Law and Order

DEC 2012

Issue link: http://lawandordermag.epubxp.com/i/98779

Contents of this Issue

Navigation

Page 59 of 67

FEATURE Internet Exploitation of Children The tools of the trade for forensic examiners, these used by Det. Flip Minton of the Southern Illinois Cyber Crime Unit. ager and attempts are made to identify them. Sgt. Dehart pointed out the Internet has made it easier to trade child porn images. It used to be a much smaller group of people trading images and now it is more broad-based. It has become a colossal problem and takes high priority with all law enforcement agencies, but they still have to devote resources to homicides, domestic violence, theft and all the normal range of criminal activities. Det. Minton pointed out the technology used, including online how-to exploitation manuals, is a two-edged sword for offenders. He stated, ���These computer manuals have their own identifcation tags, just as previously identifed child porn images, and computer forensic experts can search offender���s computers for these tags, which in the case of images can be compared to DNA but are even more accurate.��� Sgt. Bill Dehart discussed how cutting-edge technology is used both by the police and the bad guys. Simple possession of child pornography is criminal in all 50 states other than by law enforcement and on a device controlled by a governmental entity; therefore investigators must use equipment issued by their department. Lots of predators have moved to a mobile platform, such as smartphones, and investigators��� use of such devices must also be issued and controlled by their department to provide for their legal use in court proceedings. The bad guys often have better equipment and are not con- 58 LAW and ORDER I December 2012 The Southern Illinois Cyber Crime Unit keeps a ���Wall of Shame��� to remind them of why they are doing what they are doing to remove predators from the streets. strained by budgetary limitations. There are inherent issues with whatever technology is involved. The task forces use high-tech, cutting-edge tools and they are well trained in fguring out how to fnd their perpetrator. ���It takes a good investigator asking questions,��� according to Dehart. Working Internet Exploitation Cases There is no reason to reinvent the wheel. There are already trained investigators in every state ready to assist in investigations of internet-based child exploitation. Sgt. Bill Dehart pointed out that the ICAC task forces have a standard operating procedure and investigators receive training before going online doing undercover activities. That gives them the tools to do the investigation, teaches them how to talk in a chat room, peer-to-peer information on how to avoid creating bad case law and making mistakes that others have made. The Internet-based investigator must learn how to communicate with the bad guys and not violate their civil rights and create other constitutional issues. ICAC task forces have consistent training and do things in a similar manner. Areas with more popular

Articles in this issue

Archives of this issue

view archives of Law and Order - DEC 2012