Online Sexual Offences: Difference between revisions

From Criminal Law Notebook
m Text replacement - "<Br>" to "<br>"
Line 69: Line 69:
</ref>
</ref>
* the level of computer sophistication or computer literacy of the accused;<ref>
* the level of computer sophistication or computer literacy of the accused;<ref>
Thompson{{ibid}} at para 38<Br>
Thompson{{ibid}} at para 38<br>
</ref>
</ref>
* ownership of the computer<ref>
* ownership of the computer<ref>
Thompson{{ibid}} at para 38<Br>
Thompson{{ibid}} at para 38<br>
</ref>
</ref>
* level of usage of the computer;<ref>
* level of usage of the computer;<ref>
Line 81: Line 81:
</ref>
</ref>
* organization of the files<Ref>
* organization of the files<Ref>
Thompson{{ibid}} at para 38<Br>
Thompson{{ibid}} at para 38<br>
</ref>
</ref>


{{reflist|2}}
{{reflist|2}}

Revision as of 09:08, 13 January 2019

General Principles

See also: Sexual Offences

There are several Criminal Code offences that are either primarily or exclusively committed through the use of the internet and computer. These include:

Peer-to-Peer Investigations

Peer-to-peer investigations concern the detection and investigation of the distribution illegal computer files through the internet.

The automated collection of hash values and file names consistent with child pornography is not sufficient to substantiate a charge. The file must be looked at to make this determination.[1]

The specialized computer forensic examiners and investigators are able to testify to the types of offenders that they have observed in their experience.[2] Some basic technical concepts are required.

The Internet
The internet is a "global system of computer networks" that is an "important tool for the exchange of information". It is a "single global venue" that is accessible to users where ever they may be.[3]

The internet is accessed through an Internet Service Provider. The subscriber connects to the service provider who in turn connects the subscriber to the internet.[4]

An IP address is a numerical identifier that is automatically assigned to a subscriber when the computer device connects to the internet.[5] There are over 4.3 billion IP addresses.[6]

The ISP records the dates and times that the IP address is assigned to the subscribers.[7]

  1. R v Lamb, 2010 BCSC 1911 (CanLII), per Ehrcke J
  2. e.g. R v Thompson, 2016 ONCJ 271 (CanLII), per McKay J at para 24
  3. R v Ward, 2012 ONCA 660 (CanLII), per Doherty JA at para 19
  4. Ward, ibid. at para 20
  5. Ward, ibid. at para 21
  6. Ward, ibid. at para 21
  7. Ward, ibid. at para 23

Undercover Investigations

Computer Forensic Analysis

In preparing the computer for examination the expert should make a duplicate copy of the device's hard drive.[1]

Forensic examiners typically are able to recover the following information from the computer:

  • evidence of when the operating system was installed [2]
  • when the computer was last shut down properly[3]
  • evidence that the hard drive had been wiped clean, overwritten prior to the installation of the operating system[4]
  • the name of the user who registers the computer at the time of installation[5]
  • history of computer use based on website history, the presence of cookies, and the data cache[6]

It would be usual to find the internet browsing history to be set to be deleted automatically.[7]

An expert can usually rule out the possibility of hacking the computer, viruses or malware by running a scan.[8]

  1. R v Woods, 2008 ONCJ 395 (CanLII), per G Campbell J at para 16
  2. Woods, ibid. at para 16
  3. Wood, ibid. at para 16
  4. Woods, ibid. at para 16
  5. Wood, ibid. at para 16, 20
  6. Wood, ibid. at para 22
  7. Wood, ibid. at para 23
  8. Wood, ibid. at para 29

Proof of Identity

See also: Identity

In many online sexual offences there is clear evidence that a particular computing device was used in the commission of a criminal offence. The primary issue at trial would be the identity of the culprit.

Evidence suggesting of identity of the culprit (e.g. the person who possessed certain files or operated certain software) include:

  • person associated with a user account with administrative rights that may have installed software that facilitated the crime;[1]
  • the level of computer sophistication or computer literacy of the accused;[2]
  • ownership of the computer[3]
  • level of usage of the computer;[4]
  • the descriptive file names;[5]
  • organization of the files[6]
  1. e.g. see e.g. R v Thompson, 2016 ONCJ 271 (CanLII), per McKay J at para 37 to 39
  2. Thompson, ibid. at para 38
  3. Thompson, ibid. at para 38
  4. Thompon, ibid. at para 38
  5. Thompson, ibid. at para 38
  6. Thompson, ibid. at para 38