Occurrences And Techniques In Operation Snapshot

807 Words4 Pages

Within all three Operation Snapshot sting operations a myriad of obstacles and barriers stand in the way of investigating units, from identifying the individuals who are committing these horrendous acts. Communications system are an ever changing, and ever complex devices that increase in privacy and security every day. The individuals that are committing acts related to child exploitation are, taking measure to make their systems more covert, by hiding their IP address through Virtual Private Networks (VPN) (cite I video). Moreover, making it increasingly difficult to locate the individual that is responsible. Furthermore, wireless internet presents its own obstacle for officers (cite track). Wireless networks exist everywhere in now day society, …show more content…

One tool that helped agencies in the fight against child exploitation was in fact Microsoft, they assist law enforcement in creating image-matching technology to assist online service providers an effective tool to take more proactive action in stopping such distribution of images of child sexual abuse (cite Microsoft). In relation to online strategies, browsing file-sharing websites and searching known acronyms present with child exploitation. When done hundreds of results with arise from computers that are currently in possession of files matching that search term (cite track). When clicked upon it brings it file becomes available for download, showing the locating of the IP address (cite track). A single IP address with a vast collection of child exploitation material, is red flagged then investigated in determining in the material is in fact child pornography (cite timeline). Another technique used is, luring of an individual by an officer in portraying to be a child of interest for such individual, and agreeing to make psychical contact with the suspect (cite I …show more content…

This certain career role supports the officers involved by, getting the child that has been through such horrific event someone that is specially trained to talk to them (cite human). Technological crime unit, is another role that has a major part in Operation Snapshot. This unit assists the officers in, sorting through the evidence gathered, and cataloguing everything single piece of evidence (cite timeline) In addition, they look through every image deciding whether or not, it is child pornography material (cite timeline). In doing so they copy all the hard drives to preserve the integrity of the originals (cite timeline). Lastly, the RCMP integrated ICE team with municipal agencies within the province of the offence, are an immense role in each operation. These teams peruse such individuals that are either luring, possessing, distributing, or making child pornography (cite child porn

Open Document