01721nas a2200217 4500000000100000000000100001008004100002653002800043653002500071653001500096653001300111653001800124653001000142100001900152700001500171700002300186245006300209300001100272490000700283520121300290 2022 d10aJohanna Parviainen CAM10achild abuse material10acybercrime10adark web10ainvestigation10aOSINT1 aJyri Rajamäki1 aIiro Lahti1 aJohanna Parviainen00aOSINT on the Dark Web: Child Abuse Material Investigations a 21-320 v533 a

The Dark Web allows users to hide their identity while browsing or sending information, providing an ideal environment for transferring information,
goods, and services with potentially illegal intentions. Therefore, Law Enforcement Agencies (LEAs) are interested in Open Source INTelligence (OSINT) on the Dark Web. LEAs need appropriate techniques to find darknet sites used by criminals. This article examines online child sexual exploitation and the various OSINT automation tools that can be exploited on the Dark Web. Additionally, we consider OSINT on the Dark Web, paying attention to the challenges LEAs face when investigating crimes related to child abuse material (CAM). The biggest challenges are related to data storage and the criminal investigation itself. CAM may not be recorded or examined except by an LEA officer specifically designated and trained for this purpose. The study examines how OSINT could be implemented without exposing researchers to the contents of CAM. The method could be to focus the inquiry on already known links and sites. This has challenges, but a bigger number of LEAs could carry out such an inquiry, and the storage of such data would not be illegal.