Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Child Predator screws up, gets caught

0
Pin It

If you’re a pedophile, you’d be wise not to keep any prescription containers in view of a webcam with your lewd pictures. The information on such a bottle is what helped pedophile Stephen Keating get 110 years in the slammer says a CNN article.

4HBut the amazing thing is that the bottle’s information was extracted from a blurry image of it in the background of a photo that Keating took of one of his 14 victims. Keating posted the photo online, not knowing that that innocent little prescription bottle would get him busted—along with the fingerprints that were extracted off his fingertips in the image.

Yes, this is what forensic technology can do these days. Only some of Keating’s name and the prescription number were actually extracted in a photo lab, but it was enough information for a record check of the pharmacy to get his identity.

Homeland Security Investigations Cyber Crimes Center specialist Jim Cole says his Project Vic teamviews half a million images every week.

How does this technology work?

  • Computers use “Photo DNA” to speedily sift through hundreds of thousands of photos, separating previously viewed ones from new ones, sparing investigators from having to see disturbing images more than necessary.
  • Cole says that what used to take nine months now takes one month.

In another case, an image showed a woman and her victim holding a fish at a campground. The woman was a known offender…but where was this campsite?

The image of the fish was sent to Cornell University for analysis of the species: Where is this type of fish found? The location was narrowed down to a specific area, and then the campsite image, minus the offender and young victim, was sent to all the campsite advertisers in that region. They got a hit, and in fact, the reception room of the particular camping grounds had the same image on display. All of this took place in under four hours.

Even a blurry company logo on a shirt can be extracted for identification. In one case this led to a plumbing business where an offender used to work.

Where are all these images coming from in the first place? The public sends in tips to the CyberTipline. So do giants like Google, Facebook and Twitter. Cole says that the advanced technology has caused an exponential increase in the number of victims rescued.

Good guys 1. Predators ZERO.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.

Similar Posts

  • How to prevent your Pics from being lifted: Part 2 of 2
    There are many reasons someone might right-click on your image and “Save image as…” Porn, Sex and Dating Sites A woman might steal your blog headshot and use it for her dating site profile. A perv might take the picture of your child off your Facebook page and put it on a porn site. A person who runs a
  • Is that Viral Story real?
    The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a bicyclist is obviously fake. Isn’t
  • Sorry, stop posing Kids’ Photos online
    Frankly, naked babies shouldn’t be a big deal. If you don’t have naked baby pictures of your kids in the kitchen sink then you aren’t human. BUT….the world has changed. If you compare posting your children’s photos online with whipping out a wallet photo of your toddler daughter in the bathtub to your dinner party
  • How to stop Teenage Sexting
    Sexting is the act of sending images of a sexual nature via cell phone, often naked pictures. Because texting technology is so readily available and easy to understand, parents should be quite leery of telling themselves, “Oh, MY kid would never do that!” Studies showy your kid already did it. 12-17 year olds sext. And
  • How to prevent your Pics from being lifted: Part 1 of 2
    You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission. So how does someone steal your image or use it without your permission? Hacking Hacking is one way, especially if passwords are weak and the answers to security questions can

Comments are closed.

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in
Browse by Month

Browse by Category