Operation Avalanche (child pornography investigation)

Operation Avalanche (child pornography investigation)

Operation Avalanche was a major US investigation of child pornography on the Internet launched in 1999 after the arrest and conviction of Thomas and Janice Reedy, who operated an Internet pornography business called Landslide Productions in Fort Worth, Texas[1] It was made public in early August 2001 at the end of Operation Avalanche, that one hundred arrests were made out of 144 suspects. It was followed in the United Kingdom by Operation Ore, in Canada by Operation Snowball and other operations worldwide.

Although US prosecutions were made on the basis of other evidence, later reconstruction of the Landslide site and review of the computer hard drives in the UK identified flaws in the police forensic procedures used and contradicted evidence on the website given at the Reedys' trial. Specifically, investigation of the Landslide data indicated many names listed were victims of credit card fraud, and that there was no link on the Landslide front page to take the user to child pornography sites as stated in sworn trial testimony.[2]

Contents

Landslide Productions, Inc.

Thomas Reedy was a self-taught computer programmer and entrepreneur located in the Fort Worth, Texas, area. He trained and worked as a nurse, but, understanding the financial possibilities of the Internet, he set up an adult pornography website which provided a comfortable income. He soon developed a better strategy to provide middleman services for the adult pornography industry. In 1997 he set up Landslide Productions, Inc., which he ran with his wife Janice, who handled bookkeeping for the company. Landslide quickly became an adult pornography empire stretching across three continents, including some 300,000 subscribers in 60 countries. Within two years, the company made $10 million dollars, and provided the owners a luxurious lifestyle.[3]

Landslide provided payment systems for adult webmasters from different countries. The systems were automated; webmasters could sign up to the system online, and users accessing the websites would go through the payment or login system before being granted access. The principal systems were AVS for Adult Verification System and Keyz because it operated via the keyz.com domain name owned by Landslide.[4]

The AVS system was meant to legally protect the companies from laws against disseminating pornography to minors, as the credit card was used to verify that the user attempting to access a particular website was of legal age to view the website's content. Users could sign up with their credit cards to access affiliated sites, which received 65% of the sign-up fee, while Landslide took the remainder and handled the transactions with the credit card companies.[5]

In 1998 Thomas Reedy recognized systematic fraud in streams of different credit cards being signed up in batches from the same internet address to the same website. In the use of stolen card information, Landslide had to bear the loss if there was a chargeback from the card issuer, often including a penalty fee; plus, the credit card industry imposed a one percent maximum for chargebacks. To preserve his business, Reedy traced the source of the traffic and set up a new web service called Badcard.com to capture card numbers coming from the same internet address, and drew up lists of addresses and card numbers that appeared to be suspiciously used. However, his efforts failed to stop the fraudulent charges.[2]

Landslide went out of business in August 1999, as the fraudulent charges passed the one percent ceiling, leading to Superior Credit withdrawing their merchant services on August 10. Without this merchant account, Landslide could not charge credit cards and could no longer fulfill the primary function of the business. Reportedly, the biggest source of fraud at that time was coming through websites run by US law enforcement as part of a sting operation.[6]

Landslide Investigation

In April 1999, in Texas the United States Postal Inspection Service received an internal complaint through postal inspector Robert Adams. Adams had received a tip from Ronnie Miller, an acquaintance in Saint Paul, Minnesota[citation needed], who provided information about a website advertising child pornography. The image in question was being sourced from a website in Indonesia, which presented the question as to whether the USPIS could legally investigate and prosecute it[citation needed].

In early 1999, The United States Postal Inspection Service engaged the Dallas Police Department to further investigate whether the image from Indonesia could be prosecuted.[7] As a part of a nationwide initiative funded by the Office of Justice Program’s Office of Juvenile Justice and Delinquency Prevention (OJJDP), The United States Department of Justice had announced a grant from the Internet Crimes Against Children Taskforce Program to the Dallas Police Department on 10 January 1998. The purpose of the ICAC was to investigate and prosecute Internet crimes against children.[8]

The court transcriptions from the case against Landslide Productions revealed that the Dallas Police Department had formed a relationship with The Microsoft Corporation after the software maker had encouraged its technical employees to volunteer their time to better the community in which they lived. After having confirmed that prosecution would be difficult because the image in question was indeed being sourced from Indonesia, the Dallas Police Department asked its local Microsoft volunteers to assist in investigating the image. Using Web Buddy, a computer program designed to display Internet traffic on geographic maps, the volunteers helped the Dallas Police Department to verify that Internet traffic related to Ronnie Miller's complaint was passing through the routers of Ft. Worth, Texas-based Landslide Productions.

An adult classified section of the Landslide website allegedly included postings offering to trade Landslide owned Keyz passwords, and illegal child pornography sites were found to be using the Keyz payment system. The U.S. Postal Inspection Service (USPIS) and Dallas Police presented their findings to Terri Moore, an assistant district attorney in the Dallas/Ft. Worth area, and received warrants to search the Landslide business offices and the Reedy home. In August 1999, forty-five to fifty U.S. law enforcement officials from a number of agencies conducted a raid on the Landslide business offices in Fort Worth, Texas owned and operated by Thomas and Janice Reedy.

The raid of Reedy's nearby Fort Worth residence resulted in confiscation a home computer where computer expert Dane Heiskel uncovered business emails confirming his knowledge of customers using Reedy's payment system to access child pornography. Sexually explicit images of underaged children were also found on this computer.[9]

Police seized the assets and records of Landslide, and arrested Thomas and Janice Reedy. Prosecutors offered Thomas Reedy a twenty year prison term and Janice Reedy a five year term if they would plead guilty, but the Reedys refused the plea deal, believing they could not be held legally responsible for the content of third party websites. Reedy maintained that he had attempted to run a legitimate business, writing software to reduce fraud, reporting illegal sites to the FBI and cooperating with the ensuing investigations. According to Reedy, he was told by Special Agent Frank Super to leave the sites in his index for later investigation.[10]

In January 2000 Thomas Reedy was convicted of trafficking in child pornography through testimony from witnesses including Sharon Girling, a UK police officer at SOCA/NCS). Based on a prior police investigation in the UK, Sharon Girling identified victims in the pictures from a website which used the Landslide payment system. Thomas Reedy was sentenced to 1,335 years in prison, a sentence which was reduced to 180 years on appeal.

Operation Avalanche

The Reedy case led to the creation of a nationwide network of 30 federally funded task forces to fight Internet crimes against children.[11] In August 2001, Attorney General John Ashcroft and Chief Postal Inspector Kenneth Weaver announced the launch of Operation Avalanche, a police operation to gather evidence against users of the Landslide gateway and payment system. The seized database records included 35,000 US subscribers, some of whom were targeted with invitations to purchase child pornography by mail. The Chicago Tribune reported that the government also continued to run the Reedys' Landslide website for a time as part of the sting. As a result of Operation Avalanche, one hundred suspects were arrested following 144 searches in 37 states.[12]

The FBI then passed identities from the database to the police organizations of other countries, including 7,272 names to the UK and 2,329 names to Canada. Initial results of the operation seemed positive, as the gateway site and payment system were closed down and thousands of possible users of child pornography websites were identified for later investigation. However, later events somewhat diminished the luster.

Controversies

Police conducting Operation Ore in the UK targeted all names for investigation due to the difference in laws in between the US and the UK, which allowed for arrest on a charge of incitement to distribute child pornography based solely on the presence of a name in the database, regardless if the card was used - fraudulently or not - for child pornography or other legal adult sites. Law in the UK allows conviction on the basis of incitement to distribute indecent images - as such, the mere presence on the database, regardless of the legality of the sites paid for, was sufficient to warrant prosecution. In all, 3,744 people were investigated and arrested and 1,451 of those convicted. However, a subsequent challenge by those targeted led to an independent reconstruction of the Landslide site and a closer inspection of the database and the payment transactions.

In 2005 and 2007, UK investigative journalist Duncan Campbell wrote a series of articles criticizing police forensic procedures and trial evidence. After obtaining copies of the Landslide hard drives, Campbell publicly identified evidence of massive credit card fraud, including thousands of charges where there was no access to any porn site at all. Campbell stated, "independent computer expert Jim Bates of Computer Investigations, said 'the scale of the fraud, especially hacking, just leapt off the screen'."[13]

Campbell's articles also indicated that sworn statements provided by Dallas detective Steve Nelson and US postal inspector Michael Mead were false. They testified that entry to the Landslilde site was through a front-page screen featuring a button saying “Click Here (for) Child Porn”. However, the later investigation established that the button was never on the website’s front page. Instead it was on an advertising banner for another website buried deep in the Landslide offerings.[14]

After Campbell's articles appeared, the independent computer expert Jim Bates of Computer Investigations was charged and convicted of four counts of making false statements and one count of perjury regarding his qualifications[15] and barred from appearing as an expert witness. He was later arrested for possession of indecent images during his Operation Ore investigation.[16] However, the search of Bates home was later ruled as unlawful.[17][18]

See also

References

  1. ^ "Operation Avalanche: Tracking child porn", BBC News, November 11, 2002. URL accessed on June 14, 2006.
  2. ^ a b http://ore-exposed.obu-investigators.com/PC%20Pro%20article%20June%202007%20.pdf Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved 27 December 2009.
  3. ^ "Landslide: Profile of a Pornographer," CBS Fifth Estate, 5 November 2003. Retrieved 16 January 2010. http://www.cbc.ca/fifth/landslide/profile.html
  4. ^ Tresniowski, Alex. "Caught in the Web," People Magazine, 27 August 2001. Retrieved 16 January 2010. http://www.people.com/people/archive/article/0,,20135192,00.html
  5. ^ Duncan Campbell (2007-04-19). "Operation Ore flawed by fraud". The Guardian. http://technology.guardian.co.uk/weekly/story/0,,2059832,00.html. Retrieved 2007-04-23. 
  6. ^ Retrieved 16 January 2010. http://www.iamthewitness.com/Operation.Ore.Truth.Out.htm
  7. ^ "Press Release from Richard B. Roper" United States Department of Justice Northern District
  8. ^ http://ojjdp.ncjrs.gov/programs/ProgSummary.asp?pi=3
  9. ^ Alex Tresniowski "Caught in the Web", People, 27 August 2001 Vol. 56 No. 9
  10. ^ Reedy, Thomas. "1,335 Year Federal Prison Sentence for What!?" Retrieved 16 January 2010. http://www.thomasreedy.info/for%20what.htm
  11. ^ Ridder, Knight. "Child pornographer gets a life sentence," SpokesmanReview, 8 August 2001. Retrieved 16 January 2010. http://www.spokesmanreview.com/news-story.asp?date=080801&ID=s1003651
  12. ^ Yagielowicz, Stephen. "Child Pornography: An Unsolvable Problem?" 10 August 2001. Retrieved 16 January 2010. http://www.xbiz.com/articles/1405
  13. ^ http://ore-exposed.obu-investigators.com/PC%20Pro%20article%20June%202007%20.pdf Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved 7 January 2010.
  14. ^ Leppard, David. http://www.timesonline.co.uk/tol/news/uk/article539974.ece Child porn suspects set to be cleared in evidence ‘shambles’. 3 July 2005. Retrieved 7 January 2010.
  15. ^ http://news.bbc.co.uk/1/hi/england/london/7340997.stm Expert sentenced for court claims. Retrieved 30 December 2009.
  16. ^ http://www.theregister.co.uk/2008/09/17/ore_bates_arrest/ Paedo case expert Jim Bates arrested on child porn charge. Retrieved 30 December 2009.
  17. ^ Bates & Anor v Chief Constable of the Avon and Somerset Police & Anor [2009] EWHC 942 (Admin) (08 May 2009) http://www.bailii.org/ew/cases/EWHC/Admin/2009/942.html
  18. ^ O'Neill, Sean. "Police chief Colin Port risks career by refusing to return child abuse data," The Times, 27 May 2009. Retrieved on 16 January 2010. http://business.timesonline.co.uk/tol/business/law/article6368314.ece

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Operation Avalanche (child pornography crackdown) — Operation Avalanche was a major U.S. investigation of child pornography on the Internet. [http://news.bbc.co.uk/2/hi/uk news/2445065.stm Operation Avalanche: Tracking child porn] , BBC News, November 11 2002. URL accessed on June 14 2006.]… …   Wikipedia

  • Operation Avalanche (disambiguation) — Operation Avalanche, the Allied invasion of Italy, 1943 Operation Avalanche may also refer to: Operation Avalanche (child pornography investigation), A U.S. investigation of child pornography on the Internet, launched 1999 Operation Avalanche… …   Wikipedia

  • Operation Ore — Sex and the law Social issues Age of consent · Antisexualism Censorship · Essentialis …   Wikipedia

  • Child pornography — Sex and the law Social issues …   Wikipedia

  • Legal status of Internet pornography — Due to the international nature of the Internet, Internet pornography carries with it special issues with regard to the law. There is no one set of laws that apply to the distribution, purchase, or possession of Internet pornography. Only the… …   Wikipedia

  • Outline of children — Biologically, a child (plural: children) is generally a human between the stages of birth and puberty. Some definitions include the unborn (termed fetus).[1] The legal definition of child generally refers to a minor, otherwise known as a person… …   Wikipedia

  • List of military operations — This is a list of missions, operations, and projects. Missions in support of other missions are not listed independently.World War I See also List of military engagements of World War I * Albion (1917) flagicon|German Empire mdash; German capture …   Wikipedia

  • 2004 in Canada — yearbox in?=in Canada cp=20th Century c=21st century cf=22nd century yp1=2001 yp2=2002 yp3=2003 year=2004 ya1=2005 ya2=2006 ya3=2007 dp3=1970s dp2=1980s dp1=1990s d=2000s dn1=2010s dn2=2020s dn3=2030sIncumbentsEventsJanuary* January 1: Montreal… …   Wikipedia

  • Computer crime — Computer crime, or cybercrime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3]… …   Wikipedia

  • March 2004 — March 2004: January – February – March – April – May – June – July – August – September – October – November – December Events …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”