In some of these cases, the subject introduced obscene or lude content, often exposing what the perpetrator thought was a child to pornography or requesting the child produce and send sexual or pornographic images for them. Four of those cases were concluded with arrests. Thirteen cases were established that met the threshold for arrest. Some of these conversations involved the arrangement of sex with a minor in exchange for monetary compensation. During many of these exchanges, the subjects directed conversations towards sex with persons they believed to be minors. Over the course of the operation, investigators had more than 43 exchanges with persons on various social media or internet platforms. Since 2014, the Georgia ICAC Task Force has arrested over 166 people in similar operations. The children these predators target are both boys and girls. Online child predators visit chat rooms and websites on the internet, find children, begin conversations with them, introduce sexual content and arrange a meeting with the children for the purpose of having sex. Additionally, the operation targeted those that are willing to exploit children by purchasing sex with a minor. The goal of “Operation Threat Level Midnight” was to identify persons who engage in sexually explicit communication with children on the internet, arrange to engage in a sex act with the child, and then travel to meet the child for the purpose of having sex. Four mobile devices were seized as evidence during the operation. Every individual arrested during the operation believed they were going to meet with a child and engage in prearranged sex acts. The arrestees traveled from areas around South Georgia with the intent to meet a child for sex. The operation took several months of planning and involved the collaboration of 11 law enforcement agencies and the United States Attorney’s Office Middle District of Georgia. “Operation Threat Level Midnight” was a proactive effort centered in Bainbridge, GA. David Salas, 45 years old, from Leesburg, GA, unemployed, charged with OCGA 16-5-46: Trafficking of Persons for Sexual Servitude.Īdditional charges and arrests may be forthcoming.Jason Zaborske, 48 years old, from Tallahassee, FL, occupation: cook charged with OCGA 16-12-100.2(d)(1): Computer or Electronic Pornography and Child Exploitation Prevention Act of 2007.Alex Terrell Harvey, 36 years old, from Albany, GA, occupation: truck driver charged with OCGA 16-5-46: Trafficking of Persons for Sexual Servitude.Fudencio Ruiz Tum, 36 years old, from Cairo, GA, occupation: plumber charged with OCGA 16-5-46: Trafficking of Persons for Sexual Servitude.Obtaining Criminal History Record Informationīainbridge, GA (March 7, 2023) – As a result of a proactive online undercover investigation coordinated by the Georgia Internet Crimes Against Children (ICAC) Task Force, the Georgia Bureau of Investigation’s Child Exploitation and Computer Crimes Unit (CEACC), the Decatur County Sheriff’s Office, and the United States Attorney’s Office, Middle District of Georgia, four people were arrested over a three-day period beginning Thursday, March 2, 2023. Georgia Criminal History Record Restrictions Looks like my guess was correct - this was probably a mistake on CloudFlares part.GAPS - Georgia Applicant Processing Service Thats not good for PR.īut my guess is that this is some sort of mistake and the warning will dissapear shortly.Įdit: Now, an hour later, the warning page is not displayed anymore. I would, however, worry about the people I distribute the link to seeing that message and believing I am the phisher. I would not worry about my own security (anymore than I already do when clicking an obfuscated URL). Is there cause not to go to and create redirect links for my lengthy URLs? Maybe it is something that I've done or need to correct on my end? It is possible that someone else has hijacked the site and that is the reason CloudFlare is blocking it, but I would not bet on that. CloudFlare can change the content of because TinyURL has decided to pass all their traffic through CloudFlare. One could easily imagine a lot of their URL:s being reported as phishing, and that resulting in a block, though. It is a bit strange that CloudFlare would brand TinyURL as phishers, since obviously it is not TinyURL who is doing the phishing, but people using their service to generate obfuscated URL:s to dodgy sites. CloudFlare is a CDN that TinyURL apparently uses. Is says so right at the bottom of the warning message. What authority has deemed this a phishing site?ĬloudFlare does.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |