413047-Underground-Commercial-Sex-Economy
413047-Underground-Commercial-Sex-Economy
413047-Underground-Commercial-Sex-Economy
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Law enforcement said they were able to download some of the images from me and I<br />
didn’t know how this happened because it didn’t seem to be part of the program I was<br />
using for them to do that. I clicked the option from file sharing not to share the images. I<br />
wasn’t sending any images back out so I was confused how law enforcement got them.<br />
(F5)<br />
Jenkins’ 2001 (13–14) book quotes a “guru” of the child porn community who says that offenders will only<br />
get caught if they take their computer in to get fixed, send or receive child pornography through their<br />
email, or use IRC for “lolita business.” Jenkins later describes other common ways to get caught: using<br />
mediums such as AOL or attempting sexual contact crimes, such as trying to seduce children through the<br />
Internet.<br />
Eight offenders (38 percent) stated they were caught by law enforcement identifying them through their<br />
file sharing activity through IRC or P2P networks. In five cases (24 percent), they were caught by a victim<br />
or family member turning them in. Three offenders (14 percent) were turned in to law enforcement when<br />
someone in their trading network was caught. One offender (5 percent) was caught when he took his<br />
computer to a repair shop and one offender (5 percent) believed he was caught through facial recognition<br />
software identifying him in child pornography he produced. Three offenders (14 percent) were not sure or<br />
did not share how they were caught.<br />
None of the offenders mentioned sites or programs posing a threat to individuals who use them to trade<br />
child pornography. One offender believed that these sites should be held accountable, since they are<br />
complicit in child pornography activity. In his case, a file sharing program took no action when the<br />
offender was flagged for sharing child pornography. This program later aided the offender by alerting him<br />
that he was under investigation for child pornography, which allowed him time to erase his collection of<br />
images and videos:<br />
One interesting thing about the program I used: I was reported to owners of the program<br />
about a year before I got arrested. I got a designation put on me by the program, for<br />
trading child pornography. But nothing happened. I chatted with a guy, he said that he’d<br />
report me. I don’t know why he did it. I waited and waited and used the program, and<br />
nothing happened. I thought he must not have reported me. Then when I was<br />
investigated, [law enforcement] contacted the program. Then the next day I couldn’t sign<br />
in to the program. The program had a box to find out why I couldn’t log on to the site. I<br />
typed in my name and password and got an email that I couldn’t log in for child<br />
pornography. (C7)<br />
Strategies to Stop Proliferation<br />
Though offenders did not think it was possible to completely remove child pornography from the Internet,<br />
some shared an assortment of tactics that could be used to limit the proliferation of child pornography.<br />
In order to find child pornography websites, one offender suggested the Federal Communications<br />
Commission could block websites known to host child pornography by identifying and blocking their IP<br />
addresses:<br />
The only way the government could clamp it down is if you have the FCC identify that<br />
these sites are maintaining child pornography. They would get a warning. If they didn’t<br />
abide and take it off the servers, you can make lists of IPs that are blocked, could make a<br />
law that all the servers are blocked in the US so you can’t access them … There are first<br />
amendment problems with it, but you don’t allow people to sell drugs on the street, why<br />
would you let people do the same thing on the Internet (A11)<br />
Another recommendation was to track cameras used to produce child pornography images or videos<br />
through their EXIF serial number:<br />
One idea that I had was to search for the EXIF information. A partnership with Google<br />
image search, I don’t know if they could do it through their interface now, but working<br />
with them. Search the Internet for any images that have EXIF serial number that matches<br />
276