Fatal flaws in Operation Ore - the full story
By Duncan Campbell
Posted on 10 May 2007 at 09:03
In 2005, PC Pro revealed how computer evidence used against 7,272 people in the UK accused of being paedophiles had been founded on falsehoods. The misleading evidence, which claimed that every user of a Texas porn portal had to click on a banner advertising child porn to access illegal websites, was withdrawn last summer.
'It's specifically not alleged that [the accused] would have... seen a banner saying "Click Here Child Porn",' a British court was told.
The climb-down came too late for many: between then and now, the death toll of those who have killed themselves under pressure of the investigations in 'Operation Ore' has risen from 33 to 39.
Hundreds of police raids across Britain found no evidence that many suspects possessed, or were even interested in, child pornography. Because of the huge volume of computers and disks seized for examination, police high-tech crime capabilities were reportedly crippled for years.
Now, PC Pro can exclusively reveal that not only did police evidence in Operation Ore pretend users had asked for 'child porn', but that many of the Britons who have been publicly branded dangerous paedophiles were merely victims of systematic credit card fraud - some of it run by a Mafia crime family - and had never subscribed to the websites.
Is your business a social business? For helpful info and tips visit our hub.
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- Apple Watch, iPhone 6 and 6 Plus: Tim Cook's Apple back with a bang?
- BT Home Hub 5: how to get maximum speed
- 20 years of PC Pro: one-star reviews (including "the worst tablet we've ever seen")
- 20 years of PC Pro: our best covers
- Why we've closed the PC Pro forums
- How to sell more ebooks on Amazon
- 10 ways to make your business more secure
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office