shield arrow-simple-alt-top arrow-simple-alt-left arrow-simple-alt-right arrow-simple-alt-bottom facebook instagram linkedin medium pinterest rss search-alt twitter video-play arrow-long-right arrow-long-left arrow-long-top arrow-long-bottom arrow-simple-right arrow-simple-left arrow-simple-bottom readio arrow-simple-top speaker-down plus minus cloud hb pin camera globe cart rotate Group-35 star edit arrow-top arrow-right arrow-left arrow-bottom check search close square speaker-up speaker-mute return play pause love

Behind the Suits: Meet Melanie Martinson

Leading IJM investigations in the dark web, Melanie Martinson applies investigative techniques to combat cybercrime. She and her team work to identify not only consumers of online exploitation material, but the more elusive producers–who are oftentimes the abusers–of the material. The virtual world serves as her crime scene to gather digital forensic evidence in the forms of hard drives, websites, chat forums or on the dark web.

Watch the video below to learn more about this fun aunt, superhero aficionada and data security specialist.

Q: What motivated you to pursue an occupation in cyber security and investigations?

A: My career in cyber security/intelligence/investigations happened completely through God’s intervention. Way back, I knew I wanted to go into the military, but I also wanted a college degree. I ended up receiving a ROTC Air Force scholarship, but I had to pursue physics, math or computer science. I decided that “computers were the wave of the future” and opted for comp sci. Needless to say, I had never touched a computer in my life.

It was a struggle at first, but I was accepted as a computer crime investigator in the Air Force Office of Special Investigations. I spent six years training and conducting computer crime investigations, counterintelligence operations, and information warfare operations while on active duty air force. I realized just how much technology was used to commit and facilitate crime, and it presented a whole new aspect of “detective work” that I thrived on–having to truly find a needle in the haystack. So I went on to investigate hacker intrusions and child abuse material while at the NASA Office of Inspector General. The rest is history…

Q: When did IJM start to notice the transition of child exploitation crimes into the dark web?

A: There isn’t necessarily a moment in which IJM noticed a transition. The dark web has existed for quite some time, and bad guys recognized the anonymity it offered them.

Acknowledging that rampant exploitation was ongoing on the Internet in some form or another, we realized we needed to start focusing in that area. IJM also started to observe that brothel and establishment owners were not advertising girls in their places of business anymore. Instead of overt operations, they moved to covert operations–essentially operating their "businesses" online.

Q: How do you utilize new technology to fight cyber-trafficking?

A: We are currently testing out several different Internet investigative tools which scrape data from online websites (primarily escort sites, john boards, sex tourist sites) and analyze the data for various patterns, relationships and correlations. We can then view those relationships or conduct queries for specific leads. This will help us to identify potential trafficking networks and/or specific victims of sex trafficking.

We are also working with software that does much the same thing, but on the dark web. It targets only text data, but then allows us to see various relationships between users, chat posts, discussion topics, etc. This will allow us to see patterns among users on pedophile sites that could lead us to who or where they might be operating.

Furthermore, we are working with some leading tech agencies to aggregate all of this kind of data into one large database and combine it with other existing IJM data sets. Powerful analytical software will be applied to that data which will show (on a much larger scale) patterns and relationships between all of those data sets. Our goal is to identify large criminal networks, methods of operation, vulnerabilities in supply chains, trafficking routes, etc.

Have you met our VP of Investigations & Law Enforcement Development? If not, check out this video to learn of his past at NCIS and his current role at IJM.

  1. 1
  2. 2
  3. 3

Billing Information

Your donation:

  1. 1
  2. 2
  3. 3

Card Information

Your donation:

You are giving a one-time gift.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

  1. 1
  2. 2
  3. 3

Thank You!

Your receipt has been sent to your email.

How was the experience for you? Tell us here.
Questions? Contact us at or at 703-465-5495

Donors in Australia, Canada, Germany, the Netherlands, or the United Kingdom: by making a donation you agree that we may transfer your personal information to our IJM advancement offices in your country. That advancement office may contact you about future donations or for other fundraising purposes.


Donor Portal

Review your giving, tax statements and contact info via the IJM Donor Portal.

please sign in
IJM Community

Your digital hub for the movement to end modern slavery. Get exclusive updates, connect with others, and find ways to go deeper with IJM.

Please Sign In