For graph and advanced features, download the full Intel Codex Vault and open it in Obsidian.
Sensitive Crime Intake & Escalation
Purpose: Emergency procedures for handling child safety concerns, terrorism, human trafficking, and other sensitive crimes requiring immediate escalation to law enforcement or specialized agencies.
Table of Contents
- Overview
- Escalation Triggers
- Golden Rules
- Immediate Response Procedures
- Crime-Specific Protocols
- Escalation Contacts
- Evidence Preservation
- Investigator Safety
- Documentation Requirements
- Post-Escalation Procedures
Overview
When to Use This SOP
Immediate escalation required for:
- Child Sexual Abuse Material (CSAM) or child exploitation
- Imminent threat to life (suicide, violence, kidnapping)
- Terrorism or national security threats (attack planning, extremist recruitment)
- Human trafficking indicators (forced labor, sex trafficking)
- Active violent crime (ongoing assault, active shooter)
- Mass casualty planning (bombings, chemical attacks)
This SOP does NOT apply to:
- Standard criminal activity (fraud, theft, drug sales) - continue normal investigation
- Historical crimes with no ongoing threat - document and report through normal channels
- Regulatory violations or civil matters - handle per organizational policy
Legal Framework
Mandatory Reporting Laws:
- United States: Federal law (18 U.S.C. § 2258A) requires reporting CSAM to NCMEC
- European Union: GDPR Article 6(1)(d) permits processing for vital interests (life-threatening situations)
- United Kingdom: Section 47 Modern Slavery Act 2015 requires reporting trafficking
- Australia: Commonwealth Criminal Code Act 1995 (Division 474.22) CSAM reporting
Good Samaritan Provisions:
- Reporting in good faith generally protected from liability
- Privilege applies to mandatory reporters (varies by jurisdiction)
- No duty to investigate beyond reasonable belief
Investigator Responsibilities
You MUST:
- Stop active collection immediately upon discovering sensitive content
- Escalate to appropriate authority within required timeframe (often <24 hours)
- Preserve minimal evidence necessary for law enforcement action
- Protect your own psychological safety (secondary trauma risk)
- Document all actions taken during incident
You MUST NOT:
- Download, view, or store illegal content (especially CSAM)
- Continue investigation without law enforcement guidance
- Share sensitive content with unauthorized persons
- Delete evidence before law enforcement takes custody
- Attempt to contact suspects or victims directly
Escalation Triggers
Tier 1: Immediate Escalation (Within 1 Hour)
Child Sexual Abuse Material (CSAM):
- Images or videos depicting minors in sexually explicit situations
- Grooming conversations with sexual intent toward minors
- Distribution networks for child exploitation material
- Live-streamed abuse or real-time exploitation
Imminent Threat to Life:
- Credible suicide threats with means and timeline
- Active violence or kidnapping in progress
- Specific, credible threats against identifiable individuals
- Medical emergency requiring immediate intervention
Active Terrorism:
- Specific attack planning with date/time/location
- Acquisition of weapons or explosives for attack
- Real-time coordination of terrorist cell activities
- Imminent threat to critical infrastructure
Emergency Contact:
- US: 911 (local emergency), FBI tips.fbi.gov (terrorism)
- US (CSAM): NCMEC CyberTipline 1-800-843-5678 or CyberTipline.org
- UK: 999 (emergency), 101 (non-emergency), CEOP (child safety)
- EU: 112 (emergency)
Tier 2: Urgent Escalation (Within 24 Hours)
Human Trafficking Indicators:
- Evidence of forced labor or sexual exploitation
- Movement of victims across borders or states
- Control through debt bondage, threats, or violence
- Recruitment or advertisement for trafficking purposes
Violent Extremism:
- Radicalization and recruitment activities
- Propaganda distribution for terrorist organizations
- Financing of terrorist activities
- Travel to conflict zones for extremist purposes
Child Endangerment:
- Evidence of physical abuse or severe neglect
- Exposure to dangerous situations or substances
- Abandonment or missing children
- Non-CSAM exploitation (labor, begging)
Contact:
- US: National Human Trafficking Hotline 1-888-373-7888
- US: FBI field office or tips.fbi.gov
- UK: Modern Slavery Helpline 08000 121 700
- International: INTERPOL, Europol (via national contact points)
Tier 3: Standard Escalation (Within 72 Hours)
Serious Crime (Non-Imminent):
- Historical CSAM distribution (no active abuse)
- Completed violent crimes with ongoing investigation
- Large-scale fraud or organized crime
- Cyber attacks or data breaches affecting critical infrastructure
National Security Concerns:
- Foreign intelligence activities
- Espionage or classified information leaks
- Cyber warfare or state-sponsored attacks
- Export control violations (weapons, dual-use technology)
Contact:
- US: FBI field office, IC3.gov (cybercrime), State Department
- UK: National Crime Agency (NCA), GCHQ (cyber)
- Follow organizational escalation chain
Golden Rules
Rule 1: DO NOT Possess Illegal Content
CSAM and Contraband:
- NEVER download CSAM images or videos to your device
- NEVER view CSAM content beyond what's necessary to identify it
- NEVER create copies of illegal material (even for evidence purposes)
- Legal risk: Possession is a felony (US: 18 U.S.C. § 2252, UK: Protection of Children Act 1978)
What you CAN collect:
- URL/link to illegal content (do not click)
- Screenshot of file listing or thumbnail (if no explicit content visible)
- Metadata (filename, file size, hash, upload date)
- Account information (username, profile, timestamps)
- Text of conversations (grooming, planning, coordination)
Example:
✅ ALLOWED:
- URL: https://example.com/file/abc123.jpg (DO NOT OPEN)
- Filename: "IMG_2024_child.jpg"
- SHA-256: a1b2c3d4e5f6... (if already computed by platform)
- Account: @suspicious_user_123
❌ PROHIBITED:
- Downloading file to local disk
- Opening file to view content
- Taking screenshots of explicit imagery
- Sharing file with colleagues
Rule 2: Prioritize Life Safety
Imminent Harm Protocol:
- If you believe someone is in immediate danger, call emergency services (911, 999, 112) FIRST
- Provide dispatcher with:
- Type of emergency (medical, violence, kidnapping)
- Location (physical address if known, or last known location)
- Description of victim and suspect (if applicable)
- Your contact information
- Then escalate internally per organizational policy
What constitutes "imminent"?
- Specific threat with timeline (e.g., "tonight at 10 PM")
- Ongoing violence or medical emergency
- Credible suicide threat with means (e.g., "I have a gun, I'm going to end it")
- Real-time tracking of victim in danger
What does NOT require immediate 911 call:
- Historical events (abuse that occurred in the past)
- General threats without specific timeline or target
- Suicidal ideation without plan or means
- Suspected trafficking without immediate harm
Rule 3: Stop Standard Collection
When escalation triggers are met:
- STOP all active collection activities immediately
- DO NOT continue investigating the sensitive matter
- DO NOT attempt to gather more evidence (law enforcement role)
- DO NOT engage with suspects or victims
- Record only minimal identifiers (URLs, usernames, timestamps)
Why stop?
- Legal risk: Exceeding authorized scope, possessing illegal content
- Evidentiary risk: Chain of custody issues, admissibility concerns
- Safety risk: Alerting suspects, endangering victims
- Psychological risk: Secondary trauma from prolonged exposure
What to do instead:
- Preserve evidence you've already lawfully collected
- Document your findings in escalation report
- Transfer responsibility to law enforcement
- Wait for law enforcement guidance before resuming
Rule 4: Document Everything
Required documentation:
- Date/time of discovery (UTC + local timezone)
- What you found (description without illegal content)
- Where you found it (URL, platform, account)
- What actions you took (preserved, escalated, stopped)
- Who you escalated to (name, agency, contact info, reference number)
- Any law enforcement instructions received
Use Escalation Report Template (see below)
Rule 5: Protect Yourself
Secondary Trauma Risk:
- Viewing traumatic content (CSAM, violence, terrorism) causes psychological harm
- Symptoms: intrusive thoughts, nightmares, anxiety, emotional numbness
- Effects can be delayed (hours, days, weeks after exposure)
Immediate Self-Care:
- Stop viewing traumatic content immediately
- Take a break (walk, fresh air, talk to colleague)
- Notify supervisor of exposure
- Access Employee Assistance Program (EAP) or mental health resources
Organizational Support:
- Mandatory debriefing after CSAM or violent content exposure
- Access to licensed counselor/therapist
- Rotation out of sensitive investigations (if needed)
- Peer support groups for OSINT analysts
Immediate Response Procedures
Step 1: Recognize & Stop (0-5 Minutes)
Recognize escalation trigger:
- Immediately identify content type (CSAM, terrorism, trafficking, etc.)
- Assess imminence of threat (active danger vs. historical event)
- Determine appropriate escalation tier (Tier 1/2/3)
Stop collection:
- Close browser tabs or applications displaying sensitive content
- Do NOT download, screenshot, or save illegal material
- Pause automated collection scripts or tools
- Step away from workstation if needed for psychological safety
Secure workstation:
- Lock screen to prevent unauthorized viewing
- Ensure no sensitive content visible to others
- If working remotely, ensure privacy (no family members nearby)
Step 2: Initial Notification (5-15 Minutes)
Notify supervisor immediately:
Subject: URGENT - Escalation Required - [Case ID]
Supervisor,
I have encountered [CSAM / terrorism threat / human trafficking / imminent danger] during investigation of [brief case description].
Imminent threat assessment: [YES - life in danger / NO - historical or non-imminent]
I have stopped collection and am standing by for escalation guidance.
Case ID: [ID]
Discovery time: [UTC timestamp]
Platform/location: [URL or platform name - DO NOT include illegal links]
Awaiting instructions.
[Your Name]
[Contact: phone/email]
If imminent threat:
- Call supervisor immediately (do not rely on email)
- If supervisor unavailable, escalate to next in chain of command
- If imminent life threat, call 911/999/112 FIRST, then notify supervisor
Step 3: Preserve Minimal Evidence (15-30 Minutes)
What to preserve:
For CSAM:
Platform: [e.g., Telegram, forum, file host]
Account/Username: [suspect account]
URL (DO NOT OPEN): [paste URL without clicking]
Filename(s): [if visible in file listing]
File size: [if visible]
Upload date/time: [if visible]
Context: [how you discovered it, e.g., "found in Telegram channel about CP trading"]
Hash (if available): [SHA-256 from platform, do not compute yourself]
For Terrorism:
Platform: [e.g., Twitter, encrypted chat, forum]
Account(s): [suspect accounts]
Threat description: [specific attack plan, timeline, target]
Imminence: [when is attack planned?]
Location: [target location if known]
Associated accounts: [co-conspirators, group members]
Evidence preserved: [screenshots of text only, URLs]
For Human Trafficking:
Platform: [e.g., classified ads, social media, dark web]
Victim details: [age, gender, location - if known]
Trafficker details: [account, contact info, location]
Evidence of control: [threats, debt bondage, movement restrictions]
Type: [labor trafficking, sex trafficking]
Evidence preserved: [screenshots, archived pages]
Preservation methods:
# Archive web page (text only, no images)
wget --no-check-certificate --page-requisites --html-extension \
--convert-links --restrict-file-names=windows \
--exclude-directories=images,photos,media \
"https://example.com/page"
# OR use web archiving services (safer for sensitive content)
# Submit URL to: https://archive.is/ or https://web.archive.org/
# Calculate hash of URL (not file itself):
echo -n "https://example.com/illegal_file.jpg" | sha256sum
# Result: 5f8d... (use this as evidence identifier)
DO NOT:
- Download files containing illegal content
- Click on URLs leading to CSAM or extreme violence
- Take screenshots of explicit imagery
- Attempt to verify content by viewing it
Step 4: Escalate to Authority (30-60 Minutes)
Select appropriate contact (see Escalation Contacts section below)
Escalation call script:
"Hello, my name is [Your Name] from [Organization]. I am calling to report [CSAM / terrorism threat / human trafficking] discovered during an authorized OSINT investigation.
[If imminent threat]: This is an IMMINENT THREAT requiring immediate response.
Discovery details:
- Date/time: [UTC timestamp]
- Platform: [platform name]
- Type of content: [brief description]
- Imminence: [active/ongoing/historical]
- Evidence preserved: [metadata, URLs, screenshots of text]
I have stopped all collection and am awaiting your guidance. Can you provide a reference number for this report?
Contact: [Your phone/email]"
Information to provide:
- Your identity and organization
- Legal authority for investigation (if applicable)
- What you found (describe, do not show illegal content)
- Where you found it (platform, URL, account)
- When you found it (timestamp)
- What evidence you've preserved (metadata only)
- Whether threat is imminent
- Your contact information
Information to request:
- Reference number or case ID
- Next steps and timeline
- Whether you should continue investigation or pause
- Evidence transfer procedure
- Follow-up contact and timeline
Step 5: Document & Standby (60-120 Minutes)
Complete Escalation Report (use template below)
Await law enforcement guidance:
- Do NOT resume investigation without authorization
- Do NOT delete evidence without authorization
- Do NOT discuss case with unauthorized persons
- Remain available for follow-up questions
Secure evidence:
- Ensure preserved evidence is stored securely (encrypted, access-controlled)
- Do NOT email evidence (use secure transfer method provided by LE)
- Maintain chain of custody log
Crime-Specific Protocols
Child Sexual Abuse Material (CSAM)
Legal Definition (US - 18 U.S.C. § 2256):
- Visual depiction of minor (<18 years) engaged in sexually explicit conduct
- Includes real children, not computer-generated imagery (CGI) or drawings (varies by jurisdiction)
- Possession, distribution, and production are federal crimes
Recognition Indicators:
- Images/videos depicting children in sexual situations
- File names with terms: "pthc" (pre-teen hardcore), "child," age indicators
- Trading or discussion of "CP" (child pornography) or coded language
- Password-protected folders with suspicious names
- Use of Tor, encrypted messaging, or secure file hosts
Immediate Actions:
- STOP viewing immediately - close tab/window
- DO NOT download or screenshot content
- Record metadata only: URL (do not open), filename, account info
- Call NCMEC CyberTipline (US): 1-800-843-5678 or https://report.cybertip.org/
- Notify supervisor and complete escalation report
NCMEC CyberTipline Reporting:
Online form: https://report.cybertip.org/
Required information:
- Type of incident: CSAM, child sex trafficking, online enticement
- Where found: URL, platform, username
- When found: Date/time
- File info: Filename, hash (if available - DO NOT COMPUTE)
- Reporter info: Your contact details
- Additional details: Context of discovery
DO NOT upload CSAM content - provide metadata only
UK Reporting (IWF):
- Internet Watch Foundation: https://report.iwf.org.uk/
- CEOP (Child Exploitation and Online Protection): https://www.ceop.police.uk/
Post-Report:
- NCMEC provides reference number (save in case file)
- NCMEC forwards to appropriate law enforcement agency
- You may be contacted for follow-up (provide cooperation)
- Do NOT continue investigation without LE clearance
Secondary Trauma Protocol:
- Mandatory debriefing with supervisor within 24 hours
- Access to EAP/mental health resources
- Option to rotate off case
- Peer support group referral
Terrorism & National Security
Escalation Triggers:
- Specific attack planning (target, date, method)
- Acquisition of weapons, explosives, or chemical/biological agents
- Radicalization and recruitment to terrorist organizations
- Financing or material support for terrorism
- Foreign intelligence activities or espionage
- Classified information leaks
US Reporting:
- FBI Tips: https://tips.fbi.gov/ or 1-800-CALL-FBI (1-800-225-5324)
- Terrorism-related: FBI Joint Terrorism Task Force (JTTF) via tips.fbi.gov
- National security: Report via organizational chain to FBI/DoD/IC as appropriate
FBI Tip Submission:
Online: https://tips.fbi.gov/
Required information:
- Threat type: Terrorism, espionage, cyber attack
- Imminence: Immediate, near-term, long-term
- Target: Location, organization, individual
- Suspect info: Name, online accounts, location
- Evidence: URLs, screenshots of planning (text only)
- Reporter: Your contact info
Priority flags:
- Imminent attack (immediate FBI response)
- WMD materials (chemical, biological, radiological)
- Critical infrastructure targets (power grid, water, transportation)
UK Reporting:
- Anti-Terrorist Hotline: 0800 789 321
- MI5: https://www.mi5.gov.uk/ (online reporting)
- Action Fraud: https://www.actionfraud.police.uk/ (cybercrime)
International Coordination:
- INTERPOL: Via national contact point
- Europol: Via national law enforcement agency
- Five Eyes intelligence sharing (US/UK/CAN/AUS/NZ)
Evidence Preservation:
- Screenshots of text discussions (no images of violence)
- Account information and timelines
- Network diagrams (associate mapping)
- Archive web pages (propaganda, recruitment sites)
- Do NOT download files (potential malware or illegal content)
Human Trafficking
Indicators (US - Homeland Security Blue Campaign):
Labor Trafficking:
- Debt bondage (workers unable to leave due to "debt")
- Withholding of wages or identification documents
- Restricted movement (locked in workplace, transported in groups)
- Threats of deportation or violence
- Poor living/working conditions (overcrowding, lack of safety)
Sex Trafficking:
- Commercial sex involving minors (any age <18)
- Adults forced into commercial sex through force, fraud, or coercion
- Advertisement language ("new to town," "young," "fresh")
- Third-party control (pimp, trafficker managing victim)
- Signs of branding or tattoos indicating ownership
Online Evidence:
- Classified ads (Backpage successor sites, encrypted messaging)
- Social media recruitment ("modeling opportunities," "work abroad")
- Escort advertisements with trafficking indicators
- Victim posts indicating control or coercion
- Financial evidence (wire transfers, cryptocurrency payments)
US Reporting:
- National Human Trafficking Hotline: 1-888-373-7888 (24/7)
- Text: 233733 (BEFREE)
- Online: https://humantraffickinghotline.org/
- FBI Human Trafficking: tips.fbi.gov (select "Human Trafficking")
- Homeland Security Investigations (HSI): Via FBI or local field office
UK Reporting:
- Modern Slavery Helpline: 0800 0121 700
- Crimestoppers: 0800 555 111 (anonymous)
- National Crime Agency (NCA): Via 101 or online
Evidence Preservation:
# Archive classified ad
wget --page-requisites "https://classifiedsite.com/ad/12345" -O trafficking_ad.html
# Screenshot (capture ad text, posting details, contact info)
# Save to: /Evidence/CASE-ID/trafficking/screenshot_20251005.png
# Document metadata:
# - Ad ID, posting date, location, language
# - Contact info (phone, email, encrypted messaging handle)
# - Photos (save, but do not analyze if potentially underage)
# - Associated ads (same phone number, similar language)
Post-Report:
- Hotline provides reference number and next steps
- May refer to FBI, HSI, or local law enforcement
- Victim identification and rescue (law enforcement role, not yours)
- Continued monitoring may be requested (only under LE guidance)
Imminent Threat to Life
Examples:
- Credible suicide threat with specific plan and means
- Kidnapping or hostage situation in progress
- Active violence (assault, shooting, stabbing)
- Medical emergency requiring immediate intervention
Immediate Actions:
- Call 911/999/112 FIRST (emergency services)
- Provide dispatcher:
- Nature of emergency
- Location (physical address or last known location)
- Victim and suspect description (if applicable)
- Your contact information
- Source of information ("discovered online during investigation")
- Notify supervisor after emergency call
- Document emergency call (time, dispatcher, incident number)
Geolocation Assistance:
# If you have IP address or online account, attempt geolocation
# IP geolocation (approximate only):
curl -s "https://ipinfo.io/8.8.8.8/json" | jq
# Provide to emergency services:
# - IP address
# - ISP/carrier
# - Approximate location (city, state)
# - Timezone (may narrow down region)
# Social media geolocation:
# - Check profile location
# - Check recent posts for geotagged photos
# - Check language, local references, visible landmarks
Information to Provide 911:
"I am calling to report an imminent [suicide / violence / kidnapping].
Location: [physical address OR last known online location]
Person at risk: [name, age, description if known]
Threat: [specific details: weapon type, threat content, timeline]
Source: I discovered this during an authorized online investigation
Suspect: [description, location if different from victim]
My contact: [your phone number for follow-up]"
Post-Emergency:
- Obtain incident/case number from dispatcher
- Document call in escalation report
- Continue cooperation with responding officers
- Preserve all evidence related to threat
Escalation Contacts
United States
Child Safety:
- NCMEC CyberTipline: 1-800-843-5678 | https://report.cybertip.org/
- FBI Child Exploitation: https://tips.fbi.gov/ (select "Child Exploitation")
Terrorism / National Security:
- FBI Tips: 1-800-CALL-FBI (1-800-225-5324) | https://tips.fbi.gov/
- Department of Homeland Security: 1-800-BE-ALERT
Human Trafficking:
- National Human Trafficking Hotline: 1-888-373-7888 | Text: 233733
Cybercrime:
- IC3 (Internet Crime Complaint Center): https://www.ic3.gov/
Emergency:
- 911 (imminent threat to life)
United Kingdom
Child Safety:
- CEOP (Child Exploitation and Online Protection): https://www.ceop.police.uk/
- IWF (Internet Watch Foundation): https://report.iwf.org.uk/
- NSPCC Helpline: 0808 800 5000
Terrorism:
- Anti-Terrorist Hotline: 0800 789 321
- MI5: https://www.mi5.gov.uk/
Human Trafficking / Modern Slavery:
- Modern Slavery Helpline: 0800 0121 700
- Crimestoppers: 0800 555 111 (anonymous)
General Crime:
- 999 (emergency)
- 101 (non-emergency police)
European Union
Child Safety:
- INHOPE Hotline Network: https://www.inhope.org/ (EU hotline directory)
- Europol (via national contact): https://www.europol.europa.eu/
Terrorism:
- Europol Counter-Terrorism: Via national law enforcement
- 112 (emergency)
Human Trafficking:
- EU Anti-Trafficking Coordinator: Via national authorities
Australia
Child Safety:
- ACORN (Australian Cybercrime Online Reporting): https://www.cyber.gov.au/
- AFP (Australian Federal Police): https://www.afp.gov.au/
Emergency:
- 000 (police, ambulance, fire)
Canada
Child Safety:
- Cybertip.ca: https://www.cybertip.ca/ | 1-866-658-9022
Terrorism:
- RCMP National Security: https://www.rcmp-grc.gc.ca/
Emergency:
- 911 (most regions)
France
Child Safety:
- Pharos (Internet-Signalement.gouv.fr): https://www.internet-signalement.gouv.fr/ (CSAM, child exploitation)
- e-Enfance (3018): 3018 (call or text) | https://e-enfance.org/ (child cyberbullying, harassment)
- 119 - Allô Enfance en Danger: 119 (24/7 child abuse hotline)
Terrorism:
- Service Central du Renseignement Territorial (SCRT): Via local préfecture
- Online radicalization reporting: https://www.dgsi.interieur.gouv.fr/dgsi-a-vos-cotes/lutte-contre-terrorisme/signaler-personne-radicalisee
- Anti-terrorism hotline: 0800 005 696 (free, 24/7)
Human Trafficking:
- Contre la Traite: 0 800 40 25 00 https://www.contrelatraite.org/centre-ressources
- Fondation Scelles (anti-trafficking): +33 1 40 26 04 45
Cybercrime:
- Pharos: https://www.internet-signalement.gouv.fr/ (general cybercrime)
- OCLCTIC (cybercrime unit): Via local police or gendarmerie
General Crime:
- Police: 17
- Gendarmerie: 17
- Emergency: 112 (European emergency number)
- Non-emergency: Local commissariat or gendarmerie
Legal Framework:
- Article 40 CPP: Obligation to report crimes to authorities (mandatory reporting for serious crimes)
- Code pénal Article 227-23: CSAM possession, distribution, and production are criminal offenses
- Loi du 21 février 2022: Digital platform obligations to report CSAM and terrorism content
International
INTERPOL:
- Via national contact point: https://www.interpol.int/
Europol:
- Via national law enforcement: https://www.europol.europa.eu/
Evidence Preservation
What to Preserve
Metadata (Always Safe):
- URL or link (do not open if illegal content)
- Platform name (Telegram, Twitter, forum, file host)
- Account username / user ID
- Post or message timestamp (UTC)
- Filename (if visible, do not download file)
- File size (if visible)
- File hash (if provided by platform - SHA-256, MD5)
- IP address or geolocation (if available)
- Associated accounts (followers, contacts, group members)
Text Content (Safe):
- Conversation transcripts (grooming, planning, threats)
- Post text or captions
- Profile bios or descriptions
- Comment threads
- Hashtags or keywords used
Screenshots (Use Caution):
- ✅ Screenshots of text conversations (no illegal imagery)
- ✅ Screenshots of profile information
- ✅ Screenshots of file listings (no thumbnails of illegal content)
- ❌ Screenshots containing CSAM or extreme violence
- ❌ Screenshots containing victim identifying information (unless necessary)
Web Archives (Recommended):
# Submit URL to Archive.is (creates snapshot without downloading content)
# https://archive.is/
# Paste URL, click "Save"
# Result: https://archive.is/abc123 (permanent link)
# OR submit to Wayback Machine
# https://web.archive.org/save/
# Paste URL, click "Save Page"
# Document archived link in evidence log:
# Original: https://example.com/threat
# Archive: https://archive.is/abc123
# Archived: 2025-10-05 14:30 UTC
What NOT to Preserve
Never download or possess:
- CSAM images or videos
- Extreme violence or torture imagery (snuff content)
- Terrorist propaganda containing graphic violence
- Any content illegal to possess in your jurisdiction
Do not create:
- Local copies of illegal files
- Screenshots of explicit illegal content
- Forensic images of devices containing CSAM
- Decrypted versions of encrypted illegal content
Chain of Custody
Evidence Log Template:
# Evidence Log - Escalation Case
**Case ID:** ESC-2025-1005-001
**Escalation Type:** [CSAM / Terrorism / Trafficking / Imminent Threat]
**Date/Time:** 2025-10-05 14:30:00 UTC
**Investigator:** [Your Name]
## Evidence Items
### Item 1: Account Metadata
- **Type:** Account information
- **Source:** Telegram
- **Username:** @suspicious_user_123
- **User ID:** 987654321
- **Profile:** "Selling content, DM for prices"
- **Joined:** 2024-05-10
- **Location:** [Location field]
- **Collected:** 2025-10-05 14:25 UTC
- **Method:** Screenshot of profile (no illegal content visible)
- **File:** ESC-2025-1005-001_telegram_profile.png
- **Hash:** SHA-256: a1b2c3d4e5f6...
### Item 2: Illegal Content URL (NOT OPENED)
- **Type:** URL to suspected CSAM file
- **Source:** Telegram chat message
- **URL:** https://filehost.com/files/abc123 (DO NOT OPEN)
- **Filename:** [redacted - indicates underage content]
- **Context:** Sent by @suspicious_user_123 in response to request
- **Collected:** 2025-10-05 14:26 UTC
- **Method:** Copy URL from message (did not click link)
- **File:** ESC-2025-1005-001_url_log.txt
- **Hash:** N/A (text file containing URL only)
### Item 3: Conversation Transcript
- **Type:** Text conversation
- **Source:** Telegram
- **Participants:** @buyer_account, @suspicious_user_123
- **Content:** Discussion of pricing for "CP" and file sharing
- **Collected:** 2025-10-05 14:27 UTC
- **Method:** Screenshot of text only (no images)
- **File:** ESC-2025-1005-001_conversation.png
- **Hash:** SHA-256: f1e2d3c4b5a6...
## Chain of Custody
| Date/Time | Action | Custodian | Notes |
|-----------|--------|-----------|-------|
| 2025-10-05 14:30 | Evidence collected | [Your Name] | Initial collection during OSINT investigation |
| 2025-10-05 14:45 | Escalated to NCMEC | [Your Name] | Reported via CyberTipline, Ref: 123456789 |
| 2025-10-05 15:00 | Evidence secured | [Your Name] | Files moved to encrypted storage, access restricted |
| 2025-10-06 10:00 | Transferred to FBI | FBI SA John Doe | Evidence transferred via secure portal, Case: 2025-FBI-1234 |
Secure Storage
Before law enforcement takes custody:
# Create encrypted evidence container
# Windows (BitLocker):
manage-bde -on E:\Evidence\ESC-2025-1005-001 -RecoveryPassword
# Linux (LUKS):
cryptsetup luksFormat /dev/sdb1
cryptsetup luksOpen /dev/sdb1 evidence_esc_001
mkfs.ext4 /dev/mapper/evidence_esc_001
mount /dev/mapper/evidence_esc_001 /mnt/evidence
# Create evidence directory structure:
/Evidence/ESC-2025-1005-001/
├── metadata/ (account info, URLs, text logs)
├── screenshots/ (text conversations, profiles)
├── archives/ (web archives, saved pages)
├── chain_of_custody.md
└── SHA256SUMS (hash verification file)
# Calculate hashes:
sha256sum -b * > SHA256SUMS
Access control:
- Restrict access to case investigator and supervisor only
- Log all access attempts
- Ensure backups are encrypted
- Never transmit via unencrypted email or cloud storage
Investigator Safety
Secondary Trauma Recognition
Symptoms of Secondary Trauma:
- Immediate: Shock, disbelief, emotional numbness, nausea
- Short-term (hours-days): Intrusive thoughts, difficulty concentrating, irritability, sleep disturbance
- Long-term (weeks-months): Nightmares, hypervigilance, avoidance behaviors, burnout
High-Risk Content:
- CSAM (child sexual abuse material)
- Graphic violence or torture
- Mass casualty events (terrorism, mass shootings)
- Prolonged exposure to traumatic content (cumulative effect)
Immediate Self-Care
If you view traumatic content:
-
Stop viewing immediately
- Close browser tabs or applications
- Step away from computer
- Take 10-minute break minimum
-
Grounding techniques
- Deep breathing (4-7-8: inhale 4 seconds, hold 7, exhale 8)
- 5-4-3-2-1 sensory grounding (name 5 things you see, 4 you hear, 3 you feel, 2 you smell, 1 you taste)
- Physical movement (walk, stretch)
-
Social support
- Talk to colleague or supervisor (do not describe traumatic content in detail)
- Call friend or family member
- Avoid isolation
-
Document exposure
- Note date/time, content type, duration of exposure
- Report to supervisor for formal record
- Request follow-up support
Organizational Support
Mandatory procedures:
- Debriefing with supervisor within 24 hours of CSAM/extreme violence exposure
- Access to Employee Assistance Program (EAP) or mental health counselor
- Option to rotate off case or take administrative leave
- No retaliation for requesting mental health support
Peer Support:
- Peer support groups for OSINT/CSAM investigators
- Regular check-ins with team members
- Buddy system for high-risk investigations
Long-Term Wellness:
- Limit exposure time (no more than 2-4 hours/day reviewing traumatic content)
- Mandatory breaks every 45-60 minutes
- Regular mental health screenings (quarterly)
- Rotation out of sensitive cases (every 6-12 months)
Resources
US:
- National Suicide Prevention Lifeline: 988 (call or text)
- Crisis Text Line: Text HOME to 741741
- SAMHSA Helpline: 1-800-662-4357 (mental health, substance abuse)
- EAP: Contact your organization's HR department
UK:
- Samaritans: 116 123 (24/7)
- Mind: 0300 123 3393
- NHS Mental Health Crisis: Text SHOUT to 85258
International:
- Befrienders Worldwide: https://www.befrienders.org/ (global crisis helpline directory)
Documentation Requirements
Escalation Report Template
# Escalation Report
**Report ID:** ESC-2025-1005-001
**Date/Time:** 2025-10-05 14:30:00 UTC (09:30 EST)
**Investigator:** [Your Full Name]
**Case ID:** [Original investigation case ID]
**Classification:** [SENSITIVE - LAW ENFORCEMENT ONLY]
---
## Executive Summary
[1-2 sentence summary of what was found and why escalation is required]
Example: During OSINT investigation of Telegram channels related to Case XYZ-123, I discovered suspected CSAM distribution and immediately ceased collection. This report documents the escalation to NCMEC CyberTipline.
---
## Discovery Details
**Date/Time of Discovery:** 2025-10-05 14:25:00 UTC
**Platform:** [Telegram / Twitter / Forum / Website]
**Investigation Context:** [Brief description of original investigation scope]
**What was found:**
[Describe findings WITHOUT reproducing illegal content]
- Type of content: [CSAM / Terrorism planning / Human trafficking / Imminent threat]
- Location: [URL, channel name, account - DO NOT include direct links to illegal content]
- Imminence: [Active / Ongoing / Historical]
Example: "I discovered a Telegram channel (@channel_name) where users were trading files with file names indicating child sexual abuse content. I did not download or view any files. I observed text conversations discussing pricing and file sharing."
**Indicators observed:**
- [Specific indicators: file names, conversation content, account behavior]
- [Language or code words used]
- [Number of participants or files (if visible)]
---
## Actions Taken
**Immediate actions:**
- [ ] Stopped collection at [timestamp]
- [ ] Closed browser tabs / applications
- [ ] Preserved metadata (see evidence log)
- [ ] Notified supervisor at [timestamp]
**Escalation:**
- **Escalated to:** [NCMEC / FBI / Local Police / Other agency]
- **Contact method:** [Phone / Online form / Email]
- **Date/Time of report:** 2025-10-05 14:45 UTC
- **Contact person:** [Name, if applicable]
- **Reference number:** [Agency case/reference number]
- **Guidance received:** [Any instructions from agency]
---
## Evidence Preserved
**Evidence items:** [See attached Chain of Custody log]
Summary:
1. Account metadata (username, profile, timestamps)
2. URLs to suspected illegal content (NOT OPENED)
3. Text conversation screenshots (no illegal imagery)
4. Web archives of public-facing pages
**Evidence location:** /Evidence/ESC-2025-1005-001/ (encrypted, access restricted)
**Hashes:**
- evidence_item_1.png: SHA-256: a1b2c3...
- evidence_item_2.txt: SHA-256: f3e4d5...
---
## Imminence Assessment
**Is there an imminent threat to life or safety?**
- [ ] YES - Immediate law enforcement response required (911 called)
- [x] NO - Historical or non-imminent threat
**If yes, explain:**
[Describe specific threat, timeline, target, and actions taken]
---
## Investigator Exposure
**Duration of exposure to sensitive content:**
[X] minutes (approximate)
**Type of content viewed:**
- [ ] CSAM (child sexual abuse material)
- [ ] Graphic violence
- [ ] Terrorism propaganda
- [ ] Other traumatic content
**Self-care actions taken:**
- [x] Took break immediately after discovery
- [x] Notified supervisor
- [ ] Requested EAP/counseling referral
- [ ] Other: ___________
**Debriefing scheduled:** [Date/time with supervisor]
---
## Next Steps
**Awaiting:**
- [ ] Law enforcement guidance on whether to continue or pause investigation
- [ ] Evidence transfer procedure
- [ ] Follow-up contact from reporting agency
**Status:**
- [ ] Investigation paused pending LE guidance
- [ ] Investigation continuing under LE supervision
- [ ] Investigation closed, transferred to LE
**Follow-up contact:** [Name and contact info of LE liaison]
---
## Attachments
1. Chain of Custody log (ESC-2025-1005-001_chain_of_custody.md)
2. Evidence hash verification (SHA256SUMS)
3. [Any supporting documents]
---
**Report prepared by:** [Your Name]
**Title:** [Your job title]
**Contact:** [Email, phone]
**Date:** 2025-10-05
**Reviewed by:** [Supervisor name]
**Date:** 2025-10-05
---
**Distribution:**
- [X] Supervisor
- [X] Legal/Compliance
- [ ] Law Enforcement (upon request)
- [ ] Other: ___________
Post-Escalation Procedures
Awaiting Law Enforcement Guidance
Do:
- ✅ Remain available for follow-up questions
- ✅ Preserve all evidence in secure storage
- ✅ Document any new developments
- ✅ Comply with law enforcement requests
- ✅ Maintain confidentiality
Do NOT:
- ❌ Resume investigation without LE authorization
- ❌ Delete or modify evidence
- ❌ Discuss case with unauthorized persons
- ❌ Attempt to contact suspects or victims
- ❌ Publicize case details (social media, blog, etc.)
Evidence Transfer to Law Enforcement
Transfer methods:
Option 1: Secure file transfer portal
# Law enforcement provides secure upload link
# Upload evidence files via HTTPS portal
# Verify successful transfer with LE contact
# Maintain local copy until LE confirms receipt
Option 2: Encrypted email (if authorized)
# Encrypt evidence archive with password:
7z a -p[PASSWORD] -mhe=on evidence.7z /Evidence/ESC-2025-1005-001/*
# Email encrypted archive to LE contact
# Provide password via separate channel (phone call)
# Confirm receipt
Option 3: Physical media handoff
# Copy evidence to encrypted USB drive
# Hand-deliver to LE contact at secure location
# Obtain chain of custody receipt
# Maintain backup copy until case closed
Chain of custody documentation:
I, [Your Name], hereby transfer custody of evidence in Case ESC-2025-1005-001 to [LE Officer Name, Badge Number] of [Agency] on [Date] at [Time].
Evidence transferred:
- [List of items]
Transfer method: [Portal / Email / Physical media]
Investigator signature: _______________ Date: _______
LE Officer signature: _______________ Date: _______
Continued Investigation (If Authorized)
If law enforcement requests continued monitoring:
-
Obtain written authorization
- Scope of continued investigation
- Legal protections or immunity
- Reporting frequency and method
- Duration of monitoring
- Contact person for questions
-
Establish clear guidelines
- What to collect (metadata only? text conversations?)
- What NOT to collect (illegal content)
- Escalation triggers (new victims, imminent threats)
- Communication protocol with LE
-
Document all activity
- Daily logs of monitoring activities
- Regular reports to LE contact
- Immediate escalation of new sensitive findings
Example authorization:
[Law Enforcement Agency]
Authorization for Continued OSINT Monitoring
Case Number: [LE Case Number]
Date: 2025-10-05
[Your Organization] is hereby authorized to continue OSINT monitoring of [specific accounts/platforms] related to [brief case description] under the supervision of [LE Agent Name].
Scope:
- Monitor public posts and messages for [specific indicators]
- Collect metadata and text content only (no illegal imagery)
- Report new findings to [LE Contact] within [timeframe]
Prohibited actions:
- Do not download illegal content
- Do not engage with suspects
- Do not publicize investigation
Duration: [Start date] to [End date or "until case closure"]
[LE Supervisor Signature]
[Date]
Case Closure
When investigation concludes:
-
Final report to law enforcement
- Summary of all findings
- Total evidence collected
- Timeline of activities
- Final chain of custody log
-
Evidence retention
- Follow organizational retention policy
- Typically: retain until LE case closed and any appeals exhausted
- Secure deletion procedure when authorized
-
Debriefing
- Team debrief to capture lessons learned
- Individual debriefing with supervisor
- Mental health check-in for exposed investigators
-
Secure deletion (when authorized)
# Verify law enforcement authorization to delete
# Cryptographically wipe evidence files:
# Linux (shred):
shred -vfz -n 7 /Evidence/ESC-2025-1005-001/*
# Windows (sdelete):
sdelete -p 7 E:\Evidence\ESC-2025-1005-001\*
# Document deletion:
# Date: [deletion date]
# Method: 7-pass DoD wipe
# Authorization: [LE case closure letter or email]
# Verified by: [Supervisor name]
Appendix
Common Code Words & Indicators
CSAM (Child Sexual Abuse Material):
- "CP" (child pornography)
- "PTHC" (pre-teen hardcore)
- "Cheese pizza" (code for CP)
- "Jailbait" (underage but post-pubescent)
- Age indicators: "5yo," "12yo," etc.
- "Loli" or "shota" (anime-style child sexual content)
Terrorism:
- "Martyrdom operation" (suicide attack)
- "Hijrah" (travel to conflict zone)
- "Bay'ah" (pledge of allegiance to terror group)
- Specific acronyms: "AQ" (Al-Qaeda), "IS" (Islamic State)
- "Ghazwa" (raid or attack)
Human Trafficking:
- "New to town" / "Fresh" (newly trafficked victim)
- "Roses" or "donations" (payment for sex)
- Third-party posting (pimp advertising for victim)
- Multiple women at same location (brothel or trafficking ring)
- "Can't host" (victim has no control of location)
Reporting Checklist
Pre-Report:
- Escalation trigger identified
- Imminence assessed
- Collection stopped
- Supervisor notified
- Evidence preserved (metadata only)
During Report:
- Appropriate agency contacted (NCMEC, FBI, etc.)
- Reference number obtained
- Next steps clarified
- Evidence transfer method established
Post-Report:
- Escalation report completed
- Chain of custody documented
- Evidence secured
- Investigation paused or continued per LE guidance
- Debriefing scheduled (if traumatic content)
- Follow-up timeline established
Version: 2.0 Last Updated: 2025-10-10 Review Cycle: Yearly
Related SOPs: Legal & Ethics | OPSEC Planning | Collection Log | Reporting & Disclosure