Feeds

Investigators blind on P2P child abuse

Encryption on the rise too

High performance access to file storage

Child abuse investigators plan to focus efforts on the use of peer to peer networks to distribute images, following a "wholesale move" in sex offenders' online behaviour .

The "vast majority" of paedophile activity online now takes place on public and private P2P platforms rather than commercial criminal websites, the Child Exploitation and Online Protection Centre (CEOP) said today.

"Our focus must now be on tackling this as a priority," the agency said in its annual report.

However, the report pointed to a major gap in intelligence about P2P networking by paedophiles, which is usually hidden from view and technically difficult to track.

"The scale and nature of P2P file sharing involving child abuse images is currently impossible to establish," CEOP said.

"It is a mode of abuse and image distribution that remains largely unseen to the general public and indeed to the victims themselves."

The agency received only two reports from under-18s of paedophile activity on P2P networks in the last year. It said it was reliant "to a very large extent" on reports from internet industry sources and other non-public sources.

Offenders are also increasingly turning to free encryption software in an attempt to evade detection, CEOP said, meaning reports take longer to process and analyse.

The strategy document said: "It has long been recognised that child sexual offenders practise deception, disguising and masking their activities to achieve their aims.

"This is increasingly pertinent with certain developments in technology that offenders have adapted and adopted to suit their purposes. The key developments that are particularly suited to being exploited by offenders are wireless technology (which we have reported on previously but about which we are now receiving increasing reports) and the use of 'off the shelf' encryption."

The problems caused to investigators by encryption include both scrambling of stored data using software such as TrueCrypt, and disguising their location and identity when transmitting data using anonymous networking techniques such as Tor. However, CEOP indicated it expects innocent everyday use of such technology to increase too.

"There is a general trend for people to become more aware of their privacy when interacting online and perhaps the likelihood that manufacturers will move towards everyday encryption as standard," it said.

Despite CEOP's observation that the vast majority of paedophiles exchange images via P2P, yesterday it was revealed that the Queen's Speech in October will include laws to force the minority of small ISPs who have not done so to implement the Internet Watch Foundation blocklist of abuse websites. Small firms providing less than five per cent of internet connections have declined to implement the IWF blocklist, citing costs and arguing it merely hides the problem.

CEOP nevertheless hopes ISPs will help with its new focus on P2P.

"Co-ordinated responses between governments, law enforcement agencies and the communications and internet industries, mutually aiming to disrupt an offender's activity and deny them access to the services they need, will be vital to the future of child protection in technically converged environments," it said. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.