Child Pornography on the Internet
Guide No.41 (2006)
by Richard Wortley and Stephen Smallbone
The Problem of Internet Child Pornography
The guide begins by describing the problem and reviewing factors that increase the risks of Internet child pornography. It then identifies a series of questions that might assist you in analyzing your local Internet child pornography problem. Finally, it reviews responses to the problem and what is known about these from evaluative research and police practice.
The treatment of children as sexual objects has existed through the ages, and so too has the production of erotic literature and drawings involving children. However, pornography in the modern sense began with the invention of the camera in the early nineteenth century. Almost immediately, sexualized images involving children were produced, traded, and collected.Even so, child pornography remained a restricted activity through most of the twentieth century. Images were usually locally produced, of poor quality, expensive, and difficult to obtain. The relaxation of censorship standards in the 1960s led to an increase in the availability of child pornography, and, by 1977, some 250 child pornography magazines were circulating in the United States, many imported from Europe.Despite concern about the extent of child pornography, law enforcement agencies had considerable success in stemming the trafficking of these traditional hard-copy forms. However, the advent of the Internet in the 1980s dramatically changed the scale and nature of the child pornography problem, and has required new approaches to investigation and control.
Internet child pornography is unlike most crimes local police departments handle. Local citizens may access child pornography images that were produced and/or stored in another city or on another continent. Alternatively, they may produce or distribute images that are downloaded by people thousands of miles away. An investigation that begins in one police district will almost certainly cross jurisdictional boundaries. Therefore, most of the major investigations of Internet child pornography have involved cooperation among jurisdictions, often at an international level.
However, within this broader scheme, local police departments have a crucial role to play. By concentrating on components of the problem that occur within their local jurisdictions, they may uncover evidence that initiates a wider investigation. Alternatively, they may receive information from other jurisdictions about offenders in their districts. Because of the increasing use of computers in society, most police departments are likely to encounter Internet child pornography crimes. Therefore, it is important that all police departments develop strategies for dealing with the problem. Larger departments or districts may have their own dedicated Internet child pornography teams, but most smaller ones do not, and the responsibility for day-to-day investigations will fall to general-duties officers.It would be a mistake to underestimate the importance of local police in detecting and preventing Internet child pornography offenses. One study found that 56 percent of arrests for Internet child pornography crimes originated from non-specialized law enforcement agencies.
Internet child pornography is only one of a number of problems related to either child abuse or the Internet. Other related problems not directly addressed by this guide include:
- Violence and fatalities
- Exposure to hazardous materials (e.g., clandestine drug labs)
- Trafficking of children and babies and illegal adoption agencies
- Juvenile runaways.
- Online solicitation of children for sexual activity
- Identity theft (sometimes known as phishing)
Defining Child Pornography
The idea of protecting children from sexual exploitation is relatively modern. As late as the 1880s in the United States, the age of consent for girls was just 10 years.In 1977, only two states had legislation specifically outlawing the use of children in obscene material. The first federal law concerning child pornography was passed in 1978, and the first laws that specifically referred to computers and child pornography were passed in 1988. Since that time, there has been a steady tightening of child pornography laws(see Table 1).
|Table 1: Development of child pornography law in the United States|
|1978||Sexual Exploitation of Children Act||First federal law specifically dealing with child pornography. Prohibited the manufacture and commercial distribution of obscene material involving minors under 16.|
|1982||New York v. Ferber||Child pornography not protected by the First Amendment. Child pornography separated from obscenity laws, to be judged on a different standard.|
|1984||Child Protection Act||Age of minor covered by child pornography legislation was raised to 18, and distinction between child pornography and obscenity codified.|
|1986||United States v. Dost||Expanded the definition of child pornography to include sexually suggestive depictions of a lascivious nature.|
|1988||Child Protection and Obscenity Enforcement Act||Illegal to use a computer to depict or advertise child pornography.|
|1990||Osborne v. Ohio||Private possession of child pornography ruled to be illegal.|
|1996||Child Pornography Protection Act||Definition of child pornography expanded to include virtual images of children and images that appear to be of a minor.|
|1998||Child Protector and Sexual Predator Punishment Act||Internet Service Providers (ISPs) required to report known incidents of child pornography to authorities, but not required to actively monitor customers or sites.|
|2002||Ashcroft v. Free Speech Coalition||Virtual images ruled not to be pornography; "appear to be a minor" ruled to be too broad.|
To summarize the current federal legal situation in the United States:
- A child is defined as any person under the age of 18. Legislation has attempted to broaden the law to include computer-generated images (virtual images that do not involve real children) and people over 18 who appear to be minors. However, the court overturned both of these provisions. Congress has subsequently made a number of amendments to tighten federal law in these areas. Because of the evolving nature of legal provision with respect to Internet child pornography, the reader is advised to obtain up-to-date legal advice on the current situation.
- A different and more stringent standard is applied to images involving children than to images involving adults. Pornography involving a child does not have to involve obscene behavior, but may include sexually explicit conduct that is lascivious or suggestive. For example, in United States v. Knox (1993)a man was convicted for possessing videos in which the camera focused on the clothed genital region of young girls.
- Possession of (not just production and trading of) child pornography is an offense. In the case of the Internet, images do not have to be saved for an offense to have occurred—they simply need to have been accessed.
Most states have followed the federal lead with specific legislation, allowing state police to join federal agencies in the fight against child pornography.However, the exact nature of the legislation varies considerably among states. There is also a wide variation in international laws covering child pornography, and this can have significant implications for law enforcement.
Because legal definitions of both child and pornography differ considerably among jurisdictions, for research purposes child pornography is often defined broadly as any record of sexual activity involving a prepubescent person. Pornographic records include still photographs, videos, and audio recordings. The images themselves vary considerably in their graphic content. In some cases individuals may collect images that do not involve overt pornography and are not technically illegal. There are 10 levels of image severity:
- Indicative: non-sexualized pictures collected from legitimate sources (e.g., magazines, catalogs).
- Nudist: naked or semi-naked pictures of children in appropriate settings collected from legitimate sources.
- Erotica: pictures taken secretly of children in which they reveal varying degrees of nakedness.
- Posing: posed pictures of children in varying degrees of nakedness.
- Erotic posing: pictures of children in sexualized poses and in varying degrees of nakedness.
- Explicit erotic posing: pictures emphasizing the genitals.
- Explicit sexual activity: record of sexual activity involving children but not involving adults.
- Assault: record of children subjected to sexual abuse involving digital touching with adults.
- Gross assault: record of children subjected to sexual abuse involving penetrative sex, masturbation, or oral sex with adults.
- Sadistic/bestiality: record of children subjected to pain, or engaging in sexual activity with an animal.
The Role of the Internet in Promoting Child Pornography
The Internet has escalated the problem of child pornography by increasing the amount of material available, the efficiency of its distribution, and the ease of its accessibility. (See Appendix A for a summary of key terms and concepts relating to the Internet.) Specifically, the Internet:
- Permits access to vast quantities of pornographic images from around the world
- Makes pornography instantly available at any time or place
- Allows pornography to be accessed (apparently) anonymously and privately
- Facilitates direct communication and image sharing among users
- Delivers pornography relatively inexpensively
- Provides images that are of high digital quality, do not deteriorate, and can be conveniently stored
- Provides for a variety of formats (pictures, videos, sound), as well as the potential for real-time and interactive experiences
- Permits access to digital images that have been modified to create composite or virtual images (morphing).
Components of the Problem
The problem of Internet child pornography can be divided into three components—the production, distribution, and downloading of images. In some cases, the same people are involved in each stage. However, some producers and/or distributors of child pornography are motivated solely by financial gain and are not themselves sexually attracted to children.
This involves the creation of pornographic images. Collectors place a premium on new child pornography material. However, many images circulating on the Internet may be decades old, taken from earlier magazines and films. Images may be produced professionally, and, in these cases, often document the abuse of children in third-world countries. However, more commonly, amateurs make records of their own sexual abuse exploits, particularly now that electronic recording devices such as digital cameras and web cams permit individuals to create high quality, homemade images.With the advent of multimedia messaging (MMR) mobile phones, clandestine photography of children in public areas is becoming an increasing problem.
This involves the uploading and dissemination of pornographic images. These images may be stored on servers located almost anywhere in the world. Distribution may involve sophisticated pedophile rings or organized crime groups that operate for profit, but in many cases, is carried out by individual amateurs who seek no financial reward. Child pornography may be uploaded to the Internet on websites or exchanged via e-mail, instant messages, newsgroups, bulletin boards, chat rooms, and peer-to-peer (P2P) networks. Efforts by law enforcement agencies and Internet Service Providers (ISPs) to stop the dissemination of child pornography on the Internet have led to changes in offenders' methods. Child pornography websites are often shut down as soon as they are discovered, and openly trading in pornography via e-mail or chat rooms is risky because of the possibility of becoming ensnared in a police sting operation (e.g., undercover police entering chat rooms posing as pedophiles or as minor children). Increasingly those distributing child pornography are employing more sophisticated security measures to elude detection and are being driven to hidden levels of the Internet (see Table 2).
|Table 2: Distribution methods of child pornography on the Internet |
|Web pages and websites||Specific child pornography websites may be created, or child pornography images may be embedded in general pornography sites. However, there is debate about how much child pornography is available on the web. Some argue that it is relatively easy to find images. Others argue that, because of the vigilance of ISPs and police in tracking down and closing child pornography websites, it is unlikely that a normal web search using key words such as childporn would reveal much genuine child pornography. Instead, the searcher is likely to find legal pornographic sites with adults purporting to be minors, 'sting' operations, or vigilante sites. One strategy of distributors is to post temporary sites that are then advertised on pedophile bulletin boards. To prolong their existence these sites may be given innocuous names (e.g., volleyball) or other codes (e.g., ch*ldp*rn) to pass screening software. The websites may be immediately flooded with hits before they are closed down. Often the websites contain Zip archives, the password for which is then later posted on a bulletin board.|
|Web cam||Images of abuse may be broadcast in real time. In one documented case of a live broadcast, viewers could make online requests for particular sexual activities to be carried out on the victim.|
|E-mail attachments are sometimes used by professional distributors of child pornography, but more frequently they are used to share images among users, or they are sent to a potential victim as part of the grooming/seduction process. This method is considered risky by seasoned users because of the danger in unwittingly sending e-mails to undercover police posing as pedophiles or as potential victims.|
|E-groups||Specific child pornography e-groups exist to permit members to receive and share pornographic images and exchange information about new sites. Some of these groups appear on reputable servers and are swiftly shut down when they are detected. However, they may use code names or camouflage child pornography images among legal adult pornography to prolong their existence.|
|Newsgroups||Specific child pornography newsgroups provide members with a forum in which to discuss their sexual interests in children and to post child pornography. This is one of the major methods of distributing child pornography. Some child pornography newsgroups are well known to both users and authorities (for example, the abpep-t or alternative binaries pictures erotica pre-teen group). Most commercial servers block access to such sites. Some servers do provide access to them but a user runs the risk of having his/her identity captured either by the credit card payments required for access, or the record kept by the server of his/her IP address. However, a computer-savvy user can access these groups by using techniques that hide his/her identity by concealing his/her true IP address.|
|Bulletin Board Systems (BBS)||Bulletin boards may be used legally to host discussions that provide advice to seekers of child pornography, including the URLs of child pornography websites and ratings of those sites. These bulletin boards may be monitored by system administrators to exclude bogus or irrelevant postings, such as from vigilantes.|
|Chat rooms||Chat rooms may be used to exchange child pornography and locate potential victims. Chat rooms may be password-protected. Open chat rooms are avoided by seasoned child pornographers because they are often infiltrated by undercover police.|
|Peer-to-peer (P2P)||P2P networks facilitate file sharing among child pornography users. These networks permit closed groups to trade images.|
This involves accessing child pornography via the Internet. The images do not need to be saved to the computer's hard drive or to a removable disk to constitute downloading. In some cases a person may receive spam advertising child pornography, a pop-up link may appear in unrelated websites, or he may inadvertently go to a child pornography website (e.g., by mistyping a key word). In most cases, however, users must actively seek out pornographic websites or subscribe to a group dedicated to child pornography. In fact, it has been argued that genuine child pornography is relatively rare in open areas of the Internet, and, increasingly, those seeking to find images need good computer skills and inside knowledge of where to look. Most child pornography is downloaded via newsgroups and chat rooms. Access to websites and online pedophile groups may be closed and require paying a fee or using a password.
Extent of the Problem
It is difficult to be precise about the extent of Internet child pornography, but all of the available evidence points to it being a major and growing problem. At any one time there are estimated to be more than one million pornographic images of children on the Internet, with 200 new images posted daily. One offender arrested in the U.K. possessed 450,000 child pornography images. It has been reported that a single child pornography site received a million hits in a month. As noted above, one problem in estimating the number of sites is that many exist only for a brief period before they are shut down, and much of the trade in child pornography takes place at hidden levels of the Internet. It has been estimated that there are between 50,000 and 100,000 pedophiles involved in organized pornography rings around the world, and that one-third of these operate from the United States.
Profile of Users
There is no one type of Internet child pornography user, and there is no easy way to recognize an offender. Having a preconceived idea of a child sex offender can be unhelpful and prove a distraction for investigating police. Users of Internet child pornography:
- Are not necessarily involved in hands-on sexual abuse of children. It is not known exactly how many people may access child pornography on the Internet without ever physically abusing a child. Before the Internet, between one-fifth and one-third of people arrested for possession of child pornography were also involved in actual abuse. However, the Internet makes it easy for people who may never have actively sought out traditional forms of child pornography to satisfy their curiosity online and this may encourage casual users. Looking at the relationship from the other direction, those convicted of sexually abusing children will not necessarily seek out or collect child pornography, with one study putting the number of offenders who do so at around 10 percent.The term child molester covers a wide variety of offenders, from serial predators to situational offenders who may not have ingrained sexual interest in children.
- May come from all walks of life and show few warning signs. In fact, users of child pornography on the Internet are more than likely to be in a relationship, to be employed, to have an above average IQ, to be college educated, and to not have a criminal record.Those arrested for online child pornography crimes have included judges, dentists, teachers, academics, rock stars, soldiers, and police officers. Among the few distinguishing features of offenders are that they are likely to be white, male, and between the ages of 26 and 40, and may be heavy Internet users to the extent that it interferes with other aspects of their lives.
A Psychological Typology
Sexual attraction to children is known as pedophilia.However, an interest in Internet child pornography may be best thought of as falling along a continuum rather than in terms of a hard and fast distinction between pedophiles and non-pedophiles. People can behave very differently on the Internet than they do in other areas of their lives. Interacting anonymously with a computer in the safety of one's own home encourages people to express hidden thoughts and desires. Offenders vary in the strength of their interest in child pornography, as well as in the level of severity of the pornographic image to which they are attracted. From a psychological perspective, based on a typology of general pornography users, the following categories of Internet child pornography users are suggested:
- Recreational users: They access child pornography sites on impulse, out of curiosity, or for short-term entertainment. They are not seen to have long-term problems associated with child pornography use.
- At-risk users: They are vulnerable individuals who have developed an interest in child pornography, but may not have done so had it not been for the Internet.
- Sexual compulsives: They have a specific interest in children as sexual objects and seek out child pornography.
An Offending Typology
Variations among offenders translate into different patterns of Internet behavior. Offenders vary in the level of their involvement in Internet child pornography, the degree of networking in which they engage with other offenders, their expertise in employing security strategies to avoid detection, and the extent to which their Internet behavior involves direct sexual abuse of children. The following typology of child pornography offending has been suggested:
- Browsers: Offenders who stumble across child pornography but knowingly save the images. They are not involved in networking with other offenders and do not employ security strategies to avoid detection. Their browsing is an indirect abuse of children.
- Private fantasizers: Offenders who create digital images (e.g., through morphing) for private use to satisfy personal sexual desires. These offenders do not network with other offenders, do not employ security strategies, and their private fantasies are an indirect abuse of victims.
- Trawlers: Offenders who seek child pornography on the web through open browsers. They may engage in minimal networking, but they employ few security strategies and their trawling is an indirect abuse of victims.
- Non-secure collectors: Offenders who seek child pornography in non-secure chat rooms (i.e., chat rooms that do not employ security barriers such as passwords) and other open levels of the Internet. They are involved in relatively high levels of networking, and, by definition, do not employ security strategies. Their collecting behavior is an indirect abuse of children. Because of the non-secured nature of their activities, there are limits to the number and nature of the images they can collect.
- Secure collectors: Offenders who are members of a closed newsgroup or other secret pedophile ring. They engage in high levels of networking and employ sophisticated security measures to protect their activities from detection. Their collecting behavior is an indirect abuse of children. Because they occupy hidden levels of the Internet, they have access to a wide range of images. They may engage in obsessive levels of collecting, which not only involves amassing huge numbers of images, but also carefully cataloging and cross referencing them. As with other types of collections, they may expend considerable effort in obtaining rare and highly prized images. The collection may become an end in itself.
- Groomers: Offenders who develop online relationships with children and send pornography to children as part of the grooming process. Grooming involves direct abuse of children. They may or may not be involved in wider networking with other offenders, but their contact with children exposes them to risk of detection. The child may tell someone about the relationship, or the offender may be unwittingly communicating with an undercover police officer.
- Physical abusers: Offenders who sexually abuse children and for whom an interest in child pornography is just part of their pedophilic interests. They may record their own abuse behaviors for their personal use, in which case, from a legal standpoint, the possession of pornography is secondary to the evidence of their abusive behavior that it records. They may or may not network. By definition, a physical abuser directly abuses victims and his security depends upon the childs silence.
- Producers: Offenders who record the sexual abuse of children for the purpose of disseminating it to others. The extent of their networking varies depending on whether they are also distributors. Again the producer's direct abuse of the victim compromises his security.
- Distributors: Offenders involved in disseminating abuse images. In some cases they have a purely financial interest in child pornography. More often, offenders at any of the above levels who share images may be classified as distributors. Thus, the extent of a distributor's networking, his level of security, and whether he engages in direct abuse of children depends upon the level at which he is operating.
Effects of Child Pornography
Effects on the Children Portrayed
The vast majority of children who appear in child pornography have not been abducted or physically forced to participate.  In most cases they know the producer—it may even be their father—and are manipulated into taking part by more subtle means. Nevertheless, to be the subject of child pornography can have devastating physical, social, and psychological effects on children.
The children portrayed in child pornography are first victimized when their abuse is perpetrated and recorded. They are further victimized each time that record is accessed. In one study, 100 victims of child pornography were interviewed about the effects of their exploitation—at the time it occurred and in later years. Referring to when the abuse was taking place, victims described the physical pain (e.g., around the genitals), accompanying somatic symptoms (such as headaches, loss of appetite, and sleeplessness), and feelings of psychological distress (emotional isolation, anxiety, and fear). However, most also felt a pressure to cooperate with the offender and not to disclose the offense, both out of loyalty to the offender and a sense of shame about their own behavior. Only five cases were ultimately reported to authorities. In later years, the victims reported that initial feelings of shame and anxiety did not fade but intensified to feelings of deep despair, worthlessness, and hopelessness. Their experience had provided them with a distorted model of sexuality, and many had particular difficulties in establishing and maintaining healthy emotional and sexual relationships.
Effects on Users
The effects of pornography on users have been extensively researched but results are contentious. There are at least five possible relationships between pornography use and the sexual abuse of children:
- Pornography use is an expression of existing sexual interests. An individual who sexually abuses children seeks out child pornography as part of his/her pattern of sexual gratification. The offender's sexual interests cause his/her pornography use rather than the other way around.
- Pornography is used to prime the individual to offend. An individual deliberately views child pornography immediately prior to offending. Pornography is used in the short term to sexually stimulate the offender in preparation for offending.
- Pornography has a corrosive effect. An individual becomes increasingly interested in child pornography, is attracted to images of increasing severity, and becomes desensitized to the harm victims experience. Use of pornography in the long term may also increase the risk that the person will sexually abuse a child.
- Pornography has a cathartic effect. Viewing child pornography is the sole outlet for an individual's sexual attraction to children. Pornography use may substitute for, or even help the individual resist, engaging in hands-on offending.
- Pornography is a by-product of pedophilia. Pornography is created in the process of carrying out sexual abuse or is used to groom potential victims and prepare them for abuse. Pornography is incidental to the abuse suffered by the victim.
In all likelihood, the effects of child pornography vary among users, and all of the above relationships may apply depending upon the individual in question.
The Internet and Other Forms of Child Sexual Abuse
In addition to child pornography, the Internet facilitates child sexual abuse in the following ways:
- It allows networking among child abuse perpetrators: The Internet facilitates a subculture of pedophiles, who may share information and tactics and support each other's belief systems.
- It may be used to seek out and groom victims: Perpetrators may enter children's or teens’ chat rooms under an assumed identity to access and establish relationships with potential victims.
- It may be used in cyber-stalking: Children may be sexually harassed via the Internet.
- It may be used to promote child sexual tourism: Information is made available to help individuals locate child-sex tourism operators or to make direct contact with child prostitutes.
- It may be used in trafficking children: Mail-order children are available over the Internet.
Sources of Digital Evidence
Computers and their associated services retain a considerable amount of evidence of their use. Determined, computer-savvy offenders may take precautions to cover their tracks, but many offenders will have neither the foresight nor the necessary expertise to do so, and will leave a trail of incriminating evidence.
- The offender's computer: Downloaded images saved to a computers hard drive are the most obvious evidence of pornography use. However, there are also more subtle records that technicians can locate when examining a suspect's computer. For example, log files show who was logged into the computer and when; modem logs record when a computer was connected to the Internet; Web browser history entries show an offenders online activity; and e-mail and chat logs reveal online communication with cohorts or potential victims. Note, however, that seizure of a suspect's computer requires specialized expertise, and, if handled incorrectly, may result in the loss of critical evidence.
- Hand-held devices: An increasing number of devices contain components of a computer (referred to as embedded computer systems) and can be used in child pornography. These devices include digital cameras, personal digital assistants (PDAs), and mobile phones. For example, digital cameras can be used to record abuse; the files can then be easily uploaded to the Internet. Similarly, in addition to voice conversations between perpetrators, mobile phones increasingly permit the recording, storing, and transmitting of digital images. These devices may have incriminating digital records stored on their memory cards.
- Servers: Different servers may provide information with which to track pornography use. ISP authentication servers record customer account details against IP addresses (authentication logs), which can then be used to identify users. FTP and web servers used to upload and download electronic files have logs that record users' IP addresses, what files were accessed, and when. Similarly, e-mail servers retain logs of customer use. Local area network servers may be used to store collections of pornography for personal use. Individuals may use local servers connected to their work computers so that searching a suspects work server may reveal hidden collections of pornography.
- Online activity: Purpose-built or commercially available digger engine software allows law enforcement personnel to monitor online activity and identify the IP addresses of chat room contributors. Although online operations can yield conclusive digital evidence of an offender's involvement in Internet child pornography activities, officers should be careful not to become overzealous and engage in entrapment.
Challenges in Controlling Internet Child Pornography
Internet child pornography presents some unique challenges for law enforcement agencies. These challenges include:
- The structure of the Internet: The structure of the Internet makes control of child pornography very difficult. The Internet is a decentralized system with no single controlling agency or storage facility. Because it is a network of networks, even if one pathway is blocked, many alternative pathways can be taken to reach the same destination. Similarly, if one website or newsgroup is closed down, there are many others that can instantaneously take its place. The decentralized nature of the Internet, and resultant difficulties in restricting the distribution of child pornography, is exemplified by P2P networks involving direct connections among computers without the need for a central server. It has been argued that the Internet is the ultimate democratic entity and is essentially ungovernable.
- The uncertainties of jurisdiction: The Internet is an international communication tool that crosses jurisdictional boundaries. Not only is cooperation among law enforcement agencies necessary to track offenders across jurisdictions, it is required to coordinate resources and avoid duplication of effort. Parallel operations run from different jurisdictions may unknowingly target the same organization or offender. Equally problematic is the issue of who is responsible for investigating child pornography on the Internet when there is no clue as to where the images originate. There is a potential for pornography crimes to go uninvestigated because they do not fall within a particular law enforcement jurisdiction.
- The lack of regulation: The Internet, by its nature, is difficult to regulate, but many jurisdictions are reluctant to introduce laws that might help control Internet use. There are debates about the appropriate weight to give to the community's protection on the one hand, and to freedom of speech and commercial interests on the other. There is also legal ambiguity about whether ISPs should be liable for the material they carry (as are television stations) or merely regarded as the conduits for that material (similar to the mail service). The end result is that ISPs' legal obligations with respect to Internet child pornography are often unclear, and, for the most part, the emphasis has been on self-regulation.
- The differences in legislation: To the extent that there have been attempts to regulate the Internet, control efforts are hampered by cross-jurisdictional differences in laws and levels of permissiveness regarding child pornography. For example, in the United States a child is defined as someone under 18; in Australia the age is 16.Moreover, countries vary in their commitment to enforce laws and act against offenders, either for cultural reasons or because of corruption.
- The expertise of offenders: As the typology of Internet offending behavior suggests, offenders vary in the degree to which they employ elaborate security measures to avoid detection. There is a core of veteran offenders, some of whom have been active in pedophile newsgroups for more than 20 years, who possess high levels of technological expertise. Pedophile bulletin boards often contain technical advice from old hands to newcomers. It has been argued that many Internet sting operations succeed only in catching inexperienced, low-level offenders.
- The sophistication and adaptation of Internet technology: The expertise of offenders is enhanced by the rapid advances in Internet technology. In addition to P2P networks, recent developments include remailers (servers that strip the sender's identity from e-mail) and file encryption (a method of hiding or scrambling data).A technological race has developed between Internet pornographers and law enforcement agencies.
- The volume of Internet activity: The sheer amount of traffic in child pornography makes the task of tracking down every person who visits a child pornography site impossible. Many offenders realize that realistically their chances of being caught are quite remote. Similarly, while perhaps worthwhile activities, catching peripheral offenders or disrupting individual networks may have little overall impact on the scale of the problem.
Free Bound Copies of the Problem Guides
You may order free bound copies in any of three ways:
Online: Department of Justice COPS Response Center
Phone: 800-421-6770 or 202-307-1480
Allow several days for delivery.
Email sent. Thank you.
Child Pornography on the Internet
Send an e-mail with a link to this guide.
Error sending email. Please review your enteries below.
- To *
Separate multiple addresses with commas (,)
- Your Name *
- Your E-mail *
- Note: (200 character limit; no HTML)
Please limit your note to 200 characters.