Law Enforcement Technology

APR 2014

Issue link: https://let.epubxp.com/i/286869

Contents of this Issue

Navigation

Page 10 of 47

Silk Road at least banned child porn. But that's not to say other users aren't buying the material with untraceable crypto currency, and not all of these sites are buried. The UK's Internet Watch Foundation (IWF) released a report in March 2014 authored by IWF Technical Researcher Sarah Smith, which warned UK business websites against hackers looking for targets to host sexual abuse images and video. The report states "This commercial child sexual abuse material is unique in that it purports to accept payment only in bitcoins." The links in these cases are typically distributed via spam emails to Internet users. The links lead to a hacked website (of a legitimate business) and further re-direct users to com- mercial child abuse images on a second hacked website. This means businesses and Internet users need to be on the look- out and keep best security practices in mind. It means, too, that federal agents and investigators have yet another layer of deception to work through. "We need to keep pace with the trends that criminal orga- nizations are utilizing to make themselves anonymous," says Feldman. "Virtual currency, the Tor network, anything that somebody can do to hide their activity online becomes a problem for us that we need to solve." ■ 908.852.3700 www.imt-government.com n Central Command Post n Mobile Command Vehicles n Squad Cars n Handheld Receivers n Airborne Repeat Circle 18 on Reader Service Card You are under immediate threat Protect yourself and your space against the microbial attack. Qore 24 and BioShield 75 Effective protection against 99% of Bacteria, Viruses and Fungi including: MRSA, VRE, Infuenza, HIV and H1N1. Ask us how! Ferguson Safety Products For information contact us at 800-515-0223 FergusonSafety.com • Visit us at AJA's Jail Expo Booth #729 Circle 17 on Reader Service Card LET_08-11_Cybercrime0414.indd 11 3/20/14 9:03 AM

Articles in this issue

Links on this page

Archives of this issue

view archives of Law Enforcement Technology - APR 2014