Skip to main content
Article
The Structure and Content of Online Child Exploitation Networks
Proceeings of ISI-KDD '10 ACM SIGKDD Workshop on Intelligence and Security Informatics (2010)
  • Richard Frank, Simon Fraser University
  • Bryce Westlake, Simon Fraser University
  • Martin Bouchard, Simon Fraser University
Abstract

The emergence of the Internet has provided people with the ability to find and communicate with others of common interests. Unfortunately, those involved in the practices of child exploitation have also received the same benefits. Although law enforcement continues its efforts to shut down websites dedicated to child exploitation, the problem remains uncurbed. Despite this, law enforcement has yet to examine these websites as a network and determine their structure, stability and susceptibleness to attack. We extract the structure and features of four online child exploitation networks using a custom-written webpage crawler. Social network analysis is then applied with the purpose of finding key players – websites whose removal would result in the greatest fragmentation of the network and largest loss of hardcore material. Our results indicate that websites do not link based on the hardcore content of the target website; however, blogs do contain more hardcore content per page than non-blog websites.

Keywords
  • Child Exploitation,
  • Social Network Analysis,
  • Target Prioritization,
  • Internet
Disciplines
Publication Date
2010
Publisher Statement

© Frank, R., Westlake, B.G., & Bouchard, M. | ACM 2010. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings ISI-KDD '10 ACM SIGKDD Workshop on Intelligence and Security Informatics, http://dx.doi.org/10.1145/1938606.1938609.

SJSU users: use the following link to login and access the article via SJSU databases.

Citation Information
Richard Frank, Bryce Westlake and Martin Bouchard. "The Structure and Content of Online Child Exploitation Networks" Proceeings of ISI-KDD '10 ACM SIGKDD Workshop on Intelligence and Security Informatics (2010)
Available at: http://works.bepress.com/bryce_westlake/6/