The Times Australia
The Times World News

.

How the world's biggest dark web platform spreads millions of items of child sex abuse material — and why it's hard to stop

  • Written by Roderic Broadhurst, Chair Professor, Australian National University

Child sexual abuse material is rampant online, despite considerable efforts by[1] big tech companies and governments to curb it. And according to reports, it has only become more prevalent[2] during the COVID-19 pandemic.

This material is largely hosted on the anonymous part of the internet — the “darknet” - where perpetrators can share it with little fear of prosecution. There are currently a few platforms offering anonymous internet access, including i2p[3], FreeNet[4] and Tor[5].

Tor is by far the largest and presents the biggest conundrum. The open-source network and browser grants users anonymity by encrypting their information and letting them escape tracking by internet service providers.

Online privacy advocates[6] including Edward Snowden have championed the benefits of such platforms, claiming they protect free speech, freedom of thought and civil rights. But they have a dark side, too.

Tor’s perverted underworld

The Tor Project[7] was initially developed by the US Navy to protect online intelligence communications, before its code was publicly released in 2002. The Tor Project’s developers have acknowledged the potential to misuse the service which, when combined with technologies such as untraceable cryptocurrency[8], can help hide criminals.

Read more: Explainer: what is the dark web?[9]

Tor is an overlay network that exists “on top” of the internet and merges two technologies. The first is the onion service software. These are the websites, or “onion services”, hosted on the Tor network. These sites require an onion address and their servers’ physical locations are hidden from users.

The second is Tor’s privacy-maximising browser. It enables users to browse the internet anonymously by hiding their identity and location. While the Tor browser is needed to access onion services, it can also be used to browse the “surface” internet.

Accessing the Tor network is simple. And while search engine options are limited (there’s no Google), discovering onion services is simple, too. The BBC[10], New York Times, ProPublica, Facebook, the CIA and Pornhub all have a verified presence on Tor, to name a few.

Service dictionaries such as “The Hidden Wiki” list addresses on the network, allowing users to discover other (often illicit) services.

Hidden Wiki main page screenshot. The Hidden Wiki main page. Wikimedia Commons

Child sex abuse material and abuse porn is prevalent

The number of onion services active on the Tor network is unknown, although the Tor Project estimates about 170,000 active addresses. The architecture of the network allows partial monitoring of the network traffic and a summary of which services are visited. Among the visited services, child sex abuse material is common.

Of the estimated[11] 2.6 million users that use the Tor network daily, one study[12] reported only 2% (52,000) of users accessed onion services. This suggests most users access the network to retain their online privacy[13], rather than use anonymous onion services.

That said, the same study found from a single data capture that about 80% of traffic to onion services was directed to services which did offer illegal porn, abuse images and/or child sex abuse material.

Another study[14] estimated 53.4% of the 170,000 or so active onion domains contained legal content, suggesting 46.6% of services had content which was either illegal, or in a grey area.

Although scams make up a significant proportion of these services, cryptocurrency services, drug deals, malware, weapons, stolen credentials, counterfeit products and child sex abuse material also feature in this dark part of the internet.

Only about 7.5% of the child sex abuse material on the Tor network is estimated to be[15] sold for a profit. The majority of those involved aren’t in it for money, so most of this material is simply swapped. That said, some services have started[16] charging fees for content.

Several high-profile onion services hosting child sex abuse material have been shut down[17] following extensive cross-jurisdictional law enforcement operations, including The Love Zone website in 2014, PlaypEn in 2015 and Child’s Play in 2017.

A recent effort led by German police, and involving others including Australian Federal Police, Europol and the FBI, resulted in the shutdown of the illegal website [Boystown](https://en.wikipedia.org/wiki/Boystown_(website) in May.

But one of the largest child sex abuse material forums on the internet (not just Tor) has evaded law enforcement (and activist) takedown attempts for a decade. As of last month it had 508,721 registered users. And since 2013 it has hosted over a million pictures and videos of child sex abuse material and abuse porn.

The paedophile (eroticisation of pre-pubescent children), haebephile (pubescent children) and ephebophile (adolescents) communities are among the early adopters of anonymous discussion forums on Tor. Forum members distribute media, support each other and exchange tips to avoid police detection and scams targeting them.

The WeProtect Alliance[18]’s 2019 Global Threat Assessment report[19] estimated there were more than 2.88 million users on ten forums dedicated to paedophilia and paraphilia interests operating via onion services.

Countermeasures

There are huge challenges for law enforcement trying to prosecute those who produce and/or distribute child sex abuse material online. Such criminal activity typically falls across multiple jurisdictions, making detection and prosecution difficult.

Undercover operations and novel online investigative techniques are essential. One example is targeted “hacks” which offer law enforcement back-door access to sites or forums hosting child sex abuse material.

Such operations are facilitated by cybercrime[20] and transnational organised crime[21] treaties which address child sex abuse material and the trafficking of women and children.

Given the volatile nature of many onion services, a focus on onion directories and forums may help with harm reduction. Little is known about child sex abuse material forums on Tor, or the extent to which they influence onion services hosting this material.

Apart from coordinating to avoid detection, forum users can also share information about police activity, rate onion service vendors, share sites and expose scams targeting them.

The monitoring of forums by outsiders can lead to actionable interventions, such as the successful profiling of active offenders. Some agencies have explored using undercover law enforcement officers, civil society, or NGO experts (such as from the WeProtect Global Alliance[22] or ECPAT International[23]) to promote self-regulation within these groups.

While there is a lack of research on this, reformed or recovering offenders can also provide counsel to others. Some sub-forums seek to offer education, encourage treatment and reduce harm — usually by focusing on the legal and health issues associated with consuming child sex abuse material, and ways to control urges and avoid stimuli.

Other contraband services also play a role. For instance, onion services dedicated to drug, malware or other illicit trading usually ban child sex abuse material that creeps in.

Why does the Tor network allow such abhorrent material to remain, despite extensive opposition — sometimes even from those within these groups? Surely those representing Tor have read complaints in the media, if not survivor[24] reports about child sex abuse material.

Read more: The darknet – a wild west for fake coronavirus 'cures'? The reality is more complicated (and regulated)[25]

References

  1. ^ considerable efforts by (www.blog.google)
  2. ^ more prevalent (www.weprotect.org)
  3. ^ i2p (geti2p.net)
  4. ^ FreeNet (freenetproject.org)
  5. ^ Tor (www.torproject.org)
  6. ^ Online privacy advocates (theintercept.com)
  7. ^ Tor Project (support.torproject.org)
  8. ^ untraceable cryptocurrency (www.getmonero.org)
  9. ^ Explainer: what is the dark web? (theconversation.com)
  10. ^ BBC (www.bbc.com)
  11. ^ estimated (metrics.torproject.org)
  12. ^ one study (ietresearch.onlinelibrary.wiley.com)
  13. ^ retain their online privacy (www.pnas.org)
  14. ^ study (dsimg.ubm-us.net)
  15. ^ estimated to be (cj.msu.edu)
  16. ^ some services have started (www.europol.europa.eu)
  17. ^ shut down (www.vice.com)
  18. ^ WeProtect Alliance (www.weprotect.org)
  19. ^ Global Threat Assessment report (www.end-violence.org)
  20. ^ cybercrime (www.coe.int)
  21. ^ transnational organised crime (www.unodc.org)
  22. ^ WeProtect Global Alliance (www.weprotect.org)
  23. ^ ECPAT International (www.ecpat.org)
  24. ^ survivor (www.protectchildren.ca)
  25. ^ The darknet – a wild west for fake coronavirus 'cures'? The reality is more complicated (and regulated) (theconversation.com)

Read more https://theconversation.com/how-the-worlds-biggest-dark-web-platform-spreads-millions-of-items-of-child-sex-abuse-material-and-why-its-hard-to-stop-167107

Times Magazine

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

From Beach Bops to Alpine Anthems: Your Sonos Survival Guide for a Long Weekend Escape

Alright, fellow adventurers and relaxation enthusiasts! So, you've packed your bags, charged your devices, and mentally prepared for that glorious King's Birthday long weekend. But hold on, are you really ready? Because a true long weekend warrior kn...

Effective Commercial Pest Control Solutions for a Safer Workplace

Keeping a workplace clean, safe, and free from pests is essential for maintaining productivity, protecting employee health, and upholding a company's reputation. Pests pose health risks, can cause structural damage, and can lead to serious legal an...

The Times Features

Exploring the Curriculum at a Modern Junior School in Melbourne

Key Highlights The curriculum at junior schools emphasises whole-person development, catering to children’s physical, emotional, and intellectual needs. It ensures early year...

Distressed by all the bad news? Here’s how to stay informed but still look after yourself

If you’re feeling like the news is particularly bad at the moment, you’re not alone. But many of us can’t look away – and don’t want to. Engaging with news can help us make ...

The Role of Your GP in Creating a Chronic Disease Management Plan That Works

Living with a long-term condition, whether that is diabetes, asthma, arthritis or heart disease, means making hundreds of small decisions every day. You plan your diet against m...

Troubleshooting Flickering Lights: A Comprehensive Guide for Homeowners

Image by rawpixel.com on Freepik Effectively addressing flickering lights in your home is more than just a matter of convenience; it's a pivotal aspect of both home safety and en...

My shins hurt after running. Could it be shin splints?

If you’ve started running for the first time, started again after a break, or your workout is more intense, you might have felt it. A dull, nagging ache down your shins after...

Metal Roof Replacement Cost Per Square Metre in 2025: A Comprehensive Guide for Australian Homeowners

In recent years, the trend of installing metal roofs has surged across Australia. With their reputation for being both robust and visually appealing, it's easy to understand thei...