The Times Australia
The Times World News

.

How the world's biggest dark web platform spreads millions of items of child sex abuse material — and why it's hard to stop

  • Written by Roderic Broadhurst, Chair Professor, Australian National University

Child sexual abuse material is rampant online, despite considerable efforts by[1] big tech companies and governments to curb it. And according to reports, it has only become more prevalent[2] during the COVID-19 pandemic.

This material is largely hosted on the anonymous part of the internet — the “darknet” - where perpetrators can share it with little fear of prosecution. There are currently a few platforms offering anonymous internet access, including i2p[3], FreeNet[4] and Tor[5].

Tor is by far the largest and presents the biggest conundrum. The open-source network and browser grants users anonymity by encrypting their information and letting them escape tracking by internet service providers.

Online privacy advocates[6] including Edward Snowden have championed the benefits of such platforms, claiming they protect free speech, freedom of thought and civil rights. But they have a dark side, too.

Tor’s perverted underworld

The Tor Project[7] was initially developed by the US Navy to protect online intelligence communications, before its code was publicly released in 2002. The Tor Project’s developers have acknowledged the potential to misuse the service which, when combined with technologies such as untraceable cryptocurrency[8], can help hide criminals.

Read more: Explainer: what is the dark web?[9]

Tor is an overlay network that exists “on top” of the internet and merges two technologies. The first is the onion service software. These are the websites, or “onion services”, hosted on the Tor network. These sites require an onion address and their servers’ physical locations are hidden from users.

The second is Tor’s privacy-maximising browser. It enables users to browse the internet anonymously by hiding their identity and location. While the Tor browser is needed to access onion services, it can also be used to browse the “surface” internet.

Accessing the Tor network is simple. And while search engine options are limited (there’s no Google), discovering onion services is simple, too. The BBC[10], New York Times, ProPublica, Facebook, the CIA and Pornhub all have a verified presence on Tor, to name a few.

Service dictionaries such as “The Hidden Wiki” list addresses on the network, allowing users to discover other (often illicit) services.

Hidden Wiki main page screenshot. The Hidden Wiki main page. Wikimedia Commons

Child sex abuse material and abuse porn is prevalent

The number of onion services active on the Tor network is unknown, although the Tor Project estimates about 170,000 active addresses. The architecture of the network allows partial monitoring of the network traffic and a summary of which services are visited. Among the visited services, child sex abuse material is common.

Of the estimated[11] 2.6 million users that use the Tor network daily, one study[12] reported only 2% (52,000) of users accessed onion services. This suggests most users access the network to retain their online privacy[13], rather than use anonymous onion services.

That said, the same study found from a single data capture that about 80% of traffic to onion services was directed to services which did offer illegal porn, abuse images and/or child sex abuse material.

Another study[14] estimated 53.4% of the 170,000 or so active onion domains contained legal content, suggesting 46.6% of services had content which was either illegal, or in a grey area.

Although scams make up a significant proportion of these services, cryptocurrency services, drug deals, malware, weapons, stolen credentials, counterfeit products and child sex abuse material also feature in this dark part of the internet.

Only about 7.5% of the child sex abuse material on the Tor network is estimated to be[15] sold for a profit. The majority of those involved aren’t in it for money, so most of this material is simply swapped. That said, some services have started[16] charging fees for content.

Several high-profile onion services hosting child sex abuse material have been shut down[17] following extensive cross-jurisdictional law enforcement operations, including The Love Zone website in 2014, PlaypEn in 2015 and Child’s Play in 2017.

A recent effort led by German police, and involving others including Australian Federal Police, Europol and the FBI, resulted in the shutdown of the illegal website [Boystown](https://en.wikipedia.org/wiki/Boystown_(website) in May.

But one of the largest child sex abuse material forums on the internet (not just Tor) has evaded law enforcement (and activist) takedown attempts for a decade. As of last month it had 508,721 registered users. And since 2013 it has hosted over a million pictures and videos of child sex abuse material and abuse porn.

The paedophile (eroticisation of pre-pubescent children), haebephile (pubescent children) and ephebophile (adolescents) communities are among the early adopters of anonymous discussion forums on Tor. Forum members distribute media, support each other and exchange tips to avoid police detection and scams targeting them.

The WeProtect Alliance[18]’s 2019 Global Threat Assessment report[19] estimated there were more than 2.88 million users on ten forums dedicated to paedophilia and paraphilia interests operating via onion services.

Countermeasures

There are huge challenges for law enforcement trying to prosecute those who produce and/or distribute child sex abuse material online. Such criminal activity typically falls across multiple jurisdictions, making detection and prosecution difficult.

Undercover operations and novel online investigative techniques are essential. One example is targeted “hacks” which offer law enforcement back-door access to sites or forums hosting child sex abuse material.

Such operations are facilitated by cybercrime[20] and transnational organised crime[21] treaties which address child sex abuse material and the trafficking of women and children.

Given the volatile nature of many onion services, a focus on onion directories and forums may help with harm reduction. Little is known about child sex abuse material forums on Tor, or the extent to which they influence onion services hosting this material.

Apart from coordinating to avoid detection, forum users can also share information about police activity, rate onion service vendors, share sites and expose scams targeting them.

The monitoring of forums by outsiders can lead to actionable interventions, such as the successful profiling of active offenders. Some agencies have explored using undercover law enforcement officers, civil society, or NGO experts (such as from the WeProtect Global Alliance[22] or ECPAT International[23]) to promote self-regulation within these groups.

While there is a lack of research on this, reformed or recovering offenders can also provide counsel to others. Some sub-forums seek to offer education, encourage treatment and reduce harm — usually by focusing on the legal and health issues associated with consuming child sex abuse material, and ways to control urges and avoid stimuli.

Other contraband services also play a role. For instance, onion services dedicated to drug, malware or other illicit trading usually ban child sex abuse material that creeps in.

Why does the Tor network allow such abhorrent material to remain, despite extensive opposition — sometimes even from those within these groups? Surely those representing Tor have read complaints in the media, if not survivor[24] reports about child sex abuse material.

Read more: The darknet – a wild west for fake coronavirus 'cures'? The reality is more complicated (and regulated)[25]

References

  1. ^ considerable efforts by (www.blog.google)
  2. ^ more prevalent (www.weprotect.org)
  3. ^ i2p (geti2p.net)
  4. ^ FreeNet (freenetproject.org)
  5. ^ Tor (www.torproject.org)
  6. ^ Online privacy advocates (theintercept.com)
  7. ^ Tor Project (support.torproject.org)
  8. ^ untraceable cryptocurrency (www.getmonero.org)
  9. ^ Explainer: what is the dark web? (theconversation.com)
  10. ^ BBC (www.bbc.com)
  11. ^ estimated (metrics.torproject.org)
  12. ^ one study (ietresearch.onlinelibrary.wiley.com)
  13. ^ retain their online privacy (www.pnas.org)
  14. ^ study (dsimg.ubm-us.net)
  15. ^ estimated to be (cj.msu.edu)
  16. ^ some services have started (www.europol.europa.eu)
  17. ^ shut down (www.vice.com)
  18. ^ WeProtect Alliance (www.weprotect.org)
  19. ^ Global Threat Assessment report (www.end-violence.org)
  20. ^ cybercrime (www.coe.int)
  21. ^ transnational organised crime (www.unodc.org)
  22. ^ WeProtect Global Alliance (www.weprotect.org)
  23. ^ ECPAT International (www.ecpat.org)
  24. ^ survivor (www.protectchildren.ca)
  25. ^ The darknet – a wild west for fake coronavirus 'cures'? The reality is more complicated (and regulated) (theconversation.com)

Read more https://theconversation.com/how-the-worlds-biggest-dark-web-platform-spreads-millions-of-items-of-child-sex-abuse-material-and-why-its-hard-to-stop-167107

Times Magazine

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

The Times Features

Flipping vs. Holding: Which Investment Strategy Is Right for You?

Are you wondering whether flipping a property or holding onto it is the better investment strategy? The answer isn’t one-size-fits-all. Both strategies have distinct advantages a...

Why Everyone's Talking About Sea Moss - And Should You Try It Too?

Sea moss - a humble marine plant that’s been used for centuries - is making a major comeback in modern wellness circles. And it’s not just a trend. With growing interest from athle...

A Guide to Smarter Real Estate Accounting: What You Might Be Overlooking

Real estate accounting can be a complex terrain, even for experienced investors and property managers. From tracking rental income to managing property expenses, the financial in...

What Is the Dreamtime? Understanding Aboriginal Creation Stories Through Art

Aboriginal culture is built on the deep and important meaning of Dreamtime, which links beliefs and history with the elements that make life. It’s not just myths; the Dreamtime i...

How Short-Term Lenders Offer Long-Lasting Benefits in Australia

In the world of personal and business finance, short-term lenders are often viewed as temporary fixes—quick solutions for urgent cash needs. However, in Australia, short-term len...

Why School Breaks Are the Perfect Time to Build Real Game Skills

School holidays provide uninterrupted time to focus on individual skill development Players often return sharper and more confident after structured break-time training Holid...