Abstract

Cybercrime has been moving to the darknet which provides privacy and anonymity to users. Despite international efforts to eradicate child pornography, websites to distribute lurid materials are found to be resilient. Due to the significance of the criminality, law enforcement authorities have taken covert measures to dismantle the leadership of these websites, focusing on arresting the organizers and core members. In this paper, two cases involving child pornography websites were examined to disclose how these websites were structured and managed as well as investigation strategies and tactics employed by investigation agencies. Some similarities were identified during pre-arrest and after-arrest stages for an investigation goal and evidence verification, respectively. However, during a deanonymisation stage the two agencies used different investigation strategies to approach and arrest the target criminals. It is very likely that darknet websites will be managed in diverse manners, or that more anonymity and encryption will make pornography circulation structure invisible and unreachable. In this study, it was argued that perfect anonymity is not provided to the darknet users and that investigation agencies should make technical and social engineering efforts to deanonymise identities of criminals.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.