Child Pornography - Home | National Rapporteur on Trafficking in ...
Child Pornography - Home | National Rapporteur on Trafficking in ...
Child Pornography - Home | National Rapporteur on Trafficking in ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
74<br />
<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />
Simple viewers<br />
The pyramid shape <strong>in</strong>dicates that there exists a large group of ‘simple’ viewers of child abuse material<br />
who attempt to access material <strong>in</strong> simple ways. Some of them are ‘novice’ viewers who are curious<br />
about child abuse images and/or child erotica. This group possesses little knowledge of ICT and<br />
therefore use the World Wide Web and general search eng<strong>in</strong>es <strong>in</strong> order to access child abuse images<br />
or (legal) child erotica 298 through <strong>in</strong>ternet envir<strong>on</strong>ments (such as <strong>on</strong> legal modell<strong>in</strong>g sites). If these<br />
<strong>in</strong>dividuals pay for material, this takes place through <strong>on</strong>l<strong>in</strong>e payment facilities, such as credit cards or<br />
PayPal, as a result of which they also divulge their pers<strong>on</strong>al details. If the perpetrator is found higher up<br />
<strong>in</strong> the simple viewers layer (closer to the next group of open traders), more advanced technology, such<br />
as the Bullet<strong>in</strong> Board System (BBS), Usenet, Internet Relay Chat (IRC)or p2p networks will also be used.<br />
Open traders<br />
The open traders group not <strong>on</strong>ly downloads and views child abuse material, but also distributes<br />
or supplies the material <strong>in</strong> open <strong>in</strong>ternet envir<strong>on</strong>ments. This generally takes place <strong>in</strong> an unsecured<br />
way. Open traders use p2p, the BBS, IRC and websites. It is likely that <strong>on</strong>l<strong>in</strong>e storage and upload<br />
services such as Yahoo, Flickr and Facebook are also used. Commercial suppliers also fall <strong>in</strong>to the<br />
category of open traders.<br />
Closed traders<br />
The perpetrators <strong>in</strong> this group are similar to open traders, but take various security measures <strong>in</strong><br />
order to avoid discovery by <strong>in</strong>vestigative authorities. At this level communicati<strong>on</strong> takes place between<br />
<strong>in</strong>dividuals by e-mail and Instant Messenger, for example and private <strong>on</strong>l<strong>in</strong>e communities<br />
are formed through communicati<strong>on</strong>. Access is granted <strong>on</strong>ce <strong>in</strong>dividuals are sufficiently trusted<br />
by members of the group. If trust has been built up between the members, corresp<strong>on</strong>dence by<br />
letter and c<strong>on</strong>versati<strong>on</strong>s over the teleph<strong>on</strong>e can also take place. Members share material with<strong>in</strong><br />
the closed group that they have collected <strong>on</strong> the <strong>in</strong>ternet or produced themselves. If after a period<br />
of time member numbers become too great and/or the supply of new material decl<strong>in</strong>es, active<br />
members may leave the group and form new smaller closed groups.<br />
Experts<br />
These small groups feature a clear-cut hierarchical divisi<strong>on</strong> of roles and c<strong>on</strong>sist of <strong>in</strong>dividuals who have<br />
been active <strong>on</strong>l<strong>in</strong>e for a l<strong>on</strong>g time already. Security plays an important role. Members are charged with<br />
the management of material and the delegati<strong>on</strong> of roles to other members, <strong>on</strong>l<strong>in</strong>e and offl<strong>in</strong>e security<br />
of the group, provid<strong>in</strong>g explanati<strong>on</strong>s regard<strong>in</strong>g the use of technology or <strong>in</strong>telligence c<strong>on</strong>cern<strong>in</strong>g <strong>in</strong>vestigative<br />
authorities. Members not <strong>on</strong>ly value self-produced child abuse material but also knowledge<br />
of the circumstances of producti<strong>on</strong>, such as the name of the victim and his/her emoti<strong>on</strong>al reacti<strong>on</strong>.<br />
This sub-secti<strong>on</strong> has provided an impressi<strong>on</strong> of the diversity am<strong>on</strong>gst perpetrators. Although behaviour,<br />
modus operandi, age and gender may vary, all perpetrators c<strong>on</strong>tribute towards (creat<strong>in</strong>g or ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g)<br />
the victimisati<strong>on</strong> element of child pornography.<br />
298 <str<strong>on</strong>g>Child</str<strong>on</strong>g> erotica is a (n<strong>on</strong>-legal) term that encompasses all material that is not child abuse material that<br />
makes reference to children and also serves a sexual purpose for the user of this material, such as<br />
children’s underwear (advertisements), accounts of child abuse and toys, see Lann<strong>in</strong>g, 2010, pp.85-89.<br />
See also, for example, Court of Utrecht, 31 March 2011, LJN: BQ0756.