top of page

Why OSINT is a Life Saving Tool for Victims, Saving Hundreds of Missing and Exploited Children

CLEARVIEW AI PARTNERS WITH VICTIM RIGHTS ADVOCATE TO PREVENT FRT ABUSE

I am a long-time prosecutor and founder of the National Child Protection Task Force (NCPTF), a non-profit organization which provides investigative resources to under-funded law enforcement organizations. As an advocate of advanced investigative tools like facial recognition technology, I am a strong believer that there should be a balance between ensuring proper guardrails are in place, while also allowing for the effective use of facial recognition technology using an open source database. I have seen first-hand how facial recognition technology has helped hundreds of missing and exploited children and helped identify and apprehend hundreds of sexual predators in multiple states and countries.


Since February 2011, I have been a Deputy Prosecuting Attorney at the Washington County Prosecutor’s Office in Arkansas, where I prosecute felonies. I am also the founder and Chief Executive Officer of NCPTF. The NCPTF operates with approximately 50 volunteers that include active-duty law enforcement officers who volunteer their time to help state, federal, and international law enforcement agencies investigate online child abuse, recover exploited children, and hunt sexual predators and human traffickers.


The members of the NCPTF help provide detectives, analysts, and officers access to investigative expertise and resources that are unavailable or underfunded in most law enforcement organizations. For example, the NCPTF brings together recognized experts in facial recognition technology, strategic legal applications, open-source intelligence (OSINT), cellular mapping and analysis, dark-web investigations, and cryptocurrency to aid law enforcement agencies everywhere.


OSINT is a critical component in the timely identification and rescue of these young victims of violent crimes. In fact, without the ability to effectively process open-source intelligence, our success in these cases would be tragically impaired. I could give you hundreds of examples of children who were being sexually exploited or raped and were rescued solely because of access to OSINT, but most cases follow the same general fact pattern. Law enforcement officers find videos and photos on the dark web of children being raped – many are produced by parents, siblings, or other close family members. Law enforcement knows nothing about these children other than the fact that they are being raped and that their videos and photos are being traded or sold on the dark web.


Using traditional investigative techniques, law enforcement officers must carefully scrutinize every second of these rape videos hoping that the perpetrators will make a mistake and reveal a clue, such as a street sign, identification card, or receipt that could give investigators a lead. On the dark web, predators maintain manuals of changes in the law, technological advances, and the methods investigators use to identify other pedophiles. The ready availability of these how-to manuals means that predators make fewer mistakes that investigators can use to track them, and children continue to be exploited and raped.


Most of the time, law enforcement only has images of helpless children's faces with no way to identify them or bring them to safety. It is fruitless to run the faces of child rape victims, many of whom are prepubescent, through traditional law enforcement facial recognition programs because these programs are typically limited to booking photos. Sometimes, the faces of predators are present, but that is still a long shot as many of the abusers have managed to avoid arrest.


We must use open-source intelligence to identify these victims and these perpetrators. And the best source of this intelligence is publicly available data and images from the internet. But as you can imagine, the vastness of the public internet makes it impossible to effectively search it by a single human investigator or even a team of investigators. It requires working collaboratively with companies that aggregate public data and publicly available images. The data they provide is data that I or any investigator in the world would already have lawful access to, but it would take months, even years, to effectively search it manually. These young victims don’t have months or years, some don’t have hours, before they are violated again, so there is a real urgency in the need to quickly identify the victims and suspects in these cases. The use of modern, high-performing facial recognition technology and aggregated public data and images are crucial to our continued success.


This technology helps protect children who would otherwise slip through the cracks – children who have not been reported as missing or abused and are being raped by their parents, family members, or others close to the child.


Example of Locating Child Using Facial Recognition Technology

In one case here in the U.S., a predator was posting images of the sexual abuse of very young children; the images indicated he had access to children and was actively raping and abusing them. However, one of the pictures he posted included the face of a young teenage girl. Using technology with an open-source database, investigators were able to identify the girl from an old Instagram account she no longer used. This allowed law enforcement to find her and identify the predator, who was actively abusing very young children. This teen’s face would not appear in a driver’s license database or booking photos.

OSINT has been a game changer for rescuing and identifying victims such as children and identifying violent criminals that are from other states and countries. Law enforcement has significantly increased the rate of identifying child victims of sexual abuse online using platforms of aggregated publicly available data and images. In fact, limiting datasets has many unintended consequences, aside from severely limiting its use in child exploitation cases. Restricting a law enforcement agency to look for perpetrators in criminal datasets such as mug shots is inherently biased in itself. It encourages the resolution of crimes that point to repeat offenders and discourages resolution of investigations involving unknown persons that are not in the typical local data set. Citizens should be concerned if the only data its law enforcement is permitted to use is that of its own communities.


In many investigations, but more so related to children, time is never on the side of law enforcement. Trafficking and crimes against children move quickly. A child being sex trafficked could be in one location and then moved to another state the following day (or even that same day). If law enforcement cannot use facial recognition technology promptly– it will likely be too late.


Without facial recognition technology that uses a database of publicly available data and images, we will lose the ability to save hundreds of children from continuing to be raped, and exploited through recordings shared on the internet for the world to see.


___


KEVIN METCALF

Co-Founder, National Child Protection Task Force
Prosecutor, Washington County Prosecutor's Office, AR

Kevin Metcalf is a former federal agent turned prosecutor and founder of the National Child Protection Task Force (NCPTF).The NCPTF brings together experts in legal strategy, OSINT, cellular mapping and analysis, dark web, cryptocurrency, and more to aid law enforcement agencies worldwide on cases involving missing, exploited, and trafficked children. Kevin has assisted with the recovery of numerous missing and exploited children and the identification and apprehension of sexual predators in multiple countries. He is considered an international leader in innovative approaches to synthesizing legal, closed, and open-source intelligence to support missing person recovery, child exploitation, and counter-human trafficking cases worldwide.


Related Posts

See All

Josh Findley

Hoan Ton-That interviews Josh Findley, Special Agent at U.S. Department of Homeland Security

bottom of page