02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The phenomen<strong>on</strong> of child pornography<br />

and justificati<strong>on</strong> for their behaviour <strong>on</strong>l<strong>in</strong>e. 292 In this way, the <strong>on</strong>l<strong>in</strong>e sub-culture fulfils a socio-emoti<strong>on</strong>al<br />

functi<strong>on</strong> as far as these <strong>in</strong>dividuals are c<strong>on</strong>cerned. It is a place where they are able to freely share their<br />

views. Aspects of their sexuality are discussed and (<strong>in</strong>formati<strong>on</strong> relat<strong>in</strong>g to) child abuse material, sexual<br />

preferences, fantasies and events are shared. Legislati<strong>on</strong> and regulati<strong>on</strong>s, and <strong>on</strong>l<strong>in</strong>e and offl<strong>in</strong>e security<br />

measures to rema<strong>in</strong> under the radar of the <strong>in</strong>vestigative authorities are also discussed. 293 Experienced collectors<br />

believe they are unassailable, judge the likelihood of arrest as low and have a low op<strong>in</strong>i<strong>on</strong> of the<br />

(calibre of ) <strong>in</strong>vestigative authorities. 294 It should be noted that some visitors to open Internet forums reject<br />

sex with children and the collecti<strong>on</strong> of child abuse material, as they recognise the harmful c<strong>on</strong>sequences<br />

for the child and therefore regard the abuse as be<strong>in</strong>g <strong>in</strong> c<strong>on</strong>flict with the actual love for the child. 295<br />

Summary us<strong>in</strong>g a pyramid model<br />

Moran illustrates his analysis of digital offenders <strong>in</strong> the pyramid model shown below (Figure 1.1). 296 The<br />

model provides an <strong>in</strong>sight <strong>in</strong>to the use of open and closed Internet envir<strong>on</strong>ments, perpetrators’ modi<br />

operandi and the relati<strong>on</strong>ship between hands-off and hands-<strong>on</strong> offences. It also shows why child pornography<br />

is a cybercrime <strong>in</strong> most cases and why it can also be a high-tech crime <strong>in</strong> excepti<strong>on</strong>al cases. We can<br />

also add to the model that with<strong>in</strong> each layer of offenders we can f<strong>in</strong>d <strong>in</strong>dividuals who themselves abuse<br />

children. Similarly, with<strong>in</strong> the ‘simple downloaders’ layer (generally <strong>in</strong>dividuals who are discovered <strong>in</strong><br />

<strong>in</strong>vestigati<strong>on</strong>s precisely because of their lack of technological knowledge <strong>in</strong> relati<strong>on</strong> to obta<strong>in</strong><strong>in</strong>g digital<br />

child abuse material), the police also f<strong>in</strong>d perpetrators who have abused children and have produced<br />

images of this, but have not distributed them. 297<br />

Figure 1.1 Moran’s pyramid model<br />

Typology of Onl<strong>in</strong>e <str<strong>on</strong>g>Child</str<strong>on</strong>g> Exploitati<strong>on</strong> Material Users<br />

Advanced Technology and Security<br />

Moran INTERPOL 2009<br />

Experts<br />

Closed Traders<br />

Open Traders<br />

Simple Viewers<br />

Number of Users Involved<br />

292 Lann<strong>in</strong>g, 2010, p.89.<br />

293 Holt et al., 2010; Taylor & Quayle, 2003, pp.86-87.<br />

294 Jenk<strong>in</strong>s, 2001, pp.14-15.<br />

295 Holt et al., 2010.<br />

296 Moran, 2010.<br />

297 Court of Zwolle, 17 June 2010, LJN: BM9626.<br />

73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!