Advertisement

Combatting Cybercrime and Sexual Exploitation of Children: An Open Source Toolkit

  • Elisavet Charalambous
  • Dimitrios Kavallieros
  • Ben BrewsterEmail author
  • George Leventakis
  • Nikolaos Koutras
  • George Papalexandratos
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

This chapter presents the UINFC2 “Engaging Users in preventing and fighting Cybercrime” software platform, showcasing how software tools designed to detect, collect, analyse, categorise and correlate information that is publically available online, can be used to enable and enhance the reporting, detection and removal capabilities of law enforcement and hotlines in response to cybercrimes and crimes associated with the sexual exploitation of children. It further discusses the social, economic and wider impact of cybercrime on a European and global scale, highlighting a number of challenges it poses to modern society before moving on to discuss the specific challenge posed by the proliferation of online child exploitation material and discussing the functionalities of the UINFC2 system as a response mechanism.

Keywords

Child Sexual Abuse Sexual Exploitation Child Pornography Social Media Platform Fiscal Year 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

The research leading to these results was funded by the European Commission’s Prevention of and Fight against Crime, Illegal Use of Internet (INT) under grant agreement number [HOME/2013/ISEC/AG/INT/4000005215].

Open image in new window

This project has been funded with the support from the European Commission. This publication reflects the views only of the authors, and the European Commission cannot be held responsible for any use which may be made of the information contained therein.

References

  1. Allsup R, Thomas E, Monk B, Frank R, Bouchard M (2015) Networking in child exploitation: assessing disruption strategies using registrant information. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining 2015, ACM, pp. 400–407Google Scholar
  2. Arthur KK, Venter HS (2004) An investigation into computer forensic tools. In: ISSA, pp. 1–11Google Scholar
  3. Brewster B, Andrews S, Polovina S, Hirsch L, Akhgar B (2014) Environmental scanning and knowledge representation for the detection of organised crime threats. In: International conference on conceptual structures. Springer International Publishing, pp. 275–280Google Scholar
  4. Carr J (2011) The internet dimension of sexual violence against children. In: Council of Europe, protecting children from sexual violence-A comprehensive approach, pp. 281–282Google Scholar
  5. European Commission (2015) The European agenda on security. Retrieved from http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf
  6. European Parliament (2011) DIRECTIVE 2011/92/EU of the European parliament and of the council of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornographyGoogle Scholar
  7. Europol (2015) The internet organised crime threat assessmentGoogle Scholar
  8. Geiger M (2005) Evaluating commercial counter-forensic tools. In: DFRWSGoogle Scholar
  9. Gibson H, Andrews S, Domdouzis K, Hirsch L, Akhgar B (2014) Combining big social media data and FCA for crisis Response. In: Utility and cloud computing (UCC), 2014 IEEE/ACM 7th international conference on (pp. 690–695). IEEEGoogle Scholar
  10. INHOPE (2014) Facts figures and trends—the fight against online child sexual abuse in perspective. Retrieved 1 Aug 2016, from http://www.inhope.org/tns/resources/statistics-and-infographics/statistics-and-infographics-2014.aspx
  11. Internet Watch Foundation (2016) Annual Report 2015Google Scholar
  12. INTERPOL (2016) Victim identification/crimes against children/crime areas/internet/home—INTERPOL. Retrieved 1 August 2016, from http://www.interpol.int/Crime-areas/Crimes-against-children/Victim-identification
  13. INTERPOL (n.d.) Crimes against children: appropriate terminology. Retrieved from http://www.interpol.int/Crime-areas/Crimes-against-children/Appropriate-terminology
  14. Kettleborough D (2015) What’s wrong with ‘child pornography’? Retrieved from http://wp.me/p2RS15-9f
  15. Kurose JF (2005) Computer networking: A top-down approach featuring the internet, 3/E. Pearson Education IndiaGoogle Scholar
  16. Lalla H, Flowerday S (2010) Towards a standardised digital forensic process: E-mail forensics. In: ISSAGoogle Scholar
  17. McAfee (2014) Estimating the global cost of cyber crime [June 2014], pp. 1–22Google Scholar
  18. Meghanathan N, Allam SR, Moore LA (2010) Tools and techniques for network forensics. arXiv preprint arXiv:1004.0570
  19. Microsoft (n.d.) PhotoDNA cloud service. Retrieved 1 Aug 2016, from https://www.microsoft.com/en-us/photodna
  20. National Crime Agency (2013) Threat assessment of child sexual exploitation and abuseGoogle Scholar
  21. Ponemon Institute (2015) 2015 cost of cyber crime study: globalGoogle Scholar
  22. PriceWaterhouseCoopers (2016) Global economic crime survey 2016Google Scholar
  23. Rutgaizer M, Shavitt Y, Vertman O, Zilberman N (2012) Detecting pedophile activity in bittorrent networks. In: International conference on passive and active network measurement. Springer Berlin Heidelberg, pp. 106–115Google Scholar
  24. U.S. Department of Justice (2013) Regional computer forensics laboratory annual report for fiscal year 2013. Retrieved from https://www.rcfl.gov/downloads/documents/fiscal-year-2013
  25. Westlake B, Bouchard M, Frank R (2012) Comparing methods for detecting child exploitation content online. Proc.—2012 Eur Intell Secur Inform Conf EISIC 2012:156–163Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Elisavet Charalambous
    • 1
  • Dimitrios Kavallieros
    • 2
  • Ben Brewster
    • 3
    Email author
  • George Leventakis
    • 2
  • Nikolaos Koutras
    • 1
  • George Papalexandratos
    • 2
  1. 1.Advanced Integrated Technology Solutions & Services LtdEgkomiCyprus
  2. 2.Center for Security Studies (KEMEA)Hellenic Ministry of Interior and Administrative ReconstructionΑthensGreece
  3. 3.CENTRIC/Sheffield Hallam UniversitySheffieldUK

Personalised recommendations