Nothing Special   »   [go: up one dir, main page]

Academia.eduAcademia.edu
Hastings Women’s Law Journal Volume 13 Number 1 Symposium Issue: Sexual Slavery: the Trafficking of Women and Girls into the United States for Sexual Exploitation Article 9 1-1-2002 The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children Donna M. Hughes Follow this and additional works at: https://repository.uchastings.edu/hwlj Recommended Citation Donna M. Hughes, The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children, 13 Hastings Women's L.J. 127 (2002). Available at: https://repository.uchastings.edu/hwlj/vol13/iss1/9 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Women’s Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact wangangela@uchastings.edu. The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children Donna M Hughes· 1. INTRODUCTION New communications and information technologies have created a global revolution in communications, access to information, and media delivery. These new communications and information technologies are facilitating the sexual exploitation of women and girls locally, nationally and transnationally. The sexual exploitation of women and children is a global human rights crisis that is being escalated by the use of new technologies. l Using new technologies, sexual predators and pimps stalk women and children. New technical innovations facilitate the sexual exploitation of women and children because they enable people to easily buy, sell and exchange millions of images and videos of sexual exploitation of women and children. These technologies enable sexual predators to harm or exploit women and children efficiently and, anonymously. The affordability and access to global communications technologies allow users to carry out these activities in the privacy of their home. The increase of types of media, media formats, and applications diversifies the means by which sexual predators can reach their victims. This paper will not attempt to categorize all the types and uses of this new technology. However, this paper will describe the most common and newest of these technologies, and how they are used for the sexual exploitation of women and children? • Professor in the Women's Studies Department, Eleanor M. and Oscar M. Endowed Chair, , University of Rhode Island. 1. For the purpose of this paper, I use the term "sexual exploitation" to refer to trafficking for purposes of sexual exploitation, commercial sex acts, such as prostitution, pornography, and live sex shows, stalking for purposes of sexual assault or abuse, and all forms of child sexual abuse. 2. This paper is not about strict legal definitions, nor is it about the law. In fact, many experiences of women and children fall into gray areas, mther than conform to existing definitions. Also, much of the research on sexual exploitation and the Internet focuses on HASTINGS WOMEN'S LAW JOURNAL 127 128 HASTINGS WOIvlEN'S LAW JOURNAL [Vol. 13:1 II. NEW AND OLD TECHNOLOGIES COMBINED Older technologies, like television and cable are now combined with modern technologies to create new ways of delivering information, news, and entertainment.3 Web TV combines the television with the Internet.4 New cable networks use satellite transmission to deliver hundreds of channels and pay-per-view delivers content on demand. 5 Presently, there is a high demand for pornographic videos, through mainstream communication networks such as cable TV. 6 Only one of eight major cable companies in the United States does not offer pornographic movies.? Satellite and cable companies say that the.more sexually explicit the content the greater the demand. 8 ADULT VIDEO NEWS reports that pornography offerings on TV by satellite or cable are increasing video store sales and rentals, not decreasing them, as might be expected.9 The explanation is that pornography on TV is advertising pornography and fmding new buyers. 10 The mainstreaming of pornography is increasing the exploitation or abuse of women and children used in making pornography. 11 According to Paul Fishbein, owner of ADULT VIDEO NEWS, anything sells: There are so many outlets [for the videos] that even if you spend just $15,000 and two days - and put in some plot and good-looking people and decent sex - you can get satellite and cable sales. There are so many companies, and they rarely go out of business. You have to be really stupid or greedy to fail. 12 Another producer said: [A]nyone with a video camera can be a director - there are countless bottom feeders selling nasty loops on used tape. images, and the people in the images are rarely available for interviews to describe their experiences, their consent or coercion, their freedom or slavery. The extent to which the experiences of these women and children meets existing legal criteria for crimes is beyond the scope of this article. 3. DONNA M. HUGHES, THE IMPACT OF THE USE OF NEW COMMUNICATIONS AND INFORMATION TECHNOLOGIES ON TRAFFICKING IN HUMAN BEINGS FOR THE SEXUAL EXPLOITATION; A STUDY OF THE USERS (report submitted to the Group of Specialists on the Impact of the Use of New Infonnation Technologies on Trafficking in Human Beings for the Purpose of Sexual Exploitation, Committee for Equality Between Women and Men, The Council of Europe, May 200 I). 4. Id. 5. Id. 6. Kenneth Li, Silicone Valley: Porn Goes Public, THE INDUSTRY STANDARD, Nov. 6, 2000, at http://www.thestandard.com/article/display/0.1151.19696.00.html (last visited Mar. 22,2002). 7. Frank Rich, Naked Capitalists, N.Y. TIMES (Magazine), May 20,2001, at 51. 8. Id. 9. Id. 10. Id. II. Id. 12. Id. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 129 Whatever the quality or origin of a product, it can at the very least be exhibited on one of the 70,000 adult pay Web sites, about a quarter of which are owned by a few privately held companies that slice and dice the same content under different brands. 13 As a result of the huge market on the web for pornography and the competition among sites, the pornographic images have become rougher, more violent, and degrading. 14 One producer claimed that there were "no coerced" performances in pornography videos, although she immediately acknowledged that "there are little pipsqueaks who get their disgusting little (misogynistic) videos out there."ls The "misogynistic porn" this producer refers to involves degrading images, such as ejaculation on the woman's face, real pain, and violence against women that results in physical and emotional injuries. 16 In the last ten years, some American and European pornography producers have moved to places such as Budapest, Hungary because of the availability of cheap actors from Eastern and Central Europe. 17 Budapest is a destination and transit city for women trafficked from Ukraine, Moldova, Russia Romania, and Yugoslavia. IS There are hundreds of pornographic films and videos produced each year in Budapest. 19 Budapest is now the biggest center for pornography production in Europe, eclipsing rivals such as Amsterdam and Copenhagen?O Most Western European producers of sex videos use Eastern European actors whenever possible?1 An executive at Germany's Silwa production company explained: ''They cost less and do two or three more. Even excruciating or humiliating acts usually cost on~y hundred dollars.,,22 The postal service, traditionally the most anonymous and popular way to transmit pornography, is still used by collectors and producers of child pornography to distribute the pornography.23 Now, sending materials through the mail is combined with internet technology.24 Raymond Smith, 13. Rich, supra note 7. 14. ld. 15. ld. 16. Martin Amis, A Rough Trade, GUARDIAN UNLIMITED, Mar. 17, 2001, at http://www.guardian.co.ukIArchive/Article/0,4273,4153718,00.html (discussing the highrisk, increasingly violent world of the pornography industry) (last visited Mar. 22, 2002). 17. Natasha Singer, Blue Danube, at http://www.nerve.comIPhotographylPlachy/ BlueDanubel (last visited Feb. 25, 2001) (on file with author). 18. Fedor Lukyanov, "Alive Goods" Is Flow From the East, ROSSIYSKAYA GAZETA, at http://www.rg.rulenglish/eco_soyuzl03_11_1.htm(last visited Mar. 23, 2002). 19. Singer, supra note 17. 20. To Its Buyers and Sellers, The Sex Trade is Just Another Busine$$, at http://www.pirko.delEnglisch!lustiglSex.html (last visited Mar. 23,2002). 21. The Sex Industry: Giving The Customer What He Wants, THE ECONOMIST, Feb. 14, 1998, at 21. 22. !d. 23. Interview with Raymond Smith, Fraud, Child Exploitation and Asset Forfeiture Group, Office of Criminal Investigations, U.S. Postal Inspection Service (May 7, 2001). 24. ld. 130 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 u.s. Postal illspection Service, who handles hundreds of cases of child pornography, has found that the rise in internet use by sexual predators has also increased their use of the U.S. mai1.25 He said that from the time they fIrst started investigating child pornography in the early 1980s until fIve years ago, they have almost eliminated the distribution of child pornography?6 But since the internet became publicly available, the number of cases connected to the internet has steadily increased?7 ill 1998, 32 percent of cases were related to internet.28 ill 1999, 47 percent were internet related, and in 2000, 77 percent of the child pornography cases were internet related.29 Producers of child pornography advertise their videos on the internet and distribute them through the mai1. 30 Men in chat rooms trade small fIles, still images and short movie clips on the internet, but longer movies are sent by mai1. 31 Stalkers talk to children in chat rooms, ask them to take pictures of themselves, and send them through the mai1. 32 When stalkers convince children to travel to meet them, they send them bus and plane tickets through the maie 3 Scanners and video digitizers are used to tum old pornographic images, fIlms, and videos into electronic formats that can be uploaded the internet.34 About half of the child pornography online is old images from fIlms and magazines produced in the 1960s and the 70S.35 Digital cameras and recorders enable the creation of images that do not need professional processing, thereby eliminating the risk of detection. 36 These new types of equipment also make it technically easier for people to become producers of pornography.37 Digital media formats are not static nor independent.38 One format can be quickly converted into another. 39 Videos are still the primary production medium for child pornography, and the still images for the illternet are produced from video captured images.40 From one video, 25. Id. 26. !d. 27. Id. 28. !d. 29. Interview with Raymond Smith, supra note 23. 30. !d. 31. Id. 32. !d. 33. Id. 34. James F. McLaughlin, Cyber Child Sex Offender Typology (2000), at http://www.ci.keene.nh.us/policeffypology.html. 35. !d. 36. !d. 37. Donna M. Hughes, Pimps and Predators on the Internet - Globalizing Sexual Exploitation of Women and Children (Apr. 1999), available at http://www.uri.edulartscil wms/hugheslpprep.htm. 38. !d. 39. Id. 40. Max Taylor et al., Child Pornography, The Internet and Offending, ISUMA: CAN. J. POL'y REs., Summer 2001, at 94. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 131 200-300 still images can be captured, and then uploaded to a newsgroup or to a web site.41 According to the COPINE (Combating Paedophile Information Networks in Europe) Project, production of child pornography still combines older methods of production, while using new internet technologies for distribution.42 It is safe to say that the number of manufactures [producers of child pornography] has increased over the years with the availability of new medium. Home development of black and white 35MM film, self-developing Polaroid film, video cameras, camcorders, computer scanners, CUseeme technology [live video and audio transmission] and now computer cameras (including video) have made child pornography easier and easier to produce and reproduce.43 One police analyst noted that prior to the internet the majority of collectors of child pornography were not distributors because duplication technology was not readily available.44 Now, making copies of image files "involves a few clicks of any computer mouse allowing for effortless distribution.'.4S Therefore, collectors of child pornography have quickly and easily become distributors. ill. NEW TECHNOLOGIES FOR SEXUAL EXPLOITATION A. DIGITAL VIDEO DISK One new technology is Digital Video Disk (DVD), which provides high quality videos and interactive capabilities for the viewer.4 While making the videos, scenes can be shot from multiple angles, and all points of view can be added to a CD ROM.47 The viewer can then choose the version, point of view, or camera angle he/she prefers.48 Viewers can watch the movie in chronOlogical order, moving from one character to the next, or watch the movie from one character's point of view.49 Viewers can interact with DVD movies in much the same way they do with video games, giving them a more active role.so According to one producer: If a viewer wants something different, we give it to him. The viewer can go inside the head of the person having sex with [name 41. !d. 42. 43. 44. 45. 46. 47. ld. Mclaughlin, supra note 34. ld. ld. Karen Kaplan, Pushing Porn On DVDs, L.A. TIMES, Jan. 9, 2001, at AI. ld. 48. ld. 49.ld. 50. ld. 132 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 deleted], male or female. He can choose which character to follow. He can re-edit the movie. It's a great technology.51 The following is a description of a recent pornographic movie recorded on DVD: Chasing Stacy from VCA Labs, is a choose-your-own-adventure flick that follows Stacy the porn star as she signs autographs, drinks coffee, works out at the gym and takes a shower. At various points, a small green icon appears in the corner of the screen and Stacy looks straight at the camera. That's when viewers get the chance to ask Stacy out on a virtual date by pressing the Enter button on the DVD remote control. The date scenes are filmed so that the viewer feels like he's sitting directly across a glass table from Stacy, who provides insights into her personal life. Later, the viewer can select whether to take Stacy back to her house, to her office, or to another locale for a tryst. With the remote control, the details can be chosen as the action unfolds. 52 I The pornography producer, VCA, released this DVD in July 2000 and sold more than 12,000 copies by January 2001, making it the fastest selling title they have. 53 Although technologies like this have many applications and enable creativity and interactivity, when used in pornographic films, these raise the question of the impact on people, their relationships, and expectations about relationships. A portion of men who use pornography and seek out women in prostitution do so either because their lack of social skills or their misogynistic attitudes prevent them from establishing relationships with their peers.54 Technology such as this may further distance and alienate some men from meaningful and realistic relationships.55 There are a number of venues and media formats with different technologies for the transfer of files and communications, including Usenet newsgroups, World Wide Web, e-mail, live synchronous communication (text and voice chat), bulletin or message boards, Web cams for live transmission of images or videos, live video conferencing (live video chat), streaming video, peer to peer servers, and file sharing programs.56 All forums and applications offer ways to engage in the sexual exploitation of women and children.57 How each is used for sexual exploitation depends on the legality of the 51. Rich, supra note 7. 52. Kaplan, supra note 46. 53. ld. 54. Joe Parker, How Prostitution Works, at http://www.prostitutionresearch.com/parkerhow.html (last visited Mar. 23, 2002). 55. HUGHES, supra note 3. 56. ld. 57. ld. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 133 activity, which varies from country to country, the techniques adopted by the sex industry or individual users, and the level of privacy or secrecy attempted by the users. 58 Perpetrators have taken advantage of new technologies and applications to stalk victims, transmit illegal materials, and avoid detection by law enforcement.59 According to one official: "If it can be done, they're doing it.,,60 B. NEWS GROUPS Usenet news groups are still popular sites for the exchange of information on how to fmd women and children for sexual exploitation.61 Although much media attention is given to child pornography rings and cases that use sophisticated technologies to keep their activities secret, such as the Wonderland Club that used a Soviet KGB code to encrypt all its communications, the older public newsgroups are still commonly used to upload and download child pornography.62 The COPINE Project reports that over 1000 child pornographic images are posted on news groups each week. 63 C. WEB SITES Web sites are used in various ways to assist in the sexual exploitation of women and children. Web sites are the most popular venue for the distribution of pornography online. Large legal sex industry businesses have sophisticated web sites with subscription fees that bring in millions of dollars per year. 64 There are also tens of thousands of free pornography sites that are maintained by amateurs or someone making a relatively small amount of money from advertising banners for larger sites and businesses.65 Web sites offer streaming videos that can be viewed with web browser plug_ins. 66 The most recent versions of web browsers (e.g. Internet Explorer, Netscape) come packaged with these plug_ins.67 Pimps and traffickers use the web to advertise the availability of women and children for use in making pornography.68 One example includes prostitution tourists and Western producers of pornography who have been traveling to Latvia since the early 1990s to :fip.d vulnerable 58. Hughes, supra note 37. 59. Id. 60. Interview with Glenn Nick, U.S. Customs Smuggling Ctr. (May 17,2001). 61. Taylor et aI., supra note 40. 62. Stuart Miller, Technological Level of Wonderland Network Shocked All Investigators, IruSHTlMES, Sept. 3,1998, at 15. 63. Taylor et. ai., supra note 40. 64. Donna M. Hughes, The Internet and Sex Industries: Partners in Global Sexual Exploitation, IEEE TECHNOLOGY & SOCIETY MAGAZINE, Spring 2000, at 35. 65. Id. 66. Id. 67. HUGHES, supra note 3. 68. Hughes, supra note 37. 134 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 children and young adults to sexually exploit in their videos. 69 In August 1999, the Vice Police in Latvia initiated criminal proceedings against the owners of Logo Center, a "modeling agency," for production of pornography and the use of minors in the production of pornography.70 The two managers of the Logo Center provided women and children to foreign prostitution tourists and foreign pornography producers.71 They had several web sites72 with pornography, information about minors, and photographs of their "models" in different sex acts. 73 During the time these pimps operated they exploited approximately 2000 women, men, girls and boys, resulting in 174 juveniles relying on prostitution for their basic livelihood.74 The Logo Center supplied women and children for pornography production in other countries. In one case they supplied "porno models" to a Swedish pornography producer who made videos in Finland.75 The Logo Center Web site had links to other sites with bestiality and child pornography.76 After being arrested, the two owners were charged with distribution of child pornography.77 Pimps also use web sites to advertise their brothels or escort services directly to men. 78 These sites are often used to attract foreign businessmen or tourists. 79 The following is from a web site in Prague, Czech Republic: Would you like to spend an exciting night in Prague with a beautiful young girl? She will do everything for your pleasure. She will make you happy with kissing you on your mouth, French sex and sexual intercourse. During your stay, you can visit the "Golden City" with your girl. The girls are pupils and students, who are fmancing th~ir education. 8o Increasingly, prostitution web sites include photographs of the women, sometimes nUde. 81 This practice exposes women, identifying them to the public as prostitutes. 82 Many of the photographs look like modeling 69. Personal Communication with Valdis Pumpurs, Head of the Criminal Police of Latvia (May 2001). 70. /d. 71. /d. 72. Web site uris: logosagensy.com, pronorussian.nu, marige.nu, and logosagensy.nu. (These web sites are no longer available on the internet) (on file with author). 73. Personal Communication with Valdis Pumpurs, supra note 69. 74. /d. 75. Id. 76. Id. 77. /d. 78. Hughes, supra note 37. 79. /d. 80. Milas Holiday and Escort Service in Prague, http://www.prag-girls.de/framehallo.htm, (last visited Apr. 21, 2001, web site no longer available online) (on file with author). 81. Hughes, supra note 37. 82. /d. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 135 photographs, and the women may never have intended for those photographs to be used to advertise them as prostitutes.83 Some of the women may not even know their photographs are on web sites. Women suffer from the stigma placed on them for being in prostitution.84 This public display and labeling further harms women in prostitution.85 Web based message boards and bulletin boards are increasingly popular for an exchange of information by perpetrators of sexual exploitation.86 They are used in much the same way as newsgroups, but can be private and protected by passwords.87 Using these applications, men can book sex tours and "appointments" with women through the web, email and chat rooms. 88 Message boards on brothels' web sites enable men to post "reviews" of the women for other men, and communicate with pimps about the women's appearances and "performances.',s9 On sites where the women's photos are displayed, men can evaluate the women: 90 Alina's new photos indicate that she has gained some extra weight!! Please advise what is her weight currently. Thanks and regards ....91 Another example includes: Dear Milla: What happened to Alina? She seems that she gained some weight since the last time she was with you. She must not be 52Kg as written on her page. Please advise her exact weighl92 Men use message boards to make reservations for their upcoming visits.93 A Web site for a brothel in Prague, Czech Republic had the following message and request: Hallo Mila! I found your page on the Internet. I'm going to Prague this summer and probably will visit your establishment. How long time before do one have to make reservations? Could you please put out som more photos of the 83. HUGHES, supra note 3. 84. See generally COALmON AGAINST TRAmCKlNG IN WOMEN, MAKING THE HARM VISIBLE: THE GLOBAL SEXUAL EXPLOITATION OF WOMEN AND GIRlS (Donna M. Hughes & Claire M. Roche eds., Feb. 1999). 85. Hughes, supra note 37. 86. HUGHES, supra note 3. 87. ld. 88. ld. 89. Milas Holiday and Escort Service in Prague, supra note 80. 90.ld. 91. ld. 92. ld. 93. ld. 136 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 girls. Is there also possible to have analsex with the girls if you stay overnight? See you! lPeter94 Another posting included: I understand from our talk, by telephone you have, 6 girls our more, A IT the time, girls are from Ukraine. I will be in Praha, late August 2000, So I will arrive to Praha, late at night, if I remember rite, me flights is from Iceland to Copenhagen and from Copenhagen to Praha. do you have some taxi our pick up from the airport? I wold like to stay in your house the first 2 nights when I am testing your girls after that I will know which of your girls I like. I will chosen one of them to stay in me hotel four 2 nights, so I will have one of your girls, one hour at the time in your house before I chosen which one I chosen to stay with me in me hotel, is that ok with you? I understand you have 6 girls, I wold prefer to have sex with all ofthem, and then chosen one of the to stay in me hotel four 2 night after thatch, is thatch ok with you? Are your girls shaved? Ragnar ....95 Web sites are also used to market images and videos of rape and torture. 96 Slave Farm, a web site registered in Denmark, claims to have the "world's largest collection of real life amateur slaves:,97 Men are encouraged to "submit a slave to the picture farm." The images include women being subjected to sexual torture, bondage, and fetish sadism.98 Description of images include: "needle torture," "hot wax," "extreme hogtie," "hanging bondage," "tits nailed to board," "drunk from the toilet," and "pregnant bondage.,,99 Live chat is available where men can "command the bitches."loo A number of images are available free, but full access requires payment of a SUbscription fee. lOl The women in the images and videos are visibly injured, with cuts, burns, bruises, welts, and bleeding wounds. lo2 Another web site registered in Moscow, Russia advertises itself as "the best and most violent rape site on earth.,,103 It claims to have "Several Hunders [sic] of rape picS."l04 Subscribers are offered 30,000 hardcore 94. ld. 95. Milas Holiday and Escort Service in Prague, supra note 80. 96. Hughes, supra note 37. 97. SLAVE FARM, at http://www.slavefarm.com(lastvisitedMar. 19,2002) ("the world's largest amateur BDSM site"). 98. ld. 99. ld. 100. ld. 101. ld. 102. ld. 103. http://www.borov.com (last visited Feb. 26, 2001; web-site no longer links to this material) (on file with author). 104. ld. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 137 porn images, 500 online video channels, and 100 long, high quality videos. !Os There are images and videos of "violent rapes, ass rapes, mouth rapes, gang rapes, nigger rapes, tom vaginas, and tortured clits."lo6 A free 13 MB video and audio movie can be downloaded in 12 segments, each about 1 MB.107 The film shows a hooded perpetrator raping a woman in an office. !Os Previously, few people had access to such extreme material. I09 As one consultant explained, [f]ormerly men used to have to remove themselves from their community by three levels [to find extreme, violent pornography]. First, they had to go somewhere, physically, then know where to go, and then know how to find it. The Web makes it very easy to get that far removed very quicldy."llo The resurgence of child pornography through the internet is a priority for some law enforcement agencies, resulting in unparalleled international cooperation to break up the rings. 111 In contrast, the pornography of adults and post adolescent teens has been ignored. 1I2 In the United States and Europe, there are very few cases of prosecution of producers of adult and post adolescent teen pornography. A lot of the pornography is extremely misogynistic, with women portrayed as seeking and enjoying every type of humiliation, degradation, and painful sex act imaginable. ll3 Women and children are harmed physically, sexually, and emotionally in the making of pornography.1l4 Although, there is less information about women in pornography, it is likely that many women are coerced into making pornography just as they are coerced into prostitution. In addition, by filming the violence and sex crimes against women and post adolescent teens, thereby turning it into pornography, images of these violent crimes can be distributed publicly on the internet ,vith no consequences to the perpetrators. I IS The percentage of degrading, violent, misogynistic pornography 105. 106. 107. 108. 109. /d. ld. ld. ld. Interview with Jeff Middleton, Computer Focus (May 17,2001). 110. /d. Ill. HUGHES, supra note 3. 112. ld. 113. Id. 114. Liz Kelly & Dianne Butterworth, Address at the Journal of Information Law and Technology's event entitled, Policing the Internet: First European Conference on Combating Pornography and Violence on the Internet (Feb. 14, 1999) (for a description, see Yarnan Akdeniz, Po/icing the Internet - Conference Report, 1 J. INFO. 1. & TECH (1999), available at http://elj.warwick.ac.ukljiltiConfS/97_1pollakdeniz.doc); IN HARM's WAY: THE PORNOGRAPHY CNIL RIGHTS HEARINGS 39-199 (Catharine A. MacKinnon & Andrea Dworkin eds., 1998) [hereinafter IN HARM'S WAY]. 115. HUGHES, supra note 3. 138 HASTINGS WOMEN'S LAW JOURNAL [Vol13:1 continues to increase, and the images and videos become more readily available. 1l6 However, there doesn't seem to be anything new in the content of pornography; perpetrators have always raped and tortured women and children in the making of pornography.II7 What is new is the volume of pornography produced and the fact that an average person with a computer, modem and search engine can find violent, degrading images within minutes, a search that could have taken a lifetime, just fifteen years ago. The increase in video clips with audio and streaming video makes the action and harm come alive. ll8 New techniques, such as shockwave flash movies, enable the creation of animated videos. ll9 Skilled amateurs can create snuff films for distribution on the Web: 20 One person I interviewed said that "[wlith virtual film, it is possible to produce a snuff film from animation, but very difficult to tell it is not real. Now, we are limited only by our imaginations. There is nothing that can't happen on the Web."l21 D. CHATROOMS Real time synchronous communication, or "chat," is a popular means of communication on the internet. Ill Chat is available through Internet Relay Chat (IRC) channels, Instant Messaging, such as ICQ, Web based chat sites which are accessed through browsers, Multi-User Dimension (MUD) or Multi-User Simulated or Share Hallucination (MUSH) programs. 123 There are over 100,000 chat rooms available to users worldwide. I24 Some of these formats and the ''rooms'' users create are open to the public, some are private and require passwords, and others are used for one to one communication. I25 No messages are archived or stored and no log files are maintained, as is done with e-mailsorwebaccesses.so stalkers use them to look for victims without the danger of being traced by law enforcement authorities. 126 There have been numerous cases in the United States and the United Kingdom, where predators contact children for both online and physical meetings. I27 Often, during these meetings, the children are emotionally and sexually abused. 128 There have also been numerous cases of online stalking of adults that began with conversations 116. See generally IN HARM's WAY, supra note 114. 117. HUGHES, supra note 3. 118. ld. 119. Interview with Jeff Middleton, supra note 109. 120. !d. 121. ld. 122. INTERNET CRIME FORUM, INTERNET RELAY CHAT SUB-GROUP, CHAT WISE, STREET WISE: CHILDREN AND INTERNET CHAT SERVICES (Mar. 2001), at http://www.intemetcrimefomm.org.uklchatwise_streetwise.html (last visited Mar. 23, 2002) [hereinafter INTERNET CRIME FORUM]' 123. !d. 124. ld. 125. ld. 126. ld. 127. ld. 128. INTERNET CRIME FORUM, supra note 122. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 139 in chat rooms, which led to physical meetings that turned into sexual assaults,I29 In chat rooms, perpetrators engage children in sexual conversation or expose them to sexual material, including adult and child pornography,I30 Predators sexually exploit children online through this sexual talk,I31 Perpetrators ask children to send them pictures or sexual images of themselves or their friends. 132 They may encourage the children to perform sex acts on themselves or friends for the stalker's sexual satisfaction. 133 Stalkers use these activities as part of a grooming process to entice children into more direct contact, such as telephone conversations and eventual physical meetings. 134 When the child stalkers use voice chat the predators and stalkers encourage the children to get headphones to reduce the risk of someone else in the house hearing the voices. 135 They suggest that children get web cameras for their computers and move their computers to their bedrooms where the stalker can encourage sexual touching and masturbation while they watch via a Web cam. 136 A typical ruse employed by paedophiles is when the predator asks the victim what she is wearihg, This is usually followed by asking her to take something off such as her underwear. The more cunning paedophile will say something more innocuous like 'do you enjoy taking showers,' swiftly followed by 'do you touch yourself in the bath?' It is also commonplace to ask the girl if she has pubic hair in order to build up a mental picture of her level of physical maturity. The intention of most paedophiles is to engage the girl in cybersex activities. 137 In one transnational case, Franz Konstantin Baehring, a thirty-sevenyear-old German man living in Greece, contacted a fourteen-year-old girl from Florida in a chat room. 138 He followed his Internet communication with letters by mail and telephone calls. 139 After a year of corresponding, he convinced the girl to run away from home and travel to Greece. 140 To assist the girl in leaving her home, Baehring contacted a woman at a mobile 129. Karamjit KaUf, More Internet Date Rapes, SlRAlTS TIMES (Singapore), Feb. 28, 2001; Tom Gardner, AsSOCIATED PRESS, Feb. 19,2001; Conal Urquhart, Killerspreadhi's Rape Fantasies on the Internet, THE TIMEs (London), Oct. 4, 2000. 130. INTERNETCRIMEFoRUM,Supranote 122. 131. ld. 132. 133, 134. 135. 136. 137. 138. 139. 140. ld. ld. /d. /d. INTERNET CRIME FORUM, supra note 122. ld. Interview with April Hindin, Postal Inspector, Tampa, Fla. (May 15, 2001). ld. ld. 140 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 phone store and convinced her to assist an "abused girl in leaving home.,,141 The woman met the fourteen-year-old, gave her a programmed cell phone and drove her to a local airport. 142 The girl flew to Ohio, where Robert Arnder, a convicted child pornographer and one of Baebring's contacts, assisted the girl in getting a passport and leaving the United States: Baehring paid Arnder $2000 dollars for his assistance. 143 Police were able to trace the girl's travels and her contacts by examining the e-mail messages left on her computer at home. 144 Upon investigation of Robert Arnder, who assisted the girl in Ohio, they found that Arnder had pornographic images and videos of his own thirteen and seventeen-year-old daughters on his home computer. 145 He had sexually abused his daughters for at least five years. 146 Arnder has since been indicted on 147 counts of rape, 145 counts of sexual battery, two counts of compelling prostitution, six counts of pandering obscenity involving a minor, four counts of pandering sexually oriented material involving a minor, three counts of child endangerment and one count of interference with custody.147 In Greece, Baebring kept the fourteen-year-old girl under control by locking her in an apartment in Thessaloniki. 148 She was not permitted to answer the phone or the door.149 The girl's friends received e-mail messages sent from Internet cafes in Athens and Thessaloniki saying that she was happy. ISO Baebring told his mother that he felt pity for her because she suffered from leukemia and he was trying to make her happy. lSI He told the girl that he was a child psychologist who specialized in hypnotherapy and ran a youth center. 1S2 When authorities found Baebring, he was charged with abduction of a minor with malicious intent, sexual assault and exposing a minor to improper materiaL I53 Investigation of Baebring's home revealed child por,nography of other girls.ls4 He is suspected of involvement with 141. /d. 142. /d. 143. Id. 144. Interview with April Hindin, supra note 138. 145. Man faces 308-Count Indictment Related to Alleged Sex Acts With Teens, ASSOCIATED PRESS, Jan. 24, 200l. 146. Id. 147. Id. 148. Jill IGng Greenwood, Missing-Girl Case Points to Greece; 2 Suspects Charged, TAMPA TRIB., Jan. 27,2001, at 12. 149. Id. 150. Id. 151. Missing Teen Found, Says She Doesn'l Want to go Home, ATHENS NEWS, Feb. 2, 2001 [hereinafter Missing Teen FoundJ. 152. /d. 153. German Man Charged With Luring Florida Girl Overseas, AsSOCIATED PRESS, Feb. 3,2001. 154. Id. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 141 pornography rings on the internet. lss The girl suspects that Baehring may have had other girls under his control and used them in making pornography.ls6 The international effort to find the missing girl involved the Polk County Sheriff's Office in Florida, the U.S. State Department, the U.s. Customs Department, U.s. Postal Inspectors, the FBI, Interpol, the U.S. Embassy in Greece, the Greek Consulate and the police in Greece. 157 The international cooperation has been praised, but the intensity of these efforts also highlights the resources needed to find one girl, and there are thousands of girls missing each year from parts of the world where such IS8 resources and cooperation don't exist. E. FILE TRANSFER PROTOCOL Although File Transfer Protocol (hereinafter FTP), is one of the oldest ways of exchanging files on the internet, it is still popular with child pornography collectors for one-to-one exchange of child pornography.159 FTP allows users to have direct access to another person's computer hard drive to upload and download files. l60 This technique of file exchange is more likely to occur between child pornography collectors who have met in other venues and have come to trust each other. 161 F. LIVE VIDEO CHAT Every venue on the internet is used to transmit images of sexual exploitation. The number of video clips is increasing and streaming video is available for those with high-speed internet connections!62 Live Web broadcasts have become common. 163 In 2000, a case of human smuggling and trafficking was uncovered in Hawaii, U.S.A., in which Japanese women were trafficked into Honolulu to l64 perform live on the internet for audiences in Japan. Due to more restrictive laws concerning pornography in Japan, the men decided to operate their web site from Hawaii and broadcast the live shows back to Japan! 65 The Japanese men in Hawaii placed ads in Japan for "nude models.,,166 Upon their arrival in Hawaii, the women were used to make pornographic films and perform live internet sex shows. 167 The entire 155. Gennan Suspected ofLinks With Pornography Rings, ATHENS NEWS, Feb. 6,2001. 156. Missing Teen Found, supra note lSI. 157. HUGHES, supra note 3. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. !d. !d. !d. Id. Id. HUGHES, supra note 3. Immigration Raid Closes Internet Porn Site, AsSOCIATED PRESS, Jan. 15,2000. Interview with Orner Poirier, U.S. Attorney, Honolulu, HA (May 1,2001). Id. Id. 142 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 operation was aimed at a Japanese audience. 168 The web site was written in Japanese. 169 The women performed strip shows by web cam and responded to requests from men watching in Japan. 170 They used wireless keyboards for live sex chat with the men at a rate of $1 per minute. l7l The Japanese men, operating as Aloha Data, used digital cameras to capture the live video chat, then transmitted it to a server in California run by a "not respectable, but not illegal" internet service provider called Lucy's Tiger Den.172 Japanese viewers accessed the performance through the California server. 173 The U.S. hnmigration and Naturalization Service pursued the case, not because of the pornographic content of the broadcast or the sexual exploitation of the women, but because of immigration violations. 174 This case offers some twists in crime, human smuggling or trafficking and new technologies. 175 James Chaparro, Director of the Anti-Smuggling and Trafficking Unit, U.S. hnmigration and Naturalization Service, characterized the case in this way: "The Japanese men violated U.S. immigration law by smuggling/trafficking Japanese women into the U.S. in order to circumvent the Japanese law against pornography.,,176 Orner Poirier, U.S. Attorney in Honolulu, who handled the case described it in this way: "Japanese men were smuggling women into the U.S. from Japan to provide services for men in Japan.,,177 G. PEER TO PEER NETWORKS AND FILE SWAPPING PROGRAMS In the last two years, a new technology was developed and released as freeware that can create a network of peer computers. 178 The result is an open, decentralized, peer-to-peer system. 179 File swapping programs are used to find files on the network. 180 Using the program the user designates one directory on hislher computer that will be open to the public and another for downloaded files. 181 When the user logs onto the internet, he/she will be automatically connected to all other people running the same program. 182 All available files are indexed into a large searchable 168. /d. 169. /d. 170. /d. 171. Interview with Orner Poirier, supra note 165. 172. Id. 173. Id. 174. HUGHES, supra note 3. 175. /d. 176. Interview with James M. Chaparro, Director of the Anti-Smuggling and Trafficking Unit, U.S. Immigration and Naturalization Service (May 1,2001). 177. Interview with Orner Poirier, supra note 165. 178. HUGHES, supra note 3. 179. /d. 180. /d. 181. Id. 182. Id. Winter 2002] NEW COMMUNICATIONS TECHNOLOGIES 143 database. ls3 When keywords are entered the request moves from one computer to the next returning links to files. 184 At that point, the program can download the requested files from other members' network computers. 185 It is toted as a revolution in how computers and people communicate with each other on the internet. Examples of these peer to peer networks include: Napster, Scour Exchange, Gnutella, Freenet, !mesh. 186 These programs create a decentralized system, meaning there is no central server through which all communications pass. 187 Consequently, there are no logs of transmissions, and transmissions are not traceable because each site can only trace the connection back one level. 188 You can enter the public network or create a private one of your own. 189 These features this new information technology so attractive to perpetrators. 190 [S]oftware that tum[s] your PC into both a client and a server. They'll create a true Web by allowing users to easily connect directly to each other.... Download Gnutella and you can trade any type of file, pirated or not, with anybody else on the Gnutella network in virtual anonymity.191 Gnutella has a monitoring feature that allows users to monitor the searches of others to see what people are searching for. 192 According to Glenn Nick, U.S. Customs Cyber Smuggling Center "most searches on these networks are for adult and child pornography.,,193 IV. TECHNOLOGIES FOR ANONYMITY AND DISGUISE For those engaging in criminal activity or sexual exploitation, anonymity and disguise are critical. Criminals in general are using new communications technologies, such as mobile phones, to avoid police tracing of their phone calls. 194 Mobile phone services often offer free or cheap phones for signing up for their services. 195 Criminals use these 183. Id. 184. HUGHES, supra note 3. 185. See generally GNUTELLA, http://welcome.to/gnutella (last visited May 1, 2001). 186. HUGHES, supra note 3. 187. Id. 188. Id. 189. Ron Harris, Gnutella Gives Copyright Holders Headaches, AsSOCIATED PRESS, Apr. 10,2000. 190. HUGHES, supra note 3. 191. Jesse Berst, How Napster and Friends Will Turn the Web Inside Out, ZDNET, Apr. 24, 2000, at http://www.zdnet.com/anchordesk/stories/story/O. 10738,2554369,00.html. 192. Id. 193. Interview with Glenn Nick, U.S. Customs Cyber Smuggling Center (May 17,2001). 194. Richard Davis, New Technology: What Impact Will This Have On How Criminals Manage Their Business?, Address at the Wilton Park Conference entitled Organised Crime: The Dynamics of Illegal Markets, West Sussex, UK (Mar. 1,2000). 195. Id. HASTINGS WOMEN'S LAW JOURNAL 144 [Vol. 13:1 phones for a week, and then discard them. 196 Pre-paid phone cards enable anonymous use of landline telephone systems. 197 Users of cellular and satellite phones can be located far away from their home bases and still be able to use their phones. 198 Mobile phones can be programmed to transmit false identification. 199 Those engaging in international sexual exploitation use new technologies for ease of communication and to avoid detection?OO Criminais can avoid being traced by sending their communication through a series of carriers, each using different communication technologies, such as local telephone companies, long distance telephone companies, internet service providers, wireless networks, and satellite networks?OI They can send the communication through a number of different countries in different time zones?02 This complicated routing of communication makes it difficult to trace the perpetrator?03 In addition, criminals can avoid identification by transmitting their messages over the Internet through a series of anonymous re-mailers that strip off identifying headers and replace them with new ones?04 One remailer service removes identifying features from the header, holds all incoming message until five minutes after the hour, and then res ends them in random order to make tracing an individual message more difficult.20S Messages can pass through up to twenty other re-mailer services, with at least one located in a country known for its lack of cooperation with the global community and law enforcement.206 Perpetrators can also utilize technologies that do not save incriminating evidence. New technologies like Web TV, in which web communications are displayed on a TV, do not have a file cache, like browsers installed on a computer?07 Therefore, illegal material is not accidentally left in the cache to be discovered by the police. 208 Encryption is a technology used to disguise the content of either text or graphics files. Currently, there is a debate among lawmakers around the world about whether law enforcement agencies should be provided with encryption keys so they can decode messages if there is evidence of its use 196. 197. 198. 199. /d. /d. Id. /d. 200. HUGHES, supra note 3. 201. See generally PRESIDENT'S WORKING GROUP ON UNLAWFUL CONDUcr ON THE INTERNET, THE ELECTRONIC FRONTIER: THE CHALLENGE OF UNLAWFUL CONDUCT INVOLVING THE USE OF THE INTERNET (Mar. 2000), at http://www.usdoj.gov/criminallcybercrime/unlawful.htm. 202. Id. 203. Id. 204. Hughes, supra note 37. 205. Dorothy E. Denning & William E. Baugh, Jr., Hiding Crimes in Cyberspace, INFO., COMM. & SOC'Y, Sept. 1,1999, at 251-76. 206. /d. 207. Taylor et aI., supra note 40. 208. HUGHES, supra note 3. Winter 2002] NEW CO:MMUNICATIONS TECHNOLOGIES 145 in committing a crime?09 Several law enforcement officials in the United Kingdom and the United States indicated that at this point the capabilities and threat of encryption seem to be talked about more than they used to for cases of trafficking and sexual exploitation.210 Encryption programs are not easy to use, and other methods of hiding activity or content are more · to manage. 211 popuIar and easIer V. TECHNOLOGIES OF CYBER HUACKlNG The sex industry uses techniques such as "page jacking" to misdirect or trap people on pornographic web sites as page after page of pornography opens up. Page jacking is a technique the sex industry uses to misdirect users so they mistakenly come to their web sites.212 The web sites include false key-word-descriptions so that the search index will bring these individuals on to pornographic web sites.213 The users will then click on the link of their chosen topic, only to find themselves on a pornographic web site.214 Another technique used by the sex industry is called "Mouse-trapping." "Mouse trapping" occurs when the sex industry web page designers disable browser commands, such as "back" or "close," so that viewers cannot leave a pornographic site.215 Once intended or unintended viewers are on pornographic sites, they are trapped on the pornographic sites because the "back" or "close" buttons/icons are disabled so that when clicked, another pornographic web site opens up, resulting in an endless number of web pages opening up on the viewer's screen?16 In addition, pornographic web sites can change the default homepage setting on a web browser, so the next time the user opens the browser he/she is taken directly to the pornographic site.217 Furthermore, the sex industry has no idea who they are trapping on their web sites, whether they are children or adults who fervently do not want to view pornography.218 Pornographers are very aggressive about using popular current events and search subjects to misdirect viewers.219 The sex industry has exploited just about any topic on the web to trap people onto its web sites?20 Pornographers will even exploit the arrests of other pornographers.221 For 209. Denning & Baugh, supra note 205. 210. HUGHES, supra note 3. 211. 212. 213. 214. 215. Id. Id. !d. !d. Id. 216. HUGHES, supra note 3. 217. Id. 218. HUGHES, supra note 37. 219. Id. 220. Id. 221. Personal communication with Amy Potenza, Research Assistant, University of Rhode Island (May 24, 2001). 146 HASTINGS WOMEN'S LAW JOURNAL [Vol. 13:1 example, when a research assistant performed a computer search for news reports about the break-up of a child pornography ring in Russia, she found that entering the case related keywords directed her to web sites with child pornography.222 VI. CONCLUSION The use of new communication and information technologies for the sexual exploitation of women and children is creating a crisis for women and children's status, rights, and dignity all over the world. Pimps, traffickers, stalkers, and users of pornography and women and children in prostitution have adopted new technologies to further their abuse and exploitation of women and children. The use of new communications and information technologies in the sexual exploitation of women and children continues to grow with the increased number of users on the internet. Internationally, there have been governmental and law enforcement responses to distribution of child pornography, and in the U.S. and U.K. official responses to child stalkers in chat rooms. However, there is little governmental intervention to stop the sexual exploitation of adult women. 222. /d.