SlideShare une entreprise Scribd logo
1  sur  27
Online Child Enticement Crystal Ke Duffey CJ446 August 15, 2011 Final Project
What  is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
Williamsburg, VA Thursday, July 2010 Suspect: Justin Bradley May aka “Jason Marx” Victim: 13 year old girl ,[object Object]
 May acted as a modeling agent
 Sent emails from an alleged model “Nikki”.
 Nikki convinced girl to send nude pictures of herself over the Internet.
 Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
 FBI traced emails to May’s computer at W&M College.
Production of Child Pornography
 Coercion and enticement of a minor
 Receipt of Child Pornography
 15 years in Prison
 Possible 30year sentence
 $250,000 fine
 Lifetime supervision,[object Object]
Computer Hardware
Seizing A Computer ,[object Object]
 Take pictures of computer to record configuration and hardware connections
Label all wires, cables, or connectors for reassembly
Dismantle computer
Carefully move computer to a safe location where it will not be interfered with.,[object Object]
Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
Chain of Custody Document every person Their position What they did ,[object Object],[object Object],[object Object]

Contenu connexe

Tendances

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1abby ovitsky
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
The Internet own boy
The Internet own boyThe Internet own boy
The Internet own boyPiXeL16
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Legal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored InformationLegal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored Informationaustinlegal
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comjazzybaby4843
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safetyAChuppTeaches
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Coppa overview
Coppa overviewCoppa overview
Coppa overviewchstokes
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 

Tendances (20)

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
The Internet own boy
The Internet own boyThe Internet own boy
The Internet own boy
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Legal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored InformationLegal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored Information
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.com
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safety
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Mma lesson1
Mma lesson1Mma lesson1
Mma lesson1
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Sexting
SextingSexting
Sexting
 
Coppa overview
Coppa overviewCoppa overview
Coppa overview
 
trial
trialtrial
trial
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 

Similaire à Online Child Enticement

Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Blog Ethical Responsible1
Blog Ethical Responsible1Blog Ethical Responsible1
Blog Ethical Responsible1Bryan McDonald
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmaytsdikshit
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 

Similaire à Online Child Enticement (20)

Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Blog Ethical Responsible1
Blog Ethical Responsible1Blog Ethical Responsible1
Blog Ethical Responsible1
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
102009
102009102009
102009
 

Dernier

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Dernier (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Online Child Enticement

  • 1. Online Child Enticement Crystal Ke Duffey CJ446 August 15, 2011 Final Project
  • 2. What is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
  • 3. Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
  • 4. Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
  • 5. Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
  • 6. One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
  • 7.
  • 8. May acted as a modeling agent
  • 9. Sent emails from an alleged model “Nikki”.
  • 10. Nikki convinced girl to send nude pictures of herself over the Internet.
  • 11. Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
  • 12. FBI traced emails to May’s computer at W&M College.
  • 13. Production of Child Pornography
  • 14. Coercion and enticement of a minor
  • 15. Receipt of Child Pornography
  • 16. 15 years in Prison
  • 19.
  • 21.
  • 22. Take pictures of computer to record configuration and hardware connections
  • 23. Label all wires, cables, or connectors for reassembly
  • 25.
  • 26. Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
  • 27.
  • 28. Forensic Software Find data files Clone/preserve digital evidence Analyze digital evidence Separate and categorize data files by type Compare files to list of known contraband files Recover deleted/hidden data Crack/recover passwords Systematically report findings in a paper report
  • 29.
  • 30. Internet Communications Laws ECPA Electronic Communications Protection Act Codify when government could and could not intercept Internet and/or stored communications i.e. emails sent, in transmission, received PPA Privacy Protection Act Seizing computers = seizing irrelevant information Illegal to seize and hold irrelevant material Investigators must make every possible effort to return non-case related information
  • 31. A letter through the Postal Service
  • 32. Email Pathway Simplified Connection to ISP Connection to ISP Internet Path between Servers
  • 33. Email Tracing-The Long Way Copy/Clone email Open Full Header Analyze Timestamps and IP Addresses Sender’s personal IP address Sender’s ISP email server Recipient’s ISP email server Recipient’s personal IP address WHOIS search Subpoena records from appropriate company User account information, billing address, etc.
  • 34. Email Tracing - Direct Suspect continually receives emails from victim Website program Attaches a line of code to outgoing email Confirmation email sent to victim Contains IP address, date and time email was opened Unrecognizable to most Identifiable in full header
  • 35. Instant Messaging Problems: Limited time frame to obtain evidence Probable bogus information Good news: Computers can save chat transcripts Document conversations Record criminal intent Information logged on computers Subpoena for suspect’s computer
  • 36. Fourth Amendment & Your Search Warrant Consent “Shifting Sands” Include scope of search in its entirety Search incident to lawful arrest J.B. May case Warrant for computer and files Workplace searches College professors’ Internet activity monitored J.B. May supervisor can conduct search for evidence of work-related misconduct
  • 37.
  • 38.
  • 43.
  • 44.
  • 45. Resources (cont.) Baldas, Tresa. "Redford Man Gets Life for Enticing Moms to Molest Their Children Online." Freep.com. Detroit Free Press, 3 Aug. 2011. Web. 15 Aug. 2011. <http://www.freep.com/article/20110803/NEWS02/110803037/Redford-man-gets-life-enticing-moms-molest-their-children-online?odyssey=nav%7Chead>. Mei, Julia Lynne. "How to Secure Computer Forensics Evidence | EHow.com." EHow | How to Videos, Articles & More - Trusted Advice for the Curious Life | EHow.com. 7 Sept. 2010. Web. 15 Aug. 2011. <http://www.ehow.com/how_7246434_secure-computer-forensics-evidence.html>. "State Sentencing Guidelines for Online Enticement." Missingkids.com. 4 Dec. 2006. Web. 15 Aug. 2011. <http://www.missingkids.com/en_US/documents/state-sentencing-online-enticement.pdf>. Knetzger, Michael, and Jeremy Muraski. Investigating High-Tech Crime. Custom ed. Upper Saddle River: Prentice Hall, 2008. Print. Google Images Ke, Crystal