A website or webpage made up of adverts for other websites with text links or images that take you to third-party websites when you click on them.
A blog is a discussion or information site made up of separate entries, or posts. Most are interactive, and visitors can leave comments and even message each other on the blog. The interactivity is what makes them different from other static websites.
The Child Abuse Image Database (CAID) is a project led by the Home Office which will enable UK law enforcement to assess, categorise and generate unique hashes for tens of millions of child abuse images and videos found during their investigations.
|A||Images involving penetrative sexual activity; images involving sexual activity with an animal or sadism. We describe this category as “rape and sexual torture”.|
|B||Images involving non-penetrative sexual activity.|
|C||Other indecent images not falling within category A or B.|
Images or videos that show the sexual abuse of children. We use the term ‘child sexual abuse’ images to reflect the gravity of the images we deal with.
Images and videos that show extreme sexual activity that’s criminal in the UK.
These are file hosting services, cloud storage services or online file storage providers. They are internet hosting services specifically designed to host users’ files.
The Dark web, also known as the Dark net, is the hidden part of the internet accessed using Tor. Tor is anonymity software that makes it difficult to trace the users’ online activity.
Websites which, when loaded directly into a browser, show legal content - but when accessed through a particular pathway (or referrer website) show illegal content, for example child sexual abuse images.
Details of domain names that are known to be hosting child sexual abuse content.
Also known as a ‘message board’, a forum is an online chat site where people talk or upload files in the form of posts. A forum can hold sub-forums, and each of these could have several topics. Within a topic, each new discussion started is called a thread, and any forum user can reply to this thread.
A ‘hash’ is a unique code, or string of text and numbers generated from the binary data of a picture. Hashes can automatically identify known child sexual abuse images without needing to examine each image individually. This can help to prevent online distribution of this content.
An image hosting service lets users upload images and they’re then available through a unique URL. This URL can be used to make online links, or be embedded in other websites, forums and social networking sites.
A collection of images stored for non-commercial purposes. An example would be a hidden folder in an otherwise innocent website.
A world-class reporting solution for child sexual abuse content, for countries which don’t have an existing hotline.
A list of terms associated with child sexual abuse material searches.
Internet discussion groups dedicated to a variety of subjects. Users make posts to a newsgroup and others can see them and comment. Sometimes called ‘Usenet’, newsgroups were the original online forums and a precursor to the World Wide Web.
Images and videos of child sexual abuse which aren’t photographs, for example computer-generated images.
Onion sites get their name from the vegetable, which is made-up of lots of different layers. Like onions, onion sites sit behind layers and layers of anonymity which make them, and the people using them, very difficult to trace.
We can now actively search for child sexual abuse content, in addition to taking public reports. We’re the only hotline in the world that can do this.
These are systems that enable online anonymity, accelerate service requests, encryption, security and lots of other features. Some proxy software, such as Tor, attempts to conceal the true location of services.
These webpages are set up to redirect the user to another hosted webpage. When a redirector URL is browsed, the user request is automatically forwarded to the destination URL. Sometimes, when the redirector webpage is loaded in the browser it hides the destination URL.
Re-victimisation, or repeat victimisation is what happens to a victim when their image is shared more than once. A single image of a victim can be shared hundreds or thousands of times.
An internet service provider (ISP) is a company or organisation that provides access to the internet, internet connectivity and other related services, like hosting websites.
This is the process where a company that uses our IWF URL List tests their system every quarter to check they’re using it properly.
A social networking service is a platform to build social relations. It usually has a representation of each user (often a profile), their social links and a variety of other services. Popular examples include Facebook and Twitter.
Domains at the top of the domain name hierarchy. For example .com, .org and .info are all examples of generic top-level domains (gTLDs). The term also covers country code top-level domains (ccTLDs) like .uk for UK or .us for US and sponsored top-level domains (sTLDs) like .mobi or .xxx
This is an acronym for Uniform Resource Locator. A URL is the specific location where a file is saved online. For example, the URL of the IWF logo which appears on the webpage www.iwf.org.uk is www.iwf.org.uk/images/public/anna_logo.jpg
This is a service which makes it possible to view historic copies of websites, which are periodically archived over time.
A document which can be seen using a web browser. A single webpage can hold lots of images, text, videos or hyperlinks and many websites will have lots of webpages. www.iwf.org.uk/about-iwf and www.iwf.org.uk/hotline are both examples of webpages.
A website is a set of related webpages typically served from a single web domain. Most websites have several webpages.