13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>The</strong> Effects of Technology on Law En<strong>for</strong>cement’s Ability to Investigate <strong>Child</strong> PornographyAmong NDIC interviewees:• 52 percent of respondents reported that encryption <strong>and</strong> secure password technologyhampers the ability of law en<strong>for</strong>cement to investigate <strong>and</strong> prosecute child pornographyoffenders.• 46 percent of respondents reported that wireless Internet connections create anonymity,which makes it difficult <strong>for</strong> law en<strong>for</strong>cement to locate child pornography offenders.• 42 percent of respondents reported that proxy servers <strong>and</strong> IP spoofing create anonymity,which makes it difficult <strong>for</strong> law en<strong>for</strong>cement to locate child pornography offenders.• 31 percent reported that the large <strong>and</strong> seemingly limitless storage capabilities, such asonline image storage <strong>and</strong> wireless external storage devices (external hard drives,thumb/USB drives, CDs, etc.), make it difficult <strong>for</strong> law en<strong>for</strong>cement to investigate <strong>and</strong>appropriately prosecute offenders.<strong>The</strong> Effect of Technology on the Number of <strong>Child</strong> Pornography OffendersAmong NDIC interviewees:• 73 percent of respondents reported that the Internet has made it easier <strong>for</strong> offenders toacquire <strong>and</strong> distribute child pornography.• 24 percent of respondents reported that digital cameras make it easier to produce <strong>and</strong>distribute child pornography because offenders can bypass print shops <strong>and</strong> upload photosfrom their cameras directly to the Internet.• 22 percent of respondents reported that the Internet has created situational offenders whowould not have otherwise viewed or sought out child pornography if it were not <strong>for</strong> theInternet making it so prevalent <strong>and</strong> easily accessible.Methods Used by <strong>Child</strong> Pornography Offenders to Avoid Detection <strong>and</strong> Identification byLaw En<strong>for</strong>cementAmong NDIC interviewees:• 53 percent of respondents reported that child pornography offenders use proxy servers toavoid identification.• 26 percent of respondents reported the use of encryption <strong>and</strong> secure password technologyto avoid detection.• 23 percent of respondents reported the use of software programs designed to delete dataor “clean” or “wipe” a hard drive to eliminate evidence to avoid detection.• 21 percent of respondents reported the use of wireless Internet connections to avoiddetection.D-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!