Matthew David Sluss |
Eric C. Hagen |
Jim Finn |
Sluss had been working in the IT profession (he holds an associates degree in computer science from Allegany College of Maryland), he owned an internet hosting service at www.guildsolutions.com.
Besides the child pornography charges, Sluss was formerly been charged with unlawful possession of a credit card number, being in receipt of a stolen credit card, receipt of a credit card unlawfully, being a fugitive from justice (the Arkansas incident), child abuse by custodian, battery and theft.
On March 12th, 2012, U.S. District Judge Ellen B. Hollander sentenced Matthew Sluss, age 36, of Rawlings, Maryland, to 33 years in prison followed by lifetime supervised release for advertising child pornography through an Internet file sharing program. The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein.
Ellen L. Hollander |
According to his plea agreement, Sluss had previously been convicted of two offenses related to the sexual abuse of two minor boys and was required to register as a sex offender.
Sluss was a widespread Internet user of a publicly available peer-to-peer file sharing network and was involved in the advertising and distribution of child pornography. According to his plea, in 2009, the FBI Philadelphia Division began an undercover investigation into a user of a file sharing program, later identified as Sluss, who was sharing more than 115.000 files.
Rod J. Rosenstein |
During November and December 2009, the FBI downloaded 108 images and one video that contained visual illustrations of minors engaging in sexually explicit conduct. At that time, Sluss was residing in Denver, Colorado and a search warrant was executed at his home.
Law enforcement seized multiple computers and hard drives from the residence. Sluss advised the agents that he was previously employed as a network administrator, and that he hosted his own mail server and website, so, according to Sluss (seems like a make-believe), all of the data on his computers and hard drives was encrypted to protect the “documents” and prevent anyone without the appropriate password from viewing the files. A forensic review of the computers and hard drives revealed that much of the data was encrypted.
By February 2010, Sluss had moved to his parents’ home in Rawlings, Maryland, and on February 8th, 2010, registered as a sex offender with Maryland’s Sex Offender Registry, as required due to his previous convictions.
In spring and summer 2010, five separate law enforcement officers working in an undercover sting, determined that Sluss was downloading and sharing large amounts of child pornography over a publicly available file sharing program. The FBI’s Baltimore, Buffalo, Miami, and Sacramento Divisions, as well as the Toronto, Canada Police Service, all downloaded child pornography being shared by Sluss over the Internet. Video surveillance was conducted at Sluss’s residence in August and September 2010, during which Sluss was observed sitting at his computer in his bedroom, using the file sharing program and downloading images and videos of child pornography.
On September 15th, 2010, the FBI executed a next warrant at the Sluss home. Just prior to the execution of the warrant, Sluss was observed sitting at his computer in his bedroom using the file sharing program. As agents entered the residence, Sluss attempted to block the agents’ entrance at the kitchen door. As the agents began to enter, Sluss ran towards his bedroom (like a little child), where he was stopped by an agent who entered the residence through Sluss’ bedroom window.
When law enforcement agents viewed Sluss’s computer, the computer was logged onto the file sharing program and investigators were able to view the recent chat history between Sluss and his pedophile socalled “friends” on the file sharing program, as well as to access much of the data on Sluss’s various PCs.
One of the computers wired to Sluss’ bedroom was located in the rear of the crawl space under the first floor of the residence. Investigators were able to view and copy most of the data contained on this computer, which revealed over 25.000 files containing images and video of child pornography. One of the computers in Sluss’s bedroom contained much encrypted volumes.
According to the plea agreement, the file sharing program used by Sluss contains a “chat” feature that allows the user to communicate with others who use the program either through “private” or “public” chats. A review of Sluss’ computer revealed numerous chats from Sluss using the file sharing program in which he encourages the production, transportation, and distribution of child pornography. Specifically, Sluss encouraged his pedophile “friends” to make videos of boys engaged in sexually explicit activity by webcam, and share those videos with Sluss.
For example, in early September 2010, Sluss posted the following messages:
- “I don’t want teens... But I’m not giving out the private shares unless I get similar back... preteen...”
- “And again, im looking for stuff that is very recent. im spending HOURS each day... getting boys to go private for me i want the same.”
SOURCES:
FBI
http://www.baltimoresun.com/
http://www.thebaynet.com/
http://evil-unveiled.com/
http://usatoday30.usatoday.com/
Keine Kommentare:
Kommentar veröffentlichen