Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged investigation
Cyber Technology in Federal Crime

By: Carlton W. Reeves, Luis Felipe Restrepo, Laura E. Mate, Claire Murray, Claria Horn Boom, John Gleeson, Candice C. Wong, Patricia K. Cushwa, and Scott A.C. Meisler

The use of cyber technologies, such as cryptocurrency and the dark web, provides new and evolving means to commit crimes and avoid detection. These technologies are used to commit a variety of federal offenses. The dark web is sometimes used to create, hide, or access websites containing child pornography. Illegal drugs and firearms are sometimes sold through dark websites. Cryptocurrency is sometimes used to facilitate these crimes. [...] Regardless of the type of crime involved, the relative anonymity these technologies provide to their users creates challenges for the investigation and prosecution of the crimes committed with them. The use of cyber technology to commit crimes transcends national borders. As Interpol has found, this causes investigative and legal challenges that can be difficult to overcome. United States government agencies, such as the Federal Bureau of Investigation and the Financial Crimes Enforcement Network, have reported on the increasing threats from these technologies and estimated yearly losses in the billions from the crimes committed with these technologies. There has been little analysis on the individuals sentenced for a federal offense who use these technologies for illegal purposes, the offenses they committed, and trends in these areas over time. In developing this report, the United States Sentencing Commission ('the Commission') collected information on individuals sentenced for offenses using cryptocurrency, the dark web, and hacking for fiscal years 2014 through 2021."

United States Sentencing Commission Sep. 2024

Increasing the Efficacy of Investigations of Online Child Sexual Exploitation: Report to Congress

By Brian Neil Levine

Nothing in history has transformed the character and practice of child sexual exploitation more than the internet. Individuals who commit child sex crimes use internet services, social networks, and mobile apps to meet minors and each other in ways they cannot in person and to groom victims by normalizing abusive sexual acts. Many of those who commit child sex crimes deceive, coerce, and sexually extort child victims with threats that too often are realized. Individuals who commit child sex crimes use the internet to arrange in-person meetings for hands-on abuse, and they use it to remotely coerce young children to selfproduce sexual and sadistic acts. Whether the abuse is hands-on or remote, the images or videos in which an individual captures their rape of a child are referred to as child sexual abuse materials (CSAM). An ever-growing set of online services are misused daily for the upload and immediate distribution of CSAM, supporting worldwide sharing. The harms to victims of child sexual abuse and exploitation are lifelong.