Playpen was the world's most notorious darknet child pornography website after its creation in August 2014.[1][2] When it was shut down in February 2015, the site had over 215,000 users and hosted 23,000 sexually explicit images and videos of children as young as toddlers.[1][3]

The shutdown operation, called Operation Pacifier, involved the FBI hijacking the site and continuing to serve content for two weeks. During this time the FBI used a malware-based "Network Investigative Technique" to hack into the web browsers of users accessing the site, thereby revealing their identities. The operation led to the arrest of 900 site users.

While the FBI claimed to have knowledge about the existence of the website right from its beginning, it was unable to track down the servers locations or the site owner. The reason for their struggle was the fact that Playpen was hosted as a Hidden service via Tor. Only a mishap of the site owner revealing his IP address finally allowed the law enforcement to track down both page and personnel.[1]

The investigation led to the following sentences in May 2017: Steven Chase, a 57-year-old from Florida who created the website: 30 years in prison. His two co-defendants pleaded guilty and were sentenced to 20 years each earlier in 2017 for their involvement in Playpen.[2]

The investigation was criticized by the Electronic Frontier Foundation because, after having taken control of the website, the FBI continued for nearly two weeks to operate the website and thus distribute child pornography, i.e. exactly the same crime the bureau sought to stop.[4] The lawyer of a defendant in the case stated that the FBI not only operated the website, but improved it so its number of visitors rose sharply while it was under their control.[5] Nevertheless, there are other voices, like Steven Wilson, Head of the European Cybercrime Centre, who defend the actions taken as they would represent a modern response to a modern problem.[1]

In 2017, charges were dropped against one member of the site, after the court demanded that details of the hacking tool be released. The FBI preferred to keep the NIT (network investigative technique) malware a secret for future investigations.[6][7][8]

Challenges were raised about the FBI's possibly severe misuse of the initial search warrant, leading to the likely dismissal of much of the gathered evidence against one defendant.[9][10]


External links