Child Pornography Web Sites

Luders, Wade
July 2007
FBI Law Enforcement Bulletin;Jul2007, Vol. 76 Issue 7, p17
The article presents information on the strategies being used by the administrators of child pornography Web sites to evade law enforcement agencies. The Proxy servers conceal the online identity or Internet protocol address of the Web site users. By separating the advertise-and-join Web site from the members area, child pornographers hide their illegal content except to paying customers. The use of a combination of URL encoding techniques can conceal the actual location of illegal Web site content.


Related Articles

  • New tools aimed at closing child porn sites.  // Contemporary Sexuality;Nov2006, Vol. 40 Issue 11, p14 

    The article reports on the implementation of the successful British program that aims to decrease child pornography on the Internet in the U.S. The National Center for Missing and Exploited Children (NCMEC) examines suspected child porn sites and report violators to commercial website providers...

  • Outlawing Lolita: Testing the Constitutionality and Practicality of the "Victimless" Provisions of the Anti-Child Pornography Act of 2009. Cruz, Emmanuel Rey P. // Ateneo Law Journal;Dec2010, Vol. 55 Issue 3, p757 

    The article discusses the victimless provisions in the Anti-Pornography Act of 2009 of the Philippines. It states that child pornography is one of the major concerns that warrant a comprehensive legislation in the Philippines. It mentions that the victimless provisions aim to extend punishments...

  • The magic of the INTERNET. HOLLOWAY, KATHY // Nursing Review (1175-2904);Apr2011, Vol. 11 Issue 12, p8 

    The article discusses some basic terms about the Internet and websites which can be visited by medical professionals. It offers a description of what is an internet protocol (IP), a domain name system (DNS), and uniform resource locator (URL). The author also suggests looking into the website of...

  • INTERNET TIPS. Spanbauer, Scott // PCWorld;Jul2006, Vol. 24 Issue 7, p134 

    The article offers some tips about the Internet. To learn about an individual trying to connect to another computer, click Start and then Run. Type command in the open field and press Enter. At the command prompt, enter nslookup then space and then Internet protocol (IP) address. Press enter and...

  • The Great Firewall Revealed.  // Chinascope;May/Jun2008, p36 

    The article examines the Internet blocking mechanisms implemented by China to block Web sites. The filtering mechanisms used include Internet protocol (IP) blocking, TCP connection cut-off and URL hijacking. According to the article, IP blocking is done by dropping IP packets destined to certain...

  • DDIonline.com launches!  // Display & Design Ideas;Jun2010, Vol. 22 Issue 4, p11 

    The article reports that "DDI Magazine," has launched a new uniform resource locator (URL) www. ddionline.com for its website.

  • CORRECTIONS.  // Crain's New York Business;1/2/2012, Vol. 28 Issue 1, p0003 

    A correction to the article "New York, New York" in the December 12, 2011 issue is presented which discusses NewYears.com's marketing of local venue tickets for the New Year's Eve.

  • Sexting: Risky Actions and Overreactions. BOWKER, ART; SULLIVAN, MICHAEL // FBI Law Enforcement Bulletin;Jul2010, Vol. 79 Issue 7, p27 

    The article provides insights on how law enforcement officers in the U.S. can tackle with the issue of juvenile sexting, in which naked images are sent via text messages or posted online. It advises law enforcement officers to carefully consider the alleged misconduct in order to determine the...

  • Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks. Jemaa, Maher Ben; Abid, Nahla; Laurent-Maknavicius, Maryline; Chaouchi, Hakima // Journal of Computer Systems, Networks, & Communications;2009, p1 

    The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics