NEW INFORMATION TECHNOLOGIES ON TRAFFICKING IN HUMAN BEINGS

Page 19

File transfer protocol Although one of the oldest ways of exchanging files on the Internet, ftp (file transfer protocol), is still popular with pedocriminals for one to one exchange of child pornography. Ftp allows users to have direct access to another’s computer hard drive to upload and download files. This technique of file exchange is most likely to occur between child pornography collectors who have met in other venues and come trust each other. Search engines Even the everyday search engine can contribute to the expansion of sexual exploitation. Search engines are becoming more sophisticated and powerful in indexing the content of cyberspace. As a result users seeking particular types of pornography, women, children, locations, etc. can find it faster and with more precision. As a computer industry consultant said, “The discerning pornography users can find it faster. They no longer have to just stumble upon it.”18 Peer to peer networks and file swapping programs Recently, a new technology was developed and released as freeware that can create a network of peer computers. The result is an open, decentralized, peer-to-peer system. File swapping programs are used to find files on the network. Using the program the user designates one directory on his/her computer that will be open to the public and another for downloaded files. When the user logs onto the Internet, he/she will be automatically connected to all other people running the same program. All available files are indexed into a large searchable database. When keywords are entered the request moves from one computer to the next returning links to files. Then the program can download the requested files from other member’s network computers.19 It is being toted as a revolution in how computers and people communicate with each other on the Internet. These programs create a decentralized system, meaning there is no central server through which all communications pass. Consequently, there are no logs of transmissions, and transmissions are not traceable because each site can only trace the connection back one level. You can enter the public network or create a private one of your own.20 These features are what make this new information technology so attractive to perpetrators. Another program claims to take anonymity one step further by disguising the user as well21. Encryption When criminal activity on the Internet is talked about, encryption is always mentioned as a technology likely to be adopted to disguise the content of files. Several law enforcement officials in UK and the U.S. indicated that at this point the capabilities and threat of encryption seemed to be talked about more than it is used. 18

Interview, Jeff Middleton, Computer Focus, USA, 17 May 2001

19

“Gnutella-Welcome to Gnutella”, site accessed 1 May 2001

20

Ron Harris “Gnutella gives copyright holders headaches” Associated Press, 10 April 2000

21

Berst, 24 April 2000

19


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.