Journal article Open Access

Webcam Child Prostitution: An Exploration of Current and Futuristic Methods of Detection

AÇAR, Kemal Veli

Editor(s)
K. Jaishankar

Webcam Child Prostitution (WCP) is an emerging form of online child sexual abuse which the victim simply sells his/her live sexual images through Voice-over IP (VoIP) applications. Although it doesn’t directly create some of the negative effects of traditional child prostitution such as sexual transmitted diseases, it may provide future abusers and victims to traditional child prostitution and child sex tourism. Therefore, appropriate and effective prevention strategies for this heinous act should be introduced accordingly. In this respect, this article discuss the efficiency of current methods of detection and propose some futuristic methods such as metadata and content analysis of VoIP communications by private sector and fully automated chatbot for undercover operations. Applicability of such new methods in real life heavily relies on legal amendments and it also requires further research on technical aspects.

Files (520.4 kB)
Name Size
Kemalvol11issue1IJCC2017NEW.pdf md5:65491f612a81c55f6dce792972bf19e5 520.4 kB Download
  • Akdeniz, Y. (2016). Internet child pornography and the law: national and international responses. Abington, Oxford, UK: Routledge. Angga, P. A., Fachri, W. E., Elevanita, A., & Agushinta, R. D. (2015, October). Design of chatbot with 3D avatar, voice interface, and facial expression. In 2015 International Conference on Science in Information Technology (ICSITech) (pp. 326-330). IEEE. Aurén, S., & Kuhlmann, D. F. (2015). Nipa Huts with High Speed Internet: Commercial Exploitation of Children in the 21st Century. A Qualitative investigation of Webcam Child Prostitution in the Philippines. Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., & Treichler, J. (2006). Security implications of applying the Communications Assistance to Law Enforcement Act to voice over IP. Information Technology Association of America, 13. Brenner, S. W. (2006). Cybercrime jurisdiction. Crime, law and social change, 46(4-5), 189-206. Burnett, K., Ng, K. B., & Park, S. (1999). A comparison of the two traditions of metadata development. Journal of the Association for Information Science and Technology, 50(13), 1209. Cohen-Almagor, R. (2015). Confronting the Internet's Dark Side. Moral and Social Responsibility on the Free Highway. (pp. 299). Cambridge, UK: Cambridge University Press. Cox, J. (2016, January 5). The FBI's 'Unprecedented' Hacking Campaign Targeted Over a Thousand Computers. Motherboard. Retrieved from http://motherboard.vice.com/read/the-fbis-unprecedented-hacking-campaign-targeted-over-a-thousand-computers Crawford, A. (2013, November 5). Computer-generated 'Sweetie' catches online predators. BBC News. Retrieved from http://www.bbc.com/news/uk-24818769. Crawford, A. (2014, January 14). UK paedophiles pay to watch webcam child sex abuse in Philippines. BBC. Retrieved from http://www.bbc.com/news/uk-25729140. Cusick, L. (2002). Youth prostitution: A literature review. Child abuse review, 11(4), 230-251. Dempsey, L., & Heery, R. (1998). Metadata: a current view of practice and issues. Journal of Documentation, 54(2), 145-172. Dunn, J. E. (2009, February 11). Criminals using Skype, say Italian police, Networkworld. Retrieved from http://www.networkworld.com/article/2262802/collaboration-social/criminals-using-skype--say-italian-police.html. Esposito, L. C. (1998). Regulating the Internet: The new battle against child pornography. Case W. Res. J. Int'l L., 30, 541. European Financial Coalition against Commercial Sexual Exploitation of Children Online. (2010). 14 months on: A combined report from the European Financial Coalition 2009-2010. Retrieved from https://www.ceop.police.uk/documents/efc%20strat%20asses2010_080910b%20final.pdf. Europol. (2015). The Internet Organised Crime Threat Assessment (IOCTA) 2015. Retrieved from https://www.europol.europa.eu/sites/default/files/publications/europol_iocta_web_2015.pdf. Europol. (2016). The Internet Organised Crime Threat Assessment (IOCTA) 2016. Retrieved from https://www.europol.europa.eu/sites/default/files/publications/europol_iocta_web_2016.pdf. Evripidis, R. (2008). Lawful Interception and Countermeasures: In the era of Internet Telephony. Master's Thesis submitted to the Royal Institute of Technology, Stockholm, Sweden. Retrieved from http://www.diva-portal.org/smash/get/diva2:511012/FULLTEXT01.pdf. Gorge, M. (2007). Lawful interception–key concepts, actors, trends and best practice considerations. Computer Fraud & Security, 9, 10-14. Huang, J., Zhou, M., & Yang, D. (2007, January). Extracting Chatbot Knowledge from Online Discussion Forums. IJCAI, 7, 423-428. Hughes, D. M. (2002). Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children, The Hastings Women's LJ, 13, 127. Huynh, T. N., Scheuble, L., & Dayananda, V. (Undated). Child Prostitution in 12 Countries: An Exploratory Study of Predictors. The Penn State McNair Journal, 135. Interagency Working Group. (2016). Terminology Guidelines for the Protection of Children from Sexual Exploitation and Sexual Abuse. Retrieved from www.interpol.int/Media/Files/News-Media-releases/2016/Terminology-Guidelines. International Centre for Missing & Exploited Children. (2016). Child pornography: Model legislation and global review (8th edition). ICMEC. Retrieved from http://www.icmec.org/wp-content/uploads/2016/02/Child-Pornography-Model-Law-8th-Ed-Final-linked.pdf. Jia, J. (2004). The study of the application of a web-based chatbot system on the teaching of foreign languages. In Proceedings of SITE (Vol. 4, pp. 1201-1207). Kopecký, K. (2017). Online blackmail of Czech children focused on so-called "sextortion" (analysis of culprit and victim behaviors). Telematics and Informatics, 34(1), 11-19. Krone, T. (2005). International police operations against online child pornography. Canberra, Australia: Australian Institute of Criminology. Leary, M. G. (2009). Sexting or Self-Produced Child-Pornography-The Dialog Continues-Structured Prosecutorial Discretion within a Multidisciplinary Response. Va. J. Soc. Pol'y & L., 17, 486. Lemz. (2014, February 17). 'Sweetie' for Terre des Hommes [Video File]. Retrieved from https://vimeo.com/86895084. Lewis, W. D. (2015). Skype translator: Breaking down language and hearing barriers. Proceedings of Translating and the Computer (TC37). Leyden, J. (2014, January 17). International child abuse webcam ring smashed after routine police check. The Register. Retrieved from http://www.theregister.co.uk/2014/01/17/webcam_abuse_ring_dismantled. Lim, L. L. (Ed.). (1998). The sex sector: The economic and social bases of prostitution in Southeast Asia. International Labour Organization. Livingstone, S., & Smith, P. K. (2014). Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of child psychology and psychiatry, 55(6), 635-654. Masri, L. (2015). Webcam Child Sex Abuse. Retrieved from http://academicworks.cuny.edu/cgi/viewcontent.cgi?article=1107&context=gj_etds. Milanovic, A., Srbljic, S., Raznjevic, I., Sladden, D., Skrobo, D., & Matosevic, I. (2003, September). Distributed system for lawful interception in VoIP networks. In EUROCON 2003. Computer as a Tool. The IEEE Region 8, 1, 203-207. Mitchell, K. J., Wolak, J., & Finkelhor, D. (2005). Police posing as juveniles online to catch sex offenders: Is it working?. Sexual Abuse: A Journal of Research and Treatment, 17(3), 241-267. Puffer, E., McDonald, K., Pross, M., & Hudson, D. (2014). Webcam Child Sex Tourism: An Emerging Global Issue. Retrieved from http://digitalcommons.cedarville.edu/cgi/viewcontent.cgi?article=1131&context=research_scholarship_symposium. Rafferty, Y. (2013). Child trafficking and commercial sexual exploitation: A review of promising prevention policies and programs. American journal of orthopsychiatry, 83(4), 559-575. Rainie, L., & Madden, M. (2015). Americans' privacy strategies post-Snowden. Pew Research Center. Roiphe, R. (2013). The Serpent Beguiled Me: A History of the Entrapment Defense. NYLS Legal Studies Research Paper, (13/14), 73. Savchenko, I. I., & Gatsenko, O. Y. (2015). Analytical review of methods of providing internet anonymity. Automatic Control and Computer Sciences, 49(8), 696-700. Seedorf, J. (2008). Lawful interception in P2P-based VoIP systems. In Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks (pp. 217-235). Springer Berlin Heidelberg. Soares, V. N., Neves, P. A., & Rodrigues, J. J. (2008, June). Past, present and future of IP telephony. In Communication Theory, Reliability, and Quality of Service, 2008. CTRQ'08. International Conference on (pp. 19-24). IEEE. Terre des Hommes Netherlands. (2013a). An Exploratory Study on the Background and Psychosocial Consequences of Webcam Child Sex Tourism in the Philippines. Retrieved from https://www.terredeshommes.nl/sites/tdh/files/uploads/research_report_2.pdf. Terre des Hommes Netherlands. (2013b). Becoming Sweetie: a novel approach to stopping the global rise of Webcam Child Sex Tourism. Retrieved from https://www.terredeshommes.nl/sites/tdh/files/uploads/research_report.pdf Varshney, U., Snow, A., McGivern, M., & Howard, C. (2002). Voice over IP. Communications of the ACM, 45(1), 89-96. Vendius, T. T. (2015). Proactive Undercover Policing and Sexual Crimes against Children on the Internet. European Review of Organised Crime, 2, 6-24. Whittle, H., Hamilton-Giachritsis, C., Beech, A., & Collings, G. (2013). A review of online grooming: Characteristics and concerns. Aggression and violent behavior, 18(1), 62-70. Willis, B. M., & Levy, B. S. (2002). Child prostitution: global health burden, research needs, and interventions. The Lancet, 359(9315), 1417-1422.

Share

Cite as