Wired's Kim Zetter explains:ĭuring chats DeFoggi described using Tor to access PedoBook early in the morning hours and between 4 and 6 pm. Having set up such a trap, FBI agents got to know DeFoggi better. Such a deployment "can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates," explained Wired in an earlier piece on Operation Torpedo. The techniques used include "drive-by downloads," in which a website installs malware on every visitor's computer. The FBI used "various investigative techniques… to defeat the anonymous browsing technology afforded by the Tor network." Then they kept it up and running for several more weeks, gathering private communications from DeFoggi and other users. The FBI seized McGrath's site in late 2012 after monitoring him for a year. DeFoggi used names such as "fuckchrist" and "PTasseater" to register on the sites, where he could view more than 100 videos and more than 17,000 child porn images. The websites were only accessible to users who installed Tor on their browsers. One site frequented by DeFoggi was PedoBook, hosted by Aaron McGrath-a Nebraska man who was convicted earlier for his role in the operations. The former acting cybersecurity director for the US Department of Health and Human Services, Tim DeFoggi, was convicted yesterday on three child porn charges.Īs reported by Wired, DeFoggi is the sixth suspect to be caught by the FBI's Operation Torpedo, which used controversial methods of defeating the Tor anonymizing software in order to find child porn suspects.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |