Drew, Jacqueline https://www.aic.gov.au/ en Child sexual abuse material on the darknet: A script analysis of how offenders operate https://www.aic.gov.au/publications/tandi/tandi627 <span>Child sexual abuse material on the darknet: A script analysis of how offenders operate</span> <span><span lang="" about="/user/72" typeof="schema:Person" property="schema:name" datatype="">Yvette Maconachie</span></span> <span>Fri, 2021-05-07 13:58</span> <div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field--item"> <img src="/sites/default/files/styles/max_250_width/public/2021-03/computer_cyber_hacker_1661841244s.jpg?itok=EWPIcbN1" width="250" height="167" alt="Computer cyber hacker image" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-field-embed-youtube field--type-text field--label-hidden field--item"> </div> <div class="field field--name-field-author field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/author/leclerc-benoit" hreflang="en">Leclerc, Benoit</a></div> <div class="field--item"><a href="/author/drew-jacqueline" hreflang="en">Drew, Jacqueline</a></div> <div class="field--item"><a href="/author/holt-thomas" hreflang="en">Holt, Thomas</a></div> <div class="field--item"><a href="/author/cale-jesse" hreflang="en">Cale, Jesse</a></div> <div class="field--item"><a href="/author/singh-sara" hreflang="en">Singh, Sara</a></div> </div> <div class="field field--name-field-issn field--type-string field--label-inline"> <div class="field--label">ISSN</div> <div class="field--items"> <div class="field--item">1836-2206</div> </div> </div> <div class="field field--name-field-isbn field--type-string field--label-inline"> <div class="field--label">ISBN</div> <div class="field--item">9781922478160</div> </div> <div class="field field--name-field-published-date field--type-datetime field--label-inline"> <div class="field--label">Published Date</div> <div class="field--item"><time datetime="2021-05-11T12:00:00Z">11-05-2021</time> </div> </div> <div class="field field--name-field-subject field--type-entity-reference field--label-inline"> <div class="field--label">Subject</div> <div class="field--items"> <div class="field--item"><a href="/subject/child-sexual-exploitation-material" hreflang="en">Child sexual exploitation material</a></div> <div class="field--item"><a href="/subject/child-sex-offenders" hreflang="und">Child sex offenders</a></div> <div class="field--item"><a href="/subject/cybercrime" hreflang="und">Cybercrime</a></div> <div class="field--item"><a href="/subject/law-enforcement" hreflang="und">Law enforcement</a></div> <div class="field--item"><a href="/subject/peer-reviewed" hreflang="und">Peer-reviewed</a></div> </div> </div> <div class="field field--name-field-series field--type-entity-reference field--label-inline"> <div class="field--label">Series</div> <div class="field--item">Trends &amp; issues in crime and criminal justice</div> </div> <div class="field field--name-field-series-num field--type-integer field--label-hidden field--item">627</div> <div class="field field--name-field-abstract field--type-text-long field--label-above"> <div class="field--label">Abstract</div> <div class="field--item"><p>The development of online technologies in recent decades has facilitated the distribution and consumption of child sexual abuse material (CSAM) over the internet, which also led to the emergence of CSAM on the darknet—the segment of the internet hidden from the general public.</p> <p>Using data obtained from interviews with online investigators, this study uses crime script analysis to reconstruct step-by-step how offenders operate on the darknet. The findings highlight the three phases of the script: (1) the crime set-up phase, (2) the crime completion phase, and (3) the crime continuation phase. Scripting is a practical method of developing concrete ways to address this problem. The implications of using crime scripts to fight CSAM are discussed.</p> </div> </div> <div class="accordion-group"> <h2 class="accordion-button">References</h2> <div class="field field--name-field-reference-lists field--type-text-long field--label-hidden field--item accordion-container"><p><span><span><span><em><span>URLs correct as at March 2021</span></em></span></span></span></p> <p><span><span><span>Bedi S, Nelson EC, Lynskey MT, McCutcheon VV, Heath AC, Madden PAF &amp; Martin NG 2011. Risk for suicidal thoughts and behaviour after childhood sexual abuse in women and men. <em><span>Suicide and Life-Threatening Behavior</span></em> 41: 406–415</span></span></span></p> <p><span><span><span>Bissias G, Levine B, Liberatore M, Lynn B, Moore J, Wallach H &amp; Wolak J 2016. Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. <em><span>Child Abuse &amp; Neglect </span></em>52: 185–199</span></span></span></p> <p><span><span><span>Brayley H, Cockbain E &amp; Laycock G 2011. The value of crime scripting: Deconstructing internal child sex trafficking. <em><span>Policing</span></em> 5: 132–143</span></span></span></p> <p><span><span><span>Brown R &amp; Bricknell S 2018. What is the profile of child exploitation material offenders? <em><span>Trends &amp; issues in crime and criminal justice</span></em> no. 564. Canberra: Australian Institute of Criminology. <a href="https://www.aic.gov.au/publications/tandi/tandi564">https://www.aic.gov.au/publications/tandi/tandi564</a></span></span></span></p> <p><span><span><span>Burruss GW, Holt TJ &amp; Wall-Parker A 2018. The hazards of investigating internet crimes against children: Digital evidence handlers’ experiences with vicarious trauma and coping behaviors. <em><span>American Journal of Criminal Justice</span></em> 43: 433–447</span></span></span></p> <p><span><span><span>Cale J, Holt T, Leclerc B, Singh S &amp; Drew J 2021. Crime commission processes in child sexual abuse material production and distribution: A systematic review. <em><span>Trends &amp; issues in crime and criminal justice</span></em> no. 617. Canberra: Australian Institute of Criminology. <a href="https://www.aic.gov.au/publications/tandi/tandi617">https://www.aic.gov.au/publications/tandi/tandi617</a></span></span></span></p> <p><span><span><span>Chiu Y &amp; Leclerc B 2016. An examination of sexual offenses against women by acquaintances: The utility of a script framework for prevention purposes. In B Leclerc &amp; EU Savona (eds), <em><span>Crime prevention in the 21st century: Insightful approaches for crime prevention initiatives</span></em>. Cham, Switzerland: Springer International: 59–76</span></span></span></p> <p><span><span><span>Chiu Y, Leclerc B &amp; Townsley M 2011. Script analysis of drug manufacturing in clandestine laboratories: Implications for prevention. <em><span>British Journal of Criminology</span></em> 51: 355–374</span></span></span></p> <p><span><span><span>Copeland C, Wallin M &amp; Holt TJ 2020. Assessing the practices and products of darkweb firearm vendors. <em><span>Deviant Behavior</span></em> 41: 949–968</span></span></span></p> <p><span><span><span>Cornish DB 1994. The procedural analysis of offending and its relevance for situational prevention. In RV Clarke (ed), <em><span>Crime prevention studies</span></em> vol 3. Monsey, New York: Criminal Justice Press: 151–196</span></span></span></p> <p><span><span><span>Cornish DB &amp; Clarke RV 2003. Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In M Smith &amp; D Cornish (eds), <em><span>Crime prevention studies: Theory for practice in situational crime prevention</span></em> vol. 16. Monsey, New York: Criminal Justice Press</span></span></span></p> <p><span><span><span>Cornish DB &amp; Clarke RV (eds) 1986. <em><span>The reasoning criminal: Rational choice perspectives on offending</span></em>. Abingdon, Oxon: Routledge</span></span></span></p> <p><span><span><span>de Santisteban P &amp; Gámez-Guadix M 2018. Prevalence and risk factors among minors for online sexual solicitations and interactions with adults. <em><span>Journal of Sex Research</span></em> 55: 939–950</span></span></span></p> <p><span><span><span>DeHart D, Dwyer G, Seto MC, Moran R, Letourneau E &amp; Schwarz-Watts D 2017. Internet sexual solicitation of children: A proposed typology of offenders based on their chats, e-mails, and social network posts. <em><span>Journal of Sexual Aggression</span></em> 23: 77–89</span></span></span></p> <p><span><span><span>Fortin F, Paquette S &amp; Dupont B 2018. From online to offline sexual offending: Episodes and obstacles. <em><span>Aggression and Violent Behavior</span></em> 39: 33–41</span></span></span></p> <p><span><span><span>Franqueira VNL, Bryce J, Al Mutawa N &amp; Marrington A 2018. Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches. <em><span>Digital Investigation</span></em> 24: 95–105</span></span></span></p> <p><span><span><span>Gewirtz-Meydan A, Walsh W, Wolak J &amp; Finkelhor D 2018. The complex experience of child pornography survivors. <em><span>Child Abuse &amp; Neglect</span></em> 80: 238–248</span></span></span></p> <p><span><span><span>Guha A, Luebbers S, Papalia N &amp; Ogloff JRP 2019. A follow up study of mental health service utilisation in a cohort of 2433 sexually abused Australian children utilising five years of medical data. <em><span>Child Abuse &amp; Neglect</span></em> 90: 174–184</span></span></span></p> <p><span><span><span>Haasz A 2016. Underneath it all: Policing international child pornography on the dark web. <em><span>Syracuse Journal of International Law and Commerce </span></em>43: 353–380</span></span></span></p> <p><span><span><span>Holt TJ, Blevins KR &amp; Burkert N 2010. Considering the pedophile subculture online. <em><span>Sexual Abuse</span></em> 22: 3–24</span></span></span></p> <p><span><span><span>Holt T, Cale J, Leclerc B &amp; Drew J 2020. Assessing the challenges affecting the investigative methods to combat CEM offenses. <em><span>Aggression &amp; Violent Behavior</span></em> 55. <a href="https://doi.org/10.1016/j.avb.2020.101464">https://doi.org/10.1016/j.avb.2020.101464</a></span></span></span></p> <p><span><span><span>Hutchings A &amp; Holt TJ 2015. A crime script analysis of the online stolen data market. <em><span>British Journal of Criminology</span></em> 55: 596–614</span></span></span></p> <p><span><span><span>Internet Watch Foundation (IWF) 2018. <em><span>Once upon a year</span></em>. Cambridge, UK: IWF</span></span></span></p> <p><span><span><span>Jenkins P 2001. <em><span>Beyond tolerance: Child pornography on the internet</span></em>. New York: New York University Press</span></span></span></p> <p><span><span><span>Kendler KS, Bulik CM, Silberg J, Hettema JM, Myers J &amp; Prescott CA 2000. Childhood sexual abuse and adult psychiatric and substance use disorders in women: An epidemiological and Cotwin control analysis. <em><span>Archives of General Psychiatry</span></em> 57: 953–959</span></span></span></p> <p><span><span><span>Krone T &amp; Smith R 2017. Trajectories in online child sexual exploitation offending in Australia. <em><span>Trends &amp; issues in crime and criminal justice</span></em> no. 524. Canberra: Australian Institute of Criminology. <a href="https://www.aic.gov.au/publications/tandi/tandi524">https://www.aic.gov.au/publications/tandi/tandi524</a></span></span></span></p> <p><span><span><span>Krone T, Smith RG, Cartwright J, Hutchings A, Tomison A &amp; Napier S 2017. <em><span>Online child sexual exploitation offenders: A study of Australian law enforcement data</span></em>. Report to the Criminology Research Advisory Council. Canberra: Australian Institute of Criminology. <a href="https://www.aic.gov.au/crg/reports/crg-5812-13">https://www.aic.gov.au/crg/reports/crg-5812-13</a></span></span></span></p> <p><span><span><span>Leclerc B 2014. New developments in script analysis for situational crime prevention: Moving beyond offender scripts. In B Leclerc &amp; R Wortley eds), <em><span>Cognition and crime: Offender decision-making and script analyses</span></em>. Crime Science Series. London: Routledge</span></span></span></p> <p><span><span><span>Leclerc B &amp; Cale J 2020. Big Data: Generic roadmaps as global solutions for practice. In B Leclerc &amp; J Cale (eds), <em><span>Big Data: Criminology at the edge</span></em>. UK: Routledge: 117–131</span></span></span></p> <p><span><span><span>Leclerc B &amp; Wortley R (eds) 2014. <em><span>Cognition and crime: Offender decision making and script analyses</span></em>. Abingdon, Oxon: Routledge</span></span></span></p> <p><span><span><span>Leclerc B, Wortley R &amp; Smallbone S 2011. Getting into the script of adult child sexual offenders and mapping out situational prevention measures. <em><span>Journal of Research in Crime and Delinquency</span></em> 48(2): 209–237</span></span></span></p> <p><span><span><span>Lee JR &amp; Holt T 2020. The challenges and concerns of using big data to understand cybercrime. In B Leclerc &amp; J Cale (eds), <em><span>Big Data: Criminology at the edge</span></em>. UK: Routledge: 85–103</span></span></span></p> <p><span><span><span>Marcum CD, Higgins GE, Freiburger TL &amp; Ricketts ML 2010. Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cybercrime. <em><span>International Journal of Police Science &amp; Management</span></em> 12: 516–525</span></span></span></p> <p><span><span><span>Marcum CD, Higgins GE, Ricketts ML &amp; Freiburger TL 2011. An assessment of the training and resources dedicated nationally to investigation of the production of child pornography. <em><span>Policing: A Journal of Policy and Practice</span></em> 5: 23–32</span></span></span></p> <p><span><span><span>Martin J, Munksgaard R, Coomber R, Demant J &amp; Barratt MJ 2020. Selling drugs on darkweb cryptomarkets: Differentiated pathways, risks and rewards. <em><span>British Journal of Criminology</span></em> 60: 559–578</span></span></span></p> <p><span><span><span>O’Halloran E &amp; Quayle E 2010. A content analysis of a “boy love” support forum: Revisiting Durkin and Bryant. <em><span>Journal of Sexual Aggression</span></em> 16: 71–85</span></span></span></p> <p><span><span><span>Perez LM, Jones J, Englert DR &amp; Sachau D 2010. Secondary traumatic stress and burnout among law enforcement investigators exposed to disturbing media images. <em><span>Journal of Police and Criminal Psychology</span></em> 25: 113–124</span></span></span></p> <p><span><span><span>Schulz A, Bergen E, Schuhmann P, Hoyer J &amp; Santtila P 2016. Online sexual solicitation of minors: How often and between whom does it occur? <em><span>Journal of Research in Crime and Delinquency</span></em> 53: 165–188</span></span></span></p> <p><span><span><span>Seigfried-Spellar KC 2018. Assessing the psychological well-being and coping mechanisms of law enforcement investigators vs. digital forensic examiners of child pornography investigations. <em><span>Journal of Police and Criminal Psychology</span></em> 33: 215–226</span></span></span></p> <p><span><span><span>Turner S, Taillieu T, Cheung K &amp; Afifi TO 2017. The relationship between childhood sexual abuse and mental health outcomes among males: Results from a nationally representative United States sample. <em><span>Child Abuse &amp; Neglect</span></em> 66: 64–72</span></span></span></p> <p><span><span><span>Weimann G 2016. Going dark: Terrorism on the dark web. <em><span>Studies in Conflict &amp; Terrorism</span></em> 39: 195–206</span></span></span></p> <p><span><span><span>Westlake BG 2020. The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection. In T Holt &amp; A Bossler (eds), <em><span>The Palgrave handbook of international cybercrime and cyberdeviance</span></em>. New York: Palgrave Macmillan: 1225–1253</span></span></span></p> <p><span><span><span>Wortley R &amp; Smallbone S 2012. <em><span>Internet child pornography: Causes, investigation, and prevention</span></em>. Santa Barbara, California: Praeger/ABC-CLIO</span></span></span></p> </div> </div> Fri, 07 May 2021 03:58:06 +0000 Yvette Maconachie 2410 at https://www.aic.gov.au Crime commission processes in child sexual abuse material production and distribution: A systematic review https://www.aic.gov.au/publications/tandi/tandi617 <span>Crime commission processes in child sexual abuse material production and distribution: A systematic review</span> <span><span lang="" about="/user/72" typeof="schema:Person" property="schema:name" datatype="">Yvette Maconachie</span></span> <span>Mon, 2021-02-08 13:43</span> <div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field--item"> <img src="/sites/default/files/styles/max_250_width/public/2021-02/shutterstock_1641658252s_camera_lens.jpg?itok=iqIWbvAz" width="250" height="167" alt="Camera lens photo" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-field-embed-youtube field--type-text field--label-hidden field--item"> </div> <div class="field field--name-field-author field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/author/cale-jesse" hreflang="en">Cale, Jesse</a></div> <div class="field--item"><a href="/author/holt-thomas" hreflang="en">Holt, Thomas</a></div> <div class="field--item"><a href="/author/leclerc-benoit" hreflang="en">Leclerc, Benoit</a></div> <div class="field--item"><a href="/author/singh-sara" hreflang="en">Singh, Sara</a></div> <div class="field--item"><a href="/author/drew-jacqueline" hreflang="en">Drew, Jacqueline</a></div> </div> <div class="field field--name-field-issn field--type-string field--label-inline"> <div class="field--label">ISSN</div> <div class="field--items"> <div class="field--item">1836-2206</div> </div> </div> <div class="field field--name-field-isbn field--type-string field--label-inline"> <div class="field--label">ISBN</div> <div class="field--item">9781925304893</div> </div> <div class="field field--name-field-published-date field--type-datetime field--label-inline"> <div class="field--label">Published Date</div> <div class="field--item"><time datetime="2021-02-11T12:00:00Z">11-02-2021</time> </div> </div> <div class="field field--name-field-subject field--type-entity-reference field--label-inline"> <div class="field--label">Subject</div> <div class="field--items"> <div class="field--item"><a href="/subject/child-sexual-exploitation-material" hreflang="en">Child sexual exploitation material</a></div> <div class="field--item"><a href="/subject/child-abuse-and-neglect" hreflang="und">Child abuse and neglect</a></div> <div class="field--item"><a href="/subject/child-sex-offenders" hreflang="und">Child sex offenders</a></div> <div class="field--item"><a href="/subject/cybercrime" hreflang="und">Cybercrime</a></div> <div class="field--item"><a href="/subject/peer-reviewed" hreflang="und">Peer-reviewed</a></div> </div> </div> <div class="field field--name-field-series field--type-entity-reference field--label-inline"> <div class="field--label">Series</div> <div class="field--item">Trends &amp; issues in crime and criminal justice</div> </div> <div class="field field--name-field-series-num field--type-integer field--label-hidden field--item">617</div> <div class="field field--name-field-abstract field--type-text-long field--label-above"> <div class="field--label">Abstract</div> <div class="field--item"><p>This review synthesises empirical studies from the past decade investigating child sexual abuse material (CSAM) production and distribution to gain insight into crime commission processes involved in these crimes. The findings highlight overlaps in risk factors for child sexual abuse and CSAM production and distribution, and possible unique risk factors specific to the latter. A substantial amount of CSAM is produced in family contexts, and there are different motivations and strategies for producing CSAM. Taken together, the findings provide important foundational information about the variety of crime commission processes involved in CSAM production and distribution, helping the development of effective prevention and intervention strategies for this increasingly prolific type of crime.</p> </div> </div> Mon, 08 Feb 2021 02:43:02 +0000 Yvette Maconachie 2344 at https://www.aic.gov.au Reducing the methamphetamine problem in Australia: Evaluating innovative partnerships between police, pharmacies and other third parties https://www.aic.gov.au/publications/ndlerfmonograph/ndlerfmonograph39 <span>Reducing the methamphetamine problem in Australia: Evaluating innovative partnerships between police, pharmacies and other third parties</span> <span>Wed, 2020-05-20 09:49</span> <div class="field field--name-field-author field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/author/ransley-janet" hreflang="en">Ransley, Janet</a></div> <div class="field--item"><a href="/author/mazerolle-lorraine" hreflang="en">Mazerolle, Lorraine</a></div> <div class="field--item"><a href="/author/manning-matt" hreflang="en">Manning, Matt</a></div> <div class="field--item"><a href="/author/mcguffog-ingrid" hreflang="en">McGuffog, Ingrid</a></div> <div class="field--item"><a href="/author/drew-jacqueline" hreflang="en">Drew, Jacqueline</a></div> <div class="field--item"><a href="/author/webster-julianne" hreflang="en">Webster, Julianne</a></div> </div> <div class="field field--name-field-issn field--type-string field--label-inline"> <div class="field--label">ISSN</div> <div class="field--items"> <div class="field--item">1449-7476</div> </div> </div> <div class="field field--name-field-isbn field--type-string field--label-inline"> <div class="field--label">ISBN</div> <div class="field--item">9781921532986</div> </div> <div class="field field--name-field-published-date field--type-datetime field--label-inline"> <div class="field--label">Published Date</div> <div class="field--item"><time datetime="2011-06-15T12:00:00Z">15-06-2011</time> </div> </div> <div class="field field--name-field-subject field--type-entity-reference field--label-inline"> <div class="field--label">Subject</div> <div class="field--items"> <div class="field--item"><a href="/subject/methamphetamine" hreflang="und">Methamphetamine</a></div> <div class="field--item"><a href="/subject/drug-law-enforcement" hreflang="und">Drug law enforcement</a></div> <div class="field--item"><a href="/subject/interagency-cooperation" hreflang="und">Interagency cooperation</a></div> </div> </div> <div class="field field--name-field-series field--type-entity-reference field--label-inline"> <div class="field--label">Series</div> <div class="field--item">NDLERF monograph</div> </div> <div class="field field--name-field-series-num field--type-integer field--label-hidden field--item">39</div> <div class="field field--name-field-abstract field--type-text-long field--label-above"> <div class="field--label">Abstract</div> <div class="field--item"><p>Illicit methamphetamine use is a continuing and significant policy problem for Australia. The last decade has seen major shifts in both demand and supply for methamphetamines. Australian governments have responded with strategies including a heavy focus on law enforcement, especially the disruption of illicit supply of methamphetamines and the precursor drugs used in their manufacture, such as pseudoephedrine. This report addresses the research objectives of documenting the creation, nature and characteristics of partnerships between the police and third parties that seek to reduce sales of pseudoephedrine and control the methamphetamine problem in Queensland and Victoria; and understanding the wider impact of law enforcement efforts to reduce pseudoephedrine sales in terms of treatment, prevention and harm reduction across Queensland and Victoria. Further research will assess the impact if any of Project STOP on methamphetamine markets and crime outcomes in Queensland and Victoria. (Summary, edited)</p> </div> </div> Tue, 19 May 2020 23:49:10 +0000 eZ4VoE60zqcNjNZ1YCfKVvTGPJWQq2KV 575 at https://www.aic.gov.au