View Presentation Materials

Transcription

View Presentation Materials
Technology Crimes Against Children
and
The Risk They Face
Detective Richard Love (Retired)
Former Consultant FBI Crimes Against Children Unit
Pres/CEO National Crimes Against Children Training Alliance
Objectives and Goals
•
•
•
•
Offender Typology
Child Victim Issues.
Understanding Social Networking Sites.
On-Line Advertisements.
Challenges We Face
• Identify and apprehend predators operating in
a constantly changing technically complex
environment.
• Facilitate a successful prosecution with a
thorough investigation to prevent further
victimization.
• Identify children who have been sexually
exploited by predators.
• Serve as a conduit to a variety of resources to
aid victims and their families with their
recovery.
These are NOT Victimless
Crimes!
• Never lose sight of the fact that these are violent
crimes involving real children.
• The abuse suffered by these children will live
within them every day of their lives and is
repeated every time an image of their
victimization is distributed.
Challenges to
Criminal Justice Agencies
• To protect children from sexual
abuse and exploitation by
offenders
67% of all victims
of reported sexual
assaults were
younger than 18
1
1Howard
N. Snyder. Sexual Assault of Young Children as Reported to
Law Enforcement: Victim, Incident, and Offender Characteristics.
Washington, DC: National Center for Juvenile Justice, July 2000,
page 2.
Victims in Internet-initiated crimes were young teens
35%
30%
27%
26%
23%
25%
20%
14%
15%
8%
10%
5%
1%
0%
1
3
4
5
University of N.H. CACRC
2005
6
7
8
9 10 11 12 13 14 15 16 17
Age
Offender Types
Offender Types
• WHO ARE THEY
–Stranger Sex Offender
–Family Sex Offender
–Acquaintance Sex Offender
–Computer Offender
FOUR STEPS OF DEVELOPMENT
• AWARENESS
• FANTASY
• STALKING
• MOLESTATION
AWARENESS
• An individual first realizes that they have a sexual
interest in children.
• Gather as much information as possible on the
subject in an attempt to understand his feelings.
• In this early stage, the Internet provides access to a
variety of information sources to online chats with
other individuals who may have similar interests.
FANTASY
• The individual uses the research that
has been collected as a source for
sexual fantasizing and stimulation.
• Eventually, the fantasy becomes more
fixated, with an emphasis on child
pornography.
STALKING
• Fantasy is no longer enough, the individual is now
compelled to seek closeness to actual children.
• The child predator will loiter at athletic events,
parks, playgrounds, school bus stops, and other
locations where children are found and may seek
positions of trust in order to have access to children.
• Hardcore child pornography plays an important role
at this stage. The individual progresses from online
chats with others with the same interests to chats
with potential victims. He may send them photos of
himself in sexual poses and request similar sexual
photos in return.
MOLESTATION
• The individual molests a child. The predator using a
computer sets up a meeting with the child, the
meeting may lead either to a seduction or to
abduction of the child.
• Understanding these behavioral patterns can help
you structure the investigation and predict what and
how much material evidence a computer is likely to
yield.
• Be aware that an individual child predator may
demonstrate all, some, or even none of these
behaviors. Lack of evidence of the sequence of
behaviors described above does not in itself clear a
suspect.
Offender Types
• For classroom purposes, there are
two types of Child Sex Offenders:
–Situational Sex Offender
–Preferential Sex Offender
Sex Offenders
Situational
Offender
Preferential
Offender
Situational Sex Offender
• Does not have a true preference
for a child as a sex partner
• Victim is incidental, rather than
targeted
Situational Sex Offender
• Sex offense may be part of
another crime
– residential burglary
– carjacking, robbery
• Unlikely to have multiple child
victims in their past
Preferential Sex Offenders
• True preference for sexual
contact with children
• Will usually have multiple
victims in their lifetime
Preferential Sex Offenders
• Will go to great lengths to gain
access to children
–Employment
–Volunteerism
–Marriage
• Will socialize with children
Preferential Sex Offenders
• Highly motivated to commit
sex crimes
• High rate of recidivism
Preferential Sex Offenders
• Sexual fantasies focusing on
children
–May engage in photographing or
videotaping children (sexual &
non-sexual situations)
Preferential Sex Offenders
–May engage in collecting,
producing or trading child
pornography or child erotica
Preferential Sex Offenders
–May use computers as a
tool to facilitate their
sexual interest in children
STRANGER SEX
OFFENDER
• Contact through
–Confrontation
–Threats
–Physical Force
Stranger Abduction
INTRA-FAMILIAL SEX OFFENDER
• Contact through
–Private access
–Family authority
ACQUAINTANCE SEX
OFFENDER
• Contact through
–Seduction process
–Embarrassment
–Gaining the parents trust
COMPUTER SEX
OFFENDER
• Adolescent / Adult
–Impulsive/Curious-new sexual
opportunities
–Morally Indiscriminate power/anger
motivated
–Profiteers
Child Victim Issues and Interviews
“One of the greatest challenges a police officer may
encounter may be the interview of a child about
events they have experienced or witnessed. The
goal of an investigative interview is to obtain a
factual statement from the child.
In recent years, highlighted through court cases,
media and literature, child interviews conducted by
professionals in which children were victims or
witnesses of crimes have been criticized for the use
of poor interviewing techniques that could be cause
for suggestibility.”
Katie Connell, LMSW, ACSW, Child Interview Specialist
The Compliant Teen Victim
• Children who cooperate in their victimization
• Reluctantly going along with the sexual
contact in order to receive other benefits
Victim Issues
• Child may feel some responsibility for their
victimization
• Some children are actively seeking out
relationships online
Victim Issues
• Victim interview
– Traditional problems encountered in
interviewing children
– Child may know more than investigator
about computers
Victim Issues
• Child may fear punishment for their
behavior and not report victimization or
solicitation
– Disobeying parents’ rules
– Viewing pornography
• Child may fear losing computer access
Victim Issues
• Child has to deal with the fact that if
their image was uploaded to the
Internet, it will never be recovered
The Compliant Teen Victim
• Active participation in a relationship
that is not perceived to be victimization
• Sympathy for victims is inversely
proportional to their age and sexual
development
COMPLIANT VICTIMS
Control through seduction/grooming results in:
• Initial cooperation
• Decreases in likelihood of disclosure
• Increase ongoing cases
What the Parent’s Response Might Be…
• Denial of clear evidence
• Anger and rage
• May minimize, de-emphasize or de-sexualize the
involvement of their child
• Concerned about the publicity of their child’s experience
• Embarrassment may prevent them from disclosing child’s
victimization or from seeking counseling
Parent Contact
• Parent tells you their child is communicating with
an adult/stranger on the computer.
• Can you search the computer if parent gives you
consent?
• What will your course of action be?
Parent Contact
• Parent gives you permission to assume
child’s identity.
BEWARE!!!
Victim Outcry
• Child states they are being sexually abused.
• Be aware that the offender may have used
a camera, computer, web-camera, cellular
phone or some other electronic device to
document the abuse. Producing Child
Sexual Abuse Images.
Social Networking
•
•
•
•
•
•
Facebook
MySpace
Chat Roulette
Tiny Chat
6.Rounds
And Others
Social Networking Sites
• What’s it all about?
• Know the terminology
– Blog – (web log) online journal
– Blast – quick communication with friends
– Photos – Allow viewing of photos
– Reviews – Rate local businesses
– Friends – Show your linked friends
– Lists – Share your lists of music, etc.
– Groups – Share your group lists
Social Networking Sites
Allow children to post personal information,
location, photos, etc.
Allow offenders access to this information
Social Networking
• Evil of Social Networking:
Luring and enticement of minors
Cyberbullying, cyberstalking and harassment
Convicted sex offenders frequent MySpace.com
Underage users to set up accounts
Identity Theft
Copyright Violations
FaceBook
FaceBook.com
• Was the most popular place on the Internet for people
to network
• Other networking websites include:
My Space
MyYearbook
LiveJournal
Bebo
There are currently over 350 social networking sites.
Check out
http://en.wikipedia.org/wiki/List_of_social_networking_websites
For the complete list, including the current user numbers.
Facebook
Currently has it’s messenger service
incorporated into Facebook.
Now has:
• WhatsApp – Messenger service
• Instagram – Messenger service
FaceBook
MySpace.com
– MySpace.com also is another popular site in the
United States.
– Logs 4.5% of all website visits
– MySpace.com employs 300 people
– MySpace.com reports over 500 million unique
members as of January, 2009
– MySpace is an ad-supported site
AND HAS NO AGE VERIFICATION!!
Actual 12 Year Old Girl
Chat Rooms
• Consider them local newspaper
• Classified section – “Where to go
to find things by interest”
Chat Roulette
Chat Roulette
Created by Andry Ternoskiy
17 years old male from Russia
Chat Roulette
Chat Roulette
Chat Roulette
Chat Roulette
TinyChat
6.Rounds
Nasty Space
Time Spent Playing Video Games
and Parental Control
School age children (both girls and boys)
spend an average of 7 hours per week
playing video games.
Parental supervision of children’s video
game use is almost absent.
90 percent of youths surveyed reported
their parents never checked the ratings of
video games before allowing them to
purchase them.
Video Games
Blogs
Twitter
• Social Networking / Micro blogging
• 140 characters max.
• Called Tweets.
Twitter
• High School Confessions.
• College Confessions.
Yik Yak
Reddit
Reddit
POKED APP
• Can send pics, video’s and messages.
• They last 3 to 10 seconds then automatically
are deleted.
• OR ARE THEY!
SnapChat
SnapChat
• User either agrees their over 13 yoa or under
13.
• No verification of age.
• Snap aka image can last from 1 to 10 seconds.
• If receiver takes screen shot of image, sender
is notified.
SnapChat
• If receiver opens image, it’s deleted from
server. If not opened will remain for 30 days.
• No IP address, phone number etc. is captured.
• No EXIF date of image is available.
SnapChat
• SnapKids is for 13 yoa and under.
• Cannot send images
Privacy By Design
• Accounts private by default
• Only possible to send snaps to someone using
their username or phone number
• No personal information or messaging for
children under 13
• Full names not collected
• No location tracking
• Permission obtained when features are accessed
“just-in-time notifications”
Data Available
• Subscriber information
–
–
–
–
Snapchat username
Account creation date and time
Email address (optional)
Phone Number (optional)
• Log of previous Snaps and Stories
sent and received
– Sender/Recipient
– Time sent, received, opened,
screenshot taken
– Type of content (image or video)
• Content of unopened Snaps
– If less than 30 days old and not
opened by recipient
• Content of unexpired Stories
Subpoena
Including grand jury subpoenas, administrative
subpoena or civil investigative demand pursuant to
18 U.S.C. § 2703(c)(2); court order issued in
accordance with 18 U.S.C. § 2703(d); or a federal
or state search warrant.
Court order
Pursuant to 18 U.S.C. § 2703(d) or a federal or
state search warrant.
Search warrant
Federal or state search warrant.
Help When It’s Needed
• Support webpage provides immediate
information
• Comprehensive abuse and safety policies
• Trained support team
• Dedicated [email protected] email address
• Automated triage of abuse and safety related
emails
• Snapchat Guide for Parents
• Law Enforcement Guide
Preservation Requests
• Account must currently be active (not deleted)
• Subscriber information and log of previous Snaps and Stories
preserved for 90 days
• Pursuant to requests made under 18 U.S.C. § 2703(f)
Emergency Requests
•
•
•
Pursuant to 18 U.S.C. §§ 2702(b)(8) and 2702(c)(4)
Emergencies in which the danger of death or serious physical injury requires the
immediate disclosure of information
Written request on law enforcement department letterhead
Contact
[email protected]
[email protected]
• Questions
• Legal Process
• Requesting Law Enforcement Guide
Another APP.
Wikitude.com
Layar
Advertisement
• Backpage
• Craigslist
• Others
CraigsList
CraigsList
• Utilities and forms needed
– FireShot or Camtasia
– Opanda (Free product IEXIF2.3
How Craigslist Works
• www.craigslist.org OR
www.craigslist.com
• Online classified ads
forum
– Allows you to search and
post ads in nearly every
major U.S. city
– Canada, Europe, Asia,
Middle East
How Craigslist Works (cont)
• The website is broke down in:
– Sections
– Categories
– Subcategories
• Important to understand the abbreviations of
a subcategory
How Craigslist Works (cont’d)
• ‘Personals’ section is
heavily used for illegal
activity
• ‘Erotic Services’ created
controversy for the site
– Although now shut
down
– ‘Casual Encounters’ and
‘Misc Romance’ are
where we direct efforts
Posting to Craigslist
• Free to post
– Brokered apartments, job listings, therapeutic services
• An email address is required to post an ad
– CL is often requiring a verified phone number with certain
types of posting
– CL has begun to accept VOIP phone numbers
• No limit on number of postings
– CL has begun to target spammers
• Every post can contain up to 24 photos
• Poster can choose to list additional contact information
within the post
Posting to Craigslist (cont)
• A computer is not required
– Cell phones with Internet access
– Applications on smart phones
• Majority of classified postings expire after 45
days
– The following cities have a 7-day expiration
• Boston, Los Angeles, New York, Portland, Sacramento,
San Diego, Seattle, San Francisco, Washington DC
Posting to Craigslist (cont’d)
• Posters can add
additional or specified
locations
• There is not a
verification process for
listed information
Posting to Craigslist (cont’d)
• Any posting can be
“flagged” by other users
or Craigslist
• The poster will receive
an email notification if
post has been flagged
Posting to Craigslist (cont’d)
• Reasons a post can be flagged
– Miscategorized - wrong category/site, discusses
another ad, otherwise misplaced
– Prohibited - violates craigslist Terms of Use or
other posted guideline
– Spam - posted too frequently, in multiple
cities/categories, or is too commercial
Posting to Craigslist (cont’d)
• CL does “restrict” the advertisement of the
following items:
– Weapons, alcohol, drugs, hazardous materials,
illegal telecommunication equipment, counterfeit
currency, gambling items, enticement of minors
Posting to Craigslist (cont’d)
• Previous method of communication
– CL acts as the “middle man” on the initial
communication
• CL creates an email address within the post
• Subsequent email communication takes place outside
of Craigslist
• Important to not bypass the “middle man” process
Posting to Craigslist (cont’d)
• In February 2013, Craigslist began “2-way
email relay” for communication
– It poses issues for the investigator
– Email communication does not migrate away from
Craigslist
• Keeping the email address hidden from both parties
– Communication can continue even if the original
ad has been removed
• Up to 6 months
Browsing Craigslist
• No account is required to browse Craigslist
– No age verification to enter certain parts of the
site
– Banner posted before entering ‘Casual
Encounters’
Browsing Craigslist (cont’d)
• Newest postings always
appear at the top
– Post will also reflect if
pictures are included
within post
• Browsed postings are
highlighted
– Check settings in your
browser
Browsing Craigslist (cont’d)
Browsing Tips
• Start your browsing or
search by choosing a
category
– Casual Encounters
– Misc Romance
• Then choose
subcategory
Information Captured by CL
• The most important piece of information on
any Craigslist ad is the posting ID
• Craigslist captures and retains the IP address
associated with all postings
– Including verified phone number
– CL is also retaining photos included with every
post (with a 2 month retention period)
• Starting from the time the post expires or is flagged
Craigslist Contact Information
• Administrative Subpoena / Search Warrant will be
accepted by fax, email, or mail
– Quicker to have the results emailed to you
• Fax
– 415-504-6394. Attention: Custodian of Records
• Email
– [email protected] (please send request as a PDF)
• Mail
– Craigslist – 1381 9th Avenue San Francisco, CA 94122.
Attention: Custodian of Records
3D Chat Areas
SecondLife
There
IMVU
IMVU
Second Life
Watch Movies With Friends
You Can Have a Relationship
You Can Get Married
You Can Go On A Honeymoon
You Can Have a Baby
You Can Adopt a Child
Or….Create a Child Avatar
Amber’s World
You wants to take a tour of Amber’s World?
Search Engines
BLOG and SOCIAL NETWORKING SITE SCREEN
NAME and PROFILE SEARCHES.
•
•
•
•
•
Techorati.com
Chacha.com
PiPL.com
.nvls-lpr.com
RLEX
Know Where They Are
• Know their daily habits
• Know their friends
• Check in with them
• Have them check in with you
• Be involved in their activities
Their Safety: Your #1 Concern
Communicate With Your
Children
Know Where They Are
• Know their daily habits
• Know their friends
• Check in with them
• Have them check in with you
• Be aware of their activities
Source: National Center for Missing & Exploited Children. Know The
Rules…General Parental Tips to Help Keep Your Children Safer. Copyright ©
2000.
Know Where They Are
• Know their daily habits
• Know their friends
• Check in with them
• Have them check in with you
• Be aware of their activities ONLINE
Source: National Center for Missing & Exploited Children. Know The
Rules…General Parental Tips to Help Keep Your Children Safer. Copyright ©
2000.
Detective Richard Love (Retired)
Fort Lauderdale Police Department.
Former Consultant for the FBI Crimes
Against Children Unit Miami, Florida