Group of Specialists on the Impact of the Use of New Information Technologies on Trafficking in Human Beings for the Purpose of Sexual Exploitation (Eg-S-Nt)

Group of Specialists on the Impact of the Use of New Information Technologies on Trafficking in Human Beings for the Purpose of Sexual Exploitation (Eg-S-Nt)

Strasbourg, 16 September 2003 EG-S-NT (2002) 9 rev. GROUP OF SPECIALISTS ON THE IMPACT OF THE USE OF NEW INFORMATION TECHNOLOGIES ON TRAFFICKING IN HUMAN BEINGS FOR THE PURPOSE OF SEXUAL EXPLOITATION (EG-S-NT) Final report 2 EG-S-NT (2002) 9 rev. EG-S-NT (2002) 9 rev. 3 TABLE OF CONTENTS Introduction....................................................................................................................................................................7 I. The impact of the use of new information technologies on trafficking in human beings for the purpose of sexual exploitation: the scale of the phenomenon ..................................................................15 A. A study of the users............................................................................................................................17 1. The techniques used and how they work .....................................................................................17 2. The use of new technologies ...........................................................................................................22 3. The users...............................................................................................................................................30 B. Role of marriage agencies in trafficking in women and trafficking in images for the purpose of sexual exploitation.............................................................................................................................38 1. Recruitment of Women by Marriage Agencies in Countries of the Former Soviet Union ...............................................................................................................................................................39 2. Sexually exploitative services offered through marriage agencies..........................................44 3. Marriage agencies recruitment of vulnerable populations.......................................................44 4. Trafficking in Images for the purpose of sexual exploitation......................................................45 5. Conclusion ..........................................................................................................................................48 a. The Challenges...................................................................................................................................49 b. Denial of the harm.............................................................................................................................49 c. Disconnection between acts and images ...................................................................................49 II. Existing legislation in the different member States and the relevant international instruments..........50 A. At national level .................................................................................................................................50 1. Major Tendencies of the Relevant Legal Frameworks Sexual majority....................................58 2. Major Tendencies of the Relevant Legal Frameworks ................................................................60 a. General Remarks ...............................................................................................................................60 b. Specific Remarks Concerning Internet Law..................................................................................60 3. General Proposals..............................................................................................................................62 4. Specific proposals concerning Internet.........................................................................................63 B. At international level .........................................................................................................................63 C. Combating the illegal or harmful use of the Internet: how can law intervene - the example of the Yahoo case ................................................................................................................................64 1. Technical problems ...........................................................................................................................65 2. Law applicable ..................................................................................................................................65 3. Enforcement of the decision ...........................................................................................................65 4. Freedom of expression......................................................................................................................66 III. Protecting Human Rights and guaranteeing the use of new technologies: new challenges ...........67 A. Law enforcement and cases...........................................................................................................69 1. Legislation............................................................................................................................................69 2. Problems which need to be solved................................................................................................70 3. How the Internet is used ...................................................................................................................70 4. Retention of vital communication traffic data by telecommunication operators and telecommunication access and service providers ....................................................................................74 5. Why must traffic data be preserved? ............................................................................................74 6. Why is real-time or expedited traffic data collection not enough?.........................................75 i) Vital traffic data .................................................................................................................................76 ii) Retention period ................................................................................................................................77 B. The effects on the use of new information technologies on the victims - Protection of the victims ...........................................................................................................................................................79 1. Different types of victims ..................................................................................................................79 2. The effects on the use of new information technologies on the victims .................................80 3. Different types of perpetrators ........................................................................................................80 4 EG-S-NT (2002) 9 rev. 4. Protection of the victims ...................................................................................................................82 C. Prevention ...........................................................................................................................................82 D. The role of the Mass Media ..............................................................................................................85 1. The money matters............................................................................................................................86 2. The news values .................................................................................................................................88 3. New Approaches...............................................................................................................................89 E. Freedom of expression and the Internet .......................................................................................91 Conclusions and recommendations .......................................................................................................................93 Appendices................................................................................................................................................................101 Appendix 1 - Terms of reference of the EG-S-NT .................................................................................................103 Appendix 2 - List of the members of the group of specialists EG-S-NT ...........................................................105 Appendix 3 - List of international instruments.......................................................................................................107 Appendix 4 - State of signature and ratification of international instruments on action against trafficking ....................................................................................................................................................................109 Appendix 5 - Licra and UEJF vs. Yahoo! Inc. And Yahoo France order of november 20, 2000 by the Superior Court of Paris .......................................................................................................................................115 Appendix 6 - Catalogue of vital and significant traffic data............................................................................131 Appendix 7 - Schematic representation of the layered approach to determine data traffic to retain............................................................................................................................................................................134 Appendix 8 - Chapter

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    136 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us