Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Internet predator tracker<br />
Copyright<br />All material in this presentation is Copyright 2011 by Joseph Seanor and IPT LLC.<br />Any reproduction in ...
Mission<br />Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enf...
What does IPT do?<br />Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows inves...
What does IPT do?<br />IPT provides training in the form of classes, both online and in-person, on how to use these tools,...
Who is IPT?<br />Internet Predator Tracker was founded by Joe Seanor, who leads the organization and development.<br />Max...
Joe Seanor	<br />10 years Central Intelligence Agency, CIC/CNC<br />Department of Justice Telecom Security Staff<br />Priv...
What can I do?<br />YOU are the most important part of this work.<br />Without YOU involved, there is very little that can...
Wait..isn’t this Police work?<br />We work closely with local and federal law enforcement and district attorney’s.<br />Th...
Law Enforcement<br />So, yes, it is the job of Law Enforcement to investigate, capture and prosecute these predators and p...
IPT Website<br />The main website for IPT is at: <br />www.internetpredatortracker.com<br />We also have numerous sites on...
IPT Software<br />The first software developed by Joe Seanor was Internet Predator Tracker.<br />This is a complete soluti...
IPT Software<br />The original IPT software is only available to law enforcement.<br />And selected, hand picked, hand tra...
IPT Public Software<br />I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to re...
IPT Public Software<br />We are the ONLY source of predator and pedophile reporting for:<br />Internet Explorer<br />Firef...
IPT Public Software<br />Well, when I designed the software, I wanted all of the versions to work the same, so if you lear...
IPT Public Software<br />Once you click the Report button:<br />An HTML copy of the site is made.<br />No images are saved...
Internet Explorer<br />Due to the way that IE deals with extensions, the Pedophile Reporter extension uses an installation...
Internet Explorer<br />Now you will see<br />
Internet Explorer<br />Continue the install, and be sure to accept the license agreement.  When you get to the installatio...
Internet Explorer<br />The installation will continue like any normal windows install program.  And at the end you will se...
Internet Explorer<br />Now that you have installed the Pedophile reporter, you will find it located on your Internet Explo...
Firefox<br />
Firefox<br />
Firefox<br />You can go in and configure the options for the extension by clicking on Tools and then Add-ons.<br />Once yo...
Firefox options<br />
Google Chrome<br />
Google Chrome<br />Make sure to start Google Chrome and then just go to: www.google.com<br />In order to install the Pedop...
Google Chrome<br />
Google Chrome<br />Now, all you have to do is click on Install.<br />Chrome will not install the extension for you.<br />O...
Google Chrome<br />
Safari<br />Safari is the browser from Apple, and runs on both the Macintosh and PC.<br />In order to install the extensio...
Safari<br />Once you click on the download link, you will see the following window.<br />Just click on Open<br />
Safari<br />You will then be prompted with the following window, choose Install.<br />
Safari<br />The extension will be installed, and you will see Safari, now look like this:<br />
Safari<br />Once it is completed, the options window will open up so you can choose the email program you use and the emai...
Email Reporting<br />To use the Outlook and Thunderbird plug-ins, just right click on the suspected email in your inbox an...
Thunderbird <br />In order to install the Pedophile reporter for Thunderbird, just google “thunderbird extensions pedophil...
Thunderbird<br />
Thunderbird<br />Now you will see the file save window.<br />Click and save the file to your Desktop.<br />
Thunderbird<br />Now, with the extension installed, you will want to startup Thunderbird.<br />Once started, just click on...
Thunderbird<br />
Thunderbird<br />Once you click on Install and double-click on the file that you saved to your desktop.<br />You will then...
Thunderbird<br />Once you click Install, the extension will be installed.<br />You will then need to click on the Restart ...
Thunderbird<br />
Email Report<br />
Email Report<br />Now, you will see the email that contains the headers and body from the suspected email.<br />You will a...
Outlook<br />As the largest email program on the market, it was only natural that we develop a add-on for Outlook.<br />Ho...
Outlook<br />Once you download the file, just double-click on the pedophile alerter setup program.<br />
Outlook<br />Once started, you will walk through a standard windows installation program.<br />
Outlook<br />After you accept the installation agreement, you will be presented with the folder location.<br />Please do n...
Outlook<br />Once you click close, you will be presented with the following screen.<br />Just fill out the information, th...
Outlook<br />In order to use the plug-in, you just need to right-click on the suspected email, and choose Pedophile Alert....
Outlook<br />Now, you will get the choice of the subject<br />
Outlook<br />
Outlook<br />You will then see the email that is to be sent. <br />The email contains al of the information about the susp...
Android Pedophile Reporter!<br />YES!!!!<br />I’ve done it again!<br />I now have a version of the Pedophile Reporter for ...
Android Pedophile Reporter!<br />K9PR is the name of the Android App<br />It is a copy of the K-9 email program, but it ha...
Android Pedophile Reporter!<br />When you receive an email from a suspected predator or suspected pedophile, just choose O...
Android Pedophile Reporter!<br />When you choose the option of Pedophile Reporter, the program will pull all of the origin...
iPhone Pedophile Reporter<br />I am currently in development of the iPhone version.<br />When it is ready, I will send an ...
What happens with a report?<br />Once a report is sent in, an email alert is sent directly to me so that I can check the r...
What happens with a report?<br />http://XXXXXXXX-models.com/ftp://ftp.internetpedophiletracker.com/[1295120896]Report.zip ...
What happens with a report?<br />You can see from the email that it contains the website name<br />It contains the FTP fil...
MD5?<br />MD5 is a cryptographic checksum that is made of a file.<br />The MD5 is designed to protect the file from change...
What happens with a report?<br />As you can see, I get a copy of the website name, so I can verify that it is a real websi...
What happens with a report?<br />Once that is complete, I burn a copy of the file that was uploaded, along with the MD5 ha...
The IPT Disc	<br />I have finished developing and testing a new disc that will be available for download from the website....
The IPT Disc<br />
So, why do this?<br />One out of five kids using online chat-lines are approached by pedophiles<br />Nine out of ten kids ...
And….<br />The stories just go on and on.<br />As you can tell, with the growth of the internet these predators and pedoph...
As a parent<br />Know what your children are doing online.<br />Teach kids not to give out any identifying information.<br...
As a parent<br />Always keep private information private.<br />Place the family computer in an open area.<br />Remind chil...
Predator vs. Pedophile<br />Lets look at a checklist of characteristics of these two types of people.<br />These are lists...
The Predator<br />
The Predator<br />He abuses then backs off. <br />He has to win, and it is very important to him that he is always right.<...
The Predator <br />He transposes these feelings to other women. <br />He tries to create the same type of environment with...
The Predator<br />MOST IMPORTANT<br />Remember, he is most likely very shy and timid or reserved in the real world and has...
The Pedophile<br />
Pedophile Characteristics<br />Sexual Abuse in Background<br />Limited Social Contact as Teenagers <br /> Frequent and Une...
Limited Dating Relationships If Not Married<br /> If Married, “Special” Relationship With Spouse <br />Associates and Circ...
Skilled at Manipulating Children<br />Shows Sexually Explicit Material to Children <br /> Youth-Oriented Decorations in Ho...
Internet <br />
Internet sources to look at<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />84<br />Websites<br...
Keywords to look for<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />85<br />When you are looki...
Pedophile terms<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />86<br />12chan = used as a plac...
Pedophile terms<br />MAA = Minor-Attracted Adult<br />MBC = MetaBoyChat<br />MHAMIC = Male Homosexual Attraction to Minors...
Pedophile terms<br />RL = Real Life<br />RPG = Role playing games<br />RSO = Registered Sex Offender<br />SHOTA/SHOTACON =...
Symbols to look for<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />89<br />
Online Pedophile Groups<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />90<br />The biggest gro...
Pedophile Groups<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />91<br />CSC = Childhood Sensua...
Websites<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />92<br />North American Man-Boy Love As...
Child Images<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />93<br />If someone that provides y...
Going online<br />There are two ways to report a suspected predator or pedophile with the software.<br />If you come acros...
Going online<br />Remember, these tools that I have developed are for REPORTING ONLY.<br />If you come across any suspecte...
Going online<br />Without proper training, you can be placing yourself at risk if you decide to track down predators and p...
Going online<br />If you are online, using an Anonymous program to protect your location is vital.<br />There are many out...
Facebook<br />How do you report Pedophiles and Predators on Facebook?<br />Easy, first make sure you have the Pedophile Re...
MySpace<br />How do you report Pedophiles and Predators on MySpace?<br />Easy, first make sure you have the Pedophile Repo...
Any other Social Network?<br />How do you report Pedophiles and Predators on any other Social Network?<br />Easy, first ma...
Why Firefox?	<br />You can use any browser, I just used Firefox in that example.<br />Remember, I have tools for: <br />In...
How you can help<br />You can help us out by installing the software and reporting any potential websites or emails.<br />...
Are you a victim?<br />If you are a victim of a predator or pedophile, please contact me directly.<br />If you are aware o...
Joining IPT<br />If you would like to volunteer your time and help out with investigations, please contact me directly.<br...
Current Software<br />Pedophile Reporter—Internet Explorer<br />Pedophile Reporter—Firefox<br />Pedophile Reporter—Google ...
Wrap up<br />What does 2011 hold for IPT?<br />Non-Profit status!<br />IPT software 2011<br />IPT IM program for the publi...
Wrap up<br />Internet Predator Tracker was created to help make a difference online.<br />We need everyone to help out, to...
Wrap up<br />Please be safe online.<br />Please keep your children safe online<br />Educate your children about online saf...
Contact information<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />109<br />http://www.interne...
Thank you so much!<br />110<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />
Upcoming SlideShare
Loading in …5
×

Internet predator tracker v4

1,239 views

Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Internet predator tracker v4

  1. 1. Internet predator tracker<br />
  2. 2. Copyright<br />All material in this presentation is Copyright 2011 by Joseph Seanor and IPT LLC.<br />Any reproduction in physical or electronic format is not allowed without the written permission of Joseph Seanor.<br />If you wish to use this information in a presentation of your own, or in other materials, please contact me at: jseanor@internetpredatortracker.com<br />
  3. 3. Mission<br />Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enforcement to assist in the protection of our children on the Internet.<br />
  4. 4. What does IPT do?<br />Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows investigators and law enforcement to collect evidence in a secure manner about online predators and pedophiles.<br />We also provide software to the public in order to allow them to report suspected predators and pedophiles.<br />
  5. 5. What does IPT do?<br />IPT provides training in the form of classes, both online and in-person, on how to use these tools, collecting evidence, tracking on the internet and more.<br />The goal is to provide the tools and training for FREE to the public and law enforcement.<br />
  6. 6. Who is IPT?<br />Internet Predator Tracker was founded by Joe Seanor, who leads the organization and development.<br />Max Fortuna acts as Project Manager for the effort.<br />Daisy Saenz, Assistant Director and investigator.<br />We also have investigators around the country who donate their time to helping out.<br />
  7. 7. Joe Seanor <br />10 years Central Intelligence Agency, CIC/CNC<br />Department of Justice Telecom Security Staff<br />Private Investigator for 14 years<br />7 years America Online’s Senior Investigator for Computer Crime<br />Learning Tree Instructor on: IDS, Firewalls, Windows Security.<br />Author of 15 books on computers, cybercrime and more<br />Founder of the PI Mall<br />Developer of Security-Bot<br />Developer of Internet Predator Tracker software<br />CBS radio national correspondent<br />2 patents pending<br />CISSP, CEH, CET, NSA IAM<br />Developer of Internet Predator Tracker<br />
  8. 8. What can I do?<br />YOU are the most important part of this work.<br />Without YOU involved, there is very little that can be done.<br />The latest set of tools we have released allows anyone to be able to report suspected predators and pedophiles.<br />So YOU really are our best source of information!<br />
  9. 9. Wait..isn’t this Police work?<br />We work closely with local and federal law enforcement and district attorney’s.<br />The information that is collected with the tools that I have developed is only information.<br />Once we get a report, we contact our local police and DA.<br />We then let law enforcement take over the case.<br />
  10. 10. Law Enforcement<br />So, yes, it is the job of Law Enforcement to investigate, capture and prosecute these predators and pedophiles.<br />But, the only way they can know is by someone, maybe you, reporting the suspected predator or pedophile.<br />So, YOU are the most important part of this work!<br />
  11. 11. IPT Website<br />The main website for IPT is at: <br />www.internetpredatortracker.com<br />We also have numerous sites on web2.0 websites and social networks.<br />
  12. 12. IPT Software<br />The first software developed by Joe Seanor was Internet Predator Tracker.<br />This is a complete solution for investigators and law enforcement to conduct online undercover investigations against online predators and pedophiles.<br />The evidence is collected into a database that is secure and encrypted in order to protect the evidence.<br />
  13. 13. IPT Software<br />The original IPT software is only available to law enforcement.<br />And selected, hand picked, hand trained investigators.<br />
  14. 14. IPT Public Software<br />I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to report suspected online predators and pedophiles.<br />And all of the software is FREE!!<br />You can download the software from the IPT website, and multiple locations on the web.<br />
  15. 15. IPT Public Software<br />We are the ONLY source of predator and pedophile reporting for:<br />Internet Explorer<br />Firefox<br />Google Chrome<br />Safari<br />Opera<br />Outlook<br />Thunderbird<br />ALL FREE!!!<br />
  16. 16. IPT Public Software<br />Well, when I designed the software, I wanted all of the versions to work the same, so if you learned one, you could use any of them.<br />Also, I made it as easy to use as possible, so everyone would use it.<br />Each extension for the browsers follow this same process for collecting evidence.<br />
  17. 17. IPT Public Software<br />Once you click the Report button:<br />An HTML copy of the site is made.<br />No images are saved or uploaded.<br />A MD5 checksum is created (this protects the evidence.)<br />The file is uploaded to the IPT secure server<br />An email is opened that contains the information about the file that was uploaded and your email address.<br />You just click send!<br />
  18. 18. Internet Explorer<br />Due to the way that IE deals with extensions, the Pedophile Reporter extension uses an installation program.<br />Once you download the program, just double click on the setup program to begin the installation.<br />
  19. 19. Internet Explorer<br />Now you will see<br />
  20. 20. Internet Explorer<br />Continue the install, and be sure to accept the license agreement. When you get to the installation folder, please do not change that location.<br />
  21. 21. Internet Explorer<br />The installation will continue like any normal windows install program. And at the end you will see:<br />
  22. 22. Internet Explorer<br />Now that you have installed the Pedophile reporter, you will find it located on your Internet Explorer menu bar<br />
  23. 23. Firefox<br />
  24. 24. Firefox<br />
  25. 25. Firefox<br />You can go in and configure the options for the extension by clicking on Tools and then Add-ons.<br />Once you do, just click on the Options button under the name of the extension.<br />
  26. 26. Firefox options<br />
  27. 27. Google Chrome<br />
  28. 28. Google Chrome<br />Make sure to start Google Chrome and then just go to: www.google.com<br />In order to install the Pedophile reporter extension for Google Chrome, just google “Google Chrome report pedophile”<br />The first link will be for the Chrome Web Store, click on that link and you will end up at the Chrome Web store for Report Pedophile.<br />
  29. 29. Google Chrome<br />
  30. 30. Google Chrome<br />Now, all you have to do is click on Install.<br />Chrome will not install the extension for you.<br />Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent.<br />Then just click save/close on the options window.<br />
  31. 31. Google Chrome<br />
  32. 32. Safari<br />Safari is the browser from Apple, and runs on both the Macintosh and PC.<br />In order to install the extension using the Safari browser, just go to:<br />www.internetpredatortracker.com<br />Click on the tab called Software<br />Choose Safari extension<br />Then click either the English or Spanish version of the software.<br />
  33. 33. Safari<br />Once you click on the download link, you will see the following window.<br />Just click on Open<br />
  34. 34. Safari<br />You will then be prompted with the following window, choose Install.<br />
  35. 35. Safari<br />The extension will be installed, and you will see Safari, now look like this:<br />
  36. 36. Safari<br />Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent.<br />Then just click save/close on the options window.<br />
  37. 37. Email Reporting<br />To use the Outlook and Thunderbird plug-ins, just right click on the suspected email in your inbox and the program will collect the header information and email.<br />You just click send and it arrives at our IPT servers.<br />So, lets see how to install it.<br />
  38. 38. Thunderbird <br />In order to install the Pedophile reporter for Thunderbird, just google “thunderbird extensions pedophile reporter”<br />The first choice will take you to the Mozilla Thunderbird page.<br />All you have to do is click on the Download Now button.<br />
  39. 39. Thunderbird<br />
  40. 40. Thunderbird<br />Now you will see the file save window.<br />Click and save the file to your Desktop.<br />
  41. 41. Thunderbird<br />Now, with the extension installed, you will want to startup Thunderbird.<br />Once started, just click on Tools<br />Choose Add-on’s<br />Click on the Install button and choose the pedophile reporter file you just downloaded to your desktop.<br />
  42. 42. Thunderbird<br />
  43. 43. Thunderbird<br />Once you click on Install and double-click on the file that you saved to your desktop.<br />You will then see the following window <br />
  44. 44. Thunderbird<br />Once you click Install, the extension will be installed.<br />You will then need to click on the Restart Thunderbird, and the extension will now be active.<br />In order to use the extension, just right click on the suspected email in the Inbox, and choose Pedophile Alerter.<br />
  45. 45. Thunderbird<br />
  46. 46. Email Report<br />
  47. 47. Email Report<br />Now, you will see the email that contains the headers and body from the suspected email.<br />You will also have the option to choose either “suspected predator” or “suspected pedophile”<br />All you have to do now is click Send, and the report, containing the headers and body from the suspected email will be sent to the IPT server.<br />
  48. 48. Outlook<br />As the largest email program on the market, it was only natural that we develop a add-on for Outlook.<br />However, Outlook is not as easy to add things to like Thunderbird is.<br />In order to have the extension added to Outlook, you will run an install program.<br />
  49. 49. Outlook<br />Once you download the file, just double-click on the pedophile alerter setup program.<br />
  50. 50. Outlook<br />Once started, you will walk through a standard windows installation program.<br />
  51. 51. Outlook<br />After you accept the installation agreement, you will be presented with the folder location.<br />Please do not change the location of the files.<br />Once the files are installed you will see <br />
  52. 52. Outlook<br />Once you click close, you will be presented with the following screen.<br />Just fill out the information, this is where the copy of the email will be sent.<br />
  53. 53. Outlook<br />In order to use the plug-in, you just need to right-click on the suspected email, and choose Pedophile Alert.<br />
  54. 54. Outlook<br />Now, you will get the choice of the subject<br />
  55. 55. Outlook<br />
  56. 56. Outlook<br />You will then see the email that is to be sent. <br />The email contains al of the information about the suspected email that is needed to track the sender down.<br />All you have to do is click Send, and the email and information will be delivered to the IPT server.<br />
  57. 57. Android Pedophile Reporter!<br />YES!!!!<br />I’ve done it again!<br />I now have a version of the Pedophile Reporter for your Android phone!<br />Starting next week, you will be able to download the Android App from the Android Marketplace for FREE!!<br />
  58. 58. Android Pedophile Reporter!<br />K9PR is the name of the Android App<br />It is a copy of the K-9 email program, but it has been modified to allow you to report any emails from predators or pedophiles.<br />It works just like any normal email program on the Android phone, but it allows you to report emails to our servers.<br />
  59. 59. Android Pedophile Reporter!<br />When you receive an email from a suspected predator or suspected pedophile, just choose Options<br />Then choose More<br />Then choose Pedophile Reporter<br />
  60. 60. Android Pedophile Reporter!<br />When you choose the option of Pedophile Reporter, the program will pull all of the original email headers and place them into a new email<br />This new email will be addressed to our servers, and all you have to do is click Send.<br />
  61. 61. iPhone Pedophile Reporter<br />I am currently in development of the iPhone version.<br />When it is ready, I will send an email out to the beta testers group.<br />
  62. 62. What happens with a report?<br />Once a report is sent in, an email alert is sent directly to me so that I can check the report.<br />The email will have the data I need in order to find out what type of report this is.<br />The email contains the MD5 so that I can verify the integrity of the file to ensure nothing has happened.<br />Next is an example email<br />
  63. 63. What happens with a report?<br />http://XXXXXXXX-models.com/ftp://ftp.internetpedophiletracker.com/[1295120896]Report.zip || 79b8b34e50d71b418a6d1a869f34f50b <br />
  64. 64. What happens with a report?<br />You can see from the email that it contains the website name<br />It contains the FTP file name, and location that it was uploaded to the server<br />It also contains a MD5 signature.<br />
  65. 65. MD5?<br />MD5 is a cryptographic checksum that is made of a file.<br />The MD5 is designed to protect the file from change.<br />If the file is ever modified in any way, the checksum will never match.<br />This is how we protect the data for law enforcement.<br />
  66. 66. What happens with a report?<br />As you can see, I get a copy of the website name, so I can verify that it is a real website.<br />This is done by running whois records on the site, and “alive” check on the web to ensure it is active. <br />AT NO TIME DO I OR ANYONE INVESTIGATING THIS REPORT EVER ACCESSES THE SITE.<br />I then run a special script I have that does a full analysis of the website from a investigative standpoint.<br />
  67. 67. What happens with a report?<br />Once that is complete, I burn a copy of the file that was uploaded, along with the MD5 hash and a copy of the output of my script.<br />This is then place in an envelope along with a standard letter and instructions for verifying the MD5.<br />This package is mailed to the identified LE or IPT investigator.<br />A duplicate package is mailed to Innocent Images task force in DC.<br />
  68. 68. The IPT Disc <br />I have finished developing and testing a new disc that will be available for download from the website.<br />You will also, hopefully find it in some retail stores as well $5 a disc.<br />This disc has all of the tools for the browsers and the email clients. It also has training and links back to the main site.<br />
  69. 69. The IPT Disc<br />
  70. 70. So, why do this?<br />One out of five kids using online chat-lines are approached by pedophiles<br />Nine out of ten kids aged 9 to 16 have viewed pornography on the Internet<br />25% of kids subjected to sexual solicitation tell their parents<br />All these names may lead you straight to pornographic websites if you make an Internet search on them – Disney, Action Man, Barbie, Pokemon, ESPN, Alice, My Little Pony<br />100,000 sites existed in 2001 on the Internet about child pornography<br />100 billion are spent every year on pornographic sites with pay access on the Internet<br />
  71. 71. And….<br />The stories just go on and on.<br />As you can tell, with the growth of the internet these predators and pedophiles have found a new playground and it is the Internet.<br />These are a very small sample of the number of reported cases of predators and pedophiles.<br />The majority of these issues go UNREPORTED.<br />
  72. 72. As a parent<br />Know what your children are doing online.<br />Teach kids not to give out any identifying information.<br />Report any suspicious activity to police.<br />Never let your child meet anyone from online without parental supervision.<br />Keep user names and profiles generic and anonymous.<br />Avoid posting personal photos online.<br />
  73. 73. As a parent<br />Always keep private information private.<br />Place the family computer in an open area.<br />Remind children that online “friends” are still strangers.<br />You must still show respect children’s privacy<br />Become a part of your child’s online experience.<br />Be aware of phone calls or mail deliveries from unfamiliar persons.<br />
  74. 74. Predator vs. Pedophile<br />Lets look at a checklist of characteristics of these two types of people.<br />These are lists I have put together from FBI documents.<br />If you would like to read the full report, please email me and I’ll send it to you.<br />
  75. 75. The Predator<br />
  76. 76. The Predator<br />He abuses then backs off. <br />He has to win, and it is very important to him that he is always right.<br />He Hates and Loves Women at the Same Time.<br />Endless Cycle of Love/Hate with his Mother <br />This person was probably abused by his mother and then coddled. <br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />76<br />
  77. 77. The Predator <br />He transposes these feelings to other women. <br />He tries to create the same type of environment with other women. <br />This time he IS in CONTROL. <br />He may have a wife. <br />If so, he is a model husband. <br />He needs one relationship with a female that is solid and wholesome; that is why he looks elsewhere for women to abuse.<br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />77<br />
  78. 78. The Predator<br />MOST IMPORTANT<br />Remember, he is most likely very shy and timid or reserved in the real world and has low self esteem until he gets on the Internet.<br />Then he is the MASTER of his domain.<br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />78<br />
  79. 79. The Pedophile<br />
  80. 80. Pedophile Characteristics<br />Sexual Abuse in Background<br />Limited Social Contact as Teenagers <br /> Frequent and Unexpected Moves (locations)<br />Prior Arrests <br /> Multiple Victims <br />Older Than 25, Single, Never Married <br />Lives Alone or With Parents <br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />80<br />
  81. 81. Limited Dating Relationships If Not Married<br /> If Married, “Special” Relationship With Spouse <br />Associates and Circle of Friends are Young <br />Refers to Children as “Clean,” “Pure,” “Innocent,” “Impish,” or Objects <br />Skilled at Identifying Vulnerable Victims <br />Has Access to Children <br />Seduces With Attention, Affection, and Gifts <br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />81<br />Pedophile Characteristics<br />
  82. 82. Skilled at Manipulating Children<br />Shows Sexually Explicit Material to Children <br /> Youth-Oriented Decorations in House or Room<br />Photographing of Children clothed or unclothed<br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />82<br />Pedophile Characteristics<br />
  83. 83. Internet <br />
  84. 84. Internet sources to look at<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />84<br />Websites<br />News Groups<br />IRC <br />File Servers, P2P systems, Bit Torrent<br />BBS’s (yes they are still around!!)<br />
  85. 85. Keywords to look for<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />85<br />When you are looking for Pedophiles, there are certain terms to look for or you may “hear”<br />Boy love or blogo<br />Ehebophila <br />Hebephilia<br />Girl love or glogo<br />Infantophilia<br />Lolita <br />Clogo<br />
  86. 86. Pedophile terms<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />86<br />12chan = used as a place where all the material that is illegal to post on 4chan is traded. <br />4chan = group that trades objectionable pictures and material.<br />AF = Adult Friend<br />ANTI = Anti-Pedophile or Pedophile Hunter<br />AoA = Age of Attraction <br />AoC = Age of Consent<br />ATBOYS = Attracted to Boys <br />
  87. 87. Pedophile terms<br />MAA = Minor-Attracted Adult<br />MBC = MetaBoyChat<br />MHAMIC = Male Homosexual Attraction to Minors Information Center<br />NEPI = refers to Nepiophilia aka Infantophilia is the sexual attraction towards babies and toddlers (aged 0-4/5 years).<br />NN = Non Nude Model Sites/Photos where underage girls as young as two pose scantily clad in adult lingerie or in overtly sexy poses<br />P.A.C.E. = Pedophiles Against Child Exploitation<br />PAN = Pedophile Alert Network<br />PCE = International Pedophile and Child Emancipation<br />PT = Pre-Teen<br />
  88. 88. Pedophile terms<br />RL = Real Life<br />RPG = Role playing games<br />RSO = Registered Sex Offender<br />SHOTA/SHOTACON = Drawings or Cartoons (Animated) Child Pornography featuring boys<br />SO = Sex Offender<br />SOR = Sex Offender Registry<br />SQR = Sure Quality Radio<br />SYF = Sexy or Special Young Friend<br />TBL = Teenage Boy Lover<br />TGL = Teenage Girl Lover<br />Toddlercon = Animated or Cartoon Child Porn featuring sex with toddlers<br />
  89. 89. Symbols to look for<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />89<br />
  90. 90. Online Pedophile Groups<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />90<br />The biggest group online is in the area of “Man Boy Love”<br />Their website community is called “Free Spirits”<br />Other areas you can find them are:<br />Personal websites<br />IRC Channels<br />Web forums<br />Websites that support the pedophile ideals<br />
  91. 91. Pedophile Groups<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />91<br />CSC = Childhood Sensuality Circle <br />HNC = Howard Nichols Society<br />NAMBLA = North American Man/Boy Love Association<br />P.A.L. = Pedophile Alliance League<br />PAL = Pedophile Action for Liberation<br />PAN = Pedophiliacs Anonymous <br />PIE = Pedophile Information Exchange<br />SOhopeful = SOhopeful International, Inc. <br />TLCCG = The Lewis Carroll Collectors Guild<br />TRGS = The Rene Guyon Society<br />
  92. 92. Websites<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />92<br />North American Man-Boy Love Association<br />MARTIJN<br />www.boychat.org<br />www.annabelleigh.net<br />TKGL.net<br />ArtSapience.com<br />BLISS or BoyBliss<br />
  93. 93. Child Images<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />93<br />If someone that provides you images of a child that are obscene in nature, you need to contact the FBI Innocent Images Task force.<br />They are focused on:<br />Online organizations, enterprises, and communities that exploit children for profit or personal gain.<br />Major distributors of child pornography, such as those who appear to have transmitted a large volume of child pornography via an online computer on several occasions to several other people.<br />Producers of child pornography.<br />Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual activity with a minor.<br />Possessors of child pornography.<br />
  94. 94. Going online<br />There are two ways to report a suspected predator or pedophile with the software.<br />If you come across a suspected site, you simply use the software to report the site.<br />If you get an email from a suspected predator or pedophile, you just right click on the email and choose pedophile reporter and submit the email.<br />
  95. 95. Going online<br />Remember, these tools that I have developed are for REPORTING ONLY.<br />If you come across any suspected pedophile or predator websites, you need to click the report button.<br />This will collect a copy of the webpage you are on, MD5 the data, and upload it to the IPT server.<br />After you send the email in, the site will be reviewed and an investigator will contact you if you wish.<br />
  96. 96. Going online<br />Without proper training, you can be placing yourself at risk if you decide to track down predators and pedophile.<br />Without proper training, you could corrupt evidence against a predator or pedophile and they could go free.<br />The best thing you can do is just report the websites or emails that you come across.<br />And always, always report anything suspicious to your local law enforcement.<br />
  97. 97. Going online<br />If you are online, using an Anonymous program to protect your location is vital.<br />There are many out on the web, but I recommend: Surf Anonymously Online.<br />You can buy this at:<br />www.surfanonymouslyonline.com<br />
  98. 98. Facebook<br />How do you report Pedophiles and Predators on Facebook?<br />Easy, first make sure you have the Pedophile Report installed on your copy of Firefox.<br />When you go to the page of the pedophile or predator on Facebook, just click the Report Icon in Firefox!<br />That will send a copy of the offenders Facebook page and information for us to act on it.<br />
  99. 99. MySpace<br />How do you report Pedophiles and Predators on MySpace?<br />Easy, first make sure you have the Pedophile Report installed on your copy of Firefox.<br />When you go to the profile of the pedophile or predator on MySpace, just click the Report Icon in Firefox!<br />That will send a copy of the offenders MySpace profile and information for us to act on it.<br />
  100. 100. Any other Social Network?<br />How do you report Pedophiles and Predators on any other Social Network?<br />Easy, first make sure you have the Pedophile Report installed on your copy of Firefox.<br />When you go to the page of the pedophile or predator on that social network, just click the Report Icon in Firefox!<br />That will send a copy of the offenders page and information for us to act on it.<br />
  101. 101. Why Firefox? <br />You can use any browser, I just used Firefox in that example.<br />Remember, I have tools for: <br />Internet Explorer<br />Firefox<br />Safari<br />Google Chrome<br />Opera<br />
  102. 102. How you can help<br />You can help us out by installing the software and reporting any potential websites or emails.<br />I also ask you to spread the word about the free software. The more people using the software, the more reports and the safer we can make the Internet safer.<br />If you have any ideas, please contact me at: jseanor@internetpredatortracker.com<br />
  103. 103. Are you a victim?<br />If you are a victim of a predator or pedophile, please contact me directly.<br />If you are aware of a suspected predator or pedophile, please contact me directly.<br />If you know of a victim, have them contact me or visit the IPT website and click on Report.<br />
  104. 104. Joining IPT<br />If you would like to volunteer your time and help out with investigations, please contact me directly.<br />I am always looking for people to help out with reports.<br />This is pro-bono work.<br />But someone has to make a stand, right?<br />
  105. 105. Current Software<br />Pedophile Reporter—Internet Explorer<br />Pedophile Reporter—Firefox<br />Pedophile Reporter—Google Chrome<br />Pedophile Reporter—Safari<br />Pedophile Reporter—Outlook<br />Pedophile Reporter—Thunderbird<br />Pedophile Reporter –Android Phones/Tablet<br />Internet Crime Reporter--Firefox<br />
  106. 106. Wrap up<br />What does 2011 hold for IPT?<br />Non-Profit status!<br />IPT software 2011<br />IPT IM program for the public<br />Secure software for Investigators and LE<br />Writers for the IPT website (do you want to be one?)<br />Monitoring system and online access to special tools.<br />
  107. 107. Wrap up<br />Internet Predator Tracker was created to help make a difference online.<br />We need everyone to help out, to spread the word, and to make a difference.<br />If you can help out in anyway, please let me know.<br />
  108. 108. Wrap up<br />Please be safe online.<br />Please keep your children safe online<br />Educate your children about online safety<br />Report any suspicious websites or emails.<br />
  109. 109. Contact information<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />109<br />http://www.internetpredatortracker.com<br />Email:<br />internetpredatortracker@gmail.com<br />jseanor@internetpredatortracker.com<br />Phone: 404-202-1799<br />
  110. 110. Thank you so much!<br />110<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />

×