Feeds

Operation Ore: evidence of massive credit card fraud

Innocent until accused of paedophilia

The Power of One Brief: Top reasons to choose HP BladeSystem

There are few subjects as emotive as child pornography, and few accusations that can so quickly and permanently tar a reputation. Merely to be accused of a child pornography offence is to be convicted in the public consciousness.

But now it seems that Operation Ore, which saw some 7,272 British residents targeted on suspicion of buying child porn online, might have been based on rather shakier evidence than the police would like to admit.

In The Guardian today, investigative reporter Duncan Campbell says the evidence on which thousands of cases rest is unreliable.

Operation Ore began when US investigators handed a list of more than 7,000 names to British police. Each of the names appeared on a credit card transaction list, detailing card information processed by a portal site called Landslide.com.

Texas-based Landslide was not a pornography site in and of itself. Instead, it processed transactions for others, taking a 35 per cent slice of the sign up fee for its trouble.

That is not to say it was a blameless cash handler. Some of the sites that Landslide provided services to did indeed sell child pornography, and the owner of the company, Thomas Reedy, is currently serving a massive 180 year sentence (reduced from over 1,000 years) for his crimes.

But many of the sites it worked for were run-of-the-mill porn sites, filled with nothing more offensive than images of adult, consensual sex.

Campbell says that in many cases the only evidence brought was the list of credit card details. Now, he says, there is evidence that show massive levels of fraud on the list: many of the details were stolen, many more were used to sign up to perfectly legal sites.

He writes: "Late in 2006, copies of six hard drives seized from Landslide were flown to Britain to be examined by defence computer experts (including myself). They showed that Landslide had been plagued by a range of credit card fraud rackets, known in the industry as Card Not Present (CNP) frauds."

More than half the money taken by Landslide was paid to a trio of credit card fraudsters based in Indonesia. Working under the pseudonym Miranda, this group supplied child pornography over the internet. But Campbell says his new evidence, which was never disclosed by the prosecution, shows the men were also in the business of credit card fraud.

He says the UK police did not allow for the possibility of fraud in their investigations. While prosecution witnesses have testified that there was no evidence of fraud found, one forensic examiner admitted to Campbell that fraud was not specifically looked for, either.

But the levels of fraud were so high that by 1999 they actually sank Landslide. "If someone used a stolen card, Landslide had to bear the loss if there was a chargeback from the card issuer - often for the original amount and a penalty fee," Campbell explains.

There is further evidence that many of those on the list were not in fact buying child porn. Jim Bates, another forensic expert, tells Campbell the Landslide log of web activity clearly shows that many of the alleged porn purchasers never went to the sites to collect their pictures. He adds that many of the so-called porn sites were actually fake, constructed purely for the purposes of perpetrating a fraud.

In the UK, hundreds of men who say they were falsely accused on the basis of the evidence from Landslide have begun collecting names in the hope of launching a class action style lawsuit against the police.

The site these men use to communicate with one another, Inquisition21, has been delisted by Google, but the search giant has never explained why.

Many of those accused (at least 39, although some say the real figure my be much higher) have taken their own lives.

The implication of Campbell's new evidence is clear: thousands of people may have been falsely accused of the one of the most horrible crimes imaginable. Some may have even died as a result. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.