The FBI’s ploy of using photos of female staff as underage bait to ensnare predators is just one of its disturbing online abuses

3 Aug, 2021 14:56

By Kit Klarenberg, an investigative journalist exploring the role of intelligence services in shaping politics and perceptions. Follow him on Twitter @KitKlarenberg

The Bureau has a long history of using dubious and outrageous practices in their internet investigations, including seizing and running one of biggest child porn sites on the darknet.

A damning report by the Department of Justice Office of the Inspector General (OIG) has revealed that a US Federal Bureau of Investigation (FBI) special agent used photographs of female support staff employees to pose as underage females in a sex trafficking investigation, enticing would-be predators via social media. 

Shockingly, the basis for the probe was an allegation that the agent had engaged in an “inappropriate relationship” with a female support employee, in which he among other things requested the staffer provide him with provocative pictures of herself for online undercover operations.

The report found that the numerous females who were exploited in this manner were neither certified undercover employees nor certified online covert employees. 

There are “various approval and documentation requirements and extensive certification requirements” related to the use of such tactics in FBI operations, but no such policies apply to non-certified employees, meaning there is no requirement for informed written consent, supervisor approval or even supervisor notification to protect them. It is seemingly precisely this gaping loophole that the agent manipulated to their own ends. 

Photos of the female staffers in question reviewed by the OIG purportedly featured blurred faces, and the subjects were fully clothed. However, the special agent behind the ruse admitted during the investigation that he did not document which employees were used, obtain written consent from the employees or keep a record of the websites on which the photographs were posted and when they were posted. The agent claimed this was a result of “fishing” across multiple sites. 

Also on rt.com FBI agents used photos of female staffers in sting operations without authority, DOJ inspector general says

Moreover, the agent advised all participating female staff not to tell anyone about their undercover work, including their supervisors, and was unable to produce any documentation regarding how the photographs were obtained or used. The Bureau also has no idea whether the photos are still available online, or whether they were downloaded, copied or disseminated further. 

“The OIG believes that this conduct poses potential adverse consequences for [non-undercover] employees participating in UC operations, including potentially placing them in danger of becoming the victims of criminal offenses,” the report ominously cautioned. 

The alleged inability of the special agent to recall specifically to which sites he shared the photos of female FBI staff is rendered all the more unbelievable, and sinister, when one considers the agency’s history of running child porn resources in order to ensnare paedophiles.

Most notoriously, in February 2015, the Bureau seized the servers of Playpen, one of the biggest child porn sites on the darknet, and indicted its founder and owner. However, rather than closing the site, it opted to keep it running, from government-run servers in Virginia. The operation was signed off at the highest levels of the FBI and Department of Justice. 

Also on rt.com FBI hackers targeted users in 120 countries, incl. Russia, China & Iran

The Bureau went on to manipulate the site’s code, and installed tracking malware on any computer that accessed Playpen, before handing the location of users’ computers to law enforcement, with just one search warrant. While the site only operated another fortnight before its closure and the mass arrest of implicated individuals, according to one “conservative estimate,” the FBI distributed around 1 million images of child abuse while it was in charge of Playpen. 

At the time, Corey Rayburn Yung, a professor at the University of Kansas School of Law, charged that the Bureau had “actively participated in the revictimization of those depicted in child pornography with no possibility of controlling distribution,” conduct that was “immoral and inexcusable.”

Playpen is far from the only child porn website known to have been effectively owned and managed by the FBI. According to an affidavit filed by the agency in 2016, it was in a position to collect data on and identify users of 23 such darknet sites. In response, security researchers estimated that the Bureau was in effective possession of over half the darknet’s child porn sites, at the very least.

On top of the numerous clear and grave ethical questions arising from a US government agency managing a resource providing among the vilest criminal content imaginable to some of the most dangerous individuals to stalk the Earth, its legality and efficacy are highly questionable. 

Also on rt.com FBI ran 23 Dark Web child porn sites to gather visitor info

In all, 1,300 unique IP addresses were implicated in the Playpen investigation, but fewer than 100 cases made their way to court, and judges in several US states found that the FBI’s activities had been illegal, leading to evidence being ruled inadmissible and numerous defendants walking free. 

Even in a case where evidence wasn’t suppressed or indictments dismissed, the presiding judge slammed the Bureau’s tactics as “outrageous” and amounting to using “child victims as bait” without their knowledge or consent, or their families’.

Now, it seems certain elements of the Bureau have moved on to exploiting female employees as “bait” in yet another immoral subterfuge. Perhaps disclosing the specific sites involved this time would compromise another covert operation in some way. Perhaps the Bureau itself doesn’t know quite which child porn sites it is ultimately responsible for, as the total has spun out of all control these days.