Jump to content

Operation Pin

From Wikipedia, the free encyclopedia
Operation Pin
Operation NameOperation Pin
TypeChild pornography investigation
ScopeMultinational
Roster
Planned byVirtual Global Taskforce
Executed byU.K National Crime Agency, AU Australian Federal Police, U.S. Federal Bureau of Investigation, CA Royal Canadian Mounted Police
Countries ParticipatedUnited Kingdom, United States, Canada, Australia
Mission
ObjectiveTo affect the credibility of the existing CP sites, and capture information from persons seeking CP sites
MethodBait-websites/honeypots/dragnet
Timeline
Date beginAnnounced 18 December 2003
Results
Accounting

Operation Pin is an initiative of the Virtual Global Taskforce, which consists of the UK's National Crime Squad, the FBI, Interpol, the Royal Canadian Mounted Police, and the Australian Hi-Tech Crime Centre/Australian Federal Police (AFP). Its stated aim is to identify pedophiles and other people who are using the internet to access child pornography. Announced on 18 December 2003, the operation is said to involve the creation and operation of a number of websites (so-called "honeypots") purporting to offer illegal images. While these websites will not contain child pornography images, they will be designed to look like the real thing so as to ensnare as many offenders as possible.

The websites will present visitors with a variety of options which, instead of leading to illegal images, lead to a law enforcement site that will inform them that their personal details have been recorded and that they have committed a crime. They will also be given details of appropriate helplines. It is unclear if the information recorded will be technical (for example, an IP address) or personal (for example, credit card details).

The stated purpose of Operation Pin is to cause people seeking out child pornography on the Internet to wonder whether they will find an illegal site or one operated by law enforcement agencies. It can thus be understood as a kind of deterrence.

[edit]