Feeds

Operation Ore was based on flawed evidence from the start

Cops raised concerns ahead of national meeting in 2003

SANS - Survey on application security programs

Exclusive Britain’s biggest ever computer crime investigation, Operation Ore, was flawed by a catalogue of “discrepancies, errors and uncertainties”, disclosed reports of two national police conferences seen by The Register reveal.

The police memoranda show that within months of the operation launching in April 2002, detectives who forensically examined computers taken from suspects' homes in dawn raids found files showing that the main evidence used in Operation Ore was wrong. The evidence, it was claimed, showed that over 7,000 British-based subscribers had purchased access to child pornography websites.

At a national police conference held in a Pimlico hotel in February 2003, local police forces warned that claims made by the National Crime Squad (NCS), in control of the operation, had gone "pear-shaped".

According to a former detective inspector and computer forensic specialist who led an Operation Ore team in the north of England, police forces throughout the UK had been "assured from the outset" that it was not possible to subscribe to websites run by a Texas web gateway company, Landslide Inc, without clicking on and agreeing to a "Click Here Child Porn" banner on the "the home page of Landslide.com".

The NCS, he said in a report of the February meeting, were adamant that "it was not possible to enter any websites through the Landslide gateway without going through this procedure and making deliberate choices".

But after examining seized computers and looking at browser history records, two UK police forces told the meeting that the files found showed that "it was possible to ... pay for material ... without making any choices at all and without any warnings that paedophile material was available."

The forensic specialist added: "This has thrown the whole issue of incitement charges into question... I am of the opinion that in those cases where no images have been found ... there is insufficient evidence to proceed ... The NCS and CPS [Crown Prosecution Service] are looking at these issues as a matter of urgency and will be sending out advice in due course," he reported.

At a second meeting in Birmingham in March 2003, NCS retracted two claims it had made about child porn websites. The former DI alerted senior officers and colleagues that "this has serious implications ... [It] is yet another weakness in the NCS investigation which has only just come to light, with obvious consequences. I have serious doubts about the quality and integrity of the evidence supplied by the NCS and will be raising these concerns in the relevant quarter."

Former Merseyside police officer Peter Johnston said he was also concerned about claims in Operation Ore. "I ... asked ... can we have the evidence, can we see the credit card details, can we see the statements ... from the people who recovered this?”

Johnson's requests were turned down, he told ITN in a broadcast interview. He was told "it wasn’t relevant ... we have 7,500 people here ... they must be guilty, let's get out there and get them locked up".

No investigations took place. No advice was sent to police forces about the flaws in the "Click Here Child Porn" claim. Although the real front page of the Landslide website was included in an obscure part of the evidence bundle, it was described as a "front screen" while the fake front page was highlighted and described as the "front page". This sleight of hand meant that the false "front page" was always referred to at the start of court cases, thus purporting to prove that subscribers could only subscribe to Landslide sites for illegal purposes.

CEOP (Child Exploitation and Online Protection), a quasi policy agency, took over Operation Ore in 2006. The Home Office has announced that CEOP will be disbanded later this year.

The former director of CEOP who presided over Operation Ore, James Gamble, retired in October 2010 after disputes with Home Secretary Teresa May, which continue.

Operation Ore police raids continued until 2008. It was not until 2010 that CEOP computer expert Dr Nick Sharples testified in an appeal case that subscribers to Landslide websites could not have seen the "Click Here Child Porn" banner and that it was not part of the Landslide website.

CEOP has refused to comment on his evidence, claiming to The Register that a transcript "should be available" on the internet. It isn't. CEOP said: "We will not be making any further comments on this operation or its various investigations unless required to do so by a court of law or a law enforcement organisation."

The CPS told The Register that it could not provide any record that the mistake had been investigated or corrected.

3 Big data security analytics techniques

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.