A systematic literature review of the technologies that offenders of online child sexual exploitation material (CSEM) make use of. The literature review shows that offenders tend not to be ‘early adopters’ of new technologies, but rather continue to use trusted technologies even after higher functioning options are introduced. In addition to technologies utilised to access CSEM, offenders also employ countermeasures in order to avoid detection, for example encryption and anonymous browsers that protect the user’s identity and physical place such as the Tor browser. The researchers found that only a few offenders encrypt manually. With encryption built-in to technologies and the ability to use the Tor browser to visit traditional (non-dark) websites, much of the prior research into countermeasures is dated and may not be indicative of current behaviours.
BI Norwegian Business School, Norwegian University of Science and Technology
University of Pennsylvania Columbia University
B. S. Abdur Rahman Crescent Institute of Science and Technology
King Faisal Specialist Hospital and Research Centre Princess Nora bint Abdul Rahman University Mississippi State University
Technological University Dublin
Technological University Dublin
Technological University Dublin
Zurich Institute of Forensic Medicine
Adhiyamaan College of Engineering
The Economist Intelligence Unit
Australian Institute of Criminology
Auckland University of Technology
Humboldt Universitat zu Berlin
Nalla Malla Engineering College, Galgotias University, Vellore Institute of Technology
Uskudar University Medical Faculty, Istanbul, Turkey
University of Edinburgh and George Mason University
The Economist Intelligence Unit
ITU/UNESCO Broadband Commission for Sustainable Development
University of New Haven / Digital Forensic Research Workshop
Institute of Electrical and Electronics Engineers (IEEE) and Mississippi State University
Department of Psychology, University of Gothenburg