Investigation-Procedure-of-PornographyIT-Based-Violence-Challenges-and-Remedies.pptx

ssuser0d6735 1 views 5 slides Oct 10, 2025
Slide 1
Slide 1 of 5
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5

About This Presentation

Investigation Procedure of Pornography and IT Based Violence; Challenges and Remedies


Slide Content

Investigation Procedure of Pornography/IT-Based Violence – Challenges and Remedies IT-based violence encompasses crimes such as digital sexual harassment, child sexual abuse material (CSAM), revenge porn, sextortion, and the non-consensual circulation of intimate content. These offenses exploit the anonymity and expansive reach of the internet, complicating traditional investigative approaches. This presentation outlines the investigative procedures in Bangladesh, the legal frameworks supporting these actions, the challenges faced by law enforcement, and potential remedies to improve efficacy in handling these crimes.

Legal Framework Governing IT-Based Violence in Bangladesh Pornography Control Act, 2012 Focuses on production and distribution prohibitions under Section 8 to control obscene material dissemination. Cyber Security Act, 2023 Addresses digital harassment, defamation, and other online offenses under Sections 25, 26, and 29, providing a modern legal tool against IT-related crimes.

Step-by-Step Investigation Procedure Complaint Receipt Filing of GD/FIR based on victim or third-party reports; collection of digital evidence including URLs and screenshots. Evidence Preservation Imaging of devices and metadata collection such as timestamps, device ID, and IP addresses to maintain evidence integrity. Platform Cooperation & Victim Identification Requests to major platforms to retrieve subscriber data; trauma-informed approaches used to identify and support victims, especially minors. Tracing Suspects and Legal Action Utilizing IP resolution, CDR analysis, and forensic examination leading to arrest and charge sheet preparation while ensuring victim confidentiality.

Challenges in Investigating IT-Based Sexual Violence Social Stigma & Reporting Delays Victims often hesitate to report due to shame and fear of social repercussions, hindering timely intervention. Encryption and Anonymity End-to-end encryption and anonymous platforms limit law enforcement’s access to critical digital evidence. Cross-Border Complications Delayed evidence retrieval due to servers hosted abroad and varying international legal frameworks obstruct case progress. Resource & SOP Deficiencies Lack of standardized operating procedures and inadequate specialized training restrict effective investigation of digital sexual offenses.

Remedies to Enhance Investigation and Prosecution Fast-Track MLAT Processes Streamlining Mutual Legal Assistance Treaties for quicker cross-border digital evidence sharing. AI-Driven Detection Tools Implementing tools like PhotoDNA and Project Arachnid for automated detection of CSAM and other illicit content. Specialized Police Units Creating dedicated digital sexual violence units to build expertise and improve investigative outcomes. Training & Sensitization Providing comprehensive training for law enforcement and judiciary on digital sexual crime dynamics and victim sensitivity. National Helpline & Portal Establishing anonymous reporting channels to encourage timely victim support and case registration.