Operation Avalanche (child pornography investigation)

For other events called Operation Avalanche, see Operation Avalanche (disambiguation).

Operation Avalanche was a major United States investigation of child pornography on the Internet launched in 1999 after the arrest and conviction of Thomas and Janice Reedy, who operated an Internet pornography business called Landslide Productions in Fort Worth, Texas.[1] It was made public in early August 2001 at the end of Operation Avalanche, that 100 arrests were made out of 144 suspects. It was followed by Operation Ore in the United Kingdom, Operation Snowball in Canada, Operation Pecunia in Germany, Operation Amethyst in Ireland and Operation Genesis in Switzerland.[2]

Although US prosecutions were made on the basis of other evidence, later reconstruction of the Landslide site and review of the computer hard drives in the UK identified flaws in the police forensic procedures used and contradicted evidence on the website given at the Reedys' trial. Specifically, investigation of the Landslide data indicated many names listed were victims of credit card fraud, and that there was no link on the Landslide front page to take the user to child pornography sites as stated in sworn trial testimony.[3]

Landslide Productions, Inc.

Thomas Reedy was a self-taught computer programmer and entrepreneur living in the Fort Worth, Texas, area. He trained and worked as a nurse but, understanding the financial possibilities of the Internet, he set up an adult pornography website that provided a comfortable income. He soon developed a better strategy to provide middleman services for the adult pornography industry. In 1997 he set up Landslide Productions, Inc., which he ran with his wife Janice, who handled bookkeeping for the company. Landslide quickly became an adult pornography empire stretching across three continents, with some 300,000 subscribers in 60 countries. Within two years the company made $10 million and provided the owners a luxurious lifestyle.[4]

Landslide provided payment systems for adult webmasters from different countries. The systems were automated; webmasters could sign up to the system online, and users accessing the websites would go through the payment or login system before being granted access. The principal systems were AVS for Adult Verification System and Keyz because it operated via the keyz.com domain name owned by Landslide.[5]

The AVS system was meant to legally protect the companies from laws against disseminating pornography to minors, as the credit card was used to verify that the user attempting to access a particular website was of legal age to view the website's content. Users could sign up with their credit cards to access affiliated sites, which received 65% of the sign-up fee, while Landslide took the remainder and handled the transactions with the credit card companies.[6]

In 1998 Thomas Reedy recognized systematic fraud in streams of different credit cards being signed up in batches from the same internet address to the same website. In the use of stolen card information, Landslide had to bear the loss if there was a chargeback from the card issuer, often including a penalty fee; also, the credit card industry imposed a 1% maximum for chargebacks. To preserve his business, Reedy traced the source of the traffic and set up a new web service called Badcard.com to capture card numbers coming from the same internet address, and drew up lists of addresses and card numbers that appeared to be suspiciously used. However, his efforts failed to stop the fraudulent charges.[3]

Landslide went out of business in August 1999, as the fraudulent charges passed the 1% ceiling, leading to Superior Credit withdrawing its merchant services on August 10. Without this merchant account Landslide could not charge credit cards and could no longer fulfill the primary function of the business. Reportedly, the biggest source of fraud at that time was coming through websites run by US law enforcement as part of a sting operation.[7]

Landslide Investigation

In April 1999 in Texas the United States Postal Inspection Service received an internal complaint through postal inspector Robert Adams. Adams had received a tip from Ronnie Miller, an acquaintance in Saint Paul, Minnesota, who provided information about a website advertising child pornography. The image in question was being sourced from a website in Indonesia, which presented the question as to whether the USPIS could legally investigate and prosecute it.

In early 1999 the United States Postal Inspection Service engaged the Dallas Police Department to further investigate whether the image from Indonesia could be prosecuted.[8] As a part of a nationwide initiative funded by the Office of Justice Program’s Office of Juvenile Justice and Delinquency Prevention (OJJDP), The United States Department of Justice had announced a grant from the Internet Crimes Against Children Taskforce Program to the Dallas Police Department on January 10, 1998. The purpose of the ICAC was to investigate and prosecute Internet crimes against children.[9]

The court transcriptions from the case against Landslide Productions revealed that the Dallas Police Department had formed a relationship with Microsoft Corporation after the software maker had encouraged its technical employees to volunteer their time to better the community in which they lived. After having confirmed that prosecution would be difficult because the image in question was indeed being sourced from Indonesia, the Dallas Police Department asked its local Microsoft volunteers to assist in investigating the image. Using Web Buddy, a computer program designed to display Internet traffic on geographic maps, the volunteers helped the Dallas police verify that internet traffic related to Ronnie Miller's complaint was passing through the routers of Ft. Worth-based Landslide Productions.

An adult classified section of the Landslide website allegedly included postings offering to trade Landslide-owned Keyz passwords, and illegal child pornography sites were found to be using the Keyz payment system. The U.S. Postal Inspection Service (USPIS) and Dallas police presented their findings to Terri Moore, an Assistant District Attorney in the Dallas/Fort Worth area, and received warrants to search the Landslide business offices and the Reedy home. In August 1999 45 to 50 law enforcement officials from a number of agencies conducted a raid on the Landslide business offices in Fort Worth.

The raid of the Reedys' Fort Worth residence resulted in confiscation of a home computer, on which computer expert Dane Heiskel uncovered business emails confirming his knowledge of customers using Reedy's payment system to access child pornography. Sexually explicit images of children were also found on this computer.[10]

Police seized the assets and records of Landslide and arrested Thomas and Janice Reedy. Prosecutors offered Thomas a 20-year prison term and Janice a five-year term if they would plead guilty, but the Reedys refused the plea deal, believing they could not be held legally responsible for the content of third-party websites. Reedy maintained that he had attempted to run a legitimate business, writing software to reduce fraud, reporting illegal sites to the FBI and cooperating with the ensuing investigations. According to Reedy, he was told by Special Agent Frank Super to leave the sites in his index for later investigation.[11]

In January 2000 Thomas Reedy was convicted of trafficking in child pornography through testimony from witnesses including Sharon Girling, a UK police officer at SOCA/NCS). Based on a prior police investigation in the UK, Girling identified victims in the pictures from a website that used the Landslide payment system. Thomas Reedy was sentenced to 1,335 years in prison, a sentence that was reduced to 180 years on appeal.

Operation Avalanche

The Reedy case led to the creation of a nationwide network of 30 federally funded task forces to fight Internet crimes against children.[12] In August 2001, Attorney General John Ashcroft and Chief Postal Inspector Kenneth Weaver announced the launch of Operation Avalanche, an operation to gather evidence against users of the Landslide gateway and payment system. The seized database records included 35,000 US subscribers, some of whom were targeted with invitations to purchase child pornography by mail. The Chicago Tribune reported that the government also continued to run the Reedys' Landslide website for a time as part of the sting. As a result of Operation Avalanche, 100 suspects were arrested following 144 searches in 37 states.[13]

The FBI then passed identities from the database to the police organizations of other countries, including 7,272 names to the UK and 2,329 names to Canada. Initial results of the operation seemed positive, as the gateway site and payment system were closed down and thousands of possible users of child pornography websites were identified for later investigation.

Controversies

Police conducting Operation Ore in the UK targeted all names for investigation due to the difference in laws in between the US and the UK, which allowed for arrest on a charge of incitement to distribute child pornography based solely on the presence of a name in the database, regardless if the card was used--fraudulently or not--for child pornography or other legal adult sites. Law in the UK allows conviction on the basis of incitement to distribute indecent images; as such, the mere presence on the database, regardless of the legality of the sites paid for, was sufficient to warrant prosecution. In all, 3,744 people were investigated and arrested and 1,451 of those convicted. However, a subsequent challenge by those targeted led to an independent reconstruction of the Landslide site and a closer inspection of the database and the payment transactions.

In 2005 and 2007 UK investigative journalist Duncan Campbell wrote a series of articles criticizing police forensic procedures and trial evidence. After obtaining copies of the Landslide hard drives, Campbell publicly identified evidence of massive credit card fraud, including thousands of charges where there was no access to any porn site at all. Campbell stated, "Independent computer expert Jim Bates of Computer Investigations said 'the scale of the fraud, especially hacking, just leapt off the screen'."[14]

Campbell's articles also indicated that sworn statements provided by Dallas detective Steve Nelson and US postal inspector Michael Mead were false. They testified that entry to the Landslide site was through a front-page screen featuring a button saying “Click Here (for) Child Porn”. However, the later investigation established that the button was never on the website’s front page. Instead, it was on an advertising banner for another website buried deep in the Landslide offerings.[15]

After Campbell's articles appeared, independent computer expert Jim Bates of Computer Investigations was charged and convicted of four counts of making false statements and one count of perjury regarding his qualifications[16] and barred from appearing as an expert witness. He was later arrested for possession of indecent images during his Operation Ore investigation.[17] However, the search of Bates' home was later ruled unlawful.[18][19]

See also

References

  1. "Operation Avalanche: Tracking child porn", BBC News, November 11, 2002. URL accessed on June 14, 2006.
  2. Jon Kelly & Tom de Castella (December 17, 2012). "Paedophile net: Did Operation Ore change British society?". BBC News.
  3. 1 2 http://ore-exposed.obu-investigators.com/PC%20Pro%20article%20June%202007%20.pdf Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved December 27, 2009.
  4. "Landslide: Profile of a Pornographer," CBS Fifth Estate, November 5, 2003. Retrieved January 16, 2010. http://www.cbc.ca/fifth/landslide/profile.html
  5. Tresniowski, Alex. "Caught in the Web," People Magazine, August 27, 2001. Retrieved January 16, 2010. http://www.people.com/people/archive/article/0,,20135192,00.html
  6. Duncan Campbell (April 19, 2007). "Operation Ore flawed by fraud". The Guardian. Retrieved April 23, 2007.
  7. Retrieved January 16, 2010. http://www.iamthewitness.com/Operation.Ore.Truth.Out.htm
  8. "Press Release from Richard B. Roper" United States Department of Justice Northern District
  9. "Programs". ncjrs.gov.
  10. Alex Tresniowski "Caught in the Web", People, August 27, 2001 Vol. 56 No. 9
  11. Reedy, Thomas (16 January 2010). "1,335 Year Federal Prison Sentence for What!?". PC Pro Magazine. Archived from the original on January 17, 2010. Retrieved 8 June 2015.
  12. Ridder, Knight. "Child pornographer gets a life sentence," SpokesmanReview, August 8, 2001. Retrieved January 16, 2010. http://www.spokesmanreview.com/news-story.asp?date=080801&ID=s1003651
  13. Yagielowicz, Stephen. "Child Pornography: An Unsolvable Problem?" August 10, 2001. Retrieved January 16, 2010. http://www.xbiz.com/articles/1405
  14. http://ore-exposed.obu-investigators.com/PC%20Pro%20article%20June%202007%20.pdf Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved January 7, 2010.
  15. Leppard, David. http://www.timesonline.co.uk/tol/news/uk/article539974.ece Child porn suspects set to be cleared in evidence ‘shambles’. July 3, 2005. Retrieved January 7, 2010.
  16. http://news.bbc.co.uk/1/hi/england/london/7340997.stm Expert sentenced for court claims. Retrieved December 30, 2009.
  17. http://www.theregister.co.uk/2008/09/17/ore_bates_arrest/ Paedo case expert Jim Bates arrested on child porn charge. Retrieved December 30, 2009.
  18. Bates & Anor v Chief Constable of the Avon and Somerset Police & Anor [2009] EWHC 942 (Admin) (May 8, 2009) http://www.bailii.org/ew/cases/EWHC/Admin/2009/942.html
  19. O'Neill, Sean. "Police chief Colin Port risks career by refusing to return child abuse data," The Times, May 27, 2009. Retrieved on January 16, 2010. http://business.timesonline.co.uk/tol/business/law/article6368314.ece

External links

Further reading

This article is issued from Wikipedia - version of the 9/1/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.