How do I report online child abuse or child pornography?
1. It is a major concern when you discover a computer you own or administer is being used for purposes that support child abuse or child pornography. For example, your computer may be: (a) Hijacked by hackers, a hidden file server is installed without your permission, and then illegal content is downloaded onto this server. You are then in a position of “hosting” seriously illegal content. (b) Hijacked by hackers and hidden chat/chatroom server software is installed. You could then be in a position of having a computer that is aiding the commission of seriously illegal activities and conspiracies to commit serious crimes. (c) Infected by a spam relay trojan/worm. You are then in a position where it appears that spam promoting child pornography is originating from your computer. Whether the situation results from negligence on your part in failing to adequately secure your computer, or from very skillful hacking, you have a serious concern. In situations (a) and (b) above, you or your o