Menu

Fighting Internet Crimes Against Children through Community Education

The statistics are simply staggering.

  • One in five kids ages 10-17 receive unwanted online solicitations, according to research from the US Department of Justice.  
  • Most occur on social networking sites and 1 in 33 receive an aggressive sexual solicitation.  
  • One in six youth surveyed shared a nude image online (between ages of nine and 17).

What’s more alarming is between 50-70% of the online predators have physically assaulted a child in the past.   

Lt. Eric Kinsman, Commander NH ICAC Task Force“This abuse isn’t even under our noses – many parents miss it because we don’t know what to look for,” explains Lt. Eric Kinsman, Commander of the New Hampshire Internet Crimes Against Children (ICAC) Task Force, speaking to more than two dozen parents inside the high school auditorium in Exeter, New Hampshire.  

The parents attended to learn how to keep their kids safe online. While community education is a requirement for Lt. Eric Kinsman to keep federal funding, it’s the part of the job he enjoys most. He talks to both parents and students with age-appropriate presentations and views it as a key preventative measure in hopes kids will think twice before uploading a picture or inadvertently chatting with a bad actor.  

A Problematic Increase 

Kinsman explains that since 2018, there’s been a 275% increase in child exploitation cyber tips. Some silver lining is that about half of the cases end up not being a child in danger. Still, New Hampshire is serving two to three search warrants a week on criminals targeting children. 

“We got why it happened during the pandemic – with kids constantly online, but why it didn’t drop off was really puzzling,” said Lt. Kinsman. “Then we considered that more and more apps are being developed every day and more and more kids have access to a device. Kids are even creating their own explicit content and uploading it – they think it’s funny or cool and do not realize what they’re doing.”  

Lt. Kinsman explained how data is transferred between devices and how internet service providers are required to report. Those reports go to NCMEC, through its CyberTipline, which ultimately sends it to law enforcement. From there, Lt. Kinsman’s team employs digital investigative technology, including Cellebrite, to help them find the perpetrators.  

A Long History of Protecting Children  

New Hampshire led the way, creating the first Internet Crimes Against Children (ICAC) Task Force. There are now 61 across the United States with every state having one and geographically larger states breaking into several regions. The task forces are funded through grants from the federal government and provide law enforcement training, proactive investigations, reactive investigations, training to ICAC investigators and community outreach and education, like the event Lt. Kinsman created in Exeter, NH.    

Lt. Kinsman educated parents on the types of ICAC cases including possession and distribution and the more complicated cases of manufacturing the material and worst of all traveling cases where the child is groomed and lured. Lt. Kinsman then outlined the 10 Common Predator Tactics: 

  • Prey on a young person’s desire for romance, adventure and sexual information 
  • Develop trust and secrecy: Manipulate the child by listening to and sympathizing with the child’s problems and insecurities 
  • Affirm the child’s feelings and voices 
  • Exploit the child’s natural sexual curiosities 
  • Ease inhibitions by gradually introducing sex into conversations or exposing them to pornography 
  • Flatter and compliment the child excessively, send gifts (i.e. electronic currency on gaming apps, gift cards) and invest time, money and energy 
  • Develop relationship that’s romantic, controlling which the child becomes dependent 
  • Drive a wedge between the child and his or her parents 
  • Make promises of an exciting, stress-free life, tailored to the youth’s desire 
  • Make threats and will often use child sexual abuse material featuring the victim to blackmail them, also known as sextortion

A helpful companion  

Niko and Det. Matt FlemingNiko, the NH ICAC K9, doubles as an agent and a therapy dog. Not only can he sniff out any device with stored data, due to a particular chemical he’s trained to detect, he also serves as a friendly companion to the investigators who must mentally deal with investigating these cases. The five-year-old half-lab, half-golden retriever is partnered with Deputy Matt Fleming.

The pair have been working together since May 2020. “He can find any device that stores or transmits data – that’s big,” Deputy Fleming said. “We want to find everything we can and get it to the hands of the digital forensics people and let them work their magic.” In addition, Niko is a loving, secure reassurance for kids dealing with these unthinkable situations. “He’s (Niko) been involved in over 250 warrants since we’ve had him,” Lt. Kinsman said. “And he’s made an impact at every single one in some way, shape or form.”  

K9 Niko is called a "game changer" for the NH ICAC Task ForceDeputy Fleming calls Niko a game changer for the NH ICAC Task Force and says that this four-legged officer is the best partner he’s ever had. “Our days are tough,” he explained, “we see a lot of really hard things to accept. I have done probably lifetime, over 200 child predator interviews before I took Niko on. And I tell a lot of investigators that my cup was full and I wasn’t done fighting yet, but I needed to figure another way out. And I’m not a digital forensics guy. I think that in a lot of ways this dog saved my life, not just kids’ lives.” 

Kids and Apps  

Something Lt. Kinsman stresses when he talks with kids and parents is that once an image is posted online – you cannot take it back.   

“The App should not matter if your child is making good decisions when it comes to social media,” Lt. Kinsman says. “Yet we don’t want them to have a false sense of security. Particularly when apps have messages that disappear on the other end, the child must know that information can live on.”  

Lt. Kinsman flagged an App known as Spy Calc, which operates like a normal calculator, yet you can hide messages and images in there – a virtual vault. YouTube, along with Roblox is a popular source for cyber tips, particularly with younger boys. Younger boys enjoy going on YouTube and broadcasting themselves playing a game. That child now has a channel where he is chatting with his viewers.   

“Predators are known to disguise themselves as another child and they’re looking to get pieces of information from the child they can use to exploit the child at a later time. When do Mom and Dad go to work? When are they going on vacation? When are you staying with Grandma next week?” Lt. Kinsman explains. “The predator then identifies Mom and Dad on Facebook and look into a family’s life. These predators are incredible at their trade craft.”  

The New Normal   

Protecting kids and teens from online predators76% of teens are at least somewhat concerned that posting information publicly could negatively impact future – so why do they do it? There’s a reward that they could be recognized among peers and sometimes, and oftentimes that wins out in their risk/reward assessment.  

Lt. Kinsman encouraged parents in attendance – many of them GenX or elder Millennials – to consider the new normal, where: 

  • Online strangers are “friends” 
  • Kids don’t want to lose online friends (constantly comparing #s) 
  • They get major FOMO (fear of missing out) 
  • Feelings of inadequacy 
  • Screentime (time vs. quality) 
  • Stress (comparing their post to a friend’s post)

In this lens, it’s easy to see how kids, particularly teens who are seeking connection, go from a simple introduction to being exploited. How it works: 

  • They accept friend requests from people they don’t know 
  • The predators groom them over time (often from countries a world away) 
  • “I promise I won’t show anyone” 
  • “I’ll send one if you do.” 
  • They send because it’s funny, to impress or to share with a boyfriend- sadly, it’s the norm

The Big Red Flags  

Lt. Kinsman wanted to arm parents with information and that includes being able to identify red flags that something may be off, such as:  

  • Receiving gifts 
  • Calling unknown numbers 
  • Rejecting family and friends 
  • Getting upset when not online

If there’s a deviation in any baseline of normal behavior, he strongly encouraged parents to act on it. Kids are generally afraid to tell their parents, so encouraging an open dialogue is critical – explaining that they can approach you with anything. Data shows that increased parental control is associated with more (and not fewer) online risks. The messages that DO NOT WORK, include: 

  • Scare tactics 
  • Stereotypes 
  • Overstated statistics 
  • Dismissive perspectives 
  • Shaming 
  • Banning of specific sites 

Data shows the messages THAT DO WORK with kids include:  

  • Clear, reasonable expectations 
  • Positive social norms 
  • Use good stats about good behaviors 
  • Accurate and timely information 
  • Skill-based and interactive 
  • Positive, supportive conversations – here are some conversation starters: 
  • What do you like to do online? 
  • Are your contacts with others positive? 
  • Do they make you feel happy? 
  • Do you ever feel isolated? 
  • Does anything ever scare you?

What to do if Your Child is Exploited  

If your child is exploited – leave the phone as it is – do not touch a single file or do anything with the phone – the digital forensics gleaned in the case could hold the bad actor accountable. In a perfect world, place it in airplane mode while you wait to get it in the hands of law enforcement. Cellebrite is proud to partner with and provide technology for countless ICAC task forces, including New Hampshire. The trained, professional examiners can use the technology to extract the important evidence in the case that typically can hold the bad actor accountable.   

Lt. Kinsman shared some great resources he points parents toward when they need information and support in having these important conversations. They include:  

This story was originally published on the Cellebrite website.

 

From Case to Closure: How the Nampa Police Department (NPD) is Accelerating Justice with Cutting-Edge Digital Forensics Tools

Criminals today exploit a vast digital landscape—phones, computers, cloud storage—leaving a scattered trail of evidence. Beyond acquiring these disparate sets of data, investigators also face the challenge of analyzing, manually connecting dots and building a comprehensive picture. Recognizing that hurdle, the Nampa, Idaho Police Department’s Digital Forensics Lab took steps and made the proper investments to make sure that the investigative process, from case-to-closure, is as streamlined as possible.

Y2K Beginnings

The Nampa Police Department established its digital forensics lab in the early 2000s when technology began permeating law enforcement investigations. However, as technology evolved, so did the unit’s responsibilities, expanding to encompass mobile phones, computers, tablets and other digital devices. Spearheaded by Detective Cameron Cowdery, with 24 years of combined experience in patrol, CID, special investigations and DEA task forces, NPD’s digital forensics lab has become indispensable not just in NPD’s investigative process but also for agencies in neighboring counties.

“In the last three years, we’ve been right on track to be around 25 to 30 devices a month,” Det. Cowdery says, a testament to the unit’s effectiveness. Support from the agency is critical, enabling Det. Cowdery and his team to acquire crucial tools like Cellebrite Premium, UFED, Pathfinder, Guardian and more.

Running this full arsenal of digital forensics solutions, Det. Cowdery and team have continuously demonstrated their investigative edge at every step of the process, often putting forth digital evidence that helps close cases or unravel a larger web of crime that would otherwise be overlooked.
Det. Cowdery highlights three cases that illustrate the above, starting with one that demonstrates how having the right digital forensics tools at the right time can help break cases wide open.

“Right out of the box, Premium did its job and gave us solid probable cause for an arrest warrant and to take them to a grand jury.”

Pandora’s Box in an iPhone

In a drive-by shooting investigation, Det. Cowdery says they had a person who was shot and left paralyzed. The lab received an iPhone XR related to the crime, and initially didn’t have the solutions available to access and extract data from the device. Without strong evidence, the case ran the risk of running cold.

When Det. Cowdery got the Cellebrite Premium solution (now part of Cellebrite Inseyets), they “managed to get in it [iPhone XR] the day we got the solution installed,” Det. Cowdery recalls. “We ended up finding pretty significant content in the device, linking the owner of the phone to the actual shooting and numerous other crimes that had occurred before the shooting. Right out of the box, Premium did its job and gave us solid probable cause for an arrest warrant and to take them to a grand jury.”

Pathfinder Connects to Dots in Stalking Case

The detective also details an instance that showcased digital forensics solutions’ ability to connect more dots faster than was traditionally possible.

It was a stalking case and the women who feared for her life brought Detective Cowdery three devices to start. That list grew to nine associated devices.

The initial phase of the investigation involved manually searching through the data extracted from the devices provided by the victim. Detective Cowdery describes the complexity of managing multiple extractions and correlating information across different devices.

“I’m having to pull up all three extractions on two computer screens and go in between each extraction to look at his [the suspect’s] phone and her two phones that she brought us,” he explains.

However, the investigative process was eased with automated digital evidence analysis. “With the help of Pathfinder, it makes that organization so much easier by ingesting everything together. To show where it’s coming from,” Det. Cowdery notes.

Tools like Cellebrite Pathfinder enable Detective Cowdery and his team to efficiently organize and analyze vast amounts of data, uncovering critical evidence that ultimately leads to the successful resolution of the case – the woman’s ex-husband was arrested – accused of doing the stalking.

“Pathfinder’s been able to organize that data much, much, much easier than we could by ourselves,” acknowledges Detective Cowdery.

Homicide to Human Trafficking

Wrapping up his repertoire of successful cases, the detective recalls one that highlights the importance of cloud-based evidence management solutions: a shooting that unveiled a sinister human trafficking web involving minors.

“We have a homicide that occurred here in Nampa. The suspects was from the area. At the same time the homicide occurred, we found out he is smack dab in the middle of a giant human trafficking group,” Det. Cowdery recalls.

“Our neighboring jurisdiction is looking at him as the brain running a human trafficking organization. The investigator from there has a chart of all her known players, so far, that are involved in this human trafficking case that she’s been working on,” Det. Cowdery explained, revealing there were 59 suspects on said chart.

With so many players on the board, the investigation pushed the boundaries not only when it came to devices and data that needed to be accessed and extracted, yet also the ability to share all that data back and forth between relevant parties. A monumental task that was made more efficient with a cloud-based solution that NPD employs internally. In a keystroke, Det. Cowdery can share full case data with anyone, without the tedious storage drive juggling and delivery.

“Because of Cellebrite Guardian, we’re able to move this data between ourselves at a much more accelerated pace and share these large extractions between all parties involved,” he says.

Police made arrests and the case is still moving forward. With the increasing stockpile of data, Det. Cowdery is confident they will connect more dots with the help of Cellebrite Pathfinder, pulling more perpetrators out of the shadows and serving swift justice.

Looking Forward

As Det. Cameron Cowdery approaches retirement, his reflections offer a comprehensive overview of the Nampa Police Department’s digital forensics lab’s achievements, challenges and its indispensable role in modern law enforcement.

By embracing cutting-edge solutions for each step in the investigative process, the NPD is not only streamlining processes but also advancing justice and fostering inter-agency collaboration.

Uncovering Organized Crime Networks with Digital Investigative Solutions

When law enforcement officials from the Brazilian Border Police Battalion (BPFRON) found and rescued 15-year-old Luna during an operation in Santa Helena, in the interior of Paraná, Brazil, they discovered that she was one of countless young girls who had been lured into a life of abuse and forced slavery.  

This was the first human trafficking case the agency closed after technical training at The Exodus Road’s TraffickWatch Academy, a masterclass training program for law enforcement agencies in Brazil, with a module from Cellebrite. 

“In the 2022 Carnival, after receiving information that Paraguayan minors were being prostituted in brothels in Santa Helena, we triggered our first operation to combat human trafficking,” shares BPFRON 1st Police Lieutenant André L. Jaworski Fantin. 

Although the agency identified a suspect, they were unable to connect him to organized crime in the city – that is, until they used Cellebrite’s advanced digital investigative solutions to uncover an international network of criminals, with their suspect at the center of it all. 

“Thanks to the use of Cellebrite, we were able to identify a weapons, drugs and people trafficking scheme,” says Lt. André. Most importantly, they were able to reunite a child with her family.  

For Lt. André, being able to accelerate justice for and prevent further harm to these victims is the most rewarding part of being a police officer. The cherry on top of it all is being able to ensure that criminals don’t escape punishment.   

“Police officers can save, protect and help people in a way that few people can,” Lt. André says.” Far beyond enabling fair punishment for criminals, which is also rewarding, is rescuing a victim of abuse and …bringing “a little peace to their families by taking the (criminals) to justice.” 

 

Access to Digital Investigative Solutions 

For some states in Brazil, such as Pernambuco, the only equipment available to investigate these crimes are donations through Cellebrite’s partnership with The Exodus Road. Insufficient tech can affect law enforcement’s ability to resolve cases. In fact, access to advanced forensics tools and training are essential in uncovering sexual exploitation and human trafficking schemes that take place across the country.  

In Amazonas, for example, the Civil Police uncovered a sexual exploitation scheme after receiving a video from a teenage girl’s phone. After legally seizing video tapes, hard drives, pen drives and a computer as part of their investigation, they discovered that the perpetrator was involved in at least four types of sexual exploitation including prostitution, sexual assault and sexual tourism.. 

Besides the anti-trafficking training, which TraffickWatch Academy conducted in nine states across the country, Brazillian law enforcement agencies also received the latest forensics tech from Cellebrite. In 2023 alone, they rescued 170 survivors and arrested 10 perpetrators as a direct result of the training and the digital investigative solutions provided.  

 

The Importance of Digital Investigative Solutions 

Due to the transnational nature of human trafficking and organized crime, it is essential that law enforcement agencies gain access to advanced digital investigative solutions for secure and streamlined investigations and cross-agency collaboration.  

These cases underscore the critical importance of Operation Find Them All, a groundbreaking public commitment campaign between Cellebrite and its partners, the National Center for Missing and Exploited Children (NCMEC), The Exodus Road and Raven, to accelerate investigations of online crimes against children. 

Investigating Crimes Against Children: Key Challenges and Solutions in Operations

Child exploitation in the digital age has surged to unprecedented levels, demanding innovative solutions from law enforcement agencies worldwide. The staggering statistics from the National Center for Missing & Exploited Children (NCMEC) reveal the scale of the challenge: almost 32 million reports in 2022 alone.

These reports encompass a spectrum of crimes, including child sexual abuse material, online enticement, trafficking and molestation. The sheer magnitude of the issue necessitates a collective and technologically advanced approach.

However, the fight against Internet Crimes Against Children (ICAC) is fraught with challenges, from overwhelming caseloads to the constant evolution of digital tactics by criminals.

Obstacles for ICAC Officers in the Digital Age The Seattle Police Department’s ICAC unit provides a glimpse into the operational intricacies. Acting as the lead agency for the State of Washington, they filter CyberTip referrals, handle external law enforcement assistance requests, and manage ICAC-related queries from foreign entities. Some of the challenges they face include:

1. Case and Device Overload

ICAC units face an overwhelming caseload due to a significant increase in monthly referrals. In 2020, Seattle PD’s team experienced a substantial surge in referrals, averaging between 425 and 450 per month, reflecting an alarming 240% increase from 2014 – a six year time span. Officers were also issuing search warrants for up to 50 technological devices at a time because perpetrators were using multiple devices to commit these crimes.

This sudden surge has put immense pressure on the investigators, hindering effective management and planning.

2. Technological Savvy Perpetrators

Child exploiters have adapted to technological advancements, utilizing dark web platforms, peer-to-peer technologies, IP anonymizers and proxies.

“All of these are different things that suspects have access to in an attempt to obfuscate their activities. That was much less utilized a decade ago, yet it’s much more common today,” said Seattle PD’s Detective Ian Polhemus.

This technological race adds complexity to investigations, requiring constant adaptation by law enforcement.

3. Time Constraints

In child exploitation cases, time is a critical factor. As Captain Edwards of the Seattle PD emphasized, “Time is our enemy. Anything that increases that time profile for us makes it so much more difficult.”

The intricate nature of modern investigations, coupled with factors like encryption and international storage, elongates the time profile, making timely interventions challenging.

4. Personnel Strain and Funding Uncertainty

High turnover rates among investigators, attributed to the emotionally taxing nature of the work and funding uncertainties, pose a substantial threat to the sustainability of ICAC units. The “defunding” discourse adds a layer of uncertainty to personnel and resource availability.

Digital Intelligence (DI) in Action

Despite these formidable challenges, technology has become a valuable tool for ICAC units to overcome them. As technology advances, officers must have the appropriate training and tools to assist children in trouble and quickly develop actionable intelligence.

“Being able to identify technologies and training that will work and appeal to a diverse group [is key],” Captain Edwards explained.

Maintaining the chain of custody is vital during digital investigations. Using digital evidence management systems (DEMS) linked to a case management system provides a significant advantage. By deploying DEMS, agencies can protect and manage evidence through all stages of a case.

Additionally, AI-driven analytics solutions play a significant role in managing the overwhelming volume of digital data. These tools efficiently sift through vast datasets, promptly providing investigators with critical insights. This accelerates the investigative process and reduces the workload for already strained personnel.

Modern DI solutions enable authorized information sharing across departments and international boundaries. This collaborative approach is essential in tackling complicated cases often involving perpetrators operating across jurisdictions. While DI solutions still require a workforce for investigations, they save time and provide peace of mind to resource-strapped departments.

Conclusion

The battle against child exploitation demands a multifaceted approach, intertwining technological advancements, ample funding and ongoing training. This strategic approach empowers law enforcement to effectively combat child exploitation within the intricate landscape of the internet.

As society grapples with the complexities of the digital age, a united commitment is paramount, ensuring a safer future for our children in the digital world.

Cellebrite Unites Philanthropic Pioneers to Accelerate Investigations of Crimes Against Children

New Landmark Campaign Leverages the Cellebrite Platform and Promise to Accelerate Justice by Equipping and Empowering Agencies Dedicated to Protecting Youth Online

TYSONS CORNER, VA, PETAH TIKVA, ISRAEL – January 12, 2023 – Cellebrite DI Ltd. (Nasdaq: CLBT), a global leader in premier Digital Investigative solutions for the public and private sectors, is honored to announce a powerful collaboration aimed at reducing crimes against children and online child exploitation.

This new campaign titled Operation Find Them All (OFTA) brings the National Center of Missing and Exploited ChildrenThe Exodus RoadRaven and Cellebrite together for the first time under a collective goal to accelerate investigations of online crimes against children and in doing so, help law enforcement find missing children, solve crimes involving exploited minors, remove harmful online images and bring perpetrators to justice.

In addition to a financial investment to all three organizations, Cellebrite is providing NCMEC and The Exodus Road with in-kind use of its preeminent technology—namely Pathfinder, an AI-based Investigative Analytics solution, and Smart Search, a cloud-based OSINT tool for investigators—to help these organizations in their efforts to dismantle child exploitation and child sex trafficking rings by accelerating the time it takes for law enforcement to investigate persons and organizations of interest, analyze evidence, gather insights, develop and advance leads and rescue innocent survivors. “’Operation Find Them All’ has the potential to aggressively accelerate the focus and efforts of all the ‘good guys’ in law enforcement working day and night to find missing children,” says NCMEC co-founder and longtime child advocate, John Walsh. “I’m deeply thankful Cellebrite is so committed and recognizes the pivotal role it plays in protecting children. Together, we can ensure that every child has a safe childhood, and that justice prevails.”

“The dangers of digital darkness demand our immediate attention and action,” said Yossi Carmil, Cellebrite’s CEO. “At Cellebrite, we are committed to working in unison with these heroic organizations and global law enforcement to help protect children around the world from online sexual exploitation. That’s why we’re dedicating Cellebrite’s resources and capabilities to finding these innocent children.”

Law enforcement at federal, state and local agencies are buried in a chilling amount of child sexual abuse material (CSAM) cases. In 2022 alone, the FBI reported 359,094 cases of missing children and NCMEC’s CyberTipline received over 32 million reports of suspected child sexual exploitation. Today’s law enforcement professionals are under-resourced and overwhelmed due to the scale and complexity of these investigations. Cellebrite’s end-to-end portfolio will better equip law enforcement and these strategic partners with the most advanced digital investigative capabilities, innovative tools and comprehensive training to confront this crisis head-on.

“Since 2012, The Exodus Road has helped to free nearly 2,500 survivors, arrest more than 1,200 perpetrators and train over 25,000 law enforcement officers and civilians to respond to human trafficking crime. Cellebrite’s digital investigative technology and support are paramount in accelerating our work to liberate those being exploited around the world,” said Matt Parker, Chief Strategist and Co-Founder of Exodus Road.

“We must recognize that the advances in ICAC require not just technology and dedication but also a firm foundation of legislative change and heightened awareness,” said John Pizzurro, Raven CEO. “Only then can we ensure the structures and governance are in place to fully resource law enforcement and to protect our children from the relentless threats they face in the digital age. That’s why we stand in solidarity with Cellebrite and support the crucial goal of this operation to find them all.”

To learn more about Operation Find Them All, go to ofta.cellebrite.com.

About Cellebrite

Cellebrite’s (Nasdaq: CLBT) mission is to enable its customers to protect and save lives, accelerate justice and preserve privacy in communities around the world. We are a global leader in Digital Investigative solutions for the public and private sectors, empowering organizations in mastering the complexities of legally sanctioned digital investigations by streamlining intelligence processes. Trusted by thousands of leading agencies and companies worldwide, Cellebrite’s Digital Investigation platform and solutions transform how customers collect, review, analyze and manage data in legally sanctioned investigations. To learn more visit us at www.cellebrite.com, https://investors.cellebrite.com, or follow us on Twitter at @Cellebrite.

Media
Victor Cooper Sr. Director of Corporate Communications + Content Operations
Victor.cooper@cellebrite.com
+1 404.804.5910

Investor Relations
Andrew Kramer
Vice President, Investor Relations
investors@cellebrite.com
+1 973.206.7760

About the National Center for Missing and Exploited Children

The National Center for Missing & Exploited Children is a private, non-profit 501(c)(3) corporation whose mission is to help find missing children, reduce child sexual exploitation, and prevent child victimization. NCMEC works with families, victims, private industry, law enforcement, and the public to assist with preventing child abductions, recovering missing children, and providing services to deter and combat child sexual exploitation.

About The Exodus Road

The Exodus Road is a global nonprofit disrupting the darkness of modern-day slavery by partnering with law enforcement to fight human-trafficking crime, equipping communities to protect the vulnerable and empowering survivors as they walk into freedom. Working side-by-side with local staff, NGO partners and law enforcement around the world, The Exodus Road fights to liberate trafficked individuals, arrest traffickers, and provide restorative care for survivors. For additional information on what you can do to help stop trafficking, please visit The Exodus Road’s website at https://theexodusroad.com/, or on Facebook, Instagram, Twitter and YouTube.

About Raven

A 501(c)4 political lobby, Raven protects children from victimization by raising awareness of the threat of online child exploitation, increasing resources and funding to law enforcement, and lobbying for policy changes on the local and federal level.

How Prince William County Police Department Leverages Digital Forensics in Child Exploitation Cases to Serve Swift Justice


Reality paints a grim picture of child exploitation in the U.S.— according to the Rape, Abuse & Incest National Network (RAINN), 1 in 9 girls and 1 in 20 boys under the age of 18 have faced forms of sexual abuse or assault. Once alerted, these cases can lead law enforcement down a dark rabbit hole that often pulls more victims and CSAM content into the picture.

Owing to the ubiquity of digital devices, getting to the suspect’s smartphones, computers, and even vehicle infotainment system, can help law enforcement unlock a wealth of information in these instances—potential evidence that corroborates the suspect’s testimony and identify victims and other parties involved.

Such was the case with Prince William County Police Department when they received what seemed like a routine referral from their Special Victim’s Unit—that would ultimately draw in involvement from the ICAC and the office’s digital forensics unit.

Daycare Crisis

Helga Thorsdottir, Police Detective – Prince William County Police Department Source: Cellebrite
Helga Thorsdottir, Police Detective – Prince William County Police Department Source: Cellebrite

As police detective, Helga Thorsdottir recalls, “I initially got a phone call while I was in the field for a different case. It had come through Child Protective Services about a four-year-old that disclosed that her teacher had tickled her,” she explained.

“We did a forensic interview with the child and confirmed what she told us—that her daycare teacher was inappropriately touching her.”

The suspect was interviewed, and in the interim, had his phone seized via a search warrant. In collaboration with an ICAC task force that had Cellebrite solutions on hand, they managed to gain access to incriminating content that quickly led to a search warrant for the suspect’s home.

Devices from computers to smartwatches from the suspect’s home were seized, all of which made their way onto the table of the county’s digital forensics lab led by Sergeant Ryan Whaley who has been overseeing the lab since 2014.

The Lab

Conceived in the early 2000s, Prince William County’s Digital Forensics Lab branched out from the property crimes unit, when one of their detectives got the chance to receive free training on computer forensics.

The lab was officially established in 2008 with a supervisor and two trained detectives. As the unit evolved over the years so did its personal and tech stack—which now comprises advanced extraction and decoding tools.

Into the Rabbit Hole

Katie Zaimis, Master Detective for the Digital Forensics Lab – Prince William County Police Department – Source: Cellebrite

“Most of the devices came through our lab at some point. Three computers, cellphones, and a few loose drives,” said Katherine ‘Katie’ Zaimis, Master Detective for the digital forensics lab.

Collectively, they managed to extract content that was consistent with child pornography and child sexual exploitation. The data also pinpointed additional victims, “It became apparent that he would also use his smartwatch while on the playground with the children to take the images of them,” Detective Helga added.

The suspect eventually provided a full confession and was charged.

When the case was made public, additional victims came forward and the digital evidence—on top of corroborating the suspect’s confession—was also able to corroborate these individual disclosures. “For the victims in this case where these families are being told that all these things happened. We managed to validate the claims [with the digital evidence],” said the Det. Helga.

Cases like these are no one-offs for the Prince William County PD, the lab saw more than 300 devices last year alone and has supported investigations on notable high-profile cases—carving swifter paths to justice.

In the decade since its establishment, they have picked up on a few valuable lessons:

Collaboration is key

“I think collaboration is definitely important, not just from a technology perspective. We have people that come to our lab asking us to do work for them because they don’t have a specific tool that we have for example, and vice versa. That’s why networking in our field is extremely important. And, if you help somebody else out, they’re more likely to help you out when you need it,” said Det. Zaimis.

Prince William County Police Department – Source: Cellebrite

Training begets better outcomes

Det. Zaimis was quick to hark on this crucial point. “In our field, training is extremely important. You must keep updated on things. The way things are today might not be the way things are next week. So, if we just stay the same and we don’t train and we don’t update our methods and our investigative methods, then you know, we’re going to start spinning our wheels and not get anywhere.”

Old dogs, new tricks

As Sergeant Whaley puts it, “For our department’s philosophy, we train other detectives who then become part-time examiners. Last year there’s usually about an average of three detectives who are Cellebrite certified and know how to do phones for their unit.”

This adds to the lab’s capacity, improving Prince William County PD’s ability to process digital evidence—cutting down on backlogs and case bottlenecks.

Conclusion

The pivotal role played by the Prince William County Police Department in combating child exploitation cannot be understated. Their adept utilization of digital investigative solutions has led to the unraveling of intricate cases, the identification of victims, and the successful prosecution of perpetrators.

Through collaborative efforts, continuous training, and the adoption of advanced technologies such as Cellebrite solutions, they have strengthened their ability to expeditiously process digital evidence and provide support for high-profile investigations.

With over a decade of dedication, their relentless pursuit of justice sets a powerful example, reinforcing the significance of working together to protect the vulnerable.

A version of this article was originally published on the Cellebrite blog: https://cellebrite.com/en/how-prince-william-county-police-department-leverages-digital-forensics-in-child-exploitation-cases-to-serve-swift-justice/  

Advanced Machine Learning Technology Can Help Law Enforcement Build Stronger Cases

For all their benefits, always on, connected devices and networks have created channels for predators to exploit children and proliferate explicit material. Nearly every week, the media reports on yet another tragic victim of child sexual exploitation (CSE) and abuse.

The sheer number of both photos and videos seized and reviewed annually is staggering. In 2022, the CyberTipline of the National Center for Missing & Exploited Children (NCMEC) received 32,059,029 reports. The NCMEC analyzed 88.3 million images, videos and other files related to CSE – a number that has grown and continues to grow exponentially each year, challenging law enforcement agencies around the globe.

“When I started in forensics, the majority of devices we seized were desktops and laptops,” said Randy Kyburz, Certified Digital Forensic Examiner with the Seattle Police Internet Crimes Against Children Unit.

“When we did have cellphones to examine, they were largely ‘dumb.’ Years ago, we’d walk out of a crime scene with maybe one of each. Today, we often collect 30+ devices at a scene, with smart phones making up about 40 percent of total devices recovered.”

Traditional digital forensic workflows, combined with sentencing guidelines and the sheer volume of offenders, have created an epidemic where child victims are often undetected and undiscovered, and the crimes committed against them are never investigated. The failure of this detection enables the continued access to and abuse of these children.

An urgent and global call of duty

Thanks to ubiquitous connectivity, offenders have virtually unlimited access to unsuspecting children and lurid content. The technology available today can enable even a single person to facilitate child exploitation on a much larger scale.

For example, Eric Marques leveraged the anonymity of the Dark Web to operate a hosting service on Tor that included 200 child exploitation websites that brought together hundreds of thousands of offenders from across the world and housed millions of images of child exploitation material, including images of infants and toddlers. The investigation that led to his arrest involved 70 law enforcement agents from over a dozen countries.

When millions of images of child sexual abuse material (CSAM) are seized by law enforcement, many of those photos or videos are destined to be left on devices, in the cloud or in evidence lockers. There is a dire need for a reliable way to extract, parse and identify known and unknown victims. Thus, it is crucial for law enforcement to adopt digital technologies that enable them to unlock, access, and analyze data quickly and defensibly.

Optimizing shared resources and workflows

The goal remains steadfast. Identify and save more exploited children – quickly.

Unique machine learning algorithms can help agencies accelerate time to evidence. The power of an intelligent investigative analytics solution lies not only in the ability to correlate and review actionable insights across all data sources, but also to help quickly find evidence when investigators may not know what they are looking for e.g. what people are talking about, languages they are using, locations they’ve frequented, etc.

Imagine having a solution that can deliver both critical extraction and analysis capabilities at the scene and more in-depth investigational analysis in the lab. An advanced AI-powered solution will enable the following:

Accelerate time to evidence with advanced machine learning

Analytics and CSAM image categorization to automatically identify images and videos – obtained through a forensic process and suspected of containing CSE-related material – using machine learning neural-network based algorithms.

Filter, categorize and export undiscovered media artifacts

Investigators can filter images based on categories such as face, nudity, suspected child exploitation, weapons and drugs so they only see images that match specific search criteria. New media artifacts can then be quickly tagged, categorized and fed into relevant databases.

Quickly identify and crossmatch victims with facial detection

Unique algorithms automatically detect faces within any picture or video available to the system, allowing investigators to immediately and accurately crossmatch individual faces. This allows investigators to quickly identify additional pictures of the same victim.

Analyze conversations for potential luring or abuse

Natural language processing goes beyond regex and simple watch lists to uncover names, addresses, locations and more from artifacts like emails, websites, text messages or even images that contain text, using OCR, in multiple languages.

Leverage public domain cloud data to correlate evidence

Visualize and analyze publicly available data from supported social media and cloud-based sources in a unified format to track behavior, uncover common connections and correlate critical evidence that can help build a stronger case.

Seamless integration with Project VIC, CAID and other hash databases

The existence of known incriminating images is automatically identified by matching image hash values and then classified using pre-defined CSE severity categories. Previously unknown images that are discovered can also be categorized, tagged and exported seamlessly back to Project VIC and CAID databases.

A collective, collaborative fight to serve and protect the innocent

Preventing child exploitation takes collaboration, real-time information and an ongoing commitment to identify every victim quickly and get criminals – and the content they produce and share – off the streets. With more and more children using mobile devices – both phones and tablets – at an earlier age, the risks are only getting bigger.

Due to the amount of data being created, there’s also a huge migration toward mobile apps leveraging cloud storage. “Today, your evidence may not lie in the country you live in, so preserving evidence on phones and self-generated content is incredibly important,” said Arnold Guerin, a police officer and technology specialist with the Canadian Police Centre for Missing and Exploited Children, managed by the Royal Canadian Mounted Police.

“It’s an imperfect scenario that can lead to tragic circumstances. Finding new victims is a driving focus. Police and a growing list of partners have allowed us all to make significant progress.”

What all global agencies have in common – as well as the growing ecosystem of technology vendors – is the strength of a shared goal. To find and protect exploited children.

“I get asked all the time how I can do this job,” said Guerin. “It’s the mission that makes the motivation clear. I think I have the best job in the world – to find and rescue kids – because I have the power to do it.”

Richard Brown, Project VIC Coordinator for the United States and manager for the National Association to Protect Children (Protect.org) concurs.

“Project VIC’s goal is to break down the walls and the days of isolated proprietary data and create an environment where any tool can be picked up to work on case data produced by any other tool in the Project VIC ecosystem. This is our international message to industry in this crime set. Project VIC often spreads this word through training with other countries alongside the International Centre for Missing & Exploited Children (ICMEC).”

A common goal unites everyone committed to this mission. As ICMEC eloquently states: One child is one too many. Every single child deserves to grow up free from abduction, sexual abuse and exploitation. We are committed to building a safer world for our children by convening partners, advocating for improved protections and providing the necessary tools and training to those on the front lines.

More information:

Project VIC is part of a global strategy to develop and implement streamlined methods to investigate child sexual exploitation. A collaborative effort between the National Association to Protect Children, law enforcement and industry, the goal is to increase information sharing among law enforcement worldwide, while identifying more victims, more rapidly. Project VIC does this by improving – and standardizing – the technology resources available to law enforcement who review images of child sexual exploitation.2

CAID, created in 2013 by the UK Prime Minister David Cameron, uses the latest technology to transform how police forces deal with images of Child Sexual Exploitation and Abuse. It brings together all the images that the Police and NCA encounter. Forces then access and use the images’ unique identifiers – called hashes – and metadata to improve how they investigate these crimes and protect children.

Battling Increased Child Sexual Abuse Material in the Evolving Digital Age

Exacerbated by the COVID-19 pandemic and increased screen time, a staggering 31.9 million reports of child sexual abuse material (CSAM) occurred in 2022, a 47% increase from the prior year.

As a result, parents face the daunting task of ensuring their children’s safety in the digital realm, where transitioning to online platforms makes them vulnerable to threats from strangers if access is unchecked. Additionally, law enforcement agencies struggle to keep up with rapidly evolving technology while dealing with budget constraints and limited staffing.

The case of Buster Hernandez, a tech-savvy criminal using sextortion to prey on teenagers, serves as a chilling reminder of the dangers lurking online. Despite his sophisticated methods, a collaborative effort involving law enforcement agencies, social media companies, and internet service providers resulted in Hernandez’s capture and conviction.

This highlights the critical need for continued vigilance, robust legislative measures, and the prioritization of resources by law enforcement agencies. It serves as a reminder of the ongoing battle to protect children from the insidious threat of online exploitation.

You can read the full article published in Law Officer, written by Cellebrite Digital Intelligence Specialist Jared Barnhart, here.

New technology is reducing trauma for child-abuse investigators

Children are among the most vulnerable members of our society. Tragically, this also means they’re the victims of some of the most cruel and violent crimes.

Law enforcement officials dedicate themselves to the brave yet harrowing work of investigating these cases— but this often comes at a heavy psychological price. New technology may be able to reduce the growing number of trauma cases surfacing in the investigation community.

It happens all too often. Another news story, another disappearance. Another set of parents left to deal with the unimaginable grief of losing their child. Every day, children around the world are victims of sex trafficking, kidnapping, and abuse—and it’s an epidemic that shows no signs of slowing. In 2022, the CyberTipline of the National Center for Missing and Exploited Children (NCMEC) received more than 32 million reports of suspected child sexual exploitation.

As technology advances, crimes against children are increasingly being documented online. Many predators groom their victims through the use of smartphones, apps, and chatrooms. They may visit pornography websites or solicit sexual acts on the dark web. This means offenders are leaving a digital trail.

It’s no surprise then, that most (88%) of agency managers surveyed say that digital evidence significantly increases case resolvability. Additionally, access to digital evidence helps improve case closure rates, shorten investigation cycles, and bolsters prosecutors’ confidence in the case.

But analyzing this digital evidence often comes at a heavy psychological price.

The psychological impact on investigators

During the course of an investigation, an officer may have to view hundreds or even thousands of distressing images and videos of child abuse. Often this material needs to be viewed repeatedly to map evidence and identify victims or perpetrators. Specific details of furniture, backgrounds, clothing, faces or body parts may need to be manually identified and logged. The NCMEC’s Child Victim Identification Program alone has reviewed more than 322 million images and videos of suspected abuse.

While this is crucial work, these images and videos cannot be unseen. Viewing such harmful material can have a lasting psychological impact on law enforcement officers. Studies have shown this work can result in secondary traumatic stress (STS), burnout, and compassion fatigue. It may also trigger psychological side-effects including depression, anxiety, and insomnia.

In one study, 36% of law enforcement officers reported moderate to high levels of secondary trauma from being exposed to disturbing images. Another study found that crimes against children investigators who have unintended thoughts about victims or cases outside of work hours are more likely to use alcohol as a coping mechanism.6

Reducing emotional harm with technology

By developing digital investigative competencies and leveraging capabilities such as artificial intelligence (AI) and machine-learning algorithms, investigators can streamline the process of collating, analyzing and reporting on evidence. In fact, there are investigative analytics tools that can ingest digital data from a variety of online sources and mobile devices, and help investigators filter and analyze content using algorithms driven by AI.

These tools can lessen the psychological impact on investigators by flagging similar faces, objects, locations, and themes within pieces of media, and categorizing them according to case requirements. This can reduce the number of images and videos that investigators need to manually review, and how many times they need to view them—potentially reducing the chance of secondary trauma.

Technology can also improve the overall efficiency of investigations. Solutions that utilize AI-driven algorithms can map evidence and draw connections between perpetrators and victims faster than a human investigator can. While human input is still needed, this can dramatically speed up the time it takes to locate and rescue victims. Forensic reporting capabilities and seamless integration to hash data sets can also help departments to collaborate and bring criminals to justice faster.

Investigators of these crimes do some of the world’s most important work— helping to shut down child abuse networks, rescue victims, prosecute offenders, and reunite lost children with their families. But society rarely considers the emotional impact this work can have on investigating officers. It’s crucial that we leverage all the digital investigative solutions at our disposal to help them continue their life-saving work.

Why You Should Never Say “Child Porn” – A Harmful Reality

The rise of online child sexual exploitation offenses, facilitated by rapid technological changes, is a pressing concern. Perpetrators, using digital devices and the vast expanse of the internet, engage in abusive acts against children and leave a trail of trauma and suffering in their wake.

The misuse of terminology further complicates this reality. The widespread use of “child porn” to describe these despicable acts is inaccurate and profoundly harmful. It fails to capture the gravity of the situation, glossing over the depth of the pain victims experience.

The Problems with the Term “Child Porn”

Contribution to Normalization of Child Sexual Assault

Labeling these heinous acts as “porn” normalizes the abuse, placing online CSAM into a category akin to mainstream, adult, consensual pornography, explains Matt Parker co-founder of The Exodus Road. However, this is evidence of criminal acts against children, infants and young people. With more children playing games online, pedophiles and/or traffickers are using these platforms and posing as children to groom children and obtain explicit images.

“And then they extort. That opportunity to get more images or to threaten [victims] so that there’s money in exchange is a massive problem,” he said.

Glen Pounder, a founding board member of Raven, underscores the need for change, stating that the EARN IT Act will introduce stricter rules with which online platforms must comply. The amended legislation aims to appropriately define this crime as child sexual exploitation.

“I cringe when I hear child pornography,” Pounder said, emphasizing that it fails to capture the true nature of these offenses.

Research has also revealed that perpetrators often use these materials to desensitize themselves before committing sexual offenses or to groom child victims. This disturbing pattern of behavior normalizes their actions in their minds, facilitating offenders to coerce victims into sexual contact.

False Distinction and Overlap with Contact Sexual Offenses

“Child porn” creates a misleading division between viewing images and direct child sexual abuse. There is a troubling overlap between those who view child sexual abuse material (CSAM) and those who commit contact sexual crimes.

Studies suggest that individuals who viewed online CSAM (30%-80%) and those arrested for possessing such materials (76%) had sexually abused a child. Moreover, viewing this material contributes to the demand for its production. For survivors, knowing that images of their abuse continue to circulate is a constant reminder of the trauma they experienced.

Parker also pointed out a disturbing trend: elevated suicide rates among children subjected to extortion and coercion into producing CSAM. “Of course, on camera, they look like they want to be there just like everybody does in a commercial red-light district. They don’t,” Parker said, highlighting a grim reality where children are forced to live in basements, compelled to perform explicit acts on webcams. Calling this form of sexual exploitation “pornography” not only downplays the severity of the crimes committed but also adds an extra layer of complexity to the prosecution process

The Impact of Terminology on Safeguarding Children

Using the phrase ‘child porn’ minimizes the severity of the abuse. The incorrect terminology undermines the crime, leading to inadequate support and protection for the victims. Additionally, CSAM victims struggle to report their experiences as they may fear punishment or feel complicit in the creation of the materials.

Correcting this terminology is crucial as it reduces these barriers, helping survivors understand that what happened to them was abuse and not their fault.

The Terminology Guidelines for the Protection of Children from Sexual Exploitation and Sexual Abuse, also known as The Luxembourg Guidelines, offer ways to navigate terms commonly used to address exploitation and sexual abuse of children.

Below are key examples of terms that should be avoided when referring to child sexual abuse.

Terms To Be Avoided Completely Recommended
Child porn Child sexual abuse
Child sex tourism Sexual exploitation of children in the context of travel and tourism
Child sex tourist Traveling perpetrators of child sexual offenses
Child prostitution Exploitation of children in/for prostitution
Child prostitute, child sex worker Victim of sexual exploitation
Customer, client, John Abuser, child sex offender
Webcam child sex tourism/webcam child sex abuse Live online child sexual abuse

Challenges Faced by Law Enforcement and Technology Companies

Law enforcement agencies worldwide grapple with the overwhelming volume of CSAM circulating online. Unfortunately, limited resources are often allocated, hindering national and international collaborative efforts. This lack of resources severely impedes the global fight against this issue.

Moreover, cooperation from online and social media service providers remains a challenge. Technology giants like Google and Microsoft have been at the forefront, supporting the development of tools to identify and remove such horrifying content from the internet.

However, Chief Operating Officer of the National Center for Missing and Exploited Children (NCMEC) Derrick Driscoll noted that the industry lacks the capacity to detect and report child exploitation now that networks have adopted end-to-end encryption on their social platforms. “It’s going to have a huge negative impact on our ability to detect and report and ultimately, recover children from sexual exploitation.”

Consequently, law enforcement agencies face significant barriers in investigating perpetrators engaged in online dissemination of these materials.

Utilizing Digital Investigative Solutions to Filter Such Terms

The advancement of digital investigative solutions has provided law enforcement with an opportunity to filter and detect online CSAM. For instance, digital forensics examiners apply their expertise to identify and catalog CSAM. They know this evidence is crucial to a child’s safety and the pursuit of justice.

This digital contraband will be used in criminal prosecution and, more importantly, to save a child. These tools play a vital role in safeguarding children by identifying and tracking down perpetrators.

Successful instances of digital investigative solutions aiding law enforcement demonstrate these technologies’ potential to protect vulnerable children.

It is important to acknowledge the horrors faced by these young victims and hold their abusers accountable. Utilizing accurate terminology forces society to confront the harsh reality of CSAM, fostering a collective responsibility to protect children.