Conference Paper

Lantern to the Underworld - Following User Actions Using Bing URL Parameters When Child Exploitation Terms Are Suggested by the Search Engine

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Internet users use the web browser to perform various activities on the internet such as browsing internet, email, internet banking, social media applications, download files-videos etc. As web browser is the only way to access the internet and cybercrime criminal uses or target the web browser to commit the crime related to internet. It is very important for the digital forensic examiner to collect and analysis artifacts related to web browser usage of the suspect. There are various browsers available in the market such as Google Chrome, Internet Explorer, Firefox Mozilla, Safari and Opera etc, among which Google Chrome is very popular among the internet user community. Our literature survey shows that most of the researches used prefetch file and live memory analysis as source of information to extract artifacts. In this research paper, we analyzed default artifacts location, history, cookies, login data, topsides, shortcuts, user profile, prefetch file and RAM dump to collect artifacts related to internet activities on windows installed Google Chrome. The outcome of this research will serve to be a significant resource for law enforcement, computer forensic investigators, and the digital forensics research community.
Article
Full-text available
In the past three decades, there has been an exponential increase in the worldwide availability of Internet access and devices that are able to access online materials. This literature review investigated whether increased accessibility of Internet child pornography (CP) increases the risk of in-person child sexual exploitation. The current review found little to no evidence that availability of the Internet has increased the worldwide incidence or prevalence of in-person child sexual abuse. In fact, during the time period in which the Internet has flourished, international crime statistics have shown a steady decrease of in-person child sexual abuse. The only exception to this trend is an increase in Internet child pornography or luring offenses (e.g., Stats Can, 2014), which involves child abuse by definition. This article reviews the impact of the Internet on child sexual abuse. It also reviews the characteristics of online CP offenders. Treatment of these offenders and prevention of such offenses is also discussed.
Conference Paper
Full-text available
Tor is a popular ‘darknet’, a network that aims to conceal its users’ identities and online activities. Darknets are composed of host machines that cannot be accessed by conventional means, which is why the content they host is typically not indexed by traditional search engines like Google and Bing. On Tor, web content and other types of services can anonymously be made available as so-called hidden services. Obviously, where anonymity can be a vehicle for whistleblowers and political dissidents to exchange information, the reverse of the medal is that it also attracts malicious actors. In our research, we aim to develop a detailed understanding of what Tor is being used for. We applied classification and topic model-based text mining techniques to the content of over a thousand Tor hidden services in order to model their thematic organization and linguistic diversity. As far as we are aware, this paper presents the most comprehensive content-based analysis of Tor to date.
Article
Full-text available
Limited research has been conducted on the differences between those individuals who view, download, or share online child pornography (CP) from those who do not. Using Bandura's theory of reciprocal determinism, the current study tested whether Internet CP-users differed from non-CP users in their personality characteristics. 307 respondents completed an online survey: 277 were classified as non-CP users, and 30 were classified as CP users. Statistical analyses revealed a relationship between higher scores on exploitive-manipulative amoral dishonesty (EMAD) traits, lower scores on internal moral choice (IV), and the viewing of child pornography. Furthermore, the study suggests women are engaging in Internet CP consumption more often than previously suggested. Implications and limitations of the findings are discussed and suggestions for future research are presented.
Book
Full-text available
Child pornography, particularly that available via the Internet, has become a cause of huge social concern in recent years. This book examines the reality behind the often hysterical media coverage of the topic. Drawing on extensive new research findings, it examines how child pornography is used on the Internet and the social context in which such use occurs, and develops a model of offending behaviour to better help understand and deal with the processes of offending. Detailed case studies and offenders' own accounts are used to illustrate the processes involved in offending and treatment. The authors argue that we need to refine our ideas of offending, and that while severe deterrents need to be associated with possession of child pornography, a better understanding is needed of the links between possession and committing a contact offence. Only by improving our understanding of this complex and very controversial topic can we hope to deal effectively with offenders and with their child victims. This is a book which will become an essential read for anyone involved with offenders or victims from a psychological, judicial or social background.
Conference Paper
Over the last decade, the illegal distribution of child sexual abuse imagery (CSAI) has transformed alongside the rise of online sharing platforms. In this paper, we present the first longitudinal measurement study of CSAI distribution online and the threat it poses to society's ability to combat child sexual abuse. Our results illustrate that CSAI has grown exponentially-to nearly 1 million detected events per month-exceeding the capabilities of independent clearinghouses and law enforcement to take action. In order to scale CSAI protections moving forward, we discuss techniques for automating detection and response by using recent advancements in machine learning.
Article
The use of search engines and associated search functions to locate content online is now common practice. As a result, a forensic examination of a suspect's online search activity can be a critical aspect in establishing whether an offense has been committed in many investigations. This article offers an analysis of online search URL structures to support law enforcement and associated digital forensics practitioners interpret acts of online searching during an investigation. Google, Bing, Yahoo!, and DuckDuckGo searching functions are examined, and key URL attribute structures and metadata have been documented. In addition, an overview of social media searching covering Twitter, Facebook, Instagram, and YouTube is offered. Results show the ability to extract embedded metadata from search engine URLs which can establish online searching behaviors and the timing of searches.
Article
The aim of this exploratory study was to compare internet sex offenders with a matched group of child molesters in the Greater London Area. Over an 8-month period 210 subjects were assessed, of whom 90 were internet sex offenders and 120 were child molesters. A wide range of background data was collected, including a number of psychometric measures to determine risk and personality traits. The research identified a number of similarities between internet sex offenders and child molesters on background variables. Specifically, in comparison to the child molesters, the internet offenders reported more psychological difficulties in adulthood and fewer prior sexual convictions. The socio-affective characteristics of internet offenders and child molesters look similar, but the antisocial variables, such as, 'acting out' and breaking social rules underlines their difference. The follow up research was carried out after a short period of time at risk—averaging 18 months—but suggested that internet sex offenders were significantly less likely to fail in the community than child molesters in terms of all types of recidivism.
Article
Deindividuation theory informs us that anonymity is likely to beget unethical or violent behavior. Since 2002, Tor has implemented hidden services that allow users to host platforms anonymously and these have behaved accordingly with deindividuation theory: the services are used mostly for unethical content. This article realizes the first systematic analysis of users behavior on Tor hidden services. After classifying 1171 services into 23 categories, and carrying out a content analysis of 2165 posts, the article concludes that unethical content is quantitatively and qualitatively more preponderant than ethical content. The advantages of anonymity to store and access this ethical content do not balance the negative impacts caused by the unethical content. Freedom of expression and the lack of censorship, if theoretically praiseworthy, are overshadowed by what users have done with it: using Tor hidden services in unethical ways. Unethical content is undesirable by its very nature of affecting people negatively, which should lead us to reconsider the development of the Tor hidden services. For users simply wishing to stay anonymous and to act ethically, the use of Tor and of web services located in countries with a morally balanced legal system are sufficient. The support for the further development of Tor hidden services should hence stop, which would not hinder the functioning of Tor as an anonymity provider to those needing it.
Article
Our study is the first to look at mobile device use for child sexual exploitation material (CSEM) consumption, and at the global impact of deterrence efforts by search providers. We used data from Google, Bing, and Yandex to assess how web searches for CSEM are being conducted, both at present and historically. Our findings show that the blocking efforts by Google and Microsoft have resulted in a 67% drop in the past year in web-based searches for CSEM. Additionally, our findings show that mobile devices are a substantial platform for web-based consumption of CSEM, with tablets and smartphones representing 32% of all queries associated with CSEM conducted on Bing. Further, our findings show that a major search engine not located in the United States, Yandex, did not undertake blocking efforts similar to those implemented by Google and Microsoft and has seen no commensurate drop in CSEM searches and continues to profit from ad revenue on these queries. While the efforts by Google and Microsoft have had a deterrence effect in the United States, searchers from Russia and other locations where child pornography possession is not criminalized have continued to use these services. Additionally, the same lax enforcement environment has allowed searchers from the United States to utilize Yandex with little fear of detection or referral to United States law enforcement from the Russian authorities. Copyright © 2015 Elsevier Ltd. All rights reserved.
How Bing Delivers Search Results
  • Microsoft
Microsoft. "How Bing Delivers Search Results." Bing Help. Accessed August 23, 2019. https://help.bing.microsoft.com/#apex/18/enus/10016/0.
Microsoft Tackles the Child Pornography Problem
  • Steve Lohr
Lohr, Steve. "Microsoft Tackles the Child Pornography Problem." The New York Times. The New York Times, December 16, 2009. https://bits.blogs.nytimes.com/2009/12/16/microsofttackles-the-child-pornography-problem/.
Google and Microsoft Agree Steps to Block Abuse Images
  • Mark Ward
Ward, Mark. "Google and Microsoft Agree Steps to Block Abuse Images." BBC News. BBC, November 18, 2013. https://www.bbc.com/news/uk-24980765.
How Bing Became the Search Engine for Porn
  • E Dickson
Dickson, E J. "How Bing Became the Search Engine for Porn." The Daily Dot, March 2, 2020. https://www.dailydot.com/debug/bing-porn-searchengine/.
Trends in law enforcement responses to technology-facilitated child sexual exploitation crimes: The Third National Juvenile Online Victimization Study (NJOV-3)
  • J Wolak
  • D Finkelhor
  • K Mitchell
J. Wolak, D. Finkelhor, and K. Mitchell, "Trends in law enforcement responses to technology-facilitated child sexual exploitation crimes: The Third National Juvenile Online Victimization Study (NJOV-3)", Crimes against Children Research Center, Durham, NH, 2020.
Forensic analysis of private browsing artifacts
  • Said
  • Noora Huwida
  • Ibtesam Al Al Mutawa
  • Mario Awadhi
  • Guimaraes
Said, Huwida, Noora Al Mutawa, Ibtesam Al Awadhi, and Mario Guimaraes. "Forensic analysis of private browsing artifacts." In 2011 International Conference on Innovations in Information Technology, pp. 197-202. IEEE, 2011.
Introducing Unfurl" dfir.blog. dfir.blog
  • Ryan Benson
Benson, Ryan. "Introducing Unfurl" dfir.blog. dfir.blog, June 11, 2021. https://dfir.blog/introducing-unfurl/.
The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong
  • Michael H Keller
Keller, Michael H., and Gabriel J. X. "The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong?" The New York Times. The New York Times, September 29, 2019. https://www.nytimes.com/interactive/2019/09/28/us/ch ild-sex-abuse.html.