Allsup, R., Thomas, E., Monk, B., Frank, R., & Bouchard, M. (2015). Networking in child exploitation: assessing disruption strategies using registrant information. Proceedings from The 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 400-407. Paris, France: ASONAM.

This research utilizes social network analysis to determine the success of three different disruption strategies on a child exploitation network extracted from the public internet. Using a custom-written web-crawler called LECEN, data from a set of hyperlinked child-exploitation websites was collected from the Internet. From these data, two types of networks were coded: the nodes…

Read More »

Bouchard, M. (2014). Outils et méthodes pour la construction et l’analyse des réseaux illicites sur Internet. Revue Internationale de Criminologie et de Police Technique et Scientifique, 67, 317-337.

On sait maintenant que l’arrivée du Web a complètement changé la donne en ce qui concerne l’exploitation des jeunes à des fins sexuelles, alors que pédophiles et autres amateurs de pornographie juvénile profitent désormais de la toile pour consommer, distribuer, échanger du matériel. Ils profitent également de ces réseaux virtuels pour «socialiser» avec d’autres qui…

Read More »

Bouchard, M., Joffres, K., Frank, R. (2014). Preliminary analytical considerations in designing a terrorism and extremism online network extractor. Pp. 171-184 in V. Mago and V. Dabbaghian, and (Eds), Computational Models of Complex Systems. New York: Springer.

It is now widely understood that extremists use the Internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet. In particular, this chapter will focus on how TENE may help differentiate…

Read More »

Westlake, B., Bouchard, M., Frank, R. (2012). Comparing methods for detecting child exploitation content online. Proceedings of the EISIC – European Intelligence and Security Informatics, Odense, 156-163.

The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content….

Read More »

Westlake, B., Bouchard, M., Frank, R. (2011). Finding the key players in online child exploitation networks. Policy and Internet, 3(6), 1-32.

The growth of the Internet has been paralleled with a similar growth in online child exploitation. Since completely shutting down child exploitation websites is difficult (or arguably impossible), the goal must be to find the most efficient way of identifying the key targets and then to apprehend them. Traditionally, online investigations have been manual and…

Read More »

Joffres, K., Bouchard, M., Frank, R., Westlake, B. (2011). Strategies to disrupt online child exploitation networks. Proceedings of the EISIC – European Intelligence and Security Informatics, Athens, September 2011, pp. 163-170.

This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found…

Read More »

Frank, R., Westlake, B., Bouchard, M. (2010). The structure and content of online child exploitation networks. Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD 2010).

The emergence of the Internet has provided people with the ability to find and communicate with others of common interests. Unfortunately, those involved in the practices of child exploitation have also received the same benefits. Although law enforcement continues its efforts to shut down websites dedicated to child exploitation, the problem remains uncurbed. Despite this,…

Read More »