Feeds

Typical child porn user is white male IT pro

Oh dear

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The typical British consumer of child pornography, is a white male professional, probably working in IT.

An survey of 200 child porn suspects caught by the Thames Valley police in Operation Viola revealed that every one was male and no-one came from an ethnic minority.

As the Thames Valley is the heartland of the computer industry in the UK, it is perhaps not so surprising that many of the suspects are IT pros - other professionals collared in Operation Viola include doctors, managing directors and police officers. But the large number of computer companies in the Thames Valley may be the reason for the large number of child porn users in the area, police believe.

Police are now seeking academic help to research typical offenders. They want to see if links can be established between people who use child porn and people who rape children.

Operation Viola was part of Operation Ore, the national enquiry sparked by credit card details of 7,000 UK child porn users obtained by the FBI. In the Thames Valley, police seized 750 computers, 14,000 floppy disks and 5,000 CDs and prosecuted 115 people. ®

Related stories

Watch out! There's a chatroom paedophile about
Child porn-lite users to wriggle free from court hook
Paedo ring sysadmins jailed for 11 years

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.