Behind the Suits: Meet Melanie Martinson | International Justice Mission shield arrow-simple-alt-top arrow-simple-alt-left arrow-simple-alt-right arrow-simple-alt-bottom facebook instagram linkedin medium pinterest rss search-alt twitter video-play arrow-long-right arrow-long-left arrow-long-top arrow-long-bottom arrow-simple-right arrow-simple-left arrow-simple-bottom readio arrow-simple-top speaker-down plus minus cloud hb pin camera globe cart rotate star edit arrow-top arrow-right arrow-left arrow-bottom check search close square speaker-up speaker-mute return play pause love

LIMITED-TIME MATCH! Your gift doubles in impact to help send rescue and restore more lives.

give now.

Behind the Suits: Meet Melanie Martinson

Leading IJM investigations in the dark web, Melanie Martinson applies investigative techniques to combat cybercrime. She and her team work to identify not only consumers of online exploitation material, but the more elusive producers–who are oftentimes the abusers–of the material. The virtual world serves as her crime scene to gather digital forensic evidence in the forms of hard drives, websites, chat forums or on the dark web.

Watch the video below to learn more about this fun aunt, superhero aficionada and data security specialist.

Q: What motivated you to pursue an occupation in cyber security and investigations?

A: My career in cyber security/intelligence/investigations happened completely through God’s intervention. Way back, I knew I wanted to go into the military, but I also wanted a college degree. I ended up receiving a ROTC Air Force scholarship, but I had to pursue physics, math or computer science. I decided that “computers were the wave of the future” and opted for comp sci. Needless to say, I had never touched a computer in my life.

It was a struggle at first, but I was accepted as a computer crime investigator in the Air Force Office of Special Investigations. I spent six years training and conducting computer crime investigations, counterintelligence operations, and information warfare operations while on active duty air force. I realized just how much technology was used to commit and facilitate crime, and it presented a whole new aspect of “detective work” that I thrived on–having to truly find a needle in the haystack. So I went on to investigate hacker intrusions and child abuse material while at the NASA Office of Inspector General. The rest is history…

Q: When did IJM start to notice the transition of child exploitation crimes into the dark web?

A: There isn’t necessarily a moment in which IJM noticed a transition. The dark web has existed for quite some time, and bad guys recognized the anonymity it offered them.

Acknowledging that rampant exploitation was ongoing on the Internet in some form or another, we realized we needed to start focusing in that area. IJM also started to observe that brothel and establishment owners were not advertising girls in their places of business anymore. Instead of overt operations, they moved to covert operations–essentially operating their "businesses" online.

Q: How do you utilize new technology to fight cyber-trafficking?

A: We are currently testing out several different Internet investigative tools which scrape data from online websites (primarily escort sites, john boards, sex tourist sites) and analyze the data for various patterns, relationships and correlations. We can then view those relationships or conduct queries for specific leads. This will help us to identify potential trafficking networks and/or specific victims of sex trafficking.

We are also working with software that does much the same thing, but on the dark web. It targets only text data, but then allows us to see various relationships between users, chat posts, discussion topics, etc. This will allow us to see patterns among users on pedophile sites that could lead us to who or where they might be operating.

Furthermore, we are working with some leading tech agencies to aggregate all of this kind of data into one large database and combine it with other existing IJM data sets. Powerful analytical software will be applied to that data which will show (on a much larger scale) patterns and relationships between all of those data sets. Our goal is to identify large criminal networks, methods of operation, vulnerabilities in supply chains, trafficking routes, etc.

Have you met our VP of Investigations & Law Enforcement Development? If not, check out this video to learn of his past at NCIS and his current role at IJM.

You might also be interested in…

see more

Media Contact

We're here to answer your questions. Please fill out the form below and someone from our team will follow up with you soon.

More Information

Petra Kooman

Director of Marketing and Public Relations
pkooman@ijm.ca
519.679.5030 x.229

Make an Impact

Your skills, talents, and ideas are a force for change. From birthday parties to polar dips, your fundraising campaign can stop the violence.

Learn More

Thank you for signing up to learn more about starting a fundraiser. We will be in touch soon!

In the meantime, please take a look at our free guide: 25 Tips for the Novice Fundraiser.

Need Help?

Need more information?
We're here to help.
Contact us at events@ijm.ca

Test

Test