•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

In our digitally connected world, the law is arguably behind the technological developments of the Internet age. While this causes many issues for law enforcement, it is of particular concern in the area of child pornography in the United States. With the wide availability of technologies such as digital cameras, peer-to-peer file sharing, strong encryption, Internet anonymizers and cloud computing, the creation and distribution of child pornography has become more widespread. Simultaneously, fighting the growth of this crime has become more difficult. This paper explores the development of both the legal and technological environments surrounding digital child pornography. In doing so, we cover the complications that court decisions have given law enforcement who are trying to investigate and prosecute child pornographers. We then provide a review of the technologies used in this crime and the forensic challenges that cloud computing creates for law enforcement. We note that both legal and technological developments since the 1990s seem to be working to the advantage of users and sellers of child pornography. Before concluding, we provide a discussion and offer observations regarding this subject.

References

Adobe Systems Incorporated. (2012). Adobe Photoshop CS6. Retrieved from http://www.adobe.com/products/photoshop.html.

Aizescu, S. (2014, Jan 16). Bitcoin: Innovative new currency, or tool for terror? Haaretz. Retrieved from www.haaretz.com/business/1.569042.

Ashcroft v. Free Speech Coalition, 535 U.S. 234 (2002).

Barfe, L. (2012, Aug 13). Twitter is failing to police child pornography efficiently. The Guardian. Retrieved from http://www.theguardian.com/commentisfree/2012/aug/13/twitter-failure-childpornography.

Bjango. (2012). Adobe Photoshop CS6 improvements. Retrieved from http://bjango.com/articles/photoshopcs6.

Brockman, J. (2006, Apr 6). Child sex as Internet fare, through eyes of a victim. New York Times. Retrieved from www.nytimes.com/2006/04/05/washington/05porn.html.

Bowles, N. (2014, Jan 3). Tapping into Silicon Valley tech to fight child porn. SFGate. Retrieved 3 January, 2014, from www.sfgate.com/news/article/Tappinginto-Silicon-Valley-tech-to-fight-child-5112571.php.

Burke, D., & Ford, J. (2011). When a lie is the truth: Pandering child pornography. Journal of Legal, Ethical & Regulatory Issues, 14(2), 117-139.

Chawki, M. (2009). Online child sexual abuse: The French response. Journal of Digital Forensics, Security, and Law, 4(4).

Connolly, K. (2007, May 8). Germany investigates Second Life child pornography. The Guardian. Retrieved from www.theguardian.com/technology/2007/may/08/secondlife.web20.

Consumer Watchdog (2013, Dec 18). Google's social network is playground for online predators. PRNewsire Press Release. Retrieved from www.sacbee.com/2013/12/18/6010648/googles-social-network-is-playground.html.

Cornell Legal Information Institute (LII), Cornell University. (2013a). 18 USC § 2251 - Sexual exploitation of children. Retrieved 26 June 2013, from www.law.cornell.edu/uscode/text/18/2251.

Cornell Legal Information Institute (LII), Cornell University. (2013b). 18 U.S. CODE § 1466A - Obscene visual representations of the sexual abuse of children. Retrieved 26 June 2013, from www.law.cornell.edu/uscode/text/18/1466A.

Coty, Stephen. (2014). Computer forensics and incident response in the cloud. RSA Security Conference, San Francisco, CA, February 2014.

Creative Bloq. (2012). Adobe Photoshop CS6 hands-on review. Retrieved from www.creativebloq.com/photoediting/adobe-photoshop-cs6-review-1233260.

Cryptome. (2010). Anonymous author. Catch him with his encryption down: Counterencryption techniques in child exploitation investigations. Retrieved from http://cryptome.org/isp-spy/cryptospy.pdf.

Department of Justice. (2013). Child exploitation and obscenity section. Retrieved May 18, 2014, from www.justice.gov/criminal/ceos/subjectareas/childporn.html.

Department of Justice. (2003). Fact Sheet Protect Act, April 30, 2003. Retrieved 20 May 2014, from www.justice.gov/opa/pr/2003/April/03_ag_266.htm.

Dowty, D. (2013, Nov 13). Social media site Tumblr says it 'does not tolerate' child pornography after Martin J. Rothschild case. Syracuse.com. Retrieved from www.syracuse.com/news/index.ssf/2013/11/social_media_site_tumblr_says_it_does_not_tolerate_child_pornography_after_marti.html.

Easttom, C. (2014). System Forensics, Investigation, and Response, 2nd ed. Burlington, MA: Jones and Bartlett Learning. Ex Parte John Christopher Lo (2013), NO. PD-1560-12 (Tex. Crim. App., 2013).

Fabio, M., & Tacconi, S. A Machine Learning-based Triage methodology for automated categorization of digital media. Digital Investigation, 10(2), 193-204. Retrieved from http://dx.doi.org/10.1016/j.diin.2013.01.001.

Family Safe Media. (2013). Pornography statistics, 2006 Worldwide Pornography Revenues. Family Safe Media. Retrieved from www.familysafemedia.com/pornography_statistics.html.

Federal Bureau of Investigation. (2003). Privacy Impact Assessment (PIA) Child Victim Identification Program (CVIP) Innocent Images National Initiative (IINI). (May 9, 2003). Retrieved from www.fbi.gov/foia/privacy-impactassessments/cvip.

Federal Bureau of Investigation. (2012). Innocent images. Retrieved November 2013, from www.fbi.gov/statsservices/publications/innocent-images-1.

Franklin, K. (2014). “Pornography Addiction:” Science or naked rhetoric? Psychology Today. Retrieved 30 April 2014, from www.psychologytoday.com/blog/witness/201404/pornography-addiction-science-ornaked-rhetoric.

Greenwood, C. (2013, 9 June). Only one in 15 online child porn suspects is arrested: Chief Constables accused of treating offences as a ‘low priority’. Updated 10 June 2013. MailOnline. Retrieved from www.dailymail.co.uk/news/article-2338613/Only-15-online-child-pornsuspects-arrested-Chief-constablesaccused-treating-offences-lowpriority.html.

Hatch, O. (2012). Fighting the pornification of America by enforcing obscenity laws. Stanford Law & Policy Review, 23(1), 1-18.

Hilden, J. (2013, Dec 23). Why a Texas Appellate Court struck down a ban on certain sexual communications online. Justia.com. Retrieved from verdict.justia.com/2013/12/23/texasappellate-court-struck-ban-certain-sexualcommunications-online

Hurley, R., Prusty, S., Soroush, H., Walls, R.J., Albrecht, J., Cecchet, E., Levine, B.N., Liberatore, M., Lynn, B., & Wolak, J. (2013). Measurement and analysis of child pornography trafficking on P2P Networks. Proceedings of the International World Wide Web Conference Committee (IW3C2). Rio de Janeiro, Brazil, May 2013.

Immigration and Customs Enforcement. (2012). Child exploitation/operation predator. Department of Homeland Security. Retrieved from www.ice.gov/predator/.

Internet Watch Foundation (IWF). (2013, Aug 5). Websites hacked to host “the worst of the worst” child sexual abuse images. IFW News. Retrieved from www.iwf.org.uk/aboutiwf/news/post/367-websites-hacked-tohost-the-worst-of-the-worst-child-sexualabuse-images.

ICANN Security and Stability Advisory Committee. (2013). SAC-025. SSAC advisory on fast flux hosting and DNS. Retrieved December 2013, from www.icann.org.

ITV. (2013, 5 August). Firms hacked to host ‘the worst of the worst’ images. Retrieved 30 April 2014, from www.itv.com/news/update/2013-08-05/firms-hacked-to-host-the-worst-of-theworst-images.

Johnson, K. (2014, March 5). Clandestine websites fuel 'alarming' increase in child porn. USA Today. Retrieved from www.usatoday.com/story/news/nation/2014/02/19/child-pornography-darkweb/5184485/.

Jones, G. (2011). Children and development III. Progress in Development Studies, 11(2), 145-149.

Kleinman, A. (2013, July 24). Professional Glass porn is here and Google can't stop it. The Huffington Post. Retrieved from www.huffingtonpost.com/2013/07/24/google-glass-porn_n_3644321.html.

Krebs, B. (2014). Spam nation: The inside story of organized cybercrime--from global epidemic to your front door. Naperville, Illinois: Sourcebooks.

Kwan, O. (2009). From the Protection of Children against Sexual Exploitation Act of 1977 to the Adam Walsh Child Protection and Safety Act of 2006: How congress went from censoring child pornography to censoring protected sexual speech. Hastings Constitutional Law Quarterly, 36(3), 489. Retrieved from www.hastingsconlawquarterly.org/archives/V36/I3/Kwan.pdf.

Leon, A., & Gonzalez D. (2013, Jul 11). Sunrise man wanted on child pornography charges: FBI. NBC, Miami. Retrieved from www.nbcmiami.com/news/local/Sunrise-Man-Wanted-on-Child-Pornography-Charges-FBI-214914161.html.

Library of Congress. (2010). Respectfully quoted: A dictionary of quotations. Mineola, NY: Dover Publications, Inc., 192.

MacCarthy, M. (2010). What payment intermediaries are doing about online liability and why it matters. Berkeley Technology Law Journal, 25(2), 1037-1120.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing: Recommendations of The National Institute of Standards and Technology. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.

Memoirs v. Massachusetts, 383 U.S. 413 (1966).

Miller v. California, 413 U.S. 15 (1973).

Moore, R. (2011). Cybercrime: Investigating High-Technology Computer Crime. Burlington, MA: Anderson Publishing.

Motivans, M. & Kyckelhahn, T. (2007). Federal prosecution of child sex exploitation offenders, 2006. Retrieved from Bureau of Justice Statistics: http://bjs.ojp.usdoj.gov/content/pub/pdf/fpcseo06.pdf.

National Center for Missing and Exploited Children. (2013). Child Victim Identification Program. Retrieved from www.missingkids.com/CVIP.

New York v. Ferber, 458 U.S. 747 (1982). Holmes, O. W. (1934). Speeches. Mauro, T. (2002). High court rejects childporn law that 'turns the First Amendment upside down'. Freedom Forum. Retrieved 29 December 2013, from www.freedomforum.org/templates/document.asp?documentID=16082.

Obscene Publications Act. (2013). In Encyclopaedia Britannica. Retrieved from www.britannica.com/EBchecked/topic/423999/Obscene-Publications-Act.

Osborne v. Ohio, 495 U.S. 103 (1990). Poulsen, K, (2013, 13 Sep). FBI admits it controlled Tor servers behind mass malware attack. Wired. Retrieved from www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/.

Poulsen, K. (2014, 27 January). If you used this secure Webmail site, the FBI has your Inbox. Wired. Retrieved 30 April 2014, from www.wired.com/2014/01/tormail.

Prat, S., Bertsch, I., Chudzik, L. and Réveillère, C. (2013), Developing software to estimate age in child pornography images for forensic purposes: Relevance and limitations in psychocriminology. Journal of Forensic Sciences, 58: 845–846. doi: 10.1111/1556-4029.12082.

PROTECT Act of 2008, Pub, L. 110-401, 122 Stat. 4229, codified as amended at §304. (2008). Retrieved from https://www.icactaskforce.org/Documents/2008ProtectAct.pdf.

Regina v. Benjamin Hicklin, Law Reporter 3 Queen’s Bench 360 (1868).

Reno v. American Civil Liberties Union, 521 U.S. 844 (1997).

Rocha, A., Scheirer, W., Goldstein, S., & Boult, T. (2008). The unseen challenge data sets. International CVPR Workshop on Vision of the Unseen. IEEE, Anchorage, USA, 1-8.

Rocha, A., Scheirer, W., Boult, T., & Goldenstein, S. (2011). Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Computing Surveys, 43(4), 1-47.

Rosen v. United States, 161 U.S. 29 (1896).

Roth v. United States, 354 U.S. 476 (1957).

Schmidt, Eric (2013, Nov 19). Protecting children from sexual abuse. Retrieved February 1, 2014, from http://googlepolicyeurope.blogspot.com/2013/11/protecting-children-from-sexualabuse.html.

Schuster, L. (2002). Regulating virtual child pornography in the wake of Ashcroft v. Free Speech Coalition. Denver University Law Review, 80(2), 429-462.

Sammons, J. (2012). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Waltham, MA: Syngress.

Second Life Wiki. (2014). Linden Lab Official: Clarification of policy disallowing ageplay. Official Information and Policies Portal. Retrieved May 7, 2014, from http://wiki.secondlife.com/wiki/Official_Information_and_Policies_Portal.

Spencer, S. (2012). How big is the pornography industry in the United States? Covenant Eyes. Retrieved from http://www.covenanteyes.com/2012/06/01/how-big-is-the-pornography-industryin-the-united-states/.

The Guardian (2013, Oct 4). 'Tor Stinks' presentation. The Guardian. Retrieved from www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentationdocument.

The Guardian (2014, July 31). Microsoft ordered to produce overseas customer email addresses by US judge. The Guardian. Retrieved from http://www.theguardian.com/technology/2014/jul/31/microsoft-must-handoveroverseas-emails-judge.

Thomas, T. (2014, January 21). Google Glass sex app lets you watch, record yourself in the act. The Huffington Post. Retrieved from www.huffingtonpost.com/2014/01/21/google-glass-sex_n_4637741.html.

Thornburgh, D., & Lin, H. (2004). Youth, pornography, and the Internet. Issues in Science and Technology, 43-48.

United States v. Williams, 128 S.Ct. 1830 (2008). No. 06-694. Supreme Court of United States.

U.S. Department of Homeland Security. (2009). National Child Victim Identification System (NCVIS). Retrieved from www.dhs.gov/sites/default/files/publications/privacy/PIAs/privacy_pia_ncvis_august_2009.pdf.

U.S. Postal Service. (2012). U.S. postal inspectors protect children. U.S Postal Inspection Service. Retrieved from https://postalinspectors.uspis.gov/investigations/MailFraud/fraudschemes/ce/CE.aspx.

U.S. Sentencing Commission. (2012). Report to the Congress: Federal child pornography offenses. Retrieved December, 2012, from www.ussc.gov/news/congressionaltestimony-and-reports/sex-offensetopics/report-congress-federal-childpornography-offenses. 468 pages.

Wikileaks. (2009). An insight into child porn. Anonymous letter. Translated from German. Retrieved on February, 26, 2009, from http://wikileaks.org/wiki/.

Withnall, A. (2013, 22 September). Pornography addiction leads to same brain activity as alcoholism or drug abuse, study shows. The Independent. Retrieved 26 April 2014, from www.independent.co.uk/life-style/healthand-families/health-news/pornographyaddiction-leads-to-same-brain-activity-asalcoholism-or-drug-abuse-study-shows-8832708.html.

West, A. (2010). 20 years of Adobe Photoshop. Retrieved from www.webdesignerdepot.com/2010/02/20-years-of-adobe-photoshop/.

Wassom, B. (2012). Five predictions for augmented reality law in 2012, Law of Social & Emerging Media, Wassom.com. (n.d.). Also quoting Rampolla, Joe. Retrieved from www.wassom.com/5-predictions-for-augmented-reality-law-in-2012.html.

Zawoad, S., & Hasan, R. (2013). Digital forensics in the cloud. The Journal of Defense Software Engineering. 26(5), 17-20.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.