How the world’s biggest dark web platform spreads child sex abuse material — and why it’s hard to stop
A look at the seediest corners of the Tor network
Tor’s perverted underworld
TheTor Projectwas initially developed by the US Navy to protect online intelligence communications, before its code was publicly released in 2002. The Tor Project’s developers have acknowledged the potential to misuse the service which, when combined with technologies such asuntraceable cryptocurrency, can help hide criminals.
Tor is an overlay network that exists “on top” of the internet and merges two technologies. The first is the onion service software. These are the websites, or “onion services”, hosted on the Tor network. These sites require an onion address and their servers’ physical locations are hidden from users.
The second is Tor’s privacy-maximizing browser. It enables users to browse the internet anonymously by hiding their identity and location. While the Tor browser is needed to access onion services, it can also be used to browse the “surface” internet.
Accessing the Tor network is simple. And while search engine options are limited (there’s no Google), discovering onion services is simple, too. TheBBC, New York Times, ProPublica, Facebook, the CIA and Pornhub all have a verified presence on Tor, to name a few.
Service dictionaries such as “The Hidden Wiki” list addresses on the network, allowing users to discover other (often illicit) services.
Child sex abuse material and abuse porn is prevalent
The number of onion services active on the Tor network is unknown, although the Tor Project estimates about 170,000 active addresses. The architecture of the network allows partial monitoring of the network traffic and a summary of which services are visited. Among the visited services, child sex abuse material is common.
Of theestimated2.6 million users that use the Tor network daily,one studyreported only 2% (52,000) of users accessed onion services. This suggests most users access the network toretain their online privacy, rather than use anonymous onion services.
That said, the same study found from a single data capture that about 80% of traffic to onion services was directed to services which did offer illegal porn, abuse images and/or child sex abuse material.
Anotherstudyestimated 53.4% of the 170,000 or so active onion domains contained legal content, suggesting 46.6% of services had content which was either illegal, or in a grey area.
Although scams make up a significant proportion of these services, cryptocurrency services, drug deals, malware, weapons, stolen credentials, counterfeit products and child sex abuse material also feature in this dark part of the internet.
Only about 7.5% of the child sex abuse material on the Tor network isestimated to besold for a profit. The majority of those involved aren’t in it for money, so most of this material is simply swapped. That said,some services have startedcharging fees for content.
Several high-profile onion services hosting child sex abuse material have beenshut downfollowing extensive cross-jurisdictional law enforcement operations, including The Love Zone website in 2014, PlaypEn in 2015 and Child’s Play in 2017.
A recent effort led by German police, and involving others including Australian Federal Police, Europol and the FBI, resulted in the shutdown of the illegal websiteBoystownin May.
But one of the largest child sex abuse material forums on the internet (not just Tor) has evaded law enforcement (and activist) takedown attempts for a decade. As of last month it had 508,721 registered users. And since 2013 it has hosted over a million pictures and videos of child sex abuse material and abuse porn.
The pedophile (eroticization of pre-pubescent children), hebephile (pubescent children) and ephebophile (adolescents) communities are among the early adopters of anonymous discussion forums on Tor. Forum members distribute media, support each other and exchange tips to avoid police detection and scams targeting them.
TheWeProtect Alliance’s 2019Global Threat Assessment reportestimated there were more than 2.88 million users on ten forums dedicated to pedophilia and paraphilia interests operating via onion services.
Countermeasures
There are huge challenges for law enforcement trying to prosecute those who produce and/or distribute child sex abuse material online. Such criminal activity typically falls across multiple jurisdictions, making detection and prosecution difficult.
Undercover operations and novel online investigative techniques are essential. One example is targeted “hacks” which offer law enforcement back-door access to sites or forums hosting child sex abuse material.
Such operations are facilitated bycybercrimeandtransnational organised crimetreaties which address child sex abuse material and the trafficking of women and children.
Given the volatile nature of many onion services, a focus on onion directories and forums may help with harm reduction. Little is known about child sex abuse material forums on Tor, or the extent to which they influence onion services hosting this material.
Apart from coordinating to avoid detection, forum users can also share information about police activity, rate onion service vendors, share sites and expose scams targeting them.
The monitoring of forums by outsiders can lead to actionable interventions, such as the successful profiling of active offenders. Some agencies have explored using undercover law enforcement officers, civil society, or NGO experts (such as from theWeProtect Global AllianceorECPAT International) to promote self-regulation within these groups.
While there is a lack of research on this, reformed or recovering offenders can also provide counsel to others. Some sub-forums seek to offer education, encourage treatment and reduce harm — usually by focusing on the legal and health issues associated with consuming child sex abuse material, and ways to control urges and avoid stimuli.
Other contraband services also play a role. For instance, onion services dedicated to drug, malware or other illicit trading usually ban child sex abuse material that creeps in.
Why does the Tor network allow such abhorrent material to remain, despite extensive opposition — sometimes even from those within these groups? Surely those representing Tor have read complaints in the media, if notsurvivorreports about child sex abuse material.
This article byRoderic Broadhurst, Emeritus Professor,Australian National UniversityandMatthew Ball, Laboratory Coordinator at the Australian National University’s Cybercrime Observatory,Australian National University, is republished fromThe Conversationunder a Creative Commons license. Read theoriginal article.
Story byThe Conversation
An independent news and commentary website produced by academics and journalists.An independent news and commentary website produced by academics and journalists.
Get the TNW newsletter
Get the most important tech news in your inbox each week.