Transcript for:
Takedown of Major Dark Web Crimes

Today the Department of Justice announces the takedown of the dark web market Alpha Bay. This man is the most talented in technology. He's the number one in cybercrime. He owns two houses, two houses connected by a powerhouse. He's buying another house. He uses all his cars to make supercrime. But we don't see him working. The website was grossing close to half a billion dollars per year. So we're talking about, you know, 300 to 500 billion dollars a year. My name is Paul Craig. I'm the Chief Hacking Officer at Vantage Point Security. So imagine that you have a lot of something that is illegal and you want to sell it. You can't go onto Carousel and place a listing for your product that you want to sell. So the dark web's really filled that need. It's become a marketplace for where people can sell things that are illegal. So here we can get a diploma from almost any school for 0.1 of a Bitcoin, so $1,000, $1,100. Here we go, we can buy a UK passport with the name of your choice for a thousand British pounds. Driver's license, ID cards, big sale. So do you want a driver's license from Norway or Denmark? A Lithuanian ID card. That's what we're looking for, one gram of Colombian cocaine, 75% pure, uncut, $40 US. Right here on the front page, we see that they've got some actually some quite dangerous things available for sale here, because we've got weapons available, AK-47s. $500. This marketplace actually looks quite well designed. It's quite new looking. It actually looks quite legitimate. But this is all illegal. So think of it as eBay without the auctions or Amazon marketplace. It's exactly the same thing in spirit. The only difference is that because the site is anonymous, people are not shy about trading illicit goods. Alphabay very much looked... Like a really simple cut-down e-commerce site. Very, very simple. Just had categories and lists of products and prices. You would click on the link of the product and you could see a photo and a brief little description. Top rated, great reviews, very strong, lab tested. And a lot of people had comments about how they secretly shipped their items. So it would be shipped in a CD case or this would be hidden in a vase or something. The majority of listings on AlphaBay were narcotic or drug-related. There were like hundreds of pages of listings. for different categories. You would see a lot of pictures of narcotics, guns, and things that are generally illegal. Marketplaces like Alphabim are interesting in the sense that they bring the local drug dealer to the global scale. So if you think about it, the total drug market is huge. You're talking trillions of dollars. But your local drug dealer is not grossing a lot of money. The revenues are fairly small because you have to have this face-to-face interaction. There's also tons of risk associated with selling drugs on the street. And so those operations tend to be pretty small. But by moving them online, they take the Amazon model of electronic commerce and use it for illicit goods. So, of course, it gives people a much larger... a pool of potential customers and a much larger outlet. You do not just deal with your 10 or 15 regular customers. You deal potentially with tens of thousands or hundreds of thousands of potential customers worldwide. These websites don't have much content other than here are my illegal goods for sale. Technology will not only allow legitimate business to thrive, but will also allow criminals to use that technology in order to just have a better return on investment. It definitely is a bigger threat to the overall communities, and therefore it was a priority for the police to shut it down. Good morning. Today, some of the most prolific drug suppliers use what's called the dark web, which is a collection of hidden websites that you can only access if you mask your identity and your location. During the Alpha Bay investigation, one thing that became pretty clear was that the person who was in charge of the marketplace was somebody with the handle Alpha02. What was interesting with Alexander Kazas is that he started his online career as essentially somebody who was selling illicitly obtained online credentials. He was perhaps coming from this hacker mentality and he built his marketplace based on that. This is somebody who was, you know, technologically inclined. He liked to run websites, he liked to run an e-commerce platform. And he had a business and his business was successful. It's quite human nature. You have a business that is successful, that is something that you like to do. You perhaps turn very quickly a blind eye. ...on what's going on in your business, or you don't really realize what you're doing. Some of them start the marketplaces due to, I would say, ideological reasons. They believe that government should not tell people what they can or cannot put in their bodies, and they want to provide an online platform to do that. But then, when the marketplace starts to work quite well, they realize that the money is rolling in. They basically just get a thrill of operating those markets, and that's essentially what leads them to their downfall. When I first heard about OfferBay, I thought it was a website. I didn't think it was difficult. But my American friend tried to ask me, Do you know Macro? I said I know a big Macro. If Macro sells 10 units of drugs, and if it's 50 times bigger than Macro, is it big? The police who are investigating the case are not believing in their own eyes or the information that we can capture. It shouldn't be true that this happened in our world. A person can manage a website that has a value of thousands of millions and can commit the highest crime without any extraordinary management. When we started to study, we found that this website has hundreds of users. If it's a septic, It's hard to find a drug dealer group that has more than 100,000 clients. I've been doing drug dealing for 30 years. This operation is strange because it's about technology. But after the research, we know that the virus is in Thailand. So we came to the area and spent a lot of time to find out that it was in Thailand. He used an old Hotmail account, so of course it will lead to his history and to his additional digital footprint. He also used some other pseudonyms across different platforms, the same on the dark web as on the normal web and the visible web. When you're... running such a marketplace, there's also a risk that some of your previous actions will come back to haunt you at some point. So the point is that even before he even dreamed about running Alphabet, we're talking about something that took place almost a decade prior to his arrest. Some of those elements were used to actually be able to link different online personas with each other. And that's very important to remember. Whatever is on the internet, it's on the internet forever. So if you use an identity Somewhere, someday, it is there and might burst anytime with your information. Nothing that you have put there is completely deleted. We know that he is named Alexander Cash and he is Canadian. My passport is here. When we found him, we looked for him in the dark. We found out that his wife is Thai. I was investigating him. He didn't do anything. I asked around and collected information. I found out that he was working on a computer. I tried to find out what he was doing. What was he selling? What assets did he have? I found out that he had a lot of assets. There are two houses that are connected to each other. We are buying another house. We are buying it and decorating it into another 100-storey building. Then we rent another place. I had a house, but I rented it somewhere else. I saw that they used Lamborghini Aventador, which is the most expensive car, around 30 million baht. And then there's Porsche, and then there's Mini Cooper. And then the motorcycle, they used Superbike BMW, which is a high-end car. Some of the food that Alexander Cass can eat, he can spend around 1 million or 1.5 million baht on one meal. He can spend money on everything and he can live a luxurious life. The The The The The The The The The The The The The The The The The The The The The The The The The The The The The How is this possible? Many countries, even in South East Asia, they have a law that government can collect the data from the internet for protecting their national security. They call it lawful interception. Many countries in Europe, they can do. Many well-developed countries, Singapore, 100%. But in Thailand, we don't have such law. And many hackers in the world know that Thailand don't have such kind of law to sniff or collect information from the internet. And they can think it is a heaven for them. SolidFigureCAD is a world-class big case. We are the source of the IP address that attacks SolidFigure. We found that we have been hacked by the foreign hacker. All the IP address of the attacker originate from the university and the hotel in Bangkok. They compromised the server and they used that computer server to hack into the Sony picture. We have many cases, not only Sony picture, we have cases that we hacked into the other governments in Asia, in Europe, in the United States. They come to our country and they compromise, hack the server. And we call this attack attribution. Breaking Bad syndrome. So Breaking Bad is this very popular TV series and you see the evolution of the character over the series to change from a very nice, you know, upstanding citizen to an absolutely horrible criminal. Even more than money, there is kind of the thrill of doing this business. and realizing how powerful you are, they get addicted to their own product. And that product is not drugs, it's the thrill of running an illicit website. Alphabet is an online anonymous marketplace that is running anonymously on the internet. Anonymous browsing works at a high level using the following principle. Instead of me talking directly to the website that I want to visit, I'm going to talk to an intermediary who is going to talk to an intermediary who is going to talk to an intermediary and so forth. It allows people to sell illegal products or illegal services without any fear of being caught, without any fear of being identified. You could be in any country in the world and it would be quite challenging to prove that you are the one selling something on the dark web. First link would be download Tor. You can download Tor for free online. It's very simple, very straightforward to download and install and within seconds you can be running the Tor browser. So on the typical internet, the general internet that people know, you'll see.com On the Tor network, we only see the string of random characters.onion. So there's no even way to track the domain name. It's just a string of random characters. So you can quite clearly tell that that is on the Tor network. Originally, TOR was a byproduct of the Office for Naval Research to provide a mechanism for intelligence agents and spies to communicate back to the US government anonymously. Over time, the use cases have expanded. So journalists would be a great example. Journalists researching a topic inside a country that might be considered politically sensitive. We need to be able to do things that might be censored by their government. So the Tor network by itself is really not that harmful. You can share information. It may be unregulated and uncontrolled, but there's no way of buying products or services through Tor itself directly. But when you add in cryptocurrency, which has the same level of anonymity and privacy, all of a sudden these two things together really do create the perfect storm. So you can list products and receive money for products. All anonymous. When I was working on the sort of great project of my life back in 2013, and trying to figure out things like how could I get... This archive of material to journalists, so how can they see things in a safe way that's uncontrolled? There's a question of, well, do I need server infrastructure of my own? Maybe the answer is yes. Okay, how do I pay for that anonymously? Maybe, maybe someone like me may have used Bitcoin for something like that. This is... 0.4 of a Bitcoin for a Dutch passport. That would be about 4,500, given today's rate of Bitcoin, which is about 10,000 for one Bitcoin. Yeah, we accept all cryptocurrencies. Cryptocurrency is definitely the payment choice. So that is my Bitcoin wallet. And this gives me the QR code. If someone else wants to send me Bitcoin, they just scan this QR code, and then it goes to my Bitcoin address, and then the Bitcoin will come into my account. Bitcoin can be used for many legitimate things, many legitimate reasons. It just happens to also be the number one choice for people selling things on the dark web. There's no way of tracking it, or there's no way of tying a cryptocurrency wallet or address to a person. Traditionally, a lot of crime has been caught by busting the trail of money, because money always leaves quite a trail. But if it's a bank loan, the bank knows, the bank knows, many people know, they can check, but this is just their own. You can see that trading is like a virtual. It's not actual, it's virtual. No matter how much money you have, the data is in the air. So you can send millions of dollars to someone else in the other end of the world and receive goods in return without anyone in between actually seeing or knowing. The growth of cryptocurrencies, it's been very much pitched directly on the growth of the dark web. and financial services on the dark web. People have been selling drugs and other illicit goods on the web. Pretty much since the 1990s. So what was different with Silk Road? Well, what was different with Silk Road is that it tried to provide what I would call an end-to-end anonymity platform. It combines network anonymity through the use of Tor, so that an observer cannot tell which machine is connecting to which server to do those transactions. You might have thought, well, the police has shown that they can arrest those people and so you'd be foolish to enter this line of business because you're going to get caught. This is the exact opposite of what happened. People were convinced that there was demand from customers and that there was a valuable business ID in there. I think the most clear explanation for cybercrime is the demand for people in the dark market. Okay, so for this one we need to register an account. You can see they use PGP authentication, so quite privacy focused. Let's see if we can find another marketplace. Okay, we need username and password for that one. I think the Alphabay was quite unique, that it was so quick and easy to get on board and to get in. Definitely contributed to its success. Initially it was not the largest website. It was a very small website. They were primarily selling credit cards and other digital goods. So in 2015 Alphaberry really got into the spotlight for selling stolen Uber and TokTok information. Now this is just a great example of an illegal product, data in this case, being sold online and I imagine very cheaply because this information there would be a lot of it so people would be selling person by person a few dollars. But there are a lot of accounts that were being sold on Alphabet, not just things like Uber, also Netflix, Hulu, these are the things I think people would buy quite frequently. Because it's considered not so illegal, but something that they want. But reasonably quickly they became dominated by drugs. The first vendor on Alphabay was probably AlphaZero2, selling credit card numbers he had access to. And then as the business picked up and other vendors joined, he didn't say no when people started to sell drugs. It's very interesting to ask yourself how many people does it take to run a dark web marketplace. And the answer is surprisingly few, in general. A lot of the people who start those marketplaces, they are not drug syndicates, they are not courier criminals, they are people with a very strong IT background. This is really white-collar crime, which makes sense for the operator of the platform. After all, operating a website is an IT job. But what is interesting is that you see the same marketing techniques that are being used by legitimate businesses, social networks like Twitter, Reddit, and they have some quote-unquote social media consultants that are essentially promoting their brands on those social networks. Most of the cyber security personnel are between 18 and 25 years old. They are determined to do anything, and they are not afraid of the law. They are brave and brave enough to try anything. You have a certain ego present within the community. The knowledge that the general public lacks understanding about cybersecurity, that makes some of the cybersecurity hackers thinking that they might have almost like superpowers and they are so good that no one will find them. There was a group of agents who... They might feel challenged. They might feel that it's fun, it's a game. This is the criminal mind of one of these groups. It's got to be a little bit exhilarating for those people. It's got to be something that provides a thrill, a high so to speak, no pun intended. In the particular case of AlphaBay Marketplace and the reach and the amount of users that that particular marketplace reached, probably the owner had a feeling of success, a feeling of being untouchable because he reached a certain level that they didn't find me until now, I don't think they will catch me. At first, he didn't think we would be able to get this far. He is a very smart person. And if anyone knows him, he would have many layers. I think we will spend time as a hundred, as a month fighting with one person. This engineer is the number one technology expert and the number one cybercrime. This officer has been proficient in avoiding the FBI's investigation. Now we can find out that he committed a crime in Thailand. So it's very difficult for us to gather the evidence to arrest this officer. The concerns of Thai, American and foreign police officers who came to work that day are very stressful. We have never done this before. We only follow the log, the account, and the electronic data. But we never use technology and monitor each other 24 hours. 7 days a week, 30 days a month. It's a very intensive operation for our customers. How can we do it? We have to get them to use the device in the admin role because they don't use it all the time. Seeing someone's laptop logged into the marketplace also shows that intent. It shows that you are actually the person who is adminning this marketplace. So people that are using Tor cryptocurrencies will almost certainly be using extra security precautions on their laptop. So if law enforcement came you just close your laptop it's a giant encrypted brick. There is nothing more watertight than being logged in as an admin to an illegal marketplace. You're clearly involved. The first step of the project was to create a new country. It wasn't because of the 5th of July that year. It wasn't because we were the only ones ready. We were ready for 10 countries. We were ready for 10 countries. That was the first step. We were concerned that once we did it, there would be more countries. If we did it and we failed, everyone would fail because they were more important than us. Subtitles by the Amara.org community The meeting was planned and adjusted in seconds. We would choose the moment and the angle of the charge. When the charge is released, who will be in charge? Everything was controlled by the police. So, there was a signal when Alexander Cash was in charge. This is a person It takes about 5 seconds to make a decision. So we have to do what we planned in the last minute. If they know we will come to the computer, they will close the door. If they know we will come to the phone, they will close the door. Everything has to be done in 9 seconds. We have to be in control and have all the electronic devices to confirm that they cannot operate or connect online with other systems to access AlphaBay's website. That means my work will make everyone confident that we can control AlphaBay's website. When we go to the electronic device, such as computer notebook or other electronic devices, we will find that the customer gets a password, which is the root key to access the wallet of the customer. The wallet is used in the AlphaBay case, which is the control. to be sent to the admin in Alphabay. We have to unlock these root keys, which is very important for the computer's notebook. Most people use very simple passwords, like password or I love you or baseball or things like that. People who run those marketplaces use hard-to-break passwords. If you think about a passphrase, not a password, but say a phrase that's a paragraph from a book, all of a sudden becomes very, very challenging to try and guess that. Trying to break one of those passwords would take an enormous amount of resources. It's not even clear that it's possible. And breaking the encryption itself is basically infeasible with today's technology. The day we met Alexander, our Cybercrime team was online. Operation like admin. We were confident in the evidence we had. That this was him. People thought that Alphabay had committed an exit scam. The platform was still there, but you really couldn't take money out of it. The reason why the police did this was to lead people who were on Alphabay to go someplace else, to go to a different market. This is a landmark operation. Alpha Bay was roughly 10 times the size of the Silk Road. We're talking about multiple servers, different countries, hundreds of millions of dollars in cryptocurrency and a dark net drug trade that spanned the globe. Welcome to the The The The The The The The The The The The The The The The The The The The The The The The The The The The The The The The The The I am not a band of film. I am normal. Only God and I know this. It's just a lie. Because I was forced to admit that I had a victim. Even though I didn't. What they do is very unethical. I say it's bad, because they want to share photos in a group that they know is full of porn videos and porn photos. They also take the materials from other groups. For example, Wawan is part of an international group. When there is a photo of the group, it will be posted on Facebook. Most of the photos they shared were taken in public places. Children walking on the beach, children walking on the zoo, then they were taken and shared directly to the group. And I think that's very dangerous. I saw some of their conversations. There were many tips that were then included in the group. I've known the internet since I was 8 years old. I learned it by myself. When I was a kid, I was an introvert. I was quiet. I liked playing with my gadgets more than other people. When I was a kid, I liked playing with the Warnet. I would walk to the Warnet for an hour. Until there was an activity, I finally found a job, which is a Warnet operator. So, my life was mostly in Warnet. He often spent his time in Warnet. Even, Wawan said that he eventually tried to enter the deep web. And that's when he finally got to know the term pedophile. He was raised by his own wife. So, his family background is not good. He didn't graduate from high school. Wawan comes from a family on the side. When they found a group and they felt, wow, in this group I can be a leader, I can be a leader, like that. I can control many people. I'm proud of my international friends. He's naive. He can assume that he has never intercruised with a child, that he's not pedophile. But once he shared a photo, he also knew that there was a tendency that the photos he shared were photos of children and all kinds of children's sex videos. And he closed his eyes, and he deliberately closed his eyes. He enjoyed his pride as an admin. But, Wan, you know, at first, there were a lot of comments about child pornography. Then why did you continue with that? I didn't continue, so I explained again whether I continued or not. I was rarely active, I only commented on ordinary comments. First, it seems that she didn't feel too guilty. Secondly, he felt like a victim. And thirdly, he clarified that he was not his actor, he was not, I mean, not just to be a pedophile and so on. On March 2017, we conducted a cyber patrol. We found out that there was a Facebook group called Loli Candy. The group was about pornographic pictures. There were also reports from the community about the case. We continued the investigation with Undercover. The KND is one of the biggest cases that we can mention right now. One, besides the behavior of Indonesia itself, it also becomes the administrator or administrator of other groups that then affiliate with international groups. Since the beginning of our research, we have about 6,000 members on Facebook. Then, because we have been conducting research for about a week, we were quite surprised when we found out that the number of members had increased to more than 8,000. There are about 10,000 photos and videos. I was shocked at first. I was scared to see that this Facebook group, was so massive in sharing data, information, photos and videos related to children. Of course, as parents, we have children who have concerns. Facebook is not the only communication tool among them. They also create other groups, such as WhatsApp groups and Telegram groups. From the WhatsApp groups, we find links with other countries that involve more than 46 countries. There are 11 groups, and one group from Indonesia with more than 8,000 members. Because they know that Facebook will censor what they upload, and then ban their accounts when they post things that are considered illegal by Facebook, they turn to WhatsApp groups. Compared to those on Facebook, WhatsApp groups are more vulgar. They are more brave to talk, to share photos and videos. Real. These apps, such as WhatsApp and Telegram, provide the user this ability to communicate in a private and secure environment. That's why in this case, for instance, they can build chat groups which is point-to-point encrypted and easily share the information in a private and secure environment. The evidence remains on your own device. On a client device. And obviously the moment you delete the evidence, the evidence can be permanently deleted and destroyed. There is no way you can recover it back. Hello, this is Rolika We're a group for anime. We discuss spoilers, games, anime, and ongoing anime, which means what's being broadcasted right now. So I'm not the original creator. And after that, for a few months, the channel disappeared. So, the old members that I know asked me to make something new. Pawan is called Otak. He is the main admin. Then, Siha is in charge of helping and then, he is in charge of the group's activities. Tide and Deden are members, and they are also the admin, and the most routine ones, then uploading videos and photos. I think H is interested in I'm Wan, and she's like, Oh, I have a boyfriend, I have to be like this to my boyfriend. Maybe Wan feels this is wrong, but my boyfriend is involved in this too. This is just for fun. Siha, Wan, is this your boyfriend? No, he's a close friend. I know him on Facebook. We know each other, and it turns out we're talking about anime and we're connected. I think I can invite him to my group. Maybe he'll be more active. He's very friendly with my group. He comments, he's nice to people, he's very friendly with my group. He's very friendly with my group. He's very friendly with my group. He's very friendly with my group. Tiddy asked me to make him an admin. Maybe the most active one is Tide, because he's still in school. So, when he's done with school, he still has a voice. So, he can still be used to manage the group. At first, I wanted to make Ilu, Ilu Inayah, an admin, because he's the closest person I talk to. At first, we met on the Indonesian web. What is your favorite anime? My group is very interested in anime and OST. Because there are many requests from members to make the second one. Official Loli Candy 18+. What does 18 plus mean, Wan? Well, it means that the people who join it are adults, and there are no kids who post it randomly. That's the purpose. So, we want to discuss pornography for adults, for people who are already adults. We used to make rules that we had to post our pornographic videos at 10 PM. We've created a second group. The first group, we didn't create anything like that. Because we were tired of taking care of people like that. We had to do it all at once. If we didn't, we couldn't be allowed to do it. They just uploaded photos. Maybe they were just little kids. They were censored. There were porn videos, Jav videos, and also little porn videos. I was so frustrated that I didn't follow the group at all. I rarely opened Facebook on the internet. I was just playing games. I didn't have time to open Facebook. I didn't care about it because I was tired of picking up people every day. It disturbed my activities. I work at night, and I sleep in the afternoon, and then I rest. But I get disturbed because of that. Sometimes there are people who are in the WA. Bro, why is there something like this on Facebook postings? There are a lot of things like that every day. So I'm tired. I just let it be, it's up to me. So you manage this Nolikedi account while working at Warnet? Yes. I also made it when I was at Warnet. to create the group account. When I started monitoring, I thought, this is not right. Then I kicked one person, but that person had many accounts, five accounts, cloning accounts, so they posted, there was no end. And we were tired of kicking every day. Why did you continue with Candy, the second one? Because I usually look for referrals there. How did you get the money? I shared the link, link game, but I used ADS, Adfly Advertising, and I got the money from there. How did you get the money? Every time someone clicks, they get around Rp. 1 or Rp. 2 from the clicks. Only Rp. 10,000 per month or Rp. 20,000. He said it's enough to buy a data package. Other admin usually shares photos and videos with a budget. A budget of Rp. 25,000 or Rp. 50,000. In this group, the motive is mixed. Some are economically full, so they are diligent in sharing. Some are sexually satisfied. Have you ever felt interested in children? No, not at all. I was curious, yes, curious. But not interested. I was curious because in the video... In the video I saw, this little kid was taught why not be afraid, why not do this. The little kid is usually innocent. If he is taught something weird, he will be afraid. And what I see is the opposite. I read that there were six children who were victims of the Wawan. Three of them admitted that they had been close to the Wawan. Okay, at first I was forced to admit it. I'm being honest here. I was forced to admit it. And it turned out that I asked for the evidence of the vizium, but it wasn't there. It wasn't mentioned in the trial either. You can check if you don't believe it. There were no victims in the trial either, because there was no evidence of the vizium. I want to ask you something. There's one of your posts. Oh, that's my duplicate account. A lot of people have been saying it's my account. My account is real. I don't use photos. I don't use real photos. My account is real. I only use icons. My game team icons. We can make sure that the evidence we get is of course contrary to what the evidence says. That is, in addition to spreading photos and videos, he is also the one who makes the photos and videos, also as a direct actor towards the children themselves. One of the victims was her neighbor and her son. She did that by seducing the child to play with her before being raped and penetrated. The child was then taken to the hospital. The destination of tourism in Indonesia is often referred to as the world's pedophile heaven. This data is from 2010-2015 based on UNICEF Indonesia. So this number is very worrying. I don't know what is happening in Indonesia. The issue of sex against children is still a bit taboo in Indonesia to explain that this is what is called sex, even though it is only in the hands of foreigners. The government's awareness, and it should be the concern of the perpetrators of the crime, for this pedophilia. The lack of high self-respect. The Pedofila case is very dangerous for Indonesia. Therefore, we must take it seriously. So, in this case, we need to increase the awareness and awareness of the community. Dare to say no. Dare to say don't. Sometimes in the context of being polite, you can't be that polite to guests. When you meet them, they are usually very pleasant, quite eloquent. So you wouldn't know that they have been molesting children and abusing children if nobody told you. That's exactly the kind of qualities that will make a child warm up to such a person. Because they don't appear threatening at all. And this is the whole modus operandi, you know, because by being so... Friendly and warm and approachable and trustworthy in inverted commas. Parents would leave their children with these individuals and then these individuals take advantage of the children. So there is a certain persona. certain presentation that these individuals developed that has worked to their advantage. This whole process is a process of grooming where the person connects with you with the view of exploiting you totally. They told each other that by becoming a teacher, they would easily get the children's sacrifice. One of them was when they finished exercising at school. With a sweaty body, they got satisfaction by just smelling the child's sweat. They even have a good relationship. They can share photos of their neighbors, photos of their relatives, and that's their own relationship. They even make a video and share it with their friends. One thing we need to be aware of is that sometimes we think pedophiles are only men. In fact, women can also be, women can also be. So you can also get the satisfaction of having a sexual relationship with men who are still included in the children. So it means not only women, but men can also. Shihab admitted that he was in that group, but he denied that he was actively sharing photos of children and all that. Shihab said no, he wasn't interested in children, because he was more interested in the knowledge. Pedophilia is actually a factor of behavior, but there are also environmental factors. So, the environmental factors are indeed a balance of the psychosexual development, so that they like children more, so that they will continue to be curious about children. Environmental factors can be because they have been victims, then they are aware of provoking a desire, such as revenge and so on, or also the influence of their friends, their environment. Sometimes if there is a victim of sexual exploitation, sexual violence, and so on, we are only busy handling the perpetrator. Victims are forgotten. It's like a wound. If it's not treated immediately, it will eventually cause a defect. This is also a defect in this psychological aspect, which then becomes something very complex, so it can become an actor in the future. Including the initial B, including the one that conveys it. When I was 7 years old, I had a sexual assault. My neighbor was half way there. So I would go to school through her house. I was scared. I didn't say it because I was threatened. If I went through there, I wouldn't be safe. That's how it was. I'm afraid that I'd better shut my mouth. And I can't talk to people. I can't swear at people. So I just keep quiet. This group they use social media for exact purposes, the social media built. They need to communicate with people that's why they use the same strategy. They create a profile, they create groups and invite others. like-minded people to join them, share information. Many of the tools are easily accessible, is publicly available, but obviously most of the people who run these syndicates, they do have IT knowledge and they know these platforms and they can misuse these platforms and conduct a crime. Do you know that child pornography is a crime? At first, I didn't know. I thought it was a new type of pornography. I never knew that because it was my first time. When I found out that he was a criminal, I wanted to leave the group. But I couldn't, so I was arrested. I usually use social media every day after my children go to school and my husband goes to work. Someone shared on Seaworld.com that there was a group called Loli Candy. I shared it with my group, Fun Fun Stilicious. I told them that there was a group called Loli Candy that was looking for children. At first, my friends didn't believe me. They thought I was too paranoid, too scared, spreading hoax. The truth is, there are quite a lot of fake news in Indonesia. I'm the size of this, the fact-checking team can check a news five times a day, whether it's true or not. Five times a day, hoax news that is checked is the real one. Imagine if in one month there are 150 billion, it's already very massive. We, there were 4 people, entered the group, the Loli Candy group, to see if it was true, if there was or not. The first time I saw the group, I was actually surprised. Because the number was so large, there were thousands of them. The photos were of children who were being beaten. The average number of children who are shared is from the age of 9 months to 10 years old. What I'm surprised about is that not only the children in their environment are being bullied, but they also want to take pictures from people's social media accounts to be sexually commented on. The conversation I saw in that group, one of them was about how to make sure that children under the age of three are not abused when they are abused. What are the tips? What are the ways? Children also do not complain to their parents. I often post photos of my children on my social media accounts. And since the pedophilia incident, I have never done it. I have done it all in private. Finally, I am the only one who sees and goes out to my family. My husband, my relatives, that's all. I collect screenshots, I collect photos of the victims'children. We are relieved and grateful to the police for taking the complaints of the mothers seriously. There are also some rules that are quite surprising for us. One of them is to prove that the photos and videos shared are real. The Tide Tide deliberately proves that he can share his photos or videos to get a response or satisfaction, so that he is well known among other members. Subtitles by the Amara.org community Those who participate in this group also have other interactions that must be bartered, there must be other communications that show that they are active here. And if they... Whatever the photo is, they have to write captions from where it came from, from where it came from, to make sure that the photo is real. So they don't get kicked out of the picture. They also have one of the rules, or one of the members, they have The habit of proving that the video or photo that was sent by them is real, is by writing the date or name of the person who was sent to prove that this photo and video are real. that are taken from real people, not from other social media. Facebook is more focused on filtering what is posted on Facebook. That's why on Facebook they try to using certain codes, for example, the words CP and others. It's to make sure that they don't say it in a vulgar way. There is still sexual interaction in it, it's forbidden to them because it's already automatically banned by Facebook. Then the other rules are, if you want to post a message that is too vulgar, it should be censored. For example, the level that is censored, what color, what emoticon. and the for example link Mega.nz Mega.nz space, it won't change to blue, Let's take an example of URL. If that URL will contain a keyword that will be flagged by the software, for example. However, if the URL is shortened, the keyword is not anymore present in the URL and that particular software might not detect it. What we see on the internet currently, the search engine and the information that has been indexed by the search engine, represents only 5% of the overall internet. So afterwards you have what we call the deep web and the dark web. Dark web is a hidden part of internet. Obviously they must have a social media platform. Why? Because they need to inform other members. One interesting thing is why there are so many Loli Group members, up to 7,000, is because the sites provided by Wawan and others, the videos that are not censored, have very few firewalls. So we don't have to click on the server and repeatedly click on the address to get to that site. It feels like only three clicks and then we get to the main site. This is a challenge for us, so we also know that if we do that, we can't do it for a long time because we can't share the video or photo that is asked to open. to prove the members'activity. When these four members or administrators accepted us as members, we also prepared various reasons to save time while looking for the average number of the people there. We asked for help from Facebook to track or get information about other people. We did a pre-checkup of the VACON to make sure if it was real or anonymous in cyber language. But we also found contact person from their phone number. Wawan once photographed his neighbor's light. He took a picture of a child in the circle group. And it turned out that there was a number plate so the police could track him. We decided to form a team of four people to do the arrest together. That was quite challenging for us. According to our discussion yesterday, the Lurkendi case was found to be four subjects that we will arrest. The 4 places are in 4 different places. The analysis that we got is that we have to do the arrest in a one-off manner. We can't do the arrest in a different day or separated. Why? Because according to the current analysis, they already have a code where if something happens, they will shut down everything and we will lose the data we need. When the neighbors recognized that the possibility of the subject of the story is at home, then we checked again from the photo on Facebook that there was a building corner that was photographed by him. Well, it turns out that the building corner is what makes us believe that the photo is a photo of the part of the house of Wawan. Wawan actually has a network, a pretty good network in his area. He got information that someone was looking for him. He had updated his status that someone was looking for Wawan. Because he said, if he was my friend, he should just ask. No need to ask. With the status update, we are more sure that the house was left by Wawan. Social media is back in dirty hands, irresponsible. A group on Facebook asked its members to spread porn content. The police secured two pedophilia victims and two victims who were responsible for spreading the video. One of them was a 16-year-old teenage girl. This was in September 2016. There were 7,479 members. The patient was just 8. But there was a confession after I interrogated him before he went down. He said there were other clues, both on Facebook and WhatsApp. There was a photo of him. and the other two are on the phone. For international and foreign organizations, we try to contact other law enforcement agencies through FBI. We managed to secure three cellphones from Wawan, and several USB flash disks. From these three cellphones and flash disks, we can get around 2,000 files that contain photos and videos of child pornography. Oh Oh