1 min read

FBI hacking methods used to bring down Playpen questioned by US judge

Luana PASCU

October 25, 2016

FBI hacking methods used to bring down Playpen questioned by US judge

A US judge ordered the FBI to disclose if it received approval from the White House to bring down child pornography site Playpen, following three defendants” complaints regarding the legitimacy of the network investigative technique (NIT) used by the Bureau.

The FBI described Playpen, created in 2014 on the dark web, as “the largest remaining known child pornography hidden service in the world” whose goal was “the advertisement and distribution of child pornography.” In one year from its release, the site had 215,000 members and approximately 11,000 weekly unique visitors interested in extreme child abuse, as stated by the FBI.

The FBI hacked it as part of an extensive investigation that went after over 1,000 IPs of members who exchanged sex abuse material. Playpen was very well hidden on Tor, a network that keeps user identity and location anonymous, so the FBI hacked the servers to infect thousands of computers with malware.

When the FBI got hold of the servers in 2015, they were not immediately taken down. The site was kept fully operational for 12 days from FBI servers in Virginia so users could keep exchanging material and be identified by IP address, once access was gained to their computers. Some 1,500 cases have been registered, with arrests in Connecticut, Massachusetts, Illinois, New York, New Jersey, Florida, Utah and Wisconsin.

The criminal procedure is under debate, as some judges say the warrant was unconstitutional. In contrast, a judge involved in a Playpen case in Virginia ruled “the Government’s acquisition of the IP address did not represent a prohibited Fourth Amendment search.”

tags


Author



Right now

Top posts

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read
Mobile security threats: reality or myth?

Mobile security threats: reality or myth?

June 13, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands Fraud Family cybercrime ring under the spotlight as arrests made in the Netherlands
Graham CLULEY

July 23, 2021

3 min read
Homoglyph domains used in BEC scams shut down by Microsoft Homoglyph domains used in BEC scams shut down by Microsoft
Graham CLULEY

July 22, 2021

3 min read
China Sets Up New Worrying Vulnerability Disclosure Rules China Sets Up New Worrying Vulnerability Disclosure Rules
Silviu STAHIE

July 20, 2021

1 min read