Laserfiche WebLink
EXHIBIT B <br />Procedures: <br />Work space and Equipment <br />Internet Crimes Against Children (ICAO) computers and software shall be reserved for the <br />exclusive use by department designated ICAO personnel. When possible, undercover computers, <br />software, and online accounts shall be purchased covertly. No personally owned equipment shall <br />be used in ICAC investigations and all software shall be properly acquired and licensed. <br />All ICAC online investigations shall be conducted in government work space as designated by <br />the department. <br />Care Predication and Prioritization <br />Cases may be initiated by referrals from the CyberTipline, Internet Service Providers, or other <br />law enforcement agencies, and by information gathered through subject interviews, documented <br />public sources, direct observations or suspicious behavior, public complaints, or by any other <br />source acceptable under current department policy. <br />ICAO Supervisors are responsible for determining investigative priorities and selecting cases for <br />investigation: Assuming the information is deemed credible, that determination should begin <br />with an assessment of victim risk and then consider other factors such as jurisdiction and known <br />offender behavioral characteristics. The following prioritization scale was established by the <br />ICAO Task Force Review Board and will apply to the assignment of cases within the department: <br />1. A child is at immediate risk of victimization; <br />2. A child is vulnerable to victimization by a known offender; <br />3. Known suspect is aggressively soliciting a child(ren); <br />4. Traders of images that appear to be home photography with domiciled <br />children; <br />5. Aggressive, high volume child pornography traders who either are commercial <br />distributors, repeat offenders, or specialized in sadistic images; <br />6. Traders and solicitors involved in high-volume trafficking or belong to an <br />organized child pornography ring that operates as operates as a criminal <br />conspiracy; <br />7. .Traders in previously known images; <br />8. Traders in digitally altered images. <br />Record Keeping <br />ICAC investigative units shall be subject to the existing agency incident reporting procedure and <br />case supervision systems. Investigators will obtain a case number at the outset of each case.and <br />fully document their. activities through the completion of initial and supplemental reports. <br />2~Page <br />