbullying and prevention methods including sexting and its legal ramifications. Gather information on child trafficking including: grooming process, examination of online advertisements and where to find them, initial recruiting techniques, and, how different cultural heritage and gang influence impacts victimization.
Learn about how technology is used to target and exploit children. Identify the dangers and impact child pornography has on its victims and examine offender characteristics and their use of technology. Review the various types of technology used for sexual exploitation and the challenges that technology creates. Learn about the effects of sexual abuse on victims.