Type of site | Child pornography file sharing |
---|---|
Launched | June 2019[1] |
Current status | Offline (as of mid-April 2021)[2] |
Boystown (stylized in logo as BOYS TOWN) was a child pornography website run through the Tor network as an onion service. It launched in June 2019 and was shut down by authorities in April 2021. Four German administrators of the site confessed and were sentenced to long prison sentences in December 2022.[3]
The site was launched in June 2019[3] and was run through the Tor network.[4] The server was registered in Moldovia.[5] As of May 2021, the website was considered one of the largest international darknet platforms to host child pornography and had 400,000 registered users.[2][6]
The website featured various forums and chats for communication. The illegal images and videos were posted on the forums and the chats where members were able to communicate with one another.[7] There were two chat services provided, one called "Lolipub" and the other was known as "BOYSPUB".[1] The child abuse materials exchanged between users were of young children and toddlers, most of which were boys, from around the world.[8] The child pornographic content had various categories including "Art" (which included shotacon among other subcategories[9]), "hardcore", "kindergarten", and "toddler".[1] Lolipub also had rules that included banning the promotion of hurtcore.[1]
The website was investigated by a German police task force with cooperation from Europol and international law enforcement agencies. The platform's administrators and users were under investigation for months.[2][6] Early on, the German Federal Criminal Police (BKA) was able to plant an undercover agent inside the Boystown network,[5] but identifying the perpetrators proved difficult as they only communicated via the Tor network.
To identify the perpetrators, police used a correlation analysis attack against the Ricochet chat protocol which was used by Boystown admins and operates on the Tor network. By sending Ricochet messages to perpetrators and monitoring several hundred Tor nodes for simultaneous traffic of the correct size, authorities were able to piece together the chain of Tor nodes used and the perpetrator's entry node, which then revealed the perpetrators' IP addresses.[4]
The following agencies took part in the investigation:[10]
In mid-April 2021, the website was raided by authorities and shut down.[2]
Three primary suspects were discovered and identified during the investigation: a 40-year-old man from Paderborn, a 49-year-old man from Munich, and a 58-year-old man from Northern Germany who was living in Paraguay. The suspects allegedly acted as administrators for the website and gave advice to its users on how to evade law enforcement while using the platform.[2] Another suspect was a 64-year-old man from Hamburg who was accused of being one of the most active users uploading over 3,500 posts.[2][6]
The public and the press were excluded from the trial. The suspects confessed. The man from Munich was sentenced to 12 years in prison with subsequent preventive detention ("Sicherungsverwahrung"), the man from Paderborn received a sentence of 10.5 years with subsequent preventive detention, the German from Paraguay was sentenced to 8 years in prison and the man from Hamburg received a sentence of 7 years in prison.[3]
According to the suspects, one inner-circle member of Boystown claimed to be a high-ranking employee of a German security agency who as part of his job received requests from the German government and other authorities to check the security of certain processes. He acted as an administrator for Boystown and optimized various programming scripts.[5]
Hours after the shutdown, an unknown user posted a dump of Boystown online, as confirmed by the Frankfurt prosecutor's office. The journalist group STRG_F had 13.5 TB of data deleted from various file hosters by December 2021, pointing out that investigators were only interested in hard drives of perpetrators but not in removing offending material from the internet.[11]
Three successor platforms (with 410 and 846 thousand accounts) with, among others, a common admin in Germany (a 21-year-old from Saxony) were shut down Christmas 2022. Another three suspected administrators were arrested in November and December in Seelze near Hanover,[12] Schleswig-Holstein and Brazil. The BKA secured hundreds of thousands of images.[13]