06.01.2015 Views

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

One offender believed he knew what steps were necessary to secure his collection, which he hid as an<br />

encrypted volume to deter detection from law enforcement. From his perspective, a lapse in his process<br />

led to his arrest:<br />

I don’t know if I was just being lazy or what. I knew what had to be done, a certain<br />

amount of maintenance when using encryption. If 99 percent is encrypted and 1 percent<br />

isn’t, might as well have nothing … I understood how forensics work, and knew how<br />

housekeeping had to happen, and I just wasn’t doing it. (E9)<br />

Another offender, who spent ten years collecting child pornography through online search engines, never<br />

took any steps to avoid detection by law enforcement though he was aware of advanced techniques. He<br />

expected to be apprehended since he was not technologically sophisticated:<br />

Interviewer: Did you know you would get caught<br />

Respondent: If you’re computer savvy, probably not. If you’re like me, yes. [There are]<br />

guys that have a computer website and they route it all over the world and when they<br />

finally do find them they are not there anymore. (B1)<br />

To secure their child pornography collections, a third (n = 7, 33 percent) of the sample used encryption or<br />

password protection. This percentage is larger than findings from the National Juvenile Online<br />

Victimization Study, which found that 19 percent of 605 arrested child pornography possessors in 2006<br />

used sophisticated methods to hide images (Wolak et al. 2011).<br />

Networking<br />

For over half the offenders (n = 13, 62 percent), acquiring and sharing child pornography had a social<br />

component. For these individuals, social networking facilitated access to material and created a sense of<br />

community with other child pornography offenders. Jenkins (2001) describes this community as a<br />

subculture with its own values, social hierarchy, and specialized language. In addition to passing down<br />

technological expertise and directing offenders to new sources of child pornography, these communities<br />

also normalize this behavior (Taylor and Quayle 2003). Bourke and Hernandez (2009) point to the role<br />

child pornography cyber-communities play in providing support and social validation. Few studies have<br />

identified the portion of child pornography offenders engaged in online communities. Seto and colleagues<br />

(2010) found that across a sample of 68 offenders, 58 percent participated in online child pornography<br />

communities. The United States Sentencing Commission (2012) reported that approximately 25 percent<br />

of offenders have some level of involvement in online child pornography communities.<br />

Through interviews with 13 offenders, Quayle and Taylor (2002) found that for many individuals, social<br />

relationships were more important than the child pornography images. Surjadi and colleagues (2010),<br />

however, found that function to be absent within their sample of 43 Dutch Internet offenders.<br />

Offenders in our sample pointed to social relationships as an important component of their Internet<br />

activity. Though a sense of community was not the initial impetus to find child pornography, it was a key<br />

part of keeping individuals engaged in offending behavior. One offender valued relationships more highly<br />

than the pornography:<br />

Trading<br />

The pictures were a secondary thing. You traded pictures to meet people. I’d go until I got<br />

a group of people to talk to, then I wouldn’t need to collect so much. (C7)<br />

Sharing child pornography is reciprocal; both parties must provide material to conduct the trade. File<br />

sharing on mIRC generally ensures users give and take equal numbers of files by counting the number of<br />

bytes transferred, though users could inflate the number they shared by renaming duplicate files:<br />

It counts how many bytes [go] back and forth, so you have to trade equally … Duplicates<br />

are hard because people rename the files so they seem like a new file and then trade with<br />

them. Some people rename photos that aren’t that type of file and then just trade it so it<br />

counts as bytes (A11).<br />

264

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!