06.01.2015 Views

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

One offender shared how pressure to confirm his identity as a father led to producing child pornography:<br />

My production started, actually, by meeting guys and saying that I’m a father. They’d say,<br />

“Everyone says that; prove it.” Then over a year and a half, I’d prove it more<br />

inappropriately. (C7)<br />

Another offender initially believed that everyone must be lying about their behavior, since he was making<br />

up stories about his activities:<br />

Part of this whole thing is that you get into a thing where you think people are making<br />

everything up. There aren’t that many people doing that stuff. You get into this thing. The<br />

stuff we were talking about I wasn’t doing. You get into a complacent place, you think it’s<br />

all bullshit. Then all of a sudden you meet someone and it’s not. (C7)<br />

Since trades are reciprocal, offenders would need to possess material of relatively equal “value” to what<br />

they wanted to acquire. One offender began producing child pornography in order to access private<br />

material, which is highly valued:<br />

<strong>Underground</strong> even deeper—people traded private collections [that are] not on the<br />

Internet. In order to see stuff that had never been seen before, [they] needed to offer<br />

something that had never been seen before.” (A10)<br />

Another offender, who used chat rooms to acquire child pornography, felt pressure to produce child<br />

pornography, but he refused out of fear: “I was asked to produce new images, but I was scared. I never did<br />

it” (C6).<br />

Network Size and Growth<br />

None of the offenders reported membership in large networks similar to the notorious “W0nderland<br />

Club,” a child pornography ring which contained approximately 200 carefully screened members across<br />

over thirty countries. To join, members had to proffer 10,000 images (Jenkins 2001). Rather, offenders in<br />

this study tended to have smaller networks, possibly due to the perceived safety in limiting trading<br />

groups.<br />

Eight offenders (38 percent) had small trading groups with whom they regularly traded. These groups<br />

could be based on a specific type of child pornography, but would also be determined by social networks.<br />

While the majority of trading groups were limited to no more than 10 people, one offender, who had been<br />

trading for over ten years, had a larger trading network of 30 to 50 individuals. He believed that due to the<br />

increased number of child pornography collectors, groups have splintered into smaller cells:<br />

I would say the community that were really serious traders, back in 2009, would have<br />

been in the tens of thousands across the world. Even that community is so fractured. Not<br />

only what you’re interested in, but unlike using an AOL chat room or Yahoo, you have to<br />

know someone who knows someone, or know what you are looking for. Because of that,<br />

the individual cells of the community are 30 to 50 people. My specific trading circle was<br />

30 to 50 people at one time. Always new people coming in. (E9)<br />

Groups could grow quickly. As one offender shared, “The first site I went on to, I was the eighth member<br />

and then there were 200 or 300 members on it. It was quick; I remember talking to the guys about it” (I1).<br />

Relationships could be sustained throughout chat rooms and IRC channels, which could change over<br />

time, as explained by one longtime offender: “Sometimes the chat room names would change, but I had<br />

people I was friendly with for years that I would stay in touch with through IRC” (E9).<br />

Hacking Within Networks<br />

Trading groups could also foster competition, especially regarding technological prowess. One offender<br />

had a “friendly” competition with a trading partner to try to crash each other’s computer. Hacking into<br />

another offender’s computer to find child pornography could afford bragging rights and also enable<br />

acquisition of private material:<br />

267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!