U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Application of the Fairyplay Operation System To Counter Child Pornography

NCJ Number
238444
Journal
Internal Security Volume: 2 Issue: 2 Dated: July - December 2010 Pages: 221-227
Author(s)
Grzegorz Gudzbeler; Tomasz Siemianowski
Date Published
December 2010
Length
7 pages
Annotation
Capabilities of monitoring P2P networks for illegal content- sharing have increased substantially with the databases containing illegal content information reaching their operational capacity.
Abstract
Easy data gathering and processing has become possible thanks to the employment of the hash function. Unfortunately the law enforcement agencies and p2p users are locked up in a sort of an arms race. With the steady rise in monitoring capabilities grows the number of processed files stemming from the ever increasing popularity of the video recording equipment. At the same time vast majority of the existing systems do not allow for fast and effective transfer of monitored information. Identified illegal files added to a hash cache in Norway not necessarily find the way to a data bank in Portugal. With the amount of data growing exponentially international law enforcement community concurred on creating platforms to effectively collaborate and share information about the files containing illegal content. American company TLO devised a system supporting p2p networks monitoring and user identification procedures in the area of child pornography. The system is a set of extremely useful instruments that may dramatically enhance the effectiveness of child porn countering. Great recommendation of the system is its successful application by the law enforcement agencies in the United States of America, United Kingdom, Denmark, Norway and Sweden. (Published Abstract)