Feeds

Investigators blind on P2P child abuse

Encryption on the rise too

Intelligent flash storage arrays

Child abuse investigators plan to focus efforts on the use of peer to peer networks to distribute images, following a "wholesale move" in sex offenders' online behaviour .

The "vast majority" of paedophile activity online now takes place on public and private P2P platforms rather than commercial criminal websites, the Child Exploitation and Online Protection Centre (CEOP) said today.

"Our focus must now be on tackling this as a priority," the agency said in its annual report.

However, the report pointed to a major gap in intelligence about P2P networking by paedophiles, which is usually hidden from view and technically difficult to track.

"The scale and nature of P2P file sharing involving child abuse images is currently impossible to establish," CEOP said.

"It is a mode of abuse and image distribution that remains largely unseen to the general public and indeed to the victims themselves."

The agency received only two reports from under-18s of paedophile activity on P2P networks in the last year. It said it was reliant "to a very large extent" on reports from internet industry sources and other non-public sources.

Offenders are also increasingly turning to free encryption software in an attempt to evade detection, CEOP said, meaning reports take longer to process and analyse.

The strategy document said: "It has long been recognised that child sexual offenders practise deception, disguising and masking their activities to achieve their aims.

"This is increasingly pertinent with certain developments in technology that offenders have adapted and adopted to suit their purposes. The key developments that are particularly suited to being exploited by offenders are wireless technology (which we have reported on previously but about which we are now receiving increasing reports) and the use of 'off the shelf' encryption."

The problems caused to investigators by encryption include both scrambling of stored data using software such as TrueCrypt, and disguising their location and identity when transmitting data using anonymous networking techniques such as Tor. However, CEOP indicated it expects innocent everyday use of such technology to increase too.

"There is a general trend for people to become more aware of their privacy when interacting online and perhaps the likelihood that manufacturers will move towards everyday encryption as standard," it said.

Despite CEOP's observation that the vast majority of paedophiles exchange images via P2P, yesterday it was revealed that the Queen's Speech in October will include laws to force the minority of small ISPs who have not done so to implement the Internet Watch Foundation blocklist of abuse websites. Small firms providing less than five per cent of internet connections have declined to implement the IWF blocklist, citing costs and arguing it merely hides the problem.

CEOP nevertheless hopes ISPs will help with its new focus on P2P.

"Co-ordinated responses between governments, law enforcement agencies and the communications and internet industries, mutually aiming to disrupt an offender's activity and deny them access to the services they need, will be vital to the future of child protection in technically converged environments," it said. ®

Beginner's guide to SSL certificates

More from The Register

next story
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.