Term of Award
Spring 2016
Degree Name
Master of Arts in Social Sciences (M.A.)
Document Type and Release Option
Thesis (open access)
Copyright Statement / License for Reuse
This work is licensed under a Creative Commons Attribution 4.0 License.
Department
Department of Sociology and Anthropology
Committee Chair
Adam Bossler
Committee Member 1
Laurie Gould
Committee Member 2
John Brent
Abstract
Throughout recorded history, children have been subjected to sexual exploitation. Child predators and pedophiles often take great risk and go to extreme lengths to sexually exploit a child. With technological advancements many individuals became globalized and connected with the invention of the computer, the internet and its attributes. However, child predators quickly took note of the vulnerability of children as they begin to groom them online. The problem quickly evolved as the Deep (Dark) Web and encryption were created. This put great stress upon law enforcement entities as locating and combating these predators became exhausting tasks. It’s most often that these predators evolve quicker than law enforcement. Most recently, the use of hacking has become a successful tool in a child predator’s arsenal. To better understand this new phenomena, this study will focus on interviewing local, state, and federal law enforcement agents on detection, combating, prevention and direction of this problem. The results suggests that child predator hacking is a very rare crime. In fact, only one of the five officers interviewed for this study had experienced child predator hacking. Instead, child predators use easier techniques such as grooming and manipulation as children are naïve and are consensually giving the child predators explicit material. However, there is still a possibility that child predator hackers were successfully able to blackmail the child and there the crime will go unreported.
Recommended Citation
Binford, W. (2015). A Global Survey of Country Efforts to Ensure Compensation for Child Pornography Victims. Ohio State Journal Of Criminal Law, 13(1), 37-65. Botelho, G. (2013, September 27). Arrest in 'sextortion' case involving Miss Teen USA Cassidy Wolf - CNN.com. Retrieved November 8, 2015, from http://www.cnn.com/2013/09/26/justice/miss-teen-usa-sextortion/ CBS news. (2015, April 23). Baby monitor hacker delivers creepy message to child. Retrieved December 2, 2015, from http://www.cbsnews.com/news/baby-monitor-hacker-delivers-creepy-message-to-child/ CBS New York. (2015, April 21). Seen At 11: Cyber Spies Could Target Your Child Through A Baby Monitor. Retrieved January 07, 2016, from http://newyork.cbslocal.com/2015/04/21/seen-at-11-cyber-spies-could-target-your-child-through-a-baby-monitor/ Crewdson, J. (1998). By Silence Betrayed: Sexual Abuse of Children in America. Boston: Little Brown. Department of Justice. (2015a, June 3). Child Pornography. Retrieved January 10, 2016, from https://www.justice.gov/criminal-ceos/child-pornography Department of Justice. (2015b, July 6). Citizen's Guide To U.S. Federal Law On Child Pornography. Retrieved January 09, 2016, from https://www.justice.gov/criminal-ceos/citizens-guide-us-federal-law-child-pornography Department of Justice, Homeland Security Announce Child Pornography File-Sharing Crackdown: Law Enforcement Initiative Targets Child Pornography Over Peer-to-Peer Networks. (2004). Epiphaniou, G., French, T., & Maple, C. (2014). The DarkWeb: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards. Journal Of Computing & Information Technology, 21-30. Federal Bureau of Investigation (FBI). (2010). Violent Crimes Against Children. Retrieved May 03, 2016, from https://www.fbi.gov/about-us/investigate/vc_majorthefts/cac Georgia Bureau of Investigation (GBI). (2016). Child Exploitation And Computer Crimes Unit. Retrieved May 03, 2016, from http://investigative.gbi.georgia.gov/child-exploitation-and-computer-crimes-unit Gross, D. (2013, August 14). Foul-mouthed hacker hijacks baby's monitor - CNN.com. Retrieved October 26, 2015, from http://www.cnn.com/2013/08/14/tech/web/hacked-baby-monitor/index.html Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2015). Cybercrime and digital forensics: An introduction. London and New York: Routledge. Hout, M. V., & Bingham, T. (2013). ‘Surfing the Silk Road’: A study of users’ experiences. International Journal Of Drug Policy, 24(6), 524-529. Jewkes, Y., & Andrews, C. (2005). Policing the filth: The problems of investigating online child pornography in England and Wales. Policing & Society, 15(1), 42-62. Krone, T. (2004). A typology of Online Child Pornography Offending:. Trends & Issues in Crime and Criminal Justice, (279). Krone, T. (2005). International Police Operations Against Online Child Pornography. (cover story). Trends & Issues In Crime & Criminal Justice, (296), 1-6. Lanaria, V. (2015). Here Are The Biggest Hacks And Data Breaches Of 2015: Ashley Madison, OPM, Anthem And More. Retrieved January 02, 2016, from http://www.techtimes.com/articles/120040/20151229/here-are-the-biggest-hacks-and-data-breaches-of-2015-ashley-madison-opm-anthem-and-more.htm Merdian, H. L., Curtis, C., Thakker, J., Wilson, N., & Boer, D. P. (2013). The three dimensions of online child pornography offending. Journal Of Sexual Aggression, 19(1), 121-132. Miller, D. & Slater, D. (2001). The Internet: An Ethnographic Approach. Muller, M. (2011). The guardians of innocence: A parent's guide to protecting children from pornography (pp. 81-83). Springville, Utah: Horizon. Newton, M. (2008). Won’t Somebody Think of the Adults? 3-4. Pitarro, M. (2007). Cyber stalking: an analysis of online harassment and intimidation. 1(2): 180- 197). Prichard, J., Spiranovic, C., Watters, P., & Lueg, C. (2013). Young people, child pornography, and subcultural norms on the Internet. Journal Of The American Society For Information Science & Technology, 64(5), 992-1000. Office of Juvenile Justice and Delinquency Prevention. (2016). Program Study. Retrieved May 03, 2016, from http://www.ojjdp.gov/programs/ProgSummary.asp?pi=3 Sexual Exploitation of Children Over The Internet. (2007, January). Retrieved January 03, 2016, from http://burgess.house.gov/uploadedfiles/subcommittee on oversight and investigations report on the sexual exploitation of children over the internet.doc Sterling, B. (1992). The hacker crackdown: Law and disorder on the electronic frontier. New York: Bantam Books. Stump, S. (2013, September 27). Miss Teen USA has 'mixed emotions' after arrest of 'sextortion' suspect. Retrieved November 7, 2015, from http://www.today.com/news/miss-teen-usa-has-mixed-emotions-after-arrest-sextortion-suspect-8C11275299 Tate, T. (1990). Child Pornography: An Investigation. London: Methuen. Tian, J., Qi, W., & Liu, X. (2011). Retrieving Deep Web Data Through Mult- Attributes Interfaces With Structured Queries. International Journal Of Software Engineering & Knowledge Engineering, 21(4), 523-542. Tor. (n.d.). Retrieved March 28, 2015, from https://www.torproject.org/about/overview.html.en Tor. (n.d.). Retrieved March 28, 2015, from https://www.torproject.org/docs/faq.html.en Tyler, R., & Stone, L. E. (1985). Child pornography: Perpetuating the sexual victimization of children. Child Abuse & Neglect, 9(3), 313-318. Wortley, R., & Smallbone, S. (2012). Child Pornography on the Internet: Problem-Oriented Guides for Police: Problem-Specific Guides Series: No. 41. PsycEXTRA Dataset.