Introduction to Undercover Operations

Transcription

Introduction to Undercover Operations
MISSING AND EXPLOITED
CHILDREN
TRAINING & TECHNICAL
ASSISTANCE PROGRAM
An Overview of Technology Used in
Child Exploitation Cases
Steve Del Negro, Ret. MA State Police and ICAC Task Force Commander
Webinar Information
This webinar is supported by grant 2014-MC-FX-K046,
provided by the Office of Juvenile Justice and Delinquency
Prevention (OJJDP), and is brought to you by the ICAC
Training & Technical Assistance Program. Points of view or
opinions in this document are those of the author and do not
necessarily represent the official position or policies of the
U.S. Department of Justice or Fox Valley Technical College.
ICAC Training & Technical Assistance is a program of the Fox
Valley Technical College-National Criminal Justice Training
Center (NCJTC).
During the Webinar
• All attendees will be muted.
• If you desire to ask a question, please use the
questions section of the GoToWebinar dialogue
box, typically on the right side of your screen.
• Please do not raise your hand for questions, we
can not unmute you.
• Questions will either be answered directly by a
panelist or asked to the presenter who will
answer.
Poll Questions
• Poll questions may be asked during the
webinar. They are asked so we can better
understand the audience and provide the
most useful information to you.
• As they will only be open a short period of
time, please respond promptly.
Post Webinar Information
•
At the conclusion of the webinar, a short survey will appear. We
ask that you complete the survey in an effort to gather
information to better serve the community in preparation for
future webinars. Please complete it before signing off.
•
You will receive a link to access our law enforcement only webinar
library where you can view the recording and access related
webinar material. Due to the sensitivity of some of the material
you must be a registered law enforcement member of the
NCJTC.org or ICACTaskforce.org websites. If you are not
currently a member, you will need to register for access at
www.ncjtc.org.
An Overview of
Technology
Used in Child
Exploitation Cases
Learning Objectives
• Child Pornography & Child Sexual Assault
• Victims/Offenders characteristics
• Important technologies and concepts
Learning Objectives
• Types of Technology used

Cloud Computing
P2P
Social Networks
Cell Phones
Chat
Ad Services
Technology Facilitated Crimes
Against Children Offenses
• Manufacture, Dist., & Possession of c.p
• Online enticement of children by
sexual predators
• Trafficking of children for sexual
purposes, i.e., prostitution
• Sex tourism
What is Child Pornography?
• Common misconceptions
• Babies and bathtub photos
• 18+ posing as younger children
• In reality
• Evidence of a crime (CSA)
• Type of Child Sexual Exploitation (CSE)
• Child Abuse Images/Videos
Child Sexual Abuse (CSA)
• Most victims do not disclose CSA in
childhood
• Often disclosure is unconvincing, changes
or at risk of recantation
• Often little or no physical evidence of CSA
– depending on nature and timing of
disclosure
Offender Characteristics
Child Pornography Offenses Are a Valid
Diagnostic Indicator of Pedophilia
• “As a group, child pornography offenders showed greater
sexual arousal to children than to adults and differed
from groups of sex offenders against children, sex
offenders against adults, and general sexology patients.
The results suggest child pornography offending is a
stronger diagnostic indicator of pedophilia than is
sexually offending against child victims”
Seto, Cantor and Blanchard in their article in the Journal of Adolescent Psychology -2006
Suggested Reading
Victim Control Through
Technology
• Mobile phone GPS
• Constant texting
• Text message review
• Sexting
• Blackmail
Use of Pornography
•
Adult Pornography
Child Pornography
– Sexual arousal
Sexual arousal
– Sexual contact
Sexual contact
Child Pornography Collectors
Hernandez-Bourke – 2001
# of Victims
Ave. 26.4 VPO
54 Inmates
Child Pornography Collectors
Hernandez-Bourke – 2008 155 Inmates
Victimization
Key Implications for Law Enforcement
Post Hernandez Study
• Child pornographers, with and w/o criminal
records, do molest children
• Child pornography investigations should be
conducted with the goal of identifying and
locating any and all victims
• Suspect interrogations, and other investigative
methods should be utilized to identify victims
What Does That Mean?
• Is he a contact offender?
• High probability he chats online –has multiple
accounts
• High probability he has numerous social
networking sites
• High probability he has been doing this for a
very long time
Computers Appeal to Offenders
•A tool that facilitates their interest in
children
•The sex offender is the target of the
investigation, not the computer
•The investigation must identify the
person who used the computer for
the crime (SODDI Defense)
Technology Appeal to Offenders
• Provides the offender:
✴Unsupervised environment
✴Instant gratification
✴Easy accessibility (storage)
✴Security/Privacy/Speed
✴Enhanced distribution via P2P file sharing
✴“Perceived” Anonymity
Technology Appeal to Offenders
•
Medium for real time communication
✴E-mail
✴Chat Rooms
✴Instant Messages (IM)
✴Social Networking (ie; Facebook)
✴Don’t forget:
★ Mobile phones (text messaging, camera phones)
★ Online games (xbox 360, etc)
★ Virtual Reality (Second Life, WOW)
Technology Appeal to Offenders
• Provides mutual support for their adult-child sex
philosophies
• Allows for rationalization of their behavior
•Gary Hewitt, Psychotherapist
• “The support group sites give pedophiles a real
sense of power and the impetus to go out and
molest someone.”
Why Investigate Child
Pornography?
WHAT’S THE WORRY?
IT’S JUST PICTURES
Victims
Victim Impact Statement – Amy
(MISTY SERIES)
• I am a 19 year old girl and I am a victim of
child sex abuse and child pornography. I am
still discovering all the ways that the abuse and
exploitation I suffer has hurt me, has set my
life on the wrong course, and destroyed the
normal childhood, teenage years, and early
adulthood that everyone deserves.
Victim Impact Statement – Amy
(MISTY SERIES)
• “My uncle started to abuse me when I was only 4
years old.”
• “At first he showed me pornographic movies and
then he started doing things to me.”
• “And I remember the pictures.”
• “There is a lot I don't remember, but now I can't
forget because the disgusting images of what he
did to me are still out there on the internet.”
Victim Impact Statement – Amy
(MISTY SERIES)
• “Every day of my life I live in constant fear that
someone will see my pictures and recognize me
and that I will be humiliated all over again.”
• “I did not choose to be there, but now I am there
forever in pictures that people are using to do
sick things.”
• “It's like I am being abused over and over and
over again.”
Victim Impact Statement – Amy
(MISTY SERIES)
• “I want it all erased.”
•
“I want it all stopped.”
• “But I am powerless to stop it just like I was
powerless to stop my uncle.”
• “thinking and knowing that the pictures of all
this are still out there just makes it worse.”
• “It's like I can't escape from the abuse, now
or ever.”
Victim Impact Statement – Amy
(MISTY SERIES)
• “The truth is, I am being exploited and used
every day and every night…..”
• “How can I ever get over this when the crime
that is happening to me will never end?”
• “How can I get over this when the shameful
abuse I suffered is out there forever and being
enjoyed by sick people?”
• “I am horrified by the thought that other children
will probably be abused because of my pictures.”
Important Technology and
Concept
Cloud Computing
Defining the Cloud
NIST - Cloud computing is a model for enabling
convenient, on-demand network access to a
shared pool of configurable computing resources
(e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and
released with minimal management effort or
service provider interaction.
The Cloud in Layman’s Terms
• Everything we currently do:
✴Email
✴Online Storage
✴Social Networking
✴Peer-Peer File Sharing
✴Chat
Email
Social Networks
P2P
Chat
A Cloud Crime Scene
A Cloud Crime Scene
Cloud vs. Traditional Scenes
• Law enforcement already investigates cloud based
activities like social networks, email, photo posting sites,
web sites, chats, distributing and receiving child
pornography, child enticement and a host of other crimes
against children. These crimes are investigated and
tracked to a suspect using a home computer or mobile
device. These would be the traditional scenes.
• Cloud storage providers are now scanning and reporting
child pornography stored on their servers.
• Search warrants are served on the cloud storage provider
initially.
PhotoDNA
• Microsoft uses NCMEC’s photo hash values as a part of
their hash library.
• Scans and locates images on Onedrive based on PDNA
standard hash values and fuzzy hashes.
• Generates a report to the Cyber TipLine resulting in a
Cybertip to Law Enforcement.
• LE investigates and compares seized evidence to NCMEC
using the fuzzy hash to the original hash. Will not
match up, but the photo does.
Investigative Cloud Concerns
• Questions to ask yourself:
✴How does this effect our investigations?
✴How can we best use them?
✴Would a sex offender use cloud
computing?
✴What are the legal challenges to
investigators?
Emerging Technology
The Good and Bad of Technology
• The good about technology - there is always
evidence
• The bad of technology - it is always changing
• Started with email, chat rooms, instant
messaging
• Now - social networking, mobile devices, Peer to
Peer, cloud computing
Computers
Computers
Cell Phones
Gaming Systems
GPS
Digital Storage Devices
Secure USB Devices
Makes drives invisible on your
PC/Notebook, only seen with SG-key and
password. Lock away your precious files so
NO ONE knows IT exists on your computer.”
iTouch - iPad – Kindle eReaders
Computer Servers
Wireless Multi-Media Devices
Pogoplug
Anonymizing your web surfing
Truly Mobile Devices
iStick
Securedrive
iPotty ?
The Technology
• P2P
• Social Networking
• Chat
• Ad Services
• Cell Phones
Peer to Peer (P2P)
P2P Networks
Some Popular P2P Clients
Packet
I have
it
Packet
Sender
24.21.23.215
Recipient
68.15.23.25
Peer
Packet
I have it
Packet
Peer
Peer
Packet
YOU
Peer
Packet
Search Term
Ultrapeer
I have
it
Packet
Peer
Peer
Packet
I have it
Packet
Peer
Peer
Packet
I have it
Peer
Packet
Packet
72
Scope of the problem P2P 2014
2014 Usage Report
Five P2P Networks
IP’s located sharing files of interest on 03/19/15 @ 1430hrs EDT
Social Networking
Social Networks
Updated 03/01/2015 | eBizMBA
Countless Networks and New ones
Daily
Types of Social Networking Sites
•
General (MySpace, Facebook)
•
Cell Phones (Mocospace)
•
Blogging (livejournal, xanga)
•
Microblogging (Twitter, Jaiku)
•
Students (classmates.com, graduates.com)
•
Religious (holypal, fusion 101, koolanoo,
naseeb)
•
Travel (TravBuddy, WAYN)
•
Cultural (MiGente.com LunarStorm grono.net)
FACEBOOK
Facebook
• 1.3 Billion Worldwide monthly users
• 152 Million daily users in US & Canada
• 54% of the US population
• Type of content?
Facebook Stats
As of 12/14
Facebook Addiction Disorder
(FAD)
In the News
Facebook Uses PDNA
• In 2011, Facebook became the first social
network to partner with Microsoft to use PDNA
to identify and remove images that exploit
children.
Facebook Security
• Facebook allows it’s users to download a copy of their
profile to a zip file that Facebook stores.
• This information can be provided to Law Enforcement in
the event an incident occurs involving a Facebook Profile.
• Parents with access to their child's profile can download
this information and provide a copy to LEA for their
investigation.
• This includes photos, videos, posts, messages, friends lists,
and other content shared with others.
Facebook Archive
Facebook Archive
Demo
Deactivate Account
Technology & Child Sex
Trafficking
• Social Media
• Online escort sites
• Online “dating” sites
“Backpage”
“Adultfriendfinder”
• Mobile device connections
✴Texting + images
Cell Phone Applications
Real-time
• Immediate status
updates
• Broadcast to
followers
and/or the public
• Worldwide
Google+
• Facebook
killer?
• Circles
• Tighter control of
privacy
Twitter
• < 140 characters
• Public by default
• #hashtags
• @mentions
• geolocation
A hashtag allows grouping of similarly
tagged messages, and also allows an
electronic search to return all messages that
contain it.
EX: #WhatToDo
A mention is any Twitter update that
contains "@username" anywhere in the
body of the Tweet. (Yes, this means that
@replies are also considered mentions.)
reference or link to a users profile. EX:
@winston
Geocode
• Twitter Advanced Search
http://twitter.com/search-advanced
geocode:43.2308015,-71.5626055,.5mi
geocode:42.3133734,-71.057157,.5mi
Instagram
• Popular photo sharing
• “Artistic filters”
• Public by default
• Instant uploads
• #hashtags & geolocation
• Bought by Facebook
YikYak
• Location-based
messaging app
• Messages are
anonymous
• Messages expire
• Threats,
cyberbullying,
harassment
• Schools blocked*
WhatsApp
• Instant messaging app
• Groups
• Attachments
Snapchat
• Messaging App
• Text, photos, videos, drawings
• “Snaps” set to expire 1-10 seconds
• Do they really??
• 3rd party apps
Skype
• IM , VOIP, video chat
• Share files
• Web & mobile
Facetime
• iOS popularity
• VIOP, video chat
Viber
• IM & VOIP
• Exchange images, audio, video
• Desktop & mobile apps
Tumblr
• Micro-blogging platform
• Short-form content
• Private or public
• Mobile apps
Pinterest
• Online “pin-board”
• Web & mobile
• Discover, collect, share, store
• Visual bookmark
AirDrop
•No Username needed
•No Phone number needed
•Can share any type of file not just photos
Chat
Chats and more…
• Okcupid
• Teenspot.com
Kidschat.com
• Motherless.com
Chatavenue.com
• KIK Messenger
• Grindr
• Smutvibes.com
Urban Chat
Chatroulette
Omegle
Chathour.com
• Tagged.com
• MOCO
• Adultfriendfinder
IRC
Datehookup.com
Facebook / Instagram
Paltalk
• Chat client very
similar to Yahoo
Messenger
• Offers chat rooms,
instant messages, file
transfers, voice and
video chat
• Free to use basic
features
• Advanced features
require subscription
Kidschat.Net
Mocospace
Ad Services
Craigslist.org
Backpage.com
How Craigslist Works
• www.craigslist.org
OR
www.craigslist.com
• Online classified
ads forum
– Allows you to
search and post ads
in nearly every
major U.S. city
– Canada, Europe,
Asia, Middle East
Posting to Craigslist
• Free to post
– Brokered apartments, job listings, therapeutic services
• An email address is required to post an ad
– CL is often requiring a verified phone number with
certain types of posting
– CL has begun to accept VOIP phone numbers
• No limit on number of postings
– CL has begun to target spammers
• Every post can contain up to 24 photos
• Poster can choose to list additional contact information
within the post
Posting to Craigslist
•Majority of postings expire after 45 days
• In many cities, the post expire after 7 days
• Boston, Los Angeles, New York, Portland,
Sacramento, San Diego, Seattle, San
Francisco, Washington DC
Backpage
• Suspect’s post ads to meet teens
• Escort and prostitution stings
• Victim and suspect rich environment
• Juvenile Prostitution
Backpage.com
Backpage.com
Websites like Backpage.com are ideal for pimps and sex
traffickers because as private companies, they aren’t
required to disclose the advertisement owners’ names. -
Thorn’s National Survey
• Of the domestic minor sex trafficking survivors
participating in Thorn’s national survey:
– 63% were sold via the internet at some point
in their trafficking situation.
– 62% had access to a cell phone while they
were being trafficked.
– 42% had access to the internet while they
were being trafficked.
Motherless.com
Motherless.com
• There is a free area, but must pay to play
in serious abuse section
• Has search function to seek Offenders
Skype Used in Ad
Questions ?
Available Resources