interested in joining corrections.com authors network, email us for more information.

Really…Is it that Difficult to Enforce a Sex Offender Ban from SNS?

December 5th, 2010

I just read an article quoting a prosecutor about how difficult it is to enforce a ban on social networking site (SNS) use by sex offenders on probation. (http://www.live5news.com/Global/story.asp?S=13606071). The rationale is the same that we seen before. Those “crafty” sex offenders use computers in the privacy of their homes. They often use different screen names and they don’t put their pictures on the account. What is a poor law enforcement or corrections official suppose to do to catch them?

Funny, this same argument can be made for probationers’ drug use. You know it is really hard to stop offenders from using drugs. They do it in the privacy of their homes. Hardly ever do they do it in front of law enforcement or their officers. We drug test them but still they do it.

PLEASE, give me break. Why is a sex offender on probation given free access to the Internet without monitoring by their supervision officer? Monitoring or even periodic searches would prevent them and/or catch them with a social networking presence.  Even if they don’t access the account with a monitored computer, they can be caught. I know. I have done it. Even offenders without monitoring leave traces of their presence. For instance, many sex offenders are using their REAL NAME, with accurate biographical information. Others are recycling old names. I have seen sex offenders get text messages or long distance calls on their cell phone, which when traced back, reveal they had a social networking profile. Law enforcement all over the country have caught sex offenders at local libraries accessing SNS (so much for argument they only do it in the privacy of their own homes).

The other argument is it takes a court order to get access to the account for prosecution. And? What is the point there? The only one I can see is for those “crafty” sex offenders who are using bogus information. How important is it for law enforcement or corrections to detect the ones lying and hiding in social networking locations? These are the ones you really want to go after and get locked up.

Think of it as you have two sex offenders at a playground. Both are not suppose to be there. One, is not wearing a disguise and sitting on a park bench, in the plain open. The other is hiding in the bushes, with a disguise on. Both need to go, but which one is a serious threat to kids? Are officers not suppose to look causes it is hard?

By the way, a court order is really just the start of the process. Once the court order is obtained law enforcement is not really done. The information provided will provide names and addresses, all of which could be made up (or real). Law enforcement wants the Internet Service Providers Address (ISP), which they can use to trace back to the sex offender’s location and computer. So do you really think the only thing law enforcement is going to find on a crafty sex offender’s computer is their Facebook® friends? I would guess you might find child pornography or information of future or actual VICTIMS.

Additionally, sex offenders in many jurisdictions have a requirement to disclose all Internet Identifiers. Not disclosing this information is failure to maintain sex offender registration, a felony. So there is more than just a social networking prohibition violation in many of these cases, depending upon the jurisdiction and what is found on the computer. And of course you have the supervision violation issues. How important is it to remove a non-compliant sex offender from the community? You know the one caught in the playground, with a disguise, hiding in the bushes.

Finally, social networking sites will terminate a sex offenders’ profile post haste. Facebook® is very clear on their user agreement that sex offender’s are not allowed access and they will terminate the account. More SNS need to follow their lead on this point, particularly those which allow minors access. Even MySpace®, which was purported in the article to be dragging there feet, has removed thousands of sex offenders from their site. Gee, how were they and Facebook® able to find all those sex offenders on their sites and remove them if it ws so difficult? 

I gave a comparison earlier about how hard it is to stop drug use. Well consider this for a moment. Drugs only stay in an individual’s system so long. So if they use once, depending upon when you test them, you might not catch them. It will be out of their system. The more they use, coupled with frequent testing, the better the chance of catching them. The same holds for Internet use. They might get on once and get missed. However, the more they do it the better the chances of catching them. Oh and computer use, particularly posted online, (unlike drug use) can be detected for a very long time. It might be there months, even years, after it was done. Same holds for data found on a computer. (It can also be very fragile but that is another story).

It is really about managing the risk and using all the tools at one’s disposal. This is also resource and training issue. Officers need resources and training. In also may be that corrections and law enforcement need to educate prosecutors, the public, press, and politicians about the differences between difficult and impossible. Difficult maybe..but not impossible.

Email This Post Email This Post    Print This Post Print This Post

Uncategorized

January 2011 is National Stalking Awareness Month (NSAM)

December 1st, 2010

January 2011 is the 8th observance of National Stalking Awareness Month (NSAM). Approximately 3.4 million people are stalked annually and 1 in 4 victims reported the offense included a cyberstalking act.

Cyberstalking can be defined as … “the repeated use of the Internet, e-mail, or related digital electronic communications devices to annoy, alarm, or threaten a specific individual or group of  individuals.” (D’Ovidio and Doyle, 2003, p. 10) Cyberharassment is the use of the Internet where there is no specific threat to the victim. Examples of cyberharrassment are be posting unflattering comments on a social networking site, in a blog, or chatroom. Cyberbullying is usually the definition used when both the victim and the offender are juveniles. Cyberstalking, considered the most serious of the three, involves a credible threat of harm. The three are collectively referred under the broad term of Internet harassment. (Smith, 2008)  I will be posting a piece called “Supervising Internet Harassment Offenders” on December 7, 2010, to discuss the growing cyber aspect of this crime for corrections.

The NSAM Web site, presented by the Stalking Resource Center of the National Center for Victims of Crime and the Office on Violence Against Women of the U.S. Department of Justice is up and running.  The site includes resources to help individual plan for NSAM 2011 events and outreach on stalking throughout the year. You will find an interactive quiz on stalking, magnets, fact sheets, guides, event ideas, and media tools to raise awareness about stalking and publicize your events. Please check it out at http://www.stalkingawarenessmonth.org/about

References

D’Ovidio, Robert and Doyle, James (2003). “A Study on Cyberstalking: Understanding Investigative Hurdles” FBI Law Enforcement Bulletin, Volume 72, No. 3, 10-17

Smith, Alison (2008) Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying. Library of Congress. Congressional Research Service

Email This Post Email This Post    Print This Post Print This Post

Internet Safety

Inmates and Computer Access: Good or Bad

November 30th, 2010

There are five common goals in sentencing, Retribution, Incapacitation, Deterrence, Rehabilitation, Restoration. When an individual is sentenced to imprisonment, the institution’s goals are keep them safe, keep them in, keep other inmates/staff safe, and somewhere in the mix rehabilitate the offender and prepare them for release. Not too long ago the idea of giving inmate’s computer access was batted around, particularly considering the educational aspect it brings to a facility. It is one additional tool that could be used to rehabilitate the inmate. This idea has grown dramatically.

We now have the Trust Fund Limited Inmate Computer System (TRULINCS), a new program currently being deployed by the Federal Bureau of Prisons (BOP), which is expected to be at all facilities by June 2011. The program provides inmates with limited access, specifically, the capability to send and receive electronic messages without having access to the Internet. No federal inmate has Internet access.

States are also following suit with similar programs. At least one state, Kansas, has taken it a step further by allowing limited electronic banking, e-mail and video family visitations. Clearly, there is a move by some to give inmate’s Internet access beyond just e-mail. Some countries, like Australia allow prisoners to have lap top computers in their cell.

Part of this push is apparently cost savings. It costs less to deal with e-mail communication as opposed to opening and reviewing snail mail. Monitoring is still obviously a component of all these programs. If an inmate were to write something inappropriate the information would be flagged, stopped, and dealt with I am sure before being sent out.

However, what about coded messages? Apparently, some states are on top of that too with someone assigned to review messages for hidden “codes.” I wonder how successfully they will be in preventing coded messages sent via e-mail from getting out or being received. Imagine the volume of messages being sent. The TRULINGS program above has a limit for messages of 13,000 characters (approximately two pages). A person can hide a lot of coded messages in 13,000 characters, especially if they spread the entire message out over numerous e-mails.

We also have at least one case where an inmate successfully broke into prison computer systems and stole identity information on prison personnel. We have inmates smuggling in cell phones into prison. How hard would it be to smuggle a USB thumb drive with the tools needed to “hack” a prison computer or system?

Even providing computer training to inmates carries an element of risk. Recently, an inmate with word processing skills honed in prison, completed the task of creating a nice annual report on the prison’s operation for the institution. The same inmate, after released, used those same skills to develop a nice bogus prospectus and convinced at least one victim to give them investment funds on a non-existent company.

Ironically in the not too distance future, you will have inmates allowed to access a computer while in custody, but upon their release they will not be permitted access due to special conditions. The caveat is of course access can be granted if the community corrections officer is prepared and able to monitor that use. Many are not. So the fall back positions is no computer or Internet access. How will that fly? The released offender has less privledges for electronic communication than the inmate. Someone is going to put that in a legal brief soon.

I am not arguing that the access is Good or Bad. I just wonder, what the rules/guidelines are for these things. Not the specifics of what is going on, just some general, no nonsense rules for making sure we “keep them safe, keep them in, keep other inmates/staff safe, rehabilitate the offender and keep the rest of us safe from acts committed inside and outside of the prison walls.

Maybe it is time we get a  handle on this trend. As such I invite readers to post what correctional facilities are doing regarding inmate’s 1) computer; 2) e-mail access; and 3) Internet access. Give me the good and bad of it. Don’t forget to include the state/facility.

SOURCES

Department of Justice, Victoria, Australia: Personal Computers in Prison, Retrieved on November 16, 2010, http://www.justice.vic.gov.au/wps/wcm/connect/DOJ+Internet/Home/Prisons/Prisoners/Property/JUSTICE+-+Personal+Computers+in+Prison

Think Outside the Cage: Colorado Criminal Justice Reform Coalition, Retrieved on November 16, 2010 from http://thinkoutsidethecage2.blogspot.com/2009/05/email-in-pen-kansas.html

Trust Fund Limited Inmate Computer System (TRULINCS), Retrieved on November 16, 2010 from http://www.bop.gov/inmate_programs/trulincs_faq.jsp#1

U.S. Department of Justice Press Release, Retrieved on November 16, 2010 from http://www.usdoj.gov/criminal/cybercrime/janoskoIndict.pdf

Email This Post Email This Post    Print This Post Print This Post

Legal Updates

Moved Jurisdictions Restricting/Monitoring

November 30th, 2010

I moved this post to Page status. This why it will be easiler to find. Kind of an update, as of  December 10, 2010, we have 17 states, with specific statuory lanuage regarding computer/Internet restrictions, and at least two states with statutory authority for probation/parole to craft such restrtictions. That is 19 out of 50 (38%). Of course the federal authorities all impose such conditions as well.

Email This Post Email This Post    Print This Post Print This Post

Legal Updates

Welcome to the Three C’s

November 29th, 2010

First things first. I want to thank Corrections.com for giving me a chance to inform and enlighten on their site. They have been a leader in providing valuable information on corrections via the Internet for sometime. I will make every effort to continue their tradition of excellence in providing quality information on cybercrime for the correctional professional.

Now what are my “creds” as it were for tackling this subject? I have been working in law enforcement/corrections at the state and federal levels for over 25 years now. I literally have had work experiences at every level of the criminal justice process, from law enforcement investigations through post conviction supervision activities.

My interest in cybercrime dates back at least to 1990. I had just read Organizing for Computer Crime Investigation and Prosecution by Catherine H. Conly (1989), U.S. Department of Justice, and found it a compelling topic for law enforcement. I even approached my employer at the time about the need to develop computer investigation skills. From that time forward I took every opportunity that presented itself to learn more about computers and high tech investigations.

Years later, when I again found myself working in corrections, I was shocked to find that few had realized the significance of this topic on probation, parole, etc. I renewed my cybercrime interest with a keen focus on information related to corrections. To this day it is a continuing journey, which I hope to share with you through this blog.

For the past 10 years I have been specifically charged with investigations/supervision of cyber-offenders. This includes sex offenders, fraudsters, cyberstalkers, to name a few. I have installed monitoring software on offenders/defendants computers and have also searched computers. I have also completed investigations involving collecting information from the Internet on offender’s activities.

Do I have a degree in computer science? No, my degrees are in criminal justice (BS) and corrections (MA). What about special training? Well I have training from all the big players, (SEARCH, National White Collar Crime Center, the Federal Law Enforcement Training Center, the FBI, and the High Technology Crime Investigation Association).

You will soon find you don’t have to be able to read binary code (that the 0’s and 1’s code that computers interpret) to understand what is being discussed. Also, you don’t need to be C or Perl programing expert to grasp the skills/techniques that are being used by correctional professionals to address cyber-risk. I hope to challenge the reader to think about this topic and act on the knowledge it brings to prepare for the future.

To paraphrase a well known television show… “Let us boldly go where no one has gone before.” Gee, what else would you expect from someone interested in this topic?….LOL (Laughing Out Loud).

Email This Post Email This Post    Print This Post Print This Post

Uncategorized