Skip to main content

Currently Skimming:

9 Infrastructure for Age Verification
Pages 53-61

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 53...
... The necessary level of confidence will be defined rapidly as soon as the legal community determines that there is money to be made from it. What infrastructure is needed to support age checks outside the Internet?
From page 54...
... Credit cards are great in the United States but not in the middle of Africa and other places around the global Internet where the infrastructure does not exist. In Third World countries that are developing sites that deal with child pornography and child exploitation, implementing online authentication and age verification technologies is a whole different business.
From page 55...
... Once you are in that particular loop, getting out of it is next to impossible. Biometric technologies and fingerprint scans are possible, but it is cost prohibitive for both the user and authentication organization at this time.
From page 56...
... We are at least identifying the offenders and taking them out of circulation as fast as we can surgically removing them from society by whatever means is currently socially acceptable. If you could keep kids off e-mail and Internet Relay Chats that is, if kids accessed the Internet in a way that worked only through the Web, but ported then it would eliminate access to children for most of these preferential sexual offenders.
From page 57...
... This is a fear model. · The intervention model says we identify the people causing the problem and enlist the aid of the cyber-network neighborhood and crime prevention types so that people who see this activity do not ignore it.
From page 58...
... No one can tell you that you cannot make copies, because you can, and no one can tell you that you cannot use the Internet, because you can. Fred Cotton noted that, if you send a picture of women without veils to Saudi Arabia, you have sent pornography.
From page 59...
... 9.3 THE EXTENT OF THE PROBLEM When talking about protecting children online, it makes no difference whether it is protection from a sexual predator or a pornographer,4 because predators use pornography as a tool to lower the inhibitions of children. I have seen them with cartoons of Homer Simpson and Fred Flintstone, telling little kids, "See, Wilma thinks it's okay." There is no difference; pornography is still being put out there and accessed by children.
From page 60...
... David Finkelhor5 put together a study for the Office of Juvenile fustice and Delinquency Prevention, published early this year. It was an empirical study of young teenagers online and their contact with sexual predators.
From page 61...
... There is also a phenomenon called validation. If you are into sexually assaulting children, then you are universally disdained in almost every society in the world.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.