Laserfiche WebLink
I <br /> � roily „/ <br /> / gal°1utRIt IVNiIG <br /> ICAC Task Forces throughout the United States used to regularly conduct undercover operations <br /> targeting offenders who traveled to meet and assault individuals they believed were 10-to 14- <br /> year-olds. All of these undercover investigations are performed using social media apps or <br /> online ads that solicit the sexual assault of children. When arrests are made, investigators rarely <br /> find it is the first time the offender has traveled to sexually abuse a child. <br /> These offenders bring drugs, alcohol, sex toys, and other paraphernalia. In one an offender <br /> brought a dog leash and collar so he could be"walked" by a 12-year-old.' Task forces <br /> throughout the U.S. would conduct these operations on a routine basis, and they were very <br /> successful. The North Florida ICAC task force, for example, conducted 48 of these operations, <br /> arresting thousands of individuals, and obtained a conviction rate of 98.7%. Unfortunately, task <br /> forces are no longer able to perform these types of operations -they are resource intensive, and <br /> the volume of reactive cases prohibits it. <br /> The Darknet, including Tor, has become the newest online haven for child exploitation.9 Some <br /> forums and boards contain the most abusive child exploitation videos and images law <br /> enforcement has encountered. Chat forums allow offenders to create "best practices" on how to <br /> groom and abuse children effectively. A post named the"Art of Seduction" that explained how <br /> to"seduce" children was read more than 54,000 times. Other posts discuss the best way to <br /> introduce sexual activity to children without alarming them or offer such topics as "Thoughts on <br /> having oral sex with 0-2-year-olds." These conversations are horrific, yet Tor is easily <br /> downloaded as a web browser, and children and teens can install it on their phones and begin <br /> accessing it within minutes. <br /> s............... v v r)`.µro�rv/�ra�µroh F;wSr( (.a s( saWj 2()a9()d2da j-r(,1. <br /> 9 t"h(° f..)arj<,] °t is an encrypted portion of the internet that is not indexed by search engines where users can <br /> communicate anonymously without divulging identifying information,such as a user's location. Tor is one network <br /> on the Dark Net. <br />