SlideShare uma empresa Scribd logo
1 de 27
Online Child Enticement Crystal Ke Duffey CJ446 August 15, 2011 Final Project
What  is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
Williamsburg, VA Thursday, July 2010 Suspect: Justin Bradley May aka “Jason Marx” Victim: 13 year old girl ,[object Object]
 May acted as a modeling agent
 Sent emails from an alleged model “Nikki”.
 Nikki convinced girl to send nude pictures of herself over the Internet.
 Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
 FBI traced emails to May’s computer at W&M College.
Production of Child Pornography
 Coercion and enticement of a minor
 Receipt of Child Pornography
 15 years in Prison
 Possible 30year sentence
 $250,000 fine
 Lifetime supervision,[object Object]
Computer Hardware
Seizing A Computer ,[object Object]
 Take pictures of computer to record configuration and hardware connections
Label all wires, cables, or connectors for reassembly
Dismantle computer
Carefully move computer to a safe location where it will not be interfered with.,[object Object]
Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
Chain of Custody Document every person Their position What they did ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
abby ovitsky
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
dlwadsworth
 
Legal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored InformationLegal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored Information
austinlegal
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safety
AChuppTeaches
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
hoskei
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 

Mais procurados (20)

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
APPELLANTS_DEC IN SUPPORT OF_REPLY_BRIEF_AND_EXCERPT_OF.ver1
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
The Internet own boy
The Internet own boyThe Internet own boy
The Internet own boy
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Legal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored InformationLegal Issues re: Electronically Stored Information
Legal Issues re: Electronically Stored Information
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.com
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Copyright and internet_safety
Copyright and internet_safetyCopyright and internet_safety
Copyright and internet_safety
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Mma lesson1
Mma lesson1Mma lesson1
Mma lesson1
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Sexting
SextingSexting
Sexting
 
Coppa overview
Coppa overviewCoppa overview
Coppa overview
 
trial
trialtrial
trial
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 

Semelhante a Online Child Enticement

Blog Ethical Responsible1
Blog Ethical Responsible1Blog Ethical Responsible1
Blog Ethical Responsible1
Bryan McDonald
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
PHSD
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
rehmannb
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Nani Owen
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
KanelandSvihlik
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
egregory
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 

Semelhante a Online Child Enticement (20)

Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Blog Ethical Responsible1
Blog Ethical Responsible1Blog Ethical Responsible1
Blog Ethical Responsible1
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)Reporting Peer to Peer Violence in Schools Slideshare Version (2)
Reporting Peer to Peer Violence in Schools Slideshare Version (2)
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
102009
102009102009
102009
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Online Child Enticement

  • 1. Online Child Enticement Crystal Ke Duffey CJ446 August 15, 2011 Final Project
  • 2. What is Child Enticement? Internet/Electronic communication Entice, Invite, or Persuade a child Meet for Sexual Acts
  • 3. Nevada Law Suspect over 18 Knowingly contact/communicate via the use of a computer system/network Child under 16 At least 5 years younger than the suspect Intent to persuade, entice, lure, or transport child away from their home or any location known by legal guardians/parents Without expressed consent Intent to avoid consent with parents Intent to engage in sexual conduct
  • 4. Nevada Penalties Guilty Attempted Category B felony Minimum 2 years Maximum 20 years Maximum fine $10,000 Guilty if found to take steps to commit the crime Intent Must show strong possibility of committing the crime Maximum 10 year sentence
  • 5. Who Is Vulnerable Teenagers Unsupervised Relationship/Companionship Sexual activity Younger Children Friendship Innocence Fishing for children
  • 6. One Study… 1,500 users; 1999-2000 10-17 yoa 1 in 7 received unwanted sexual solicitation 4% - aggressive solicitation (contact outside the Internet) 5% - reported to Law Enforcement, an Internet Service Provider, or other authority
  • 7.
  • 8. May acted as a modeling agent
  • 9. Sent emails from an alleged model “Nikki”.
  • 10. Nikki convinced girl to send nude pictures of herself over the Internet.
  • 11. Nikki also “offered to send a photographer to take modeling pictures of her in exchange for sex acts.”
  • 12. FBI traced emails to May’s computer at W&M College.
  • 13. Production of Child Pornography
  • 14. Coercion and enticement of a minor
  • 15. Receipt of Child Pornography
  • 16. 15 years in Prison
  • 19.
  • 21.
  • 22. Take pictures of computer to record configuration and hardware connections
  • 23. Label all wires, cables, or connectors for reassembly
  • 25.
  • 26. Pack & Move Individual packaging Cool, dry, shock-absorbing manner Power cables can be packed with immediate hardware Antistatic bubble wrap Specially manufactured evidence bags Record serial numbers Box for transport Large transport vehicle
  • 27.
  • 28. Forensic Software Find data files Clone/preserve digital evidence Analyze digital evidence Separate and categorize data files by type Compare files to list of known contraband files Recover deleted/hidden data Crack/recover passwords Systematically report findings in a paper report
  • 29.
  • 30. Internet Communications Laws ECPA Electronic Communications Protection Act Codify when government could and could not intercept Internet and/or stored communications i.e. emails sent, in transmission, received PPA Privacy Protection Act Seizing computers = seizing irrelevant information Illegal to seize and hold irrelevant material Investigators must make every possible effort to return non-case related information
  • 31. A letter through the Postal Service
  • 32. Email Pathway Simplified Connection to ISP Connection to ISP Internet Path between Servers
  • 33. Email Tracing-The Long Way Copy/Clone email Open Full Header Analyze Timestamps and IP Addresses Sender’s personal IP address Sender’s ISP email server Recipient’s ISP email server Recipient’s personal IP address WHOIS search Subpoena records from appropriate company User account information, billing address, etc.
  • 34. Email Tracing - Direct Suspect continually receives emails from victim Website program Attaches a line of code to outgoing email Confirmation email sent to victim Contains IP address, date and time email was opened Unrecognizable to most Identifiable in full header
  • 35. Instant Messaging Problems: Limited time frame to obtain evidence Probable bogus information Good news: Computers can save chat transcripts Document conversations Record criminal intent Information logged on computers Subpoena for suspect’s computer
  • 36. Fourth Amendment & Your Search Warrant Consent “Shifting Sands” Include scope of search in its entirety Search incident to lawful arrest J.B. May case Warrant for computer and files Workplace searches College professors’ Internet activity monitored J.B. May supervisor can conduct search for evidence of work-related misconduct
  • 37.
  • 38.
  • 43.
  • 44.
  • 45. Resources (cont.) Baldas, Tresa. "Redford Man Gets Life for Enticing Moms to Molest Their Children Online." Freep.com. Detroit Free Press, 3 Aug. 2011. Web. 15 Aug. 2011. <http://www.freep.com/article/20110803/NEWS02/110803037/Redford-man-gets-life-enticing-moms-molest-their-children-online?odyssey=nav%7Chead>. Mei, Julia Lynne. "How to Secure Computer Forensics Evidence | EHow.com." EHow | How to Videos, Articles & More - Trusted Advice for the Curious Life | EHow.com. 7 Sept. 2010. Web. 15 Aug. 2011. <http://www.ehow.com/how_7246434_secure-computer-forensics-evidence.html>. "State Sentencing Guidelines for Online Enticement." Missingkids.com. 4 Dec. 2006. Web. 15 Aug. 2011. <http://www.missingkids.com/en_US/documents/state-sentencing-online-enticement.pdf>. Knetzger, Michael, and Jeremy Muraski. Investigating High-Tech Crime. Custom ed. Upper Saddle River: Prentice Hall, 2008. Print. Google Images Ke, Crystal