Sie sind auf Seite 1von 4

Mary Mayfield Pedophiles and Child Pornography, High-Tech Intelligence Gathering CJ316-01 March 19, 2012

Page 208 2. A secretive pedophile is a person that lives a double life; a family person that takes care of home and a person that is sexually aroused by children. An example of a secretive pedophile is; http://www.johntfloyd.com/comments/july09/29a.htm . A child pornography collector is a person that share and trade images and/or videos with other pedophiles. An example of a child pornography is; http://www.ice.gov/news/releases/1106/110617atlanta.htm . An active pedophile is the most dangerous pedophile there is. It is a person that performs physical acts against children and keeps souvenirs from their victims such as underwear. An example of an active pedophile is; http://www.youtube.com/watch?v=T0xEUW-cuoQ . 3. The Internet has emboldened pedophiles by the way they introduce themselves to children. On the Internet, they can become whoever they want using names and photos of their choice, most common in chat rooms. Years ago, pedophiles would ride around neighborhoods, go to a park or school to prowl on children. An example of this would be; http://money.cnn.com/2007/02/12/magazines/fortune/net_child_safety.fortune/index.htm . Page 235 1. The difference between open-source and close-source data is; open-source consists of databases, message boards, media sources and outlets, photographs, tape and video recordings, satellite images, and government and private sector Web sites that are searchable by anybody with an Internet connection for free or a fee. Closed-source data is the same as open-source but requires authorization to access that is controlled by using an encrypted username and password.

2. The three basic concepts that are needed to search the Internet effectively for intelligence information are; knowing where to search by using search engines such as www.bing.com and www.google.com which are Web sites dedicated to retrieving data from the Internet, knowing how to search effectively, and knowing what to do with the information. 3. Boolean search techniques can be used to carry out effective searches, eliminating many unrelated documents such as using AND, OR, and NOT. Using AND narrows a search by combining terms; it will retrieve documents that use both terms specified for example, Dalton AND Georgia. Using OR broadens a search to include results that contain either of the words typed in. OR is a good tool to use when there are several common spellings or synonyms of a word for example, liberal OR democrat. Using NOT will narrow a search by excluding certain search terms. NOT retrieves documents that contains one, not the other, of the search terms entered for example, Dalton NOT travel.

References Bellevue Community College Library Media Center, Boolean Search Techniques. Retrieved March 20, 2012, from http://bellevuecollege.edu/lmc/handouts/boolean.pdf Muraski, M.K. (n.d.). Investigating High-Tech Crime. Prentice Hall.

Das könnte Ihnen auch gefallen