Child Pornography Websites on the Darknet
Julak Lee
Julak Lee, Department of Security Management, Kyonggi University, Gwanggyosan-Ro, Suwon-Si, Korea.
Manuscript received on 17 August 2019 | Revised Manuscript received on 27 August 2019 | Manuscript Published on 16 September 2019 | PP: 48-54 | Volume-8 Issue-2S6 July 2019 | Retrieval Number: B10100782S619/2019©BEIESP | DOI: 10.35940/ijrte.B1010.0782S619
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cybercrime has been moving to the darknet which provides privacy and anonymity to users. Despite international efforts to eradicate child pornography, websites to distribute lurid materials are found to be resilient. Due to the significance of the criminality, law enforcement authorities have taken covert measures to dismantle the leadership of these websites, focusing on arresting the organizers and core members. In this paper, two cases involving child pornography websites were examined to disclose how these websites were structured and managed as well as investigation strategies and tactics employed by investigation agencies. Some similarities were identified during pre-arrest and after-arrest stages for an investigation goal and evidence verification, respectively. However, during a deanonymisation stage the two agencies used different investigation strategies to approach and arrest the target criminals. It is very likely that darknet websites will be managed in diverse manners, or that more anonymity and encryption will make pornography circulation structure invisible and unreachable. In this study, it was argued that perfect anonymity is not provided to the darknet users and that investigation agencies should make technical and social engineering efforts to deanonymise identities of criminals.
Keywords: Child Pornography, Darknet, Criminal Investigation, Cryptocurrency, Management Style.
Scope of the Article: Digital Rights Management