VIRTUS and Rfarley.Com 1 CHILD SEXUAL ABUSE CRIMES

Total Page:16

File Type:pdf, Size:1020Kb

VIRTUS and Rfarley.Com 1 CHILD SEXUAL ABUSE CRIMES INTERNET SAFETY: New Challenges in Protecting God’s Children Online 2007 National Safe Environment Leadership Conference by Robert Hugh Farley Robert Hugh Farley M.S. Consultant in Crimes …against Children Chicago, IL USA www.RFarley.com www.RFarley.com Download your copy of the seminar handout materials online at www.virtus.org VIRTUS and RFarley.com 1 CHILD SEXUAL ABUSE CRIMES z Opportunity z Desire z Children are perfect victims www.RFarley.com THE ONLINE CHILD MOLESTER www.RFarley.com CHILD SEXUAL ABUSE IS AN OLD CRIME Computers … z New technique for molesters to gain access to children z New tools z New evidence But it’s still the same old crime ! www.RFarley.com VIRTUS and RFarley.com 2 NEW PROGRAM FOR 2007 www.RFarley.com EVOLUTION OF ONLINE CRIMES z Text dialogue z Still images z Moving images z Real times images www.RFarley.com WEBCAM AND “REAL TIME” PROBLEMS FOR CHILDREN www.RFarley.com VIRTUS and RFarley.com 3 WEBCAM CASE ILLUSTRATION “MENO” www.RFarley.com CHILD EXPLOITATION HISTORY Beyond Computers …. z Cell phones z Text messaging –SMS z Internet access www.RFarley.com TEXT MESSAGES Do yur kds snd msgz lik DIS 1? Try texting this back U r like so grounded 4ever cya www.RFarley.com VIRTUS and RFarley.com 4 IDENTIFICATION OF COMPUTER TERMS www.RFarley.com COMPUTER HARDWARE z System box or base unit z Monitor z Keyboard z Pointing device z Audio devices z Printer www.RFarley.com MOLESTER PERIPHERALS z Scanners z Digital cameras z Video devices www.RFarley.com VIRTUS and RFarley.com 5 CHILD MOLESTER COLLECTIONS www.RFarley.com ELEMENTS OF THE COLLECTION z Child erotica z Child pornography z Trophies www.RFarley.com DOWNLOAD A FILE z Received from an external source z Storage - hard drive vs. other media RFarley.com VIRTUS and RFarley.com 6 WEB PAGE DANGERS FOR CHILDREN z myspace.com z facebook.com z hotornot.com z livejournal.com z xanga.com z ratemyteacher.com www.RFarley.com z Gaming sites CHAT ROOMS www.RFarley.com CHATTING LIKE A CHILD Emoticons and Smileys See VIRTUS Online www.RFarley.com VIRTUS and RFarley.com 7 TOURING CYBERSPACE The Internet …… z World Wide Web (www) z Usenet Newsgroups z Internet Relay Chat (IRC) Rfarley.com INTERNET RELAY CHAT “IRC” CHANNELS z mIRC shareware software z DALnet z Undernet z EFnet z A chatroom is a channel z “Fserve” Rfarley.com RFarley.com VIRTUS and RFarley.com 8 ONLINE MOLESTER SEDUCTION TECHNIQUES z Assumes a child or teen identity z Bogus profile z Pretends to care about children z Language z Asks for personal information z Requests photos z Talks about family/friends z Telephone contact z Wants to meet RFarley.com ONLINE “REAL VICTIMS” CASE ILLUSTRATION “TOMMY” www.RFarley.com www.rfarley.com ThankThank youyou !! www.RFarley.com VIRTUS and RFarley.com 9 Robert Hugh Farley M.S. Consultant in Crimes Against Children for VIRTUS™ 10 So. LaSalle Street, Suite 1420 Chicago, IL 60603 USA 847-236-9134 FAX 847-236-9135 Email [email protected] Web Page www.rfarley.com www.RFarley.com VIRTUS and RFarley.com 10.
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • Introduction to Online Sexual Exploitation Curriculum 1 Safe Online Outreach Project Learning Objectives
    Introduction To Online Sexual Exploitation: Curriculum February 2003 Safe OnLine Outreach Project © M. Horton 2003 Safe OnLine Outreach Project Acknowledgements This document is the result of many hours of hard work and dedication. I'd like to thank Renata Karrys, Jaynne Aster, Nikki O'Halloran, Charlaine Avery, Lisa Ingvallsen and Elizabeth Nethery for their support and assistance in producing this document. Additionally the SOLO Advisory Committee, the Canadian National Crime Prevention - Community Mobilization Program, the Vancouver Foundation, Athabasca University/MediaCan and Parents Against Sexual Abuse have all been instrumental in turning this idea into a Project. Lastly, David and Conor have been silent contributors to this project since it began. Their support is woven into each page. Merlyn Horton SOLO Project Coordinator February 2003 Safe OnLine Outreach Project February 3, 2003 Introduction to the Curriculum Dear Reader, The curriculum you hold in your hands was produced in a former pottery studio in the middle of a coastal rain forest in British Columbia, Canada; the physical launch pad for this examination of a virtual issue. It is the result of three years of research. This introduction is intended to outline a context for the curriculum and to give you an overview of how to use this curriculum, who should present this curriculum and how appropriate audiences might be chosen. Context The philosophical foundation for this curriculum, and indeed for the Safe OnLine Outreach Project, is the United Nations Convention on the Rights of the Child (CRC)1. The CRC is one of four Conventions created by the United Nations to further the goal of recognizing the inherent dignity and rights of all members of the human family2.
    [Show full text]
  • Sample Chapter
    5674ch01.qxd_jt 9/24/03 8:44 AM Page 1 11 TheThe OnlineOnline WorldWorld 5674ch01.qxd_jt 9/24/03 8:44 AM Page 2 Today’s online world has changed dramatically in the last decade. Back then, online to the average user meant a telephone connection directly to either another computer or to an online service, such as CompuServe or AOL. The Internet now dominates all online activity. In popular parlance, the Internet is synonymous with the World Wide Web, although it is much more, as we’ll explain in this book. The Internet can be described generally as a “network” of networks. It is a transportation vehicle for applications. In fact, the visual representations of the Net look like a road map. If lines are drawn between each connection, between larger and larger connections, and between smaller and smaller ones, the end result is a web of connections—a virtual road map. This book is divided into four rough sections. The first is for beginners. It is to get anyone up to speed quickly with the information needed about the Web. Each chapter has recommended Web sites (to type the address, or Uniform Resource Locator [URL] into your Web browser) to help direct you. The second section has more detailed information about downloads, email, secu- rity, and information on virus protection. The third part is about how to create a Web site, Web tools, blogging, and what you can add to your Web site (such as streaming media, RSS feeds, and XML, among other things). The fourth part is by far the densest.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • 11733583.PDF (5.977Mb)
    Faculté de Droit Direction des bibliothèques AVIS NOTICE L’auteur a autorisé l’Université The author has given the de Montréal à reproduire et Université de Montréal diffuser, en totalité ou en partie, permission to partially or par quelque moyen que ce soit completely reproduce and et sur quelque support que ce diffuse copies of this report or soit, et exclusivement à des fins thesis in any form or by any non lucratives d’enseignement means whatsoever for strictly et de recherche, des copies de non profit educational and ce mémoire ou de cette thèse. purposes. L’auteur et les coauteurs le cas The author and the co-authors, échéant, conservent néan- if applicable, nevertheless keep moins la liberté reconnue au the acknowledged rights of a titulaire du droit d’auteur de copyright holder to com- diffuser, éditer et utiliser mercially diffuse, edit and use commercialement ou non ce this work if they choose. Long travail. Les extraits substantiels excerpts from this work may not de celui-ci ne peuvent être be printed or reproduced in imprimés ou autrement another form without reproduits sans autorisation de permission from the author. l’auteur. L’Université ne sera The University is not aucunement responsable d’une responsible for commercial, utilisation commerciale, indus- industrial or other use of this trielle ou autre du mémoire ou report or thesis by a third party, de la thèse par un tiers, y including by professors. compris les professeurs. Université rU, de Montréal :1,NJ Il tJ 3 4-1()", 1 Université de Montréal Les droits économiques dans l'environnement numérique : portrait de notions en mutation Présenté par : Anne-Marie McSween Faculté de droit Mémoire présenté à la Faculté des études supérieures en vue de l'obtention du grade Maîtrise en droit (L.L.M.) '-1u.d~e-s"""-8 Option recherche (technologies de l'information) '1~e~radaoctroyélllJ(f'>..
    [Show full text]
  • Talk, Type, and Text: Conversation on the Internet
    Talk, Type, and Text: Conversation on the Internet Jon Camfield TC660H Plan II Honors Program The University of Texas at Austin April 26, 1999 Joel F. Sherzer Anthropology Supervising Professor Heidi Johnson Linguistics Second Reader i Abstract Author: Jon Camfield Title: Talk, Type, and Text: Conversation on the Internet Supervising Professor: Dr. Joel Sherzer Second Reader: Heidi Johnson On the eve of Y2K, the extent that computers are interwoven with our lives is painfully obvious, yet only relatively recently has the academic eye taken interest in the events going on on-line. Despite this attention, there still remain new frontiers that have not been explored on the Internet. The phenomenon of real-time interaction is the best example of these. Some commentaries have treated the social aspects of MUDs, a special subspecies of real-time interaction, but more pure textual conversations have not been examined closely. This paper seeks to remedy this. I will, by necesity, place my investigations into the frame of the Internet at large, and discuss websites, e-mail and newsgroups. I will focus, however, on data from real-time interactions which use text as their only channel of communication. i Table of Contents ABSTRACT.................................................................................................................................................................. i TABLE OF CONTENTS...........................................................................................................................................
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • IRC Jenisch, Morocutti
    WAP / IRC Jenisch, Morocutti IRC - Internet Relay Chat Protocol, Communication, Applications Jenisch Alexander Morocutti Nikolaus [email protected] [email protected] Previous Page Quit Full Screen Next Page WAP / IRC Jenisch, Morocutti Introduction • Facts. • How it works. • IRC specifiaction. • Communication. • Messages Details. • Applications. Previous Page Quit Full Screen Next Page WAP / IRC Jenisch, Morocutti Facts • IRC provides a way of communicating in real time with people from all over the world. • Consists of various separate networks of IRC servers. • The largest nets are EFnet (the original IRC net), Undernet, IRCnet, DALnet, and Quakenet. • Jarkko Oikarinen, Department of Information Processing Science in University of Oulu (finnland) 1988. • Based on TCP/IP. Previous Page Quit Full Screen Next Page WAP / IRC Jenisch, Morocutti How it works Generally, the user runs a program to connect to a server on one of the IRC nets, and the server relays information to and from other servers on the same net. Once connected to an IRC server on an IRC network, you can join one or more channels and converse with others. Conversations may be public (where everyone in a channel can see what you type) or private (messages between only two people). • Channels: A channel is a named group of one or more clients which will all receive messages addressed to that channel. Channel names usually begin with a ’#’, and are registered in the channel list of the irc net. • Nicknames: Each user is known on IRC by a unique nick. • Channel ops: Channels are controlled by channel operators, or just ’ops’ for short, who can control the channel by choosing who may join (by ’banning’ some users), who must leave (by ’kicking’ them out), and even who may speak (by making the channel ’moderated’)! • IRC ops: IRC ops manage the servers themselves.
    [Show full text]
  • Table of Contents
    Contents 1 Table of Contents Foreword 0 Part I Welcome to mIRC 5 Part II Connect to a Server 5 1 Connection Issues................................................................................................................................... 6 Part III Join a Channel 6 1 Channels List................................................................................................................................... 8 Part IV Chat Privately 9 Part V Send and Receive Files 9 1 Accepting Files................................................................................................................................... 11 Part VI Change Colors 12 1 Control Codes................................................................................................................................... 12 Part VII Options 14 1 Connect ................................................................................................................................... 14 Servers .......................................................................................................................................................... 15 Options .......................................................................................................................................................... 16 Identd .......................................................................................................................................................... 18 Proxy .........................................................................................................................................................
    [Show full text]