1 / 41

Internet Awareness

Internet Awareness. Child Exploitation Facilitated by Modern Technology. Current Challenges. Social Networking Sites. Trends. Dangers. Preservation & Collection. Challenges. Resources. Social Networking Sites (SNS). What are they?. What is a SNS?. Social Networking Site

drew
Download Presentation

Internet Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Awareness Child Exploitation Facilitated by Modern Technology

  2. Current Challenges Social Networking Sites Trends Dangers Preservation & Collection Challenges Resources

  3. Social Networking Sites (SNS) What are they?

  4. What is a SNS? • Social Networking Site • Place where people create and share information with each other • “Virtual communities” • An “online local hangout” where like minded people meet

  5. Popular SNS 5

  6. Attractiveness of SNS • Risk of being judged is diminished • Greater opportunity to find “like minded” people • Unlimited number of people in your community • Socialize with people throughout the world • SNS is a place to be found!

  7. SNS Commonalities • Users can post personal information -name, location, age, school, interests • Friends • Communication between users • Blog or Journal • Can create and upload content - photos, videos, music

  8. SNS Blogs “The double edge sword” Although Blogs are [essentially] thoughts or comments added to a user’s page, it offers a lot more: • Updated regularly (Time & Date Stamped) • How valid is this information • Friends tend to share more information about you than you had intended on others knowing • Great tool for acquiring information about a person • (by friend or foe) • Provides for an endless link to other possible victims.

  9. Trends Evolution of Online Child Exploitation

  10. Areas of Teen Activity • Social Networking Sites (SNS) • Distribution of Child Pornography • Self created images • Defamatory Websites • Use of Anonymizers • Craigslist • Teenage Prostitution

  11. Teens & Social Networking • 19% of online teens keep a blog • 38% of teens read the blogs of others • Older girls lead the blogging activity • Teen bloggers are tech-savvy & heavy internet • users Pew Internet Survey, 2005

  12. SNS Reporting 1 1 As of Sept. 2007 CyberTipline

  13. Online Enticement • In 2006, one (1) in seven (7) children received unwanted online requests: • Engage in sexual activities • Provide intimate sexual information. • “No decrease” in aggressive sexual solicitations(where the solicitor asked to meet the child in person, called the child on the phone, or sent the child mail, money, or other gifts offline-compared to a 2000 study) • In more than half of the cases, the child did not tell anyone. Online Victimization: Five Years Later, 2006

  14. Online Enticement Reports

  15. Relationship of Abuser to Child1 2 3 4 • Abuser data based upon victim information submitted to NCMEC by law enforcement, as of March 31, 2006. • “Unknown to Child” includes un-established relationships, i.e. photographers, child sex tourism, runaways, etc. • “Online Enticement” includes either (1) victims who met a perpetrator online and transmitted self-produced images or (2) victims and offenders who met online and then met offline, producing images. • “Self-produced” includes those victims who have produced and distributed images of themselves.

  16. Victim Age Breakdown:Online Solicitation Victim Age Online Victimization: Five Years Later, 2006

  17. Proxy Can You Really Block Access?

  18. Anonymous Proxy Server How does anonymous surfing work? • A proxy server facilitates communication between a computer and a web site. • Your computer communicates with an anonymous proxy server, and the anonymous proxy server speaks to the web site. • Locally, it appears that your computer only communicated with the proxy server.

  19. No Problem; I will Proxy Proxy Servers • Proxy server is a server that retrieves Web pages for you, providing only its own identity to the sites it visits. • Requesting data comes first to the proxy, and through the requested proxy, the data is transmitted to you.

  20. Proxy Strategies • Block incoming traffic from the site you wish to block.

  21. Dangers Newest Exploitation Venues

  22. Managing the Risks Internet

  23. CyberBullying • Fourteen year old girl reports the existence of a slanderous SNS • In addition to graphic pornography, the child’s real name, cell phone number and location are prominently displayed Electronic Bathroom Wall

  24. Identify Concerns

  25. Other SNS Concerns • Exposure to Inappropriate Material • Gangs • Teen Violence • Extremist Groups • Gaming Sites • Rating Sites • Defamatory Websites

  26. Newest Exploitation Venues Virtual Lives Second life Mobile Technology Mobile Messaging Disposable Phones • Cyberbullying • Craigslist • Prostitution • Online gaming • XBOX/360 • PSP/3 • Wii • WOW (World of Warcraft) • Everquest

  27. Preservation & Collection Evidence at your fingertips

  28. Collecting Public Information • Public information: • Any information which is available for all to see • Blog entries, images, user comments, friend lists, and public profile • Make an electronic copy of publicly available content • Preserve/Save questionable material to a file

  29. Tools for Best Evidence • Preservation & Collection • Screen Capture • Cut, Copy, Paste • Software • Preservation Letter • Letter directed to company which you want to preserve info. • Web Site Archive • Capture an entire website • Web Browser • Use of other browsers reveal more information

  30. Saving a Webpage Firefox Internet Explorer Firefox Firefox

  31. Print Screen • Print Screen • Located on keyboard • Captures image of what is currently displayed on screen • Placed in clipboard • When pressed, nothing seems to happen, but “ctl-V” will paste image

  32. Why Report Time is Fleeting

  33. Retention Periods • Time of Retention vary between the ISPs

  34. Challenges Obstacles you will encounter

  35. Online Challenges

  36. Online Advantage Diminished expectation of privacy • People tend to share more information online than in person • Gain insight into motives • Identify additional persons involved • Viewing their “friends” and/or “buddy list” • People who use the internet tend to use the same screen name • Use of a similar screen name is common • Check through various i.e. Xanga, FaceBook, Tagged,Yahoo, Gmail, etc.

  37. Resources

  38. Online Resources • National Center for Missing and Exploited Children • 2 SMRT 4U™ • Don't Believe the Type • HDOP: Help Delete Online Predators • NetSmartz • NetSmartz 411

  39. National Center for Missing and Exploited Children 24 Hour hotline 1-800-THE-LOST CyberTipLine: www.missingkids.com Federal Law Enforcement Federal Bureau of Investigation Postal Inspectors Office Immigrations and Customs Enforcement Secret Service **Internet Crimes Against Children Task Force (ICAC)** Reporting & Assistance

  40. Questions

  41. Thank you! Eliott Cohen Trooper First Class/Investigator Maryland State Police Internet Crimes Against Children-Maryland Task Force

More Related