02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

74<br />

<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />

Simple viewers<br />

The pyramid shape <strong>in</strong>dicates that there exists a large group of ‘simple’ viewers of child abuse material<br />

who attempt to access material <strong>in</strong> simple ways. Some of them are ‘novice’ viewers who are curious<br />

about child abuse images and/or child erotica. This group possesses little knowledge of ICT and<br />

therefore use the World Wide Web and general search eng<strong>in</strong>es <strong>in</strong> order to access child abuse images<br />

or (legal) child erotica 298 through <strong>in</strong>ternet envir<strong>on</strong>ments (such as <strong>on</strong> legal modell<strong>in</strong>g sites). If these<br />

<strong>in</strong>dividuals pay for material, this takes place through <strong>on</strong>l<strong>in</strong>e payment facilities, such as credit cards or<br />

PayPal, as a result of which they also divulge their pers<strong>on</strong>al details. If the perpetrator is found higher up<br />

<strong>in</strong> the simple viewers layer (closer to the next group of open traders), more advanced technology, such<br />

as the Bullet<strong>in</strong> Board System (BBS), Usenet, Internet Relay Chat (IRC)or p2p networks will also be used.<br />

Open traders<br />

The open traders group not <strong>on</strong>ly downloads and views child abuse material, but also distributes<br />

or supplies the material <strong>in</strong> open <strong>in</strong>ternet envir<strong>on</strong>ments. This generally takes place <strong>in</strong> an unsecured<br />

way. Open traders use p2p, the BBS, IRC and websites. It is likely that <strong>on</strong>l<strong>in</strong>e storage and upload<br />

services such as Yahoo, Flickr and Facebook are also used. Commercial suppliers also fall <strong>in</strong>to the<br />

category of open traders.<br />

Closed traders<br />

The perpetrators <strong>in</strong> this group are similar to open traders, but take various security measures <strong>in</strong><br />

order to avoid discovery by <strong>in</strong>vestigative authorities. At this level communicati<strong>on</strong> takes place between<br />

<strong>in</strong>dividuals by e-mail and Instant Messenger, for example and private <strong>on</strong>l<strong>in</strong>e communities<br />

are formed through communicati<strong>on</strong>. Access is granted <strong>on</strong>ce <strong>in</strong>dividuals are sufficiently trusted<br />

by members of the group. If trust has been built up between the members, corresp<strong>on</strong>dence by<br />

letter and c<strong>on</strong>versati<strong>on</strong>s over the teleph<strong>on</strong>e can also take place. Members share material with<strong>in</strong><br />

the closed group that they have collected <strong>on</strong> the <strong>in</strong>ternet or produced themselves. If after a period<br />

of time member numbers become too great and/or the supply of new material decl<strong>in</strong>es, active<br />

members may leave the group and form new smaller closed groups.<br />

Experts<br />

These small groups feature a clear-cut hierarchical divisi<strong>on</strong> of roles and c<strong>on</strong>sist of <strong>in</strong>dividuals who have<br />

been active <strong>on</strong>l<strong>in</strong>e for a l<strong>on</strong>g time already. Security plays an important role. Members are charged with<br />

the management of material and the delegati<strong>on</strong> of roles to other members, <strong>on</strong>l<strong>in</strong>e and offl<strong>in</strong>e security<br />

of the group, provid<strong>in</strong>g explanati<strong>on</strong>s regard<strong>in</strong>g the use of technology or <strong>in</strong>telligence c<strong>on</strong>cern<strong>in</strong>g <strong>in</strong>vestigative<br />

authorities. Members not <strong>on</strong>ly value self-produced child abuse material but also knowledge<br />

of the circumstances of producti<strong>on</strong>, such as the name of the victim and his/her emoti<strong>on</strong>al reacti<strong>on</strong>.<br />

This sub-secti<strong>on</strong> has provided an impressi<strong>on</strong> of the diversity am<strong>on</strong>gst perpetrators. Although behaviour,<br />

modus operandi, age and gender may vary, all perpetrators c<strong>on</strong>tribute towards (creat<strong>in</strong>g or ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g)<br />

the victimisati<strong>on</strong> element of child pornography.<br />

298 <str<strong>on</strong>g>Child</str<strong>on</strong>g> erotica is a (n<strong>on</strong>-legal) term that encompasses all material that is not child abuse material that<br />

makes reference to children and also serves a sexual purpose for the user of this material, such as<br />

children’s underwear (advertisements), accounts of child abuse and toys, see Lann<strong>in</strong>g, 2010, pp.85-89.<br />

See also, for example, Court of Utrecht, 31 March 2011, LJN: BQ0756.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!