MENU TITLE: PROTECTING CHILDREN ONLINE Series: OJJDP Broadcast: April 23, 1998 11 Pages U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention Protecting Children Online NATIONAL SATELLITE TELECONFERENCE APRIL 23, 1998 A Production of The National Center for Missing and Exploited Children and the Office of Juvenile Justice and Delinquency Prevention U.S. Department of Justice in association with Juvenile Justice Telecommunications Assistance Project Eastern Kentucky University Training Resource Center 301 Perkins Building Richmond, KY 40475-6671 AGENDA April 23, 1998 Broadcast Time 1:30 p.m. 12:30 p.m. 11:30 a.m. 10:30 a.m. (EDT) (CDT) (MDT) (PDT) Broadcast Objectives  To allow participants to better recognize the threat posed by emerging online technology.  To identify available resources to assist law enforcement officials to successfully resolve online crimes against children.  To identify critical components of successful prevention programs. Activity Approximate Duration Timetable (EDT) Preconference Activities (conducted by local facilitator) 30 minutes 1:00 - 1:30 Preconference activities should include familiarization with site surroundings, introduction of other participants, an introduction and program overview provided by the site facilitator, and a review of Participant Packet materials. 1. Test Slate 30 min. 1:00 - 1:30 2. Videoconference Begins -- 1:30 3. Open and Welcome 5 min. 1:30 - 1:35 4. Overview of Issues (pre-taped) 6 min. 1:35 - 1:41 5. Scenario Part I (pre-taped) 7 min. 1:42 - 1:49 6. Panel Discussion/Call In Segment 41 min. 1:50 - 2:30 7. Scenario Part II (pre-taped) 4 min. 2:30 - 2:34 8. Panel Discussion/Call-in Segment 45 min. 2:34 - 3:19 9. Available Resources 7 min. 3:19 - 3:26 10. Attorney General Janet Reno-invited 2 min. 3:26 - 3:28 14. Closing Comments 2 min 3:38 - 3:30 15. Postconference Call-In 30 min. 3:30 - 4:00 Postconference discussion should focus on key issues discussed in the program. Protecting Children Online Cyberspace. The Information Highway. The Internet. With this powerful new medium, our greatest museums, libraries, and universities are a mouseclick away. But with these benefits, there are a few risks to children using online services that include exposure to inappropriate material, physical molestation, and harassment. Computer technology has, in essence, provided online predators the opportunity to enter the homes and bedrooms of children who are using the resource to communicate with friends, play games, or learn about the world they live in. Children can become victims online, especially when they obtain a false sense of security and are susceptible to requests for personal information about themselves or their families. Predators have managed to capitalize on this emerging technology in several ways. Preferential sex offenders often are meticulous recordkeepers and record specific details of their exploitation activities. They also use computer technology to collect and store child pornography. For these offenders, yesterday's spiral notebook has become today's laptop computer and they are using this technology to sexually exploit children. Children exploring the Internet can be approached by predators in teen or child chat rooms. Sometimes these children will not report the encounter to a parent or adult for fear of having the "plug pulled." Instead they either ignore the contact or engage in what they believe is an innocent, anonymous conversation. As with traditional child exploitation, these predators will try to groom their victims online hoping to obtain personal information and/or take advantage of any of their fears and vulnerabilities in an effort to meet with the child. They may invite the child to call them collect or make arrangements for face-to-face meetings. As criminals adjust to new technology, so must law enforcement. To effectively protect children from online criminal activity, law enforcement must stay current with the technology, understand the techniques and behavioral characteristics of the cyberspace predator, and work collaboratively with local, state, and federal law enforcement to address this "borderless" crime. On March 9, 1998, the National Center for Missing and Exploited Children (NCMEC) launched its CyberTipline to serve as a national clearinghouse, as mandated by federal law, for tips and leads regarding the sexual exploitation of children. Reports can be made on-line (www.missingkids.com/cybertip) or to NCMEC hotline staff on the 24-Hour Child Pornography Tipline (1-800-843-5678). Currently, individuals can report incidents of child pornography (Internet and non-Internet related), online enticement of children for sexual acts, child-sex tourism, child prostitution, and child sexual molestation (not in the family). NCMEC's Exploited Child Unit staff prioritizes these reports based on the immediate danger to the child and then adds value to the reports when possible (e.g., examining reported websites, conducting searches on suspect information). These reports are made available on-line to the Federal Bureau of Investigation, U.S. Customs Service, and U.S. Postal Inspection Service. If a specific jurisdiction is identified, NCMEC forwards the report to the appropriate law enforcement agency. In addition, NCMEC will forward reports involving criminal violations in other countries to the respective national law enforcement agency, and we currently are seeking ways to include the other hotlines and tiplines located in Europe and Canada. To take a tour of NCMEC's CyberTipline, please visit our webpage (www.missingkids.com/cybertip). Further, if you identify any sexual exploitation of children over the Internet, please use our CyberTipline to report it to NCMEC. If we can be of any assistance to you in the future or you would like additional information regarding the CyberTipline, please do not hesitate to contact Ruben Rodriguez, Director of the Exploited Child Unit or Kathy Free, Project Manager at 703/235-3900. Internet Related Child Exploitation The vast majority of information on the Internet is entertaining, informative, and educational. But the "Net" can have a dark side. The growth of the Internet into a powerful, worldwide medium has increased the danger to youths throughout the world and complicated law enforcement capabilities. It has simplified the method of exchanging child pornography, allowing an individual to receive pornography instantly. In a matter of minutes a viewer can access and download hundreds of photographs. It is not solely a matter of images, pedophiles can use the Internet, with no precautions, to exchange names and addresses of other pedophiles and of potential child-victims. ON-LINE SAFETY GUIDELINES FOR CHILDREN Do not give personal information such as your address, telephone number, parent's work address or telephone number, or the name and location of your school. Tell your parents if something that you come across online makes you feel uncomfortable. Never agree to get together with someone you "meet" online without your parents permission. If your parents agree to the meeting, be sure the meeting is in a public place and that you bring them along. Never respond to messages or bulletin board items that are suggestive, obscene, belligerent, threatening, or make you feel uncomfortable. Give a copy of such messages to your parents and have them forward it to your Internet service provider. Never send pictures of yourself or any other personal material to a friend you meet online without telling your parents first. Follow the rules that your parents set for your online activities. There are places on the Internet that are for adults only. If you find yourself in one of those areas LEAVE and go to one of the cool places on the Internet for kids. INTERNET QUICK REFERENCE LIST Applet: A small Java program that can be embedded in an HTML page. Applets differ from full-fledged Java applications in that they are not allowed to access certain resources on the local computer, such as files and serial devices (modems, printers, etc.), and are prohibited from communicating with most other computers across a network. The current rule is that an applet can only make an Internet connection to the computer from which the applet was sent. Baud: In common usage the baud rate of a modem is how many bits it can send or receive per second. Technically, baud is the number of times per second that the carrier signal shifts value - for example a 1200 bit-per-second modem actually runs at 300 baud, but it moves 4 bits per baud (4 x 300 = 1200 bits per second). BBS: (Bulletin Board System) - A computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and make announcements without the people being connected to the computer at the same time. There are many thousands (millions?) of BBS's around the world, most are very small, running on a single IBM clone PC with I or 2 phone lines. Some are very large and the line between a BBS and a system like CompuServe gets crossed at some point, but it is not clearly drawn. Bps: (Bits-Per-Second) - A measurement of how fast data is moved from one place to another. A 28.8 modem can move 28,800 bits per second. Browser: A Client program (software) that is used to look at various kinds of Internet resources. Cookie: The most common meaning of "Cookie" on the Internet refers to a piece of information sent by a Web Server to a Web Browser that the Browser software is expected to save and to send back to the Server whenever the browser makes additional requests from the Server. Depending on the type of Cookie used, and the Browser's settings, the Browser may accept or not accept the Cookie, and may save the Cookie for either a short time or a long time. Cookies might contain information such as login or registration information, online "shopping cart" information, user preferences, etc. When a Server receives a request from a Browser that includes a Cookie, the Server is able to use the information stored in the Cookie. For example, the Server might customize what is sent back to the user, or keep a log of particular user's requests. Cookies are usually set to expire after a predetermined amount of time and are usually saved in memory until the Browser software is closed down, at which time they may be saved to disk if their "expire time" has not been reached. Cookies do not read your hard drive and send your life story to the CIA, but they can be used to gather more information about a user than would be possible without them. Cyberspace: Term originated by author William Gibson in his novel Neuromancer the word Cyberspace is currently used to describe the whole range of information resources available through computer networks. E-mail: (electronic mail) Messages, usually text, sent from one person to another via computer. E-mail can also be sent automatically to a large number of addresses (mailing lists). FAQ (Frequently Asked Questions): FAQs are documents that list and answer the most common questions on a particular subject. There are hundreds of FAQs on subjects as diverse as Pet Grooming and Cryptography. FAQs are usually written by people who have tired of answering the same question over and over. FTP (File Transfer Protocol): Internet protocol (and program) used to transfer files between hosts. Gopher: A widely successful method of making menus of material available over the Internet. Gopher is a Client and Server style program, which requires that the user have a Gopher Client program. Although Gopher spread rapidly across the globe in only a couple of years, it has been largely supplanted by Hypertext, also known as VPM (World Wide Web). There are still thousands of Gopher Servers on the Internet and we can expect they will remain for a while., Hit: As used in reference to the World Wide Web, "hit" means a single request from a web browser for a single item from a web server; thus in order for a web browser to display a page that contains 3 graphics, 4 "hits" would occur at the server: 1 for the HTML page, and one for each of the 3 graphics. "Hits" are often used as a very rough measure of load on a server, e.g, "Our server has been getting 300,000 hits per month.' Because each "hit" can represent anything from a request for a tiny document (or even a request for a missing document) all the way to request that requires some significant extra processing (such as a complex search request), the actual load on a machine from I hit is almost impossible to define. Home Page (or Homepage): Several meanings. Originally, the web page that your browser is set to use when it starts up, The more common meaning refers to the main web page for a business, organization, person or simply the main page out of a collection of web pages e.g. "Check out so-and-so's new Home Page." Another sloppier use of the term refers to practically any web page as a "homepage," e.g. web site has 65 homepages and none of them are interesting." HTML (HyperText Markup Language): a language (or format) used for creating hypertext documents on the World Wide Web. This is the format used to create Web pages.. HTTP: (HyperText Transport Protocol) - an information retrieval mechanism for HTML documents. Hypergraphic: A graphic image link to other documents containing more information on the same or a related topic. To retrieve the related document, click on the hypergraphic. Similar to an icon in the Mac world. Hypertext: A text link to other documents containing more information on the same or a related topic. Hypertext links are identified as different colored text with an underline. To retrieve the related document, or move to the related link, click on the hypertext. Internet: A collection of networks interconnected by a set of routers which allow them to function as a single, large virtual network. IRC: (Internet Relay Chat) - Basically a huge multi-user live chat facility. There are a number of major IRC servers around the world which are linked to each other. Anyone can create a channel and anything that anyone types in a given channel is seen by all others in the channel. Private channels can (and are) created for multi-person conference calls. ISP: (Internet Service Provider) - An institution that provides access to the Internet in some form, usually for money. Java: Java is a network-oriented programming language invented by Sun Microsystems that is specifically designed for writing programs that can be safely downloaded to your computer through the Internet and immediately run without fear of viruses or other harm to your computer or files. Using small Java programs (called "Applets"), Web pages can include functions such as animations, calculators, and other fancy tricks. We can expect to see a huge variety of features added to the Web using Java, since you can write a Java program to do almost anything a regular computer program can do, and then include that Java program in a Web page. Listserv: The most common kind of maillist, Listservs originated on BITNET but they are now common on the Internet. Login: Noun or a verb. Noun: The account name used to gain access to a computer system. Not a secret (contrast with Password), Verb: The act of entering into a computer system, e.g. Login to the VY'ELL and then go to the GBN conference. Maillist (or Mailing List): A (usually automated) system that allows people to send e-mail to one address, whereupon their message is copied and sent to all of the other subscribers to the maillist. In this way, people who have many different kinds of e-mail access can participate in discussions together. Modem: A device that you connect to your computer and to a phone line, that allows the computer to talk to other computers through the phone system, Basically, modems do for computers what a telephone does for humans. Newsgroup: The name for discussion groups on USENET. Online: To be connected, by way of a modem, to the World Wide Web. Password: A code used to gain access to a locked system. Good passwords contain letters and non-letters and are not simple combinations such as virtue7. A good password might be: Hot$ 1 -6 Server: A computer, or a software package, that provides a specific kind of service to client software running on other computers. The term can refer to a particular piece of software, such as a WWW server, or to the machine on which the software is running, e.g. Our mail server is down today, that's why e-mail isn't getting out. A single server machine could have several different server software packages running on it, thus providing many different servers to clients on the network. Terminal: A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Usually you will use terminal software in a personal computer - the software pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else. @ (Uniform Resource Locator): - The standard way to give the address of any resource on the Internet that is part of the World Wide Web (WWW). A URL looks like this: http://www.matisse.net/seminars.html or telnet://well.sfca.us or news:new.newusers.questions etc. The most common way to use a URL is to enter into a WWW browser program, such as Netscape, or Lynx. USENET: A world-wide system of discussion groups, with comments passed among hundreds of thousands of machines. Not all USENET machines are on the Internet, maybe half. USENET is completely decentralized, with over 10,000 discussion areas, called newsgroups. WWW: (World Wide Web) - Two meanings - First, loosely used: the whole constellation of resources that can be accessed using Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the universe of hypertext servers (HTTP servers) which are the servers that allow text, graphics, sound files, etc.. to be mixed together. TELEPHONE PROTOCOL The telephone is a key component in allowing participants to communicate with the panelists in the television studios. The questions that are asked and comments that are made generally reflect what many others are thinking and provide perspective and depth to the videoconference. We will try to get as many calls on the air as possible. If you call in, please be patient. Our operators may be handling other calls. The following information will assist you. 1. If the phone is in the same room as the TV(s), you should be ready to lower the volume before you go on the air to reduce noisy feedback. 2. Dial the following number to ask a question or make a comment: 1-800-895-4584. 3. When your call is answered, please state your question to the operator briefly and clearly. You will be put on hold. 4. When you are to be put on the air, another operator will come on the line and ask your home State. The operator will inform you when you are next on the air and that this would be a good time to turn down the sound on your TV. Please turn down the sound on your TV. 5. When you are on the air, please state your name, city and State and ask your question loudly and clearly. 6. After you have finished with your conversation, please hang up. **Cellular Phones** Please do not use cellular phones to place your calls. Cellular phones may produce static interference that may result in your being disconnected. Prior Satellite Videoconferences Produced by the Office of Juvenile Justice and Delinquency Prevention Conditions of Confinement in Juvenile Corrections and Detention Facilities September 1993 Community Collaboration June 1995 Effective Programs for Serious, Violent, and Chronic Juvenile Offenders October 1995 Youth-Oriented Community Policing December 1995 Juvenile Boot Camps February 1996 Conflict Resolution for Youth May 1996 Reducing Youth Gun Violence August 1996 Youth Out of the Education Mainstream October 1996 Has the Juvenile Court Outlived Its Usefulness? December 1996 Youth Gangs in America March 1997 Preventing Drug Abuse Among Youth June 1997 Mentoring for Youth in Schools and Communities September 1997 Comprehensive Juvenile Justice in State Legislatures February 1998 For Further Information For videos of previous OJJDP videoconferences, please contact the Juvenile Justice Clearinghouse, PO Box 6000, Rockville, MD 20849-6000; call 800-638-8736; fax 301-251-5212; or e-mail askncjrs@ncjrs.org. For information on future OJJDP programs, contact the Juvenile Justice Telecommunications Assistance Project, Eastern Kentucky University, 300 Stratton Building, Richmond, KY 40475-3131; call 606-622-6671; fax 606-622-4397; or e-mail beckytrc@iclub.org. Protecting Children Online PROGRAM PANELISTS Daniel Armagh, Director, American Prosecutors Research Institute-National Center for Prosecution of Child Abuse, 99 Canal Center Plaza-Suite 510, Alexandria, VA 23314; (703) 739-0321. Daniel Armagh has litigated child abuse cases for 10 years. As assistant district attorney for Lawrence County, Pennsylvania, he was director of the Sensitive Crimes Unit with emphasis on the prosecution of crimes against children. Mr. Armagh has tried over 150 jury trials and has argued before the highest courts on appellate issues in Oklahoma and Pennsylvania. Mr. Armagh received his bachelor's degree and juris doctorate degree from the University of Oklahoma with honors, and studied at Queen's College, Oxford University, United Kingdom. Mr. Armagh joined the staff at the American Prosecutors Research Institute in April 1995. Under his direction, the Center's expert staff provides training and technical assistance to prosecutors and other professionals nationwide concerning the investigation and prosecution of sexual, physical and fatal child abuse. The Center also serves as an authoritative clearinghouse for relevant information regarding legislative and caselaw developments, court reforms, trial strategy, the latest research, medical advances, policy development and case management. Fred Cotton, Director, Training Services, SEARCH Group, Inc., 7311 Greenhaven Drive, Suite 145, Sacramento, CA 95831 (916)-392-2550 Fred Cotton manages Training Services at SEARCH's National Criminal Justice Computer Laboratory and Training Center and provides technical assistance and training to criminal justice agencies nationwide in the field of information systems including assistance in the investigation of computer crimes and the examination of seized microcomputers. He currently manages and instructs in the "Investigation of Computer Crimes" course which is offered nationally by SEARCH. He has also taught Advanced Officer courses and officer safety subjects in the Basic Police Academy. In August 1995, he was invited guest of the Norwegian National Bureau of Criminal Investigation in Oslo, Norway where he provided training on computer investigations to investigators from Norway. Mr. Cotton has 13 years of law enforcement service as a field supervisor with experience in operations, investigations, records, training and data processing. In addition to his duties at SEARCH, he is currently a Reserve Police Officer with both the Yuba City (California) Police Department and the Los Angeles Police Department. Mr. Cotton holds his degree in Administration of Justice and is currently a member of the national board of directors for the High Technology Crime Investigation Association. Rick Potosec, Special Agency, Federal Bureau of Investigation Mr. Potosec is a Certified Public Accountant and has been employed as a Special Agency with the FBI for 18 years. His first assignment was in the Washington Field Office, Washington, D.C. where he investigated general criminal cases and was involved in a long term undercover operation. In 1985 he was reassigned to the Baltimore Division, Silver Spring, MC Resident Agency where he investigated bank robbery, kidnapping and other reactive criminal matters. In 1989, the focus of Special Agency Potocek's assignments turned to white collar crime matters including financial institution fraud, government fraud, public corruption and bankruptcy fraud. Special Agency Potocek is currently the Principal Relief supervisor for Squad 19 in the FBI's Maryland Metropolitan Office at Calverton. Squad 19 is responsible for the FBI's national initiative referred to as "Innocent Images". The focus of this undercover investigation is to identify and prosecute individuals who lure children into illicit sexual relationships using online computer systems and the Internet as well as individuals who use these same services to produce and distribute child pornography. As of April 9, 1998, the Innocent Images Initiative has recorded a total of 191 convictions, 169 arrests, 169 indictments, 70 criminal informations filed and 341 search warrants executed since March, 1995. Protecting Children Online PROGRAM PANELISTS continued Richard P. "Toby" Tyler, Sergeant, Sheriff's Crimes Against Children Detail, 655 East 3rd Street, San Bernardino, CA 92415; PH: (909) 387-3619, Fax: (909) 387-3455 Toby Tyler has been a law enforcement officer for the San Bernardino County Sheriff's Department for more than 27 years and has been a Specialized Crimes Against Children Detail investigator for more than 17 years. He is an Associate Clinical Professor of Pediatrics at Loma Linda University-School of Medicine and Instructor at the University of Southern California. Sgt. Tyler is a court recognized expert witness and has testified in cases involving pedophilia, child sexual exploitation and child molestation in many courts and tribunals across the country. Sergeant Tyler has participated in the creation of successful legislation in the field of child abuse and child sexual abuse. In addition, Sgt. Tyler routinely testifies before the Legislature on pending legislation which will have an effect on child abuse and child sexual abuse issues. Sgt. Tyler has participated in more than 1,000 investigations of child maltreatment during his assignment to the Sheriff's Crimes Against Children Detail. Ruben Rodriguez, Director, Exploited Child Unit, National Center for Missing and Exploited Children 2101 Wilson Boulevard-Suite 550, Arlington, VA 22201-3077. PH: 1-800-843-5678. Mr. Rodriguez has been with the National Center since 1990, first as the Supervisor of the Case Analysis Unit, then subsequently being promoted in November 1996 to the position of Director of the Exploited Child Unit. Prior to coming to the National Center, Mr. Rodriguez was a Detective with the Metropolitan Police Department in Washington DC, where he was assigned to the Intelligence Division. Mr. Rodriguez was detailed to the FBI from March 1985 to June 1990 as an Intelligence Liaison Officer working on Chinese Organized Crime. Mr. Rodriguez attended American University, majoring in Administration of Justice and Maryland University, majoring in Computer Science and Applications. Mr. Rodriguez is a guest lecturer at the University of Maryland, the FBI Academy, Quantico, VA, Senior Police College, Bramshill, England, and several law enforcement conference and symposium. He is currently speaking at several on-line Child Pornography/Child Sexual Exploitation Regional Symposiums, hosted by the FBI though out the United States. Protecting Children Online VIDEOCONFERENCE DATA AND EVALUATION FORM Directions: Please provide the information requested in this questionnaire regarding videoconference evaluation. Part I: PARTICIPANT INFORMATION 1. Gender Male Female 2. Age 20-30 31-40 41-50 51 & above 3. College Degree None BA/BS MA/MS Doctorate Other (Describe): 4. Current Position Upper Management Mid-Management Line Staff Other (Describe): 5. Years in Current Position 3 or Less 4-6 7-10 More than 10 6. Years Experience in Youth-Related Programs 3 or Less 4-6 7-10 More than 10 PART II: CONFERENCE EVALUATION (Circle the number that best reflects your rating.) 7. Local Site Facilitation 1 2 3 4 5 The facilitator was knowledgeable and responsive to participants' concerns. 8. Participant Materials 1 2 3 4 5 The material complemented the program. 9. Viewing Site 1 2 3 4 5 The conference room was comfortable and appropriately arranged for clear viewing and hearing. 10. Television Sound 1 2 3 4 5 The televised sound was audible and clear. 11. Broadcast Reception 1 2 3 4 5 The television image was sharp. 12. Television Visuals 1 2 3 4 5 All visuals were readable and clear (charts, graphics, diagrams, etc.). 13. Panelist Effectiveness - Topic 1 2 3 4 5 The panelists were knowledgeable about the topic. 14. Panelist Effectiveness - Implementation 1 2 3 4 5 The panelists were knowledgeable about program implementation. 15. Panelist Effectiveness - Delivery 1 2 3 4 5 The panelists were clear and effective in presenting their points. 16. Presentation of New Ideas 1 2 3 4 5 I acquired new knowledge, information, and ideas. 17. Overall Effectiveness of the Medium (videoconference) 1 2 3 4 5 The videoconference medium was an effective information dissemination tool. 18. Comparative Effectiveness of the Medium 1 2 3 4 5 As compared to traditional delivery (speakers, materials), the videoconference was more effective for me as a means of acquiring new knowledge. 19. Future Use of Video videoconference Programming 1 2 3 4 5 Videoconferences should be used for future training and information dissemination by OJJDP. Part III: ANTICIPATED APPLICATION OF NEW IDEAS, KNOWLEDGE, INFORMATION GAINED THROUGH VIDEOCONFERENCE 20. I anticipate being able to apply knowledge gained Never Immediately Within 1-6 months Within 7-12 months After at least one year 21. Implementation of new ideas/knowledge in my organization/agency/program depends on Self only Supervisor Head of organization/agency/program Legislation Other ( Describe): Part IV: ADDITIONAL COMMENTARY 22. What did you find most beneficial about this videoconference? 23. How could the videoconference have been more productive and worthwhile for you? 24. What topics would you like to see covered in future videoconferences? 25. Additional comments: Please return this evaluation form to your facilitator. Thank you.