Digital EthnographyCybersecurity StudiesCivic TechnologyResearch Documentation
Tools | Google Sheets, Looker Studio, Figma
Language | HTML, CSS, JavaScript
I. CONCEPT
WHAT
This research project delves into the cyber environment of the messaging
platform Telegram, specifically analyzing its role in the infamous "Nth
Room" case, a harrowing example of sextortion and human trafficking. The
project sheds light on the often-overlooked aspects of Telegram's
technical features that may have facilitated these crimes. Employing an
ethnographic approach, the research is visualized as an interactive web
map resource. This contribution aims to serve as a valuable tool for
online communities and collectives working towards global justice in the
fight against digital sex crimes.
WHY
This project investigates the role of Telegram, a secure and widely used
messaging platform, in facilitating the horrific "Nth Room" case. This
case involved a series of interconnected digital sex crimes, including
blackmail, sextortion, and the distribution of exploitative content. While
the crimes have received significant attention, the technical aspects of
Telegram that may have enabled them remain largely unexamined.
This research addresses this gap by employing an ethnographic approach to analyze
Telegram's cyber environment. By examining the "Nth Room" case through this
lens, the project aims to illuminate how specific features of the platform
may have contributed to the crimes' scope, duration, and complexity. The resulting
web map resource, "The Net Works," serves as a critical exploration of this
connection, offering valuable insights for online safety advocates and policymakers
working to combat digital sex crimes.
HOW
This project employs an ethnographic approach to investigate the Telegram
environment in the context of the "Nth Room" case. Ethnography involves
immersing oneself in a particular social setting to understand its culture
and practices. In this case, the research analyzes user behavior, platform
functionalities, and the broader online discourse surrounding the case.
By examining how Telegram's features (e.g., encryption, anonymity) potentially
interacted with the abusive culture within the platform, the project illuminates
the factors that may have contributed to the crimes' severity and scale. This
analysis is visualized through an interactive web-based map, "The Net Works,"
which illustrates these interconnections and serves as a tool for online safety
advocates and policymakers.
The findings contribute to a nuanced understanding of the complex relationship
between technology and social harm. It challenges simplistic narratives of
"democratic technology" by exposing how seemingly neutral tools can be repurposed
for harm. Ultimately, this research sparks critical conversations about privacy,
anonymity, and the ethical responsibilities of technology companies in creating
safer online spaces.
II. PRODUCT
DOCUMENTATION
III. PUBLISHING
Exhibition
Anthropology & Design Exhibition, The New School (2021)
“ADX invites students from varied disciplinary backgrounds to explore
and experiment with anthropological and design research methods that
open up new epistemological and creative possibilities, and illuminate
our lived experiences and imaginations. The exhibition consists of a
virtual reality showcase and a series of virtual moderated panels with
artists and presenters.”
National Undergraduate Research Conference on Science, Technology,
Medicine & Society, Vassar College (2021)
“The STMS Conference is an opportunity for undergraduates from across
divisions to present their research on myriad topics related to the
intersections of science, technology, medicine, and society.”
Kim, Hyejin. “Current Status of Response to Digital Child Sexual Slavery
and Comparative Analysis of Overseas Crime Prediction System Using
Artificial Intelligence.” Journal of Digital Convergence 18.7 (2020):
357–368.
This article, authored by the CEO of the Global Digital Sexual Crime
Policy Research Institute, offers a critical analysis of the "Nth Room"
case. The author delves into the criminal methods employed, highlighting
how the perpetrators exploited Telegram's secure communication features
and darkcoin exchange systems. The article emphasizes the devastating
mental and psychological impact on the victims, prompting a necessary
discussion about the role of technology in facilitating new forms of
sexual exploitation.
Several key findings resonate with this project. First, the article underscores
cyber sextortion as the initial step in a multi-layered exploitation process.
Second, it raises the important issue of "possession" in the context of image-based
sexual abuse, where streaming distribution is becoming more prevalent. Third,
the article highlights the responsibility of digital platforms to prevent the
spread of exploitative content. In the "Nth Room" case, Telegram's refusal
to cooperate with the investigation due to privacy concerns is a critical point.
The research also identifies challenges in combating these crimes, such as
the limitations of tracing cryptocurrency transactions across foreign exchanges
and the ease with which evidence can be deleted on platforms like Telegram.
These insights are valuable as this project explores the connections between
criminal methodologies and the technological features that enable them.
Charles, Angela T. “The Abuse of Teenagers by Online Predators Facilitated
Through the Internet and Social Media.” MS Thesis, Utica College, 2017.
This article provides a valuable framework for analyzing cyber sexual
abuse, particularly relevant to the "Nth Room" case. The author
effectively introduces key concepts and terminology related to cybercrime,
including the distinction between "advanced cybercrime" and "cyber-enabled
crime." Critically, the article focuses on cyber-enabled crimes, which
encompass sexual extortion and exploitation – the core methods of abuse in
the "Nth Room" case. This contextualization helps position the research
within the broader landscape of cyber sexual abuse.
Beyond definitions, the article explores the ways in which the internet and
social media facilitate these crimes. It delves into various types of online
sexual predators and their methods. The chapter "The Different Acts of Abuse
that are Committed Using the Internet" is particularly insightful, providing
detailed explanations of relevant methods like human sex trafficking (sexual
exploitation) and sextortion, both crucial aspects of the "Nth Room" case.
O’Malley, Roberta L., and Karen M. Holt. “Cyber Sextortion: An Exploratory
Analysis of Different Perpetrators Engaging in a Similar Crime.” Journal
of Interpersonal Violence (2020): 1–26.
Focused on cyber sextortion as a form of image-based sexual abuse (IBSA),
this article provides valuable insights for analyzing this project's
subject. The authors conducted a qualitative content analysis of media
articles and court documents related to 152 cyber sextortion offenders.
Their analysis identified four key themes, including two particularly
relevant to the "Nth Room" case: minor-focused offenders and
cybercrime-oriented offenders.
The article highlights three key characteristics that differentiate cyber sextortion
from other interpersonal crimes: the cyberspace element, the possession of
compromising material, and the extortion component. Despite diverse motivations
(sex, power, dominance, coercion, or money), cyber sextortion offenders often
employ similar methods. The article's data-driven approach offers helpful examples
for structuring analytical frameworks.