Search TorNews

Find cybersecurity news, guides, and research articles

Popular searches:

Home » News » Government & Policy » FBI Alert Tip-Off Allowed Australian Dark Web Suspect to Destroy Evidence, Police Allege

FBI Alert Tip-Off Allowed Australian Dark Web Suspect to Destroy Evidence, Police Allege

By:
Last updated:November 26, 2025
Human Written
  • Australian law enforcement alleges that dark web suspect Marc Conyard got a direct warning from the FBI concerning his illicit internet activities to cease his actions.

  • Rather than complying with authorities, the police claim that Conyard used the warning as an avenue to instantly erase all digital devices, attempting to wipe off critical evidence connected to the charges.

  • The suspect currently faces various charges, such as possessing child abuse material and the purposeful destruction of legal evidence, further worsening his legal situation.

Police FBI Warning Tip-Off Let Australian Dark Web Suspect Destroy Child Abuse Evidence

In a rather disturbing incident for international policing corporations, local police authorities alleged that a suspected Australian dark web user had deleted crucial digital evidence in a child abuse litigation against him.

Notably, the Federal Bureau of Investigation (FBI) issued an informal warning to Conyard. The agency warned Coonyard to stop posting child sexual abuse videos on forums on the dark web after the agency tracked the nefarious activities to him.

Currently, international law enforcement bodies have raised multiple charges against Conyard. The charges include being in possession of child sexual abuse material and purposely erasing evidence after the FBI had allegedly warned him. Prosecutors allege that he has acted upon the high-degree warning issued to him.

The Warning and the Purported Cover-Up

According to police reports, the first alert to authorities regarding a potential offender was an FBI operation based in the United States that aimed to disrupt the unlawful distribution of child abuse material on the dark web. This action is part of the FBI’s wider campaign against digital threats, which also includes public warnings about sophisticated attacks like the recent Gmail cookie theft attack, bypassing 2FA.

The FBI had also communicated with Australian police authorities concerning this person. The international agency even issued an informal warning to Conyard to prevent him from additional criminal activity.

Instead of taking this warning as a preventative measure to cease ongoing illegal activities, Conyard even did the exact opposite. According to law enforcement, only after a few minutes of getting the warning, the suspect started a systematic process of online data destruction.

Investigators noted that the goal of his destruction was to erase files, browser history connected to the alleged possession and sharing of illicit content, and communications. This illegal action is the foundation for the charge of “purposely erasing evidence,” which is a severe criminal offence that suggests obvious premeditation and even an effort to obstruct justice.

Ultimately, international investigators issued a search warrant at his property, but court files show that the evidence obtained from his property was way less substantial than expected. Thus, investigators connect the incident to the FBI’s tip-off.

The Dark Web Allegations and Charges

The defendant’s actions and his association with the dark web have made the case more complicated. Following the tracking, investigation, and subsequent raid, prosecutors charged Conyard with possessing child abuse material, a charge with serious consequences. Australian courts have demonstrated a low tolerance for such offenses, as seen in the recent case of an Australian man jailed for 19 years in a dark web child abuse case, highlighting the potential penalties Conyard now faces.

In addition, the distinct element of this litigation is the particular charge of erasing evidence, which comes with its own unique and serious penalties. By purportedly trying to erase his devices, the suspect not only complicated the simplicity of the original prosecution but even bolstered the prosecutor’s secondary charge against him.

It is worth noting that court proceedings are anticipated to focus mainly on forensic analysis of the confiscated devices. Prosecutors aim to use the results of the analysis to determine the kinds of material that Conyard allegedly destroyed. They also aim to establish the timeframe between the FBI’s informal warning and the data erasure.

Share this article

About the Author

Joahn G

Joahn G

Cyber Threat Journalist

Joahn is a cyber threat journalist dedicated to tracking the evolving landscape of digital risks. His reporting focuses on ransomware gangs, data breach incidents, and state-sponsored cyber operations. By analyzing threat actor motives and tactics, he provides timely intelligence that helps readers understand and anticipate the security challenges of tomorrow.

View all posts by Joahn G >
Comments (0)

No comments.