The Cincinnati FBI has announced that they've nabbed one of the ringleaders in a dark web child porn site, who's apparently assisted in a worldwide child porn ring amongst pedophiles, as part of “Operation Pacifier”.
49-year-old Robert Phelps, of Shelby County, was one of three defendants in Southern Ohio on trial involving the takedown of a major child porn distribution dark website, according to Benjamin C. Glassman, United States Attorney for the Southern District of Ohio.
The<a href="https://www.justice.gov/usao-sdoh/pr/shelby-county-man-sentenced-possessing-child-pornography"> FBI released a statement </a>through the Justice Department a few days ago, in which they described some of the case involving Phelps; who in my expert opinion has become an informant for the Federal Bureau of Investigation against the rest of the site Admins.
According to court documents, in this case, federal agents in July seized one computer that contained more than 6,300 images and 590 videos of prepubescent children being molested by adults during a search of Phelps’ Jackson Center home.
Another individual hard drive contained an additional 255,000 images and 120 videos in a disturbing stockpile of a pedophile’s fantasy realm of child pornography.
Stop and think about this for a moment. We're talking about well over 260,000 images and videos of underage children being sexually assaulted.
Benjamin C. Glassman, United States Attorney for the Southern District of Ohio, Angela L. Byers, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division, and other members of the FBI’s Child Exploitation Task Force announced the sentence handed down by U.S. District Judge Walter H. Rice; in which Phelps has now been sentenced to a federal prison for only 36 months, which is absolutely outrageous for the amount of child pornography he had on hand.
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Shelby County Man Sentenced for Possessing Child Pornography: Robert Phelps was sentenced to 36 months in prison … <a href="https://t.co/v9lDrNBtdB">https://t.co/v9lDrNBtdB</a></p>— FBI Cincinnati (@FBICincinnati) <a href="https://twitter.com/FBICincinnati/status/944417350492684288?ref_src=twsrc%5Etfw">December 23, 2017</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
It would be a safe assumption to assume he's turned state's evidence against the site in which he was previously affiliated when you combine the fact that the FBI has not yet announced the name of this dark web operation.
<a href="https://en.m.wikipedia.org/wiki/Operation_Pacifier">Operation Pacifier </a>has been ongoing for several years now, since at least 2015.
Earlier this summer<a href="http://www.thegoldwater.com/news/4140-HAPPENING-AGAIN-Massive-Pedophile-Ring-Of-900-Arrested-Media-Silent"> The Goldwater reported </a>at least 900 arrests in a major series of undercover stings and raids since the investigation began in 2015, that the media has been absolutely silent about.
The FBI says as a part of this particular investigation, at least 350 U.S.-based individuals have been arrested, 25 producers of child pornography have been prosecuted, 51 alleged hands-on abusers have been prosecuted and 55 American children who were subjected to sexual abuse have been successfully identified or rescued.
The FBI actually hacked into computers that were located inside Russia, Iran, and China; all of which started when the<a href="http://www.independent.co.uk/news/world/europe/europol-fbi-joint-investigation-operation-pacifier-uncovers-global-paedophilia-ring-870-arrests-a7722821.html"> FBI targeted the dark website </a>known as “Playpen”.
The playpen was part of the dark web, a small collection of sites that use special software called Tor to mask the physical location of their servers.
Visitors to these sites also use Tor to conceal where they’re connecting from, meaning that law enforcement couldn’t simply identify who was using the illegal site.
So, when a foreign law-enforcement agency found Playpen’s administrators were running the site from the United States of America, the FBI seized Playpen’s server.
Instead of shutting the site down straight away, however, the FBI moved it to a government facility and kept Playpen operational for 13 days. During this time, the Bureau deployed what it describes as a network investigative technique (NIT), which is a computer exploit and the piece of malware, to break into Playpen users’ computers and grab identifying information; most importantly, their IP address.
Armed with this, the FBI could subpoena internet service providers to reveal who had accessed Playpen.
It’s a digital equivalent of an FBI squad picking the lock of a private residence, collecting evidence, and taking it back to headquarters.
In all, the FBI hacked over 8,000 computers in 120 countries, including across South America, Europe, and in the U.S. too.
The operation led to hundreds of arrests, as well as the identification and rescue of hundreds of victims of child abuse, according to the FBI’s own figures.
However, something the FBI has kept quiet and has not previously been reported, is the Bureau also hacked computers in countries that have a particularly volatile relationship with the U.S, especially around issues of malicious hacking, “including Russia, Iran, and China,” according to a<a href="https://www.documentcloud.org/documents/4176585-Opening-Brief-in-Tippens.html#document/p28/a386743"> recently filed court record</a>.
<img src="https://media.8ch.net/file_store/7188aabeeab775b3df401fa9ed457482d709ff95fbcd63294efb6d07b61fe6a9.jpg" style="max-height:640px;max-width:360px;">
What is abundantly clear at this point, is that “Pedogate” is a one-hundred percent reality, not just in America, but spanning the entire globe.
<strong><span style="color:red;">Tips? Info? Send me a message!</span></strong>
<i>Follow Me On Twitter:</i>