12.07.2015 Views

sexual exploitation of children over the internet - Meldpunt ...

sexual exploitation of children over the internet - Meldpunt ...

sexual exploitation of children over the internet - Meldpunt ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

efforts with respect to child pornography images are mostly reactive. As some pipelineproviders explained to <strong>the</strong> Subcommittee, <strong>the</strong> primary way <strong>the</strong>y disc<strong>over</strong> childpornography images on <strong>the</strong>ir networks is by customer reports or complaints, which <strong>the</strong>pipeline provider <strong>the</strong>n forwards to NCMEC. Pipeline providers also respond to lawenforcement agents’ requests and subpoenas for customer information.In addition to <strong>the</strong>ir proactive measures, <strong>the</strong> Internet Service Providers also explained<strong>the</strong>ir data retention policies and addressed <strong>the</strong> announcement <strong>of</strong> <strong>the</strong> Department <strong>of</strong> Justicethat it intended to explore with ISPs establishing a uniform data retention policy for <strong>the</strong>purpose <strong>of</strong> enhancing law enforcement’s investigations <strong>of</strong> Internet child pornography. 17As discussed previously, law enforcement agents who testified at <strong>the</strong> Subcommittee’sApril and May hearings explained that inadequate data retention policies had prevented<strong>the</strong>m in some cases from identifying individuals who create or distribute childpornography images <strong>over</strong> <strong>the</strong> Internet.While all <strong>the</strong> Internet Service Providers testified that <strong>the</strong>y report images <strong>of</strong> apparentchild pornography to NCMEC when <strong>the</strong>y disc<strong>over</strong> it on <strong>the</strong>ir networks and that <strong>the</strong>yattempt to respond to law enforcement agents’ requests and subpoenas as expeditiously aspossible, <strong>the</strong> data retention policies <strong>of</strong> <strong>the</strong> ISPs that testified at <strong>the</strong> hearing vary widely,from 60 days to seven years. Testimony provided at <strong>the</strong> hearing suggests that <strong>the</strong> cost <strong>of</strong>data retention is a determining factor in setting <strong>the</strong> retention period. AOL, for example,testified that retaining <strong>the</strong> IP addresses for each user session <strong>of</strong> every AOL user wouldcost $44 million per year. Several factors have a bearing on <strong>the</strong> cost, for example, <strong>the</strong>types <strong>of</strong> services <strong>of</strong>fered by <strong>the</strong> provider, <strong>the</strong> number <strong>of</strong> users, and whe<strong>the</strong>r <strong>the</strong> site is freeor available only to paid subscribers. However, law enforcement <strong>of</strong>ficials have stressedthat it is <strong>the</strong> ISPs that provide connectivity to <strong>the</strong> Internet which need to retain IPaddresses for at least one year for purposes <strong>of</strong> child pornography investigations.The operations <strong>of</strong> social networking websites were also examined at <strong>the</strong> June hearing.These websites have become increasingly popular in recent years, especially amongpreteens, teenagers and young adults. Registered users with social networking websitesare able to build personal webpages. These webpages <strong>of</strong>ten contain personal informationabout <strong>the</strong> user, such as where he or she attends school or works, <strong>the</strong>ir likes and dislikes,links to <strong>the</strong>ir friends’ webpages or o<strong>the</strong>r websites, contact information, and photographs.Recently, social networking websites have received a great deal <strong>of</strong> scrutiny as childpredators have used <strong>the</strong> information on <strong>children</strong>’s webpages to contact <strong>the</strong>m and togroom <strong>the</strong>m in anticipation <strong>of</strong> meeting <strong>the</strong>m in person. Facebook, MySpace, and Xangatestified about <strong>the</strong> safeguards <strong>the</strong>y have implemented on <strong>the</strong>ir websites. 18 Users <strong>of</strong> each17 At <strong>the</strong> time <strong>of</strong> <strong>the</strong> hearing, AOL retained <strong>the</strong> data that links an IP address to a customer’s name for 90days; Earthlink for seven years; Comcast for 180 days; Verizon for nine months.18 At <strong>the</strong> time <strong>of</strong> <strong>the</strong> hearing, MySpace had 80 million registered users; Xanga had 27 million; and Facebookhad more than 8 million. While Facebook, MySpace, and Xanga are each social networking websites, <strong>the</strong>yoperate differently with respect to how users can obtain access to <strong>the</strong> website. MySpace and Xanga areopen to <strong>the</strong> general public. Anyone with Internet access can open a MySpace or Xanga account and build apersonal webpage. In contrast, to join Facebook, a user must be validated into one <strong>of</strong> Facebook’s onlinecommunities. The communities are largely organized by high schools and colleges, but <strong>the</strong>re are also work22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!