SlideShare a Scribd company logo
Online Child Enticement Crystal Ke Duffey CJ446 August 15, 2011 Final Project
What  is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
Williamsburg, VA Thursday, July 2010 Suspect: Justin Bradley May aka “Jason Marx” Victim: 13 year old girl ,[object Object]
 May acted as a modeling agent
 Sent emails from an alleged model “Nikki”.
 Nikki convinced girl to send nude pictures of herself over the Internet.
 Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
 FBI traced emails to May’s computer at W&M College.
Production of Child Pornography
 Coercion and enticement of a minor
 Receipt of Child Pornography
 15 years in Prison
 Possible 30year sentence
 $250,000 fine
 Lifetime supervision,[object Object]
Computer Hardware
Seizing A Computer ,[object Object]
 Take pictures of computer to record configuration and hardware connections
Label all wires, cables, or connectors for reassembly
Dismantle computer
Carefully move computer to a safe location where it will not be interfered with.,[object Object]
Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
Chain of Custody Document every person Their position What they did ,[object Object],[object Object],[object Object]

More Related Content

What's hot

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
Wendy Knox Everette
 
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1abby ovitsky
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
The Internet own boy
The Internet own boyThe Internet own boy
The Internet own boy
PiXeL16
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
Nilendra Kumar
 
Legal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored InformationLegal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored Informationaustinlegal
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
hirakhalid2394
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.com
jazzybaby4843
 
Internet safety
Internet safetyInternet safety
Internet safety
AChuppTeaches
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safetyAChuppTeaches
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Nuria Quiles
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Mma lesson1
Mma lesson1Mma lesson1
Mma lesson1
Rico Lausa
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Sexting
SextingSexting
Sexting
Richard Voltz
 
Coppa overview
Coppa overviewCoppa overview
Coppa overview
chstokes
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 

What's hot (20)

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
The Internet own boy
The Internet own boyThe Internet own boy
The Internet own boy
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Legal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored InformationLegal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored Information
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.com
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safety
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Mma lesson1
Mma lesson1Mma lesson1
Mma lesson1
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Sexting
SextingSexting
Sexting
 
Coppa overview
Coppa overviewCoppa overview
Coppa overview
 
trial
trialtrial
trial
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 

Similar to Online Child Enticement

Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
Randy Rodgers
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
malissa_1041
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
National Crime Prevention Council
 
Blog Ethical Responsible1
Blog Ethical Responsible1Blog Ethical Responsible1
Blog Ethical Responsible1Bryan McDonald
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
Eric Cedo
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Community Legal Education Ontario (CLEO)
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
tsdikshit
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
102009
102009102009

Similar to Online Child Enticement (20)

Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Blog Ethical Responsible1
Blog Ethical Responsible1Blog Ethical Responsible1
Blog Ethical Responsible1
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
102009
102009102009
102009
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 

Online Child Enticement

  • 1. Online Child Enticement Crystal Ke Duffey CJ446 August 15, 2011 Final Project
  • 2. What is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
  • 3. Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
  • 4. Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
  • 5. Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
  • 6. One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
  • 7.
  • 8. May acted as a modeling agent
  • 9. Sent emails from an alleged model “Nikki”.
  • 10. Nikki convinced girl to send nude pictures of herself over the Internet.
  • 11. Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
  • 12. FBI traced emails to May’s computer at W&M College.
  • 13. Production of Child Pornography
  • 14. Coercion and enticement of a minor
  • 15. Receipt of Child Pornography
  • 16. 15 years in Prison
  • 19.
  • 21.
  • 22. Take pictures of computer to record configuration and hardware connections
  • 23. Label all wires, cables, or connectors for reassembly
  • 25.
  • 26. Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
  • 27.
  • 28. Forensic Software Find data files Clone/preserve digital evidence Analyze digital evidence Separate and categorize data files by type Compare files to list of known contraband files Recover deleted/hidden data Crack/recover passwords Systematically report findings in a paper report
  • 29.
  • 30. Internet Communications Laws ECPA Electronic Communications Protection Act Codify when government could and could not intercept Internet and/or stored communications i.e. emails sent, in transmission, received PPA Privacy Protection Act Seizing computers = seizing irrelevant information Illegal to seize and hold irrelevant material Investigators must make every possible effort to return non-case related information
  • 31. A letter through the Postal Service
  • 32. Email Pathway Simplified Connection to ISP Connection to ISP Internet Path between Servers
  • 33. Email Tracing-The Long Way Copy/Clone email Open Full Header Analyze Timestamps and IP Addresses Sender’s personal IP address Sender’s ISP email server Recipient’s ISP email server Recipient’s personal IP address WHOIS search Subpoena records from appropriate company User account information, billing address, etc.
  • 34. Email Tracing - Direct Suspect continually receives emails from victim Website program Attaches a line of code to outgoing email Confirmation email sent to victim Contains IP address, date and time email was opened Unrecognizable to most Identifiable in full header
  • 35. Instant Messaging Problems: Limited time frame to obtain evidence Probable bogus information Good news: Computers can save chat transcripts Document conversations Record criminal intent Information logged on computers Subpoena for suspect’s computer
  • 36. Fourth Amendment & Your Search Warrant Consent “Shifting Sands” Include scope of search in its entirety Search incident to lawful arrest J.B. May case Warrant for computer and files Workplace searches College professors’ Internet activity monitored J.B. May supervisor can conduct search for evidence of work-related misconduct
  • 37.
  • 38.
  • 43.
  • 44.
  • 45. Resources (cont.) Baldas, Tresa. "Redford Man Gets Life for Enticing Moms to Molest Their Children Online." Freep.com. Detroit Free Press, 3 Aug. 2011. Web. 15 Aug. 2011. <http://www.freep.com/article/20110803/NEWS02/110803037/Redford-man-gets-life-enticing-moms-molest-their-children-online?odyssey=nav%7Chead>. Mei, Julia Lynne. "How to Secure Computer Forensics Evidence | EHow.com." EHow | How to Videos, Articles & More - Trusted Advice for the Curious Life | EHow.com. 7 Sept. 2010. Web. 15 Aug. 2011. <http://www.ehow.com/how_7246434_secure-computer-forensics-evidence.html>. "State Sentencing Guidelines for Online Enticement." Missingkids.com. 4 Dec. 2006. Web. 15 Aug. 2011. <http://www.missingkids.com/en_US/documents/state-sentencing-online-enticement.pdf>. Knetzger, Michael, and Jeremy Muraski. Investigating High-Tech Crime. Custom ed. Upper Saddle River: Prentice Hall, 2008. Print. Google Images Ke, Crystal