Skip to main content

Challenges and Opportunities in Investigations of Online Sexual Exploitation of Children: Old Networks, Dark Web, and Proactive Response

  • Chapter
  • First Online:
Criminal Investigations of Sexual Offenses

Abstract

The Internet provides private spaces that make it easier to engage in sexual activities, including with minors, and has also facilitated contact with young victims. This chapter looks at the challenges for criminal investigations posed by online sexual offenses against minors. The first challenges are determining how to police clear web networks for child sexual exploitation material (CSEM) and the possible shift of Internet users toward the Dark Web. Recent initiatives to address these issues are reviewed. We then look at the challenges involved in investigating individuals who engage in online sexual solicitation of minors. Not only is it often difficult to determine whether individuals depicted in CSEM are minors, whether the actions pictured indeed constituted abuse, or what constitutes child luring, but complex cases can involve large amounts of data to be analyzed, requiring the mobilization of both financial and human resources. The last section of the chapter offers different alternatives to improve the effectiveness of response in the fight against online sexual offenses targeting minors, suggesting both predictive analysis and the importance of proactive solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Ablon, L., Libicki, M. C., & Abler, A. M. (2014). Markets for cybercrime tools and stolen data. RAND Corporation. https://www.rand.org/pubs/research_reports/RR610.html

    Book  Google Scholar 

  • Açar, K. V. (2018). OSINT by crowdsourcing: A theoretical model for online child abuse investigations. International Journal of Cyber Criminology, 12, 206–229.

    Google Scholar 

  • Akilandeswari, J. & Gopalan, N. P. (2008). An architectural framework of a crawler for locating deep web repositories using learning multi-agents systems. Paper presented at the 2008 Third International Conference on Internet and Web Applications and Services, Athens, Greece.

    Google Scholar 

  • Babchishin, K. M., Hanson, R. K., & VanZuylen, H. (2015). Online child pornography offenders are different: A meta-analysis of the characteristics of online and offline sex offenders against children. Archives of Sexual Behaviour, 44, 45–66.

    Article  Google Scholar 

  • Black, P. J., Wollis, M., Woodworth, M., & Hancock, J. T. (2015). A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse & Neglect, 44, 140–149.

    Article  Google Scholar 

  • Boyd, D. M. (2008). Taken out of context: American teen sociality in networked publics. (Doctoral thesis, University of California). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1344756.

  • Braunstein, A., Dall’Astaa, L., Semerjiand, G., & Zdeborováe, L. (2016). Network dismantling. PNAS, 113(44), 12368–12373.

    Article  Google Scholar 

  • Brennan, M. & Perkins, D. E., Merdian, H. L., Tyrrell, E., Babchishin, K. M, McCartan, K. F., & Kelly, R. (2019). Best practice in the management of online sex offending. PEARL Research Repository. http://hdl.handle.net/10026.1/14331.

  • Briggs, P., Simon, W. T., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse: A Journal of Research and Treatment, 23, 72–91.

    Article  Google Scholar 

  • Burruss, G. W., & Holt, T. J. (2017). The hazards of investigating Internet crimes against children: Digital evidence handlers experiences with vicarious trauma and coping behaviors. American Journal of Criminal Justice, 43, 433–447.

    Article  Google Scholar 

  • Canadian Center for Child Protection. (2016). Child sexual abuse images on the Internet: A cybertip.ca analysis. Canadian Centre for Child Protection. https://protectchildren.ca/en/resources-research/child-sexual-abuse-images-report/.

  • Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the Dark Web: A case study of Jihad on the web. Journal of the American Society for Information Science and Technology, 59, 1347–1359.

    Article  Google Scholar 

  • Clarke, R. V. G., & Felson, M. (1993). Routine activity and rational choice: Advances in criminological theory (Vol. 5). Transaction Publishers.

    Google Scholar 

  • Cooper, A. (1998). Sexuality and the Internet: Surfing its way into the New Millennium. CyberPsychology & Behavior, 1, 187–193.

    Article  Google Scholar 

  • Cooper, A. (2002). Sex and the Internet: A guidebook for clinicians. Brunner-Routledge.

    Google Scholar 

  • Cybertip (2016). Our Results: Reporting and Education. Cybertip. https://www.cybertip.ca/app/en/about-our_results/.

  • Cybertip (2021) - Project Arachnid https://www.cybertip.ca/app/en/projects-arachnid.

  • DeBell, M. & Chapman, C. (2003). Computer and internet use by children and adolescents in 2001 (Report no. NCES 2004–014). National Center for Education Statistics. https://nces.ed.gov/pubs2004/2004014.pdf.

  • Deisman, W. W. (2008). Securing cyberspace: Neo-liberalism, risk and child safety. (Doctoral Dissertation, Carleton University). https://curve.carleton.ca/19050665-6b31-4e27-937d-aa5a6de8e4b4.

  • DeMarco, J., Sharrock, S., Crowther, T., & Barnard, M. (2018). Behaviour and Characteristics of perpetrators of online-facilitated exploitation: A rapid evidence assessment. Independent Inquiry into Child Sexual Abuse. IICSA. https://www.iicsa.org.uk/key-documents/3720/view/rapid-evidence-assessment-behaviour-characteristics-perpetrators-online-facilitated-child-sexual-abuse-exploitation.pdf.

  • Dwyer, R. G. et al. (2016a). Protecting children online: Using research-based algorithms to prioritize law enforcement Internet investigations. Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250154.pdf.

  • Dwyer, G. R., Seto, M. C., DeHart, D., Letourneau, E., Moran, R., & Armstong, K. (2016b). Protecting child online: Using research-based algorithms to prioritize law enforcement Internet investigations, Technical Report (Report no. 250154). Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250154.pdf.

  • FBI (2009). Online sexual exploitation of children. In the Federation Bureau of Investigation’s efforts to combat crimes against children. Office of the Inspector General. https://oig.justice.gov/reports/FBI/a0908/final.pdf.

  • Felstead, M. (2018). Identifying factors that influence the use of Dark web cryptomarkets: Qualitative interviews with cryptomarket users. The Plymouth Law & Criminal Justice Review, 10, 84–104.

    Google Scholar 

  • Fidalgo, E., Alegre, E., Fernandez-Robles, L., & Gonzales-Castro, V. (2019). Classifying suspicious content in tor darknet through semantic attention keypoint filtering. Digital Investigation, 30, 12–22.

    Article  Google Scholar 

  • Fortin, F., & Paquette, S. (2018). Investigations and online sexual exploitation of children. In P. Lussier & E. Beauregard (Eds.), Sexual offending: A criminological perspective. Routledge, Taylor & Francis.

    Google Scholar 

  • Fortin, F., Paquette, S., & Dupont, B. (2018). From online to offline sexual offending: episodes and obstacles. Aggression and Violent Behavior, 39, 33–41.

    Article  Google Scholar 

  • Garrington, C., Merdian, H., & Boer, D. P. (2018). Variables influencing the case priorisation of men convicted of Internet child abuse material offences. Sexual Offending: Theory, Research, and Prevention, 15, 1–19.

    Google Scholar 

  • Gehl, R.-W. (2016). Power/freedom on the darknet: A digital ethnography of the Dark Social Network. New Media & Society, 18, 1219–1123.

    Article  Google Scholar 

  • Grant, T., & Macleod, N. (2016). Assuming identities online: Experimental linguistics applied to the policing of online paedophile activity. Applied Linguistics, 37, 50–70.

    Article  Google Scholar 

  • Graham, R. et Pitman, B. (2018). Freedom in the wilderness: A study of a Darknet space. Convergence: The International Journal of Research into New Media Technologies, 26, 1–27. https://doi.org/10.1177/1354856518806636

  • Gregory, W. J. (2018). Honeypots: Not for Winnie the Pooh but for Winnie the pedo: Law enforcement’s lawful use of technology to catch perpetrators and help victims of child exploitation on the dark web. George Mason Law Review, 26, 259–312.

    Google Scholar 

  • Haasz, A. (2016). Underneath it all: Policing international child pornography on the Dark Web. Syracuse Journal of International Law and Commerce, 43, 353–380.

    Google Scholar 

  • Hanson, R. K., & Morton-Bourgon, K. E. (2005). The characteristics of persistent sexual offenders: A meta-analysis of recidivism studies. Journal of Consulting and Clinical Psychology, 73, 1154–1163.

    Article  Google Scholar 

  • Hayes, D. R., Cappa, F., & Cardon, J. H. (2018). A framework for more effective dark web marketplace investigations. Information, 9, 1–17.

    Article  Google Scholar 

  • Irwin, D., Dadej, A., & Slay, J. (2012). Extraction of electronic evidence from VoIP: Identification & analysis of digital speech. Journal of Digital Forensics, Security and Law, 7. https://doi.org/10.15394/jdfsl.2012.1128

  • Johansson, C. (2019). Combating online child sexual abuse material. (Master thesis, Malmö University). http://muep.mau.se/handle/2043/29049.

  • Krone, T., Smith, R., Cartwright, J., Hutchings, A., Tomison, A., & Napier, S. (2017). Online child sexual exploitation offenders: A study of Australian law enforcement data. Criminology Research Advisory Council. https://pdfs.semanticscholar.org/e694/b3ac08fb9aebcbd07da1f2625110d166793a.pdf.

  • Lee, J. (2019). Child pornography websites on the darknet. International Journal of Recent Technology and Engineering, 8, 48–54.

    Google Scholar 

  • Long, M., Alison, L., Tejeiro, R., Hendricks, E., & Giles, S. (2016). KIRAT: Law enforcement’s prioritization tool for investigating indecent image offenders. Psychology, Public Policy, and Law, 22, 12–21.

    Article  Google Scholar 

  • McManus, M., Long, M., Alison, L., & Almond, L. (2015). Factors associated with contact child sexual abuse in a sample of indecent image offenders. Journal of Sexual Aggression: An International, Interdisciplinary Forum for Research, Theory and Practice, 21, 368–384.

    Article  Google Scholar 

  • Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2010). Growth and change in undercover online child exploitation investigations, 2000–2006. Policing and Society, 20, 416–431.

    Article  Google Scholar 

  • Mitchell, K. J., Wolak, J., Finkelhor, D., & Jones, L. (2012). Investigators using the Internet to apprehend sex offenders: Findings from the Second National Juvenile Online Victimization Study. Police Practice and Research, 13, 267–281.

    Article  Google Scholar 

  • Newman, G. R. (2011). Sting operations. National Criminal Justice Reference Service. https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=242552.

  • Owen, G., Savage, N. (2015). The Tor dark net. Global Commission on Internet Governance.

    Google Scholar 

  • Owens, J. N., Eakin, J. D., Hoffer, T., Muirhead, Y. et Shelton, J. (2016). Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases. Aggression and Violent Behavior, 30, 3–14. https://doi.org/10.1016/j.avb.2016.07.001

  • Paquette, S. (2016, May). Enquêtes en matière de pédopornographie : Avantages et inconvénients de l’utilisation des données virtuelles [Child pornography criminal investigations: Advantages and inconveniences of the virtual data]. Paper presented at the conference “Cybercriminalité” of the European Research Group on the Normativities, Paris, France.

    Google Scholar 

  • Paquette, S. (forthcoming 2021). The sexual exploitation of children and adolescents over the Internet. In R. J. Tully, G. Bohall, & J. P. Singh (Eds.), Best practices in sexual offender assessment and management. Springer.

    Google Scholar 

  • Paquette, S., & Cortoni, F. (2021). Offense-supportive cognitions expressed by men who use Internet to sexually exploit children: A thematic analysis. International Journal of Offender Therapy and Comparative Criminology. Online first.

    Google Scholar 

  • Paquette, S., & Chopin, J. (2020). Applying the Motivation-Facilitation Model to understand the sexual abuse of adolescents: A comparison with those committed against children and adults.

    Google Scholar 

  • Pellerin, C. (2017). DARPA Program helps to fight human trafficking. https://www.defense.gov/Explore/News/Article/Article/1041509/darpa-program-helps-to-fight-human-trafficking/.

  • Pranoto, H., Gunawan, F. E., & Soewito, B. (2015). Logistic models for classifying online grooming conversation. Procedia Computer Science, 59, 357–365.

    Article  Google Scholar 

  • Quayle, E. (2020). Prevention, disruption and deterrence of online sexual exploitation and abuse. ERA Forum.

    Google Scholar 

  • Quayle, E., & Newman, E. (2015). The role of sexual images in online and offline sexual behaviour with minors. Current Psychiatry Reports, 17, 43.

    Article  Google Scholar 

  • Quebec Ministry of Public Security (2014). Les six niveaux de services policiers en fonction du nombre d'habitants [The six levels of policing based on population size]. https://www.securitepublique.gouv.qc.ca/police/quebec/services-de-police/desserte-policiere/six-niveaux-service.html.

  • Raghavan, S. & Garcia-Molina, H. (2000). Crawling the Hidden Web. Technical Report. Stanford.

    Google Scholar 

  • Rashid, A., Greenwood, P., Walkerdine, J., Baron, A., & Rayson, P. (2012). Technological solutions to offending. In E. Quayle & K. L. Ribisl (Eds.), Understanding and preventing online sexual exploitation of children (pp. 228–243). Routledge.

    Google Scholar 

  • Requiao da Cunha, B., et al. (2020). Assessing police topological efficiency in a major sting operation on the dark web. Scientific Reports, 10(1).

    Google Scholar 

  • Seto, M. C. (2013). Internet sex offenders. American Psychological Association.

    Book  Google Scholar 

  • Seto, M. C. (2019). The motivation-facilitation model of sexual offending. Sexual Abuse, 31, 3–24.

    Article  Google Scholar 

  • Seto, M. C., & Eke, A. W. (2015). Predicting recidivism among adult male child pornography offenders: Development of the Child Pornography Offender Risk Tool (CPORT). Law and Human Behavior, 39, 426–429.

    Article  Google Scholar 

  • Seto, M. C., Wood, J. M., Babchishin, K. M., & Flynn, S. (2012). Online solicitation offenders are different from child pornography offenders and lower risk contact sexual offenders. American Psychological Association, 36, 320–330.

    Google Scholar 

  • Sheetz, M. W. (2000). Cyberpredators: Police Internet investigations under Florida statute 847.0135. University of Miami Law Review, 54, 405–450.

    Google Scholar 

  • Smahel, D., Machackova, H., Mascheroni, G., Dedkova, L., Staksrud, E., Ólafsson, K., Livingstone, S., & Hasebrink, U. (2020). EU Kids Online 2020: Survey results from 19 countries. EU Kids Online. http://eprints.lse.ac.uk/103294/1/EU_Kids_Online_2020_March2020.pdf.

  • Solon, O. (2020, July 17). Inside the surveillance software tracking child porn offenders across the globe. NBC news. https://www.nbcnews.com/tech/internet/inside-surveillance-software-tracking-child-porn-offenders-across-globe-n1234019.

  • Steel, C. M. S. (2009). Web-based child pornography. International Journal of Digital Crime and Forensics, 1, 58–69.

    Article  Google Scholar 

  • United Nations Office on Drugs and Crime. (2013). Comprehensive Study on Cybercrime. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

  • U.S. Department of Justice. (2010). The national strategy for child exploitation prevention and interdiction: A report to Congress. Author.

    Google Scholar 

  • United States General Accounting Office (2004). File sharing programs: Peer to peer networks provide ready access to child pornography (Report no. GAO-03-351). Government Accountability Office. http://www.gao.gov/new.items/d03351.pdf.

  • Usha, D., Niveditha, V. V. R., Kirubadevi, T., & Thamishikkavi, P. (2020). Use of predictive analytical algorithm by crime investigation team: An analysis. International Journal of Advances Science and Technology, 29, 2986–2992.

    Google Scholar 

  • Westlake, G. (2019). The past, present, future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection. In T. Holt & M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance. Springer Nature Switzerland.

    Google Scholar 

  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35, 424.

    Article  Google Scholar 

  • Wolak, J., Finkelhor, D., & Mitchell, K. (2011). Child pornography possessors: Trends in offender and case characteristics. Sexual Abuse: A Journal of Research and Treatment, 23, 22–42.

    Article  Google Scholar 

  • Wolak, J., Liberatore, M., & Levine, B. N. (2014). Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. Child Abuse & Neglect, 38, 347–356.

    Article  Google Scholar 

  • Wortley, R., & Smallbone, S. (2006). Applying situational principles to sexual offenses against children. Crime Prevention Studies, 19, 7.

    Google Scholar 

  • Wurtele, S. K. (2017). Preventing cyber sexual solicitation of adolescents. In R. Alexander (Ed.), Research and practices in child maltreatment prevention (Vol. 1, pp. 361–393). STM Learning, Inc..

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francis Fortin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fortin, F., Paquette, S., Gagné, S. (2021). Challenges and Opportunities in Investigations of Online Sexual Exploitation of Children: Old Networks, Dark Web, and Proactive Response. In: Deslauriers-Varin, N., Bennell, C. (eds) Criminal Investigations of Sexual Offenses. Springer, Cham. https://doi.org/10.1007/978-3-030-79968-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79968-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79967-0

  • Online ISBN: 978-3-030-79968-7

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics