00:00 GMT +321 September 2019
Listen Live
    Cybercrime

    Nowhere 'Tor' Hide: Notorious Sextortionist Busted by FBI in Booby Trap Sting

    CC0 / Pixabay
    US
    Get short URL
    0 60
    Subscribe

    US officials have announced the Federal Bureau of Investigation caught Californian sextortionist Buster Hernandez, who is accused of making cyber threats to young girls in order to produce child pornography, in an elaborate sting operation. The case is a further demonstration that the "anonymous" Tor browser does not offer sanctuary to criminals.

    Authorities began investigating Hernandez, who operated under the pseudonym "Brian Kil," in December 2015.

    To "sextort" his victims, Hernandez is said to have created multiple social media accounts, contacting underage female targets via private messages, suggesting he possessed "dirty pics" of them, and threatening to send the offending snaps to the victim's family and friends if they didn't provide him with more.

    The FBI's court filing suggests Hernandez targeted victims in "at least 10 federal districts" between 2012-2017, extorting images from girls as young as 12.

    The first case outlined in the filing claims "Kil" talked one girl into sending him naked pictures of herself, which he then posted to a Facebook account, disseminating child pornography in the process.

    When the victim began to resist, "Kil" threatened a Columbine-style attack on her high school (Plainfield High, Indiana), as well as neighboring Dansville High School.

    "Tomorrow will be a f***ing bloodbath at Plainfield High. I will open fire on all you sickening pieces of s***. I have in my possession three homemade pipe bombs, two handguns and one semi automatic rifle. I will be targeting [the victim] personally," he wrote.

    The threat led to both high schools closing, and their constituent towns erupting into chaos, as they tried to identify "Brian Kil" and stop him — they have also since given Hernandez two further charges (threats to use an explosive device, and threats to injure).

    However, authorities were unable to locate this "Kil," because the IP address connected to the account was a Tor access node, thus rendering him anonymous.

    "Kil" soon moved on from Plainfield and began targeting new areas, creating fresh aliases and dozens of Facebook accounts to contact victims, while also using text messages, Twitter, and Dropbox to send sextortionate messages and threats. He also boasted about not getting caught, saying he had "a lot more stealing and blackmailing" to do and wished to become the "worst cyber terrorist that ever lived."

    He also said he would add a "dozen dead police" to his "tally," and said it would take a "miracle" for authorities to find him, as they were "useless."

    Determined to catch the predator, the FBI contacted one of Hernandez' victims while she was still in communication with "Kil," and created a non-pornographic video for her to send to him.

    The video contained a small scrap of code, known as a Network Investigative Technique, into the file. It recorded the real IP address of the suspect, connected to a home in Bakersfield, California, then sent it to the FBI.

    The Bureau didn't stop there. In order to further their case, agents installed a camera on a pole outside the address linked to the IP, and added surveillance to all internet traffic coming and going from the location. Via the wiretap, the FBI also found instances of the IP viewing images of the Columbine massacre on imageboard site 4chan, as well as child pornography.

    26-year-old Hernandez, who seldom left his house, was quickly identified as the culprit, and arrested August 7.

    He is charged with threats to use an explosive device, threats to injure, and sexual exploitation of a child. He faces a minimum of 15 years behind bars and a maximum of 30 years, if convicted on all counts.

    The case serves as a palpable demonstration that Tor — frequently vaunted as an entirely anonymous form of web browsing — does not offer any degree of invisibility if authorities are suitably determined to catch a user, and their crimes are requisitely severe.

    As US Attorney General Jeff Sessions remarked in July, when an international sting operation entrapped users of Hansa Market — a key dark web resource for the purchase and sale of guns — drugs and malware, the dark web is "not a place to hide," and law enforcement agencies will "continue to find, arrest, prosecute, convict, and incarcerate criminals, drug traffickers and their enablers wherever they are."    

    Related:

    US-Led Entrapment of AlphaBay Users Shows Dark Web Anonymity Is Illusory
    Threat For Hire? Teen Who Targeted JCC Sold Services on Dark Web, Says FBI
    How an Ethical Hacker Helped the FBI Crack the 'Most Bizarre' Murder Case
    Tags:
    cyber criminal, sextortion, teenagers, pedophile, deep web, crime, extortion, high school, dark web, investigation, terrorist, cyber crime, sex, Tor, Federal Bureau of Investigation (FBI), Buster Hernandez, United States, California
    Community standardsDiscussion
    Comment via FacebookComment via Sputnik