SlideShare a Scribd company logo
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3841                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Computer Hacking Forensic Investigator (CHFI)
Module XLV: Investigating Child Pornography Cases
Exam 312-49
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3842                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 News: 7 Southern California Men Arrested in Child Porn Investigation
Source: http://www.latimes.com/
52 people were suspected of possessing or producing child pornography using peer-to-peer computer
networks to exchange those graphic images and videos. These were from Los Angeles, Orange, Riverside,
San Bernardino and Ventura counties and out of them, seven Southern California men were arrested on
Tuesday following an eight-month investigation by federal, state, and local law enforcement agencies.
U.S. Atty. Thomas O'Brien at a news conference in Los Angeles said that, "The evidence is horrific”.
The charged included attorneys, a law enforcement officer, and men with previous child porn-related
convictions. If convicted of the maximum charges for possession of child pornography, each defendant
could face up to 10 years in federal prison. Those with a previous conviction could face a minimum of 10
years.
Those charged include Gary Samuel Cochran, 50, of Huntington Beach, previously convicted of child
molestation and possession of obscene materials depicting children engaged in sex acts; Evan Craig
Stephens, 36, of Upland, a registered sex offender; George Tyler Farmer, 39, of Oxnard, previously
convicted of molesting a 6-year-old child; and Eric David Lacey, 48, of Hollywood.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3843                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 News: Chinese National Arrested Over Child Porn
Source: http://www.abc.net.au/
Many of the cases are enrolled against child pornography. A man who was arriving from Hong Kong was
arrested at Cairns Airport, in far north Queensland after customs official found child porn on his laptop
computer. Later, a 30 years old Chinese national was detained and taken to the Cairns watch-house for
court proceedings before being bailed.
Kaylene Zakharoff, an acting customs’ national manager of investigations said that:
 “The man faces up to 10 years imprisonment if he/she is convicted”
 “Visitors to Australia need not be aware that Australia does have strict import controls and this
type of pornography is not accepted and we will investigate and prosecute these matters where
appropriate.”
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3844                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 News: Theft Leads to Child Porn Search
Source: http://www.argusleader.com/
According to the court’s documents, investigators have found child porn images on the system of Elk
point’s volunteer fire management. According to the search warrant documents though large numbers of
suspected child porn images were found on the system of Kavanaugh, 43, he was not charged against it.
According to an affidavit in support of the search warrant, the investigation began when Kavanaugh
reported that his computer was stolen from his Burbank home on June 27. He complained this to Sheriff
Dan Limoges, county prosecutors, and the attorney general's office about a deputy's refusal to take the
report seriously. In one of those conversations, he even said that the laptop was found later in his yard in
damaged condition and was used for several times.
On July 8, deputies retrieved the computer from the Elk Point Fire Station and examined it.
According to an affidavit, the search revealed, "Dozens of female nude images which had titles such as
high school teens and two images titled mother and young daughter natural. These two images contained
a nude woman with a preteen girl, both fully nude."
Investigators obtained a search warrant the next day but the charges have not been filed as Miller said
that, he has not received any report from the sheriff's office. He said, "It's still in the investigative stage.
It's far too early to make any statement at all."
Elk Point Mayor Isabel Trobaugh said:
 She was surprised to hear about the investigation, but she had no first-hand knowledge of it
 The volunteer fire department is separate from city government and is funded by property owners
in the fire district.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3845                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Module Objective
Child pornography is the serious crime prevailing on the Internet. It is the harassing act against the
children where the adults are using them for their gratification. Possessing or transmitting the child porn
images or videos is considered as a crime and various organizations (law enforcement and non-profitable
organizations) are taking initiative to stop it. This module will familiarize you with:
 Child Pornography
 People’s Motives behind Child Pornography
 People involved in Child Pornography
 Role of Internet in Promoting Child Pornography
 Effects of Child Pornography on children
 Measures to Prevent Dissemination of Child Pornography
 Challenges in Controlling Child Pornography
 Steps for Investigating Child Pornography Cases
 Sources of Digital Evidence
 Techniques to Reduce the Problem of Child Pornography
 Guidelines to Avoid Pornography
 Report on Child Pornography
 Laws against Child Pornography
 Anti-Child Pornography Organizations
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3846                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Module Flow
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3847                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Introduction to Child Pornography
Child Pornography is a serious crime. There are growing numbers of children who access the Internet all
over the world. Rapidly expanding computer technology and the Internet has given access to the
production and distribution of child pornography.
Child pornography is defined as “a visual depiction of any kind, including a drawing, cartoon, sculpture,
or painting, photograph, film, video, or computer-generated image or picture, whether made or produced
by electronic, mechanical, or other means, of sexually explicit conduct, where it depicts a minor engaging
in sexually explicit conduct and is obscene, or depicts an image that is, or appears to be, of a minor
engaging in graphic bestiality, sadistic or masochistic abuse, or sexual intercourse, including genital-
genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex.”.
Source: http://www.missingkids.com
Child pornography also includes the production, distribution, and possession of pornographic material.
As children spend more and more of their time on the Internet, they are becoming increasingly prey to
child abusers/pornographers. Child pornography begins with the production of pornographic materials
such as porn images and videos. Offenders enter into correspondence with children through online
instant messaging or chat rooms. They emotionally attract the prospective victim and befriend them. After
establishing a steady relationship, they introduce children to pornography by providing images and videos
that have sexually explicit material. Not only girls and boys but also infants are becoming victim to such
offensive activities. Pornographers make use of poor children, disabled minors, and sometimes
neighborhood children for sexual exploitation.
Distribution of porn material is also a serious crime. The Internet has made the distribution of illegal
material easy. Pornographers resort to newsgroups, Internet Relay Chat, web-based groups, email,
webcams, and peer-to-peer technology to distribute pornographic material. Downloading of such images
is also considered a crime.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3848                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3849                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Survey
Source: http://www.missingkids.com/ 
Figure 44-1: The Second National Incidence Studies of Missing, Abducted, Runaway, and Thrown away
Children
Figure 44-2: The Second National Incidence Studies of Missing, Abducted, Runaway, and Thrown away
Children
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3850                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-3: Sex Crime Cases Survey Report
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3851                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 People’s Motive behind Child Pornography
It is observed that criminals involved in pornographic cases are unmarried, separated, divorced, or
widowed. They become involved with child pornography due to various factors. These factors could range
from mere moneymaking to sexual perversion. Children being the most vulnerable of the victims of sexual
perversion, these offenders go for child pornography. They draw children into pornographic activities by:
 Seduction
 Coercion: They force children into sexual activities or threaten them with dire consequences
 Payment: They offer monetary benefits to attract children
 Solicitation: Request them for a sexual relationship
Voyeurism is another motive behind child pornography. It includes people who derive sexual pleasure by
secretly watching the sexual activities or others in the nude.
Blackmailing is also a factor that leads some people to child pornography. The offenders lure or force
children or teenagers into offensive activities and make videos and images of them. Later, they blackmail
the victims or their parents by threatening to expose the images or videos.
Offenders sell pornographic material to make easy money. They also build their own web sites that
provide pornographic materials for money, such as downloading the pornographic images from their site.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3852                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 People Involved in Child Pornography
People involved in child pornography, known as “pornographers”, are either directly or indirectly related
to child abuse.
It involves people who enter into online relationships with children. They attract victims for sexual
activities or send the pornographic materials to children as part of the grooming process. They contact
children using online messaging or a chatroom. This is considered as direct abuse of children. A person
who physically abuses children is also considered a child pornographer. For such people, the main
intention is to satisfy their sexual curiosity. They also make pornographic images or videos for their own
satisfaction.
Production of porn material is also a serious crime. A person who produces porn images or records the
sexual activities of children is also considered a pornographer. A person who provides sources of child
pornography is also included in such an offence. Such offences are indirect abuse of children. They may
distribute pornographic materials through email, web cam, and in a chatroom.
People who intentionally download pornographic material from the Internet and save it to their computer
also fall into the category of pornographer. They may not have any intention to abuse and may not be
related to other offenders; they download it for pleasure. Parents or guardians who allow their children to
engage in pornographic activity are also considered offenders.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3853                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Role of Internet in Child Pornography
The Internet is a fast communication vehicle providing a number of online services. This growing facility
helps children and youngsters to learn. Yet, with the increase in access, there has been a rise in Internet
crimes. The Internet plays an important role in child pornography cases.
Through the Internet, it is easy to access a huge quantity of pornographic material. It provides complete
anonymity and privacy. It reduces the cost of production and distribution of such material. The offender
distributes the material easily with web services such as email, user groups, and webcams. An offender
can create his own web site and upload the porn material, so that others can easily download it. Using an
Internet facility such as a web cam, he can send real-time porn pictures or video.
The most frequent source for distributing porn material is email. Offenders can send images or videos as
attachments. Offenders can also use email for grooming or seduction purposes. Other methods of
distributing child pornography through the Internet are as follows:
Newsgroup: In a newsgroup, members may discuss their sexual interest in child and adult pornographic
material
Chatrooms: In chatrooms, offenders chat and share porn materials with each other.
The Internet is the best and most inexpensive method for transferring porn materials. The most
advantageous factor about the Internet is that the offenders can access pornographic material anytime
and anywhere. The Internet enables them to send the images or videos in any format which can be stored
easily in any digital devices such as mobile phones and PDAs.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3854                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Effects of Child Pornography on Children
Child pornography affects children physically, socially, and psychologically. It causes physical injuries to
the victims during molestation such as genital bruising and lacerations. In many cases, teenagers may be
inflicted with negative effects on growing sexuality due to inappropriate early sexual experiences. Child
pornography also gives rise to sexually transmitted diseases.
Child pornographic victims also suffer from psychological traumas such as depression, emptiness, and
schizophrenia. Girl victims may suffer from higher rates of nightmares, back pain, headaches, pelvic pain,
and other similar symptoms in her adult age. Pornography may cause sexual addiction that result in
prostitution teenage pregnancy and sexually transmitted diseases. A victim may also lose his or her
mental balance and become suicidal.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3855                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Measures to Prevent Dissemination of Child Pornography
 Computer Industry Self Regulation (Role of ISP):
An ISP (Internet Service Provider) plays an important role in reducing the problems of child
pornography. If an ISP helps to procure pornographic material over the Internet, then it becomes
easy for the police to apprehend the pornographer. Yet in some cases, an ISP stores and gives
access to child pornography sites for commercial purposes. Therefore, it is necessary for an ISP to
take some self-regulatory actions to reduce the problem of child pornography. Some of these
strategies include:
o Block the illegal sites: It is important that various ISP associations should come together and
make a decision to block the illegal sites. If any member opens it unknowingly, then he should
be told to remove that site.
o Use the filters for browsers and search engines for safe search:
ISPs can use filters on the browsers to help block sites containing words related to
pornography and use filters on the search engines so that it will not search the illegal sites or
images.
o Establish compliant sites:
Some of the ISP associations should open the complaint site or hot sites that will help people
to complain against pornography. Such an association may directly deal with the police or any
other authority.
 Legislative Regulation:
Create rules and regulations against child pornography to minimize the problem of pornography.
Make it mandatory for the ISP to inform the police about illegal sites.
Inform ISPs to verify the identities of the people who open the Internet. If they find anyone who
illegally uses others’ accounts, they should inform the police. Confirm the age of the account
holder and restrict children from opening an account without an adult’s supervision. Inform an
advertiser not to advertise such illegal sites. Inform the credit card companies not to pay money
to anyone without confirming it. If they find any transaction with a pornographer, block the credit
card transaction of that person.
 Citizen’s Committee:
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3856                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
A Citizen’s committee may also help in controlling child pornography. They may establish an
organization, which creates awareness among the public about such issues and provides them
with a forum to voice their complaints about such activities. They may provide information to
parents and teachers through their sites or publications about the problem of child pornography
and how to tackle them.
 Parental Strategies:
Parents play an important role in protecting children from child pornography. They should
restrict their children from accessing such materials. They should use filtering software and
search engines to protect their children from any indecent material.
 Law Enforcement Responses (Role of Police):
Police play a crucial role in investigating the pornographic sites. The police may use new
computer forensics tools and techniques to investigate such sites. They may scan the Internet
service and restrict the ISP to remove illegal sites. They may perform sting operations to
investigate the offenders. They may make contact through chatrooms, newsgroups, or via P2P
with offenders by disguising themselves as teenagers to investigate the offenders.
Police may also use the honey-trap sites to find offenders. These sites contain pornographic
material, but they note the IP address or the credit card number of a criminal who tries to
download the porn material from these sites.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3857                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Challenges in Controlling Child Pornography
 Large Internet traffic:
The Internet is the network of networks; it provides a fast and easy way for disseminating
information. In order to keep a check on the sites, if you block the way to open any site, then there
are many alternatives available to reach the same target. In a similar way, if you block any website
or newsgroup, then there are a number of sites and groups which replace the same. Due to this
large traffic over the Internet, it is difficult to catch the person who visits such sites.
 Unclear jurisdiction due to anonymity of offenders:
The Internet is the best tool for communication all over the world. So, criminals from any corner
of the world can send or use pornographic material. Laws differ from country to country so it adds
to the difficulty of tracking the offender. For example, in the United States a child is defined as
those who are under 18 years of age, while in Australia it is defined as those who are under
16years of age. It may happen that an offender produces the porn material in one country and
distributes it in another country. This causes a problem about who will investigate and under
which country’s law, the offender should be arrested.
 Lack of laws and regulation:
Another challenge to check child pornography is the lack of laws and regulation in different
countries. In most countries, there are no laws against child pornography, so offenders can easily
produce the porn material in such countries and distribute it through the Internet all over the
world.
 Sophistication and the use of Internet technology by offenders:
Due to sophisticated Internet technologies, it is difficult to track the offender. Offenders use
various techniques such as email, webcams, chatrooms, and newsgroups to distribute the
material. With the Internet, it is easy to access a number of pornographic materials which reduces
the cost of production and distribution of such material. It provides complete anonymity and
privacy that causes a problem during investigation.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3858                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Precautions before Investigating Child Pornography Cases
The investigators are required to take the precautions or the guidelines for evaluation and solving the
case. The precautions to be taken before investigating child pornography cases are as follows:
 Ensure the authorization to investigate the child pornography cases
 Familiarize with the local laws that are related to the child pornography
 Document each step of the investigation in detail
 Take assistance from two authorized persons
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3859                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Steps for Investigating Child Pornography
Investigators follow certain steps for investigating child pornography cases, which are as follows:
1. Search and seize all computers and media devices
2. Check the authenticated login sessions
3. Search the hard disk for pornographic material
4. Recover deleted files and folders
5. Check metadata of files and folders related to pornography
6. Check and recover browser information:
a. Browsing history
b. Download history
c. Saved form and search history
d. Cache
e. Cookies
f. Saved passwords
g. Authenticated sessions
7. Check ISP logs
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3860                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 1: Search and Seize All Computers and Media Devices
The user can save the information on the system or media devices such as USBs, CDs, and DVDs. Follow
these steps to search the files on these devices for evidence:
 Search the files and folders of the suspect’s system for pornographic material
 Look for the pornographic material on media devices such as USBs, CDs and DVDs, and pen
drives
 Document and seize the collected evidence carefully
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3861                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 2: Check Authenticated Login Sessions
Check sessions through which the user can log in to the system either through an administrator account,
standard account, or via guest account with an authentication (password):
 Check the login information as user accounts are password protected
 Check under which account the pornographic material was accessed
 Check the user, who accessed the porn material, i.e., is he an authenticated user, a guest, or an
administrator?
Figure 44-4: User Login
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3862                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 3: Search the Hard Disk for Pornographic Material
Search the hard disk of the suspect’s system for pornographic material.
 Hard disk search includes searching in:
o Files and folders
o Applications
o Temporary Internet files
o Recycle Bin
Tools such as SurfRecon scan the system for pornographic material (both on hard disk as well as browser
cache).
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3863                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 4: Recover Deleted Files and Folders
The user may delete the pornographic material from the desktop, hard disk, and even from the Recycle
Bin. To recover files and folders, even though they are deleted from the Recycle Bin:
 Use tools such as File Recover, Data recovery wizards, PC Inspector File Recovery, etc.
Figure 44-5: Data Recovery Wizards (Source: https://www.regnow.com/)
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3864                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-6: PC Inspector File Recovery (Source: http://www.raymond.cc/)
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3865                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 5: Check Metadata of Files and Folders Related to Pornography
Metadata is the information of when the file was created, modified, or deleted. File/folder creation,
modification, or deletion allows the investigator to know when the material was accessed.
 Check the metadata of files and folders that consist of pornographic material
 Check the metadata of files and folders from the Recycle Bin (as most users tend to delete the files
from the desktop or drives after accessing them)
Figure 44-7: Folder Properties Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3866                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 6: Check and Recover the Browser Information
It is easy to check the browsed information with the help of browsers such as Internet Explorer, Mozilla
Firefox, etc.
 Check and recover browser, information which includes:
o Browsing history, save form, and search history
o Download history
o Cache
o Cookies
o Offline website data
o Saved passwords
o Authenticated sessions
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3867                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Browsing History, Save Form, and Search History
To access browsing history, open Internet browser and press Ctrl+H to open the browsing history. The
steps to check the browsing history, save form, and search history are as follows:
 Check the links that were accessed to trace the child pornography link
 Search for the suspected link through the search bar
Browsers offer the feature of URL suggestion as the user types the letters in the URL tab (provided the
URLs were browsed on the system, on the particular browser, previously).
Figure 44-8: Browsing History
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3868                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-9: History Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3869                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Download History
Download history is one of the features of Internet browsers, where downloaded information is saved. To
view the download history:
 Select Tools and click Download; or
 Just press Ctrl+J (shortcut to access download history information)
Though users have a tendency to clean up the downloaded information, if not cleaned up, it provides
detailed information of the files that are downloaded and can be a source of evidence.
Figure 44-10: File Downloading Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3870                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Cache
A cache is a collection of web page copies stored on the system’s hard disk or in its volatile memory, i.e.,
random-access memory (RAM).
To change cache settings, open the browser. Select Tools. Open the Advanced panel, and click the
Network tab. Enter a number in the Use up to field to specify the size of the cache.
A user will sometimes select the Clear Now option for security purposes, in order to delete the cache
information. Steps to get information from the cache are as follows:
 Check the browser information in the cache
 If the browser cache information is deleted, recover the information using tools such as
INDEX.DAT file viewer
Figure 44-11: Cache Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3871                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Cookies
A cookie is a piece of information that is stored on the system by a web browser. Steps to be followed to
check the cookies are as follows:
 Check the cookie information to determine the websites the user has accessed
 To access cookies, select Tools. Click options→Privacy→Show Cookies
Figure 44-12: Cookie Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3872                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-13: Window Showing Cookies
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3873                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Saved Passwords
A password is the secret word or string used for authentication purposes. New versions of browsers
provide the ability to store passwords of visited websites. Passwords are remembered and saved by the
browser, depending upon the user’s request, and this information is stored in the Remember Passwords
section of the browser tools. Investigators need to check this information for as it provides URLs of sites,
usernames, as well passwords. To check for those passwords and access the links to find evidence:
 Go to Tools→Options→Security→Show Passwords
Figure 44-14: Password Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3874                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Authenticated Sessions
An authenticated session is the use of the correct username and password for a particular link. To check
for authenticated sessions, follow these steps:
 Check whether the user logged in to website with authentication
 Check for the number of attempts made by the user
Figure 44-15: Login Window
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3875                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Step 7: Check ISP Logs
ISP logs are all Internet activity information that is saved by Internet service providers. They are logs of
the web pages that the user has visited. These logs provide data access information (Internet access) of the
users to whom a particular ISP provider provides service.
This is a difficult way to extract information because:
 ISPs do not usually show the logs, to maintain user privacy
 Though ISPs show the logs, it is difficult to extract required information from the huge amount of
logs
The ISP can provide help; for instance, suppose the police raided the owner a child pornography site. It is
easy to look up to the IP addresses of the users who have visited the site and once the IP addresses are
found, the police can get the details of the users with the ISP’s help.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3876                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Sources of Digital Evidence
Following are some of the sources of evidence that play an important role during investigation:
 Offender’s computer:
The offender’s computer is the main source of evidence during the investigation of child
pornography cases. When an offender downloads any image, it saves it to the hard drive, which is
important evidence for the investigation. There are many materials, such as log files, which show
the detailed information about who logged on to the computer and when. The web browser’s
history shows the online activities of the criminal. Email and chat logs extract an online
communication record of the offender.
 Hand-held devices:
Offenders may also use handheld devices for child pornography. Devices such as PDAs and
mobile phones with digital cameras can be used for recording offensive pictures and transmitting
digital images. Therefore, these devices are also important in investigation.
 Servers:
Servers may also play an important role in investigation. For example, an ISP authentication
server records the information of the customer with the IP address that can be used for
identifying the user. FTP and web servers are generally used for uploading and downloading the
files, but it also records the details about which file to be uploaded or downloaded and also
monitors the IP address of the user.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3877                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Citizens’ Responsibility Against Pornography
Possessing, transmitting, or distributing the child porn images are illegal acts. More than being a crime, it
is inhuman to harass a child for doing the act, so as a citizen it is our responsibility to act against it thus
eradicating it completely for a better society.
Following are the guidelines that citizens can use in order to eradicate pornography:
 Protest against child porn websites
 Provide information about the impact of pornography on children
 Take initiatives to cease child porn on web
 Report against the site that is distributing child porn to government officials
 Report to anti- child porn organizations about the site
o Report is anonymous and 24*7 online, so no problem can be created after posting the report
 Block credit card transactions that are requested for child pornography
 Ask ISPs to block the content or URL
o Example: World's largest Internet Service Providers (ISPs) Verizon, Time Warner Cable, and
Sprint blocked access to child porn material, available on the Internet.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3878                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Guidelines to Avoid Child Pornography on the Web
There are many child pornographic sites prevailing on the Internet. Following are the guidelines to avoid
child pornography on the web:
 Use Internet filters that filter unwanted content on the system: Internet filters are the software
that is installed on the system in order to avoid unwanted content such as child porn sites,
gambling sites, etc.
 Make use of search engines that have in-built filters: It is necessary to make use of search engines
that have in-built filters as they help in safe searching and filtered results. Example: Google safe
search filtering
 Avoid guesswork on URLs: Most of the users have a habit of making a guess work on URLs to get
the information, but this at times moves the user to pornographic sites.
 Use proper and appropriate keywords during research: Use appropriate keywords while
researching, otherwise this can cause problems
 Avoid browsing questionable URLs or banners that take you to unwelcomed sites
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3879                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Guidelines for Parents to Protect Children from Pornography
Source: http://www.crime-research.org/
Initial teachers for children are their parents, so it is necessary that they guide their children to make good
decisions. Following are the guidelines for parents to reduce the risk of their children being taken
advantage of:
 Create a friendly relationship with your child: If the child is afraid of his/her parents, it is
unlikely that he/she will ask them for help. So it is necessary and the parents’ responsibility to
have a good relationship with their children.
 Guide your child while browsing: Browsing a huge network like the Internet is at times
dangerous to your child, so parents can help by guiding their children and teaching them safe
ways to search.
 Install filtering software that blocks porn sites: There are various Internet filters available that
filter websites that the user (parent) wishes to block on the system.
 Promote the use of search engines with safe search: Promote the use of search engines with safe
search (Google offers safe search) in order to stay away from inappropriate sites.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3880                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Make children aware of child pornography prevailing on Internet: Explain to your child in
detail about child pornography that is prevalent on the Internet. Even familiarize them with laws
and offenses they could face due to its promotion.
 Assist them with various anti-child pornography organizations: Though software is installed,
there is still a chance of pornography prevailing on the system. It is the duty of parents to inform
kids about whom to approach and how to report that particular illegal site, thus helping to
eradicate pornography.
 Use software: Use software that monitors and records all websites visited by your child, captures
and logs their instant messenger chats, etc.
If parents find that their children have been looking at pornography, they should explain to the child that
he or she has committed a crime, and make sure that the child understands the law.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3881                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
Tools to Protect Children from Pornography
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3882                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Reveal
Source: http://www.antichildporn.org/
The concept behind this software is to help bridge the technology gap between the knowledgeable child
who is on the Internet, yet lacks the life skills needed to know what is and is not dangerous, and parents
who may be a bit behind in understanding this technology and what their child may be getting into.
Reveal, although not intended as a police forensic tool, it thought to be of some utility in providing a quick
means for evaluating large amounts of computer data/files. In the advanced section of Reveal, the ability
to create a customized dictionary will be helpful in some types of data reviews.
The attached program is a self-extracting and self-installing program which creates a directory (default)
on your "C" drive in "C:ProgramsReveal". It also creates a couple of sub directories under this directory
as well as putting an icon on the Desktop. It also comes with an un-install program and is thought to be
free of any code, which will affect the way you have your computer setup.
Features:
 Reveal works by searching all files found and comparing each word inside a file against special
dictionaries of words commonly used by pedophiles, child pornographers, cultists, occultists,
drug pushers, and purveyors of hate and violence
 It also searches for images, video, and audio files and provides a quick and easy means for you to
review these files for content which may be objectionable
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3883                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 iProtectYou
Source: ‘http://www.softforyou.com/
iProtectYou is an Internet filtering and monitoring program, which enables you to control when the
Internet can be used and which websites can be accessed through your computer. iProtectYou is designed
for parents who are concerned about the possible detrimental effects of the Internet on the development
of their children. iProtectYou is also designed for schools and libraries, so that they can control what is
being viewed in public spaces, and schools, so that children do not have free access to undesirable sites on
the Internet.
The porn blocker iProtectYou gives parents several methods for monitoring and controlling their children
from accessing child pornography over the Internet:
 Porn block by word filtering: You can prevent access to websites containing vulgar or explicit
words or phrases. These settings can changed be at any time at your discretion. In order to
increase the effectiveness of the program, you have the option to use words from a pre-made list,
or you can define your own.
 Porn block by URL (address) filtering: You can prevent access to individual websites based on
their URL (address). iProtectYou gives you complete control over this filter's settings. You can
also choose to block web sites using iProtectYou's built-in list of bad sites.
 Porn block by using the bad site list: This comprehensive and ever-changing list is made up of
over thousands of websites on the Internet that contain undesirable content such as pornography.
If the parent wants to block a particular website not found in the list, they can do this by using the
URL (Address) filtering.
Features:
 Restrict your family members from visiting websites and news groups that may contain
pernicious information
 Block emails, chat sessions, instant messages, and P2P connections if they contain inappropriate
words
 Prevent your private information (credit card number for example) from being sent to the
Internet
 Set a schedule to specify days and times when online activity is allowed
 Limit Internet Traffic to a specified amount of data that can be sent or received per user / per day
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3884                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Control the list of programs that can have access to the Internet
 Get notification emails with full descriptions of blocked operations and an attached screen-shot of
your kids' computer to control them remotely
 Get detailed information about Internet resources used by your computer
 Set different levels of restrictions for every member of your family depending on their maturity,
interest, habits, and parental control needs
Figure 44-16: iProtectYou Pro control pannel
 
Figure 44-17: iProtectYou Users and Groups screenshot
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3885                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
Figure 44-18: iProtectYou setting screenshot
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3886                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 WUPC Web Control for Parents 4
Source: http://www.download.com/
WUPC Web Control for Parents 4 is an easy-to-use parental control tool, developed specially to protect
children from forbidden materials such as pornography, online gambling, and online drug information. It
helps to prevent kids from accessing user-specified websites. It has a very clear interface, where you can
review websites that were visited by your child and lock all forbidden materials with two clicks.
Figure 44-19: WUPC Web Control for Parents 4
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3887                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 BrowseControl
Source: http://www.browsecontrol.com/
BrowseControl controls access to the Internet and blocks applications on Windows operating systems. It
can also be used to block access to floppy disks, CD drives, and USB drives. It helps the user to restrict
inappropriate surfing and enforce Internet usage policies.
Following are the features of BrowseControl:
 It can completely block the Internet
 Allow access to only websites the user specifies
 Deny web access to websites the user specifies
 Schedule Internet ON at only certain times of the day
 It consists of an Application Blocker that allows the user to specify software applications he or she
wants to block the user from running
 It can block any number of protocols and the user can even specify any additional ports
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3888                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-20: BrowseControl
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3889                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 ChatGuard
Source: http://www.chatprotection.com/
ChatGuard is the software developed for protection from online sexual solicitation
It monitors:
 Internet
o Chat sessions, URLs, communications, emails, and so on
 Games and audio
 Desktop enhancements
 Business and finance
Figure 44-21: ChatGuard session logs screenshot
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3890                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-22: ChatGuard version update screenshot
Figure 44-23: ChatGuard parent library screenshot
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3891                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Child Exploitation Tracking System (CETS)
Source: http://www.microsoft.com/
CETS was developed jointly by Microsoft Canada, the Royal Canadian Mounted Police (RCMP), and the
Toronto Police Service. CETS, a software solution built using open industry standards, assists law-
enforcement officials in their work to stop the exploitation of children on the Internet by enabling
effective collaboration and providing a set of advanced software tools and technologies for use by
investigators.
The tracking system will serve as a repository of information and will also be used as an investigative tool.
The solution enables police agencies to capture, share, and search information from the point of detection
through the investigative phase, arrest, and offender management.
CETS is a great tool for information management; CETS puts together the work of hundreds of police
agencies in one place. The tool can establish links from the different agencies that police wouldn't
necessarily make.
Features:
 CETS enables agencies to avoid duplicate efforts. Sharing information over a secure network,
officers can match up investigations that reference the same people or online identities
 CETS links and connects criminal behavior online that is difficult for the human eye to see
 Using CETS, police agencies can manage and analyze huge volumes of information in powerful
new ways, such as cross-referencing obscure data relationships and using social-network analysis
to identify communities of offenders 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3892                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3893                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3894                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3895                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Reports on Child Pornography
Source: http://www.icmec.org/
The following tables demonstrate the survey of various countries against child pornography. These tables
show that some countries such as Afghanistan, Albania, Bangladesh, India, Pakistan, Thailand, Singapore,
and Egypt do not have any law against child pornography, while countries such as Argentina, Austria,
Belgium, Brazil, Canada, France, Germany, Hong Kong, Italy, Japan, New Zealand, Russia, South Africa,
United Kingdom and United States have well defined laws against child pornography.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3896                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3897                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3898                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3899                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3900                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3901                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3902                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3903                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3904                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3905                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3906                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
Figure 44-24: Child Pornography Reports
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3907                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
Laws Against Child Pornography
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3908                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3909                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 U.S. Laws Against Child Pornography
Source: http://www.missingkids.com/
18 U.S.C. 1466A – OBSCENE VISUAL REPRESENTATIONS OF THE SEXUAL ABUSE OF CHILDREN
It is forbidden to knowingly produce, distribute, receive, or possess with the intent to distribute, a visual
depiction of any kind, including a drawing, cartoon, sculpture, or painting, that:
 depicts a minor engaging in sexually explicit conduct and is obscene, or
 depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or
masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or
oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious
literary, artistic, political, or scientific value.
Attempts or conspiracies to knowingly produce, distribute, receive, or possess with the intent to
distribute, a visual depiction of any kind, including a drawing, cartoon, sculpture, or painting, that:
 depicts a minor engaging in sexually explicit conduct and is obscene, or
 depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or
masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or
oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious
literary, artistic, political, or scientific value, are also forbidden.
It is forbidden to knowingly possess a visual depiction of any kind, including a drawing, cartoon,
sculpture, or painting, that:
 depicts a minor engaging in sexually explicit conduct and is obscene, or
 depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or
masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or
oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious
literary, artistic, political, or scientific value,
If one of the...circumstances [noted below] is present:
 any communication involved in or made in furtherance of the offense is communicated or
transported by the mail, or in interstate or foreign commerce by any means, including by
computer, or any means or instrumentality of interstate or foreign commerce is otherwise used in
committing or in furtherance of the commission of the offense;
 any communication involved in or made in furtherance of the offense contemplates the
transmission or transportation of a visual depiction by the mail, or in interstate or foreign
commerce by any means, including by computer;
 any person travels or is transported in interstate or foreign commerce in the course of the
commission or in furtherance of the commission of the offense;
 any visual depiction involved in the offense has been mailed, or has been shipped or transported
in interstate or foreign commerce by any means, including by computer, or was produced using
materials that have been mailed, or that have been shipped or transported in interstate or foreign
commerce by any means, including by computer; or
 The offense is committed in the special maritime and territorial jurisdiction of the United States
or in any territory or possession of the United States.
An attempt to knowingly possess such a visual depiction is also forbidden under the same circumstances
Source: http://www.law.cornell.edu/
§ 2251. Sexual exploitation of children
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3910                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
(a) Any person who employs, uses, persuades, induces, entices, or coerces any minor to engage in, or who
has a minor assist any other person to engage in, or who transports any minor in interstate or foreign
commerce, or in any Territory or Possession of the United States, with the intent that such minor engage
in, any sexually explicit conduct for the purpose of producing any visual depiction of such conduct, shall
be punished as provided under subsection (e), if such person knows or has reason to know that such
visual depiction will be transported in interstate or foreign commerce or mailed, if that visual depiction
was produced using materials that have been mailed, shipped, or transported in interstate or foreign
commerce by any means, including by computer, or if such visual depiction has actually been transported
in interstate or foreign commerce or mailed.
(b) Any parent, legal guardian, or person having custody or control of a minor who knowingly permits
such minor to engage in, or to assist any other person to engage in, sexually explicit conduct for the
purpose of producing any visual depiction of such conduct shall be punished as provided under subsection
(e) of this section, if such parent, legal guardian, or person knows or has reason to know that such visual
depiction will be transported in interstate or foreign commerce or mailed, if that visual depiction was
produced using materials that have been mailed, shipped, or transported in interstate or foreign
commerce by any means, including by computer, or if such visual depiction has actually been transported
in interstate or foreign commerce or mailed.
(c)
(1) Any person who, in a circumstance described in paragraph (2), employs, uses, persuades, induces,
entices, or coerces any minor to engage in, or who has a minor assist any other person to engage in,
any sexually explicit conduct outside of the United States, its territories or possessions, for the
purpose of producing any visual depiction of such conduct, shall be punished as provided under
subsection (e).
(2) The circumstance referred to in paragraph (1) is that—
(A) The person intends such visual depiction to be transported to the United States, its territories
or possessions, by any means, including by computer or mail; or
(B) The person transports such visual depiction to the United States, its territories or possessions,
by any means, including by computer or mail.
(d)
(1)Any person, who, in a circumstance described in paragraph (2), knowingly makes, prints, or
publishes, or causes to be made, printed, or published, any notice or advertisement seeking or
offering—
(A) to receive, exchange, buy, produce, display, distribute, or reproduce, any visual depiction, if
the production of such visual depiction involves the use of a minor engaging in sexually explicit
conduct and such visual depiction is of such conduct; or
(B) Participation in any act of sexually explicit conduct by or with any minor for the purpose of
producing a visual depiction of such conduct; shall be punished as provided under subsection (e).
(2) The circumstance referred to in paragraph (1) is that—
(A) such person knows or has reason to know that such notice or advertisement will be
transported in interstate or foreign commerce by any means including by computer or mailed; or
(B) Such notice or advertisement is transported in interstate or foreign commerce by any means
including by computer or mailed.
(e) Any individual who violates, or attempts or conspires to violate, this section shall be fined under this
title and imprisoned not less than 15 years nor more than 30 years, but if such person has one prior
conviction under this chapter, chapter 71, chapter 109A, or chapter 117, or under section 920 of title 10
(article 120 of the Uniform Code of Military Justice), or under the laws of any State relating to the sexual
exploitation of children, such person shall be fined under this title and imprisoned for not less than 25
years nor more than 50 years, but if such person has 2 or more prior convictions under this chapter,
chapter 71, chapter 109A, or chapter 117, or under section 920 of title 10 (article 120 of the Uniform Code
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3911                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
of Military Justice), or under the laws of any State relating to the sexual exploitation of children, such
person shall be fined under this title and imprisoned not less than 35 years nor more than life. Any
organization that violates, or attempts or conspires to violate, this section shall be fined under this title.
Whoever, in the course of an offense under this section, engages in conduct that results in the death of a
person shall be punished by death or imprisoned for any term of years or for life.
§ 2252. Certain activities relating to material involving the sexual exploitation of minors
(a) Any person who—
(1) Knowingly transports or ships in interstate or foreign commerce by any means including by
computer or mails, any visual depiction, if—
(A) The producing of such visual depiction involves the use of a minor engaging in sexually
explicit conduct; and
(B) Such visual depiction is of such conduct;
(2) knowingly receives, or distributes, any visual depiction that has been mailed, or has been shipped
or transported in interstate or foreign commerce, or which contains materials which have been mailed
or so shipped or transported, by any means including by computer, or knowingly reproduces any
visual depiction for distribution in interstate or foreign commerce or through the mails, if—
(A) The producing of such visual depiction involves the use of a minor engaging in sexually
explicit conduct; and
(B) Such visual depiction is of such conduct;
(3) Either—
(A) in the special maritime and territorial jurisdiction of the United States, or on any land or
building owned by, leased to, or otherwise used by or under the control of the Government of the
United States, or in the Indian country as defined in section 1151 of this title, knowingly sells or
possesses with intent to sell any visual depiction; or
(B) knowingly sells or possesses with intent to sell any visual depiction that has been mailed, or
has been shipped or transported in interstate or foreign commerce, or which was produced using
materials which have been mailed or so shipped or transported, by any means, including by
computer, if—
(i) The producing of such visual depiction involves the use of a minor engaging in sexually
explicit conduct; and
(ii) Such visual depiction is of such conduct; or
(4) Either—
(A) in the special maritime and territorial jurisdiction of the United States, or on any land or
building owned by, leased to, or otherwise used by or under the control of the Government of the
United States, or in the Indian country as defined in section 1151 of this title, knowingly possesses
1 or more books, magazines, periodicals, films, video tapes, or other matter which contain any
visual depiction; or
(B) knowingly possesses 1 or more books, magazines, periodicals, films, video tapes, or other
matter which contain any visual depiction that has been mailed, or has been shipped or
transported in interstate or foreign commerce, or which was produced using materials which have
been mailed or so shipped or transported, by any means including by computer, if—
(i) The producing of such visual depiction involves the use of a minor engaging in sexually
explicit conduct; and
(ii) Such visual depiction is of such conduct; shall be punished as provided in subsection (b)
of this section.
(b)
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3912                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
(1) Whoever violates, or attempts or conspires to violate, paragraphs [1] (1), (2), or (3) of subsection (a)
shall be fined under this title and imprisoned not less than 5 years and not more than 20 years, but if
such person has a prior conviction under this chapter, chapter 71, chapter 109A, or chapter 117, or
under section 920 of title 10 (article 120 of the Uniform Code of Military Justice), or under the laws of
any State relating to aggravated sexual abuse, sexual abuse, or abusive sexual conduct involving a
minor or ward, or the production, possession, receipt, mailing, sale, distribution, shipment, or
transportation of child pornography, such person shall be fined under this title and imprisoned for
not less than 15 years nor more than 40 years.
(2) Whoever violates, or attempts or conspires to violate, paragraph (4) of subsection (a) shall be
fined under this title or imprisoned not more than 10 years, or both, but if such person has a prior
conviction under this chapter, chapter 71, chapter 109A, or chapter 117, or under section 920 of title
10 (article 120 of the Uniform Code of Military Justice), or under the laws of any State relating to
aggravated sexual abuse, sexual abuse, or abusive sexual conduct involving a minor or ward, or the
production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child
pornography, such person shall be fined under this title and imprisoned for not less than 10 years nor
more than 20 years.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3913                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 U.S. Laws Against Child Pornography
Source: http://www4.law.cornell.edu/
42 U.S.C. 13032 – Reporting of child pornography by electronic communication service providers
1. Duty of report: Whoever, while engaged in providing an electronic communication service or a
remote computing service to the public, through a facility or means of interstate or foreign
commerce, obtains knowledge of facts or circumstances from which a violation of section 2251,
2251A, 2252, 2252A, 2252B, or 2260 of title 18, involving child pornography (as defined in section
2256 of that title), or a violation of section 1466A of that title, is apparent, shall, as soon as
reasonably possible, make a report of such facts or circumstances to the Cyber Tip Line at the
National Center for Missing and Exploited Children (NCMEC), which shall forward that report to
a law enforcement agency or agencies designated by the Attorney General.
2. Designation of agencies: Not later than 180 days after October 30, 1998, the Attorney General
shall designate the law enforcement agency or agencies to which a report shall be forwarded
under paragraph (1)
3. In addition to forwarding such reports to those agencies designated in subsection (b)(2) of this
section, the National Center for Missing and Exploited Children is authorized to forward any such
report to an appropriate official of a state or subdivision of a state for the purpose of enforcing
state criminal law.
4. Failure to report: A provider of electronic communication services or remote computing services
described in paragraph (1) who knowingly and willfully fails to make a report under that
paragraph shall be fined:
a. in the case of an initial failure to make a report, not more than $50,000; and
b. in the case of any second or subsequent failure to make a report, not more than $100,000 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3914                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Australia Laws Against Child Pornography
Source: http://www.austlii.edu.au/
474.19 Using a carriage service for child pornography material
(1) A person is guilty of an offence if:
(a) The person:
(i) Uses a carriage service to access material; or
(ii) Uses a carriage service to cause material to be transmitted to the person; or
(iii) Uses a carriage service to transmit material; or
(iv) Uses a carriage service to make material available; or
(v) Uses a carriage service to publish or otherwise distribute material; and
(b) The material is child pornography material.
Penalty: Imprisonment for 10 years.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3915                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
(2) To avoid doubt, the following are the fault elements for the physical elements of an offence
against subsection (1):
(a) Intention is the fault element for the conduct referred to in paragraph (1) (a);
(b) Recklessness is the fault element for the circumstances referred to in paragraph (1)(b).
(3) As well as the general defenses provided for in Part 2.3, defenses are provided for under
section 474.21 in relation to this section.
474.20 Possessing, controlling, producing, supplying or obtaining child pornography material for use
through a carriage service
(1) A person is guilty of an offence if:
(a) The person:
(i) Has possession or control of material; or
(ii) Produces, supplies or obtains material; and
(b) The material is child pornography material; and
(c) The person has that possession or control, or engages in that production, supply or
obtaining, with the intention that the material be used:
(i) By that person; or
(ii) By another person;
In committing an offence against section 474.19 (using a carriage service for child pornography material).
Penalty: Imprisonment for 10 years.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3916                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Austria Laws Against Child Pornography
Source: http://www.interpol.org/
§ 207a - Pornographic depictions of minors
(1) Anyone who
1. Produces or
2. Imports, transports or exports for the purpose of dissemination or
3. offers, procures, transfers, presents or makes available in any other manner to another person a
pornographic depiction of a minor (under paragraph 4) will be sentenced to up to three years'
imprisonment.
(2) Anyone who commits the offence for financial gain will be sentenced to six months' to five years'
imprisonment. Anyone who commits the offence as a member of a criminal organization, or in such a way
that the minor sustains particularly grievous harm, will be sentenced to 1-10 years' imprisonment; anyone
who produces a pornographic depiction of a minor (under paragraph 4) using severe violence or who, in
producing such pornographic depiction, endangers the life of the depicted minor either intentionally or as
a result of gross negligence, will also be punished.
(3) Anyone who obtains, or is in possession of, a pornographic depiction of a minor over 14 years of age
(under paragraph 4, subparagraphs 3 and 4) will be sentenced to up to one year's imprisonment. Anyone
who obtains, or is in possession of, a pornographic depiction of a minor (under paragraph 4) will be
sentenced to up to two years' imprisonment.
(4) Pornographic depictions of minors are:
1. Realistic depictions of a sexual act performed on a minor under 14 years of age or by such minor
on himself, on another person or with an animal,
2. realistic depictions of an event performed with a minor under 14 years of age, examination of
which creates the impression, according to the circumstances of the case, that it involves a sexual
act performed on such minor or by the minor on himself, on another person or with an animal,
3. Realistic depictions
a. of a sexual act within the meaning of subparagraph 1 or of an event within the meaning
of subparagraph 2, though with minors over 14 years of age, or
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3917                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
b. of the genitals or pubic region of minors, provided such depictions are distorted in a
sensational manner, focus on the genitals or pubic region or are devoid of other
manifestations of life in order to sexually to arouse the observer,
4. pictorial representations, an examination of which - following alteration of a depiction or
without use of such alteration - creates the impression, according to the circumstances of the case,
that it is a depiction within the meaning of subparagraphs 1-3.
(5) In accordance with paragraph 1, subparagraph 1, and paragraph 3, anyone who:
1. produces, or is in possession of, a pornographic depiction of a minor over 14 years of age with
the latter's consent or for the latter's own private use, or
2. Produces, or is in possession of, a pornographic depiction of a minor over 14 years of age,
within the meaning of paragraph 4, subparagraph 4, for his own private use, provided no risk of
dissemination of the depiction is associated with the act, shall not be punished.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3918                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Belgium Laws Against Child Pornography
Source: http://www.childfocus-net-alert.be/
“Art.383bis (*)
§ 1. Notwithstanding the application of Articles 379 and 380, whosoever has displayed, sold,
rented, distributed or handed out emblems, objects, films, photos, slides or other visual media
representing sexual positions or acts of a pornographic nature, involving or representing minors
or has handed to a transport or distribution agent, manufactured or held, imported or caused to
be imported such objects with a view to commerce or distribution shall be punished by penal
servitude and a fine of five hundred to ten thousand francs.
§ 2. Whosoever has knowingly possessed emblems, objects, films, photos, slides or other visual
media as referred to under § 1 shall be punished by imprisonment for a month to a year and a fine
of hundred to a thousand francs.
§ 3. The offence referred to under § 1 shall be punished by forced labor for ten to fifteen years and
a fine of five hundred to fifty thousand francs if it constitutes an act of participation in the main or
accessory activity of an association, whether or not the culprit holds the position of manager.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3919                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
§ 4. The special confiscation provided for in Article 42, 1°, may be applied to the offences referred
to in § 1 and § 2, even when the objects that it concern, are not the property of the convicted
person.
§ 5. Articles 382 and 389 are applicable to the offences referred to in § 1 and § 3. "
"Art.380ter (*)
§ 1. Shall be punished by imprisonment for two months to two years and a fine of two hundred
francs to two thousand francs whosoever and by whatever means publishes, distributes or
disseminates or causes to be published, distributed or disseminated publicity, directly or
indirectly, even in concealing its nature through artifices of language, for an offer of services of a
sexual nature with a direct or indirect profit-making objective, when the said publicity is
specifically addressed to minors or when it refers to services proposed either by minors or by
persons claimed to be so. The sentence shall be imprisonment for three months to three years and
a fine of three hundred to three thousand francs when the publicity referred to in Article 1 has the
objective or effect, direct or indirect, of facilitating the prostitution or debauchery of a minor or
his/her exploitation for sexual purposes.
§ 2. Shall be punished by imprisonment for one month to a year and a fine of a hundred to a
thousand francs whosoever by whatever means publishes, distributes or disseminates or causes to
be published, distributed or disseminated publicity, directly or indirectly, even in concealing its
nature through artifices of language, for an offer of services of a sexual nature with a direct or
indirect profit-making objective, when these services are offered through a telecommunications
medium.
§ 3. In cases not covered by § 1 and § 2, shall be punished by imprisonment for one month to a
year and a fine of a hundred to a thousand francs whosoever by whatever means of publicity, even
in concealing its nature through artifices of language, makes it known that he indulges in
prostitution, facilitates the prostitution of others or wishes to enter into a relationship with a
person indulging in debauchery.
Shall be punished by the same sentences whosoever by means of publicity encourages, through
the allusion made therein, the exploitation of minors or adults for sexual purposes or uses such
publicity on the occasion of an offer of services ."
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3920                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Cyprus Laws Against Child Pornography
Source: http://www.interpol.org/
The age in child pornography legislation is 18 years (Criminal Code chapter 154, Article 154)
The Convention on Cybercrime, law 22(III)/2004
Title 3 – Content-related offences
Article 9 – Offences related to child pornography
1. Each Party shall adopt such legislative and other measures as may be necessary to establish as
criminal offences under its domestic law, when committed intentionally and without right the
following conduct
a. producing child pornography for the purpose of its distribution through a computer system;
b. offering or making available child pornography through a computer system;
c. distributing or transmitting child pornography through a computer system;
d. procuring child pornography through a computer system for oneself or for another person;
e. possessing child pornography in a computer system or on a computer data storage medium.
2. For the purpose of paragraph 1 above, the term 'child pornography' shall include pornographic
material that visually depicts:
a. a minor engaged in sexually explicit conduct;
b. a person appearing to be a minor engaged in sexually explicit conduct;
c. realistic images representing a minor engaged in sexually explicit conduct.
3. For the purpose of paragraph 2 above, the term 'minor' shall include all persons under 18 years of
age. A Party may, however, require a lower age limit, which shall be not less than 16 years.
4. Each Party may reserve the right not to apply, in whole or in part, paragraphs
1. sub-paragraphs d and e, and 2. sub-paragraphs b and c.
Combating Trafficking in Human Beings and Sexual Abuse of Minors Law 3(1)/2000
Trading in pornography material - Law 3(1)/2000
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3921                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Sec. 4(1): 'Whoever, using children for trading purposes, makes, possess, carries, imports or exports by
any means or circulates documents, printed material, literary works, drawings, paintings, emblems,
photographs, movies or other indecent objects of any kind or uses any means of publication for the
facilitation of the circulation or the trading of the indecent objects commits an offence and in case of
conviction will be liable to imprisonment not exceeding ten (10) years.'
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3922                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Japan Laws Against Child Pornography
Source: http://www.interpol.int/
Article 2 - Definitions
For the purpose of this Law, 'child pornography' means photos, videotapes and other visual materials
which:
i. Depict, in a way that can be recognized visually, such a pose of a child relating to sexual
intercourse or an act similar to sexual intercourse with or by the child.
ii. Depict, in a way that can be recognized visually, such a pose of a child relating to the act of
touching genital organs, etc. of the child or of having the child touch someone else's genital
organs, etc. in order to arouse or stimulate the viewer's sexual desire; or
iii. Depict, in a way that can be recognized visually, such a pose of a child who is naked totally or
partially in order to arouse or stimulate the viewer's sexual desire.
Article 7 - Distribution, etc. of Child pornography
i. A person who distributes, sells, lends as a business, or displays in public, child pornography shall
be punished with imprisonment with labor for not more than three years or a fine not exceeding
three million yen
ii. A person who produces, possesses, transports, imports to or exports from Japan child
pornography for the purpose of conducting any of the acts mentioned in the preceding paragraph
shall be punished with the same penalty as is described in the said paragraph
iii. A Japanese national who imports to or exports from a foreign country child pornography for the
purpose of conducting any of the acts mentioned in paragraph 1 of this article shall be punished
with the same penalty as is described in the said paragraph
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3923                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 South African Laws Against Child Pornography
Source: http://llnw.creamermedia.co.za/
Child Care Amendment Act
To amend the Child Care Act, 1983, so as to provide for a right of appeal against certain orders relating to
children; to provide for the establishment of secure care facilities; to revoke the power of the Minister to
transfer certain pupils and children to any institution, custody or supervision mentioned in section 290 of
the Criminal Procedure Act, 1977; to provide for the prohibition against the commercial sexual
exploitation of children; and to make further provision for the estimation of a person’s age in certain
proceedings; and to provide for matters connected therewith.
Section 50
1. Any person who participates or is involved in the commercial sexual exploitation of a child shall
be guilty of an offence
2. Any person who is an owner, lessor, manager, tenant or occupier of property on which the
commercial sexual exploitation of a child occurs and who, within a reasonable time of gaining
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3924                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
information of such occurrence, fails to report such occurrence at a police station, shall be guilty
of an offence
3. Any person who is convicted of an offence in terms of this section, shall be liable to a fine, or to
imprisonment for a period not exceeding 10 years, or to both such fine and such imprisonment
Amendment of section 2 of Act 65 of 1996
a. The objects of this Act shall be to—
(a) regulate the creation, production, possession, and distribution of certain publications and
certain films by means of classification, the imposition of age restrictions and the giving of
consumer advice due regard being had in particular to the protection of children against sexual
exploitation or degradation in publications, films and on the Internet and
(b) make the exploitative use of children in pornographic publications, films or on the Internet
punishable
Amendment of section 27 of Act 65 of 1996
 Any person shall be guilty of an offence if he or she knowingly:
(a) creates, produces, imports, or is in possession of a publication which contains a visual
presentation of child pornography
(b) creates, produces, imports, or is in possession of a film which contains a scene or scenes of
child pornography
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3925                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 UK laws Against Child Pornography
Source: http://www.opsi.gov.uk/
Sex Offences Act 2003 (SOA 2003)
An Act to make new provision about sexual offences, their prevention and the protection of children from
harm from other sexual acts, and for connected purpose. Sections that relate to child harassment towards
pornography are as follows:
 Section 15: Meeting a child following sexual grooming etc.
1. A person aged 18 or over (A) commits an offence if:
a. having met or communicated with another person (B) on at least two earlier occasions, he
intentionally meets B, or travels with the intention of meeting B in any part of the world
b. at the time, he intends to do anything to or in respect of B, during or after the meeting
and in any part of the world, which if done will involve the commission by A of a relevant
offence
c. B is under 16 and
d. A does not reasonably believe that B is 16 or over
2. In subsection (1):
a. The reference to A having met or communicated with B is a reference to A having met B
in any part of the world or having communicated with B by any means from, to or in any
part of the world;
b. “relevant offence” means:
i. an offence under this Part,
ii. an offence within any of paragraphs 61 to 92 of Schedule 3, or
iii. anything done outside England and Wales and Northern Ireland which is not an
offence within sub-paragraph (i) or (ii) but would be an offence within sub-paragraph
(i) if done in England and Wales
3. In this section as it applies to Northern Ireland:
a. subsection (1) has effect with the substitution of “17” for “16” in both places;
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3926                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
b. subsection (2)(b)(iii) has effect with the substitution of “sub-paragraph (ii) if done in
Northern Ireland” for “sub-paragraph (i) if done in England and Wales”.
4. A person guilty of an offence under this section is liable:
a. on summary conviction, to imprisonment for a term not exceeding 6months or a fine not
exceeding the statutory maximum or both
b. on conviction on indictment, to imprisonment for a term not exceeding 10 years
 Section 16: Abuse of position of trust: sexual activity with a child
1. A person aged 18 or over (A) commits an offence if—
a. he intentionally touches another person (B),
b. the touching is sexual,
c. A is in a position of trust in relation to B,
d. where subsection (2) applies, A knows or could reasonably be expected to know of the
circumstances by virtue of which he is in a position of trust in relation to B, and
e. either—
i. B is under 18 and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. This subsection applies where A—
a. (a) is in a position of trust in relation to B by virtue of circumstances within section 21(2),
(3), (4) or (5), and
b. (b) is not in such a position of trust by virtue of other circumstances.
3. Where in proceedings for an offence under this section it is proved that the other person was
under 18, the defendant is to be taken not to have reasonably believed that that person was 18
or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably
believed it.
4. Where in proceedings for an offence under this section—
a. it is proved that the defendant was in a position of trust in relation to the other person by
virtue of circumstances within section 21(2), (3), (4), or (5), and
b. it is not proved that he was in such a position of trust by virtue of other circumstances,
c. it is to be taken that the defendant knew or could reasonably have been expected to know
of the circumstances by virtue of which he was in such a position of trust unless sufficient
evidence is adduced to raise an issue as to whether he knew or could reasonably have
been expected to know of those circumstances.
5. A person guilty of an offence under this section is liable—
a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not
exceeding the statutory maximum or both;
b. On conviction on indictment, to imprisonment for a term not exceeding 5 years.
 Section 17: Abuse of position of trust: causing or inciting a child to engage in sexual activity
1. A person aged 18 or over (A) commits an offence if—
a. he intentionally causes or incites another person (B) to engage in an activity,
b. the activity is sexual,
c. A is in a position of trust in relation to B,
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3927                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
d. where subsection (2) applies, A knows or could reasonably be expected to know of the
circumstances by virtue of which he is in a position of trust in relation to B, and
e. either—
i. B is under 18 and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. This subsection applies where A—
a. (a) is in a position of trust in relation to B by virtue of circumstances within section 21(2),
(3), (4) or (5), and
b. (b) is not in such a position of trust by virtue of other circumstances.
3. Where in proceedings for an offence under this section it is proved that the other person was
under 18, the defendant is to be taken not to have reasonably believed that that person was 18
or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably
believed it.
4. Where in proceedings for an offence under this section—
a. it is proved that the defendant was in a position of trust in relation to the other person by
virtue of circumstances within section 21(2), (3), (4) or (5), and
b. it is not proved that he was in such a position of trust by virtue of other circumstances,
c. it is to be taken that the defendant knew or could reasonably have been expected to know
of the circumstances by virtue of which he was in such a position of trust unless sufficient
evidence is adduced to raise an issue as to whether he knew or could reasonably have
been expected to know of those circumstances.
5. A person guilty of an offence under this section is liable—
a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not
exceeding the statutory maximum or both;
b. on conviction on indictment, to imprisonment for a term not exceeding 5 years.
 Section 18: Abuse of position of trust: sexual activity in the presence of a child
1. A person aged 18 or over (A) commits an offence if—
a. he intentionally engages in an activity,
b. the activity is sexual,
c. for the purpose of obtaining sexual gratification, he engages in it—
i. when another person (B) is present or is in a place from which A can be observed, and
ii. knowing or believing that B is aware, or intending that B should be aware, that he is
engaging in it,
d. A is in a position of trust in relation to B,
e. where subsection (2) applies, A knows or could reasonably be expected to know of the
circumstances by virtue of which he is in a position of trust in relation to B, and
f. (f) either—
i. B is under 18 and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. This subsection applies where A—
a. is in a position of trust in relation to B by virtue of circumstances within section 21(2),
(3), (4) or (5), and
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3928                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
b. is not in such a position of trust by virtue of other circumstances.
3. Where in proceedings for an offence under this section it is proved that the other person was
under 18, the defendant is to be taken not to have reasonably believed that that person was 18
or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably
believed it.
4. Where in proceedings for an offence under this section—
a. it is proved that the defendant was in a position of trust in relation to the other person by
virtue of circumstances within section 21(2), (3), (4) or (5), and
b. it is not proved that he was in such a position of trust by virtue of other circumstances,
it is to be taken that the defendant knew or could reasonably have been expected to know of the
circumstances by virtue of which he was in such a position of trust unless sufficient evidence is
adduced to raise an issue as to whether he knew or could reasonably have been expected to know
of those circumstances.
5. A person guilty of an offence under this section is liable—
a. (a) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine
not exceeding the statutory maximum or both;
b. (b) on conviction on indictment, to imprisonment for a term not exceeding 5 years.
 Section 19: Abuse of position of trust: causing a child to watch a sexual act
1. A person aged 18 or over (A) commits an offence if—
a. for the purpose of obtaining sexual gratification, he intentionally causes another person
(B) to watch a third person engaging in an activity, or to look at an image of any person
engaging in an activity,
b. the activity is sexual,
c. A is in a position of trust in relation to B,
d. where subsection (2) applies, A knows or could reasonably be expected to know of the
circumstances by virtue of which he is in a position of trust in relation to B, and
e. either—
i. B is under 18 and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. This subsection applies where A—
a. is in a position of trust in relation to B by virtue of circumstances within section 21(2),
(3), (4) or (5), and
b. is not in such a position of trust by virtue of other circumstances.
3. Where in proceedings for an offence under this section it is proved that the other person was
under 18, the defendant is to be taken not to have reasonably believed that that person was 18
or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably
believed it.
4. Where in proceedings for an offence under this section—
a. it is proved that the defendant was in a position of trust in relation to the other person by
virtue of circumstances within section 21(2), (3), (4) or (5), and
b. it is not proved that he was in such a position of trust by virtue of other circumstances,
it is to be taken that the defendant knew or could reasonably have been expected to know of the
circumstances by virtue of which he was in such a position of trust unless sufficient evidence is
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3929                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
adduced to raise an issue as to whether he knew or could reasonably have been expected to know
of those circumstances.
5. A person guilty of an offence under this section is liable—
a. (a) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine
not exceeding the statutory maximum or both;
b. (b) on conviction on indictment, to imprisonment for a term not exceeding 5 years.
 Section 47: Paying for sexual services of a child
1. A person (A) commits an offence if—
a. he intentionally obtains for himself the sexual services of another person (B),
b. before obtaining those services, he has made or promised payment for those services to B
or a third person, or knows that another person has made or promised such a payment,
and
c. either—
i. B is under 18, and A does not reasonably believe that B is 18 orover, or
ii. B is under 13.
2. In this section, “payment” means any financial advantage, including the discharge of an
obligation to pay or the provision of goods or services (including sexual services) gratuitously
or at a discount.
3. A person guilty of an offence under this section against a person under 13, where subsection
(6) applies, is liable on conviction on indictment to imprisonment for life.
4. Unless subsection (3) applies, a person guilty of an offence under this section against a person
under 16 is liable—
a. where subsection (6) applies, on conviction on indictment, to imprisonment for a term not
exceeding 14 years;
b. in any other case—
i. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine
not exceeding the statutory maximum or both;
ii. on conviction on indictment, to imprisonment for a term not exceeding 14 years.
5. Unless subsection (3) or (4) applies, a person guilty of an offence under this section is liable—
a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not
exceeding the statutory maximum or both;
b. on conviction on indictment, to imprisonment for a term not exceeding 7 years.
6. This subsection applies where the offence involved—
a. penetration of B’s anus or vagina with a part of A’s body or anything else,
b. penetration of B’s mouth with A’s penis,
c. penetration of A’s anus or vagina with a part of B’s body or by B with anything else, or
d. penetration of A’s mouth with B’s penis.
7. In the application of this section to Northern Ireland, subsection (4) has effect with the
substitution of “17” for “16”.
 Section 48: Causing or inciting child prostitution or pornography
1. A person (A) commits an offence if—
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3930                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
a. he intentionally causes or incites another person (B) to become a prostitute, or to be
involved in pornography, in any part of the world, and
b. either—
i. B is under 18, and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. A person guilty of an offence under this section is liable—
a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not
exceeding the statutory maximum or both;
b. on conviction on indictment, to imprisonment for a term not exceeding 14 years.
 Section 49: Controlling a child prostitute or a child involved in pornography
1. A person (A) commits an offence if—
a. he intentionally controls any of the activities of another person (B) relating to B’s
prostitution or involvement in pornography in any part of the world, and
b. either—
i. B is under 18, and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. A person guilty of an offence under this section is liable—
a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not
exceeding the statutory maximum or both;
b. on conviction on indictment, to imprisonment for a term not exceeding 14 years.
 Section 50: Arranging or facilitating child prostitution or pornography
1. A person (A) commits an offence if—
a. he intentionally arranges or facilitates the prostitution or involvement in pornography in
any part of the world of another person (B), and
b. either—
i. B is under 18, and A does not reasonably believe that B is 18 or over, or
ii. B is under 13.
2. A person guilty of an offence under this section is liable—
a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not
exceeding the statutory maximum or both;
b. on conviction on indictment, to imprisonment for a term not exceeding 14 years.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3931                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 State Laws: Michigan Laws Against Child Pornography
Source: http://www.legislature.mi.gov/
Child Abuse and Neglect Prevention Act
The Child Abuse and Neglect Prevention Act is to establish the state child abuse and neglect prevention
board; to provide the powers and duties of the state child abuse and neglect prevention board; and to
prescribe the powers and duties of certain state departments.
Act 250 of 1982- It is an act to:
 To establish the state child abuse and neglect prevention board
 To provide the powers and duties of the state child abuse and neglect prevention board
 To prescribe the powers and duties of certain state departments
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3932                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 State Laws: England and Wales Laws
Source: http://www.iwf.org.uk/
Protection of Children Act 1978
Section 1: It is an offence for a person –
 To take, or permit to be taken, or to make any indecent photograph or pseudo-photograph of a
child; or to distribute or show such indecent photographs or pseudo-photographs; or to possess
such indecent photographs or pseudo-photographs, with a view to their being distributed or
shown by himself or others; or to publish or cause to be published any advertisement likely to be
understood as conveying that the advertiser distributes or shows such indecent photographs or
pseudo-photographs, or intends to do so
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3933                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 State Laws: Scotland Laws
Source: http://www.iwf.org.uk/
Civic Government (Scotland) Act, 1982
 Section 52 - Indecent Child Photographs
o Any person who:
• Takes, or permits to be taken or makes, any indecent photograph or pseudo-photograph
of a child under 18 years of age
• Distributes or shows such an indecent photograph or pseudo-photograph
• Has in his possession such an indecent photograph or pseudo-photograph with a view to
its being distributed or shown by himself or others; or
• Publishes or causes to be published any advertisement likely to be understood as
conveying that the advertiser distributes or shows such an indecent photograph or
pseudo-photograph, or intends to do so,
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3934                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
• Shall be guilty of an offence under this section
 Section 52A - Possession of Photographs
o It is an offence for a person to have any indecent photograph or pseudo-photograph of a child
under the age of 18 years in his possession
 Section 52B - Exemptions for photographs of 16 and 17 year olds
o In relation to offences under Section 52(1)(a), 52(1)(b), 52(1)(c) and Section 52A the accused
is not guilty of an offence
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3935                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 State Laws: Philippines Laws (Republic Acts)
Source: http://www.chanrobles.com/
Republic Act 7610 - Special Protection of Children Against Child Abuse, Exploitation and Discrimination
Act
Article III, Section 5: Child Prostitution and Other Sexual Abuse
 Children, whether male or female, who for money, profit, or any other consideration or due to the
coercion or influence of any adult, syndicate or group, indulge in sexual intercourse or lascivious
conduct, are deemed to be children exploited in prostitution and other sexual abuse
The penalty of reclusion temporal in its medium period to reclusion perpetua shall be imposed upon the
following:
(a) Those who engage in or promote, facilitate or induce child prostitution which include, but are not
limited to, the following:
1. Acting as a procurer of a child prostitute;
2. Inducing a person to be a client of a child prostitute by means of written or oral
advertisements or other similar means;
3. Taking advantage of influence or relationship to procure a child as prostitute;
4. Threatening or using violence towards a child to engage him as a prostitute; or
5. Giving monetary consideration goods or other pecuniary benefit to a child with intent to
engage such child in prostitution
(b) Those who commit the act of sexual intercourse of lascivious conduct with a child exploited in
prostitution or subject to other sexual abuse; Provided, That when the victims is under twelve (12)
years of age, the perpetrators shall be prosecuted under Article 335, paragraph 3, for rape and
Article 336 of Act No. 3815, as amended, the Revised Penal Code, for rape or lascivious conduct,
as the case may be: Provided, That the penalty for lascivious conduct when the victim is under
twelve (12) years of age shall be reclusion temporal in its medium period; and
(c) Those who derive profit or advantage therefrom, whether as manager or owner of the
establishment where the prostitution takes place, or of the sauna, disco, bar, resort, place of
entertainment or establishment serving as a cover or which engages in prostitution in addition to
the activity for which the license has been issued to said establishment
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3936                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Article III Section 6: Attempt To Commit Child Prostitution
 There is an attempt to commit child prostitution under Section 5, paragraph (a) hereof when any
person who, not being a relative of a child, is found alone with the said child inside the room or
cubicle of a house, an inn, hotel, motel, pension house, apartelle or other similar establishments,
vessel, vehicle or any other hidden or secluded area under circumstances which would lead a
reasonable person to believe that the child is about to be exploited in prostitution and other
sexual abuse
 There is also an attempt to commit child prostitution, under paragraph (b) of Section 5 hereof
when any person is receiving services from a child in a sauna parlor or bath, massage clinic,
health club and other similar establishments. A penalty lower by two (2) degrees than that
prescribed for the consummated felony under Section 5 hereof shall be imposed upon the
principals of the attempt to commit the crime of child prostitution under this Act, or, in the
proper case, under the Revised Penal Code
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3937                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Children’s Internet Protection Act (CIPA)
Source: http://www.fcc.gov/
The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress in December 2000 to
address concerns about access to offensive content over the Internet on school and library computers.
CIPA imposes certain types of requirements on any school or library that receives funding for Internet
access or internal connections from the E-rate program—a program that makes certain communications
technology more affordable for eligible schools and libraries.
Following are the requirements of CIPA:
 Schools and libraries subject to CIPA may not receive the discounts offered by the E-rate program
unless they certify that they have an Internet safety policy and technology protection measures in
place. An Internet safety policy must include technology protection measures to block or filter
Internet access to pictures that: (a) are obscene, (b) are child pornography, or (c) are harmful to
minors (for computers that are accessed by minors).
 Schools subject to CIPA are required to adopt and enforce a policy to monitor online activities of
minors.
 Schools and libraries subject to CIPA are required to adopt and implement a policy addressing:
(a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors
when using electronic mail, chat rooms, and other forms of direct electronic communications; (c)
unauthorized access, including so-called “hacking,” and other unlawful activities by minors
online; (d) unauthorized disclosure, use, and dissemination of personal information regarding
minors; and (e) restricting minors’ access to materials harmful to them.
 
 
 
 
 
 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3938                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 
 
 
 
 
Anti-Child-Pornography Organizations
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3939                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Anti-Child-Pornography Organizations
Anti-child-pornography organizations are the non-profit organizations established for eradicating child
pornography to help children live in the best environment. They accept anonymous and online abuse
reports in order to maintain secrecy of individuals. Following are the various anti-child-pornography
organizations:
1. Project Safe Childhood (http://www.projectsafechildhood.gov/)
2. Innocent Images National Initiative
3. Internet Crimes Against Children (ICAC)
4. Antichildporn.org
5. Child Exploitation and Online Protection (CEOP) Centre
6. ThinkUKnow
7. Virtual Global Taskforce
8. Internet Watch Foundation
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3940                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
9. International Centre for Missing & Exploited Children
10. National Centre for Missing & Exploited Children
11. Child Victim Identification Program
12. Financial Coalition Against Child Pornography
13. Preverted Justice
14. The National Society for the Prevention of Cruelty to Children (NSPCC)
15. Canadian Centre for Child Protection
16. Association of Sites Advocating Child Protection (ASACP)
17. Websites Against Child Porn (WSACP)
18. Child Focus
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3941                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 http://www.projectsafechildhood.gov/
Source: http://www.projectsafechildhood.gov/
Project Safe Childhood (PSC) aims to combat the proliferation of technology-facilitated sexual
exploitation crimes against children. It must aim to investigate and prosecute vigorously, and protect and
assist the victimized children. At the same time, it must recognize the need for a broad, community-based
effort to protect children and to guarantee future generations the opportunities of the American dream.
PSC creates, on a national platform, locally designed partnerships of federal, state, local, and tribal law
enforcement officers in each federal judicial district to investigate and prosecute Internet-based crimes
against children. With the U.S. Attorney as the convenor, each local community will be able to design and
implement programs that are uniquely tailored to its needs, while maximizing the impact of national
resources and expertise. Basic vision of PSC will be put into action through the building of PSC
partnerships in each district, the development of district-specific strategic plans, and the reporting of
results on a semi-annual basis in order to ensure accountability to the goals of PSC.
The PSC partnerships in every district aim to address five major components of the initiative, as follows:
 Integrated Federal, State, and Local Efforts to Investigate and Prosecute Child Exploitation
Cases, and to Identify and Rescue Child Victims:
U.S. Attorneys will coordinate the investigation and prosecution of child exploitation crimes, and
the efforts to identify and rescue victims. Establishing open and formal lines of information
sharing and case referrals is imperative, so that investigators and prosecutors can use all available
tools for finding offenders and selecting the most appropriate forum in which to seek convictions.
Aggressive investigations and prosecutions must be accompanied by strong victim-assistance
efforts. Given their closeness to the community, local PSC partners must play a central role in
helping national and local partners in identifying and rescuing victims of child exploitation cases.
 Participation of PSC Partners in Coordinated National Initiatives:
Child pornography cases are often initiated by law enforcement agents uncovering a peer-to-peer
network, server, or website. Such national operations may be conducted by the FBI’s Innocent
Images Unit, ICE’s Cyber Crime Center, USPIS’s Child Exploitation Task Forces, ICAC task forces,
or others, and are frequently coordinated by CEOS. These investigations will lead to hundreds or
thousands of leads in communities throughout the country.
 Increased Federal Involvement in Child Pornography and Enticement Cases:
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3942                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
All states have laws in place to respond to child exploitation and abuse, and some states have very
significant criminal laws and penalty provisions for child pornography offenders and online
sexual predators that parallel or exceed those provided by federal law.
 Training of Federal, State, and Local Law Enforcement:
Computer-based crimes, such as the child exploitation by using PCs and Internet, present unique
challenges for law enforcement. Investigators must be trained and have the necessary equipment
to investigate and perform computer forensics analysis of targeted equipment. Prosecutors must
learn the most up-to-date and effective techniques for bringing these cases. Officers and
prosecutors must be oriented to receive and handle packaged leads distributed from national
investigations or from NCMEC’s CyberTipline or CVIP. A key component of PSC will therefore be
to ensure that federal, state, local, and tribal officers are properly instructed. The training needs
of PSC partners within each district will be assessed, and officials will take advantage of training
programs facilitated or administered by NCMEC, the ICAC program, and the National Advocacy
Center, among other programs and providers.
 Community Awareness and Educational Programs:
PSC will aim to enhance existing efforts to generate awareness and to educate the public about the
threats to our children, and ways to prevent online exploitation. It partners with existing national
programs through NCMEC and the ICAC program in order to raise awareness about the threat of
online sexual predators and provide the tools and information to parents and youngsters seeking
to report possible violations. These national campaigns will be complemented by the efforts of
each district’s PSC partnership to impact its community through expanded outreach efforts.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3943                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Innocent Images National Initiative
Source: http://www.fbi.gov/
The Innocent Images National Initiative (IINI), a component of FBI's Cyber Crimes Program, is an
intelligence driven, proactive, multi-agency investigative operation to combat the proliferation of child
pornography/child sexual exploitation (CP/CSE) facilitated by an online computer. It provides centralized
coordination and analysis of case information that by its nature is national and international in scope,
requiring unprecedented coordination with state, local, and international governments and among FBI
field offices and Legal Attachés.
The mission of the IINI is to reduce the vulnerability of children to acts of sexual exploitation and abuse
which are facilitated through the use of computers; to identify and rescue witting and unwitting child
victims; to investigate and prosecute sexual predators who use the Internet and other online services to
sexually exploit children for personal or financial gain; and to strengthen the capabilities of federal, state,
local, and international law enforcement through training programs and investigative assistance.
FBI’s Innocent Images National Initiative focuses on:
 Online organizations, enterprises, and communities that exploit children for profit or personal
gain
 Producers of child pornography
 Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual
activity with a minor
 Major distributors of child pornography, such as those who appear to have transmitted a large
volume of child pornography via an online computer on several occasions to several other people
 Possessors of child pornography
The FBI and the Department of Justice review all files and select the most egregious subjects for
prosecution. In addition, the IINI works to identify child victims and obtain appropriate
services/assistance for them and to establish a law enforcement presence on the Internet that will act as a
deterrent to those who seek to sexually exploit children.
Innocent Images has expanded to include investigations involving all areas of the Internet and online
services including:
 Internet websites that post child pornography
 Internet News Groups
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3944                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Internet Relay Chat (IRC) Channels
 File Servers (“FServes”)
 Online Groups and Organizations (eGroups)
 Peer-to-Peer (P2P) file-sharing programs
 Bulletin Board Systems (BBSs) and other online forums
Innocent Images Statistical Accomplishments
Online child pornography/child sexual exploitation investigations, which are worked under the FBI's
Innocent Images National Initiative, accounted for 39 percent of all investigations worked under the FBI's
Cyber Division in fiscal year 2007.
Innocent Images grew exponentially between fiscal years 1996 and 2007 with a:
 2062 percent increase in cases opened (113 to 2443)
 1003 percent increase in information & indictments (99 to 1092)
 2501 percent increase in arrests, locates, and summons (68 to 1769)
 1404 percent increase in convictions and pretrial diversions (68 to 1023)
Between fiscal years 1996-2007, the Innocent Images National Initiative has recorded the following
statistical accomplishments:
 Number of cases opened: 20,134
 Number of information and indictments: 6,844
 Number of arrests, locates, and summons: 9,469
 Number of convictions and pretrial diversions: 6,863
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3945                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Internet Crimes against Children (ICAC)
Source: http://attorneygeneral.utah.gov/
The Internet Crimes against Children Task Force (ICAC) is a multi-jurisdictional task force that
investigates and prosecutes individuals who use the Internet to exploit children. It is a network of
coordinated regional task forces engaged in helping state and local law enforcement agencies to develop
an effective response to cyber-enticement and child pornography cases.
This help consists of proactive investigations, forensic and investigative components, training and
technical assistance, effective prosecutions, victim services, and community education.
An ICAC task force is formed when a state or local law enforcement agency enters into a grant contract
with OJJDP, and that entity then enters into Memoranda of Understanding with other federal, state, and
local agencies.
ICAC task forces have played a critical role in law enforcement’s efforts to stop Internet criminal activity
that poses harm to children. Investigations initiated by the ICAC task forces led to more than 1,600
arrests and over 6,000 forensic examinations in 2005. Since the beginning of the ICAC program,
investigations have resulted in 7,328 arrests. The ICAC task forces’ nationwide efforts have resulted in the
prosecution of many cases; in the first six months of fiscal year 2005 alone, for example, the ICAC
program reported that its investigations resulted in 4,947 state charges and 577 federal charges.
The task force’s mission is to:
 Intervene and stop individuals who use the Internet to entice a child to meet with them for sexual
purposes;
 Investigate and prosecute those who possess, create, or distribute child pornography; and
 Educate the public about the dangers that exist for minors on the Internet.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3946                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Antichildporn.org
Source: http://www.antichildporn.org/
AntiChildPorn.Org (ACPO) is an organization, comprising of volunteers from all around the world, whose
mission is to stop the sexual exploitation of the world's children. For the past five years, ACPO has been
addressing the issues of Child Pornography production and distribution via the Internet, as well as the
predatory use of the Internet for the sexual abuse of children.
Their main focus is to protect children from becoming victims of child pornography and to keep it from
spreading over the Internet. Their secondary focus is education. They want to train individuals and
organizations about the Internet and its associated risks. They wish to educate the public and politicians
to this epidemic and the danger these criminals pose to the collective social interest. They want to address
the supply and demand issues related to these illicit materials and facilitate cooperative efforts between
police agencies and other public interest groups worldwide. They counsel the law enforcement on
gathering information and evidence related to the Internet.
Goals:
 Provide a mass amount of information to law enforcement authorities, including activity hot spots
on the Internet and the result of their own investigations of the activities of online child
pornographers
 Halt sensationalism and hype regarding the Internet while promoting quality investigative
journalism on pedophile pornography
 Create enough public pressure to bring authorities to the point of action
 Form a cooperative with other internet groups with similar goals that will benefit them all and
increase their impact
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3947                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 How to Report to Antichildporn.org about Child Pornography Cases
Following is the procedure for reporting child porn case to www.antichildporn.org:
 Go to Homepage http://www.antichildporn.org/
 Click Report!  Report Child Porn
 The form ‘Anonymous Submission’ will appear
 Give the appropriate web address or FTP address of the pornographic site
 Write details about that site
 You can report about more than one site
 Click Submit
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3948                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-25: Child pornography report form
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3949                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Child Exploitation and Online Protection (CEOP) Centre
Source: http://www.ceop.gov.uk/
The Child Exploitation and Online Protection (CEOP) Centre is a UK-based anti-child-pornography
organization. It is the part of UK government/police that basically focuses on protecting children from
sexual abuse. It targets, tracks, and brings offenders or perpetrators to the court of law with the help of
direct, local, or international forces. Each sub-team of the CEOP Centre has at least one police officer who
handles each and every legal matter. It not only consists of police officers but also NSPCC members who
are sponsored by VISA and SERCO, government, and various other corporations.
It is an approach that sees the development of specialist areas such as its Behavioral Analysis Unit, an
approach to victim identification or the development of our child trafficking unit, as well as filtering into
all areas of outreach activities such as the most wanted initiative and public awareness plans. Its
intelligence researches on how offenders operate and think, how children and young people behave, and
how technological advances are developing.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3950                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-26: Child Exploitation and Online Protection (CEOP) Centre
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3951                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 ThinkUKnow
Source: http://www.thinkuknow.co.uk/
ThinkUKnow is the education programme of the Child Exploitation and Online Protection Centre aimed
at young people, and encourages safe Internet browsing. It is based around three themes that are as
follows:
 How to have fun
 How to stay in control
 How to report a problem
It provides the latest information on the sites children like to visit, mobiles, and new technology. It divides
the users into various groups based on age:
1. Children between 5-7
2. Children between 8-10
3. Children between 11-16
4. For parents or caretakers
5. For teachers or trainers
Depending on the age group, users can target specific information. It offers an online reporting option
that can be accessed just by clicking the icon REPORT ABUSE. After clicking Report Abuse, the user
needs to fill in the URL and further information and click to submit the report.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3952                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-27: ThinkUKnow Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3953                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
 Virtual Global Taskforce (VGT)
Source: http://www.virtualglobaltaskforce.com/
The Virtual Global Taskforce (VGT) is group of law enforcement agencies from around the world working
together to fight child abuse online. The aim of it is to build an effective, international partnership of law
enforcement agencies that helps to protect children from online child abuse.
The objectives of the VGT are:
 To make the Internet a safer place
 To identify, locate, and help children at risk
 To hold perpetrators appropriately to account
The VGT is made up of:
 Australian Federal Police
 CEOP Centre in UK
 Italian Postal and Communication Police Service
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3954                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Royal Canadian Mounted Police
 US Department of Homeland Security
 Interpol
It allows users to report the abuse online. The user just needs to click the icon Report Abuse, fill in the
details and the URL, and submit the report.
Figure 44-28: Virtual Global Taskforce (VGT) Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3955                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Internet Watch Foundation (IWF)
Source: http://www.iwf.org.uk/
The Internet Watch Foundation (IWF) is the UK hotline for reporting illegal content, specifically acting
upon child sexual abuse content hosted worldwide and criminally obscene and incitement to racial hatred
content hosted in the UK.
Following are the features of Internet Watch Foundation (IWF):
 Online reporting form: It can be reached from any page of the website by clicking the Report
Illegal Content Click Here icon at the top right hand side of any page
 Links to relevant websites: Shown on every page where needed; this section shows links to the
relevant websites and document downloads for that page
 Tools for choosing appearance of the page: Shown on every page; this section allows the user to
choose a font size, print, bookmark or email the page they are on
 Communications: Shown on every page; this section provides IWF contact details as well as links
to the newsletter registration page, the website feedback page, IWF literature, and materials page
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3956                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 News Ticker: Shown on every page; these scrolling links allow you to access the most recent IWF
news stories
 Search Function: Shown on every page; this function allows you to search the IWF website using
keywords and phrases
The following are the steps for reporting at IWF online:
 Go to http://www.iwf.org.uk/
 To report against illegal content, click Click here Report Illegal Content
 Submit the URL and the report
Figure 44-29: Internet Watch Foundation (IWF) Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3957                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 International Centre for Missing & Exploited Children (ICMEC)
Source: http://www.icmec.org/
The International Centre for Missing & Exploited Children was founded in 1998 and launched by the U.S.
It works to identify and coordinate a global network of organizations fighting child sexual exploitation and
abduction. It offers a hotline and cyber tipline that let users report child porn sites. It also accepts reports
via telephone communication at 1-800-THE-LOST. People can visit www.missingkids.com for more
information.
ICMEC's work brings promise to children and families by:
 Establishing a global resource to find missing children and prevent child-sexual exploitation
 Creating national centers and affiliates worldwide
 Building an international network to disseminate images of and information about missing and
exploited children
 Providing training to law enforcement, prosecutors, judges, legal professionals, nongovernmental
organizations, and government officials
 Advocating and proposing legislative changes in laws, treaties, and systems to protect children
worldwide
 Conducting international expert conferences to build awareness encourage and increase
cooperation and collaboration between and among countries
 Working alongside financial industry and law enforcement to combat commercial child-sexual
exploitation
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3958                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-30: International Centre for Missing & Exploited Children (ICMEC) Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3959                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 National Center for Missing & Exploited Children (NCMEC)
Source: http://www.missingkids.com/
The National Center for Missing & Exploited Children (NCMEC) is the non-profit anti-child-pornography
organization. It is the Nation's Resource Center for Child Protection that gives a better understanding
about child pornography and its prevalence on Internet. It helps in reporting about missing child or
reporting against a site that is offering child pornography via a cyber tipline.
 
Figure 44-31: National Center for Missing & Exploited Children (NCMEC) 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3960                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
CyberTipline
The CyberTipline is a reporting mechanism for cases of child sexual exploitation including child
pornography, online enticement of children for sex acts, molestation of children outside the family, sex
tourism of children, child victims of prostitution, and unsolicited obscene material sent to a child. Reports
may be made 24-hours per day, 7 days per week online at www.cybertipline.com or by calling 1-800-843-
5678
How to report:
 Go to http://www.missingkids.com/cybertip/
 Click the arrow beside CyberTipline
 Enter information on the form as required
 Enter the URL that is showcasing child pornography
 Submit the report
 
Figure 44-32: CyberTipline
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3961                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Child Victim Identification Program (CVIP)
Source: http://www.missingkids.com/
The Child Victim Identification Program (CVIP) is the world's largest database that serves as the
clearinghouse in the United States for child pornography cases and also serves as the main point of
contact to international agencies for victim identification.
It helps assist law enforcement and prosecution teams with child-pornography evidence reviews in order
to help them learn the full range of crimes committed in each case, maximize sentences available for each
charge, and attempt to identify the location of unidentified child sexual exploitation victims. It is
maintained by the Child Exploitation and Obscenity Section of the United States Department of Justice
and the National Center for Missing and Exploited Children (NCMEC).
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3962                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-33: Child Victim Identification Program (CVIP)
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3963                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Financial Coalition against Child Pornography (FCACP)
Source: http://www.icmec.org/
The Financial Coalition against Child Pornography (FCACP) is a coalition of credit card issuers and
Internet services companies that seek to eliminate commercial child pornography by taking action on the
payment systems used fund these illegal operations. It merged with the International Centre for Missing &
Exploited Children (ICMEC) and the National Centre for Missing & Exploited Children (NCMEC). Thirty
companies have joined ICMEC and NCMEC to create and make FCACP successful. It includes leading
banks, credit card companies, third-party payment companies, and Internet services companies.
Coalition members will be vigilant and will look proactively for and report child pornography to the
clearinghouse. It will ensure that information derived from proactive efforts is reviewed by the
clearinghouse, that information is shared with Coalition companies, and that a tracking and feedback
system is developed to ensure that broad-based action is taken to eradicate illegal practices. 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3964                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Perverted Justice
Source: http://www.perverted-justice.com/
Perverted Justice (PeeJ) is a California-based non-profit organization for investigating, identifying, or
publicizing users in chat rooms with predatory tendencies towards children. Its methods are controversial
and a number of critics have called these actions harassment.
It recruits volunteer contributors who:
 Pose as underage children in chat rooms
 Use fake online screen names
 Wait for predators to instigate conversations with them 
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3965                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 National Society for the Prevention of Cruelty to Children (NSPCC)
Source: http://www.nspcc.org.uk/, http://www.childline.org.uk/
NSPCC protects children from cruelty, supports vulnerable families, campaigns for changes to the law,
and raises awareness about abuse. Its aim is to have a society where all children are loved, valued, and
able to fulfill their potential. It has 177 community-based projects and runs the Child Protection Helpline
and ChildLine in the UK and the Channel Islands.
Most of its work is with children, young people, and their families. It also works to achieve cultural, social,
and political change—influencing legislation, policy, practice, public attitudes, behaviors, and delivering
services for the benefit of young people.
http://www.childline.org.uk/ is the service provided by NSPCC that helps users know about abuse or
porn. It is the UK's free, 24-hour helpline for children in distress or danger. Trained volunteer counselors
comfort, advise, and protect children and young people who may feel they have nowhere else to turn. It is
built in child friendly way. It provides with the number 0800 1111 that takes the user (Children) reports
and takes the necessary actions.
NSPCC has set four objectives that help it in reaching its goal:
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3966                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 To mobilize everyone to take action to end child cruelty
 To give children the help, support, and environment they need to stay safe from cruelty
 To find ways of working with communities to keep children safe from cruelty
 To be, and be seen as, someone to turn to for children and young people
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3967                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Canadian Centre for Child Protection
Source: http://www.protectchildren.ca/
The Canadian Centre for Child Protection (CCCP) is a non-profit, charitable organization dedicated to the
personal safety of all children. The goal of CCCP is to reduce child victimization by providing programs
and services to Canadians. It was incorporated in April 1985 as Child Find Manitoba following the
disappearance and murder of a 13-year-old child. The missions of the CCCP are as follows:
 To reduce the incidence of missing and sexually exploited children
 To educate the public on child personal safety and sexual exploitation
 To assist in finding the location of missing children
 To advocate for and increase awareness about issues relating to child sexual exploitation
The Canadian Centre for Child Protection:
 Delivers programs to increase the personal safety of children and reduce their risk of sexual
exploitation
 Prevents harm to children through education and prevention programs for children, families,
schools, and communities
 Receives and addresses reports of child pornography, online luring, child sex tourism, and
children exploited through prostitution
 Maintains comprehensive data on the latest trends in child victimization and develops training
and programs to address the risks
 Accepts tips from the public and assists in locating missing children
 Advocates on issues relating to child victimization and protection
 Researches better practices on how to keep children safer
 Coordinates national efforts in the area of child protection through collaboration with non-profit
agencies, government, industry, law enforcement, educators, and families
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3968                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-34: Canadian Centre for Child Protection
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3969                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 http://cybertip.ca/
Source: http://cybertip.ca/
Cybertip.ca is Canada’s national tipline for reporting online sexual exploitation of children.
Following is the procedure to report child pornography on Cybertip.ca:
 Go to http://cybertip.ca/
 Click Click here to report
 Write details about the child porn site
 Submit the report
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3970                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-35: Cybertip-ca Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3971                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Association of Sites Advocating Child Protection (ASACP)
Source: http://www.asacp.org/
The Association of Sites Advocating Child Protection (ASACP), founded in 1996, is a non-profit
organization dedicated to eliminating child pornography from the Internet. It battles child pornography
through its CP reporting hotline and by organizing the efforts of the online adult industry to combat the
heinous crime of child sexual abuse. It also works to help parents prevent children from viewing age-
inappropriate material online.
It provides an online hotline for web surfers and webmasters to report suspected child pornography sites.
Every page of the site provides links to this hotline, which receives thousands of reports every month. It
investigates those reports and determines the hosting, billing, IP address, ownership, and linkage of
suspected CP sites.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3972                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-36: Association of Sites Advocating Child Protection (ASACP)
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3973                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Web Sites Against Child Porn (WSACP)
Source: http://www.wsacp.org/
Web Sites Against Child Porn (WSACP) is an anti-child-pornography organization. Its goal is to stop as
many child pornographic websites as possible and make the Internet a better place for everyone. It
provides feedback on all reports submitted with a valid email address. The staff of WSACP will inform you
if a suspect’s site has been reported to the authorities or not, if they were unable to report a suspect site to
the authorities, and reasons for it. It offers online reporting against a site by submitting the URL, thus
providing news and resources related to child pornography.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3974                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 http://www.reportchildporn.com/
Source: http://www.reportchildporn.com/
Reportchildporn.com is a hotline for webmasters and surfers to report suspected child pornography.
It offers:
 A way to report child porn
 An avenue to discuss problems related to child porn
Figure 44-37: Report Child Porn Page
How to report:
1. Click Enter Report Child Porn.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3975                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 
Figure 44-38: Report Child Porn Page 
2. If you are the registered user, click Username and Password, log in, and report a child porn
site.
3. If not the registered user, click Register now and after registering, log in and report the site.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3976                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 Child Focus
Source: http://www.childfocus.be/
The European Centre for Missing and Sexually Exploited Children, operating under the name of Child
Focus, is a foundation under Belgian law recognized as a public utility. It acts on an independent basis
and only in the interest of children.
Following are the features of Child Focus:
 It provides active support in the investigation of disappearances, abductions, or sexual
exploitation of children
 It supports and encourages investigations and legal measures
 It ensures follow-up to the cases that are entrusted to it and participates in the counseling of
victims
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3977                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
.
Figure 44-39: Child Focus Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3978                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
 StopChildPorno.be
Source: http://www.stopchildporno.be/
StopChildPorno.be is the Belgian civil hotline for reporting child abuse images found on the Internet. It
informs you about the problem of child pornography prevalent on the Internet, Belgian legislation
concerning this matter, different possibilities to report, procedures, addresses of other hotlines abroad,
and communication campaigns focusing on children.
How to report:
 Go to http://www.stopchildporno.be/index.php?language=en
 Click Report a site
 In Procedure, check either I want to be anonymous or I want to be informed and click
Continue
 Indicate which type of report you want to submit
 Copy and paste the URL of the website
 Submit the report
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3979                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Figure 44-40: StopChildPorno.be Website
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3980                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Summary
Child pornography is defined as any work that centers on activities involving the sexual behavior of
children. Such activities include drawings, cartoons, sculptures, or paintings, photography, films, videos
or computer-generated images or pictures, whether made or produced by electronic, mechanical, or other
means. It also includes distribution and possession of the porn materials.
Criminals involved in pornographic cases are generally unmarried, separated, divorced or widowed.
Motives of people can range from mere money-making to sexual perversion. They attract children by
coercion, seduction, and luring them with money. People involved in child pornography are also known as
‘pornographers’. It includes the person who establishes the online relationship with the children, who
physically abuses the children, and the person who produces and distributes the porn materials.
The Internet provides easy access to a number of pornographic materials and reduces the cost of
production and distribution of such material. An offender distributes the material easily through web
services such as emails, user groups, and webcams. Child pornography affects children physically,
socially, and psychologically.
ISP (Internet Service Provider) plays an important role in reducing the problem of child pornography. It
can facilitate in reducing pornography by blocking illegal sites, applying filters to browsers and search
engines, and by creating complaint sites. The police also play a crucial role in investigating the
pornographic sites. They may use new computer forensics tools and techniques to investigate such sites.
They may also use “honey trap” sites to find offenders.
The challenges in controlling child pornography are large Internet traffic, lack of rules and regulations,
and different advanced techniques used by the offender. An offender’s computer, hand-held devices, and
servers are the main sources of evidence for the investigation.
Organizations such as Antichildporn.org (ACPO), and Innocent Images National Initiative (IINI),
Cybertip.ca comprise volunteers from around the world whose mission is to stop the sexual exploitation of
the children.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3981                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Exercise:
1. What are the motives of people behind child pornography?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
2. Explain the role of the Internet in promoting child pornography.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3. What are the effects of child pornography on children?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
4. How dissemination of child pornography can be prevented?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
5. What are the challenges faced in controlling child pornography?
_____________________________________________________________________
_____________________________________________________________________
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3982                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
6. List the guidelines for investigating child pornography cases.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
7. List the sources of digital evidence during an investigation.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
8. List the guidelines for parents to reduce the risk of their child being porned.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
9. Are there any tools to protect children from accessing pornography?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
10. Write a brief note on the laws against child pornography in the United States of America.
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3983                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
11. Explain in details about various anti-child porn organizations.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Computer Hacking Forensic Investigator Exam 312-49
Investigating Child Pornography Cases 
Module XLV Page | 3984                                               Computer Hacking Forensic Investigator Copyright © by EC-Council 
   All Rights Reserved. Reproduction is Strictly Prohibited. 
Hands On
1. Go to site http://www.icmec.org/en_X1/pdf/ModelLegislationFINAL.pdf and read the report on
Child Pornography.
2. Go to site http://www.antichildporn.org/ and read about how to report against Child
Pornography.
3. Go to site http://www.fbi.gov/publications/innocent.htm and read about Innocent Images
National Initiative.
4. Visit your local government site and browse for laws against Child pornography.
5. Run the tool Net Nanny and see the result.

More Related Content

PDF
File000097
PDF
File000095
PDF
File000157
PDF
Social Media & Employment Law - TAPS 2012
PPTX
Revenge porn: punish, remove, forget, forgive?
PPTX
What do we do with aproblem like revenge porn ?
PPT
Framing Search Engine Responsibilities
PPTX
Pli workplace privacy in the year 2013 2013-6-13
File000097
File000095
File000157
Social Media & Employment Law - TAPS 2012
Revenge porn: punish, remove, forget, forgive?
What do we do with aproblem like revenge porn ?
Framing Search Engine Responsibilities
Pli workplace privacy in the year 2013 2013-6-13

What's hot (20)

PPTX
Unraveling intermediary liability
PPTX
What is a joke? The role of social media providers in regulating speech
PDF
Privacy and social media in the workplace
PDF
Social Media in the Workplace
PPT
The Human Rights Responsibilities of Internet Gatekeepers
PPTX
Social Media in the Workplace and Beyond
PPTX
Privacy Law
PDF
Municipalities & The Internet: A Few Legal Issues
PPTX
Teaching Ethics
PPTX
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
PPTX
A Tale of One City
DOC
Myths And Misconceptions About Workplace Bullying Josh Bornstein
PPT
2012: NJ GMIS: The Double Edge Sword of the Social Network
PDF
Perspectivesmanage
PPT
OLC Presentation Jipson
PDF
Young Adults And On Line Privacy
PDF
Public-Employee Privacy Rights in the Age of Social Media
PDF
Social Media And Employment Screening
DOCX
6161141 Dissertation 310315
PDF
2600 v20 n2 (summer 2003)
Unraveling intermediary liability
What is a joke? The role of social media providers in regulating speech
Privacy and social media in the workplace
Social Media in the Workplace
The Human Rights Responsibilities of Internet Gatekeepers
Social Media in the Workplace and Beyond
Privacy Law
Municipalities & The Internet: A Few Legal Issues
Teaching Ethics
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
A Tale of One City
Myths And Misconceptions About Workplace Bullying Josh Bornstein
2012: NJ GMIS: The Double Edge Sword of the Social Network
Perspectivesmanage
OLC Presentation Jipson
Young Adults And On Line Privacy
Public-Employee Privacy Rights in the Age of Social Media
Social Media And Employment Screening
6161141 Dissertation 310315
2600 v20 n2 (summer 2003)
Ad

Similar to File000098 (20)

PPT
Justine- pedophile laws
DOC
Crj 101 as we enter the last week of the course/tutorialoutlet
PPTX
prt. 1...Online Pedophiles
PPTX
Internet Safety For Kids By Tanmay
PPT
Protecting children in cyberspace
PPTX
Pornography on the Internet
PPTX
Pornography on the internet
PPTX
Porno
PPTX
Pornography on the internet
PDF
Pathways White Paper FINAL (1) (1)
PPTX
KidSafe - Parental Training Presentation
PPT
Internet Safety
DOCX
Grant Proposal Excerpt Build Your Own NGO
PDF
File000158
PPTX
Cyber crime against children
PPTX
CYBER CRIME AGAINST CHILDREN_2
PDF
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
PPTX
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
PPTX
Children-safety-online-Presentation.pptx
PPTX
OSEC presentation.pptx :::::::::::…........
Justine- pedophile laws
Crj 101 as we enter the last week of the course/tutorialoutlet
prt. 1...Online Pedophiles
Internet Safety For Kids By Tanmay
Protecting children in cyberspace
Pornography on the Internet
Pornography on the internet
Porno
Pornography on the internet
Pathways White Paper FINAL (1) (1)
KidSafe - Parental Training Presentation
Internet Safety
Grant Proposal Excerpt Build Your Own NGO
File000158
Cyber crime against children
CYBER CRIME AGAINST CHILDREN_2
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Children-safety-online-Presentation.pptx
OSEC presentation.pptx :::::::::::…........
Ad

More from Desmond Devendran (20)

PDF
Siam key-facts
PDF
Siam foundation-process-guides
PDF
Siam foundation-body-of-knowledge
PDF
Enterprise service-management-essentials
PDF
Service Integration and Management
PDF
Diagram of iso_22301_implementation_process_en
PDF
File000176
PDF
File000175
PDF
File000174
PDF
File000173
PDF
File000172
PDF
File000171
PDF
File000170
PDF
File000169
PDF
File000168
PDF
File000167
PDF
File000166
PDF
File000165
PDF
File000164
Siam key-facts
Siam foundation-process-guides
Siam foundation-body-of-knowledge
Enterprise service-management-essentials
Service Integration and Management
Diagram of iso_22301_implementation_process_en
File000176
File000175
File000174
File000173
File000172
File000171
File000170
File000169
File000168
File000167
File000166
File000165
File000164

Recently uploaded (20)

DOCX
Memecoin memecoinist news site for trends and insights
PPTX
India’s Response to the Rohingya Refugee Crisis: Balancing National Security,...
PDF
History ppt on World War 2 and its consequences
PDF
4th-president-of-the-Philippines-_20250 812_103637_0000.pdf
PDF
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
DOCX
End Of The Age TV Program: Depicting the Actual Truth in a World of Lies
PDF
Best 5 Sites for Verified Cash App Accounts – BTC & Instant Delivery.pdf
PDF
Naya Bharat Vision 2047_ Key Takeaways from This Year’s Independence Day Them...
PDF
Naidu Pushes for Rs 36 Crore Subsidy to Support Farmers in Need
PDF
Samaya Jyothi Live News Telugu | Breaking & Trusted Updates
PPTX
Pakistan movement part 2: story about Pakistan Movement
DOC
BU毕业证学历认证,阿什兰大学毕业证文凭证书
PDF
Mindanao Debate Lecture Presentation Outline 1.General Facts 2.Mindanao Histo...
PPTX
15 Years of Fraud The Shocking Case of CA Impersonation.pptx
PPTX
The-Evolution-of-Public-Human-Resource-Management (1).pptx
PDF
Reviving Regional Truths: AI-Powered Journalism in Bangladesh
PPTX
7th-president-Ramon-Magsaysay-Presentation.pptx
PDF
Opher Bryer-The Rise and Fall of Opher Bryer How an AI Startup Turned from Pr...
PDF
Pancasila & Citizen Resume PPT - Guest lecture
PDF
424926802-1987-Constitution-as-Basis-of-Environmental-Laws.pdf
Memecoin memecoinist news site for trends and insights
India’s Response to the Rohingya Refugee Crisis: Balancing National Security,...
History ppt on World War 2 and its consequences
4th-president-of-the-Philippines-_20250 812_103637_0000.pdf
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
End Of The Age TV Program: Depicting the Actual Truth in a World of Lies
Best 5 Sites for Verified Cash App Accounts – BTC & Instant Delivery.pdf
Naya Bharat Vision 2047_ Key Takeaways from This Year’s Independence Day Them...
Naidu Pushes for Rs 36 Crore Subsidy to Support Farmers in Need
Samaya Jyothi Live News Telugu | Breaking & Trusted Updates
Pakistan movement part 2: story about Pakistan Movement
BU毕业证学历认证,阿什兰大学毕业证文凭证书
Mindanao Debate Lecture Presentation Outline 1.General Facts 2.Mindanao Histo...
15 Years of Fraud The Shocking Case of CA Impersonation.pptx
The-Evolution-of-Public-Human-Resource-Management (1).pptx
Reviving Regional Truths: AI-Powered Journalism in Bangladesh
7th-president-Ramon-Magsaysay-Presentation.pptx
Opher Bryer-The Rise and Fall of Opher Bryer How an AI Startup Turned from Pr...
Pancasila & Citizen Resume PPT - Guest lecture
424926802-1987-Constitution-as-Basis-of-Environmental-Laws.pdf

File000098

  • 1. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3841                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Computer Hacking Forensic Investigator (CHFI) Module XLV: Investigating Child Pornography Cases Exam 312-49
  • 2. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3842                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   News: 7 Southern California Men Arrested in Child Porn Investigation Source: http://www.latimes.com/ 52 people were suspected of possessing or producing child pornography using peer-to-peer computer networks to exchange those graphic images and videos. These were from Los Angeles, Orange, Riverside, San Bernardino and Ventura counties and out of them, seven Southern California men were arrested on Tuesday following an eight-month investigation by federal, state, and local law enforcement agencies. U.S. Atty. Thomas O'Brien at a news conference in Los Angeles said that, "The evidence is horrific”. The charged included attorneys, a law enforcement officer, and men with previous child porn-related convictions. If convicted of the maximum charges for possession of child pornography, each defendant could face up to 10 years in federal prison. Those with a previous conviction could face a minimum of 10 years. Those charged include Gary Samuel Cochran, 50, of Huntington Beach, previously convicted of child molestation and possession of obscene materials depicting children engaged in sex acts; Evan Craig Stephens, 36, of Upland, a registered sex offender; George Tyler Farmer, 39, of Oxnard, previously convicted of molesting a 6-year-old child; and Eric David Lacey, 48, of Hollywood.
  • 3. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3843                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   News: Chinese National Arrested Over Child Porn Source: http://www.abc.net.au/ Many of the cases are enrolled against child pornography. A man who was arriving from Hong Kong was arrested at Cairns Airport, in far north Queensland after customs official found child porn on his laptop computer. Later, a 30 years old Chinese national was detained and taken to the Cairns watch-house for court proceedings before being bailed. Kaylene Zakharoff, an acting customs’ national manager of investigations said that:  “The man faces up to 10 years imprisonment if he/she is convicted”  “Visitors to Australia need not be aware that Australia does have strict import controls and this type of pornography is not accepted and we will investigate and prosecute these matters where appropriate.”
  • 4. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3844                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   News: Theft Leads to Child Porn Search Source: http://www.argusleader.com/ According to the court’s documents, investigators have found child porn images on the system of Elk point’s volunteer fire management. According to the search warrant documents though large numbers of suspected child porn images were found on the system of Kavanaugh, 43, he was not charged against it. According to an affidavit in support of the search warrant, the investigation began when Kavanaugh reported that his computer was stolen from his Burbank home on June 27. He complained this to Sheriff Dan Limoges, county prosecutors, and the attorney general's office about a deputy's refusal to take the report seriously. In one of those conversations, he even said that the laptop was found later in his yard in damaged condition and was used for several times. On July 8, deputies retrieved the computer from the Elk Point Fire Station and examined it. According to an affidavit, the search revealed, "Dozens of female nude images which had titles such as high school teens and two images titled mother and young daughter natural. These two images contained a nude woman with a preteen girl, both fully nude." Investigators obtained a search warrant the next day but the charges have not been filed as Miller said that, he has not received any report from the sheriff's office. He said, "It's still in the investigative stage. It's far too early to make any statement at all." Elk Point Mayor Isabel Trobaugh said:  She was surprised to hear about the investigation, but she had no first-hand knowledge of it  The volunteer fire department is separate from city government and is funded by property owners in the fire district.
  • 5. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3845                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Module Objective Child pornography is the serious crime prevailing on the Internet. It is the harassing act against the children where the adults are using them for their gratification. Possessing or transmitting the child porn images or videos is considered as a crime and various organizations (law enforcement and non-profitable organizations) are taking initiative to stop it. This module will familiarize you with:  Child Pornography  People’s Motives behind Child Pornography  People involved in Child Pornography  Role of Internet in Promoting Child Pornography  Effects of Child Pornography on children  Measures to Prevent Dissemination of Child Pornography  Challenges in Controlling Child Pornography  Steps for Investigating Child Pornography Cases  Sources of Digital Evidence  Techniques to Reduce the Problem of Child Pornography  Guidelines to Avoid Pornography  Report on Child Pornography  Laws against Child Pornography  Anti-Child Pornography Organizations
  • 6. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3846                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Module Flow  
  • 7. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3847                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Introduction to Child Pornography Child Pornography is a serious crime. There are growing numbers of children who access the Internet all over the world. Rapidly expanding computer technology and the Internet has given access to the production and distribution of child pornography. Child pornography is defined as “a visual depiction of any kind, including a drawing, cartoon, sculpture, or painting, photograph, film, video, or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where it depicts a minor engaging in sexually explicit conduct and is obscene, or depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or masochistic abuse, or sexual intercourse, including genital- genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex.”. Source: http://www.missingkids.com Child pornography also includes the production, distribution, and possession of pornographic material. As children spend more and more of their time on the Internet, they are becoming increasingly prey to child abusers/pornographers. Child pornography begins with the production of pornographic materials such as porn images and videos. Offenders enter into correspondence with children through online instant messaging or chat rooms. They emotionally attract the prospective victim and befriend them. After establishing a steady relationship, they introduce children to pornography by providing images and videos that have sexually explicit material. Not only girls and boys but also infants are becoming victim to such offensive activities. Pornographers make use of poor children, disabled minors, and sometimes neighborhood children for sexual exploitation. Distribution of porn material is also a serious crime. The Internet has made the distribution of illegal material easy. Pornographers resort to newsgroups, Internet Relay Chat, web-based groups, email, webcams, and peer-to-peer technology to distribute pornographic material. Downloading of such images is also considered a crime.
  • 8. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3848                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited. 
  • 9. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3849                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Survey Source: http://www.missingkids.com/  Figure 44-1: The Second National Incidence Studies of Missing, Abducted, Runaway, and Thrown away Children Figure 44-2: The Second National Incidence Studies of Missing, Abducted, Runaway, and Thrown away Children
  • 10. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3850                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-3: Sex Crime Cases Survey Report
  • 11. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3851                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   People’s Motive behind Child Pornography It is observed that criminals involved in pornographic cases are unmarried, separated, divorced, or widowed. They become involved with child pornography due to various factors. These factors could range from mere moneymaking to sexual perversion. Children being the most vulnerable of the victims of sexual perversion, these offenders go for child pornography. They draw children into pornographic activities by:  Seduction  Coercion: They force children into sexual activities or threaten them with dire consequences  Payment: They offer monetary benefits to attract children  Solicitation: Request them for a sexual relationship Voyeurism is another motive behind child pornography. It includes people who derive sexual pleasure by secretly watching the sexual activities or others in the nude. Blackmailing is also a factor that leads some people to child pornography. The offenders lure or force children or teenagers into offensive activities and make videos and images of them. Later, they blackmail the victims or their parents by threatening to expose the images or videos. Offenders sell pornographic material to make easy money. They also build their own web sites that provide pornographic materials for money, such as downloading the pornographic images from their site.
  • 12. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3852                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   People Involved in Child Pornography People involved in child pornography, known as “pornographers”, are either directly or indirectly related to child abuse. It involves people who enter into online relationships with children. They attract victims for sexual activities or send the pornographic materials to children as part of the grooming process. They contact children using online messaging or a chatroom. This is considered as direct abuse of children. A person who physically abuses children is also considered a child pornographer. For such people, the main intention is to satisfy their sexual curiosity. They also make pornographic images or videos for their own satisfaction. Production of porn material is also a serious crime. A person who produces porn images or records the sexual activities of children is also considered a pornographer. A person who provides sources of child pornography is also included in such an offence. Such offences are indirect abuse of children. They may distribute pornographic materials through email, web cam, and in a chatroom. People who intentionally download pornographic material from the Internet and save it to their computer also fall into the category of pornographer. They may not have any intention to abuse and may not be related to other offenders; they download it for pleasure. Parents or guardians who allow their children to engage in pornographic activity are also considered offenders.
  • 13. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3853                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Role of Internet in Child Pornography The Internet is a fast communication vehicle providing a number of online services. This growing facility helps children and youngsters to learn. Yet, with the increase in access, there has been a rise in Internet crimes. The Internet plays an important role in child pornography cases. Through the Internet, it is easy to access a huge quantity of pornographic material. It provides complete anonymity and privacy. It reduces the cost of production and distribution of such material. The offender distributes the material easily with web services such as email, user groups, and webcams. An offender can create his own web site and upload the porn material, so that others can easily download it. Using an Internet facility such as a web cam, he can send real-time porn pictures or video. The most frequent source for distributing porn material is email. Offenders can send images or videos as attachments. Offenders can also use email for grooming or seduction purposes. Other methods of distributing child pornography through the Internet are as follows: Newsgroup: In a newsgroup, members may discuss their sexual interest in child and adult pornographic material Chatrooms: In chatrooms, offenders chat and share porn materials with each other. The Internet is the best and most inexpensive method for transferring porn materials. The most advantageous factor about the Internet is that the offenders can access pornographic material anytime and anywhere. The Internet enables them to send the images or videos in any format which can be stored easily in any digital devices such as mobile phones and PDAs.
  • 14. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3854                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Effects of Child Pornography on Children Child pornography affects children physically, socially, and psychologically. It causes physical injuries to the victims during molestation such as genital bruising and lacerations. In many cases, teenagers may be inflicted with negative effects on growing sexuality due to inappropriate early sexual experiences. Child pornography also gives rise to sexually transmitted diseases. Child pornographic victims also suffer from psychological traumas such as depression, emptiness, and schizophrenia. Girl victims may suffer from higher rates of nightmares, back pain, headaches, pelvic pain, and other similar symptoms in her adult age. Pornography may cause sexual addiction that result in prostitution teenage pregnancy and sexually transmitted diseases. A victim may also lose his or her mental balance and become suicidal.
  • 15. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3855                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Measures to Prevent Dissemination of Child Pornography  Computer Industry Self Regulation (Role of ISP): An ISP (Internet Service Provider) plays an important role in reducing the problems of child pornography. If an ISP helps to procure pornographic material over the Internet, then it becomes easy for the police to apprehend the pornographer. Yet in some cases, an ISP stores and gives access to child pornography sites for commercial purposes. Therefore, it is necessary for an ISP to take some self-regulatory actions to reduce the problem of child pornography. Some of these strategies include: o Block the illegal sites: It is important that various ISP associations should come together and make a decision to block the illegal sites. If any member opens it unknowingly, then he should be told to remove that site. o Use the filters for browsers and search engines for safe search: ISPs can use filters on the browsers to help block sites containing words related to pornography and use filters on the search engines so that it will not search the illegal sites or images. o Establish compliant sites: Some of the ISP associations should open the complaint site or hot sites that will help people to complain against pornography. Such an association may directly deal with the police or any other authority.  Legislative Regulation: Create rules and regulations against child pornography to minimize the problem of pornography. Make it mandatory for the ISP to inform the police about illegal sites. Inform ISPs to verify the identities of the people who open the Internet. If they find anyone who illegally uses others’ accounts, they should inform the police. Confirm the age of the account holder and restrict children from opening an account without an adult’s supervision. Inform an advertiser not to advertise such illegal sites. Inform the credit card companies not to pay money to anyone without confirming it. If they find any transaction with a pornographer, block the credit card transaction of that person.  Citizen’s Committee:
  • 16. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3856                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  A Citizen’s committee may also help in controlling child pornography. They may establish an organization, which creates awareness among the public about such issues and provides them with a forum to voice their complaints about such activities. They may provide information to parents and teachers through their sites or publications about the problem of child pornography and how to tackle them.  Parental Strategies: Parents play an important role in protecting children from child pornography. They should restrict their children from accessing such materials. They should use filtering software and search engines to protect their children from any indecent material.  Law Enforcement Responses (Role of Police): Police play a crucial role in investigating the pornographic sites. The police may use new computer forensics tools and techniques to investigate such sites. They may scan the Internet service and restrict the ISP to remove illegal sites. They may perform sting operations to investigate the offenders. They may make contact through chatrooms, newsgroups, or via P2P with offenders by disguising themselves as teenagers to investigate the offenders. Police may also use the honey-trap sites to find offenders. These sites contain pornographic material, but they note the IP address or the credit card number of a criminal who tries to download the porn material from these sites.
  • 17. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3857                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Challenges in Controlling Child Pornography  Large Internet traffic: The Internet is the network of networks; it provides a fast and easy way for disseminating information. In order to keep a check on the sites, if you block the way to open any site, then there are many alternatives available to reach the same target. In a similar way, if you block any website or newsgroup, then there are a number of sites and groups which replace the same. Due to this large traffic over the Internet, it is difficult to catch the person who visits such sites.  Unclear jurisdiction due to anonymity of offenders: The Internet is the best tool for communication all over the world. So, criminals from any corner of the world can send or use pornographic material. Laws differ from country to country so it adds to the difficulty of tracking the offender. For example, in the United States a child is defined as those who are under 18 years of age, while in Australia it is defined as those who are under 16years of age. It may happen that an offender produces the porn material in one country and distributes it in another country. This causes a problem about who will investigate and under which country’s law, the offender should be arrested.  Lack of laws and regulation: Another challenge to check child pornography is the lack of laws and regulation in different countries. In most countries, there are no laws against child pornography, so offenders can easily produce the porn material in such countries and distribute it through the Internet all over the world.  Sophistication and the use of Internet technology by offenders: Due to sophisticated Internet technologies, it is difficult to track the offender. Offenders use various techniques such as email, webcams, chatrooms, and newsgroups to distribute the material. With the Internet, it is easy to access a number of pornographic materials which reduces the cost of production and distribution of such material. It provides complete anonymity and privacy that causes a problem during investigation.
  • 18. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3858                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Precautions before Investigating Child Pornography Cases The investigators are required to take the precautions or the guidelines for evaluation and solving the case. The precautions to be taken before investigating child pornography cases are as follows:  Ensure the authorization to investigate the child pornography cases  Familiarize with the local laws that are related to the child pornography  Document each step of the investigation in detail  Take assistance from two authorized persons
  • 19. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3859                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Steps for Investigating Child Pornography Investigators follow certain steps for investigating child pornography cases, which are as follows: 1. Search and seize all computers and media devices 2. Check the authenticated login sessions 3. Search the hard disk for pornographic material 4. Recover deleted files and folders 5. Check metadata of files and folders related to pornography 6. Check and recover browser information: a. Browsing history b. Download history c. Saved form and search history d. Cache e. Cookies f. Saved passwords g. Authenticated sessions 7. Check ISP logs
  • 20. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3860                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 1: Search and Seize All Computers and Media Devices The user can save the information on the system or media devices such as USBs, CDs, and DVDs. Follow these steps to search the files on these devices for evidence:  Search the files and folders of the suspect’s system for pornographic material  Look for the pornographic material on media devices such as USBs, CDs and DVDs, and pen drives  Document and seize the collected evidence carefully
  • 21. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3861                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 2: Check Authenticated Login Sessions Check sessions through which the user can log in to the system either through an administrator account, standard account, or via guest account with an authentication (password):  Check the login information as user accounts are password protected  Check under which account the pornographic material was accessed  Check the user, who accessed the porn material, i.e., is he an authenticated user, a guest, or an administrator? Figure 44-4: User Login
  • 22. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3862                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 3: Search the Hard Disk for Pornographic Material Search the hard disk of the suspect’s system for pornographic material.  Hard disk search includes searching in: o Files and folders o Applications o Temporary Internet files o Recycle Bin Tools such as SurfRecon scan the system for pornographic material (both on hard disk as well as browser cache).
  • 23. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3863                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 4: Recover Deleted Files and Folders The user may delete the pornographic material from the desktop, hard disk, and even from the Recycle Bin. To recover files and folders, even though they are deleted from the Recycle Bin:  Use tools such as File Recover, Data recovery wizards, PC Inspector File Recovery, etc. Figure 44-5: Data Recovery Wizards (Source: https://www.regnow.com/)
  • 24. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3864                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-6: PC Inspector File Recovery (Source: http://www.raymond.cc/)
  • 25. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3865                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 5: Check Metadata of Files and Folders Related to Pornography Metadata is the information of when the file was created, modified, or deleted. File/folder creation, modification, or deletion allows the investigator to know when the material was accessed.  Check the metadata of files and folders that consist of pornographic material  Check the metadata of files and folders from the Recycle Bin (as most users tend to delete the files from the desktop or drives after accessing them) Figure 44-7: Folder Properties Window
  • 26. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3866                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 6: Check and Recover the Browser Information It is easy to check the browsed information with the help of browsers such as Internet Explorer, Mozilla Firefox, etc.  Check and recover browser, information which includes: o Browsing history, save form, and search history o Download history o Cache o Cookies o Offline website data o Saved passwords o Authenticated sessions
  • 27. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3867                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Browsing History, Save Form, and Search History To access browsing history, open Internet browser and press Ctrl+H to open the browsing history. The steps to check the browsing history, save form, and search history are as follows:  Check the links that were accessed to trace the child pornography link  Search for the suspected link through the search bar Browsers offer the feature of URL suggestion as the user types the letters in the URL tab (provided the URLs were browsed on the system, on the particular browser, previously). Figure 44-8: Browsing History
  • 28. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3868                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-9: History Window
  • 29. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3869                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Download History Download history is one of the features of Internet browsers, where downloaded information is saved. To view the download history:  Select Tools and click Download; or  Just press Ctrl+J (shortcut to access download history information) Though users have a tendency to clean up the downloaded information, if not cleaned up, it provides detailed information of the files that are downloaded and can be a source of evidence. Figure 44-10: File Downloading Window
  • 30. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3870                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Cache A cache is a collection of web page copies stored on the system’s hard disk or in its volatile memory, i.e., random-access memory (RAM). To change cache settings, open the browser. Select Tools. Open the Advanced panel, and click the Network tab. Enter a number in the Use up to field to specify the size of the cache. A user will sometimes select the Clear Now option for security purposes, in order to delete the cache information. Steps to get information from the cache are as follows:  Check the browser information in the cache  If the browser cache information is deleted, recover the information using tools such as INDEX.DAT file viewer Figure 44-11: Cache Window
  • 31. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3871                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Cookies A cookie is a piece of information that is stored on the system by a web browser. Steps to be followed to check the cookies are as follows:  Check the cookie information to determine the websites the user has accessed  To access cookies, select Tools. Click options→Privacy→Show Cookies Figure 44-12: Cookie Window
  • 32. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3872                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-13: Window Showing Cookies
  • 33. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3873                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Saved Passwords A password is the secret word or string used for authentication purposes. New versions of browsers provide the ability to store passwords of visited websites. Passwords are remembered and saved by the browser, depending upon the user’s request, and this information is stored in the Remember Passwords section of the browser tools. Investigators need to check this information for as it provides URLs of sites, usernames, as well passwords. To check for those passwords and access the links to find evidence:  Go to Tools→Options→Security→Show Passwords Figure 44-14: Password Window
  • 34. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3874                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Authenticated Sessions An authenticated session is the use of the correct username and password for a particular link. To check for authenticated sessions, follow these steps:  Check whether the user logged in to website with authentication  Check for the number of attempts made by the user Figure 44-15: Login Window
  • 35. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3875                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Step 7: Check ISP Logs ISP logs are all Internet activity information that is saved by Internet service providers. They are logs of the web pages that the user has visited. These logs provide data access information (Internet access) of the users to whom a particular ISP provider provides service. This is a difficult way to extract information because:  ISPs do not usually show the logs, to maintain user privacy  Though ISPs show the logs, it is difficult to extract required information from the huge amount of logs The ISP can provide help; for instance, suppose the police raided the owner a child pornography site. It is easy to look up to the IP addresses of the users who have visited the site and once the IP addresses are found, the police can get the details of the users with the ISP’s help.
  • 36. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3876                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Sources of Digital Evidence Following are some of the sources of evidence that play an important role during investigation:  Offender’s computer: The offender’s computer is the main source of evidence during the investigation of child pornography cases. When an offender downloads any image, it saves it to the hard drive, which is important evidence for the investigation. There are many materials, such as log files, which show the detailed information about who logged on to the computer and when. The web browser’s history shows the online activities of the criminal. Email and chat logs extract an online communication record of the offender.  Hand-held devices: Offenders may also use handheld devices for child pornography. Devices such as PDAs and mobile phones with digital cameras can be used for recording offensive pictures and transmitting digital images. Therefore, these devices are also important in investigation.  Servers: Servers may also play an important role in investigation. For example, an ISP authentication server records the information of the customer with the IP address that can be used for identifying the user. FTP and web servers are generally used for uploading and downloading the files, but it also records the details about which file to be uploaded or downloaded and also monitors the IP address of the user.
  • 37. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3877                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Citizens’ Responsibility Against Pornography Possessing, transmitting, or distributing the child porn images are illegal acts. More than being a crime, it is inhuman to harass a child for doing the act, so as a citizen it is our responsibility to act against it thus eradicating it completely for a better society. Following are the guidelines that citizens can use in order to eradicate pornography:  Protest against child porn websites  Provide information about the impact of pornography on children  Take initiatives to cease child porn on web  Report against the site that is distributing child porn to government officials  Report to anti- child porn organizations about the site o Report is anonymous and 24*7 online, so no problem can be created after posting the report  Block credit card transactions that are requested for child pornography  Ask ISPs to block the content or URL o Example: World's largest Internet Service Providers (ISPs) Verizon, Time Warner Cable, and Sprint blocked access to child porn material, available on the Internet.
  • 38. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3878                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Guidelines to Avoid Child Pornography on the Web There are many child pornographic sites prevailing on the Internet. Following are the guidelines to avoid child pornography on the web:  Use Internet filters that filter unwanted content on the system: Internet filters are the software that is installed on the system in order to avoid unwanted content such as child porn sites, gambling sites, etc.  Make use of search engines that have in-built filters: It is necessary to make use of search engines that have in-built filters as they help in safe searching and filtered results. Example: Google safe search filtering  Avoid guesswork on URLs: Most of the users have a habit of making a guess work on URLs to get the information, but this at times moves the user to pornographic sites.  Use proper and appropriate keywords during research: Use appropriate keywords while researching, otherwise this can cause problems  Avoid browsing questionable URLs or banners that take you to unwelcomed sites
  • 39. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3879                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Guidelines for Parents to Protect Children from Pornography Source: http://www.crime-research.org/ Initial teachers for children are their parents, so it is necessary that they guide their children to make good decisions. Following are the guidelines for parents to reduce the risk of their children being taken advantage of:  Create a friendly relationship with your child: If the child is afraid of his/her parents, it is unlikely that he/she will ask them for help. So it is necessary and the parents’ responsibility to have a good relationship with their children.  Guide your child while browsing: Browsing a huge network like the Internet is at times dangerous to your child, so parents can help by guiding their children and teaching them safe ways to search.  Install filtering software that blocks porn sites: There are various Internet filters available that filter websites that the user (parent) wishes to block on the system.  Promote the use of search engines with safe search: Promote the use of search engines with safe search (Google offers safe search) in order to stay away from inappropriate sites.
  • 40. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3880                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Make children aware of child pornography prevailing on Internet: Explain to your child in detail about child pornography that is prevalent on the Internet. Even familiarize them with laws and offenses they could face due to its promotion.  Assist them with various anti-child pornography organizations: Though software is installed, there is still a chance of pornography prevailing on the system. It is the duty of parents to inform kids about whom to approach and how to report that particular illegal site, thus helping to eradicate pornography.  Use software: Use software that monitors and records all websites visited by your child, captures and logs their instant messenger chats, etc. If parents find that their children have been looking at pornography, they should explain to the child that he or she has committed a crime, and make sure that the child understands the law.
  • 41. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3881                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.    Tools to Protect Children from Pornography
  • 42. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3882                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Reveal Source: http://www.antichildporn.org/ The concept behind this software is to help bridge the technology gap between the knowledgeable child who is on the Internet, yet lacks the life skills needed to know what is and is not dangerous, and parents who may be a bit behind in understanding this technology and what their child may be getting into. Reveal, although not intended as a police forensic tool, it thought to be of some utility in providing a quick means for evaluating large amounts of computer data/files. In the advanced section of Reveal, the ability to create a customized dictionary will be helpful in some types of data reviews. The attached program is a self-extracting and self-installing program which creates a directory (default) on your "C" drive in "C:ProgramsReveal". It also creates a couple of sub directories under this directory as well as putting an icon on the Desktop. It also comes with an un-install program and is thought to be free of any code, which will affect the way you have your computer setup. Features:  Reveal works by searching all files found and comparing each word inside a file against special dictionaries of words commonly used by pedophiles, child pornographers, cultists, occultists, drug pushers, and purveyors of hate and violence  It also searches for images, video, and audio files and provides a quick and easy means for you to review these files for content which may be objectionable
  • 43. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3883                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   iProtectYou Source: ‘http://www.softforyou.com/ iProtectYou is an Internet filtering and monitoring program, which enables you to control when the Internet can be used and which websites can be accessed through your computer. iProtectYou is designed for parents who are concerned about the possible detrimental effects of the Internet on the development of their children. iProtectYou is also designed for schools and libraries, so that they can control what is being viewed in public spaces, and schools, so that children do not have free access to undesirable sites on the Internet. The porn blocker iProtectYou gives parents several methods for monitoring and controlling their children from accessing child pornography over the Internet:  Porn block by word filtering: You can prevent access to websites containing vulgar or explicit words or phrases. These settings can changed be at any time at your discretion. In order to increase the effectiveness of the program, you have the option to use words from a pre-made list, or you can define your own.  Porn block by URL (address) filtering: You can prevent access to individual websites based on their URL (address). iProtectYou gives you complete control over this filter's settings. You can also choose to block web sites using iProtectYou's built-in list of bad sites.  Porn block by using the bad site list: This comprehensive and ever-changing list is made up of over thousands of websites on the Internet that contain undesirable content such as pornography. If the parent wants to block a particular website not found in the list, they can do this by using the URL (Address) filtering. Features:  Restrict your family members from visiting websites and news groups that may contain pernicious information  Block emails, chat sessions, instant messages, and P2P connections if they contain inappropriate words  Prevent your private information (credit card number for example) from being sent to the Internet  Set a schedule to specify days and times when online activity is allowed  Limit Internet Traffic to a specified amount of data that can be sent or received per user / per day
  • 44. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3884                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Control the list of programs that can have access to the Internet  Get notification emails with full descriptions of blocked operations and an attached screen-shot of your kids' computer to control them remotely  Get detailed information about Internet resources used by your computer  Set different levels of restrictions for every member of your family depending on their maturity, interest, habits, and parental control needs Figure 44-16: iProtectYou Pro control pannel   Figure 44-17: iProtectYou Users and Groups screenshot
  • 45. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3885                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.    Figure 44-18: iProtectYou setting screenshot
  • 46. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3886                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   WUPC Web Control for Parents 4 Source: http://www.download.com/ WUPC Web Control for Parents 4 is an easy-to-use parental control tool, developed specially to protect children from forbidden materials such as pornography, online gambling, and online drug information. It helps to prevent kids from accessing user-specified websites. It has a very clear interface, where you can review websites that were visited by your child and lock all forbidden materials with two clicks. Figure 44-19: WUPC Web Control for Parents 4
  • 47. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3887                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   BrowseControl Source: http://www.browsecontrol.com/ BrowseControl controls access to the Internet and blocks applications on Windows operating systems. It can also be used to block access to floppy disks, CD drives, and USB drives. It helps the user to restrict inappropriate surfing and enforce Internet usage policies. Following are the features of BrowseControl:  It can completely block the Internet  Allow access to only websites the user specifies  Deny web access to websites the user specifies  Schedule Internet ON at only certain times of the day  It consists of an Application Blocker that allows the user to specify software applications he or she wants to block the user from running  It can block any number of protocols and the user can even specify any additional ports
  • 48. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3888                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-20: BrowseControl
  • 49. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3889                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   ChatGuard Source: http://www.chatprotection.com/ ChatGuard is the software developed for protection from online sexual solicitation It monitors:  Internet o Chat sessions, URLs, communications, emails, and so on  Games and audio  Desktop enhancements  Business and finance Figure 44-21: ChatGuard session logs screenshot
  • 50. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3890                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-22: ChatGuard version update screenshot Figure 44-23: ChatGuard parent library screenshot
  • 51. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3891                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Child Exploitation Tracking System (CETS) Source: http://www.microsoft.com/ CETS was developed jointly by Microsoft Canada, the Royal Canadian Mounted Police (RCMP), and the Toronto Police Service. CETS, a software solution built using open industry standards, assists law- enforcement officials in their work to stop the exploitation of children on the Internet by enabling effective collaboration and providing a set of advanced software tools and technologies for use by investigators. The tracking system will serve as a repository of information and will also be used as an investigative tool. The solution enables police agencies to capture, share, and search information from the point of detection through the investigative phase, arrest, and offender management. CETS is a great tool for information management; CETS puts together the work of hundreds of police agencies in one place. The tool can establish links from the different agencies that police wouldn't necessarily make. Features:  CETS enables agencies to avoid duplicate efforts. Sharing information over a secure network, officers can match up investigations that reference the same people or online identities  CETS links and connects criminal behavior online that is difficult for the human eye to see  Using CETS, police agencies can manage and analyze huge volumes of information in powerful new ways, such as cross-referencing obscure data relationships and using social-network analysis to identify communities of offenders 
  • 52. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3892                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited. 
  • 53. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3893                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited. 
  • 54. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3894                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited. 
  • 55. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3895                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Reports on Child Pornography Source: http://www.icmec.org/ The following tables demonstrate the survey of various countries against child pornography. These tables show that some countries such as Afghanistan, Albania, Bangladesh, India, Pakistan, Thailand, Singapore, and Egypt do not have any law against child pornography, while countries such as Argentina, Austria, Belgium, Brazil, Canada, France, Germany, Hong Kong, Italy, Japan, New Zealand, Russia, South Africa, United Kingdom and United States have well defined laws against child pornography.
  • 56. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3896                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   
  • 57. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3897                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 58. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3898                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.     
  • 59. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3899                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 60. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3900                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 61. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3901                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.     
  • 62. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3902                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.     
  • 63. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3903                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 64. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3904                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 65. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3905                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 66. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3906                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.    Figure 44-24: Child Pornography Reports
  • 67. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3907                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.    Laws Against Child Pornography
  • 68. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3908                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.       
  • 69. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3909                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   U.S. Laws Against Child Pornography Source: http://www.missingkids.com/ 18 U.S.C. 1466A – OBSCENE VISUAL REPRESENTATIONS OF THE SEXUAL ABUSE OF CHILDREN It is forbidden to knowingly produce, distribute, receive, or possess with the intent to distribute, a visual depiction of any kind, including a drawing, cartoon, sculpture, or painting, that:  depicts a minor engaging in sexually explicit conduct and is obscene, or  depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious literary, artistic, political, or scientific value. Attempts or conspiracies to knowingly produce, distribute, receive, or possess with the intent to distribute, a visual depiction of any kind, including a drawing, cartoon, sculpture, or painting, that:  depicts a minor engaging in sexually explicit conduct and is obscene, or  depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious literary, artistic, political, or scientific value, are also forbidden. It is forbidden to knowingly possess a visual depiction of any kind, including a drawing, cartoon, sculpture, or painting, that:  depicts a minor engaging in sexually explicit conduct and is obscene, or  depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious literary, artistic, political, or scientific value, If one of the...circumstances [noted below] is present:  any communication involved in or made in furtherance of the offense is communicated or transported by the mail, or in interstate or foreign commerce by any means, including by computer, or any means or instrumentality of interstate or foreign commerce is otherwise used in committing or in furtherance of the commission of the offense;  any communication involved in or made in furtherance of the offense contemplates the transmission or transportation of a visual depiction by the mail, or in interstate or foreign commerce by any means, including by computer;  any person travels or is transported in interstate or foreign commerce in the course of the commission or in furtherance of the commission of the offense;  any visual depiction involved in the offense has been mailed, or has been shipped or transported in interstate or foreign commerce by any means, including by computer, or was produced using materials that have been mailed, or that have been shipped or transported in interstate or foreign commerce by any means, including by computer; or  The offense is committed in the special maritime and territorial jurisdiction of the United States or in any territory or possession of the United States. An attempt to knowingly possess such a visual depiction is also forbidden under the same circumstances Source: http://www.law.cornell.edu/ § 2251. Sexual exploitation of children
  • 70. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3910                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  (a) Any person who employs, uses, persuades, induces, entices, or coerces any minor to engage in, or who has a minor assist any other person to engage in, or who transports any minor in interstate or foreign commerce, or in any Territory or Possession of the United States, with the intent that such minor engage in, any sexually explicit conduct for the purpose of producing any visual depiction of such conduct, shall be punished as provided under subsection (e), if such person knows or has reason to know that such visual depiction will be transported in interstate or foreign commerce or mailed, if that visual depiction was produced using materials that have been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer, or if such visual depiction has actually been transported in interstate or foreign commerce or mailed. (b) Any parent, legal guardian, or person having custody or control of a minor who knowingly permits such minor to engage in, or to assist any other person to engage in, sexually explicit conduct for the purpose of producing any visual depiction of such conduct shall be punished as provided under subsection (e) of this section, if such parent, legal guardian, or person knows or has reason to know that such visual depiction will be transported in interstate or foreign commerce or mailed, if that visual depiction was produced using materials that have been mailed, shipped, or transported in interstate or foreign commerce by any means, including by computer, or if such visual depiction has actually been transported in interstate or foreign commerce or mailed. (c) (1) Any person who, in a circumstance described in paragraph (2), employs, uses, persuades, induces, entices, or coerces any minor to engage in, or who has a minor assist any other person to engage in, any sexually explicit conduct outside of the United States, its territories or possessions, for the purpose of producing any visual depiction of such conduct, shall be punished as provided under subsection (e). (2) The circumstance referred to in paragraph (1) is that— (A) The person intends such visual depiction to be transported to the United States, its territories or possessions, by any means, including by computer or mail; or (B) The person transports such visual depiction to the United States, its territories or possessions, by any means, including by computer or mail. (d) (1)Any person, who, in a circumstance described in paragraph (2), knowingly makes, prints, or publishes, or causes to be made, printed, or published, any notice or advertisement seeking or offering— (A) to receive, exchange, buy, produce, display, distribute, or reproduce, any visual depiction, if the production of such visual depiction involves the use of a minor engaging in sexually explicit conduct and such visual depiction is of such conduct; or (B) Participation in any act of sexually explicit conduct by or with any minor for the purpose of producing a visual depiction of such conduct; shall be punished as provided under subsection (e). (2) The circumstance referred to in paragraph (1) is that— (A) such person knows or has reason to know that such notice or advertisement will be transported in interstate or foreign commerce by any means including by computer or mailed; or (B) Such notice or advertisement is transported in interstate or foreign commerce by any means including by computer or mailed. (e) Any individual who violates, or attempts or conspires to violate, this section shall be fined under this title and imprisoned not less than 15 years nor more than 30 years, but if such person has one prior conviction under this chapter, chapter 71, chapter 109A, or chapter 117, or under section 920 of title 10 (article 120 of the Uniform Code of Military Justice), or under the laws of any State relating to the sexual exploitation of children, such person shall be fined under this title and imprisoned for not less than 25 years nor more than 50 years, but if such person has 2 or more prior convictions under this chapter, chapter 71, chapter 109A, or chapter 117, or under section 920 of title 10 (article 120 of the Uniform Code
  • 71. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3911                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  of Military Justice), or under the laws of any State relating to the sexual exploitation of children, such person shall be fined under this title and imprisoned not less than 35 years nor more than life. Any organization that violates, or attempts or conspires to violate, this section shall be fined under this title. Whoever, in the course of an offense under this section, engages in conduct that results in the death of a person shall be punished by death or imprisoned for any term of years or for life. § 2252. Certain activities relating to material involving the sexual exploitation of minors (a) Any person who— (1) Knowingly transports or ships in interstate or foreign commerce by any means including by computer or mails, any visual depiction, if— (A) The producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (B) Such visual depiction is of such conduct; (2) knowingly receives, or distributes, any visual depiction that has been mailed, or has been shipped or transported in interstate or foreign commerce, or which contains materials which have been mailed or so shipped or transported, by any means including by computer, or knowingly reproduces any visual depiction for distribution in interstate or foreign commerce or through the mails, if— (A) The producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (B) Such visual depiction is of such conduct; (3) Either— (A) in the special maritime and territorial jurisdiction of the United States, or on any land or building owned by, leased to, or otherwise used by or under the control of the Government of the United States, or in the Indian country as defined in section 1151 of this title, knowingly sells or possesses with intent to sell any visual depiction; or (B) knowingly sells or possesses with intent to sell any visual depiction that has been mailed, or has been shipped or transported in interstate or foreign commerce, or which was produced using materials which have been mailed or so shipped or transported, by any means, including by computer, if— (i) The producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (ii) Such visual depiction is of such conduct; or (4) Either— (A) in the special maritime and territorial jurisdiction of the United States, or on any land or building owned by, leased to, or otherwise used by or under the control of the Government of the United States, or in the Indian country as defined in section 1151 of this title, knowingly possesses 1 or more books, magazines, periodicals, films, video tapes, or other matter which contain any visual depiction; or (B) knowingly possesses 1 or more books, magazines, periodicals, films, video tapes, or other matter which contain any visual depiction that has been mailed, or has been shipped or transported in interstate or foreign commerce, or which was produced using materials which have been mailed or so shipped or transported, by any means including by computer, if— (i) The producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (ii) Such visual depiction is of such conduct; shall be punished as provided in subsection (b) of this section. (b)
  • 72. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3912                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  (1) Whoever violates, or attempts or conspires to violate, paragraphs [1] (1), (2), or (3) of subsection (a) shall be fined under this title and imprisoned not less than 5 years and not more than 20 years, but if such person has a prior conviction under this chapter, chapter 71, chapter 109A, or chapter 117, or under section 920 of title 10 (article 120 of the Uniform Code of Military Justice), or under the laws of any State relating to aggravated sexual abuse, sexual abuse, or abusive sexual conduct involving a minor or ward, or the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, such person shall be fined under this title and imprisoned for not less than 15 years nor more than 40 years. (2) Whoever violates, or attempts or conspires to violate, paragraph (4) of subsection (a) shall be fined under this title or imprisoned not more than 10 years, or both, but if such person has a prior conviction under this chapter, chapter 71, chapter 109A, or chapter 117, or under section 920 of title 10 (article 120 of the Uniform Code of Military Justice), or under the laws of any State relating to aggravated sexual abuse, sexual abuse, or abusive sexual conduct involving a minor or ward, or the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, such person shall be fined under this title and imprisoned for not less than 10 years nor more than 20 years.
  • 73. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3913                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   U.S. Laws Against Child Pornography Source: http://www4.law.cornell.edu/ 42 U.S.C. 13032 – Reporting of child pornography by electronic communication service providers 1. Duty of report: Whoever, while engaged in providing an electronic communication service or a remote computing service to the public, through a facility or means of interstate or foreign commerce, obtains knowledge of facts or circumstances from which a violation of section 2251, 2251A, 2252, 2252A, 2252B, or 2260 of title 18, involving child pornography (as defined in section 2256 of that title), or a violation of section 1466A of that title, is apparent, shall, as soon as reasonably possible, make a report of such facts or circumstances to the Cyber Tip Line at the National Center for Missing and Exploited Children (NCMEC), which shall forward that report to a law enforcement agency or agencies designated by the Attorney General. 2. Designation of agencies: Not later than 180 days after October 30, 1998, the Attorney General shall designate the law enforcement agency or agencies to which a report shall be forwarded under paragraph (1) 3. In addition to forwarding such reports to those agencies designated in subsection (b)(2) of this section, the National Center for Missing and Exploited Children is authorized to forward any such report to an appropriate official of a state or subdivision of a state for the purpose of enforcing state criminal law. 4. Failure to report: A provider of electronic communication services or remote computing services described in paragraph (1) who knowingly and willfully fails to make a report under that paragraph shall be fined: a. in the case of an initial failure to make a report, not more than $50,000; and b. in the case of any second or subsequent failure to make a report, not more than $100,000 
  • 74. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3914                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Australia Laws Against Child Pornography Source: http://www.austlii.edu.au/ 474.19 Using a carriage service for child pornography material (1) A person is guilty of an offence if: (a) The person: (i) Uses a carriage service to access material; or (ii) Uses a carriage service to cause material to be transmitted to the person; or (iii) Uses a carriage service to transmit material; or (iv) Uses a carriage service to make material available; or (v) Uses a carriage service to publish or otherwise distribute material; and (b) The material is child pornography material. Penalty: Imprisonment for 10 years.
  • 75. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3915                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  (2) To avoid doubt, the following are the fault elements for the physical elements of an offence against subsection (1): (a) Intention is the fault element for the conduct referred to in paragraph (1) (a); (b) Recklessness is the fault element for the circumstances referred to in paragraph (1)(b). (3) As well as the general defenses provided for in Part 2.3, defenses are provided for under section 474.21 in relation to this section. 474.20 Possessing, controlling, producing, supplying or obtaining child pornography material for use through a carriage service (1) A person is guilty of an offence if: (a) The person: (i) Has possession or control of material; or (ii) Produces, supplies or obtains material; and (b) The material is child pornography material; and (c) The person has that possession or control, or engages in that production, supply or obtaining, with the intention that the material be used: (i) By that person; or (ii) By another person; In committing an offence against section 474.19 (using a carriage service for child pornography material). Penalty: Imprisonment for 10 years.
  • 76. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3916                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Austria Laws Against Child Pornography Source: http://www.interpol.org/ § 207a - Pornographic depictions of minors (1) Anyone who 1. Produces or 2. Imports, transports or exports for the purpose of dissemination or 3. offers, procures, transfers, presents or makes available in any other manner to another person a pornographic depiction of a minor (under paragraph 4) will be sentenced to up to three years' imprisonment. (2) Anyone who commits the offence for financial gain will be sentenced to six months' to five years' imprisonment. Anyone who commits the offence as a member of a criminal organization, or in such a way that the minor sustains particularly grievous harm, will be sentenced to 1-10 years' imprisonment; anyone who produces a pornographic depiction of a minor (under paragraph 4) using severe violence or who, in producing such pornographic depiction, endangers the life of the depicted minor either intentionally or as a result of gross negligence, will also be punished. (3) Anyone who obtains, or is in possession of, a pornographic depiction of a minor over 14 years of age (under paragraph 4, subparagraphs 3 and 4) will be sentenced to up to one year's imprisonment. Anyone who obtains, or is in possession of, a pornographic depiction of a minor (under paragraph 4) will be sentenced to up to two years' imprisonment. (4) Pornographic depictions of minors are: 1. Realistic depictions of a sexual act performed on a minor under 14 years of age or by such minor on himself, on another person or with an animal, 2. realistic depictions of an event performed with a minor under 14 years of age, examination of which creates the impression, according to the circumstances of the case, that it involves a sexual act performed on such minor or by the minor on himself, on another person or with an animal, 3. Realistic depictions a. of a sexual act within the meaning of subparagraph 1 or of an event within the meaning of subparagraph 2, though with minors over 14 years of age, or
  • 77. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3917                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  b. of the genitals or pubic region of minors, provided such depictions are distorted in a sensational manner, focus on the genitals or pubic region or are devoid of other manifestations of life in order to sexually to arouse the observer, 4. pictorial representations, an examination of which - following alteration of a depiction or without use of such alteration - creates the impression, according to the circumstances of the case, that it is a depiction within the meaning of subparagraphs 1-3. (5) In accordance with paragraph 1, subparagraph 1, and paragraph 3, anyone who: 1. produces, or is in possession of, a pornographic depiction of a minor over 14 years of age with the latter's consent or for the latter's own private use, or 2. Produces, or is in possession of, a pornographic depiction of a minor over 14 years of age, within the meaning of paragraph 4, subparagraph 4, for his own private use, provided no risk of dissemination of the depiction is associated with the act, shall not be punished.
  • 78. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3918                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Belgium Laws Against Child Pornography Source: http://www.childfocus-net-alert.be/ “Art.383bis (*) § 1. Notwithstanding the application of Articles 379 and 380, whosoever has displayed, sold, rented, distributed or handed out emblems, objects, films, photos, slides or other visual media representing sexual positions or acts of a pornographic nature, involving or representing minors or has handed to a transport or distribution agent, manufactured or held, imported or caused to be imported such objects with a view to commerce or distribution shall be punished by penal servitude and a fine of five hundred to ten thousand francs. § 2. Whosoever has knowingly possessed emblems, objects, films, photos, slides or other visual media as referred to under § 1 shall be punished by imprisonment for a month to a year and a fine of hundred to a thousand francs. § 3. The offence referred to under § 1 shall be punished by forced labor for ten to fifteen years and a fine of five hundred to fifty thousand francs if it constitutes an act of participation in the main or accessory activity of an association, whether or not the culprit holds the position of manager.
  • 79. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3919                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  § 4. The special confiscation provided for in Article 42, 1°, may be applied to the offences referred to in § 1 and § 2, even when the objects that it concern, are not the property of the convicted person. § 5. Articles 382 and 389 are applicable to the offences referred to in § 1 and § 3. " "Art.380ter (*) § 1. Shall be punished by imprisonment for two months to two years and a fine of two hundred francs to two thousand francs whosoever and by whatever means publishes, distributes or disseminates or causes to be published, distributed or disseminated publicity, directly or indirectly, even in concealing its nature through artifices of language, for an offer of services of a sexual nature with a direct or indirect profit-making objective, when the said publicity is specifically addressed to minors or when it refers to services proposed either by minors or by persons claimed to be so. The sentence shall be imprisonment for three months to three years and a fine of three hundred to three thousand francs when the publicity referred to in Article 1 has the objective or effect, direct or indirect, of facilitating the prostitution or debauchery of a minor or his/her exploitation for sexual purposes. § 2. Shall be punished by imprisonment for one month to a year and a fine of a hundred to a thousand francs whosoever by whatever means publishes, distributes or disseminates or causes to be published, distributed or disseminated publicity, directly or indirectly, even in concealing its nature through artifices of language, for an offer of services of a sexual nature with a direct or indirect profit-making objective, when these services are offered through a telecommunications medium. § 3. In cases not covered by § 1 and § 2, shall be punished by imprisonment for one month to a year and a fine of a hundred to a thousand francs whosoever by whatever means of publicity, even in concealing its nature through artifices of language, makes it known that he indulges in prostitution, facilitates the prostitution of others or wishes to enter into a relationship with a person indulging in debauchery. Shall be punished by the same sentences whosoever by means of publicity encourages, through the allusion made therein, the exploitation of minors or adults for sexual purposes or uses such publicity on the occasion of an offer of services ."
  • 80. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3920                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Cyprus Laws Against Child Pornography Source: http://www.interpol.org/ The age in child pornography legislation is 18 years (Criminal Code chapter 154, Article 154) The Convention on Cybercrime, law 22(III)/2004 Title 3 – Content-related offences Article 9 – Offences related to child pornography 1. Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right the following conduct a. producing child pornography for the purpose of its distribution through a computer system; b. offering or making available child pornography through a computer system; c. distributing or transmitting child pornography through a computer system; d. procuring child pornography through a computer system for oneself or for another person; e. possessing child pornography in a computer system or on a computer data storage medium. 2. For the purpose of paragraph 1 above, the term 'child pornography' shall include pornographic material that visually depicts: a. a minor engaged in sexually explicit conduct; b. a person appearing to be a minor engaged in sexually explicit conduct; c. realistic images representing a minor engaged in sexually explicit conduct. 3. For the purpose of paragraph 2 above, the term 'minor' shall include all persons under 18 years of age. A Party may, however, require a lower age limit, which shall be not less than 16 years. 4. Each Party may reserve the right not to apply, in whole or in part, paragraphs 1. sub-paragraphs d and e, and 2. sub-paragraphs b and c. Combating Trafficking in Human Beings and Sexual Abuse of Minors Law 3(1)/2000 Trading in pornography material - Law 3(1)/2000
  • 81. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3921                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Sec. 4(1): 'Whoever, using children for trading purposes, makes, possess, carries, imports or exports by any means or circulates documents, printed material, literary works, drawings, paintings, emblems, photographs, movies or other indecent objects of any kind or uses any means of publication for the facilitation of the circulation or the trading of the indecent objects commits an offence and in case of conviction will be liable to imprisonment not exceeding ten (10) years.'
  • 82. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3922                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Japan Laws Against Child Pornography Source: http://www.interpol.int/ Article 2 - Definitions For the purpose of this Law, 'child pornography' means photos, videotapes and other visual materials which: i. Depict, in a way that can be recognized visually, such a pose of a child relating to sexual intercourse or an act similar to sexual intercourse with or by the child. ii. Depict, in a way that can be recognized visually, such a pose of a child relating to the act of touching genital organs, etc. of the child or of having the child touch someone else's genital organs, etc. in order to arouse or stimulate the viewer's sexual desire; or iii. Depict, in a way that can be recognized visually, such a pose of a child who is naked totally or partially in order to arouse or stimulate the viewer's sexual desire. Article 7 - Distribution, etc. of Child pornography i. A person who distributes, sells, lends as a business, or displays in public, child pornography shall be punished with imprisonment with labor for not more than three years or a fine not exceeding three million yen ii. A person who produces, possesses, transports, imports to or exports from Japan child pornography for the purpose of conducting any of the acts mentioned in the preceding paragraph shall be punished with the same penalty as is described in the said paragraph iii. A Japanese national who imports to or exports from a foreign country child pornography for the purpose of conducting any of the acts mentioned in paragraph 1 of this article shall be punished with the same penalty as is described in the said paragraph
  • 83. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3923                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   South African Laws Against Child Pornography Source: http://llnw.creamermedia.co.za/ Child Care Amendment Act To amend the Child Care Act, 1983, so as to provide for a right of appeal against certain orders relating to children; to provide for the establishment of secure care facilities; to revoke the power of the Minister to transfer certain pupils and children to any institution, custody or supervision mentioned in section 290 of the Criminal Procedure Act, 1977; to provide for the prohibition against the commercial sexual exploitation of children; and to make further provision for the estimation of a person’s age in certain proceedings; and to provide for matters connected therewith. Section 50 1. Any person who participates or is involved in the commercial sexual exploitation of a child shall be guilty of an offence 2. Any person who is an owner, lessor, manager, tenant or occupier of property on which the commercial sexual exploitation of a child occurs and who, within a reasonable time of gaining
  • 84. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3924                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  information of such occurrence, fails to report such occurrence at a police station, shall be guilty of an offence 3. Any person who is convicted of an offence in terms of this section, shall be liable to a fine, or to imprisonment for a period not exceeding 10 years, or to both such fine and such imprisonment Amendment of section 2 of Act 65 of 1996 a. The objects of this Act shall be to— (a) regulate the creation, production, possession, and distribution of certain publications and certain films by means of classification, the imposition of age restrictions and the giving of consumer advice due regard being had in particular to the protection of children against sexual exploitation or degradation in publications, films and on the Internet and (b) make the exploitative use of children in pornographic publications, films or on the Internet punishable Amendment of section 27 of Act 65 of 1996  Any person shall be guilty of an offence if he or she knowingly: (a) creates, produces, imports, or is in possession of a publication which contains a visual presentation of child pornography (b) creates, produces, imports, or is in possession of a film which contains a scene or scenes of child pornography
  • 85. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3925                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   UK laws Against Child Pornography Source: http://www.opsi.gov.uk/ Sex Offences Act 2003 (SOA 2003) An Act to make new provision about sexual offences, their prevention and the protection of children from harm from other sexual acts, and for connected purpose. Sections that relate to child harassment towards pornography are as follows:  Section 15: Meeting a child following sexual grooming etc. 1. A person aged 18 or over (A) commits an offence if: a. having met or communicated with another person (B) on at least two earlier occasions, he intentionally meets B, or travels with the intention of meeting B in any part of the world b. at the time, he intends to do anything to or in respect of B, during or after the meeting and in any part of the world, which if done will involve the commission by A of a relevant offence c. B is under 16 and d. A does not reasonably believe that B is 16 or over 2. In subsection (1): a. The reference to A having met or communicated with B is a reference to A having met B in any part of the world or having communicated with B by any means from, to or in any part of the world; b. “relevant offence” means: i. an offence under this Part, ii. an offence within any of paragraphs 61 to 92 of Schedule 3, or iii. anything done outside England and Wales and Northern Ireland which is not an offence within sub-paragraph (i) or (ii) but would be an offence within sub-paragraph (i) if done in England and Wales 3. In this section as it applies to Northern Ireland: a. subsection (1) has effect with the substitution of “17” for “16” in both places;
  • 86. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3926                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  b. subsection (2)(b)(iii) has effect with the substitution of “sub-paragraph (ii) if done in Northern Ireland” for “sub-paragraph (i) if done in England and Wales”. 4. A person guilty of an offence under this section is liable: a. on summary conviction, to imprisonment for a term not exceeding 6months or a fine not exceeding the statutory maximum or both b. on conviction on indictment, to imprisonment for a term not exceeding 10 years  Section 16: Abuse of position of trust: sexual activity with a child 1. A person aged 18 or over (A) commits an offence if— a. he intentionally touches another person (B), b. the touching is sexual, c. A is in a position of trust in relation to B, d. where subsection (2) applies, A knows or could reasonably be expected to know of the circumstances by virtue of which he is in a position of trust in relation to B, and e. either— i. B is under 18 and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. This subsection applies where A— a. (a) is in a position of trust in relation to B by virtue of circumstances within section 21(2), (3), (4) or (5), and b. (b) is not in such a position of trust by virtue of other circumstances. 3. Where in proceedings for an offence under this section it is proved that the other person was under 18, the defendant is to be taken not to have reasonably believed that that person was 18 or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably believed it. 4. Where in proceedings for an offence under this section— a. it is proved that the defendant was in a position of trust in relation to the other person by virtue of circumstances within section 21(2), (3), (4), or (5), and b. it is not proved that he was in such a position of trust by virtue of other circumstances, c. it is to be taken that the defendant knew or could reasonably have been expected to know of the circumstances by virtue of which he was in such a position of trust unless sufficient evidence is adduced to raise an issue as to whether he knew or could reasonably have been expected to know of those circumstances. 5. A person guilty of an offence under this section is liable— a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. On conviction on indictment, to imprisonment for a term not exceeding 5 years.  Section 17: Abuse of position of trust: causing or inciting a child to engage in sexual activity 1. A person aged 18 or over (A) commits an offence if— a. he intentionally causes or incites another person (B) to engage in an activity, b. the activity is sexual, c. A is in a position of trust in relation to B,
  • 87. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3927                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  d. where subsection (2) applies, A knows or could reasonably be expected to know of the circumstances by virtue of which he is in a position of trust in relation to B, and e. either— i. B is under 18 and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. This subsection applies where A— a. (a) is in a position of trust in relation to B by virtue of circumstances within section 21(2), (3), (4) or (5), and b. (b) is not in such a position of trust by virtue of other circumstances. 3. Where in proceedings for an offence under this section it is proved that the other person was under 18, the defendant is to be taken not to have reasonably believed that that person was 18 or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably believed it. 4. Where in proceedings for an offence under this section— a. it is proved that the defendant was in a position of trust in relation to the other person by virtue of circumstances within section 21(2), (3), (4) or (5), and b. it is not proved that he was in such a position of trust by virtue of other circumstances, c. it is to be taken that the defendant knew or could reasonably have been expected to know of the circumstances by virtue of which he was in such a position of trust unless sufficient evidence is adduced to raise an issue as to whether he knew or could reasonably have been expected to know of those circumstances. 5. A person guilty of an offence under this section is liable— a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. on conviction on indictment, to imprisonment for a term not exceeding 5 years.  Section 18: Abuse of position of trust: sexual activity in the presence of a child 1. A person aged 18 or over (A) commits an offence if— a. he intentionally engages in an activity, b. the activity is sexual, c. for the purpose of obtaining sexual gratification, he engages in it— i. when another person (B) is present or is in a place from which A can be observed, and ii. knowing or believing that B is aware, or intending that B should be aware, that he is engaging in it, d. A is in a position of trust in relation to B, e. where subsection (2) applies, A knows or could reasonably be expected to know of the circumstances by virtue of which he is in a position of trust in relation to B, and f. (f) either— i. B is under 18 and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. This subsection applies where A— a. is in a position of trust in relation to B by virtue of circumstances within section 21(2), (3), (4) or (5), and
  • 88. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3928                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  b. is not in such a position of trust by virtue of other circumstances. 3. Where in proceedings for an offence under this section it is proved that the other person was under 18, the defendant is to be taken not to have reasonably believed that that person was 18 or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably believed it. 4. Where in proceedings for an offence under this section— a. it is proved that the defendant was in a position of trust in relation to the other person by virtue of circumstances within section 21(2), (3), (4) or (5), and b. it is not proved that he was in such a position of trust by virtue of other circumstances, it is to be taken that the defendant knew or could reasonably have been expected to know of the circumstances by virtue of which he was in such a position of trust unless sufficient evidence is adduced to raise an issue as to whether he knew or could reasonably have been expected to know of those circumstances. 5. A person guilty of an offence under this section is liable— a. (a) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. (b) on conviction on indictment, to imprisonment for a term not exceeding 5 years.  Section 19: Abuse of position of trust: causing a child to watch a sexual act 1. A person aged 18 or over (A) commits an offence if— a. for the purpose of obtaining sexual gratification, he intentionally causes another person (B) to watch a third person engaging in an activity, or to look at an image of any person engaging in an activity, b. the activity is sexual, c. A is in a position of trust in relation to B, d. where subsection (2) applies, A knows or could reasonably be expected to know of the circumstances by virtue of which he is in a position of trust in relation to B, and e. either— i. B is under 18 and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. This subsection applies where A— a. is in a position of trust in relation to B by virtue of circumstances within section 21(2), (3), (4) or (5), and b. is not in such a position of trust by virtue of other circumstances. 3. Where in proceedings for an offence under this section it is proved that the other person was under 18, the defendant is to be taken not to have reasonably believed that that person was 18 or over unless sufficient evidence is adduced to raise an issue as to whether he reasonably believed it. 4. Where in proceedings for an offence under this section— a. it is proved that the defendant was in a position of trust in relation to the other person by virtue of circumstances within section 21(2), (3), (4) or (5), and b. it is not proved that he was in such a position of trust by virtue of other circumstances, it is to be taken that the defendant knew or could reasonably have been expected to know of the circumstances by virtue of which he was in such a position of trust unless sufficient evidence is
  • 89. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3929                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  adduced to raise an issue as to whether he knew or could reasonably have been expected to know of those circumstances. 5. A person guilty of an offence under this section is liable— a. (a) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. (b) on conviction on indictment, to imprisonment for a term not exceeding 5 years.  Section 47: Paying for sexual services of a child 1. A person (A) commits an offence if— a. he intentionally obtains for himself the sexual services of another person (B), b. before obtaining those services, he has made or promised payment for those services to B or a third person, or knows that another person has made or promised such a payment, and c. either— i. B is under 18, and A does not reasonably believe that B is 18 orover, or ii. B is under 13. 2. In this section, “payment” means any financial advantage, including the discharge of an obligation to pay or the provision of goods or services (including sexual services) gratuitously or at a discount. 3. A person guilty of an offence under this section against a person under 13, where subsection (6) applies, is liable on conviction on indictment to imprisonment for life. 4. Unless subsection (3) applies, a person guilty of an offence under this section against a person under 16 is liable— a. where subsection (6) applies, on conviction on indictment, to imprisonment for a term not exceeding 14 years; b. in any other case— i. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; ii. on conviction on indictment, to imprisonment for a term not exceeding 14 years. 5. Unless subsection (3) or (4) applies, a person guilty of an offence under this section is liable— a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. on conviction on indictment, to imprisonment for a term not exceeding 7 years. 6. This subsection applies where the offence involved— a. penetration of B’s anus or vagina with a part of A’s body or anything else, b. penetration of B’s mouth with A’s penis, c. penetration of A’s anus or vagina with a part of B’s body or by B with anything else, or d. penetration of A’s mouth with B’s penis. 7. In the application of this section to Northern Ireland, subsection (4) has effect with the substitution of “17” for “16”.  Section 48: Causing or inciting child prostitution or pornography 1. A person (A) commits an offence if—
  • 90. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3930                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  a. he intentionally causes or incites another person (B) to become a prostitute, or to be involved in pornography, in any part of the world, and b. either— i. B is under 18, and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. A person guilty of an offence under this section is liable— a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. on conviction on indictment, to imprisonment for a term not exceeding 14 years.  Section 49: Controlling a child prostitute or a child involved in pornography 1. A person (A) commits an offence if— a. he intentionally controls any of the activities of another person (B) relating to B’s prostitution or involvement in pornography in any part of the world, and b. either— i. B is under 18, and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. A person guilty of an offence under this section is liable— a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. on conviction on indictment, to imprisonment for a term not exceeding 14 years.  Section 50: Arranging or facilitating child prostitution or pornography 1. A person (A) commits an offence if— a. he intentionally arranges or facilitates the prostitution or involvement in pornography in any part of the world of another person (B), and b. either— i. B is under 18, and A does not reasonably believe that B is 18 or over, or ii. B is under 13. 2. A person guilty of an offence under this section is liable— a. on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum or both; b. on conviction on indictment, to imprisonment for a term not exceeding 14 years.
  • 91. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3931                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   State Laws: Michigan Laws Against Child Pornography Source: http://www.legislature.mi.gov/ Child Abuse and Neglect Prevention Act The Child Abuse and Neglect Prevention Act is to establish the state child abuse and neglect prevention board; to provide the powers and duties of the state child abuse and neglect prevention board; and to prescribe the powers and duties of certain state departments. Act 250 of 1982- It is an act to:  To establish the state child abuse and neglect prevention board  To provide the powers and duties of the state child abuse and neglect prevention board  To prescribe the powers and duties of certain state departments
  • 92. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3932                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   State Laws: England and Wales Laws Source: http://www.iwf.org.uk/ Protection of Children Act 1978 Section 1: It is an offence for a person –  To take, or permit to be taken, or to make any indecent photograph or pseudo-photograph of a child; or to distribute or show such indecent photographs or pseudo-photographs; or to possess such indecent photographs or pseudo-photographs, with a view to their being distributed or shown by himself or others; or to publish or cause to be published any advertisement likely to be understood as conveying that the advertiser distributes or shows such indecent photographs or pseudo-photographs, or intends to do so
  • 93. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3933                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   State Laws: Scotland Laws Source: http://www.iwf.org.uk/ Civic Government (Scotland) Act, 1982  Section 52 - Indecent Child Photographs o Any person who: • Takes, or permits to be taken or makes, any indecent photograph or pseudo-photograph of a child under 18 years of age • Distributes or shows such an indecent photograph or pseudo-photograph • Has in his possession such an indecent photograph or pseudo-photograph with a view to its being distributed or shown by himself or others; or • Publishes or causes to be published any advertisement likely to be understood as conveying that the advertiser distributes or shows such an indecent photograph or pseudo-photograph, or intends to do so,
  • 94. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3934                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  • Shall be guilty of an offence under this section  Section 52A - Possession of Photographs o It is an offence for a person to have any indecent photograph or pseudo-photograph of a child under the age of 18 years in his possession  Section 52B - Exemptions for photographs of 16 and 17 year olds o In relation to offences under Section 52(1)(a), 52(1)(b), 52(1)(c) and Section 52A the accused is not guilty of an offence
  • 95. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3935                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   State Laws: Philippines Laws (Republic Acts) Source: http://www.chanrobles.com/ Republic Act 7610 - Special Protection of Children Against Child Abuse, Exploitation and Discrimination Act Article III, Section 5: Child Prostitution and Other Sexual Abuse  Children, whether male or female, who for money, profit, or any other consideration or due to the coercion or influence of any adult, syndicate or group, indulge in sexual intercourse or lascivious conduct, are deemed to be children exploited in prostitution and other sexual abuse The penalty of reclusion temporal in its medium period to reclusion perpetua shall be imposed upon the following: (a) Those who engage in or promote, facilitate or induce child prostitution which include, but are not limited to, the following: 1. Acting as a procurer of a child prostitute; 2. Inducing a person to be a client of a child prostitute by means of written or oral advertisements or other similar means; 3. Taking advantage of influence or relationship to procure a child as prostitute; 4. Threatening or using violence towards a child to engage him as a prostitute; or 5. Giving monetary consideration goods or other pecuniary benefit to a child with intent to engage such child in prostitution (b) Those who commit the act of sexual intercourse of lascivious conduct with a child exploited in prostitution or subject to other sexual abuse; Provided, That when the victims is under twelve (12) years of age, the perpetrators shall be prosecuted under Article 335, paragraph 3, for rape and Article 336 of Act No. 3815, as amended, the Revised Penal Code, for rape or lascivious conduct, as the case may be: Provided, That the penalty for lascivious conduct when the victim is under twelve (12) years of age shall be reclusion temporal in its medium period; and (c) Those who derive profit or advantage therefrom, whether as manager or owner of the establishment where the prostitution takes place, or of the sauna, disco, bar, resort, place of entertainment or establishment serving as a cover or which engages in prostitution in addition to the activity for which the license has been issued to said establishment
  • 96. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3936                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Article III Section 6: Attempt To Commit Child Prostitution  There is an attempt to commit child prostitution under Section 5, paragraph (a) hereof when any person who, not being a relative of a child, is found alone with the said child inside the room or cubicle of a house, an inn, hotel, motel, pension house, apartelle or other similar establishments, vessel, vehicle or any other hidden or secluded area under circumstances which would lead a reasonable person to believe that the child is about to be exploited in prostitution and other sexual abuse  There is also an attempt to commit child prostitution, under paragraph (b) of Section 5 hereof when any person is receiving services from a child in a sauna parlor or bath, massage clinic, health club and other similar establishments. A penalty lower by two (2) degrees than that prescribed for the consummated felony under Section 5 hereof shall be imposed upon the principals of the attempt to commit the crime of child prostitution under this Act, or, in the proper case, under the Revised Penal Code
  • 97. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3937                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Children’s Internet Protection Act (CIPA) Source: http://www.fcc.gov/ The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress in December 2000 to address concerns about access to offensive content over the Internet on school and library computers. CIPA imposes certain types of requirements on any school or library that receives funding for Internet access or internal connections from the E-rate program—a program that makes certain communications technology more affordable for eligible schools and libraries. Following are the requirements of CIPA:  Schools and libraries subject to CIPA may not receive the discounts offered by the E-rate program unless they certify that they have an Internet safety policy and technology protection measures in place. An Internet safety policy must include technology protection measures to block or filter Internet access to pictures that: (a) are obscene, (b) are child pornography, or (c) are harmful to minors (for computers that are accessed by minors).  Schools subject to CIPA are required to adopt and enforce a policy to monitor online activities of minors.  Schools and libraries subject to CIPA are required to adopt and implement a policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) restricting minors’ access to materials harmful to them.            
  • 98. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3938                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.              Anti-Child-Pornography Organizations
  • 99. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3939                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Anti-Child-Pornography Organizations Anti-child-pornography organizations are the non-profit organizations established for eradicating child pornography to help children live in the best environment. They accept anonymous and online abuse reports in order to maintain secrecy of individuals. Following are the various anti-child-pornography organizations: 1. Project Safe Childhood (http://www.projectsafechildhood.gov/) 2. Innocent Images National Initiative 3. Internet Crimes Against Children (ICAC) 4. Antichildporn.org 5. Child Exploitation and Online Protection (CEOP) Centre 6. ThinkUKnow 7. Virtual Global Taskforce 8. Internet Watch Foundation
  • 100. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3940                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  9. International Centre for Missing & Exploited Children 10. National Centre for Missing & Exploited Children 11. Child Victim Identification Program 12. Financial Coalition Against Child Pornography 13. Preverted Justice 14. The National Society for the Prevention of Cruelty to Children (NSPCC) 15. Canadian Centre for Child Protection 16. Association of Sites Advocating Child Protection (ASACP) 17. Websites Against Child Porn (WSACP) 18. Child Focus
  • 101. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3941                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   http://www.projectsafechildhood.gov/ Source: http://www.projectsafechildhood.gov/ Project Safe Childhood (PSC) aims to combat the proliferation of technology-facilitated sexual exploitation crimes against children. It must aim to investigate and prosecute vigorously, and protect and assist the victimized children. At the same time, it must recognize the need for a broad, community-based effort to protect children and to guarantee future generations the opportunities of the American dream. PSC creates, on a national platform, locally designed partnerships of federal, state, local, and tribal law enforcement officers in each federal judicial district to investigate and prosecute Internet-based crimes against children. With the U.S. Attorney as the convenor, each local community will be able to design and implement programs that are uniquely tailored to its needs, while maximizing the impact of national resources and expertise. Basic vision of PSC will be put into action through the building of PSC partnerships in each district, the development of district-specific strategic plans, and the reporting of results on a semi-annual basis in order to ensure accountability to the goals of PSC. The PSC partnerships in every district aim to address five major components of the initiative, as follows:  Integrated Federal, State, and Local Efforts to Investigate and Prosecute Child Exploitation Cases, and to Identify and Rescue Child Victims: U.S. Attorneys will coordinate the investigation and prosecution of child exploitation crimes, and the efforts to identify and rescue victims. Establishing open and formal lines of information sharing and case referrals is imperative, so that investigators and prosecutors can use all available tools for finding offenders and selecting the most appropriate forum in which to seek convictions. Aggressive investigations and prosecutions must be accompanied by strong victim-assistance efforts. Given their closeness to the community, local PSC partners must play a central role in helping national and local partners in identifying and rescuing victims of child exploitation cases.  Participation of PSC Partners in Coordinated National Initiatives: Child pornography cases are often initiated by law enforcement agents uncovering a peer-to-peer network, server, or website. Such national operations may be conducted by the FBI’s Innocent Images Unit, ICE’s Cyber Crime Center, USPIS’s Child Exploitation Task Forces, ICAC task forces, or others, and are frequently coordinated by CEOS. These investigations will lead to hundreds or thousands of leads in communities throughout the country.  Increased Federal Involvement in Child Pornography and Enticement Cases:
  • 102. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3942                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  All states have laws in place to respond to child exploitation and abuse, and some states have very significant criminal laws and penalty provisions for child pornography offenders and online sexual predators that parallel or exceed those provided by federal law.  Training of Federal, State, and Local Law Enforcement: Computer-based crimes, such as the child exploitation by using PCs and Internet, present unique challenges for law enforcement. Investigators must be trained and have the necessary equipment to investigate and perform computer forensics analysis of targeted equipment. Prosecutors must learn the most up-to-date and effective techniques for bringing these cases. Officers and prosecutors must be oriented to receive and handle packaged leads distributed from national investigations or from NCMEC’s CyberTipline or CVIP. A key component of PSC will therefore be to ensure that federal, state, local, and tribal officers are properly instructed. The training needs of PSC partners within each district will be assessed, and officials will take advantage of training programs facilitated or administered by NCMEC, the ICAC program, and the National Advocacy Center, among other programs and providers.  Community Awareness and Educational Programs: PSC will aim to enhance existing efforts to generate awareness and to educate the public about the threats to our children, and ways to prevent online exploitation. It partners with existing national programs through NCMEC and the ICAC program in order to raise awareness about the threat of online sexual predators and provide the tools and information to parents and youngsters seeking to report possible violations. These national campaigns will be complemented by the efforts of each district’s PSC partnership to impact its community through expanded outreach efforts.
  • 103. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3943                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Innocent Images National Initiative Source: http://www.fbi.gov/ The Innocent Images National Initiative (IINI), a component of FBI's Cyber Crimes Program, is an intelligence driven, proactive, multi-agency investigative operation to combat the proliferation of child pornography/child sexual exploitation (CP/CSE) facilitated by an online computer. It provides centralized coordination and analysis of case information that by its nature is national and international in scope, requiring unprecedented coordination with state, local, and international governments and among FBI field offices and Legal Attachés. The mission of the IINI is to reduce the vulnerability of children to acts of sexual exploitation and abuse which are facilitated through the use of computers; to identify and rescue witting and unwitting child victims; to investigate and prosecute sexual predators who use the Internet and other online services to sexually exploit children for personal or financial gain; and to strengthen the capabilities of federal, state, local, and international law enforcement through training programs and investigative assistance. FBI’s Innocent Images National Initiative focuses on:  Online organizations, enterprises, and communities that exploit children for profit or personal gain  Producers of child pornography  Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual activity with a minor  Major distributors of child pornography, such as those who appear to have transmitted a large volume of child pornography via an online computer on several occasions to several other people  Possessors of child pornography The FBI and the Department of Justice review all files and select the most egregious subjects for prosecution. In addition, the IINI works to identify child victims and obtain appropriate services/assistance for them and to establish a law enforcement presence on the Internet that will act as a deterrent to those who seek to sexually exploit children. Innocent Images has expanded to include investigations involving all areas of the Internet and online services including:  Internet websites that post child pornography  Internet News Groups
  • 104. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3944                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Internet Relay Chat (IRC) Channels  File Servers (“FServes”)  Online Groups and Organizations (eGroups)  Peer-to-Peer (P2P) file-sharing programs  Bulletin Board Systems (BBSs) and other online forums Innocent Images Statistical Accomplishments Online child pornography/child sexual exploitation investigations, which are worked under the FBI's Innocent Images National Initiative, accounted for 39 percent of all investigations worked under the FBI's Cyber Division in fiscal year 2007. Innocent Images grew exponentially between fiscal years 1996 and 2007 with a:  2062 percent increase in cases opened (113 to 2443)  1003 percent increase in information & indictments (99 to 1092)  2501 percent increase in arrests, locates, and summons (68 to 1769)  1404 percent increase in convictions and pretrial diversions (68 to 1023) Between fiscal years 1996-2007, the Innocent Images National Initiative has recorded the following statistical accomplishments:  Number of cases opened: 20,134  Number of information and indictments: 6,844  Number of arrests, locates, and summons: 9,469  Number of convictions and pretrial diversions: 6,863
  • 105. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3945                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Internet Crimes against Children (ICAC) Source: http://attorneygeneral.utah.gov/ The Internet Crimes against Children Task Force (ICAC) is a multi-jurisdictional task force that investigates and prosecutes individuals who use the Internet to exploit children. It is a network of coordinated regional task forces engaged in helping state and local law enforcement agencies to develop an effective response to cyber-enticement and child pornography cases. This help consists of proactive investigations, forensic and investigative components, training and technical assistance, effective prosecutions, victim services, and community education. An ICAC task force is formed when a state or local law enforcement agency enters into a grant contract with OJJDP, and that entity then enters into Memoranda of Understanding with other federal, state, and local agencies. ICAC task forces have played a critical role in law enforcement’s efforts to stop Internet criminal activity that poses harm to children. Investigations initiated by the ICAC task forces led to more than 1,600 arrests and over 6,000 forensic examinations in 2005. Since the beginning of the ICAC program, investigations have resulted in 7,328 arrests. The ICAC task forces’ nationwide efforts have resulted in the prosecution of many cases; in the first six months of fiscal year 2005 alone, for example, the ICAC program reported that its investigations resulted in 4,947 state charges and 577 federal charges. The task force’s mission is to:  Intervene and stop individuals who use the Internet to entice a child to meet with them for sexual purposes;  Investigate and prosecute those who possess, create, or distribute child pornography; and  Educate the public about the dangers that exist for minors on the Internet.
  • 106. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3946                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Antichildporn.org Source: http://www.antichildporn.org/ AntiChildPorn.Org (ACPO) is an organization, comprising of volunteers from all around the world, whose mission is to stop the sexual exploitation of the world's children. For the past five years, ACPO has been addressing the issues of Child Pornography production and distribution via the Internet, as well as the predatory use of the Internet for the sexual abuse of children. Their main focus is to protect children from becoming victims of child pornography and to keep it from spreading over the Internet. Their secondary focus is education. They want to train individuals and organizations about the Internet and its associated risks. They wish to educate the public and politicians to this epidemic and the danger these criminals pose to the collective social interest. They want to address the supply and demand issues related to these illicit materials and facilitate cooperative efforts between police agencies and other public interest groups worldwide. They counsel the law enforcement on gathering information and evidence related to the Internet. Goals:  Provide a mass amount of information to law enforcement authorities, including activity hot spots on the Internet and the result of their own investigations of the activities of online child pornographers  Halt sensationalism and hype regarding the Internet while promoting quality investigative journalism on pedophile pornography  Create enough public pressure to bring authorities to the point of action  Form a cooperative with other internet groups with similar goals that will benefit them all and increase their impact
  • 107. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3947                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   How to Report to Antichildporn.org about Child Pornography Cases Following is the procedure for reporting child porn case to www.antichildporn.org:  Go to Homepage http://www.antichildporn.org/  Click Report!  Report Child Porn  The form ‘Anonymous Submission’ will appear  Give the appropriate web address or FTP address of the pornographic site  Write details about that site  You can report about more than one site  Click Submit
  • 108. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3948                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-25: Child pornography report form
  • 109. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3949                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Child Exploitation and Online Protection (CEOP) Centre Source: http://www.ceop.gov.uk/ The Child Exploitation and Online Protection (CEOP) Centre is a UK-based anti-child-pornography organization. It is the part of UK government/police that basically focuses on protecting children from sexual abuse. It targets, tracks, and brings offenders or perpetrators to the court of law with the help of direct, local, or international forces. Each sub-team of the CEOP Centre has at least one police officer who handles each and every legal matter. It not only consists of police officers but also NSPCC members who are sponsored by VISA and SERCO, government, and various other corporations. It is an approach that sees the development of specialist areas such as its Behavioral Analysis Unit, an approach to victim identification or the development of our child trafficking unit, as well as filtering into all areas of outreach activities such as the most wanted initiative and public awareness plans. Its intelligence researches on how offenders operate and think, how children and young people behave, and how technological advances are developing.
  • 110. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3950                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-26: Child Exploitation and Online Protection (CEOP) Centre
  • 111. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3951                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   ThinkUKnow Source: http://www.thinkuknow.co.uk/ ThinkUKnow is the education programme of the Child Exploitation and Online Protection Centre aimed at young people, and encourages safe Internet browsing. It is based around three themes that are as follows:  How to have fun  How to stay in control  How to report a problem It provides the latest information on the sites children like to visit, mobiles, and new technology. It divides the users into various groups based on age: 1. Children between 5-7 2. Children between 8-10 3. Children between 11-16 4. For parents or caretakers 5. For teachers or trainers Depending on the age group, users can target specific information. It offers an online reporting option that can be accessed just by clicking the icon REPORT ABUSE. After clicking Report Abuse, the user needs to fill in the URL and further information and click to submit the report.
  • 112. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3952                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-27: ThinkUKnow Website
  • 113. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3953                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.     Virtual Global Taskforce (VGT) Source: http://www.virtualglobaltaskforce.com/ The Virtual Global Taskforce (VGT) is group of law enforcement agencies from around the world working together to fight child abuse online. The aim of it is to build an effective, international partnership of law enforcement agencies that helps to protect children from online child abuse. The objectives of the VGT are:  To make the Internet a safer place  To identify, locate, and help children at risk  To hold perpetrators appropriately to account The VGT is made up of:  Australian Federal Police  CEOP Centre in UK  Italian Postal and Communication Police Service
  • 114. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3954                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Royal Canadian Mounted Police  US Department of Homeland Security  Interpol It allows users to report the abuse online. The user just needs to click the icon Report Abuse, fill in the details and the URL, and submit the report. Figure 44-28: Virtual Global Taskforce (VGT) Website
  • 115. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3955                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Internet Watch Foundation (IWF) Source: http://www.iwf.org.uk/ The Internet Watch Foundation (IWF) is the UK hotline for reporting illegal content, specifically acting upon child sexual abuse content hosted worldwide and criminally obscene and incitement to racial hatred content hosted in the UK. Following are the features of Internet Watch Foundation (IWF):  Online reporting form: It can be reached from any page of the website by clicking the Report Illegal Content Click Here icon at the top right hand side of any page  Links to relevant websites: Shown on every page where needed; this section shows links to the relevant websites and document downloads for that page  Tools for choosing appearance of the page: Shown on every page; this section allows the user to choose a font size, print, bookmark or email the page they are on  Communications: Shown on every page; this section provides IWF contact details as well as links to the newsletter registration page, the website feedback page, IWF literature, and materials page
  • 116. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3956                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   News Ticker: Shown on every page; these scrolling links allow you to access the most recent IWF news stories  Search Function: Shown on every page; this function allows you to search the IWF website using keywords and phrases The following are the steps for reporting at IWF online:  Go to http://www.iwf.org.uk/  To report against illegal content, click Click here Report Illegal Content  Submit the URL and the report Figure 44-29: Internet Watch Foundation (IWF) Website
  • 117. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3957                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   International Centre for Missing & Exploited Children (ICMEC) Source: http://www.icmec.org/ The International Centre for Missing & Exploited Children was founded in 1998 and launched by the U.S. It works to identify and coordinate a global network of organizations fighting child sexual exploitation and abduction. It offers a hotline and cyber tipline that let users report child porn sites. It also accepts reports via telephone communication at 1-800-THE-LOST. People can visit www.missingkids.com for more information. ICMEC's work brings promise to children and families by:  Establishing a global resource to find missing children and prevent child-sexual exploitation  Creating national centers and affiliates worldwide  Building an international network to disseminate images of and information about missing and exploited children  Providing training to law enforcement, prosecutors, judges, legal professionals, nongovernmental organizations, and government officials  Advocating and proposing legislative changes in laws, treaties, and systems to protect children worldwide  Conducting international expert conferences to build awareness encourage and increase cooperation and collaboration between and among countries  Working alongside financial industry and law enforcement to combat commercial child-sexual exploitation
  • 118. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3958                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-30: International Centre for Missing & Exploited Children (ICMEC) Website
  • 119. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3959                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   National Center for Missing & Exploited Children (NCMEC) Source: http://www.missingkids.com/ The National Center for Missing & Exploited Children (NCMEC) is the non-profit anti-child-pornography organization. It is the Nation's Resource Center for Child Protection that gives a better understanding about child pornography and its prevalence on Internet. It helps in reporting about missing child or reporting against a site that is offering child pornography via a cyber tipline.   Figure 44-31: National Center for Missing & Exploited Children (NCMEC) 
  • 120. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3960                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  CyberTipline The CyberTipline is a reporting mechanism for cases of child sexual exploitation including child pornography, online enticement of children for sex acts, molestation of children outside the family, sex tourism of children, child victims of prostitution, and unsolicited obscene material sent to a child. Reports may be made 24-hours per day, 7 days per week online at www.cybertipline.com or by calling 1-800-843- 5678 How to report:  Go to http://www.missingkids.com/cybertip/  Click the arrow beside CyberTipline  Enter information on the form as required  Enter the URL that is showcasing child pornography  Submit the report   Figure 44-32: CyberTipline
  • 121. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3961                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Child Victim Identification Program (CVIP) Source: http://www.missingkids.com/ The Child Victim Identification Program (CVIP) is the world's largest database that serves as the clearinghouse in the United States for child pornography cases and also serves as the main point of contact to international agencies for victim identification. It helps assist law enforcement and prosecution teams with child-pornography evidence reviews in order to help them learn the full range of crimes committed in each case, maximize sentences available for each charge, and attempt to identify the location of unidentified child sexual exploitation victims. It is maintained by the Child Exploitation and Obscenity Section of the United States Department of Justice and the National Center for Missing and Exploited Children (NCMEC).
  • 122. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3962                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-33: Child Victim Identification Program (CVIP)
  • 123. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3963                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Financial Coalition against Child Pornography (FCACP) Source: http://www.icmec.org/ The Financial Coalition against Child Pornography (FCACP) is a coalition of credit card issuers and Internet services companies that seek to eliminate commercial child pornography by taking action on the payment systems used fund these illegal operations. It merged with the International Centre for Missing & Exploited Children (ICMEC) and the National Centre for Missing & Exploited Children (NCMEC). Thirty companies have joined ICMEC and NCMEC to create and make FCACP successful. It includes leading banks, credit card companies, third-party payment companies, and Internet services companies. Coalition members will be vigilant and will look proactively for and report child pornography to the clearinghouse. It will ensure that information derived from proactive efforts is reviewed by the clearinghouse, that information is shared with Coalition companies, and that a tracking and feedback system is developed to ensure that broad-based action is taken to eradicate illegal practices. 
  • 124. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3964                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Perverted Justice Source: http://www.perverted-justice.com/ Perverted Justice (PeeJ) is a California-based non-profit organization for investigating, identifying, or publicizing users in chat rooms with predatory tendencies towards children. Its methods are controversial and a number of critics have called these actions harassment. It recruits volunteer contributors who:  Pose as underage children in chat rooms  Use fake online screen names  Wait for predators to instigate conversations with them 
  • 125. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3965                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   National Society for the Prevention of Cruelty to Children (NSPCC) Source: http://www.nspcc.org.uk/, http://www.childline.org.uk/ NSPCC protects children from cruelty, supports vulnerable families, campaigns for changes to the law, and raises awareness about abuse. Its aim is to have a society where all children are loved, valued, and able to fulfill their potential. It has 177 community-based projects and runs the Child Protection Helpline and ChildLine in the UK and the Channel Islands. Most of its work is with children, young people, and their families. It also works to achieve cultural, social, and political change—influencing legislation, policy, practice, public attitudes, behaviors, and delivering services for the benefit of young people. http://www.childline.org.uk/ is the service provided by NSPCC that helps users know about abuse or porn. It is the UK's free, 24-hour helpline for children in distress or danger. Trained volunteer counselors comfort, advise, and protect children and young people who may feel they have nowhere else to turn. It is built in child friendly way. It provides with the number 0800 1111 that takes the user (Children) reports and takes the necessary actions. NSPCC has set four objectives that help it in reaching its goal:
  • 126. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3966                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   To mobilize everyone to take action to end child cruelty  To give children the help, support, and environment they need to stay safe from cruelty  To find ways of working with communities to keep children safe from cruelty  To be, and be seen as, someone to turn to for children and young people
  • 127. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3967                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Canadian Centre for Child Protection Source: http://www.protectchildren.ca/ The Canadian Centre for Child Protection (CCCP) is a non-profit, charitable organization dedicated to the personal safety of all children. The goal of CCCP is to reduce child victimization by providing programs and services to Canadians. It was incorporated in April 1985 as Child Find Manitoba following the disappearance and murder of a 13-year-old child. The missions of the CCCP are as follows:  To reduce the incidence of missing and sexually exploited children  To educate the public on child personal safety and sexual exploitation  To assist in finding the location of missing children  To advocate for and increase awareness about issues relating to child sexual exploitation The Canadian Centre for Child Protection:  Delivers programs to increase the personal safety of children and reduce their risk of sexual exploitation  Prevents harm to children through education and prevention programs for children, families, schools, and communities  Receives and addresses reports of child pornography, online luring, child sex tourism, and children exploited through prostitution  Maintains comprehensive data on the latest trends in child victimization and develops training and programs to address the risks  Accepts tips from the public and assists in locating missing children  Advocates on issues relating to child victimization and protection  Researches better practices on how to keep children safer  Coordinates national efforts in the area of child protection through collaboration with non-profit agencies, government, industry, law enforcement, educators, and families
  • 128. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3968                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-34: Canadian Centre for Child Protection
  • 129. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3969                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   http://cybertip.ca/ Source: http://cybertip.ca/ Cybertip.ca is Canada’s national tipline for reporting online sexual exploitation of children. Following is the procedure to report child pornography on Cybertip.ca:  Go to http://cybertip.ca/  Click Click here to report  Write details about the child porn site  Submit the report
  • 130. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3970                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-35: Cybertip-ca Website
  • 131. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3971                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Association of Sites Advocating Child Protection (ASACP) Source: http://www.asacp.org/ The Association of Sites Advocating Child Protection (ASACP), founded in 1996, is a non-profit organization dedicated to eliminating child pornography from the Internet. It battles child pornography through its CP reporting hotline and by organizing the efforts of the online adult industry to combat the heinous crime of child sexual abuse. It also works to help parents prevent children from viewing age- inappropriate material online. It provides an online hotline for web surfers and webmasters to report suspected child pornography sites. Every page of the site provides links to this hotline, which receives thousands of reports every month. It investigates those reports and determines the hosting, billing, IP address, ownership, and linkage of suspected CP sites.
  • 132. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3972                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-36: Association of Sites Advocating Child Protection (ASACP)
  • 133. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3973                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Web Sites Against Child Porn (WSACP) Source: http://www.wsacp.org/ Web Sites Against Child Porn (WSACP) is an anti-child-pornography organization. Its goal is to stop as many child pornographic websites as possible and make the Internet a better place for everyone. It provides feedback on all reports submitted with a valid email address. The staff of WSACP will inform you if a suspect’s site has been reported to the authorities or not, if they were unable to report a suspect site to the authorities, and reasons for it. It offers online reporting against a site by submitting the URL, thus providing news and resources related to child pornography.
  • 134. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3974                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   http://www.reportchildporn.com/ Source: http://www.reportchildporn.com/ Reportchildporn.com is a hotline for webmasters and surfers to report suspected child pornography. It offers:  A way to report child porn  An avenue to discuss problems related to child porn Figure 44-37: Report Child Porn Page How to report: 1. Click Enter Report Child Porn.
  • 135. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3975                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.    Figure 44-38: Report Child Porn Page  2. If you are the registered user, click Username and Password, log in, and report a child porn site. 3. If not the registered user, click Register now and after registering, log in and report the site.
  • 136. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3976                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   Child Focus Source: http://www.childfocus.be/ The European Centre for Missing and Sexually Exploited Children, operating under the name of Child Focus, is a foundation under Belgian law recognized as a public utility. It acts on an independent basis and only in the interest of children. Following are the features of Child Focus:  It provides active support in the investigation of disappearances, abductions, or sexual exploitation of children  It supports and encourages investigations and legal measures  It ensures follow-up to the cases that are entrusted to it and participates in the counseling of victims
  • 137. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3977                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  . Figure 44-39: Child Focus Website
  • 138. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3978                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.   StopChildPorno.be Source: http://www.stopchildporno.be/ StopChildPorno.be is the Belgian civil hotline for reporting child abuse images found on the Internet. It informs you about the problem of child pornography prevalent on the Internet, Belgian legislation concerning this matter, different possibilities to report, procedures, addresses of other hotlines abroad, and communication campaigns focusing on children. How to report:  Go to http://www.stopchildporno.be/index.php?language=en  Click Report a site  In Procedure, check either I want to be anonymous or I want to be informed and click Continue  Indicate which type of report you want to submit  Copy and paste the URL of the website  Submit the report
  • 139. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3979                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Figure 44-40: StopChildPorno.be Website
  • 140. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3980                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Summary Child pornography is defined as any work that centers on activities involving the sexual behavior of children. Such activities include drawings, cartoons, sculptures, or paintings, photography, films, videos or computer-generated images or pictures, whether made or produced by electronic, mechanical, or other means. It also includes distribution and possession of the porn materials. Criminals involved in pornographic cases are generally unmarried, separated, divorced or widowed. Motives of people can range from mere money-making to sexual perversion. They attract children by coercion, seduction, and luring them with money. People involved in child pornography are also known as ‘pornographers’. It includes the person who establishes the online relationship with the children, who physically abuses the children, and the person who produces and distributes the porn materials. The Internet provides easy access to a number of pornographic materials and reduces the cost of production and distribution of such material. An offender distributes the material easily through web services such as emails, user groups, and webcams. Child pornography affects children physically, socially, and psychologically. ISP (Internet Service Provider) plays an important role in reducing the problem of child pornography. It can facilitate in reducing pornography by blocking illegal sites, applying filters to browsers and search engines, and by creating complaint sites. The police also play a crucial role in investigating the pornographic sites. They may use new computer forensics tools and techniques to investigate such sites. They may also use “honey trap” sites to find offenders. The challenges in controlling child pornography are large Internet traffic, lack of rules and regulations, and different advanced techniques used by the offender. An offender’s computer, hand-held devices, and servers are the main sources of evidence for the investigation. Organizations such as Antichildporn.org (ACPO), and Innocent Images National Initiative (IINI), Cybertip.ca comprise volunteers from around the world whose mission is to stop the sexual exploitation of the children.
  • 141. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3981                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Exercise: 1. What are the motives of people behind child pornography? _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 2. Explain the role of the Internet in promoting child pornography. _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 3. What are the effects of child pornography on children? _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 4. How dissemination of child pornography can be prevented? _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 5. What are the challenges faced in controlling child pornography? _____________________________________________________________________ _____________________________________________________________________
  • 142. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3982                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 6. List the guidelines for investigating child pornography cases. _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 7. List the sources of digital evidence during an investigation. _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 8. List the guidelines for parents to reduce the risk of their child being porned. _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 9. Are there any tools to protect children from accessing pornography? _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 10. Write a brief note on the laws against child pornography in the United States of America.
  • 143. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3983                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ 11. Explain in details about various anti-child porn organizations. _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________
  • 144. Computer Hacking Forensic Investigator Exam 312-49 Investigating Child Pornography Cases  Module XLV Page | 3984                                               Computer Hacking Forensic Investigator Copyright © by EC-Council     All Rights Reserved. Reproduction is Strictly Prohibited.  Hands On 1. Go to site http://www.icmec.org/en_X1/pdf/ModelLegislationFINAL.pdf and read the report on Child Pornography. 2. Go to site http://www.antichildporn.org/ and read about how to report against Child Pornography. 3. Go to site http://www.fbi.gov/publications/innocent.htm and read about Innocent Images National Initiative. 4. Visit your local government site and browse for laws against Child pornography. 5. Run the tool Net Nanny and see the result.