SD CA Law Approved, 10-2 Against Jolene’s Law

Hello!?!?….  Can you hear????  That’s Our Children, and NO ONE is answering their desperate, but almost unheard cry for help.  One reason you can barely hear it is because it has gone unanswered for nearly 7,000 years; the main reason it is so quiet is because danger is so near.

I hope you will read this very closely, for only then will you begin to see the truth of what is all around you.  You will see and begin to realize that a very large percentage of Our elected Representatives could care less what YOU AND I think or feel.  They KNOW that only a small percentage of people like us care enough about anyone other than themselves, to even bother to read articles like this.

HELLO!!!!

Child abuse law changes approved, continued study defeated
10-2 against a proposal to allow the Jolene’s Law Task Force to continue

PIERRE, S.D. (AP) — A state House committee has approved a measure aimed at making child sexual abuse reporting clearer but has defeated a plan to authorize more time to study how to address the issue in South Dakota.

The House State Affairs Committee voted unanimously on Wednesday to approve a plan that would require a mandatory reporter who first hears a child’s account of abuse to be available when it’s reported.

But the panel voted 10-2 against a proposal to allow the Jolene’s Law Task Force to continue working this year. The panel is named after Jolene Loetscher, of Sioux Falls, who was a victim of sexual abuse as a teenager and has talked publicly about her story.

Loetscher says the vote is heartbreaking because there’s “so much more we need to do.”

Largest Ever Child Abuse Images Bust

Police may charge data centre in largest ever child abuse images bust

Canadian police have seized over 1.2 petabytes of data from the dark net – more than four times the amount of data in the US Library of Co​ngress – in what could be the largest child abuse image investigation ever.

In what would be a game-changing shift in prosecutorial tactics, police are considering going beyond the traditional method of prosecuting individuals and will potentially also press charges against the owner of the drives that hold that material – most likely, an Ontario data centre that houses the abusive images.

As Motherboard reports, police developed in-house password cracking software that’s slowly churning through the massive information trove.

Up to 7500 people – the number of unique IP addresses associated with the data seized – from nearly 100 countries could be implicated.

Scott Tod, Deputy Commissioner of the Ontario Provincial Police (OPP), spoke to Motherboard in late February following an address to a crowd of defence specialists.

Here’s what he had to say about the data centre, which investigators have refrained from naming:

  • What we are alleging is occurring is that there are individuals and organizations that are profiting from the storage and the exchange of child sexual exploitation material.

They store it and they provide a secure website that you can log into, much like people do with illegal online gaming sites.
Tamir Israel, a staff lawyer at the Canadian Internet Policy & Public Interest Clinic (CIPPIC), said that charges against the data centre will likely depend on whether employees were aware of the activity taking place on the file-sharing service the data centre hosts.

Such awareness isn’t the norm, he said:

  • There’s no proactive obligation to investigate what happens on your service. If you do become aware that something is there, there’s a reporting obligation.

But usually data centers aren’t actively looking through their stuff, so it’s reasonable to say that they wouldn’t have come across that.

Hanni Fakhoury, senior staff attorney at the Electronic Frontier Foundation, told Motherboard that going after a web hosting server is a novel approach:

  • What I’ve traditionally seen is very targeted investigations. Agents will go undercover on some peer-to-peer site and see files that are available for sharing, and they’ll engage a person and trade photos with them. Or they’ll see that the person is sharing child pornography files and take investigative steps to uncover that specific individual and arrest them. That’s very common, that’s bread and butter how these sorts of cases are done.

What is new is this approach that says, you know what, there’s a web hosting server out there that hosts a lot of child porn. It also hosts other stuff that we’re not interested in, but it hosts a lot of child porn, so we’re going to take down that whole host.

Police have developed password-cracking software that can cycle through 500,000 possibilities per second in order to sift through the seized data, which contains approximately 1.5 million compressed, password-protected RAR files, stored and analysed on the additional hardware they’ve had to purchase for the job.

Out of the 7500 IP addresses police have identified, 2200 of the users are in the US, 843 are in Germany, 534 are in Japan, 457 are in Russia, 394 in Canada, 380 in the UK and 374 in France.

Until all the files have been password-cracked, however, there’s no saying how many of those files actually contain child porn. In fact, it’s probably a mash-up of abusive images and more innocent material.

From Tod:

  • We’re not making any assumptions of how many are actually criminally guilty at this time, or criminally responsible. But we’re certainly a size of information that’s being traded that we know is illegal material of volumes that we’ve never seen before.

This is the first investigation of this scale, to my knowledge—in North America, if not worldwide.