Trinity Mount Ministries
Thursday, August 6, 2015
Windows 10 wipes your child safety settings if you upgrade from 7 or 8:
Friday, July 17, 2015
DOJ - New Hampshire Man Charged in “Sextortion” Scheme Targeting Minors:
Friday, July 10, 2015
Senior Jharkhand IPS officer recovered a missing girl in an hour using WhatsApp
Tuesday, June 23, 2015
The Dark Web: A haven for pedophiles beyond the Internet
by Jerome Elam
WASHINGTON, June 6, 2015 – It was November of 2014 in the quiet suburban neighborhood as the light of an early Saturday morning began to peek through the clouds and the day found its beginning. The quaint three-bedroom home on the corner blended in with the rest of the neighborhood, as the freshly painted beige exterior glistened in the early morning sun. The neatly trimmed yard was littered with the toys of young children, and a brown mini van missing a hubcap was parked in the driveway.
Suddenly the screech of tires broke the landscape of silence as three black Chevy Suburbans with blacked windows came to an abrupt halt in front of the house. A group of men wearing black body armor and matching helmets formed a line behind two others holding a large black battering ram as they the disengaged the safety of their automatic weapons. As the group advanced on the front door, a loud crash echoed as the force of the battering ram met the front door and splinters of wood rained down on the group.
Inside the house a middle-aged man sat at a computer in the darkness as images of young children flashed across the screen and the video streamed across the secret network that made him invisible to the rest of the world. Seconds later, he was lying on the floor handcuffed, and law enforcement agents carefully began to collect the evidence they needed to bring down a global ring of pedophiles.
The investigation had taken over a year and had led agents into the darkest depths of a world few know about, a world where terrorists, drug dealers and pedophiles roam freely. Known as “the Dark Web,” it is a series on non-indexed sites around the world that create an abyss 500 times larger than the Internet you and I surf every day.
Tor is free software that allows a user to browse, send e-mail and chat anonymously. It also allows users access to the “Dark Web.” A 2014 study by University of Portsmouth computer science researcher Gareth Owen discovered a startling 80 percent of the traffic to sites on the Dark Web were associated with child pornography.
In an interview with CBS News, Greg Virgin, who formerly worked with the National Security Agency and is now a cyber security consultant to children’s rights groups commented, “It was just an awful realization, discovering there were tens of thousands of people who are not only trading child pornography, but planning to exploit children.”
On the Dark Web, pedophile “shopping” sites advertise children for sale as well as take “orders” for specific age groups. Virgin said, “We found one site where users openly advertised the ages of the children they were interested in. The average youngest age they were seeking for girls was zero years old. And the average age for boys was one.”
A 2014 Business Insider article by James Cook that documents a pedophile fundraising site for child exploitation videos further emphasizes the growth of child exploitation on the Dark Web. Pedophiles created a twisted form of the popular fundraising tool “Kickstarter,” which collected funds to exploit children and then share the videos on the Dark Web for free.
The FBI is rumored to have taken down several of the servers used by pedophiles on the Dark Web in 2013. But, according to Virgin, “”The demand is picked up very quickly by other sites, and the sites are replaced very quickly, usually by a stronger, better site.”
The Dark Web is a Rubik’s cube of depravity. For those who know how to unlock its many hidden doors, there is no limit to the horrific nightmares children are forced to live. Internet browsers such as Internet Explorer and Google Chrome scan roughly 5 percent of the space that is reached by Tor, which plunges deeply into the hidden world. Internet privacy enthusiasts attempt to deflect criticism of the use of Tor and the presence of child exploitation on the Dark Web by saying the numbers are inflated.
A computer hacker who spoke under the condition of anonymity noted, “There are doors within the Dark Web hidden so well that only a handful of experts could find them, and even then it would take some time to uncover the warren of passageways deep beneath the surface.”
Tor began with a much nobler purpose that still finds its place in the expanding landscape of illicit users on the Dark Web. It was envisioned as a way to allow journalists and those living under oppressive governments a means of communication that would protect their identities and their lives.
Created by the U.S. Naval Research Laboratory, Tor began in the 1990s as a way for the U.S. Intelligence Community to communicate securely. In 1997, the Defense Advanced Research Projects Agency (DARPA) further developed Tor and in 2004, the Naval Research Laboratory released the code for Tor under a free license. In 2006 a non-profit called “The Tor Project” was created by a group of computer scientists in Massachusetts that maintains Tor in association with several other organizations.
Law enforcement has been fighting back against those who exploit Tor for darker purposes. In 2013, Irish authorities arrested 28-year-old Eric Eoin Marques, who is thought responsible for Freedom Hosting, an anonymous hosting company rife with child exploitation.
After Marques’ arrest, a panic rushed through the pedophile community, when the U.S. National Security Agency released a virus onto the Freedom Hosting website to track and uncover the pedophiles lurking on the Dark Web. Numerous child exploitation forums were deleted in response to law enforcement’s infiltration of their twisted domain, and warnings temporarily drove pedophiles further underground.
The Dark Web interests law enforcement not only because of its large community of pedophiles but also because organized crime, terrorists, money laundering and the illegal drug trade have proliferated in its dark abyss.
For example, the infamous “Silk Road” site provided a marketplace of illicit drugs for sale on the Dark Web. Run by an administrator known only as the “Dread Pirate Roberts” (named after the character in the William Goldman novel and later movie “The Princess Bride”), the site drew the public ire of New York Sen. Chuck Schumer. The FBI arrested Ross William Ulbricht after an elaborate sting operation caught him logged on to the Silk Road site as the Dread Pirate Roberts himself.
The Dark Web has become an arena where the cat and mouse game between authorities and those who exploit a child’s innocence continues. The National Center for Missing and Exploited Children reports that as of January 2015, its CyberTipline received more than 3.3 million reports of suspected child sexual exploitation since it was launched in 1998. Memex, a powerful new search engine developed by DARPA has given U.S. law enforcement the ability to root out the elusive miscreants who trade in the most depraved corners of the Dark Web.
We face a desperate struggle as child exploitation continues to grow at an unprecedented rate. Law enforcement needs everyone to learn how those who exploit our children operate. It is only when we have all joined together in the fight to save our children that we will finally eradicate these parasites of the innocent.
As a survivor of child sex trafficking, childhood sexual abuse and childhood sexual exploitation, I understand the continuous cycle of abuse each victim suffers. As a child I was abandoned by irresponsible and abusive parents, left to fend for myself, stripped of the tools that every child needs to function in the world and saved from a darker ending only by the unconditional love of my great-aunt.
I have struggled my entire life with the effects of my early loss of innocence. Overcoming it has been my greatest triumph, but it only became possible through the love and caring of those who held human compassion in the highest regard and dedicated themselves to the rescue of those standing at the edge of the abyss.
My sincerest hope is that I can save one child from suffering the hell I endured. Then I can leave this life with a sense of accomplishment. I hope you will all join me in the fight to protect our children from sexual predators before the next child is stripped of innocence.
To learn more about how you can help stop those who exploit a child’s innocence and report suspected child sexual exploitation, visit the National Center for Missing and Exploited Children website http://www.missingkids.com/cybertipline/ or call the CyberTipline at 1-800-843-5678. Working together we can save the next child from a lifetime of ravaged innocence and stolen hopes and dreams.
Source: The Dark Web
Friday, June 19, 2015
Missing child alerts to become part of all Dutch Facebook timelines:
Source: Missing child alerts on Dutch Facebook timelines
Thursday, June 11, 2015
Children's Internet Safety
The Internet can be a wonderful resource for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. Kids who are old enough to punch in a few letters on the keyboard can have access to the world.
But that access can also pose hazards. For example, an 8-year-old might do an online search for "Lego." But with just one missed keystroke, the word "Legs" is entered instead, and the child may be directed to a slew of websites with a focus on legs — some of which may contain pornographic material.
That's why it's important to be aware of what your kids see and hear on the Internet, who they meet, and what they share about themselves online.
As with any safety issue, it's wise to talk with your kids about your concerns, take advantage of resources to protect them, and keep a close eye on their activities.
Internet Safety Laws:
A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from getting a child's personal information without a parent knowing about it and agreeing to it first.
COPPA requires websites to explain their privacy policies on the site and get parental consent before collecting or using a child's personal information, such as a name, address, phone number, or Social Security number. The law also prohibits a site from requiring a child to provide more personal information than necessary to play a game or participate in a contest.
But even with this law, your kids' best online protection is you. By talking to them about potential online dangers and monitoring their computer use, you'll help them surf the Internet safely.
Online Protection Tools:
Online tools are available that will let you control your kids' access to adult material and help protect them from Internet predators. No option is going to guarantee that they'll be kept away from 100% of the risks on the Internet. So it's important to be aware of your kids' computer activities and educate them about online risks.
Many Internet service providers:
(ISPs) provide parent-control options to block certain material from coming into a computer. You can also get software that helps block access to certain sites based on a "bad site" list that your ISP creates. Filtering programs can block sites from coming in and restrict personal information from being sent online. Other programs can monitor and track online activity. Also, make sure your kids create a screen name to protect their real identity.
Getting Involved in Kids' Online Activities:
Aside from these tools, it's wise to take an active role in protecting your kids from Internet predators and sexually explicit materials online. To do that:
Become computer literate and learn how to block objectionable material.
Keep the computer in a common area, not in individual bedrooms, where you can watch and monitor its use.
Share an email account with your child so you can monitor messages.
Bookmark kids' favorite sites for easy access.
Spend time online together to teach your kids appropriate online behavior.
Forbid your child from entering private chat rooms; block them with safety features provided by your Internet service provider or with special filtering software. Be aware that posting messages to chat rooms reveals a user's email address to others.
Monitor your credit card and phone bills for unfamiliar account charges.
Find out what, if any, online protection is offered by your child's school, after-school center, friends' homes, or anyplace where kids could use a computer without your supervision.
Take your child seriously if he or she reports an uncomfortable online exchange.
Forward copies of obscene or threatening messages you or your kids get to your Internet service provider.
Call the National Center for Missing and Exploited Children at (800) 843-5678 if you're aware of the transmission, use, or viewing of child pornography online. Contact your local law enforcement agency or the FBI if your child has received child pornography via the Internet.
Many sites use "cookies," devices that track specific information about the user, such as name, email address, and shopping preferences. Cookies can be disabled. Ask your Internet service provider for more information.
Basic Rules:
Set up some guidelines for your kids to use while they're online, such as:
Follow the rules you set, as well as those set by your Internet service provider.
Never trade personal photographs in the mail or scanned photographs over the Internet.
Never reveal personal information, such as address, phone number, or school name or location. Use only a screen name. Never agree to meet anyone from a chat room in person.
Never respond to a threatening email or message.
Always tell a parent about any communication or conversation that was scary.
If your child has a new "friend," insist on being "introduced" online to that friend.
Chat Room Caution:
Chat rooms are virtual online rooms where chat sessions take place. They're set up according to interest or subject, such as a favorite sport or TV show. Because people can communicate with each other alone or in a group, chat rooms are among the most popular online destinations — especially for kids and teens.
But chat rooms can pose hazards for kids. Some kids have met "friends" in chat rooms who were interested in exploiting them. No one knows how common chat-room predators are, but pedophiles (adults who are sexually interested in children) are known to frequent chat rooms.
These predators sometimes prod their online acquaintances to exchange personal information, such as addresses and phone numbers, thus putting the kids they are chatting with — and their families — at risk.
Pedophiles often pose as teenagers in chat rooms. Because many kids have been told by parents not to give out their phone numbers, pedophiles may encourage kids to call them — and if they do, caller ID will instantly give the offenders the kids' phone numbers.
Warning Signs:
Warning signs of a child being targeted by an online predator include spending long hours online, especially at night, phone calls from people you don't know, or unsolicited gifts arriving in the mail. If your child suddenly turns off the computer when you walk into the room, ask why and monitor computer time more closely. Withdrawal from family life and reluctance to discuss online activities are other signs to watch for.
Contact your local law enforcement agency or the FBI if your child has received pornography via the Internet or has been the target of an online sex offender.
Taking an active role in your kids' Internet activities will help ensure that they benefit from the wealth of valuable information it offers without being exposed to any potential dangers.
Reviewed by: Steven Dowshen, MD
Source: http://m.kidshealth.org/parent/positive/family/net_safety.html
Monday, October 29, 2012
Geeks Get Clever to Help Find Missing Children with Custom 404 Pages:
Geeks Get Clever to Help Find Missing Children with Custom 404 Pages
By Jeff Balke Mon., Oct. 29 2012 at 7:00 AM
If you've ever visited a website but went to a page that doesn't exist, you have probably found yourself stuck on a page that says something like "You the page you are looking for doesn't exist" if the site didn't automatically redirect you to the main page. Visiting a page that doesn't exist on a website leads to errors, the most common of which is a "404 Page Not found" response.
Tuesday, August 21, 2012
Digital Strategy at the Department of Justice:
Digital Strategy at the Department of Justice
In the past few years, the Department of Justice has taken many steps to make the department’s information more available and accessible. We’ve added hundreds of data sets to data.gov, have begun using social media to bring information directly to you, and added more information to our website than ever before. But we know we can do more. As we begin to formulate our digital strategy, we want your input on which information and services you’d like us to prioritize and make more tech and mobile-friendly. There are two areas where we’d like your input:
- What Justice Department information would you like to be able to access on mobile devices?
- What Justice Department information, data, or applications would you like to us make available via APIs (Applied Programming Interface)?
We’ve come up with a few possibilities for each area. You can see the list on our Digital Strategy web page, justice.gov/digitalstrategy.
We welcome your feedback on the possible candidates for improvement, or other opportunities we may have overlooked. Your feedback, combined with other internal and external conversations, will guide our digital plan in the coming months and years.
Read more about how we are participating in the Digital Government Strategy and Open Government at our website.
Trinity Mount Ministries
Monday, October 3, 2011
FBI - Protecting our Children with Technology:
Technology, Partnerships Work Hand in Hand
Investigators dedicated to rescuing child victims of sexual abuse and arresting those who traffic in child pornography are often faced with the difficult and time-consuming task of analyzing hundreds of thousands of illicit images traded online.
For the eighth year in a row, October has been designated National Cyber Security Awareness Month. The goal: to reinforce the importance of protecting the cyber networks that are so much a part of our daily lives. The theme of the observance, which is sponsored by the Department of Homeland Security, is “Our Shared Responsibility." Over the course of the month we will be posting additional stories and information about cyber crimes and security. Read more |
---|
DARC personnel, who analyze digital evidence in the most significant online child exploitation cases, are currently testing a software tool called the Child Exploitation Tracking System (CETS). The CETS program—already in use in several locations around the world—is designed to streamline investigations and integrate with other CETS operations so that law enforcement agencies can enhance their cooperation and efficiently move their cases forward.
“CETS has tremendous potential for the FBI,” said Special Agent Barbara Cordero, a veteran cyber investigator who manages research, development, and training for the Innocent Images National Initiative. “Eventually, when everyone is plugged into CETS, it will allow law enforcement everywhere to share key information.”
“If I’m in a small police department in Iowa, I might not know that another department in Maryland is investigating the same subject I am investigating,” Cordero explained. “CETS will tell me that, along with other important information.”
The FBI established the Innocent Images National Initiative in 1995 to address the proliferation of child pornography and child exploitation facilitated by the Internet. A component of the Bureau’s cyber crimes program, the Innocent Images initiative takes a proactive, multi-agency, investigative approach that relies on strong domestic and international law enforcement partnerships. The initiative prioritizes several investigative areas, including: - Online organizations and enterprises that exploit children for profit or personal gain; - Major distributors and producers of child pornography; - Individuals who travel—or are willing to travel—for the purpose of engaging in sexual activity with a minor; and - Possessors of child pornography. |
---|
“CETS has the ability to put the same information in one place and make it available in a unified standard for everyone,” said Special Agent Charles Wilder, who heads DARC. “That’s important because the Internet has removed all geographic boundaries in these types of crimes.”
The CETS program was created by Microsoft at the request of the Royal Canadian Mounted Police National Child Exploitation Coordination Center—investigators there wanted a system designed specifically for child exploitation cases. The program is now being used in Canada and Australia—and Interpol, the international police organization, is working with several of its member countries to integrate CETS into its existing systems.
The ultimate goal is to expand the number of CETS users and to one day integrate all the operations so investigators can share information in a truly global way. “Right now,” Cordero said, “the immediate benefit for the FBI is that CETS saves us a tremendous amount of time in the image review process. Bad guys who trade pornographic images have massive collections,” she said. “We regularly seize hundreds of thousands of images. CETS makes the review process extremely efficient.”
She added, “The FBI has terrific partnerships with cyber investigators in the U.S. and around the world. As we move forward, CETS will allow us to strengthen those partnerships by sharing more and more critical information. This type of technology is a model for the future.”
Resources:
- Innocent Images National Initiative
- National Cyber Security Awareness Month