On Child Sex Abuse Presence in BitTorrent Networks
نویسندگان
چکیده
The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal material, while keeping the source of the data and the acquiring users anonymous. In this paper we analyze activity measurements in the BitTorrent network and examine child sex abuse activity through three major BitTorrent web portals. We detect and characterize child sex abuse material in the network, and also analyze different aspects of the abusers activity. We hope our results will help law enforcement teams put more focus on the BitTorrent network and ease the detection of new illicit material.
منابع مشابه
Detecting Pedophile Activity in BitTorrent Networks
The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal material, while keeping the source of the data and the acquiring users anonymous. In this paper we analyze activity measurements in the BitTorrent network and examine child sex abuse activity through the Mininova web portal. We ...
متن کاملCharacterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks.
We provide detailed measurement of the illegal trade in child exploitation material (CEM, also known as child pornography) from mid-2011 through 2014 on five popular peer-to-peer (P2P) file sharing networks. We characterize several observations: counts of peers trafficking in CEM; the proportion of arrested traffickers that were identified during the investigation as committing contact sexual o...
متن کاملDetection of Child Sexual Abuse Media on P2P Networks: Normalization and Classification of Associated Filenames
The goal of the iCOP project is to build a system detecting the originators of pedophile content on P2P networks such as BitTorrent, eDonkey, or Kad. This paper outlines the key functions of the language processing in the iCOP system. Next, we describe the architecture of the language analysis module and its key components – filename classifier, term extractor, and filename normalizer. The lang...
متن کاملEffective Factors of Child Abuse within Family
Aim(s): Child abuse is a common crime and it is caused by multiple individual and environmental factors that are combined. It increases the likelihood of this type of social harm. The aim of this study was to investigate the effective factors of child abuse within family. Participants & Methods: In this study, qualitative method and in-depth interviews with experts were used and by analyzing t...
متن کاملJuvenile Sex Offending: Its Prevalence and the Criminal Justice Response
The public perception of sex offenders tends to be of predatory stranger rapists and child molesters. 1 A typical child molester is perceived to be the predatory child sex offender who lurks around schoolyards and playgrounds.2 The public exposure of child exploitation networks or ‘rings’ which produce and share child pornography reinforces the stereotype of the classic child molester as a pred...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013