Reports of child sexual abuse material (CSAM) are exploding online. And the actors behind this illegal content are taking advantage of new technologies to protect their operations. In this talk, the audience will get a detailed look at how journalists from a major news organization worked with expert research professionals to investigate a ring of websites hosting abusive imagery run by a major CSAM actor that has been operating on the open web for years. We will discuss both our data sources and data analysis methods we used to derive compelling results for this study. Finally, we will expose the patterns of these websites by looking at the details of their network infrastructures, hosting companies and evasion techniques used over time.


time: 11:30

Other sessions:

Dynamics of Bulletproof Hosting

Improving Connection between Private Investigations and LEA/Judicial Reaction

Unravelling the Dynamic Complexity of Cyber Security Investment Decision Making

Strengthening our Resilience: the Compelling Case for a Vulnerability Management Program

Not Facing the Adversary: Cyber Security Without Armed Forces