Question:
child porn, how do people get caught (p2p, etc technical question)?
berdoz
2008-05-14 22:20:24 UTC
First of all I haven't DL any child porn, I am just curious how this works. Actually we have a bet riding on the answers to these:

How do people get caught, let's say they use a p2p program (like limewire)? Is it possible to catch someone downloading it or can you only detect the person sharing the file? IOW is the DLer anonymous or can they be detected? What is the procedure police use (how do they detect people)? Do they go after the sharers or the DLers? or both? Can the police detect you if you DL it from a normal website?

Also something we argued about...let's say you purchase legal porn but the models look underage (for ex., Kitty, the over-20 porn actress that looks like she's underage). I say there's no way to prove it is actually legal porn, although you might be able the "tell" by its production quality. Do you think if police found this kind of porn they'd not know the difference?

Please, no preaching. I just want the answer to this, it's a technical question not a moral.
Ten answers:
James B
2008-05-14 22:51:57 UTC
It honestly boils down to one dude making a mistake that gets the cops onto him and then he's caught. They quickly turn in every one they know in the life trying to avoid the serious jail time looming over their heads. Its one of the reasons those folk are so secretive, they can't trust each other...thank god! I'm glad for every one that gets caught.



They then track back through the arrestees computer records to find where he got them and who he traded with and monitor those connections hoping to get another one. That's the job of a Forensic Computer expert. Way beyond my pay grade.
Theodoric
2015-08-19 05:54:00 UTC
This Site Might Help You.



RE:

child porn, how do people get caught (p2p, etc technical question)?

First of all I haven't DL any child porn, I am just curious how this works. Actually we have a bet riding on the answers to these:



How do people get caught, let's say they use a p2p program (like limewire)? Is it possible to catch someone downloading it or can you only detect the person...
?
2016-11-09 04:11:24 UTC
Youngest Looking Porn Actress
Nikki
2016-03-20 09:28:15 UTC
Well, first off, you HAVE to leave him, it is your responsibility as a MOTHER! He is not fit to be around your children, if you think he is, you are HIGH! Get out, and go home! You can, there are many programs that take care of woman with children, afdc,food stamps,low income or no income housing, shelters, family?? TWO>>he may have erased it all but the fed's can still trace it to his computer, you can still find that stuff on a computer even if its been erased,,,take the computer to a whiz! Get out of there, he's a friggin sicko! PS. he's in the military, all you have to do is contact his commanding officer and he will be investigated..also, they will attach his wages for child support and alimony, get a lawyer fast!
anonymous
2016-04-08 03:55:04 UTC
For the best answers, search on this site https://shorturl.im/avMYE



He loves you and the kids but not quite enough to cause him to learn a lesson from the first mistake. You probably could stay with him and nothing bad may come of it. Maybe he'll never touch a child or never take naughty pics of your kids' friends when they come over. But how will you know? Maybe this is just the beginning of something terrible. There's no telling. He knows it's wrong, but does it anyway. If you want to stay with him, you must go to counseling to get to the bottom of it. If you do not want to take the risk, you just gotta leave and restart your life.
anonymous
2014-08-06 13:43:53 UTC
I actually published a book on this topic called 'Catch Me If You Know How' (see raving reviews on Amazon). Law enforcement catches file sharing users by joining the file sharing network themselves and downloading what is being shared. They then use specialized software that tracks the IP address of all who shares these known files and also the IP address of those who grab these files for downloading (since they too have a copy of the offending files).



Additionally, they will target known offenders and monitor those users IP with traffic monitoring software (supposedly they need to have a warrant for this) which in turn shows what other IP's he/she is sharing with. This snoop software can be installed on their computer and simply "listen" for traffic to/from your own computer by being on the same network as you (your ISP's network, not your home network). This allows law enforcement to monitor a specific computers' traffic without installing anything on your computer or in your home. But this method can get hairy since they still have the burden of proof that you are the offender. I say this because imagine how many pedophile suse a neighbors WiFi or how do they know what person in a home was sharing the files?



For the offenders, they often hide their internet traffic by using a proxy or VPN service that encrypts their traffic so it cannot be sniffed, even by the experts of your own ISP. They also have their IP address masked by the proxy or VPN service provider making them appear to be physically somewhere else in the world.



Travis Morgan
MICHAEL B
2008-05-15 00:18:45 UTC
If you've ever heard of NAMBLA (it's a kiddie porn organization for queer men, yuck!) for every 10,000 members, 5000 are cops posing as queer pedophiles to snag real pedophiles. They also track kiddie porn sites-not adult sites with young looking women. And every now and then, some retard takes his computer into Best Buy and the nerds trip over the kiddie porn and call the cops. If you're dumb enough to give the evidence to someone who'll probably find it, you deserve to get caught.
j H
2008-05-14 23:13:34 UTC
There is also "pending" legislation that if you take your computer in for repairs and they spot something on your computer such as child porn, they will have to report it.



I disagree with this however because you then give them the authority to scan your hard drives looking for this. I feel that is an invasion of privacy as who knows what personal information they will also find and "use"
John T
2008-05-14 22:32:50 UTC
Lots of infiltration. Groups generally have databases and trade images to one another. An undercover operator joins the group, gathers information, and then a sweep picks them up.
Steven C
2008-05-14 22:24:28 UTC
There are sites set up by the governemnt that have tracking cookies that know who and where you are. Then they knock on your door and get you.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...