Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Operation Innocent Images

What challenges have come up?

Data encryption: encoding messages or files where only authorized parties have access (could use a password or someone with the appropriate code-breaking skills)

- the director of the FBI in 1995 Louis Freeh stated that some child pornographers walk free because of unbreakable cryptography and has led to the Operation seeking more government-mandated controls over encryption technology

- "public safety issue"

- "key escrow" plan

by Cassandra Luken

What came out of it

Operation Innocent Images was created...

a task force with the mission to:

"break up entire networks and communities of online pedophiles to take down major distributors and producers of child pornography; to stop sexual predators from using the Internet to lure children from their families; and to catch those viewing and sharing illicit images"

The results of the case included the two men being convicted of child abuse but with no link to the disappearance

What is actually being done?

Sources

  • agents work undercover to root out adults posing as minors
  • works with the National Center for Missing and Exploited Children
  • attempts to dismantle online groups, organizations , and for-profit enterprises
  • have broadened internationally "not just an American problem"

The Story

Buckley, S., & Sevilla, G. (1993, May 30). BOY"S DISAPPEARANCE REMAINS A PUZZLE. Retrieved February 18, 2018, from https://www.washingtonpost.com/archive/politics/1993/05/30/boys-disappearance-remains-a-puzzle/f54d0909-8f86-42bc-adf8-d294cb633221/?utm_term=.119bf7c37a82

Durkin, K. F. (1997(. Misuese of the Internet by Pedophiles: Implications for Law Enforcement and Probation Practice*. Federal Probation , 61, 3rd ser., 14-18. Retrieved February 17, 2018, from https://www.researchgate.net/publication/282291571_Misuse_of_the_Internet_by_pedophiles_Implications_for_law_enforcement_and_probation_practice

Federal Bureau of Investigation Innocent Images National Initiative, Feruary 2006. (n.d.). Retrieved February 17, 2018, from https://archives.fbi.gov/archives/news/stories/2006/february/innocent-images-statistics-1

Innocent Images: Looking Back Over the Years... And Overseas. (2006, Feb 24). Retrieved Feb. 17, 2018, from https://archives.fbi.gov/archives/news/stories/2006/february/innocent_images022406

Lewis, P. H. (1995, Sept. 25). TECHNOLOGY: ON THE NET; The FBI sting operation on child pornography raises questions about encryption. Retrieved Feb 17, 2018, from https://www.nytimes.com/1995/09/25/business/technology-net-fbi-sting-operation-child-pornography-raises-questions-about.html

Operation Innocent Images (n.d.). Retrieved Feb. 17, 2018, from https://www.fbi.gov/history/famous-cases/operation-innocent-images

Ways Pedophiles Misuse the Internet

May of 1993

a missing 10-year-old named George Stanley Burdynski Jr. from Brentwood, Maryland

The FBI were brought onto the case in collaboration with the Prince George's County police

- the investigation led to the discovery of 2 pedophiles that were giving gifts and taking local children on vacations

- the 2 pedophiles were found to have been running a larger ring of online child pornographers (for around 25 years)

1) to traffic child pornography through computer networks

2) to locate children to molest

3) to engage in inappropriate sexual communication with children

4) to communicate with other pedophiles

Set up chat rooms in this case and would use it to talk to boys and share images

Learn more about creating dynamic, engaging presentations with Prezi