Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Crime Canada Data Storage The Internet

Police Could Charge Data Center Operators In the Largest Child Porn Bust Ever 199

sarahnaomi sends this report from Motherboard: Canadian police say they've uncovered a massive online file sharing network for exploitative material that could involve up to 7,500 users in nearly 100 countries worldwide. But unlike past investigations into the distribution of child porn, which typically involve targeting suspects individually, police have instead seized over 1.2 petabytes of data ... from a data center responsible for storing the material, and may even attempt to lay criminal charges against its operators, too.

"What we are alleging is occurring is that there are individuals and organizations that are profiting from the storage and the exchange of child sexual exploitation material," Scott Tod, Deputy Commissioner of the Ontario Provincial Police (OPP), told Motherboard at a conference late last month, after speaking to a crowd of defense specialists. "They store it and they provide a secure website that you can log into, much like people do with illegal online gaming sites."
This discussion has been archived. No new comments can be posted.

Police Could Charge Data Center Operators In the Largest Child Porn Bust Ever

Comments Filter:
  • 1.2 what? (Score:5, Funny)

    by Anonymous Coward on Monday March 02, 2015 @08:14PM (#49168481)

    1.2 pedobytes.

    • by hawguy ( 1600213 ) on Monday March 02, 2015 @08:23PM (#49168539)

      1.2 pedobytes.

      According to the article, they seized more than 4 times more child porn than the Library of Congress has.

      But unlike past investigations into the distribution of child porn, which typically involve targeting suspects individually, police have instead seized over 1.2 petabytes of data—more than four times the amount of data in the US Library of Congress

      I'm kind of surprised that all congress could only manage to accumulate 300TB of child porn.

      • Re: (Score:2, Funny)

        by Anonymous Coward

        Budget cutbacks.

        • And then there is the one guy in the basement, whose job it is to decide "is this child porn good enough for Congress" and then upload it to a server for Congressmen to access...

        • by fyngyrz ( 762201 )

          Budget cutbacks.

          In careful consideration of this, and in light of the seriousness of the problem, I have determined that the appropriate reaction is to seize Canada. I'm pretty sure that congress will determine the commerce clause covers it, anyway. I'm writing my crook^w legislator this evening.

      • That reminds me of Jimmy Carr's most Offensive jokes:

        * https://www.youtube.com/watch?... [youtube.com]

        * https://www.youtube.com/watch?... [youtube.com]

      • by Nidi62 ( 1525137 )

        1.2 pedobytes.

        According to the article, they seized more than 4 times more child porn than the Library of Congress has.

        Depending on how much child porn the Library of Congress has, that might not be that much.

      • Re:1.2 what? (Score:5, Insightful)

        by Shoten ( 260439 ) on Tuesday March 03, 2015 @07:55AM (#49170535)

        1.2 pedobytes.

        According to the article, they seized more than 4 times more child porn than the Library of Congress has.

        But unlike past investigations into the distribution of child porn, which typically involve targeting suspects individually, police have instead seized over 1.2 petabytes of data—more than four times the amount of data in the US Library of Congress

        I'm kind of surprised that all congress could only manage to accumulate 300TB of child porn.

        Actually, they seized 1.2 petabytes of data, not child porn.

        The situation is that this is a data center. So that means SANs and virtual hosts. SANs mean that you don't just have a 1-to-1 relationship between a hard drive (or even a hard drive array) and a computer. And virtual hosting means you don't have a 1-to-1 relationship between a server and a website. So I'd bet my paycheck that they went in with a broad net, grabbing every SAN that they thought contained child porn. In essence, they grabbed the whole data center so that they can figure out just how much of it...and which of it...is actual evidence.

    • They probable siezed the entire contents of the datacenter, just to be sure they got everything offending. Might mean a few thousand customers will be inconvenienced, but it's the only way to be sure.

      • by jafiwam ( 310805 )

        They probable siezed the entire contents of the datacenter, just to be sure they got everything offending. Might mean a few thousand customers will be inconvenienced, but it's the only way to be sure.

        The only thing this is "sure" to do is absolutely kill the formerly thriving data center / cloud computing business in Canada.

        With that much data, they barely have the justice / investigation capability in the ENTIRE COUNTRY to sort through it all, and it demonstrates without a doubt the capaiblity that they DO have is technically ignorant to the point of not being able to read labels and cross reference it with customer records.

        The result will be more, but more distributed hosting of such things there

  • by Anonymous Coward

    Charge Intel for making CPU's!
    Charge Microsoft for making computer software!
    Charge Alexander Graham Bell for inventing the telephone!

  • by oic0 ( 1864384 ) on Monday March 02, 2015 @08:19PM (#49168519)
    So they are guilty for providing secure online storage. Apparently you aren't allowed to supply secure storage, you have to snoop through your users content to make sure its not illegal... Also land lords much search all apartments, banks must search safety deposit boxes, storage rental owners must search their units.
    • Just because I know it's going to happen: Everybody, please keep in mind - Canadian police means it's Canada and not US Law that matters.

      But I had the same thought as you. Sure, 1.2 petabytes is a huge amount of data, but at ~$200/terabyte, that's 'only' $200k worth of data, and easily reachable by many commercial businesses that are 'data intensive'.

      Should a car rental place be liable if one of their customers is using their cars to run drugs? What if they're one of their bigger customers? How about th

      • by rtb61 ( 674572 )

        You are a little off track in you car analogy. The space in not just rented it is managed and redistributed to more akin to a taxi service. So if taxi drivers where driving around picking up and distributing illegal materials, are they guilty, hmm, good bloody question and one that most certainly 'NEEDS' to be investigation. Once the investigation is complete, they can then decide whether or not prosecution is appropriate and then of course guilt or innocence can be decide in court. The data hosting and ex

        • You are a little off track in you car analogy. The space in not just rented it is managed and redistributed to more akin to a taxi service.

          I stand by 'rental car' as opposed to 'taxi' because of the level of hands-on personal interaction required of the data, IE 'none'.

          I agree though, they need to go after the producers. Though at this point I can't help but think that many of them have probably already been punished, or are even dead.

      • by s.petry ( 762400 ) on Monday March 02, 2015 @10:55PM (#49169169)

        For posterity, nowhere does the article claim that the 1.2 Petabytes is all child pornography. The company claims that most of the data is not, but I guess that is a secondary issue. Holding the company responsible is idiotic unless they were complicit in the crime. Did they refuse to take action that the courts claimed they needed to with the data? Try to hide the data when cops came looking? I don't see any of those things, so IMHO this is a scare tactic attempting to get people to do what GP stated: "have companies snoop through all user data" which is asinine.

        I'm of the personal opinion that people involved in child porn should be jailed for life without parole if they are found guilty. The rule of law can not be tossed out the window because of my emotion on the topic. That is called chaos or anarchy, and we are supposed to be civilized.

        • by AmiMoJo ( 196126 ) *

          They are just leaning on them to try and scare other companies into being less respecting of privacy or building systems that don't allow them to police their own systems.

    • don't for get google for linking to sites as well.

      why not also go after EACH ISP as well.

      • might as well take it to the next logical step.

        its on the internet....

        you are on the internet.....

        therefore you are guilty for possessing illegal materials!
    • Were they aware of the contents?

    • by blueg3 ( 192743 )

      In my limited experience seeing these cases go by, no.

      It's usually hard to convict these child porn cases unless you can demonstrate that the perpetrator action's were knowing and willful. Yes, some of the laws aren't like that and are strict liability, which sucks. Yes, some unwise prosecutors indict on absolutely ridiculous cases, and that sucks. But in general, if you're going to actually get a conviction in court, you really need to be able to demonstrate that the guy did it knowingly and willfully.

      Even

      • "If you find CP images in a browser cache, then you've got to demonstrate that they got there by willful action and not by mistake."

        This is not correct. Real actionable CP cannot be reached by accident.

        I know of a situation where there was a complete web snapshot taken of a large East Coast (US) major name university. It turns out there were a lot of links to porn and other disreputable (drugs, gambling) web addresses. This was not because the school was a nest of porn watching drug taking gamblers, but d

        • by blueg3 ( 192743 )

          There's more to the Internet than the Web. There is certainly CP that can be accessed accidentally. It's true that it doesn't really happen all that often. (It mostly happens with people on P2P file-sharing systems who execute vague searches for porn and then mass-download everything.) But it doesn't matter -- the defense can and does make a legitimate case that it *could* be accidental unless you demonstrate intent to a reasonable degree.

        • by itzly ( 3699663 )

          After researching the legal issues, it was determined that nothing you could find on the easily accessible internet included CP

          That depends on your definition of CP. Does a naked kid on the beach or in the bathtub count ?

          • by dbIII ( 701233 )
            In some places even a cartoon of an imaginary person counts as child porn and people have been jailed for such images.
            Personally I think that's going too far and we should be worrying about crimes committed against children instead of being thought police. Go after child molesters first - there's been more effort going after Kim Dotcom by playing the child porn hosting card than going after a convicted child rapist like Polanski.
        • I've spent a lot of time on the shady side of the internet. I've yet to find any real CP. The closest I've seen are artistic depictions - though I note that in many jurisdictions including the UK where I live, possessing even an pornographic artistic depiction of a character that resembles a minor is illegal.

      • Julie Amero did almost did time due to pop up pron, the school being late in paying for the web filtering software, and the a sub being told do not trun off the system.

      • by cdrudge ( 68377 )

        Even then, if your evidence of intent is too deeply technical, you conviction is at risk, because a jury absolutely hates any deep technical discussions (they are not, in general, technically-minded people).

        I'm not sure a persons want to risk their freedom if they were to ever to be accused of something and was relying on technical details as a defense. I think for the average jury all the prosecution would have to do is say "We found this horrible image of a child on their computer" and instantly they are

        • by blueg3 ( 192743 )

          Oh, no. You do not want your defense to rest on technical details. Rather, a common tactic (admittedly, among people who are guilty) is for the defense to claim that it was an accident or malware and demand that the prosecution show intent. The defense can then hammer on the prosecution's expert witness (forensic investigator) and back them in to a corner where they're having to explain technical details. This makes the jury unhappy with the prosecution.

          Displaying the images you found in court works pretty

    • So they are guilty for providing secure online storage. Apparently you aren't allowed to supply secure storage, you have to snoop through your users content to make sure its not illegal... Also land lords much search all apartments, banks must search safety deposit boxes, storage rental owners must search their units.

      If they provided secure online storage, they shouldn't be guilty. If they were providing secure online storage to people whom they knew or should have known were hosting porn of underage people, they should suffer a significant legal penalty. If they were providing secure online storage to people whom they knew or should have known were hosting child porn of preteens then they should be burned at the stake.

      There is such a thing as willful blindness. The sheer quantity of data involved is going to make it

      • by Anonymous Coward on Monday March 02, 2015 @11:12PM (#49169217)

        This is a file sharing site, it almost certainly is 1.2 petabytes of regular porn, movies and music. But its encrypted so they don't know.

        How do you force decryption? You play the "think of the children" card.

        So they threaten the file host to get them to install some sort of webbugs and remove the decryption. Presumably they're threatening lots of the file hosts in a similar fashion.. "remove the encryption or well find one pedo file on there and claim its all pedo and bust you with screams of 'military grade hardware' and 1.2 TB drives.. blah blah blah.

        What this means is that a file host refused to comply with their mass surveillance demands and so they're playing their pedo panic card. Perhaps the terrorist card will be played after that.

        And people like you will do your marketing (and it is clearly marketing) for this. You even talk like one " If they were providing secure online storage to people whom they knew or should have known". Right.

        • If it's a file-sharing site, there's always the possibility the child porn was just an excuse - the real reason being that you can't bust the doors down so easily for copyright infringement. If pressure was applied politically to get the company closed down, a search to find something illegal follows. That would explain the huge volume of siezed data: Police grabbing every server in the building in order to force the datacenter to cease operations and drive them out of business.

        • What this means is that a file host refused to comply with their mass surveillance demands and so they're playing their pedo panic card. Perhaps the terrorist card will be played after that.

          And people like you will do your marketing (and it is clearly marketing) for this. You even talk like one " If they were providing secure online storage to people whom they knew or should have known". Right.

          They reported a hosted site where you sign on to exchange child porn. If accurate, that's a good thing for them to go after.

          Obviously if it's done with ulterior motives, like in response to a failure to comply with the NSL equivalent up there, it is a bad thing.

          As to how I talk, you have to talk that way if you want to establish the boundaries of someone's liability, civil or criminal. You need to have the possibility to prosecute someone who deliberately looks the other way while crime is happening, or e

          • by pla ( 258480 )
            They reported a hosted site where you sign on to exchange child porn. If accurate, that's a good thing for them to go after.

            "Hosted" still doesn't mean "knew it existed". It just means that it happened to live on their servers.

            For a rare non-car analogy, my GMail account "hosts" thousands of attachments I've received over the years, many encrypted (I don't send personal info through any third party in cleartext). Anyone who "knows the password" can get in and view them. Some of them, I've even share
      • by Damouze ( 766305 )

        The system of plea bargaining is a perversion of justice and should be gotten rid of as soon as possible.

    • by Altrag ( 195300 )

      So far no, you're not required to snoop through user's content, even in Canada.

      But presumably since they were making money off of this, some or all of this content was being distributed. My guess is that the cops found themselves a way into the distribution chain and traced it back to a source large enough to warrant giving themselves a public pat on the back. You know, like an investigation is supposed to work.

      I bet Vic Toews is crying that this didn't happen 3 years ago. His warrantless wiretapping bil

    • At least in the US, the government has gone after people unwittingly hosting illegal data many times before.
  • No privacy! Every file upload must be monitored and scrutinized and reported to the authorities! This is how we will defeat terror and keep the children safe!
  • by Scott Jermaine Guyton ( 3639423 ) on Monday March 02, 2015 @08:26PM (#49168555)
    “There's no proactive obligation to investigate what happens on your service," said Tamir Israel, a staff lawyer at the Canadian Internet Policy & Public Interest Clinic (CIPPIC). “If you do become aware that something is there, there's a reporting obligation. But usually data centers aren't actively looking through their stuff, so it's reasonable to say that they wouldn't have come across that." Nobody's got time for that!
  • 1.2 PETABYTES??? (Score:4, Interesting)

    by Anonymous Coward on Monday March 02, 2015 @08:40PM (#49168623)

    Something isnt adding up. That's the kind of volume I would expect for an aspiring XHampster and a much wider legit audience, petabytes of child porn just doesn't seem possible. That's what, a couple of hundred gigabytes for each of the accused? Potentially hundreds of thousands of hours of video? Who the hell could have produced that much????

    This sounds like BS to force datacentres to give backdoors to the feds.

    • by SumDog ( 466607 )

      If you read the article, they cops have custom password hacking software. It's more likely they just seized everything. There's probably 1TB, of actual child porn. But they got a warrant so they can go through the rest of the data...illegally...just to be sure.

    • by gweihir ( 88907 ) on Monday March 02, 2015 @09:11PM (#49168789)

      Same here. If we assume 1GB/h, that would be 1.2 million hours of film, i.e. 140 years. That is a bit much to be credible. Seems to me some people are trying to abuse the victims even more in order to get more funding and more surveillance laws.

  • SummaryBait (Score:4, Informative)

    by michaelmalak ( 91262 ) <michael@michaelmalak.com> on Monday March 02, 2015 @08:43PM (#49168649) Homepage

    charges will likely hinge on the degree to which employees knew such activity was taking place

    • Whoa, whoa, whoa. Let's not let facts get in the way of Internet outrage.

    • Yes, but it's interesting it's even being talked about. Normally, when a crime is committed, you don't also immediately consider indicting the owner of the facility it happened in...unless there's specific evidence they're involved that isn't being made public.

      If this is the garden variety case where there's no reason to think the data center operators are involved, then of course this is massive overreach.

    • Riiiight! I also have oceanfront property in Alberta I want to sell you.

      I about guarantee mass arrests of the employees of the data center and 1 to 3 years unjust imprisonment for all of them until the day before the trial with maybe a few going to trial or have half of the employees get time served in plea deals, sentencing them all to have a felony record and to work for low wage jobs the rest of their miserable lives just because, well, just because.

      I hope to God that I am wrong on this!!! PLEASE
  • by LostMyBeaver ( 1226054 ) on Monday March 02, 2015 @09:23PM (#49168843)
    I hate articles like this.

    They say "To access the files, many of which are password protected, the cops developed password-cracking software in-house that is slowly sifting through the mountain of information."

    Uh... I'll translate this to, the files are all protected with easy to remember, dictionary based passwords and they wrote a script which uses a rainbow list to try each one which is why it's so damn slow.

    When you read shit statements made by whoever provided the interview to whoever actually performed it and realize they're both clueless, it becomes really hard to take the rest of the article seriously. It's like when you read a CV from a fry boy at McDonalds who writes "Food preparation technician", you just can't expect everything else to be embellished in order to sound more important.

    Another example of "STUPID!!!" is :
    "The volume of information is so expansive that in order to store and analyze the data safely and securely, police had to purchase storage hardware similar to what was used by Canadian military forces in Afghanistan."

    Computer crimes forensics has to be handled very carefully. If you alter the data, it's inadmissible in most courts as it's tampering with evidence. The FBI paid millions to write data handling procedures following the public beating they took on the gloves in the OJ case. So, it's important to have a backup and some way to read the data without altering it... or they need to keep a copy.

    A 1.2 petabyte SAN can be done in 16U for analysis using 6TB drives and Cisco 3160 servers. For unaltered storage, there are tape drives. They're slow and they're inefficient, but they're an accepted medium for evidence.

    So, making dumb ass statements like "we needed 1.2TB of hard drives and a workstation" as making some idiotic remark like how they've gone war zone grade was just LAME!

    Nailing the data center is a great idea EXCEPT!!! they probably run almost all that crap through Tor and use BitCoin now. So, if there is actually any real traceable information to be had, they just passed up their best opportunity to planting a proper honeypot and actually busting the people using the site. They could have put "dating sites" like "find an anonymous live show in your area" and the pervs who are using telephones can provide their locations via GPS. Then they can track and bust them.

    Instead, they've just done what the police have found so successful with the Pirate Bay and the site will be moved somewhere else next week or month and they won't have a clue what to do about it.

    Let's be honest, these fool cops probably just secured the safety of the pedophiles for a while longer.
    • by complete loony ( 663508 ) <(moc.liamg) (ta) (namekaL.ymereJ)> on Monday March 02, 2015 @11:30PM (#49169273)

      To access the files, many of which are password protected, the cops developed password-cracking software in-house that is slowly sifting through the mountain of information.

      So the real take away is that they have no idea how much of this 1.2 PB is actually child porn. What they have is a file sharing / web hosting service with 1.2 PB of data, provided by users, some of which they know is child porn.

    • "Developed password-cracking software in-house"

      Brilliant. Have some amateur develop it, instead of using an established product written by an expert. Great idea.

      Reminds me of the time (no joke) a Secret Service agent asked me to get data off of a PC that had been used for a credit-card scam. At the time I was (iirc) a college freshman or maybe sophomore, majoring in EE, who happened to program as a hobby. At the time I felt pretty flattered - only in retrospect did I realize how crazy this was. I had full,

    • No, these cops want to scare the sh*t out of data center employees because they can. They don't care that they probably cannot convict a single person, the process of arrest and the prospect of months of imprisonment without any evidence, and withholding necessary medical care, is enough for people to make a plea deal.

      When the police want to make your life hell they can arrest you every other week, trumping up charges and dropping them within hours, and seize your property until you can't pay your lawye
  • Is there a second source for this? I can't find anything outside of the linked article. E.g. In Google I can't find anything about OPP child porn busts since Sept 2014; I can't find anything about this on the OPP home page; nor in the last month or so on EFF blog (EFF provided a quote for the article).

    • Sept 2014

      Yeah, that's probably it. Sounds like about the right amount of time before it would be reported on Slashdot.

  • Great... (Score:4, Interesting)

    by Mashiki ( 184564 ) <mashiki.gmail@com> on Monday March 02, 2015 @10:10PM (#49168991) Homepage

    These are the same fucking retards that can't even properly secure evidence when Wynns government decided to violate the data protection laws and deleted not only primary, but backup data when there was a standing warrant regarding to the massive scandal relating to the gas plants. You'll have to excuse me if I don't have any faith in the information provided at all. Hell, their general force is in 80/90's era computer technology.

    What's gonna get good is that they pulled a blanket seizure with a warrant that was for specific data. That's a no-no guys, the judge stated one thing you stupid idjits did something else. I'm going to hazard it'll get to court and the entire thing will be thrown out because they overstepped the bounds of the original seizure warrant.

  • Child Gender (Score:2, Interesting)

    I've always wondered... when one thinks of child porn they imagine ugly, balding guys taking advantage of little girls. Do these people ever make stuff like older women taking advantage of younger boys? You'd think there would be some interest in that sort of thing among those kinds of people.

    For the record I have no interesting in "researching" this and landing in jail for it, hence the question.

    • 2 teachers accused of sex crimes in San Clemente beach trip with students [mynewsla.com]

      Two former Covina-Valley Unified School District teachers previously charged with misdemeanors for allegedly supplying booze to underage students on a San Clemente camping trip were charged Monday with felony sex offenses.

      Melody Suzanne Lippert, 38, of Covina, is accused of playing “matchmaker” for co-defendant Michelle Louise Ghirelli, 30, of West Covina, who is charged with having sex with a 17-year-old boy, according

      • Pretty sure 17 years old doesn't count as "child", so that doesn't answer my question. Ah well... one of those mysteries I'll never solve I suppose.

        • It does for legal purposes in many jurisdictions.

          Sex and age laws get complicated. Here in the UK, for example, it's legal to have sex at sixteen - but illegal to supply pornography to someone of sixteen. They are only allowed to look at the real thing. And if they record their perfectly-legal sex, that's production of child pornography.

        • I can answer your question: yes, they do. You don't have to look for illegal content, you can:

          1. Look for "fantasy stories" published by "child lovers". You'll find plenty that involve female adults with male or female children, indicating a - for lack of a better term - demand for that market.
          2. Google "woman charged for creating child porn". You'll find at least a few cases of women who molested young children (preteens) and distributed the resulting material.

          You can also look up cases like Karla Ho

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (1) Gee, I wish we hadn't backed down on 'noalias'.

Working...