06.01.2015 Views

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

programmers. Over a quarter of offenders (n = 6, 29 percent), however, had little experience with<br />

computers, describing themselves as “point and click” or “rookie” users.<br />

Wolak, Finkelhor, and Mitchell (2005) found in a sample of 429 offenders, law enforcement investigators<br />

described 10 percent of arrestees as extremely knowledgeable about the Internet, 4 percent very<br />

knowledgeable, 40 percent somewhat knowledgeable, and 3 percent not at all knowledgeable.<br />

Steps to Avoid Law Enforcement<br />

There was a large degree of variation in how actively offenders used technology to evade law enforcement<br />

detection. For some, security was an important factor in determining what method to use to download<br />

child pornography. Many offenders recognized the risk involved in peer-to-peer networking. One offender<br />

commented that “serious users” would not use GigaTribe, a P2P network, because they would have to<br />

trust a third party network:<br />

People involved in the trading community are very cautious of this sort of thing. No<br />

matter how good the product looked or the company said, they wouldn’t trust them. (E9)<br />

Another offender believed that trading through IRC was less common, therefore he was less likely to be<br />

caught:<br />

I was always a little bit nervous about it. It wasn’t so much that I thought these places<br />

could be patrolled and others couldn’t. It was the low hanging fruit, so if anyone wants to<br />

get involved in this, it’s the first thing they’ll see and there are so many people there. IRC<br />

was fringe. (E9)<br />

Some offenders felt that uploading images was the most dangerous, since it could attract attention and<br />

enable detection by law enforcement:<br />

I didn’t upload my own images because I was too afraid of law enforcement. I thought<br />

uploading was asking to be arrested—inviting attention to myself and inviting other men<br />

to engage me. (B2)<br />

There is always a risk of law enforcement … If [you are] not posting images, [there is] less<br />

risk than [for] people downloading. When [you] post images, all your IPs go along with<br />

the post. I never posted. (D1)<br />

One offender assumed that downloading large batch files of legal material would mask child pornography,<br />

though he later recognized this large amount of downloading may have actually attracted law<br />

enforcement’s attention:<br />

Respondent: So at the time I would follow that and download a batch, in bulk, and then<br />

in more mainstream [files], there would be illegal things buried within it.<br />

Interviewer: So there were certain ways to get to what was buried<br />

Respondent: Think of a bag of groceries. You have Oreo cookies around the good,<br />

healthy stuff, and then that’s how you’d hide it. You snuck it in there.<br />

Interviewer: So that’s how you would share<br />

Respondent: Yeah, well, that’s how I would download. And so I would hide that in<br />

there, and try to download all those packages to keep it in the background and part of the<br />

low noise. I thought downloading those packages was keeping me safe. But that actually<br />

ended up being more of a red flag to the police. (A6)<br />

Serious traders, those who had developed an extensive collection and close networks, had more advanced<br />

strategies for evading law enforcement. These methods, such as using the Tor network, often required<br />

more technological expertise. One offender, who made money compiling child pornography for<br />

customers, was aware of online law enforcement efforts to stop child pornography and used an<br />

anonymizer service to cover his tracks. He shared, "If you don’t know how to get out there anonymously,<br />

ICAC [Internet Crimes Against Children] is serious” (C6).<br />

263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!