Open Source Intelligence Investigation pp 233-249 | Cite as
Combatting Cybercrime and Sexual Exploitation of Children: An Open Source Toolkit
- 1 Citations
- 1 Mentions
- 1.9k Downloads
Abstract
This chapter presents the UINFC2 “Engaging Users in preventing and fighting Cybercrime” software platform, showcasing how software tools designed to detect, collect, analyse, categorise and correlate information that is publically available online, can be used to enable and enhance the reporting, detection and removal capabilities of law enforcement and hotlines in response to cybercrimes and crimes associated with the sexual exploitation of children. It further discusses the social, economic and wider impact of cybercrime on a European and global scale, highlighting a number of challenges it poses to modern society before moving on to discuss the specific challenge posed by the proliferation of online child exploitation material and discussing the functionalities of the UINFC2 system as a response mechanism.
Keywords
Child Sexual Abuse Sexual Exploitation Child Pornography Social Media Platform Fiscal YearNotes
Acknowledgments
The research leading to these results was funded by the European Commission’s Prevention of and Fight against Crime, Illegal Use of Internet (INT) under grant agreement number [HOME/2013/ISEC/AG/INT/4000005215].
This project has been funded with the support from the European Commission. This publication reflects the views only of the authors, and the European Commission cannot be held responsible for any use which may be made of the information contained therein.
References
- Allsup R, Thomas E, Monk B, Frank R, Bouchard M (2015) Networking in child exploitation: assessing disruption strategies using registrant information. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining 2015, ACM, pp. 400–407Google Scholar
- Arthur KK, Venter HS (2004) An investigation into computer forensic tools. In: ISSA, pp. 1–11Google Scholar
- Brewster B, Andrews S, Polovina S, Hirsch L, Akhgar B (2014) Environmental scanning and knowledge representation for the detection of organised crime threats. In: International conference on conceptual structures. Springer International Publishing, pp. 275–280Google Scholar
- Carr J (2011) The internet dimension of sexual violence against children. In: Council of Europe, protecting children from sexual violence-A comprehensive approach, pp. 281–282Google Scholar
- European Commission (2015) The European agenda on security. Retrieved from http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf
- European Parliament (2011) DIRECTIVE 2011/92/EU of the European parliament and of the council of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornographyGoogle Scholar
- Europol (2015) The internet organised crime threat assessmentGoogle Scholar
- Geiger M (2005) Evaluating commercial counter-forensic tools. In: DFRWSGoogle Scholar
- Gibson H, Andrews S, Domdouzis K, Hirsch L, Akhgar B (2014) Combining big social media data and FCA for crisis Response. In: Utility and cloud computing (UCC), 2014 IEEE/ACM 7th international conference on (pp. 690–695). IEEEGoogle Scholar
- INHOPE (2014) Facts figures and trends—the fight against online child sexual abuse in perspective. Retrieved 1 Aug 2016, from http://www.inhope.org/tns/resources/statistics-and-infographics/statistics-and-infographics-2014.aspx
- Internet Watch Foundation (2016) Annual Report 2015Google Scholar
- INTERPOL (2016) Victim identification/crimes against children/crime areas/internet/home—INTERPOL. Retrieved 1 August 2016, from http://www.interpol.int/Crime-areas/Crimes-against-children/Victim-identification
- INTERPOL (n.d.) Crimes against children: appropriate terminology. Retrieved from http://www.interpol.int/Crime-areas/Crimes-against-children/Appropriate-terminology
- Kettleborough D (2015) What’s wrong with ‘child pornography’? Retrieved from http://wp.me/p2RS15-9f
- Kurose JF (2005) Computer networking: A top-down approach featuring the internet, 3/E. Pearson Education IndiaGoogle Scholar
- Lalla H, Flowerday S (2010) Towards a standardised digital forensic process: E-mail forensics. In: ISSAGoogle Scholar
- McAfee (2014) Estimating the global cost of cyber crime [June 2014], pp. 1–22Google Scholar
- Meghanathan N, Allam SR, Moore LA (2010) Tools and techniques for network forensics. arXiv preprint arXiv:1004.0570
- Microsoft (n.d.) PhotoDNA cloud service. Retrieved 1 Aug 2016, from https://www.microsoft.com/en-us/photodna
- National Crime Agency (2013) Threat assessment of child sexual exploitation and abuseGoogle Scholar
- Ponemon Institute (2015) 2015 cost of cyber crime study: globalGoogle Scholar
- PriceWaterhouseCoopers (2016) Global economic crime survey 2016Google Scholar
- Rutgaizer M, Shavitt Y, Vertman O, Zilberman N (2012) Detecting pedophile activity in bittorrent networks. In: International conference on passive and active network measurement. Springer Berlin Heidelberg, pp. 106–115Google Scholar
- U.S. Department of Justice (2013) Regional computer forensics laboratory annual report for fiscal year 2013. Retrieved from https://www.rcfl.gov/downloads/documents/fiscal-year-2013
- Westlake B, Bouchard M, Frank R (2012) Comparing methods for detecting child exploitation content online. Proc.—2012 Eur Intell Secur Inform Conf EISIC 2012:156–163Google Scholar