Home » Human Trafficking and Internet Porn: THE CONNECTIONS

WAYS TO HELP OUT

We are a 501c3 non profit organization designed to spread conservative values on campus. Your contributions are tax deductible. To donate by mail send contributions to Students For A Better Future.Com P.O. Box 436 Mount Tabor, NJ 07878-0436

Subscribe

Human Trafficking and Internet Porn: THE CONNECTIONS

What has caused the rise in human trafficking and the proliferation of pornography on the Internet?  Surely many factors, but one is the growth in the number of sites catering to such activity.  Among the worst is YouPorn.com, an imitator of YouTube.  On its face, it works the same way: a person can simply search anonymously for content, or create an account and upload one’s own x-rated content.  But that portal goes much further, linking to many other similar sites.  And clearly there are advertisers clamoring to purchase a bit of real estate on every page of these domains.  Just a few minutes on any of these sites and you can tell that your computer is fighting (assuming you use virus protection) unauthorized downloading of who-knows-what.  Based on past experience you may realize that it is not likely to be just a new car ad or some travel site.  These sites tend to be much more aggressive in their attempts to pull users in.  The operators care little about the actual person on the on the shiny side of the monitor.  You are a revenue stream, a potential provider of content to create more revenue streams, and a means of access to other users, i.e. even more revenue streams.  Appealing to the most base, pleasure-seeking and self-serving aspects of human nature, websites like this add nothing to the human experience, are generally demeaning, and for many, prove to be addicting.  And that is just the effect on adults.

It does not appear that YouTube or now the ubiquitous Google (since it acquired YouTube) ever objected publicly to YouPorn, although their management must certainly be aware of it.  Proponents would say that YouPorn has free speech protections under the First Amendment to the U.S. Constitution, and this is likely true.  But that does not preclude Google from issuing a statement acknowledging the moral bereft-ness of these sites.  Reasonable and principled persons undoubtedly can see it; Google’s silence is deafening.  They are more concerned with creating new home page logos honoring all kinds of trivial things.

Coupled with this is a decided lack of oversight by the operators of more mainstream sites, such as Facebook and craigslist, which are ostensibly “out there” for an entirely different reason.  Facebook monitors have taken down numerous sites for such innocuous things as too many doggie photos, a Marine emblem, a Navy Seal Page, etc., while the outright pornographic entries are left in peace.  as Belinda Luscombe at Time.com writes, “…if your taste in humor runs to rape, domestic violence, dead babies, 9/11 victims or Oklahoma tornado misery, there’s a Facebook page for you. Generally, Facebook will take down what it deems harmful — hate speech, pornography, calls for violence — but not what it considers controversial.  A lot of jokes about beating up women or rape seem to fall under that”.  It is pathetic.

Craigslist posts in their “Casual Encounters” sections and elsewhere are rife with explicit material, both photos and descriptions.  Only an admonition to practice “safe sex” is present.  In other categories, a post may be flagged as “inappropriate”;  given the caliber of entries allowed in the personal sections, what could possibly be their criteria in these other spaces?  Goldman Sachs dis-invested in BackPage.com, an offshoot of the Village Voice, the legendary New York City alternative daily format paper . For much of its history, the paper made money by selling “adult services” ads in the back of the paper.  NY Times columnist Kristof labeled it the “biggest forum for sex trafficking of under-age girls in the United States.”  They may or may not have been pimping trafficked women but their content was definitely a family-unfriendly.

Ashley Madison and the recent hacking debacle there has led to at least 3 suicides.  Just how do we stop all of this, or at least protect ourselves and our loved ones?  With regard to the wide variety of ways one can be subjected to pornography, especially unknowingly; here is an excellent article from Family Safe Media; it is well worth the read.  Please also visit their site at www.familysafemedia.com.

Tricks Pornographers Play

 

There was a time when tricking a teen into viewing pornography meant that his pals pasted a Playboy centerfold into his locker. On the other hand, if he went looking for it, he could’ve gotten hold of a magazine or two through an unscrupulous store clerk or a friend’s older brother. But once those few pages had exhausted their appeal, there was no full-scale blitz to deluge him with more.

Times have changed. Not only is pornography today more lewd and provocative, but its peddlers (now part of a multi-billion dollar business) are much more aggressive in their recruitment of new customers. For both sides, the Internet has offered up a crucial ingredient to the burgeoning industry — anonymity. No need to leave one’s home to purchase pornography. Now, a never-ending supply of ever more erotic and interactive pornography can be accessed and experienced in a completely private world. And now, teen boys aren’t the sole target. To a pornographer, anyone with a computer is a potential addict.

Just about anyone who has used the Internet — from 7-year-old boys to 80-year-old grandmas — knows that pornography is just a click away. But most Internet users still believe that unless they go looking for porn, it won’t find them. What they don’t realize, however, is how aggressively pornographers are implementing new strategies in marketing and technology to actually push pornography to unwitting users, without their consent, and often even without their knowledge.

Deception
The most common technique for tricking the Internet user is by sheer deception. When you walk into your neighborhood grocery store, you expect to find groceries on the shelves. But if, instead, you find thousands of explicit pornographic videos, you would be outraged. If the store appeared just as it did yesterday with the same name and same signs, wouldn’t any unsuspecting shopper assume it was the same grocery store and not a porn outlet? Sound far-fetched? Not on the Internet!

Porn-Napping
It is a common practice among pornographers to purchase expired domain names when the original owner forgets to renew the current domain name, a strategy known as “porn-napping.” After purchasing the expired domain name, they then redirect the expired URL back to their own porn sites. Porn-nappers sometimes offer to resell the domain name back to the original owner for an exorbitant fee that borders on extortion.

Thousands of well-known companies have learned the hard way how critical it is to keep tabs on their domain registrations. Due to an unfortunate clerical error, the accounting firm of Ernst and Young let the registration lapse on their children’s money management site, moneyopolis.org. Quickly purchased by a pornographer, all visitors to the site ended up at euroteensluts.com, obviously a porn site, until Ernst and Young repurchased moneyopolis.

Ernst and Young is not alone. Other big-name porn-napping victims include AOL, the Boston Philharmonic Orchestra, the Dutch Government, the United Nations, and even the U.S. Department of Education.

Cyber Squatting
Many pornographers legally purchase domain names for legitimate topics in a switch-up referred to as “cyber squatting.” As an example, someone expecting to find information about the President of the United States might type in whitehouse.com and be very confused (or outraged) at finding explicit porn on the site. The official site for the Whitehouse is at whitehouse.gov rather than .com. Other examples of cyber squatting include the innocent-sounding web domain names of civilwarbattles.com, eugenoregon.com, and tourdefrance.com.

Doorway Scams
A close cousin to porn-napping and cyber-squatting is a technique known as a ” doorway scam,” which makes use of one of the most common tools on the Internet: the search engine. Experienced pornographers have figured out that by carefully constructing their websites, and designing them around non-pornographic themes, they gain new opportunities to deceive unsuspecting surfers. Web page content is created to place the website high on a search engine’s results, and after clicking on it, the user is redirected to a porn site.

Another version of the doorway scam is to create a porn site around a common, non-pornographic theme. So rather than redirect the Internet user to another unrelated but pornographic site, this technique actually creates pornographic web pages related to their title. Thus, in an innocent search for “livestock,” the unsuspecting user may open up a page depicting bestiality.

Misspelling
Not long ago, if you were attempting to go to one of the most popular search engines, google.com, and accidentally typed in an extra “l” (googlle.com) you would have ended up at an Asian porn site. Pornographers are buying up the misspelled domain names of trendy, high-traffic sites with hard-to-spell names, such as abercrombieandfitch.com, etc.

Speaking of Google, it recently became one of the first search engines to offer the ability to search the Internet by images, rather than in text and text-links. With this new technology, the results of the search are presented in an image or thumbnail graphical format. It is not hard to imagine how pornography can easily make its way into image search results.

Advertising
Advertising has become a huge business for websites, and this innovation has not eluded clever pornographers. Fortunately, most legitimate and responsible businesses will not sell advertising space to pornographers. But unfortunately, that hasn’t stopped a large number of porn-industry leaders, who have created fake system error messages, message alert boxes, or false forms that dupe you into thinking you have to click on the OK button or enter certain information, when in reality, you are clicking on the link to open the pornographer’s front door.

Entrapment
If you’ve fallen prey to any of the above scams and entered a porn site, whether accidentally or not, your computer may have been marked or altered in some covert way. Depending on what was done at the porn site — whether just an unintentional visit, a quick tour, or a download of a picture or program — a whole host of problems can be encountered.

Looping
One common trick is to put your computer into a never-ending loop with new porn pages appearing, one right after the other. The faster you close the pages, the faster the new pages appear.

Mousetrapping
Depending on the browser you use, some sites will alter the use of the Back button or the Close function, preventing you from exiting the pornographic website. This practice is sometimes known as “mousetrapping,” because it renders your mouse useless. Regardless of what you do, you have lost control of your browser, similar to being caught in a mousetrap.

Startup File Alteration
It is also possible to have your computer altered with the consequences not showing up immediately. In one technique, pornographers place a program into your startup directory that sends you to a porn site or displays a pornographic image whenever you boot up.

Cookies
A cookie is a small file placed on your computer’s hard drive when you visit certain websites. Though not necessarily a bad function, cookies may contain considerable personal information such as your buying habits, personal preferences, and Internet usage history. Since they can store information about you personally and about your Internet habits, they can be used by unscrupulous pornographers to track every move you make on the Web and target you for various scams, as well as becoming a threat to your Internet privacy.

Dangerous Downloads
Pornographers are experienced at disguising themselves as credible websites. How well do you know the reputation of the source of your newly downloaded graphics? Hopefully, you didn’t just invite the pornographer, in sheep’s clothing, to invade your computer with a program that will take you on a never-ending pornographic ride with the wolf in the driver’s seat.

Trojan Horses
With literally millions of free downloads readily available for the taking, you can get everything from screen savers, background images, and fancy desktop icons to serious gaming applications and highly advanced software programs. But be warned — that very appealing new screen saver may actually be a Trojan horse, that when clicked upon, kicks off a program that opens up into a world of pornography, and also possibly wreaking havoc in your system. Trojan horses and other malicious invaders can be placed on your machine even when downloading something as simple as a pretty calendar or a childrens’ puzzle.

Dialers
A more recent trick that unscrupulous porn dealers are experimenting with involves using downloads to covertly install expensive dialers on an unsuspecting user’s PC that will automatically dial for-pay (and frequently long distance) porn sites, charging exorbitant fees every time they do so. The Federal Trade Commission recently filed a case against a company for a variation of the dialer scam. This particular porn dealer was using downloads to install 1-900 dial-up programs that replace the existing ISP Internet accounts.

Spyware
Also called adware, spyware can be installed on your computer without your knowledge when you download something from the Internet or from file-sharing programs. Spyware covertly gathers user information through the user’s Internet connection and transmits that information back to the spyware author. Some spyware programs have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, and collect email addresses, passwords, and credit card numbers. Generally used for advertising, spyware can also give a porn peddler a wealth of information about his unsuspecting prey.

Live Action
Webcams are special cameras that are set up to record and broadcast full-motion video and sound over the Internet. Originally, this technology was used to implement inexpensive teleconferencing capabilities for businesses. Now it is one of the favorite technologies used on pornographic websites: real-time viewing of sexual activities. This concept, popularized by the movie, The Truman Show, allows for 24-hour uncensored and uncut online viewing. Webcams can be installed in a bedroom, dormitory room, showers, etc. A simple click from a website can allow you, as an invited guest, to participate in a voyeuristic journey into an individual’s most intimate experiences.

Email
Depending on which email service you use, you may have already been flooded with unwanted and unsolicited pornography. Hotmail and AOL email accounts have been favorite targets for porn peddlers’ aggressive marketing strategies. You can actually become entangled in an inappropriate or adult website before you even know that the email you received has anything to do with pornography.

And don’t make the mistake of thinking that simply following the unsubscribe instructions will end your email problems. By responding, you are telling the pornster not only that your email account is valid, but also that you read his unsolicited message. Most likely he will continue to use and sell your address.

Some emails contain high-tech multimedia video attachments that begin playing the instant you click on them, whether inadvertently or not. New email technology even allows a video to be sent as part of the email rather than an attachment, with the result being that the video begins playing on your screen before you even realize what happened.

Emails are infamous for transmitting worms or viruses. As an example, the worm known as “Homepage” can modify your browser’s user default home page, so that every time you click on your browser, you are automatically sent to a porn website.

Email Spoofing
One of the latest techniques in getting unsuspecting readers to open inappropriate email is to use a technique known as “spoofing.” Originally developed as a virus transmitter, this practice works on users who wouldn’t think of opening an email attachment from an unknown source. Through various methods, a deceitful marketer can send you a “spoofed” email from someone in your address book, creating a false sense of security as you open their attachment. CONTINUE

Pages: 1 2


Leave a comment

Weekly Podcasts

Channel 21 LANTV New Jersey Current Programming


Upcoming Podcast

  • Totalitarian Thought
    Totalitarian Thought
    Totalitarianism is a term used by some political scientists to describe a political system in which the state holds total authority over the society and seeks to control all aspects of public and private life wherever possible. Read More Here:   
  • Immigration reform
    Immigration reform
    Under a Trump Presidency, how will our Immigration System be revamped. Learn More:
  • What's Life Like Under A Trump Presidency?
    What's Life Like Under A Trump Presidency?
    Will you have a job? Will Obamacare be repealed? Learn more:

RSS Seton Hall Sports

Skip to toolbar