Boystown (website)

Source: Wikipedia, the free encyclopedia.
Boystown
Logo
Type of site
Child pornography file sharing
LaunchedJune 2019[1]
Current statusOffline (as of mid-April 2021)[2]

Boystown (stylized in logo as BOYS TOWN) was a child pornography website run through the Tor network as an onion service. It launched in June 2019 and was shut down by authorities in April 2021. Four German administrators of the site confessed and were sentenced to long prison sentences in December 2022.[3]

Site

Examples of categories on Boystown

The site was launched in June 2019[3] and was run through the Tor network.[4] The server was registered in Moldovia.[5] As of May 2021, the website was considered one of the largest international darknet platforms to host child pornography and had 400,000 registered users.[2][6]

Website content

The website featured various forums and chats for communication. The illegal images and videos were posted on the forums and the chats where members were able to communicate with one another.[7] There were two chat services provided, one called "Lolipub" and the other was known as "BOYSPUB".[1] The child abuse materials exchanged between users were of young children and toddlers, most of which were boys, from around the world.[8] The child pornographic content had various categories including "Art" (which included shotacon among other subcategories[9]), "hardcore", "kindergarten", and "toddler".[1] Lolipub also had rules that included banning the promotion of hurtcore.[1]

Investigation

The website was investigated by a German police task force with cooperation from Europol and international law enforcement agencies. The platform's administrators and users were under investigation for months.[2][6] Early on, the German Federal Criminal Police (BKA) was able to plant an undercover agent inside the Boystown network,[5] but identifying the perpetrators proved difficult as they only communicated via the Tor network.

To identify the perpetrators, police used a correlation analysis attack against the Ricochet chat protocol which was used by Boystown admins and operates on the Tor network. By sending Ricochet messages to perpetrators and monitoring several hundred Tor nodes for simultaneous traffic of the correct size, authorities were able to piece together the chain of Tor nodes used and the perpetrator's entry node, which then revealed the perpetrators' IP addresses.[4]

Agencies involved in the investigation

The following agencies took part in the investigation:[10]

Website shutdown

In mid-April 2021, the website was raided by authorities and shut down.[2]

Suspects, trial, convictions

Three primary suspects were discovered and identified during the investigation: a 40-year-old man from Paderborn, a 49-year-old man from Munich, and a 58-year-old man from Northern Germany who was living in Paraguay. The suspects allegedly acted as administrators for the website and gave advice to its users on how to evade law enforcement while using the platform.[2] Another suspect was a 64-year-old man from Hamburg who was accused of being one of the most active users uploading over 3,500 posts.[2][6]

The public and the press were excluded from the trial. The suspects confessed. The man from Munich was sentenced to 12 years in prison with subsequent preventive detention ("Sicherungsverwahrung"), the man from Paderborn received a sentence of 10.5 years with subsequent preventive detention, the German from Paraguay was sentenced to 8 years in prison and the man from Hamburg received a sentence of 7 years in prison.[3]

According to the suspects, one inner-circle member of Boystown claimed to be a high-ranking employee of a German security agency who as part of his job received requests from the German government and other authorities to check the security of certain processes. He acted as an administrator for Boystown and optimized various programming scripts.[5]

Aftermath

Hours after the shutdown, an unknown user posted a dump of Boystown online, as confirmed by the Frankfurt prosecutor's office. The journalist group STRG_F had 13.5 TB of data deleted from various file hosters by December 2021, pointing out that investigators were only interested in hard drives of perpetrators but not in removing offending material from the internet.[11]

Three successor platforms (with 410 and 846 thousand accounts) with, among others, a common admin in Germany (a 21-year-old from Saxony) were shut down Christmas 2022. Another three suspected administrators were arrested in November and December in Seelze near Hanover,[12] Schleswig-Holstein and Brazil. The BKA secured hundreds of thousands of images.[13]

References

  1. ^ a b c d "Europol Just Took Down One of the World's Largest Dark Web Child Porn Sites". Vice. 3 May 2021. Archived from the original on 28 July 2021. Retrieved 28 June 2021.
  2. ^ a b c d e f "Police bust dark web child porn site used by more than 400,000 members". CBS News. 3 May 2021. Archived from the original on 4 May 2021. Retrieved 5 May 2021.
  3. ^ a b c "Hohe Haftstrafen für Betreiber der Darknet-Plattform "Boystown"". Süddeutsche.de (in German). 2022-12-06. Retrieved 2024-10-05.
  4. ^ a b Dölle, Mirko (2024-09-19). "Boystown investigations: Catching criminals on the darknet with a stopwatch". heise online. Retrieved 2024-10-05.
  5. ^ a b c Stark, Holger (8 September 2022). "Kindesmissbrauch: Wie besessen". Die Zeit. Archived from the original on 2022-09-09.
  6. ^ a b c "Police take down 'Boystown,' one of the largest child porn sites on the dark web". The Daily Dot. 3 May 2021. Archived from the original on 28 July 2021. Retrieved 28 June 2021.
  7. ^ "BOYSTOWN CHILD PORNOGRAPHY SITE BUSTED". 4 May 2021. Archived from the original on 28 July 2021. Retrieved 28 June 2021.
  8. ^ "German police make arrests as they shut down large darknet site housing child abuse material". ABC News. 3 May 2021. Archived from the original on 28 July 2021. Retrieved 28 June 2021.
  9. ^ File:Boystown forums.jpg
  10. ^ "4 arrested in takedown of dark web child abuse platform with some half a million users". 3 May 2021. Archived from the original on 3 May 2021. Retrieved 11 October 2021.
  11. ^ "Pädo-Foren: Warum löscht niemand die Aufnahmen? | STRG_F". funk. Archived from the original on 2023-04-17. Retrieved 2023-04-17.
  12. ^ Hellerling, Peer (14 January 2023). "Kinderpornos im Darknet: Niedersächsischer Verdächtiger kommt aus Seelze". www.haz.de. Archived from the original on 18 April 2023. Retrieved 18 April 2023.
  13. ^ "BKA - Listenseite für Pressemitteilungen 2022 - Schlag gegen Darknet-Plattformen wegen der Verbreitung von Abbildungen sexualisierter Gewalt an Kindern". Archived from the original on 2023-04-17.