Child Sexual Abuse Material and the Internet (part 2):

Similar documents
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

FACT SHEET: PROJECT SAFE CHILDHOOD

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Optional Protocol on the sale of children, child prostitution and child pornography

Online grooming: What changes with the new legislation?

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

Cybercrime: Improving international cooperation

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

UNITED NATIONS Press Release Committee on the Rights of the Child 16 January 2009

Commercial Sexual Exploitation of Children Online A Strategic Assessment

Cyber Crime and Data Retention

Situation of trafficking in Thailand

Service and anonymisation.

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign

OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY

National Resources for Sex Trafficking

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

CRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations

CASES FORWARDED WITH REGARD TO CORRUPTION

First Pacific Islands Capacity Building Workshop on Child Online Protection

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Migration/ Asylum. Co-operation in the field of drugs

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legislative Council Panel on Security. Subcommittee on Police s Handling of Sex Workers and Searches of Detainees

COUNCIL OF THE EUROPEAN UNION. Brussels, 17 December 2003 (OR. en) 14994/03. Interinstitutional File: 2002/0043 (CNS) MIGR 101

Criminal Code (Child Pornography and Abuse) Amendment Bill 2004

Australian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting

ACT AGAINST HUMAN TRAFFICKING

Computer Facilitated Crimes Against Children International Law Enforcement Training

Alternative Report to the First National Report of Switzerland

Prepared by Daniel C. Préfontaine, Q.C., Director and Chief Executive Officer

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Regional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.

Threat Assessment of Child Sexual Exploitation and Abuse

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM:

Qatari Law NO. (15)OF YEAR 2011 On Combating Trafficking in Human Beings

The Massachusetts Strategic Plan for Cyber Crime

Eurojust. The European Union s Judicial Cooperation Unit

Resolution 11/3. Trafficking in persons, especially women and children

USSC Update: Recent Congressional Reports

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE

Jackpot! Money Laundering Through Online Gambling

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

Julia Davidson, PhD Professor of Criminology, Kingston University Safer Internet. Pl Keeping Children & Young People Safe Online, 3 rd International

Council of Europe campaign to stop sexual violence against children

Using blocking to combat online child abuse images: Questions & Answers

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

TESTIMONY OF COOK COUNTY STATE S ATTORNEY ANITA ALVAREZ SENATE JUDICIARY SUBCOMMITTEE ON HUMAN RIGHTS AND THE LAW

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO)

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES

CEOP Relationship Management Strategy

Supported by. World Trademark Review. Anti-counterfeiting. Poland. Contributing firm Patpol Patent & Trademark Attorneys.

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

CRIMINAL JUSTICE AND COURTS BILL. Factsheet Revenge Pornography

Cyber intelligence exchange in business environment : a battle for trust and data

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

GENDER EQUALITY AND WOMEN S RIGHTS. Council of Europe Standards

International information exchange and law enforcement cooperation

Royal Canadian Mounted Police Cybercrime Strategy

STATEMENT PETER T. EDGE EXECUTIVE ASSOCIATE DIRECTOR HOMELAND SECURITY INVESTIGATIONS

Victim/Witness Security and Protection

The Rio de Janeiro Declaration and Call for Action to Prevent and Stop Sexual Exploitation of Children and Adolescents. Preamble

ADVANCE UNEDITED VERSION

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

LAW ENFORCEMENT and LEGAL FRAMEWORK (EAST AFRICAN REGION)

OFFICIAL. Operational Case for the Retention of Internet Connection Records

ARRANGEMENT OF SECTIONS

Good practices and tools for use in case management, including by front-line law enforcement authorities responding to trafficking in persons

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

The global challenge

CYBERCRIME AND THE LAW

Trends : Increase in numbers of children sexually exploited Younger children New vulnerable groups (displaced children, etc.) HIV/AIDS pandemic growth

CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)

Accessing electronically stored evidence of child exploitation material offences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

Vortrag Dubrovnik SS 2013

The Protocol to Eliminate Illicit Trade in Tobacco Products: an overview

An Overview of Cybersecurity and Cybercrime in Taiwan

Queensland. Criminal Code (Filming or Possessing Images of Violence Against Schoolchildren) Amendment Bill 2010

PROPOSED REFORMS TO COMMONWEALTH CHILD SEX-RELATED OFFENCES. 1 of 77

Convention on the Elimination of All Forms of Discrimination against Women

Compensation. International framework Marjan Wijers

FORMULATING AN EFFECTIVE ANTI-CORRUPTION STRATEGY THE EXPERIENCE OF HONG KONG ICAC

United Kingdom Human Trafficking Centre

Corporations and Human Rights: Do They Have Obligations?

SORNA Substantial Implementation Review State of Tennessee

Classification scheme Criminal law and criminology (STR)

Department of Criminal Justice Services Frequently Asked Questions (FAQ)

Transcription:

Child Sexual Abuse Material and the Internet (part 2): Challenges for the Law Enforcement Agencies Child sexual abuse material (CSAM) distribution on the Internet is overwhelming law enforcement worldwide: once an image is uploaded, it passes from hand to hand, is distributed in thousands of copies and will never be completely removed from circulation. CSAM from the 1970s and 1980s is still being distributed and exchanged, even the published CSAM from the 1960s, also known as pedophile press 1, has been scanned and distributed online, not to mention all the material produced since digital cameras and smartphones became widely available. The number of unique CSAM in existence can only grow. This is the second part of an analysis which examines the interaction between CSAM and the Internet. The first part investigated the influence that new technologies have on the CSAM phenomenon and the profiles of CSAM offenders. This part delves into the extent of the problem, the difficulties to measure it, the challenges that law enforcement encounters and the major steps taken on international, European and Belgian levels in order to combat CSAM online. I Quantifying the scale of CSAM trade online It is almost impossible to accurately quantify the problem of CSAM on the Internet: websites appear and are taken down by law enforcement or NGOs very quickly but may pop up the next day with a different domain name or appear simultaneously under several different URLs. A great part of CSAM is distributed not on websites but through P2P networks and hidden levels of the Internet the Darknets 2, where quantification is even more difficult. 1 Published pornography magazines depicting minors of all ages that, in the period between the 1960s and the 1970s, were available to be legally bought in pornography shops of many European countries. 2 See ECPAT Belgium, «In the shadows of the Internet: child sexual abuse materials in the Darknets» (June 2015). 1

Most estimations agree that the size of the phenomenon is really significant and growing together with the growth of Internet access worldwide and widespread availability of mobile devices 3. The scale can be illustrated with the fact that any major international law enforcement operation in the last years aimed at online CSAM distribution networks uncovered from hundreds to thousands of suspects: from the well- known case of the Wonderland Club, a CSAM exchange network taken down by an international investigation in 1998 when 104 arrests were carried out simultaneously in 13 countries 4, to the Operation Ore an investigation in Britain which was launched in 2002 with over 7 thousand suspects and concluded with 1,837 convictions at the end of the prosecution process 5. Furthermore, in recent years a new phenomenon appeared that is even more difficult to trace: the live streaming of sexual abuse of children 6. The offender orders an online sexual abuse of children, which is perpetrated live by a third person. Unless it has been recorded, no evidence of the abuse is available. A case study, called Sweetie, which used an animated and realistic 3D image of a 10- year- old girl to imitate a real child in the webcam sex tourism industry, astonished the world when its results were revealed in 2013. During the 3 months of investigation, "Sweetie" was contacted by nearly 20,000 Web users, a 1,000 of whom offered money for sex acts performed in front of the camera 7. The low prices asked for such sessions permit the offenders to pay for them any time they want to see CSAM, instead of downloading this material and saving it for later and repeated viewing. Unfortunately, the low amount of money transferred rarely raises any suspicions in the banking sector and the real- time viewing might not leave any traces on the offender's computer. In addition, the number of existing CSAM would not correspond to the numbers of abused children, as CSAM images are often produced in series and the same children may appear in multiple CSAM sets. Also, the number of seized material during police operations is misleading as the same CSAM can be seen over and over again in possession of different offenders. Therefore, the totals do not represent unique images but contain a lot of 3 European Financial Coalition against Commercial Sexual Exploitation of Children online, Strategic Assessment of Commercial Sexual Exploitation of Children Online, p. 17: http://www.europeanfinancialcoalition.eu/private10/images/news/pdf/65.pdf 4 http://www.theguardian.com/uk/2001/feb/11/tracymcveigh.martinbright 5 http://www.bbc.com/news/magazine- 20237564 6 See ECPAT Belgium: "Child sex tourism via webcam, a disturbing new trend", August 2014, http://ecpat.be/wp- content/uploads/2014/09/le- tourisme- sexuel- impliquant- des- enfants- via- webcam1.pdf. 7 http://www.theguardian.com/world/2007/oct/16/internationalcrime.thailand 2

duplication. Finally, different jurisdictions and law enforcement agencies have different definitions and counting methodologies. All these issues contribute to the lack of knowledge about the current magnitude of CSAM trade online. II The challenges and opportunities of fight against CSAM on the Internet Despite the enormous efforts of law enforcement, NGOs and civil society actors, only a small part of all CSAM offenders are ever apprehended. One of the main reasons for this is the global nature of the Internet. Once an investigation into CSAM- related offences starts, it is most likely to lead the investigator outside the boundaries of his own national jurisdiction: the servers hosting CSAM might be in another country, the CSAM itself might be produced in a third country by an offender who travelled from a yet another country. Therefore, coordination and collaboration between national law enforcement agencies are imperative to the success of an investigation. However, even when the law enforcement is willing to cooperate, different legal definitions of the crime, different legal procedures, limits for the age of consent, length of procedures, and even the political and cultural contexts might forestall the success of an investigation. An excellent example is the famous case of Christopher Paul Neil, a child molester, who was identified in CSAM by INTERPOL and later arrested for abuse of young boys in Cambodia and Thailand 8. The material was analysed in Germany, then passed on to INTERPOL which launched an international manhunt for the man. He was then identified to be a Canadian citizen residing in South Korea and have fled to Thailand after having been identified. In this case the offender was successfully apprehended but we can only imagine the efforts which were needed in all these jurisdictions. As the offenders often hide themselves behind anonymizing software and encryption, law enforcement is rarely able to find such identifying information as IP addresses. Victim identification becomes the crucial element. Because the majority of CSAM that is circulating online is historic and recycled, any time a new picture or video are identified, this means 8 http://www.theguardian.com/world/2007/oct/16/internationalcrime.thailand. 3

ongoing or recent abuse 9 : if the child can be identified, that child then can be saved from the abusive environment. Hash 10 values help separate which images were previously identified by law enforcement so that the investigator can focus on the new images first, looking for any clues in the image to help identify the victim, the location or the perpetrator. Sometimes even a single detail, like a water bottle 11 or a road sign 12 in the background, can point in the right direction. III Responses at international, European and Belgian levels The seriousness of the problem calls for immediate solutions. And we have seen some significant steps taken in this direction by many law enforcement agencies and other stakeholders. INTERPOL and Europol are playing a central role in the cooperation between law enforcement agencies in different jurisdictions, victim identification and support to international operations. The International Child Sexual Exploitation image database (ICSE DB), managed by INTERPOL, is a good example of how police expertise from all over the world can work together effectively and timely 13. Europol's European Cybercrime Centre (EC3) is also tackling the problem of child sexual exploitation and distribution of CSAM 14. The Focal Point (FP) Twins in EC3 supports European Union's local authorities in preventing and combatting child sexual exploitation. They provide assistance and expertise where needed and requested. The European Financial Coalition against Commercial Sexual Exploitation of Children Online was created in 2012 in order to bring the main European stakeholders together. The Coalition assembles law enforcement, NGOs active in the field of child protection, financial institutions and Internet technology corporations. It is active in five different focus areas: 9 EUROPOL, «Virtual Global Taskforce Environmental Scan 2012», p. 15, available at: https://www.europol.europa.eu/content/virtual- global- taskforce- environmental- scan- 2012 10 Hash value is an alpha- numerical code generated by an algorithm; this code is often used in computer forensics to identify files with certainty. 11 http://www.kctv5.com/story/18619292/shawnee- mission- teachers- help- identify- porn- victims- prosecutors- say 12 http://www.nbcphiladelphia.com/news/local/new- Efforts- to- Identify- Victims- Gain- Traction- 278678451.html 13 INTERPOL, Victim identification, available at: http://www.interpol.int/en/crime- areas/crimes- against- children/victim- identification. 14 EUROPOL, Sexual exploitation of children, available at: https://www.europol.europa.eu/ec3/child- sexual- exploitation. 4

operational support, strategic analysis & reporting, private sector support & cooperation, training and awareness raising 15. In 2012 Belgium ratified the Budapest Convention on Cybercrime, which dates back to 2001. Its aims were to harmonise national legislations, increase effectiveness of investigative techniques, procedural measures and international co- operation 16. Part of this Convention explicitly addresses child pornography crimes. Article 383bis, which in the Belgian Penal Code introduced the provisions on child pornography already in 1995, was later amended to be more in line with the Budapest Convention and incorporate the specifics of CSAM distribution online. Unfortunately, the Belgian criminal law still doesn't contain a legal definition of what material constitutes CSAM and this may lead to ambiguities during prosecution or when seeking international cooperation 17. Furthermore, Belgium has the so- called extra- territorial legislation (a tool which allows the Belgian courts to prosecute Belgian nationals/residents for crimes committed abroad) a very important legal instrument in the field of child sexual exploitation offences. Belgium has also made several commitments to fight against online child sexual abuse material: CSAM crimes online can be reported directly to the police 18 or a civil hotline 19 and a specific Anti- Trafficking Unit in the Federal Police investigates these crimes. There is also a cooperation agreement between the police and the coordinator of the civil hotline, Child Focus 20. Belgium participates in an important international project CIRCAMP (COSPOL Internet Related Child Abuse Material Project) and Belgian Federal Police is one of 15 European Financial Coalition against Commercial Sexual Exploitation of Children online, http://www.europeanfinancialcoalition.eu/private10/images/news/pdf/65.pdf 16 http://www.timelex.eu/en/blog/detail/belgium- ratifies- budapest- convention- on- cybercrime 17 ECPAT International/ECPAT Belgium (2014), «Global Monitoring status of action against commercial sexual exploitation of children. Belgium», pp.24-25. 18 https://www.ecops.be/webforms/default.aspx?lang=en 19 http://stopchildporno.be/en/home- en/ 20 Service for Criminal Policy, Sexual offences, http://www.dsb- spc.be/web/index.php?itemid=86&id=61&option=com_content&task=view&lang=french. 5

three national partners that, together with INTERPOL, are creating a new video analysis database aimed at victim identification in child sexual abuse material 21. From 2012 Belgium criminalizes access to CSAM on the same level as its possession an amendment which was made necessary by the spread of live child sexual abuse streaming on the Internet and technologies, which allow storage of files on separate servers and not on a personal computer 22. IV Conclusion Users of child sexual abuse material unfortunately still have a head start on police in order to better conceal their crimes. Therefore, and despite the efforts made, the police and judicial authorities are not able to measure the extent of this phenomenon, nor to fight effectively against it. These services must make an investment not only in their technological resources but also human resources (such as continuous training for investigators and analysts) to address these crimes. An open and clear partnership is also required for an effective action to combat CSAM online: between law enforcement agencies, judicial authorities, the Information and Communications Technologies (ICT) industry, Internet Service Providers (ISPs), the banking sector and the NGOs 23. A proactive approach by ISPs to identify CSAM on their infrastructure and banking sector to identify and trace suspicious payments for indecent material plays a particularly important role in this case. The creation of European Financial Coalition against Commercial Sexual Exploitation of Children Online shows a very welcome step in this direction, but the Internet does not have any borders and, therefore, the Coalition should expand to be global in order to reach its full potential. 21 INTERPOL, Victim identification, available at: http://www.interpol.int/en/crime- areas/crimes- against- children/victim- identification. 22 ECPAT International/ECPAT Belgium (2014), p. 25. 23 http://www.europeanfinancialcoalition.eu/private10/images/document/1.pdf 6

This analysis was written in June 2015 by Justė Neverauskaitė and reviewed by ECPAT Belgium. ECPAT Belgium is the Belgian member of ECPAT International (End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes). The mission of ECPAT Belgium is to fight against sexual exploitation of children for commercial purposes: child prostitution, child pornography, trafficking of children for sexual purposes and child sex tourism. ECPAT Belgique Rue du Marché aux Poulets, 30 1000 Bruxelles Tél: 02/522.63.23 Email: info@ecpat.be 7