Hastings Women’s Law Journal
Volume 13
Number 1 Symposium Issue: Sexual Slavery: the
Trafficking of Women and Girls into the United States
for Sexual Exploitation
Article 9
1-1-2002
The Use of New Communications and Information
Technologies for Sexual Exploitation of Women
and Children
Donna M. Hughes
Follow this and additional works at: https://repository.uchastings.edu/hwlj
Recommended Citation
Donna M. Hughes, The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children, 13
Hastings Women's L.J. 127 (2002).
Available at: https://repository.uchastings.edu/hwlj/vol13/iss1/9
This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in
Hastings Women’s Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact
wangangela@uchastings.edu.
The Use of New Communications and
Information Technologies for Sexual Exploitation
of Women and Children
Donna M Hughes·
1. INTRODUCTION
New communications and information technologies have created a
global revolution in communications, access to information, and media
delivery. These new communications and information technologies are
facilitating the sexual exploitation of women and girls locally, nationally
and transnationally. The sexual exploitation of women and children is a
global human rights crisis that is being escalated by the use of new
technologies. l Using new technologies, sexual predators and pimps stalk
women and children. New technical innovations facilitate the sexual
exploitation of women and children because they enable people to easily
buy, sell and exchange millions of images and videos of sexual exploitation
of women and children.
These technologies enable sexual predators to harm or exploit women
and children efficiently and, anonymously. The affordability and access to
global communications technologies allow users to carry out these
activities in the privacy of their home.
The increase of types of media, media formats, and applications
diversifies the means by which sexual predators can reach their victims.
This paper will not attempt to categorize all the types and uses of this new
technology. However, this paper will describe the most common and
newest of these technologies, and how they are used for the sexual
exploitation of women and children?
• Professor in the Women's Studies Department, Eleanor M. and Oscar M. Endowed Chair,
,
University of Rhode Island.
1. For the purpose of this paper, I use the term "sexual exploitation" to refer to
trafficking for purposes of sexual exploitation, commercial sex acts, such as prostitution,
pornography, and live sex shows, stalking for purposes of sexual assault or abuse, and all
forms of child sexual abuse.
2. This paper is not about strict legal definitions, nor is it about the law. In fact, many
experiences of women and children fall into gray areas, mther than conform to existing
definitions. Also, much of the research on sexual exploitation and the Internet focuses on
HASTINGS WOMEN'S LAW JOURNAL
127
128
HASTINGS WOIvlEN'S LAW JOURNAL
[Vol. 13:1
II. NEW AND OLD TECHNOLOGIES COMBINED
Older technologies, like television and cable are now combined with
modern technologies to create new ways of delivering information, news,
and entertainment.3 Web TV combines the television with the Internet.4
New cable networks use satellite transmission to deliver hundreds of
channels and pay-per-view delivers content on demand. 5
Presently, there is a high demand for pornographic videos, through
mainstream communication networks such as cable TV. 6 Only one of eight
major cable companies in the United States does not offer pornographic
movies.? Satellite and cable companies say that the.more sexually explicit
the content the greater the demand. 8 ADULT VIDEO NEWS reports that
pornography offerings on TV by satellite or cable are increasing video store
sales and rentals, not decreasing them, as might be expected.9 The
explanation is that pornography on TV is advertising pornography and
fmding new buyers. 10 The mainstreaming of pornography is increasing the
exploitation or abuse of women and children used in making
pornography. 11 According to Paul Fishbein, owner of ADULT VIDEO
NEWS, anything sells:
There are so many outlets [for the videos] that even if you spend
just $15,000 and two days - and put in some plot and good-looking
people and decent sex - you can get satellite and cable sales. There
are so many companies, and they rarely go out of business. You
have to be really stupid or greedy to fail. 12
Another producer said:
[A]nyone with a video camera can be a director - there are
countless bottom feeders selling nasty loops on used tape.
images, and the people in the images are rarely available for interviews to describe their
experiences, their consent or coercion, their freedom or slavery. The extent to which the
experiences of these women and children meets existing legal criteria for crimes is beyond
the scope of this article.
3. DONNA M. HUGHES, THE IMPACT OF THE USE OF NEW COMMUNICATIONS AND
INFORMATION TECHNOLOGIES ON TRAFFICKING IN HUMAN BEINGS FOR THE SEXUAL
EXPLOITATION; A STUDY OF THE USERS (report submitted to the Group of Specialists on the
Impact of the Use of New Infonnation Technologies on Trafficking in Human Beings for
the Purpose of Sexual Exploitation, Committee for Equality Between Women and Men, The
Council of Europe, May 200 I).
4. Id.
5. Id.
6. Kenneth Li, Silicone Valley: Porn Goes Public, THE INDUSTRY STANDARD, Nov. 6,
2000, at http://www.thestandard.com/article/display/0.1151.19696.00.html (last visited Mar.
22,2002).
7. Frank Rich, Naked Capitalists, N.Y. TIMES (Magazine), May 20,2001, at 51.
8. Id.
9. Id.
10. Id.
II. Id.
12. Id.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
129
Whatever the quality or origin of a product, it can at the very least
be exhibited on one of the 70,000 adult pay Web sites, about a
quarter of which are owned by a few privately held companies that
slice and dice the same content under different brands. 13
As a result of the huge market on the web for pornography and the
competition among sites, the pornographic images have become rougher,
more violent, and degrading. 14 One producer claimed that there were "no
coerced" performances in pornography videos, although she immediately
acknowledged that "there are little pipsqueaks who get their disgusting
little (misogynistic) videos out there."ls The "misogynistic porn" this
producer refers to involves degrading images, such as ejaculation on the
woman's face, real pain, and violence against women that results in
physical and emotional injuries. 16
In the last ten years, some American and European pornography
producers have moved to places such as Budapest, Hungary because of the
availability of cheap actors from Eastern and Central Europe. 17 Budapest is
a destination and transit city for women trafficked from Ukraine, Moldova,
Russia Romania, and Yugoslavia. IS There are hundreds of pornographic
films and videos produced each year in Budapest. 19 Budapest is now the
biggest center for pornography production in Europe, eclipsing rivals such
as Amsterdam and Copenhagen?O Most Western European producers of
sex videos use Eastern European actors whenever possible?1 An executive
at Germany's Silwa production company explained: ''They cost less and do
two or three
more. Even excruciating or humiliating acts usually cost on~y
hundred dollars.,,22
The postal service, traditionally the most anonymous and popular way
to transmit pornography, is still used by collectors and producers of child
pornography to distribute the pornography.23 Now, sending materials
through the mail is combined with internet technology.24 Raymond Smith,
13. Rich, supra note 7.
14. ld.
15. ld.
16. Martin Amis, A Rough Trade, GUARDIAN UNLIMITED, Mar. 17, 2001, at
http://www.guardian.co.ukIArchive/Article/0,4273,4153718,00.html (discussing the highrisk, increasingly violent world of the pornography industry) (last visited Mar. 22, 2002).
17. Natasha Singer, Blue Danube, at http://www.nerve.comIPhotographylPlachy/
BlueDanubel (last visited Feb. 25, 2001) (on file with author).
18. Fedor Lukyanov, "Alive Goods" Is Flow From the East, ROSSIYSKAYA GAZETA, at
http://www.rg.rulenglish/eco_soyuzl03_11_1.htm(last visited Mar. 23, 2002).
19. Singer, supra note 17.
20. To Its Buyers and Sellers, The Sex Trade is Just Another Busine$$, at
http://www.pirko.delEnglisch!lustiglSex.html (last visited Mar. 23,2002).
21. The Sex Industry: Giving The Customer What He Wants, THE ECONOMIST, Feb. 14,
1998, at 21.
22. !d.
23. Interview with Raymond Smith, Fraud, Child Exploitation and Asset Forfeiture
Group, Office of Criminal Investigations, U.S. Postal Inspection Service (May 7, 2001).
24. ld.
130
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
u.s. Postal illspection Service, who handles hundreds of cases of child
pornography, has found that the rise in internet use by sexual predators has
also increased their use of the U.S. mai1.25 He said that from the time they
fIrst started investigating child pornography in the early 1980s until fIve
years ago, they have almost eliminated the distribution of child
pornography?6 But since the internet became publicly available, the
number of cases connected to the internet has steadily increased?7 ill 1998,
32 percent of cases were related to internet.28 ill 1999, 47 percent were
internet related, and in 2000, 77 percent of the child pornography cases
were internet related.29
Producers of child pornography advertise their videos on the internet
and distribute them through the mai1. 30 Men in chat rooms trade small
fIles, still images and short movie clips on the internet, but longer movies
are sent by mai1. 31 Stalkers talk to children in chat rooms, ask them to take
pictures of themselves, and send them through the mai1. 32 When stalkers
convince children to travel to meet them, they send them bus and plane
tickets through the maie 3
Scanners and video digitizers are used to tum old pornographic images,
fIlms, and videos into electronic formats that can be uploaded the internet.34
About half of the child pornography online is old images from fIlms and
magazines produced in the 1960s and the 70S.35 Digital cameras and
recorders enable the creation of images that do not need professional
processing, thereby eliminating the risk of detection. 36 These new types of
equipment also make it technically easier for people to become producers
of pornography.37 Digital media formats are not static nor independent.38
One format can be quickly converted into another. 39 Videos are still the
primary production medium for child pornography, and the still images for
the illternet are produced from video captured images.40 From one video,
25. Id.
26. !d.
27. Id.
28. !d.
29. Interview with Raymond Smith, supra note 23.
30. !d.
31. Id.
32. !d.
33. Id.
34. James F. McLaughlin, Cyber Child Sex Offender Typology (2000), at
http://www.ci.keene.nh.us/policeffypology.html.
35. !d.
36. !d.
37. Donna M. Hughes, Pimps and Predators on the Internet - Globalizing Sexual
Exploitation of Women and Children (Apr. 1999), available at http://www.uri.edulartscil
wms/hugheslpprep.htm.
38. !d.
39. Id.
40. Max Taylor et al., Child Pornography, The Internet and Offending, ISUMA: CAN. J.
POL'y REs., Summer 2001, at 94.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
131
200-300 still images can be captured, and then uploaded to a newsgroup or
to a web site.41 According to the COPINE (Combating Paedophile
Information Networks in Europe) Project, production of child pornography
still combines older methods of production, while using new internet
technologies for distribution.42
It is safe to say that the number of manufactures [producers of
child pornography] has increased over the years with the
availability of new medium. Home development of black and
white 35MM film, self-developing Polaroid film, video cameras,
camcorders, computer scanners, CUseeme technology [live video
and audio transmission] and now computer cameras (including
video) have made child pornography easier and easier to produce
and reproduce.43
One police analyst noted that prior to the internet the majority of
collectors of child pornography were not distributors because duplication
technology was not readily available.44 Now, making copies of image files
"involves a few clicks of any computer mouse allowing for effortless
distribution.'.4S Therefore, collectors of child pornography have quickly
and easily become distributors.
ill. NEW TECHNOLOGIES FOR SEXUAL EXPLOITATION
A. DIGITAL VIDEO DISK
One new technology is Digital Video Disk (DVD), which provides
high quality videos and interactive capabilities for the viewer.4 While
making the videos, scenes can be shot from multiple angles, and all points
of view can be added to a CD ROM.47 The viewer can then choose the
version, point of view, or camera angle he/she prefers.48 Viewers can
watch the movie in chronOlogical order, moving from one character to the
next, or watch the movie from one character's point of view.49 Viewers
can interact with DVD movies in much the same way they do with video
games, giving them a more active role.so According to one producer:
If a viewer wants something different, we give it to him. The
viewer can go inside the head of the person having sex with [name
41. !d.
42.
43.
44.
45.
46.
47.
ld.
Mclaughlin, supra note 34.
ld.
ld.
Karen Kaplan, Pushing Porn On DVDs, L.A. TIMES, Jan. 9, 2001, at AI.
ld.
48. ld.
49.ld.
50. ld.
132
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
deleted], male or female. He can choose which character to follow.
He can re-edit the movie. It's a great technology.51
The following is a description of a recent pornographic movie recorded on
DVD:
Chasing Stacy from VCA Labs, is a choose-your-own-adventure
flick that follows Stacy the porn star as she signs autographs,
drinks coffee, works out at the gym and takes a shower. At various
points, a small green icon appears in the corner of the screen and
Stacy looks straight at the camera. That's when viewers get the
chance to ask Stacy out on a virtual date by pressing the Enter
button on the DVD remote control. The date scenes are filmed so
that the viewer feels like he's sitting directly across a glass table
from Stacy, who provides insights into her personal life. Later, the
viewer can select whether to take Stacy back to her house, to her
office, or to another locale for a tryst. With the remote control, the
details can be chosen as the action unfolds. 52
I
The pornography producer, VCA, released this DVD in July 2000 and
sold more than 12,000 copies by January 2001, making it the fastest selling
title they have. 53
Although technologies like this have many applications and enable
creativity and interactivity, when used in pornographic films, these raise
the question of the impact on people, their relationships, and expectations
about relationships. A portion of men who use pornography and seek out
women in prostitution do so either because their lack of social skills or their
misogynistic attitudes prevent them from establishing relationships with
their peers.54 Technology such as this may further distance and alienate
some men from meaningful and realistic relationships.55
There are a number of venues and media formats with different
technologies for the transfer of files and communications, including Usenet
newsgroups, World Wide Web, e-mail, live synchronous communication
(text and voice chat), bulletin or message boards, Web cams for live
transmission of images or videos, live video conferencing (live video chat),
streaming video, peer to peer servers, and file sharing programs.56 All
forums and applications offer ways to engage in the sexual exploitation of
women and children.57
How each is used for sexual exploitation depends on the legality of the
51. Rich, supra note 7.
52. Kaplan, supra note 46.
53. ld.
54. Joe Parker, How Prostitution Works, at http://www.prostitutionresearch.com/parkerhow.html (last visited Mar. 23, 2002).
55. HUGHES, supra note 3.
56. ld.
57. ld.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
133
activity, which varies from country to country, the techniques adopted by
the sex industry or individual users, and the level of privacy or secrecy
attempted by the users. 58 Perpetrators have taken advantage of new
technologies and applications to stalk victims, transmit illegal materials,
and avoid detection by law enforcement.59 According to one official: "If it
can be done, they're doing it.,,60
B. NEWS GROUPS
Usenet news groups are still popular sites for the exchange of
information on how to fmd women and children for sexual exploitation.61
Although much media attention is given to child pornography rings and
cases that use sophisticated technologies to keep their activities secret, such
as the Wonderland Club that used a Soviet KGB code to encrypt all its
communications, the older public newsgroups are still commonly used to
upload and download child pornography.62 The COPINE Project reports
that over 1000 child pornographic images are posted on news groups each
week. 63
C. WEB SITES
Web sites are used in various ways to assist in the sexual exploitation
of women and children. Web sites are the most popular venue for the
distribution of pornography online. Large legal sex industry businesses
have sophisticated web sites with subscription fees that bring in millions of
dollars per year. 64 There are also tens of thousands of free pornography
sites that are maintained by amateurs or someone making a relatively small
amount of money from advertising banners for larger sites and
businesses.65 Web sites offer streaming videos that can be viewed with
web browser plug_ins. 66 The most recent versions of web browsers (e.g.
Internet Explorer, Netscape) come packaged with these plug_ins.67
Pimps and traffickers use the web to advertise the availability of
women and children for use in making pornography.68 One example
includes prostitution tourists and Western producers of pornography who
have been traveling to Latvia since the early 1990s to :fip.d vulnerable
58. Hughes, supra note 37.
59. Id.
60. Interview with Glenn Nick, U.S. Customs Smuggling Ctr. (May 17,2001).
61. Taylor et aI., supra note 40.
62. Stuart Miller, Technological Level of Wonderland Network Shocked All Investigators,
IruSHTlMES, Sept. 3,1998, at 15.
63. Taylor et. ai., supra note 40.
64. Donna M. Hughes, The Internet and Sex Industries: Partners in Global Sexual
Exploitation, IEEE TECHNOLOGY & SOCIETY MAGAZINE, Spring 2000, at 35.
65. Id.
66. Id.
67. HUGHES, supra note 3.
68. Hughes, supra note 37.
134
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
children and young adults to sexually exploit in their videos. 69 In August
1999, the Vice Police in Latvia initiated criminal proceedings against the
owners of Logo Center, a "modeling agency," for production of
pornography and the use of minors in the production of pornography.70
The two managers of the Logo Center provided women and children to
foreign prostitution tourists and foreign pornography producers.71 They
had several web sites72 with pornography, information about minors, and
photographs of their "models" in different sex acts. 73 During the time these
pimps operated they exploited approximately 2000 women, men, girls and
boys, resulting in 174 juveniles relying on prostitution for their basic
livelihood.74
The Logo Center supplied women and children for pornography
production in other countries. In one case they supplied "porno models" to
a Swedish pornography producer who made videos in Finland.75 The Logo
Center Web site had links to other sites with bestiality and child
pornography.76 After being arrested, the two owners were charged with
distribution of child pornography.77
Pimps also use web sites to advertise their brothels or escort services
directly to men. 78 These sites are often used to attract foreign businessmen
or tourists. 79 The following is from a web site in Prague, Czech Republic:
Would you like to spend an exciting night in Prague with a
beautiful young girl? She will do everything for your pleasure.
She will make you happy with kissing you on your mouth, French
sex and sexual intercourse. During your stay, you can visit the
"Golden City" with your girl. The girls are pupils and students,
who are fmancing th~ir
education. 8o
Increasingly, prostitution web sites include photographs of the women,
sometimes nUde. 81 This practice exposes women, identifying them to the
public as prostitutes. 82 Many of the photographs look like modeling
69. Personal Communication with Valdis Pumpurs, Head of the Criminal Police of Latvia
(May 2001).
70. /d.
71. /d.
72. Web site uris: logosagensy.com, pronorussian.nu, marige.nu, and logosagensy.nu.
(These web sites are no longer available on the internet) (on file with author).
73. Personal Communication with Valdis Pumpurs, supra note 69.
74. /d.
75. Id.
76. Id.
77. /d.
78. Hughes, supra note 37.
79. /d.
80. Milas Holiday and Escort Service in Prague, http://www.prag-girls.de/framehallo.htm, (last visited Apr. 21, 2001, web site no longer available online) (on file with
author).
81. Hughes, supra note 37.
82. /d.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
135
photographs, and the women may never have intended for those
photographs to be used to advertise them as prostitutes.83 Some of the
women may not even know their photographs are on web sites. Women
suffer from the stigma placed on them for being in prostitution.84 This
public display and labeling further harms women in prostitution.85
Web based message boards and bulletin boards are increasingly
popular for an exchange of information by perpetrators of sexual
exploitation.86 They are used in much the same way as newsgroups, but
can be private and protected by passwords.87 Using these applications, men
can book sex tours and "appointments" with women through the web, email and chat rooms. 88
Message boards on brothels' web sites enable men to post "reviews" of
the women for other men, and communicate with pimps about the women's
appearances and "performances.',s9 On sites where the women's photos are
displayed, men can evaluate the women: 90
Alina's new photos indicate that she has gained some extra
weight!! Please advise what is her weight currently. Thanks and
regards ....91
Another example includes:
Dear Milla:
What happened to Alina? She seems that she gained some weight
since the last time she was with you. She must not be 52Kg as
written on her page. Please advise her exact weighl92
Men use message boards to make reservations for their upcoming
visits.93 A Web site for a brothel in Prague, Czech Republic had the
following message and request:
Hallo Mila! I found your page on the Internet.
I'm going to Prague this summer and probably will visit your
establishment. How long time before do one have to make
reservations? Could you please put out som more photos of the
83. HUGHES, supra note 3.
84. See generally COALmON AGAINST TRAmCKlNG IN WOMEN, MAKING THE HARM
VISIBLE: THE GLOBAL SEXUAL EXPLOITATION OF WOMEN AND GIRlS (Donna M. Hughes &
Claire M. Roche eds., Feb. 1999).
85. Hughes, supra note 37.
86. HUGHES, supra note 3.
87. ld.
88. ld.
89. Milas Holiday and Escort Service in Prague, supra note 80.
90.ld.
91. ld.
92. ld.
93. ld.
136
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
girls. Is there also possible to have analsex with the girls if you
stay overnight? See you! lPeter94
Another posting included:
I understand from our talk, by telephone you have, 6 girls our
more, A IT the time, girls are from Ukraine. I will be in Praha, late
August 2000, So I will arrive to Praha, late at night, if I remember
rite, me flights is from Iceland to Copenhagen and from
Copenhagen to Praha. do you have some taxi our pick up from the
airport? I wold like to stay in your house the first 2 nights when I
am testing your girls after that I will know which of your girls I
like. I will chosen one of them to stay in me hotel four 2 nights, so
I will have one of your girls, one hour at the time in your house
before I chosen which one I chosen to stay with me in me hotel, is
that ok with you? I understand you have 6 girls, I wold prefer to
have sex with all ofthem, and then chosen one of the to stay in me
hotel four 2 night after thatch, is thatch ok with you? Are your
girls shaved? Ragnar ....95
Web sites are also used to market images and videos of rape and
torture. 96 Slave Farm, a web site registered in Denmark, claims to have the
"world's largest collection of real life amateur slaves:,97 Men are
encouraged to "submit a slave to the picture farm." The images include
women being subjected to sexual torture, bondage, and fetish sadism.98
Description of images include: "needle torture," "hot wax," "extreme
hogtie," "hanging bondage," "tits nailed to board," "drunk from the toilet,"
and "pregnant bondage.,,99 Live chat is available where men can
"command the bitches."loo A number of images are available free, but full
access requires payment of a SUbscription fee. lOl The women in the images
and videos are visibly injured, with cuts, burns, bruises, welts, and bleeding
wounds. lo2
Another web site registered in Moscow, Russia advertises itself as "the
best and most violent rape site on earth.,,103 It claims to have "Several
Hunders [sic] of rape picS."l04 Subscribers are offered 30,000 hardcore
94. ld.
95. Milas Holiday and Escort Service in Prague, supra note 80.
96. Hughes, supra note 37.
97. SLAVE FARM, at http://www.slavefarm.com(lastvisitedMar. 19,2002) ("the world's
largest amateur BDSM site").
98. ld.
99. ld.
100. ld.
101. ld.
102. ld.
103. http://www.borov.com (last visited Feb. 26, 2001; web-site no longer links to this
material) (on file with author).
104. ld.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
137
porn images, 500 online video channels, and 100 long, high quality
videos. !Os There are images and videos of "violent rapes, ass rapes, mouth
rapes, gang rapes, nigger rapes, tom vaginas, and tortured clits."lo6 A free
13 MB video and audio movie can be downloaded in 12 segments, each
about 1 MB.107 The film shows a hooded perpetrator raping a woman in an
office. !Os
Previously, few people had access to such extreme material. I09 As one
consultant explained,
[f]ormerly men used to have to remove themselves from their
community by three levels [to find extreme, violent pornography].
First, they had to go somewhere, physically, then know where to
go, and then know how to find it. The Web makes it very easy to
get that far removed very quicldy."llo
The resurgence of child pornography through the internet is a priority
for some law enforcement agencies, resulting in unparalleled international
cooperation to break up the rings. 111 In contrast, the pornography of adults
and post adolescent teens has been ignored. 1I2 In the United States and
Europe, there are very few cases of prosecution of producers of adult and
post adolescent teen pornography.
A lot of the pornography is extremely misogynistic, with women
portrayed as seeking and enjoying every type of humiliation, degradation,
and painful sex act imaginable. ll3 Women and children are harmed
physically, sexually, and emotionally in the making of pornography.1l4
Although, there is less information about women in pornography, it is
likely that many women are coerced into making pornography just as they
are coerced into prostitution. In addition, by filming the violence and sex
crimes against women and post adolescent teens, thereby turning it into
pornography, images of these violent crimes can be distributed publicly on
the internet ,vith no consequences to the perpetrators. I IS
The percentage of degrading, violent, misogynistic pornography
105.
106.
107.
108.
109.
/d.
ld.
ld.
ld.
Interview with Jeff Middleton, Computer Focus (May 17,2001).
110. /d.
Ill. HUGHES, supra note 3.
112. ld.
113. Id.
114. Liz Kelly & Dianne Butterworth, Address at the Journal of Information Law and
Technology's event entitled, Policing the Internet: First European Conference on Combating
Pornography and Violence on the Internet (Feb. 14, 1999) (for a description, see Yarnan
Akdeniz, Po/icing the Internet - Conference Report, 1 J. INFO. 1. & TECH (1999), available
at http://elj.warwick.ac.ukljiltiConfS/97_1pollakdeniz.doc); IN HARM's WAY: THE
PORNOGRAPHY CNIL RIGHTS HEARINGS 39-199 (Catharine A. MacKinnon & Andrea
Dworkin eds., 1998) [hereinafter IN HARM'S WAY].
115. HUGHES, supra note 3.
138
HASTINGS WOMEN'S LAW JOURNAL
[Vol13:1
continues to increase, and the images and videos become more readily
available. 1l6 However, there doesn't seem to be anything new in the
content of pornography; perpetrators have always raped and tortured
women and children in the making of pornography.II7 What is new is the
volume of pornography produced and the fact that an average person with a
computer, modem and search engine can find violent, degrading images
within minutes, a search that could have taken a lifetime, just fifteen years
ago. The increase in video clips with audio and streaming video makes the
action and harm come alive. ll8 New techniques, such as shockwave flash
movies, enable the creation of animated videos. ll9 Skilled amateurs can
create snuff films for distribution on the Web: 20 One person I interviewed
said that "[wlith virtual film, it is possible to produce a snuff film from
animation, but very difficult to tell it is not real. Now, we are limited only
by our imaginations. There is nothing that can't happen on the Web."l21
D. CHATROOMS
Real time synchronous communication, or "chat," is a popular means
of communication on the internet. Ill Chat is available through Internet
Relay Chat (IRC) channels, Instant Messaging, such as ICQ, Web based
chat sites which are accessed through browsers, Multi-User Dimension
(MUD) or Multi-User Simulated or Share Hallucination (MUSH)
programs. 123 There are over 100,000 chat rooms available to users
worldwide. I24 Some of these formats and the ''rooms'' users create are open
to the public, some are private and require passwords, and others are used
for one to one communication. I25 No messages are archived or stored and
no log files are maintained, as is done with e-mailsorwebaccesses.so
stalkers use them to look for victims without the danger of being traced by
law enforcement authorities. 126 There have been numerous cases in the
United States and the United Kingdom, where predators contact children
for both online and physical meetings. I27 Often, during these meetings, the
children are emotionally and sexually abused. 128 There have also been
numerous cases of online stalking of adults that began with conversations
116. See generally IN HARM's WAY, supra note 114.
117. HUGHES, supra note 3.
118. ld.
119. Interview with Jeff Middleton, supra note 109.
120. !d.
121. ld.
122. INTERNET CRIME FORUM, INTERNET RELAY CHAT SUB-GROUP, CHAT WISE, STREET
WISE:
CHILDREN
AND
INTERNET
CHAT
SERVICES
(Mar.
2001),
at
http://www.intemetcrimefomm.org.uklchatwise_streetwise.html (last visited Mar. 23, 2002)
[hereinafter INTERNET CRIME FORUM]'
123. !d.
124. ld.
125. ld.
126. ld.
127. ld.
128. INTERNET CRIME FORUM, supra note 122.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
139
in chat rooms, which led to physical meetings that turned into sexual
assaults,I29
In chat rooms, perpetrators engage children in sexual conversation or
expose them to sexual material, including adult and child pornography,I30
Predators sexually exploit children online through this sexual talk,I31
Perpetrators ask children to send them pictures or sexual images of
themselves or their friends. 132 They may encourage the children to perform
sex acts on themselves or friends for the stalker's sexual satisfaction. 133
Stalkers use these activities as part of a grooming process to entice children
into more direct contact, such as telephone conversations and eventual
physical meetings. 134
When the child stalkers use voice chat the predators and stalkers
encourage the children to get headphones to reduce the risk of someone
else in the house hearing the voices. 135 They suggest that children get web
cameras for their computers and move their computers to their bedrooms
where the stalker can encourage sexual touching and masturbation while
they watch via a Web cam. 136
A typical ruse employed by paedophiles is when the predator asks
the victim what she is wearihg, This is usually followed by asking
her to take something off such as her underwear. The more
cunning paedophile will say something more innocuous like 'do
you enjoy taking showers,' swiftly followed by 'do you touch
yourself in the bath?' It is also commonplace to ask the girl if she
has pubic hair in order to build up a mental picture of her level of
physical maturity. The intention of most paedophiles is to engage
the girl in cybersex activities. 137
In one transnational case, Franz Konstantin Baehring, a thirty-sevenyear-old German man living in Greece, contacted a fourteen-year-old girl
from Florida in a chat room. 138 He followed his Internet communication
with letters by mail and telephone calls. 139 After a year of corresponding,
he convinced the girl to run away from home and travel to Greece. 140 To
assist the girl in leaving her home, Baehring contacted a woman at a mobile
129. Karamjit KaUf, More Internet Date Rapes, SlRAlTS TIMES (Singapore), Feb. 28, 2001;
Tom Gardner, AsSOCIATED PRESS, Feb. 19,2001; Conal Urquhart, Killerspreadhi's Rape
Fantasies on the Internet, THE TIMEs (London), Oct. 4, 2000.
130. INTERNETCRIMEFoRUM,Supranote 122.
131. ld.
132.
133,
134.
135.
136.
137.
138.
139.
140.
ld.
ld.
/d.
/d.
INTERNET CRIME FORUM, supra note
122.
ld.
Interview with April Hindin, Postal Inspector, Tampa, Fla. (May 15, 2001).
ld.
ld.
140
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
phone store and convinced her to assist an "abused girl in leaving home.,,141
The woman met the fourteen-year-old, gave her a programmed cell phone
and drove her to a local airport. 142 The girl flew to Ohio, where Robert
Arnder, a convicted child pornographer and one of Baebring's contacts,
assisted the girl in getting a passport and leaving the United States:
Baehring paid Arnder $2000 dollars for his assistance. 143 Police were able
to trace the girl's travels and her contacts by examining the e-mail
messages left on her computer at home. 144
Upon investigation of Robert Arnder, who assisted the girl in Ohio,
they found that Arnder had pornographic images and videos of his own
thirteen and seventeen-year-old daughters on his home computer. 145 He
had sexually abused his daughters for at least five years. 146 Arnder has
since been indicted on 147 counts of rape, 145 counts of sexual battery, two
counts of compelling prostitution, six counts of pandering obscenity
involving a minor, four counts of pandering sexually oriented material
involving a minor, three counts of child endangerment and one count of
interference with custody.147
In Greece, Baebring kept the fourteen-year-old girl under control by
locking her in an apartment in Thessaloniki. 148 She was not permitted to
answer the phone or the door.149 The girl's friends received e-mail
messages sent from Internet cafes in Athens and Thessaloniki saying that
she was happy. ISO Baebring told his mother that he felt pity for her because
she suffered from leukemia and he was trying to make her happy. lSI He
told the girl that he was a child psychologist who specialized in
hypnotherapy and ran a youth center. 1S2
When authorities found Baebring, he was charged with abduction of a
minor with malicious intent, sexual assault and exposing a minor to
improper materiaL I53 Investigation of Baebring's home revealed child
por,nography of other girls.ls4 He is suspected of involvement with
141. /d.
142. /d.
143. Id.
144. Interview with April Hindin, supra note 138.
145. Man faces 308-Count Indictment Related to Alleged Sex Acts With Teens,
ASSOCIATED PRESS, Jan. 24, 200l.
146. Id.
147. Id.
148. Jill IGng Greenwood, Missing-Girl Case Points to Greece; 2 Suspects Charged,
TAMPA TRIB.,
Jan. 27,2001, at 12.
149. Id.
150. Id.
151. Missing Teen Found, Says She Doesn'l Want to go Home, ATHENS NEWS, Feb. 2,
2001 [hereinafter Missing Teen FoundJ.
152. /d.
153. German Man Charged With Luring Florida Girl Overseas, AsSOCIATED PRESS, Feb.
3,2001.
154. Id.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
141
pornography rings on the internet. lss The girl suspects that Baehring may
have had other girls under his control and used them in making
pornography.ls6
The international effort to find the missing girl involved the Polk
County Sheriff's Office in Florida, the U.S. State Department, the U.s.
Customs Department, U.s. Postal Inspectors, the FBI, Interpol, the U.S.
Embassy in Greece, the Greek Consulate and the police in Greece. 157 The
international cooperation has been praised, but the intensity of these efforts
also highlights the resources needed to find one girl, and there are
thousands of girls missing each year from parts of the world where such
IS8
resources and cooperation don't exist.
E. FILE TRANSFER PROTOCOL
Although File Transfer Protocol (hereinafter FTP), is one of the oldest
ways of exchanging files on the internet, it is still popular with child
pornography collectors for one-to-one exchange of child pornography.159
FTP allows users to have direct access to another person's computer hard
drive to upload and download files. l60 This technique of file exchange is
more likely to occur between child pornography collectors who have met in
other venues and have come to trust each other. 161
F. LIVE VIDEO CHAT
Every venue on the internet is used to transmit images of sexual
exploitation. The number of video clips is increasing and streaming video
is available for those with high-speed internet connections!62 Live Web
broadcasts have become common. 163
In 2000, a case of human smuggling and trafficking was uncovered in
Hawaii, U.S.A., in which Japanese women were trafficked into Honolulu to
l64
perform live on the internet for audiences in Japan.
Due to more
restrictive laws concerning pornography in Japan, the men decided to
operate their web site from Hawaii and broadcast the live shows back to
Japan! 65 The Japanese men in Hawaii placed ads in Japan for "nude
models.,,166 Upon their arrival in Hawaii, the women were used to make
pornographic films and perform live internet sex shows. 167 The entire
155. Gennan Suspected ofLinks With Pornography Rings, ATHENS NEWS, Feb. 6,2001.
156. Missing Teen Found, supra note lSI.
157. HUGHES, supra note 3.
158.
159.
160.
161.
162.
163.
164.
165.
166.
167.
!d.
!d.
!d.
Id.
Id.
HUGHES, supra note 3.
Immigration Raid Closes Internet Porn Site, AsSOCIATED PRESS, Jan. 15,2000.
Interview with Orner Poirier, U.S. Attorney, Honolulu, HA (May 1,2001).
Id.
Id.
142
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
operation was aimed at a Japanese audience. 168 The web site was written in
Japanese. 169 The women performed strip shows by web cam and responded
to requests from men watching in Japan. 170 They used wireless keyboards
for live sex chat with the men at a rate of $1 per minute. l7l The Japanese
men, operating as Aloha Data, used digital cameras to capture the live
video chat, then transmitted it to a server in California run by a "not
respectable, but not illegal" internet service provider called Lucy's Tiger
Den.172 Japanese viewers accessed the performance through the California
server. 173
The U.S. hnmigration and Naturalization Service pursued the case, not
because of the pornographic content of the broadcast or the sexual
exploitation of the women, but because of immigration violations. 174 This
case offers some twists in crime, human smuggling or trafficking and new
technologies. 175 James Chaparro, Director of the Anti-Smuggling and
Trafficking Unit, U.S. hnmigration and Naturalization Service,
characterized the case in this way: "The Japanese men violated U.S.
immigration law by smuggling/trafficking Japanese women into the U.S. in
order to circumvent the Japanese law against pornography.,,176 Orner
Poirier, U.S. Attorney in Honolulu, who handled the case described it in
this way: "Japanese men were smuggling women into the U.S. from Japan
to provide services for men in Japan.,,177
G. PEER TO PEER NETWORKS AND FILE SWAPPING PROGRAMS
In the last two years, a new technology was developed and released as
freeware that can create a network of peer computers. 178 The result is an
open, decentralized, peer-to-peer system. 179 File swapping programs are
used to find files on the network. 180 Using the program the user designates
one directory on hislher computer that will be open to the public and
another for downloaded files. 181 When the user logs onto the internet,
he/she will be automatically connected to all other people running the same
program. 182 All available files are indexed into a large searchable
168. /d.
169. /d.
170. /d.
171. Interview with Orner Poirier, supra note 165.
172. Id.
173. Id.
174. HUGHES, supra note 3.
175. /d.
176. Interview with James M. Chaparro, Director of the Anti-Smuggling and Trafficking
Unit, U.S. Immigration and Naturalization Service (May 1,2001).
177. Interview with Orner Poirier, supra note 165.
178. HUGHES, supra note 3.
179. /d.
180. /d.
181. Id.
182. Id.
Winter 2002]
NEW COMMUNICATIONS TECHNOLOGIES
143
database. ls3 When keywords are entered the request moves from one
computer to the next returning links to files. 184 At that point, the program
can download the requested files from other members' network
computers. 185 It is toted as a revolution in how computers and people
communicate with each other on the internet. Examples of these peer to
peer networks include: Napster, Scour Exchange, Gnutella, Freenet,
!mesh. 186
These programs create a decentralized system, meaning there is no
central server through which all communications pass. 187 Consequently,
there are no logs of transmissions, and transmissions are not traceable
because each site can only trace the connection back one level. 188 You can
enter the public network or create a private one of your own. 189 These
features this new information technology so attractive to perpetrators. 190
[S]oftware that tum[s] your PC into both a client and a server.
They'll create a true Web by allowing users to easily connect
directly to each other.... Download Gnutella and you can trade
any type of file, pirated or not, with anybody else on the Gnutella
network in virtual anonymity.191
Gnutella has a monitoring feature that allows users to monitor the
searches of others to see what people are searching for. 192 According to
Glenn Nick, U.S. Customs Cyber Smuggling Center "most searches on
these networks are for adult and child pornography.,,193
IV. TECHNOLOGIES FOR ANONYMITY AND DISGUISE
For those engaging in criminal activity or sexual exploitation,
anonymity and disguise are critical. Criminals in general are using new
communications technologies, such as mobile phones, to avoid police
tracing of their phone calls. 194 Mobile phone services often offer free or
cheap phones for signing up for their services. 195 Criminals use these
183. Id.
184. HUGHES, supra note 3.
185. See generally GNUTELLA, http://welcome.to/gnutella (last visited May 1, 2001).
186. HUGHES, supra note 3.
187. Id.
188. Id.
189. Ron Harris, Gnutella Gives Copyright Holders Headaches, AsSOCIATED PRESS, Apr.
10,2000.
190. HUGHES, supra note 3.
191. Jesse Berst, How Napster and Friends Will Turn the Web Inside Out, ZDNET, Apr.
24, 2000, at http://www.zdnet.com/anchordesk/stories/story/O. 10738,2554369,00.html.
192. Id.
193. Interview with Glenn Nick, U.S. Customs Cyber Smuggling Center (May 17,2001).
194. Richard Davis, New Technology: What Impact Will This Have On How Criminals
Manage Their Business?, Address at the Wilton Park Conference entitled Organised Crime:
The Dynamics of Illegal Markets, West Sussex, UK (Mar. 1,2000).
195. Id.
HASTINGS WOMEN'S LAW JOURNAL
144
[Vol. 13:1
phones for a week, and then discard them. 196 Pre-paid phone cards enable
anonymous use of landline telephone systems. 197 Users of cellular and
satellite phones can be located far away from their home bases and still be
able to use their phones. 198 Mobile phones can be programmed to transmit
false identification. 199 Those engaging in international sexual exploitation
use new technologies for ease of communication and to avoid detection?OO
Criminais can avoid being traced by sending their communication
through a series of carriers, each using different communication
technologies, such as local telephone companies, long distance telephone
companies, internet service providers, wireless networks, and satellite
networks?OI They can send the communication through a number of
different countries in different time zones?02 This complicated routing of
communication makes it difficult to trace the perpetrator?03
In addition, criminals can avoid identification by transmitting their
messages over the Internet through a series of anonymous re-mailers that
strip off identifying headers and replace them with new ones?04 One remailer service removes identifying features from the header, holds all
incoming message until five minutes after the hour, and then res ends them
in random order to make tracing an individual message more difficult.20S
Messages can pass through up to twenty other re-mailer services, with at
least one located in a country known for its lack of cooperation with the
global community and law enforcement.206
Perpetrators can also utilize technologies that do not save incriminating
evidence. New technologies like Web TV, in which web communications
are displayed on a TV, do not have a file cache, like browsers installed on a
computer?07 Therefore, illegal material is not accidentally left in the cache
to be discovered by the police. 208
Encryption is a technology used to disguise the content of either text or
graphics files. Currently, there is a debate among lawmakers around the
world about whether law enforcement agencies should be provided with
encryption keys so they can decode messages if there is evidence of its use
196.
197.
198.
199.
/d.
/d.
Id.
/d.
200. HUGHES, supra note 3.
201. See generally PRESIDENT'S WORKING GROUP ON UNLAWFUL CONDUcr ON THE
INTERNET, THE ELECTRONIC FRONTIER: THE CHALLENGE OF UNLAWFUL CONDUCT
INVOLVING
THE
USE
OF
THE
INTERNET
(Mar.
2000),
at
http://www.usdoj.gov/criminallcybercrime/unlawful.htm.
202. Id.
203. Id.
204. Hughes, supra note 37.
205. Dorothy E. Denning & William E. Baugh, Jr., Hiding Crimes in Cyberspace, INFO.,
COMM. & SOC'Y, Sept. 1,1999, at 251-76.
206. /d.
207. Taylor et aI., supra note 40.
208. HUGHES, supra note 3.
Winter 2002]
NEW CO:MMUNICATIONS TECHNOLOGIES
145
in committing a crime?09 Several law enforcement officials in the United
Kingdom and the United States indicated that at this point the capabilities
and threat of encryption seem to be talked about more than they used to for
cases of trafficking and sexual exploitation.210 Encryption programs are not
easy to use, and other methods of hiding activity or content are more
· to manage. 211
popuIar and easIer
V. TECHNOLOGIES OF CYBER HUACKlNG
The sex industry uses techniques such as "page jacking" to misdirect or
trap people on pornographic web sites as page after page of pornography
opens up. Page jacking is a technique the sex industry uses to misdirect
users so they mistakenly come to their web sites.212 The web sites include
false key-word-descriptions so that the search index will bring these
individuals on to pornographic web sites.213 The users will then click on
the link of their chosen topic, only to find themselves on a pornographic
web site.214
Another technique used by the sex industry is called "Mouse-trapping."
"Mouse trapping" occurs when the sex industry web page designers
disable browser commands, such as "back" or "close," so that viewers
cannot leave a pornographic site.215 Once intended or unintended viewers
are on pornographic sites, they are trapped on the pornographic sites
because the "back" or "close" buttons/icons are disabled so that when
clicked, another pornographic web site opens up, resulting in an endless
number of web pages opening up on the viewer's screen?16 In addition,
pornographic web sites can change the default homepage setting on a web
browser, so the next time the user opens the browser he/she is taken
directly to the pornographic site.217 Furthermore, the sex industry has no
idea who they are trapping on their web sites, whether they are children or
adults who fervently do not want to view pornography.218
Pornographers are very aggressive about using popular current events
and search subjects to misdirect viewers.219 The sex industry has exploited
just about any topic on the web to trap people onto its web sites?20
Pornographers will even exploit the arrests of other pornographers.221 For
209. Denning & Baugh, supra note 205.
210. HUGHES, supra note 3.
211.
212.
213.
214.
215.
Id.
Id.
!d.
!d.
Id.
216. HUGHES, supra note 3.
217. Id.
218. HUGHES, supra note 37.
219. Id.
220. Id.
221. Personal communication with Amy Potenza, Research Assistant, University of Rhode
Island (May 24, 2001).
146
HASTINGS WOMEN'S LAW JOURNAL
[Vol. 13:1
example, when a research assistant performed a computer search for news
reports about the break-up of a child pornography ring in Russia, she found
that entering the case related keywords directed her to web sites with child
pornography.222
VI. CONCLUSION
The use of new communication and information technologies for the
sexual exploitation of women and children is creating a crisis for women
and children's status, rights, and dignity all over the world. Pimps,
traffickers, stalkers, and users of pornography and women and children in
prostitution have adopted new technologies to further their abuse and
exploitation of women and children.
The use of new communications and information technologies in the
sexual exploitation of women and children continues to grow with the
increased number of users on the internet. Internationally, there have been
governmental and law enforcement responses to distribution of child
pornography, and in the U.S. and U.K. official responses to child stalkers in
chat rooms. However, there is little governmental intervention to stop the
sexual exploitation of adult women.
222. /d.