Abstract
The Internet provides private spaces that make it easier to engage in sexual activities, including with minors, and has also facilitated contact with young victims. This chapter looks at the challenges for criminal investigations posed by online sexual offenses against minors. The first challenges are determining how to police clear web networks for child sexual exploitation material (CSEM) and the possible shift of Internet users toward the Dark Web. Recent initiatives to address these issues are reviewed. We then look at the challenges involved in investigating individuals who engage in online sexual solicitation of minors. Not only is it often difficult to determine whether individuals depicted in CSEM are minors, whether the actions pictured indeed constituted abuse, or what constitutes child luring, but complex cases can involve large amounts of data to be analyzed, requiring the mobilization of both financial and human resources. The last section of the chapter offers different alternatives to improve the effectiveness of response in the fight against online sexual offenses targeting minors, suggesting both predictive analysis and the importance of proactive solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ablon, L., Libicki, M. C., & Abler, A. M. (2014). Markets for cybercrime tools and stolen data. RAND Corporation. https://www.rand.org/pubs/research_reports/RR610.html
Açar, K. V. (2018). OSINT by crowdsourcing: A theoretical model for online child abuse investigations. International Journal of Cyber Criminology, 12, 206–229.
Akilandeswari, J. & Gopalan, N. P. (2008). An architectural framework of a crawler for locating deep web repositories using learning multi-agents systems. Paper presented at the 2008 Third International Conference on Internet and Web Applications and Services, Athens, Greece.
Babchishin, K. M., Hanson, R. K., & VanZuylen, H. (2015). Online child pornography offenders are different: A meta-analysis of the characteristics of online and offline sex offenders against children. Archives of Sexual Behaviour, 44, 45–66.
Black, P. J., Wollis, M., Woodworth, M., & Hancock, J. T. (2015). A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse & Neglect, 44, 140–149.
Boyd, D. M. (2008). Taken out of context: American teen sociality in networked publics. (Doctoral thesis, University of California). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1344756.
Braunstein, A., Dall’Astaa, L., Semerjiand, G., & Zdeborováe, L. (2016). Network dismantling. PNAS, 113(44), 12368–12373.
Brennan, M. & Perkins, D. E., Merdian, H. L., Tyrrell, E., Babchishin, K. M, McCartan, K. F., & Kelly, R. (2019). Best practice in the management of online sex offending. PEARL Research Repository. http://hdl.handle.net/10026.1/14331.
Briggs, P., Simon, W. T., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse: A Journal of Research and Treatment, 23, 72–91.
Burruss, G. W., & Holt, T. J. (2017). The hazards of investigating Internet crimes against children: Digital evidence handlers experiences with vicarious trauma and coping behaviors. American Journal of Criminal Justice, 43, 433–447.
Canadian Center for Child Protection. (2016). Child sexual abuse images on the Internet: A cybertip.ca analysis. Canadian Centre for Child Protection. https://protectchildren.ca/en/resources-research/child-sexual-abuse-images-report/.
Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the Dark Web: A case study of Jihad on the web. Journal of the American Society for Information Science and Technology, 59, 1347–1359.
Clarke, R. V. G., & Felson, M. (1993). Routine activity and rational choice: Advances in criminological theory (Vol. 5). Transaction Publishers.
Cooper, A. (1998). Sexuality and the Internet: Surfing its way into the New Millennium. CyberPsychology & Behavior, 1, 187–193.
Cooper, A. (2002). Sex and the Internet: A guidebook for clinicians. Brunner-Routledge.
Cybertip (2016). Our Results: Reporting and Education. Cybertip. https://www.cybertip.ca/app/en/about-our_results/.
Cybertip (2021) - Project Arachnid https://www.cybertip.ca/app/en/projects-arachnid.
DeBell, M. & Chapman, C. (2003). Computer and internet use by children and adolescents in 2001 (Report no. NCES 2004–014). National Center for Education Statistics. https://nces.ed.gov/pubs2004/2004014.pdf.
Deisman, W. W. (2008). Securing cyberspace: Neo-liberalism, risk and child safety. (Doctoral Dissertation, Carleton University). https://curve.carleton.ca/19050665-6b31-4e27-937d-aa5a6de8e4b4.
DeMarco, J., Sharrock, S., Crowther, T., & Barnard, M. (2018). Behaviour and Characteristics of perpetrators of online-facilitated exploitation: A rapid evidence assessment. Independent Inquiry into Child Sexual Abuse. IICSA. https://www.iicsa.org.uk/key-documents/3720/view/rapid-evidence-assessment-behaviour-characteristics-perpetrators-online-facilitated-child-sexual-abuse-exploitation.pdf.
Dwyer, R. G. et al. (2016a). Protecting children online: Using research-based algorithms to prioritize law enforcement Internet investigations. Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250154.pdf.
Dwyer, G. R., Seto, M. C., DeHart, D., Letourneau, E., Moran, R., & Armstong, K. (2016b). Protecting child online: Using research-based algorithms to prioritize law enforcement Internet investigations, Technical Report (Report no. 250154). Office of Juvenile Justice and Delinquency Prevention. https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250154.pdf.
FBI (2009). Online sexual exploitation of children. In the Federation Bureau of Investigation’s efforts to combat crimes against children. Office of the Inspector General. https://oig.justice.gov/reports/FBI/a0908/final.pdf.
Felstead, M. (2018). Identifying factors that influence the use of Dark web cryptomarkets: Qualitative interviews with cryptomarket users. The Plymouth Law & Criminal Justice Review, 10, 84–104.
Fidalgo, E., Alegre, E., Fernandez-Robles, L., & Gonzales-Castro, V. (2019). Classifying suspicious content in tor darknet through semantic attention keypoint filtering. Digital Investigation, 30, 12–22.
Fortin, F., & Paquette, S. (2018). Investigations and online sexual exploitation of children. In P. Lussier & E. Beauregard (Eds.), Sexual offending: A criminological perspective. Routledge, Taylor & Francis.
Fortin, F., Paquette, S., & Dupont, B. (2018). From online to offline sexual offending: episodes and obstacles. Aggression and Violent Behavior, 39, 33–41.
Garrington, C., Merdian, H., & Boer, D. P. (2018). Variables influencing the case priorisation of men convicted of Internet child abuse material offences. Sexual Offending: Theory, Research, and Prevention, 15, 1–19.
Gehl, R.-W. (2016). Power/freedom on the darknet: A digital ethnography of the Dark Social Network. New Media & Society, 18, 1219–1123.
Grant, T., & Macleod, N. (2016). Assuming identities online: Experimental linguistics applied to the policing of online paedophile activity. Applied Linguistics, 37, 50–70.
Graham, R. et Pitman, B. (2018). Freedom in the wilderness: A study of a Darknet space. Convergence: The International Journal of Research into New Media Technologies, 26, 1–27. https://doi.org/10.1177/1354856518806636
Gregory, W. J. (2018). Honeypots: Not for Winnie the Pooh but for Winnie the pedo: Law enforcement’s lawful use of technology to catch perpetrators and help victims of child exploitation on the dark web. George Mason Law Review, 26, 259–312.
Haasz, A. (2016). Underneath it all: Policing international child pornography on the Dark Web. Syracuse Journal of International Law and Commerce, 43, 353–380.
Hanson, R. K., & Morton-Bourgon, K. E. (2005). The characteristics of persistent sexual offenders: A meta-analysis of recidivism studies. Journal of Consulting and Clinical Psychology, 73, 1154–1163.
Hayes, D. R., Cappa, F., & Cardon, J. H. (2018). A framework for more effective dark web marketplace investigations. Information, 9, 1–17.
Irwin, D., Dadej, A., & Slay, J. (2012). Extraction of electronic evidence from VoIP: Identification & analysis of digital speech. Journal of Digital Forensics, Security and Law, 7. https://doi.org/10.15394/jdfsl.2012.1128
Johansson, C. (2019). Combating online child sexual abuse material. (Master thesis, Malmö University). http://muep.mau.se/handle/2043/29049.
Krone, T., Smith, R., Cartwright, J., Hutchings, A., Tomison, A., & Napier, S. (2017). Online child sexual exploitation offenders: A study of Australian law enforcement data. Criminology Research Advisory Council. https://pdfs.semanticscholar.org/e694/b3ac08fb9aebcbd07da1f2625110d166793a.pdf.
Lee, J. (2019). Child pornography websites on the darknet. International Journal of Recent Technology and Engineering, 8, 48–54.
Long, M., Alison, L., Tejeiro, R., Hendricks, E., & Giles, S. (2016). KIRAT: Law enforcement’s prioritization tool for investigating indecent image offenders. Psychology, Public Policy, and Law, 22, 12–21.
McManus, M., Long, M., Alison, L., & Almond, L. (2015). Factors associated with contact child sexual abuse in a sample of indecent image offenders. Journal of Sexual Aggression: An International, Interdisciplinary Forum for Research, Theory and Practice, 21, 368–384.
Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2010). Growth and change in undercover online child exploitation investigations, 2000–2006. Policing and Society, 20, 416–431.
Mitchell, K. J., Wolak, J., Finkelhor, D., & Jones, L. (2012). Investigators using the Internet to apprehend sex offenders: Findings from the Second National Juvenile Online Victimization Study. Police Practice and Research, 13, 267–281.
Newman, G. R. (2011). Sting operations. National Criminal Justice Reference Service. https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=242552.
Owen, G., Savage, N. (2015). The Tor dark net. Global Commission on Internet Governance.
Owens, J. N., Eakin, J. D., Hoffer, T., Muirhead, Y. et Shelton, J. (2016). Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases. Aggression and Violent Behavior, 30, 3–14. https://doi.org/10.1016/j.avb.2016.07.001
Paquette, S. (2016, May). Enquêtes en matière de pédopornographie : Avantages et inconvénients de l’utilisation des données virtuelles [Child pornography criminal investigations: Advantages and inconveniences of the virtual data]. Paper presented at the conference “Cybercriminalité” of the European Research Group on the Normativities, Paris, France.
Paquette, S. (forthcoming 2021). The sexual exploitation of children and adolescents over the Internet. In R. J. Tully, G. Bohall, & J. P. Singh (Eds.), Best practices in sexual offender assessment and management. Springer.
Paquette, S., & Cortoni, F. (2021). Offense-supportive cognitions expressed by men who use Internet to sexually exploit children: A thematic analysis. International Journal of Offender Therapy and Comparative Criminology. Online first.
Paquette, S., & Chopin, J. (2020). Applying the Motivation-Facilitation Model to understand the sexual abuse of adolescents: A comparison with those committed against children and adults.
Pellerin, C. (2017). DARPA Program helps to fight human trafficking. https://www.defense.gov/Explore/News/Article/Article/1041509/darpa-program-helps-to-fight-human-trafficking/.
Pranoto, H., Gunawan, F. E., & Soewito, B. (2015). Logistic models for classifying online grooming conversation. Procedia Computer Science, 59, 357–365.
Quayle, E. (2020). Prevention, disruption and deterrence of online sexual exploitation and abuse. ERA Forum.
Quayle, E., & Newman, E. (2015). The role of sexual images in online and offline sexual behaviour with minors. Current Psychiatry Reports, 17, 43.
Quebec Ministry of Public Security (2014). Les six niveaux de services policiers en fonction du nombre d'habitants [The six levels of policing based on population size]. https://www.securitepublique.gouv.qc.ca/police/quebec/services-de-police/desserte-policiere/six-niveaux-service.html.
Raghavan, S. & Garcia-Molina, H. (2000). Crawling the Hidden Web. Technical Report. Stanford.
Rashid, A., Greenwood, P., Walkerdine, J., Baron, A., & Rayson, P. (2012). Technological solutions to offending. In E. Quayle & K. L. Ribisl (Eds.), Understanding and preventing online sexual exploitation of children (pp. 228–243). Routledge.
Requiao da Cunha, B., et al. (2020). Assessing police topological efficiency in a major sting operation on the dark web. Scientific Reports, 10(1).
Seto, M. C. (2013). Internet sex offenders. American Psychological Association.
Seto, M. C. (2019). The motivation-facilitation model of sexual offending. Sexual Abuse, 31, 3–24.
Seto, M. C., & Eke, A. W. (2015). Predicting recidivism among adult male child pornography offenders: Development of the Child Pornography Offender Risk Tool (CPORT). Law and Human Behavior, 39, 426–429.
Seto, M. C., Wood, J. M., Babchishin, K. M., & Flynn, S. (2012). Online solicitation offenders are different from child pornography offenders and lower risk contact sexual offenders. American Psychological Association, 36, 320–330.
Sheetz, M. W. (2000). Cyberpredators: Police Internet investigations under Florida statute 847.0135. University of Miami Law Review, 54, 405–450.
Smahel, D., Machackova, H., Mascheroni, G., Dedkova, L., Staksrud, E., Ólafsson, K., Livingstone, S., & Hasebrink, U. (2020). EU Kids Online 2020: Survey results from 19 countries. EU Kids Online. http://eprints.lse.ac.uk/103294/1/EU_Kids_Online_2020_March2020.pdf.
Solon, O. (2020, July 17). Inside the surveillance software tracking child porn offenders across the globe. NBC news. https://www.nbcnews.com/tech/internet/inside-surveillance-software-tracking-child-porn-offenders-across-globe-n1234019.
Steel, C. M. S. (2009). Web-based child pornography. International Journal of Digital Crime and Forensics, 1, 58–69.
United Nations Office on Drugs and Crime. (2013). Comprehensive Study on Cybercrime. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
U.S. Department of Justice. (2010). The national strategy for child exploitation prevention and interdiction: A report to Congress. Author.
United States General Accounting Office (2004). File sharing programs: Peer to peer networks provide ready access to child pornography (Report no. GAO-03-351). Government Accountability Office. http://www.gao.gov/new.items/d03351.pdf.
Usha, D., Niveditha, V. V. R., Kirubadevi, T., & Thamishikkavi, P. (2020). Use of predictive analytical algorithm by crime investigation team: An analysis. International Journal of Advances Science and Technology, 29, 2986–2992.
Westlake, G. (2019). The past, present, future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection. In T. Holt & M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance. Springer Nature Switzerland.
Wolak, J., Finkelhor, D., & Mitchell, K. J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35, 424.
Wolak, J., Finkelhor, D., & Mitchell, K. (2011). Child pornography possessors: Trends in offender and case characteristics. Sexual Abuse: A Journal of Research and Treatment, 23, 22–42.
Wolak, J., Liberatore, M., & Levine, B. N. (2014). Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. Child Abuse & Neglect, 38, 347–356.
Wortley, R., & Smallbone, S. (2006). Applying situational principles to sexual offenses against children. Crime Prevention Studies, 19, 7.
Wurtele, S. K. (2017). Preventing cyber sexual solicitation of adolescents. In R. Alexander (Ed.), Research and practices in child maltreatment prevention (Vol. 1, pp. 361–393). STM Learning, Inc..
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Fortin, F., Paquette, S., Gagné, S. (2021). Challenges and Opportunities in Investigations of Online Sexual Exploitation of Children: Old Networks, Dark Web, and Proactive Response. In: Deslauriers-Varin, N., Bennell, C. (eds) Criminal Investigations of Sexual Offenses. Springer, Cham. https://doi.org/10.1007/978-3-030-79968-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-79968-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79967-0
Online ISBN: 978-3-030-79968-7
eBook Packages: Law and CriminologyLaw and Criminology (R0)