Sous-culture pédophile et processus d’enculturation en matière de cybersécurité

une analyse en classes latentes des thématiques sécuritaires sur le dark web

Auteurs-es

DOI :

https://doi.org/10.26034/la.cfs.2023.3481

Mots-clés :

Expertise criminelle, sous-culture pédophile, enculturation, stratégies de protection, cybersécurité, Dark web

Résumé

L’échange et l’acquisition de compétences de cybersécurité sur le dark web par la communauté pédophile font partis de la sous-culture pédophile sur Internet. Dans cette perspective, cette étude s’intéresse au processus d’enculturation en matière de cybersécurité par les utilisateurs de forums pédophiles sur le dark web et est encadrée par l’approche de l’expertise criminelle. Spécifiquement, cette recherche a pour objectif de déterminer si les thématiques discutées constituent un ensemble homogène ou hétérogène et si elles sont associées à des indicateurs d’expertise et d’intérêt de la part de la communauté pédophile. Cette étude se fonde sur l’analyse de 290 fils de discussion (FDDs) spécifiquement dévolus aux sujets de cybersécurité, extrait de trois forums pédophiles sur le dark web. Une analyse en classes latentes a permis de classifier les différents FDDs en quatre classes en fonction des thématiques traitées : stratégies réactives de confrontation avec la justice, stratégies proactives basiques, stratégies de lutte contre les menaces non judiciarisées, stratégies proactives avancées. Les indicateurs de validité externes permettent de confirmer l’existence d’un lien entre les sujets traités, le niveau d’expertise et le niveau d’intérêt des utilisateurs de ces forums confirmant l’existence d’un processus d’enculturation au sein de la sous-culture pédophile sur internet.

 

Références

Acar, K. V. (2017). Child abuse materials as digital goods: Why we should fear new commercial forms.

Aldridge, J. et Décary-Hétu, D. (2016). Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy, 35, 7-15. https://doi.org/10.1016/j.drugpo.2016.04.020

American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders : DSM-5™ (5the éd.). American Psychiatric Publ. http://www.psychiatry.org/psychiatrists/practice/dsm/dsm-5/online-assessment-measures

Beauregard, E. et Bouchard, M. (2010). Cleaning up your act: Forensic awareness as a detection avoidance strategy. Journal of Criminal Justice, 38(6), 1160-1166. https://doi.org/10.1002/car.2308

Brake, M. (1980). The sociology of youth culture and youth subcultures. Routledge & Kegan.

Caneppele, S. et Aebi, M. F. (2019). Crime drop or police recording flop? On the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing: A Journal of Policy and Practice, 13(1), 66-79. https://doi.org/10.1093/police/pax055

Cherbonneau, M. et Copes, H. (2005). ‘Drive it like you Stole it’ Auto Theft and the Illusion of Normalcy. British Journal of Criminology, 46(2), 193-211. https://doi.org/10.1093/bjc/azi059

Chohan, U. W. (2017). A history of bitcoin. Disponible à SSRN 3047875.

Chopin, J., Paquette, S. et Beauregard, E. (2022). Is There an Expert Stranger “Rapist” Sexual Abuse, 34(1). https://doi.org/10.1177/1079063221993478

Chopin, J., Paquette, S. et Fortin, F. (2022). Geeks and Newbies: Investigating the Criminal Expertise of Online Sex Offenders. Deviant Behavior, 1-17. https://doi.org/10.1080/01639625.2022.2059417

Collins, L. M. et Lanza, S. T. (2010). Latent class and latent transition analysis: With applications in the social, behavioral, and health sciences. Wiley.

Copes, H. et Cherbonneau, M. (2006). The key to auto theft: emerging methods of auto theft from the offenders’ perspective. British Journal of Criminology, 46(5), 917-934. https://doi.org/10.1093/bjc/azl001

Cornish, D. B. et Clarke, R. V. (1986). Introduction. Dans D. B. Cornish et R. V. Clarke (dir.), The Reasoning Criminal: Rational choice perspectives on offending (p. 1-18). Springer-Verlag.

Cornish, D. B. et Clarke, R. V. (1987, 1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933-948. https://doi.org/10.1111/j.1745-9125.1987.tb00826.x

Cornish, D. B. et Clarke, R. V. (2008). The rational choice perspective. Dans R. Wortley et L. Mazerolle (dir.), Environmental Criminology and Crime Analysis. Willan Publishing.

Davies, A., Wittebrood, K. et Jackson, J. L. (1997). Predicting the criminal antecedents of a stranger rapist from his offence behaviour. Science & Justice, 37(3), 161-170. https://doi.org/10.1016/S1355-0306(97)72169-5

Deslauriers-Varin, N. et Beauregard, E. (2010, 2010/09//). Victims’ routine activities and sex offenders’ target selection scripts: A latent class analysis. Sexual Abuse, 22(3), 315-342. https://doi.org/10.1177/1079063210375975

Durkin, K. F. (1997). Misuse of the Internet by pedophiles: Implications for law enforcement and probation practice. Fed. Probation, 61, 14.

Durkin, K. F. et Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103-127. https://doi.org/10.1080/016396299266524

Ericsson, K. A., Hoffman, R. R., Kozbelt, A. et Williams, A. M. (2018). The Cambridge handbook of expertise and expert performance. Cambridge University Press.

Fontana-Rosa, J. C. (2001). Legal competency in a case of pedophilia: Advertising on the Internet. International Journal of Offender Therapy and Comparative Criminology, 45(1), 118-128. https://doi.org/10.1177/0306624X0145100

Fortin, F. (2014). C’est ma collection mais c’est bien plus que ça : analyse des processus de collecte et de l’évolution des images dans les collections de pornographie juvénile [Université de Montréal].

Gonzalez, F. M. et Palacios, T. B. (2004). Quantitative evaluation of commercial web sites:: an empirical study of Spanish firms. International Journal of information management, 24(4), 313-328. https://doi.org/10.1016/j.ijinfomgt.2004.04.009

Hernández, B., Jiménez, J. et Martín, M. J. (2009). Key website factors in e-business strategy. International Journal of information management, 29(5), 362-371. https://doi.org/10.1016/j.ijinfomgt.2008.12.006

Holt, T. J., Blevins, K. R. et Burkert, N. (2010). Considering the pedophile subculture online. Sexual Abuse, 22(1), 3-24. https://doi.org/10.1177%2F1079063209344979

Idika, N. et Mathur, A. P. (2007). A survey of malware detection techniques. Purdue University, 48(2), 32-46.

Jenkins, P. (2001). Beyond tolerance: Child pornography on the Internet. University Press.

Jørgensen, P. et Jensen, J. (1990). Latent class analysis of deluded patients. Psychopathology, 23(1), 46-51. https://doi.org/10.1159/000284637

Krone, T., Smith, R. G., Cartwright, J., Hutchings, A., Tomison, A. et Napier, S. (2017). Online child sexual exploitation offenders: A study of Australian law enforcement data. Criminology Research Grants, 77, 1213.

Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: overview and issues. Crime, Law and Social Change, 67(1), 3-20. https://doi.org/10.1007/s10611-016-9645-3

Linde, A. et Aebi, M. (2020). La criminologie comparée à l’heure de la société numérique : Les théories traditionnelles peuvent-elles expliquer les tendances de la cyber-délinquance ? Revue Internationale de Criminologie et de Police Technique et Scientifique, 4(20), 387-414.

Loeb, J. (2017). Europol study assesses technology for fighting online child abuse [News Briefing]. Engineering & Technology, 12(10), 8-8. https://doi.org/10.1049/et.2017.1011

McCarthy, J. A. (2010). Internet sexual activity: A comparison between contact and non-contact child pornography offenders. Journal of sexual aggression, 16(2), 181-195. https://doi.org/10.1080/13552601003760006

Myrseth, H. et Notelaers, G. (2018). A latent class approach for classifying the problem and disordered gamers in a group of adolescence. Frontiers in psychology, 9, 2273. https://doi.org/10.3389/fpsyg.2018.02273

Nee, C. (2015). Understanding expertise in burglars: From pre-conscious scanning to action and beyond. Aggression and Violent Behavior, 20, 53-61. https://doi.org/10.1016/j.avb.2014.12.006

Nee, C. et Meenaghan, A. (2006). Expert decision making in burglars. British Journal of Criminology, 46(5), 935-949. https://doi.org/10.1093/bjc/azl013

Nee, C. et Taylor, M. (2000). Examining burglars' target selection: Interview, experiment or ethnomethodology? Psychology, Crime & Law, 6(1), 45-59. https://doi.org/10.1080/10683160008410831

Nee, C. et Ward, T. (2015). Review of expertise and its general implications for correctional psychology and criminology. Aggression and Violent Behavior, 20, 1-9. https://doi.org/10.1016/j.avb.2014.12.002

Nee, C., White, M., Woolford, K., Pascu, T., Barker, L. et Wainwright, L. (2015). New methods for examining expertise in burglars in natural and simulated environments: preliminary findings. Psychology, Crime & Law, 21(5), 507-513. https://doi.org/10.1080/1068316X.2014.989849

Owen, G. et Savage, N. (2015). The Tor dark net. https://policycommons.net/artifacts/1223621/the-tor-dark-net/1776697/

Paquette, S. et Fortin, F. (2021). Les traces numériques laissées par les cyberdélinquants sexuels: identités virtuelles et protection de l’anonymat. Revue Internationale de Criminologie et de Police Technique et Scientifique.

Park, J., Schlesinger, L. B., Pinizzotto, A. J. et Davis, E. F. (2008). Serial and single-victim rapists: differences in crime-scene violence, interpersonal involvement, and criminal sophistication. Behavioral Sciences & the Law, 26(2), 227-237. https://doi.org/10.1002/bsl.804

Penna, L., Clark, A. et Mohay, G. (2005). Challenges of automating the detection of paedophile activity on the internet. Dans. First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

Quayle, E. et Taylor, M. (2002). Child pornography and the Internet: Perpetuating a cycle of abuse. Deviant Behavior, 23(4), 331-361. https://doi.org/10.1080/01639620290086413

Reale, K. (2022). Criminal Expertise and Sexual Violence: An Examination of the Crime-Commission Process [Simon Fraser University]. https://summit.sfu.ca/item/34855

Reale, K., Beauregard, E. et Chopin, J. (2021a). Criminal Expertise and Sexual Violence: Comparing the Crime-Commission Process Involved in Sexual Burglary and Sexual Robbery Criminal Justice and Behavior. https://doi.org/10.1177/00938548211023541

Reale, K., Beauregard, E. et Chopin, J. (2021b). Expert Versus Novice: Criminal Expertise in Sexual Burglary and Sexual Robbery Sexual Abuse. https://doi.org/10.1177/10790632211024236

Rekik, R., Kallel, I., Casillas, J. et Alimi, A. M. (2018). Assessing web sites quality: A systematic literature review by text and association rules mining. International Journal of information management, 38(1), 201-216. https://doi.org/10.1016/j.ijinfomgt.2017.06.007

Sanger, D. E. et Chen, B. X. (2014). Signaling post-Snowden Era, new iPhone locks out NSA. New York Times, 26.

Seto, M. C., Reeves, L. et Jung, S. (2010). Explanations given by child pornography offenders for their crimes. Journal of sexual aggression, 16(2), 169-180. https://doi.org/10.1080/13552600903572396

Steel, C. M., Newman, E., O’Rourke, S. et Quayle, E. (2020). An integrative review of historical technology and countermeasure usage trends in online child sexual exploitation material offenders. Forensic Science International: Digital Investigation, 33, 300971. https://doi.org/10.1016/j.fsidi.2020.300971

Sutherland, E. H. (1937). The professional thief. Journal of Criminal Law and Criminology (1931-1951), 161-163.

Taylor, M., Quayle, E. et Holland, G. (2001). Child pornography, the Internet and offending. The Canadian Journal of Policy Research, 2(2), 94-100.

Topalli, V. (2005). Criminal expertise and offender decision-making: An experimental analysis of how offenders and non-offenders differentially perceive social stimuli. The British Journal of Criminology, 45(3), 269-295. https://doi.org/10.1093/bjc/azh086

Ward, T. (1999). Competency and deficit models in the understanding and treatment of sexual offenders. Journal of sex research, 36(3), 298-305. https://doi.org/10.1080/00224499909552000

Westlake, B. G. et Bouchard, M. (2016). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly, 33(7), 1154-1181. https://doi.org/10.1080/07418825.2015.1046393

Wolak, J., Finkelhor, D. et Mitchell, K. (2005). Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study.

Wolak, J., Finkelhor, D. et Mitchell, K. (2011). Child pornography possessors: Trends in offender and case characteristics. Sexual Abuse, 23(1), 22-42. https://doi.org/10.1177%2F1079063210372143

Wolak, J., Mitchell, K. et Finkelhor, D. (2003). Internet sex crimes against minors: The reponse of law enforcement. National Center for Missing and Exploited Children.

Young, J. (2010). Subcultural Theories: Virtues and Vices. Dans R. Agnew et J. Kaufman (dir.), Anomie, Strain and Subcultural Theories of Crime (p. 110-135). Ashgate.

Téléchargements

Publié-e

11.03.2023

Comment citer

Chopin, J., Décary-Hétu, D., Marois, E., & Vincendon, L. (2023). Sous-culture pédophile et processus d’enculturation en matière de cybersécurité : une analyse en classes latentes des thématiques sécuritaires sur le dark web. Criminologie, Forensique Et Sécurité, 1(1). https://doi.org/10.26034/la.cfs.2023.3481

Numéro

Rubrique

Articles réguliers

Catégories