>Users:   login   |  register       > email     > people    


A High Tech Synergy to Managing the Cyber-sex Offender
By Art Bowker, Cybercrime Specialist
Published: 03/15/2010

Predator It is no secret that convicted sex offenders are increasing being found online, particularly on social networking sites. In February of 2009, MySpace had reportedly removed 90,000 sex offenders from its site since 2007. (Wortham, 2009) At the end of 2009 New York’s Electronic Securing and Targeting of Online Predators Act (e-STOP) resulted in the removal of 11,721 profiles associated with 4,336 dangerous sexual predators registered in New York. (WIVB.com, 2010) Community corrections officers (CCO) are likewise being increasing tasked to manage the cyber-risk posed by sex offenders. In some departments this translates into prohibiting sex offenders' computer/Internet use. Others take a more progressive view, permitting computer use but monitoring it as well. Usually the later approach centers on either periodic searching of an offender’s computer or the deployment of monitoring software. Each approach has its pros and cons. The more progressive departments recognize the synergy of combining both approaches into their supervision strategies.

Computer Searches

Searching a computer can detect noncompliance, including new law violations, that occurred days or even years before the search. The most basic search or preview takes a quick look at the computer on site to determine if there are any issues. Preview searches can be conducted with software or hardware write blockers that prevent any change to the media. They usually are no longer than an hour in duration. Preview searches are not true forensic examinations because they frequently focus only on data that is located in the computer hard drive’s allocated space, such as files listed in a directory. They do not usually retrieve deleted files located in unallocated space. Additionally, they usually do not access system areas, such as Window’s Registry, which can contain important information about the user’s actions. Nevertheless, they frequently will uncover evidence, particularly if done with little warning. Evidence found from a preview search, such as pornographic images, will usually justify taking the computer for a more through forensic examination.

A forensic examination is much more detailed and time consuming. It always involves making a duplicate image of the drive, which can take a significant amount of time, depending upon the drive’s size. The original hard drive is maintained for safekeeping and the duplicate image is then examined. The examination goes beyond just a preview. They include such things as retrieving deleted files and data from unallocated space and examining protected storage areas. It literally can take days or even weeks to complete a computer forensic examination.

Time consuming is just one of the concerns for agencies relying solely on computer searches to detect noncompliance. Proper training and equipment, both of which frequently needs updated, are required to complete computer searches. Offenders who use encryption[1] and/or steganography[2] programs can also defeat or at least minimize a computer search’s effectiveness. Additionally, cleaning or wiping utilities can purge noncompliance evidence prior to a search. Finally, there can be a significant delay in detecting noncompliance even when they are conducted frequently. A sex offender could groom and victimize a minor and/or obtain and distribute hundreds of child pornography images in the days or weeks between a periodic computer search.

Computer Monitoring

Monitoring software[3] can address many of these shortcoming. It can transmit through the Internet keyword alerts, websites visited, and even screen shots of noncompliance. The result is officers can receive timely notification of problem behaviors within minutes of their occurrence instead of depending on the next scheduled search. Some monitoring software can block access to social networking sites and pornographic materials. Additionally, they can restrict Internet use to certain times of day, such as normal working hours.

Monitoring software can also overcome encryption, steganography, and wiping utilities. It does this by recording everything, including the incriminating evidence and the offender's efforts to conceal or destroy it. Even removing and destroying the hard drive can be futile for the offender because some monitoring software forwards the evidence to a secure server, beyond their reach.

Monitoring software is not without limitations. It can not detect violations that occurred before it was installed. Additionally, it only works on a computer it is installed on. Monitoring software also can not always be installed on all Internet capable devices, such as cell phones[4] and gaming systems. Additionally, it can be circumvented by technically sophisticated offenders. Finally, remote receipt of noncompliance requires that the target computer be connected to the Internet.

Conversely, the ability to conduct computer searches overcomes many of these limitations. Searching a computer before monitoring software is installed will insure the offender does not already have pornography or sexually explicit stories (FieldSearch[5] is an excellent free tool for this purpose). Unauthorized computers discovered can be subjected to a search. Likewise, digital devices, such as cell phones and gaming systems can be searched as needed.

Conclusion

This article has hopefully raised awareness of using computer searches and monitoring software to supervise the sex offender. Each have pros and cons. However, embracing both these approaches will overcome their limitations and provide the right synergy to managing the cyber-sex offender.

About the Author

Art Bowker has over twenty four years experience in both corrections and law enforcement at the state and federal levels. He is currently the Secretary of the High Technology Crime Investigation Association (htcia.org). Art also has a Master of Corrections degree from Kent State University. Follow Art on Twitter.com at: (http://twitter.com/Computerpo)

References

WIVB.Com (2010). “Sex Offenders Removed from Social Sites: E-STOP Law Results in Removal from Websites” LIN Television Corporation. February 2, 2010, Retrieved February 8, 2010 from http://www.wivb.com/dpp/news/new_york/Sex-offenders-removed-from-social-sites

Wortham, Jenna (2009). “MySpace Turns Over 90,000 Names of Registered Sex Offenders” New York Times. February 3, 2009, Retrieved February 8, 2010 from http://www.nytimes.com/2009/02/04/technology/internet/04myspace.html

Footnotes:
  1. Encryption programs make data or a file unreadable unless it is unencrypted, which also requires a password.
  2. Steganography programs conceal data or a file inside another file, usually an image file. This process effectively hides the file. The process usually also involves encryption and also requires a password to retrieve the hidden file.
  3. Internet Probation & Parole Control, Inc. (http://www.impulsecontrol.net) and SureView of Raytheon Oakley Systems (http://www.raytheon.com) are leaders in this area. Over the counter software vendor, Spectorsoft (SpectorSoft.com) maker of SpectroPro and Eblaster is also a viable option.
  4. There is one company that can monitor cell phone use, My Mobile Watchdog (http://www.mymobilewatchdog.com/). However, it is limited to only certain models.
  5. This software was developed by the National Law Enforcement and Corrections Technology Center – Rocky Mountain Region specifically for use by probation and parole officers. It can be obtained for free at https://fieldsearch.justnet.org/request.asp .

Other articles by Bowker:


Comments:

  1. hamiltonlindley on 04/21/2020:

    Waco has developed a reputation for a rocket-docket in patent litigation. It’s an important choice to find the right lawyer in Waco for your important patent litigation matter. When people in the know make the hire, they hire Dunnam & Dunnam. If you are looking for a rear end accident waco , then Dunnam & Dunnam is the right choice. For nearly 100 years, people in Waco have hired the firm when the results matter at Dunnam & Dunnam are among the most respected in the Central Texas area. They have the experience in trials and mediations to guide your case in the right way. There are few important decisions at the outset of the case that can turn the tide in your favor. Choosing the right lawyer is one of them.

  2. leo12 on 01/09/2011:

    Wow awesome. However is it possible catch everyone who do such types of crime. i have faced such kind of intruder over web many times. I really fell harass when i meet such kind of perv over web. If its work then it will help every individual a lot. Thanks

  3. Robert Rosenbusch on 05/18/2010:

    Art, this is a great article and I agree with your analysis. I did want to offer though that my company RemoteCOM at www.remote-com.com also does computer monitoring. One of the things I think you can add to the article that is rarely discussed is the constant analysis of the data collected. If the data is not analyzed daily then the offenders can get a sense that the probation officers are not watching what is going on. This also puts the department and the officers at a liability if they missed critical data because they didnt have the time to review it. Lets face it we know that Officers case loads are not getting any smaller. That is why we do the monitoring for and in conjunction with the officers and alert them to potential problems. Thanks Art good job.

  4. computerpo on 03/31/2010:

    Parental Controls and Monitoring: http://www.smobilesystems.com/ Might be able to use for monitoring cell phones. Just found out about. Art Bowker


Login to let us know what you think

User Name:   

Password:       


Forgot password?





correctsource logo




Use of this web site constitutes acceptance of The Corrections Connection User Agreement
The Corrections Connection ©. Copyright 1996 - 2024 © . All Rights Reserved | 15 Mill Wharf Plaza Scituate Mass. 02066 (617) 471 4445 Fax: (617) 608 9015