Using Real-Time Monitoring to Gather Data on Online Predators
Total Page:16
File Type:pdf, Size:1020Kb
A Criminological Analysis: Using Real-Time Monitoring to Gather Data on Online Predators Kasun Jayawardena, B.Jus Supervisor: Dr. Colin Thorne Submitted in fulfilment for the degree of Masters of Justice (Research) School of Justice Faculty of Law QUEENSLAND UNIVERSITY OF TECHNOLOGY Abstract The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in 2 regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators. 3 Contents Chapter 1: Introduction ............................................................................................................. 13 Defining Child Sexual Abuse .................................................................................................... 16 Abusers and Online Predators ............................................................................................... 18 Legal Aspects ............................................................................................................................ 19 Child Sexual Abuse and Offenders ....................................................................................... 20 Chapter 2: Technology Used to Facilitate Child Sexual Abuse .............................................. 22 The Evolving Internet: Reimagining Old Technologies ........................................................... 22 Anonymity ............................................................................................................................. 23 Internet Relay Chat (IRC)...................................................................................................... 24 mIRC ..................................................................................................................................... 25 File servers and other add-on software .................................................................................. 25 File sharing software ............................................................................................................. 25 Image sharing ........................................................................................................................ 26 Transcript 1: Image Sharing of Child Pornography and Comments ................................ 26 Social networking .................................................................................................................. 26 Instant messengers ................................................................................................................. 26 Chapter 3: Theory and Practice of Paedophilia in the Internet Age ..................................... 28 Child Sexual Abuse and Abusers .............................................................................................. 29 Integrated Theory .................................................................................................................. 29 Quadripartite Model .............................................................................................................. 30 Pre-condition Model .............................................................................................................. 30 Pathways Model .................................................................................................................... 30 4 Profiling Abusers....................................................................................................................... 31 Behavioural and Psychological Research ................................................................................. 32 Communication ......................................................................................................................... 40 Anonymity ................................................................................................................................. 41 Organised Abuse ....................................................................................................................... 41 Knowledge Gaps ....................................................................................................................... 42 Behavioural Analysis and Profiling ....................................................................................... 42 Technological Utilisation ...................................................................................................... 42 Communication and Social Structure Analysis ..................................................................... 43 Previous Methods ...................................................................................................................... 43 The Need for Ongoing Primary Research ................................................................................. 45 Chapter 4: Research Methods ................................................................................................... 47 Design........................................................................................................................................ 47 Data Collection Procedure ........................................................................................................ 48 Internet Relay Chat Environment .......................................................................................... 48 Table 1: Logged Chatrooms .............................................................................................. 49 Method of Collection ............................................................................................................. 51 Setting Up of Monitoring ...................................................................................................... 52 Figure 1: Virtual Private Network ..................................................................................... 53 Internet Relay Chat Communication ..................................................................................... 54 Screenshot 1: mIRC Setup Options .................................................................................... 57 Transcript 2: Exits, Entrances and IP/ISP Information .................................................... 58 Transcript 3: Conversation, Advertisement and Fserver .................................................. 58 Sampling.................................................................................................................................... 60 5 Figure 2: Example of Whois .............................................................................................