Infractions sexuelles en ligne

De Le carnet de droit pénal
Version datée du 22 juin 2024 à 01:32 par AdminF (discussion | contributions) (Remplacement de texte : « ==General Principles== » par « ==Principes généraux== »)
Ang

Fr

Cette page a été mise à jour ou révisée de manière substantielle pour la dernière fois November 2022. (Rev. # 3010)
n.b.: Cette page est expérimentale. Si vous repérez une grammaire ou un texte anglais clairement incorrect, veuillez m'en informer à [email protected] et je le corrigerai dès que possible.

Principes généraux

Voir également: Sexual Offences

There are several Criminal Code offences that are either primarily or exclusively committed through the use of the internet and computer. These include:

NCMEC CyberTipline Reports

Many investigations into ICE related crimes, include reports generated by organizations such as the National Centre for Missing and Exploited Children. These reports are generally considered reliable for the purpose of establishing grounds for the issuance of a judicial authorization.[1]

Child Protection System

A major tool for law enforcement is the Child Protection Tool. It logs IP addresses and associated hash values of files believed to meet the definition of child pornography from sources across North America.[2]

  1. R c Cusick, 2015 ONSC 6739 (CanLII), par Ricchetti J
  2. R c Waygood, 2016 BCSC 2607 (CanLII) (hyperliens fonctionnels en attente), par Schultes J, au para 4

Peer-to-Peer Investigations

Peer-to-peer investigations concern the detection and investigation of the distribution illegal computer files through the internet.

The automated collection of hash values and file names consistent with child pornography is not sufficient to substantiate a charge. The file must be looked at to make this determination.[1]

The specialized computer forensic examiners and investigators are able to testify to the types of offenders that they have observed in their experience.[2] Some basic technical concepts are required.

The Internet

The internet is a "global system of computer networks" that is an "important tool for the exchange of information". It is a "single global venue" that is accessible to users where ever they may be.[3]

The internet is accessed through an Internet Service Provider. The subscriber connects to the service provider who in turn connects the subscriber to the internet.[4]

An IP address is a numerical identifier that is automatically assigned to a subscriber when the computer device connects to the internet.[5] There are over 4.3 billion IP addresses.[6]

The ISP records the dates and times that the IP address is assigned to the subscribers.[7]

  1. R c Lamb, 2010 BCSC 1911 (CanLII), [2010] BCJ No 2701, par Ehrcke J
  2. e.g. R c Thompson, 2016 ONCJ 271 (CanLII), par McKay J, au para 24
  3. R c Ward, 2012 ONCA 660 (CanLII), 112 OR (3d) 321, par Doherty JA, au para 19
  4. , ibid., au para 20
  5. Ward, supra, au para 21
  6. Ward, supra, au para 21
  7. Ward, supra, au para 23

Undercover Investigations

A peace officer must obtain a judicial authorization if they intend to use an "account takeover" method of detecting online criminal activity.[1]

Computer Forensic Analysis

In preparing the computer for examination the expert should make a duplicate copy of the device's hard drive.[1]

Forensic examiners typically are able to recover the following information from the computer:

  • evidence of when the operating system was installed [2]
  • when the computer was last shut down properly[3]
  • evidence that the hard drive had been wiped clean, overwritten prior to the installation of the operating system[4]
  • the name of the user who registers the computer at the time of installation[5]
  • history of computer use based on website history, the presence of cookies, and the data cache[6]

It would be usual to find the internet browsing history to be set to be deleted automatically.[7]

An expert can usually rule out the possibility of hacking the computer, viruses or malware by running a scan.[8]

Computer forensics considerations:

  • a computer forensic analyst will not necessarily be able to comment on the use of various apps and their ability to leave inculpatory evidence.[9]
  1. R c Woods, 2008 ONCJ 395 (CanLII), par G Campbell J, au para 16
  2. , ibid., au para 16
  3. Woods, supra, au para 16
  4. Woods, supra, au para 16
  5. Woods, supra, aux paras 16, 20
  6. Woods, supra, au para 22
  7. Woods, supra, au para 23
  8. Woods, supra, au para 29
  9. e.g. R c Gauthier, 2021 ONCA 216 (CanLII), par Harvison Young JA expert could not comment on whether chat logs could have been inserted on the device by having a concurrent log-in from a different device.

Proof of Identity

Voir également: Identity

In many online sexual offences there is clear evidence that a particular computing device was used in the commission of a criminal offence. The primary issue at trial would be the identity of the culprit.

Evidence suggesting of identity of the culprit (e.g. the person who possessed certain files or operated certain software) include:

  • person associated with a user account with administrative rights that may have installed software that facilitated the crime;[1]
  • the level of computer sophistication or computer literacy of the accused;[2]
  • ownership of the computer[3]
  • level of usage of the computer;[4]
  • the descriptive file names;[5]
  • organization of the files[6]
  1. e.g. see R c Thompson, 2016 ONCJ 271 (CanLII), par McKay J, aux paras 37 to 39
  2. , ibid., au para 38
  3. Thompson, supra, au para 38
  4. Thomspon, supra, au para 38
  5. Thompson, supra, au para 38
  6. Thompson, supra, au para 38