Transcript Slide 1

Detective Shawn M. Bostick
Wichita Kansas Police Department
Kansas ICAC
Challenges to Law Enforcement

Identify and apprehend predators operating in a
constantly changing technically complex
environment.

Facilitate a successful prosecution with a thorough
investigation to prevent further victimization.

Identify children who have been sexually exploited
by predators.

Serve as a conduit to a variety of resources to aid
victims and their families with their recovery.
Goals and Objectives

Reactive Investigations – Knock and Talks,
Search Warrants, victim outcry and other agency
referrals.

Review Officer Safety - The importance of
identifying your suspect before the interview.

Suspect Interviews - Technical aspects to enhance
your interview / interrogation.

Considerations when conducting victim interviews.
These are NOT Victimless Crimes!

Never lose sight of the fact that these are
violent crimes involving real children.

The abuse suffered by these children will
live within them every day of their lives and
is repeated every time an image of their
victimization is distributed.
These Are Not Your Typical Criminals!

Frequently well educated, have established ties to
the community and have had little or no interaction
with police.

Overcome with shame.

Face intense scrutiny by friends, neighbors, coworkers and members of their community.

Reputations are destroyed.

Not only do the children suffer…so does the
suspect’s family.
Offenders: Who are they?

There is no one “profile” of a child predator.
They could be:
Youth coach
Electrician
Lawyer
Reporter
Law enforcement
Businessman
Actor
Salesman
Teacher
Clergy
First and Foremost Considerations
Officer Safety!

Find out everything you can about your suspect and their
associates before conducting an interview or making an arrest.

Assess the risk and determine how you will respond to
decrease the possibility of injury or death to yourself and fellow
officers.

It is not uncommon for suspects to react in an irrational
manner.
Child Porn Suspect Found Dead at Home
Suicide
July 14, 2006
By Dana Willhoit
The Ledger
LAKELAND -- A Lakeland man was found dead at his home Wednesday afternoon, possibly from
suicide, several days after police searched his home for child pornography.
Police served a search warrant on the home of Harry Weber, 68, on Monday. The investigation
started after a female acquaintance of Weber contacted police.
She told them that Weber, whom she barely knew, had made an odd comment to her about how a
man "could fall under the spider bite of a young boy's kiss.“ He then contacted her minor son,
which alarmed her. She then talked to Weber's roommate, who told her that Weber was obsessed
with child pornography, which he downloaded from the Internet, and that he might be stalking
young boys.
When police interviewed Weber, he told them that he had pictures of young boys, which he
described as "child erotica," but denied having child pornography, the report said.
Police later spoke to his roommate, who told them that he had seen Weber download numerous
child pornography images from the Internet, and that he would print many of the images and post
them on foam board to display them around the home.
The roommate said that after the police visited, Weber told him he had gotten rid of some of his
"collections" in trash bins around the city, and asked the roommate to help delete the images from
Weber's computer. The roommate refused, and instead moved out of the house.
Police searched the house Monday, but Weber was not arrested at the time pending a forensic
examination of the computer.
Police were called to the house Wednesday afternoon to do a welfare check on Weber. Police found
Weber dead. The cause of death will be determined by the medical examiner.
Deputy is killed, another wounded
August 20, 2004
FORT LAUDERDALE - One Broward County sheriff's deputy was killed and
another was injured when a child pornography suspect opened fire on them
with a high-powered weapon as they served a search warrant. Detective Todd
Fatta, 33, was killed when shots allegedly fired by Kenneth Wilk, 42, hit him in
the chest, penetrating his bullet-resistant vest. Sgt. Angelo Cedeno, 36, was
shot in the hand and shoulder.
Other officers returned fire at Wilk, but he was not injured and was taken into
custody at the scene. Wilk was held on charges of conspiracy to possess child
porn and conspiracy to obstruct justice.
The deputies were part of a multi-agency task force which combats child porn.
Twice before, task force members had been to the house. Last year, Wilk was
arrested after he threatened officers serving a child porn warrant. Last month,
another warrant was served and Wilk's partner, Kelly Ray Jones, a registered
sex offender, was arrested on charges of using the Internet to send illicit
images of children to an undercover detective. He remains jailed.
After Jones' arrest, Wilk was bragging police had not found all of the child
pornography. Officers returned to search for additional material. When the
deputies entered the house and rounded a corner, Wilk fired at them. Mr. Wilk
had several weapons, several high-caliber weapons around the house.
Preferential Child Molesters
1. Sexual preference is children.
2. Sexual fantasies focus on children.
3. Will use Internet to groom and molest children.
Situational Molester
1. Preference is not children but will
molest them.
2. May/can be violent.
3. Act mat be a result of another crime.
Knock & Talks,
Search Warrants
and
Suspect Interviews
SUSPECT IDENTIFICATION
WHO’S BEHIND THE COMPUTER OR
ELECTRONIC DEVICE?
Internet Service Provider

Subpoena subscriber information including screen
names, e-mail addresses, specific and/or recent
online activity from suspect’s ISP.

This may identify the subscriber but not necessarily
the offender (AOL).

Yahoo! does not verify subscriber information but
does capture and retain the suspect’s IP address at
the time the account was created.

“Online Activity” or “IP History” Logs may confirm if
a suspect was online on a specific date and time but
are retained by ISP’s for varying limited periods of
time.
Suspect Identification

Include in your search any other occupants of the
household and /or any known associates of the
suspect.

Consider non-traditional sources of information.

Any information extracted by suspect during chat
information to include such things as his name,
description, location, telephone number, vehicle
description, etc.
Suspect Identification
Criminal History (NCIC)
Local Law Enforcement
NCMEC
FBI Innocent Images / ICE
Sex Offender Registries
Search Engines (Google, Yahoo!, etc.)
Online Profiles, Brief Cases, Photo Albums (AOL,
Yahoo, MySpace, etc.)
Web Logs “Blogs” (MySpace, Facebook, etc.)
Employment
Weapons Permits
So You Think You’re Prepared for Anything
and Everything…Maybe Not…
Seizing the Computer is Not Enough!
Whether you access your suspect’s
computer through consent or a Search
Warrant…
It’s your responsibility to place the suspect
behind the computer or electronic device!
You must be prepared to conduct a
thorough interview.
The Investigation

Typically this is accomplished through the suspect’s
own admissions during an interview.

Through a telephone call conducted by a victim or an
undercover officer with the suspect.

The suspect’s use of a web camera.

Through a ruse at the suspect’s residence while he
is online.
Executing a Search Warrant

Determine an appropriate approach to include the presence of
a uniformed officer…will it be a knock at the door, a dynamic
entry or something else?

Prepare a written “Operational Plan” that has been reviewed
and approved by your supervisor.

Delegate responsibilities – you can’t conduct a thorough
interview and search at the same time.

Consider utilizing ICAC task force members from neighboring
agencies.

Contact your ICAC if non-sworn or private sector employees
who possess technical expertise are used in Network
investigations.
Planning for Safety

Schedule a briefing to include all of the participating
officers…encourage their feedback.

Distribute a copy of the “Ops Plan” to all of the
participating investigators.

Make certain that participating investigators
understand both the risk and their roles.

Are you confident that you have done everything to
prevent serious harm to your fellow officers?
In the Absence of Probable
Cause…Knock & Talks

The objective is to obtain consent to conduct an onsite search of the suspect’s computer.

Be prepared to conduct an on-site search of the
suspect’s computer.

Once again, keep officer safety in mind…know who
your suspect is, plan your approach.

Should take place where you most likely believe the
suspect and his computer will be located (i.e., home or
office).
The Interview – Your Approach
(some ideas)

Your approach will probably include an element of
deception…

We received a complaint from a child’s parent
regarding your online activities.

We are investigating a runaway and found links to
you on the child’s computer.

Seek written consent to conduct an on-site search of
your suspect’s computer.
Knock & Talks

Non-custodial interview – Miranda warning not
required. Fine line between custodial and noncustodial. Can’t go wrong with Miranda.

Limit the number of investigators initially present to
avoid the impression of a custodial atmosphere.

Document your suspect’s consent with a “Consent to
Search” form signed by your suspect.

Consider having your examiner wait outside until
after you have obtained consent.
CONSENT TO SEARCH
COMPUTER(S), COMPUTER PERIPHERALS, & RELATED MEDIA
I, ________________________________________, do hereby authorize and give my permission
to_____________________________ , who has identified himself/herself to me as a sworn law
enforcement officer, with the necessary assistance of a computer forensic examiner, to make a full and
complete search of my computer (s), computer peripherals and related media located at
___________________________________.
I have been advised by the above law enforcement officer that law enforcement officers are engaged in
an investigation concerning an alleged violation of federal and/or state laws pertaining to Internet
crimes against children, including child pornography. I do further authorize and give permission to take
from my___________________________ located at __________________________, any computer (s),
computer peripherals and related media which may have or might have connection, value or relevance
as evidence in said investigation.
The above law enforcement officer has fully and fairly advised me of my rights as follows:
That I have a right to refuse consent to this search of my property.
That I have a right to consult with an attorney or any other person of my choice prior to giving this
consent and permission to search the above described property.
That any computer (s), computer peripherals and related media found by said officers in the course of
their search can be used as evidence against me or others in a court of law.
I fully understand and appreciate these rights and wish that it be specifically understood that I am
hereby giving consent and permission to conduct the search of the computer (s), related peripherals
and related media solely because of my desire to freely and voluntarily cooperate and assist in this
investigation. I have not been promised anything or been threatened or coerced in any way; nor has
any inducement of any kind been held out to me in return for this consent and permission to search.
Have suspect & witnesses sign with date, time and location.
Knock & Talks

Consider who else may be at the residence
when you plan to do this… wife, children,
friends, other relatives. Need to interview
them also.

Once again, work to narrow your focus by
identifying who uses the screen name in
question.

Don’t be confrontational…give your suspect
an opportunity to explain...to rationalize or
minimize his behavior.

What are you going to say…
To Arrest or Not to Arrest

Based upon individual circumstances.

Is a child at immediate risk? – may include suspect’s
own children, step children or children in the
neighborhood.

Does the suspect work or volunteer in an
environment with children?

Keep in mind does “speedy trial” begin at the time of
arrest. Consult with your prosecutor.

Forensic examination of computers may take days,
weeks or months.
The Lead In…

Have you experienced any unauthorized charges on
your credit card?

Has anyone else recently had access to your
computer? Family members? Friends?

Have you been directed to “offensive” or
“inappropriate” websites?

Have you received any unsolicited “offensive” or
“inappropriate” material?
Debriefing Guides will Help You
Remember to…

Determine the source of your suspect’s child
pornography.

How your suspect obtains child pornography (casual
trading in chat rooms, private groups, file sharing
software, commercial websites).

Determine the frequency / volume of child
pornography sent and received by your suspect.

Identify online associates of your suspect that may
form the basis for “spin-off” investigations.
“Knock & Talk” Considerations

Do you have the technical expertise present to
conduct an on-site search of the computer.

Preview software is not a “one size fits all” product.
Consider having several varieties in your toolkit such
as Knoppix, ImageScan or using EnCase with a
Fastblock device.

Do you anticipate an immediate arrest if child
pornography is found?
How In-Depth is the On-Site Search?

Document all steps taken while conducting the
search.

Does the Search stops when the first image of child
pornography is found if it is for another reason.

Computer should then be seized pending the
issuance of a Search Warrant seeking authorization
for a comprehensive off-site forensic analysis.

What about storage media (diskettes, thumb drives,
CD’s and DVD’s)?
SUSPECT INTERVIEWS
Interview Should Include…

Who lives at the residence?

How many computers are located within the
residence?

Who uses the computers, are they password
protected?

Are any folders/files password protected?

Consider referring to a debriefing guide.
Use the Interview to…

Identify children who may have been
exploited by your suspect.

Identify other offenders known to the
suspect.

Give your suspect the opportunity to write a
note to the “child’s” parent.

Determine what age and sex they preferred.
Themes
Give your suspect an opportunity to confess in a
manner that…

Is psychologically acceptable to him

Makes behavior appear less reprehensible

Minimizes the gravity of the crime

Transfers some or all of the blame to others

Allows them to be seen as the “victim”
GET THEM OUT OF DENIAL STAGE
Rationalization

“I just wanted to tell the child how unsafe it
was to meet a stranger…”

“I would never hurt a child…”

“I didn’t create it…I just downloaded it”

“I gave the child attention he /she was not
getting at home.”
Your Suspect May Want to Blame…

The Child – “She said she was eighteen”

The Victim’s “Uncaring” Parents

Their Own Spouse

Alcohol / Drugs

Depression / Anxiety

Their Own Victimization

Ignorance - “I didn’t know chatting was against the
law.”
Or Technology…

Computers, digital images, video clips

The Internet

Web cameras

Unsolicited sexually explicit e-mail

“Instant Messaging”

Wireless communications – PDA’s cellular phones etc.
Preparing for Your Interview

Review the records you subpoenaed from the
suspect’s ISP – know who you’re dealing with.

Verify through online activity or IP history logs that
someone was “signed on” at the time the image
was transmitted or the chat occurred.

Determine where the suspect’s account was being
accessed from…home, office, library?

Dial-up account information, DSL connections, and
IP address information may link the computer to a
specific location at a specific time.
Videotaping the Interview

Considerations include your agency policy, your
preference and the opinion of your prosecutor.

Videotape captures the unspoken word…the
suspect’s body language.

They can also be a dual edged sword.

Videotape also allows for scrutiny from the defense.
If You Plan to Show the Suspect
Images

Submit the images to NCMEC for comparison with
their Child Victim Identification Program (CVIP)
database.

Your submission should include all images of
children including both child erotica and child
pornography.

CVIP’s report to you will also identify those children
who have been identified during previous
investigations and a law enforcement point of
contact for each child.

Have a pediatrician view the images and offer an
opinion as to the child’s age if the child has not been
previously identified.
Determining Who Your Suspect Is

Body Language.

Ask the occupants who uses the computer

Ask them to identify their ISP and the screen names
/ e-mail addresses that they use to narrow the focus
of your investigation.

What if multiple users share the same screen
name?

Does anyone utilize file sharing (Peer to Peer)
programs?
The Interview

Surprisingly, most suspects will be willing to talk
to you if only to deflect the focus of your
investigation away from other family members.
Interview family members now!

Advise the suspect of his Constitutional Rights as
per the Miranda decision from a written
Rights/Rights Waiver form. Have your suspect
sign the form.

Utilize a “Debriefing Guide” only after establishing
a rapport with your suspect to insure a thorough
interview.

Be prepared to tape record a statement.
The Interview

Most people are more than willing to expound
upon their computer / electronic device skills
without suspicion while being questioned.

Confirm through questioning that your suspect
possesses the computer skills required to commit
what you suspect him of doing…Let him teach
you!

The information you gather may be extremely
important to the forensic examiner. This will
probably be your only opportunity to obtain
encryption keys.
Debriefing Guides will Help You
Remember to…

Establish your suspect’s level of computer skills.

Identify all computers used by your suspect.
(home, work, friend’s house, library)

Identify past / present screen names and
addresses used by the suspect.

Identify places frequented by your suspect on the
Internet (chat rooms, public and groups, peer to
peer networks)
e-mail
Guide for Computer Crime Related
Interview
Date / Time of Interview:
Others Present:
Who resides at the residence:
Formal Education:
Computer Training:
(formal, informal, self taught)
(In your book)
Guide for Computer Crime Related
Interview
Screen Names and Passwords for each user:
E-Mail Addresses for each user:
Storage Media utilized by each user?
(hard drive, diskettes, CD’s, thumb drives)
Has anyone else used the screen name under
investigation?
Who?
Was the password for this screen name shared with
anyone?
Who?
Previewing the Computer During the
Execution of the Knock & Talk or
Search Warrant

To form the basis for an immediate arrest if
warranted.

To identify your suspect when multiple occupants
deny responsibility for online activity.

To encourage additional admissions from your
suspect.
More Thoughts…

When two investigators participate in the interview,
each investigator will come away from the interview
with different impressions.

At some point during the interview, take a break.
Take this opportunity to compare your thoughts with
your partner or anyone else observing the interview.
Discuss what areas need to be addressed or
readdressed.

Keep in mind, your suspect is a risk to himself.
While in your custody make sure that he is under
constant observation.
The Interview…Don’t Forget…

To ask about children they might have offended and
when their sexual interest in children first began.

To always take the opportunity to expand your
interview to include the possibility that your suspect
knows of other offenders or has victimized other
children.

Your suspect’s online contacts are a potential
source for additional investigations.

Just as children minimize or deny the abuse they
have suffered, offenders minimize or deny the
abuse they inflict!
The Ultimate Reward!
I wanted to thank you
for helping cause the
total destruction of my
life. I am 40 years old
and with a 30 year
sentence it looks like I
may never get out.
To be honest with you,
this is really a death
sentence to me.
Child Victim Issues and
Interviews
“One of the greatest challenges a police officer
may encounter may be the interview of a child
about events they have experienced or
witnessed. The goal of an investigative
interview is to obtain a factual statement from
the child.
In recent years, highlighted through court
cases, media and literature, child interviews
conducted by professionals in which children
were victims or witnesses of crimes have been
criticized for the use of poor interviewing
techniques that could be cause for
suggestibility.”
Katie Connell, LMSW, ACSW, Child Interview Specialist
The Compliant
Teen Victim
 Children
who cooperate in their
victimization
 Reluctantly
going along with the
sexual contact in order to receive
other benefits
Victim Issues
 Child
may feel some responsibility
for their victimization
 Some
children are actively seeking
out relationships online
Victim Issues
Victim
interview
 Traditional problems
encountered in interviewing
children
 Child may know more than
investigator about computers
Victim Issues
 Child
may fear punishment for
their behavior and not report
victimization or solicitation
 Disobeying parents’ rules
 Viewing pornography
 Child
may fear losing computer
access
Victim Issues
 Child
has to deal with the fact
that if their image was
uploaded to the Internet, it will
never be recovered
COMPLIANT VICTIMS
Control through seduction/grooming results in:
 Initial cooperation
 Decreases in likelihood
disclosure
 Increase ongoing cases
of
Child Victim Interviews

Realize that children may be further traumatized by
multiple interviews.

Have others on your team observe the interview
from another room. Consider using an earpiece to
let them communicate with you.

Let the child know that others are listening and
watching.

Don’t challenge the child’s perception (He takes
care of me, loves me, buys me gifts, we’re going to
get married, etc.)
Expect Child Victims to Withhold
Information






The child may not believe that he / she is a victim.
Expect child victims to be confused about how they
should feel.
Depression, Withdrawal, Anger, Feelings of Guilt,
Responsibility for the Abuse, Sense of
Powerlessness, Feelings of Worthlessness, Low Self
Esteem.
Could include the stigma of homosexuality.
They may not cooperate because of their
relationship to your suspect. They may minimize or
deny the abuse.
What are you going to tell my parents?
Commonly Recommended Skills

Insure that the child feels physically and emotionally
comfortable at the beginning of the interview

Convey warmth and interest, both through words
and non-verbal cues such as posture, eye contact,
and tone of voice.

Use simple vocabulary and short sentences, as
appropriate to the child’s age.

Ask open ended questions to encourage the child to
give longer, fuller answers in his or her own words.
Commonly Recommended Skills

Encourage the child to describe what happened in
his or her own words, starting at the beginning and
continuing to the end.

Avoid interrupting the child’s statements. Save
specific questions about details until the later parts
of the interview, when the child has finished
describing what happened.

End the interview by describing what will happen
after he or she leaves the interview room.

Provide older children with an opportunity to ask
questions.
Child Victim Interview

Children may tailor their responses in an effort to
provide the “right” answer to please you.

Do not assume that because a child uses a word that
he or she knows what it means OR that both of you
mean the same thing.

Simple words often mean something different to
children than they do to adults, such as “private
place” or “did you go?”

Adolescent Slang
Child Victim Interview

Avoid the use of legal and technical terms.

Use the child’s words for body parts.

Reinforce in the child that he / she did not do
anything wrong. Don’t say, “You’re a victim.”

Remember that interviews are often the target of
defense attorney attacks.
What the Parent’s Response Might
Be…

Denial of clear evidence

Anger and rage

May minimize, de-emphasize or de-sexualize the
involvement of their child

Concerned about the publicity of their child’s
experience

Embarrassment may prevent them from disclosing
child’s victimization or from seeking counseling
PARENT CONTACT

Parent tells you their child is
communicating with an adult / stranger
on the computer.

Can you search the computer if parent
gives you consent?

What will your course of action be?
PARENT CONTACT

Parent gives you permission to assume
child’s identity.
BEWARE!!!
RISK OF ASSUMING
IDENTITY

Child’s style of communication is different
from yours.

Child tells offender that law enforcement
is investigating.

Child continues to communicate with
offender.
SITES THEY MAY USE
Blogs
3D Chat Areas
MySecondLife
There
IMVU
IMVU
My Second Life
Securing Electronic Evidence
When you arrive at the scene:
• Assess the environment and document scene with photography.
• Once the suspect’s computer(s) is/are located be mindful of LAN’s or
portable devices which could store additional evidence.
• Assess the system configuration: what’s running, what’s connected,
and what would be the best way to start collecting.
• Once you begin your collection, begin with the incidentals and
work your scene from the outside-in towards the system.
Photograph the Computer Configuration
ICAC-Search & Seizure-West-061208
Photographs, diagrams, or labels,
will prove to be useful if the system
needs to be reconfigured.
A computer system check list is a
useful tool.
Are you going to collect attachments?
• If not, describe what attachment
was.
• If yes, secure it, separate from
the tower.
Place evidence tape over the power
buttons & ports.
A
B
C
If the computer is on DO NOT shut it off. Unplug from
back of computer.
If the computer is off DO NOT turn it on unless you
have proper training.
Technology
Constantly Changing
&
Constantly Challenging
Trends

Technology Convergence
 Hardware, Software & Services

Mobility
 Portable Devices & Removable Media
 Wireless Technologies

Security
 Encryption
 Biometrics

Lack of or Inaccurate IP Records
 Wi-Fi Hotspots (Open Access Points)
Wristwatch Storage up to 512 Meg
for Less Than $100.00
AND REALLY KEEPS TIME!!
Introducing the Swiss Army USB
Lighter Sized Camera 300 Pics
Don’t Forget the Obvious
The Microsoft Xbox game console has an Intel Celeron 733 MHz processor
(16K L1, 128K L2, 133 MHz FSB), 64 MB RAM, 8 or 10 GB of hard disk
space, a 10/100 Megabit Ethernet adapter, a DVD/CD drive, four (non-standard)
USB ports, and a 130 Watt power supply. New consoles can be bought in in the
United States for $180.
No Towers
Wireless Hard Drives
802.11 Wi-Fi

Increase of Unsecured Public Access
 Airports
 Retail Stores
 Government & Schools

Unsecured Residential Access Point
 Hit the house with the open access point

Unsecured Businesses Access Point
WiFi Cameras

Adding Wi-Fi to a digital camera ought to offer some juicy
possibilities anyway. You could shoot pictures without even
having a memory card: The camera would shunt them
wirelessly to your waiting laptop as you worked. You could
post pictures to your own Web site or a photo gallery site
like Flickr.com while they're still hot off the sensor.
New Technology



Holographic Storage
 3-Dimensional / SLM
 No moving parts
 Huge storage possibilities
 Gigs of data on a sugar cube
Molecular Memory
 Stores data on proteins (Bacteriorhodospin)
 Uses lasers to change protein structure for
read write
Best characteristic: CHEAP
New Technology
Biometrics - the identification of
individuals using biological traits,
such as those based on retinal or
iris scanning, fingerprints, or face
recognition.
This is an emerging technology that
is increasingly being used for
information and computer security.
Win7 / Software
Cypher Shield encrypts data as it is stored on the hard disk. Only after inserting
the 64-bit security key can you (or anyone else) use and access those files stored
within. For those with sensitive files and data, now you have the best of both
worlds, data which is both portable and secure.
Stealth Key – USB
• Allows for internet surfing
• All related temp files are stored
• Can serve a dual purpose
Key Catcher
Capture 130,000 Keystrokes
This is a device that can be connected to a keyboard to record all keystrokes. It has a
changeable password, keyword search, enable/disable option, and stores URLs.
Records more than 130,000 keystrokes and does not require any software. Monitor
unauthorized access to your computer or your network. Use it to troubleshoot or make
fixes by tracing back through a users command sequence.
Responding to CyberTips

Source of referral:
 Yahoo
 AOL
 MSN
 Members of the public
 Other ISPs
Peer to Peer Investigations
The pro-active investigation of the Gnutella file
sharing network with the use of legally accepted methods
designed by members of ICAC to identify those
individuals who share child pornography.
1. Limewire
2. Bearshare
3. Gnucleus
4. Shareaza
5. Morpheus
Investigating Child Molesters…
•Can be like swimming
through a river of ooze
and slime
•We pretend to
understand them; we hide
our disgust and we offer
them excuses…
And Then We Provide Them With a
Nice Home
NCMEC Resources

Utilize resources offered through NCMEC:
Family Advocacy Services
– technical assistance, referrals, and
crisis
intervention
Team Hope
– peer support to families
Our Goals Have Now Become Your
Mission

To apprehend offenders and facilitate a successful
prosecution in order to prevent further victimization.

To identify children who have been sexually
exploited by online predators.

To assure that both the child and their family are
provided access to all available resources to aid
them in their recovery.
Questions?
Detective Shawn Bostick
Kansas ICAC Task Force
Wichita Police Department
[email protected]
(316) 337-6557 – Ofc
(316) 305-0600 –Cell