A project depicting:
What Online Child Enticement is;
What the consequences are;
The behind-the-scenes forensics;
Preserving and moving computer evidence;
Case examples
2. What is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
3. Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
4. Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
5. Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
6. One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
26. Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
27.
28. Forensic Software Find data files Clone/preserve digital evidence Analyze digital evidence Separate and categorize data files by type Compare files to list of known contraband files Recover deleted/hidden data Crack/recover passwords Systematically report findings in a paper report
29.
30. Internet Communications Laws ECPA Electronic Communications Protection Act Codify when government could and could not intercept Internet and/or stored communications i.e. emails sent, in transmission, received PPA Privacy Protection Act Seizing computers = seizing irrelevant information Illegal to seize and hold irrelevant material Investigators must make every possible effort to return non-case related information
33. Email Tracing-The Long Way Copy/Clone email Open Full Header Analyze Timestamps and IP Addresses Sender’s personal IP address Sender’s ISP email server Recipient’s ISP email server Recipient’s personal IP address WHOIS search Subpoena records from appropriate company User account information, billing address, etc.
34. Email Tracing - Direct Suspect continually receives emails from victim Website program Attaches a line of code to outgoing email Confirmation email sent to victim Contains IP address, date and time email was opened Unrecognizable to most Identifiable in full header
35. Instant Messaging Problems: Limited time frame to obtain evidence Probable bogus information Good news: Computers can save chat transcripts Document conversations Record criminal intent Information logged on computers Subpoena for suspect’s computer
36. Fourth Amendment & Your Search Warrant Consent “Shifting Sands” Include scope of search in its entirety Search incident to lawful arrest J.B. May case Warrant for computer and files Workplace searches College professors’ Internet activity monitored J.B. May supervisor can conduct search for evidence of work-related misconduct
45. Resources (cont.) Baldas, Tresa. "Redford Man Gets Life for Enticing Moms to Molest Their Children Online." Freep.com. Detroit Free Press, 3 Aug. 2011. Web. 15 Aug. 2011. <http://www.freep.com/article/20110803/NEWS02/110803037/Redford-man-gets-life-enticing-moms-molest-their-children-online?odyssey=nav%7Chead>. Mei, Julia Lynne. "How to Secure Computer Forensics Evidence | EHow.com." EHow | How to Videos, Articles & More - Trusted Advice for the Curious Life | EHow.com. 7 Sept. 2010. Web. 15 Aug. 2011. <http://www.ehow.com/how_7246434_secure-computer-forensics-evidence.html>. "State Sentencing Guidelines for Online Enticement." Missingkids.com. 4 Dec. 2006. Web. 15 Aug. 2011. <http://www.missingkids.com/en_US/documents/state-sentencing-online-enticement.pdf>. Knetzger, Michael, and Jeremy Muraski. Investigating High-Tech Crime. Custom ed. Upper Saddle River: Prentice Hall, 2008. Print. Google Images Ke, Crystal