02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44<br />

<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />

Four aspects of the Internet that also exert an <strong>in</strong>fluence up<strong>on</strong> the phenomen<strong>on</strong> of child pornography<br />

are the end-to-end pr<strong>in</strong>ciple, the use of open standards, the global nature of the Internet, and the<br />

private market. 77 This last aspect of the Internet entails that networks are owned and adm<strong>in</strong>istrated<br />

by aut<strong>on</strong>omous organisati<strong>on</strong>s, primarily from the private sector. For this reas<strong>on</strong>, governments have,<br />

<strong>in</strong> pr<strong>in</strong>ciple, little c<strong>on</strong>trol over the Internet. The global nature of the Internet means that it is not<br />

bound by nati<strong>on</strong>al boundaries, and that data, such as child abuse material <strong>in</strong> digital format, is sent<br />

irrespective of political and territorial borders. This also means that the perpetrators, (potential)<br />

victims and material can come <strong>in</strong>to c<strong>on</strong>tact with <strong>on</strong>e another more easily, more quickly and more<br />

often. 78 The fact that perpetrators and victims can f<strong>in</strong>d <strong>on</strong>e another all over the world is also related to<br />

the aspects of comm<strong>on</strong> standards. The Internet can be accessed openly and freely by any<strong>on</strong>e. <str<strong>on</strong>g>Child</str<strong>on</strong>g>ren<br />

from Mid-Eastern Europe, for example, who are vulnerable due a low socio-ec<strong>on</strong>omic status can also<br />

be found <strong>on</strong> the Internet. 79 The Internet is also based up<strong>on</strong> the end-to-end pr<strong>in</strong>ciple. 80 This means<br />

that it was designed as a neutral, transparent and very simple communicati<strong>on</strong> channel. All complex<br />

software and other functi<strong>on</strong>s for receiv<strong>in</strong>g and process<strong>in</strong>g data are c<strong>on</strong>ta<strong>in</strong>ed (<strong>in</strong> equipment) at the<br />

end of the network. In short, the Internet, as the communicati<strong>on</strong> channel, does not discrim<strong>in</strong>ate: as<br />

far as the Internet is c<strong>on</strong>cerned, digital child abuse material is data that is no different to any other<br />

data. For this reas<strong>on</strong>, the term ‘trade <strong>in</strong> (crim<strong>in</strong>al) <strong>in</strong>formati<strong>on</strong>’ is also sometimes used. 81 Data is not<br />

carried through a central po<strong>in</strong>t, but can take <strong>in</strong>numerable routes through the network structure.<br />

The fact that the data is located at the ends of the network means that the activities of management,<br />

m<strong>on</strong>itor<strong>in</strong>g and surveillance of the network are extremely difficult, and that attenti<strong>on</strong> should rather<br />

be focused up<strong>on</strong> the computer and users at the opposite ends of the network. 82 The questi<strong>on</strong> of how<br />

to achieve an acceptable form of management, m<strong>on</strong>itor<strong>in</strong>g and surveillance 83 , whilst reta<strong>in</strong><strong>in</strong>g the<br />

aforementi<strong>on</strong>ed characteristics of the Internet, falls with<strong>in</strong> the scope of Internet governance 84 (as<br />

do the regulati<strong>on</strong>s with regard to digital child abuse material), which will be exam<strong>in</strong>ed <strong>in</strong> greater<br />

detail <strong>in</strong> §3.8.<br />

Cyber and/or high-tech crime<br />

As we have shown above, ICT can also be misused by <strong>in</strong>dividuals <strong>in</strong> order to obta<strong>in</strong> or distribute abusive<br />

images and films and <strong>in</strong> order to c<strong>on</strong>tact children with the <strong>in</strong>tenti<strong>on</strong> of abus<strong>in</strong>g them or produc<strong>in</strong>g<br />

child abuse material. When ICT is used to commit crim<strong>in</strong>al offences, it is referred to as cybercrime, ICT<br />

and computer crime, or high-tech crime. 85 In this c<strong>on</strong>text, the report <strong>on</strong>ly uses the terms ‘cybercrime’<br />

and ‘high-tech crime’. The Hightech Crime Crim<strong>in</strong>aliteitsbeeldanalyse 2009 (CBA) [High-tech Crime Picture<br />

Analysis] describes cybercrime as “any crim<strong>in</strong>al act aimed at committ<strong>in</strong>g cybercrime, <strong>in</strong> which the use of automated<br />

functi<strong>on</strong> <strong>in</strong> the process<strong>in</strong>g and transfer of data is of significant importance”. 86 The literature makes a dist<strong>in</strong>cti<strong>on</strong><br />

77 Mathias<strong>on</strong> et al., 2004, p.7; Solum, 2009, p.50.<br />

78 Davids<strong>on</strong> & Gottschalk, 2011, p.28.<br />

79 ECPAT Internati<strong>on</strong>al, 2008.<br />

80 Taylor & Quayle, 2006, p.172 call this pr<strong>in</strong>ciple ‘edge-to-edge’.<br />

81 Van der Hulst & Neve, 2008, pp.50-51.<br />

82 Taylor & Quayle, 2006, p.173.<br />

83 Lessig, 2001.<br />

84 Solum, 2009, p.48<br />

85 Mulder et al., 2010, pp.259-286.<br />

86 KLPD – <str<strong>on</strong>g>Nati<strong>on</strong>al</str<strong>on</strong>g> Crime Squad, 2010 (not publicly available).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!