02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

42<br />

<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />

child abuse material. 59 Current (high-tech) <strong>in</strong>novati<strong>on</strong>s that hamper the detecti<strong>on</strong> of such material, 60<br />

such as encrypti<strong>on</strong>, 61 cloud comput<strong>in</strong>g, 62 (pre-paid) smart ph<strong>on</strong>es and free Wi-Fi, 63 will ultimately also<br />

become accessible to low-tech users. Such <strong>in</strong>novati<strong>on</strong>s are used by billi<strong>on</strong>s of people all over the world.<br />

The drawback is that <strong>in</strong>dividuals with harmful <strong>in</strong>tenti<strong>on</strong>s can also use technology now and <strong>in</strong> the future<br />

<strong>in</strong> order to achieve their purpose.<br />

Digital child abuse material and ICT as an opportunity<br />

Technology not <strong>on</strong>ly presents a challenge due to the fact that <strong>in</strong>dividuals discover new ways of<br />

display<strong>in</strong>g deviant behaviour, but also creates opportunities for academia and organisati<strong>on</strong>s <strong>in</strong>volved<br />

<strong>in</strong> prevent<strong>in</strong>g and tackl<strong>in</strong>g child pornography. Those opportunities lie <strong>in</strong> the digital material<br />

itself <strong>on</strong> the <strong>on</strong>e hand, and <strong>in</strong> the technology used <strong>in</strong> order to produce, distribute and/or view <strong>on</strong><br />

the other hand.<br />

- As far as tackl<strong>in</strong>g child pornography is c<strong>on</strong>cerned, the material can provide proof that abuse<br />

has taken place. In the case of babies and toddlers, it may even be the <strong>on</strong>ly proof that a form<br />

of sexual violence has taken place. Other digital data, such as chatroom c<strong>on</strong>versati<strong>on</strong>s, l<strong>in</strong>ks<br />

to websites, etc., may <strong>in</strong>dicate that sexual violence aga<strong>in</strong>st children has taken place or is <strong>in</strong> a<br />

preparatory stage. 64 Individuals also leave data beh<strong>in</strong>d <strong>in</strong> cyberspace that can form a digital<br />

profile. All of these digital signals provide potential <strong>in</strong>formati<strong>on</strong> c<strong>on</strong>cern<strong>in</strong>g the (identity of)<br />

perpetrators and victims. 65<br />

- ICT can also make a c<strong>on</strong>tributi<strong>on</strong> <strong>in</strong> the preventi<strong>on</strong> of sexual violence aga<strong>in</strong>st children. Potential<br />

perpetrators and victims are both active <strong>in</strong> cyberspace. This means, for example, that <strong>in</strong>formati<strong>on</strong><br />

c<strong>on</strong>cern<strong>in</strong>g sexual violence aga<strong>in</strong>st children can be provided by the government through<br />

digital channels, and that ICT and its users can make a c<strong>on</strong>tributi<strong>on</strong> towards <strong>in</strong>creas<strong>in</strong>g the<br />

physical and social safety of these digital channels.<br />

59 Taylor & Quayle, 2003, p.199.<br />

60 We know for example that users of child abuse material have ever greater expertise and use c<strong>on</strong>cealment<br />

methods (such as encrypti<strong>on</strong>) <strong>in</strong> order to rema<strong>in</strong> undetected. For example, it is possible <strong>in</strong> certa<strong>in</strong><br />

publicly-accessible envir<strong>on</strong>ments (such as chatrooms, aucti<strong>on</strong> sites and peer-to-peer (p2p) networks)<br />

to communicate <strong>in</strong> private (Van der Hulst & Neve, 2008, p.43; Solum, 2009, p.54).<br />

61 By encrypt<strong>in</strong>g <strong>in</strong>formati<strong>on</strong>, unauthorised users can be prevented from access<strong>in</strong>g that <strong>in</strong>formati<strong>on</strong>. In<br />

practice, the public key encrypti<strong>on</strong> method is ma<strong>in</strong>ly used <strong>in</strong> encrypti<strong>on</strong>. KLPD – <str<strong>on</strong>g>Nati<strong>on</strong>al</str<strong>on</strong>g> Crime Squad,<br />

2010, p.196 (not publicly available).<br />

62 ‘Cloud’ refers to the storage and process<strong>in</strong>g of data via the Internet. In the cloud model, data and comput<strong>in</strong>g<br />

capacity are available <strong>on</strong>l<strong>in</strong>e without it be<strong>in</strong>g possible to know where the data are stored and<br />

which computers are carry<strong>in</strong>g out the computati<strong>on</strong>. The physical locati<strong>on</strong> of storage and comput<strong>in</strong>g<br />

capacity varies and is not relevant with<strong>in</strong> the cloud model. KLPD – <str<strong>on</strong>g>Nati<strong>on</strong>al</str<strong>on</strong>g> Crime Squad, 2010, p.194<br />

(not publicly available).<br />

63 GOVCERT, 2010.<br />

64 See Vrijwilliger Kaatsheuvel gepakt voor k<strong>in</strong>derporno [Volunteer <strong>in</strong> Kaatsheuvel arrested for possessi<strong>on</strong> of child abuse<br />

images] E<strong>in</strong>dhovens Dagblad, 9 August 2011, available at www.ed.nl/regio/e<strong>in</strong>dhovenregio/9263533/<br />

Vrijwilliger-Kaatsheuvel-gepakt-voor-k<strong>in</strong>derporno.ece (viewed 10 August 2011).<br />

65 See for example Melanie had eerder gered kunnen worden [Melanie could have been saved so<strong>on</strong>er], De Telegraaf,<br />

5 July 2011, available at: www.telegraaf.nl/b<strong>in</strong>nenland/10141960/_Melanie_eerder_gered_kunnen_worden_.html<br />

(viewed 9 August 2011).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!