Реферат по предмету "Иностранный язык"


Child Pornography On Internet Essay Research Paper

In this new age of Information, the Internet has made all types of information

readily available. Some of this information can be very useful, some can be

malicious. Child pornography, also known as Paedophilia is one of these

problems. Any one person can find child pornography on the internet with just a

few clicks of the mouse using any search engine. Despite webmaster’s and law

enforcement officials’ efforts to control child pornography and shut down

illegal sites, new sites are posted using several ways to mask their identity.

The Internet provides a new world for curious children. It offers entertainment,

opportunities for education, information and communication. The Internet is a

tool that opens a window of opportunities. As Internet use grows, so do the

risks of children being exposed to inappropriate material, in particular,

criminal activity by paedophiles and child pornographers. Many children first

come in contact with the Internet at a very young age. Some children become

victims of child pornography through close relatives who may have abused them.

Some children become involved with chat services or newsgroup threads. It is

usually through these sites that they meet child pornographers. Children may be

asked to send explicit pictures of themselves taken either by a digital camera

or scanned from a polaroid. The pornographer will then post the pictures on

their web site, sometimes hiding them through encryption, steganography or

password protecting them using a javascript or applet. Certain efforts have been

made to control child pornography through legislation. In 1977 the Sexual

Exploitation of Children Act was put into Legislation. (U.S. Code : Title 18,

Section 2251-2253) The law prohibits the use of a minor in the making of

pornography, the transport of a child across state lines, the taking of a

pornographic picture of a minor, and the production and circulation of materials

advertising child pornography. It also prohibits the transfer, sale, purchase,

and receipt of minors when the purpose of such transfer, sale, purchase, or

receipt is to use the child or youth in the production of child pornography. The

transportation, importation, shipment, and receipt of child pornography by any

interstate means, including by mail or computer, is also prohibited. The Child

Protection Act of 1984 (U.S. Code : Title 18, Section 2251-2255) defines anyone

younger than the age of 18 as a child. Therefore, a sexually explicit photograph

of anyone 17 years of age or younger is child pornography. On November 7, 1986,

the U.S. Congress enacted the Child Sexual Abuse and Pornography Act (U.S. Code

: Title 18, Section 2251-2256) that banned the production and use of

advertisements for child pornography and included a provision for civil remedies

of personal injuries suffered by a minor who is a victim. It also raised the

minimum sentences for repeat offenders from imprisonment of not less than two

years to imprisonment of not less than five years. On November 18, 1988, the

U.S. Congress enacted the Child Protection and Obscenity Enforcement Act (U.S.

Code : Title 18, Section 2251-2256) that made it unlawful to use a computer to

transmit advertisements or visual depictions of child pornography and it

prohibited the buying, selling, or otherwise obtaining temporary custody or

control of children for the purpose of producing child pornography. On November

29, 1990, the U.S. Congress enacted US Code : Title 18, Section 2252 making it a

federal crime to possess three or more depictions of child pornography that were

mailed or shipped in interstate or foreign commerce or that were produced using

materials that were mailed or shipped by any means, including by computer. With

the passage of the Telecommunications Act of 1996, it is a federal crime for

anyone using the mail, interstate or foreign commerce, to persuade, induce, or

entice any individual younger than the age of 18 to engage in any sexual act for

which the person may be criminally prosecuted. The Child Pornography Prevention

Act of 1996 amends the definition of child pornography to include that which

actually depicts the sexual conduct of real minor children and that which

appears to be a depiction of a minor engaging in sexual conduct. Computer,

photographic, and photocopy technology is amazingly competent at creating and

altering images that have been "morphed" to look like children even

though those photographed may have actually been adults. People who alter

pornographic images to look like children can now be prosecuted under the law.

Abstracts for these laws can be found at http://www4.law.cornell.edu/uscode/18/.

The current legislation in place at the federal and state level clearly defines

child pornography, and the standard sentencing for offenders. It also clearly

defines a minor and what activity involving a minor is illegal. What the

legislation does not do is set the standards for retreival of evidence from an

electronic device, namely computers. Also, the current legislation does not set

standards for decrypting child pornography that is protected. One example is the

use of Steganography. Steganography uses a bitstream algorithm to hide

information in the form of raw binary code within other files suitable to hold

information. The most commonly used form of Steganography uses the least

significant bit of a bitmap image to store virtually any type of information.

Every three bytes in a bitmap file represents a pixel. Each of these bytes

represents a level of red, blue or green. Since there are eight bits in a byte,

there can be up to 256 different combinations of 1’s and 0’s in a single byte.

In the case of a bitmap, each unique combination of 1’s and 0’s represents a

level of red, blue or green. When the colors are combined, there is the

possibility of 256^3 or 4,294,967,296 different colors. In order to hide

information within a bitmap file, the file in which you want to hide must be

copied bit for bit into the last bit of each byte in the bitmap file. This will

change each pixel of the bitmap file at the most by 1 / 2,097,152, depending on

whether the bit being copied is the same as the bit it is replacing. Since the

human eye can only physically distinguish between an average of 250 different

colors, a difference of 1 / 2,097,152 is indistinguishable. Since only one bit

of the target bitmap is being used to store information, the source file can at

most be 1/8 of the size of the target file. In the case of a bitmap, a high

resolution picture can easily hold a lower resolution picture that may contain

child pornography. Legally, if a bitmap image is found to contain a hidden image

using steganography, there is no legal procedure for extracting that evidence

for a court case. The prosecution would have to somehow explain how

steganography works to a jury, and to the judge, and would have to prove in some

way that the information found did in fact come from that bitmap file.

Currently, evidence found in this manner is inadmissible in court because there

is no legislation dealing with this type of evidence. Also, there is no standard

approved software that will decode these files. There are several software

programs readily available on the internet which will encode or decode

information using the least significant bit algorithm. One example is called

Hide and Seek. Anyone can obtain this software free of charge, making it easy

for child pornographers to hide their work. Another problem is illicit material

that is stored on a remote computer. If the perpetrator of child pornography

does not own the computer that the material is stored on, it would be difficult

for law enforcement officials to obtain a warrant to search a third party’s

computer. Also, there is currently no legislation that defines what space an a

machine belongs to a specific do.

342




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Послание князю Изяславу о неделе преподобного Феодосия Печерского
Реферат Жак Моно
Реферат Социальные опасности и их характеристики
Реферат Ancient Babylon Essay Research Paper The code
Реферат Закон Кулона. Электростатическое поле
Реферат Summary Of 1984 Essay Research Paper Summary
Реферат Физическая природа формирований конфигураций фигур вращения электронных оболочек атомов
Реферат Основные методы психологических исследований
Реферат Анализ информационной системы организации. Политика информационной безопасности организации
Реферат Аннотация программы учебной дисциплины «Компьютерные сети» Направление 010400. 62 «Прикладная математика и информатика»
Реферат Традиційні громадські спільності
Реферат Монгольское нашествие и установление ордынского ига на Руси
Реферат Аудит организации бухгалтерского учета и учетной политики предприятия 3
Реферат Мир как история, различия цивилизаций в подходах к пониманию истории, взгляд Шпенглера на историю
Реферат Луна (реферат)