No Criminal is beyond FBI Reach


Every parent wants decency in every media, whether movies or the Internet. But, on Internet, you may find everything. During the Corona pandemic, even small kids were given access to the mobiles and Internet. Keeping an eye on children every time is not possible. Although firewalls block specific websites and routers also come with parenting guards.
There has been a sharp decline in adult hosting websites in recent years, and even now, the hosting providers are very stringent on this. But, online adult websites still exist on the Dark Web, and land laws are not sufficient or powerless to some extent to stop them. It creates a sense of urgency to stop abuse and adultery. Negative things gain more popularity, such as adultery websites, images, gallery rack up a substantial number of views.

A single collection of images, labeled “Melinda – my daughter,” was viewed more than 467,000 times. The most challenging part is that viewers or members of such sites are not punished, or significantly fewer numbers get punishment. The agencies find investigations of such websites costly, slow and difficult.

Recently FBI hackers resorted to hacking to hunt down pedophiles hiding anonymously on the Internet. They took down a child porn ring on TOR by hacking, spying, and conducting home raids. The details came into focus when the FBI played the hacker spies role going beyond legal boundaries with court authorization.

In Operation Torpedo started in 2011, Netherlands police found a large child porn site and gained administrative access. The web server was located inside a data center at Power DNN, a Web hosting service located in Bellevue, Nebraska. Prosecutors said police rescued over half a dozen children. According to court records, Dutch cops then tipped off the FBI.

The judge approved FBI spying on Omaha, Nebraska, home of one Power DNN employee, Aaron McGrath. In late 2012, The federal agents burst into his house and caught McGrath signed in as the administrator of PedoBook, a social media site where people shared photos of child pornography. His laptop data was encrypted and locked, but investigators could determine the password and unlock the computer, as per court records. FBI agents could not identify the website’s visitors, as the website on the Dark Web was accessible through the TOR browser, which hides visitors’ location by bouncing Internet traffic signals around the globe. Then FBI was granted a search warrant for a “network investigative technique,” allowing agents to slip computer code into photos on the child porn website.

Every time a website visitor clicked on an image of a naked child, their computer also downloaded extra data that reported its actual IP address and operating system and identified users. The FBI agents exploited notoriously vulnerable Flash to establish a direct connection to reveal IP addresses. Those using an outdated version of TOR and didn’t set computers block Flash, their IP got revealed. They catch the slowest, dumbest of the bunch without breaking TOR’s anonymity.

One more challenge is that few, in the name of free speech, criticize the government’s actions and question the legality of bringing down such websites; they say the Internet is free and such websites can also run, and people can freely watch them. Challenging the FBI hacking methods in the Operation Torpedo case, the defense attorney claimed the mass hack was “overreaching of law enforcement.” “FBI unfairly sneaked upon his client.” The defense argued that the search warrant required notifying the suspect of the electronic search within 30 days.

These criminals’ acts were beyond one’s imagination. A 22-year-old from Ashford, Alabama, promised to produce images of his yet unborn daughter while still in her mother’s womb, and the FBI stopped him, and now he is in prison for 15 years.
A 42-year-old boasted about the many girls he raped in the Philippines. He’s now serving 20 years.
(source: https://money.cnn.com/2016/01/25/technology/fbi-child-porn/index.html)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.