[LINK] ACMA Internet Filter List Leaked
rene
rene.lk at libertus.net
Sat Mar 21 17:46:36 AEDT 2009
On Fri, 20 Mar 2009 11:06:59 +1100, Paul Brooks wrote:
> I highly doubt that the kind of material that we might universally
> like to see blocked is likely to be made available on a publicly
> accessable website. Surely the last thing somebody with a library of
> this nature would want is for it to be stumbled across - apart from
> being illegal, it would also be very valuable to other like-minded
> people, so I naively expect its more likely to be hidden behind many
> layers of secrecy and private networks to avoid the 'club' being
> penetrated by law enforcement agents and to protect the scarcity and
> value.
And, according to AFP staff on Background Briefing 15 Mar 2009, claims of
stumbling across 'cp' material on the web "don't wash":
http://www.abc.net.au/rn/backgroundbriefing/stories/2009/2512171.htm
======
Wendy Carlisle: The peddlers of child pornography are smart, and
technically very advanced. And when they set up sites on the web, they
don't signpost it with a name easily found on Google. They hijack innocent
websites, and engage in sophisticated hit-and-run operations.
Neil Gaugan (AFP): A couple of investigations we've done recently have been
people hacking into websites, and then downloading child abuse material on
to those websites, and through word of mouth and through instant messaging
and the like, people that like to look at these type of images have gone in
and downloaded the images from that hack website. Now the hack website is
not in any way, shape or form, involved in the distribution.
Wendy Carlisle: They're just the temporary host?
Neil Gaugan (AFP) : Exactly right. They are the temporary host. The other
thing we are finding now is the proliferation of this type of material
through peer-to-peer networks. Most people would be familiar with things
such as LimeWire, which is a video sharing, which does a good purpose in
life, but unfortunately we have a number of applications where people
utilise them, to actually share this type of material.
Wendy Carlisle: How much child abuse imagery would be on those peer-to-peer
networks, and how significant are they in the whole trade of this material?
Neil Gaugan (AFP) : Operation Resistance was a job we did towards the end
of last calendar year, which resulted in a significant number of arrests in
Australia, over 20, then we seized in excess of 500,000 images and in
excess of 40 hours worth of video. So that's a fairly significant amount of
information, as you can no doubt ascertain.
Wendy Carlisle: The AFP's task is enormous, they're constantly liaising
with Interpol, the FBI and other child protection units in Europe. The
trade in child abuse images is enormous; no-one knows really how big or how
many children are being abused, but with so many vulnerable children across
the world and with men willing to pay big dollars for prize images, the
stakes are high.
Sitting behind one computer screen when Background Briefing arrived at the
AFP, was a federal agent, whose name was classified, as someone who might
soon go undercover. We can only introduce him as Tim.
Tim (AFP) : You do need to use the right search terms within sort of Google
or the bigger search engines. A lot of these people find the sites by going
into chat rooms that are on the topic of child pornography, they will sort
of trade the names of the sites.
Wendy Carlisle: So they're secret websites, yes?
Tim: For sure, for sure. But fully accessible by the public if they know...
Wendy Carlisle: If you knew the keywords?
Tim: If you knew what you were looking for, or if you had the IP address or
if you had the actual URL, the domain name of the site, you could find it.
Wendy Carlisle: Would it be easy to stumble across?
Tim: No, it's not that easy to stumble across. Often we hear the excuse 'I
was just searching for something, for maybe adult pornography and I
stumbled across this child pornography site, and that's why.'
Wendy Carlisle: That doesn't wash?
Tim: That really doesn't wash. It's an excuse. And for our forensic
investigators, we can tell exactly what search terms people have been
using, and what exactly they have been looking for, so it's very easy to
prove what they're actually searching for and how they found it.
==========
Irene
More information about the Link
mailing list