13.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

anonymous post<strong>in</strong>g of pho<strong>to</strong>graphs. The Internet Watch Foundation (IWF) (IWF, 2006)<strong>in</strong>dicated that <strong>in</strong> 2006 pho<strong>to</strong>-album websites accounted for 10.5% of all URLs reported<strong>to</strong> law enforcement agencies and o<strong>the</strong>r hotl<strong>in</strong>es, apparently conta<strong>in</strong><strong>in</strong>g potentially illegalchild abuse images. The IWF also noted a trend whereby commercial websites s<strong>to</strong>re <strong>the</strong>image files on a remote website, some of which conta<strong>in</strong> collections of elements of animage which, when assembled make up <strong>the</strong> whole image. When a person clicks on <strong>the</strong>‘parent’ commercial website <strong>to</strong> <strong>download</strong> images, <strong>the</strong> site collects <strong>the</strong> relevant pieces fromseparately hosted image s<strong>to</strong>res and assembles <strong>the</strong>m. The IWF (2006) noted that, “Theseimage ‘jigsaw’ s<strong>to</strong>res might be able <strong>to</strong> evade removal and law enforcement <strong>in</strong>vestigation as<strong>the</strong> images may not constitute potentially illegal content <strong>in</strong> <strong>the</strong>ir pre-assembled state”.Choo, Smith and McCusker (2007) have also suggested we are also likely <strong>to</strong> see enhancedmethods of exploit<strong>in</strong>g wireless vulnerabilities, <strong>in</strong>clud<strong>in</strong>g drive-by subversion of wirelesshome routers through unauthorised access by mobile WiFi clients, mak<strong>in</strong>g it more difficult<strong>to</strong> identify <strong>the</strong> <strong>download</strong><strong>in</strong>g of abusive material. However, only home routers that are notprotected by access keys and network encryption are <strong>the</strong> ones most likely <strong>to</strong> be used <strong>in</strong> thisway. With <strong>the</strong> growth of WiMax (with much greater reach than WiFi) <strong>the</strong> same challengesfaced by private, unmoni<strong>to</strong>red and anonymous access is compounded. We have also seen an<strong>in</strong>creased use of botmalware that aims <strong>to</strong> avoid detection by anti-virus software and thatallow a child’s computer <strong>to</strong> be controlled. There are also new payment systems <strong>in</strong> whichInternet <strong>in</strong>ternational funds transfer <strong>in</strong>structions (IFTIs) and e-currencies cont<strong>in</strong>ue <strong>to</strong>grow (eg, prepaid cards and smartcards which avoid some of <strong>the</strong> traceability of traditionalcredit-card transactions). In addition live sexual abuse videos can be streamed <strong>to</strong> Internetchatrooms, with <strong>the</strong> actual perpetra<strong>to</strong>r respond<strong>in</strong>g <strong>in</strong> real time <strong>to</strong> commands from o<strong>the</strong>rparticipants who are able <strong>to</strong> see <strong>the</strong> images.S<strong>in</strong>ce <strong>the</strong> Second World Congress we have seen <strong>in</strong>creas<strong>in</strong>g use of distributed networks, suchas peer-<strong>to</strong>-peer (p2p), which facilitate file shar<strong>in</strong>g amongst users. Many studies show thata large amount of paedophile and harmful contents is distributed us<strong>in</strong>g p2p file exchangesystems, and that <strong>the</strong> volume of such exchanges is <strong>in</strong>creas<strong>in</strong>g (Taylor and Quayle, 2003;Waters, 2007). Mehta et al. (2002) exam<strong>in</strong>ed 507 video files retrieved from <strong>the</strong> Gnutellanetwork us<strong>in</strong>g key words that were likely <strong>to</strong> be l<strong>in</strong>ked <strong>to</strong> a search for pornographic material.Their data suggested that while <strong>the</strong> availability of obscene or illegal video files constituted arelatively small percentage of <strong>the</strong> overall set, <strong>the</strong> ease with which <strong>the</strong> material was accessedand <strong>the</strong> sheer volume of data flow<strong>in</strong>g through <strong>the</strong> network was seen as a cause for concern.Video files def<strong>in</strong>ed as paedophilic represented 3.7% of <strong>the</strong> sample, but as millions of fileswere exchanged this represented a sizeable number. These authors also moni<strong>to</strong>red a website(Gnutellameter) which captures data exchanged <strong>in</strong> Gnutella and provides summaries ofkey words most commonly entered by users. They suggested that, “<strong>the</strong> most commonly32|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!