Your computer could open door to cyberpredators

Apr 29, 2009 By Amy L. Edwards

They're hacking into computers, secretly watching girls on webcams, and using sophisticated techniques to disguise child pornography and thwart law enforcement. Across the globe, men with advanced computer and Internet skills are victimizing children using tactics that most people can't grasp.

Consider Patrick Connolly and Ivory Dickerson.

In the years the two men targeted teen girls, FBI agents say, they hacked into their victims' computers and extorted girls into making child pornography of themselves.

Experts say their cases should serve as a warning to computer users everywhere.

"It is absolutely something that people should be concerned about," said Mark McLaughlin, president of the International High Technology Crime Investigation Association, based in Roseville, Calif.

"The Internet opens, at a minimum, a window into the personal space of the household, and if misused, a door," McLaughlin said. "Once anything is typed onto a keyboard and sent out to others, the originator loses all control of where that data might end up or how it will be used."

Connolly and Dickerson are accused of victimizing at least four girls from the Orlando, Fla., area. And investigators say there may be hundreds, even thousands, of other victims they have yet to identify. One of their alleged victims was told her sister would be hurt if she didn't provide nude photos of herself.

"We're talking about young victims who felt pressured and often believed that if they provided some things to these individuals that they would be left alone," FBI Agent Nick Savage said at a recent news briefing. "When in fact, it was really just the beginning."

Connolly, a former military contractor, and Dickerson, a former civil engineer, could take control of their victims' computers, investigators said. They could delete files, see what the girls were typing and secretly watch girls on their webcams.

"Once they were able to, basically, get into one computer, it was a snowball effect," Savage said. "They were able to target other individuals by assuming the identity of an individual whose computer they've taken over."

Computer-crimes experts say it's difficult to tell exactly how many people are victimized by Internet predators.

Cybercrimes are underreported and legal definitions of "cybercrime" vary, said Sameer Hinduja, a Florida Atlantic University professor who studies cybercrimes.

But the FBI reports that more incidents of online child pornography and exploitation are being identified for investigation than ever before.

The number of FBI cases opened under the Innocent Images National Initiative -- a multiagency operation geared to combat child porn and exploitation -- has increased by more than 2,000 percent since 1996.

The FBI opened 113 Innocent Images cases in 1996. By 2007, that figure skyrocketed to about 2,445.

Though Hinduja thinks law enforcement is making progress, he noted that their efforts are not "as proactive as we would like."

Susan Brenner, a University of Dayton law professor and cybercrimes expert, said people often forget that a computer can be a weapon.

"What the Internet has let people do is hurt people in new and dreadful ways," she said. "People start losing control of their lives. The psychological, the emotional harm is very real."

In July 2007, Mark Wayne Miller, a registered sex offender from Ohio, was sentenced to 25 years in prison for secretly watching and recording webcam footage of girls involved in sexually explicit conduct. He was also charged with persuading girls to perform sexually for him in front of their webcams.

Miller obtained girls' passwords to a popular Internet portal and then secretly accessed their webcam sessions. Court records state Miller looked for log-in names that were likely to be minors.

Miller, now 48, also pretended to be a young man and built relationships with girls he met online, including a 16-year-old Pennsylvania girl. According to his plea agreement, Miller persuaded the unsuspecting teens to perform sexually in front of their webcams. He even distributed some of it to others.

Later this month, seven men will be sentenced in North Florida for their involvement in a sophisticated international child-pornography ring.

During the January trial, an Australian constable testified that the group used a complex system of pseudonyms and screening tests for new members to avoid detection, according to the U.S. Attorney's Office.

One of the ways they tried to thwart law enforcement was to use encrypted messages so that the public -- and police -- couldn't see what they were discussing.

FBI Director Robert Mueller said during a conference in August that members of the ring "boasted of being 'untouchable.'"

The good news, experts say, is that cases involving online predators with such advanced skills are not the norm.

But when such crimes do occur, they often involve a lot of victims, Hinduja said.

And it's these sensational cases that "opens our eyes," he said. "We kind of need these reminders that people need to be wise about who they talk to online and what they download."

___

(c) 2009, The Orlando Sentinel (Fla.).
Visit the Sentinel on the World Wide Web at www.orlandosentinel.com/
Distributed by McClatchy-Tribune Information Services.

Explore further: Facebook goes retro with 'Rooms' chat app

add to favorites email to friend print save as pdf

Related Stories

Google eradicates pornography its own way

Jun 28, 2006

Google is showing signs of more resistance in complying with regulators even as rival providers are complying more with the federal government's guidelines.

'Internet predator' stereotypes debunked in new study

Feb 19, 2008

Contrary to stereotype, most Internet sex offenders are not adults who target young children by posing as another youth, luring children to meetings, and then abducting or forcibly raping them, according to researchers who ...

Vt. may set aside harshest penalties for 'sexting'

Apr 14, 2009

(AP) -- Parents, school districts and law enforcement have been grappling with what to do with teenagers who take sexually explicit photos of themselves with their cell phone cameras and send them to friends.

Recommended for you

Facebook goes retro with 'Rooms' chat app

16 hours ago

Facebook on Thursday released an application that lets people create virtual "rooms" to chat about whatever they wish using any name they would like.

Some online shoppers pay more than others, study shows

18 hours ago

Internet users regularly receive all kinds of personalized content, from Google search results to product recommendations on Amazon. This is thanks to the complex algorithms that produce results based on users' profiles and ...

Twitter looks to weave into more mobile apps

Oct 22, 2014

Twitter on Wednesday set out to weave itself into mobile applications with a free "Fabric" platform to help developers build better programs and make more money.

Google unveils app for managing Gmail inboxes

Oct 22, 2014

Google is introducing an application designed to make it easier for its Gmail users to find and manage important information that can often become buried in their inboxes.

User comments : 0