TITLE

Child Pornography Web Sites

AUTHOR(S)
Luders, Wade
PUB. DATE
July 2007
SOURCE
FBI Law Enforcement Bulletin;Jul2007, Vol. 76 Issue 7, p17
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article presents information on the strategies being used by the administrators of child pornography Web sites to evade law enforcement agencies. The Proxy servers conceal the online identity or Internet protocol address of the Web site users. By separating the advertise-and-join Web site from the members area, child pornographers hide their illegal content except to paying customers. The use of a combination of URL encoding techniques can conceal the actual location of illegal Web site content.
ACCESSION #
27399161

Tags: INTERNET pornography;  CHILD pornography;  CHILDREN & pornography;  WEBSITES;  LAW enforcement agencies;  INTERNET protocol;  UNIFORM Resource Locators

 

Related Articles

  • New tools aimed at closing child porn sites.  // Contemporary Sexuality;Nov2006, Vol. 40 Issue 11, p14 

    The article reports on the implementation of the successful British program that aims to decrease child pornography on the Internet in the U.S. The National Center for Missing and Exploited Children (NCMEC) examines suspected child porn sites and report violators to commercial website providers...

  • Outlawing Lolita: Testing the Constitutionality and Practicality of the "Victimless" Provisions of the Anti-Child Pornography Act of 2009. Cruz, Emmanuel Rey P. // Ateneo Law Journal;Dec2010, Vol. 55 Issue 3, p757 

    The article discusses the victimless provisions in the Anti-Pornography Act of 2009 of the Philippines. It states that child pornography is one of the major concerns that warrant a comprehensive legislation in the Philippines. It mentions that the victimless provisions aim to extend punishments...

  • The Great Firewall Revealed.  // Chinascope;May/Jun2008, p36 

    The article examines the Internet blocking mechanisms implemented by China to block Web sites. The filtering mechanisms used include Internet protocol (IP) blocking, TCP connection cut-off and URL hijacking. According to the article, IP blocking is done by dropping IP packets destined to certain...

  • INTERNET TIPS. Spanbauer, Scott // PC World;Jul2006, Vol. 24 Issue 7, p134 

    The article offers some tips about the Internet. To learn about an individual trying to connect to another computer, click Start and then Run. Type command in the open field and press Enter. At the command prompt, enter nslookup then space and then Internet protocol (IP) address. Press enter and...

  • The magic of the INTERNET. HOLLOWAY, KATHY // Nursing Review (1175-2904);Apr2011, Vol. 11 Issue 12, p8 

    The article discusses some basic terms about the Internet and websites which can be visited by medical professionals. It offers a description of what is an internet protocol (IP), a domain name system (DNS), and uniform resource locator (URL). The author also suggests looking into the website of...

  • DDIonline.com launches!  // Display & Design Ideas;Jun2010, Vol. 22 Issue 4, p11 

    The article reports that "DDI Magazine," has launched a new uniform resource locator (URL) www. ddionline.com for its website.

  • Sexting: Risky Actions and Overreactions. BOWKER, ART; SULLIVAN, MICHAEL // FBI Law Enforcement Bulletin;Jul2010, Vol. 79 Issue 7, p27 

    The article provides insights on how law enforcement officers in the U.S. can tackle with the issue of juvenile sexting, in which naked images are sent via text messages or posted online. It advises law enforcement officers to carefully consider the alleged misconduct in order to determine the...

  • Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks. Jemaa, Maher Ben; Abid, Nahla; Laurent-Maknavicius, Maryline; Chaouchi, Hakima // Journal of Computer Systems, Networks, & Communications;2009, p1 

    The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements....

  • Internet blacklist draws fire.  // Guide;May2009, Vol. 29 Issue 5, p12 

    The article reports on the Australian government blacklisting some of gay websites to filter out inappropriate subjects. Nearly 2,400 sites have been targeted by the government to which Communications Minister Stephen Conroy viewed the list as irresponsible. The list of websites encourage child...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics