Title: QUIZ
1(No Transcript)
2Internet Safety
Exploited and Missing Child Unit Internet Crimes
Against Children Task Force 130 S.
Market Wichita, Kansas (316) 337-6552 www.sedgwick
county.org/EMCU
Wichita Police Department Crime Prevention
Unit 455 N. Main Wichita, Ks. (316) 268-4101
3QUIZ
- BRB
- POS
- LOL
- BBL
- LMAO
- SOMY
- A/S/L
4(No Transcript)
5Internet Crimes Against Children Task Force
- The Internet Crimes Against Children Task Force
Program helps state and local law enforcement
agencies develop and effective response to cyber
enticement and child pornography cases. This
help encompasses forensic and investigative
components, training and technical assistance,
victim services, and community education.
6Internet Crimes Against Children Task Force
- Currently 46 Task Forces
- Include both state and local agencies
- Provide Regional Assistance
- Forensics
- Investigative Assistance
- Training/Technical Assistance
7Kansas I.C.A.C.
- Encompasses
- Forensic and investigative components
- Training and technical assistance
- Victim services
- Community education
8CYBERTIPLINE
- www.cybertipline.com or 1-800-THE-LOST
- Launched in March of 1998 and offers a means of
reporting child sexual exploitation (child
pornography), online enticement, child
prostitution, child sex tourism, unsolicited
sexual material sent to a child. It is staffed 24
hours a day, 7 days a week. - PROTECT ACT 2003- New Federal Law that makes it a
crime to knowingly use a misleading domain name
on the Internet with the intent to deceive a
minor into viewing harmful material. Punish by
up to 4 years and/or fine.
9CYBERTIPLINE
- Any incident reported goes through a three step
process - CyberTipline operators review and prioritize each
lead - NCMECs (National Center for Missing and
Exploited Children) Exploited Child Unit analyzes
tips and does additional research - Information gathered becomes available to the
FBI, Bureau of Immigration and Customs
Enforcement and the U.S. Postal Inspection
Service via secure web connection. It is also
passed onto the appropriate state and local
authorities and the ISP when appropriate.
10Child Predators new tool kit
- Technology DIGITAL CAMERAS
- Cell Phones
- Instant Messaging (AOL/MSN/YAHOO)
- Web Cams
- PDAs
- Wireless Internet
- School
- Libraries
11Internet Crimes Against Children Task Force
- Online Victimization (A report on the Nations
Youth) - Released June 2000
- Nearly 10 million youth, 10 through 17 on line
regularly in 1999 - This survey was of a nationally representative
sample of 1,501 youth who use the Internet
Regularly - Available from www.missingkids.org
12Kids and the Internet
Who Surfs Alone?
The majority of US children over the age of 12
are allowed to surf the Web unsupervised,
according to a recent survey by Greenfield
Online. The study found that only 5 percent of
parents with children over the age of 16 attempt
to monitor their online activities, with just 20
percent of parents using software to control the
type of material their children can access
online. Greenfield estimates that 55 percent
of children aged 11 and over use the Net for
school work, while 20 percent of parents with
children in this age group say that they are more
interested in the Net than in TV.
15
50
12-15 years old
15 years old
75
0
10
20
30
40
50
60
70
80
13How can I chat Safely?
- Know the 4 Rs-
- Recognize techniques used by online predators to
deceive you - Refuse - requests for personal information
14How can I chat Safely?
- Know the 4 Rs-
- Respond assertively if you are ever in an
uncomfortable situation while online. Exit the
program, log off or ignore. Tell a trusted
adult. - Report - to a trusted adult, any suspicious or
dangerous contact that makes you feel
uncomfortable. CYBERTIPLINE.COM!
15Video Clip Cyber Predators
16CASE Eltoro1001
- Athen began chatting with units 13 year old
decoy on March 21, 2002. - Chat room in prior to contact Dad4Daughters
Teen chat room using Yahoo - Athen gave phone number for decoy to call and was
very persistent that she stay a virgin until he
met her.
17CASE Eltoro1001
- Athen said he was a pilot and traveled.
- Chatted and had phone conversations with Athen
until April 13, 2002. - April 13, 2002 Athen was arrested after
arriving to meet Alexis to take her back to his
hotel room and engage in sexual conduct and take
pictures of this activity.
18hotalexis88 (032312 PM) thkns eltoro1001
(032316 PM) do you like older men? eltoro1001
(032324 PM) you are very welcome hotalexis88
(032325 PM) i like cute guys eltoro1001
(032338 PM) i am 49 eltoro1001 (032347 PM)
is that too old for you? hotalexis88 (032427
PM) r u cute eltoro1001 (032436 PM) you can
tell me eltoro1001 (032445 PM) i will send you
my pic hotalexis88 (032457 PM) ok eltoro1001
(032542 PM) do you meet in real
life? hotalexis88 (032556 PM) havent
yet eltoro1001 (032611 PM) what is your real
age? hotalexis88 (032614 PM) 13 hotalexis88
(032617 PM) really eltoro1001 (032620 PM)
wow eltoro1001 (032632 PM) are you sexually
active?
19hotalexis88 (032650 PM) nope havent done
nothin but kissin sorry eltoro1001 (032658 PM)
its ok eltoro1001 (032716 PM) maybe i will be
the one if you like me hotalexis88 (032727 PM)
really? hotalexis88 (032735 PM) i bet i suck
at it eltoro1001 (032745 PM) did you get my
pic? hotalexis88 (032750 PM) yea how old
ru?? eltoro1001 (032754 PM) 49 hotalexis88
(032801 PM) u dont look 49 really?? eltoro1001
(032807 PM) thank you eltoro1001 (032839
PM) would you consider meeting with
me? hotalexis88 (032855 PM) yea if u r as nice
as u seem 2 be eltoro1001 (032910 PM) i am ,
and thank you eltoro1001 (032942 PM) where do
you live? if i may ask? hotalexis88 (033020
PM) im wichita hotalexis88 (033023 PM)
u? eltoro1001 (033029 PM) dallas hotalexis88
(033039 PM) ive never been there eltoro1001
(033102 PM) i have not been to wichita kansas
either hotalexis88 (033116 PM) nothin here
really it sucks eltoro1001 (033131 PM) lol
ok....if you say so hotalexis88 (033143 PM)
trust me i know eltoro1001 (033148 PM)
ok eltoro1001 (033211 PM) but you are there
and that is enough for me to come visit
20CASE Eltoro1001
- Picture Athen sent of himself during first chat
conversation. - He drove the vehicle in the picture to Wichita,
Kansas on April 13, 2002 to meet Alexis.
21CASE Eltoro1001
- Car that Athen drove to meet Alexis.
22CASE Eltoro1001
- Pictures from inside the suburban.
23- Printed off directions from his house to meet
location. - Investigators in Arlington, Texas located a map
like this on his computer which lead them to a 14
year old child Athen sexually assaulted 3 days
prior to our case.
24- Eltoro1001 identified as Athanasios Kartalis, 49,
male from Arlington, Texas. - Arlington Texas PD located hundreds of pictures
of child pornography in Mr. Kartalis apartment. - Also located were pictures on a Olympus smart
media card of a young girl engaged in sexual
conduct. The pictures appeared to be from a
hotel room.
25CASE Eltoro1001
- Investigators located a mapquest map on Mr.
Kartalis computer with an address in El Paso,
Texas during forensic examination. - On the computer itself 162 instant message
conversations with the majority being sexual in
nature and the Mr. Kartalis interest in
master/slave. - Mr. Kartalis also used American Online which had
numerous emails saved with similar topics.
26CASE Eltoro1001
- The mapquest map located with the address in El
Paso, Texas ended up being for a 14 year old
girl, L.J. who Mr. Kartalis had sexually
assaulted prior to meeting our decoy. - The pictures on the media card were of her.
- Mr. Kartalis was found guilty in Kansas for One
count Attempted Rape in Arlington, Texas for
Promotion of Child Pornography and in El Paso,
Texas for the child sexual abuse - He will served over 40 years in Texas.
27Risks for Children on the internet
- Exposure to inappropriate material
- May be exposed to materials that are sexual,
hateful, violent or activities that are dangerous
or illegal - They could actively look for it or it could come
inadvertently via chat areas, e-mail or instant
messaging
28Risks for Children on the Internet
- Physical Molestation
- Many molesters are on-line and actively looking
for a child. The child could put out information
that would give the molester the childs
location, arrange an encounter or the molester
could use information that is provided to find
them. - Make sure the child knows that whatever is put on
the internet is able to be seen by ALL people on
the internet. Dont put information that would
provide clues about where you live, work or go to
school.
29REMEMBER
- PEOPLE ONLINE ARE NOT ALWAYS WHO THEY PRETEND TO
BE!!!!!
30Risks for Children on the Internet
- Harassment or Bullying
- Potential to encounter messages that are
belligerent, demeaning, or harassing. The
internet is a good place to do this because it is
harder to find the offender - Viruses and Hackers
- Possibility of the child downloading a file that
contains a virus or the possibility of a hacker
getting into the computer via remote access which
could jeopardize the privacy or safety of the
family
31Risks for Children on the Internet
- Legal and Financial
- Be sure that you or your child do not give out
any personal financial information. If you do use
a credit card online be sure the site is a
secured site that encrypts the information. - Also make sure you use good judgment and avoid
being inconsiderate, mean or rude online. These
activities could violate a persons rights.
32Guidelines for Parents
- Talk with your child about what they can and
cannot do online - Be open with the child and encourage them to come
to you if they encounter a problem or something
that makes them feel uncomfortable online - Learn everything you can about the internet
- Check out blocking, filtering and ratings
applications
33Identity Theft Video
34Preventing Identity Theft
- Always protect your personal information.
- Never send personal information to e-mail
requests - Verify any transactions
- Catch Identity theft early by checking your
credit report yearly
35Preventing Identity Theft
- Ensure Anti-virus software is installed and up to
date - Regularly update computer programs with
manufacturers security patches - Install a personal firewall
- CHANGE PASSWORDS REGULARLY
- Log out of website after your business is
complete - Disconnect your computer from internet when not
in use
36Cyber Security Video
37Virus Nightmares
- Named a virus because of the similarities with
biological viruses - Effects can very enormously
- Spreads and infects many computers rapidly
- Slammer Worm
- Snuck through unprotected port
- Spread by searching random internet addresses
- Within 10 minutes 90 of all unprotected
computers in the world were infected - No damage was caused by this virus
38SpyWare AdWare Nightmares
- Installed discreetly on your computer and
literally watch your every move reporting it back
to a third party. - The third party then sells this to advertising
companies and other interested parties so you
start receiving ads, pop-ups and Spam that is
targeted to your preferences.
39SpyWare AdWare Nightmares
- Many users are unaware they have SpyWare because
of the lack of notification on the info-gathering
function of the software. - Very important to read and understand the End
User License Agreement.
40SpyWare AdWare Nightmares
Tips to prevent compromise
- Read the fine print before installing any
software. Especially adware that is supported by
channeling ads to your computer.
- Install and configure a personal firewall on your
computer to identify and block unauthorized
outbound connections as well as unauthorized
inbound connections
41SpyWare AdWare Nightmares
Tips to prevent compromise
- Always run an anti-virus program that updates
itself automatically to counter new threats.
- Scan your system regularly with a tool like
PestPatrol, Spyremover or SpyWareNuker which
identifies and removes not only spyware and
adware but thousands of other pests.
42Points to Remember
- Talk to your child and monitor activities on
internet - Set up parental controls on computer to limit
what they can be exposed to on internet - Watch for signs that something is going on such
as unexplained absences from home or school,
long periods of activity on internet, minimizing
the screen when you walk into room - Familiarize yourself with the internet and look
up the abbreviations for internet chat
43Points To Remember
- Be guarded about information that you give on the
internet - Be aware of possible e-mail/internet scams asking
for your personal information - Be sure you know and trust the company you
conduct business with on the internet - Use all available security measures to prevent
and stop spyware and adware or unauthorized
connections to your computer through the internet
44Questions
45Contact Information
- Wichita Police Department
- Crime Prevention Unit
- 455 N. Main 4th Floor
- Wichita, Ks. 67202
- (316) 268-4101
46(No Transcript)