Operation Nest Egg

Last updated
Operation Nest Egg
Operation NameOperation Nest Egg
TypeChild pornography crackdown
Roster
Planned byUnited States
Executed byUnited States
# of Countries Participated1
Mission
TargetWebsite: thecachebbs.com
Timeline
Date executed2008
Results
Accounting

Operation Nest Egg was an international law enforcement initiative aimed at dismantling an online network dedicated to the distribution and trade of child pornography. Launched in February 2008, the operation was a collaborative effort involving multiple law enforcement agencies, including the U.S. Department of Justice, the U.S. Postal Inspection Service (USPIS), and U.S. Immigration and Customs Enforcement (ICE). [1]

The primary focus of the investigation was the bulletin board style website thecachebbs.com which at its peak had around 1,000 members. [2] As of February 2008, postal inspectors had already seized the main servers from Caro.net, a web host based in North Carolina. This caused periodic downtime which prompted the site admins to move the hosting to Atomic Colo in Minnesota. A backup server that was utilized during the periods of downtime was hosted by Future Hosting in Dallas, TX. [1]

Operation Nest Egg was a spinoff investigation developed from leads related to another international investigation, "Operation Joint Hammer," which targeted transnational rings of child pornography trafficking. Operation Delego was a subsequent spinoff investigation from leads developed through "Operation Nest Egg," the prosecution of another online group dedicated to sharing and disseminating child pornography. [3] Operation Joint Hammer was spawned by Operation Koala which led to 40 arrests in Britain, 21 in France, 11 in Spain, eight in Sweden, five in Belgium, four in Italy, two in Iceland and one in Denmark. [4]

Trial of Roger Loughry

A decision was made to go after the leadership of The Cache on conspiracy charges instead of prosecuting each member individually. This meant that the administrators could be consolidated into one criminal case handled by prosecutor Steven DeBrota. This also meant that evidence and discovery were limited to activities directly related to The Cache instead of material from the defendants homes, which in some cases was worse. [2]

Despite this, DeBrota brought a postal inspector to the stand who testified about the material seized from Roger Loughry's house which contained videos of men having sex with underage girls. Since they did not come from The Cache, however, they were not part of the conspiracy charges against Loughry. DeBrota insisted on showing the videos to the jury. Loughry and his team objected as the material was outside the scope of the case and could be used to sway the jurors' emotions. DeBrota insisted that the material needed to be presented to demonstrate that Loughry misunderstood the definition of child pornography, as Loughry had previously argued that the material on The Cache did not constitute child pornography as it was almost exclusively still image of genitalia. The judge ruled in favor of the prosecutor. [1]

After his sentencing, Loughry got a new lawyer and appealed his conviction on the basis that the videos had prejudiced the jury. On October 11 2011, the appeals court of Chicago ruled that the videos had indeed been "highly inflammatory and had only minimal probative value. These errors were not harmless." The entire case was overturned and Loughry was granted a new trial. [5] In 2013 Loughry was again found guilty on all all 16 charges. He was sentenced to 30 years in prison as well as lifetime supervised release. [6]

Related Research Articles

Operation Ore was a British police operation that commenced in 1999 following information received from US law enforcement, which was intended to prosecute thousands of users of a website reportedly featuring child pornography. It was the United Kingdom's biggest ever computer crime investigation, leading to 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned and 140 children removed from suspected dangerous situations and an estimated 33 suicides. Operation Ore identified and prosecuted some sex offenders, but the validity of the police procedures was later questioned, as errors in the investigations resulted in many false arrests.

Operation Avalanche was a major United States investigation of child pornography on the Internet launched in 1999 after the arrest and conviction of Thomas and Janice Reedy, who operated an Internet pornography business called Landslide Productions in Fort Worth, Texas. It was made public in early August 2001, at the end of Operation Avalanche, that 100 arrests were made out of 144 suspects. It was followed by Operation Ore in the United Kingdom, Operation Snowball in Canada, Operation Pecunia in Germany, Operation Amethyst in Ireland, and Operation Genesis in Switzerland.

Definitions and restrictions on pornography vary across jurisdictions. The production, distribution, and possession of pornographic films, photographs, and similar material are activities that are legal in many but not all countries, providing that any specific people featured in the material have consented to being included and are above a certain age. Various other restrictions often apply as well. The minimum age requirement for performers is most typically 18 years.

The 2004 Ukrainian child pornography raids occurred a few months before the First Orange Revolution, when police in Ukraine raided a softcore child pornography ring operating in the cities of Kyiv, Kharkiv, and Simferopol. The ring had operated since 2001 and used a modeling agency as a front.

Child erotica is non-pornographic material relating to children that is used by any individuals for sexual purposes. It is a broader term than child pornography, incorporating material that may cause sexual arousal such as nonsexual images, books or magazines on children or pedophilia, toys, diaries, or clothes. Law enforcement investigators have found that child erotica is often collected by pedophiles and child sexual abuse offenders. It may be collected as a form of compulsive behavior and as a substitute for illegal underage pornography and is often a form of evidence for criminal behavior.

<span class="mw-page-title-main">IRS Criminal Investigation</span> Criminal Investigation division of the IRS

Internal Revenue Service, Criminal Investigation (IRS-CI) is the United States federal law enforcement agency responsible for investigating potential criminal violations of the U.S. Internal Revenue Code and related financial crimes, such as money laundering, currency transaction violations, tax-related identity theft fraud and terrorist financing that adversely affect tax administration. While other federal agencies also have investigative jurisdiction for money laundering and some Bank Secrecy Act violations, IRS-CI is the only federal agency that can investigate potential criminal violations of the Internal Revenue Code, in a manner intended to foster confidence in the tax system and deter violations of tax law. Criminal Investigation is a division of the Internal Revenue Service, which in turn is a bureau within the United States Department of the Treasury.

<i>In re Boucher</i>

In re Boucher, is a federal criminal case in Vermont, which was the first to directly address the question of whether investigators can compel a suspect to reveal their encryption passphrase or password, despite the U.S. Constitution's Fifth Amendment protection against self-incrimination. A magistrate judge held that producing the passphrase would constitute self-incrimination. In its submission on appeal to the District Court, the Government stated that it does not seek the password for the encrypted hard drive, but only sought to force Boucher to produce the contents of his encrypted hard drive in an unencrypted format by opening the drive before the grand jury. A District Court judge agreed with the government, holding that, given Boucher's initial cooperation in showing some of the content of his computer to border agents, producing the complete contents would not constitute self-incrimination.

The United Blood Nation, also known as the East Coast Bloods, is a street and prison gang active primarily in the New York metropolitan area. It is the east coast faction of the California-based Bloods street gang. Their main source of income is the trafficking and sale of illegal drugs.

<span class="mw-page-title-main">Child pornography laws in the United States</span>

In the United States, child pornography is illegal under federal law and in all states and is punishable by up to life imprisonment and fines of up to $250,000. U.S. laws regarding child pornography are virtually always enforced and amongst the sternest in the world. The Supreme Court of the United States has found child pornography to be outside the protections of the First Amendment to the United States Constitution. Federal sentencing guidelines on child pornography differentiate between production, distribution, and purchasing/receiving, and also include variations in severity based on the age of the child involved in the materials, with significant increases in penalties when the offense involves a prepubescent child or a child under the age of 18. U.S. law distinguishes between pornographic images of an actual minor, realistic images that are not of an actual minor, and non-realistic images such as drawings. The latter two categories are legally protected unless found to be obscene, whereas the first does not require a finding of obscenity.

Operation Delego was a major international child pornography investigation, launched in 2009, which dismantled an international pedophile ring that operated an invitation-only Internet site named Dreamboard which featured incentives for images of the violent sexual abuse of young children under twelve, including infants. Only 72 charges were filed against the approximately 600 members of Dreamboard due to the extensive encryption involved. Members were required to upload new material at least every 50 days to maintain their access and remain in good standing.

<span class="mw-page-title-main">Federal Correctional Institution, Elkton</span> Low-security United States prison in Ohio

The Federal Correctional Institution, Elkton is a low-security United States federal prison for male inmates near Elkton, Ohio. It is operated by the Federal Bureau of Prisons, a division of the United States Department of Justice. It also has an adjacent satellite prison camp that houses low and minimum-security male inmates.

<span class="mw-page-title-main">Federal Correctional Institution, Petersburg</span> U.S. prison in Prince George County, Virginia

The Federal Correctional Institution, Petersburg is a United States federal prison for low- and medium-security male inmates. It is part of the Petersburg Federal Correctional Complex (FCC) in Virginia and operated by the Federal Bureau of Prisons, a division of the United States Department of Justice. An adjacent satellite prison camp houses minimum-security male offenders. FCI Petersburg consists of two facilities:

<i>United States v. Shynkarenko</i>

Maksym Shynkarenko, a citizen of Kharkiv, Ukraine, was indicted on September 16, 2008 by the grand jury for the United States District Court for the District of New Jersey on one count of conspiracy to transport and ship child pornography; sixteen counts of transportation and shipment of child pornography; one count of conspiracy to advertise child pornography; 12 counts of advertising child pornography; one count of engaging in a child exploitation enterprise; and one count of money laundering under the relevant 18 U.S.C. Sections: 2251, 2252A, 1956, and 2.

<span class="mw-page-title-main">Freedom Hosting</span> Defunct Tor web hosting service

Freedom Hosting was a Tor specialist web hosting service that was established in 2008. At its height in August 2013, it was the largest Tor web host.

Project Spade was an international police investigation into child pornography, began in October 2010 in Toronto, Canada. The investigation started when Toronto Police Service officers made on-line contact with a man who was alleged to have been sharing pornographic videos via the Internet and by mail. The investigation eventually covered over 50 countries. 348 people were arrested internationally, and 386 children were said to have been rescued. The primary producers were Igor Rusanov and Andrey Ivanov in Crimea, Ukraine, Markus Roth in Romania, and Paul Kruger in Germany.

Operation Torpedo was a 2011 operation in which the Federal Bureau of Investigation (FBI) compromised three different hidden services hosting child pornography, which would then target anyone who happened to access them using a network investigative technique (NIT).

Playpen was a darknet child pornography website that operated from August 2014 to March 2015. The website operated through the Tor network which allowed users to use the website anonymously. After running the website for 6 months, the website owner Steven W. Chase was captured by the FBI. After his capture, the FBI continued to run the website for another 13 days as part of Operation Pacifier.

<span class="mw-page-title-main">Joshua Schulte</span> Former CIA employee and criminal (born 1988)

Joshua Adam Schulte is a former Central Intelligence Agency (CIA) employee who was convicted of leaking classified documents to WikiLeaks. WikiLeaks published the documents as Vault 7, which The New York Times called "the largest loss of classified documents in the agency's history and a huge embarrassment for C.I.A. officials." After his conviction, the Department of Justice called it "one of the most brazen and damaging acts of espionage in American history."

Boystown was a child pornography website run through the Tor network as an onion service. It launched in June 2019 and was shut down by authorities in April 2021. Four German administrators of the site confessed and were sentenced to long prison sentences in December 2022.

<span class="mw-page-title-main">Welcome to Video case</span> Investigation and prosecution of child sexual exploitation ring

The Welcome to Video case involved the investigation and prosecution of a child pornography ring which traded videos through the South Korean website Welcome to Video, owned and operated by Son Jung-woo. Authorities estimated about 360,000 downloads had been made through the website, which had roughly 1.2 million members, 4,000 of which were paid members, from 38 countries. Through international cooperation and investigations, 337 people were arrested on charges of possessing child pornography.

References

  1. 1 2 3 Anderson, Nate (2013-08-19). The Internet Police: How Crime Went Online, and the Cops Followed. W. W. Norton & Company. ISBN   978-0-393-24054-2.
  2. 1 2 Anderson, Nate (2013-08-19). "Taking down "the largest child pornography conspiracy ever prosecuted"". Ars Technica. Retrieved 2024-07-08.
  3. "Law enforcement officials announce charges against individuals on 5 continents involved in child exploitation network | ICE". www.ice.gov. 2023-02-14. Retrieved 2024-07-08.
  4. "Crushed: child sex ring". The Sydney Morning Herald. 2007-11-06. Retrieved 2024-07-08.
  5. "Maryland Man Sentenced For Role In Child Porn Ring - CBS Baltimore". www.cbsnews.com. 2013-02-01. Retrieved 2024-07-08.
  6. "Office of Public Affairs | Maryland Man Found Guilty After Trial and Sentenced to 30 Years in Prison in International Child Pornography Conspiracy Case | United States Department of Justice". www.justice.gov. 2013-02-01. Retrieved 2024-07-08.