© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ 07458 Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Modus Operandi.

Slides:



Advertisements
Similar presentations
Forensic Victimology 2nd Edition
Advertisements

By: Kristie Nakamura, Liz Campos, Katreina Gamil, & Lawrence Leung
Internet Safety 9th Grade Health.
Chapter 7 Resolving Conflicts and Preventing Violence Lesson 3
Safe Touch Middle School Grades 6-8
Forms of Cyberbullying
19 Sexual Health Centre 28 Richmond Street Saint John, N. B
Resolving Conflicts & Preventing Violence
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
INTERNET SAFETY and Social Networking
Intermediate Grades 3-5 Safe Touch Material for this presentation was attained from West County Psychological Associates© PowerPoint presentation created.
Livingston Police Department. What is a Stranger?  A stranger is someone your child does not know well.  Make sure your child doesn’t think that only.
Interviewing Elders Chapter 8.
1 Confessions Chapter 11. Smart Talk: Contemporary Interviewing and Interrogation By Denise Kindschi Gosselin PRENTICE HALL ©2006 Pearson Education, Inc.
 The average pedophile will commit 117 sexual crimes in their lifetime.  According to the U.S. Justice Department, 33% or girls & 14% of boys are sexually.
Interviewing and Interrogation
Cyberbullying: Crossing the Line 8th Grade September 27, 2011
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Faux Paw Internet Safety Training Miami Dade County Public Schools Division of Physical Education and Health Literacy.
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
CJ 316 CJ 316 Investigating Cybercrime
Safe Environment Education Grades 4-6 Growing Up Healthy!
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
IntroductionIntroduction Lesson 2: Risky Online Relationships The Internet thrives because people want to share with, learn from, and respond to others.
Sexting Definition: The act of sending, receiving or forwarding sexually explicit messages or photos electronically, primarily between cell phones, but.
U U nderstand the need for being safe in the cyber community - just like your physical community. U U nderstand how predators typically approach kids.
PLAYING IT SAFE (6A.1) S ___ ___ N ___ G ___ ___ A ___ ___ ___ T ___ ___ ___ S ___ ___ ___ ___ ___ ___ B ___ B ___ ___ ___ ___ ___ ___ ___.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
MR. PRALL Harmful Relationships. This PowerPoint will focus on harmful relationships. It includes profiles of teens who relate in harmful ways, reasons.
Jenna’s Law House Bill 1041 Jenna’s Law  What is sexual abuse? Any sexual act between an adult and a minor ▪OR between two minors when one has “POWER”
Educating the Community About Sexual Assault and About a Comprehensive Approach to the Management of Sex Offenders in the Community.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
It’s a Big Deal. ‘It’s a Big Deal’  If a photo is sent to you, do not send it to other people.  If you receive a photo from someone you.
CHAPTER 5 SECTION 3 Sexual Abuse and Violence. Sexual Abuse Sexual abuse- is any sexual act without consent  Kissing  Fondling  Forced intercourse.
Abuse & Violence Why What How When. Just by looking, can you tell who has been abused? Nearly five children die every day in America from abuse and neglect.
Why should any form of sexual abuse be reported to the police?
Copyright © 2012, 2009, 2006, 2001, 1997 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved 0 Criminology: A Sociological.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Week 7 Cyber Crimes Investigating High-Tech Crime By Michael Knetzger and Jeremy.
Predator Identification Internet Safety Awareness.
© 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did.
CHAT ROOMS What Makes Them Dangerous And How YOU Can Make Them Safe! MARY B. CONYERS PROTECT EVERYCHILD P. O. Box 749, Knightdale, NC
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Unit 4 Auction Fraud & Child Pornography The use of the Internet in an online.
PRENTICE HALL ©2005 Pearson Education, Inc. Criminal Analysis: Crime Prevention and Intervention Strategies Criminal Investigative Analysis: Child Predators.
By: Daniella Berezin, Dylan Ahadov, Noah Tapiero Child Predators.
By Janis Fishman and Anna Shin CHILD PREDATORS ONLINE.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Public Safety Committee September 28, 2015 David O. Brown Chief Of Police Operation Brick and Mortar 1.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
All of you probably heard about the death of the youth named Danny. The police found out that he was a street gang member who took part in a Russian Roulette.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Connecting.
Called To Serve Session 2 Please the arrow keys to navigate forward and backward.
T HINK ! Before You Post A lesson on Internet Safety Source:
Will Howard 8 th Grade. I am presenting this because I want people to learn the causes about sexting.
QUESTION… Is the internet bad?. GOODBad News/Finances Homework Research Shopping Games Education Sports Travel Entertainment Genealogy Pornography.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
PEDOPHILIA JASON- A SICK F*** ZACH-CHILD LOVER JENNIE- A PERSON THAT DOESN’T UNDERSTAND WHAT’S WRONG GABY- OBSESSION WITH CHILDREN AS SEX OBJECTS.
DOMESTIC VIOLENCE Domestic violence is abuse that happens between members of the same family or persons involved in a close relationship: husband/wife;
It’s a Big Deal SEXTING. ‘It’s a Big Deal’
 Sexual assault  Incest  Child abuse  Child pornography  Human Trafficking  Rape *If you are uncomfortable… please let me know and you can step.
Grooming is a process used to prepare a child for sexual abuse. The aim is to gain access to a child and build a relationship with that child. Grooming.
Sex Abuse and Dating Violence
Sharing Images – The Law
Tips and Information for Parents
Predator Identification
Sexualized Behaviors in Children and Teens
Erin’s Law NMS Student Presentation
What do you see??.
Erin’s Law FMS Student Presentation
Presentation transcript:

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Modus Operandi of the Predatory Pedophile In the days before the Internet, pedophiles had no choice but to try and approach potential victims in person. They could, for example, park their vehicles near a school, playground, or other area that children frequent and try to get a victim’s attention by asking directions, needing help, passing out candy, or doing something else likely to draw attention from a child without arousing general alarm.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Traditional Methods of the Pedophile Pedophiles have also traditionally tended to look for vocations that allow them the advantages of working with children and having a position of trust and responsibility. There have been many examples of this activity in recent years, with numerous stories on predatory teachers, clergy, athletics coaches, and even police officers.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Traditional Methods of the Pedophile, con’t. In addition to having occupations that imply trust, these occupations also have another advantage for a would-be pedophile — a perception of power or control. In the case of clergy, the belief that the clergy member is doing God’s work can be a very powerful force in motivating a naïve youngster to do as the offender says. Likewise, with a teacher or police officer, there is a certain aura of power or authority, and the victim may fear repercussions in the form of bad grades, being kicked out of school, or even being arrested.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Traditional Methods of the Pedophile, con’t. Further, the offender may take advantage of victims’ perception of inferiority by making threats or telling them that no one would believe them over a “respected” police officer, teacher, etc. Add to all of that the constant lessons that kids should listen to and respect adults, and the child victim is in a very vulnerable position.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Grooming Victims In addition to exercising their positional superiority, pedophiles make use of another technique of preparing their victims. This process of breaking down a victim’s barriers or objections is called grooming the victim. This is not grooming in the traditional sense, e.g., combing hair or brushing teeth. Grooming, in this sense, is the process of preparing a victim and overcoming a victim’s sense of right and wrong and lowering his or her inhibitions against a sexual act.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Grooming Victims, con’t. For example, if a sex offender is looking to have sexual intercourse with a young child, he or she may show that child numerous images of child pornography in order to desensitize the child. The offender will then appeal to the child’s naïve logic and say something like, “It can’t be wrong if they are all doing it.”

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Grooming Victims, con’t. In the case of an older victim, the offender may show images or videos of other teens engaged in sexual conduct. It is widely believed that pornography desensitizes the pedophile as well, and this can actually cause a cycle of pedophilia, similar to a narcotics addiction. Offenders will eventually believe that there is nothing wrong with their pedophilia if desensitized enough. Some offenders even believe that they are just more enlightened than the rest of society in regards to sexual relations with children.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Online Predation and Child Enticement Pedophiles operate online in a wide variety of ways, and the online mechanism of anonymous communications can be a very powerful ally. Online child enticement statistics are truly frightening and demonstrate that this type of activity has tremendously increased. Studies have estimated that approximately 1 out of every 5 children 10 to 17 years old received an unwanted sexual solicitation within the past year (Office of Juvenile Justice and Delinquency Prevention, 2001).

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Online Predation and Child Enticement, Con’t. In the past, a pedophile would have to go to a park or school and try to talk to a child in person. Think of fishing with one fishing pole in a local stream. Now, compare that to talking to hundreds of different kids every day in an online chat room, relatively anonymously. This would be similar to casting a wide commercial fishing net into a large inland lake. Sex offenders may get so many potential victims to respond that they may have to actually work to filter their choices to a more manageable number before determining which victims they will try to meet in the real world.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Online Predation and Child Enticement, Con’t. The larger pool of potential victims and the feeling of anonymity will likely embolden pedophiles and exacerbate the problem of child enticement and sexual assault. Emboldened pedophiles online also have one other advantage — they can gradually introduce themselves to younger children. In person, it is obvious right away that they are much older than their victim, or “scary looking,” or perhaps even physically unattractive. Online, they can portray whatever persona they devise using names and photos they choose. A male pedophile who likes teenage boys could even pose as an attractive female online.