Similitude de Ocorrências de CSAM na Internet e o Registro Perante às Autoridades no Estado de São Paulo
Abstract
The scientific scope of this article is to draw a similarity between LE (Law Enforcement) records and the sharing of Child Sexual Abuse Materials (CSAM), one of the crimes carried out in the Child and Adolescent Statute, and its effective virtual distribution. For this intent, police monitoring software was used to monitor peer-to-peer networks, having as a methodological cut as occurrences, both of effective sharing of material and of LE occurrence records, observed only in the State from Sao Paulo. Finally, the study is able to demonstrate that police records faithfully reflect the location of occurrences, albeit in smaller numerical proportions compared to virtual ones.
References
Barreto, A. and dos Santos, H. (2019). Deep Web: Investigação no submundo da internet. Brasport.
Bissias, G., Levine, B., Liberatore, M., Lynn, B., Moore, J., Wallach, H., and Wolak, J. (2016). Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. Child abuse & neglect, 52:185–199.
Castrillon-Santana, M., Lorenzo-Navarro, J., Travieso-Gonzalez, C. M., Freire-Obregon, D., and Alonso-Hernandez, J. B. (2018). Evaluation of local descriptors and cnns for non-adult detection in visual content. Pattern Recognition Letters, 113:10–18.
Clarke, I., Sandberg, O., Wiley, B., and Hong, T. W. (2001). Freenet: A Distributed Anonymous Information Storage and Retrieval System, pages 46–66. Springer Berlin Heidelberg, Berlin, Heidelberg.
DataGeo (2021). Infraestrutura de dados espaciais ambientais do estado de são paulo – idea-sp. Acessado em: 1 de junho de 2021.
de Telecomunicações, A. N. (2021). Panorama: Cobertura das localidades e obrigações. Acessado em: 1 de junho de 2021.
dos Deputados, C. (2003). Departamento de taquigrafia, revisão e redação. AudiênciaPublica. Sobre PEC25/95. Sessão, (229.1):30–0.
Freitas, D. J., Marcondes, T. B., Nakamura, L. H., and Meneguette, R. I. (2015). A health smart home system to report incidents for disabled people. In 2015 International Conference on Distributed Computing in Sensor Systems, pages 210–211.
Galaxy, A. (2020). P2P File Sharing since 2002.
Heckmann, O., Bock, A., Mauthe, A., and Steinmetz, R. (2004). The edonkey file-sharing network. In GI Jahrestagung.
Inc, B. (2021). BitTorrent.
Lei, N. (1990). 8.069, de 13 de julho de 1990. dispõe sobre o estatuto da criança e do adolescente e dá outras providências. Diário Oficial da União, 16.
OPAS, O. M. U. (1980). Manual da classificação estatística internacional de doenças, lesões e causas de óbito. In Manual da classificação estatística internacional de doenças, lesões e causas de óbito, pages 815–815.
Vetulani, Z., Geoffrois, E., Czarnecki, W., and Kochanowski, B. Language resources for public security applications: Needs and specificities. Language Resources for Public Security Applications, page 1.
Westlake, B., Bouchard, M., and Frank, R. (2017). Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse, 29(7):685–708.
Wolak, J., Liberatore, M., and Levine, B. N. (2014). Measuring a year of child pornography trafficking by us computers on a peer-to-peer network. Child Abuse & Neglect, 38(2):347–356.
