Skip to main content

Combatting Cybercrime and Sexual Exploitation of Children: An Open Source Toolkit

  • Chapter
  • First Online:
Open Source Intelligence Investigation

Abstract

This chapter presents the UINFC2 “Engaging Users in preventing and fighting Cybercrime” software platform, showcasing how software tools designed to detect, collect, analyse, categorise and correlate information that is publically available online, can be used to enable and enhance the reporting, detection and removal capabilities of law enforcement and hotlines in response to cybercrimes and crimes associated with the sexual exploitation of children. It further discusses the social, economic and wider impact of cybercrime on a European and global scale, highlighting a number of challenges it poses to modern society before moving on to discuss the specific challenge posed by the proliferation of online child exploitation material and discussing the functionalities of the UINFC2 system as a response mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Allsup R, Thomas E, Monk B, Frank R, Bouchard M (2015) Networking in child exploitation: assessing disruption strategies using registrant information. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining 2015, ACM, pp. 400–407

    Google Scholar 

  • Arthur KK, Venter HS (2004) An investigation into computer forensic tools. In: ISSA, pp. 1–11

    Google Scholar 

  • Brewster B, Andrews S, Polovina S, Hirsch L, Akhgar B (2014) Environmental scanning and knowledge representation for the detection of organised crime threats. In: International conference on conceptual structures. Springer International Publishing, pp. 275–280

    Google Scholar 

  • Carr J (2011) The internet dimension of sexual violence against children. In: Council of Europe, protecting children from sexual violence-A comprehensive approach, pp. 281–282

    Google Scholar 

  • European Commission (2015) The European agenda on security. Retrieved from http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf

  • European Parliament (2011) DIRECTIVE 2011/92/EU of the European parliament and of the council of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography

    Google Scholar 

  • Europol (2015) The internet organised crime threat assessment

    Google Scholar 

  • Geiger M (2005) Evaluating commercial counter-forensic tools. In: DFRWS

    Google Scholar 

  • Gibson H, Andrews S, Domdouzis K, Hirsch L, Akhgar B (2014) Combining big social media data and FCA for crisis Response. In: Utility and cloud computing (UCC), 2014 IEEE/ACM 7th international conference on (pp. 690–695). IEEE

    Google Scholar 

  • INHOPE (2014) Facts figures and trends—the fight against online child sexual abuse in perspective. Retrieved 1 Aug 2016, from http://www.inhope.org/tns/resources/statistics-and-infographics/statistics-and-infographics-2014.aspx

  • Internet Watch Foundation (2016) Annual Report 2015

    Google Scholar 

  • INTERPOL (2016) Victim identification/crimes against children/crime areas/internet/home—INTERPOL. Retrieved 1 August 2016, from http://www.interpol.int/Crime-areas/Crimes-against-children/Victim-identification

  • INTERPOL (n.d.) Crimes against children: appropriate terminology. Retrieved from http://www.interpol.int/Crime-areas/Crimes-against-children/Appropriate-terminology

  • Kettleborough D (2015) What’s wrong with ‘child pornography’? Retrieved from http://wp.me/p2RS15-9f

  • Kurose JF (2005) Computer networking: A top-down approach featuring the internet, 3/E. Pearson Education India

    Google Scholar 

  • Lalla H, Flowerday S (2010) Towards a standardised digital forensic process: E-mail forensics. In: ISSA

    Google Scholar 

  • McAfee (2014) Estimating the global cost of cyber crime [June 2014], pp. 1–22

    Google Scholar 

  • Meghanathan N, Allam SR, Moore LA (2010) Tools and techniques for network forensics. arXiv preprint arXiv:1004.0570

  • Microsoft (n.d.) PhotoDNA cloud service. Retrieved 1 Aug 2016, from https://www.microsoft.com/en-us/photodna

  • National Crime Agency (2013) Threat assessment of child sexual exploitation and abuse

    Google Scholar 

  • Ponemon Institute (2015) 2015 cost of cyber crime study: global

    Google Scholar 

  • PriceWaterhouseCoopers (2016) Global economic crime survey 2016

    Google Scholar 

  • Rutgaizer M, Shavitt Y, Vertman O, Zilberman N (2012) Detecting pedophile activity in bittorrent networks. In: International conference on passive and active network measurement. Springer Berlin Heidelberg, pp. 106–115

    Google Scholar 

  • U.S. Department of Justice (2013) Regional computer forensics laboratory annual report for fiscal year 2013. Retrieved from https://www.rcfl.gov/downloads/documents/fiscal-year-2013

  • Westlake B, Bouchard M, Frank R (2012) Comparing methods for detecting child exploitation content online. Proc.—2012 Eur Intell Secur Inform Conf EISIC 2012:156–163

    Google Scholar 

Download references

Acknowledgments

The research leading to these results was funded by the European Commission’s Prevention of and Fight against Crime, Illegal Use of Internet (INT) under grant agreement number [HOME/2013/ISEC/AG/INT/4000005215].

This project has been funded with the support from the European Commission. This publication reflects the views only of the authors, and the European Commission cannot be held responsible for any use which may be made of the information contained therein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ben Brewster .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this chapter

Cite this chapter

Charalambous, E., Kavallieros, D., Brewster, B., Leventakis, G., Koutras, N., Papalexandratos, G. (2016). Combatting Cybercrime and Sexual Exploitation of Children: An Open Source Toolkit. In: Akhgar, B., Bayerl, P., Sampson, F. (eds) Open Source Intelligence Investigation. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-47671-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47671-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47670-4

  • Online ISBN: 978-3-319-47671-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics