It was only able to catch the slowest, dumbest of the bunch.Īmong them: One 22-year old from Ashford, Alabama, who promised to produce images of his yet unborn daughter while she was still in her mother's womb. That means the FBI didn't break Tor's anonymity. If visitors used an outdated version of Tor - and didn't set their computers to block Flash - that Flash app was able to establish a direct connection and reveal their IP address. Agents added Flash software to the hijacked porn site, exploiting the fact that Flash is notoriously vulnerable to hacking. The exact method used by the FBI is detailed in other court records. the actual location and identity of those users." In unsealed court documents from 2012, FBI Agent Jeffrey Tarpinian describes this hack as "the only available investigative technique with a reasonable likelihood of securing the evidence necessary to prove. Every time a website visitor clicked on an image of a naked child, their computer also downloaded extra data that reported back to the FBI the computer's true IP address and type of operating system. The FBI was granted a search warrant for a "network investigative technique," allowing agents to slip computer code into photos on the child porn website. Tor hides their location by bouncing Internet traffic signals around the globe. The site was on the Dark Web, which means people could only access the website by using the Tor browser. But they still couldn't identify the website's visitors. That gave agents administrative access to the website. But investigators were somehow "able to determine the password and unlock the computer," court records say. McGrath quickly closed the laptop - immediately locking the data inside with encryption. In late 2012, federal agents burst into his home and caught McGrath signed in as the administrator of PedoBook, a social media site where people shared photos of child pornography.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |