12.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

As <strong>the</strong> genre is so new, <strong>the</strong>re have been few achievements with respect <strong>to</strong> child protectionand social network<strong>in</strong>g sites. Like much of <strong>the</strong> Internet, <strong>the</strong> sites <strong>the</strong>mselves often gounmoni<strong>to</strong>red and unregulated. They are largely dependent on <strong>the</strong> end-user <strong>to</strong> act as apolice force by report<strong>in</strong>g any <strong>in</strong>appropriate content <strong>to</strong> <strong>the</strong> site adm<strong>in</strong>istra<strong>to</strong>rs. As a result,effort has been placed on try<strong>in</strong>g <strong>to</strong> ensure <strong>the</strong> end-user is age appropriate and can makeappropriate decisions. Some sites have set m<strong>in</strong>imum age registrations for use of <strong>the</strong>ir pages,most often be<strong>in</strong>g 13 years of age. In order <strong>to</strong> prevent children from falsely represent<strong>in</strong>g<strong>the</strong>ir ages, some technologies have been implemented <strong>to</strong> attempt verification. 3735.6 Software Manufacturers and Onl<strong>in</strong>e Gam<strong>in</strong>gRecognis<strong>in</strong>g that <strong>the</strong>re is an <strong>in</strong>sufficient amount of law enforcement personnel <strong>to</strong> personallyscan every suspected image of child abuse, o<strong>the</strong>r mechanisms for <strong>the</strong> <strong>in</strong>vestigations ofInternet crimes aga<strong>in</strong>st children are required. A few computerised databases conta<strong>in</strong><strong>in</strong>gchild abuse images and images of those <strong>in</strong>volved <strong>in</strong> <strong>the</strong> abuse, have been developed with<strong>the</strong> assistance of private sec<strong>to</strong>r software manufacturers. In 2003, Imagis formally launched<strong>Child</strong>Base, a program that digitalises images and <strong>in</strong> m<strong>in</strong>utes provides <strong>in</strong><strong>format</strong>ion aboutits content. 374 This particular database saves law enforcement agencies significant time as itmatches pictures <strong>to</strong> determ<strong>in</strong>e if <strong>the</strong> image has been viewed by someone else on a previousoccasion. As well, this software cross-references facial features that do not change, evenwith ag<strong>in</strong>g. As well, <strong>the</strong> software can identify where <strong>the</strong> abuse <strong>to</strong>ok place by focus<strong>in</strong>g on<strong>the</strong> physical environment and <strong>the</strong> architectural features. For <strong>in</strong>stance, a child abuse pictureconta<strong>in</strong><strong>in</strong>g a unique look<strong>in</strong>g roof directed law enforcement officials <strong>to</strong> a country, city andneighbourhood where <strong>the</strong>y would be able <strong>to</strong> f<strong>in</strong>d a roof similar <strong>to</strong> that conta<strong>in</strong>ed <strong>in</strong> <strong>the</strong>picture. It is <strong>in</strong>terest<strong>in</strong>g <strong>to</strong> note that Imagis sells its software <strong>to</strong> police departments.A similar software database has been designed and sponsored by Microsoft Canada, after<strong>the</strong>y received a plea from Canadian law enforcements. <strong>Child</strong> Exploitation Track<strong>in</strong>g System(CETS), a $US 2.5 million project funded by Microsoft International, provides advancedsoftware <strong>to</strong>ols and technology <strong>to</strong> be used by <strong>in</strong>vestiga<strong>to</strong>rs. Developed <strong>in</strong> partnership with<strong>the</strong> Royal Canadian Mounted Police and <strong>the</strong> Toron<strong>to</strong> Police Service, CETS serves asa good example of how law enforcements and <strong>the</strong> software <strong>in</strong>dustry can work <strong>to</strong>ge<strong>the</strong>r.This track<strong>in</strong>g system does not repeat <strong>in</strong><strong>format</strong>ion but ra<strong>the</strong>r l<strong>in</strong>ks crim<strong>in</strong>al behaviouronl<strong>in</strong>e and allows computer systems from different countries and different technologies <strong>to</strong>communicate with one ano<strong>the</strong>r.Onl<strong>in</strong>e games are games played over some form of computer network. At <strong>the</strong> present, thisalmost always means <strong>the</strong> Internet or equivalent technology; but games have always used92|Private Sec<strong>to</strong>r Accountability <strong>in</strong> Combat<strong>in</strong>g <strong>the</strong> Commercial Sexual Exploitation of <strong>Child</strong>ren

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!