The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
These two applications (Fairplay, RoundUp) are currently the only sources of data in the UnitedStates known to the Department on the volume of child pornography traded over peer to peernetworks. They do not, however, represent the total volume of child pornography traded over theInternet for these reasons:• The number and names of child pornography files change every minute. It is thereforeimpossible to determine an accurate, absolute count of all child pornography files on theInternet. Both Fairplay and RoundUp limit their hits to a discrete number of known files(for technological and investigative efficiency reasons).• Some computers and computer users are exchanging files currently unknown to lawenforcement or not on the watch list for Fairplay and RoundUp; those files, computers,and computer users cannot be counted.• The tools we have to monitor the trading of child pornography on the Internet work onsome of the most widely used computer file sharing clients. 15 There is file trading traffic,some of it presumably child pornography, on other peer-to-peer file sharing applicationsthat are not accounted for by these tools.• Beyond peer-to-peer file sharing tools, child pornography is traded over the internet viae-mail applications, chat rooms, IRC, web site downloads and other applications. Theseforms of child pornography trading are not included in the counts from OperationFairplay and RoundUp.• Not all unique IPs identified by Operations Fairplay and RoundUp represent anindividual who is intentionally trading in child pornography. There have been casesidentified through these operations of users who unintentionally downloaded a single fileof child pornography over the Peer-to-Peer file sharing network (e.g., while searching foradult pornography). While these unintentional down loaders are contributing to the globalproblem of the online availability of child pornography, they are not themselvesconsumers of child pornography. Further, IP addresses are not static, so a consumer ofchild pornography may be counted numerous times by these operations as his IP addresschanges over time.Over 100 search warrants have been completed from leads generated by Operation RoundUpsince its initiation last year.15 One particular network is also used because its configuration supports the efficient investigation of onlinetransactions and because this network was specifically noted in a GAO report as a major source of pornographytrading. U.S. General Accounting Office (2003). Statement of Linda D. Koontz Director, Information ManagementIssues.“File-Sharing Programs. Child Pornography Is Readily Accessible over Peer-to-Peer Networks.” GAO-03-537T.13
The Table below shows the number of unique IP addresses logged by Operations Fairplay andRoundUp.Unique IP Addresses Users Engaging in Peer-to-Peer File Sharing of Child PornographyOperation Operation Fairplay Operation RoundUpFairplay January -June 2009 October 5, 2008-Fiscal Year 2008 October 4, 2009Domestic 1,717,522 1,424,734 9,793,430International 2,891,159 2,325,035 11,877,014Total 4,608,681 3,749,769 21,670,444Source: Wyoming Division of Criminal Investigations, Palm Beach County State's AttorneyOffice and Massachusetts State PoliceThe Table below shows the percentage of unique IP addresses and new GUIDs 16 in the UnitedStates identified by Operation RoundUp over a 3 week period in September-October, 2009.Unique IP Addresses Users and GUIDs Engaging in Peer-to-Peer File Sharing of ChildPornography September-October, 2009 [Operation RoundUp]Date Total US % US US New US New NewRecords Records Unique IP US IP GUID US Guid/IPGuid9/19/09 18,965,165 8,781,521 46.30% 1,033,134 114,1759/27/09 20,144,735 9,226,370 45.80% 1,052,217 19,083 121,232 7,057 36.98%9/30/09 20,862,015 9,493,631 45.51% 1,060,522 8,305 123,916 2,684 32.32%10/3/09 21,425,113 9,698,666 45.27% 1,067,617 7,095 127,394 3,478 49.02%10/4/09 21,670,444 9,793,430 45.19% 1,073,065 5,448 128,335 941 17.27%Source: Massachusetts State Police16 GUID is a unique computer identifier.14
- Page 1: U.S. Department of Justice
- Page 5 and 6: 4. UNITED STATES ATTORNEY’S OFFIC
- Page 7 and 8: V. CONCLUSION .....................
- Page 9 and 10: amount of information, including: (
- Page 12 and 13: assisting state, local, tribal and
- Page 14 and 15: goals that can provide some measura
- Page 16 and 17: State and federal investigators and
- Page 18 and 19: a. Available indicators suggest chi
- Page 22 and 23: The Figure below shows the number o
- Page 24 and 25: For FY 2008, ICAC Task Forces repor
- Page 26 and 27: Some researchers suggest that viewi
- Page 28 and 29: interests in children and their des
- Page 31 and 32: could later bediscovered by lawenfo
- Page 33 and 34: domains are commercial purveyors of
- Page 35 and 36: • The offender communicates with
- Page 37 and 38: 1. Online enticement complaints are
- Page 39 and 40: elationship. After the child has ga
- Page 41 and 42: Influenced and Corrupt Organization
- Page 43 and 44: D. Child Sex TourismChild sex touri
- Page 45 and 46: Exploitation of Children Today (PRO
- Page 47 and 48: A task force model often is employe
- Page 49 and 50: The United States Attorney’s offi
- Page 51 and 52: FBI and CEOS, in conjunction with N
- Page 53 and 54: The effects of child sex tourism re
- Page 55 and 56: 352 investigations and 162 charged
- Page 57 and 58: • CEOS worked closely with NDIC i
- Page 59 and 60: • Alameda County, CA, Children's
- Page 61 and 62: • Additional data have been submi
- Page 63 and 64: postsentence persons and civilly co
- Page 65 and 66: B. A Review of the Internet Crimes
- Page 67 and 68: • Providing training and technica
- Page 69 and 70: Table 1 : ICAC Task Force Agencies
<strong>The</strong>se two applications (Fairplay, RoundUp) are currently the only sources of data in the UnitedStates known to the Department on the volume of child pornography traded over peer to peernetworks. <strong>The</strong>y do not, however, represent the total volume of child pornography traded over theInternet <strong>for</strong> these reasons:• <strong>The</strong> number <strong>and</strong> names of child pornography files change every minute. It is there<strong>for</strong>eimpossible to determine an accurate, absolute count of all child pornography files on theInternet. Both Fairplay <strong>and</strong> RoundUp limit their hits to a discrete number of known files(<strong>for</strong> technological <strong>and</strong> investigative efficiency reasons).• Some computers <strong>and</strong> computer users are exchanging files currently unknown to lawen<strong>for</strong>cement or not on the watch list <strong>for</strong> Fairplay <strong>and</strong> RoundUp; those files, computers,<strong>and</strong> computer users cannot be counted.• <strong>The</strong> tools we have to monitor the trading of child pornography on the Internet work onsome of the most widely used computer file sharing clients. 15 <strong>The</strong>re is file trading traffic,some of it presumably child pornography, on other peer-to-peer file sharing applicationsthat are not accounted <strong>for</strong> by these tools.• Beyond peer-to-peer file sharing tools, child pornography is traded over the internet viae-mail applications, chat rooms, IRC, web site downloads <strong>and</strong> other applications. <strong>The</strong>se<strong>for</strong>ms of child pornography trading are not included in the counts from OperationFairplay <strong>and</strong> RoundUp.• Not all unique IPs identified by Operations Fairplay <strong>and</strong> RoundUp represent anindividual who is intentionally trading in child pornography. <strong>The</strong>re have been casesidentified through these operations of users who unintentionally downloaded a single fileof child pornography over the Peer-to-Peer file sharing network (e.g., while searching <strong>for</strong>adult pornography). While these unintentional down loaders are contributing to the globalproblem of the online availability of child pornography, they are not themselvesconsumers of child pornography. Further, IP addresses are not static, so a consumer ofchild pornography may be counted numerous times by these operations as his IP addresschanges over time.Over 100 search warrants have been completed from leads generated by Operation RoundUpsince its initiation last year.15 One particular network is also used because its configuration supports the efficient investigation of onlinetransactions <strong>and</strong> because this network was specifically noted in a GAO report as a major source of pornographytrading. U.S. General Accounting Office (2003). Statement of Linda D. Koontz Director, In<strong>for</strong>mation ManagementIssues.“File-Sharing Programs. <strong>Child</strong> Pornography Is Readily Accessible over Peer-to-Peer Networks.” GAO-03-537T.13