Feeds

British cops cuff 660 suspected paedophiles

Arrests people allegedly accessing child abuse images online

Providing a secure and efficient Helpdesk

Hundreds of suspected paedophiles have been arrested by UK police following a six-month-long operation.

The majority of cases have yet to carry charges, the National Crime Agency said. The charge sheet so far ranges from possessing indecent images of children to serious sexual assault.

The NCA added it had manacled 660 people throughout the UK and said that doctors, teachers, scout leaders, ex-cops and care workers were among the cuffed suspects.

Only 39 individuals were on the Registered Sex Offenders' list, said the NCA.

Police declined to explain how they "snared" the suspects. They said that the operation had remained covert until today to protect some 400 children, identify alleged offenders and secure the evidence needed.

NCA deputy director Phil Gormley said:

Some of the people who start by accessing indecent images online go on to abuse children directly. So the operation is not only about catching people who have already offended – it is about influencing potential offenders before they cross that line.

We want those offenders to know that the internet is not a safe anonymous space for accessing indecent images, that they leave a digital footprint, and that law enforcement will find it.

The operation was the first of its kind in Blighty to have been coordinated in such a fashion, said the NCA - which enlisted the help of 45 police forces across England, Wales, Scotland and Northern Ireland.

It comes after Google and Microsoft bent to political pressure late last year by agreeing to tweak their search engines to make it a little harder for sickos to find child abuse images online.

Additionally, Google has developed a hashing technology for YouTube that places a unique ID mark on illegal child abuse vids. Once a copy is spotted on the service, all other copies are then apparently removed from the web.

The US tech giants said last November that they planned to work with the NCA - which has 4,000 people on its books tracking, investigating and cuffing paedophiles in the UK - to try to tackle the peer-to-peer networks in the darker corners of the web.

The agency has previously given Google and Microsoft an "unambiguous" list of terms that would clearly lead to child abuse images online. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.