Because of the development of the internet and the associated digital opportunities, the crimes of possession and distribution of child sexual abuse material (CSAM) have gone through tremendous... Show moreBecause of the development of the internet and the associated digital opportunities, the crimes of possession and distribution of child sexual abuse material (CSAM) have gone through tremendous changes and developments over the last decennia. Nowadays, many CSAM offenders access and distribute CSAM through the Darkweb, the hidden and encrypted part of the internet. This book offers a description of the criminal process and the organization of CSAM fora on the Darkweb. Moreover, it describes how ‘keyplayers’ on such fora can be identified, and distinguishes various profiles and behavioral patterns of offenders active on Darkweb CSAM fora. Finally, the book describes how trust on the online fora is established. The studies described in this book provide an important, evidence-based contribution to the current knowledge on online CSAM offending. Extensively discussing practical implications for law enforcement and other professional organizations, this book is of relevance to academics as well as practitioners. Show less
Zand, E. van 't; Matthijsse, S.; Fischer, T.; Wagen, W. van der 2021
With access to and usage of it increasing dramatically over the past 20 years, the Internet has become an emerging realm for human interaction. With children constituting one-third of Internet... Show moreWith access to and usage of it increasing dramatically over the past 20 years, the Internet has become an emerging realm for human interaction. With children constituting one-third of Internet users worldwide, this realm offers endless opportunities to learn, connect, and interact. At the same time, the Internet facilitates child sexual abuse on a large scale – through the production, dissemination, and accessing of child sexual abuse material.This study aims to critically analyse emerging aspects of the international and national regulation, investigation and prosecution of online child sexual abuse material from a child-rights and rule-of-law-based approach. It investigates emerging aspects of substantive and procedural law which have been little explored in the past, zooming in on complex constitutional aspects by applying a comparative legal analysis approach with a strong focus on the Global South as well as interdisciplinary legal research.In order to solve these complex legal issues, the answer lies in the identification and subsequent navigation of a variety of dichotomies that govern the discourse on online child sexual abuse material. The international and national regulation, investigation and prosecution of emerging aspects of online child sexual abuse material hence require constant identification, reflection and calibration of competing discourses, with a view to developing a cyber-specific yet victim-sensitive response that upholds the rule of law and takes a child-centred approach. Show less
This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of... Show more This study examines the following investigative methods that are commonly used in cybercrime investigations: (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method. For many of these investigative methods, the legal basis in Dutch law is ambiguous. However, a clear legal basis for investigative methods that indicates the scope of investigative methods and the manner in which they are applied must be available. It helps prevent arbitrary application of power by governmental authorities and is therefore essential for protecting the rule of law. The author examines how a foreseeable legal framework for the identified investigative methods can be created that meets the requirements that are derived from the right to privacy in art. 8 ECHR. The borderless nature of the Internet is also taken into account. The question is addressed to which extent digital investigative methods can be applied unilaterally across State borders. The analysis results in a list of recommendations to improve the regulations for digital investigative methods on both the domestic level and the international level. Show less