02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The phenomen<strong>on</strong> of child pornography<br />

are no <strong>in</strong>dicati<strong>on</strong>s that groups <strong>in</strong> the Netherlands are <strong>in</strong>volved <strong>in</strong> commercial producti<strong>on</strong> and distributi<strong>on</strong>.<br />

The NDB also showed that there is little <strong>in</strong>sight <strong>in</strong>to the <strong>in</strong>volvement of Dutch groups <strong>in</strong> the producti<strong>on</strong> of<br />

child abuse material <strong>in</strong> other countries. What is clear, however, is that Dutch payment process<strong>in</strong>g companies<br />

are <strong>in</strong>volved <strong>in</strong> process<strong>in</strong>g the flow of funds 210 and that servers located <strong>in</strong> the Netherlands are be<strong>in</strong>g<br />

used to host child abuse material. 211<br />

Distributi<strong>on</strong> with<strong>in</strong> amateur networks, also known as ‘paedophile networks’, usually takes place with<strong>in</strong><br />

more or less organised networks or newsgroups that use protected areas of the Internet (see also §1.4.2).<br />

With<strong>in</strong> these networks, encrypted e-mail and files, group-based communicati<strong>on</strong> via chat channels such<br />

as Internet Relay Chat (IRC) and Microsoft Network Messenger (MSN) and peer-to-peer (p2p) exchange<br />

programs are used <strong>in</strong> which documents never actually appear <strong>on</strong> the network and are therefore more<br />

difficult to trace. 212 These p2p programs enable shared folders to be created (automatically) <strong>in</strong> which<br />

files can be shared with other users of an exchange program. From a legal perspective, material <strong>in</strong> this<br />

situati<strong>on</strong> is supplied <strong>on</strong> the <strong>on</strong>e side and acquired <strong>on</strong> the other. 213 It is not known what proporti<strong>on</strong> of<br />

child abuse material is distributed <strong>on</strong> the Internet via which route and it is likely that p2p programs such<br />

as Gnutella and BitTorrent are the <strong>on</strong>es that are most popularly used for distributi<strong>on</strong> purposes. 214 What<br />

is clear, however, is that the means of distributi<strong>on</strong> is subject to change, partly due to the fact that the<br />

suppliers of child abuse material are resp<strong>on</strong>d<strong>in</strong>g to repressive measures and partly because new technical<br />

means are always emerg<strong>in</strong>g. 215<br />

‘Possessi<strong>on</strong>’ and ‘obta<strong>in</strong><strong>in</strong>g access to’<br />

<str<strong>on</strong>g>Child</str<strong>on</strong>g> abuse material <strong>in</strong> analogue format was and still rema<strong>in</strong>s fairly bulky 216 and a large quantity of<br />

hard-copy material occupies a c<strong>on</strong>siderable amount of space. With the <strong>in</strong>troducti<strong>on</strong> of ICT and the<br />

subsequent shift from analogue to digital, the access to and storage of child abuse material has been<br />

vastly simplified. It is frequently the case that <strong>in</strong>dividuals are tracked down who have many hundreds<br />

of thousands and sometimes even milli<strong>on</strong>s of digital images <strong>in</strong> their possessi<strong>on</strong>. Previously, large collecti<strong>on</strong>s<br />

reflected the time and effort that some<strong>on</strong>e had spent <strong>on</strong> them, but today large quantities are<br />

more likely to reflect the speed of an <strong>in</strong>dividual’s Internet c<strong>on</strong>necti<strong>on</strong>. 217 Some perpetrators deliberately<br />

store large quantities of digital data relat<strong>in</strong>g to sexual violence aga<strong>in</strong>st children <strong>on</strong> the computer.<br />

210 KLPD – Internati<strong>on</strong>al Police Informati<strong>on</strong> Service [Dienst IPOL], 2008.<br />

211 AK Zensur [German Work<strong>in</strong>g Group Aga<strong>in</strong>st Internet Block<strong>in</strong>g and Censorship], 2010, p.7. This study refers to a<br />

Russian-language child pornography website with an Indian doma<strong>in</strong> name (.<strong>in</strong>) that is hosted from<br />

with<strong>in</strong> the Netherlands.<br />

212 Van der Hulst & Neve, 2008, pp.51-52; O’D<strong>on</strong>nell & Milner, 2007, pp.36-40.<br />

213 See Court of The Hague, 23 November 2010, LJN: BO4955. Prior to the legislative amendment of January<br />

2010 (Act of 26 November 2009, Dutch Bullet<strong>in</strong> of Acts and Decrees 544, entered <strong>in</strong>to force <strong>on</strong> 1<br />

January 2010, Dutch Bullet<strong>in</strong> of Acts and Decrees 578), a legal precedent was set (Van Koppen, 2009,<br />

pp. 91-95) <strong>in</strong> which the court ruled that this form of supply<strong>in</strong>g child abuse material c<strong>on</strong>stituted a form<br />

of (passive) distributi<strong>on</strong>, see for example Court of Appeal of Den Bosch, 5 October 2005, Dutch Law<br />

Reports 2005, 558.<br />

214 Liberatore et al., 2010.<br />

215 Leukfeldt et al., 2009, p.26<br />

216 Taylor & Quayle, 2003, p.199.<br />

217 O’D<strong>on</strong>nell & Milner, 2007, pp.57-58.<br />

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!