Reports of child sexual abuse material (CSAM) are exploding online. And the actors behind this illegal content are taking advantage of new technologies to protect their operations. In this talk, the audience will get a detailed look at how journalists from a major news organization worked with expert research professionals to investigate a ring of websites hosting abusive imagery run by a major CSAM actor that has been operating on the open web for years. We will discuss both our data sources and data analysis methods we used to derive compelling results for this study. Finally, we will expose the patterns of these websites by looking at the details of their network infrastructures, hosting companies and evasion techniques used over time.


time: 11:30

Other sessions:

EU (Cyber) Roadmap for the Future

The Pursuit of Better E-mail Security at de Tweede Kamer

Public-Private Partnerships World Café

Hacking 'Privacy by Design'

Strengthening our Resilience: the Compelling Case for a Vulnerability Management Program

Offender Behaviours: Innovative Methods to Examine Web Defacers and Account Hijackers