Child sexual abuse material on the darknet: A script analysis of how offenders operate

Computer cyber hacker image

The development of online technologies in recent decades has facilitated the distribution and consumption of child sexual abuse material (CSAM) over the internet, which also led to the emergence of CSAM on the darknet—the segment of the internet hidden from the general public.

Using data obtained from interviews with online investigators, this study uses crime script analysis to reconstruct step-by-step how offenders operate on the darknet. The findings highlight the three phases of the script: (1) the crime set-up phase, (2) the crime completion phase, and (3) the crime continuation phase. Scripting is a practical method of developing concrete ways to address this problem. The implications of using crime scripts to fight CSAM are discussed.


URLs correct as at March 2021

Bedi S, Nelson EC, Lynskey MT, McCutcheon VV, Heath AC, Madden PAF & Martin NG 2011. Risk for suicidal thoughts and behaviour after childhood sexual abuse in women and men. Suicide and Life-Threatening Behavior 41: 406–415

Bissias G, Levine B, Liberatore M, Lynn B, Moore J, Wallach H & Wolak J 2016. Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. Child Abuse & Neglect 52: 185–199

Brayley H, Cockbain E & Laycock G 2011. The value of crime scripting: Deconstructing internal child sex trafficking. Policing 5: 132–143

Brown R & Bricknell S 2018. What is the profile of child exploitation material offenders? Trends & issues in crime and criminal justice no. 564. Canberra: Australian Institute of Criminology.

Burruss GW, Holt TJ & Wall-Parker A 2018. The hazards of investigating internet crimes against children: Digital evidence handlers’ experiences with vicarious trauma and coping behaviors. American Journal of Criminal Justice 43: 433–447

Cale J, Holt T, Leclerc B, Singh S & Drew J 2021. Crime commission processes in child sexual abuse material production and distribution: A systematic review. Trends & issues in crime and criminal justice no. 617. Canberra: Australian Institute of Criminology.

Chiu Y & Leclerc B 2016. An examination of sexual offenses against women by acquaintances: The utility of a script framework for prevention purposes. In B Leclerc & EU Savona (eds), Crime prevention in the 21st century: Insightful approaches for crime prevention initiatives. Cham, Switzerland: Springer International: 59–76

Chiu Y, Leclerc B & Townsley M 2011. Script analysis of drug manufacturing in clandestine laboratories: Implications for prevention. British Journal of Criminology 51: 355–374

Copeland C, Wallin M & Holt TJ 2020. Assessing the practices and products of darkweb firearm vendors. Deviant Behavior 41: 949–968

Cornish DB 1994. The procedural analysis of offending and its relevance for situational prevention. In RV Clarke (ed), Crime prevention studies vol 3. Monsey, New York: Criminal Justice Press: 151–196

Cornish DB & Clarke RV 2003. Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In M Smith & D Cornish (eds), Crime prevention studies: Theory for practice in situational crime prevention vol. 16. Monsey, New York: Criminal Justice Press

Cornish DB & Clarke RV (eds) 1986. The reasoning criminal: Rational choice perspectives on offending. Abingdon, Oxon: Routledge

de Santisteban P & Gámez-Guadix M 2018. Prevalence and risk factors among minors for online sexual solicitations and interactions with adults. Journal of Sex Research 55: 939–950

DeHart D, Dwyer G, Seto MC, Moran R, Letourneau E & Schwarz-Watts D 2017. Internet sexual solicitation of children: A proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of Sexual Aggression 23: 77–89

Fortin F, Paquette S & Dupont B 2018. From online to offline sexual offending: Episodes and obstacles. Aggression and Violent Behavior 39: 33–41

Franqueira VNL, Bryce J, Al Mutawa N & Marrington A 2018. Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches. Digital Investigation 24: 95–105

Gewirtz-Meydan A, Walsh W, Wolak J & Finkelhor D 2018. The complex experience of child pornography survivors. Child Abuse & Neglect 80: 238–248

Guha A, Luebbers S, Papalia N & Ogloff JRP 2019. A follow up study of mental health service utilisation in a cohort of 2433 sexually abused Australian children utilising five years of medical data. Child Abuse & Neglect 90: 174–184

Haasz A 2016. Underneath it all: Policing international child pornography on the dark web. Syracuse Journal of International Law and Commerce 43: 353–380

Holt TJ, Blevins KR & Burkert N 2010. Considering the pedophile subculture online. Sexual Abuse 22: 3–24

Holt T, Cale J, Leclerc B & Drew J 2020. Assessing the challenges affecting the investigative methods to combat CEM offenses. Aggression & Violent Behavior 55.

Hutchings A & Holt TJ 2015. A crime script analysis of the online stolen data market. British Journal of Criminology 55: 596–614

Internet Watch Foundation (IWF) 2018. Once upon a year. Cambridge, UK: IWF

Jenkins P 2001. Beyond tolerance: Child pornography on the internet. New York: New York University Press

Kendler KS, Bulik CM, Silberg J, Hettema JM, Myers J & Prescott CA 2000. Childhood sexual abuse and adult psychiatric and substance use disorders in women: An epidemiological and Cotwin control analysis. Archives of General Psychiatry 57: 953–959

Krone T & Smith R 2017. Trajectories in online child sexual exploitation offending in Australia. Trends & issues in crime and criminal justice no. 524. Canberra: Australian Institute of Criminology.

Krone T, Smith RG, Cartwright J, Hutchings A, Tomison A & Napier S 2017. Online child sexual exploitation offenders: A study of Australian law enforcement data. Report to the Criminology Research Advisory Council. Canberra: Australian Institute of Criminology.

Leclerc B 2014. New developments in script analysis for situational crime prevention: Moving beyond offender scripts. In B Leclerc & R Wortley eds), Cognition and crime: Offender decision-making and script analyses. Crime Science Series. London: Routledge

Leclerc B & Cale J 2020. Big Data: Generic roadmaps as global solutions for practice. In B Leclerc & J Cale (eds), Big Data: Criminology at the edge. UK: Routledge: 117–131

Leclerc B & Wortley R (eds) 2014. Cognition and crime: Offender decision making and script analyses. Abingdon, Oxon: Routledge

Leclerc B, Wortley R & Smallbone S 2011. Getting into the script of adult child sexual offenders and mapping out situational prevention measures. Journal of Research in Crime and Delinquency 48(2): 209–237

Lee JR & Holt T 2020. The challenges and concerns of using big data to understand cybercrime. In B Leclerc & J Cale (eds), Big Data: Criminology at the edge. UK: Routledge: 85–103

Marcum CD, Higgins GE, Freiburger TL & Ricketts ML 2010. Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cybercrime. International Journal of Police Science & Management 12: 516–525

Marcum CD, Higgins GE, Ricketts ML & Freiburger TL 2011. An assessment of the training and resources dedicated nationally to investigation of the production of child pornography. Policing: A Journal of Policy and Practice 5: 23–32

Martin J, Munksgaard R, Coomber R, Demant J & Barratt MJ 2020. Selling drugs on darkweb cryptomarkets: Differentiated pathways, risks and rewards. British Journal of Criminology 60: 559–578

O’Halloran E & Quayle E 2010. A content analysis of a “boy love” support forum: Revisiting Durkin and Bryant. Journal of Sexual Aggression 16: 71–85

Perez LM, Jones J, Englert DR & Sachau D 2010. Secondary traumatic stress and burnout among law enforcement investigators exposed to disturbing media images. Journal of Police and Criminal Psychology 25: 113–124

Schulz A, Bergen E, Schuhmann P, Hoyer J & Santtila P 2016. Online sexual solicitation of minors: How often and between whom does it occur? Journal of Research in Crime and Delinquency 53: 165–188

Seigfried-Spellar KC 2018. Assessing the psychological well-being and coping mechanisms of law enforcement investigators vs. digital forensic examiners of child pornography investigations. Journal of Police and Criminal Psychology 33: 215–226

Turner S, Taillieu T, Cheung K & Afifi TO 2017. The relationship between childhood sexual abuse and mental health outcomes among males: Results from a nationally representative United States sample. Child Abuse & Neglect 66: 64–72

Weimann G 2016. Going dark: Terrorism on the dark web. Studies in Conflict & Terrorism 39: 195–206

Westlake BG 2020. The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection. In T Holt & A Bossler (eds), The Palgrave handbook of international cybercrime and cyberdeviance. New York: Palgrave Macmillan: 1225–1253

Wortley R & Smallbone S 2012. Internet child pornography: Causes, investigation, and prevention. Santa Barbara, California: Praeger/ABC-CLIO