Essay, Research Paper: Child Pornography On Internet
Alcohol and Drugs
Free Alcohol and Drugs research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page
was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Alcohol and Drugs, use the professional writing service offered by our company.
In this new age of Information, the Internet has made all types of information
readily available. Some of this information can be very useful, some can be
malicious. Child pornography, also known as Paedophilia is one of these
problems. Any one person can find child pornography on the internet with just a
few clicks of the mouse using any search engine. Despite webmaster's and law
enforcement officials' efforts to control child pornography and shut down
illegal sites, new sites are posted using several ways to mask their identity.
The Internet provides a new world for curious children. It offers entertainment,
opportunities for education, information and communication. The Internet is a
tool that opens a window of opportunities. As Internet use grows, so do the
risks of children being exposed to inappropriate material, in particular,
criminal activity by paedophiles and child pornographers. Many children first
come in contact with the Internet at a very young age. Some children become
victims of child pornography through close relatives who may have abused them.
Some children become involved with chat services or newsgroup threads. It is
usually through these sites that they meet child pornographers. Children may be
asked to send explicit pictures of themselves taken either by a digital camera
or scanned from a polaroid. The pornographer will then post the pictures on
their web site, sometimes hiding them through encryption, steganography or
password protecting them using a javascript or applet. Certain efforts have been
made to control child pornography through legislation. In 1977 the Sexual
Exploitation of Children Act was put into Legislation. (U.S. Code : Title 18,
Section 2251-2253) The law prohibits the use of a minor in the making of
pornography, the transport of a child across state lines, the taking of a
pornographic picture of a minor, and the production and circulation of materials
advertising child pornography. It also prohibits the transfer, sale, purchase,
and receipt of minors when the purpose of such transfer, sale, purchase, or
receipt is to use the child or youth in the production of child pornography. The
transportation, importation, shipment, and receipt of child pornography by any
interstate means, including by mail or computer, is also prohibited. The Child
Protection Act of 1984 (U.S. Code : Title 18, Section 2251-2255) defines anyone
younger than the age of 18 as a child. Therefore, a sexually explicit photograph
of anyone 17 years of age or younger is child pornography. On November 7, 1986,
the U.S. Congress enacted the Child Sexual Abuse and Pornography Act (U.S. Code
: Title 18, Section 2251-2256) that banned the production and use of
advertisements for child pornography and included a provision for civil remedies
of personal injuries suffered by a minor who is a victim. It also raised the
minimum sentences for repeat offenders from imprisonment of not less than two
years to imprisonment of not less than five years. On November 18, 1988, the
U.S. Congress enacted the Child Protection and Obscenity Enforcement Act (U.S.
Code : Title 18, Section 2251-2256) that made it unlawful to use a computer to
transmit advertisements or visual depictions of child pornography and it
prohibited the buying, selling, or otherwise obtaining temporary custody or
control of children for the purpose of producing child pornography. On November
29, 1990, the U.S. Congress enacted US Code : Title 18, Section 2252 making it a
federal crime to possess three or more depictions of child pornography that were
mailed or shipped in interstate or foreign commerce or that were produced using
materials that were mailed or shipped by any means, including by computer. With
the passage of the Telecommunications Act of 1996, it is a federal crime for
anyone using the mail, interstate or foreign commerce, to persuade, induce, or
entice any individual younger than the age of 18 to engage in any sexual act for
which the person may be criminally prosecuted. The Child Pornography Prevention
Act of 1996 amends the definition of child pornography to include that which
actually depicts the sexual conduct of real minor children and that which
appears to be a depiction of a minor engaging in sexual conduct. Computer,
photographic, and photocopy technology is amazingly competent at creating and
altering images that have been "morphed" to look like children even
though those photographed may have actually been adults. People who alter
pornographic images to look like children can now be prosecuted under the law.
Abstracts for these laws can be found at http://www4.law.cornell.edu/uscode/18/.
The current legislation in place at the federal and state level clearly defines
child pornography, and the standard sentencing for offenders. It also clearly
defines a minor and what activity involving a minor is illegal. What the
legislation does not do is set the standards for retreival of evidence from an
electronic device, namely computers. Also, the current legislation does not set
standards for decrypting child pornography that is protected. One example is the
use of Steganography. Steganography uses a bitstream algorithm to hide
information in the form of raw binary code within other files suitable to hold
information. The most commonly used form of Steganography uses the least
significant bit of a bitmap image to store virtually any type of information.
Every three bytes in a bitmap file represents a pixel. Each of these bytes
represents a level of red, blue or green. Since there are eight bits in a byte,
there can be up to 256 different combinations of 1's and 0's in a single byte.
In the case of a bitmap, each unique combination of 1's and 0's represents a
level of red, blue or green. When the colors are combined, there is the
possibility of 256^3 or 4,294,967,296 different colors. In order to hide
information within a bitmap file, the file in which you want to hide must be
copied bit for bit into the last bit of each byte in the bitmap file. This will
change each pixel of the bitmap file at the most by 1 / 2,097,152, depending on
whether the bit being copied is the same as the bit it is replacing. Since the
human eye can only physically distinguish between an average of 250 different
colors, a difference of 1 / 2,097,152 is indistinguishable. Since only one bit
of the target bitmap is being used to store information, the source file can at
most be 1/8 of the size of the target file. In the case of a bitmap, a high
resolution picture can easily hold a lower resolution picture that may contain
child pornography. Legally, if a bitmap image is found to contain a hidden image
using steganography, there is no legal procedure for extracting that evidence
for a court case. The prosecution would have to somehow explain how
steganography works to a jury, and to the judge, and would have to prove in some
way that the information found did in fact come from that bitmap file.
Currently, evidence found in this manner is inadmissible in court because there
is no legislation dealing with this type of evidence. Also, there is no standard
approved software that will decode these files. There are several software
programs readily available on the internet which will encode or decode
information using the least significant bit algorithm. One example is called
Hide and Seek. Anyone can obtain this software free of charge, making it easy
for child pornographers to hide their work. Another problem is illicit material
that is stored on a remote computer. If the perpetrator of child pornography
does not own the computer that the material is stored on, it would be difficult
for law enforcement officials to obtain a warrant to search a third party's
computer. Also, there is currently no legislation that defines what space an a
machine belongs to a specific do.
readily available. Some of this information can be very useful, some can be
malicious. Child pornography, also known as Paedophilia is one of these
problems. Any one person can find child pornography on the internet with just a
few clicks of the mouse using any search engine. Despite webmaster's and law
enforcement officials' efforts to control child pornography and shut down
illegal sites, new sites are posted using several ways to mask their identity.
The Internet provides a new world for curious children. It offers entertainment,
opportunities for education, information and communication. The Internet is a
tool that opens a window of opportunities. As Internet use grows, so do the
risks of children being exposed to inappropriate material, in particular,
criminal activity by paedophiles and child pornographers. Many children first
come in contact with the Internet at a very young age. Some children become
victims of child pornography through close relatives who may have abused them.
Some children become involved with chat services or newsgroup threads. It is
usually through these sites that they meet child pornographers. Children may be
asked to send explicit pictures of themselves taken either by a digital camera
or scanned from a polaroid. The pornographer will then post the pictures on
their web site, sometimes hiding them through encryption, steganography or
password protecting them using a javascript or applet. Certain efforts have been
made to control child pornography through legislation. In 1977 the Sexual
Exploitation of Children Act was put into Legislation. (U.S. Code : Title 18,
Section 2251-2253) The law prohibits the use of a minor in the making of
pornography, the transport of a child across state lines, the taking of a
pornographic picture of a minor, and the production and circulation of materials
advertising child pornography. It also prohibits the transfer, sale, purchase,
and receipt of minors when the purpose of such transfer, sale, purchase, or
receipt is to use the child or youth in the production of child pornography. The
transportation, importation, shipment, and receipt of child pornography by any
interstate means, including by mail or computer, is also prohibited. The Child
Protection Act of 1984 (U.S. Code : Title 18, Section 2251-2255) defines anyone
younger than the age of 18 as a child. Therefore, a sexually explicit photograph
of anyone 17 years of age or younger is child pornography. On November 7, 1986,
the U.S. Congress enacted the Child Sexual Abuse and Pornography Act (U.S. Code
: Title 18, Section 2251-2256) that banned the production and use of
advertisements for child pornography and included a provision for civil remedies
of personal injuries suffered by a minor who is a victim. It also raised the
minimum sentences for repeat offenders from imprisonment of not less than two
years to imprisonment of not less than five years. On November 18, 1988, the
U.S. Congress enacted the Child Protection and Obscenity Enforcement Act (U.S.
Code : Title 18, Section 2251-2256) that made it unlawful to use a computer to
transmit advertisements or visual depictions of child pornography and it
prohibited the buying, selling, or otherwise obtaining temporary custody or
control of children for the purpose of producing child pornography. On November
29, 1990, the U.S. Congress enacted US Code : Title 18, Section 2252 making it a
federal crime to possess three or more depictions of child pornography that were
mailed or shipped in interstate or foreign commerce or that were produced using
materials that were mailed or shipped by any means, including by computer. With
the passage of the Telecommunications Act of 1996, it is a federal crime for
anyone using the mail, interstate or foreign commerce, to persuade, induce, or
entice any individual younger than the age of 18 to engage in any sexual act for
which the person may be criminally prosecuted. The Child Pornography Prevention
Act of 1996 amends the definition of child pornography to include that which
actually depicts the sexual conduct of real minor children and that which
appears to be a depiction of a minor engaging in sexual conduct. Computer,
photographic, and photocopy technology is amazingly competent at creating and
altering images that have been "morphed" to look like children even
though those photographed may have actually been adults. People who alter
pornographic images to look like children can now be prosecuted under the law.
Abstracts for these laws can be found at http://www4.law.cornell.edu/uscode/18/.
The current legislation in place at the federal and state level clearly defines
child pornography, and the standard sentencing for offenders. It also clearly
defines a minor and what activity involving a minor is illegal. What the
legislation does not do is set the standards for retreival of evidence from an
electronic device, namely computers. Also, the current legislation does not set
standards for decrypting child pornography that is protected. One example is the
use of Steganography. Steganography uses a bitstream algorithm to hide
information in the form of raw binary code within other files suitable to hold
information. The most commonly used form of Steganography uses the least
significant bit of a bitmap image to store virtually any type of information.
Every three bytes in a bitmap file represents a pixel. Each of these bytes
represents a level of red, blue or green. Since there are eight bits in a byte,
there can be up to 256 different combinations of 1's and 0's in a single byte.
In the case of a bitmap, each unique combination of 1's and 0's represents a
level of red, blue or green. When the colors are combined, there is the
possibility of 256^3 or 4,294,967,296 different colors. In order to hide
information within a bitmap file, the file in which you want to hide must be
copied bit for bit into the last bit of each byte in the bitmap file. This will
change each pixel of the bitmap file at the most by 1 / 2,097,152, depending on
whether the bit being copied is the same as the bit it is replacing. Since the
human eye can only physically distinguish between an average of 250 different
colors, a difference of 1 / 2,097,152 is indistinguishable. Since only one bit
of the target bitmap is being used to store information, the source file can at
most be 1/8 of the size of the target file. In the case of a bitmap, a high
resolution picture can easily hold a lower resolution picture that may contain
child pornography. Legally, if a bitmap image is found to contain a hidden image
using steganography, there is no legal procedure for extracting that evidence
for a court case. The prosecution would have to somehow explain how
steganography works to a jury, and to the judge, and would have to prove in some
way that the information found did in fact come from that bitmap file.
Currently, evidence found in this manner is inadmissible in court because there
is no legislation dealing with this type of evidence. Also, there is no standard
approved software that will decode these files. There are several software
programs readily available on the internet which will encode or decode
information using the least significant bit algorithm. One example is called
Hide and Seek. Anyone can obtain this software free of charge, making it easy
for child pornographers to hide their work. Another problem is illicit material
that is stored on a remote computer. If the perpetrator of child pornography
does not own the computer that the material is stored on, it would be difficult
for law enforcement officials to obtain a warrant to search a third party's
computer. Also, there is currently no legislation that defines what space an a
machine belongs to a specific do.
1
0
Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Help other users to find the good and worthy free term papers and trash the bad ones.
Get a Custom Paper on Alcohol and Drugs:
Free papers will not meet the guidelines of your specific project. If you need a custom essay on Alcohol and Drugs: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.
Related essays:
6
0
Alcohol and Drugs / Cocaine
Cocaine is one of the worst drugs on the streets today. It has destroyed
millions of lives and will hurt many more in the years to come. The Partnership
for a Drug-Free America is a group that is conc...
1
3
Alcohol and Drugs / Drinking Age
In the United States, it is illegal to consume alcohol until the age of
twenty-one. At the age of eighteen, a person can get married, vote, drive, take
out loans, pay taxes, buy tobacco, and be in the...
1
3
Alcohol and Drugs / Drug Abuse
Drug abuse in the United States of America, we, the people value several things,
some of which are freedom, expanding and taking care of our families and our
financial security. We, the people, take s...
1
1
Alcohol and Drugs / Drugs And Alcohol
One of the biggest problems people cope with today is the addiction of drugs and
alcohol. The effects of taking these drugs are dangerous: domestic violence,
crimes, accidents, sexual assault or becom...
1
1
Alcohol and Drugs / Drugs And Crime
The link between drug use and crime is not a new one. For more than twenty
years, both the National Institute on Drug Abuse and the National Institute of
Justice have funded many studies to try to bet...