The agency receives very few reports from the public about child abuse images and videos on P2P networks, and instead get the majority of their reports from Internet industry sources and other non-public sources. To avoid detection, offenders are now increasingly using file encryption software to mask the content being shared on P2P networks; even if investigators download the files, they cannot decrypt them to see their contents.
"This is increasingly pertinent with certain developments in technology that offenders have adapted and adopted to suit their purposes. The key developments that are particularly suited to being exploited by offenders are wireless technology (which we have reported on previously but about which we are now receiving increasing reports) and the use of 'off the shelf' encryption."
In addition to off-the-shelf encryption, there also has been an increase in the use of pro-privacy services, such as TOR, in order to avoid being tracked down. CEOP indicated however that these technologies are used mostly, and increasingly by by innocent everyday Internet users for legitimate purposes.
"There is a general trend for people to become more aware of their privacy when interacting online and perhaps the likelihood that manufacturers will move towards everyday encryption as standard," the report said.