Online Child Sexual Abuse Content: the Development of a Comprehensive, Transferable International Internet Notice and Takedown System

Total Page:16

File Type:pdf, Size:1020Kb

Online Child Sexual Abuse Content: the Development of a Comprehensive, Transferable International Internet Notice and Takedown System Online Child Sexual Abuse Content: The Development of a Comprehensive, Transferable International Internet Notice and Takedown System Dr. Weixiao Wei The research project was funded by the Nominet Trust and the research report was written by an independent researcher, Dr. Weixiao Wei. The opinions, findings, and conclusions or recommendations expressed herein are those of the author and do not necessarily reflect those of the Nominet Trust, or any other organisations that participated the research project. I Table of Contents List of Acronyms ........................................................................................... I Acknowledgments ...................................................................................... III Executive Summary ....................................................................................... 1 Part 1: Introduction ...................................................................................... 4 1.1 Research Background ............................................................................................................. 4 1.2 Research Objectives ............................................................................................................... 4 1.3 Research Methodology........................................................................................................... 5 1.4 Outline of the Report.............................................................................................................. 6 1.5 Definition ................................................................................................................................ 6 Part 2: Legal Approaches relating to Child Sexual Abuse Content Worldwide 8 2.1 Introduction ............................................................................................................................ 8 2.2 International Law and Development ...................................................................................... 8 2.3 The European Perspective .................................................................................................... 11 2.4 Perspectives of Different Countries ..................................................................................... 21 2.4.1 European Countries: the UK, Spain, and Germany ....................................................... 22 2.4.1.1 The United Kingdom ............................................................................................... 22 2.4.1.2 Spain ....................................................................................................................... 29 2.4.1.3 Germany ................................................................................................................. 32 2.4.2 Countries in North and Latin America: the U.S., Brazil .................................................. 36 2.4.2.1 The U.S. ................................................................................................................... 36 2.4.2.2 Brazil ....................................................................................................................... 39 2.4.3 Asian-Pacific Countries: Australia, Taiwan, and Thailand .............................................. 43 2.4.3.1 Australia .................................................................................................................. 43 2.4.3.2 Taiwan .................................................................................................................... 47 2.4.3.3 Thailand .................................................................................................................. 50 2.5 Conclusion ............................................................................................................................ 53 II Part 3: The Existing Regulatory Regimes relating to Child Sexual Abuse Content ....................................................................................................... 56 3.1 Introduction .......................................................................................................................... 56 3.2 The Statutory Regulation Regime ......................................................................................... 57 3.2.1. The Strengths of Statutory Regulation ......................................................................... 57 3.2.1.1 Establishment of Special Law Enforcement Agencies ............................................ 57 3.2.1.2 Progress Made by Special Law Enforcement Agencies .......................................... 60 3.2.2 Inadequacy of the Law Enforcement Approaches ........................................................ 63 3.2.3 The Weaknesses of Statutory Regulation in Terms of the Swift Removal of Child Sexual Abuse Content at Source ........................................................................................................ 65 3.3 The Self-Regulation Regime.................................................................................................. 70 3.3.1 Self-Regulation in the Context of Child Sexual Abuse Content ..................................... 70 3.3.2 Internet Blocking ........................................................................................................... 72 3.3.2.1 Internet Blocking in the Context of Child Sexual Abuse Content ........................... 72 3.3.2.2 The Advantages of Blocking and Incentives behind Blocking................................. 74 3.3.2.3 Problems with Internet Blocking ............................................................................ 76 3.3.2.4 Summary ................................................................................................................. 78 3.3.3 The Notice and Takedown System ................................................................................ 79 3.3.3.1 The Notice and Takedown System in the Context of Child Sexual Abuse Content 79 3.3.3.2 The Strengths of the Notice and Takedown System .............................................. 80 3.3.3.3 The Drawbacks and Limitations of the Notice and Takedown System .................. 82 3.3.4 Internet Blocking vs. Notice and Takedown .................................................................. 84 3.4 Conclusion ............................................................................................................................ 85 Part 4: The Development of an International Notice and Takedown System88 4.1 Introduction .......................................................................................................................... 88 4.2 The Necessity and Possibility of Developing an International Notice and Takedown System .................................................................................................................................................... 88 4.3 Several Pertinent Issues in Relation to the Development of an International Notice and Takedown System ....................................................................................................................... 93 III 4.3.1 Different National Standards relating to Child Sexual Abuse Content .......................... 93 4.3.2 Differing Legal Procedures relating to Takedown of Child Sexual Abuse Content ........ 98 4.3.3 Impact on the Complex Network of Relationships on which International Co-operation Relies .................................................................................................................................... 101 4.3.4 Specific Impact on Law Enforcement Activity relating to Child Sexual Abuse Content related Offences ................................................................................................................... 103 4.3.5 Risks to an Organisation of Issuing International Takedown Notices ......................... 107 4.4 Conclusion .......................................................................................................................... 109 Part 5: Conclusion and Recommendations ................................................. 112 Bibliography .............................................................................................. 117 Appendix: Survey Questionnaire ............................................................... 122 IV List of Acronyms ACMA Australian Communications and Media Authority BKA German Federal Police (Bundeskriminalamt) CAIU Child Abuse Investigation Units CEOP Child Exploitation and Online Protection Centre CEOS Child Exploitation and Obscenity Section (the U.S. Department of Justice) CGA Civic Government (Scotland) Act 1982 CIRCAMP COSPOL Internet Related Child Abusive Material Project CJA Criminal Justice Act of 1988 CJPOA Criminal Justice and Public Order Act 1994 CP Child Pornography CSAC Child Sexual Abuse Content ECPAT End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes ESPs Electronic Service Providers FBI Federal Bureau of Investigation of the U.S. ICACs Internet Crimes against Children Task Forces of the U.S. ICAID Interpol Child Abuse Image Database ICCPR the International Covenant on Civil and Political Rights ICE Immigration and Customs Enforcement (U.S. Department of Homeland Security) ICSE DB International Child Sexual Exploitation Image Database INHOPE International Association of Internet Hotlines ISP Internet Service Provider IWF Internet Watch Foundation LKA German State Police (Landeskriminalamt) LSSICE Spanish Information Society Services and Electronic Commerce Act
Recommended publications
  • The Sexual Exploitation of Children in Travel and Tourism Creating A
    ECPAT International Creating a United Front against the Sexual Exploitation of Children in Travel and Tourism The following papers in this journal were presented at the XVIIth ISPCAN International Congress on Child Abuse and Neglect, held from 7-10 September 2008, in Hong Kong: Understanding the linkages between CST and other forms of CSEC in East Asia and the Pacific. Extraterritorial laws: why they are not really working and how they can be strengthened. Lessons learned and good practices on working with the private sector to combat CST and trafficking for sexual exploitation. June 2009 Copyright © ECPAT International ECPAT International is a global network of organisations and individuals working together to eliminate child prostitution, child pornography and the trafficking of children for sexual purposes. It seeks to encourage the world community to ensure that children everywhere enjoy their fundamental rights free and secure from all forms of commercial sexual exploitation. Extracts from this publication may be freely reproduced provided that due acknowledgment is given to ECPAT International. ECPAT International 328/1 Phayathai Road Ratchathewi Bangkok 10400 THAILAND Tel: +662 215 3388, +662 611 0972 Fax: +662 215 8272 Email: [email protected] Website: www.ecpat.net 1 Table of Contents Acronyms 3 Preface 4 Extraterritorial laws: why they are not really working and how they can be strengthened 6 2 Understanding the linkages between CST and other forms of CSEC in East Asia and the Pacific 23 Lessons learned and good practices on working
    [Show full text]
  • Extraterritorial Laws 1 Why They Are Not Really Working and How They Can Be Strengthened
    EXTRATERRITORIAL LAWS 1 WHY THEY ARE NOT REALLY WORKING AND HOW THEY CAN BE STRENGTHENED SEPTEMBER 2008 2 Written by: Catherine Beaulieu Layout and Design by: Manida Naebklang September 2008 Copyright © ECPAT International ECPAT International 328/1 Phayathai Road Ratchathewi Bangkok 10400 THAILAND Tel: +662 215 3388, +662 611 0972 Fax: +662 215 8272 Email: [email protected] Website: www.ecpat.net TABLE OF conTENTS 3 EXTRATERRITORIAL LAWS: Why they are not really working and how they can be strengthened . 4 Extraterritorial legislation: a tool to fight child sex tourism . 5 Extraterritorial legislation regarding offences against children As implemented in selected examples of domestic jurisdiction . 8 Some obstacles to extraterritorial jurisdiction . 8 International cooperation and assistance . 13 Analysis and recommendations . 16 ENDNOTES . .19 EXTRATERRITORIAL LAWS: WHY THEY ARE NOT REALLY WORKING AND HOW THEY CAN BE STRENGTHENED The problem of child sex tourism was first brought to the world’s attention in the early 1990s largely as a result of the work of ECPAT and other non- governmental organisations (NGOs). The international community’s recognition and concern “at the widespread and continuing practice of sex tourism, to which children are especially vulnerable, as it directly promotes the sale of children, child prostitution and child pornography” was also clearly stated in the preamble to the Optional Protocol to the Convention on the Rights of the Child on the sale of children, child prostitution and child pornography (OPSC)1. While a number of legally binding instruments currently impose obligations upon States to take measures to counter child sex tourism, the problem persists and continues to devastate the lives of countless children around the world, with often irreparable 4 consequences.
    [Show full text]
  • Crime and Criminology Fifteenth Edition
    Supplement to Accompany CRIME AND CRIMINOLOGY FIFTEENTH EDITION Sue Titus Reid Wolters Kluwer services its customers worldwide with CCH, Aspen Publishers, and Kluwer Law International products. See www.wolterskluerlb.com. This Supplement constitutes copyrighted material and is subject to United States Copyright laws. This Supplement is being made available as a courtesy to those teachers who have adopted the underlying textbook that accompanies the Supplement, as well as those teachers who have shown a genuine interest in adopting the underlying textbook. This may not be modified, reproduced, displayed, distributed, or transmitted in any form or by any means, without the express, prior, written permission of Wolters Kluwer. Those teachers who have adopted the underlying textbook may assign this Supplement to their class and incorporate it into their class notes, presentation slides, and testing materials, or make certain other noncommercial uses of this Supplement as permitted by copyright law, but those teachers may not otherwise modify, reproduce, display, distribute, or transmit the manual in any form or by any means without the express prior written permission of Wolters Kluwer. For permission requests, visit us at www.wolterskluwerlb.com, or fax a written request to our permissions department at 212-771-0803. Table of Contents Chapter 1. Crime, Criminal Law, and Criminology .................................................................1 Supplement 1.1. Massachusetts Supreme Judicial Court Upholds Necessity Defense for Homeless
    [Show full text]
  • Child Sexual Abuse Material and the Internet (Part 2)
    Child Sexual Abuse Material and the Internet (part 2): Challenges for the Law Enforcement Agencies Child sexual abuse material (CSAM) distribution on the Internet is overwhelming law enforcement worldwide: once an image is uploaded, it passes from hand to hand, is distributed in thousands of copies and will never be completely removed from circulation. CSAM from the 1970s and 1980s is still being distributed and exchanged, even the published CSAM from the 1960s, also known as pedophile press1, has been scanned and distributed online, not to mention all the material produced since digital cameras and smartphones became widely available. The number of unique CSAM in existence can only grow. This is the second part of an analysis which examines the interaction between CSAM and the Internet. The first part investigated the influence that new technologies have on the CSAM phenomenon and the profiles of CSAM offenders. This part delves into the extent of the problem, the difficulties to measure it, the challenges that law enforcement encounters and the major steps taken on international, European and Belgian levels in order to combat CSAM online. I Quantifying the scale of CSAM trade online It is almost impossible to accurately quantify the problem of CSAM on the Internet: websites appear and are taken down by law enforcement or NGOs very quickly but may pop up the next day with a different domain name or appear simultaneously under several different URLs. A great part of CSAM is distributed not on websites but through P2P networks and hidden levels of the Internet – the Darknets2, where quantification is even more difficult.
    [Show full text]
  • Improving International Cooperation To
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by British Columbia's network of post-secondary digital repositories IMPROVING INTERNATIONAL COOPERATION TO COMBAT TRANSNATIONAL CHILD SEXUAL EXPLOITATION: AN ANALYSIS OF BILATERAL COOPERATION IN CHILD SEX TOURISM CASES INVOLVING THAILAND AND CANADA by Samantha de Vries Bachelor of Arts Degree, Criminology, University of Ontario Institute of Technology, 2011 Diploma, Law and Security Administration, Durham College, 2009 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS (CRIMINAL JUSTICE) In the School of Criminology and Criminal Justice © Samantha de Vries 2018 UNIVERSITY OF THE FRASER VALLEY Summer 2018 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. Approval Name: Samantha de Vries Degree: Master of Arts (Criminal Justice) Degree Title: Improving International Cooperation to Combat Transnational Child Sexual Exploitation: An Analysis of Bilateral Cooperation in Child Sex Tourism Cases involving Thailand and Canada Examining Committee Amanda McCormick, PhD GPC Chair Director, School of Criminology and Criminal Justice ____________________________________________________________ Yvon Dandurand, M.A. Senior Supervisor Associate Professor, School of Criminology and Criminal Justice Hayli Millar, PhD Second Supervisor Associate Professor, School of Criminology and Criminal Justice ____________________________________________________________
    [Show full text]