Operation Avalanche (child pornography investigation)

Last updated

Operation Avalanche
Operation NameOperation Avalanche
TypeChild pornography crackdown
Roster
Planned byUnited States
Executed byAustralia, Canada, Germany, Ireland, Germany, Switzerland, United Kingdom, United States
Mission
Timeline
Date begin1999
Date end~2002
Results
Suspects144
Arrests100
Accounting

Operation Avalanche was a major United States investigation of child pornography on the Internet launched in 1999 after the arrest and conviction of Thomas and Janice Reedy, who operated an Internet pornography business called Landslide Productions in Fort Worth, Texas. [1] It was made public in early August 2001, at the end of Operation Avalanche, that 100 arrests were made out of 144 suspects. It was followed by Operation Ore in the United Kingdom, Operation Snowball in Canada, Operation Pecunia in Germany, Operation Amethyst in Ireland, and Operation Genesis in Switzerland. [2]

Contents

Although US prosecutions were made on the basis of other evidence, later reconstruction of the Landslide site and review of the computer hard drives in the UK identified flaws in the police forensic procedures used and contradicted evidence on the website given at the Reedys' trial. Specifically, investigation of the Landslide data indicated many names listed were victims of credit card fraud and that there was no link on the Landslide front page to take the user to child pornography sites, as stated in sworn trial testimony. [3]

Landslide Productions, Inc.

Thomas Reedy was a self-taught computer programmer and entrepreneur living in the Fort Worth, Texas, area. He trained and worked as a nurse, but, understanding the financial possibilities of the Internet, he set up an adult pornography website that provided a comfortable income. He soon developed a better strategy to provide middleman services for the adult pornography industry. In 1997, he set up Landslide Productions, Inc., which he ran with his wife Janice, who handled bookkeeping for the company. Landslide quickly became an adult pornography empire stretching across three continents, with some 300,000 subscribers in 60 countries. Within two years, the company made $10 million and provided the owners with a luxurious lifestyle. [4]

Landslide provided payment systems for adult webmasters from different countries. The systems were automated; webmasters could sign up to the system online, and users accessing the websites would go through the payment or login system before being granted access. The principal systems were AVS, for Adult Verification System, and Keyz, because it operated via the keyz.com domain name owned by Landslide. [5]

The AVS system was meant to legally protect the companies from laws against disseminating pornography to minors, as the credit card was used to verify that the user attempting to access a particular website was of legal age to view the website's content. Users could sign up with their credit cards to access affiliated sites, which received 65% of the sign-up fee, while Landslide took the remainder and handled the transactions with the credit card companies. [6]

In 1998, Thomas Reedy recognized systematic fraud in streams of different credit cards being signed up in batches from the same internet address to the same website. In the use of stolen card information, Landslide would have had to bear the loss if there had been a chargeback from the card issuer, often including a penalty fee; also, the credit card industry imposed a 1% maximum for chargebacks. To preserve his business, Reedy traced the source of the traffic, set up a new web service called Badcard.com to capture card numbers coming from the same internet address, and drew up lists of addresses and card numbers that appeared to be suspiciously used. However, his efforts failed to stop the fraudulent charges. [3]

Landslide went out of business in August 1999, as the fraudulent charges passed the 1% ceiling, leading to Superior Credit withdrawing its merchant services on August 10. Without this merchant account, Landslide could not charge credit cards and could no longer fulfill the primary function of the business. Reportedly, the biggest source of fraud at that time was coming through websites run by US law enforcement as part of a sting operation. [7]

Landslide investigation

In April 1999, in Texas, the United States Postal Inspection Service received an internal complaint from postal inspector Robert Adams. Adams had received a tip from Ronnie Miller, an acquaintance in Saint Paul, Minnesota [ citation needed ] who provided information about a website advertising child pornography. The image in question was being sourced from a website in Indonesia, which presented the question as to whether the USPIS could legally investigate and prosecute it.[ citation needed ]

In early 1999, the United States Postal Inspection Service engaged the Dallas Police Department to further investigate whether the image from Indonesia could be prosecuted. [8] As a part of a nationwide initiative funded by the Office of Justice Program's Office of Juvenile Justice and Delinquency Prevention (OJJDP), the United States Department of Justice announced a grant from the Internet Crimes Against Children Taskforce Program to the Dallas Police Department on January 10, 1998. The purpose of the ICAC was to investigate and prosecute Internet crimes against children. [9]

The court transcriptions from the case against Landslide Productions revealed that the Dallas Police Department had formed a relationship with Microsoft Corporation after the software maker had encouraged its technical employees to volunteer their time to better the community in which they lived. After having confirmed that prosecution would be difficult because the image in question was indeed being sourced from Indonesia, the Dallas Police Department asked its local Microsoft volunteers to assist in investigating the image. Using Web Buddy, a computer program designed to display Internet traffic on geographic maps, the volunteers helped the Dallas police verify that internet traffic related to Ronnie Miller's complaint was passing through the routers of Ft. Worth-based Landslide Productions.

An adult classified section of the Landslide website allegedly included postings offering to trade Landslide-owned Keyz passwords, and illegal child pornography sites were found to be using the Keyz payment system. The U.S. Postal Inspection Service (USPIS) and Dallas police presented their findings to Terri Moore, an Assistant District Attorney in the Dallas/Fort Worth area, and received warrants to search the Landslide business offices and the Reedy home. In August 1999, 45 to 50 law enforcement officials from a number of agencies conducted a raid on the Landslide business offices in Fort Worth.

The raid of the Reedys' Fort Worth residence resulted in the confiscation of a home computer, on which computer expert Dane Heiskel uncovered business emails confirming his knowledge of customers using Reedy's payment system to access child pornography. Sexually explicit images of children were also found on this computer. [10]

Police seized the assets and records of Landslide and arrested Thomas and Janice Reedy (see United States v. Reedy - 4:00-cr-00054). Prosecutors offered Thomas a 20-year prison term and Janice a five-year term if they would plead guilty, but the Reedys refused the plea deal, believing they could not be held legally responsible for the content of third-party websites. Reedy maintained that he had attempted to run a legitimate business by writing software to reduce fraud, reporting illegal sites to the Federal Bureau of Investigation (FBI), and cooperating with the ensuing investigations. According to Reedy, he was told by Special Agent Frank Super to leave the sites in his index for later investigation. [11]

In January 2000, Thomas Reedy was convicted of trafficking in child pornography through testimony from witnesses, including Sharon Girling, a UK police officer at SOCA/NCS. Based on a prior police investigation in the UK, Girling identified victims in the pictures from a website that used the Landslide payment system. Thomas Reedy was sentenced to 1,335 years in prison, a sentence that was reduced to 180 years on appeal.

Operation Avalanche

The Reedy case led to the creation of a nationwide network of 30 federally funded task forces to fight Internet crimes against children. [12] In August 2001, Attorney General John Ashcroft and Chief Postal Inspector Kenneth Weaver announced the launch of Operation Avalanche, an operation to gather evidence against users of the Landslide gateway and payment system. The seized database records included 35,000 US subscribers, some of whom were targeted with invitations to purchase child pornography by mail. The Chicago Tribune reported that the government also continued to run the Reedys' Landslide website for a time as part of the sting. As a result of Operation Avalanche, 100 suspects were arrested following 144 searches in 37 states. [13]

The FBI then passed identities from the database to the police organizations of other countries, including 7,272 names in the UK and 2,329 names in Canada. Initial results of the operation seemed positive, as the gateway site and payment system were closed down and thousands of possible users of child pornography websites were identified for later investigation.

Controversies

Police conducting Operation Ore in the UK targeted all names for investigation due to the difference in laws between the US and the UK, which allowed for arrest on a charge of incitement to distribute child pornography based solely on the presence of a name in the database, regardless of whether the card was used—fraudulently or not—for child pornography or for other legal adult sites. Law in the UK allows conviction on the basis of incitement to distribute indecent images; as such, the mere presence on the database, regardless of the legality of the sites paid for, was sufficient to warrant prosecution. In all, 3,744 people were investigated, and arrested and 1,451 of those were convicted. However, a subsequent challenge by those targeted led to an independent reconstruction of the Landslide site and a closer inspection of the database and the payment transactions.

In 2005 and 2007, UK investigative journalist Duncan Campbell wrote a series of articles criticizing police forensic procedures and trial evidence. After obtaining copies of the Landslide hard drives, Campbell publicly identified evidence of massive credit card fraud, including thousands of charges where there was no access to any porn site at all. Campbell stated, "Independent computer expert Jim Bates of Computer Investigations said 'the scale of the fraud, especially hacking, just leapt off the screen'." [14]

Campbell's articles also indicated that sworn statements provided by Dallas detective Steve Nelson and US postal inspector Michael Mead were false. They testified that entry to the Landslide site was through a front-page screen featuring a button saying "Click Here (for) Child Porn." However, the later investigation established that the button was never on the website's front page. Instead, it was on an advertising banner for another website buried deep in the Landslide offerings. [15]

After Campbell's articles appeared, independent computer expert Jim Bates of "Computer Investigations" was charged and convicted of four counts of making false statements and one count of perjury regarding his qualifications [16] and barred from appearing as an expert witness. He was later arrested for possession of indecent images during his Operation Ore investigation. [17] However, the search of Bates' home was later ruled unlawful. [18] [19]

Results

Country-specific results

Participating law enforcement agencies

See also

Related Research Articles

Operation Ore was a British police operation that commenced in 1999 following information received from US law enforcement, which was intended to prosecute thousands of users of a website reportedly featuring child pornography. It was the United Kingdom's biggest ever computer crime investigation, leading to 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned and 140 children removed from suspected dangerous situations and an estimated 33 suicides. Operation Ore identified and prosecuted some sex offenders, but the validity of the police procedures was later questioned, as errors in the investigations resulted in many false arrests.

<span class="mw-page-title-main">Internet fraud</span> Fraud or deception using the Internet

Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace. It is differentiated from theft since, in this case, the victim voluntarily and knowingly provides the information, money or property to the perpetrator. It is also distinguished by the way it involves temporally and spatially separated offenders.

Operation Auxin was an Australian Federal Police operation in September 2004, leading to the arrest of almost 200 people on charges of child pornography. These people were all accused of purchasing child pornography over the Internet, using their credit cards, from Belarusian crime syndicates; the credit card payments had been processed by a company named Landslide.com in Fort Lauderdale, Florida. Among the accused were people holding positions of trust in the community, such as police officers, members of the military, teachers, and ministers of religion. Several of the suspects committed suicide. It was the follow-up to the U.S. FBI operation Operation Avalanche. And has been associated with Operation FALCON.

Rape pornography is a subgenre of pornography involving the description or depiction of rape. Such pornography either involves simulated rape, wherein sexually consenting adults feign rape, or it involves actual rape. Victims of actual rape may be coerced to feign consent such that the pornography produced deceptively appears as simulated rape or non-rape pornography. The depiction of rape in non-pornographic media is not considered rape pornography. Simulated scenes of rape and other forms of sexual violence have appeared in mainstream cinema, including rape and revenge films, almost since its advent.

A paysite or pay site, in the adult entertainment industry, is a website that charges money to become a member and view its content, and often produces original adult content. They can be contrasted with "free-sites", which do not charge a membership fee. Most paysites offer "free tours" which allow non-members to view a limited number of short trailers. The vast majority of paysite memberships are bought by men. Some of the earliest paysites began by scanning images from pornographic magazines. The number of sites then grew until the market was saturated, and now many thousands of sites cater to every legal pornographic niche.

The Genesis Operation was an operation carried out by the Swiss Federal Office of Police (Fedpol), the judiciary of the canton of Zurich, and the Cantonal Police of the other cantons of Switzerland between September 2002 and May 2004 against the possession of illegal child pornography in the form of digital images based on a United States tip to Interpol with information about the use of credit cards.

<span class="mw-page-title-main">United States Postal Inspection Service</span> Federal law enforcement agency

The United States Postal Inspection Service (USPIS), or the Postal Inspectors, is the federal law enforcement arm of the United States Postal Service. It supports and protects the U.S. Postal Service, its employees, infrastructure, and customers by enforcing the laws that defend the United States' mail system from illegal or dangerous use. Its jurisdiction covers any crimes that may adversely affect or fraudulently use the U.S. Mail, the postal system, or postal employees. With roots going back to the late 18th century, the USPIS is the oldest continuously operating federal law enforcement agency.

Cobra Video is an American independent gay pornographic studio. The company has been the subject of scandals related to founder Bryan Kocis, who engaged in sex with a minor in one instance, and hired an underage actor to perform in another.

An age verification system, also known as an age gate, is any technical system that externally verifies a person's age. These systems are used primarily to restrict access to content classified, either voluntarily or by local laws, as being inappropriate for users under a specific age, such as alcohol, tobacco, gambling, video games with objectionable content, pornography, or to remain in compliance with online privacy laws that regulate the collection of personal information from minors, such as COPPA in the United States.

Operation Amethyst was a Garda Síochána (police) operation targeting child pornography in the Republic of Ireland. Involving simultaneous searches on May 27, 2002 of over 100 individuals suspected of downloading child pornography, it was one of the largest police operations in Ireland's history.

The Financial Coalition Against Child Pornography (FCACP) is a coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that are used to fund these illegal operations.

The Paedophile Unit is a branch of the Metropolitan Police Service's Child Abuse Investigation Command, based at Scotland Yard in London, England. It operates against the manufacture and distribution of child pornography, online child grooming, and "predatory paedophiles online", and organised crime associated with these.

<span class="mw-page-title-main">Internet pornography</span> Any pornography that is accessible over the Internet

Internet pornography is any pornography that is accessible over the Internet; primarily via websites, FTP connections, peer-to-peer file sharing, or Usenet newsgroups. The greater accessibility of the World Wide Web from the late 1990s led to an incremental growth of Internet pornography, the use of which among adolescents and adults has since become increasingly popular.

<i>United States v. Shynkarenko</i>

Maksym Shynkarenko, a citizen of Kharkiv, Ukraine, was indicted on September 16, 2008 by the grand jury for the United States District Court for the District of New Jersey on one count of conspiracy to transport and ship child pornography; sixteen counts of transportation and shipment of child pornography; one count of conspiracy to advertise child pornography; 12 counts of advertising child pornography; one count of engaging in a child exploitation enterprise; and one count of money laundering under the relevant 18 U.S.C. Sections: 2251, 2252A, 1956, and 2.

The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.

Project Spade, an international police investigation into child pornography, began in October 2010 in Toronto, Canada. The investigation started when Toronto Police Service officers made on-line contact with a man who was alleged to have been sharing pornographic videos via the Internet and by mail. The investigation eventually covered over 50 countries. 348 people were arrested internationally, and 386 children were said to have been rescued. The primary producers were Igor Rusanov and Andrey Ivanov in Crimea, Ukraine, Markus Roth in Romania, and Paul Kruger in Germany.

<span class="mw-page-title-main">Pornhub</span> Pornographic video-sharing website owned by Aylo

Pornhub is a Canadian-owned internet pornography video-sharing website, one of several owned by adult entertainment conglomerate Aylo. As of February 2024, Pornhub is the 13th-most-visited website in the world and the second-most-visited adult website, after XVideos.

<span class="mw-page-title-main">Carding (fraud)</span> Crime involving the trafficking of credit card data

Carding is a term of the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques. Modern carding sites have been described as full-service commercial entities.

<span class="mw-page-title-main">FBI MoneyPak Ransomware</span> Ransomware

The FBI MoneyPak Ransomware, also known as Reveton Ransomware, is a type of ransomware malware. It starts by purporting to be from a national police agency and that they have locked the computer or smart phone due to "illegal activities" and demands a ransom payment via GreenDot MoneyPak cards in order to release the device.

In 2003, the New Jersey District Attorney's Office launched an investigation into the activities of the belarusian firm Regpay Co. Ltd. The company created sites with child porn. The investigation was called Operation Falcon.

References

  1. "Operation Avalanche: Tracking child porn", BBC News, November 11, 2002. URL accessed on June 14, 2006.
  2. Jon Kelly & Tom de Castella (December 17, 2012). "Paedophile net: Did Operation Ore change British society?". BBC News.
  3. 1 2 "Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved December 27, 2009" (PDF). Archived from the original (PDF) on December 16, 2014.
  4. "Landslide: Profile of a Pornographer". CBS Fifth Estate. November 5, 2003. Retrieved January 16, 2010.
  5. Tresniowski, Alex (August 27, 2001). "Caught in the Web". People Magazine. Retrieved January 16, 2010.
  6. Duncan Campbell (April 19, 2007). "Operation Ore flawed by fraud". The Guardian . Retrieved April 23, 2007.
  7. Retrieved January 16, 2010
  8. "Press Release from Richard B. Roper Archived May 6, 2009, at the Wayback Machine " United States Department of Justice Northern District
  9. "Programs". ncjrs.gov.
  10. Alex Tresniowski "Caught in the Web", People, August 27, 2001 Vol. 56 No. 9
  11. Reedy, Thomas (January 16, 2010). "1,335 Year Federal Prison Sentence for What!?". PC Pro Magazine. Archived from the original on January 17, 2010. Retrieved June 8, 2015.
  12. Ridder, Knight (August 8, 2001). "Child pornographer gets a life sentence". spokesmanreview.com. Retrieved January 16, 2010.
  13. Yagielowicz, Stephen (August 10, 2001). "Child Pornography: An Unsolvable Problem?" . Retrieved January 16, 2010.
  14. Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved January 7, 2010. Archived December 16, 2014, at the Wayback Machine
  15. Leppard, David (July 3, 2005). "Child porn suspects set to be cleared in evidence 'shambles'" . Retrieved January 7, 2010.
  16. "BBC NEWS - UK - England - London - Expert sentenced for court claims". April 10, 2008.
  17. Fae, Jane (September 17, 2008). "Paedo case expert Jim Bates arrested on child porn charge". The Register .
  18. Lord Justice Richards and Mr Justice Owen (May 8, 2009). "Bates & Anor v Chief Constable of the Avon and Somerset Police & Anor".
  19. "The Times & The Sunday Times".
  20. 1 2 3 4 5 Jon Kelly & Tom de Castella (December 17, 2012). "Paedophile net: Did Operation Ore change British society?". BBC News.

Further reading