Operation Auxin

Last updated
Operation Auxin
Operation NameOperation Auxin
TypeChild pornography crackdown
Roster
Planned byUnited States
Executed byAustralia, Canada, Germany, Ireland, Italy, Switzerland, United Kingdom, United States
Mission
Targetassociated users associated with website portal Landslide Productions.
ObjectiveTo round up and prosecute suspects named in a Tip by the United States FBI from Operation Avalanche
Timeline
Results
Arrests~200
Accounting

Operation Auxin was an Australian Federal Police operation in September 2004, leading to the arrest of almost 200 people on charges of child pornography. These people were all accused of purchasing child pornography over the Internet, using their credit cards, from Belarusian crime syndicates, the credit card payments having been processed by a company named Landslide.com in Fort Lauderdale, Florida. Among the accused were people holding positions of trust in the community, such as police officers (including one officer assigned to investigate child pornography), members of the military, teachers and ministers of religion. Several of the suspects committed suicide. It was the follow-up to the U.S. FBI operation Operation Avalanche. And has been associated with Operation FALCON [1]

Contents

US investigation

Between 1999 and 2001, after a tip, a US investigation was conducted into Landslide Productions Inc., a Texas-based online pornography portal operated by Thomas and Janice Reedy. The portal was found to have provided access to child pornography and the Reedys were both convicted of trafficking child pornography in August 2001.

Following the investigation and conviction "Operation Avalanche" was launched, in the US, to trace and prosecute child pornography users identified in the Landslide database. In addition, the website was run for a short time as part of a sting operation by the FBI to capture new suspects.[8] The FBI also passed identities from the Landslide database to the police organisations of other countries, including 7,272 names to the UK.

Legality

The initial credit card evidence used in the investigation has since been widely debunked due to there being no established link between a credit card being used and actual pornography being downloaded. [2] Additionally, multiple cases of credit card fraud involving organised crime syndicates has also raised the possibility that credit card numbers retrieved from Landslide.com may have been used by a third party and not their owners at all. [3]

Similarly Operation Ore in the United Kingdom have come under intense fire both from those wrongfully convicted and from civil rights groups. [3]

Results

Nearly 200 people arrested in Australia

Country Specific Results

Participating Countries

Related Research Articles

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

Operation Ore was a British police operation that commenced in 1999 following information received from US law enforcement, which was intended to prosecute thousands of users of a website reportedly featuring child pornography. It was the United Kingdom's biggest ever computer crime investigation, leading to 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned and 140 children removed from suspected dangerous situations and an estimated 33 suicides. Operation Ore identified and prosecuted some sex offenders, but the validity of the police procedures was later questioned, as errors in the investigations resulted in many false arrests.

Operation Pin is an initiative of the Virtual Global Taskforce, which consists of UK's National Crime Squad, the FBI, Interpol, the Royal Canadian Mounted Police and the Australian Hi-Tech Crime Centre / Australian Federal Police (AFP). Its stated aim is to identify pedophiles and other people who are using the internet to access child pornography. Announced on 18 December 2003, the operation is said to involve the creation and operation of a number of websites purporting to offer illegal images. While these websites will not contain child pornography images, they will be designed to look like the real thing so as to ensnare as many offenders as possible.

Operation Avalanche was a major United States investigation of child pornography on the Internet launched in 1999 after the arrest and conviction of Thomas and Janice Reedy, who operated an Internet pornography business called Landslide Productions in Fort Worth, Texas. It was made public in early August 2001 at the end of Operation Avalanche that 100 arrests were made out of 144 suspects. It was followed by Operation Ore in the United Kingdom, Operation Snowball in Canada, Operation Pecunia in Germany, Operation Amethyst in Ireland and Operation Genesis in Switzerland.

Operation Sundevil was a 1990 nationwide United States Secret Service crackdown on "illegal computer hacking activities." It involved raids in approximately fifteen different cities and resulted in three arrests and the confiscation of computers, the contents of electronic bulletin board systems (BBSes), and floppy disks. It was revealed in a press release on May 9, 1990. The arrests and subsequent court cases resulted in the creation of the Electronic Frontier Foundation. The operation is now seen as largely a public-relations stunt. Operation Sundevil has also been viewed as one of the preliminary attacks on the Legion of Doom and similar hacking groups. The raid on Steve Jackson Games, which led to the court case Steve Jackson Games, Inc. v. United States Secret Service, is often attributed to Operation Sundevil, but the Electronic Frontier Foundation states that it is unrelated and cites this attribution as a media error.

The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.

The Genesis Operation was an operation carried out by the Swiss Federal Office of Police (Fedpol), the judiciary of the Canton of Zurich and the Cantonal Police of the other cantons of Switzerland between September 2002 and May 2004 against the possession of illegal child pornography in the form of digital images based on the United States "Tip" to Interpol with information about the use of credit cards

<span class="mw-page-title-main">United States Postal Inspection Service</span> Federal law enforcement agency

The United States Postal Inspection Service (USPIS), or the Postal Inspectors, is the federal law enforcement arm of the United States Postal Service. It supports and protects the U.S. Postal Service, its employees, infrastructure, and customers by enforcing the laws that defend the United States' mail system from illegal or dangerous use. Its jurisdiction covers any crimes that may adversely affect or fraudulently use the U.S. Mail, the postal system or postal employees. With roots going back to the late 18th century, the USPIS is the oldest continuously operating federal law enforcement agency.

The Big Circle Gang is a Chinese triad which was established in Hong Kong in the 1970s. They were given the moniker "Big Circle Gang" and were formed by former members of the Red Guards, a paramilitary organization established by Mao Zedong during the Cultural Revolution. After Mao eventually ordered a crackdown on the Red Guards using the People's Liberation Army (PLA), many former members of the organization were imprisoned in China. However, some former Red Guards fled as refugees to Hong Kong, where they "turned their military prowess to crime", according to a Canadian court record, forming the triad known as the Big Circle Gang. The triad now thrives among the unregulated factories and underground banks of Guangdong, and especially in the city of Guangzhou; they were nicknamed the "Big Circle Gang" after a drawing on a map indicating in which part of China they operated.

<span class="mw-page-title-main">National Incident-Based Reporting System</span> System used by law enforcement agencies in the United States

National Incident-Based Reporting System (NIBRS) is an incident-based reporting system used by law enforcement agencies in the United States for collecting and reporting data on crimes. Local, state and federal agencies generate NIBRS data from their records management systems. Data is collected on every incident and arrest in the Group A offense category. These Group A offenses are 52 offenses grouped in 23 crime categories. Specific facts about these offenses are gathered and reported to NIBRS. In addition to the Group A offenses, 10 Group B offenses are reported with only the arrest information.

Operation Amethyst was a Garda Síochána (police) operation targeting child pornography in the Republic of Ireland. Involving simultaneous searches on May 27, 2002 of over 100 individuals suspected of downloading child pornography, it was one of the largest police operations in Ireland's history.

<span class="mw-page-title-main">IRS Criminal Investigation</span> Criminal Investigation division of the IRS

Internal Revenue Service, Criminal Investigation (IRS-CI) is the United States federal law enforcement agency responsible for investigating potential criminal violations of the U.S. Internal Revenue Code and related financial crimes, such as money laundering, currency transaction violations, tax-related identity theft fraud and terrorist financing that adversely affect tax administration. While other federal agencies also have investigative jurisdiction for money laundering and some Bank Secrecy Act violations, IRS-CI is the only federal agency that can investigate potential criminal violations of the Internal Revenue Code, in a manner intended to foster confidence in the tax system and deter violations of tax law. Criminal Investigation is a division of the Internal Revenue Service, which in turn is a bureau within the United States Department of the Treasury.

Task Force Argos is a branch of the Queensland Police Service, responsible for the investigation of online child exploitation and abuse. Founded in 1997, the unit's original charter was to investigate institutional child abuse allegations arising from the Forde Inquiry.

The United Blood Nation, also known as the East Coast Bloods, is a street and prison gang active primarily in the New York metropolitan area. It is the east coast faction of the California-based Bloods street gang. Their main source of income is the trafficking and sale of illegal drugs.

Operation Power Outage was a sting operation targeted at arresting and indicting members of the criminal group Armenian Power operating in the United States. The group is accused of racketeering offenses, bank fraud schemes, kidnappings, and drug trafficking. Armenian Power which originated 20 years ago in East Hollywood and has over 200 members, has developed from a street gang into an international criminal organization.

<span class="mw-page-title-main">FBI Cyber Division</span> US Federal Bureau of Investigation division

The Cyber Division (CyD) is a Federal Bureau of Investigation division which heads the national effort to investigate and prosecute internet crimes, including "cyber based terrorism, espionage, computer intrusions, and major cyber fraud." This division of the FBI uses the information it gathers during investigation to inform the public of current trends in cyber crime. It focuses around three main priorities: computer intrusion, identity theft, and cyber fraud. It was created in 2002.

<span class="mw-page-title-main">Carding (fraud)</span> Crime involving the trafficking of credit card data

Carding is a term of the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques. Modern carding sites have been described as full-service commercial entities.

<span class="mw-page-title-main">FBI MoneyPak Ransomware</span>

The FBI MoneyPak Ransomware, also known as Reveton Ransomware, is a type of ransomware malware. It starts by purporting to be from a national police agency and that they have locked the computer or smart phone due to "illegal activities" and demands a ransom payment via GreenDot MoneyPak cards in order to release the device.

<span class="mw-page-title-main">Operation Trojan Shield</span> International police sting operation, 2018 to 2021

The ANOM sting operation is a collaboration by law enforcement agencies from several countries, running between 2018 and 2021, that intercepted millions of messages sent through the supposedly secure smartphone-based proprietary messaging app ANOM. The ANOM service was widely used by criminals, but instead of providing secure communication, it was actually a trojan horse covertly distributed by the United States Federal Bureau of Investigation (FBI) and the Australian Federal Police (AFP), enabling them to monitor all communications. Through collaboration with other law enforcement agencies worldwide, the operation resulted in the arrest of over 800 suspects allegedly involved in criminal activity, in 16 countries. Among the arrested people were alleged members of Australian-based Italian mafia, Albanian organised crime, outlaw motorcycle clubs, drug syndicates and other organised crime groups.

Operation Lobos (, also known as Operation Wolves, was a Brazilian-centered 12-country, multinational operation, to target operations of a TOR onion service known as Baby Heart. Additional objectives/targets of the joint operation were the deanonymization of the TOR host server, TOR administrator and TOR users associated with the Target Website and several other targeted websites/chat-sites that were alleged to contain or be used to traffic illegal images of child sexual abuse materials and other categories of legal nude and non-nude images of persons under 18. As of February 2024, the complete list of target websites/chat-sites involved in this operation have not been released by any government, however, the primary targets appeared to be the following: Baby-Heart, Hurt-meh, Boyvids 4.0, Anjos Prohibidos /Forbidden-Angels, and Loli Lust. Court documents have indicated that there were at least two other websites/chat-sites that were targeted, however the names of the websites/chat-sites have not been made public.

References

  1. "Operation Auxin explained". Sydney Morning Herald. Archived from the original on 11 February 2009.
  2. Campbell, Duncan (19 April 2007). "Operation Ore flawed by fraud". The Guardian.
  3. 1 2 Campbell, Duncan (1 July 2005). "Operation Ore exposed". Alphr.