Sted og dato (Indsæt --> Diasnummer) Dias 1 Digital Footprints from a Police Perspectice: Fighting Child Pornography on the Internet.

Slides:



Advertisements
Similar presentations
A NEW EUROPEAN YOUTH PORTAL FOR A NEW GENERATION.
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
SESSION 1: INTRODUCTION TO HUMANITARIAN ACTION. What guides UNICEFs humanitarian action Characteristics and challenges posed by complex emergencies UNICEFs.
Children's Rights and Child Protection: Whats that got to do with the Internet? Vernon Jones Save the Children Denmark.
1 FPEG Identity theft & payment fraud point December 2007.
Daphne III – Action grant KICK-OFF Meeting Violence against children the EU policy perspective 21 January :30 Centre Albert Borschette.
REALIZING BOSNIA AND HERZEGOVINAS EUROPEAN POTENTIAL: FROM POST-CONFLICT TO PRE-ACCESSION FROM DAYTON TO BRUSSELS - PROGRESS ON EU INTEGRATION - Mr. Adnan.
The Managing Authority –Keystone of the Control System
The role of the Managing Authorities
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Illinois Department of Children and Family Services, Pathways to Strengthening and Supporting Families Program April 15, 2010 Division of Service Support,
Using Information at the University University Secretarys Office
BUILDING A EUROPE FOR AND WITH CHILDREN The ONE in FIVE Campaign Regina Jensdottir.
European Commission – Directorate-General Communication 1 Lessons learned from the European Year of Volunteering Preparations for the European.
Internet Safety Presentation
Children Internet Safety via collaboration between Russian NGOs and Internet business.
Internet Safety 9th Grade Health.
Neighbourhood Watch Poland: DIALOG Programme experiences.
Communications Regulatory Agency Media Literacy and Protection of Children Experiences of the Communications Regulatory Agency of BH Kemal Huseinović,
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
Creating and Capturing Customer Value
Higher education policy, main developments in Europe Empower European Universities Annual conference The State of Universities for Progress Parkhotel.
VOORBLAD.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
Impact of the Lisbon Treaty on the Common Security and Defence Policy of the European Union 24 February 2013 Joël Schuyer.
Council of Europe Eastern Partnership Facility 16 May 2013, Brussels.
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
Moldova - EU Visa Liberalisation Process. Visa liberalisation : background  Further advancing on the way of reforming in cooperation with the EU and.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
11 Professor Rosalind F Croucher Commissioner. 22.
11-1 MFIRS 11 Arson Module ObjectivesObjectives The participants will be able to: –describe when the Arson Module (NFIRS 11) is to be used. –demonstrate.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Abuse Prevention and Response Protocol.
Loredana Ceccacci: Expert of the Observatory for the fight against pedophilia and child pornography.
NORMAPME ISO User Guide for European SMEs The essence of.
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
BUILDING A EUROPE FOR AND WITH CHILDREN The ONE in FIVE Campaign.
Workshop 24 Input by ILGA-Europe (policy and coalition opportunities) Joël Le Déroff – Senior Policy & Programmes Officer – 19 October.
The need for global approach to child online protection Dr. Mona Al-achkar Jabbour Pan Arab Observatory for cyber security October.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Awareness raising session for Parents and Carers.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Rethinking child protection in a digital age, Fighting online.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Overview of SAPS roles and responsibilities and demand reduction Assistant Commissioner Tertius Geldenhuys.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
9th International Conference “Keeping children and young people safe online” 1 Szymon Wójcik Nobody’s Children Foundation Warsaw, Poland.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Combatting Child Sexual Exploitation – the European Approach Europol Rob Wainwright Director Europol Unclassified - Basic Protection Level Europol Public.
San José, Costa Rica, 9-10 June 2014 Marie-laure Lemineur Head, Sexual Exploitation of Children Online Programme The sexual exploitation of children through.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Cyber Security and Georgia. New Challenges
Child Sexual Exploitation and Abuse
Securing free and fair European elections
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Sted og dato (Indsæt --> Diasnummer) Dias 1 Digital Footprints from a Police Perspectice: Fighting Child Pornography on the Internet

Sted og dato (Indsæt --> Diasnummer) Dias 2 The networked society The world now spends over 110 billion minutes on social networks and blog sites Surveillance society? “The loss of individual freedom and the loss of privacy seems the prize for the growing dependency of the internet. The struggle for privacy is the 21 st century civil rights struggle” (Ulrich Beck)

Sted og dato (Indsæt --> Diasnummer) Dias 3 What is the problem? We are more and more online …and so are the criminals

Sted og dato (Indsæt --> Diasnummer) Dias 4 Social media – the new playground for pedophiles Computers and the internet have massively increased the production and distribution of child pornography (children being raped and sexually abused) Easy acces to victims (grooming): Social media (Facebook, Arto) Online plays with chat function (WOW)

Sted og dato (Indsæt --> Diasnummer) Dias 5 The child as the most fragile user With the arrival of new methods of communication on the Internet and mobile technologies, children are more exposed to complex and multi-faceted emerging threats How to protect the child against the use of the internet for child sexual abuse? Alleded conflict between the rights of the child and other fundamental rights such as freedom of expression and the right to privacy

Sted og dato (Indsæt --> Diasnummer) Dias 6 ”Child pornography” The term ‘child pornography’ is a record of the systematic rape, abuse and torture of children on film and photograph and other electronic means Child pornography = child exploitation material (CEM) However legal instruments continue to refer to ‘child pornography’ 2011/92 Directive on combatting the sexual abuse and sexual exploitation of children and child pornography

Sted og dato (Indsæt --> Diasnummer) Dias 7 Who are the perpetrators? Groups in the families who use the webcam to exploit and exchange livestreming with friends People who are online all the time trying to groome kids in order to get acces to an innocent child Real organised criminal groups who for money will rape children in front of you for USD 40

Sted og dato (Indsæt --> Diasnummer) Dias 8 Excuses “Was not me, but someone else who used/hacked my computer” “Just looking for cybersex”

Sted og dato (Indsæt --> Diasnummer) Dias 9 Challenges for the police International, borderless crime Rapid development Anonymisazion services/dark net (TOR) and hidden servers (Silkroad) Lack of global validation of IP adresses Cloud services Slow reaction within public authorities Different national agendas/priorities

Sted og dato (Indsæt --> Diasnummer) Dias 10 TOR - the ”Dark Net” TOR – the Onion Router - is “a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet” (TOR website). The TOR-users request is sent through 3 randomly chosen TOR routers. Every step is encrypted. The visited webpage only knows the adress of the closest router =>No digital footprints Fear of surveillance => more and more people choose TOR Out of 186 countries USA is highest ranking user, Denmark = 55, Sweden = 31, Norway = 40, France = 18, Germany = 16

Sted og dato (Indsæt --> Diasnummer) Dias 11 What to look after? -> Possession awareness of presence power of disposal over the files intention on possession files found in My documents temporary internet files recovered folders

Sted og dato (Indsæt --> Diasnummer) Dias 12 What to focus on? Specifying content IP addresses Domain names and DNS URLs File content and Filename Keywords Content Signatures (hash values) DNS= Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. URL= Uniform Resource Locator (URL) it is the global address of documents and other resources on the World Wide Web. Hash Values= a number generated from a string of text.

Sted og dato (Indsæt --> Diasnummer) Dias 13 Children at risk - what to do? Children are often more vulnerable when it comes to internet safety as they are still developing and learning. This has consequences for their capacity to identify and manage potential risks on the Internet. Build human and institutional cyber security capabilities through: Awareness-raising campaigns at global, national and regional levels; Training programs for parents, guardians, educators, and children; Partnerships with different stakeholders.

Sted og dato (Indsæt --> Diasnummer) Dias 14 Blocking Styles of Blocking Personal filtering Network blocking Hybrids of these two styles webpages containing child pornography are currently blocked (National Danish Police, July 2013)

Sted og dato (Indsæt --> Diasnummer) Dias 15 Content targeted - examples Child Pornography Controversial political topics / hate speech / Libel and publication of false information Content published by terrorist Copyright violations Intellectual Property Rights Gambling Websites Terrorist activities

Sted og dato (Indsæt --> Diasnummer) Dias 16 Tendencies in child pornography  more recent material  increase of violence  victims of younger age “Its not a question of disgusting pictures on the internet. It is the victims behind those pictures who are the most important. It’s a question of life and dead. Babies are being raped on request and even killed. How come legislation deals with terror and no this?” (Europol Liason officer)

Sted og dato (Indsæt --> Diasnummer) Dias 17 EU Legal framework 2011/92/EU Directive on combatting the sexual abuse, sexual exploitation of children and child pornography The Stockholm Programme The EU Internal Security Strategy of the European Union The Council of Europe Convention on Cybercrime The Council of Europe Convention on Protection of Children against Sexual Exploitation and Sexual Abuse (“the Lanzarote Convention”)

Sted og dato (Indsæt --> Diasnummer) Dias 18 EC3 – European Cyber Crime Centre The Centre started operations in January 2013 and is to act as the focal point in the fight against cybercrime in the Union.

Sted og dato (Indsæt --> Diasnummer) Dias 19 EC3 - functions 1. Serve as the European cybercrime information focal point; 2. Pool European cybercrime expertise to support Member States; 3. Provide support to Member States' cybercrime investigations; 4. Be the collective voice of European cybercrime investigators across law enforcement and the judiciary.

Sted og dato (Indsæt --> Diasnummer) Dias 20 20Thanks EC3 - Cooperation with Key Actors International Partners European Agencies Private Sector, research communities and civil society organisations Member States

Sted og dato (Indsæt --> Diasnummer) Dias 21 A Global Alliance against Child Sexual Abuse Online Child pornography – a global problem! Agreement on a Global Alliance against Child Sexual Abuse Online with the US authorities at the EU-US Ministerial Meeting on June 2012 in Copenhagen EC3 – Interpol Global Complex partnership

Sted og dato (Indsæt --> Diasnummer) Dias 22 The ”Sweetie” case “Sweetie”, an avatar created by a Dutch children's charity organization was built to expose the scale of the problem => hits in a month

Sted og dato (Indsæt --> Diasnummer) Dias 23 ”BabyMay” Danish journalist posing online in August 2008 pretending to be a minor of 13 years Profile on Arto.dk Research during 1½ years

Sted og dato (Indsæt --> Diasnummer) Dias 24 Policing Online Sex Offenders Cyberpatrolling? Proactive investigation 1. Going on-line, posing as a child and placing your ‘child’ profile in areas of the Internet where actual children are most likely to be targeted (e.g. Chat facility / Social Network Sites, Massively Multiplayer Online Role Playing Games) / Web Cam Sites… 2. Going on-line as Sex Offender to identify offenders and victims

Sted og dato (Indsæt --> Diasnummer) Dias 25 Policing online Sex Offensers Reactive : In response to a complaint, observation, or real victim; conducting an online undercover investigation of a specific subject or group of subjects online. Eg Victim / Informant / Virtual Global Taskforce/ other Law Enforcement “Its better to be there in the beginning than in the end” (Troels Ørting, Head of EC3)

Sted og dato (Indsæt --> Diasnummer) Dias 26 Reactive vs Proactive Law enforcement investigates two types of cases: reactive and proactive. Reactive cases involve a response to a complaint and may involve one or more investigating agencies. Proactive cases often involve a law enforcement officer going onto the Internet to seek out suspects—sometimes called “undercover chat.” This occurs without a complaint being the trigger for the action.

Sted og dato (Indsæt --> Diasnummer) Dias 27 Logging On 15 March 2006 the European Union adopted the Data Retention Directive, on "the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC“ The Directive requires Member States to ensure that communications providers retain, for a period of between 6 months and 2 years, necessary data as specified in the Directive. The data is required to be available to "competent" national authorities in specific cases, "for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law".

Sted og dato (Indsæt --> Diasnummer) Dias 28 The German case The German Bundestag had implemented the directive (6 months retention), but on 2 March 2010, the Federal Constitutional Court of Germany ruled the law unconstitutional as a violation of the guarantee of the secrecy of correspondence. => The directive is currently not implemented in Germany.

Sted og dato (Indsæt --> Diasnummer) Dias 29 The German Highway Shooter case – hypocrisy? Germans are apolectic about the internet spy programs Prism and Tempora. But police managed to catch a highway shooter using similar tactics. Shootings began in 2008 and hit a woman in Police are forbidden acces to data collected, so they created their own system. In April 2013 the system identified the shooter. However privacy activists are concerned.

Sted og dato (Indsæt --> Diasnummer) Dias 30 THANK YOU! Trine Thygesen Vendius, Ph.D. Candidate, Faculty of Law, Copenhagen University,