SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Urbas G. J. Contemp. Crim. Justice 2010; 26(4): 410-425.

Copyright

(Copyright © 2010, SAGE Publishing)

DOI

10.1177/1043986210377103

PMID

unavailable

Abstract

As the range of cybercrimes expands, law enforcement agencies develop new strategies for their investigation. One method being adopted by police in some countries is to exploit the same anonymity that criminals use to operate online and engage with actual or potential suspects using assumed identities. For example, police investigating online child grooming may assume the identity of a child or young person and engage in chats or email or SMS communication with a suspect. In some situations they may take over the identity of a real child who has been contacted by a suspected child groomer, for example, if contacted by a concerned parent, but in others they may invent an entirely fictitious identity. Where this investigative technique results in arrest and prosecution, arguments about entrapment, or illegal/improper obtaining of evidence may arise. It is therefore important to clarify the legal basis on which such covert investigations may be conducted and to ensure that the substantive and procedural law that apply enable proper and effective law enforcement while at the same time guarding against improper manipulation of persons using electronic communications technologies. This article explores situations in which cybercrimes such as online child grooming can be covertly investigated and seeks to identify best practice for effective online law enforcement.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print