The Dark Net (30 page)

Read The Dark Net Online

Authors: Jamie Bartlett

BOOK: The Dark Net
4.74Mb size Format: txt, pdf, ePub

p.84
‘We intend to place a new star . . .’ Greenberg, A.,
This Machine Kills Secrets
, p.131.

p.84
‘It was finally discontinued in 2001 . . .’
http://www.securityfocus.com/news/294
.

p.85
‘It is currently run and managed . . .’
http://cooperativa.cat/en/whats-cic/background/;
https://www.diagonalperiodico.net/blogs/diagonal-english/from-critique-to-construction-the-integrated-cooperative-in-catalonia.html
.

p.85
‘CIC’s vision is to find new ways . . .’ D’Alisa, G., Demaria, F. and Cattaneo, C., ‘Civil and Uncivil Actors for a Degrowth Society’,
Journal of Civil Society
:
http://www.tandfonline.com/doi/pdf/10.1080/17448689.2013.788935
.

p.87
‘Throw in the communal cooking . . .’ ‘Degrowth in Action’, from
Opposition to Alternatives Building: How the Cooperative Integral Catalana enacts a Degrowth Vision
. It is the 2012 Master’s thesis of Sheryle Carlson, of the Human Ecology Divison of Lund University.

p.88
‘In 2009, Duran began promoting . . .’
http://enricduran.cat/en/i-have-robbed-492000-euros-whom-most-rob-us-order-denounce-them-and-build-some-alternatives-society-0/
.

p.90
‘Although Amir’s technical know-how . . .’
https://bitcointalk.org/index.php?topic=169398.0
(some also blame him for the 2011 Bitcoinia controversy, when a Bitcoin trading exchange partly run by Amir was hacked and £145,000 in Bitcoins were stolen).

p.90
‘“We believe this is not in . . .”’
http://www.forbes.com/sites/andygreenberg/2013/10/31/darkwallet-aims-to-be-the-anarchists-bitcoin-app-of-choice/
.

p.90
‘Both he and Cody Wilson . . .’
http://www.wired.co.uk/news/archive/2014-04/30/dark-wallet/
.

p.91
‘Although he never attended a meeting . . .’ Levy, S.,
Crypto
, pp.216–17. Akst, D., ‘In Cyberspace, Nobody Can Hear You Write a Check: Cash? History, The Evolution of Money is Moving Way Faster than the ATM Line. Guard Your Passwords’,
LA Times
, 4 February 1996.

p.93
‘He even added an out-of-place . . .’
http://en.bitcoin.it/wiki/Genesis_block
(accessed 9 January 2014).

p.94
‘In his early posts, Satoshi wrote . . .’
http://www.mail-archive.com/[email protected]/msg10001.html
(accessed 9 January 2014). Many of the most influential people in the development of Bitcoin in these mailing list days – Wei Dai, Nick Szabo, Adam Back and, of course, Hal Finney – were all veterans of the Cypherpunk mailing list.

p.94
‘Satoshi typed in his last post . . .’ Until 2014, when a
Newsweek
journalist claimed to have found him living quietly and humbly in California. But the man
Newsweek
identified claims Bitcoin has nothing to do with him.

p.94
‘The Dark Wallet will include a number of new features . . .’ Although some users are sceptical about how well Dark Wallet will work, because it is a full reimplementation of the Bitcoin protocol, which is highly ambitious, even for Amir.

p.94
‘One of the key innovations . . .’
https://wiki.unsystem.net/index.php/DarkWallet/Multisig
.

p.95
‘Amir anticipates a lot of people . . .’ In May 2014, an alpha version of the Dark Wallet was made publicly available: Amir encouraged users to test the software as he continued to work on it.

p.97
‘One is a social media platform . . .’ Technically speaking, Twister doesn’t store the posts themselves into the blockchain, but rather just the username records.

p.98
‘So Smári and two colleagues . . .’
http://www.indiegogo.com/projects/Mailpile-taking-email-back
.

p.99
‘The cypherpunk message isn’t going unheeded . . .’
http://www.dailydot.com/news/pgp-encryption-snowden-prism-nsa/
.

p.99
‘In 2013, documents released by Edward Snowden . . .’ James Ball, Julian Borger and Glenn Greenwald, ‘Revealed: how US and UK spy agencies defeat internet privacy and security’,
Guardian
, 6 September 2013 [
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
(accessed 20 November 2013)]; Ellen Nakashima, ‘NSA has made strides in thwarting encryption used to protect Internet communication’,
Washington Post,
5 September 2013,
http://articles.washingtonpost.com/2013-09-05/world/41798759_1_encryption-nsa-internet
(accessed 20 November 2013).

p.100
‘By the next morning . . .’
http://www.huffingtonpost.co.uk/eva-blumdumontet/cryptoparty-london-encryption-_b_1953705.html
(accessed 23 February 2014).

p.100
‘I’ve documented at least . . .’
http://besva.de/mirror-cryptoparty.org/
(accessed 23 February 2014). Obviously there is no central authority for the crypto-party movement. Its reach is likely to be great because each participant is expected to take what they’ve learnt and share it with others, possibly having their own private crypto-party. Encryption takes two, after all.

p.100
‘There is even a free crypto-party handbook . . .’ It is available here:
https://github.com/cryptoparty/handbook
(accessed 23 February 2014).

p.101
‘Surveys consistently show that we value privacy . . .’ Bartlett, J.,
Data Dialogue
.

p.105
‘Crypto-currencies can “help . . .’
http://enricduran.cat/en/statements 172013/
.

p.106
‘A place where citizens can exist . . .’ In a 1995 email to transhumanists who were planning to build a floating seastead community to live outside national laws, May urged them to think about computer networks instead, which he considers more hospitable and secure than any physical location – even one in the ocean.

Chapter 4
Three Clicks

p.110
‘I contacted the police . . .’ Given the sensitive nature of the subject, it is worth spending a moment on definitions. The seminal psychiatric document,
The Diagnostic and Statistical Manual
(fourth edition, text revised –
DSM-IV-TR
) of the American Psychiatric Association, has a specific definition of paedophilia: the individual must have experienced intense and recurring sexual fantasies involving children over a minimum period of six months, or various behaviours or urges involving sexual activities with a prepubescent child or children. This individual will also experience significant impairment or distress in social, occupational or other functions due to the presence of these fantasies. Finally, a paedophile must be at least sixteen and at least five years older than their victims. (The new
DSM-V
– released 2013 – kept its definition exactly the same, except for a routine name change from ‘paedophilia’ to ‘paedophilic disorder’.) Child sex offending is different as it can cover people who are convicted for a range of criminal offences, including viewing illegal material. (The DSM’s definition of paedophilia has not been without controversy: critics have argued that it pays insufficient attention to factors such as paedophiles’ inability to control themselves, and also fails to distinguish ‘hebephiles’, i.e. offenders who are exclusively attracted to pubescent children.) For the purposes of this chapter, I use the terms child pornography and indecent images of children interchangeably. Specialists in the field prefer the term ‘child sexual abuse images’, because all illegal images of young people can be fairly described as sexual abuse. However, although many images are clearly ‘abuse’ in the sense most people would understand it, the term can also be slightly misleading for a non-specialist, as it gives the impression that there is always direct physical abuse involved, which is not the case. The definition cited in the text is from the Office of the United Nations High Commissioner for Human Rights (2002).

p.110
‘The internet has radically changed . . .’ There are three different ways in which people engage in sexual offences of children online, which are often incorrectly conflated. There are those who view, collect and distribute child pornography. There are others who engage in ‘virtual’ abuse, in which an adult has some kind of sexual relationship with a child online, possibly involving webcams or exchanging images, but never meet them in person. Finally, there are those who use the internet to find and groom children, with the intention of meeting them. The relationship between these different types of abuse is murky: some offenders commit all three offences, others only the first or second.

p.110
‘According to UK law . . .’ This is called the Sentencing Advisory Panel scale. Level 1: Nudity or erotic posing with no sexual activity. Level 2: Sexual activity between children, or solo masturbation by a child. Level 3: Non-penetrative sexual activity between adult(s) and child(ren). Level 4: Penetrative sexual activity between child(ren) and adult(s). Level 5: Sadism or bestiality. In April 2014 this was changed to three levels. Category A (Level 4 & 5); Category B (Level 3) and Category C (defined as those not falling into Categories A or B). See Sentencing Council Sexual Offences Definitive Guidelines (2014).

p.110
‘During the sexual liberation movement . . .’ Tate, T.,
Child Pornography: An Investigation
, pp.33–4.

p.110
‘By the late seventies . . .’ Tate, p.33; Jenkins, P.,
Beyond Tolerance: Child Pornography on the Internet
, p.32. There was also surge in pro-paedophile pressure groups, which publicly called for the legalisation of sexual relationships between adults and minors. In the UK, the Paedophile Information Exchange (PIE) was founded in 1974 and even became an affiliate of the National Council for Civil Liberties. And most famously the North American Man/Boy Love Association (NAMBLA), established in 1978, still campaign today. O’Donnell, I. and Milner, C.,
Child Pornography: Crime, Computers and Society
, p.11; Ost, S.,
Child Pornography and Sexual Grooming: Legal and Societal Responses
.

p.111
‘In the UK, many paedophiles . . .’ This information is based on an interview with a specialist who works with recovering sex offenders, and who has asked to remain nameless.

p.111
‘Because it was so hard to come by . . .’ Quoted in Wortley, R. and Smallbone, S.,
Internet Child Pornography: Causes, Investigation and Prevention
.

p.111
‘Anonymous Usenet groups . . .’ Jenkins, P.,
Beyond Tolerance: Child Pornography on the Internet
, p.54.

p.111
‘In 1993, Operation Long Arm targeted . . .’
http://articles.balti moresun.com/1993-09-01/news/1993244018_1_child-pornography-distribution-of-child-computer
. One FBI officer involved in these raids said, ‘Of all the techniques used by child pornographers, none has been more successful than the worldwide use of BBSs.’

p.112
‘Prospective members had to be put forward . . .’ Wortley and Smallbone,
Internet Child Pornography
, p.66.

p.112
‘Seven UK men were convicted . . .’ Sheldon, K. and Howitt, D.,
Sex Offenders and the Internet
, p.28:
http://www.theguardian.com/uk/2001/feb/11/tracymcveigh.martinbright
;
http://news.bbc.co.uk/1/hi/uk/1166643.stm
.

p.112
‘The infamous Lolita City . . .’ This is taken from an anonymous letter published online and available in a Tor Hidden Service, from someone who claimed to be a member of an international child pornography ring (‘Mr X’), a German living abroad, ‘where there are no laws relating to surfing, viewing, downloading and saving any type of files’. He claims to have worked in the field of children’s models ‘and knows hundreds of paedophiles’.

p.112
‘By October 2007, Interpol’s Child Abuse . . .’ Cited by Elliott, I. A., Beech, A. R., Mandeville-Norden, R. and Hayes, E., ‘Psychological profiles of internet sexual offenders: Comparisons with contact sexual offenders’,
Sexual Abuse,
21, pp.76–92.

p.112
‘By 2010, the UK police database . . .’
http://www.official-documents.gov.uk/document/cm77/7785/7785.pdf
;
http://www.bbc.co.uk/news/uk-21507006
; Finkelhor, D. and Lewis, I. A., ‘An Epidemiologic Approach to the Study of Child Molesters’, in Quinsey, R. A. and Quinsey, V. L. (eds)
Human Sexual Aggression: Current Perspectives. Annals of the New York Academy of Sciences
; Kirwan, G. and Power, A.,
The Psychology of Cyber Crime: Concepts and Principles
, p.115;
http://www.theguardian.com/lifeandstyle/2013/oct/05/sold-mum-dad-images-child-abuse
.

p.112
‘In 2011, law enforcement authorities . . .’
http://www.justice.gov/psc/docs/natstrategyreport.pdf
and
http://www.ussc.gov/Legislative_and_Public_Affairs/Public_Hearings_and_Meetings/20120215-16/Testimony_15_Collins.pdf
.

p.112
‘Twenty-five years on from the NSPCC’s estimate . . .’ Wortley and Smallbone,
Internet Child Pornography
.

p.112
‘CEOP believes that there are . . .’ CEOP (2013)
Threat Assessment of Child Exploitation and Abuse
.

p.113
‘According to the same source . . .’ This was a hacker named Intangir – who reputedly also runs another infamous Tor Hidden Service known as ‘Doxbin’, where the personal details of many anonymous users are listed.

p.113
‘One academic has recorded nine . . .’ Krone, T., ‘A Typology of Online Child Pornography Offending’,
Trends & Issues in Crime and Criminal Justice
, no. 279. The profile of sex offenders has been the subject of a lot of academic work. See: Grubin, D., ‘Sex Offending Against Children: Understanding the Risk’,
Police Research Series
99, p.14; Quayle, E., Vaughan, M. and Taylor, M., ‘Sex offenders, internet child abuse images and emotional avoidance: The importance of values’,
Aggression and Violent Behaviour
, 11, pp.1–11; Siegfried, K. C., Lovely, R. W. and Rogers, M. K., ‘Self-reported Online Child Pornography Behaviour: A Psychological Analysis’,
International Journal of Cyber Criminology
2, pp.286–97; Riegel, D. L., ‘Effects on Boy-attracted Pedosexual Males of Viewing Boy Erotica’,
Archives of Sexual Behavior
33, pp.321–3; Wolak, J., Finkelhor, D. and Mitchell, K. J.,
Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From The National Juvenile Online Victimization Study
, National Center for Missing and Exploited Children; Webb, L., Craissati, J. and Keen, S., ‘Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters’,
Sexual Abuse
19, pp.449–65; Elliott, I. A., Beech, A. R., Mandeville-Norden, R. and Hayes, E., ‘Psychological Profiles of Internet Sexual Offenders: Comparisons with contact sexual offenders’,
Sexual Abuse,
21, pp.76–92.

Other books

Dead Girl in a Green Dress by Loucinda McGary
The Big Exit by Carnoy, David
The Matchmaker's Match by Jessica Nelson
The Simple Death by Michael Duffy
Apples to Oranges by Xondra Day
The Golden Age by Ajvaz, Michal