Do You Need Help?

About Us

The Internet Crimes Against Children (ICAC) task force program was created by the Department of Justice (DOJ), through the Office of Juvenile Justice and Delinquency Prevention (OJJDP), in 1998. Due to the increasing internet access from home, law enforcement saw an increase in complaints about child sexual exploitation. Strangers now had access to kids in the very place they should be the safest…at home. The ICAC Program was developed and began via a grant offering to local and state agencies to begin combating the problem.

When the program began, there were ten (10) grants awarded through OJJDP to start ICAC task forces. The number of task forces has grown to sixty-one (61), with some states having two or more.

Pink and Blue handprint from our logo representing both girls and boys that we help

What are the signs of abuse?

Parents often wonder what signs they should look out for, which may indicate their child is being sexually exploited. While no list is comprehensive, these are general signs that something may be affecting your child. These signs do not necessarily mean your child has been sexually exploited.  They are, however, fairly reliable indicators that your child is struggling with something and definitely warrants further exploration to try to determine what is causing these signs to manifest in the young person in your life.

report icon

Ultimately, you know your child and should take note of any changes in their behavior or routine that are not easily explained.

  • Sudden and/or unexplained personality changes
  • Angry outbursts
  • Abnormal irritation
  • Self-harm or self-medication
    (alcohol, prescription/illicit drugs)
  • Withdrawal from normal family activities
  • Disrupted sleep patterns; persistent nightmares
  • Changes in friendships (no longer spending time with or
    talking about normal friends)
  • Increased talk about a “new” friend (usually vague, not willing
    to provide a lot of details)
  • New “friend” demands excessive amounts of your child’s time and
    attention, resulting in isolation from friends and family
  • Hiding online activity/not talking about it openly
  • Hiding/changing screen when someone else enters the room
  • Overly possessive of electronic devices
  • Secretive about online activity/use of devices, especially newer technology
  • Evasiveness/agitated behavior when communicating with someone by phone/text/SMS/PM/DM/etc., especially when requiring “privacy”
  • Acting out in suggestive ways or speaking about topics not appropriate for their age
  • Sudden changes in dress (could become more modest or more sensual)
  • Unexpected gifts/packages being delivered
  • Unexplained sums of cash
  • Hotel room keys

“I never thought it would happen to my child…”

We hear these words too often. No parent wants to believe their child will be victimized, but the reality is, your child has a very high chance of being exploited. Education is key, and it must be approached from two fronts – parental education and child education.

Frequently Asked Questions

Below you will find some of the most commonly asked questions about the ICAC Program and crimes against children involving technology.

What Does “ICAC” stand for?

ICAC stands for Internet Crimes Against Children. The ICAC Task Force program was an initiative started in 1998 by the Office of Juvenile Justice and Delinquency Prevention. The Bedford County Sheriff’s Office was one of the first ten task forces in the United States when it started in 1998.

I think my child may be a victim…what do I do?

If you think your child is a victim of online child sexual exploitation, there are several things you should do to help law enforcement have the best chance of locating and prosecuting the offender. There will be a surge of emotions when you find out your child has been victimized, which is normal, but it is important to act calmly. First, preserve any evidence. Do not continue to look through data or electronic devices that were used by your child, as it may alter or destroy digital evidence. If possible, secure any online accounts, make sure you know the login and password information for the accounts, and keep the device charged/powered on until law enforcement can collect it. Disconnect from the internet, wireless, Bluetooth, etc…if a mobile device, place into airplane mode. Do NOT delete any messages or images/videos, no matter how explicit they may be. Do NOT contact the offender and tell them you are calling the police. This may seem like common sense, but in the heat of the moment, it happens more often than one would think.

How can I report an internet crime involving a child?

You should attempt to contact your local law enforcement agency first, especially if it is an emergency involving immediate risk to the life or physical safety of a child. In this case, dial 9-1-1. If you live in Virginia, you can look at the Task Force Affiliate Agency list and see if your agency is a member of the SOVA-ICAC Task Force. If you live in Northern Virginia, you can check the website for the NOVA-DC ICAC Task Force to see if your local law enforcement agency is a member of that task force. You can also report 24hrs a day via The National Center For Missing and Exploited Children’s Cybertipline. This can be done by phone at 1-800-THE-LOST (1-800-843-5678) or online here. When making a report through NCMEC’s Cybertipline, you do have the option of making an anonymous tip, but please keep in mind that making an anonymous complaint may result in law enforcement not being able to contact you for additional information they may need to further an investigation.

I want to help! Can I volunteer to work with your task force or report suspected predators I find online through my own investigations?

While we wholeheartedly understand the desire to help, we cannot condone cyber vigilantism or accept any cases/leads developed via intentional investigations performed by non-law enforcement investigators. Investigators must receive extensive training related to legal investigative techniques, avoiding entrapment issues, preserving evidence, etc. Not knowing what is required for successful prosecutions, a non-law enforcement person attempting to do their own investigations may inadvertently violate someone’s rights or commit an act that causes any evidence obtained to be thrown out. In addition, predators will often send Child Sex Abuse Material (CSAM) via picture or video to people they are communicating with. They may send it to a child (or who they think is a child) to show the child that other kids are doing what the predator is encouraging the child to do. They may also send CSAM to adults that they think are like-minded. Either way, you could end up in possession of CSAM, putting yourself at risk of being prosecuted for violation of both state and federal law.

What are some resources I can use to better learn how to protect my children?

Education is key! As parents, we have a responsibility to teach our children about the dangers they will face online and what to do if and when something happens. Communication at an early age, at age-appropriate levels, is paramount. Discussing topics like appropriate touch and appropriate behavior are important and should be consistent and reinforced frequently. Know that many children will be exposed to some sort of sexually explicit content years before you think they will, and often well before parents even think about having “the talk” with their child about puberty and healthy sexual behaviors. Begin having those discussions very early on, at age-appropriate levels, but start setting the foundation for trust and open communication. Teach your children what to do when they are exposed and that they can come to you without being ashamed or embarrassed. Take time to learn about the devices you choose to allow your children to use. Know and use parental controls, restrictions, and notifications. Control screen time. A simple web search can also provide a wealth of information to educate yourself and help educate your children. Here are some resources you can use.

Will someone come to do a presentation for my group?

As part of our task force mission, we provide presentations to groups of all ages and types. We would be happy to come to speak with your group, though we ask that the audience is of similar make-up (i.e., adults-only, teens, middle schoolers, younger children, etc.). Request a presentation.

What is Child ID?

Our Child ID program is a free service we can provide at your public event. We will bring all the equipment to digitally fingerprint and photograph children (with parental/guardian consent), with all information saved to a CD-Rom, and given back to the parent/guardian. We do NOT keep or store any information about the child other than maintaining the signed consent form. In the event a child goes missing, the parents/guardians will have current pictures, fingerprints, and other important data in one place to easily provide to law enforcement to try to help locate and identify the missing child. You can request a Child ID team for your event.

Have you witnessed signs of child exploitation? Report it.

What Happens When I Make a Report?

Young woman using cell phone in business office

REPORT

Once a report is given, analysts begin reviewing the complaint and forward to the ICAC Task Force with jurisdiction.

Police Officers on phone

REVIEW

Law enforcement will review to determine if there is an actual violation of state or federal law.

help

CONTACT

Law enforcement may need to contact you for additional information. It is extremely difficult to investigate anonymous complaints, and often times they need additional information to develop probable cause to obtain legal process to identify the suspect.

Police Officers

INVESTIGATE

If a criminal violation has occurred, law enforcement will investigate to try to determine who the suspect is and will consult with the appropriate prosecutors for appropriate charges if a suspect can be identified, after a search warrant is executed and evidence obtained.