[Federal Register Volume 64, Number 88 (Friday, May 7, 1999)]
[Notices]
[Pages 24856-24860]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 99-11433]



[[Page 24855]]

_______________________________________________________________________

Part III





Department of Justice





_______________________________________________________________________



Office of Juvenile Justice and Delinquency Prevention



_______________________________________________________________________



Internet Crimes Against Children Task Force Program; Notice

  Federal Register / Vol. 64, No. 88 / Friday, May 7, 1999 / Notices  

[[Page 24856]]



DEPARTMENT OF JUSTICE

Office of Juvenile Justice and Delinquency Prevention
[OJP (OJJDP)-1222]
RIN 1121-ZB55


Internet Crimes Against Children Task Force Program

AGENCY: Office of Juvenile Justice and Delinquency Prevention, Office 
of Justice Programs, Justice.

ACTION: Announcement of Discretionary Competitive Assistance Grant.

-----------------------------------------------------------------------

SUMMARY: Notice is hereby given that the Office of Juvenile Justice and 
Delinquency Prevention (OJJDP), pursuant to Public Law 105-277, October 
19, 1998, Making Appropriations for the Departments of Commerce, 
Justice, and State, the Judiciary, and Related Agencies for the Fiscal 
Year Ending September 30, 1999, is requesting applications from State 
and local law enforcement agencies interested in participating in the 
Internet Crimes Against Children Task Force (ICAC Task Force) Program. 
The ICAC Task Force Program encourages communities to develop regional 
multidisciplinary, multijurisdictional task forces to prevent, 
interdict, and investigate sexual exploitation offenses against 
children by offenders using online technology.

DATES: Applications must be received by June 21, 1999.

ADDRESSES: Interested applicants must obtain an application kit from 
the Juvenile Justice Clearinghouse at 800-638-8736. The application kit 
is also available at OJJDP's Web site at www.ojjdp.ncjrs.org.

FOR FURTHER INFORMATION CONTACT: Michael Medaris, ICAC Task Force 
Program Manager, Office of Juvenile Justice and Delinquency Prevention, 
202-616-8937. [This is not a toll-free number.]

SUPPLEMENTAL INFORMATION:

Purpose

    The purpose of this program is to assist State and local law 
enforcement agencies to enhance their investigative response to sexual 
exploitation of children by offenders using the Internet, online 
communication systems, or other computer technology. For purposes of 
this program announcement, ``Internet crimes against children (ICAC)'' 
refers to sexual exploitation of children that is facilitated by 
computers and includes crimes of child pornography and online 
solicitation for sexual purposes.

Background

    In his 1984 novel, Neuromancer, William Gibson created a world he 
named ``Cyberspace.'' Gibson theorized that online human interaction 
with computers would create a virtual universe where electronic actions 
could entail physical repercussions. Fifteen years later, cyberspace is 
a reality. Started by the Internet, accelerated by the World Wide Web, 
and fueled by the data demands of the Information Age, today's 
cyberspace covers the entire world through instantaneous information 
exchange.
    Industry experts estimate that more than 10 million children 
currently go online and, by the year 2002, 45 million children will use 
cyberspace to talk with friends, explore the universe, or complete 
homework assignments. In cyberspace, children are a mouse click away 
from exploring our greatest museums, libraries, and universities. 
Unfortunately, they are also a mouse click away from sexual 
exploitation and victimization.
    While providing almost limitless opportunities to learn, the 
Internet has also become the new schoolyard for predators seeking 
children to victimize. Yesterday's enticements of puppy dogs and candy 
bars are augmented in today's chat rooms with anonymity and 
pornography. Cloaked in the anonymity of cyberspace, sex offenders can 
capitalize on the natural curiosity of children, seeking victims with 
little risk of detection. Preferential sex offenders 1 no 
longer need to lurk in parks and malls. Instead, they can roam from 
chat room to chat room trolling for children susceptible to 
victimization. This alarming trend has grave implications for parents, 
teachers, and law enforcement officers because it circumvents 
conventional safeguards in place for the physical world and provides 
sex offenders virtually unlimited opportunities for unsupervised 
contact with children.
---------------------------------------------------------------------------

    \1\ For the purposes of this program, ``preferential sex 
offenders'' are defined as individuals whose primary sexual focus is 
children.
---------------------------------------------------------------------------

    In 1982, New York v. Ferber (458 U.S. 747), the Supreme Court 
stated: ``The distribution of photographs and films depicting sexual 
activity by juveniles is intrinsically related to the sexual abuse of 
children * * * the materials produced are a permanent record of the 
children's participation and the harm to the child is exacerbated by 
their circulation.'' There are much more insidious implications to 
child pornography than the mere depiction of a child's molestation. It 
not only depicts the sexual assault of a child, but is also used by 
child molesters to recruit, seduce, and control future victims. While 
not all molesters collect pornography and not all child pornography 
collectors molest children, there is a significant consensus among law 
enforcement officers about the role pornography plays in recruiting and 
controlling additional victims. Child pornography is used to break down 
inhibitions, validate sex between children and adults as normal, and 
control the victim throughout the molestation. When the offender loses 
interest, it is often used as blackmail to ensure the child's silence 
and in these most egregious cases, child pornography allows the 
molester to go unpunished--and what is most important and indeed 
tragic--the victim untreated. It is clear to OJJDP that this inexorable 
confluence of the increasing online presence of children, the 
proliferation of child pornography, and predators ceaselessly searching 
for unsupervised contact with underage victims presents a significant 
threat to the health and safety of children and a formidable challenge 
for law enforcement today and into the foreseeable future.
    Many factors complicate law enforcement's response to these 
challenges. Because the Internet transcends State and local boundaries, 
very few investigations begin and end within the same jurisdiction. 
Most investigations involve multiple jurisdictions, which then require 
close coordination and cooperation between Federal, State, and local 
law enforcement agencies.
    Evidence collection in cases of Internet crimes against children 
invariably requires specialized knowledge. Many preferential sex 
offenders tend to be avid recordkeepers, and their computers, magnetic 
media, and related equipment can be rich sources of evidence. However, 
routine forensic examination procedures are insufficient for seizing, 
preserving, and analyzing this information. In addition, specific legal 
issues regarding property and privacy rights may be triggered with the 
seizure of computers and related technology.
    When appropriate, medical and psychological evaluation of child 
victims should also be a part of the law enforcement response. While 
ensuring that injuries or diseases related to the exploitation are 
treated, forensic medical examinations can also provide crucial 
corroborative evidence.
    Routine interviewing practices are inadequate for collecting 
evidence from child victims of Internet crimes. Some children deny they 
are victims because of embarrassment or fear of ridicule

[[Page 24857]]

from their peers or discipline from their parents. Others bond with the 
offender, remain susceptible to further manipulation, and resent what 
they perceive as interference from law enforcement. Investigators who 
lack understanding of the dynamics of juvenile sexual exploitation risk 
losing information critical for conviction of the perpetrator or 
identification of additional victims.
    The factors cited above almost routinely complicate the 
investigative process, and while no two cases will raise identical 
issues of jurisdiction, evidence collection, and victim services, it is 
logical to presume that investigations characterized by a 
multijurisdictional, multidisciplinary approach are more likely to 
result in successful prosecutions.
    A variety of Federal activities are assisting and can further 
assist law enforcement in responding to these offenses. The Innocent 
Images program, located in the Federal Bureau of Investigation's 
(FBI's) Baltimore Field Division, works specifically on computer-
facilitated child sexual exploitation cases and has developed 
substantial technical and investigative expertise. Each FBI Field 
Division has two designated Crimes Against Children coordinators who 
work with State and local law enforcement agencies to investigate and 
prosecute child abduction and exploitation cases that transcend 
jurisdictional boundaries.
    The U.S. Customs Service (USCS) and the U.S. Postal Inspection 
Service (USPIS) have successfully investigated hundreds of child 
pornography cases and have developed specialized expertise in 
undercover operations targeting preferential sex offenders and child 
pornography.
    With OJJDP and private sector funding, the National Center for 
Missing and Exploited Children (NCMEC) serves as the national resource 
center and clearinghouse for missing and exploited children issues. 
NCMEC's Exploited Child Unit coordinates a comprehensive training and 
technical assistance program that includes prevention and awareness 
activities, and the CyberTipline (www.missingkids.com). The Tipline 
collects online reports from citizens regarding computer-facilitated 
sexual exploitation of children and rapidly forwards the information to 
law enforcement agencies with investigative jurisdiction. Brought 
online in March 1998, the CyberTipline has provided information that 
has enabled law enforcement officers to arrest individuals seeking sex 
with underage victims and safely recover and return children enticed 
from home by sex offenders.
    NCMEC's law enforcement training and technical assistance program 
was developed in partnership with the FBI, OJJDP, USCS, USPIS, and the 
Child Exploitation and Obscenity Section (CEOS) of the Criminal 
Division, U.S. Department of Justice. NCMEC has also developed a broad-
based education and awareness campaign that features the Kids and 
Company curriculum, Know the Rules teen awareness program, and two 
pamphlets, Child Safety on the Information Highway and Teen Safety on 
the Information Highway, that provide information about safe Internet 
practices for children and youth. These programs and materials are 
offered free of charge, and OJJDP encourages communities working on 
child victimization issues to use them. Additional information 
regarding NCMEC's broad array of services for children, parents, 
educators, and law enforcement officers can be obtained by calling 800-
843-5678 or by accessing NCMEC's Web site at www.missingkids.com.
    In fiscal year (FY) 1998, OJJDP awarded funds to 10 State or local 
law enforcement agencies to develop regional multijurisdictional and 
multiagency task forces to prevent, interdict, and investigate ICAC 
offenses. Under the Internet Crimes Against Children Task Force (ICAC 
Task Force) Program, the following jurisdictions received FY 1998 
funding: Bedford County, Virginia, Sheriff's Department; Broward 
County, Florida, Sheriff's Department; Colorado Springs, Colorado, 
Police Department; Dallas, Texas, Police Department; Illinois State 
Police; New York State Division of Criminal Justices Services; 
Portsmouth, New Hampshire, Police Department; Sacramento County, 
California, Sheriff's Office; South Carolina Office of the Attorney 
General; and Wisconsin Department of Justice. These agencies have 
become regional clusters of ICAC technical and investigative expertise 
and offer prevention and investigative services to children, parents, 
educators, law enforcement officers, and other individuals working on 
child sexual exploitation issues.
    In the 21st century, law enforcement will be increasingly 
challenged by sex offenders using computer technology to victimize 
children. To help meet this challenge, at the direction of Congress, 
OJJDP is continuing a competitive grant program, the ICAC Task Force 
Program, which will award cooperative agreements to State and local law 
enforcement agencies seeking to improve their investigative response to 
the computer-facilitated sexual exploitation of children.

Program Strategy

    The OJJDP ICAC Task Force Program seeks to enhance the national 
response by developing a State and local law enforcement network 
composed of regional task forces. The program encourages communities to 
develop multijurisdictional and multiagency responses and provides 
funding to enable State and local law enforcement agencies to acquire 
the knowledge, personnel resources, and specialized equipment to 
prevent, interdict, or investigate ICAC offenses. Although the ICAC 
Task Force Program emphasizes law enforcement investigations, OJJDP 
encourages jurisdictions to include intervention, prevention, and 
victim services activities as part of their comprehensive approach.
    A total of $2.4 million is available to fund new ICAC Task Force 
Program grants in FY 1999. OJJDP intends to award 8 to 10 new 
cooperative agreement awards of up to $300,000 each to State or local 
law enforcement agencies or combinations of State or local law 
enforcement agencies. Successful applicants will be expected to serve 
as regional clusters of ICAC technical and investigative expertise, 
collaborate with existing OJJDP ICAC Task Forces, and become part of a 
national law enforcement network designed to protect children on the 
information highway.
    Cooperative agreements will be competitively awarded as follows:
     At least two cooperative agreements will be reserved for 
rural States or rural jurisdictions.2
---------------------------------------------------------------------------

    \2\ For the purposes of the ICAC Program, a ``rural State'' 
means a State that has a population density of 52 or fewer persons 
per square mile or a State in which the largest county has fewer 
than 150,000 population based on the decennial census of 1990 
through FY 1997. ``A rural area or jurisdiction'' means one that 
lies outside a Metropolitan Area (MA) as determined by the Office of 
Management and Budget as of June 30, 1996, and that has a total 
population of no more than 100,000, based on the most recent census 
data. Tribal governments and small towns and cites may be included 
in this definition, provided they meet the above criteria. In small 
jurisdictions where the larger surrounding jurisdiction is 
responsible for providing any of the necessary human services 
(probation, law enforcement, social services, etc.), a joint 
application is recommended. To determine if a jurisdiction is within 
an MA and therefore not considered a rural jurisdiction under the 
ICAC Task Force Program, visit the Census Web site at 
www.census.gov/population/www/metroarea.html.
---------------------------------------------------------------------------

     No more than two cooperative agreements will be awarded to 
jurisdictions proposing to expand existing ICAC law enforcement 
programs.

[[Page 24858]]

     Applicants from States where there are existing OJJDP ICAC 
Task Forces, i.e., California, Colorado, Florida, Illinois, New 
Hampshire, New York, South Carolina, Texas, Virginia, and Wisconsin, 
must clearly indicate protocols or procedures to coordinate their 
investigations and other activities with existing Task Forces within 
their States.
    Successful applicants will develop or enhance an investigative ICAC 
response that includes prevention, education, and victim services 
activities and investigators working in a multiagency, 
interdisciplinary task force environment.

Eligibility Requirements

    Applicants must be State and/or local law enforcement agencies. 
Joint applications from two or more eligible applicants are welcome; 
however, one applicant must be clearly indicated as the primary 
applicant (for correspondence, award, and management purposes) and the 
other(s) indicated as coapplicant(s).
    Applications should include evidence of multidisciplinary, 
multijurisdictional partnerships among public agencies, private 
organizations, community-based groups, and prosecutors' offices. 
Applications should also include prevention activities.

Goal

    To enhance State and local law enforcement ICAC investigative 
response.

Objectives

    Projects must accomplish the following objectives:
     Develop or expand multiagency, multijurisdictional task 
forces that include, but are not limited to, representatives from law 
enforcement, prosecution, victim services, and child protective 
services agencies. Relevant nongovernment organizations may also be 
included, and OJJDP encourages applicants to invite task force 
participation by Federal law enforcement.
     Institute policies and procedures that comply with the 
OJJDP ICAC Task Force Program Operational and Investigative Standards 
(see ``OJJDP Program Management'' below). Requests from eligible law 
enforcement agencies for copies of this document must be faxed on 
official letterhead to the Juvenile Justice Clearinghouse at 301-519-
5600 (Attention: Corey Mackison).
     Ensure investigative capacity by properly equipping and 
training ICAC Task Force investigators. Task Force investigators should 
be computer literate, knowledgeable regarding child exploitation 
issues, and familiar with Federal and State statutes and caselaw 
pertaining to ICAC investigations.
     Develop and maintain case management systems to document 
reported offenses and investigative results and to make or receive 
outside agency referrals of ICAC cases.
     Develop response protocols or memorandums of 
understandings that foster collaboration, information sharing, and 
service integration among public and private organizations to provide 
services to sexually exploited children.

OJJDP Program Management

    On the information highway, conventional law enforcement boundaries 
are virtually meaningless and the governing factors of time, place, and 
distance lose their sway. Offenders eagerly adapted the jurisdictional 
murkiness and metaphysical aspects of the Internet to further their 
criminal activities. These factors, which are conducive to criminal 
activity, present unique coordination and communication challenges for 
State and local law enforcement.
    Few ICAC cases start and end within same the jurisdiction, and 
investigations usually cross town, State, or even international 
borders. Accordingly, nearly all ICAC investigations involve multiple 
jurisdictions and require interagency coordination and communication. 
Absent meaningful case coordination, it is likely that law enforcement 
will simultaneously investigate identical suspects and organizations or 
target undercover operatives of other law enforcement agencies. Lack of 
communication and coordination can also contribute to law enforcement 
officers inadvertently disrupting clandestine investigations of other 
agencies.
    The obvious need for interagency cooperation and coordination also 
galvanizes interest in establishing standards for ICAC undercover 
investigations. Representatives from Federal, State, and local law 
enforcement agencies have repeatedly expressed concern about initiating 
investigations that are based on referrals from outside agencies that 
may be predicated on information acquired through inappropriate officer 
conduct or investigative techniques.
    The clandestine nature of undercover operations along with the 
Internet's metaphysical aspect significantly exacerbates these 
concerns. Undercover operations, when executed and documented properly, 
collect virtually unassailable evidence regarding a suspect's 
predilection to sexually exploit children. These operations allow law 
enforcement to go on the offensive and--what is most important--
children do not have to be victimized to bring a case. While there is 
substantial consensus that carefully managed undercover operations by 
well-trained officers are very effective, they also generate 
significant concerns regarding legal, coordination, communication, and 
resource management issues.
    To address these concerns, OJJDP's overall ICAC Task Force program 
management involves:
     Ensuring that ICAC Task Force personnel are adequately 
trained and equipped.
     Establishing and/or maintaining ICAC Task Force 
investigative standards to facilitate interagency case referrals.
     Advocating coordination and collaboration among Federal, 
State, and local law enforcement agencies investigating ICAC offenses.
     Fostering meaningful information sharing to avoid 
redundant investigations or activities that could disrupt ongoing 
investigations of other agencies.
     Maintaining a national oversight board composed of local 
prosecutors and law enforcement executives to review undercover 
operations proposals and to formulate policy for the operation of the 
ICAC Task Force Program.
    OJJDP has established ICAC Task Force operational and investigative 
standards through a collaborative process with the 10 original ICAC 
Task Force agencies and the FBI, NCMEC, USCS, USPIS, CEOS, and the 
Executive Office for United States Attorneys. The standards were 
designed by the Task Force agencies to foster information sharing, 
coordinate investigations, ensure the probative quality of undercover 
operations, and facilitate interagency case referrals through 
standardization of investigative practices.
    OJJDP has also established an ICAC Task Force Review Board (Board) 
to assist in the administration of the ICAC Task Force Program. As a 
condition of award, each grantee designates a policy-level law 
enforcement official or prosecutor to be a Board member. Although the 
Board's primary responsibility is to review proposed undercover 
operations for compliance with the standards, a major focus of the 
Board is to encourage case coordination and facilitate information 
sharing on trends, innovative investigative techniques, and prosecution 
strategies. Technical advice is provided to the

[[Page 24859]]

Board by CEOS, the FBI, and other Federal law enforcement agencies.
    In addition, each ICAC Task Force member sends at least one 
investigator and one policy-level official to the ICAC Task Force 
orientation seminar. The next seminar, scheduled for September 26-30, 
1999, at NCMEC's Jimmy Ryce Law Enforcement Training Center, was 
developed by OJJDP and NCMEC in consultation with Federal law 
enforcement agencies. The seminar will provide information regarding 
legal issues, specific investigative techniques, undercover operation 
documentation requirements, behavioral characteristics of preferential 
sex offenders, and other topics relevant to child exploitation cases.
    Expenses associated with attendance at the orientation seminar will 
be reimbursed by OJJDP and NCMEC. Expenses associated with Board 
responsibilities will be covered by grant funds.

Selection Criteria

    The OJJDP Administrator is committed to the concept of a national 
network of State and local law enforcement to respond to online 
enticement and child pornography offenses. Under this concept, the ICAC 
Task Forces will be positioned throughout the country to serve as 
regional sources of technical, educational, and investigative expertise 
to provide assistance to parents, teachers, law enforcement, and other 
professionals working on child sexual exploitation issues. Therefore, 
in selecting applicants, consideration will be given to achieving an 
equitable geographic distribution.
    OJJDP will convene a peer review panel to evaluate and rank 
applications and to make funding recommendations to the OJJDP 
Administrator. Although peer review recommendations are given weight, 
they are advisory only and final award decisions will be made by the 
OJJDP Administrator. OJJDP will negotiate specific terms of the award 
with applicants being considered for the award. Applicants will be 
evaluated and rated according to the criteria outlined below.

Problem(s) To Be Addressed (10 points)

    The applicant should clearly identify the need for this project and 
demonstrate an understanding of the program concept. While OJJDP 
recognizes that Internet crimes against children are an emerging 
problem, applicants should include data that illustrate the size and 
scope of the problem in the State and local jurisdiction, where 
available. If statistics or other research findings are used to support 
a statement or position, applicants must include the relevant source 
information.

Goals and Objectives (10 points)

    Applicants must establish clearly defined, measurable, and 
attainable goals and objectives for this program.

Project Design (35 points)

    The applicant must present a clear workplan that contains program 
elements directly linked to the achievement of the project objectives. 
The workplan must indicate significant project milestones, product due 
dates, and the nature of the products to be delivered. The applicant 
must explain in clear terms how the State or local task force will be 
developed and implemented. In those States currently participating in 
the OJJDP ICAC Task Force Program, an explanation of how activities 
will be coordinated with the existing OJJDP ICAC Task Force must be 
included. In addition, letters of support from State and local 
prosecution offices and the cognizant United States Attorney should be 
provided.

Management and Organizational Capability (30 points)

    Applicant's management structure and staffing must be adequate and 
appropriate for the successful implementation of the project. 
Applicants must present a workplan that identifies responsible 
individuals, their time commitment, major tasks, and milestones. 
Applicants must describe how Internet crimes against children 
activities will be continued following Federal funding support. In 
addition, direct letters of support from State and local prosecution 
offices and the local district United States Attorney should be 
provided.

Budget (15 points)

    Applicants must provide a proposed budget that is complete, 
detailed, reasonable, allowable, and cost effective in relation to the 
activities to be undertaken. Budgets must allow for required travel, 
including four trips for one individual to the quarterly ICAC Task 
Force Board meetings.

Format

    The narrative must not exceed 35 pages in length (excluding forms, 
assurances, and appendixes) and must be submitted on 8\1/2\- by 11-inch 
paper, double-spaced on one side of the paper in a standard 12-point 
font. These requirements are necessary to maintain fair and uniform 
standards among all applicants. If the narrative does not conform to 
these standards, OJJDP will deem the application ineligible for 
consideration.

Award Period

    The project will be for up to an 18-month budget and project 
period. Funding of the project beyond the initial project period will 
be contingent upon performance of the grantee, and availability of 
funds.

Award Amount

    The total amount available for this program is $2.4 million. OJJDP 
intends to award 8 to 10 cooperative agreements of up to $300,000 each 
for the 18-month project period.

Catalog of Federal Domestic Assistance (CFDA) Number

    For this program, the CFDA number, which is required on Standard 
Form 424, Application for Federal Assistance, is 16.543. This form is 
included in OJJDP's Application Kit, which can be obtained by calling 
the Juvenile Justice Clearinghouse at 800-638-8736 or sending an e-mail 
request to [email protected]. The kit is also available online at 
www.ojjdp.ncjrs.org.

Coordination of Federal Efforts

    To encourage better coordination among Federal agencies in 
addressing State and local needs, the U.S. Department of Justice is 
requesting applicants to provide information on the following: (1) 
active Federal grant award(s) supporting this or related efforts, 
including awards from the U.S. Department of Justice; (2) any pending 
application(s) for Federal funds for this or related efforts; and (3) 
plans for coordinating any funds described in items (1) or (2) with the 
funding sought by this application. For each Federal award, applicants 
must include the program or project title, the Federal grantor agency, 
the amount of the award, and a brief description of its purpose.
    ``Related efforts'' is defined for these purposes as one of the 
following:
     Efforts for the same purpose (i.e., the proposed award 
would supplement, expand, complement, or continue activities funded 
with other Federal grants).
     Another phase or component of the same program or project 
(e.g., to implement a planning effort funded by other Federal funds or 
to provide a substance abuse treatment or education component within a 
criminal justice project).
     Services of some kind (e.g., technical assistance, 
research, or

[[Page 24860]]

evaluation) to the program or project described in the application.

Delivery Instructions

    All application packages should be mailed or delivered to the 
Office of Juvenile Justice and Delinquency Prevention, c/o Juvenile 
Justice Resource Center, 2277 Research Boulevard, Mail Stop 2K, 
Rockville, MD 20850; 301-519-5535. Note: In the lower left-hand corner 
of the envelope, the applicant must clearly write ``Internet Crimes 
Against Children Task Force Program.''

Due Date

    Applicants are responsible for ensuring that the original and five 
copies of the application package are received by 5 p.m. EDT on June 
21, 1999.

Contact

    For further information, call Michael Medaris, ICAC Task Force 
Program Manager, Missing and Exploited Children's Program, 202-616-
3637, or send an e-mail inquiry to [email protected].

References

    Burgess, A., and Grant, C. 1988. Children Traumatized in Sex 
Rings. Arlington, VA: National Center for Missing and Exploited 
Children.
    Cage, R., and Pence, D. 1997. Criminal Investigation of Child 
Sexual Abuse. Washington, DC: U.S. Department of Justice, Office of 
Justice Programs, Office of Juvenile Justice and Delinquency 
Prevention.
    Dressler, K. 1997. Multijurisdictional Task Forces: Ten Years of 
Research and Evaluation: A Report to the Attorney General 
Washington, DC: U.S. Department of Justice, Office of Justice 
Programs, Bureau of Justice Assistance.
    Farley, R., and Lanning, K. 1997. Understanding and 
Investigating Child Sexual Exploitation. Washington, DC: U.S. 
Department of Justice, Office of Justice Programs, Office of 
Juvenile Justice and Delinquency Prevention.
    Fuller, K., and Saywitz, K. 1997. Interviewing Child Witnesses and 
Victims of Sexual Abuse. Washington, DC: U.S. Department of Justice, 
Office of Justice Programs, Office of Juvenile Justice and Delinquency 
Prevention.
    Hammerschlag, M. 1997. Sexually Transmitted Diseases and Child 
Sexual Abuse. Washington, DC: U.S. Department of Justice, Office of 
Justice Programs, Office of Juvenile Justice and Delinquency 
Prevention.
    Lanning, K. 1992. Child Molesters: A Behavioral Analysis for Law 
Enforcement Officers Investigating Cases of Child Sexual Exploitation. 
Arlington, VA: National Center for Missing and Exploited Children.
    Lanning, K. 1992. Child Sex Rings: A Behavioral Analysis for 
Criminal Justice Professionals Handling Cases of Child Sexual 
Exploitation. Arlington, VA: National Center for Missing and Exploited 
Children.
    Magid, L. 1994. Child Safety on the Information Highway (pamphlet). 
Arlington, VA: National Center for Missing and Exploited Children.
    Magid, L. 1998. Teen Safety on the Information Highway (pamphlet). 
Arlington, VA: National Center for Missing and Exploited Children.
    National Center for Missing and Exploited Children. 1998. Know the 
Rules (pamphlet). Arlington, VA: National Center for Missing and 
Exploited Children.
    Quarantiello, L. 1997. Cyber Crime: How to Protect Yourself from 
Computer Criminals. Lake Geneva, WI: Tiare Publications.
    Rosenblatt, K. 1995. High-Technology Crime: Investigating Cases 
Involving Computers. San Jose, CA: KSK Publications.
    Whitcomb, D. 1995. Child Sexual Exploitation: Improving 
Investigations and Protecting Victims: A Blueprint for Action. 
Washington, DC: U.S. Department of Justice, Office of Justice Programs, 
Office for Victims of Crime.G4

    Dated: May 3, 1999.
Shay Bilchik,
Administrator, Office of Juvenile Justice and Delinquency Prevention.
[FR Doc. 99-11433 Filed 5-6-99; 8:45 am]
BILLING CODE 4410-18-P