Paedophile caught after police video trick lures him out of Dark Web

The 59-year-old was a member of Website 19, which was operational from 2012 to December 2014

Aatif Sulleyman
Friday 05 May 2017 14:28 BST
Comments
Members of Website 19 were required to constantly submit new content in order to retain access to the site
Members of Website 19 were required to constantly submit new content in order to retain access to the site (iStock)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

A paedophile has been jailed after authorities used a special video file to get him to unsuspectingly reveal his IP address.

The paedophile, Roy Harvender Jr. from New Castle County, Delaware, had been using an anonymising network to access child sexual abuse images, but the video lured him into opening “an internet connection outside of the network software”, allowing the FBI to track him down.

The 59-year-old was a member of Website 19, a child pornography website on the 'Dark Web', which was operational from 2012 to December 2014.

His username was ‘ricenbeans’ and, like all other members of Website 19, he was required to constantly submit new content in order to retain access to the site.

Court documents obtained by the Register have revealed that an unidentified foreign law enforcement agency (FLA 1) arrested a member of Website 19 in June 2014, and used his account details to track down both its operator and the server hosting the site.

The operator, who was based in another country, agreed to cooperate with the police force that arrested him, and FLA 1 took control of Website 19 and “began operating the site from a computer server in its own jurisdiction”, in order to identify more of the site’s members.

In November 2014, FLA 1, “acting independently and according to its own national laws”, posted a link to a video on a Website 19 forum.

The file “was advertised as a preview of a child pornography website with streaming video”, and when members of Website 19 hit the link, they were informed that the file would play on an external website.

“If the user chose to open the file, a video file containing images of child pornography began to play, and FLA 1 captured and recorded the IP address of the user accessing the file,” reads the court document.

“FLA 1 configured the video file to open an Internet connection outside of the Network software, thereby allowing FLA 1 to capture the user's actual IP address, as well as a session identifier to tie the IP address to the activity of a particular ‘Website 19’ user account.”

Harvender Jr. clicked through, prompting FLA 1 to inform the FBI when his US IP address was exposed.

Further investigations led to Harvender Jr.’s arrest. Though he admitted to being a member of Website 19, he claimed not to know that possession of child pornography was illegal.

He pled guilty to one count of distribution of child pornography, and has been sentenced to 13 years behind bars.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in