Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl


2010 | 2(2) | 221-228

Article title

Application оf the Fairyplay Operation System to Counter Child Pornography

Title variants

Languages of publication


Capabilities of monitoring P2P networks for illegal content sharing have increased substantially with the databases containing illegal content information reaching their operational capacity. Easy data gathering and processing has become possible thanks to the employment of the hash function.. Unfortunately the law enforcement agencies and p2p users are locked up in a sort of an arms race. With the steady rise in monitoring capabilities grows the number of processed files stemming from the ever increasing popularity of the video recording equipment. At the same time vast majority of the existing systems do not allow for fast and effective transfer of monitored information. Identified illegal files added to a hash cache in Norway not necessarily find the way to a data bank in Portugal. With the amount of data growing exponentially international law enforcement community concurred on creating platforms to effectively collaborate and share information about the files containing illegal content. American company TLO devised a system supporting p2p networks monitoring and user identification procedures in the area of child pornography. The system is a set of extremely useful instruments that may dramatically enhance the effectiveness of child porn countering. Great recommendation of the system is its successful application by the law enforcement agencies in the USA, United Kingdom, Denmark, Norway and Sweden.





Physical description



Document Type

Publication order reference


YADDA identifier

JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.