Category Archives: NCMEC

TX Attorney General CEU Arrest Child Sex Offender

.jpg photo of Child Predator arrested for Child Pornography
Thomas Lee Scott, 58, of Lorena Texas.

AG Paxton’s Child Exploitation Unit Arrests
Lorena Man for Possession of Child Pornography

AUSTIN, TX  –  Attorney General Ken Paxton today announced that the Child Exploitation Unit (CEU) of his office arrested Thomas Lee Scott, 58, of Lorena, on two counts of Possession of Child Pornography, a third-degree felony punishable by up to 10 years in prison per charge.

Investigators discovered child pornography being shared from a device with an IP address connected to Scott’s home in Lorena.

While executing a search warrant at his home, investigators located child pornography and seized several digital storage devices that will be examined by the attorney general’s Digital Forensics Unit.

Scott, a registered sex offender, was convicted in 1991 of child molestation in Indiana.

The Texas Attorney General’s Office works to protect children by using the latest technology to track down some of the most profoundly evil predators online.

The CEU proactively seeks out and arrests predators who commit crimes against children using technology and online sources.

Attorney General Paxton urges all parents and teachers to become aware of the risks our children face on the internet and take steps to help ensure their children’s safety.

If you suspect someone is producing or downloading child pornography you can report it to NCMEC

For more information on cyber safety, please visit: https://texasattorneygeneral.gov/initiatives/cyber-safety/

TX AG CEU Rounds Up Woodway Purveyor Of Child Porn

.jpg photo of Child Pornographer
Charles David Baker, 23, of Woodway Texas.

OAG’s Child Exploitation Unit Arrests McLennan County Man for Possession of Child Pornography

AUSTIN, TX  –  Texas Attorney General Ken Paxton announced today that the Child Exploitation Unit (CEU) of his office arrested 23-year-old Charles David Baker, of Woodway, on two counts of Possession of Child Pornography, a third-degree felony.  Baker could face up to 10 years in prison per charge if convicted.

Following a CyberTipline report from the National Center for Missing and Exploited Children involving the upload of an image of child pornography to an email account, CEU investigators executed a search warrant at Baker’s residence, where child pornography was found on his personal computer.

Investigators seized several additional digital storage devices that will be examined by the attorney general’s Digital Forensics Unit.

During an interview, Baker admitted the email account was his.

He was transported to the McLennan County Jail where he will appear before a magistrate.

The Texas Attorney General’s Office works to protect children by using the latest technology to track down some of the most profoundly evil predators online.

The CEU proactively seeks out and arrests predators who commit crimes against children using technology and online sources.

Attorney General Paxton urges all parents and teachers to become aware of the risks our children face on the internet and take steps to help ensure their children’s safety.

If you suspect someone of producing or downloading child pornography you can report it to NCMEC.

For more information on cyber safety, please visit: https://texasattorneygeneral.gov/initiatives/cyber-safety/

Child Safety & Prevention Series #5

.jpg photo of NCMEC graphic
Important things to consider before allowing your child to stay home without you.

Staying Home Alone

With everything parents have to juggle these days, the time may come when families have to leave a child home alone.

There are a number of important things to consider before allowing your child to stay home without you.

You should…

  • Assess your child.  Make sure he or she is mature enough to handle this responsibility.  Ask your child how he or she feels about being alone.
  • Define rules and expectations to help ensure your child maintains a daily routine while home alone.
  • Keep a list of numbers close to the telephone including those for you, other trusted adults, 911 and other emergency services.
  • Create practice situations and be sure your child understands what to do in specific emergencies such as a fire or loss of electricity.

Make sure your child knows…

  • His or her full name, address and telephone number along with your full name and how to reach you.
  • He or she should never open the door for someone unless that person is on a preapproved list of trusted adults you have provided.

Also make sure your child knows how to…

  • Contact 911 in case of an emergency.
  • Carry his or her key so it is hidden and secure.
  • Lock the door after entering and make sure the home is secure.
  • Tell callers you’re unavailable instead of saying he or she is home alone.
  • Check with you immediately upon returning home to let you know he or she has safely arrived.

For more information about child safety, visit MissingKids.com

NOTE:  This is not the property of NOT IN MY WORLD!!!!, we are a self-supporting information center for parents, families, and the public, to help all children, who are the future of our world; by raising awareness to Child Abuse, and it’s lifelong detrimental effects.

We want to say THANK YOU to the National Center for Missing & Exploited Children, and the U.S. Department of Justice for allowing us the use of so many resources to properly educate our staff, and also to pass along this valuable information and resources to parents, families, and the public.

National Center for Missing & Exploited Children®
http://www.missingkids.com
1-800-THE-LOST® (1-800-843-5678)

Dru Sjodin National Sex Offender Public Website
THE U.S. DEPARTMENT OF JUSTICE
NSOPW
https://www.nsopw.gov

Got 2B Safe – My Rules

.jpg photo of NCMEC Logo
Join with us in donating to this worthy cause

Knowing My Rules for Safety

  1. I CHECK FIRST with my parents, guardians, or other trusted adults before going anywhere, helping anyone, accepting anything, or getting into a car.
  2.  I TAKE A FRIEND with me when going places or playing outside.
  3.  I TELL people “NO” if they try to touch me or hurt me.  It’s OK
    for me to stand up for myself.
  4.  I TELL my trusted adult if anything makes me feel sad, scared,
    or confused.

Sometimes there are people who trick or hurt others.  No one has the right to do that to you.  So use these rules, and remember you are STRONG, are SMART, and have the right to be SAFE.

Always:

  • CHECK FIRST
  • TAKE A FRIEND
  • TELL PEOPLE “NO” IF THEY TRY TO TOUCH YOU OR HURT YOU
  • TELL AN ADULT YOU TRUST IF ANYTHING HAPPENS

KidSmartz is a child safety program that educates families about preventing abduction and empowers kids in grades K-5 to practice safer behaviors.  This program offers resources to help parents, caregivers, and teachers protect kids by teaching and practicing the 4 Rules of Personal Safety using tips, printable activities, quizzes, articles, music, videos, and more.

1-800-THE-LOST (1-800-843-5678)
http://www.missingkids.com

Resources:

National Center for Missing & Exploited Children
KidSmartz.org

The Fight For All Children Needs You

.jpg photo of Child Sex Trafficking graphic
The internet has created a lawless space for predators to buy and sell people.

How tech companies are trying to
combat trafficking

Sex trafficking and human slavery are certainly nothing new, but the internet has created a lawless space for predators to buy and sell people.  Today, more than 150,000 escort ads are posted in the US every day, many of them for children.  The human trafficking industry enslaves an estimated 27 million people worldwide.

Now, an organization is turning to the very features of the internet that make trafficking so widespread to combat it.  Thorn partners with technology companies like Google, Pinterest, Facebook and others to help identify and rescue children, and possibly catch predators.

Last month, a video of Thorn founder Ashton Kutcher went viral when he gave very personal testimony to the US Senate on the tragedy of child trafficking.  Earlier this year, Sen. Bob Corker of Tennessee sponsored a bill that eventually became a law to direct $50 million in federal money annually to combat sex trafficking and human slavery in the US.

Following Kutcher’s Senate speech in February, the White House – led by Ivanka Trump – invited a number of anti-trafficking groups in to discuss what can be done.  Policy proposals may follow.
Traditionally, law enforcement efforts to combat trafficking have been insufficient, given the fluid nature, anonymity and enormous reach of the internet.  Thorn’s approach is interesting because it creates tech tools specifically geared to helping the authorities.

In 2011, law enforcement officials in the US turned 22 million images and videos of child abuse over to the National Center for Missing and Exploited Children to identify the victims, according to the center’s US Sentencing Commission testimony cited by Nicholas Kristof in The New York Times.  In the US alone, 9 million computer IP addresses were tracked sharing child pornography files.  The sheer volume of victims and perpetrators is overwhelming for law enforcement.

Child abuse images are often traded on peer-to-peer networks or inside password-protected chat rooms.  Most buying and selling of sex occurs online, on listings sites like Backpage or Craigslist – where escort ads are posted, and customers text in to make contact.  That’s not illegal.  The challenge for law enforcement is that many of those featured in the ads may be underage girls who are trafficked – mixed in with women posting ads voluntarily.

“These transactions don’t happen in the open,” says Julie Cordua, CEO of Thorn.  “I can go on to backpage.com and put my couch up for sale and if I click the next tab I can buy a 14-year-old for sex, and this is not illegal, because an escort is not illegal.  Every day, hundreds of thousands of ads are posted, and some are children, but how do we know?  It’s like trying to find a needle in a haystack.”

Innovations in tech and data science can make that process more efficient.

Thorn is using machine learning, in which computers learn what advertisements represent a child, and create an algorithm to predict what other ads are more likely to be associated with a child.  That, they hope, can reduce the thousands of images of children in circulation.

They’re also using facial recognition software that recognizes signs of aging and can identify children from photos.  They are working with the National Center for Missing and Exploited Children’s database of missing children that could be matched to images from online ads.  This helps detectives in tracking down and identifying children.

There is also a new texting application called Befreetexting designed to reach trafficked children who have sporadic access to cellphones.  “These kids are held kind of captive, so they can’t pick up a phone, but they can text, and so we can create a text hotline,” Cordua says.

By sorting through the images to identify which are children, law enforcement can hone in on victims.  The goal is to get to children as quickly as possible.  That’s just one side of the problem.  Creating technology to go after the predators, either the customer or the pimp, has proven more difficult.