Just in Plain Sight: Unveiling CSAM Distribution Campaigns on the Clear Web
- URL: http://arxiv.org/abs/2511.03816v1
- Date: Wed, 05 Nov 2025 19:30:19 GMT
- Title: Just in Plain Sight: Unveiling CSAM Distribution Campaigns on the Clear Web
- Authors: Nikolaos Lykousas, Constantinos Patsakis,
- Abstract summary: After the COVID-19 pandemic, there is a huge surge in the distribution of child sexual abuse material (CSAM)<n>Traditionally, the exchange of such material is performed on the dark web, as it provides many privacy guarantees that facilitate illicit trades.<n>The introduction of end-to-end encryption platforms has brought it to the deep web.
- Score: 5.758073912084364
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Child sexual abuse is among the most hideous crimes, yet, after the COVID-19 pandemic, there is a huge surge in the distribution of child sexual abuse material (CSAM). Traditionally, the exchange of such material is performed on the dark web, as it provides many privacy guarantees that facilitate illicit trades. However, the introduction of end-to-end encryption platforms has brought it to the deep web. In this work, we report our findings for a campaign of spreading child sexual abuse material on the clear web. The campaign utilized at least 1,026 web pages for at least 738,286 registered users. Our analysis details the operation of such a campaign, showcasing how social networks are abused and the role of bots, but also the bypasses that are used. Going a step further and exploiting operational faults in the campaign, we gain insight into the demand for such content, as well as the dynamics of the user network that supports it.
Related papers
- Characterizing Event-themed Malicious Web Campaigns: A Case Study on War-themed Websites [5.344218760540407]
Cybercriminals often abuse various global or regional events as themes of their fraudulent activities to breach user trust.<n>This paper investigates how to characterize event-themed malicious website-based campaigns.<n>We find that attackers tailor their attacks by exploiting the unique aspects of events.
arXiv Detail & Related papers (2025-09-29T19:07:15Z) - On the Use of Proxies in Political Ad Targeting [49.61009579554272]
We show that major political advertisers circumvented mitigations by targeting proxy attributes.
Our findings have crucial implications for the ongoing discussion on the regulation of political advertising.
arXiv Detail & Related papers (2024-10-18T17:15:13Z) - Differentially Private Data Release on Graphs: Inefficiencies and Unfairness [48.96399034594329]
This paper characterizes the impact of Differential Privacy on bias and unfairness in the context of releasing information about networks.
We consider a network release problem where the network structure is known to all, but the weights on edges must be released privately.
Our work provides theoretical foundations and empirical evidence into the bias and unfairness arising due to privacy in these networked decision problems.
arXiv Detail & Related papers (2024-08-08T08:37:37Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - Unveiling Local Patterns of Child Pornography Consumption in France
using Tor [0.6749750044497731]
We analyze local patterns of child pornography consumption across 1341 French communes in 20 metropolitan regions of France using fine-grained mobile traffic data of Tor network-related web services.
We estimate that approx. 0.08 % of Tor mobile download traffic observed in France is linked to the consumption of child sexual abuse materials by correlating it with local-level temporal porn consumption patterns.
arXiv Detail & Related papers (2023-10-17T09:31:26Z) - Understanding writing style in social media with a supervised
contrastively pre-trained transformer [57.48690310135374]
Online Social Networks serve as fertile ground for harmful behavior, ranging from hate speech to the dissemination of disinformation.
We introduce the Style Transformer for Authorship Representations (STAR), trained on a large corpus derived from public sources of 4.5 x 106 authored texts.
Using a support base of 8 documents of 512 tokens, we can discern authors from sets of up to 1616 authors with at least 80% accuracy.
arXiv Detail & Related papers (2023-10-17T09:01:17Z) - Dark Web Activity Classification Using Deep Learning [0.0]
We propose a search engine that employs deep learning to detect the titles of activities on the dark web.
We focus on five categories of activities, including drug trading, weapon trading, selling stolen bank cards, selling fake IDs, and selling illegal currencies.
Our aim is to extract relevant images from websites with a ".onion" extension and identify the titles of websites without images by extracting keywords from the text of the pages.
arXiv Detail & Related papers (2023-05-30T14:39:32Z) - Reporting Revenge Porn: a Preliminary Expert Analysis [0.0]
We present a preliminary expert analysis of the process for reporting revenge porn abuses in selected content sharing platforms.
Among these, we included social networks, image hosting websites, video hosting platforms, forums, and pornographic sites.
arXiv Detail & Related papers (2021-06-23T08:08:59Z) - hBert + BiasCorp -- Fighting Racism on the Web [58.768804813646334]
We are releasing BiasCorp, a dataset containing 139,090 comments and news segment from three specific sources - Fox News, BreitbartNews and YouTube.
In this work, we present hBERT, where we modify certain layers of the pretrained BERT model with the new Hopfield Layer.
We are also releasing a JavaScript library and a Chrome Extension Application, to help developers make use of our trained model in web applications.
arXiv Detail & Related papers (2021-04-06T02:17:20Z) - Keystroke Biometrics in Response to Fake News Propagation in a Global
Pandemic [77.79066811371978]
This work proposes and analyzes the use of keystroke biometrics for content de-anonymization.
Fake news have become a powerful tool to manipulate public opinion, especially during major events.
arXiv Detail & Related papers (2020-05-15T17:56:11Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.