12.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Research is currently be<strong>in</strong>g undertaken <strong>to</strong> verify <strong>the</strong> extent <strong>to</strong> which ISPs can be expected <strong>to</strong>participate <strong>in</strong> <strong>the</strong> elim<strong>in</strong>ation of child pornography from <strong>the</strong> Internet. 358 It has been widelyacknowledged that ISPs are well positioned <strong>to</strong> assist <strong>in</strong> <strong>the</strong> fight because offenders needISPs <strong>to</strong> access <strong>the</strong> Internet, and law enforcement officials need ISPs <strong>to</strong> trace offenders. 359Some potential solutions <strong>in</strong>clude requir<strong>in</strong>g ISPs <strong>to</strong> record and verify client data <strong>to</strong> ensure<strong>the</strong> names provided are not false; requir<strong>in</strong>g ISPs <strong>to</strong> keep records of <strong>in</strong><strong>format</strong>ion that havepassed through <strong>the</strong>ir servers for an agreed-upon m<strong>in</strong>imum amount of time; requir<strong>in</strong>gISPs <strong>to</strong> select which Usenet groups <strong>to</strong> mount, reject<strong>in</strong>g those who explicitly <strong>in</strong>dicatethat <strong>the</strong> contents may <strong>in</strong>clude pornography. The Australian Internet Association recentlyestablished a code of conduct <strong>to</strong> beg<strong>in</strong> lay<strong>in</strong>g a framework for such ethical practices.ECPAT International recently signed contracts with ten major ISPs from Taiwan <strong>to</strong>protect children from harmful content on <strong>the</strong> Internet. The ISPs are obligated <strong>to</strong> create achild protection team, as well as <strong>in</strong>clude a section on <strong>the</strong> website for child safety. 360Although hav<strong>in</strong>g <strong>the</strong> ISPs on board would be a help, it would not solve <strong>the</strong> entire problem.In North America, <strong>the</strong>re have been a series of cases <strong>in</strong>volv<strong>in</strong>g s<strong>to</strong>len wireless connections.“War driv<strong>in</strong>g” is a common phrase used for <strong>in</strong>dividuals who drive <strong>in</strong> neighbourhoodswith a lap<strong>to</strong>p and try <strong>to</strong> <strong>in</strong>tercept Internet connection from nearby homes. This allows<strong>the</strong> <strong>in</strong>dividual <strong>to</strong> look at illegal sites without gett<strong>in</strong>g caught because <strong>the</strong> only lead <strong>the</strong> ISPwould have is <strong>to</strong> <strong>the</strong> person who <strong>the</strong> Internet connection belongs <strong>to</strong>. 361Encryption software provides a fur<strong>the</strong>r challenge <strong>to</strong> law enforcement agencies attempt<strong>in</strong>g<strong>to</strong> <strong>in</strong>vestigate and prosecute child sex offenders. A MNC <strong>in</strong>vestigation concern<strong>in</strong>g <strong>the</strong>world’s largest Internet pornography r<strong>in</strong>g illustrates <strong>the</strong> difficulties of such encryptionprograms. Upon <strong>the</strong> discovery and arrest of various members of <strong>the</strong> “Wonderland Club”,a r<strong>in</strong>g collaborat<strong>in</strong>g <strong>in</strong> <strong>the</strong> fabrication and possession of nearly one million pornographicrepresentations of children, authorities were unable <strong>to</strong> crack all <strong>the</strong> encryption codes <strong>to</strong> revealevidence of <strong>the</strong> crimes. 362 The Soviet KGB allegedly developed <strong>the</strong> encryption programsthat were used by members of <strong>the</strong> Wonderland Club. In a Canadian case, <strong>the</strong> man who wascharged with child pornography had “forgotten” <strong>the</strong> password <strong>to</strong> <strong>the</strong> <strong>in</strong>stalled encryptionsoftware, <strong>the</strong>refore police were unable <strong>to</strong> access 41,000 files of pictures. 363 Investiga<strong>to</strong>rswith <strong>the</strong> British National Crime Squad, US Cus<strong>to</strong>ms and Interpol, work<strong>in</strong>g <strong>to</strong>ge<strong>the</strong>r, wereunable <strong>to</strong> decode <strong>the</strong> software used for both Internet transmission and hard drive copiesand were thus unable <strong>to</strong> secure all <strong>the</strong> evidence required <strong>to</strong> br<strong>in</strong>g <strong>the</strong> case <strong>to</strong> trial. 364Virtual payment is ano<strong>the</strong>r way for offenders <strong>to</strong> rema<strong>in</strong> anonymous. Credit card companiesare be<strong>in</strong>g urged <strong>to</strong> s<strong>to</strong>p accept<strong>in</strong>g payment for child pornography websites, this <strong>in</strong>cludess<strong>to</strong>pp<strong>in</strong>g payments through ‘”e-gold”, which allows purchasers <strong>to</strong> hide credit card<strong>in</strong><strong>format</strong>ion. Paypal, an onl<strong>in</strong>e payment processor, announced that it would f<strong>in</strong>e cus<strong>to</strong>mersPrivate Sec<strong>to</strong>r Accountability <strong>in</strong> Combat<strong>in</strong>g <strong>the</strong> Commercial Sexual Exploitation of <strong>Child</strong>ren|89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!