Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks
dc.contributor.author | Bissias, G., Levine, B., Liberatore, M., Lynn, B., Moore, J., Wallach, H., & Wolak, J. | |
dc.date.accessioned | 2016-09-30T14:15:08Z | |
dc.date.available | 2016-09-30T14:15:08Z | |
dc.date.issued | 2016 | |
dc.description.abstract | We provide detailed measurement of the illegal trade in child exploitation material (CEM, also known as child pornography) from mid-2011 through 2014 on five popular peer-to-peer (P2P) file sharing networks. We characterize several observations: counts of peers trafficking in CEM; the proportion of arrested traffickers that were identified during the investigation as committing contact sexual offenses against children; trends in the trafficking of sexual images of sadistic acts and infants or toddlers; the relationship between such content and contact offenders; and survival rates of CEM. In the 5 P2P networks we examined, we estimate there were recently about 840,000 unique installations per month of P2P programs sharing CEM worldwide. We estimate that about 3 in 10,000 Internet users worldwide were sharing CEM in a given month; rates vary per country. We found an overall month-to-month decline in trafficking of CEM during our study. By surveying law enforcement we determined that 9.5% of persons arrested for P2P-based CEM traffic-king on the studied networks were identified during the investigation as having sexually offended against children offline. Rates per network varied, ranging from 8% of arrests forCEM trafficking on Gnutella to 21% on BitTorrent. Within BitTorrent, where law enforcement applied their own measure of content severity, the rate of contact offenses among peers sharing the most-severe CEM (29%) was higher than those sharing the least-severe CEM (15%). Although the persistence of CEM on the networks varied, it generally survived for long periods of time; e.g., BitTorrent CEM had a survival rate near 100%. (Author Abstract) | en_US |
dc.identifier.citation | Bissias, G., Levine, B., Liberatore, M., Lynn, B., Moore, J., Wallach, H., & Wolak, J. (2016). Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. Child abuse & neglect, 52, 185-199. | en_US |
dc.identifier.uri | https://www.researchgate.net/profile/Janis_Wolak/publication/288932502_Characterization_of_contact_offenders_and_child_exploitation_material_trafficking_on_five_peer-to-peer_networks/links/56940c3508ae820ff072aa3f.pdf | |
dc.identifier.uri | http://hdl.handle.net/11212/2956 | |
dc.language.iso | en | en_US |
dc.publisher | Child Abuse & Neglect | en_US |
dc.subject | child abuse | en_US |
dc.subject | sexual abuse | en_US |
dc.subject | CSEC | en_US |
dc.subject | torrents | en_US |
dc.subject | cyber crime | en_US |
dc.subject | research | en_US |
dc.subject | internet | en_US |
dc.title | Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks | en_US |