Internet Domain Registry

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 27 October 2008

Operación Carrusel sets an example for fighting Child Pornography

Posted on 04:13 by Unknown
The Spanish government last week reminded us how easy it is to catch large groups of online perverts who enjoy downloading child pornography. Last week in Spain, Manuel Vasquez, the chief of the national police's "Brigada de Investigación Tecnológica", announced the detention of 121 people, and brought charges against 96 of them. 800 police officials performed 210 searches in 42 Spanish provinces, leading to the seizure of 347 hard drives, 1,186 CDs and DVDs, and 36 laptop computers. Among those charged was a member of the CNI (Centro Nacional de Inteligencia) and an agent of the National Police who worked in Spain. Four underaged students were also detained.


(watch the video in Spanish)

"Operation Carrousel" is the largest coordinated effort in the history of la Policía Nacional. The investigation began in July of 2007 when the Federal Police of Brasil (la Policía Federal de Brasil) shared log files from a major child pornography distribution network with the government of 75 countries. The archives which they shared identified 18,000 IP addresses from which child pornography had been accessed, including 1,600 connections that had originated in Spain. Those IP addresses were turned over to the Brigade of Technological Research (BIT), who used them to identify 250 homes from a great deal of the activity had occurred.

Those investigated were all "distributers" -- those who could be shown to have ACCESSED the Brazilian stash and also to have SHARED at least three files via Peer to Peer (P2P) networks that made clear reference to underaged pornography in their file names. Terms such as "preteen" or "pcth" (which in Spanish is an abbreviation for "preteen hard core") were suspected, and contents were checked to determine whether the files were in fact what they were labelled.

The Spanish article describing these events, at rtve.es, closes by pointing out how the criminals in these situations are from all walks of life . . . taxi drivers, bank employees, police, commercial pilots, concierges, and teachers, . . . from all ages . . . 4 minors, 5 over the age of 60, 60 between the ages of 18 and 30, 74 from 31 to 40, 52 from 41 to 50, and 22 more between 51 and 60 . . .and from all parts of the country. 49 were arrested in Catalonia, 37 in Andalusia, 29 in Madrid, 22 in Valencia, 15 in Basque country, 13 in Castilla y Leon, 11 in Galicia, 8 in Castilla La Mancha, 7 in Canarias, 6 in Murcia, 5 in Aragón, 5 in Cantabria, 5 in Baleares, 4 in Extramadura, and 1 in La Rioja.

The crime is the same in most every country. We saw similar results in Australia this summer with Operation Centurion, which began when German authorities shared lists of IP addresses of those who visited a child porn website in Germany with other countries. In that case 1,500 Australian IP addresses were investigated -- so far as we can tell the ONLY country of the 170 with whom the Germans shared the information that did anything useful with it. In the opening raid in May, more than 70 Australians were arrested, and more than one million child exploitation images and videos were seized. Arrests in Australia now exceed one hundred people, with the most recent happening last week with the arrest of Robert Andrusiow in Wollongong.

The USA has not had a similar operations since the March 2002 Operation Candyman, which netted 89 offenders in 20 states after 266 searches were conducted. 27 of those arrested plead guilty to molesting more than 36 children.

In Operation Candyman, the Houston FBI's Child Exploitation Task Force set up a Yahoo "eGroup" at www.egroups.com/groups/thecandyman, and monitored the activities of visitors for nearly a year before the raids.

Like its predecessor, Operation Avalanche, which lead to 100 arrests in 37 states, there were some rather strong challenges and accusations of entrapment. The problems generated from CandyMan and Avalanche need to be studied, and compared with the results of Spain's Operación Carrusel and Australia's Operation Centurion.

The lesson we should be learning from the successes in Australia and Spain is that its not necessary to conduct undercover operations that may lead to charges of entrapment. We have technology on our side. Monitoring the highly trafficked child pornography websites of the world and determining where the visitors come from is a perfectly adequate way in which to scoop up large collections of online perverts. To be sure, some of those IP addresses will lead to open WiFi points, libraries, hotels, etc. But as we learned in Spain, many of the perverts are operating from their own homes, and using those same home addresses to do Peer to Peer "distribution". Searching their homes will certainly put officials on the trail to more badness, and will send an important message that is in need of an update: Child Pornography Is Not Tolerated in the United States of America.
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Happy New Year! Here's a Virus! (New Year's Postcard malware)
    I've been busy this week looking at the various defacements (see ComputerWorld , and ABC News ) and other cyber attacks (see yesterday...
  • From Russia, With Love . . . new Postcard spam spies on your PC
    Isn't it nice to have friends who send you postcards? The UAB Spam Data Mine is especially fortunate in that way. Beginning the evenin...
  • Top Brands Imitated by Malicious Spam
    WebSense recently released an InfoGraphic titled "Top Five Subject Lines in Phishing Emails." for January 1, 2013 through Septemb...
  • New Year's Waledac Card
    We haven't seen a new version of Waledac since Independence Day (July 4, 2009), but it looks like its back! I'm on vacation today, s...
  • Tempting Photo Attachments Lead to Fake AV
    One of today's largest malicious spam campaigns continued an occasional theme we've been seeing for a few weeks. A subject line, fo...
  • What about the Social Security Numbers? (The Utah Data Breach and your SSN)
    The Utah Data Breach This week the continuing saga of the Utah Medicaid Data Breach continued to unfold. If you haven't been following...
  • Stop the Rumors: Quit SMSing about WalMart Gang Initiations
    My daughter and her teenage friend were sitting on the couch watching TV today when they began getting text messages on their phone. Here...
  • Minipost: IPR Center celebrates Cyber Monday
    The National Intellectual Property Rights Center (IPR Center) announced today that in celebration of Cyber Monday, they have Seized 82 Domai...
  • ACH Spammer switches to Shortened URLs
    For many weeks now the spammers behind one particular malware family have been fighting a running battle to keep their malware-hosting domai...
  • Work at Home . . . for a Criminal?
    How do you tell if a "Work at Home" invitation is a scam? Here's a clue: It comes in your email. In today's Blog, I tho...

Categories

  • china
  • computer security careers
  • conficker
  • cyberwar
  • digital certificates
  • facebook
  • fake av
  • gumblar
  • koobface
  • law enforcement
  • malware
  • pharmaceuticals
  • phishing
  • public policy
  • spam
  • twitter
  • twitter malware
  • waledac
  • zbot

Blog Archive

  • ►  2013 (21)
    • ►  December (4)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (5)
    • ►  April (3)
    • ►  March (1)
  • ►  2012 (18)
    • ►  August (1)
    • ►  June (1)
    • ►  May (7)
    • ►  April (2)
    • ►  March (7)
  • ►  2011 (28)
    • ►  November (3)
    • ►  October (1)
    • ►  August (4)
    • ►  July (6)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (6)
    • ►  February (1)
    • ►  January (2)
  • ►  2010 (80)
    • ►  December (6)
    • ►  November (10)
    • ►  October (6)
    • ►  September (12)
    • ►  August (5)
    • ►  July (4)
    • ►  June (11)
    • ►  April (7)
    • ►  March (8)
    • ►  February (4)
    • ►  January (7)
  • ►  2009 (92)
    • ►  December (12)
    • ►  November (11)
    • ►  October (16)
    • ►  September (7)
    • ►  July (5)
    • ►  June (10)
    • ►  May (2)
    • ►  April (6)
    • ►  March (7)
    • ►  February (6)
    • ►  January (10)
  • ▼  2008 (101)
    • ►  December (7)
    • ►  November (17)
    • ▼  October (11)
      • LaSalle acquisition by Bank of America spreads mal...
      • First Enom Phish, now Network Solutions Phish
      • Caution: Enom Phishing continues
      • Ding Dong The Witch Is Dead! ( ICANN Pulls the Pl...
      • Tip to Phishers: First Build Site, THEN Spam
      • Operación Carrusel sets an example for fighting Ch...
      • The demise of index1.php PornTube Video Malware
      • Ryan Goldstein: Digerati Faces ?Justice?
      • FTC stops AffKing and SanCash, so is Pill Spam Gone?
      • SanCash (Affking) taken down in New Zealand
      • Need help with your debt? Ask the Panamanian Russ...
    • ►  September (10)
    • ►  August (22)
    • ►  July (12)
    • ►  June (3)
    • ►  May (7)
    • ►  April (5)
    • ►  March (2)
    • ►  February (1)
    • ►  January (4)
  • ►  2007 (31)
    • ►  December (3)
    • ►  November (9)
    • ►  October (3)
    • ►  September (2)
    • ►  August (5)
    • ►  July (5)
    • ►  January (4)
  • ►  2006 (5)
    • ►  December (2)
    • ►  October (3)
Powered by Blogger.

About Me

Unknown
View my complete profile