The use of such an objective measure <strong>in</strong>creases <strong>the</strong> likelihood of consistency acrosssentenc<strong>in</strong>g without necessitat<strong>in</strong>g that all <strong>in</strong>volved should have had <strong>to</strong> view <strong>the</strong> images, andis <strong>in</strong>creas<strong>in</strong>gly be<strong>in</strong>g used <strong>in</strong> countries outside of England and Wales (Cooper, 2006). Thereis understandable concern that repeated view<strong>in</strong>g of images may be problematic for <strong>the</strong>well-be<strong>in</strong>g of professionals (largely but not exclusively police) who work <strong>in</strong> this area, but afur<strong>the</strong>r consideration relates <strong>to</strong> <strong>the</strong> repeated view<strong>in</strong>g of images and fur<strong>the</strong>r victimisation of<strong>the</strong> children depicted. As Adam (2002) has suggested, “Clearly <strong>the</strong> gaze is used <strong>to</strong> terribleeffect <strong>in</strong> Internet child pornography cases where <strong>the</strong> difficulty of f<strong>in</strong>ally remov<strong>in</strong>g all copiesof <strong>the</strong> images from computer networks means that o<strong>the</strong>rs may cont<strong>in</strong>ue <strong>to</strong> gaze upon<strong>the</strong> images long after <strong>the</strong> orig<strong>in</strong>al perpetra<strong>to</strong>r has been brought <strong>to</strong> justice” (p. 135). Onedifficulty, however, is that while <strong>the</strong> COPINE typology was created as an <strong>in</strong>dica<strong>to</strong>r of howchildren are victimised through Internet child pornography, it is <strong>in</strong>creas<strong>in</strong>gly be<strong>in</strong>g usedby <strong>the</strong> courts as an <strong>in</strong>dica<strong>to</strong>r of <strong>the</strong> seriousness of <strong>the</strong> offence, or even <strong>the</strong> dangerousness of<strong>the</strong> offender. The latter is problematic, <strong>in</strong> that <strong>the</strong>re is little evidence <strong>to</strong> <strong>in</strong>dicate whe<strong>the</strong>r,for example, view<strong>in</strong>g images of children sexually engaged with animals is more likely <strong>to</strong><strong>in</strong>crease <strong>the</strong> risk of a contact offence than view<strong>in</strong>g images of children who are clo<strong>the</strong>d(Quayle, 2008). However, Gillespie (personal communication) argues that <strong>the</strong> difficultymay lie <strong>in</strong> <strong>the</strong> way that <strong>the</strong> law is phrased, ra<strong>the</strong>r than <strong>the</strong> use of <strong>the</strong> scale, as <strong>the</strong> SAPsuggested that <strong>the</strong> pho<strong>to</strong>graphs are ‘worse’ as <strong>the</strong>y progress through <strong>the</strong> levels, because <strong>the</strong>yshow more graphic imagery, and thus <strong>the</strong> punishment should be more severe.The discussion is an important one as underp<strong>in</strong>n<strong>in</strong>g <strong>the</strong> proposed change of term<strong>in</strong>ologyis a belief that <strong>the</strong> creation, distribution and collection of such images causes harm.However, <strong>the</strong> abuse might not <strong>in</strong>volve direct harm aga<strong>in</strong>st a given child, for example wherea pho<strong>to</strong>graph is taken without <strong>the</strong> child’s or <strong>the</strong> carer’s knowledge, but that it contributes<strong>to</strong>wards harms that seek <strong>to</strong> make sexual objects of children, and that <strong>the</strong> very trade of suchimages creates a marketplace that values <strong>the</strong> fur<strong>the</strong>r creation of images. This is where <strong>the</strong>dist<strong>in</strong>ction between sexual abuse, on <strong>the</strong> one hand, and sexual exploitation, on <strong>the</strong> o<strong>the</strong>r,becomes important. The exploiter of <strong>the</strong> abuse suffered by <strong>the</strong> child will commit an offenceaga<strong>in</strong>st <strong>the</strong> child <strong>in</strong> <strong>the</strong> image whe<strong>the</strong>r or not <strong>the</strong> child is aware of <strong>the</strong> fact that s/he hasbeen pho<strong>to</strong>graphed. The legal framework where image possession is deemed an offenceand where view<strong>in</strong>g of an image is likewise seen as a crime builds on <strong>the</strong> crim<strong>in</strong>alisationnot only of contact sexual abuse but also of <strong>the</strong> cont<strong>in</strong>ued exploitation that follows. Oneconsiderable challenge posed by such a debate is, <strong>in</strong> <strong>the</strong> context of <strong>the</strong> huge volume oflegal but sexualised material relat<strong>in</strong>g <strong>to</strong> children on <strong>the</strong> Internet, is how we might def<strong>in</strong>e<strong>the</strong>se images, and whe<strong>the</strong>r we should be attempt<strong>in</strong>g <strong>to</strong> control <strong>the</strong>ir distribution. Clearlywe cannot legislate aga<strong>in</strong>st fantasy, but K<strong>in</strong>g (2008) has argued that, “It is not clear…that <strong>the</strong> consumer (or <strong>the</strong> rest of society) can always (or ever) be sure what category aparticular image falls <strong>in</strong><strong>to</strong>, how much harm <strong>to</strong> <strong>the</strong> subject it represents, for however happy16|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e
and carefree <strong>the</strong> child seems <strong>to</strong> be, we cannot know what later effects she suffered (or,<strong>in</strong>deed, what she was subjected <strong>to</strong> after or as a result of that pho<strong>to</strong>graph). In fact it’sclear that some degree of harm is almost always done <strong>to</strong> <strong>the</strong> subject <strong>in</strong> <strong>the</strong> productionand distribution of child pornography of all k<strong>in</strong>ds…” (p. 332). K<strong>in</strong>g (2008) goes on <strong>to</strong>suggest that child pornography not only harms its immediate victims, <strong>the</strong> children whoseabuse is at its centre, but also harms o<strong>the</strong>r children through <strong>the</strong> actions and attitudes ofits consumers. Throughout this paper we will move <strong>in</strong>terchangeably between <strong>the</strong> terms‘child pornography’ and ‘abuse images’, as this reflects <strong>the</strong> current literature and legislation<strong>in</strong> this area. However, it is important <strong>to</strong> note that not all sexualised depictions of childrenare visual, and that <strong>the</strong> term ‘abusive materials’ might both capture this and lend itself <strong>to</strong>fur<strong>the</strong>r def<strong>in</strong>ition <strong>in</strong> <strong>in</strong>ternational law.This section emphasises <strong>the</strong> importance of attempt<strong>in</strong>g <strong>to</strong> dist<strong>in</strong>guish between sexualabuse and sexual exploitation <strong>in</strong> this technological context as it has significance no<strong>to</strong>nly for <strong>the</strong> impact on <strong>the</strong> child but also for <strong>the</strong> wider crim<strong>in</strong>al-justice and childprotectionresponses. We also note <strong>the</strong> use of <strong>the</strong> terms ‘child pornography’ and ‘childabuse images’ that is reflected <strong>in</strong> <strong>the</strong> current literature and legislation, and suggest thatnot all sexualised depictions of children are visual and that <strong>the</strong> term ‘abusive’ materials,when objectively def<strong>in</strong>ed, might both capture this and lend itself <strong>to</strong> fur<strong>the</strong>r def<strong>in</strong>ition<strong>in</strong> <strong>in</strong>ternational law.2.2 Virtual child pornographyOne fur<strong>the</strong>r forensic issue of concern relates <strong>to</strong> pseudo (digitally altered) images andvirtual child pornography. The Council of Europe’s Convention on <strong>the</strong> Protection of <strong>Child</strong>renaga<strong>in</strong>st Sexual Exploitation and Sexual Abuse, states that, “Each Party may reserve <strong>the</strong> rightnot <strong>to</strong> apply, <strong>in</strong> whole or <strong>in</strong> part, paragraph 1a. and e. <strong>to</strong> <strong>the</strong> production and possessionof pornographic material: consist<strong>in</strong>g exclusively of simulated representations or realisticimages of a non-existent child”. It appears that <strong>the</strong> issue of ‘virtual child pornography’ isleft largely unaddressed with<strong>in</strong> <strong>the</strong> <strong>in</strong>ternational framework, and <strong>the</strong>re is little consensusaround <strong>the</strong> necessity <strong>to</strong> make such materials crim<strong>in</strong>al. We will exam<strong>in</strong>e this <strong>in</strong> more detailwhen we consider Internet child pornography and <strong>the</strong> law.In relation <strong>to</strong> digitally altered images, Gillespie (2003) has raised important issues abouthow different an image has <strong>to</strong> be for it <strong>to</strong> constitute a pseudo-image, possession of which<strong>in</strong> England and Wales is likely <strong>to</strong> attract a lower sentence. In <strong>the</strong> US, <strong>the</strong> constitutionalityof virtual child pornography rema<strong>in</strong>s a critical issue. In Ashcroft v. Free Speech Coalition(2002) a majority of <strong>the</strong> Supreme Court struck down portions of <strong>the</strong> <strong>Child</strong> Pornography<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |17
- Page 5 and 6: Child Pornography and SexualExploit
- Page 7 and 8: 6.1.5 Media co-operation 956.1.6 Ev
- Page 9 and 10: Executive SummaryÜ This thematic p
- Page 11 and 12: importance for children who are sam
- Page 13 and 14: Actions to be achieved by 2013Toget
- Page 15 and 16: Positive advances were also noted,
- Page 17 and 18: 2. Adult perpetrators of abuse2.1 C
- Page 19 and 20: 2 (c) defined child pornography as,
- Page 21 and 22: Taylor, 2002). In part, this relate
- Page 23: Level 7: Explicit Sexual Activity.I
- Page 29 and 30: 2.3 The Internet sex offender, the
- Page 31 and 32: e criminalised before the offender
- Page 33 and 34: Non-secure collector: This person p
- Page 35 and 36: This section examines the potential
- Page 37 and 38: about sexually abusive practices an
- Page 39 and 40: Activity Number PercentagePhysical
- Page 41 and 42: searched for files on Gnutella are
- Page 43 and 44: for a minimum of several months, wi
- Page 45 and 46: develop a risk assessment that will
- Page 47 and 48: 3. Child victims of abuse via the n
- Page 49 and 50: that a more conservative estimate w
- Page 51 and 52: States need to demonstrate investme
- Page 53 and 54: we investigate such cases and how w
- Page 55 and 56: Table 5: Disclosure of abuse throug
- Page 57 and 58: Silbert (1989) made reference to th
- Page 59 and 60: they will have had no control over
- Page 61 and 62: 3.3 Children persuaded and coerced
- Page 63 and 64: all crimes in which the victim thou
- Page 65 and 66: situation have reported to one of t
- Page 67 and 68: programmed to make them difficult t
- Page 69 and 70: disorders, for young offenders with
- Page 71 and 72: ealising how widely they could be c
- Page 73 and 74: contexts, be seen as a consequence
- Page 75 and 76:
some people they connect with onlin
- Page 77 and 78:
Two studies by Lwin et al. (2008) l
- Page 79 and 80:
perhaps reaching the same conclusio
- Page 81 and 82:
4.5.2 Young people accessing child
- Page 83 and 84:
Some abusers intent on grooming you
- Page 85 and 86:
or young person’s experience of b
- Page 87 and 88:
for different psychosocial problems
- Page 89 and 90:
A recent study from Ukraine demonst
- Page 91 and 92:
paper, such as online abuse where t
- Page 93 and 94:
definition in Article 20 - Offences
- Page 95 and 96:
• Which is a visual or audio repr
- Page 97 and 98:
i. The display of the material by a
- Page 99 and 100:
sex offending, this would certainly
- Page 101 and 102:
the vast majority who met someone o
- Page 103 and 104:
6.1.6 Evaluation of impactFew infor
- Page 105 and 106:
most countries. However, such image
- Page 107 and 108:
of online child sexual abuse conten
- Page 109 and 110:
gambling). Based on research commis
- Page 111 and 112:
7. RecommendationsIn preparation of
- Page 113 and 114:
Endnotes1Dr. Ethel Quayle, COPINE R
- Page 115 and 116:
Bensimon, P. The role of pornograph
- Page 117 and 118:
Flood, M. Exposure to pornography a
- Page 119 and 120:
Joyce, E. and Kraut, R. Predicting
- Page 121 and 122:
Mitchell, K.J., Finkelhor, D. and W
- Page 123 and 124:
Shukan Bunshun. Yoji Rape Bon ga Ba
- Page 125:
Wolak, J., Finkelhor, D., Mitchell,