Group of Specialists on the Impact of the Use of New Information Technologies on Trafficking in Human Beings for the Purpose of Sexual Exploitation (Eg-S-Nt)
Total Page:16
File Type:pdf, Size:1020Kb
Strasbourg, 16 September 2003 EG-S-NT (2002) 9 rev. GROUP OF SPECIALISTS ON THE IMPACT OF THE USE OF NEW INFORMATION TECHNOLOGIES ON TRAFFICKING IN HUMAN BEINGS FOR THE PURPOSE OF SEXUAL EXPLOITATION (EG-S-NT) Final report 2 EG-S-NT (2002) 9 rev. EG-S-NT (2002) 9 rev. 3 TABLE OF CONTENTS Introduction....................................................................................................................................................................7 I. The impact of the use of new information technologies on trafficking in human beings for the purpose of sexual exploitation: the scale of the phenomenon ..................................................................15 A. A study of the users............................................................................................................................17 1. The techniques used and how they work .....................................................................................17 2. The use of new technologies ...........................................................................................................22 3. The users...............................................................................................................................................30 B. Role of marriage agencies in trafficking in women and trafficking in images for the purpose of sexual exploitation.............................................................................................................................38 1. Recruitment of Women by Marriage Agencies in Countries of the Former Soviet Union ...............................................................................................................................................................39 2. Sexually exploitative services offered through marriage agencies..........................................44 3. Marriage agencies recruitment of vulnerable populations.......................................................44 4. Trafficking in Images for the purpose of sexual exploitation......................................................45 5. Conclusion ..........................................................................................................................................48 a. The Challenges...................................................................................................................................49 b. Denial of the harm.............................................................................................................................49 c. Disconnection between acts and images ...................................................................................49 II. Existing legislation in the different member States and the relevant international instruments..........50 A. At national level .................................................................................................................................50 1. Major Tendencies of the Relevant Legal Frameworks Sexual majority....................................58 2. Major Tendencies of the Relevant Legal Frameworks ................................................................60 a. General Remarks ...............................................................................................................................60 b. Specific Remarks Concerning Internet Law..................................................................................60 3. General Proposals..............................................................................................................................62 4. Specific proposals concerning Internet.........................................................................................63 B. At international level .........................................................................................................................63 C. Combating the illegal or harmful use of the Internet: how can law intervene - the example of the Yahoo case ................................................................................................................................64 1. Technical problems ...........................................................................................................................65 2. Law applicable ..................................................................................................................................65 3. Enforcement of the decision ...........................................................................................................65 4. Freedom of expression......................................................................................................................66 III. Protecting Human Rights and guaranteeing the use of new technologies: new challenges ...........67 A. Law enforcement and cases...........................................................................................................69 1. Legislation............................................................................................................................................69 2. Problems which need to be solved................................................................................................70 3. How the Internet is used ...................................................................................................................70 4. Retention of vital communication traffic data by telecommunication operators and telecommunication access and service providers ....................................................................................74 5. Why must traffic data be preserved? ............................................................................................74 6. Why is real-time or expedited traffic data collection not enough?.........................................75 i) Vital traffic data .................................................................................................................................76 ii) Retention period ................................................................................................................................77 B. The effects on the use of new information technologies on the victims - Protection of the victims ...........................................................................................................................................................79 1. Different types of victims ..................................................................................................................79 2. The effects on the use of new information technologies on the victims .................................80 3. Different types of perpetrators ........................................................................................................80 4 EG-S-NT (2002) 9 rev. 4. Protection of the victims ...................................................................................................................82 C. Prevention ...........................................................................................................................................82 D. The role of the Mass Media ..............................................................................................................85 1. The money matters............................................................................................................................86 2. The news values .................................................................................................................................88 3. New Approaches...............................................................................................................................89 E. Freedom of expression and the Internet .......................................................................................91 Conclusions and recommendations .......................................................................................................................93 Appendices................................................................................................................................................................101 Appendix 1 - Terms of reference of the EG-S-NT .................................................................................................103 Appendix 2 - List of the members of the group of specialists EG-S-NT ...........................................................105 Appendix 3 - List of international instruments.......................................................................................................107 Appendix 4 - State of signature and ratification of international instruments on action against trafficking ....................................................................................................................................................................109 Appendix 5 - Licra and UEJF vs. Yahoo! Inc. And Yahoo France order of november 20, 2000 by the Superior Court of Paris .......................................................................................................................................115 Appendix 6 - Catalogue of vital and significant traffic data............................................................................131 Appendix 7 - Schematic representation of the layered approach to determine data traffic to retain............................................................................................................................................................................134 Appendix 8 - Chapter