August 1, 2022 (San Diego, CA) The National Center for Missing and Exploited Children (NCMEC) is on the front lines of the fight against online crimes against children. Their ‘CyberTipline’ is the country’s centralized system for reporting the online exploitation of children.
According to NCMEC’s website, “Concerned individuals and organizations make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, and unsolicited obscene materials sent to a child.
In the United States, there are over 60 regional ICAC Task Force agencies representing almost 5,500 individual agencies.
Sergeant Garrick Nugent is commander of the San Diego ICAC Task Force. His task force consists of roughly 33 different agencies that endeavor to work together to investigate cybercrimes against children in San Diego, Imperial, and Riverside Counties. According to Nugent, most investigations begin with NCMEC, which contacts San Diego ICAC when it believes there’s a local case. These tips, referred to as CyberTips, number in the thousands each year for San Diego ICAC alone. And that number has risen consistently over the past five years.
“I truthfully believe there are more cases,” said Nugent in a 2020 interview with a CBS affiliate in San Diego. “I wish I could say we are (keeping up with the volume). We have both children and predators that are at home. They have unprecedented access to the internet. They’ve got lots and lots of time on their hands and therefore I think we’re seeing the increase as a result.”
Dealing With Growing Volume
With each CyberTip comes a host of investigation intelligence including perpetrator usernames, unique IP addresses, suspect information, Internet Service Provider details, and much more. CyberTips also include disturbing multimedia evidence of child sexual assault materials (CSAM) that must be verified by the task force. Each CyberTip must be downloaded, opened, reviewed, verified, prioritized, and assigned to investigators who already maintain a full plate of cases to investigate. To say the problem is overwhelming is an understatement.
Since 2020, however, Nugent’s ICAC task force has worked in partnership with Texas-based Case Closed Software to develop innovative new systems designed to simplify and speed up the entire process of triaging and managing CyberTips.
The new system was implemented last year and now, according to Nugent, “greatly helps his ICAC task force to efficiently triage the NCMEC CyberTips and to control, direct, organize, review, and track our multi-agency investigations into child abuse and exploitation.”
Working Hand in Hand to Solve Problems
A quote from Nugent on Case Closed Software’s website states “This software is a must-have for ICAC units.”
Douglas Wood is the founder and CEO of Case Closed Software. According to Wood, his company has unique functionality to allow near-instant triage of CyberTips.
“As a result of our unique partnership with San Diego ICAC, users can simply save CyberTips to our CJIS-compliant cloud service, and moments later view all pertinent information for quick and effective triage”, says Wood. “They can then be assigned to any task force case agent who can use the ICAC investigation case management system to work more efficiently through investigations and prosecutions.”
The Crimes Against Children Conference
In a joint announcement, Case Closed Software and San Diego ICAC Task Force stated support for the upcoming 34th annual Crimes Against Children Conference (CACC) in Dallas, TX beginning August 8, 2022.
According to Case Closed Software, conference attendees will be able to see the ICAC task force software in action at the Exhibitor’s Hall. CCAC is presented annually by the Dallas Children’s Advocacy Center and provides training to agencies in the fields of law enforcement, social work, child protective services, child advocacy, therapy, and medicine who work directly with child victims of crime.
A large, multi-jurisdictional drug task force in Texas has turned to Case Closed Software™ in its fight against drug trafficking, in partnership with the U.S. High Intensity Drug Trafficking Area (HIDTA) Program.
The drug task force consists of several county and local law enforcement agencies in conjunction with the District Attorney’s Office.
The HIDTA program, created by Congress with the Anti-Drug Abuse Act of 1988, provides assistance to Federal, state, local, and tribal law enforcement agencies operating in areas determined to be critical drug-trafficking regions of the United States.
The HIDTA’s mission is to reduce drug availability by creating intelligence-driven drug task forces aimed at eliminating or reducing domestic drug trafficking and its harmful consequences through enhancing and helping to coordinate drug trafficking control efforts among federal, tribal, state and local law enforcement agencies.
By deploying Case Closed Software, agents across the county can track cases, suspects, reports, evidence and an array of other information to increase prosecution and conviction rates.
Investigations of human traffickers, and the subsequent rescue of victims, is a very complex undertaking. Unlike more traditional criminal investigations, there is rarely ‘one suspect’, ‘one victim’, or ‘one location’.
Instead, the crime of human trafficking takes place in a shady world that consists of multiple entities. Multiple perpetrators who work for multiple criminal organizations. Multiple victims who are trafficked by multiple pimps in multiple locations. These variables can make human trafficking a hidden crime that is difficult to investigate. The cost of not investigating, however, is the loss of lives, the loss of freedom, and the loss of innocence.
One particularly complicating feature of human trafficking investigations is the relationships between victims and traffickers. Traffickers initially use force, fraud, or coercion to lure their victims and force them into labor or commercial sexual exploitation. They seek out victims who may be susceptible to their lies for a variety of reasons including economic hardship, psychological or emotional instability, or other socio-economic disadvantages.
Once lured by the traffickers, victims rarely have an opportunity to speak out or call for help. Language barriers, fear of their attackers, lack of a social safety net, and a general feeling of helplessness overwhelm the victims. Thus, the crime becomes difficult to investigate.
But investigate we must. The cost of turning our backs on this global problem is simply too high.
This overview will focus on some best practices for managing investigations into human trafficking, the capture of perpetrators, and the rescue of victims. A haphazard approach to these sensitive and complex investigations is likely to cause more harm than good, and these best practices are designed to help your organization maximize your productivity and safely rescue more victims.
Best Practice #1 – Stay Organized
The first best practice we need to discuss is ‘Staying Organized’. What might start off as a Tip that a young girl is being sold for sex in a local hotel may quickly grow in scope to include multiple victims, multiple locations, multiple pimps, and multiple abusers. These criminal enterprises thrive in the dark and, like cockroaches, simply scatter and disappear once light is shone. The practice of staying organized helps ensure that no intelligence or evidence falls through the cracks, giving the traffickers time to scatter and hide.
Use investigation case management software. There are simply too many ‘moving parts’ within a human trafficking enterprise to attempt to stay organized without a purpose-built database. Spreadsheets, notes, cloud folders… these are all yesterday’s tools that cannot adequately manage today’s investigations.
With your case management software, track every tip that you receive. Some tips may be stronger than others. Some may lead to full-blown investigations, and some may not. In any case, track and store each tip that you receive as you never, ever know when information from those tips may become relevant to your ongoing investigations.
Triage every tip you can. Spend a moment to search your case management system to determine if anything about a tip relates to any current or past investigation. You can’t do this with paper files or spreadsheets. Perform some online research on the subject(s) of the tips to gauge how reliable the information might be. If the tip initially lacks the actionable or credible information to assign resources, keep the data in the case management system for future use. If the tip does contain actionable and credible information, use the case management system to prepare an actual Investigative Case and assign resources immediately.
Importantly, in terms of Staying Organized, use your case management process to track each action being taken on the investigation. Did someone perform some Open Source Intelligence on the suspected location? Log that information electronically so that it does not fall through the cracks.
Has an agent visited the suspected location to determine if there are likely victims there? Log that into the system. Store any videos or photographs that the investigator made and attach them right to that case.
Log and maintain notes and related files on every action taken on your human trafficking cases. Make them safe, secure, and easy to access by other team members.
Organization is the KEY to any criminal investigation, and even more so for investigations into human trafficking.
Best Practice #2 – Securely Share Information in Real-Time
Investigations into human trafficking and victim rescues are complex and cannot occur in a vacuum. Much like the criminal enterprises themselves have multiple roles such as kidnappers, transporters, handlers, and pimps for example, so must your investigation team have specialized roles. Your undercover ‘john’ cannot be the same as your public-facing advocate, for example.
The key to ensuring that everyone involved in the investigation is successful is sharing information. In an environment where traffickers are always on the lookout for potential risks to their operation, it’s of utmost importance that your operational team all be on the same page so that no missteps occur.
This type of alerting and information sharing cannot be done by text messages or word-of-mouth. It must occur within a fool-proof system of secure information sharing where there is no room for ambiguity. Lives depend upon it.
All of the actions and intelligence that is gathered during an investigation should be securely stored in your case management system. The moment a member of the investigation team submits new information, all other permitted team members should have secure, online access to the new information whether they are notes, videos, photographs or other file types. The removal of ambiguity or misinterpretation is key to ensuring that all team members are aware of the case status at all times.
As an aside, for multi-jurisdictional investigations, teams should ensure that individual members can view the information in the language of their choice in real-time. If the information was entered by an investigator in Brazil using Portuguese, that information should immediately be readable to a team member in Colombia who understands only Spanish. Always focus on ensuring your team members have access to accurate information in real-time. When time is lost, the cockroaches scatter.
In those unique situations where individual team members do NOT require access to the information, perhaps because an investigation is particularly sensitive or involves public officials, your case management system should have capabilities to disallow them from viewing the update. This keeps information in the correct hands, while still furthering the integrity of the data-sharing requirement.
Only when information is shared in real-time can managers and team leaders best determine the next steps for the investigation and rescue of victims.
Best Practice #3 – Maintain Investigation Privacy and Integrity
As mentioned above, human trafficking organizations are like cockroaches. The moment they sense something is going to shine a light on them, they disappear into the woodwork. This most tragic of outcomes is painful for both the investigators and victims alike.
Keeping the investigation lights off, therefore, must be a strategic goal of human trafficking investigations. Assigning roles to your team, and ensuring that all members are adhering to those roles, is one way to keep your actions covert and secure. If a team member’s role is to pose as an interested buyer of sex, that team member should probably not also be involved in general reconnaissance of crime scenes where he or she may be recognized.
Another way to ensure privacy and integrity is to utilize cutting-edge access policies to ensure that information is not accessed by outsiders or, worse yet, an insider to your team. Ensure, therefore, that EVERY SINGLE KEYSTROKE into your case management system is logged and reviewable. If your suspect organization packed up and left mere days before your major rescue and arrest operation, its important to know how that happened. Who accessed the information in your case management system, and why?
Make sure that the information your team is electronically storing is secure. Very secure. Use globally recognized and proven data security standards to protect all data and access to it. Ensure that all team members are trained and well-versed on any systems you are using for investigations.
There can never be too much integrity in a human trafficking investigation, and there can never be too much privacy. Loose lips sink ships. The same goes for loose investigation procedures. The line between a rescued victim and a lost opportunity is thin. Use investigation privacy and integrity to walk that line more effectively.
Best Practice #4 – Share Information with Senior Law Enforcement or Trusted Partners
As a team of human trafficking investigators, you recognize the seriousness and horror of human beings – like you, like me, like our daughters, sons, and grandchildren – being bought and sold for pleasure. You understand the misery of the victims and feel compelled to help. Good. That makes you a good person.
Law Enforcement agencies, however, do not typically act as emotional human beings. They have full caseloads involving homicides, drugs, corruption, and a host of other traditional crimes. Too often, they view human trafficking as merely ‘prostitution’. If a person wants to sell his or her body in exchange for money, there are no victims and, therefore, these cases can often receive a very low priority. Many times, they are dismissed out of hand.
The job of the human trafficking investigation team, therefore, is to get the attention of senior local law enforcement partners in a direct and meaningful manner… one that compels the officers to work with your team in rescues and arrests.
Our history and background suggest that engaging senior law enforcement ‘too early’ adds risk to the investigation. Remember, loose lips sink ships, and these cases are often viewed as unimportant.
Sadly, our experience also shows that involving senior partners ‘too late’ is problematic as police departments are often reluctant to become involved in situations that they have not directly controlled and cannot easily verify the integrity of the work done prior to their involvement.
So, the answer of when to involve your senior partners is unique to each case and each situation. That decision can’t be covered in detail here. Instead, the method used to involve local senior law enforcement – whenever that transpires – is a factor that you can and should control to maximize the potential for a successful operation.
Going in to meet with your prospective law enforcement partner should be a pleasant experience. Your team has built a good case and you’re ready to involve the authorities to help finalize the operation. Going in unprepared, however, will result in disappointment or disaster. As advocates for the prosecution of these types of crimes, you’re full of passion. Best practices, however, show that it is equally important to be full of actionable facts, evidence, and proof.
Therefore, best practices suggest that you build a ‘case file’ as you prepare to meet with law enforcement or senior management. On television, they sometimes call the visual representation of this case file a ‘murder board’. Make sure you have one. Make sure your case file lists ALL of the entities involved in your case. Make sure it includes all of the specific actions you’ve taken. Make sure it includes all of the audio, video, photos, and other evidence you’ve gathered.
Make sure the case file clearly shows the human trafficking operation. Who is in charge? Who are victims? What locations are involved? Who are the supporting witnesses?
Without an easy-to-digest case file, your chance of getting senior law enforcement’s attention diminishes quickly. So, utilize your case management system to very clearly outline the case in a compelling and thorough manner.
Best Practice #5 – Plan, Plan, and Plan Again
The final best practice is Operational Planning. Not to overstate it, but as I’ve said earlier human traffickers are cockroaches. At the first sign of light, you’ll lose them. Every time.
The final best practice for investigating human trafficking is perhaps the most important. Plan.
Plan, then plan again, and then plan once more. Plan your response to every initial tip. Plan your initial investigation work into every case. Plan the tasks and mission of every operative involved in your case. Plan how to get case information into the hands of those who need it in real-time. Plan to keep the investigation quiet so as not to risk the cockroaches running.
Plan every covert operation as if lives depended upon it. They might. Plan in advance what the ‘panic’ word is. Plan in advance what hand signals your operative might use if audio fails. Plan in advance to know where the nearest trauma center is. Plan in advance to know what other risks are present. Dogs? Security? Children?
Plan and make that plan available to everyone who needs to see it. Share that plan in your case management system and know when every user has read it.
Finally, plan to present your case in a compelling manner to senior law enforcement officials. And then work with them on a plan to successfully pull victims out of harm’s way and arrest the bad guys.
Summary of Best Practices
We have covered some of the key ingredients to a successful human trafficking investigation and rescue. Of course, no operation ever goes exactly as you expect, but by ensuring that you are following these best practices – staying organized, sharing internal information, maintaining investigation integrity, effectively engaging with senior law enforcement officials, and conducting meticulous planning – you greatly increase the likelihood that your efforts will result in the wonderful rescue of victims and the prosecution and incarceration of the perpetrators.
By Douglas Wood, entrepreneur and investigation management professional.
(April 6, 2021) Austin, TX – Case Closed Software™, a leading provider of investigation case management software to specialized investigation unit, today announced that a large Georgia Sheriff’s Office has signed a multi-year contract for their secure, cloud-based systems.
The Peach State county, serving tens of thousands of residents, selected Case Closed Software after speaking with existing users and testing the functionality with their own data. Case Closed Software will help the county’s Sheriff’s Office and associated Multi-Jurisdictional Drug Task Force work investigations more efficiently with a goal to close criminal cases more quickly.
According to Douglas Wood, President of Case Closed Software, the county selected his company’s offering due to the flexibility and overall feature set it offers.
“We’re thrilled to add this new law enforcement client to our delighted customer base”, said Mr. Wood. “We very proudly focus on specialized investigation units which include state bureaus of investigation, fugitive recovery agents, anti-human trafficking investigators, drug task forces, internet crimes against children units, and local law enforcement.”
Case Closed Software has begun implementation of the software and expects the County to be fully installed and trained by April 30, 2021.
Billy the Kid carved his name into history through his exploits during and after the Lincoln County War. In a career filled with almost impossible escapes and daring acts in battle, the “Kid” nevertheless found himself on the losing side of the war and, in its aftermath, was branded the West’s most notorious and wanted desperado.
Reportedly killed by Sheriff Pat Garrett in 1881, rumors persisted that the Kid survived, and new evidence developed by Cold West Detective Agency may prove that the Kid lived well into the Atomic Age.
Cold West Detective Agency takes a different and unique approach to history. While historians like to ‘study’ it, Cold West detectives actually ‘investigate’ it as a cold case. Working with law enforcement, Cold West detectives bring distinctive and rare expertise to the investigation of historical cold cases.
Blending old-west footwork with leading-edge investigation case management technologies from Texas-based Case Closed Software, Cold West detectives perform robust investigations at these century-old crime scenes.
Cold West picks up where history left off, and that can make some historians uncomfortable. It’s been said that “dead men tell no tales”, but when Cold West’s group of hardened investigators combine their expertise and curiosity with Case Closed Software, these investigations come back alive, and history begins to speak its secrets.
Cold West uses the “posse method”, utilizing experts from any and every field required to move the case forward. They work hand-in-hand with local Sheriffs, police, tech experts, federal agents, historians, and other experts, using cutting edge modern crime scene investigative methods (CSI) to develop never before seen and court-accepted evidence that changes history.
“Case Closed Software has been a game-changer for us”, said Steve Sederwall the co-founder of Cold West and former federal criminal investigator. “Our ability to blend all of our new investigation findings with all of those historical records helps us identify and develop new tips on our historical cases.”
Recently, Cold West – in the midst of investigating another famous old west crime – used Case Closed to develop previously unknown information that could completely change history’s view of the case. That investigation continues today.
“I like to think about how Jesse James or Billy The Kid would react to seeing how the accepted narrative of their demise is being changed through the work of Cold West detectives using modern and leading-edge technology”, added Case Closed Software’s president Douglas Wood.
The Exodus Road, a global organization dedicated to fighting human trafficking, announced today that they have adopted the industry leading investigation case management system from Austin, TX based Case Closed Software.
The Exodus Road fights human trafficking by sending national and foreign operatives to suspected human trafficking locations to gather intelligence and evidence. To date, their organization has been directly involved in the rescue of nearly 1500 victims of human trafficking and the arrests of almost 600 criminals in six different countries. Using Case Closed Software, the company expects to improve these global operations and manage cases more effectively, ultimately resulting in the rescue of more and more victims.
The Exodus Road began through the work of co-founders Matt and Laura Parker who, in 2010, operated a children’s home in rural Northern Thailand. During that time, Matt and Laura were exposed to marginalized people groups – targets for human trafficking. Eventually, Matt began networking with news media and local police to learn about the problem at the ground level. After a period of research, he was deputized by police and started working personally to find those trapped in slavery. Today, they lead a team of 70 staff members, many of whom are national operatives who work closely with vetted police partners.
“With operatives and investigators around the world, we needed a truly powerful and multi-jurisdictional investigation management system,” said Ryan Hill, director of Global Operations at The Exodus Road. “We chose the Case Closed Software solution because of its impressive feature set, multi-language support, and ease of use for our field operatives. Case Closed Software will allow us to stay organized and share case files electronically with local law enforcement agencies around the world. We can even plan rescue operations directly within the system.”
Case Closed Software’s founder and CEO, Douglas Wood, commented “When we first met the folks at The Exodus Road, we were shocked to learn how widespread this criminal activity is. Human traffickers operate in a shadowy underworld that knows no borders and has no mercy for its victims. Case Closed Software is a perfect fit for anti-human trafficking investigations. Our software allows operatives to collect and share intelligence and evidence and helps track the people, locations and other entities involved in these horrendous crimes.”
The Case Closed Software investigation management platform deployed by The Exodus Road includes end-to-end case management with a configurable workflow, tips and leads management, evidence tracking, operations planning, multi-language support, and a host of other powerful features including entity deconfliction and visualization.
About The Exodus Road
For more information, https://theexodusroad.com or email: press@theExodusRoad.com
About Case Closed Software
For more information, https://www.caseclosedsoftware.com or email: info@CaseClosedSoftware.com