In Ohio, a 400-pound man, likewise, uses a Web site to impersonate a 15-year-old boy in order to convince a 12-year-old girl to send photographs and videotapes of herself naked. Social networking over the Web has helped connect millions of Internet users, but all of this online interaction can also have a serious downside: a proliferation of pedophiles who use code words to trade in child pornography or prowl chat rooms and befriend underage victims, peppering their messages with words like "kewl" and other youthful colloquialisms.
In a move that pits technology against criminals (and, some fear, privacy), a group of researchers at Lancaster University in England and law-enforcement officials at the United Kingdom's Child Exploitation and Online Protection Center (CEOP) is developing software that tracks the Web's evolving child pornography lexicon as well as predators' chat strategies to help law-enforcement agencies catch the most secretive of these criminals before they strike.
Instant messaging, and commenting served as the new mode of online communication, and chat rooms came to be seen as unpleasantly tacky rather than commonly useful.
Sure, you may see chat rooms around today, but most of them are either used by a specific group or individuals just wanting to get – – a show. You probably know that they aren’t necessarily dead – they just aren’t the public channel of text-form conversation.
FLEXI DJIt all started back when I was 14 years old and got hooked on the early warehouse and acid house sounds.
I got hold of some mis-matched belt drives and a shoddy mixer and started to play everywhere I could; house parties, barn raves and so on.
Alternatively you can use the Java applet here which will take you directly to the chat room.
You'll need a copy of m IRC which you can obtain from
"There's so much activity it's virtually impossible to police," he says. Rashid's strategy is to create automated monitoring tools that operators of chat rooms, social networks, and file-sharing networks would install on their sites.
This will provide law-enforcement officials with an automatically updating dictionary of these code words, along with an alert system which will inform them when users are detected masquerading as children.
In preparation to write the software module for file-sharing networks (a prototype by the end of the year), the team sifted through an entire month of search traffic on the number one peer-to-peer file-sharing network, Gnutella, between February 27th and March 27th 2005.
Because each peer participates in routing network messages to and from other peers, Rashid's team could set up a specialized client to intercept and log these queries throughout large segments of the network.