[tor-talk] dutch police crawling hidden servers

Rejo Zenger rejo at zenger.nl
Tue Aug 5 14:31:35 UTC 2014


Hi,

http://www.wired.com/2014/08/operation_torpedo/

  "Operation Torpedo began with an investigation in the Netherlands in
  August 2011. Agents at the National High Tech Crime Unit of the
  Netherlands’ national police force had decided to crack down on online
  child porn, according to an FBI affidavit. To that end, they wrote a web
  crawler that scoured the Dark Net, collecting all the Tor onion
  addresses it could find.

  The NHTCU agents systematically visited each of the sites and made a
  list of those dedicated to child pornography. Then, armed with a search
  warrant from the Court of Rotterdam, the agents set out to determine
  where the sites were located.

  That, in theory, is a daunting task—Tor hidden services mask their
  locations behind layers of routing. But when the agents got to a site
  called “Pedoboard,” they discovered that the owner had foolishly left
  the administrative account open with no password. They logged in and
  began poking around, eventually finding the server’s real Internet IP
  address in Bellevue, Nebraska."

The operation is in known in the Netherlands by the name of Descartes.
The name "Torpedo" was their internal nickname for the operation. The
case was a followup to the Robert M.-case, one of the largest child
abuse-cases in the Netherlands.

-- 
Rejo Zenger
E rejo at zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl  
T @rejozenger | J rejo at zenger.nl
OpenPGP   1FBF 7B37 6537 68B1 2532  A4CB 0994 0946 21DB EFD4
XMPP OTR  271A 9186 AFBC 8124 18CF  4BE2 E000 E708 F811 5ACF
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 931 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140805/b3ff3e0c/attachment.sig>


More information about the tor-talk mailing list