A Study of the Users

A Study of the Users

The Impact of the Use of New Communications and Information Technologies on Trafficking in Human Beings for Sexual Exploitation A Study of the Users Donna M. Hughes University of Rhode Island, USA The Group of Specialists on the Impact of the Use of New Information Technologies on Trafficking in Human Beings for the Purpose of Sexual Exploitation (EG-S-NT) Committee for Equality between Women and Men (CDEG) Council of Europe May 2001 Table of Contents Introduction ..........................................................................................................................................4 Definition of trafficking for sexual exploitation.............................................................................4 Methods..........................................................................................................................................5 Organization of report ....................................................................................................................5 The Technologies ..................................................................................................................................6 New and Old Technologies ................................................................................................................6 Multi-Media Sex Industries................................................................................................................8 Technologies of the Near Future ........................................................................................................8 Wireless Internet access .................................................................................................................9 Internet Venues, Applications and Services.......................................................................................9 Sex Industries and Perpetrators ........................................................................................................10 Newsgroups..................................................................................................................................10 Web message and bulletin boards ................................................................................................10 Web sites ......................................................................................................................................10 Chat rooms ...................................................................................................................................10 File transfer protocol ....................................................................................................................11 Search engines..............................................................................................................................11 Peer to peer networks and file swapping programs......................................................................11 Encryption ....................................................................................................................................12 Unethical Practices ...........................................................................................................................12 Anonymity and Disguise ..................................................................................................................13 New technologies, new capacities, and increased production and distribution............................13 The Use of New Technologies ............................................................................................................14 Communication Among Traffickers and Pimps...............................................................................14 Latvian Web site for prostitution and pornographic services.......................................................14 Russian folk dancers forced to strip in Alaska, USA ...................................................................15 Traffickers and Stalkers Contacting Victims....................................................................................15 Traffickers recruiting victims.......................................................................................................16 Stalking children in chat rooms....................................................................................................16 Investigation of stalking in the UK ..............................................................................................17 U.S. girl stalked from Greece.......................................................................................................18 Communication Between Pimps, Pornographers and Users ............................................................19 Distribution of Russian produced child pornography; Pimping Russian children .......................19 Pimping women on the Web ........................................................................................................19 Communication Among Men Seeking to Sexually Exploit Women and Children ..........................21 Latvian and Swedish child sex abusers and pornographers..........................................................21 Communication about buying women and girls for prostitution..................................................22 Transmission of Images, Videos and Live Broadcasts.....................................................................22 Pimping from prison by Web cam................................................................................................22 Donna M. Hughes A Study of the Users 2 Japanese women in live performances broadcast from U.S. ........................................................22 Rape and torture images and videos.............................................................................................23 Global epidemic of sexual exploitation on the Internet................................................................24 Facilitation of Access to Pornography..............................................................................................25 Landslide Verification Service.....................................................................................................25 Internet service provider guilty of knowingly providing access to child pornography................26 The Users.............................................................................................................................................27 Internet Usage Statistics in Europe...................................................................................................27 The Collectors ..................................................................................................................................28 Collectors of child pornography and the role of the Internet........................................................28 Collectors of male child pornography ..........................................................................................29 The Stalkers......................................................................................................................................29 The Buyers .......................................................................................................................................30 Links between prostitution and pornography ...............................................................................32 The Producers...................................................................................................................................32 Producers of child pornography ...................................................................................................32 Producers of adult pornography ...................................................................................................33 Budapest – Pornography production capital.................................................................................34 The Consumers.................................................................................................................................35 Workplace Users ..........................................................................................................................36 The Unintended Users ......................................................................................................................38 The Future User................................................................................................................................39 The Challenges....................................................................................................................................40 Denial of the Harm ...........................................................................................................................40 Disconnection Between Acts and Images ........................................................................................42 References ...........................................................................................................................................44 Donna M. Hughes A Study of the Users 3 Introduction The trafficking in women and children for sexual exploitation is a global human rights crisis being perpetrated by individual criminals and organized crime groups, and facilitated by increased tolerance for the sexual exploitation and sexual abuse of women and children. The favored destination countries for trafficked women are the wealthy states of Western Europe,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    48 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us