410 likes | 591 Views
Internet Awareness. Child Exploitation Facilitated by Modern Technology. Current Challenges. Social Networking Sites. Trends. Dangers. Preservation & Collection. Challenges. Resources. Social Networking Sites (SNS). What are they?. What is a SNS?. Social Networking Site
E N D
Internet Awareness Child Exploitation Facilitated by Modern Technology
Current Challenges Social Networking Sites Trends Dangers Preservation & Collection Challenges Resources
Social Networking Sites (SNS) What are they?
What is a SNS? • Social Networking Site • Place where people create and share information with each other • “Virtual communities” • An “online local hangout” where like minded people meet
Attractiveness of SNS • Risk of being judged is diminished • Greater opportunity to find “like minded” people • Unlimited number of people in your community • Socialize with people throughout the world • SNS is a place to be found!
SNS Commonalities • Users can post personal information -name, location, age, school, interests • Friends • Communication between users • Blog or Journal • Can create and upload content - photos, videos, music
SNS Blogs “The double edge sword” Although Blogs are [essentially] thoughts or comments added to a user’s page, it offers a lot more: • Updated regularly (Time & Date Stamped) • How valid is this information • Friends tend to share more information about you than you had intended on others knowing • Great tool for acquiring information about a person • (by friend or foe) • Provides for an endless link to other possible victims.
Trends Evolution of Online Child Exploitation
Areas of Teen Activity • Social Networking Sites (SNS) • Distribution of Child Pornography • Self created images • Defamatory Websites • Use of Anonymizers • Craigslist • Teenage Prostitution
Teens & Social Networking • 19% of online teens keep a blog • 38% of teens read the blogs of others • Older girls lead the blogging activity • Teen bloggers are tech-savvy & heavy internet • users Pew Internet Survey, 2005
SNS Reporting 1 1 As of Sept. 2007 CyberTipline
Online Enticement • In 2006, one (1) in seven (7) children received unwanted online requests: • Engage in sexual activities • Provide intimate sexual information. • “No decrease” in aggressive sexual solicitations(where the solicitor asked to meet the child in person, called the child on the phone, or sent the child mail, money, or other gifts offline-compared to a 2000 study) • In more than half of the cases, the child did not tell anyone. Online Victimization: Five Years Later, 2006
Relationship of Abuser to Child1 2 3 4 • Abuser data based upon victim information submitted to NCMEC by law enforcement, as of March 31, 2006. • “Unknown to Child” includes un-established relationships, i.e. photographers, child sex tourism, runaways, etc. • “Online Enticement” includes either (1) victims who met a perpetrator online and transmitted self-produced images or (2) victims and offenders who met online and then met offline, producing images. • “Self-produced” includes those victims who have produced and distributed images of themselves.
Victim Age Breakdown:Online Solicitation Victim Age Online Victimization: Five Years Later, 2006
Proxy Can You Really Block Access?
Anonymous Proxy Server How does anonymous surfing work? • A proxy server facilitates communication between a computer and a web site. • Your computer communicates with an anonymous proxy server, and the anonymous proxy server speaks to the web site. • Locally, it appears that your computer only communicated with the proxy server.
No Problem; I will Proxy Proxy Servers • Proxy server is a server that retrieves Web pages for you, providing only its own identity to the sites it visits. • Requesting data comes first to the proxy, and through the requested proxy, the data is transmitted to you.
Proxy Strategies • Block incoming traffic from the site you wish to block.
Dangers Newest Exploitation Venues
Managing the Risks Internet
CyberBullying • Fourteen year old girl reports the existence of a slanderous SNS • In addition to graphic pornography, the child’s real name, cell phone number and location are prominently displayed Electronic Bathroom Wall
Other SNS Concerns • Exposure to Inappropriate Material • Gangs • Teen Violence • Extremist Groups • Gaming Sites • Rating Sites • Defamatory Websites
Newest Exploitation Venues Virtual Lives Second life Mobile Technology Mobile Messaging Disposable Phones • Cyberbullying • Craigslist • Prostitution • Online gaming • XBOX/360 • PSP/3 • Wii • WOW (World of Warcraft) • Everquest
Preservation & Collection Evidence at your fingertips
Collecting Public Information • Public information: • Any information which is available for all to see • Blog entries, images, user comments, friend lists, and public profile • Make an electronic copy of publicly available content • Preserve/Save questionable material to a file
Tools for Best Evidence • Preservation & Collection • Screen Capture • Cut, Copy, Paste • Software • Preservation Letter • Letter directed to company which you want to preserve info. • Web Site Archive • Capture an entire website • Web Browser • Use of other browsers reveal more information
Saving a Webpage Firefox Internet Explorer Firefox Firefox
Print Screen • Print Screen • Located on keyboard • Captures image of what is currently displayed on screen • Placed in clipboard • When pressed, nothing seems to happen, but “ctl-V” will paste image
Why Report Time is Fleeting
Retention Periods • Time of Retention vary between the ISPs
Challenges Obstacles you will encounter
Online Advantage Diminished expectation of privacy • People tend to share more information online than in person • Gain insight into motives • Identify additional persons involved • Viewing their “friends” and/or “buddy list” • People who use the internet tend to use the same screen name • Use of a similar screen name is common • Check through various i.e. Xanga, FaceBook, Tagged,Yahoo, Gmail, etc.
Online Resources • National Center for Missing and Exploited Children • 2 SMRT 4U™ • Don't Believe the Type • HDOP: Help Delete Online Predators • NetSmartz • NetSmartz 411
National Center for Missing and Exploited Children 24 Hour hotline 1-800-THE-LOST CyberTipLine: www.missingkids.com Federal Law Enforcement Federal Bureau of Investigation Postal Inspectors Office Immigrations and Customs Enforcement Secret Service **Internet Crimes Against Children Task Force (ICAC)** Reporting & Assistance
Thank you! Eliott Cohen Trooper First Class/Investigator Maryland State Police Internet Crimes Against Children-Maryland Task Force