[Federal Register Volume 64, Number 158 (Tuesday, August 17, 1999)]
[Notices]
[Pages 44808-44811]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 99-21228]
[[Page 44807]]
_______________________________________________________________________
Part III
Department of Justice
_______________________________________________________________________
Office of Juvenile Justice and Delinquency Prevention
_______________________________________________________________________
Internet Crimes Against Children Task Force Training and Technical
Assistance Program; Notice
Federal Register / Vol. 64, No. 158 / Tuesday, August 17, 1999 /
Notices
[[Page 44808]]
DEPARTMENT OF JUSTICE
Office of Juvenile Justice and Delinquency Prevention
[OJP (OJJDP)-1242]
RIN 1121-ZB76
Internet Crimes Against Children Task Force Training and
Technical Assistance Program
AGENCY: Office of Justice Programs, Office of Juvenile Justice and
Delinquency Prevention, Justice.
ACTION: Announcement of Discretionary Competitive Assistance Grant.
-----------------------------------------------------------------------
SUMMARY: Notice is hereby given that the Office of Juvenile Justice and
Delinquency Prevention (OJJDP), pursuant to Public Law 105-277, October
19, 1998, the Omnibus Consolidated and Emergency Supplemental
Appropriation Act of 1999, is requesting applications from
organizations to provide a training and technical assistance program
that will assist OJJDP in developing and delivering programs and
activities designed to counter the computer-facilitated sexual
exploitation of children. Congress has directed OJJDP to sponsor ``town
meetings to focus on cybercrimes against children in local communities
across the country'' and to deliver ``highly technical sophisticated
computer training for State and local law enforcement.'' In addition to
town meetings, activities will include delivering computer forensic
training to State and local law enforcement officers, and providing
OJJDP with the technical assistance capacity to administer the Internet
Crimes Against Children Task Force (ICAC Task Force) Program.
DATES: Applications must be received by October 1, 1999.
ADDRESSES: Interested applicants must obtain an application kit from
the Juvenile Justice Clearinghouse at 800-638-8736. The application kit
is also available at OJJDP's Web site at www.ojjdp.ncjrs.org/grants/
about.html/#kit.
FOR FURTHER INFORMATION CONTACT: Michael Medaris, ICAC Task Force
Program Manager, Office of Juvenile Justice and Delinquency Prevention,
202-616-8937.
This is not a toll-free number.
SUPPLEMENTARY INFORMATION:
Purpose
This program has two purposes. The first is to assist State and
local law enforcement agencies enhance their investigative response to
sexual exploitation of children by offenders using the Internet, online
communication systems, or other computer technology. The second is to
assist OJJDP to administer the ICAC Task Force Program through the
provision of training and technical assistance and other activities as
determined by OJJDP. For purposes of this program announcement,
``Internet crimes against children'' refers to sexual exploitation of
children facilitated by computers and includes crimes of child
pornography and online solicitation for sexual purposes.
Background
Industry experts estimate that more than 10 million children
currently go online and, by the year 2002, 45 million children will use
cyberspace to talk with friends, explore the universe, or complete
homework assignments. While providing almost limitless opportunities to
learn, the Internet has also become the new venue for predators seeking
children to victimize. Cloaked in the anonymity of cyberspace, sex
offenders can capitalize on the natural curiosity of children, seeking
victims with little risk of detection. Preferential sex offenders
1 can roam from chat room to chat room trolling for children
susceptible to victimization. This alarming trend has grave
implications for parents, teachers, and law enforcement officers
because it circumvents conventional safeguards in place for the
physical world and provides sex offenders virtually unlimited
opportunities for unsupervised contact with children.
---------------------------------------------------------------------------
\1\ For the purposes of this program, preferential sex offenders
are defined as individuals whose primary sexual focus is on
children.
---------------------------------------------------------------------------
The Internet has also become a major medium for distribution of
child pornography. In 1982, in New York v. Ferber, 458 U.S. 747 (1982),
the Supreme Court stated: ``The distribution of photographs and films
depicting sexual activity by juveniles is intrinsically related to the
sexual abuse of children . . . the materials produced are a permanent
record of the children's participation and the harm to the child is
exacerbated by their circulation.'' Child pornography not only depicts
the sexual assault of a child, but is also used by child molesters to
recruit, seduce, and control future victims. It is used to break down
inhibitions, validate sex between children and adults as normal, and
control the victim throughout the molestation. When the offender loses
interest, it is often used as blackmail to ensure the child's silence
and in these most egregious cases, child pornography allows the
molester to go unpunished and the victim untreated. It is clear to
OJJDP that the intersecting of the increasing online presence of
children, the proliferation of child pornography, and preferential sex
offenders ceaselessly searching for unsupervised contact with underage
victims presents a significant threat to the health and safety of
children.
In response to this threat, Congress in the FY 1998 Omnibus
Appropriations Act, Public Law 105-119, authorized OJJDP to stimulate
the creation of ``State and local law enforcement cyber units to
investigate child sexual exploitation.'' In September 1998, with 10
awards to State and local law enforcement agencies across the Nation,
OJJDP initiated a national program to counter the emerging threat of
offenders using the Internet or other online technology to sexually
exploit children. Designed to encourage communities to adopt a
multidisciplinary, multijurisdictional response to online enticement
and child pornography cases, the Internet Crimes Against Children Task
Force (ICAC Task Force) Program ensures that participating State and
local law enforcement agencies can acquire the necessary knowledge,
equipment, and personnel resources to prevent, interdict, or
investigate ICAC offenses. Under this program, ICAC Task forces serve
as regional sources of prevention, education, and investigative
expertise to provide assistance to parents, teachers, law enforcement,
and other professionals working on child victimization issues.
Agencies receiving ICAC Task Force Program funding in FY 1998 were
Bedford County, Virginia, Sheriff's Department; Broward County,
Florida, Sheriff's Department; Colorado Springs, Colorado, Police
Department; Dallas, Texas, Police Department; Illinois State Police;
New York State Division of Criminal Justices Services; Portsmouth, New
Hampshire, Police Department; Sacramento County, California, Sheriff's
Office; the South Carolina Office of the Attorney General; and the
Wisconsin Department of Justice.
Under a cooperative agreement with OJJDP, the National Center for
Missing and Exploited Children (NCMEC) also plays a crucial role in
enhancing the national response to Internet crimes against children by
providing a wide range of activities including the CyberTipline, which
provides a way for children, parents, and concerned citizens to report
information online about suspected child exploitation activity to law
enforcement; prevention and education programs; and training courses
for law enforcement. For example, NCMEC's Protecting Children
[[Page 44809]]
Online course provides investigators specific information regarding
behavior characteristics, technical demands of Internet investigations,
interviewing and interrogation techniques, and other aspects of law
enforcement essential to effective investigation of these offenses. Its
Protecting Children Online Unit Commander Seminar focuses on the
broader policy and procedural issues that confront law enforcement
managers developing strategies for responding to Internet crimes
against children.
In FY 1999, OJJDP will provide continuation funding to the 10
original task forces. It will also expand the ICAC Task Force Program
by adding 8 new agencies.
OJJDP ICAC Task Force Program Management
Nearly all law enforcement investigations start with a
determination of jurisdiction and in making that determination, time,
place, and location are important considerations. However, this
conventional approach is virtually meaningless in the electronic world
of cyberspace, and preferential sex offenders have quickly developed
substantial expertise in adapting this ambiguity to further their
criminal activities.
Few ICAC cases begin and end within the same jurisdiction, and
investigations usually cross town, State, or even international
borders. Accordingly, nearly all ICAC investigations involve multiple
jurisdictions and require interagency coordination and communication.
Absent meaningful case coordination, it is likely that law enforcement
will simultaneously investigate identical suspects and organizations or
target undercover operatives of other law enforcement agencies. Lack of
communication can also contribute to law enforcement officers
inadvertently disrupting clandestine investigations of other agencies.
The obvious need for interagency cooperation and coordination also
stimulates interest in establishing standards for ICAC undercover
investigations. Representatives from Federal, State, and local law
enforcement agencies have repeatedly expressed concern about initiating
investigations based on outside agency referrals that may be predicated
on information acquired through inappropriate officer conduct or
investigative techniques.
The clandestine nature of undercover operations along with the
Internet's metaphysical aspect significantly increases these concerns.
Undercover operations, when executed and documented properly, collect
virtually unassailable evidence regarding a suspect's predilection to
sexually exploit children. These operations allow law enforcement to go
on the offensive and--what is most important--children do not have to
be victimized to bring a case. While there is substantial consensus
that carefully managed undercover operations by well-trained officers
are very effective, they also generate significant concerns regarding
legal, coordination, communication, and resource management issues.
To address these concerns, OJJDP has established ICAC Task Force
operational and investigative standards (Standards) through a
collaborative process with the 10 original ICAC Task Force agencies and
Federal prosecutorial and law enforcement agencies.2 The
Standards were designed by the Task Force agencies to foster
information sharing, coordinate investigations, ensure the probative
quality of undercover operations, and facilitate interagency case
referrals through standardization of investigative practices.
---------------------------------------------------------------------------
\2\ Participating in development of the Standards were
representatives from the United States Customs Service (USCS), the
United States Postal Inspection Service (USPIS), the National Center
for Missing and Exploited Children (NCMEC), and--from the Department
of Justice--OJJDP, the Federal Bureau of Investigation, the Child
Exploitation and Obscenity Section (CEOS) of the Criminal Division,
and the Executive Office for United States Attorneys.
---------------------------------------------------------------------------
OJJDP has also established an ICAC Task Force Review Board (Board),
composed of local prosecutors and law enforcement executives from
participating agencies, to review proposed undercover operations for
compliance with the principles of the Standards, formulate policy,
encourage case coordination, and facilitate information sharing on
trends, investigative techniques, and prosecution strategies.
In sum, program management for the OJJDP ICAC Task Force involves:
Ensuring that ICAC Task Force personnel are adequately
trained and equipped.
Maintaining ICAC investigative standards to facilitate
interagency case referrals.
Advocating coordination and collaboration among Federal,
State, and local law enforcement agencies investigating ICAC offenses.
Fostering meaningful information sharing to avoid
redundant investigations or disruptive activities to ongoing
investigations of other agencies.
Maintaining an advisory board to review undercover
operations proposals and to formulate policy for the operation of the
ICAC Task Force Program.
Goal
To develop a training and technical assistance program to assist
State and local law enforcement to respond to ICAC offenses and to
assist OJJDP in supporting the ICAC Task Force Program.
Objectives
The project must accomplish the following objectives:
Develop and deliver a technical investigative course that
complements the curriculum of NCMEC's Protecting Children Online
course. This new technical investigative course must feature a hands-on
approach and be capable of being offered regionally. It should provide
information regarding legal issues, hardware and software
specifications, evidence collection procedures, and specific
investigative techniques to assist law enforcement to effectively
respond to computer-facilitated sexual exploitation cases.
Using the ``town meeting'' concept, assist OJJDP and NCMEC
to sponsor events to promote awareness and encourage jurisdictions to
develop communitywide prevention and interdiction efforts related to
ICAC offenses.
Develop a logistical support program to facilitate OJJDP
ICAC Task Force Board meetings.
Develop a technical assistance capacity composed of a
cadre of expert practitioners who have expertise in task force
implementation including the development of multiagency response
protocols, information sharing, performance measures, Federal grant
reporting requirements, and investigative and technical aspects of ICAC
investigations.
Develop an ICAC offense training and technical assistance
directory that includes information regarding existing prevention and
education programs and publications and provides a list of technical
and investigative course providers that offer training relevant to ICAC
investigations.
Develop an ongoing needs assessment system to assist OJJDP
to plan future training and technical assistance programs.
Program Strategy
OJJDP is consolidating a wide range of training, technical
assistance, and town meeting activities to achieve cost savings and to
ensure that these activities are carried out with a consistent point of
view and comply with the OJJDP ICAC Task Force
[[Page 44810]]
Standards. Because the Standards contain sensitive investigative
information, they will not be made available to organizations during
the application phase of this program. However, for the purposes of
responding to this request for proposals, applicants should be aware
that the Standards express broad law enforcement themes that pertain to
target selection, supervision, media releases, evidence collection
procedures, undercover conduct, and other issues regarding ICAC
investigations. OJJDP will make the Standards available to the
successful applicant once the award is made.
During the implementation of these activities, the applicant will
be expected to collaborate with NCMEC and to work closely with OJJDP.
Eligibility Requirements
OJJDP invites applications from public and private nonprofit
agencies. Joint applications from two or more eligible applicants are
welcome; however, one applicant must be clearly indicated as the
primary applicant (for correspondence, award, and management purposes)
and the others indicated as coapplicants.
Selection Criteria
OJJDP will convene a peer review panel to evaluate and rank
applications and to make a funding recommendation to the OJJDP
Administrator. Although peer review recommendations are given weight,
they are advisory only and the final award decision will be made by the
OJJDP Administrator. OJJDP will negotiate specific terms of the award
with applicants being considered for the award. Applicants will be
rated and evaluated according to the criteria outlined below.
Problem(s) To Be Addressed (10 points)
The applicant should clearly demonstrate an understanding of the
program concept and in particular, an understanding of a program
requiring reconciliation of Federal oversight responsibilities with the
interests of State and local law enforcement agencies.
Goals and Objectives (10 points)
Applicants must establish goals and objectives for this program
that are clearly defined, measurable, and attainable.
Project Design (25 points)
The applicant must present a clear workplan that contains program
elements directly linked to the achievement of the project objectives.
The workplan must indicate significant project milestones, product due
dates, and the nature of the products to be delivered. In addition,
applicant should present a clear concept of how it intends to deliver a
technical computer investigative course that is designed to be offered
regionally and features a hands-on approach.
Management and Organizational Capability (40 points)
The project's management structure and staffing must be appropriate
for the successful implementation of the project. Applicants must
present resumes of staff (either permanent or contractual) with
expertise in meeting logistics, computer forensics, curriculum
development, and law enforcement task force implementation and
maintenance issues. Applicants must also present a workplan that
identifies responsible individuals, their time commitment, and their
relation to major tasks and milestones.
The applicant's organizational ability to administer the project
successfully must be clearly documented in the proposal and should
include available computer technology to be utilized in attaining the
objectives. Documentation must include past or current organizational
experience in the subject areas and skills required to achieve the
objectives and with projects of the magnitude and complexity described
in this program announcement. In addition, applicants must demonstrate
an ability and history of handling sensitive information in a
confidential and prudent manner.
Budget (15 points)
Applicants must provide a proposed budget that is complete,
detailed, reasonable, allowable, and cost effective in relation to the
activities to be undertaken. Applicants should consider the following
OJJDP expectations for budget planning purposes:
Deliver at least 8 regional sessions of the technical
investigative course with a projected capacity of no less than 20
students.
Design, support, and deliver at least four town meetings.
(OJJDP anticipates centering these activities around existing ICAC Task
Force jurisdictions.)
Facilitate eight ICAC Task Force Board meetings. Although
transportation and lodging expenses of Board members will be the
responsibility of individual ICAC Task Forces, all other activities or
expenses associated with Board meetings will be the responsibility of
the applicant. This includes, but is not limited to, identifying and
securing meeting space, providing onsite support, communicating with
Board members regarding meeting arrangements, arranging for audiovisual
equipment as necessary, and reimbursing travel and lodging expenses of
guest speakers (no more than two per meeting).
Perform a technical assistance function ranging from
telephone consultation to direct onsite support, using a cadre of
expert practitioners. At the direction of OJJDP, technical assistance
will be provided to assist ICAC Task Forces to comply with the
Standards, assist the Board to formulate and document operational by-
laws for the Program, and based on the availability of funds, assist
other jurisdictions interested in improving their response to ICAC
offenses.
Format
The narrative must not exceed 35 pages in length (excluding forms,
assurances, and appendixes) and must be submitted on 8\1/2\ by 11-inch
paper, double-spaced on one side of the paper in a standard 12-point
font. These requirements are necessary to maintain fair and uniform
standards among all applicants. If the narrative does not conform to
these standards, OJJDP will deem the application ineligible for
consideration.
Award Period
The project will be funded as a cooperative agreement for up to an
18-month budget and project period. Funding of the project in
subsequent budget periods will be contingent upon OJJDP's assessment of
continuing need, availability of funds, and the performance of the
grantee.
Award Amount
OJJDP intends to award one cooperative agreement of up to $400,000
for an 18-month project period.
Catalog of Federal Domestic Assistance (CFDA) Number
For this program, the CFDA number, which is required on Standard
Form 424, Application for Federal Assistance, is 16.543. This form is
included in OJJDP's Application Kit, which can be obtained by calling
the Juvenile Justice Clearinghouse at 800-638-8736 or sending an e-mail
request to puborder@ncjrs.org. The kit is also available online at
www.ojjdp.ncjrs.org/grants/about.html#kit.
Coordination of Federal Efforts
To encourage better coordination among Federal agencies in
addressing State and local needs, the U.S. Department of Justice is
requesting
[[Page 44811]]
applicants to provide information on the following: (1) active Federal
grant award(s) supporting this or related efforts, including awards
from the U.S. Department of Justice; (2) any pending application(s) for
Federal funds for this or related efforts; and (3) plans for
coordinating any funds described in items (1) or (2) with the funding
sought by this application. For each Federal award, applicants must
include the program or project title, the Federal grantor agency, the
amount of the award, and a brief description of its purpose.
``Related efforts'' is defined for these purposes as one of the
following:
Efforts for the same purpose (i.e., the proposed award
would supplement, expand, complement, or continue activities funded
with other Federal grants).
Another phase or component of the same program or project
(e.g., to implement a planning effort funded by other Federal funds or
to provide a substance abuse treatment or education component within a
criminal justice project).
Services of some kind (e.g., technical assistance,
research, or evaluation) to the program or project described in the
application.
Delivery Instructions
All application packages should be mailed or delivered to the
Office of Juvenile Justice and Delinquency Prevention, c/o Juvenile
Justice Resource Center, 2277 Research Boulevard, Mail Stop 2K,
Rockville, MD 20850; 301-519-5535. Note: In the lower left-hand corner
of the envelope, the applicant must clearly write ``Internet Crimes
Against Children Task Force Training and Technical Assistance
Program.''
Due Date
Applicants are responsible for ensuring that the original and five
copies of the application package are received by 5 p.m. EDT on October
1, 1999.
Contact
For further information, call Michael Medaris, Program Manager,
ICAC Task Force Program Manager, 202-616-3637, or send an e-mail
inquiry to medarism@ojp.usdoj.gov.
References
Burgess, A., and Grant, C. 1988. Children Traumatized in Sex Rings.
Arlington, VA: National Center for Missing and Exploited Children.
Cage, R., and Pence, D. 1997. Criminal Investigation of Child Sexual
Abuse. Washington, DC: U.S. Department of Justice, Office of Justice
Programs, Office of Juvenile Justice and Delinquency Prevention.
Dressler, K. 1997. Multijurisdictional Task Forces: Ten Years of
Research and Evaluation: A Report to the Attorney General.
Washington, DC: U.S. Department of Justice, Office of Justice
Programs, Bureau of Justice Assistance.
Farley, R., and Lanning, K. 1997. Understanding and Investigating
Child Sexual Exploitation. Washington, DC: U.S. Department of
Justice, Office of Justice Programs, Office of Juvenile Justice and
Delinquency Prevention.
Fuller, K., and Saywitz, K. 1997. Interviewing Child Witnesses and
Victims of Sexual Abuse. Washington, DC: U.S. Department of Justice,
Office of Justice Programs, Office of Juvenile Justice and
Delinquency Prevention.
Hammerschlag, M. 1997. Sexually Transmitted Diseases and Child
Sexual Abuse. Washington, DC: U.S. Department of Justice, Office of
Justice Programs, Office of Juvenile Justice and Delinquency
Prevention.
Lanning, K. 1992. Child Molesters: A Behavioral Analysis for Law
Enforcement Officers Investigating Cases of Child Sexual
Exploitation. Arlington, VA: National Center for Missing and
Exploited Children.
Lanning, K. 1992. Child Sex Rings: A Behavioral Analysis for
Criminal Justice Professionals Handling Cases of Child Sexual
Exploitation. Arlington, VA: National Center for Missing and
Exploited Children.
Magid, L. 1994. Child Safety on the Information Highway (pamphlet).
Arlington, VA: National Center for Missing and Exploited Children,
1994.
Magid, L. 1998. Teen Safety on the Information Highway (pamphlet).
Arlington, VA: National Center for Missing and Exploited Children.
National Center for Missing and Exploited Children. 1998. Know the
Rules (pamphlet). Arlington, VA: National Center for Missing and
Exploited Children.
Quarantiello, L. 1997. Cyber Crime: How to Protect Yourself from
Computer Criminals. Lake Geneva, WI: Tiare Publications.
Rosenblatt, K. 1995. High-Technology Crime: Investigating Cases
Involving Computers. San Jose, CA: KSK Publications.
Whitcomb, D. 1995 Child Sexual Exploitation: Improving
Investigations and Protecting Victims: A Blueprint for Action.
Washington, DC: U.S. Department of Justice, Office of Justice
Programs, Office for Victims of Crime.
Dated: August 11, 1999.
John J. Wilson,
Deputy Administrator, Office of Juvenile Justice and Delinquency
Prevention.
[FR Doc. 99-21228 Filed 8-16-99; 8:45 am]
BILLING CODE 4410-18-P