Internet Vulnerability & Criminal Activity

Slides:



Advertisements
Similar presentations
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
Advertisements

Youth and Social Networking Sites Comenius Project
What is Child Sexual Exploitation
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
Sex, Laws and Videos: 21st Century Sex Crimes Use of Recording Devices, Film, Cell Phones, Computers and the Internet Ginger Kimes Staff Attorney Prosecutor.
 The average pedophile will commit 117 sexual crimes in their lifetime.  According to the U.S. Justice Department, 33% or girls & 14% of boys are sexually.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Internet Vulnerability & Criminal Activity 6.2 – 10/10/2011 Child Enticement, Child Molestation, & Sexual Tourism.
SEXUAL VARIANTS, ABUSE AND DYSFUNCTIONS
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Chapter 12 Sexual Variants, Abuse, and Dysfunctions
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Chapter Eighteen Sexually Explicit Materials, Prostitution, and Sex Laws Copyright ©2008 by the McGraw-Hill Companies, Inc.
What are Sexual Disorders? CLASS OBJECTIVES : What is Gender Identity Disorder? What are Paraphilias?
Serial Killers. typically defined as: typically defined as: –An individual who has murdered three or more people over a period of more than a month, with.
SS440: Unit 8 Sexual and Gender Identity Disorders Dr. Angie Whalen 1.
Sexual and Gender Identity Disorders. Gender Identity Disorder The Paraphilias Sexual Dysfunctions.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Copyright ©2008 by the McGraw-Hill Companies, Inc. Chapter Ten Sexual Variations and Paraphilic Behavior.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
By Gail Brenner. The main purpose in this survey is to find out how students use networking sites.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
QUESTION… Is the internet bad?. GOODBad News/Finances Homework Research Shopping Games Education Sports Travel Entertainment Genealogy Pornography.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Modus Operandi.
Social Media LCBMS Guidance Staff.
Sexual Variants and Disorders
Act One Parent Information Slideshow
Say Hi is a free messenger app that allows individuals to find and chat to other people. Say Hi states “Say Hi can help you find new people nearby! It.
Sexual Offenders Chapter 6.
CHILD SEXUAL EXPLOITATION
Public Security versus Social Media:
E-Safety Briefing
FriendLife is a hot new social network where you can get tons of new friends and followers. You can share photos, message each other and stream live video!
Unit 7 Seminar.
Bullying through technology Sexting Consequences
Abuse and Neglect Children and teens need care. They need food, clothing, and a place to call home. They also need protection from danger. Both neglect.
There are approximately 500million tweets sent every day
Abuse and Neglect Children and teens need care. They need food, clothing, and a place to call home. They also need protection from danger. Both neglect.
Pics, Flicks, and Sexting
Tips and Information for Parents
Teaching Internet Safety
Chapter 13 Public Order Crimes
English B50 In Class Essay #1.
Gender Identity and Sexual Disorders
● SmartLaw Sexting and the Law.
FriendLife is a hot new social network where you can get tons of new friends and followers. You can share photos, message each other and stream live video!
“We don’t have a choice on whether we DO social media, the question is how well we DO it” Erik Qualman For example we don’t have a choice sometimes if.
Author: Spencer Akerman
Predator Identification
Bullying.
A Gift of Fire Third edition Sara Baase
Exploitation, Child Pornography, & Child Molestation
What is CSE Sexual Exploitation of children and young people under the age of 18 involves exploitative situations where the young person receives ‘something’
SEXUAL VARIATIONS AND DISORDERS
Harmful Sexual Behaviour - 7 Minute Briefing
Child Sexual Exploitation - 7 Minute Briefing
Sexting and the Law.
Abuse and Neglect Children and teens need care. They need food, clothing, and a place to call home. They also need protection from danger. Both neglect.
Whilst you are sat down have a think about what are your concerns around keeping your family safe on the internet?
The Challenging Landscape of Problematic Sexual Behaviors, Including “Sexual Addiction” and “Hypersexuality” Paul Joannides, Psy. D.
A Gift of Fire Third edition Sara Baase
Relationship and Abuse
Peer on Peer Abuse Harmful Sexualised Behaviour July 2019
Responsible use of Technology
Risks and Opportunities
Presentation transcript:

Internet Vulnerability & Criminal Activity 4.1 – 2/15/10 Child Exploitation - Pedophilia & Child Pornography This week & next week – looking at how children are exploited online

Child Exploitation “Possession, manufacture and distribution of child pornography; online enticement of children for sexual acts; child prostitution; child sex tourism and; child sexual molestation. ” Long Term Effects of the Victims of Child Exploitation Violent and emotional trauma Fear Intimidation Lose of trust Delinquency, criminal behavior Drug/alcohol abuse Abusive behaviors of other children 25% of child exploiters are other children

Methods of Child Exploitation Enticement “Inviting, persuading, or attempting to persuade a child to enter any vehicle, building, room, or secluded place with intent to commit an unlawful sexual act upon or with the person of said child” Pornography “Depictions of minors in sexual acts or provocative poses” Molestation “Any sexual behavior or activity that is abusive or nonconsensual toward a child – or sexual behavior that is specifically prohibited by state/federal law” Adult taking advantage of a child’s vulnerability Child/Minor any one under the age of 18 (even if age of consent lower in state)

Methods of Child Exploitation Prostitution “The use of a child by others for sexual activities in return for remuneration or any other form of consideration” Sex Tourism “Traveling to a foreign country with the intent to engage in sexual activity with a child”

Victims of Child Exploitation Online

Minor “Anyone under the age of 18 no matter what the age of consent in a state maybe”

Characteristics of Victims Dysfunctional families Older rather than younger Confusion over sexual orientation Not always “innocent” May misrepresent themselves May be looking for / collecting pornography Do not understand what they are getting into Consent is not an issue Teens curious & stupid Full of bravado

Computer/Internet Use by Sex Offenders Computer only a tool Online offenders most similar to acquaintance molesters Offender slang “Traders” - Traffic in child porn “Travelers” - Solicit sex with children Problem area - adolescents Producing/trading child porn (sexting) Soliciting sex with other adolescents Not sexually deviant Will focus on the use of the internet more than general computer use Computer a tool, not target - storage creation of child porn - way to exploit kids, find others with same interests For investigation purposes, OL offenders most like acquaintances - take time to groom child Kids curious, hormonally challenged & do stupid things Investigating child sexual exploitation requires knowledge of technical, legal, & behavioral aspects of computer usage - may require expert assisance

Illegal Computer/Internet Activities Possessing / producing child pornography Uploading / downloading child pornography Soliciting sex with children Offering a child for sexual purposes Many ways to produce child porn - child porn almost gone in the 80’s/ Computer Internet brought it back

Legal Sexual Activities Validating deviant sexual behavior and interests Reinforcing deviant arousal patterns Storing and sharing sexual fantasies Lying about one’s age and identity

Legal Sexual Activities cont. Collecting adult pornography that is not obscene Disseminating “indecent” material, talking dirty, “cyber-sex”, and providing sex instructions Injecting oneself into the “problem” of computer exploitation of children to rationalize interests

Categories of Sexual Offenders Situational Offenders Preferential Offenders Miscellaneous Offenders

Situational Offenders “Normal” adolescent / adult Curious Impulsive Morally indiscriminate Power / anger motivated Previous violent offenses Profiteers Easy money Normal teens / adults - searching for porno online, curious, impulsive Morally indiscriminate - mothers offering kids for sex Behavior not long-term, persistant or as predictable as preferrential

Miscellaneous “Offenders” Media Reporters Engage in illegal behavior for news story Pranksters “cyber-smearing” Older “Boyfriends” Late teens / early 20’s Overzealous citizens Want to help law enforcement Be aware of true motivation

Preferential Offenders Pedophile Prefers sex with children Diverse Wide variety of deviant interests Sexually indiscriminate Latent Recently begun to act on illegal urges Pedophile - porn will be child porn Diverse - may have some child porn, but not main interest

Understanding Sexual Offender Behavior

Sexual deviations or perversions Paraphilia Sexual deviations or perversions Medical conditions

Paraphilia Defined Psychosexual disorder Recurrent, intense sexual arousing fantasies, urges, or behaviors that involve: Nonhuman objects Suffering or humiliation Children, other non-consenting persons Occurs over a period of six months

Types of Paraphilia Exhibitionism - exposure Fetishism - objects Pedophilia - children Sexual masochism - self-pain Sexual sadism - partner-pain Voyeurism - watching Some not illegal Not illegal if urges are not acted upon

Pedophilia Characteristics (Psychological) Sexual in nature Highly addictive Compulsive & repetitive Very difficult to treat Unstopped by self-control/self-discipline Only a crime if urge is acted on Does not include adolescent consensual relationships Pysch point of view, not legal Usually higher socio-economic status, education but as computer usage becomes more wide spread, not so much the case any more

Pedophiles use of the Internet Trafficking in child pornography Locating children to molest Engaging in inappropriate communications with children Communicating with other pedophiles Big problem - Victims become perps – patterns of sexual desires/ behaviors laid down in childhood adolescence Communicating - reinforcement

Internet Technologies used by Sex Offenders Adult Pornography Social Networking Sites Chat Rooms Online Gaming Sites Peer-to-Peer (P2P) Web Cams

Some Pedophile Groups - Some on the Web North American Man - Boy Love Association - NAMBLA The Rene Guyon Society Childhood Sensuality Circle - CSC Pedophiliacs Anonymous - PAN Pedophile Information Exchange - PIE Pedophile Action for Liberation - PAL Pedophile Alliance League - P.A.L. The Lewis Carroll Collectors Guild Howard Nichols Society

Evidence Screen name Screen profile Accuracy of profile Length of time active Amount of time spent online Number of transmissions Number of files Number of file originated Number of files forwarded Number of files received Number of recipients Site of communication Theme of messages and chat Theme of pornography Things to look for when investigating - help determine perp behavior

“Depictions of minors in sexual acts or provocative poses” Child Pornography “Depictions of minors in sexual acts or provocative poses” Idea of protecting children from sexual exploitation relatively late – 1880’s girl's age of consent was 10 1977 – only 2 states has laws outlawing kids in obscene materials First federal law – 1978 1988 – first laws concerning child porn online 1990 – Private possession of child porn became illegal – Possession may just be access, not saving files While attempts have been made to outlaw virtual child porn & young looking over 18 year olds, laws have been overturned as being too broad

How the Internet Changed Child Porn Prior to the Internet, Child porn local, very small distribution Mid 1980’s - Child porn almost wiped out Internet & technology allows Cheap, easy creation of child porn Anonymous distribution Available through all Net channels (IRC, P2P, web pages, e-mail) While the loosening of social attitudes toward sex made child porn more available during the 1970’s problem, LE had contained the problem

The Role of the Internet in Promoting Child Pornography Permits vast quantities from around the world Instantly available in any time or place Can be accessed anonymously & privately Facilitates direct communication and file sharing between users Relatively inexpensive Images do not deteriorate & are easy to store Variety of formats; potential for real-time & interactive experiences Can be used to create composite or virtual images

Three Components of the Problem Production Distribution Downloading

Production Premium placed on new material – much material decades old Professionally produced materials from third world countries Most common, amateurs recording their own sexual exploits Clandestine photography of children in public places

Distribution Uploading & dissemination of pornographic images May involve sophisticated pedophile rings & organized crime groups Many times carried out by amateurs Efforts to stop distribution focusing on ISP’s and police stings has changed the way in which child porn is distributed Increasingly, sophisticated security measures are being used

Methods of Distribution Web sites Web cam E-mail E-groups Newsgroups Bulletin Board Systems Chat Rooms Peer-to-peer

Downloading Accessing child porn via the Internet Images do not need to be saved In most cases, users must be actively seeking child porn Increasingly, good computer skills & inside knowledge required Most downloading done via newsgroups & chat rooms Require fees & psswords

Offender Typology Browsers Private fantasizers Trawlers Inadvertently find child porn, but knowingly keep the images No networking No security strategies Private fantasizers Create digital images for personal use Trawlers Seek child porn through open sources Minimal networking Few security strategies Different patterns of Internet behavior Various levels of involvement w/ Internet child porn Different degrees of networking w/ other offenders Different expertise in employing secure stratigies

Offender Typology Non-secure collectors Secure collectors Groomers Seek child porn in non-secure chat rooms & other open levels High levels of networking No security strategies Secure collectors Use closed newsgroups or secret pedophile rings High level of networking Sophisticated security measures Groomers Develop online relationships with children, use child porn to “groom” victim May or may not be involved with networking Little security strategies Different patterns of Internet behavior Various levels of involvement w/ Internet child porn Different degrees of networking w/ other offenders Different expertise in employing secure stratigies

Offender Typology Physical abusers Producers Distributors Child porn part of pedophilic interest May create their own child porn, evidence of their behavior May or may not network Security depends on victim’s silence Producers Record abuse for purpose of distributing to others Networking depends on if producer is also distributor Distributors Disseminates child porn images May have purely financial interests Networking and security depends upon level of operation Any of the other offender levels may be considered distributors

How do Pedophiles use Child Pornography Source of pride Sexual gratification Feed/create sexual fantasies Training/grooming potential victims Lower potential victim’s inhibitions Blackmail victim into silence Profit Barter with other pedophiles

Dangers Associated with Child Porn Single most distinct characteristic of child molester Used by molester to ‘normalize’ behavior Long term use leads to desensitization Used by terrorist groups to exchange information - http://www.timesonline.co.uk/tol/news/uk/crime/article4959002.ece

Law Enforcement Challenges Structure of the Internet Decentralized, P2P One site shut down, another will instantly take it’s place Uncertainties of jurisdiction Requires cooperation among agencies No clue to where images originate Why aren’t we doing something? Cause it isn’t easy.

Law Enforcement Challenges Lack of regulation Community protection vs. Freedom of Speech Ambiguity regarding liability, ISP responsibility Differences in legislation Differences between countries Countries may vary in commitment Cultural differences Expertise of offenders Long time offenders experts in security measures Many sting operations catch the inexperienced, low-level offender Child abuse okay in some countries - Afghanistan

Sources Child Molesters: A Behavioral Analysis - http://www.missingkids.com/en_US/publications/NC70.pdf Child Pornography on the Internet - http://www.cops.usdoj.gov/files/ric/Publications/e04062000.pdf