Pedophiles are swapping thousands of hardcore images of child sex abuse in a new form of child pornography that police believe is feeding a demand for more real-time victims of abuse.
The demand for child porn through the use of file-sharing technology -- normally associated with swapping music and movies -- has grown so rapidly that law enforcement agencies are now employed in a global race to track down the children who are being abused. Some of the children, police believe, are being abused on a daily basis to provide a constant supply of new computerized material.
Senior officers have revealed that the scale of peer-to-peer traffic in illegal images of children now dwarfs almost any other pedophile network they have encountered. The images are generally more extreme and at least 20 percent of the users are what police class as Category One, meaning that the suspect is "of significant risk to children."
ILLUSTRATION: MOUNTAIN PEOPLE
But resources available to police to tackle peer-to-peer child porn are limited and though they are catching some offenders, it may take months or even years to track down the location of some victims.
In such cases, officers monitoring the images can only watch as the children grow older and continue to be abused.
Many of those addicted to child porn have flocked to peer-to-peer file sharing software such as Kazaa, Morpheus and Grokster because they are free, so, crucially, users do not have to leave any credit card details, leading them to believe that they cannot be traced. The explosion in file sharing, driven by the demand for music files, has also made the technology readily accessible, quick and easy to use.
It also has the attraction of not requiring the users to be part of a traditional organized pedophile ring using password-protected, covert means to distribute images; rather peer-to-peer technology allows them direct access into the hard drives of other pedophiles' computers with no third party authority monitoring content as is the case with chat rooms and news groups.
Scotland Yard officers have said that they stumbled across this phenomenon by accident during another inquiry and say they have been stunned by its exponential growth. They believe the phenomenon is more alarming than previous Internet-related cases, such as the high-profile Operation Ore.
The Met's child protection hi-tech crime unit has already built a list of 800 suspects involved in file swapping illegal images in the UK alone. While most are involved only in sharing or downloading the images, a significant proportion are active abusers producing the material themselves, often using their own children, their neighbor's children or -- in rarer cases -- by luring strangers. At least 30 peer-to-peer cases in the UK so far involved hands-on abuse in which the children in the images were real-time victims.
Police found one man who had wired webcams into his daughter's bedroom so that he could share video images of his abuse with other peer-to-peer file sharers.
Detective Superintendent Peter Spindler, who heads Scotland Yard's pedophile unit, said: "We are finding real-time live abusers. These people are able to get brand new images straight up on the net."
His officers have found that when new images appear, the children involved are often related to or live nearby the person distributing the material.
But the sheer volume of new material, combined with the fact that it could have been produced anywhere in the world, has meant that police have often been unable to pinpoint the child's location.
Detectives rely on two methods of tracing a location: electronic footprints left by the user while online and forensic analysis of the images to find clues pointing to the country of origin, such as telephone books in the background or the style of furnishings. In some cases, often where the child is being held prisoner and abused in a completely blank room, there are not enough leads for police to chase.
One case being investigated involves a prepubescent girl who is being held prisoner in a room and repeatedly abused. International law enforcement agencies know only that she is in the US and the FBI is trying to pinpoint her exact location. New images of the child are shared through Kazaa and other services but police have been unable to find her.
Gemma Holland, victim identification project manager at the University of Cork's Combating Pedophile Information Networks in Europe, which has a database of more than 600,000 child porn images, said: "This is a global problem. The abuse could be in the next village or somewhere near you but the problem is the images are being shown globally. Identifying the kids in these images should be our prime concern and of the greatest importance."
The decentralized nature of the Internet and peer-to-peer file sharing specifically make it difficult to define numbers of images in circulation or children involved but experts says it is growing daily. Washington's national centre for missing and exploited children, which acts as a clearing house for child porn tip-offs, said that reports of such images in shared files had increased by 400 percent this year.
David Wilson, professor of criminology at the University of Central England in Birmingham, said: "`Peer-to-peer' facilitates the most extreme, aggressive and reprehensible types of behavior that the Internet will allow."
The National Crime Squad is considering co-ordinating all of this work, rather than leaving it to small groups working within the country's various forces; so far the leading forces have been the Met, West Midlands and Greater Manchester.
"Peer-to-peer" has become more attractive for pedophiles in the wake of Operation Ore, the high-profile British police operation which was launched after US authorities handed over the names of 7,200 people suspected of subscribing to Web sites offering pedophilic images. While Ore has grabbed headlines, many senior officers and child abuse experts believe that targeting people at the lower end of the pedophile spectrum has been a distraction in terms of child protection.
Wilson believes Ore showed how the criminal justice system concentrated on the wrong type of offender, the people who downloaded the material rather than produced them. It needed to refocus on activities such as peer-to-peer file sharing and the producers of child pornography.
He said: "Police operations have not been getting to the type of pedophile that we need to get to. It's in their interests to keep the debate moving towards the kind of people they should be spending time and resources on.
"The Achilles heel of peer-to-peer is that it makes something that is secret and furtive into something that is public and when it is public that offers the police a window of opportunity to police it."
In a room on the fifth floor at Scotland Yard, officers in the high-tech crime unit are trying to do exactly that, sitting at computers, monitoring activity on the peer-to-peer boards. They are part of a team working on Operation Pilsey which started as a small-time inquiry in March 2001 by the Met's clubs and vice unit, and burgeoned with the number of people posting images via file sharing. The detectives working here are now inundated.
They explain that they can use technology to detect the location of those who download the images and sometimes that of the abusers.
If there is a child immediately in danger, officers will conduct a raid as soon as they have a location.
Pedophiles believe it is harder for them to be detected through peer-to-peer software but investigators are able to access their shared folders and quickly discover if they contain illegal images of child abuse. They are then able to establish the location of the owner of the shared folder.
Detective Constable Sean Robbie scans through a list of images held in one shared folder to illustrate the point. A scroll through shows the thousands of illicit files that are on offer. Some of the milder titles are Nine-year-old rape, Eight-year dance and Dad does daughter. All of it is accessible to anyone who requests it, including children. Key in the word Britney or Barbie and the number of images available is astonishing.
We view one of the files involving the American girl -- of which there are thousands -- and see her dancing provocatively for the camera. This is one of the least extreme of the images available, some of them replications, others new.
Over the last 18 months, Pilsey officers have found a surprising number of magistrates, city workers and police officers and even children with pedophile images on their computer. Two weeks ago, William Legros, now 18 but 16 when he downloaded child sex images, was given a 12-month community rehabilitation order after being tracked down by Pilsey.
James Taylor, 43, was convicted in Scotland last month after he posted digital camera shots of himself raping a 13-month-old baby. He was detected when Scotland Yard officers passed his details on to local police. Forensic analysis of the images helped establish the baby's location in a house nearby.
Taylor, from Grangemouth, who is married with children aged 15, 13 and 11, also took indecent pictures of a six-year-old child as she slept and had 2,880 hardcore child porn images on his hard drive. He was sentenced to just five years.
In June, Gordon Sheppard, 35, of Stirling, was convicted of posting more than 900 pictures of himself abusing an eight-year-old.
He is now serving seven years.
"No matter how many we nick, there doesn't seem to be any marked disruption of them," one detective said.
Detective Inspector Brian Ward, the officer in charge of Pilsey, said: "So many computers are being examined and so many suspects are being thrown up. We are in danger of being inundated. We have a department of 22 and it's not enough. We have got to start thinking more about the disruption of this."
By exposing themselves to public gaze via file swapping services, pedophiles whose abuse may never have come to light are now more likely to be caught. But with communications technology developing so rapidly, detectives know that their success in bringing down peer-to-peer child porn networks will quickly drive the users to find new and more sophisticated distribution means.
John Carr, Internet adviser to the children's charity, NCH Action for Children, has warned that encoding of material may be the pedophiles' next bolt-hole.
For Ward, the challenge will be to ensure that by the time the child pornographers get that far, his officers are already there waiting for them.
Congratulations to China’s working class — they have officially entered the “Livestock Feed 2.0” era. While others are still researching how to achieve healthy and balanced diets, China has already evolved to the point where it does not matter whether you are actually eating food, as long as you can swallow it. There is no need for cooking, chewing or making decisions — just tear open a package, add some hot water and in a short three minutes you have something that can keep you alive for at least another six hours. This is not science fiction — it is reality.
A foreign colleague of mine asked me recently, “What is a safe distance from potential People’s Liberation Army (PLA) Rocket Force’s (PLARF) Taiwan targets?” This article will answer this question and help people living in Taiwan have a deeper understanding of the threat. Why is it important to understand PLA/PLARF targeting strategy? According to RAND analysis, the PLA’s “systems destruction warfare” focuses on crippling an adversary’s operational system by targeting its networks, especially leadership, command and control (C2) nodes, sensors, and information hubs. Admiral Samuel Paparo, commander of US Indo-Pacific Command, noted in his 15 May 2025 Sedona Forum keynote speech that, as
In a world increasingly defined by unpredictability, two actors stand out as islands of stability: Europe and Taiwan. One, a sprawling union of democracies, but under immense pressure, grappling with a geopolitical reality it was not originally designed for. The other, a vibrant, resilient democracy thriving as a technological global leader, but living under a growing existential threat. In response to rising uncertainties, they are both seeking resilience and learning to better position themselves. It is now time they recognize each other not just as partners of convenience, but as strategic and indispensable lifelines. The US, long seen as the anchor
Chinese Nationalist Party (KMT) Chairman Eric Chu (朱立倫) last week announced that the KMT was launching “Operation Patriot” in response to an unprecedented massive campaign to recall 31 KMT legislators. However, his action has also raised questions and doubts: Are these so-called “patriots” pledging allegiance to the country or to the party? While all KMT-proposed campaigns to recall Democratic Progressive Party (DPP) lawmakers have failed, and a growing number of local KMT chapter personnel have been indicted for allegedly forging petition signatures, media reports said that at least 26 recall motions against KMT legislators have passed the second signature threshold