Online Child Enticement<br />Crystal Ke<br />Duffey CJ446<br />August 15, 2011<br />Final Project<br />
What  is Child Enticement?<br />Internet/Electronic communication<br />Entice, Invite, or Persuade a child<br />Meet for S...
Nevada Law<br />Suspect over 18<br />Knowingly contact/communicate via the use of a computer system/network<br />Child und...
Nevada Penalties<br />Guilty<br />Attempted<br />Category B felony<br />Minimum 2 years<br />Maximum 20 years<br />Maximum...
Who Is Vulnerable<br />Teenagers<br />Unsupervised<br />Relationship/Companionship<br />Sexual activity<br />Younger Child...
One Study…<br />1,500 users; 1999-2000<br />10-17 yoa<br />1 in 7 received unwanted sexual solicitation<br />4% - aggressi...
Williamsburg, VA<br />Thursday, July 2010<br />Suspect: Justin Bradley May aka “Jason Marx”<br />Victim: 13 year old girl<...
 May acted as a modeling agent
 Sent emails from an alleged model “Nikki”.
 Nikki convinced girl to send nude pictures of herself over the Internet.
 Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
 FBI traced emails to May’s computer at W&M College.
Production of Child Pornography
 Coercion and enticement of a minor
 Receipt of Child Pornography
 15 years in Prison
 Possible 30year sentence
 $250,000 fine
 Lifetime supervision</li></li></ul><li>By My Mother’s Hand<br />Story<br />Caught<br />several online personas - single f...
Computer<br />Hardware<br />
Seizing A Computer<br /><ul><li> Turn off computer – hard shutdown
 Take pictures of computer to record configuration and hardware connections
Label all wires, cables, or connectors for reassembly
Dismantle computer
Carefully move computer to a safe location where it will not be interfered with.</li></li></ul><li>Preservation<br />Take ...
Pack & Move<br />Individual packaging<br />Cool, dry, shock-absorbing manner<br />Power cables can be packed with immediat...
Chain of Custody<br />Document every person<br />Their position<br />What they did<br /><ul><li>Ensure nothing was manipul...
Upcoming SlideShare
Loading in …5
×

Online Child Enticement

1,909 views

Published on

A project depicting:
What Online Child Enticement is;
What the consequences are;
The behind-the-scenes forensics;
Preserving and moving computer evidence;
Case examples

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,909
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Online Child Enticement

  1. 1. Online Child Enticement<br />Crystal Ke<br />Duffey CJ446<br />August 15, 2011<br />Final Project<br />
  2. 2. What is Child Enticement?<br />Internet/Electronic communication<br />Entice, Invite, or Persuade a child<br />Meet for Sexual Acts<br />
  3. 3. Nevada Law<br />Suspect over 18<br />Knowingly contact/communicate via the use of a computer system/network<br />Child under 16<br />At least 5 years younger than the suspect<br />Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents<br />Without expressed consent<br />Intent to avoid consent with parents<br />Intent to engage in sexual conduct<br />
  4. 4. Nevada Penalties<br />Guilty<br />Attempted<br />Category B felony<br />Minimum 2 years<br />Maximum 20 years<br />Maximum fine $10,000<br />Guilty if found to take steps to commit the crime<br />Intent<br />Must show strong possibility of committing the crime<br />Maximum 10 year sentence<br />
  5. 5. Who Is Vulnerable<br />Teenagers<br />Unsupervised<br />Relationship/Companionship<br />Sexual activity<br />Younger Children<br />Friendship<br />Innocence<br />Fishing for children<br />
  6. 6. One Study…<br />1,500 users; 1999-2000<br />10-17 yoa<br />1 in 7 received unwanted sexual solicitation<br />4% - aggressive solicitation (contact outside the Internet)<br />5% - reported to Law Enforcement, an Internet Service Provider, or other authority<br />
  7. 7. Williamsburg, VA<br />Thursday, July 2010<br />Suspect: Justin Bradley May aka “Jason Marx”<br />Victim: 13 year old girl<br /><ul><li> Victim originally posted clothed images on a modeling website.
  8. 8. May acted as a modeling agent
  9. 9. Sent emails from an alleged model “Nikki”.
  10. 10. Nikki convinced girl to send nude pictures of herself over the Internet.
  11. 11. Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
  12. 12. FBI traced emails to May’s computer at W&M College.
  13. 13. Production of Child Pornography
  14. 14. Coercion and enticement of a minor
  15. 15. Receipt of Child Pornography
  16. 16. 15 years in Prison
  17. 17. Possible 30year sentence
  18. 18. $250,000 fine
  19. 19. Lifetime supervision</li></li></ul><li>By My Mother’s Hand<br />Story<br />Caught<br />several online personas - single father<br />single mothers in New Hampshire, Florida, and Idaho<br />Entice mothers to sexually assault their children<br />Mothers would send pictures and live web camera access to Demink<br />Ex: Demink pretended to be a psychologistClaimed that sexual acts could help mother get closer to her mentally challenged child.<br />Grandmother’s conversation with grandson.<br />Boy was visiting his mother and didn’t have any fun.<br />Demink sentenced to life in Prison<br />Suspect: Steven Demink<br />Victims: 7 single mothers and 12 children<br />
  20. 20. Computer<br />Hardware<br />
  21. 21. Seizing A Computer<br /><ul><li> Turn off computer – hard shutdown
  22. 22. Take pictures of computer to record configuration and hardware connections
  23. 23. Label all wires, cables, or connectors for reassembly
  24. 24. Dismantle computer
  25. 25. Carefully move computer to a safe location where it will not be interfered with.</li></li></ul><li>Preservation<br />Take care that the computer doesn’t erase all information on power disconnect.<br />Do no harm / Preserve in a pristine state<br />Protect from physical harm, magnetic fields, etc.<br />Take pictures<br />Distance suspect<br />
  26. 26. Pack & Move<br />Individual packaging<br />Cool, dry, shock-absorbing manner<br />Power cables can be packed with immediate hardware<br />Antistatic bubble wrap<br />Specially manufactured evidence bags<br />Record serial numbers<br />Box for transport<br />Large transport vehicle<br />
  27. 27. Chain of Custody<br />Document every person<br />Their position<br />What they did<br /><ul><li>Ensure nothing was manipulated</li></li></ul><li>Preserve & Copy<br />Create several copies of materials<br />Write Blocker<br />Copy not alter<br />Bit-by-bit copy (aka bitstream copy)<br /><ul><li>Hard dick drive is copied exactly</li></li></ul><li>Computer Search<br />Make copies of all the computer data<br />Document all data and information using software that ensures nothing is altered or changed.<br />Record times of seizure and searches<br />Search for deleted files in unallocated space on disk drive<br />Identify and document all information researched and retrieved<br />Review manually encrypted files for evidence.<br />Evaluate the computer’s applications and software –might be used to send out viruses, etc.<br />Log and record all software used in the investigation and ensure you are licensed to use these programs.<br />
  28. 28. Forensic Software<br />Find data files<br />Clone/preserve digital evidence<br />Analyze digital evidence<br />Separate and categorize data files by type<br />Compare files to list of known contraband files<br />Recover deleted/hidden data<br />Crack/recover passwords<br />Systematically report findings in a paper report<br />
  29. 29.
  30. 30. Internet Communications Laws<br />ECPA<br />Electronic Communications Protection Act<br />Codify when government could and could not intercept Internet and/or stored communications<br />i.e. emails sent, in transmission, received<br />PPA<br />Privacy Protection Act<br />Seizing computers = seizing irrelevant information<br />Illegal to seize and hold irrelevant material<br />Investigators must make every possible effort to return non-case related information<br />
  31. 31. A letter through the Postal Service<br />
  32. 32. Email Pathway Simplified<br />Connection to ISP<br />Connection to ISP<br />Internet Path between Servers<br />
  33. 33. Email Tracing-The Long Way<br />Copy/Clone email<br />Open Full Header<br />Analyze Timestamps and IP Addresses<br />Sender’s personal IP address<br />Sender’s ISP email server<br />Recipient’s ISP email server<br />Recipient’s personal IP address<br />WHOIS search<br />Subpoena records from appropriate company<br />User account information, billing address, etc.<br />
  34. 34. Email Tracing - Direct<br />Suspect continually receives emails from victim<br />Website program<br />Attaches a line of code to outgoing email<br />Confirmation email sent to victim<br />Contains IP address, date and time email was opened<br />Unrecognizable to most<br />Identifiable in full header<br />
  35. 35. Instant Messaging<br />Problems:<br />Limited time frame to obtain evidence<br />Probable bogus information<br />Good news:<br />Computers can save chat transcripts<br />Document conversations<br />Record criminal intent<br />Information logged on computers<br />Subpoena for suspect’s computer<br />
  36. 36. Fourth Amendment & Your Search Warrant <br />Consent<br />“Shifting Sands”<br />Include scope of search in its entirety<br />Search incident to lawful arrest<br />J.B. May case<br />Warrant for computer and files<br />Workplace searches<br />College professors’ Internet activity monitored<br />J.B. May supervisor can conduct search for evidence of work-related misconduct<br />
  37. 37. My Suggestion<br />Nevada:<br /><ul><li> 2-20 years in prison
  38. 38. $10,000 fine</li></ul>Mississippi:<br /><ul><li> 1st offense:
  39. 39. 5-40 years
  40. 40. $50,000-$500,000
  41. 41. 2+ offense:
  42. 42. 20-Life
  43. 43. $100,000-$1,000,000</li></ul>Wisconsin:<br /><ul><li> Not to exceed 40 years
  44. 44. Not to exceed $100,0000</li></li></ul><li>Resources<br />"Nevada Child Enticement Laws | CriminalDefenseLawyer.com." Criminal Defense Lawyers. Criminal Law Information. Crimes & Legal Advice | CriminalDefenseLawyer.com.. Web. 13 Aug. 2011. <http://www.criminaldefenselawyer.com/resources/criminal-defense/sex-crimes/nevada-child-enticement-laws.htm>.<br />"Missing Children Website." National Center for Missing and Exploited Children. Web. 13 Aug. 2011. <http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US>.<br />"W&M Prof Pleads Guilty to Child Porn Charge." The Virginia Gazette. 18 Oct. 2010. Web. 15 Aug. 2011. <http://www.vagazette.com/articles/2010/10/18/news/doc4cbc918710630953874591.txt>.<br />Weidman, Chris. "W&M Professor Charged in Online Child Enticement Case." WY Daily - Williamsburg, VA Yorktown, VA Daily News. 3 July 2010. Web. 15 Aug. 2011. <http://wydaily.com/local-news/4664-wam-professor-charged-in-online-child-enticement-case.html>.<br />"Trumbull Man Pleads No Contest." Omaha.com. 18 Nov. 2009. Web. 15 Aug. 2011. <http://www.omaha.com/article/20091118/NEWS01/911189956>.<br />"Trumbull Man Pleads No Contest in Online Child Enticement Case - Nebraska City, NE - Nebraska City News-Press." Homepage - Nebraska City, NE - Nebraska City News-Press. 18 Nov. 2009. Web. 15 Aug. 2011. <http://www.ncnewspress.com/news/x381219796/Trumbull-Man-Pleads-No-Contest-in-Online-Child-Enticement-Case>.<br />
  45. 45. Resources (cont.)<br />Baldas, Tresa. "Redford Man Gets Life for Enticing Moms to Molest Their Children Online." Freep.com. Detroit Free Press, 3 Aug. 2011. Web. 15 Aug. 2011. <http://www.freep.com/article/20110803/NEWS02/110803037/Redford-man-gets-life-enticing-moms-molest-their-children-online?odyssey=nav%7Chead>.<br />Mei, Julia Lynne. "How to Secure Computer Forensics Evidence | EHow.com." EHow | How to Videos, Articles & More - Trusted Advice for the Curious Life | EHow.com. 7 Sept. 2010. Web. 15 Aug. 2011. <http://www.ehow.com/how_7246434_secure-computer-forensics-evidence.html>.<br />"State Sentencing Guidelines for Online Enticement." Missingkids.com. 4 Dec. 2006. Web. 15 Aug. 2011. <http://www.missingkids.com/en_US/documents/state-sentencing-online-enticement.pdf>.<br />Knetzger, Michael, and Jeremy Muraski. Investigating High-Tech Crime. Custom ed. Upper Saddle River: Prentice Hall, 2008. Print.<br />Google Images<br />Ke, Crystal <br />

×