Description

Never have so many children spent so many hours on the internet as they have the last 18 months!

Over the past recent years, we have seen a remarkable reduction in the number of “stereotypical” child abductions. Predators targeting children who are alone or perceived vulnerable whether at school bus stops, playgrounds, or just walking in their neighborhoods. AMBER Alerts, the omnipresence of security video surveillance throughout communities, cellular/smart telephone capabilities, and other technologies, coupled with aggressive law enforcement response are just a few of the reasons for the reduction. While this is encouraging news, unfortunately, we are finding that many offenders have simply changed tactics in the way they contact and lure children away from their homes. It even has a name – “Sextortion” or “online luring of children.” Offenders have simply moved from street corners right into the homes and bedrooms of children using social media and gaming chat rooms to contact and groom our kids for victimization. By every estimation, the problem is “exploding” here in the United States and globally. For instance, the National Center for Missing & Exploited Children found that in the last three-quarters of just last year there were over 30,000 reports to the CyberTip line of online luring – on pace to exceed 40,000 instances. And, this is just what NCMEC sees – many believe the problem is far greater, even at epidemic levels, and law enforcement unfortunately is struggling to keep up. Today, the internet and chatrooms have become the biggest threat to our children’s safety.

Additionally, as the Internet of Things (IoT) expands, it means that evidence of these crimes may be located in different places and require a vast set of skills to properly identify, seize and examine the data. Most investigators are going to be able to identify the obvious items, such as computers and cell phones, but may miss items such as Routers, Cameras, smartwatches, and even items such as cloud backups, cell records, Google history, and Snapchat messages and memories. In this event, our two presenters will cover how to respond to Cyber Predator investigations in 2021. Specifically, this course will cover the following:

Part 1: Presented by Robert Lowery

Types of Crimes

Online Predator

Sexual Exploitation

Blackmail

Child Pornography

Who are the people involved

The Predator

The Victim

How to begin the investigation

Who to notify

Additional Resources

Part 2: Presented by Glenn K. Bard

Types of evidence

Devices

Records

Clouds

Devices – Proper seizing and what can be obtained from a good examination.

Phones

Computers

Others

Records – Proper warrant wording and analysis

Cellular Records

Social Media Records

Google Records

Clouds – Proper warrant wording and review of contents

Phone backups

Social media backup files

The Dark Web

Different ways Predators are using the Dark Web to try and hide

Print Friendly, PDF & Email