this snippet from an unrelated recent case describing some of the sick ways paedos connect, also wondering if anything was found encrypted on bs or others computers, or are they old school?
There are a few key ways paedophiles work. Some operate in isolation, targeting children for grooming and trying to solicit photos, and they existed in other environments before the internet.
Then there’s a newer, online breed, who collect photos and videos of children and do not make contact. Then there are those who do make contact. Finally, you have those who like to connect with like-minded individuals.
“They’ll talk about what they like to do, that’s very common,” said Ms McLean. “They exchange photos, say, ‘I’ve got this, what would you like to do to them?’
“Others try to impress with what they can get. They might say, ‘If you want to be part of our chat, you need to provide six photos of girls under six.’ You’re expected to trade something. And then they think, if someone’s giving this stuff to me, they’re probably real.”
http://www.news.com.au/lifestyle/pa...s/news-story/82052b43cc9139a72fa1d9105fb8e23f