The FBI hacks have drawn repeated – though so far unsuccessful – legal challenges, largely centered on the search warrants agents obtained before agents cracked the computer network.īut they have also prompted a backlash of a different kind. “It’s not like they’re blasting it out to the world.” “These are places where people know exactly what they’re getting when they arrive,” said James Marsh, who represents some of the children depicted in some of the most widely-circulated images. Lawyers for child pornography victims expressed surprise that the FBI would agree to such tactics – in part because agents had rejected them in the past – but nonetheless said they approved. Some of the images described in court filings involved children barely old enough for kindergarten.
PIMPANDHOST VLAD MODELS PICS DOWNLOAD
At the time, the site had more than 215,000 registered users and included links to more than 23,000 sexually explicit images and videos of children, including more than 9,000 files that users could download directly from the FBI. The Justice Department acknowledged in court filings that the FBI operated the site, known as Playpen, from Feb.
PIMPANDHOST VLAD MODELS PICS SOFTWARE
In each case, the FBI infected the sites with software that punctured that security, allowing agents to identify hundreds of users. The operation - whose details remain largely secret - was at least the third time in recent years that FBI agents took control of a child pornography site but left it online in an attempt to catch users who officials said would otherwise remain hidden behind an encrypted and anonymous computer network. If convicted, Prine faces 10 years to life in prison.WASHINGTON - For nearly two weeks last year, the FBI operated what it described as one of the Internet’s largest child pornography websites, allowing users to download thousands of illicit images and videos from a government site in the Washington suburbs. The children were about that old, the detective replied. “That,” referred to, in Prine’s words “sexual interaction between family members.”ĭid the mom like to participate (in the incest and child rape) or just watch? “I enjoy both,” the detective replied, before asking Morton for his age preferences. “Are you into that?” Prine had written to the detective earlier. Earlier, Prine had explained in explicit detail exactly what he hoped to get out of the encounter: This case presents a world of smoke and mirrors.”Ī world of smoke and mirrors that nevertheless resolves into a pretty damning scene: Police busted Prine, carrying a pizza box, as he approached the supposed 32-year-old mother’s apartment on Nov. “It is not just officers who pose,” he told the court. Prine’s lawyer is taking the “Internet as fantasyland” defense, claiming his client was simply role-playing. hristmas”ĭetective James Morton, who posted the ad, was using the capital letters as a simple code: In pedophile circles, PTHC stands for “pre-teen hardcore.” The ad was an invitation, and Prine took Morton up on his offer. “P.hamily fun serious replies only bama won yes T.erday and kansas state lost don’t forget to H. The flurry of emails began with this message posted to the “Casual Encounters” section of Craigslist: Jurors heard opening statements yesterday in the case of Alan Preston Prine, 60, arrested last November after exchanging more than 200 emails with an undercover officer posing as a 32-year-old housewife offering up her two pre-teen kids for sex. A recent undercover sting in Mobile, Ala., provides a window into the secret world of coded language pedophiles use online.