Wednesday, May 6, 2020

The Downloaded Child Pornography Video Files - 996 Words

I obtained a copy of Agent Sutehall’s report, the downloaded child pornography video files and the log files generated by the law enforcement version of eMule which document the undercover downloads. I reviewed Agent Sutehall’s report and the eMule log files and with my experience and training, I was able to concur that Agent Sutehall had sufficient facts to lead a reasonable person to conclude that there was a probability that the suspect was involved in criminal activity. I viewed the video files and they clearly depicted minors engaged in sexually explicit conduct. Below is description of two files: ï  ± 10-12 year old female being raped by an adult male in several different scenes. ï  ± 10-12 year old nude female being sexually abused. With the totality of the circumstances, I determined that probable cause existed to write a search warrant to Comcast Communications to obtain the subscriber’s information for the suspect IP address. 2. Write a search warrant to Comcast Communications to verify the subscriber of the IP address lives in the City limits of Kirkland. I wrote a search warrant to Comcast Communications to search IP address Test for the subscriber’s information. The warrant was reviewed by King County Prosecutor Cecelia Gregson. I have worked with Prosecutor Gregson on more than a dozen cases and she has become a great resource. Prosecutor Gregson has commended me on my work in ICAC and is confident with my experience and investigations. TheShow MoreRelatedA Discussion On Expressing Yourself1259 Words   |  6 Pagesrobot.txt file. The robot.txt file is a line that web developers can incorporate when developing a website that does not want to be indexed. The deep web is not the dark web but, the dark web is a small part of the deep web. Dark web uses software like Freenet, Jondo, Ip2, Alienet, Tails OS, and the most famous software, Tor to access websites anonymously that are not indexed. The dark web is hidden due to access in narcotics, assassination, weapons, malware, terrorism, and child pornography. DespiteRead M oreChild Sexual Abuse and Child Pornography2003 Words   |  8 PagesChild pornography is a broadly defined term mainly because there is no internationally agreed upon definition. There are also some conflicting laws between different countries that further complicate the issue of child pornography. It can become difficult to prosecute with the increased use of computers and anonymous online networks. Both the offenders and the victims can come from a wide range of social and cultural backgrounds. Child pornography includes pictures or videos that present childrenRead MoreThe Internet : File Sharing, And The Distribution Of The Internet1768 Words   |  8 Pagesthe internet. Peer to Peer (P2P), a form of file sharing allows people to participate in the distribution and sharing of multimedia files across a wide network of connected computers on the internet. This allows them to transfer many files between two computers across the internet through other file-sharing networks. It also created user-based search engines containing a menagerie of files that allowed users to share and acquire files. Most of the files being distributed by the user base on the peerRead More Internet Censorship Essay1605 Words   |  7 Pagesother scientists in the same field of study all over the world can know in minutes. Ordinary people use the Internet for communication, expressing their opinions in the newsgroups, obtaining new information from the WWW, downloading all types of media files, or j ust â€Å"surfingâ€Å" for their own personal enjoyment. Users of the Internet have the freedom to express anything they believe. The fact that the Internet has no single authority figure creates a problem about what kind of materials should be availableRead MoreThe Deep Web : The Invisible Web Essay1494 Words   |  6 Pagesdisturbing and controversial part of the deep web is that of child pornography and violent pornographic videos. Overtime the traffic on these sites is constantly increasing and the deep web has made it ever so easy for such people to fulfill their desires while keeping their chances of being caught to a minimum (â€Å"Tour the Deep Web†). On the flip side, the deep web also contains individuals who work towards taking down sites that show child pornography and work to obtain the names and addresses of such peopleRead More Internet Essay2216 Words   |  9 Pagesnetwork that could survive a nuclear attack. For the first decade that the Internet was in existence, it was primarily used to facilitate electronic mail, support on line discussion groups, allow access to distant databases, and support the transfer of files between government agencies, companies and universities. Today over 15 million people in the United States and approximately 25 million people worldwide access the Internet regularly, including children. Many parents believe that depriving their childrenRead MoreEssay on Disability Discrimination Act1408 Words   |  6 Pagesare discriminated against because of that connection or relationship. For example, it is unlawful discrimination if: * A parent is refused a job because the employer assumes he or she will need time off work to look after a child with a disability * People are refused access to a restaurant because they are with a friend who has a disability * A carer of a person with a disability is refused accommodation because of his or her association withRead MoreInfluence of the Internet on Teenagers1882 Words   |  8 PagesEvery person goes through the period of being a teenager which is 13-18 years. This period is often characterized by unstable emotional state and even psychological stresses. During this period young people are shifting from being a child to being an adult person. In addition, a lot of young people try to establish their roles in the society, to understand their feelings and attitudes. This investigation might be accompanied by the feelings of fear, nervousness and vagueness. It is a common knowledgeRead MoreCSS350 IP5 Essay6845 Words   |  28 Pagescommission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization. Whichever the case, computer forensics can be used to investigate computer related crime or misconductRead More3.1 Identify the Characteristics of Different Types of Child Abuse1891 Words   |  8 Pagescharacteristics of different types of child abuse Abuse means any of the following acts which seriously endanger the physical, mental, or emotional health and safety of the child:   The infliction, attempted infliction, or as a result of inadequate supervision, the allowance of the infliction or attempted infliction of physical or mental injury upon the child by a parent or caretaker. The exploitation or overwork of a child by a parent or caretaker. The involvement of the child in any sexual act with a parent

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.