Child Pornography - Home | National Rapporteur on Trafficking in ...
Child Pornography - Home | National Rapporteur on Trafficking in ...
Child Pornography - Home | National Rapporteur on Trafficking in ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
42<br />
<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />
child abuse material. 59 Current (high-tech) <strong>in</strong>novati<strong>on</strong>s that hamper the detecti<strong>on</strong> of such material, 60<br />
such as encrypti<strong>on</strong>, 61 cloud comput<strong>in</strong>g, 62 (pre-paid) smart ph<strong>on</strong>es and free Wi-Fi, 63 will ultimately also<br />
become accessible to low-tech users. Such <strong>in</strong>novati<strong>on</strong>s are used by billi<strong>on</strong>s of people all over the world.<br />
The drawback is that <strong>in</strong>dividuals with harmful <strong>in</strong>tenti<strong>on</strong>s can also use technology now and <strong>in</strong> the future<br />
<strong>in</strong> order to achieve their purpose.<br />
Digital child abuse material and ICT as an opportunity<br />
Technology not <strong>on</strong>ly presents a challenge due to the fact that <strong>in</strong>dividuals discover new ways of<br />
display<strong>in</strong>g deviant behaviour, but also creates opportunities for academia and organisati<strong>on</strong>s <strong>in</strong>volved<br />
<strong>in</strong> prevent<strong>in</strong>g and tackl<strong>in</strong>g child pornography. Those opportunities lie <strong>in</strong> the digital material<br />
itself <strong>on</strong> the <strong>on</strong>e hand, and <strong>in</strong> the technology used <strong>in</strong> order to produce, distribute and/or view <strong>on</strong><br />
the other hand.<br />
- As far as tackl<strong>in</strong>g child pornography is c<strong>on</strong>cerned, the material can provide proof that abuse<br />
has taken place. In the case of babies and toddlers, it may even be the <strong>on</strong>ly proof that a form<br />
of sexual violence has taken place. Other digital data, such as chatroom c<strong>on</strong>versati<strong>on</strong>s, l<strong>in</strong>ks<br />
to websites, etc., may <strong>in</strong>dicate that sexual violence aga<strong>in</strong>st children has taken place or is <strong>in</strong> a<br />
preparatory stage. 64 Individuals also leave data beh<strong>in</strong>d <strong>in</strong> cyberspace that can form a digital<br />
profile. All of these digital signals provide potential <strong>in</strong>formati<strong>on</strong> c<strong>on</strong>cern<strong>in</strong>g the (identity of)<br />
perpetrators and victims. 65<br />
- ICT can also make a c<strong>on</strong>tributi<strong>on</strong> <strong>in</strong> the preventi<strong>on</strong> of sexual violence aga<strong>in</strong>st children. Potential<br />
perpetrators and victims are both active <strong>in</strong> cyberspace. This means, for example, that <strong>in</strong>formati<strong>on</strong><br />
c<strong>on</strong>cern<strong>in</strong>g sexual violence aga<strong>in</strong>st children can be provided by the government through<br />
digital channels, and that ICT and its users can make a c<strong>on</strong>tributi<strong>on</strong> towards <strong>in</strong>creas<strong>in</strong>g the<br />
physical and social safety of these digital channels.<br />
59 Taylor & Quayle, 2003, p.199.<br />
60 We know for example that users of child abuse material have ever greater expertise and use c<strong>on</strong>cealment<br />
methods (such as encrypti<strong>on</strong>) <strong>in</strong> order to rema<strong>in</strong> undetected. For example, it is possible <strong>in</strong> certa<strong>in</strong><br />
publicly-accessible envir<strong>on</strong>ments (such as chatrooms, aucti<strong>on</strong> sites and peer-to-peer (p2p) networks)<br />
to communicate <strong>in</strong> private (Van der Hulst & Neve, 2008, p.43; Solum, 2009, p.54).<br />
61 By encrypt<strong>in</strong>g <strong>in</strong>formati<strong>on</strong>, unauthorised users can be prevented from access<strong>in</strong>g that <strong>in</strong>formati<strong>on</strong>. In<br />
practice, the public key encrypti<strong>on</strong> method is ma<strong>in</strong>ly used <strong>in</strong> encrypti<strong>on</strong>. KLPD – <str<strong>on</strong>g>Nati<strong>on</strong>al</str<strong>on</strong>g> Crime Squad,<br />
2010, p.196 (not publicly available).<br />
62 ‘Cloud’ refers to the storage and process<strong>in</strong>g of data via the Internet. In the cloud model, data and comput<strong>in</strong>g<br />
capacity are available <strong>on</strong>l<strong>in</strong>e without it be<strong>in</strong>g possible to know where the data are stored and<br />
which computers are carry<strong>in</strong>g out the computati<strong>on</strong>. The physical locati<strong>on</strong> of storage and comput<strong>in</strong>g<br />
capacity varies and is not relevant with<strong>in</strong> the cloud model. KLPD – <str<strong>on</strong>g>Nati<strong>on</strong>al</str<strong>on</strong>g> Crime Squad, 2010, p.194<br />
(not publicly available).<br />
63 GOVCERT, 2010.<br />
64 See Vrijwilliger Kaatsheuvel gepakt voor k<strong>in</strong>derporno [Volunteer <strong>in</strong> Kaatsheuvel arrested for possessi<strong>on</strong> of child abuse<br />
images] E<strong>in</strong>dhovens Dagblad, 9 August 2011, available at www.ed.nl/regio/e<strong>in</strong>dhovenregio/9263533/<br />
Vrijwilliger-Kaatsheuvel-gepakt-voor-k<strong>in</strong>derporno.ece (viewed 10 August 2011).<br />
65 See for example Melanie had eerder gered kunnen worden [Melanie could have been saved so<strong>on</strong>er], De Telegraaf,<br />
5 July 2011, available at: www.telegraaf.nl/b<strong>in</strong>nenland/10141960/_Melanie_eerder_gered_kunnen_worden_.html<br />
(viewed 9 August 2011).