02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The phenomen<strong>on</strong> of child pornography<br />

three aspects is unknown and cannot therefore be expressed <strong>in</strong> figures. Statistical data c<strong>on</strong>cern<strong>in</strong>g<br />

the number of known perpetrators (from the police or the Public Prosecuti<strong>on</strong> Service, 364 for example)<br />

and known victims (from care services, for example) <strong>on</strong>ly represent the tip of the iceberg and<br />

therefore do not yield any <strong>in</strong>formati<strong>on</strong> about the extent of the phenomen<strong>on</strong>. Nevertheless, there<br />

is a demand for data that could provide po<strong>in</strong>ters <strong>in</strong> relati<strong>on</strong> to it. As Stol (2010) rightly notes: “In<br />

order to tackle a safety problem, we must beg<strong>in</strong> to gather <strong>in</strong>formati<strong>on</strong> about that problem. […] The very first questi<strong>on</strong><br />

to which we must f<strong>in</strong>d the answer is, of course: how often does this problem occur?”. 365 As the safety issue with<br />

regard to cyberspace is becom<strong>in</strong>g more significant and more complex, whilst at the same time we<br />

know little about it, the Cybersafety lectureship was created at the NHL Hogeschool [NHL University<br />

of Applied Sciences] <strong>in</strong> 2008 366 . With<strong>in</strong> the scope of that faculty department, research was and is<br />

be<strong>in</strong>g c<strong>on</strong>ducted <strong>in</strong>to this issue, as part of the three research programmes ‘trends <strong>in</strong> cybercrime’,<br />

‘youth and cybersafety’ and ‘bus<strong>in</strong>ess and cybersafety’. 367 Interest<strong>in</strong>g research f<strong>in</strong>d<strong>in</strong>gs have already<br />

been published <strong>in</strong> fields <strong>in</strong>clud<strong>in</strong>g the (overlapp<strong>in</strong>g) area of child pornography, 368 and more can be<br />

expected <strong>in</strong> the future. 369<br />

1.5.1 The number of perpetrators – safety <strong>in</strong> numbers<br />

The number of <strong>in</strong>dividuals who are <strong>in</strong>volved <strong>in</strong> child pornography (producti<strong>on</strong>, distributi<strong>on</strong>, possessi<strong>on</strong>/<br />

view<strong>in</strong>g of child abuse material) is not known 370 and is potentially <strong>on</strong> the <strong>in</strong>crease. 371 Even so, (disputable)<br />

estimates are published <strong>on</strong> a regular basis, and it is not uncomm<strong>on</strong> for these figures to take <strong>on</strong> a<br />

life of their own. 372 It is precisely because little is known about these figures that many authors borrow<br />

<strong>in</strong>formati<strong>on</strong> from <strong>on</strong>e another and c<strong>on</strong>sequently statistics appear to be accurate (also known as the<br />

copycat effect 373 ). However, certa<strong>in</strong>ly with<strong>in</strong> the c<strong>on</strong>text of child pornography – a crime that is so closely<br />

associated with the c<strong>on</strong>stantly develop<strong>in</strong>g <strong>on</strong>l<strong>in</strong>e world – this must be avoided, unless the c<strong>on</strong>text (<strong>in</strong>-<br />

364 See §3.5.4 for statistical data c<strong>on</strong>cern<strong>in</strong>g prosecuted suspects and c<strong>on</strong>victed <strong>in</strong>dividuals <strong>in</strong> the<br />

Netherlands.<br />

365 Stol, 2010.<br />

366 Stol, 2010.<br />

367 Stol, 2010.<br />

368 One example is the publicati<strong>on</strong> by Leukfeldt et al. <strong>in</strong> 2010. This describes the f<strong>in</strong>d<strong>in</strong>gs of an exploratory<br />

study of five cybercrimes, <strong>in</strong>clud<strong>in</strong>g child pornography.<br />

369 Stol, 2010.<br />

370 Quayle et al., 2008, p.27.<br />

371 Report of the Special <str<strong>on</strong>g>Rapporteur</str<strong>on</strong>g> <strong>on</strong> the sale of children, child prostituti<strong>on</strong> and child pornography (Ms.<br />

Najat M’jid Maalla), UN Doc A/HRC/12/23, 13 July 2009. In this report the Special <str<strong>on</strong>g>Rapporteur</str<strong>on</strong>g> stated that<br />

750,000 ‘predators’ are c<strong>on</strong>nected to the Internet at any given time (it is not clear whether they are<br />

therefore search<strong>in</strong>g for victims or child abuse material) and that hundreds of thousands of searches for<br />

child abuse material are entered <strong>on</strong> a daily basis. These f<strong>in</strong>d<strong>in</strong>gs are based up<strong>on</strong> a questi<strong>on</strong>naire that<br />

was drawn up and then completed by governments, <strong>in</strong>ternati<strong>on</strong>al organisati<strong>on</strong>s, n<strong>on</strong>-governmental<br />

organisati<strong>on</strong>s and the private sector <strong>in</strong> March 2009.<br />

372 For that matter, this applies just as much to statistics c<strong>on</strong>cern<strong>in</strong>g the number of victims and the extent<br />

of child abuse material.<br />

373 Leukfeldt et al., 2010, p.254.<br />

81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!