Crime On The
Superhighway
A Guide To Online Safety
By Former Investigator Lynn Zwicke
I. WHAT IS A COMMUNICATIONS SERVICE? A electronic means whereby individuals are capable of communicating with one another, via notes and replies, through fiber optics. Fiber optics has replaced wires as a means of communications and is also used to transmit graphic images in split seconds.
![]()
![]()
![]()
There are many different "rooms" you can enter. There are rooms created by the service and there are member created rooms. Many times the rooms have names, that at the very least, encourage illegal activity, such as "man wants boys", "older male seeks cybersex with young teen", "xxxxteen gifs/jpgs", etc. You enter the chat area with a choosen pseudonym. Names can be changed frequently, making it difficult to trace a person who may be conducting illegal activity while in chat. ![]()
Individuals who sexually exploit/solicit children. Mostly involves adults getting kids involved in child pornography, or distributing pornography to minors, but adults can fall victim to this crime as well. Individuals who become obsessed with another individual and they follow their victim from board to board, seeking and compiling various information that their victim may have posted on the boards, with the intent to locate personal information on their victim such as address, telephone#, date of birth, or the city/state in which they live. They then use this information to harass, threaten, and intimidate their victim both online and offline. An individual gains access to your password and uses this information to get at your credit card information, and uses the #'s to make purchases. ![]()
a) Many times uses false names
b) Seek child/teen victim in the kids area's on the services, such as the Teens BB, Games BB, or chat area's where the kids gather. c) Make contact through email d) Befriend child/teen e) Extract personal information from child/teen f) Write sexually explicit mail to the child/teen g) Setup a "meet" - sexually molest child/teen Many pedophiles will also make telephone contact with the victim, usually by having the child call collect so that his telephone# don't show up on the parents bill. Two main reasons they want telephone contact is 1) to engage the child in "phone sex" and, 2) to make sure that they are communicating with a child and not a law enforcement agent.Many times persons involved in child pornography deceive their victims into sending pictures of themselves to the person. Some of the ways they do this is by stating they are photogaphers and that they can help get the child into modeling, and many times offer them several hundred dollers to pose. Another way is, after they build a "close" relationship with their victim, they tell them they want "sexy" pictures for their viewing only. The pictures are scanned and put on disk. Even if the victim sends them a non-sexually explicit photo of themselves, there are graphic programs that allow the person to alter these photos, such as putting the face of the victim on the nude body of another person. These pictures are then distributed via modem to others. The pictures are many times posted on the Internet without the victims knowledge and are used to trade with others involved with child pornography. The distribution of child pornography, through utilizing the online services, is rapidly increasing at an alarming rate. The most common way of distribution is by sending the graphic images to another persons email. Pedophiles will use this method in attempts to "excite" the child and to lead them into other sexual conversation/acts. They will also send child porn, as well as adult porn, to the child in attempts to desensitize them to a degree that the child feels "everyone" is doing these things and there is nothing wrong with taking these kinds of sexually graphic pictures. When an individual sends these files through email, he will many times coach the kids as to how to get rid of any evidence of having received the files. Some of the things they will be coached to do is as follows: a) Download the files to floppy disk rather then the hard drive; b) Put a name of a game or other child appropriate program on the disk so that if the parents see the disk lying around, they will just assume it is a child's program; c) Change the file extension after down loaded. For example: the file is originally named teenxxx.jpg. By renaming the file to checkers.exe, not only would parents think the file was a checkers game, if they attempted to execute the file, they would receive an execution error message and would not be able to open the file. When the child wants to view the graphic, all she/he has to do is rename the file with the correct 0extension to it. Individuals will also assign a password to the child allowing them to enter their account to download graphic files from their email. Example: Prodigy allows the "A" member (the account holder) to add 5 other members to their accounts using sub id's B-F. The "A" member will setup a sub id# with a false name and date of birth, then give the password to the child so that he/she can sign on to his account using a sub id#. The individual will then send the porn from his "A" membership email, to the sub id email. If he is writing sexually explicit letters to the child, he will also send them to the sub id#. The child downloads the files, reads the letters, replies to the individual, sending it back to the "A" id, deletes the mail/files in the sub id email box, then signs off of the service. This is done to keep the parents who do monitor their childrens email from becoming aware that someone is distributing porn or writing sexually explicit letters to their children. Since all of the communication between the child and the individual is taking place in the individuals account, parents are unaware of these exchanges.a) Follow their victim from board to board. They "hangout" on the same BB's as their victim, many times posting notes to the victim, making sure the victim is aware that he/she is being followed. Many times they will "flame" their victim (becoming argumentive, insulting) to get their attention. b) Accumulate personal information on their victim. Many times members post personal information such as address, date of birth, or telephone#, on the various bulletin boards. The stalker will accumulate any information that he can on his victim. c) Stalkers will almost always make contact with their victims through email. The letters may be loving, threatening, or sexually explicit. He will many times use multiple names when contacting the victim. d) Contact victim via telephone. If the stalker is able to access the victims telephone#, he will many times make calls to the victim to threaten, harass, or intimidate them. e) Track the victim to his/her home. a) Find out the victims password to their online account. This is usually done by "hacking" or by the individual conning the victim into giving him his/her password. b) Access the victims account and record credit card information. c) Make large purchases. d) Disappear. They many times use false names/address's when they sign on to a service. After they make purchases, they drop the account. The merchandise is usually sent to a false address, such as an abandoned home, or to an accomplice, who, when questioned, states he/she knows nothing about it. a) The individual will post a note stating that he/she has an item for sale or trade. He/she will then receive the money or trade from the victim but will not send the promised item to the victim. |