SlideShare une entreprise Scribd logo
1  sur  101
Internet predator tracker
Copyright All material in this presentation is Copyright 2010 by Joseph Seanor and IPT LLC. Any reproduction in physical or electronic format is not allowed without the written permission of Joseph Seanor. If you wish to use this information in a presentation of your own, or in other materials, please contact me at: jseanor@internetpredatortracker.com
Mission Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enforcement to assist in the protection of our children on the Internet.
What does IPT do? Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows investigators and law enforcement to collect evidence in a secure manner about online predators and pedophiles. We also provide software to the public in order to allow them to report suspected predators and pedophiles.
What does IPT do? IPT provides training in the form of classes, both online and in-person, on how to use these tools, collecting evidence, tracking on the internet and more. The goal is to provide the tools and training for FREE to the public and law enforcement.
Who is IPT? Internet Predator Tracker was founded by Joe Seanor, who leads the organization and development. Max Fortuna acts as Project Manager for the effort. We also have investigators around the country who donate their time to helping out.
Joe Seanor	 10 years Central Intelligence Agency, CIC/CNC Department of Justice Telecom Security Staff Private Investigator for 14 years 7 years America Online’s Senior Investigator for Computer Crime Learning Tree Instructor on: IDS, Firewalls, Windows Security. Author of 15 books on computers, cybercrime and more Founder of the PI Mall Developer of Security-Bot Developer of Internet Predator Tracker software CBS radio national correspondent 2 patents pending CISSP, CEH, CET, NSA IAM Developer of Internet Predator Tracker
What can I do? YOU are the most important part of this work. Without YOU involved, there is very little that can be done. The latest set of tools we have released allows anyone to be able to report suspected predators and pedophiles. So YOU really are our best source of information!
Wait..isn’t this Police work? We work closely with local and federal law enforcement and district attorney’s. The information that is collected with the tools that I have developed is only information. Once we get a report, we contact our local police and DA. We then let law enforcement take over the case.
Law Enforcement So, yes, it is the job of Law Enforcement to investigate, capture and prosecute these predators and pedophiles. But, the only way they can know is by someone, maybe you, reporting the suspected predator or pedophile. So, YOU are the most important part of this work!
IPT Website The main website for IPT is at:  www.internetpredatortracker.com We also have numerous sites on web2.0 websites and social networks.
IPT Software The first software developed by Joe Seanor was Internet Predator Tracker. This is a complete solution for investigators and law enforcement to conduct online undercover investigations against online predators and pedophiles. The evidence is collected into a database that is secure and encrypted in order to protect the evidence.
IPT Software The original IPT software is only available to law enforcement. And selected, hand picked, hand trained investigators.
IPT Public Software I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to report suspected online predators and pedophiles. And all of the software is FREE!! You can download the software from the IPT website, and multiple locations on the web.
IPT Public Software We are the ONLY source of predator and pedophile reporting for: Internet Explorer Firefox Google Chrome Safari Opera Outlook Thunderbird ALL FREE!!!
IPT Public Software Well, when I designed the software, I wanted all of the versions to work the same, so if you learned one, you could use any of them. Also, I made it as easy to use as possible, so everyone would use it. Each extension for the browsers follow this same process for collecting evidence.
IPT Public Software Once you click the Report button: An HTML copy of the site is made. No images are saved or uploaded. A MD5 checksum is created (this protects the evidence.) The file is uploaded to the IPT secure server An email is opened that contains the information about the file that was uploaded and your email address. You just click send!
Internet Explorer Due to the way that IE deals with extensions, the Pedophile Reporter extension uses an installation program. Once you download the program, just double click on the setup program to begin the installation.
Internet Explorer Now you will see
Internet Explorer Continue the install, and be sure to accept the license agreement.  When you get to the installation folder, please do not change that location.
Internet Explorer The installation will continue like any normal windows install program.  And at the end you will see:
Internet Explorer Now that you have installed the Pedophile reporter, you will find it located on your Internet Explorer menu bar
Firefox
Firefox
Firefox You can go in and configure the options for the extension by clicking on Tools and then Add-ons. Once you do, just click on the Options button under the name of the extension.
Firefox options
Google Chrome
Google Chrome Make sure to start Google Chrome and then just go to: www.google.com In order to install the Pedophile reporter extension for Google Chrome, just google “Google Chrome report pedophile” The first link will be for the Chrome Web Store, click on that link and you will end up at the Chrome Web store for Report Pedophile.
Google Chrome
Google Chrome Now, all you have to do is click on Install. Chrome will not install the extension for you. Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent. Then just click save/close on the options window.
Google Chrome
Safari Safari is the browser from Apple, and runs on both the Macintosh and PC. In order to install the extension using the Safari browser,  just go to: www.internetpredatortracker.com Click on the tab called Software Choose Safari extension Then click either the English or Spanish version of the software.
Safari Once you click on the download link, you will see the following window. Just click on Open
Safari You will then be prompted with the following window, choose Install.
Safari The extension will be installed, and you will see Safari, now look like this:
Safari Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent. Then just click save/close on the options window.
Email Reporting To use the Outlook and Thunderbird plug-ins, just right click on the suspected email in your inbox and the program will collect the header information and email. You just click send and it arrives at our IPT servers. So, lets see how to install it.
Thunderbird  In order to install the Pedophile reporter for Thunderbird, just google “thunderbird extensions pedophile reporter” The first choice will take you to the Mozilla Thunderbird page. All you have to do is click on the Download Now button.
Thunderbird
Thunderbird Now you will see the file save window. Click and save the file to your Desktop.
Thunderbird Now, with the extension installed, you will want to startup Thunderbird. Once started, just click on Tools Choose Add-on’s Click on the Install button and choose the pedophile reporter file you just downloaded to your desktop.
Thunderbird
Thunderbird Once you click on Install and double-click on the file that you saved to your desktop. You will then see the following window
Thunderbird Once you click Install, the extension will be installed. You will then need to click on the Restart Thunderbird, and the extension will now be active. In order to use the extension, just right click on the suspected email in the Inbox, and choose Pedophile Alerter.
Thunderbird
Email Report Now, you will see the email that contains the headers and body from the suspected email. You will also have the option to choose either “suspected predator” or “suspected pedophile” All you have to do now is click Send, and the report, containing the headers and body from the suspected email will be sent to the IPT server.
Email Report
Outlook As the largest email program on the market, it was only natural that we develop a add-on for Outlook. However, Outlook is not as easy to add things to like Thunderbird is. In order to have the extension added to Outlook, you will run an install program.
Outlook Once you download the file, just double-click on the pedophile alerter setup program.
Outlook Once started, you will walk through a standard windows installation program.
Outlook After you accept the installation agreement, you will be presented with the folder location. Please do not change the location of the files. Once the files are installed you will see
Outlook Once you click close, you will be presented with the following screen. Just fill out the information, this is where the copy of the email will be sent.
Outlook In order to use the plug-in, you just need to right-click on the suspected email, and choose Pedophile Alert.
Outlook Now, you will get the choice of the subject
Outlook You will then see the email that is to be sent.  The email contains al of the information about the suspected email that is needed to track the sender down. All you have to do is click Send, and the email and information will be delivered to the IPT server.
Outlook
So, why do this? One out of five kids using online chat-lines are approached by pedophiles Nine out of ten kids aged 9 to 16 have viewed pornography on the Internet 25% of kids subjected to sexual solicitation tell their parents All these names may lead you straight to pornographic websites if you make an Internet search on them – Disney, Action Man, Barbie, Pokemon, ESPN, Alice, My Little Pony 100,000 sites existed in 2001 on the Internet about child pornography 100 billion are spent every year on pornographic sites with pay access on the Internet
And…. The stories just go on and on. As you can tell, with the growth of the internet these predators and pedophiles have found a new playground and it is the Internet. These are a very small sample of the number of reported cases of predators and pedophiles. The majority of these issues go UNREPORTED.
As a parent Know what your children are doing online. Teach kids not to give out any identifying information. Report any suspicious activity to police. Never let your child meet anyone from online without parental supervision. Keep user names and profiles generic and anonymous. Avoid posting personal photos online.
As a parent Always keep private information private. Place the family computer in an open area. Remind children that online “friends” are still strangers. You must still show respect children’s privacy Become a part of your child’s online experience. Be aware of phone calls or mail deliveries from unfamiliar persons.
Predator vs. Pedophile Lets look at a checklist of characteristics of these two types of people. These are lists I have put together from FBI documents. If you would like to read the full report, please email me and I’ll send it to you.
The Predator
The Predator He abuses then backs off.  He has to win, and it is very important to him that he is always right. He Hates and Loves Women at the Same Time. Endless Cycle of Love/Hate with his Mother  This person was probably abused by his mother and then coddled.  12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 63
The Predator  He transposes these feelings to other women.  He tries to create the same type of environment with other women.  This time he IS in CONTROL.  He may have a wife.  If so, he is a model husband.  He needs one relationship with a female that is solid and wholesome; that is why he looks elsewhere for women to abuse. 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 64
The Predator MOST IMPORTANT Remember, he is most likely very shy and timid or reserved in the real world and has low self esteem until he gets on the Internet. Then he is the MASTER of his domain. 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 65
The Pedophile
Pedophile Characteristics Sexual Abuse in Background Limited Social Contact as Teenagers   Frequent and Unexpected Moves (locations) Prior Arrests   Multiple Victims  Older Than 25, Single, Never Married  Lives Alone or With Parents  12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 67
Limited Dating Relationships If Not Married  If Married, “Special” Relationship With Spouse  Associates and Circle of Friends are Young  Refers to Children as “Clean,” “Pure,” “Innocent,” “Impish,” or Objects  Skilled at Identifying Vulnerable Victims  Has Access to Children  Seduces With Attention, Affection, and Gifts  12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 68 Pedophile Characteristics
Skilled at Manipulating Children Shows Sexually Explicit Material to Children   Youth-Oriented Decorations in House or Room Photographing of Children clothed or unclothed 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 69 Pedophile Characteristics
Internet
Internet sources to look at Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 71 Websites News Groups IRC  File Servers, P2P systems, Bit Torrent BBS’s (yes they are still around!!)
Keywords to look for Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 72 When you are looking for Pedophiles, there are certain terms to look for or you may “hear” Boy love or blogo Ehebophila Hebephilia Girl love or glogo Infantophilia Lolita  Clogo
Pedophile terms Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 73 12chan = used as a place where all the material that is illegal to post on 4chan is traded.  4chan = group that trades objectionable pictures and material. AF = Adult Friend ANTI = Anti-Pedophile or Pedophile Hunter AoA = Age of Attraction  AoC = Age of Consent ATBOYS = Attracted to Boys 
Pedophile terms Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 74 BC = Boy Chat BK = Butterfly Kisses BL = Boy love or Boy lover  BLi = Boy Links BLISS = BoyBliss BLN = Boylover.net BLogo = BoyLover Logo  BLOL = Boy land online BM = Boy Moment BMW = BoyLove Media Watch BRU = BoysrUs BT = BoyTales
Pedophile terms CA = Child Advocate CHSC = Cement-headed Straight Clown CL = Childlove(r) Pedophile term used to describe an attraction to both male and female Children CLogo = ChildLover Logo CLOMAL = ChildLove Online Media Activism CM = Child Molester CP = Child Pornography CPS = Child Protection Services CSA = Child Sexual Abuse FSC = Free Spirits Coalition, aka Free Spirits Committee
Pedophile terms GC = Girl Chat GL = Girllove or Girllover GLi = Girl Links GLN = Girllover.net GLogo = GirlLover Logo GlWiki = Girl Love Wiki GM = Girl Moment GT = Get Together GTG = Get Together
Pedophile terms HBP = High Boylover Priesthood HEBE = Refers to Hebephilia, or the sexual attraction to underage children from post puberty (age 12 to the age of 17) IBLD = International BoyLove Day IBLD = International BoyLove Day IM = Instant Messaging JF = Jungsforum (German) or Jongensforum (Dutch) KLOL = Kidzlandonline KP = Kiddie Porn
Pedophile terms LB = Little Boy LBL = Little Boy Lover LBLogo = LittleBoy Lover Logo LEA = Law Enforcement Agency LEO = Law Enforcement Officer LG = Little Girl LGL = Little Girl Lover LGs = Little Girls LL = LifeLine LLWS = Little League World Series LMIRL = Lets Meet In Real Life LOLI = Reference to girls under 12 LOLICON = Drawings or Cartoons (Animated) of Child Pornography featuring girls Loved boy = a boy who is being molested by a pedophile LULAB = Love you like a brother LULAS = Love you like a sister
Pedophile terms MAA = Minor-Attracted Adult MBC = MetaBoyChat MHAMIC = Male Homosexual Attraction to Minors Information Center NEPI = refers to Nepiophilia aka Infantophilia is the sexual attraction towards babies and toddlers (aged 0-4/5 years). NN = Non Nude Model Sites/Photos where underage girls as young as two pose scantily clad in adult lingerie or in overtly sexy poses P.A.C.E. = Pedophiles Against Child Exploitation PAN = Pedophile Alert Network PCE = International Pedophile and Child Emancipation PT = Pre-Teen
Pedophile terms RL = Real Life RPG = Role playing games RSO = Registered Sex Offender SHOTA/SHOTACON = Drawings or Cartoons (Animated) Child Pornography featuring boys SO = Sex Offender SOR = Sex Offender Registry SQR = Sure Quality Radio SYF = Sexy or Special Young Friend TBL = Teenage Boy Lover TGL = Teenage Girl Lover Toddlercon = Animated or Cartoon Child Porn featuring sex with toddlers
Pedophile terms VoA = Visions of Alice and Alicelovers.com WIBNI = Wouldn't it be nice if WTGP = Want To Go Private? XGen = Cross-Generational YF = Young Friend
Symbols to look for Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 82
Online Pedophile Groups Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 83 The biggest group online is in the area of “Man Boy Love” Their website community is called “Free Spirits” Other areas you can find them are: Personal websites IRC Channels Web forums Websites that support the pedophile ideals
Pedophile Groups Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 84 CSC = Childhood Sensuality Circle  HNC = Howard Nichols Society NAMBLA = North American Man/Boy Love Association P.A.L. = Pedophile Alliance League PAL = Pedophile Action for Liberation PAN = Pedophiliacs Anonymous  PIE = Pedophile Information Exchange SOhopeful = SOhopeful International, Inc.  TLCCG = The Lewis Carroll Collectors Guild TRGS = The Rene Guyon Society
Websites Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 85 North American Man-Boy Love Association MARTIJN www.boychat.org www.annabelleigh.net TKGL.net ArtSapience.com BLISS or BoyBliss
Websites BoyMoment—message board BoyTales BoyTalk BoyLove Media Watch Boylandonline boylover.net Boys Scout Camp BoysMagicWorld
Websites BoysrUs Butterfly Kisses Cerius Common Ground Crossroads Debate Forum El Castillo Azul Elijah's World GirlLinks GirlLove Garden
Websites GlWiki GU Free Paed Cooperative PCE Jungs Kidzlandonline La Garçonnière LifeLine forum The Little Boy Lover Forum The Montreal Ganymede Collective MrDouble.com
Websites Open Hands P.A.C.E Partij voor Naastenliefde, Vrijheid en Diversiteit Puellula.com Philia SOclear Media Productions, Inc SOhopeful International, Inc Sure Quality Radio TeenBoysWorld TkGL Visions of Alice and Alicelovers.com
Child Images Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 90 If someone that provides you images of a child that are obscene in nature, you need to contact the FBI Innocent Images Task force. They are focused on: Online organizations, enterprises, and communities that exploit children for profit or personal gain. Major distributors of child pornography, such as those who appear to have transmitted a large volume of child pornography via an online computer on several occasions to several other people. Producers of child pornography. Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual activity with a minor. Possessors of child pornography.
Going online There are two ways to report a suspected predator or pedophile with the software. If you come across a suspected site, you simply use the software to report the site. If you get an email from a suspected predator or pedophile, you just right click on the email and choose pedophile reporter and submit the email.
Going online Remember, these tools that I have developed are for REPORTING ONLY. If you come across any suspected pedophile or predator websites, you need to click the report button. This will collect a copy of the webpage you are on, MD5 the data, and upload it to the IPT server. After you send the email in, the site will be reviewed and an investigator will contact you if you wish.
Going online Without proper training, you can be placing yourself at risk if you decide to track down predators and pedophile. Without proper training, you could corrupt evidence against a predator or pedophile and they could go free. The best thing you can do is just report the websites or emails that you come across. And always, always report anything suspicious to your local law enforcement.
Going online If you are online, using an Anonymous program to protect your location is vital. There are many out on the web, but I recommend: Surf Anonymously Online. You can buy this at: www.surfanonymouslyonline.com
How you can help You can help us out by installing the software and reporting any potential websites or emails. I also ask you to spread the word about the free software.  The more people using the software, the more reports and the safer we can make the Internet safer. If you have any ideas, please contact me at: jseanor@internetpredatortracker.com
Are you a victim? If you are a victim of a predator or pedophile, please contact me directly. If you are aware of a suspected predator or pedophile, please contact me directly. If you know of a victim, have them contact me or visit the IPT website and click on Report.
Joining IPT If you would like to volunteer your time and help out with investigations, please contact me directly. I am always looking for people to help out with reports. This is pro-bono work. But someone has to make a stand, right?
Contact information Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 98 http://www.internetpredatortracker.com Email: internetpredatortracker@gmail.com jseanor@internetpredatortracker.com Phone: 404-202-1799
Wrap up Internet Predator Tracker was created to help make a difference online. We need everyone to help out, to spread the word, and to make a difference. If you can help out in anyway, please let me know.
Wrap up Please be safe online. Please keep your children safe online Educate your children about online safety Report any suspicious websites or emails.
Thank you so much! 101 Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved

Contenu connexe

Similaire à Internet predator tracker

Internet predator tracker v4
Internet predator tracker v4Internet predator tracker v4
Internet predator tracker v4Joe Seanor
 
Pedophile Reporter Outlook plugin
Pedophile Reporter Outlook pluginPedophile Reporter Outlook plugin
Pedophile Reporter Outlook pluginJoe Seanor
 
Pedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer pluginPedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer pluginJoe Seanor
 
Firefox plugin
Firefox pluginFirefox plugin
Firefox pluginJoe Seanor
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog comIrisPhilme
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Ted Whittemore
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
Lindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionLindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionIvy Lindsey
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost coldfire007
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Getting started with python
Getting started with pythonGetting started with python
Getting started with pythonTechieHours
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issueshekar M
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me森泉 小
 
Dosearches virus removal
Dosearches virus removalDosearches virus removal
Dosearches virus removalsakthiprime2
 
Meet the iPhone/iTouch
Meet the iPhone/iTouchMeet the iPhone/iTouch
Meet the iPhone/iTouchElizabeth Mamo
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virusharoNaroum
 

Similaire à Internet predator tracker (20)

Internet predator tracker v4
Internet predator tracker v4Internet predator tracker v4
Internet predator tracker v4
 
Pedophile Reporter Outlook plugin
Pedophile Reporter Outlook pluginPedophile Reporter Outlook plugin
Pedophile Reporter Outlook plugin
 
Pedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer pluginPedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer plugin
 
Firefox plugin
Firefox pluginFirefox plugin
Firefox plugin
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Lindsey_FinalTrainingSession
Lindsey_FinalTrainingSessionLindsey_FinalTrainingSession
Lindsey_FinalTrainingSession
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Getting started with python
Getting started with pythonGetting started with python
Getting started with python
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 
How to use spybot
How to use spybotHow to use spybot
How to use spybot
 
Dosearches virus removal
Dosearches virus removalDosearches virus removal
Dosearches virus removal
 
Meet the iPhone/iTouch
Meet the iPhone/iTouchMeet the iPhone/iTouch
Meet the iPhone/iTouch
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Get rid of results hub virus
Get rid of results hub virusGet rid of results hub virus
Get rid of results hub virus
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Internet predator tracker

  • 2. Copyright All material in this presentation is Copyright 2010 by Joseph Seanor and IPT LLC. Any reproduction in physical or electronic format is not allowed without the written permission of Joseph Seanor. If you wish to use this information in a presentation of your own, or in other materials, please contact me at: jseanor@internetpredatortracker.com
  • 3. Mission Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enforcement to assist in the protection of our children on the Internet.
  • 4. What does IPT do? Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows investigators and law enforcement to collect evidence in a secure manner about online predators and pedophiles. We also provide software to the public in order to allow them to report suspected predators and pedophiles.
  • 5. What does IPT do? IPT provides training in the form of classes, both online and in-person, on how to use these tools, collecting evidence, tracking on the internet and more. The goal is to provide the tools and training for FREE to the public and law enforcement.
  • 6. Who is IPT? Internet Predator Tracker was founded by Joe Seanor, who leads the organization and development. Max Fortuna acts as Project Manager for the effort. We also have investigators around the country who donate their time to helping out.
  • 7. Joe Seanor 10 years Central Intelligence Agency, CIC/CNC Department of Justice Telecom Security Staff Private Investigator for 14 years 7 years America Online’s Senior Investigator for Computer Crime Learning Tree Instructor on: IDS, Firewalls, Windows Security. Author of 15 books on computers, cybercrime and more Founder of the PI Mall Developer of Security-Bot Developer of Internet Predator Tracker software CBS radio national correspondent 2 patents pending CISSP, CEH, CET, NSA IAM Developer of Internet Predator Tracker
  • 8. What can I do? YOU are the most important part of this work. Without YOU involved, there is very little that can be done. The latest set of tools we have released allows anyone to be able to report suspected predators and pedophiles. So YOU really are our best source of information!
  • 9. Wait..isn’t this Police work? We work closely with local and federal law enforcement and district attorney’s. The information that is collected with the tools that I have developed is only information. Once we get a report, we contact our local police and DA. We then let law enforcement take over the case.
  • 10. Law Enforcement So, yes, it is the job of Law Enforcement to investigate, capture and prosecute these predators and pedophiles. But, the only way they can know is by someone, maybe you, reporting the suspected predator or pedophile. So, YOU are the most important part of this work!
  • 11. IPT Website The main website for IPT is at: www.internetpredatortracker.com We also have numerous sites on web2.0 websites and social networks.
  • 12. IPT Software The first software developed by Joe Seanor was Internet Predator Tracker. This is a complete solution for investigators and law enforcement to conduct online undercover investigations against online predators and pedophiles. The evidence is collected into a database that is secure and encrypted in order to protect the evidence.
  • 13. IPT Software The original IPT software is only available to law enforcement. And selected, hand picked, hand trained investigators.
  • 14. IPT Public Software I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to report suspected online predators and pedophiles. And all of the software is FREE!! You can download the software from the IPT website, and multiple locations on the web.
  • 15. IPT Public Software We are the ONLY source of predator and pedophile reporting for: Internet Explorer Firefox Google Chrome Safari Opera Outlook Thunderbird ALL FREE!!!
  • 16. IPT Public Software Well, when I designed the software, I wanted all of the versions to work the same, so if you learned one, you could use any of them. Also, I made it as easy to use as possible, so everyone would use it. Each extension for the browsers follow this same process for collecting evidence.
  • 17. IPT Public Software Once you click the Report button: An HTML copy of the site is made. No images are saved or uploaded. A MD5 checksum is created (this protects the evidence.) The file is uploaded to the IPT secure server An email is opened that contains the information about the file that was uploaded and your email address. You just click send!
  • 18. Internet Explorer Due to the way that IE deals with extensions, the Pedophile Reporter extension uses an installation program. Once you download the program, just double click on the setup program to begin the installation.
  • 19. Internet Explorer Now you will see
  • 20. Internet Explorer Continue the install, and be sure to accept the license agreement. When you get to the installation folder, please do not change that location.
  • 21. Internet Explorer The installation will continue like any normal windows install program. And at the end you will see:
  • 22. Internet Explorer Now that you have installed the Pedophile reporter, you will find it located on your Internet Explorer menu bar
  • 25. Firefox You can go in and configure the options for the extension by clicking on Tools and then Add-ons. Once you do, just click on the Options button under the name of the extension.
  • 28. Google Chrome Make sure to start Google Chrome and then just go to: www.google.com In order to install the Pedophile reporter extension for Google Chrome, just google “Google Chrome report pedophile” The first link will be for the Chrome Web Store, click on that link and you will end up at the Chrome Web store for Report Pedophile.
  • 30. Google Chrome Now, all you have to do is click on Install. Chrome will not install the extension for you. Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent. Then just click save/close on the options window.
  • 32. Safari Safari is the browser from Apple, and runs on both the Macintosh and PC. In order to install the extension using the Safari browser, just go to: www.internetpredatortracker.com Click on the tab called Software Choose Safari extension Then click either the English or Spanish version of the software.
  • 33. Safari Once you click on the download link, you will see the following window. Just click on Open
  • 34. Safari You will then be prompted with the following window, choose Install.
  • 35. Safari The extension will be installed, and you will see Safari, now look like this:
  • 36. Safari Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent. Then just click save/close on the options window.
  • 37. Email Reporting To use the Outlook and Thunderbird plug-ins, just right click on the suspected email in your inbox and the program will collect the header information and email. You just click send and it arrives at our IPT servers. So, lets see how to install it.
  • 38. Thunderbird In order to install the Pedophile reporter for Thunderbird, just google “thunderbird extensions pedophile reporter” The first choice will take you to the Mozilla Thunderbird page. All you have to do is click on the Download Now button.
  • 40. Thunderbird Now you will see the file save window. Click and save the file to your Desktop.
  • 41. Thunderbird Now, with the extension installed, you will want to startup Thunderbird. Once started, just click on Tools Choose Add-on’s Click on the Install button and choose the pedophile reporter file you just downloaded to your desktop.
  • 43. Thunderbird Once you click on Install and double-click on the file that you saved to your desktop. You will then see the following window
  • 44. Thunderbird Once you click Install, the extension will be installed. You will then need to click on the Restart Thunderbird, and the extension will now be active. In order to use the extension, just right click on the suspected email in the Inbox, and choose Pedophile Alerter.
  • 46. Email Report Now, you will see the email that contains the headers and body from the suspected email. You will also have the option to choose either “suspected predator” or “suspected pedophile” All you have to do now is click Send, and the report, containing the headers and body from the suspected email will be sent to the IPT server.
  • 48. Outlook As the largest email program on the market, it was only natural that we develop a add-on for Outlook. However, Outlook is not as easy to add things to like Thunderbird is. In order to have the extension added to Outlook, you will run an install program.
  • 49. Outlook Once you download the file, just double-click on the pedophile alerter setup program.
  • 50. Outlook Once started, you will walk through a standard windows installation program.
  • 51. Outlook After you accept the installation agreement, you will be presented with the folder location. Please do not change the location of the files. Once the files are installed you will see
  • 52. Outlook Once you click close, you will be presented with the following screen. Just fill out the information, this is where the copy of the email will be sent.
  • 53. Outlook In order to use the plug-in, you just need to right-click on the suspected email, and choose Pedophile Alert.
  • 54. Outlook Now, you will get the choice of the subject
  • 55. Outlook You will then see the email that is to be sent. The email contains al of the information about the suspected email that is needed to track the sender down. All you have to do is click Send, and the email and information will be delivered to the IPT server.
  • 57. So, why do this? One out of five kids using online chat-lines are approached by pedophiles Nine out of ten kids aged 9 to 16 have viewed pornography on the Internet 25% of kids subjected to sexual solicitation tell their parents All these names may lead you straight to pornographic websites if you make an Internet search on them – Disney, Action Man, Barbie, Pokemon, ESPN, Alice, My Little Pony 100,000 sites existed in 2001 on the Internet about child pornography 100 billion are spent every year on pornographic sites with pay access on the Internet
  • 58. And…. The stories just go on and on. As you can tell, with the growth of the internet these predators and pedophiles have found a new playground and it is the Internet. These are a very small sample of the number of reported cases of predators and pedophiles. The majority of these issues go UNREPORTED.
  • 59. As a parent Know what your children are doing online. Teach kids not to give out any identifying information. Report any suspicious activity to police. Never let your child meet anyone from online without parental supervision. Keep user names and profiles generic and anonymous. Avoid posting personal photos online.
  • 60. As a parent Always keep private information private. Place the family computer in an open area. Remind children that online “friends” are still strangers. You must still show respect children’s privacy Become a part of your child’s online experience. Be aware of phone calls or mail deliveries from unfamiliar persons.
  • 61. Predator vs. Pedophile Lets look at a checklist of characteristics of these two types of people. These are lists I have put together from FBI documents. If you would like to read the full report, please email me and I’ll send it to you.
  • 63. The Predator He abuses then backs off. He has to win, and it is very important to him that he is always right. He Hates and Loves Women at the Same Time. Endless Cycle of Love/Hate with his Mother This person was probably abused by his mother and then coddled. 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 63
  • 64. The Predator He transposes these feelings to other women. He tries to create the same type of environment with other women. This time he IS in CONTROL. He may have a wife. If so, he is a model husband. He needs one relationship with a female that is solid and wholesome; that is why he looks elsewhere for women to abuse. 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 64
  • 65. The Predator MOST IMPORTANT Remember, he is most likely very shy and timid or reserved in the real world and has low self esteem until he gets on the Internet. Then he is the MASTER of his domain. 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 65
  • 67. Pedophile Characteristics Sexual Abuse in Background Limited Social Contact as Teenagers Frequent and Unexpected Moves (locations) Prior Arrests Multiple Victims Older Than 25, Single, Never Married Lives Alone or With Parents 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 67
  • 68. Limited Dating Relationships If Not Married If Married, “Special” Relationship With Spouse Associates and Circle of Friends are Young Refers to Children as “Clean,” “Pure,” “Innocent,” “Impish,” or Objects Skilled at Identifying Vulnerable Victims Has Access to Children Seduces With Attention, Affection, and Gifts 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 68 Pedophile Characteristics
  • 69. Skilled at Manipulating Children Shows Sexually Explicit Material to Children Youth-Oriented Decorations in House or Room Photographing of Children clothed or unclothed 12/22/2010 Copyright 2010 Joseph Seanor and PI Mall LLC 69 Pedophile Characteristics
  • 71. Internet sources to look at Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 71 Websites News Groups IRC File Servers, P2P systems, Bit Torrent BBS’s (yes they are still around!!)
  • 72. Keywords to look for Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 72 When you are looking for Pedophiles, there are certain terms to look for or you may “hear” Boy love or blogo Ehebophila Hebephilia Girl love or glogo Infantophilia Lolita Clogo
  • 73. Pedophile terms Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 73 12chan = used as a place where all the material that is illegal to post on 4chan is traded. 4chan = group that trades objectionable pictures and material. AF = Adult Friend ANTI = Anti-Pedophile or Pedophile Hunter AoA = Age of Attraction AoC = Age of Consent ATBOYS = Attracted to Boys 
  • 74. Pedophile terms Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 74 BC = Boy Chat BK = Butterfly Kisses BL = Boy love or Boy lover BLi = Boy Links BLISS = BoyBliss BLN = Boylover.net BLogo = BoyLover Logo BLOL = Boy land online BM = Boy Moment BMW = BoyLove Media Watch BRU = BoysrUs BT = BoyTales
  • 75. Pedophile terms CA = Child Advocate CHSC = Cement-headed Straight Clown CL = Childlove(r) Pedophile term used to describe an attraction to both male and female Children CLogo = ChildLover Logo CLOMAL = ChildLove Online Media Activism CM = Child Molester CP = Child Pornography CPS = Child Protection Services CSA = Child Sexual Abuse FSC = Free Spirits Coalition, aka Free Spirits Committee
  • 76. Pedophile terms GC = Girl Chat GL = Girllove or Girllover GLi = Girl Links GLN = Girllover.net GLogo = GirlLover Logo GlWiki = Girl Love Wiki GM = Girl Moment GT = Get Together GTG = Get Together
  • 77. Pedophile terms HBP = High Boylover Priesthood HEBE = Refers to Hebephilia, or the sexual attraction to underage children from post puberty (age 12 to the age of 17) IBLD = International BoyLove Day IBLD = International BoyLove Day IM = Instant Messaging JF = Jungsforum (German) or Jongensforum (Dutch) KLOL = Kidzlandonline KP = Kiddie Porn
  • 78. Pedophile terms LB = Little Boy LBL = Little Boy Lover LBLogo = LittleBoy Lover Logo LEA = Law Enforcement Agency LEO = Law Enforcement Officer LG = Little Girl LGL = Little Girl Lover LGs = Little Girls LL = LifeLine LLWS = Little League World Series LMIRL = Lets Meet In Real Life LOLI = Reference to girls under 12 LOLICON = Drawings or Cartoons (Animated) of Child Pornography featuring girls Loved boy = a boy who is being molested by a pedophile LULAB = Love you like a brother LULAS = Love you like a sister
  • 79. Pedophile terms MAA = Minor-Attracted Adult MBC = MetaBoyChat MHAMIC = Male Homosexual Attraction to Minors Information Center NEPI = refers to Nepiophilia aka Infantophilia is the sexual attraction towards babies and toddlers (aged 0-4/5 years). NN = Non Nude Model Sites/Photos where underage girls as young as two pose scantily clad in adult lingerie or in overtly sexy poses P.A.C.E. = Pedophiles Against Child Exploitation PAN = Pedophile Alert Network PCE = International Pedophile and Child Emancipation PT = Pre-Teen
  • 80. Pedophile terms RL = Real Life RPG = Role playing games RSO = Registered Sex Offender SHOTA/SHOTACON = Drawings or Cartoons (Animated) Child Pornography featuring boys SO = Sex Offender SOR = Sex Offender Registry SQR = Sure Quality Radio SYF = Sexy or Special Young Friend TBL = Teenage Boy Lover TGL = Teenage Girl Lover Toddlercon = Animated or Cartoon Child Porn featuring sex with toddlers
  • 81. Pedophile terms VoA = Visions of Alice and Alicelovers.com WIBNI = Wouldn't it be nice if WTGP = Want To Go Private? XGen = Cross-Generational YF = Young Friend
  • 82. Symbols to look for Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 82
  • 83. Online Pedophile Groups Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 83 The biggest group online is in the area of “Man Boy Love” Their website community is called “Free Spirits” Other areas you can find them are: Personal websites IRC Channels Web forums Websites that support the pedophile ideals
  • 84. Pedophile Groups Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 84 CSC = Childhood Sensuality Circle HNC = Howard Nichols Society NAMBLA = North American Man/Boy Love Association P.A.L. = Pedophile Alliance League PAL = Pedophile Action for Liberation PAN = Pedophiliacs Anonymous PIE = Pedophile Information Exchange SOhopeful = SOhopeful International, Inc. TLCCG = The Lewis Carroll Collectors Guild TRGS = The Rene Guyon Society
  • 85. Websites Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 85 North American Man-Boy Love Association MARTIJN www.boychat.org www.annabelleigh.net TKGL.net ArtSapience.com BLISS or BoyBliss
  • 86. Websites BoyMoment—message board BoyTales BoyTalk BoyLove Media Watch Boylandonline boylover.net Boys Scout Camp BoysMagicWorld
  • 87. Websites BoysrUs Butterfly Kisses Cerius Common Ground Crossroads Debate Forum El Castillo Azul Elijah's World GirlLinks GirlLove Garden
  • 88. Websites GlWiki GU Free Paed Cooperative PCE Jungs Kidzlandonline La Garçonnière LifeLine forum The Little Boy Lover Forum The Montreal Ganymede Collective MrDouble.com
  • 89. Websites Open Hands P.A.C.E Partij voor Naastenliefde, Vrijheid en Diversiteit Puellula.com Philia SOclear Media Productions, Inc SOhopeful International, Inc Sure Quality Radio TeenBoysWorld TkGL Visions of Alice and Alicelovers.com
  • 90. Child Images Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 90 If someone that provides you images of a child that are obscene in nature, you need to contact the FBI Innocent Images Task force. They are focused on: Online organizations, enterprises, and communities that exploit children for profit or personal gain. Major distributors of child pornography, such as those who appear to have transmitted a large volume of child pornography via an online computer on several occasions to several other people. Producers of child pornography. Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual activity with a minor. Possessors of child pornography.
  • 91. Going online There are two ways to report a suspected predator or pedophile with the software. If you come across a suspected site, you simply use the software to report the site. If you get an email from a suspected predator or pedophile, you just right click on the email and choose pedophile reporter and submit the email.
  • 92. Going online Remember, these tools that I have developed are for REPORTING ONLY. If you come across any suspected pedophile or predator websites, you need to click the report button. This will collect a copy of the webpage you are on, MD5 the data, and upload it to the IPT server. After you send the email in, the site will be reviewed and an investigator will contact you if you wish.
  • 93. Going online Without proper training, you can be placing yourself at risk if you decide to track down predators and pedophile. Without proper training, you could corrupt evidence against a predator or pedophile and they could go free. The best thing you can do is just report the websites or emails that you come across. And always, always report anything suspicious to your local law enforcement.
  • 94. Going online If you are online, using an Anonymous program to protect your location is vital. There are many out on the web, but I recommend: Surf Anonymously Online. You can buy this at: www.surfanonymouslyonline.com
  • 95. How you can help You can help us out by installing the software and reporting any potential websites or emails. I also ask you to spread the word about the free software. The more people using the software, the more reports and the safer we can make the Internet safer. If you have any ideas, please contact me at: jseanor@internetpredatortracker.com
  • 96. Are you a victim? If you are a victim of a predator or pedophile, please contact me directly. If you are aware of a suspected predator or pedophile, please contact me directly. If you know of a victim, have them contact me or visit the IPT website and click on Report.
  • 97. Joining IPT If you would like to volunteer your time and help out with investigations, please contact me directly. I am always looking for people to help out with reports. This is pro-bono work. But someone has to make a stand, right?
  • 98. Contact information Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 98 http://www.internetpredatortracker.com Email: internetpredatortracker@gmail.com jseanor@internetpredatortracker.com Phone: 404-202-1799
  • 99. Wrap up Internet Predator Tracker was created to help make a difference online. We need everyone to help out, to spread the word, and to make a difference. If you can help out in anyway, please let me know.
  • 100. Wrap up Please be safe online. Please keep your children safe online Educate your children about online safety Report any suspicious websites or emails.
  • 101. Thank you so much! 101 Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved