Child Pornography National Rapporteur on Trafficking in Human Beings

Total Page:16

File Type:pdf, Size:1020Kb

Child Pornography National Rapporteur on Trafficking in Human Beings 1 Child Pornography National Rapporteur on Trafficking in Human Beings Child Pornography First report of the Dutch National Rapporteur Child Pornography First report of the Dutch National Rapporteur First report of the Dutch National Rapporteur Postal address P.O. Box 20301 Dit2500 is EHeen The uitgave Hague van: MinisterieThe Netherlands van Veiligheid en Justitie PostbusT +31 (0)703704514 20301 | 2500 eh Den Haag www.rijksoverheid.nl/venjwww.bnrm.nl MaandMay 2012 2010 | Publicatienr: | Publicatienr: j-14260 j-0000 Publication Details Reference: National Rapporteur on Trafficking in Human Beings (2011). Child Pornography – First report of the Dutch National Rapporteur. The Hague: BNRM Bureau of the Dutch National Rapporteur P.O. Box 20301 2500 EH The Hague +31(0)70 3704514 www.bnrm.nl Lay-out: Het vlakke land, Rotterdam © bnrm 2011 0 Table of Contents Table of Contents 3 Overview of figures and tables 7 Abbreviations used 9 Foreword 17 Introduction 21 Current context 21 Scope covered by the reporting role 23 Perpetrators, victims and technology 25 Creating the reporting body 26 Structure of the report 28 1 The phenomenon of child pornography 31 1.1 Introduction 31 1.2 Developments over time 33 1.2.1 Introduction 33 1.2.2 The period up to the mid-1990s 33 1.2.3 Mid-1990s to present 39 1.3 Legal framework – Article 240b of the Dutch Criminal Code 49 1.4 The nature of child pornography 58 1.4.1 Technology 58 1.4.1.1 The nature of the material 58 1.4.1.2 The activities – ‘production’, ‘distribution’ and ‘possession’ 62 1.4.1.3 Functions of child abuse material for perpetrators 67 1.4.2 Perpetrators 68 1.4.3 Victims 75 1.5 The extent of child abuse material 80 1.5.1 The number of perpetrators – safety in numbers 81 1.5.2 The number of victims 83 1.5.3 The volume of child abuse material 87 1.6 Conclusion 89 2 The government agenda 91 2.1 Introduction 91 2.2 Policy developments since the early 1980s 92 2.3 The significance of the Lanzarote Convention 100 4 Child PornograPhy First report oF the Dutch NatioNal rapporteur 2.4 Security and Justice 101 2.4.1 Security and Justice: the digital dimension 102 2.4.2 Domestic violence 106 2.5 Health, Welfare and Sport 107 2.5.1 Sexual health 107 2.5.2 Regional Plan to Tackle Child Abuse 109 2.6 Education, Culture and Science 111 2.7 Social Affairs and Employment 112 2.8 Economic Affairs, Agriculture and Innovation 113 2.9 Conclusion 114 3 Implementation 115 3.1 Introduction 115 3.2 Prevention 118 3.2.1 Introduction 118 3.2.2 Prevention measures aimed at perpetrators 119 3.2.3 Prevention measures aimed at victims 122 3.2.4 Situational prevention 124 3.2.5 Public prevention measures 127 3.2.6 Conclusion 128 3.3 Identification & recording 129 3.3.1 The identification of perpetrators 130 3.3.1.1 Stop it Now! UK & Ireland 131 3.3.1.2 Stichting M. [Report Crime Anonymously] 134 3.3.2 The identification of victims 135 3.3.2.1 The Kindertelefoon service 141 3.3.2.2 Helpwanted.nl 143 3.3.2.3 Child Abuse Counselling and Reporting Centre 145 3.3.3 The identification of content 149 3.3.3.1 The Hotline Combating Child Pornography on the Internet 149 3.3.3.2 The Cyber Crime Reporting Website 154 3.3.4 Conclusion 156 3.4 Detection 157 3.4.1 Introduction 157 3.4.2 Working method in detection 157 3.4.3 Complications 167 3.4.4 The new structure 172 3.4.5 Conclusion 173 3.5 Prosecution and trial 175 3.5.1 Prosecution 175 3.5.2 Trial 178 3.5.3 Sentences and orders 181 3.5.4 Prosecution and trial in figures 190 3.5.4.1 Prosecution in figures 190 3.5.4.2 Cases concluded in first instance in figures 197 3.5.4.3 Cases settled on appeal in figures 202 5 Table of Contents 3.5.4.4 Characteristics of suspects and persons convicted 205 3.5.5 Trends 207 3.5.6 Conclusion 209 3.6 After-care for and supervision of sex offenders 210 3.6.1 Introduction 210 3.6.2 Legal framework 212 3.6.3 Integrated approach, after-care for and supervision of offenders 220 3.6.3.1 Starting points 221 3.6.3.2 Phases in the integrated approach 225 3.6.4 Youth offenders 235 3.6.5 Probation and after-care – quantitative data 237 3.6.6 Conclusion 242 3.7 Victim assistance 243 3.7.1 Introduction 243 3.7.2 Provision of assistance to victims of sexual abuse 244 3.7.3 Provision of assistance to victims of sexual abuse within the context of child pornography 248 3.7.4 Provision of assistance to victims of the distribution, possession and viewing of child abuse material 250 3.7.5 The Amsterdam sexual abuse case 251 3.7.6 Conclusion 254 3.8 Public-private sector partnerships in the Netherlands in the matter of child pornography 255 3.8.1 Introduction 255 3.8.2 Interplay of forces in public-private sector partnerships 256 3.8.3 Concrete (actions of ) public-private sector partnerships 260 3.8.3.1 Private sector 262 3.8.3.2 Intermediate-level social organisations 269 3.8.4 Direction of public-private sector partnerships in the Netherlands 271 3.8.5 Conclusion 276 4 Conclusions and recommendations 279 4.1 Core message 279 4.2 Where do matters stand at present? 280 4.2.1 Child pornography as a complex phenomenon 280 4.2.2 The government agenda 281 4.2.3 Implementation 283 4.2.3.1 General 283 4.2.3.2 Prevention 283 4.2.3.3 Identification and registration 285 4.2.3.4 Detection 286 4.2.3.5 Prosecution and trial 287 4.2.3.6 After-care and supervision 288 4.2.3.7 Victim assistance 289 4.2.3.8 Public-private sector partnerships 290 4.3 Connections 290 4.4 Specification and recommendations 291 6 Child PornograPhy First report oF the Dutch NatioNal rapporteur Bibliography 297 Appendix 307 A1 COPINE scale 309 A2 Justification of research methods used 311 1 The AMK study 311 2 The Public Prosecution Service data and Investigation & Research and Policy Database for Judicial Documentation study 312 3 The probation study 313 A3 Explanatory notes to tables, figures and statistics 315 1 Explanatory notes to tables 315 2 Explanatory notes to figures 315 3 Explanatory notes to statistics 315 A4 Supplementary tables 317 1 Supplement to §3.3.3.1 The Hotline Combating Child Pornography on the Internet 317 2a Supplement to §3.5.4.1 Prosecutions in figures 319 2b Supplement to §3.5.4.2 Cases concluded in first instance, in figures 323 2c Supplement to §3.5.4.3 Cases settled on appeal in figures 328 2d Supplement to §3.5.4.4 Characteristics of suspects and persons convicted 331 3 Supplement to §3.6.5 Probation and after-care – quantitative data 333 0 Overview of figures and tables Figure 0.1 Perpetrators, victims and technology 25 Figure 1.1 Moran’s pyramid model 73 Figure 3.1 Annual number of reports to the Hotline Combating Child Pornography on the Internet – including content reported in duplicate (2005-2010) 150 Figure 3.2 Annual reports – including content reported in duplicate – according to place where found 151 Figure 3.3 Proportion of unique reports relating to child abuse material compared with the total number of unique reports (2007-2010) 152 Figure 3.4 Proportion of unique reports of child abuse material on servers hosted in the Netherlands compared with the total number of unique reports of child abuse material (2005-2010) 152 Figure 3.5 Gender distribution amongst victims depicted in the incidences of child abuse material on servers in the Netherlands that were reported in 2010 153 Figure 3.6 Age distribution amongst victims depicted in the incidences of child abuse material on servers in the Netherlands that were reported in 2010 154 Figure 3.7 Number of cases registered with the Public Prosecution Service (2005-2010) 191 Figure 3.8 Cases registered in each district court public prosecutor’s office (total 2005-2010) 191 Figure 3.9 Nature of the registered cases (2005-2010) 192 Figure 3.10 Registered cases by gravest offences (2005-2010) 194 Figure 3.11 Registered cases and preventive detention (2005-2010) 195 Figure 3.12 Number of cases concluded by the Public Prosecution Service (2005-2010) 195 Figure 3.13 Concluded cases by type of settlement (2005-2010) 196 Figure 3.14 Number of cases concluded in first instance (2005-2010) 197 Figure 3.15 Cases settled in first instance by type of settlement (2005-2010) 198 Figure 3.16 Convictions in first instance by severity of charges (2005-2010) 199 Figure 3.17 Convictions in first instance according to sentence imposed (2005-2010) 199 Figure 3.18 Non-suspended or partially-suspended custodial sentences handed down in the first instance according to term category (2005-2010) 201 Figure 3.19 Community service orders handed down in first instance according to term category 201 Figure 3.20 Cases settled in first instance in which an appeal was lodged (2005-2010) 202 Figure 3.21 Number of cases settled on appeal (2005-2009) 203 Figure 3.22 Cases settled on appeal according to settlement type (total 2005-2009) 203 Figure 3.23 Convictions on appeal according to sentence imposed (total 2005-2009) 204 8 Child PornograPhy First report oF the Dutch NatioNal rapporteur Figure 3.24 Non-suspended or partially suspended custodial sentences handed down on appeal according to term category (total 2005-2009) 204 Figure 3.25 Community service orders handed down on appeal according to term category (2005-2009) 205 Figure 3.26 Age of suspects (2005-2010) 206 Figure 3.27 Age of persons convicted (2005-2010) 206 Figure 4.1 Intervention model 293 Figure 4.2 Connections model 294 Table 1.1 Child pornography – online/offline and hands-on/hands-off 47 Table 1.2 Sexual violence against children – online/offline and hands-on/hands-off 48 Table 1.3 Experience of sexual abuse by gender 85 Table 1.4 Online sexual experiences by gender 86 Table 3.1
Recommended publications
  • De Teeven-Deal Gratis Epub, Ebook
    DE TEEVEN-DEAL GRATIS Auteur: Marten Oosting Aantal pagina's: 160 pagina's Verschijningsdatum: 2016-04-26 Uitgever: Balans EAN: 9789460031342 Taal: nl Link: Download hier De lange geschiedenis van de Teevendeal: een tijdlijn Verantwoordelijk minister Opstelten vertelde de Tweede Kamer dat bij de schikking een bedrag van ongeveer 1,25 miljoen gulden terugvloeide naar H. Teeven zei zich het bedrag niet te herinneren, terwijl raadsman Doedens meldde een bedrag van bijna vijf miljoen gulden te hebben ontvangen ten bate van zijn cliënt. Opstelten trad af omdat hij de Kamer verkeerd had geïnformeerd, Teeven omdat zijn betrokkenheid bij de oorspronkelijke deal zijn geloofwaardigheid als staatssecretaris had aangetast. De affaire werd vervolgens op verzoek van de Tweede Kamer onderzocht door een commissie onder leiding van de voormalige Nationaal Ombudsman Marten Oosting , die in december concludeerde dat [2]. Kort na publicatie van Oostings rapport trad Kamervoorzitter Van Miltenburg af, omdat zij eerder in het jaar een anonieme brief aan de Kamer met details over de Teevendeal had vernietigd. Begin werd de commissie-Oosting herbenoemd om de gang van zaken omtrent de zoektocht naar het afschrift te onderzoeken, nadat de suggestie was gewekt dat bewindspersonen die hadden gedwarsboomd. Een jaar later kreeg de affaire een verder vervolg, nadat Nieuwsuur -journalist Bas Haan suggereerde dat Van der Steur nog tijdens Opsteltens bewind informatie over de Teevendeal voor zijn collega-Kamerleden achtergehouden had: met name de wetenschap dat Teeven zich het precieze bedrag in wél wist te herinneren. In oktober erkende oud- minister van Justitie Ivo Opstelten toe "cruciale fouten" te hebben gemaakt in de affaire.
    [Show full text]
  • Rapport Van De Commissie-Oosting De Heer Segers (Christenunie): Aan De Orde Is Het Debat Over Het Rapport Van De Commis- Sie-Oosting
    De voorzitter: 10 Oké. De heer Segers. Rapport van de commissie-Oosting De heer Segers (ChristenUnie): Aan de orde is het debat over het rapport van de commis- sie-Oosting. Ik wil de minister-president danken voor die ruimhartigheid. Mijn verzoek betrof dit gespreksverslag. Ik kan niet namens de collega's spreken en ik weet ook niet hoe het debat ver- De voorzitter: dergaat. Ik kan dat dus niet namens alles en iedereen Ik heet iedereen van harte welkom, in het bijzonder de beloven. Mijn verzoek betrof dit gespreksverslag en het lijkt minister-president en de minister en staatssecretaris van mij goed als dat inderdaad richting de Kamer gaat. Veiligheid en Justitie. Ik geef de heer Segers namens de ChristenUnie als eerste spreker het woord. Minister Rutte: Ik moet het hard zeggen. Ik ben bereid mijn gespreksverslag De heer Segers (ChristenUnie): openbaar te delen met de Kamer. Dat kan nu worden toe- Voorzitter. Ik heb een punt van orde en dat is tweeledig. gezonden. Dan zeg ik erbij dat ik ervan uitga dat het daarbij Allereerst wil ik een herhaling, een onderstreping van een blijft. Nogmaals, het kan bij ambtenaren worden uitgelegd verzoek van collega Pechtold gisteren naar voren brengen als druk om ook hun verslagen openbaar te maken. Ik vind over de sprekersvolgorde van de kant van het kabinet. Er dat echt zeer ongewenst, omdat zij dan in de toekomst zijn veel vragen over de bewindslieden van Veiligheid en onveilig zijn in gesprekken met dit soort commissies. Als Justitie en wij zouden hen graag eerst willen spreken, zodat wij het erover eens zijn dat we het laten bij mijn gespreks- we hun antwoorden kunnen bespreken met de premier.
    [Show full text]
  • Regulating Violence in Video Games: Virtually Everything
    Journal of the National Association of Administrative Law Judiciary Volume 31 Issue 1 Article 7 3-15-2011 Regulating Violence in Video Games: Virtually Everything Alan Wilcox Follow this and additional works at: https://digitalcommons.pepperdine.edu/naalj Part of the Administrative Law Commons, Comparative and Foreign Law Commons, and the Entertainment, Arts, and Sports Law Commons Recommended Citation Alan Wilcox, Regulating Violence in Video Games: Virtually Everything, 31 J. Nat’l Ass’n Admin. L. Judiciary Iss. 1 (2011) Available at: https://digitalcommons.pepperdine.edu/naalj/vol31/iss1/7 This Comment is brought to you for free and open access by the Caruso School of Law at Pepperdine Digital Commons. It has been accepted for inclusion in Journal of the National Association of Administrative Law Judiciary by an authorized editor of Pepperdine Digital Commons. For more information, please contact [email protected], [email protected], [email protected]. Regulating Violence in Video Games: Virtually Everything By Alan Wilcox* TABLE OF CONTENTS I. INTRODUCTION ................................. ....... 254 II. PAST AND CURRENT RESTRICTIONS ON VIOLENCE IN VIDEO GAMES ........................................... 256 A. The Origins of Video Game Regulation...............256 B. The ESRB ............................. ..... 263 III. RESTRICTIONS IMPOSED IN OTHER COUNTRIES . ............ 275 A. The European Union ............................... 276 1. PEGI.. ................................... 276 2. The United
    [Show full text]
  • Microsoft 2012 Citizenship Report
    Citizenship at Microsoft Our Company Serving Communities Working Responsibly About this Report Microsoft 2012 Citizenship Report Microsoft 2012 Citizenship Report 01 Contents Citizenship at Microsoft Serving Communities Working Responsibly About this Report 3 Serving communities 14 Creating opportunities for youth 46 Our people 85 Reporting year 4 Working responsibly 15 Empowering youth through 47 Compensation and benefits 85 Scope 4 Citizenship governance education and technology 48 Diversity and inclusion 85 Additional reporting 5 Setting priorities and 16 Inspiring young imaginations 50 Training and development 85 Feedback stakeholder engagement 18 Realizing potential with new skills 51 Health and safety 86 United Nations Global Compact 5 External frameworks 20 Supporting youth-focused 53 Environment 6 FY12 highlights and achievements nonprofits 54 Impact of our operations 23 Empowering nonprofits 58 Technology for the environment 24 Donating software to nonprofits Our Company worldwide 61 Human rights 26 Providing hardware to more people 62 Affirming our commitment 28 Sharing knowledge to build capacity 64 Privacy and data security 8 Our business 28 Solutions in action 65 Online safety 8 Where we are 67 Freedom of expression 8 Engaging our customers 31 Employee giving and partners 32 Helping employees make 69 Responsible sourcing 10 Our products a difference 71 Hardware production 11 Investing in innovation 73 Conflict minerals 36 Humanitarian response 74 Expanding our efforts 37 Providing assistance in times of need 76 Governance 40 Accessibility 77 Corporate governance 41 Empowering people with disabilities 79 Maintaining strong practices and performance 42 Engaging students with special needs 80 Public policy engagement 44 Improving seniors’ well-being 83 Compliance Cover: Participants at the 2012 Imagine Cup, Sydney, Australia.
    [Show full text]
  • FY15 Safer Cities Whitepaper
    Employing Information Technology TO COMBAT HUMAN TRAF FICKING Arthur T. Ball Clyde W. Ford, CEO Managing Director, Asia Entegra Analytics Public Safety and National Security Microsoft Corporation Employing Information Technology to Combat Human Trafficking | 1 Anti-trafficking advocates, law enforcement agencies (LEAs), governments, nongovernmental organizations (NGOs), and intergovernmental organizations (IGOs) have worked for years to combat human trafficking, but their progress to date has been limited. The issues are especially complex, and the solutions are not simple. Although technology facilitates this sinister practice, technology can also help fight it. Advances in sociotechnical research, privacy, Microsoft and its partners are applying their interoperability, cloud and mobile technology, and industry experience to address technology- data sharing offer great potential to bring state- facilitated crime. They are investing in research, of-the-art technology to bear on human trafficking programs, and partnerships to support human across borders, between jurisdictions, and among rights and advance the fight against human the various agencies on the front lines of this trafficking. Progress is possible through increased effort. As Microsoft shows in fighting other forms public awareness, strong public-private of digital crime, it believes technology companies partnerships (PPPs), and cooperation with should play an important role in efforts to disrupt intervention efforts that increase the risk for human trafficking, by funding and facilitating the traffickers. All of these efforts must be based on a research that fosters innovation and harnesses nuanced understanding of the influence of advanced technology to more effectively disrupt innovative technology on the problem and on the this trade. implications and consequences of employing such technology by the community of interest (COI) in stopping human trafficking.
    [Show full text]
  • Summary Paper on Online Child Sexual Exploitation
    SUMMARY PAPER ON ONLINE CHILD SEXUAL EXPLOITATION ECPAT International is a global network of civil society The Internet is a part of children’s lives. Information organisations working together to end the sexual exploitation of and Communication Technologies (ICT) are now as children (SEC). ECPAT comprises member organisations in over important to the education and social development of 100 countries who generate knowledge, raise awareness, and children and young people as they are to the overall advocate to protect children from all forms of sexual exploitation. global economy. According to research, children and adolescents under 18 account for an estimated one in Key manifestations of sexual exploitation of children (SEC) three Internet users around the world1 and global data include the exploitation of children in prostitution, the sale and indicates that children’s usage is increasing – both in trafficking of children for sexual purposes, online child sexual terms of the number of children with access, and their exploitation (OCSE), the sexual exploitation of children in travel time spent online.2 While there is still disparity in access and tourism (SECTT) and some forms of child, early and forced to new technologies between and within countries in marriages (CEFM). None of these contexts or manifestations are the developed and developing world, technology now isolated, and any discussion of one must be a discussion of SEC mediates almost all human activities in some way. Our altogether. lives exist on a continuum that includes online and offline domains simultaneously. It can therefore be argued that Notably, these contexts and manifestations of SEC are becoming children are living in a digital world where on/offline increasingly complex and interlinked as a result of drivers like greater mobility of people, evolving digital technology and rapidly expanding access to communications.
    [Show full text]
  • Voorjaarscongres 2017
    ledenmagazine van de VVD Jaargang 13 Nummer 4 7 juli 2017 Voorjaarscongres 2017 Het is tijd voor actie! Collegetour: Verre van uitgeregeerd Houd de koffietruck Het Winnende Raadslid op de weg! 3 6 12 15 HET IS TIJD VOOR ACTIE! Colofon Liber is een uitgave van de VVD en verschijnt in principe acht keer per jaar. Kopij volgende editie vóór 11 september 2017. Het is dat u dit stukje leest, want anders kiezingen komen er aan in maart 2018. had het mij niet verbaasd als u niet had Op alle niveaus wordt er al aan de cam- Realisatie: geweten wie de voorzitter van de partij pagne gewerkt. Vrijwel alle netwerken Het is geen geheim. De afgelopen jaren heb- 2018 lid zijn van de VVD. Het is de VVD Algemeen Secretariaat in is. De voorzitter van een partij opereert hebben hun eerste ledenvergadering ge- ben politieke partijen in Nederland te maken ideale mogelijkheid om op een laag- samenwerking met Meere Reclamestudio meestal vooral op de achtergrond en had en procedures vastgesteld; sommige met dalende ledenaantallen. Ook de VVD. Voor drempelige manier kennis te maken en een netwerk van VVD-correspondenten. zorgt er samen met de leden van het lijsttrekkers zijn al gekozen en er wordt Algemeen Secretaris Stephanie ter Borg is het met onze partij. Je bent als intro- Hoofdbestuur en de professionals van druk gewerkt aan de lokale verkiezings- glashelder: “Het is tijd voor actie!” Liber gaat ductielid van harte welkom op bij- Bladmanagement: het Algemeen Secretariaat voor dat de programma’s. We merken dan ook hoe met haar in gesprek over het werven van nieu- voorbeeld onze congressen, bijeen- Debbie van de Wijngaard partij functioneert.
    [Show full text]
  • Reining in Online Abuses
    Technology and Innovation, Vol. 19, pp. 593-599, 2018 ISSN 1949-8241 • E-ISSN 1949-825X Printed in the USA. All rights reserved. http://dx.doi.org/10.21300/19.3.2018.593 Copyright © 2018 National Academy of Inventors. www.technologyandinnovation.org REINING IN ONLINE ABUSES Hany Farid Dartmouth College, Hanover, NH, USA Online platforms today are being used in deplorably diverse ways: recruiting and radicalizing terrorists; exploiting children; buying and selling illegal weapons and underage prostitutes; bullying, stalking, and trolling on social media; distributing revenge porn; stealing personal and financial data; propagating fake and hateful news; and more. Technology companies have been and continue to be frustratingly slow in responding to these real threats with real conse- quences. I advocate for the development and deployment of new technologies that allow for the free flow of ideas while reining in abuses. As a case study, I will describe the development and deployment of two such technologies—photoDNA and eGlyph—that are currently being used in the global fight against child exploitation and extremism. Key words: Social media; Child protection; Counter-extremism INTRODUCTION number of CP reports. In the early 1980s, it was Here are some sobering statistics: In 2016, the illegal in New York State for an individual to “pro- National Center for Missing and Exploited Children mote any performance which includes sexual conduct by a child less than sixteen years of age.” In 1982, (NCMEC) received 8,000,000 reports of child por- Paul Ferber was charged under this law with selling nography (CP), 460,000 reports of missing children, material that depicted underage children involved and 220,000 reports of sexual exploitation.
    [Show full text]
  • Photodna & Photodna Cloud Service
    PhotoDNA & PhotoDNA Cloud Service Fact Sheet PhotoDNA Microsoft believes its customers are entitled to safer and more secure online experiences that are free from illegal, objectionable and unwanted content. PhotoDNA is a core element of Microsoft’s voluntary business strategy to protect its customers, systems and reputation by helping to create a safer online environment. • Every single day, there are over 1.8 billion unique images uploaded and shared online. Stopping the distribution of illegal images of sexually abused children is like finding a needle in a haystack. • In 2009 Microsoft partnered with Dartmouth College to develop PhotoDNA, a technology that aids in finding and removing some of the “worst of the worst” images of child sexual abuse from the Internet. • Microsoft donated the PhotoDNA technology to the National Center for Missing & Exploited Children (NCMEC), which established a PhotoDNA-based program for online service providers to help disrupt the spread of child sexual abuse material online. • PhotoDNA has become a leading best practice for combating child sexual abuse material on the Internet. • PhotoDNA is provided free of charge to qualified companies and developers. Currently, more than 50 companies, including Facebook and Twitter, non-governmental organizations and law enforcement use PhotoDNA. PhotoDNA Technology PhotoDNA technology converts images into a greyscale format with uniform size, then divides the image into squares and assigns a numerical value that represents the unique shading found within each square. • Together, those numerical values represent the “PhotoDNA signature,” or “hash,” of an image, which can then be compared to signatures of other images to find copies of a given image with incredible accuracy and at scale.
    [Show full text]
  • Lake E≠Ect? a Research Team Explores the Dynamics of Naturally Occurring Greenhouse Gases in the Great Lakes
    STRANGE SCIENCE MOMENTOUS MELIORA! LESSONS IN LOOKING An astrophysicist meets Highlights from a Where poet Jennifer Grotz a Marvel movie signature celebration found her latest inspiration UNIVERSITY OF ROCHESTER /NovembER–DecembER 2016 Lake E≠ect? A research team explores the dynamics of naturally occurring greenhouse gases in the Great Lakes. RochRev_Nov2016_Cover.indd 1 11/1/16 4:38 PM “You have to feel strongly about where you give. I really feel I owe the University for a lot of my career. My experience was due in part Invest in PAYING IT to someone else’s generosity. Through the George Eastman Circle, I can help students what you love with fewer resources pursue their career “WE’RE BOOMERS. We think we’ll be aspirations at Rochester.” around forever—but finalizing our estate FORWARD gifts felt good,” said Judy Ricker. Her husband, —Virgil Joseph ’01 | Vice President-Relationship Manager, Ray, agrees. “It’s a win-win for us and the Canandaigua National Bank & Trust University,” he said. “We can provide for FOR FUTURE Rochester, New York ourselves in retirement, then our daughter, Member, George Eastman Circle Rochester Leadership Council and the school we both love.” GENERATIONS Supports: School of Arts and Sciences The Rickers’ charitable remainder unitrust provides income for their family before creating three named funds at the Eastman School of Music. Those endowed funds— two professorships and one scholarship— will be around forever. They acknowledge Eastman’s celebrated history, and Ray and Judy’s confidence in the School’s future. Judy’s message to other boomers? “Get on this bus! Join us in ensuring the future of what you love most about the University.” Judith Ricker ’76E, ’81E (MM), ’91S (MBA) is a freelance oboist, a business consultant, and former executive vice president of brand research at Market Probe.
    [Show full text]
  • Chapter 36 Netherlands: the Pedophile Kingdom and Sodom and Gomorrah of the Modern World Joachim Hagopian
    Chapter 36 Netherlands: The Pedophile Kingdom and Sodom and Gomorrah of the Modern World Joachim Hagopian Cover Credit: Nora Maccoby with permission http://www.noramaccoby.com/ The lineage of former Holy Roman and French nobility comprises today’s House of Orange-Nassau ruling over the constitutional monarchy of the Netherlands. The Dutch royalty owns major multinational corporations such as Royal Dutch Shell, KLM Royal Dutch Airlines, Philips Electronics and Holland-America Line.1 The royal family has evolved its interests as a high-level authority currently operating as a branch of the Vatican’s Roman empire, wielding considerable influence over such powerful entities as the Rand Corporation, Koch Industries, Princeton University (founded in honor of the House of Orange), some of the world’s largest banks including AMRO and investment firms like BlackRock,2 the largest financial asset management institution on the planet, worth an estimated $7.4 trillion in client assets.3 Coincided by design with the planned Corona scamdemic, this year BlackRock’s been busily bailing out the US Federal Reserve, buying billions worth of bonds to keep the house of cards economy from imploding, in one fell swoop in April seizing control over the US Treasury and Federal Reserve.4 This private, unelected monolith has monopoly control now over the entire US economy as the centralized economic chokehold over the global masses prepares to tighten its death grip noose over humanity.5 As the long planned implosion of the world economy goes up in smoke, by engineered design, this latest power grab amidst the so called pandemic crisis is all about consolidation of power and control into fewer and fewer hands, lending new meaning to the thoroughly bankrupted USA Corporation owned and operated by the financial juggernaut of “the Crown.”6 The stakes have never been higher in 2020.
    [Show full text]
  • Progress in Empirical Research on Children's
    Volume XII Number 2, November 1983 ISSN:0091-3995 Sex Information and Education Council of the U.S. PROGRESS IN EMPIRICAL RESEARCH ON CHILDREN’S SEXUALITY Ernest Borneman, PhD President, Austrian Society for Research in Sexology President, German Society for Research in Sociological Sexology [Throughout my years of attending local, regional, national, impossible in most countries of the western world. The result is and international conferences, I have rarely heard a paper that not only ignorance but a plethora of false information. provoked such intense and prolonged discussion as did Dr. When my first research team began its work some 40 years Ernest Borneman’s presentation at the Sixth World Congress of ago, we believed, for instance, that a boy’s first pollution (emis- Sexology he/d in Washington, D.C. in May 7983. For days after sion of semen at times other than during coitus) indicated that his talk, wherever conference participants gathered, someone his semen had become fertile. We believed, too, that a girl would invariably ask; “Did you hear Borneman’s paper!” and could not be impregnated before she had her menarche. We thus trigger engrossed interaction. Both the methodology and accepted these assumptions because they seemed obvious. It the interpretation of his findings prompted heated reaction never occurred to us to question or test them. pro and con. I a/so had the opportunity of using Dr. Borne- Then we heard of a nine-year-old girl who had been raped man’s paper with our New York University international and had borne a child prior to her menarche.
    [Show full text]