Online Undercover Investigations and the Role of Private Third Parties

dc.contributor.authorGrabosky, Peter
dc.contributor.authorUrbas, Gregor
dc.date.accessioned2025-10-23T04:54:58Z
dc.date.available2025-10-23T04:54:58Z
dc.date.issued2019
dc.date.updated2023-10-29T07:16:07Z
dc.description.abstractThis article explores the use of covert online investigative methods by state agencies, and by individuals and institutions in civil society. Our focus is primarily on active investigations of online child exploitation. In particular, we are concerned with two types of investigative activity-- a) an investigator's active deceptive impersonation of a child or of a facilitator of child exploitation, online; and b) techniques of accessing and compromising information systems used for the purpose of child exploitation. While these investigative methods may have a legitimate place in contemporary crime control, they do pose problems. We look first at their potential for abuse by state agencies, and the remedies available to the targets of illegal or otherwise questionable state practices. We then turn to non-state investigators, and note that the targets of private investigation have even less protection. We conclude by articulating some standards by which the propriety of state and non-state covert online investigative activity may be evaluated.
dc.format.mimetypeapplication/pdfen_AU
dc.identifier.issn0974-2891
dc.identifier.urihttps://hdl.handle.net/1885/733793195
dc.language.isoen_AUen_AU
dc.provenanceThis is a Diamond Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC-BY-NC-SA 4.0) License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
dc.publisherK. Jaishankar
dc.rights© 2019 International Journal of Cyber Criminology
dc.rights.licenseCreative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC-BY-NC-SA 4.0)
dc.rights.urihttps://creativecommons.org/licenses/by-nc-sa/4.0/deed.en
dc.sourceInternational Journal of Cyber Criminology
dc.titleOnline Undercover Investigations and the Role of Private Third Parties
dc.typeJournal article
dcterms.accessRightsOpen Access
local.bibliographicCitation.issue1
local.bibliographicCitation.lastpage54
local.bibliographicCitation.startpage38
local.contributor.affiliationGrabosky, Peter, College of Asia and the Pacific, ANU
local.contributor.affiliationUrbas, Gregor, ANU College of Law, ANU
local.contributor.authoruidGrabosky, Peter, u4032886
local.contributor.authoruidUrbas, Gregor, u4018002
local.description.notesImported from ARIES
local.identifier.absfor440207 - Cybercrime
local.identifier.ariespublicationU5603422xPUB175
local.identifier.citationvolume13
local.identifier.doi10.5281/zenodo.3383885
local.type.statusPublished Version

Downloads

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Journal Article PDF - IJCC.pdf
Size:
525.75 KB
Format:
Adobe Portable Document Format