Operation Ore

Operation Ore was a British police operation that commenced in 1999 following information received from US law enforcement, which was intended to prosecute thousands of users of a website reportedly featuring child pornography. It was the United Kingdom's biggest ever computer crime investigation,[1] leading to 7,250 suspects identified, 4,283 homes searched, 3,744 arrests, 1,848 charged, 1,451 convictions, 493 cautioned and 140 children removed from suspected dangerous situations[2] and an estimated 33[3] suicides.[4][5] Operation Ore identified and prosecuted some sex offenders, but the validity of the police procedures was later questioned, as errors in the investigations resulted in a large number of false arrests.[3]

Operation Ore followed the similar crackdown in the United States, called Operation Avalanche; in the US 100 people were charged from the 35,000 US access records available.[6] In total 390,000 individuals in over 60 countries were found to have accessed material in the combined investigations.[7]

US investigation

Between 1999 and 2001, after a tip, a US investigation was conducted into Landslide Productions Inc., a Texas-based online pornography portal operated by Thomas and Janice Reedy. The portal was found to have provided access to child pornography and the Reedys were both convicted of trafficking child pornography in August 2001.

Following the investigation and conviction "Operation Avalanche" was launched, in the US, to trace and prosecute child pornography users identified in the Landslide database. In addition, the website was run for a short time as part of a sting operation by the FBI to capture new suspects.[8] The FBI also passed identities from the Landslide database to the police organizations of other countries, including 7,272 names to the UK.

Operation Ore

In May 2002, Operation Ore was implemented in the UK to investigate and prosecute the Landslide users whose names were provided by the FBI. In the UK standard operating procedure dictates that all alleged paedophiles must be arrested quickly and thoroughly due to the high risk they pose to children. Those under investigation were reported by Rebecca Smithers of The Guardian to include government ministers, MPs and judges.[9]

The charge of possession of child pornography was used where evidence was found, but the lesser charge of incitement was used in those cases where a user's details were on the Landslide database but no images were found on the suspect's computer or in their home. Because of the number of names on the FBI list, the scale of the investigation in the UK was overwhelming to the police, who appealed to the government for emergency funding for the case. Reportedly, several million pounds were spent in the investigations,[10] and complaints mounted that other investigations were put at risk because of the diversion of the resources of child protection units into the case.[11]

Information from the Operation Ore list of names was leaked to the press early in 2003. After obtaining the list, the Sunday Times stated that it included the names of a number of prominent individuals, some of which were later published by the press. The Sunday Times reported that the list included at least twenty senior executives, a senior teacher at a girl's public school, personnel from military bases, GPs, university academics and civil servants, a famous newspaper columnist, a song writer for a pop band, a member of a chart-topping 1980s cult pop group, and an official with the Church of England.[11] An investigation followed the leak, and police complained that the advance warning would allow suspected paedophiles to dispose of evidence. A police officer was reported to have lost his job for leaking the names.

Controversies

After 2003 Operation Ore came under closer scrutiny, with police forces in the UK being criticised for their handling of the operation. The most common criticism was that they failed to determine whether or not the owners of credit cards in Landslide's database actually accessed any sites containing child porn, unlike in the US where it was determined in advance whether or not credit card subscribers had purchased child porn. Investigative journalist Duncan Campbell exposed these flaws in a series of articles in 2005 and 2007.[12][13][14]

Many of the charges at the Landslide affiliated sites were made using stolen credit card information, and the police arrested the real owners of the credit cards, not the viewers. Thousands of credit card charges were made where there was no access to a site, or access only to a dummy site. When the police checked, seven years after Operation Ore commenced, they found 54,348 occurrences of stolen credit card information in the Landslide database. The British police failed to provide this information to the defendants, and in some cases implied that they had checked and found no evidence of credit card fraud when no such check had been done. Because of the nature of the charges, children were removed from homes immediately. In the two years it took the police to determine that thousands had been falsely accused, over 100 children had been removed from their homes and denied any unsupervised time with their fathers.[15] The arrests also led to an estimated 33 suicides by 2007.[3]

One man was charged when the sole "suspicious" image in his possession was of young-looking—but adult—actress Melissa-Ashley.[16] Also arrested were Massive Attack's Robert Del Naja (later cleared)[5] and The Who's guitarist Pete Townshend, who was cautioned by the police after acknowledging a credit card access to the Landslide website. Duncan Campbell later stated in PC Pro magazine that their credit card charges and IP addresses were traced through the Landslide site, and both were found to have accessed sites which had nothing to do with child pornography.[17] The actor and writer Chris Langham was among those convicted.[18]

Independent investigators later obtained both the database records and video of the Landslide raid. When this information was presented in a UK court, Michael Mead of the United States Postal Service contradicted his US testimony under oath regarding several details relating to the investigation. As a result of the errors exposed in the cases, some people arrested in Operation Ore filed a group action lawsuit in 2006 against the detectives behind Operation Ore, alleging false arrest.[19]

After Campbell's articles appeared, the independent computer expert Jim Bates who analysed the hard drives was charged and convicted of four counts of making false statements and one count of perjury regarding his qualifications[20] and barred from appearing as an expert witness. Bates's judgement has been called into question on other matters.[21] Bates was later arrested for possession of indecent images during his Operation Ore investigations.[22] The search of Bates home was ruled as unlawful, as the police had applied for the search warrant using the wrong section of PACE, and were unable to examine any of the material seized from his house.[23][24][25]

CEOP and its Chief Executive, Jim Gamble, were accused of using vague terms which do not have a recognised meaning within either child protection or law enforcement when they defended the operation.[26]

On 6 December 2010, senior Court of Appeal judges rejected the appeal of Anthony O'Shea, stating that they were "entirely confident that the appellant was rightly convicted".[27] The judgement states in relation to the appellant's assertions regarding the claim that his IP address had been disguised: "These suggestions are fanciful in the extreme. The appellant's theory (for it is no more than such) that he [Mr O’Shea] was the victim of the machinations of a fraudulent webmaster is, in our view, pure speculation."[28][29] Jim Bates, an expert witness and critic of Operation Ore, was criticised for misleading comments during the hearing. The appeal had been considered to be a landmark case where success could have led to many of the other convictions achieved as a result of Ore being overturned.[22]

See also

References

  1. http://www.telegraph.co.uk/technology/news/8422200/Police-face-750k-bill-for-false-Operation-Ore-charges.html Christopher Williams. "Police face £750k bill for false Operation Ore charges", Daily Telegraph, 2 April 2011. Retrieved on 16 May 2012
  2. Arthur, Charles (17 May 2007). "When will we know whether Operation Ore was a success?". The Guardian (London). Retrieved 20 May 2010.
  3. 1 2 3 "Operation Ore exposed". PC Pro.
  4. Laville, Sandra (2 July 2009). "Legal challenge to web child abuse inquiry". The Guardian (London). Retrieved 20 May 2010.
  5. 1 2 "Child Porn Suspects Set to be Cleared in Evidence Shambles", Sunday Times 3 July 2005. Retrieved 23 January 2007. Archived 8 October 2008 at the Wayback Machine
  6. "Operation Ore exposed", PC Pro magazine. Retrieved 19 June 2006.
  7. Jewkes & Andrews. Crime Online: Chapter 5, pp62 - "Internet Child Pornography; international responses". Willan Publishing, UK (also Portland, OR) 1st Ed (2007).
  8. Yagielowicz, Stephen. "Child Pornography: An Unsolvable Problem?" 10 August 2001. Retrieved 16 January 2010. http://www.xbiz.com/articles/1405
  9. Smithers, Rebecca (25 January 2003), "Staff at public school in child porn inquiry", The Guardian
  10. "Operation Avalanche: Tracking child porn", BBC News, 11 November 2002. Retrieved 14 June 2006.
  11. 1 2 Cullen, Drew. "Child Porn list leaked to Sunday Times," The Register, 27 January 2003. Retrieved 16 January 2010. http://www.theregister.co.uk/2003/01/27/child_porn_list_leaked/
  12. Duncan Campbell (19 April 2007). "Operation Ore flawed by fraud". London: The Guardian. Retrieved 23 April 2007.
  13. Campbell, Duncan (1 July 2005). "Operation Ore exposed". PCPro. Retrieved 23 April 2007.
  14. Campbell, Duncan (April 2007). "Sex, Lies and the Missing Videotape". PCPro. Retrieved 23 April 2007.
  15. "Operation Ore: evidence of massive credit card fraud". theregister.co.uk.
  16. Liam Clarke 'Child' porn star backs Army major The Sunday Times 29 May 2005
  17. http://ore-exposed.obu-investigators.com/PC%20Pro%20article%20June%202007%20.pdf Campbell, Duncan. "Sex, Lies and the Missing Videotape" PC Pro Magazine, June 2007. Retrieved 27 December 2009.
  18. http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/08/02/nlangham202.xml Sapsted, David. "Langham: Caught in Operation Ore's net", Daily Telegraph, 2 August 2007. Retrieved on 2 August 2007
  19. Howie, Michael (15 September 2006). "Accused in child porn inquiry to sue police". The Scotsman. Retrieved 23 April 2007.
  20. "BBC NEWS - UK - England - London - Expert sentenced for court claims". bbc.co.uk.
  21. Doward, Jamie (23 March 2008). "How police put their faith in the 'expert' witness who was a fraud". The Guardian (London).
  22. 1 2 http://www.theregister.co.uk/2008/09/17/ore_bates_arrest/ Paedo case expert Jim Bates arrested on child porn charge. Retrieved 30 December 2009.
  23. Police chief Colin Port forced to back down in hard drive stand-off http://www.timesonline.co.uk/tol/news/uk/crime/article6512468.ece
  24. Bates & Anor v Chief Constable of the Avon and Somerset Police & Anor [2009] EWHC 942 (Admin) (8 May 2009) http://www.bailii.org/ew/cases/EWHC/Admin/2009/942.html
  25. O'Neill, Sean. "Police chief Colin Port risks career by refusing to return child abuse data," The Times, 27 May 2009. Retrieved on 16 January 2010. http://business.timesonline.co.uk/tol/business/law/article6368314.ece - (dead link, please fix)
  26. Arthur, Charles (17 May 2007). "When will we know whether Operation Ore was a success?". The Guardian (London). Retrieved 20 May 2010.
  27. "Police welcome rejection of child porn conviction appeal". South Yorkshire Times. 4 January 2011.
  28. http://www.judiciary.gov.uk/Resources/JCO/Documents/Judgments/o-shea-judgment-06122010.pdf
  29. Jane Fae (6 December 2010). "Judges reject Operation Ore appeal". The Register.

External links

This article is issued from Wikipedia - version of the Thursday, January 07, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.