13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• <strong>The</strong> offender communicates with other offenders in online communities about his sexualinterest in children.<strong>The</strong> presence of any of these factors should alert law en<strong>for</strong>cement officers to the possibility thatan offender, particularly one with ready access to children, could be a contact offender. Lawen<strong>for</strong>cement, however, cannot summarily dismiss as a priority target an offender who appearsonly to be possessing images. In many instances, when law en<strong>for</strong>cement officers execute searchwarrants <strong>for</strong> a computer <strong>and</strong> premises of an offender who appears only to be possessing images,evidence of molestation is uncovered. 49An offender who purchases child pornography from a commercial web site, however, is notnecessarily high-risk <strong>and</strong> may even be an entry-level offender. Paying <strong>for</strong> child pornography hasnot been shown to be an indicator of risk, <strong>and</strong> offenders buy child pornography <strong>for</strong> a variety ofreasons. <strong>The</strong> fact that an offender resorts to paying <strong>for</strong> images may or may not signal a relativelack of sophistication. In addition, while some commercial sites have freshly produced sex abuseimages, many simply recycle old images that are otherwise available elsewhere on the Internet.By contrast, some private trading groups 50 have more extreme <strong>and</strong> new material <strong>and</strong> membershipin some of these groups is strictly vetted by the offenders operating the groups. Individuals mustactively seek these groups to gain access, create usernames <strong>and</strong> passwords to gain entry, <strong>and</strong>often dedicate significant amounts of time to a particular group to maintain membership.Similarly, an offender using pure P2P technology may signal less of a risk than an offender usinga technology that combines P2P file sharing with the ability to interact with like-mindedoffenders. This is because pure P2P technology only requires a blind search of the network <strong>for</strong>images <strong>and</strong> videos using a search term; it does not require much personal investment or anypersonal contact to acquire images. Of course, these observations are not universal <strong>and</strong> thosewho trade on basic peer-to-peer can pose the same risk to a child as an offender using anencrypted message board to trade images. Similarly, an offender who does not use encryption orother evasive technologies can always pose the same or greater risk to a child than one who does.49See Appendix A, Operation Joint Hammer.50 See Appendix A, Operation Achilles.28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!