CYBER CRIMES CENTER U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY BEFORE THE U.S. HELSINKI COMMISSION.

Similar documents
Tripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail

Tangier Model United Nations Human Rights Committee

STATEMENT OF JOHN MORTON DIRECTOR U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY

Federal Efforts and Legislation

ADMINISTRATION OF JUSTICE HOMELAND SECURITY

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM.

Justice for Victims of Trafficking Act Section-by-Section Analysis

PC: , 457.1, 872, CVC: (C) TITLE 8: INMATE RELEASE I. PURPOSE:

NCSL SUMMARY P.L (HR 4472)

COMBATING HUMAN TRAFFICKING IN THE UNITED STATES. What can Thailand learn from US approaches?

Introduction to Homeland Security

STATEMENT JOHN COHEN DEPUTY COUNTERTERRORISM COORDINATOR DEPARTMENT OF HOMELAND SECUIRTY AND PETER T. EDGE

Official Journal of the European Union

UNIVERSAL PERIODIC REVIEW INDIA

GAO REGISTERED SEX OFFENDERS. Sharing More Information Will Enable Federal Agencies to Improve Notifications of Sex Offenders International Travel

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

MARIN COUNTY SHERIFF'S OFFICE GENERAL ORDER. DATE Chapter 5- Operations GO /11/2014 PAGE 1 of 6. Immigration Status (Trust Act implementation)

IC Repealed (As added by P.L , SEC.244. Repealed by P.L , SEC.15.)

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Office of Investigations Buffalo, New York

a GAO GAO BORDER SECURITY Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process

TESTIMONY OF MICHAEL J. FISHER CHIEF UNITED STATES BORDER PATROL U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY BEFORE

DHS Biometrics Strategic Framework

EDWARD BYRNE MEMORIAL JUSTICE ASSISTANCE GRANT (JAG) PROGRAM FY 2014 STATE SOLICITATION, CFDA #

The Government anticipates requiring continuation of the following tasks:

ORDER OF THE PRESIDENT OF THE REPUBLIC OF AZERBAIJAN

EXECUTIVE SUMMARY. United States of America* Introduction

Immigration and Customs Enforcement (ICE) Secure Communities (SC)

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet

MEXICO (Tier 2) Recommendations for Mexico:

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM.

Modern Day Slavery: An Overview. Banu Demiralp April 17, 2012 Janna Lipman

PREVENTING THE SEXUAL EXPLOITATION OF CHILDREN. Action for Children and Youth Aotearoa Incorporated

Homeland Security Investigations Amy Valenzuela Supervisory Special Agent Immigration Options for Crime Victims

List of beneficiaries who are to be awarded grants for the implementation of CEPOL training activities in 2016

IN THE SECOND DISTRICT COURT OF APPEAL, LAKELAND, FLORIDA. May 4, 2007

AMENDMENT 343. EN United in diversity EN 2010/0064(COD) Draft report Roberta Angelilli (PE v03-00)

577 Phone Calls 250 s 45 Online Tip Reports

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

22 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

[MUNICIPALITY POLICE DEPARTMENT] GENERAL ORDER. Volume: Chapter: #of Pages: FAIR AND EQUAL POLICING. Effective Date: Supersedes Order #:

Work Programme on Terrorism to Implement the ASEAN Plan of Action to Combat Transnational Crime. Kuala Lumpur, 17 May 2002

Dear Delegates, It is a pleasure to welcome you to the 2016 Montessori Model United Nations Conference.

NATIONAL SOUTHWEST BORDER COUNTERNARCOTICS STRATEGY Unclassified Summary

The Measurement of Child Sex Trafficking and Exploitation

Trafficking People and Involuntary Servitude

Todd Bleckicki National Program Manager HSI Headquarters

Following the Money to Combat Terrorism, Crime and Corruption

PROTECTING CULTURAL HERITAGE

The Eurostat-UNODC joint annual data collection on crime and criminal justice. Michael Jandl Statistics and Surveys Section UNODC

On combating trafficking in human beings

Summary: H.R. 5682, FIRST STEP Act (115th Congress, 2018) Sponsors: Representatives Doug Collins (R-GA) and Hakeem Jeffries (D-NY)

SEX TRAFFICKING OF CHILDREN IN CYPRUS

Evolution of the Definition of Aggravated Felony

Original language: English CoP18 Doc CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA

The Indonesian National Police and the Philippine National Police, hereinafter referred to as the Parties ;

Immigration Violations

SEX TRAFFICKING AND MONEY LAUNDERING

IC Chapter 3.5. Human and Sexual Trafficking

CRIMINOLOGY TODAY. AN INTEGRATIVE INTRODUCTION sixth edition. By FRANK SCHMALLEGER. Pearson Education, Inc.

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM.

Pure Haven Essentials Website Terms of Use

All Human Trafficking Bills from the House and Senate. 114 th Congress

Hidden Costs of Crime: Quantifying the Economic Impact of Illicit Trade on Business and Investment

Belarus* EXECUTIVE SUMMARY. Introduction. National Plan of Action (NPA)

SEX TRAFFICKING OF CHILDREN IN AUSTRALIA

Country Report on Trafficking in Human Beings: Turkey

National Report Japan

Hearing entitled Following the Money: How Human Traffickers Exploit U.S. Financial Markets

23 illegal alien workers for The Sun Valley Group arrested in. Enforcement action at Arcata flower grower is part of ongoing ICE investigation

STATEMENT OF. David V. Aguilar Chief Office of Border Patrol U.S. Customs and Border Protection Department of Homeland Security BEFORE

Issue: Strengthening measures regarding international security as a way of combating transnational organized crimes

The Challenge of Human Trafficking and its links to Migrant Smuggling in the Greater Mekong Sub-region

OVERVIEW OF IMMIGRATION CONSEQUENCES OF STATE COURT CRIMINAL CONVICTIONS. October 11, 2013

Operation Brick and Mortar Internet Facilitated Child Sex Trafficking

WAPIS PROGRAMME WEST AFRICAN POLICE INFORMATION SYSTEM. This Programme is funded by the European Union

TRANSNATIONAL CRIME. An International Law Enforcement Collaboration

THE JOINT INVESTIGATION TEAMS A EUROPEAN INSTRUMENT OF FIGHT AGAINST TERRORISM

UNITED NATIONS OFFICE FOR DRUGS AND CRIME. Combating human trafficking

CRC/C/OPSC/CHE/CO/1. Convention on the Rights of the Child. United Nations

Cyber Border Security Defining and Defending a National Cyber Border

PRESIDENT TRUMP S EXECUTIVE ORDERS ON IMMIGRATION

The Role of the Department of Homeland Security Overseas

September 17, Ernest Davis, Mayor City of Mount Vernon Mount Vernon City Hall, 1 st Floor One Roosevelt Square Mount Vernon, New York 10550

SENATOR THE HON. CHRISTOPHER ELLISON Minister for Justice and Customs Senator for Western Australia Manager of Government Business in the Senate

998 Phone Calls 228 s 80 Online Tip Reports

Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography

Republic of Equatorial Guinea

The Gunpowder and Explosives Act governs the importation and transit of explosives and other dangerous cargo into the island.

Department of Justice & Equality. Second National Action Plan to Prevent and Combat Human Trafficking in Ireland

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

I. NON-LPR CANCELLATION (UNDOCUMENTED)

Office of Small and Disadvantaged Business Utilization (OSDBU)

Amend the Communications Decency Act to Protect Victims of Sexual Exploitation

September 17, Debra Preston, County Executive Broome County Office Building, 6 th Floor PO Box Hawley Street Binghamton, New York 13902

or attempts to do so, shall be fined under this title, imprisoned for any term of years or life, or both.

Ambassador Warren Tichenor s Opening Remarks. Thank you Madam Chair. My name is Warren Tichenor. I am the

Follow this and additional works at: Part of the Law Commons

UNDERSTANDING HUMAN TRAFFICKING CASES

The Digital Appellate Court Introduction to the edca Electronic Portal

Transcription:

CYBER CRIMES CENTER U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY BEFORE THE U.S. HELSINKI COMMISSION June 17, 2008 INTRODUCTION Chairman Hastings, Co-Chairman Cardin, and distinguished Members of the Commission on Security and Cooperation in Europe, my name is Shawn Bray and I am Unit Chief, Cyber Crimes Center at the Department of Homeland Security's U.S. Immigration and Customs Enforcement (ICE). I appreciate the opportunity to discuss ICE's authorities and responsibilities with respect to investigating U.S. trans-border child sexual exploitation crimes. THE ICE MISSION Among Department of Homeland Security law enforcement agencies, ICE has the most expansive investigative authorities and the largest number of investigators. ICE is the nation's principal investigative agency for crimes related to the nation's borders, including violations of American customs and immigration laws. Our mission is to protect the American people by combating terrorists and other criminals who seek to cross our borders and threaten us here at home. Working overseas, along the nation's borders and throughout the nation's

interior, ICE agents and officers are demonstrating that our unified immigration and customs authorities are a powerful tool for identifying, disrupting and dismantling criminal organizations that violate our Nation's borders. Our agents and officers make it harder for potential terrorists and transnational criminal groups to move themselves, their supporters, illicit funds or weapons across the Nation's borders through traditional human, drug, contraband, or financial smuggling networks, routes and methods. Since its creation in March 2003, ICE has combated threats to our border, homeland and national security, including the cross-border Internet sexual exploitation of children. OPERATION PREDATOR Operation Predator is an ongoing ICE initiative focused on the trans-border aspects of child exploitation, including the related financial crimes. It is designed to identify and investigate those engaged in Internet child pornography, including the criminal business conspiracies that support this illicit trade. The program organizes ICE's activities in child exploitation investigations to arrest/apprehend and ultimately to prosecute and/or deport a variety of violators, including: (1) Individuals who engage in the receipt, transfer, distribution, trafficking, sale, facilitation, and production of child pornography in foreign commerce, including utilization of the Internet; (2) Individuals who travel internationally for child sex tourism or facilitate such travel;

(3) Individuals who engage in the human smuggling and trafficking of minorsinto the United States for illicit sexual purposes (sexual exploitation and/or prostitution) or worksite exploitation, and/or commit any crimes resulting in the harm, injury or death of a minor (not including the smuggling of children by parents for family unity reasons); (4) Foreign nationals/aliens who have been convicted of local, state or federal offenses against minors under the age of 18 and are now eligible for removal from the United States; and (5) Those same criminal aliens who have been previously deported from the United States for such offenses but have re-entered the country illegally. These five enforcement categories are an integral part of the mission and responsibility of ICE in terms of border security, since the heinous criminal activities involving child exploitation are not confined within, or hindered by, a country's physical borders, but rather transcend them. The advent of the Internet has created even greater opportunities and incentives for ruthless predators to profit by exploiting children in the borderless anonymity of cyberspace. One can now transmit child pornography through foreign commerce by simply typing on a computer keyboard, with less obstruction and risk than arriving at a port of entry with child pornographic material hidden in luggage.

Officially launched by ICE on July 9, 2003, Operation Predator is currently managed and administered by the Cyber Crimes Center, a headquarters unit of the Office of Investigations, which coordinates enforcement efforts against transborder child sexual exploitation. As part of those efforts: ICE established a single web portal to access all publicly available state Megan's Law databases. ICE created a National Child Victim Identification System in partnership with the National Center for Missing and Exploited Children (NCMEC), the FBI, U.S. Postal Inspection Service, U.S. Secret Service, the Department of Justice, the Internet Crimes Against Children Task Forces, and other agencies. ICE stationed attaches internationally to work with foreign governments and foreign law enforcement counterparts to enhance coordination and cooperation on trans-border crime. ICE is working with INTERPOL to enhance foreign government intelligence on criminal child predators. As of June 4, 2008, ICE has made a total of 11,331 criminal and administrative arrests under Operation Predator. Of that total, 9, 477 were non-us citizens (aliens/foreign nationals); and of those, 6,318 individuals were deported from the United States. THE COMMERCIAL ONLINE CHILD EXPLOITATION ENVIRONMENT

The ICE Cyber Crimes Center (C3) is responsible for investigating violations of immigration and customs laws that occur in cyberspace, including trans-border sexual exploitation of children over the Internet. When ICE investigates the online sexual exploitation of children, we focus on three components of the Internet: international commercial and non-commercial websites, international Peer-to-Peer groups, and international Internet Relay Chat. Criminal organizations increasingly use the Internet to internationally advertise, distribute, and receive electronic contraband, specifically images of child exploitation. In doing so, they are reaping enormous profits from the sale of access to websites containing these images. To stop the proliferation of international commercial child exploitation websites, C3 dedicates substantial investigative resources to identifying and dismantling the criminal organizations responsible for such sites and the exploitation from which they profit. Although it is difficult to determine the exact number of web sites offering images of child sexual exploitation, ICE believes there several hundred commercial child pornography content websites supported by thousands and thousands of URLs for teaser sites, advertising sites and the like. Among members-only web sites, there is a tremendously high rate of duplication, with many identical or noticeably similar sites operated by the same individuals. Furthermore, we often encounter 10 to 15 different advertising web sites operated by the same individuals, all of which link to the same members-only website. This renders an accurate count of

web sites depicting child exploitation especially difficult to obtain. Recent investigations, including ICE's unprecedented Operation Falcon, have revealed a common methodology that criminal organizations use to commercially distribute images of child exploitation around the world. Typically, the organization consists of at least three component groups. The first of these groups includes the individuals responsible for uploading and maintaining the advertising and payment websites. These websites provide willing customers the opportunity to purchase Internet access to websites with a large volume of child exploitation images. The second group consists of individuals who facilitate the payment process. ICE has identified the following online payment methods used by international commercial child exploitation organizations: e-gold, PayPal, Western Union, and traditional credit card-based merchants. We believe there are subgroups within this second group with responsibility for exploiting each type of international Internet payment method. They remain attentive to the development and availability of new financial methods. The third group consists of those who control the overall criminal organization, decide which payment method will be used in a given situation, determine the content of the membersonly child exploitation website, and direct the laundering and distribution of the proceeds. ICE's Internet child exploitation investigations have revealed that many of those who control and profit from these electronic images are located in Eastern

Europe and former Soviet countries. Furthermore, there is likely some overlap within these organizations because of the ease with which the three groups described earlier can provide their services to multiple organizations at any given time. For example, an organized payment facilitator can easily accept payments from multiple advertising websites for access to multiple members-only websites. A website that advertises access to members-only child exploitation websites is easy to upload to Internet web servers and can be operational at multiple locations within one day. Payment websites have a similar structure and are easy to operate, whereas members-only websites are much larger and more difficult to upload. Generally the same members-only website is uploaded on one Internet web server and allowed to operate for 30 days, after which its operators remove it from the server and upload it to a different server. CONCLUSION ICE s Cyber Crimes Center is dedicated to working to identify all individuals involved in international criminal organizations and component groups that conduct every type of activity associated with trans-border child exploitation. These individuals include those who advertise specific members-only websites, those who facilitate customer payments, those who control the members-only websites, and those who ultimately receive the proceeds from the sale of child exploitation images. With an investigative expertise in international financial crimes, including money laundering, C3 is working diligently to identify and dismantle the international criminal organizations that operate child exploitation websites, as well as identifying the many individuals that frequent or subscribe to

these websites. ICE coordinates closely with the: Internet Crimes Against Children Task Forces, Various elements of the Department of Justice's Project Safe Childhood initiative, and Non-Governmental Organizations, like the National Center for Missing and Exploited Children, to maximize the effect of these international investigations and thereby protect children. I hope my remarks today have been helpful and informative. Thank you for inviting me and I will be glad to answer any questions you may have at this time.