Your role in child abuse

Friday 6 October 14:30 - 15:00, Green room

Mick Moran (An Garda Síochána)



The ever-changing world of ICT has created the perfect environment for those who have a sexual preference for children. Networking amongst themselves, accessing and sharing child abuse material and accessing children themselves are just some of the ways they use ICT. The network of networks including anonymous networks allows all of this abuse to take place in a 'virtual' way but with IRL consequences for many different people, including you. This presentation will take you on a tour of one of the darkest parts of society. Although this world was ably illuminated well by Nabokov in 1955, it is only really being understood now, and even then we fall into the trap of sensationalist headlines and closed minds that continues to stunt a conversation that must be had. 

I will argue that this is as much an infosec issue as a police one, and even try to convince you all that you should be treating it as a threat on your networks in the same way you do malware and spam. Finally, I will circle around to finish on your role in child abuse!

 

 

Mick Moran

I'm a very proud member of An Garda Síochána (pronunciation lessons from Brian Honan). I have been a police officer since 1990 and in that time have worked frontline, serious crime, computer crime and sexual crime investigation. I have been privileged to have worked with INTERPOL where I managed the vulnerable communities sub-directorate covering all aspects of human trafficking, people smuggling and child exploitation especially online.  I am currently the garda liaison officer in Paris where I cover all aspects of crime and national security.

@mickmoran



VB2018 MONTREAL!

VB2017 OVERVIEW

VB2017 SPEAKERS

VB2017 PROGRAMME

2017 PÉTER SZŐR AWARD


Other VB2017 papers

Mariachis and jackpotting: ATM malware from Latin America

Thiago Marques (Kaspersky Lab)

Fabio Assolini (Kaspersky Lab)

Of all the forms of attack against financial institutions in the world, the ones that are most likely to combine traditional…

Keynote address: Inside Cloudbleed

John Graham-Cumming (Cloudflare)

In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…

Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Juan Andres Guerrero-Saade (Kaspersky Lab)
Costin Raiu (Kaspersky Lab)

Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.