06.01.2015 Views

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Law enforcement said they were able to download some of the images from me and I<br />

didn’t know how this happened because it didn’t seem to be part of the program I was<br />

using for them to do that. I clicked the option from file sharing not to share the images. I<br />

wasn’t sending any images back out so I was confused how law enforcement got them.<br />

(F5)<br />

Jenkins’ 2001 (13–14) book quotes a “guru” of the child porn community who says that offenders will only<br />

get caught if they take their computer in to get fixed, send or receive child pornography through their<br />

email, or use IRC for “lolita business.” Jenkins later describes other common ways to get caught: using<br />

mediums such as AOL or attempting sexual contact crimes, such as trying to seduce children through the<br />

Internet.<br />

Eight offenders (38 percent) stated they were caught by law enforcement identifying them through their<br />

file sharing activity through IRC or P2P networks. In five cases (24 percent), they were caught by a victim<br />

or family member turning them in. Three offenders (14 percent) were turned in to law enforcement when<br />

someone in their trading network was caught. One offender (5 percent) was caught when he took his<br />

computer to a repair shop and one offender (5 percent) believed he was caught through facial recognition<br />

software identifying him in child pornography he produced. Three offenders (14 percent) were not sure or<br />

did not share how they were caught.<br />

None of the offenders mentioned sites or programs posing a threat to individuals who use them to trade<br />

child pornography. One offender believed that these sites should be held accountable, since they are<br />

complicit in child pornography activity. In his case, a file sharing program took no action when the<br />

offender was flagged for sharing child pornography. This program later aided the offender by alerting him<br />

that he was under investigation for child pornography, which allowed him time to erase his collection of<br />

images and videos:<br />

One interesting thing about the program I used: I was reported to owners of the program<br />

about a year before I got arrested. I got a designation put on me by the program, for<br />

trading child pornography. But nothing happened. I chatted with a guy, he said that he’d<br />

report me. I don’t know why he did it. I waited and waited and used the program, and<br />

nothing happened. I thought he must not have reported me. Then when I was<br />

investigated, [law enforcement] contacted the program. Then the next day I couldn’t sign<br />

in to the program. The program had a box to find out why I couldn’t log on to the site. I<br />

typed in my name and password and got an email that I couldn’t log in for child<br />

pornography. (C7)<br />

Strategies to Stop Proliferation<br />

Though offenders did not think it was possible to completely remove child pornography from the Internet,<br />

some shared an assortment of tactics that could be used to limit the proliferation of child pornography.<br />

In order to find child pornography websites, one offender suggested the Federal Communications<br />

Commission could block websites known to host child pornography by identifying and blocking their IP<br />

addresses:<br />

The only way the government could clamp it down is if you have the FCC identify that<br />

these sites are maintaining child pornography. They would get a warning. If they didn’t<br />

abide and take it off the servers, you can make lists of IPs that are blocked, could make a<br />

law that all the servers are blocked in the US so you can’t access them … There are first<br />

amendment problems with it, but you don’t allow people to sell drugs on the street, why<br />

would you let people do the same thing on the Internet (A11)<br />

Another recommendation was to track cameras used to produce child pornography images or videos<br />

through their EXIF serial number:<br />

One idea that I had was to search for the EXIF information. A partnership with Google<br />

image search, I don’t know if they could do it through their interface now, but working<br />

with them. Search the Internet for any images that have EXIF serial number that matches<br />

276

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!