TV News LIES

Wednesday, Nov 26th

Last update08:21:34 AM GMT

You are here News Of Special Interest Investigators race to find victims of child pornography

Investigators race to find victims of child pornography

E-mail Print PDF

Investigating child pornThe expansion of the "Dark Web," where pedophiles hide using websites that encrypt their computers' identifying information, has fueled an explosion of child pornography that has law enforcement in a race against time to find victims before they are abused again.

Investigators follow the trail of images around the world any way they can. They rely on traditional detective techniques, such as interviewing suspects, but they also use modern-day digital methods. They enhance blurry backgrounds for clues to a photo's location. They monitor websites popular with pedophiles. They use social media to blast photos of suspected child pornographers in the hope that someone will recognize them.

"There's no more vulnerable person than a child," says Jim Cole, who heads the child victim identification program in the federal government's Cyber Crimes Center at Homeland Security Investigations. "The first goal is to find the child and prevent further harm."

Cole spends his days on the third floor of a nondescript building in a nondescript office park in suburban Washington, D.C., poring over thousands of sexually explicit images of children.

Finding the victims is urgent, he says, because 80% of child pornography victims are abused by someone they know, most often a parent, guardian, relative or family friend. That means the abuse is probably ongoing.

More...


Most Recent Related Stories...


Honda admits under-reporting serious U.S. accidents since 2003

Honda under reported accidents in USHonda Motor Co (7267.T) failed to notify U.S. safety regulators of 1,729 claims of injuries and...

Israeli Cabinet approves nationality bill

netanyahuIsrael's Cabinet has approved a contentious bill that officially defines Israel as the nation-state of the...

Secret Malware in European Union Attack Linked to U.S. and British Intelligence

regin malwareComplex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and...

The Never-Ending Replay of November 22, 1963

JFK assassinationyear ago this week, no one could escape the wall-to-wall coverage of the Kennedy assassination’s 50th...
 
America's # 1 Enemy
Tee Shirt
& Help Support TvNewsLIES.org!
TVNL Tee Shirt
 
TVNL TOTE BAG
Conserve our Planet
& Help Support TvNewsLIES.org!
 
Get your 9/11 & Media
Deception Dollars
& Help Support TvNewsLIES.org!
 
The Loaded Deck
The First & the Best!
The Media & Bush Admin Exposed!