Eliminating Online Child Sexual Abuse Material

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book uses a crime science approach to explore the ways in which child sexual abuse material (CSAM) can be tackled. It describes the CSAM ecosystem, focusing on the ways in which it is produced, distributed and consumed and explores different interventions that can be used to tackle each issue.

Eliminating Online Child Sexual Abuse Material provides a methodical approach to unpacking and understanding this growing problem, identifies approaches that have been shown to work and offers alternatives that might be tried. This analysis is set within a crime sciences context that draws on rational choice, routine activities, situation crime prevention and environmental criminology to better understand the nature of the problem and the potential ways in which it may be solved.

This book is intended for policy-makers and practitioners working in child protection, online harms and related areas and for students studying sexual violence or internet-related crime. The book will also be of interest to crime scientists as it provides another example of how the approach can be used to understand and reduce crime.

Author(s): Rick Brown
Series: Crime Science Series
Publisher: Routledge
Year: 2022

Language: English
Pages: 206
City: London

Cover
Half Title
Series Information
Title Page
Copyright Page
Table of Contents
Figures
Tables
Abbreviations
1 Introduction
The Problem
But Where’s the Harm?
Impact of Child Sexual Abuse
Impact of Child Sexual Abuse Material
Purpose of this Book
Defining Child Sexual Abuse Material
Defining ‘Child’
Distinguishing CSAM From Adult Pornography
Defining ‘Material’
The Many Facets of CSAM
Using Crime Science
Structure of this Book
Notes
References
Part I The Ecosystem
2 The CSAM Ecosystem
What Is an Ecosystem?
What Constitutes the Environment in the CSAM Ecosystem?
The Internet
Signposting Information – IP Addresses and the Domain Name System
The World Wide Web
Internet Service Providers
Online Applications
The Financial System
A Climate That Is Conducive to Growth
What Constitutes an Organism in the CSAM Ecosystem?
Consumers
Content Producers
Content Distributors
Service Providers
Victims / Survivors
Other ‘Organisms’ Operating in the CSAM Ecosystem
How Are Communities Formed in the CSAM Ecosystem and How Do Their Members Interact With One Another?
Summing Up the CSAM Ecosystem
Notes
References
3 How Is CSAM Produced?
Introduction
Perpetrator-created CSAM
Perpetrator Exploits Child in Their Care
Perpetrator Exploits Child With Whom They Are in a Relationship
Perpetrator Predates On Children Not in Their Care
Perpetrator Pays for Access to a Child
Self-produced CSAM
The Role of Adult Pornography in the CSAM Ecosystem and How It Facilitates Self-Creation
Livestreaming of CSAM
CSAM in Computer-Generated Images, Animation and Computer Games
Computer-generated Images
Computer Games
Cartoons and Animation
Summing Up the Ways in Which CSAM Is Created
Understanding How the Ecosystem Facilitates the Creation of CSAM
Notes
References
4 How Is CSAM Distributed?
Introduction
Email
Websites
Peer-to-peer Networks
Forums
Internet Relay Chat
Instant Messaging
Computer Games
File Storage Sites
Social Media
Sharing On the Darknet
Which Countries Share CSAM?
Summing Up the Ways in Which CSAM Is Shared
Note
References
5 How Is CSAM Consumed?
Introduction
How Is CSAM Viewed?
Storing CSAM to View Later
What Is Being Viewed?
Severity of Material
Escalation in Viewing
Situations in Which CSAM Is Viewed
Technology Used to View CSAM
Security Measures to Prevent Disclosure
Summing Up the Ways in Which CSAM Is Consumed
References
6 Understanding CSAM Problems
Introduction
Classifying Problem Facilitators
Production-related Problems
Distribution-related Problems
Features of the 15 Problems
Facilitating Access to Saved Material
Facilitating Access to Victims / Survivors
Facilitating Access to a Community of Perpetrators
The Failure of Guardians
Not All Problems Are Equal
Next Steps
Note
References
Part II Addressing the Problem
7 Taking a Crime Science Approach
Introduction
Some Theory
Rational Choice
Situational Crime Prevention
Environmental Criminology
Routine Activity
Some Tools
The Crime Triangle
Crime Scripts
Arms Races
The 11 Ds
The Hierarchy of Intervention
A Word On Displacement
Bringing It All Together
Notes
References
8 Approaches to Reducing the Production of CSAM
Introduction
Interventions That Address Target Selection
Incarcerating Child Sexual Offenders
Attrition in the Criminal Justice System
Low Recidivism Rates
Treatment Programmes for Child Sexual Offenders
Sex Offender Registries
Employee Criminal Record Checks
Raising Awareness of Risk Among Children and Young People
Online Moderation By Social Media Platforms
Interventions That Address Preparation
Situational Prevention of Preparation in the Offline Environment
Proactive Law Enforcement Investigation of Online Grooming
Awareness Raising to Help Children Identify Grooming
Warnings for Parents and Guardians
Interventions That Address Perpetration
Interventions That Address Completion
Establishing Reporting and Response Frameworks
Mandatory Reporting of Child Sexual Abuse
Reactive Police Investigation
Computer Forensic Examination
Crowdsourcing of Intelligence
Summing Up the Evidence On Approaches the Reduce the Production of CSAM
What More Could Be Done to Reduce CSAM Production?
Age Restrictions On Social Media Platforms
Making It Harder to Find Friends
Disinformation in Online Forums
Removing the Profit From Livestreaming
Throttling Internet Speeds
Could Cameras Decide Whether to Record?
Notes
References
9 Approaches to Preventing the Distribution of CSAM
Introduction
Search and Destroy
Identifying CSAM to Be Removed
Tools for Identifying CSAM
Ordering the Removal of CSAM
But Removal Is Not Always Effective
Taking Down Rogue Servers
Blocking Content
Blocking Access to URLs
Blocking CSAM Search Terms
The Problem of Encryption
Summing Up the Evidence On Approaches That Reduce the Distribution of CSAM
What More Could Be Done to Reduce CSAM Distribution?
Technical Solutions
Applications to Identify New CSAM Early in Its Distribution Lifecycle
Analysing Metadata Patterns
Designing Out CSAM
Policy Solutions
Increase Responsibility for CSAM
Focusing Attention On Recidivist ESPs and ISPs
Notes
References
10 Approaches to Preventing the Consumption of CSAM
Introduction
Pop-up Messaging to Warn Users
Law Enforcement Detection of CSAM Consumers
Tracking the IP Addresses of CSAM Consumers
Using Malware to Track CSAM Consumers
Using the Financial System to Identify CSAM Consumers
Demotivating CSAM Consumers
Remote Support Through Call Centres and Online Chat
Online Self-Help
Therapeutic Treatment
Support for Family Members
Summing Up the Evidence On Approaches to Reduce the Consumption of CSAM
What More Could Be Done to Reduce CSAM From Being Consumed?
Notes
References
11 Conclusions
Addressing a Complex Problem
Priorities for Action
Raising the Stakes for ESPs / ISPs
Self-regulation
Government Regulation
Ending End-To-End Encryption
Reducing Anonymity
Following the Money
Dealing With the Darknet
Concluding Remarks
Notes
References
Index