Long awaited answers: revelations of a professional pedo hunter


OpChildSafety is an online child safety initiative supplemented by civilians like you and me, just trying to make the world a little bit safer for kids. After all, we’re living in an age where kids are not being protected, neither by online game developers nor by social media or messaging platforms.

Because they’re undefended, a Child Sexual Abuse (CSAM) epidemic has blazed out of control across the world, driven by depraved reprobate criminals fixated on monetizing, distributing, and proliferating CSAM. According to reports, there are approximately half a million predators online any day of the week, with record-breaking amounts of reports flooding into reporting platforms.

To put this into perspective, the National Center for Missing and Exploited Children (NCMEC) alone receives an average of 80,000 reports a day and shows no signs of decreasing in its annual statistics.

ADVERTISEMENT

Simply put, the infrastructure to combat this epic monster does not exist. This is why civilian vigilantes volunteer to fill this vacuum. However, with most lacking an understanding of how investigations work, is it possible grassroots movements are causing more harm than good?

Konstancija Gasaityte profile Gintaras Radauskas Paulius Grinkevicius Marcus Walsh profile
Get our latest stories today on Google News

Experience speaks

I wanted to know more about how this epidemic is fought, this time not by a cyber vigilante but by a professional hunter who has worked cases alongside law enforcement. So, I interviewed Arthur Howell, a man with over a decade of experience in supplementing investigations in the fight to make the internet a little bit safer for kids.

He was once a firefighter and served in the US Army right out of High School. He has a career background in digital forensics and obtained his associate's degree in digital forensics from Perdue University. He started working soon after as a contractor for various US government departments, including murder cases.

This allowed him to work as a contractor under sworn federal agents for the Innocent Images National Initiative (IINI). As he explained in the interview, it is common practice for contractors to be rotated regularly to manage the psychological and emotional impact these investigations carry, which also helps to safeguard productivity and flexibility.

“The duration of rotations varied, often lasting either 6 months or one year, depending on the assignment and operational needs. I personally completed two rotations. The IINI program has since been integrated into the Violent Crimes Against Children (VCAC) program, which continues the mission of combating these heinous crimes,” said Arthur.

Due to the sensitive nature of his casework, much of the specifics of what he worked on cannot be published. However, he was more than willing to discuss general investigative procedures and how civilian ‘helpers’ can impact the process.

ADVERTISEMENT

Damage by outsiders, lack of training, and mistaken identity

I wanted to delve right into the hard questions. Countless hacktivists seemingly do not know what they are doing. I have witnessed firsthand the damage they’ve caused to active investigations that could have resulted in the dismantling and arrests of CSAM markets.

“Generally, outside interference stems from a lack of understanding of the investigative techniques used by trained professionals. Fortunately, I have not personally encountered interference in my investigations—something I consider a stroke of luck. However, when such interference does occur, the consequences can be severe,” Arthur said.

He went on to explain how there are usually three outcomes of outside involvement in an investigation. The following describes three scenarios that can unfold.

Best case scenario

The interference has no significant impact. We document the incident and proceed with the investigation. Occasionally, legal doctrines like the silver platter doctrine may apply, allowing evidence to be used in good faith if obtained properly.

However, when dealing with CSAM (Child Sexual Abuse Material), the laws are stricter. For example, even possessing such material to turn it over to law enforcement is a crime. The safest course of action is to report suspicions to your local FBI field office (or its equivalent in your country) without attempting to collect evidence yourself. A simple report like, “I believe ‘Bob’ showed me an exploitative image of a child,” is sufficient. You do not need to prove anything. Law enforcement will handle the investigation, gather evidence, establish probable cause, and proceed legally. Attempting to bypass this process risks violating someone’s rights.

“There are numerous cases of vigilantes falsely accusing individuals of heinous crimes, such as pedophilia. These false accusations can destroy an innocent person’s life, sometimes leading to tragic consequences, including suicide. These mistakes underscore the importance of leaving investigations to trained professionals who follow legal procedures.”

Average scenario

The evidence provided by well-meaning individuals complicates the investigation, diverting valuable time and resources. A key legal concept, fruit of the poisonous tree, can render all subsequent evidence inadmissible if the initial evidence was gathered improperly. Warrants, subpoenas, and other investigative steps based on that evidence could be invalidated, potentially derailing the entire case.

ADVERTISEMENT

Worst case scenario

The person attempting to assist could inadvertently incriminate themselves and face the same charges as the individual they were trying to expose. If someone breaks the law while collecting evidence, we are obligated to inform the investigating officers, leaving prosecutors to determine whether charges are appropriate. This could lead to well-intentioned individuals being prosecuted and branded in the same way as the offenders they sought to stop.

Furthermore, he explained how the outsiders who get the perpetrator wrong are among the worst scenarios, as a false accusation of this magnitude could understandably destroy an innocent person’s life.

“There are numerous cases of vigilantes falsely accusing individuals of heinous crimes, such as pedophilia. These false accusations can destroy an innocent person’s life, sometimes leading to tragic consequences, including suicide. These mistakes underscore the importance of leaving investigations to trained professionals who follow legal procedures,” he said.

Systemic challenges and avenues of prevention

Arthur explained that the existing infrastructure between law enforcement and their collaboration with non-profits is more robust than people are aware of. However, several choke points stand in the way of progress.

  1. Prosecuting attorneys are in short supply
  2. The FBI needs more sworn agents to handle the groundwork.
  3. Better human resources standards because the FBI's rigorous standards make the hiring process difficult.

The way he put it, increasing the FBI’s use of contractors to enable flexible scaling of investigations as needed could help broaden the scope of manpower to satisfy the workload.

Additionally, advocating for an increased FBI budget for their Violent Crimes Against Children (VCAC) program is vital. But when it comes to systemic changes within governmental agencies, such changes require citizen involvement, such as writing to your State Legislators, proposing evidence-based laws, and for citizens to strive to run for office if they hope to make a positive impact toward meaningful change.

He said increasing budgets could help, but other solutions could be explored, such as harsher punishments, which could act as a deterrent.

ADVERTISEMENT

This is something I’ve meditated on before because the sentences handed down to child predators aren’t proportionate to the violent life-altering crimes they are committing against vulnerable children.

“Beyond legislation, we need to fund more research into the psychological and sociological factors driving this behavior. Understanding the root causes could lead to more effective prevention strategies,” he said.

He went on to explain how addressing cultural norms that normalize harmful behaviors (e.g., child marriage, exploitation, or age-inappropriate relationships) and reforming age-of-consent laws across the United States would be a major step in the right direction. Due to numerous exceptions for child marriages, this creates legal ambiguities.

“By establishing clearer, standardized laws, we can eliminate gray areas and make it easier for juries to deliver just verdicts.”

“Finally, advocating for mental health resources is essential. Encouraging individuals who struggle with these impulses to seek help could prevent crimes before they occur. Tackling the root causes of this behavior requires robust scientific research and a societal commitment to early intervention.”

“Beyond legislation, we need to fund more research into the psychological and sociological factors driving this behavior. Understanding the root causes could lead to more effective prevention strategies.”

Moreover, he explained that until the justice department can reach a 1:1 ratio of prosecutors, investigators, and agents to carry the workload from these cases, there will always exist a gap in resources.

“The closer we get to this ideal, the more justice we can deliver to victims,” he said.

Until that vacuum is sealed, everyone involved in this initiative must do what they can with the resources available to them.

“Progress requires constant effort, innovation, and public support to expand the capacity of those on the front lines of these investigations.”

ADVERTISEMENT

This confirmed my suspicion, and not only mine but also others I know who recognize that something is wrong with the system. How it can work for some, but not others. Reporting CSAM to authorities almost feels like a game of drawing straws, where most people are drawing short straws.

The demand for qualified personnel seemingly disadvantages the entire process. The process stems from the ability to triage and weigh the merits of each report received, determining whether they meet probable cause criteria to obtain warrants, make arrests, prosecute cases, and incarcerate bad actors.

The elements in this wheel require a lot of moving parts and cannot be fulfilled by any one individual. Thus, when civilian ‘pedo hunters’ perceive this gap, is it any wonder why they try to fill in the gaps?

Aside from self-incrimination by downloading evidence in the form of prohibited images and videos which must never be done under any circumstances, the inherent lack of training, juvenile posturing, attention-seeking, boasting, disrupting investigations, and ultimately destroying evidence is largely why the FBI and other agencies do not work with cyber vigilantes.

If you think about it, perhaps law enforcement and organizations like the NCMEC should offer training and certification programs to the public. This could help reduce vigilantism while enabling a qualified public apparatus to supplement investigations under their guidance.

Understanding the reporting process

According to Arthur, non-profit organizations like the IINI and the NCMEC utilize a structured triage management incident response system to prioritize the abundant reports they receive. This helps to effectively safeguard the allocation of resources, also so that cases that require urgency receive immediate attention.

“Their triage processes are tailored to legal and investigative priorities, differing from traditional medical triage systems. Factors such as the statute of limitations on certain crimes significantly influence case urgency, as timely action is crucial for legal proceedings. Additionally, the nature and specificity of evidence play a role in prioritization; unique or highly specialized evidence may require particular attention and involve specific forensic expertise.”

What about when reports seem to go unheard? This is something that troubled just about everyone familiar with OpChildSafety.

“This question raises an important point, and my response begins with a clarifying question: is it that no action has been taken, or is it that the specific action the reporter expected hasn’t occurred within the desired timeframe?”

ADVERTISEMENT

“A hallmark of professional investigations is the principle of non-disclosure during active cases, which prevents compromising their integrity.”

Additionally, it has to be said that profiles hunters stumble upon across social media could be used for sting operations. On the user end, we aren’t going to know the difference.

“A hallmark of professional investigations is the principle of non-disclosure during active cases, which prevents compromising their integrity. In my work, I strictly adhere to this principle—even refraining from sharing case details with victims until evidence is presented in court,” he said.

Until that point, everything remains strictly confidential in order to protect the integrity of the case. Hence, why the need for secrecy can easily cause misunderstandings. What seems like inaction, carelessness, and incompetence is

“What appears as inaction may, in reality, be a thorough and ongoing investigation that cannot be publicly acknowledged. Even acknowledging a case’s existence could jeopardize its success.”

He broke down the investigative process, which is a matter of public record. The following is in his own words:

1. Reporting and Intake:

  • The process typically starts when a report is filed with a platform, law enforcement agency, or organization like the National Center for Missing & Exploited Children (NCMEC).
  • Platforms like Facebook may initially review the report to determine if it violates their Terms of Service (ToS). If the content is flagged as potentially illegal, they often escalate it to organizations like NCMEC.
  • NCMEC operates as a clearinghouse, triaging reports and forwarding actionable cases to the appropriate law enforcement agencies.

2. Triage and Prioritization:

  • Organizations receiving high volumes of reports, such as NCMEC (which processes tens of thousands of reports daily), use a triage system to prioritize cases.
  • Factors influencing prioritization may include:
  • The apparent severity of the content.
  • Immediate threats to safety.
  • Jurisdictional relevance.
  • Statute of limitations for certain crimes.

3. Initial Review:

  • Analysts or investigators review the submitted content and accompanying metadata (e.g., IP addresses, timestamps) to verify its legitimacy and determine whether it meets legal thresholds for further investigation.
  • For cases involving online content, the preservation of evidence is a key step. This often involves issuing legal requests to platforms to maintain records while the investigation proceeds.

4. Evidence Collection and Analysis:

  • If the case moves forward, investigators work to collect additional evidence. This may include subpoenas for user data, search warrants, or forensic analysis of seized devices.
  • Collaboration with platforms, ISPs, and other third parties is common during this phase. These in roads have been built over many years and are based on warrant compliance, generally.

5. Active Investigation:

  • During this stage, investigators may conduct undercover operations, analyze digital trails, or cross-reference reports with existing cases.
  • It’s crucial to maintain operational security and avoid tipping off suspects, which is why these investigations often appear invisible to the public.

6. Case Building:

  • Once sufficient evidence is gathered, law enforcement builds a case, typically in partnership with prosecutors. This involves organizing evidence, preparing legal arguments, and ensuring that all investigative steps comply with laws and regulations.
  • If charges are brought, the case enters the judicial system. At this stage, it may become public through indictments or court hearings.
  • However, until this point, confidentiality is paramount to protect the integrity of the case and the rights of all parties involved.

8. Post-Investigation Actions:

  • After a case concludes, platforms may take additional actions, such as removing content or banning accounts.
  • Law enforcement and organizations like NCMEC may use the outcomes to improve processes or inform public awareness campaigns.

A message to vigilantes

People who want to work in this field will find that it is exceedingly emotionally and psychologically devastating. “It’s emotionally grueling. Investigators are exposed to material that can deeply affect even the toughest individuals.”

It involves peering through the looking glass and witnessing the darkest aspects of humanity. While there are many people out there who are trying to do the right thing, this kind of work is not for everyone. Being able to be resilient and compartmentalize for a time, and then unpack and try to find a way to heal is easier said than done.

“For those who feel compelled to help, I encourage channeling that passion into meaningful action. Consider pursuing a career in investigations, whether as a sworn officer, a technical contractor, or in another specialized role. There are numerous ways to contribute effectively. Above all, remember that these efforts are ultimately for the victims. Every case, when handled correctly, can bring justice closer to those who need it most.”

As our interview came to a close, he emphasized the importance of supporting the victims who require far more help than bad actors who need your attention. The many are seized by the thrill of the hunt in the quest to catch bad actors, he says we owe it to the victims to seek proper training and certification to become a legitimate investigator.

There are many avenues to support this cause without potentially jeopardizing these investigative initiatives. “Interference undermines justice. Attempting to gather evidence yourself often creates a list of materials that cannot be used in court, hindering the case rather than helping,” he said.

Without question, victims need reassurance that they are not alone and that professionals are working tirelessly and legally to secure justice. Therefore, showing them there is life beyond their pain, filled with unconditional love and support could be the very empowerment that offers the strength to heal from their trauma.

“Unfortunately, as an investigator, I often couldn’t directly engage with victims due to strict professional boundaries, but you can offer the human connection and compassion they desperately need.”