


There was little effort by authorities to conceal her identity, as would normally be the protocol in a case such as this, and she has since dropped off the radar.Īll of her personal webpages promoting her modeling career have pulled offline, and very little information can be found on her, however there is a photograph of her in an advertisement for FMD (Fashion Model Directory) and, it's claimed, the picture appears to be current, that is, she looks at least a couple of years older then when last seen. And that's all I know about Mariya Babko, most of which is rumor or conjecture. Her only connection to the "deep web" is that that's largely where the infamous pics and vids are being traded.The user’s online handle was “Pewter,” and while logged on at a website called Playpen, he allegedly downloaded images of young girls being sexually molested. To reach the site, he first had to install free software called Tor, the world’s most widely used tool for giving users anonymity online. In order to uncover Pewter’s true identity and location, the FBI quietly turned to a technique more typically used by hackers. The agency, with a warrant, surreptitiously placed computer code, or malware, on all computers that logged into the Playpen site.

When Pewter connected, the malware exploited a flaw in his browser, forcing his computer to reveal its true Internet protocol address. From there, a subpoena to Comcast yielded his real name and address. Pewter was unmasked last year as Jay Michaud, a 62-year-old public schools administrator in Vancouver, Wash. With a second warrant, agents searched the suspect’s home and found a thumb drive that allegedly contained multiple images of children engaged in sex acts.

Last July, Michaud was arrested and charged with possession of child pornography. Michaud’s is the lead case in a sweeping national investigation into child porn on what is known as the dark Web, a universe of sites that are off Google’s radar where users can operate with anonymity.Īs criminals become more savvy about using technology such as Tor to hide their tracks, investigators are turning to hacking tools to thwart them.
