Beyond Tolerance
eBook - ePub

Beyond Tolerance

Child Pornography on the Internet

  1. 260 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Beyond Tolerance

Child Pornography on the Internet

About this book

The first book on the abhorrent business of child pornography

Perhaps nothing evokes more universal disgust as child pornography. The world of its makers and users is so abhorrent that it is rarely discussed much less studied. Child pornographers have taken advantage of this and are successfully using the new electronic media to exchange their wares without detection or significant sanction. What are the implications of this threat for free speech and a free exchange of ideas on the internet? And how can we stop this illegal activity, which is so repugnant that even the most laissez-faire cyberlibertarians want it stamped out, if we know nothing about it?

Philip Jenkins takes a leap onto the lower tiers of electronic media in this first book on the business of child pornography online. He tells the story of how the advent of the internet caused this deviant subculture to become highly organized and go global. We learn how the trade which operates on clandestine websites from Budapest or Singapore to the U.S. is easy to glimpse yet difficult to eradicate. Jenkins details how the most sophisticated transactions are done through a proxy, a "false flag" address, rendering the host computer, and participants, virtually unidentifiable. And these sites exist for only a few minutes or hours allowing on-line child pornographers to stay one step ahead of the law. This is truly a globalized criminal network which knows no names or boundaries, and thus challenges both international and U.S. law.

Beyond Tolerance delves into the myths and realities of child pornography and the complex process to stamp out criminal activity over the web, including the timely debates over trade regulation, users' privacy, and individual rights. This sobering look and a criminal community contains lessons about human behavior and the law that none interested in media and the new technology can afford to ignore.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Beyond Tolerance by Philip Jenkins in PDF and/or ePUB format, as well as other popular books in Social Sciences & Sociology. We have over one million books available in our catalogue for you to explore.

Information

NOTES

Notes to Chapter 1

1. The quote is from “Helena Lover” on the main discussion board (BBS2) of the Maestro Web site, February 6, 2000. As I will explain, “Maestro” is a pseudonym, and I will not publish the actual URL of this site. Henceforward, all quotations from this site will be introduced with the prefix MB.
2. MB: “Don’t Know,” October 29, 1999.
3. New York v. Ferber, 458 U.S. 747, 1982.
4. A large and growing literature deals with the legal and constitutional challenges involved in regulating the Internet. See, for example, William S. Byassee, “Jurisdiction of Cyberspace,” Wake Forest Law Review 30 (1995): 197–220; J. Q. Crews, “Regulating Pornography on the Internet,” Law and Psychology Review 20 (1996): 179–195; Lilian Edwards and Charlotte Waelde, Law and the Internet (Oxford: Hart, 1997); Lesli C. Esposito, “Regulating the Internet,” Case Western Reserve Journal of International Law 30 (1998): 541–565; Mark J. Stefik, The Internet Edge (Cambridge, MA: MIT Press, 1999); Jean Hellwege, “Law Enforcement, Legislators Grapple with Child Sexual Exploitation on the Net,” Trial, March 2000, 13–16; S. J. Drucker and G. Gumpert, “CyberCrime and Punishment,” Critical Studies in Media Communication 17 (June 2000): 133–158.
5. Ian Hacking, The Social Construction of What? (Cambridge, MA: Harvard University Press, 1999); Philip Jenkins, “Fighting Terrorism as if Women Mattered,” in Jeff Ferrell and Neil Websdale, eds., Making Trouble (Hawthorne, NY: Aldine de Gruyter, 1999), 319–346; Philip Jenkins, Synthetic Panics (New York: New York University Press, 1999).
6. Philip Jenkins, Moral Panic (New Haven, CT: Yale University Press, 1998), 209–213; Jim Exon, “At Issue: Should the Government Crack Down on Pornography on the Internet?” CQ Researcher 5 (24), June 30, 1995; Cyberporn and Children: Hearing before the Committee on the Judiciary, US Senate, 104th Congress, 1st session … July 24, 1995 (Washington, DC: GPO, 1995); Cyberporn: Protecting Our Children from the Back Alleys of the Internet. Joint Hearing before the Subcommittee on Basic Research and the Subcommittee on Technology of the Committee on Science, US House of Representatives, 104th Congress, First Session, July 26, 1995 (Washington, DC: GPO, 1995). The cyberporn issue by no means died with the CDA. See, for instance, Internet Indecency: Hearing before the Committee on Commerce, Science, and Transportation, US Senate, 105th Congress, Second Session, February 10, 1998 (Washington, DC: GPO, 1999); Legislative Proposals to Protect Children from Inappropriate Materials on the Internet: Hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, 105th Congress, Second Session, … September 11, 1998 (Washington, DC: GPO, 1998); “More People Named to Panel for Curbs on Web Pornography,” WSJ, October 20, 1999; Jeri Clausing, “Commission Will Work to Protect Children after Legislation Fails,” NYT, March 7, 2000.
7. Yaron Svoray and Thomas Hughes, Gods of Death (New York: Simon and Schuster, 1997).
8. Use of Computers in the Sexual Exploitation of Children (Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, 1999).
9. LeRoy G. Schultz, “Kiddie Porn”: A Social Policy Analysis (Morgantown, WV: School of Social Work, West Virginia University, 1977); Shirley O’Brien, Child Pornography (Dubuque, IA: Kendall Hunt, 1983); Kenneth V. Lanning and Ann W. Burgess, Child Pornography and Sex Rings (Washington, DC: FBI, U.S. Dept. of Justice, 1984); Ann W. Burgess and Marieanne L. Clark, eds., Child Pornography and Sex Rings (Lexington, MA: LexingtonBooks, 1984); Howard A. Davidson and Gregory A. Loken, Child Pornography and Prostitution (Washington, DC: NCMEC, 1987); Patricia N. Chock, “The Use of Computers in the Sexual Exploitation of Children and Child Pornography,” Computer Law Journal 7 (1987): 383–407; D. Campagna and D. Poffenberger, The Sexual Trafficking of Children (Dover, MA: Auburn House, 1988); Kenneth V. Lanning, Child Sex Rings (Washington, DC: NCMEC, 1989); Tim Tate, Child Pornography (London: Methuen, 1990); Jan Schuijer and Benjamin Rossen, “The Trade in Child Pornography,” Issues in Child Abuse Accusations 4 (1992): 55–107. For more up-to-date studies, see Carl Goran Svedin, Kristina Back, and Radda Barnen, Children Who Don’t Speak Out (Stockholm, Sweden: Swedish Save the Children, 1996); Ronald Weitzer, ed., Sex for Sale (New York: Routledge 1999); Anna Grant, Fiona David, and Peter Grabosky, “Child Pornography in the Digital Age,” in Phil Williams, ed., Illegal Immigration and Commercial Sex (London: Frank Cass, 1999), 171–188; Yaman Akdeniz, Sex on the Net (London: South Street, 1999). For contemporary European writing, see, for instance, Gisela Wuttke, Kinderprostitution, Kinderpornographie, Tourismus (Gottingen: Lamuv, 1998); Detlef Drewes, Kinder im Datennetz: Pornographie und Prostitution in den neuen Medien (Frankfurt am Main: Eichborn, 1995). Carlos A. Arnaldo, ed., Child Abuse on the Internet (New York: Berghahn Books, 2000).
10. Laurie J. Flynn, “Guardian Angels Now Patrol the Net” NYT, March 16, 1996; Cybersex Cop, documentary program broadcast on A&E network, 1998. Keith A. Schroeder and Julie Ledger, eds., Life and Death on the Internet (Supple Publishing, 1998); Deborah Boehle, “Terrorized on the Internet,” Woman’s Day; March 9, 1999, 22–27; Stephanie Mansfield; “The Avengers Online,” Good Housekeeping, June 1999, 122–125+; Sean Kelly and Karen E. Crummy, “Netting Sexual Predators,” Denver Post, November 8, 1999; Catherine Edwards, “Pedophiles Prowl the Internet,” Insight on the News, February 28, 2000; “Gumshoe Mom Helps Collar Criminals On Line,” Centre Daily Times (State College, PA), March 13, 2000; Katherine Tarbox, Katie.com: My Story (New York: E. P. Dutton, 2000); Anita Hamilton, “Chatting with the Enemy,” Time, May 8, 2000, 95; Peter A. Carlin and Barbara Surk, “Cyber Survivor,” People Weekly, May 29, 2000, 95–96; Michelle Malkin, “Parental Neglect Leads Teen-agers to Be Seduced on the Internet,” Insight on the News, June 5, 2000; Debra West, “Afte...

Table of contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Contents
  5. Acknowledgments
  6. Note on Usage
  7. Glossary
  8. One Out of Control?
  9. Two Child Pornography
  10. Three Into the Net
  11. Four A Society of Deviants
  12. Five Moralities
  13. Six Policing the Net
  14. Seven Vigilantes and Militias
  15. Eight A Global Community
  16. Nine Where Next?
  17. Abbreviations
  18. Notes
  19. Index
  20. About the Author