Top Banner
New Information Technologies and Trafficking for Sexual Exploitation A Study of the Users Strasbourg, France, Dec 2000 Donna M. Hughes
44

New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Jan 16, 2023

Download

Documents

Silvia Dorado
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

New Information Technologies and

Trafficking for Sexual Exploitation

A Study of the Users

Strasbourg, France, Dec 2000

Donna M. Hughes

Page 2: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Prepared For

The Group of Specialists on the Impact of the

Use of New Information Technologies

on Trafficking in Human Beings

for Sexual Exploitation

Committee for Equality Between

Women and Men

Council of Europe

Page 3: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Methods I

Interviews

Law enforcement officials

Researchers of trafficking and child sexual abuse

Computer industry consultants

Reports

Law enforcement officials

Researchers

NGOs

Page 4: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Methods II

Content analysis

Men’s writings in newsgroups, Web sites

Email from men

Original research on the Internet

Most people only had partial information

Page 5: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Organization of Report

The Technologies

Description of features of technologies

The Use of New Technologies

How users/perpetrators use technologies

The Users

Who the users/perpetrators are, their

characteristics

The Challenges

Page 6: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The Technologies New and Old

Old and new technologies are used in combination

Combination of delivery systems Web TV, Satellite cable, Internet and mail

Old images and videos are digitized

Video used to record child pornography, video capture of images for Internet distribution

New technologies increase duplication and distribution

Page 7: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The TechnologiesNew Technologies

Digital Video Disks (DVD)

Interactive capabilities for the viewer

The viewer can choose the version, point

of view, or camera angle

If use of pornography distances and

alienates users from real-life relationships,

sexuality and intimacy, this technology can

exacerbate that

Page 8: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The TechnologiesMulti-Media Formats for Content

Combinations of new technologies and media formats

Still images, videos, CD-ROMS, DVD

Sex industries produce and deliver images and videos in multi-media formats

Content is duplicated and distributed in a variety of ways

Wide, uncontrolled distribution

Page 9: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The TechnologiesSex Industries, Users and Perpetrators

Sex industries, users and perpetrators

have aggressively adopted all new

technologies

Marketing new developments for delivery,

viewing, and increased quality of content

Conceal illegal activities and avoid

detection

Page 10: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The TechnologiesInternet venues

Newsgroups – anonymous, easy to use

1000 illegal images of child pornography

posted on newsgroups each week

Web sites and message boards

Commercial sex industry – large,

sophisticated subscription-base online

clubs and databases of images and videos

Streaming videos

Page 11: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The Technologies

Chat rooms

Accessibility varies: open, private groups with

passwords, one to one communication

No logs maintained

File transfer protocol (FTP)

Allows direct access to files on hard drive

Peer to peer networks

Decentralized, file swapping programs used

with searchable databases

Page 12: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Technologies

Encryption

Page 13: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Online Practices

Practices that advertise sex sites

Spam – unsolicited email

Advertising banners

Free Web sites

Practices that trap viewers

Page jacking or misdirection/false advertising

Mouse trapping

Page 14: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Technologies for Anonymity

Disguise identity for criminal or offensive

activities

Anonymous remailers

Use wireless technologies

Use technologies that don’t use cache files

Combinations of techniques

Page 15: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Use of New Technologies

Page 16: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Traffickers and Pimps

Use mobile phones and pagers to

communicate with and control women and

girls, and for surveillance

Use new technologies to communicate and

coordinate activities

Web sites for advertising women and girls

for use in the production of pornography

Page 17: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Traffickers/Stalkers Contacting

Victims

Perpetrators contact victims in Internet

forums

Contact adults, physically meet and assault

them

Contact children, engage in sexually

inappropriate chat, send pornography, entice

the child into sending sexually explicit

photographs of self, and physical meetings

Page 18: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Traffickers recruiting victims

Post job advertisements on Web sites in

Eastern European countries

Email messages sent out in Brazil

recruiting women to go to Spain

Page 19: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Stalking children in chat rooms

Numerous cases of perpetrators

contacting and luring children from chat

rooms

Some cases indicate that they may be

ways traffickers recruit victims

Page 20: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Commercial child pornography

Newsgroups and password protected

bulletin boards have been sites for

advertisements for children to use in

pornography

Trafficking children in Russia for the

commercial production of child

pornography for Western market

Page 21: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Pimping women on the Web

Use of Web pages to advertise brothels

Photographs of women are included

Men communicate with pimps and make

“appointments” with women through

Web sites, email and chat rooms

Men can post “reviews” of the specific

women’s “performances”

Page 22: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Peer communication

Men exchange information on where to find

women

Newsgroups, Web sites, and chat rooms

Several public newsgroups dedicated to

finding and “reviewing” women in

prostitution

These writing contain information that

indicates the women may be trafficked

Page 23: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Transmission of Images,

Videos and Live Broadcasts

The number of pornographic video clips

and live broadcasts is increasing

Women are smuggled/trafficked for live

broadcasts

Rape and torture images and videos

Audio and video clips make the content

more vivid

Victimization and revictimization

Page 24: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The Users

Page 25: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Analysis of Child Pornography Collectors

Analysis of collectors of child pornography

Use computer to meet at virtual community of

like minded people

An important psychological process directly

connected to acquiring technological skills

Collector is empowered by collecting, sexual

satisfaction, computer skills and supportive online

community

“Functional addiction”

Page 26: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Characteristics of Collectors of

Child Pornography

Age range 13-65

Preference for white children

More images from Eastern Europe

Page 27: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Collectors of Pornography

Collector spends large amount of time with

their collection

Labeling

Categorizing

Collecting series of images

Printing out hard copies of favorite images

Technology facilitates these types of

activities

Page 28: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Collectors of Pornography

Progressive interactive contact with

other users

Start with downloading images with no

contact with others

Escalate to interacting with other collectors

in chat rooms

Interaction with others requires trading, so

escalate to distribution

Page 29: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

CollectorsProgressive Activity

Collecting is progressive in content and

technologies used

Start off collecting adult pornography, then

escalate to child pornography

Start off with still images from newsgroups

and Web sites, then escalate to movie clips

Increasingly sophisticated technologies

Increasingly harmful offender behavior

Page 30: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Collectors

Need large computer storage – extra

hard drives and external storage

Used other people’s computers

Page 31: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Collectors

How much of what is known about child

pornography collectors applies to adult

pornography collectors?

Page 32: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Stalkers

Sex offenders engage children online

Sexual talk

Audio and visual interactions online

Meetings

Ages 17-56, maybe 50% of online

solicitations come from other adolescents

Travel to meet children, or send children

money ticket to travel to meet them

Page 33: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Stalkers

Most are collectors of child pornography

Higher proportion of sadistic offenders

Page 34: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Buyers Who Write on the Internet

Traveling businessmen

Local men reporting on prostitution

Male students

They say they consult newsgroups and

Web sites before they travel and print

out information on prostitution

Write to relive the sexual experience

Page 35: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Producers of Child Pornography

All producers of child pornography, are also collectors

Ages 26-53

Producers secretly photograph children

Producers distribute images of children they sexually abuse

Perpetrators send digital cameras for live transmission over the Internet to children they contact online. The perpetrators use video capture equipment on their end.

Page 36: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Commercial Production of

Child Pornography

Eastern European countries

Slavic children for predators who prefer

white children

Poverty, unemployment

Increase in street children who can be

victimized

Laws on producing and distributing

pornography, even child pornography are

weak

Page 37: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Adult Pornography

High profit industry

Moving from the control of organized crime

to large businesses

Budapest, pornography production is

considered part of free market economy

Competition on the Internet resulted in

rougher, more violent, degrading images

and videos

Page 38: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Trafficked Women and

Children in Pornography

Known cases of the use of trafficked

children for the making of pornography

Russia and Hungary

Numerous cases of the use of trafficked

women in prostitution

How many trafficked women are used in

the making of pornography???

Page 39: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The Consumers

“A major weakness in contemporary

work in this area is that it does not

consider how individual consumers use

and understand pornograph[y]…nor

does it acknowledge their choice,

responsibility and accountability for their

behaviors.”

Page 40: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Unintended Users

Pornographic material is pervasive; it is

difficult to avoid it

Sex industry uses aggressive techniques to

get and keep pornography in front of

viewers

Spam

Advertising on search engines

Page jacking or misdirection

Mousetrapping

Page 41: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Future Users

Teenagers learn social norms and attitudes

through new media

Page 42: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

The Challenges

Page 43: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Challenges

Diversity of attitudes and laws concerning

prostitution and pornography (and

trafficking)

Denial of the harm

Sexual exploitation has been normalized

Lack of empathy for victims

No standards (legal or moral) to evaluate

or understand images

Page 44: New Information Technologies and Trafficking for Sexual Exploitation: A Study of the Users

Challenges

Disconnection between the acts and the

images

Child pornography: The image is evidence

of abuse

To change attitudes and laws so that

freedom of expression is protected, but

protects rights of people to be free of

trafficking and sexual exploitation