Mark Williams-Thomas MA Director - WT Associates Ltd.

Slides:



Advertisements
Similar presentations
Introducing… Global File Registry A subsidiary of Altnet Inc.
Advertisements

Blocking Technologies Teach In Dave Harcourt 14 th April 2011.
MySpace and Online Safety Brian Boies. Agenda  What is MySpace?  Dangers and Realities  Safety Tips.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
 Download music  Doing homework / research  Google  Digital cameras  Gaming sites  Youtube  Social Networking (JD: play video to explain SN here)
BitTorrent Join the swarm! BY: Joe Petruska. What is BitTorrent? a peer-to-peer file sharing protocol used for distributing large amounts of data.
Y Pant School. What does CEOP do? CEOP work in partnership to protect children and young people from sexual exploitation – from the e-world to the real.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Peer to Peer Programming Systems, Protocols, and Economic Models.
Interest in File Sharing at All Time High Article Link Article Link.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Measurement and Diagnosis of Address Misconfigured P2P traffic Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic Lab for Internet and Security.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
P2P WeeSan Lee
Peer To Peer (P2P) And Torrenting James Jenkinson.
The Internet A brief overview Internet - An interconnected system of networks that connects computers around the world via the TCP/IP protocol. What.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
14/03/14 Friars Primary School. » “1) everything that’s already in the world when you’re born is just normal; » 2) anything that gets invented between.
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
LİMEW İRE İntroduction İntroduction Buissness Model Buissness Model Features and Design Features and Design Users and Usage Users and Usage.
Hutton All Saints’ Online Risks and Dangers Workshop WEDNESDAY 19 TH NOVEMBER 2014.
Chasmine King Vocabulary. aggregator a web-based or installed application that aggregates related, frequently updated content from various Internet sources.
A Survey of P2P Filesharing Applications James Kirk CS February 3, 2004.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Your Child and the Internet The Good, The Bad, and the Ugly Presented by Dr. Chris Greer ~ Georgia College and State University.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
بسم الله الرحمن الرحيم The Internet and the World Wide Web.
P2P Report Prepared for Media Defender, Inc.. 2 A larger volume of CD sales in 2006 were lost to borrowing, rather than to P2P How Were Lost CD Sales.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
Detective Inspector Paul Cook Bedfordshire Police Public Protection Unit.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
What is Web 2.0? We, the users, are Web 2.0…we create sites that allow people to interact, exchange, and collaborate with each other via the World Wide.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Combatting Child Sexual Exploitation – the European Approach Europol Rob Wainwright Director Europol Unclassified - Basic Protection Level Europol Public.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
1. When was the first selfie taken? a) 2002b) 1839c) When was the first sent? a)1991b) 1982c) Can you name the popular apps/websites.
Ian McGraw Education Safeguarding Team Surrey County Council.
What does CEOP do? CEOP work in partnership to protect children and young people from sexual exploitation – from the e-world to the real world The corporate.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
E-safety Training Tuesday, 12 th April, Aims of the session: Examine ‘The Digital Landscape’ – current statistics To underline the message of.
Network and hardware revision
Cyberbullying Can be done by anyone to anyone
Home entertainment.
File Sharing Matthew Prenzler.
Uses and Limitations of ICT
Online Filtering, Monitoring and Safe Practice
CLICKCEOP : MSN Messenger Live
PEER TO PEER BitTorrent.
Objectives To understand the about types of computer network
Whilst you are sat down have a think about what are your concerns around keeping your family safe on the internet?
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Mark Williams-Thomas MA Director - WT Associates Ltd

Social Networking Sites Exploited by Child Sex Offenders and Predatory Paedophiles to Abuse Children How can this Phenomenon be Policed? successfully ?

Internet Control May Vernon Coaker- Home Office expecting broadband ISPs to install web- filtering technology voluntarily by the end of next year (2007) but, if this deadline is not met, he would - he hinted strongly - consider legislation to force them to. IWF List- but what if not on the list?

P2P networks -to find and download files located on other P2P users’ hard drive and to share files located on their own computer. P2P -designed to accommodate large numbers of users, and capable of transferring vast amounts of data(images, videos, music) What is Peer to Peer

Peer to Peer sites Most popular networks BitTorrent via uTorrent and Azureus and the trackers & indexing sites Gnutella via Limewire eDonkey network via eMule

Grooming

Andrew LINTERN Andrew Lintern Oxford Scientist 20,000 images 10 years Abused a baby 2 Profiles

Video

Pro actively police Peer to Peer Pro-actively police social networking sites Create a national child sex offenders register Notify ISP, Social Networking sites of offenders names and details Create a national police task force to investigate online paedophiles What needs to be done?

QUESTIONS?