Child Pornography - Home | National Rapporteur on Trafficking in ...
Child Pornography - Home | National Rapporteur on Trafficking in ...
Child Pornography - Home | National Rapporteur on Trafficking in ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
274<br />
<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />
probati<strong>on</strong> and after-care services, and services that provide assistance, but also <strong>in</strong>terventi<strong>on</strong>s by NGOs<br />
and the bus<strong>in</strong>ess sector themselves. 876<br />
Strategies<br />
A possible strategy that is (ma<strong>in</strong>ly) applicable to reduc<strong>in</strong>g the accessibility of (old) material c<strong>on</strong>stitut<strong>in</strong>g<br />
child pornography is sweep<strong>in</strong>g Internet envir<strong>on</strong>ments clean of child abuse material and related c<strong>on</strong>tent<br />
(for example search terms related to child pornography) as much as possible by remov<strong>in</strong>g or add<strong>in</strong>g data.<br />
This strategy is based <strong>on</strong> the situati<strong>on</strong>al factors that are related to search<strong>in</strong>g, the pre-crim<strong>in</strong>al situati<strong>on</strong><br />
and the tactics of <strong>in</strong>dividuals who view child abuse material, 877 and child pornography as data for the<br />
Internet 878 (see §1.4.2).<br />
Various <strong>in</strong>terventi<strong>on</strong>s that are described <strong>in</strong> §3.8.3 are focused <strong>on</strong> remov<strong>in</strong>g child abuse material as much<br />
as possible <strong>on</strong>ce it has been identified, such as <strong>on</strong>l<strong>in</strong>e communities and ISPs apply<strong>in</strong>g the voluntary<br />
and statutory NTD regulati<strong>on</strong>s. In the discussi<strong>on</strong> about whether or not to block child abuse material,<br />
the motto ‘d<strong>on</strong>’t block, but remove’ is often used. 879 Removal is based <strong>on</strong> data m<strong>in</strong>imisati<strong>on</strong>: material<br />
needs to be removed from the Internet. Data related to child pornography, such as search terms related<br />
to child pornography <strong>on</strong> search eng<strong>in</strong>es and l<strong>in</strong>ks to material c<strong>on</strong>stitut<strong>in</strong>g child pornography, should<br />
also be removed, where possible, by companies, NGOs and the Internet community. Data maximisati<strong>on</strong><br />
is the opposite of data m<strong>in</strong>imisati<strong>on</strong>. Internet envir<strong>on</strong>ments where material cannot be removed<br />
are sometimes suitable to add data to. 880 The motto here is, ‘If you have a needle, create a haystack!’ 881<br />
Private parties and NGOs are able to participate <strong>in</strong> certa<strong>in</strong> Internet envir<strong>on</strong>ments <strong>in</strong> the same way as<br />
c<strong>on</strong>sumers of child abuse material. They are able to add data by supply<strong>in</strong>g large numbers of files and/or<br />
reference with titles related to child pornography, which <strong>in</strong> actual fact simply c<strong>on</strong>ta<strong>in</strong> a warn<strong>in</strong>g or refer<br />
to self-help programmes such as croga.org or Stop it Now!. In additi<strong>on</strong> to this, not <strong>on</strong>ly the quantity but<br />
also the nature of the data is important <strong>in</strong> data maximisati<strong>on</strong>. NGOs and organisati<strong>on</strong>s that provide assistance<br />
could draw attenti<strong>on</strong> to self-help programmes <strong>in</strong> open Internet envir<strong>on</strong>ments where offenders<br />
876 This does not necessarily <strong>in</strong>volve obligati<strong>on</strong>s of ISPs to participate <strong>in</strong> a crim<strong>in</strong>al <strong>in</strong>vestigati<strong>on</strong> or commercial<br />
product development by the private sector demanded by the police, see ‘NFI en NCIM Groep<br />
sluiten partnership’ [NFI and NCIM Group form a partnership], Dutch Forensic Institute, 4 August 2011,<br />
see www.nederlandsforensisch<strong>in</strong>stituut.nl/nieuws/2011/nfi-en-ncim-groep-sluiten-partnership.<br />
aspx?cp=68&cs=18251 (viewed 10 August 2011). Such <strong>in</strong>terventi<strong>on</strong>s are not <strong>in</strong>cluded <strong>in</strong> the previouslystated<br />
def<strong>in</strong>iti<strong>on</strong> of public-private sector partnerships.<br />
877 Taylor & Quayle, 2006, pp.169-195.<br />
878 Van der Hulst & Neve, 2008, pp.50-51.<br />
879 ‘Europees akkoord: beelden k<strong>in</strong>dermisbruik niet blokkeren maar verwijderen’ [European agreement: do not block,<br />
but remove images of child abuse], GroenL<strong>in</strong>ks, 28 June 2011, www.europa.groenl<strong>in</strong>ks.nl/Europees+a<br />
kkoord%3A+beelden+k<strong>in</strong>dermisbruik+niet+blokkeren+ maar+verwijderen (viewed 10 August 2011).<br />
880 Data maximisati<strong>on</strong> is also used with<strong>in</strong> the scope of detecti<strong>on</strong> of material c<strong>on</strong>stitut<strong>in</strong>g child pornography<br />
<strong>on</strong> peer-to-peer networks. Liberatore et al. (2010) developed a method that places unique identify<strong>in</strong>g<br />
tags <strong>in</strong> the storage space of a downloader of child abuse material <strong>on</strong> peer-to-peer networks. This<br />
technology is now be<strong>in</strong>g used by <strong>in</strong>stituti<strong>on</strong>s <strong>in</strong>volved <strong>in</strong> detecti<strong>on</strong> <strong>in</strong> 49 states <strong>in</strong> the USA.<br />
881 Presentati<strong>on</strong> ‘Informatie, privacy en veiligheid’ [Informati<strong>on</strong>, privacy and safety] by B.J. Koops (University<br />
of Tilburg) 21 January 2011 <strong>in</strong> the Hague.