The Power of OSINT in Catching Predators: An Admin’s Perspective

Published:

spot_img

Investigation into CSAM Marketplace: Uncovering the Dark Web Operation of ‘JoeHaze’

#OpChildSafety Investigation Uncovers Disturbing CSAM Marketplace

The #OpChildSafety investigation, initiated on March 12th, 2024, by a threat researcher from W1nterStorm, codenamed CR-2, uncovered a dark underworld within a Facebook group named ‘Modeling 4 Kidz’. This group, initially linked to the CSAM network Hydra, was a facade for a vile marketplace catering to individuals with depraved interests.

Among the threads in the group, a user named JoeHaze lured members to a private WhatsApp community, where CR-2 stumbled upon some of the most horrific CSAM she had ever encountered. The investigation led to the unmasking of ‘FunnyUncle’, the admin of this underground marketplace, whose lack of online security measures proved to be his downfall.

Despite facing resistance from law enforcement agencies like the IWF and NCMEC, the investigation continued, eventually identifying ‘FunnyUncle’ as Joseph Jaeger Hayes from Tallahassee, Florida. Armed with information from OSINT Industries, CR-2 pieced together Hayes’ online activities, including his involvement in distributing CSAM on Telegram and the dark web.

As the investigation neared its conclusion, a detailed report was compiled and sent to Interpol and the Tallahassee police department. The question remains – why isn’t the world prioritizing the protection of children from such heinous crimes? The #OpChildSafety movement aims to bring awareness to the issue and hold perpetrators like Hayes accountable for their actions.

The fight against child exploitation continues, with dedicated individuals like CR-2 leading the charge. The hope is that one day, communities will be alerted to the presence of predators like Hayes, ensuring the safety of children everywhere. Watch the full story unfold in the embedded video above.

spot_img

Related articles

Recent articles

Over 8,000 ChatGPT API Keys Exposed: What You Need to Know

The Growing Security Challenge of Exposed ChatGPT API Keys As artificial intelligence (AI) continues to advance, its integration into mainstream software development comes with newfound...

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...