413047-Underground-Commercial-Sex-Economy
413047-Underground-Commercial-Sex-Economy
413047-Underground-Commercial-Sex-Economy
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
programmers. Over a quarter of offenders (n = 6, 29 percent), however, had little experience with<br />
computers, describing themselves as “point and click” or “rookie” users.<br />
Wolak, Finkelhor, and Mitchell (2005) found in a sample of 429 offenders, law enforcement investigators<br />
described 10 percent of arrestees as extremely knowledgeable about the Internet, 4 percent very<br />
knowledgeable, 40 percent somewhat knowledgeable, and 3 percent not at all knowledgeable.<br />
Steps to Avoid Law Enforcement<br />
There was a large degree of variation in how actively offenders used technology to evade law enforcement<br />
detection. For some, security was an important factor in determining what method to use to download<br />
child pornography. Many offenders recognized the risk involved in peer-to-peer networking. One offender<br />
commented that “serious users” would not use GigaTribe, a P2P network, because they would have to<br />
trust a third party network:<br />
People involved in the trading community are very cautious of this sort of thing. No<br />
matter how good the product looked or the company said, they wouldn’t trust them. (E9)<br />
Another offender believed that trading through IRC was less common, therefore he was less likely to be<br />
caught:<br />
I was always a little bit nervous about it. It wasn’t so much that I thought these places<br />
could be patrolled and others couldn’t. It was the low hanging fruit, so if anyone wants to<br />
get involved in this, it’s the first thing they’ll see and there are so many people there. IRC<br />
was fringe. (E9)<br />
Some offenders felt that uploading images was the most dangerous, since it could attract attention and<br />
enable detection by law enforcement:<br />
I didn’t upload my own images because I was too afraid of law enforcement. I thought<br />
uploading was asking to be arrested—inviting attention to myself and inviting other men<br />
to engage me. (B2)<br />
There is always a risk of law enforcement … If [you are] not posting images, [there is] less<br />
risk than [for] people downloading. When [you] post images, all your IPs go along with<br />
the post. I never posted. (D1)<br />
One offender assumed that downloading large batch files of legal material would mask child pornography,<br />
though he later recognized this large amount of downloading may have actually attracted law<br />
enforcement’s attention:<br />
Respondent: So at the time I would follow that and download a batch, in bulk, and then<br />
in more mainstream [files], there would be illegal things buried within it.<br />
Interviewer: So there were certain ways to get to what was buried<br />
Respondent: Think of a bag of groceries. You have Oreo cookies around the good,<br />
healthy stuff, and then that’s how you’d hide it. You snuck it in there.<br />
Interviewer: So that’s how you would share<br />
Respondent: Yeah, well, that’s how I would download. And so I would hide that in<br />
there, and try to download all those packages to keep it in the background and part of the<br />
low noise. I thought downloading those packages was keeping me safe. But that actually<br />
ended up being more of a red flag to the police. (A6)<br />
Serious traders, those who had developed an extensive collection and close networks, had more advanced<br />
strategies for evading law enforcement. These methods, such as using the Tor network, often required<br />
more technological expertise. One offender, who made money compiling child pornography for<br />
customers, was aware of online law enforcement efforts to stop child pornography and used an<br />
anonymizer service to cover his tracks. He shared, "If you don’t know how to get out there anonymously,<br />
ICAC [Internet Crimes Against Children] is serious” (C6).<br />
263