ACAMS Today, Sept-Nov 2023 September-November 2023 | Page 122

GLOBAL FINANCIAL CRIME REVIEW
Live online CSE is often facilitated through online chat rooms , social media platforms and communication apps with video chat features . U . S . -based offenders are known to view live online CSE content streamed from high-risk online CSE-facilitating countries such as the Philippines , where English is commonly spoken and internet access is readily available . Facilitators within these high-risk countries generate and distribute online CSE content for financial gain .
Graphic 2 : Live online CSE personas and red flags
Facilitators are typically near their child victims , often related and usually operate alone , committing interfamilial sexual abuse within a home context . Some facilitators may collaborate with others to maximize financial returns . These facilitators interact with offenders globally , receiving payments from multiple regions .
Graphic 2 provides key red flags for offenders and facilitators participating in live online CSE offending .
Define target persona ’ s attributes and behaviors
Reduce the initial data set , based on a lead or intelligence
Further refine first stage results
Live online CSE offender ( U . S .)
Profile
• Typically : Male , working age or retired adult , from high-risk CSE offender country , IT literate
Key ( trigger ) red flags
• Matching known IP address for CSA
• Frequent low dollar payments to high-risk CSE facilitator countries
• Registered child sex-offender
Refinement red flags
• Travel to high-risk CSE facilitating countries
• Purchases on adult entertainment platforms known for CSE content
• Purchases of child-like sex dolls etc .
Live online CSE facilitator
Profile
• Typically : Female , working age adult , from high-risk CSE facilitator country , English skills , easy access to children
Key ( trigger ) red flags
• CSE-keywords in payment references
• Frequent low dollar payments from high-risk CSE offender countries
• Frequent similar payments from multiple unrelated payers
Refinement red flags
• Receiving funds from payment processors , incl . digital currencies
• Payments to advertisers for adult ads
• Purchases on domain registration or to website hosting companies etc .
Source : RedCompass Labs
Detection
Understanding typologies , red flags , and risk exposure to CSAM / CSE / CST activity is just the beginning . The next step is transaction monitoring and investigation . On its own , transaction monitoring is not sufficient . CSAM / CSE / CST activity often involves intricate networks and discreet transactions that might not raise direct alerts . Additional data and enhanced technologies are required to best detect and investigate this activity . The best results are achieved through a combination of intelligence-led models supported by open-source intelligence ( OSINT ), entity resolution , 8 network generation , persona-based models , and machine learning or artificial intelligence ( AI ).
OSINT-curated CSAM / CSE data sets encompass a wealth of carefully verified information , including business names , emails , addresses and phone numbers linked to sex workers , known traffickers , organizations , suspicious entities and high-risk regions . This information is not easily obtained and takes significant effort to collect .
122 acamstoday . org