View Presentation Materials
Transcription
View Presentation Materials
Technology Crimes Against Children and The Risk They Face Detective Richard Love (Retired) Former Consultant FBI Crimes Against Children Unit Pres/CEO National Crimes Against Children Training Alliance Objectives and Goals • • • • Offender Typology Child Victim Issues. Understanding Social Networking Sites. On-Line Advertisements. Challenges We Face • Identify and apprehend predators operating in a constantly changing technically complex environment. • Facilitate a successful prosecution with a thorough investigation to prevent further victimization. • Identify children who have been sexually exploited by predators. • Serve as a conduit to a variety of resources to aid victims and their families with their recovery. These are NOT Victimless Crimes! • Never lose sight of the fact that these are violent crimes involving real children. • The abuse suffered by these children will live within them every day of their lives and is repeated every time an image of their victimization is distributed. Challenges to Criminal Justice Agencies • To protect children from sexual abuse and exploitation by offenders 67% of all victims of reported sexual assaults were younger than 18 1 1Howard N. Snyder. Sexual Assault of Young Children as Reported to Law Enforcement: Victim, Incident, and Offender Characteristics. Washington, DC: National Center for Juvenile Justice, July 2000, page 2. Victims in Internet-initiated crimes were young teens 35% 30% 27% 26% 23% 25% 20% 14% 15% 8% 10% 5% 1% 0% 1 3 4 5 University of N.H. CACRC 2005 6 7 8 9 10 11 12 13 14 15 16 17 Age Offender Types Offender Types • WHO ARE THEY –Stranger Sex Offender –Family Sex Offender –Acquaintance Sex Offender –Computer Offender FOUR STEPS OF DEVELOPMENT • AWARENESS • FANTASY • STALKING • MOLESTATION AWARENESS • An individual first realizes that they have a sexual interest in children. • Gather as much information as possible on the subject in an attempt to understand his feelings. • In this early stage, the Internet provides access to a variety of information sources to online chats with other individuals who may have similar interests. FANTASY • The individual uses the research that has been collected as a source for sexual fantasizing and stimulation. • Eventually, the fantasy becomes more fixated, with an emphasis on child pornography. STALKING • Fantasy is no longer enough, the individual is now compelled to seek closeness to actual children. • The child predator will loiter at athletic events, parks, playgrounds, school bus stops, and other locations where children are found and may seek positions of trust in order to have access to children. • Hardcore child pornography plays an important role at this stage. The individual progresses from online chats with others with the same interests to chats with potential victims. He may send them photos of himself in sexual poses and request similar sexual photos in return. MOLESTATION • The individual molests a child. The predator using a computer sets up a meeting with the child, the meeting may lead either to a seduction or to abduction of the child. • Understanding these behavioral patterns can help you structure the investigation and predict what and how much material evidence a computer is likely to yield. • Be aware that an individual child predator may demonstrate all, some, or even none of these behaviors. Lack of evidence of the sequence of behaviors described above does not in itself clear a suspect. Offender Types • For classroom purposes, there are two types of Child Sex Offenders: –Situational Sex Offender –Preferential Sex Offender Sex Offenders Situational Offender Preferential Offender Situational Sex Offender • Does not have a true preference for a child as a sex partner • Victim is incidental, rather than targeted Situational Sex Offender • Sex offense may be part of another crime – residential burglary – carjacking, robbery • Unlikely to have multiple child victims in their past Preferential Sex Offenders • True preference for sexual contact with children • Will usually have multiple victims in their lifetime Preferential Sex Offenders • Will go to great lengths to gain access to children –Employment –Volunteerism –Marriage • Will socialize with children Preferential Sex Offenders • Highly motivated to commit sex crimes • High rate of recidivism Preferential Sex Offenders • Sexual fantasies focusing on children –May engage in photographing or videotaping children (sexual & non-sexual situations) Preferential Sex Offenders –May engage in collecting, producing or trading child pornography or child erotica Preferential Sex Offenders –May use computers as a tool to facilitate their sexual interest in children STRANGER SEX OFFENDER • Contact through –Confrontation –Threats –Physical Force Stranger Abduction INTRA-FAMILIAL SEX OFFENDER • Contact through –Private access –Family authority ACQUAINTANCE SEX OFFENDER • Contact through –Seduction process –Embarrassment –Gaining the parents trust COMPUTER SEX OFFENDER • Adolescent / Adult –Impulsive/Curious-new sexual opportunities –Morally Indiscriminate power/anger motivated –Profiteers Child Victim Issues and Interviews “One of the greatest challenges a police officer may encounter may be the interview of a child about events they have experienced or witnessed. The goal of an investigative interview is to obtain a factual statement from the child. In recent years, highlighted through court cases, media and literature, child interviews conducted by professionals in which children were victims or witnesses of crimes have been criticized for the use of poor interviewing techniques that could be cause for suggestibility.” Katie Connell, LMSW, ACSW, Child Interview Specialist The Compliant Teen Victim • Children who cooperate in their victimization • Reluctantly going along with the sexual contact in order to receive other benefits Victim Issues • Child may feel some responsibility for their victimization • Some children are actively seeking out relationships online Victim Issues • Victim interview – Traditional problems encountered in interviewing children – Child may know more than investigator about computers Victim Issues • Child may fear punishment for their behavior and not report victimization or solicitation – Disobeying parents’ rules – Viewing pornography • Child may fear losing computer access Victim Issues • Child has to deal with the fact that if their image was uploaded to the Internet, it will never be recovered The Compliant Teen Victim • Active participation in a relationship that is not perceived to be victimization • Sympathy for victims is inversely proportional to their age and sexual development COMPLIANT VICTIMS Control through seduction/grooming results in: • Initial cooperation • Decreases in likelihood of disclosure • Increase ongoing cases What the Parent’s Response Might Be… • Denial of clear evidence • Anger and rage • May minimize, de-emphasize or de-sexualize the involvement of their child • Concerned about the publicity of their child’s experience • Embarrassment may prevent them from disclosing child’s victimization or from seeking counseling Parent Contact • Parent tells you their child is communicating with an adult/stranger on the computer. • Can you search the computer if parent gives you consent? • What will your course of action be? Parent Contact • Parent gives you permission to assume child’s identity. BEWARE!!! Victim Outcry • Child states they are being sexually abused. • Be aware that the offender may have used a camera, computer, web-camera, cellular phone or some other electronic device to document the abuse. Producing Child Sexual Abuse Images. Social Networking • • • • • • Facebook MySpace Chat Roulette Tiny Chat 6.Rounds And Others Social Networking Sites • What’s it all about? • Know the terminology – Blog – (web log) online journal – Blast – quick communication with friends – Photos – Allow viewing of photos – Reviews – Rate local businesses – Friends – Show your linked friends – Lists – Share your lists of music, etc. – Groups – Share your group lists Social Networking Sites Allow children to post personal information, location, photos, etc. Allow offenders access to this information Social Networking • Evil of Social Networking: Luring and enticement of minors Cyberbullying, cyberstalking and harassment Convicted sex offenders frequent MySpace.com Underage users to set up accounts Identity Theft Copyright Violations FaceBook FaceBook.com • Was the most popular place on the Internet for people to network • Other networking websites include: My Space MyYearbook LiveJournal Bebo There are currently over 350 social networking sites. Check out http://en.wikipedia.org/wiki/List_of_social_networking_websites For the complete list, including the current user numbers. Facebook Currently has it’s messenger service incorporated into Facebook. Now has: • WhatsApp – Messenger service • Instagram – Messenger service FaceBook MySpace.com – MySpace.com also is another popular site in the United States. – Logs 4.5% of all website visits – MySpace.com employs 300 people – MySpace.com reports over 500 million unique members as of January, 2009 – MySpace is an ad-supported site AND HAS NO AGE VERIFICATION!! Actual 12 Year Old Girl Chat Rooms • Consider them local newspaper • Classified section – “Where to go to find things by interest” Chat Roulette Chat Roulette Created by Andry Ternoskiy 17 years old male from Russia Chat Roulette Chat Roulette Chat Roulette Chat Roulette TinyChat 6.Rounds Nasty Space Time Spent Playing Video Games and Parental Control School age children (both girls and boys) spend an average of 7 hours per week playing video games. Parental supervision of children’s video game use is almost absent. 90 percent of youths surveyed reported their parents never checked the ratings of video games before allowing them to purchase them. Video Games Blogs Twitter • Social Networking / Micro blogging • 140 characters max. • Called Tweets. Twitter • High School Confessions. • College Confessions. Yik Yak Reddit Reddit POKED APP • Can send pics, video’s and messages. • They last 3 to 10 seconds then automatically are deleted. • OR ARE THEY! SnapChat SnapChat • User either agrees their over 13 yoa or under 13. • No verification of age. • Snap aka image can last from 1 to 10 seconds. • If receiver takes screen shot of image, sender is notified. SnapChat • If receiver opens image, it’s deleted from server. If not opened will remain for 30 days. • No IP address, phone number etc. is captured. • No EXIF date of image is available. SnapChat • SnapKids is for 13 yoa and under. • Cannot send images Privacy By Design • Accounts private by default • Only possible to send snaps to someone using their username or phone number • No personal information or messaging for children under 13 • Full names not collected • No location tracking • Permission obtained when features are accessed “just-in-time notifications” Data Available • Subscriber information – – – – Snapchat username Account creation date and time Email address (optional) Phone Number (optional) • Log of previous Snaps and Stories sent and received – Sender/Recipient – Time sent, received, opened, screenshot taken – Type of content (image or video) • Content of unopened Snaps – If less than 30 days old and not opened by recipient • Content of unexpired Stories Subpoena Including grand jury subpoenas, administrative subpoena or civil investigative demand pursuant to 18 U.S.C. § 2703(c)(2); court order issued in accordance with 18 U.S.C. § 2703(d); or a federal or state search warrant. Court order Pursuant to 18 U.S.C. § 2703(d) or a federal or state search warrant. Search warrant Federal or state search warrant. Help When It’s Needed • Support webpage provides immediate information • Comprehensive abuse and safety policies • Trained support team • Dedicated safety@snapchat.com email address • Automated triage of abuse and safety related emails • Snapchat Guide for Parents • Law Enforcement Guide Preservation Requests • Account must currently be active (not deleted) • Subscriber information and log of previous Snaps and Stories preserved for 90 days • Pursuant to requests made under 18 U.S.C. § 2703(f) Emergency Requests • • • Pursuant to 18 U.S.C. §§ 2702(b)(8) and 2702(c)(4) Emergencies in which the danger of death or serious physical injury requires the immediate disclosure of information Written request on law enforcement department letterhead Contact safety@snapchat.com lawenforcement@snapchat.com • Questions • Legal Process • Requesting Law Enforcement Guide Another APP. Wikitude.com Layar Advertisement • Backpage • Craigslist • Others CraigsList CraigsList • Utilities and forms needed – FireShot or Camtasia – Opanda (Free product IEXIF2.3 How Craigslist Works • www.craigslist.org OR www.craigslist.com • Online classified ads forum – Allows you to search and post ads in nearly every major U.S. city – Canada, Europe, Asia, Middle East How Craigslist Works (cont) • The website is broke down in: – Sections – Categories – Subcategories • Important to understand the abbreviations of a subcategory How Craigslist Works (cont’d) • ‘Personals’ section is heavily used for illegal activity • ‘Erotic Services’ created controversy for the site – Although now shut down – ‘Casual Encounters’ and ‘Misc Romance’ are where we direct efforts Posting to Craigslist • Free to post – Brokered apartments, job listings, therapeutic services • An email address is required to post an ad – CL is often requiring a verified phone number with certain types of posting – CL has begun to accept VOIP phone numbers • No limit on number of postings – CL has begun to target spammers • Every post can contain up to 24 photos • Poster can choose to list additional contact information within the post Posting to Craigslist (cont) • A computer is not required – Cell phones with Internet access – Applications on smart phones • Majority of classified postings expire after 45 days – The following cities have a 7-day expiration • Boston, Los Angeles, New York, Portland, Sacramento, San Diego, Seattle, San Francisco, Washington DC Posting to Craigslist (cont’d) • Posters can add additional or specified locations • There is not a verification process for listed information Posting to Craigslist (cont’d) • Any posting can be “flagged” by other users or Craigslist • The poster will receive an email notification if post has been flagged Posting to Craigslist (cont’d) • Reasons a post can be flagged – Miscategorized - wrong category/site, discusses another ad, otherwise misplaced – Prohibited - violates craigslist Terms of Use or other posted guideline – Spam - posted too frequently, in multiple cities/categories, or is too commercial Posting to Craigslist (cont’d) • CL does “restrict” the advertisement of the following items: – Weapons, alcohol, drugs, hazardous materials, illegal telecommunication equipment, counterfeit currency, gambling items, enticement of minors Posting to Craigslist (cont’d) • Previous method of communication – CL acts as the “middle man” on the initial communication • CL creates an email address within the post • Subsequent email communication takes place outside of Craigslist • Important to not bypass the “middle man” process Posting to Craigslist (cont’d) • In February 2013, Craigslist began “2-way email relay” for communication – It poses issues for the investigator – Email communication does not migrate away from Craigslist • Keeping the email address hidden from both parties – Communication can continue even if the original ad has been removed • Up to 6 months Browsing Craigslist • No account is required to browse Craigslist – No age verification to enter certain parts of the site – Banner posted before entering ‘Casual Encounters’ Browsing Craigslist (cont’d) • Newest postings always appear at the top – Post will also reflect if pictures are included within post • Browsed postings are highlighted – Check settings in your browser Browsing Craigslist (cont’d) Browsing Tips • Start your browsing or search by choosing a category – Casual Encounters – Misc Romance • Then choose subcategory Information Captured by CL • The most important piece of information on any Craigslist ad is the posting ID • Craigslist captures and retains the IP address associated with all postings – Including verified phone number – CL is also retaining photos included with every post (with a 2 month retention period) • Starting from the time the post expires or is flagged Craigslist Contact Information • Administrative Subpoena / Search Warrant will be accepted by fax, email, or mail – Quicker to have the results emailed to you • Fax – 415-504-6394. Attention: Custodian of Records • Email – legal@craigslist.org (please send request as a PDF) • Mail – Craigslist – 1381 9th Avenue San Francisco, CA 94122. Attention: Custodian of Records 3D Chat Areas SecondLife There IMVU IMVU Second Life Watch Movies With Friends You Can Have a Relationship You Can Get Married You Can Go On A Honeymoon You Can Have a Baby You Can Adopt a Child Or….Create a Child Avatar Amber’s World You wants to take a tour of Amber’s World? Search Engines BLOG and SOCIAL NETWORKING SITE SCREEN NAME and PROFILE SEARCHES. • • • • • Techorati.com Chacha.com PiPL.com .nvls-lpr.com RLEX Know Where They Are • Know their daily habits • Know their friends • Check in with them • Have them check in with you • Be involved in their activities Their Safety: Your #1 Concern Communicate With Your Children Know Where They Are • Know their daily habits • Know their friends • Check in with them • Have them check in with you • Be aware of their activities Source: National Center for Missing & Exploited Children. Know The Rules…General Parental Tips to Help Keep Your Children Safer. Copyright © 2000. Know Where They Are • Know their daily habits • Know their friends • Check in with them • Have them check in with you • Be aware of their activities ONLINE Source: National Center for Missing & Exploited Children. Know The Rules…General Parental Tips to Help Keep Your Children Safer. Copyright © 2000. Detective Richard Love (Retired) Fort Lauderdale Police Department. Former Consultant for the FBI Crimes Against Children Unit Miami, Florida