Jump to content

User:PaladinOfDaedalus/draft operation pacifier

From Wikipedia, the free encyclopedia


Operation Pacifier was a U.S. Government law enforcement investigation and operation led by the U.S. Federal Bureau of Investigation (FBI) from August 2014 to March 2015. The goal of the operation was to seize a specific Tor (network) onion service/website that was used to traffic child sexual abuse materials (CSAM) and to perform a [watering hole attack]] by continuing to operate the website to deploy malware - Network Intrusion Technique (NIT) - to the website users to infect their computers and deanonymize their IP addresses and collect criminal evidence from their computers.

The operation was a continuation of the FBI's MCCU's efforts into identifying and dismantling CP distribution. It utilized the Violent Crimes Against Child (VCAC) task force workers.[1]

Description of the Target Website

[edit]

Playpen was a Tor (network) child pornography website that operated from August 2014 to March 2015.[2][3] The website operated through the Tor network which allowed users to use the website anonymously. When it was shut down in March 2015, the site had over 215,000 users and hosted 23,000 sexually explicit images and videos of children as young as toddlers.[3]

Investigation

[edit]

Much of the operation was overseen from Linthicum Maryland.

While the FBI claimed to have knowledge about the existence of the website right from its beginning, it was unable to track down the servers locations or the site owner. This was because the website was hosted anonymously through Tor.  Only a mishap of the site owner revealing his IP address finally allowed the law enforcement to track down both page and personnel.[2]

After running the website for 6 months, the website owner Steven W. Chase was captured by the FBI.

Methodology

[edit]

The FBI sezied access to the site and contined to run them and serve CSAM content for about 2 weeks (from February 19, 2015 until March 4, 2015). During this time the FBI used a malware-based "Network Investigative Technique" (NIT) to hack into the web browsers of users accessing the site in what is known as a watering hole attack, thereby revealing their identities.

Results

[edit]

The operation led to the arrest of 956 site users and five prison sentences.

The investigation led to the sentencing of Steven W. Chase, a 58-year-old man from Florida who created the website, to 30 years in prison in May 2017. His two co-defendants pleaded guilty and were sentenced to 20 years each earlier in 2017 for their involvement in the "Playpen" website.[2]

2015-2019

[edit]

In 2017, the FBI dropped charges against one defendant after the court for that case requested details on the NIT malware. The FBI preferred to keep the NIT malware a secret for future investigations.[4][5][6]

2019 to present

[edit]

As a result of the appeals court ruling that the warrant was invalid but that the evidence was obtained in good faith, the FBI and HSI began to re-arrest the defendants in 2022, 7 years after they had the charges against them dismissed.

[edit]

The investigation was criticized by the Electronic Frontier Foundation because of the generality of the warrant, and because after having taken control of the website, the FBI continued for nearly two weeks to operate the website and thus distribute child pornography, i.e. exactly the same crime the bureau sought to stop.[7] The lawyer of a defendant in the case stated that the FBI not only operated the website, but improved it so its number of visitors rose sharply while it was under their control.[8]

Challenges were raised about the FBI's possibly severe misuse of the initial search warrant, leading to the likely dismissal of much of the gathered evidence against one defendant.[9][10] The warrant stated it was to be used to gather information on people in the Eastern District of Virginia only, but because the NIT malware indiscriminately infected people using the site, it was in fact used to gather information from many other areas.[11] Before the change to Rule 41 in 2016 to allow it, this was illegal.[12] On August 28, 2019, the Eleventh Circuit Court of Appeals ruled that the warrant was invalid but that the evidence obtained was not required to be excluded due to the good-faith exception doctrine.[13]

References

[edit]
  1. ^ https://storage.courtlistener.com/recap/gov.uscourts.mad.233074/gov.uscourts.mad.233074.103.5.pdf
  2. ^ a b c Farivar, Cyrus (2017-05-05). "Creator of infamous Playpen website sentenced to 30 years in prison". Ars Technica. Retrieved 2017-05-08.
  3. ^ a b Cimpanu, Catalin (2016-09-17). "Admin of Dark Web Child Pornography Website "Playpen" Found Guilty". news.softpedia.com. Retrieved 2017-05-07.
  4. ^ Pulkkinen, Levi (July 14, 2015). "FBI: Special ed teacher caught with infant rape photos". Seattle Post-Intelligencer.
  5. ^ Newman, Lily Hay (March 7, 2017). "The Feds Would Rather Drop a Child Porn Case Than Give Up a Tor Exploit". Wired.
  6. ^ Farivar, Cyrus (March 5, 2017). "To keep Tor hack source code secret, DOJ dismisses child porn case". Ars Technica.
  7. ^ Rumold, Mark (2016-09-15). "Playpen: The Story of the FBI's Unprecedented and Illegal Hacking Operation". eff.org. Retrieved 2017-05-08.
  8. ^ Conditt, Jessica (2016-08-23). "FBI improved a Dark Web child pornography site, lawyer argues". engadget.com. Retrieved 2017-05-08.
  9. ^ "A massive FBI child porn probe has lawyers asking: Does the end justify the means?". Star Tribune.
  10. ^ "It is not OK to break the law to catch criminals, judge rules". June 8, 2017.
  11. ^ Rumold, Mark (2016-09-26). "The Playpen Story: Rule 41 and Global Hacking Warrants". Electronic Frontier Foundation. Retrieved 2023-03-17.
  12. ^ "How an obscure rule lets law enforcement search any computer". Engadget. Retrieved 2023-03-17.
  13. ^ "No. 17-14915 and No. 18-11852" (PDF).
[edit]

Category:Defunct Tor hidden services Category:Child pornography websites Pacifier Category:Child pornography crackdowns