Home » Featured » Co-Admin of The Love Zone Admits to Running Another Deepweb Child Porn Site
Click Here To Hide Tor

Co-Admin of The Love Zone Admits to Running Another Deepweb Child Porn Site

In 2014, Taskforce Argos took down the child porn site The Love Zone (TLZ) and captured Britain’s “worst pedophile ever. The site’s administrator, Shannon McCoole, testified against several co-admins following his arrest. One man, a 33-year-old from Bornholm, was just discovered to be one such co-admin while running another child porn site.

In February 2016, Danish police raided the home of the Bornholm man, seizing 56,594 images and 3,174 videos. All images and videos were contained on terabytes of encrypted storage mediums. Investigators, at the time of this article, had not yet recovered everything on the drives.

After McCoole’s arrest, the man testified against many of the co-admins and provided login passwords to the site. The passwords alone contributed to the arrests of 23 members of TLZ, both viewers and admins alike. The arrest of a 48-year-old from Denmark, in late 2015, made headlines in several publications; when the 48-year-old was on on trial, McCoole testified against the man specifically.

The 48-year-old, McCoole claimed, was one of the largest sources of child pornorgraphy on in the world. “He helped me find original child pornography material. In general, TL [the 48-year-old] had seen so much material that if he had not seen something before, then it had to be new,” McCoole said. The 48-year-old was arrested with 100,000 images and 600 videos in his possession. He was sentenced to seven years in prison.

Within a month of TL’s trial closing, the 33-year-old from Bornholm was raided and arrested by Danish police. Police arrested the 33-year-old in connection with TLZ and information provided by the aforementioned 48-year-old.

In the courtroom, the 33-year-old acknowledged many of the charges against him. His acknowledgement made the case more difficult for prosecutors. He acknowledged his role as a co-admin of TLZ where he provided and curated media. Many of the images in his possession came directly from the previously convicted 48-year-old. Despite acknowledging and, in part, admitting his administrative role, he pleaded not guilty.

Ulrik Sjølin Pedersen, the man’s lawyer, claimed any activity associated with TLZ ended when TLZ was taken down. His client, the lawyer told reporters, would like to plead guilty but only if the circumstances are right.

While discussing TLZ administration, the 33-year-old spoke of another darknet child pornography site that had previously been unknown to Danish law enforcement. The Bornholm man spoke of being the owner and administrator of a Scandinavian-only site called DanBB. He revealed that the site shared many similarities with TLZ, including that members must upload unique content once a week. In contrast with TLZ, all members of DanBB must be Scandinavian-speaking. No other languages were permitted.

The images and videos on the site were shared with TLZ. However, prosecutor Pernille Munch said that much of the media was of a more serious variety. The overwhelming majority of images depicted sexual acts against children instead of a mixed bag of content.

Munch said the hearing only lasted two hours due to the defendant’s cooperation but the prosecution is unsure how to proceed. He will receive a minimum prison sentence of two years, regardless of the changes that may occur. The defendant is also being charged with possession of cannabis but this is unlikely to have an impact on sentencing.

Two more members of deepweb child porn sites are expected to be in a courtroom for hearings within a month. A 35-year-old and a 41-year-old have been arrested in connection with TLZ and similar sites. One of the suspects will be testified against by McCoole, via video conference.

No convictions have made.

One comment

  1. Metallica decided their first album “kill em all” to these scumbags

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Captcha: *