LEXO PA REKLAMA!

SHKARKO APP

Careful! Pedophiles use computer cameras to molest minors online

2023-05-07 22:30:00, Blog Eden Kamar & Christian Jordan Howell

Careful! Pedophiles use computer cameras to molest minors online

According to the Internet Watch foundation, since 2019 there has been a 10-fold increase in sexual abuse images created by internet-connected cameras or other recording devices worldwide. Social media sites and chat rooms are the most common methods used to facilitate contact with children.

And abuse happens both online and offline. Increasingly, pedophiles are using advances in technology to sexually molest children. Once he has gained access to a child's cell phone or computer camera, he can use it to record, produce and distribute child pornography.

We are criminologists who study cybercrime and cyber security. Our latest scam aimed to examine the methods online pedophiles use to infiltrate online shadow cams used by children. We were introduced to the Internet as children to observe pedophiles active on the net.

We started by creating some automated chatbots disguised as 13-year-old girls. We placed these chatbots as bait for online pedophiles in various chat rooms often used by children to socialize with their peers. They never started conversations and were programmed to only respond to users who identified themselves as over 18.

We programmed the bots to start each conversation by indicating their age, gender and location. This is a common practice in chatroom culture, and ensured that the recorded conversations were with adults over the age of 18 who were knowingly and willingly chatting with a minor.

Although it is possible that some subjects were minors and presented as adults, previous studies show that online pedophiles usually appear younger than they actually are, not older.

In total, our chatbots recorded 953 conversations with self-identified adults who were told they were talking to a 13-year-old girl. Almost all the conversations were of a sexual nature with an emphasis on the cameras. Some of them were clear in their desires and immediately offered payment for videos of the child performing erotic acts.

Others tried to get videos from them with promises of love and relationships in the future. In addition to these commonly used tactics, we found that 39 percent of conversations included an unsolicited link. We also performed a forensic investigation of the links and found that 19 percent (71 links) were associated with a malware virus, 5 percent (18 links) led to phishing websites aimed at hacking children's devices, and 41 for percent (154 links) were linked to a video conferencing platform from a company in Norway.

It was immediately clear to us how some of these connections could help a pedophile victimize a child. Online pedophiles use malware to compromise a child's computer system and gain remote access to their webcam.

Bait sites are used to collect personal information, which may assist the pedophile in victimizing their target. For example, attacks with this method could give a bully access to a child's computer password, which could be used to remotely control the child's camera.

At first, it was unclear why the Whereby platform was preferred by pedophiles. But upon further investigation, we discovered that pedophiles could exploit known features on the Whereby platform to view and record children without their consent.

This method of attack can facilitate online sexual abuse. The perpetrator does not need to be technically savvy or a manipulator to gain access to a child's webcam. Meanwhile, someone who is able to convince a victim to visit a seemingly harmless site can also gain control of the child's camera.

Once they have access to the camera, a predator can abuse the child by watching and recording it without their consent. Based on our analysis, it's possible for predators to use Whereby to control a child's webcam, embedding a live video stream on a website of their choosing.

We ran a test with an embedded account on Whereby, which showed that the account host can embed code that allows them to turn on the visitor's camera. The test confirmed that it is possible to turn on a visitor's camera without their knowledge. On the other hand, we have found no evidence to suggest that other major video conferencing platforms, such as Zoom, BlueJeans, WebEx, GoogleMeet, GoTo Meeting and Microsoft Teams, can be exploited in this way.

Control of the visitor's camera and microphone is limited within the Whereby platform. There are icons that show when the camera and microphone are on. However, children may not be aware of the camera and microphone indicators, and would be at risk if they switch browser tabs without exiting the Whereby platform or closing that tab.

In this scenario, a child would not be aware that the interlocutor was controlling his camera and microphone. Children's awareness is the first step towards a safe and trustworthy cyberspace.

We are reporting these methods of attack so that parents and policy makers can protect and educate an otherwise vulnerable population. Now that video conferencing platform companies are aware of these exploits, they can reconfigure their platforms to avoid such exploitation.

There are several ways people can spy on you through your camera. For starters, always cover your child's webcam. Although this does not prevent sexual abuse, it does prevent predatory pedophiles from spying on a camera.

You should also monitor your child's online activity. The anonymity offered by social media sites and chat rooms that facilitate initial contact can lead to online sexual abuse. Strangers on the Internet remain the same, so teach your child about the danger that comes from strangers./ "The Conversation" - Translated and adapted by CNA.al

Lajmet e fundit nga