Feeds

Paedophiles face credit card blacklist

Fiscal attack

  • alert
  • submit to reddit

Boost IT visibility and business value

Paedophiles who use credit cards to pay for access to child abuse sites risk having their credit cards withdrawn. National Crime Squad Assistant Chief Constable Jim Gamble said UK police were working with banks and credit reference agencies on procedures to blacklist offenders. The same credit cards sometimes feature in prosecution of repeat offenders.

"By using credit cards to perform an unlawful act they will have breached their card issuers' terms and conditions. We can't allow credit cards to become instruments of crime," said ACC Gamble.

Stolen credit card details are occasionally used to access child abuse websites. ACC Gamble said police have "diligent procedures to double check information" so that paedophile allegations are not made on the basis of a credit card transaction alone.

Police are also keen to persuade card issuers of the wisdom of withdrawing merchant status from aggregators guilty of knowingly doing business with pay-per-view child abuse sites.

The idea was discussed at a meeting of the Virtual Global Task Force in London this week. The Task Force, which brings together police forces and other agencies, was set up six months with the goal of making the Internet a safer environment for youngsters. Plans for police across the world to co-ordinate the monitoring of Internet chat rooms in order to deter paedophiles from 'grooming' prospective victims online were discussed at the conference.

Details of the monitoring scheme, including when it might be introduced and how many officers might be involved, remain sketchy. At a press conference this morning police were repeatedly asked how they could hope to monitor a huge number of Internet sites.

Gamble noted that police were targeting resources. "We're not looking to occupy every chat room. We're following an intelligence-led approach taking information from our cyber-tip off lines and elsewhere," he said.

The monitoring scheme is part of establishing a visible police presence online separate from undercover investigations of paedophile activity online, which might still take place. The success of the scheme will be apparent from its deterrent effect of driving paedophiles out of chat rooms and from any arrests made, ACC Gamble said. ®

Related stories

102 UK kids saved from paedos
Police in paedo porn sting
BT's modest plan to clean up the Net
Pervert! You're using the Internet
MSN Chat: It's the child protection lobby wot's to blame LINX

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.