Japan finally bans possession of child pronography.

While the exploitation of children is a despicable act that causes suffering to the victims and the society, this law is going to have only minimal effect on those actually producing this kind of pornography, because they already work hidden from public. We already know that attraction to children is caused by abnormalities in the brain or tumors and this knowledge should be applied to treatment and prevention.

Wikileaks (2009) - An insight into child porn

As soon as the server is available, a qualified server admin connects to it via a chain of servers in various countries with the help of SSH on the new server. Today complete partitions are encrypted with TrueCrypt and all of the operating system logs are turned off.

Because people consider the servers in Germany very reliable, fast and inexpensive, these are usually configured as HIDDEN CONTENT SERVERS.

In other words, all the illegal files such as pictures, videos, etc. are uploaded on these servers - naturally via various proxies (and since you are still wondering what these proxies can be - I'll explain that later). These servers are using firewalls, completely sealed and made inaccessible except by a few servers all over the world - so-called PROXY SERVERs or FORWARD SERVERs.

If the server is shut down or Someone logs in from the console, the TrueCrypt partition is unmounted. Just as was done on the content servers, logs are turned off and TrueCrypt is installed on the so-called proxy servers or forward servers. The Russians have developed very clever software that can be used as a proxy server (in addition to the possibilities of SSL tunneling and IP Forwarding). These proxy servers accept incoming connections from the retail customers and route them to the content Servers in Germany - COMPLETELY ANONYMOUSLY AND UNIDENTIFIABLY. The communication link can even be configured to be encrypted.

Result: the server in Germany ATTRACTS NO ATTENTION AND STAYS COMPLETELY ANONYMOUS because its IP is not used by anyone except for the proxy server that uses it to route the traffic back and forth through a tunnel - using similar technology as is used with large enterprise VPNs. I stress that these proxy servers are everywhere in the world and only consume a lot of traffic, have no special demands, and above all are completely empty.

Networks of servers around the world are also used at the DNS level. The DNS has many special features: the refresh times have a TTL (Time To Live) of approximately 10 minutes, the entries usually have multiple IP entries in the round robin procedure at each request and rotate the visitor to any of the forward proxy servers.

And you have cases in the UK and the US, where the obvious pedophile activity is covered up.

The Westminster child abuse ‘coverup’: how much did MPs know?

FBI & Pentagon officials purchased and downloaded child porn - 5,200 employees caught

/r/worldnews Thread Link - japantimes.co.jp