Feeds

Investigators blind on P2P child abuse

Encryption on the rise too

Security for virtualized datacentres

Child abuse investigators plan to focus efforts on the use of peer to peer networks to distribute images, following a "wholesale move" in sex offenders' online behaviour .

The "vast majority" of paedophile activity online now takes place on public and private P2P platforms rather than commercial criminal websites, the Child Exploitation and Online Protection Centre (CEOP) said today.

"Our focus must now be on tackling this as a priority," the agency said in its annual report.

However, the report pointed to a major gap in intelligence about P2P networking by paedophiles, which is usually hidden from view and technically difficult to track.

"The scale and nature of P2P file sharing involving child abuse images is currently impossible to establish," CEOP said.

"It is a mode of abuse and image distribution that remains largely unseen to the general public and indeed to the victims themselves."

The agency received only two reports from under-18s of paedophile activity on P2P networks in the last year. It said it was reliant "to a very large extent" on reports from internet industry sources and other non-public sources.

Offenders are also increasingly turning to free encryption software in an attempt to evade detection, CEOP said, meaning reports take longer to process and analyse.

The strategy document said: "It has long been recognised that child sexual offenders practise deception, disguising and masking their activities to achieve their aims.

"This is increasingly pertinent with certain developments in technology that offenders have adapted and adopted to suit their purposes. The key developments that are particularly suited to being exploited by offenders are wireless technology (which we have reported on previously but about which we are now receiving increasing reports) and the use of 'off the shelf' encryption."

The problems caused to investigators by encryption include both scrambling of stored data using software such as TrueCrypt, and disguising their location and identity when transmitting data using anonymous networking techniques such as Tor. However, CEOP indicated it expects innocent everyday use of such technology to increase too.

"There is a general trend for people to become more aware of their privacy when interacting online and perhaps the likelihood that manufacturers will move towards everyday encryption as standard," it said.

Despite CEOP's observation that the vast majority of paedophiles exchange images via P2P, yesterday it was revealed that the Queen's Speech in October will include laws to force the minority of small ISPs who have not done so to implement the Internet Watch Foundation blocklist of abuse websites. Small firms providing less than five per cent of internet connections have declined to implement the IWF blocklist, citing costs and arguing it merely hides the problem.

CEOP nevertheless hopes ISPs will help with its new focus on P2P.

"Co-ordinated responses between governments, law enforcement agencies and the communications and internet industries, mutually aiming to disrupt an offender's activity and deny them access to the services they need, will be vital to the future of child protection in technically converged environments," it said. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.