Type of site | Child pornography file sharing |
---|---|
Launched | June 2019 [1] |
Current status | Offline (as of mid-April 2021) [2] |
Boystown (stylized in logo as BOYS TOWN) was a child pornography website run through the Tor network as an onion service. It launched in June 2019 and was shut down by authorities in April 2021. Four German administrators of the site confessed and were sentenced to long prison sentences in December 2022. [3]
The site was launched in June 2019 [3] and was run through the Tor network. [4] The server was registered in Moldovia. [5] As of May 2021, the website was considered one of the largest international darknet platforms to host child pornography and had 400,000 registered users. [2] [6]
The website featured various forums and chats for communication. The illegal images and videos were posted on the forums and the chats where members were able to communicate with one another. [7] There were two chat services provided, one called "Lolipub" and the other was known as "BOYSPUB". [1] The child abuse materials exchanged between users were of young children and toddlers, most of which were boys, from around the world. [8] The child pornographic content had various categories including "Art" (which included shotacon among other subcategories [9] ), "hardcore", "kindergarten", and "toddler". [1] Lolipub also had rules that included banning the promotion of hurtcore. [1]
The website was investigated by a German police task force with cooperation from Europol and international law enforcement agencies. The platform's administrators and users were under investigation for months. [2] [6] Early on, the German Federal Criminal Police (BKA) was able to plant an undercover agent inside the Boystown network, [5] but identifying the perpetrators proved difficult as they only communicated via the Tor network.
To identify the perpetrators, police used a correlation analysis attack against the Ricochet chat protocol which was used by Boystown admins and operates on the Tor network. By sending Ricochet messages to perpetrators and monitoring several hundred Tor nodes for simultaneous traffic of the correct size, authorities were able to piece together the chain of Tor nodes used and the perpetrator's entry node, which then revealed the perpetrators' IP addresses. [4]
The following agencies took part in the investigation: [10]
In mid-April 2021, the website was raided by authorities and shut down. [2]
Three primary suspects were discovered and identified during the investigation: a 40-year-old man from Paderborn, a 49-year-old man from Munich, and a 58-year-old man from Northern Germany who was living in Paraguay. The suspects allegedly acted as administrators for the website and gave advice to its users on how to evade law enforcement while using the platform. [2] Another suspect was a 64-year-old man from Hamburg who was accused of being one of the most active users uploading over 3,500 posts. [2] [6]
The public and the press were excluded from the trial. The suspects confessed. The man from Munich was sentenced to 12 years in prison with subsequent preventive detention ("Sicherungsverwahrung"), the man from Paderborn received a sentence of 10.5 years with subsequent preventive detention, the German from Paraguay was sentenced to 8 years in prison and the man from Hamburg received a sentence of 7 years in prison. [3]
According to the suspects, one inner-circle member of Boystown claimed to be a high-ranking employee of a German security agency who as part of his job received requests from the German government and other authorities to check the security of certain processes. He acted as an administrator for Boystown and optimized various programming scripts. [5]
Hours after the shutdown, an unknown user posted a dump of Boystown online, as confirmed by the Frankfurt prosecutor's office. The journalist group STRG_F had 13.5 TB of data deleted from various file hosters by December 2021, pointing out that investigators were only interested in hard drives of perpetrators but not in removing offending material from the internet. [11]
Three successor platforms (with 410 and 846 thousand accounts) with, among others, a common admin in Germany (a 21-year-old from Saxony) were shut down Christmas 2022. Another three suspected administrators were arrested in November and December in Seelze near Hanover, [12] Schleswig-Holstein and Brazil. The BKA secured hundreds of thousands of images. [13]
Operation Ore was a British police operation that commenced in 1999 following information received from US law enforcement, which was intended to prosecute thousands of users of a website reportedly featuring child pornography. It was the United Kingdom's biggest ever computer crime investigation, leading to 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned and 140 children removed from suspected dangerous situations and an estimated 33 suicides. Operation Ore identified and prosecuted some sex offenders, but the validity of the police procedures was later questioned, as errors in the investigations resulted in many false arrests.
Sebastian Edathy is a German former politician. He was a prominent member of the Social Democratic Party (SPD) and became the chairman of a key committee in January 2012 at the Parliament, which was investigating failures of police and intelligence units in the serial murders of nine immigrants by the far-right German terrorist group National Socialist Underground (NSU) from 2000 to 2007. The NSU committee questioned various officials from Germany's Federal Criminal Police Office during 2012 and 2013. His alleged possession of child porn material sparked the Edathy-Affäre.
Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.
Silk Road was an online black market and the first modern darknet market. It was launched in 2011 by its American founder Ross Ulbricht under the pseudonym "Dread Pirate Roberts." As part of the dark web, Silk Road operated as a hidden service on the Tor network, allowing users to buy and sell products and services between each other anonymously. All transactions were conducted with bitcoin, a cryptocurrency which aided in protecting user identities. The website was known for its illegal drug marketplace, among other illegal and legal product listings. Between February 2011 and July 2013, the site facilitated sales amounting to 9,519,664 Bitcoins.
Lolita City was a child pornography website that used hidden services available through the Tor network. The site hosted images and videos of underage males and females up to 17 years of age. The website was hosted by Freedom Hosting, a defunct Tor-based web hosting provider.
Freedom Hosting was a Tor specialist web hosting service that was established in 2008. At its height in August 2013, it was the largest Tor web host.
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
Project Spade, an international police investigation into child pornography, began in October 2010 in Toronto, Canada. The investigation started when Toronto Police Service officers made on-line contact with a man who was alleged to have been sharing pornographic videos via the Internet and by mail. The investigation eventually covered over 50 countries. 348 people were arrested internationally, and 386 children were said to have been rescued. The primary producers were Igor Rusanov and Andrey Ivanov in Crimea, Ukraine, Markus Roth in Romania, and Paul Kruger in Germany.
Ricochet or Ricochet IM is a free software, multi-platform, instant messaging software project originally developed by John Brooks and later adopted as the official instant messaging client project of the Invisible.im group. A goal of the Invisible.im group is to help people maintain privacy by developing a "metadata free" instant messaging client.
Operation Onymous was an international law enforcement operation targeting darknet markets and other hidden services operating on the Tor network.
Evolution was a darknet market operating on the Tor network. The site was founded by an individual known as 'Verto' who also founded the now defunct Tor Carding Forum. Evolution was active between 14 January 2014 and mid-March 2015.
A darknet market is a commercial website on the dark web that operates via darknets such as Tor and I2P. They function primarily as black markets, selling or brokering transactions involving drugs, cyber-arms, weapons, counterfeit currency, stolen credit card details, forged documents, unlicensed pharmaceuticals, steroids, and other illicit goods as well as the sale of legal products. In December 2014, a study by Gareth Owen from the University of Portsmouth suggested the second most popular sites on Tor were darknet markets.
DeepDotWeb was a news site dedicated to events in and surrounding the dark web featuring interviews and reviews about darknet markets, Tor hidden services, privacy, bitcoin, and related news. The website was seized on May 7, 2019, during an investigation into the owners' affiliate marketing model, in which they received money for posting links to certain darknet markets, and for which they were charged with conspiracy to commit money laundering. In March 2021 site administrator Tal Prihar pleaded guilty to his charge of conspiracy to commit money laundering.
Operation Torpedo was a 2011 operation in which the Federal Bureau of Investigation (FBI) compromised three different hidden services hosting child pornography, which would then target anyone who happened to access them using a network investigative technique (NIT).
Playpen was a darknet child pornography website that operated from August 2014 to March 2015. The website operated through the Tor network which allowed users to use the website anonymously. After running the website for 6 months, the website owner Steven W. Chase was captured by the FBI. After his capture, the FBI continued to run the website for another 13 days as part of Operation Pacifier.
Operation Bayonet was a multinational law enforcement operation culminating in 2017 targeting the AlphaBay and Hansa darknet markets. Many other darknet markets were also shut down.
Childs Play [sic] was a website on the darknet featuring child sexual abuse material that operated from April 2016 to September 2017, which at its peak was the largest of its class. The site was concealed by being run as a hidden service on the Tor network. After running the site for the first six months, owner Benjamin Faulkner of North Bay, Ontario, Canada, was captured by the United States Department of Homeland Security. For the remaining eleven months the website was owned and operated by the Australian Queensland Police Service's Task Force Argos, as part of Operation Artemis.
The "Nth Room" case is a criminal case involving blackmail, cybersex trafficking, and the spread of sexually exploitative videos via the Telegram app between 2018 and 2020 in South Korea. A man nicknamed god god sold sexual exploitation videos on Telegram channels and groups.
Operation Lobos, also known as Operation Wolves, was a Brazilian-centered 12-country multinational operation to target the operations of a TOR onion service known as Baby Heart. Additional objectives and targets of the joint operation were the deanonymization of the TOR host servers, TOR administrators, and TOR users associated with the target website and several other targeted websites/chat-sites that were alleged to contain or be used to traffic illegal images of child sexual abuse materials (CSAM) and other categories of legal nude and non-nude images of persons under 18. As of February 2024, the complete list of target websites/chat-sites involved in this operation has not been released by any government; however, the primary targets appeared to be the following: Baby Heart, Hurt-meh, Boyvids 4.0, Anjos Prohibidos (BR)/Forbidden Angels, and Loli Lust. Court documents have indicated that there were at least two other websites/chat-sites that were targeted; however, the names of the websites/chat-sites have not been made public.