Online Sexual Offences: Difference between revisions

From Criminal Law Notebook
m Text replacement - "criminal code" to "Criminal Code"
 
m 1 revision imported
(No difference)

Revision as of 18:14, 22 February 2018

General Principles

See also: Sexual Offences

There are several Criminal Code offences that are either primarily or exclusively committed through the use of the internet and computer. These include:

Peer-to-Peer Investigations

Peer-to-peer investigations concern the detection and investigation of the distribution illegal computer files through the internet.

The automated collection of hash values and file names consistent with child pornography is not sufficient to substantiate a charge. The file must be looked at to make this determination.[1]

The specialized computer forensic examiners and investigators are able to testify to the types of offenders that they have observed in their experience.[2] Some basic technical concepts are required.

The Internet
The internet is a "global system of computer networks" that is an "important tool for the exchange of information". It is a "single global venue" that is accessible to users where ever they may be.[3]

The internet is accessed through an Internet Service Provider. The subscriber connects to the service provider who in turn connects the subscriber to the internet.[4]

An IP address is a numerical identifier that is automatically assigned to a subscriber when the computer device connects to the internet.[5] There are over 4.3 billion IP addresses.[6]

The ISP records the dates and times that the IP address is assigned to the subscribers.[7]

  1. R v Lamb, 2010 BCSC 1911 (CanLII)
  2. e.g. R v Thompson, 2016 ONCJ 271 (CanLII) at para 24
  3. R v Ward, 2012 ONCA 660 (CanLII) at para 19
  4. Ward at para 20
  5. Ward at para 21
  6. Ward at para 21
  7. Ward at para 23

Undercover Investigations

Computer Forensic Analysis

In preparing the computer for examination the expert should make a duplicate copy of the device's hard drive.[1]

Forensic examiners typically are able to recover the following information from the computer:

  • evidence of when the operating system was installed [2]
  • when the computer was last shut down properly[3]
  • evidence that the hard drive had been wiped clean, overwritten prior to the installation of the operating system[4]
  • the name of the user who registers the computer at the time of installation[5]
  • history of computer use based on website history, the presence of cookies, and the data cache[6]

It would be usual to find the internet browsing history to be set to be deleted automatically.[7]

An expert can usually rule out the possibility of hacking the computer, viruses or malware by running a scan.[8]

  1. R v Woods, 2008 ONCJ 395 (CanLII) at para 16
  2. R v Woods at para 16
  3. Wood at para 16
  4. R v Woods at para 16
  5. Wood at para 16, 20
  6. Wood at para 22
  7. Wood at para 23
  8. wood at para 29

Proof of Identity

See also: Identity

In many online sexual offences there is clear evidence that a particular computing device was used in the commission of a criminal offence. The primary issue at trial would be the identity of the culprit.

Evidence suggesting of identity of the culprit (e.g. the person who possessed certain files or operated certain software) include:

  • person associated with a user account with administrative rights that may have installed software that facilitated the crime;[1]
  • the level of computer sophistication or computer literacy of the accused;[2]
  • ownership of the computer[3]
  • level of usage of the computer;[4]
  • the descriptive file names;[5]
  • organization of the files[6]
  1. e.g. see e.g. R v Thompson, 2016 ONCJ 271 (CanLII) at para 37 to 39
  2. Thompson at para 38
  3. Thompson at para 38
  4. Thompon, supra at para 38
  5. Thompson at para 38
  6. Thompson at para 38