Earlier this year we brought you an in-depth exposé of how, for 12 days in February and March, the Federal Bureau of Investigation (FBI) ran the world’s largest child porn site, Playpen. According to newly unsealed documents, Playpen wasn’t the only site containing child pornography on FBI servers.

The piece above can handle the in-depth explaining (if you’re interested), but it went down like this: the FBI seized the site, ran it on government servers for 13 days and attempted to ensnare pedophiles through malware. The malware, known in law enforcement as a “network investigative technique” (NIT), tried to infiltrate layers of security TOR users employ when accessing the dark web. In at least a few cases, it worked.

According to an FBI affidavit:

In the normal course of the operation of a web site, a user sends “request data” to the web site in order to access that site. While Websites 1-23 operate at a government facility, such request data associated with a user’s actions on Websites 1-23 will be collected. That data collection is not a function of the NIT. Such request data can be paired with data collected by the NIT, however, in order to attempt to identify a particular user and to determine that particular user’s actions on Websites 1-23.

Put simply, “websites 1-23” were operated at a government facility for an undefined period in an attempt to snag potential child predators.

Sarah Jamie Lewis, a security researcher, told Ars Technica: “it’s a pretty reasonable assumption” that the FBI was, at one point, running nearly half of all known child porn sites hosted on Tor-hidden services. Lewis runs OnionScan, an analysis tool that uses bots to map out the dark web and look for vulnerabilities. She began her researching in April of this year, and as of August, she’s mapped 29 unique child porn-related sites on Tor-hidden servers.

The issue — aside from the FBI’s above-the-law approach at investigation — is the use of a single warrant to hack thousands of computers. The Playpen investigation netted some 1,300 unique internet protocol (IP) addresses. Of these, fewer than 100 cases made their way to court, and judges in Iowa, Massachusetts, and Oklahoma ruled that the FBI’s investigation techniques violated current laws of federal procedure.

Other judges have taken issue with the unlawful search but failed to go as far as suppressing the evidence collected.

While no one would argue that child sex abuse is among the vilest of possible crimes, law enforcement’s handling of the matter is equally disturbing. The perpetuation of child sex abuse by allowing these sites to continue operating is akin to victimizing the child all over again under the guise of an investigation.

In a world bound by law and governed by order, there’s no side-stepping the issue: the FBI is committing the same crime as the criminals it’s putting behind bars. In the end, you have to attempt to reconcile whether the action of facilitating child sex abuse is worth the means — the capture of 100 alleged pedophiles.

Along the way you’ll have to ask yourself if an agency designed to uphold the law is warranted in breaking it.

We’ve reached out to our FBI contacts for comment and will update if needed.

FBI operated 23 Tor-hidden child porn sites, deployed malware from them on Ars Technica

Read next: Facebook puts a stop to race-targeted advertising for housing, credit, or employment