SACRED REALMS and ICONS of TEE Damnled
Total Page:16
File Type:pdf, Size:1020Kb
SACRED REALMS AND ICONS OF TEE DAMNlED THE ETHNOGRAPHY OF AN INTERNET-BASED CE-I-TLD PORNOGRAPHY RPNG by iAN FERGUSON A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillrnent of the requirements for the degree of Masters of Arts Department of Sociology and Anthropo iogy Carleton University Ottawa, Ontario May 1998 Copyright O 1998 Ian Ferguson National Library Bibliothèque nationale 6*m of Canada du Canada Acquisitions and Acquisitions et Bibliographie Services services bibliographiques 395 Wellington Street 395, rue Wellington Ottawa ON K1A ON4 Ottawa ON KI A ON4 Canada Canada Your file Voire rergrencs Our Ne Nomreférence The author has granted a non- L'auteur a accordé une licence non exclusive licence allowing the exclusive permettant à la National Librq of Canada to Bibliothèque nationale du Canada de reproduce, loan, distri'bute or seLl reproduire, prêter, distribuer ou copies of this thesis in microfom, vendre des copies de cette thèse sous paper or electronic formats. la forme de microfiche/fih, de reproduction sur papier ou sur format électronique. The author retains ownership of the L'auteur conserve la propriété du copyright in this thesis. Neither the droit d'auteur qui protège cette thèse. thesis nor substantial extracts fkom it Ni la thèse ni des extraits substantiels may be pRnted or othemise de celle-ci ne doivent être imprimés reproduced without the author's ou autrement reproduits sans son permission. autorisation, Over the past five years? there has been increasing attention paid to child pornography trficking via the Internet. One area where research has been remiss. however, concerns how online comunities involved in child pomography trficking are established and sustained on the Internet' in particular those whose members maintain no contact outside their cyberspace environments. This thesis presents an ethnographie account of the exchange relations of one Mernet-based child pornography ring operating via an htemet ReIay Chat (IRC) channel, and the factors that influence and disrupt these relations. In doing so, the author presents a case study of human adaptation to a particular environmental domain in cyberspace through an examination of the dynarnics of this vhaicomrnunity and the nature of the criminal threat that it poses. The process of writing this thesis has been a deeply disturbing experience. and has been taxing both physically and psychologically. The nature of this type of research forced me to witness firsthand some of the most abhorrent misdeeds capable of hmankind. Consequently, 1 am indebted to several people for their generous assistance. suppoa and encouragement during the course of this project. I owe a great deal to my advisors John Cove and Scott Clark. For the past five years, John and Scott have inspired and guided me both academically and professionally. Their çenerosity and encouragement has led me to challenge wwhat it means to be an anthropologist, to take nsks, and to apply my knowledge to the criminal justice arena. Additional thanks are given to Scoa for allowing me the opportunity to work as a consultant with the Department of Justice Canada. This project brought me into close contact with several mernbers of the law enforcement cornrnunity-. I am grateful to Sergeant Keith Daniels, Sexual Assauit and Child Abuse Section? of the Ottawa Carleton Regionai Police Service. Keith went beyond the call of duty to provide me with on-going assistance and information, and was always a telephone call away in the event of trouble. 1 cannot rhank him enough. 'The detectives of the Ontario Provincial Police Pomography Crime Unit (Project P) are thanked for their generous support and for taking the time to discuss this project. Several important avenues of research were also discussed with Marilyn Young of Revenue Canada's Intelligence SeMces Division. Additional thanks are extended to David Sunahara of the Canadian Police College in Ottawa; Special Agent Caroline Thrasher of .. Il the FB'[; Doug Skoog or the University of Winnipeg; and Mark Irving of' the Canadian Center fbr Justice Statistics ai Statistics Canada. 1 am fortiinate to Iinvc a network ofo colleagues wlio have played instrumental roles in my acadernic. profèssional and persona1 lives. Marc Tyrrell lias been a driving force througlioiit my iindcrgrndiinte and greduate careers. tIis vast knowledge, insiglits and motivation liwc giiidcd my rcsearcli and Icd nie io rrcopnize the necessity Tor anthropology in tlir contcniporary world. Tony Maltby served as a research assistant both off and online. Tony's knowledge of cornputers and IRC facilitated this project. 1 also thank Iiim Tor ilic coiiniless Iiours spent assisting in obscrvaiions, annlyzing field Iogs, sitinp in cars waitinp for infamants, and conduciing interviews. Additional gratitude is estended to Paul Thibaudeau and Professor Brion Given Tor their insiglits into cyber-arclieology and cy ber-aiithropoloçy. ; I would'hso likc to iliank rny friend Janet Lee at the Ontario ~inistry'ofthe ~ttohe~General. Janet's cliarm. espertise and humor were instnirnental to the success of this tliesis. 1 niii yrntcliil. For clcnriiig iip ;iiiy poiciiiiol siings wiili tiic titlc. I wiild likc lo tliiink Jmc. Jensen of Sierra Onlinc. Spcciül yrniiiudc is cstcnded io scvernl îriends Tor ilieir support, encoungeknt and assistance during tlic coursc ol iliis rcsenrcli. My besi Sriend Stcve Cliflord lias always becn ilierc for nic during tlic hcst and worst of' tinics, and is responsible for developing niy iiiicrcsts in coniputcrs and tlic online world. Steve Clifforci, Andrea - Stevens and Dnniia IIcSouzn arc i1i:iiikcd lbr tlic ncconiniodntion~during my offlinc fieldwork in Toron6 CmMcNulty, my rcscarcli partncr at Jiisiice and î'ricnd lias continued to believe in my research. I am also gratefid to my good fiend Jason Throop for his knowledge. sarcasm and of course, the continued use of his laptop dunng this project. Lastly. I would iike to thank Mary Vincent and my parents who have continued to stand by me and have given me support and courage throughout my academic and professional careers. 1thank them for their patience during this project, whicli has robbed so much time away fiom them. TABLE OF CONTENTS Acknowledgments Table of Contents List of Tables List of Figures Introduction Organization Note on Language Methodology & Ethics lnvestigative Ethnography Background Investigation Sources Bac kground Interviews Approaching the Field Technological Considerations EstabIishing Contact Participant Observation Ethical and Legal Implications of the Research Historical Overview and Literature Review The Internet Pomography Debate: Regulation & Perceptions of Safety Content Regulation "Stranger Danger" and Technological Uncertainty Issues of Availability and Accessibility Definitions Child Sema1 Victimization Child Molesters, Pedophiles and Infantophiles Child Pornography Rings Illegal Pornography Child Pornography Technical Child Pornography Simdated Child Pornography Digitally Sirnulated Child Pornography Surnrnary: Towards the Virtualization of the Child Pomography RUig Virtualizing the Child Pornography Ring Environmental Domains in Cyberspace Virtuai Settlements and Virtual Communities Virtual Cornmunities Virtual Settlements # 1OO%preteenpixxx: A Virtual Child Pomography Ring Social Interaction in Internet Relay Chat A Community Threat Assessment Model Stage One: Classification of Action Stage Two: Rationalization for Action Applying the Model nireat Assessment Summary The Channel The Channel Name: #1OO%preteenpixxx Inside # l OO%preteenpixxx The Channel Window Language Channel Users User Profile Reasons for Involvement Collectors Suppliers Times of Use Interna1 Trade Technologies File Servers Private Trading Que- Window Direct Client-to-Client External Trade Technologies File Transfer Protocol Sites Usenet Newsgoups Web Sites The Materials Media Titles Age, Gencier and Ethnicity- Environment Degees of Explicitness and "Legalitfl Specialized and Fetish Files The 'Value" of the Material Trade Ratios The Credit Systern Determination of "Value" Comrnents Law Enforcement Agents and Anti-Child Pomography Crusaders Channel Security Epilogue and Conclusions Appendix A: Key Informant Interview Schedules Al - Law Enforcement Officers and Intelligence Officers A2 - Online Infformants Appendix B: Statement of Ethics vii Appendix C: Some hi& profile Canadian Intemet child pomography cases 146 Appendix D: File Narnes Endnotes Glossary Re ferences LIST OF TABLES Table 1. IRC Modes LIST OF FIGIRES Figure 1. A digitally simulated pomographic image Figure 2. Environmental Domains in Cyberspace Figure 3. SenLement Taxonomy Figure 4. Classification of Action Figure 5. Rationalization for Action Figure 6. Action Assessrnent for #1 OO%preteenpixxx Community Figure 7. The title bar Figure 8. Main rnIRC screen Figure 9. DCC Chat Request Figure 10. Receiving a File using DCC Figure 11. Expiicitness and Legality of Materials Al1 it takes for evil to prevail is for good men to do nothing. - Ethical Hackers Against Pedophilia Smut give me smut and nothing but. A dirty novel 1 can't shut, if it's uncut and unsubtle For the graphic pictures I adore Indecent magazines galore 1 love them more if they're hardcore Stnzrr - Tom Lehrer INTRODUCTION The rapid increase in the mainstream popularity of the [ntemet over the past decade has led to a variety of real-world crirninals taking advantage of this technology to faci!itate their actions. In many cases, Intemet technology has allowed