Woke33

The first thing that comes to mind is that this project has more than one ulterior motive. This sounds very suspicious.

Kahlypso79

Government holding a vast databzse of child porn... now where have I seen that before....(If someone can send this to the guy on the video.. It may be relevant to him..)

FBI software cracks encryption wall ‘Magic Lantern’ part of new ‘Enhanced Carnivore Project’ 20/11/2001 http://www.nbcnews.com/id/3341694/ns/technology_and_science-security/t/fbi-software-cracks-encryption-wall/

Magic Lantern is one of a series of enhancements currently being developed for the FBI’s Carnivore project, the source said, under the umbrella project name of Cyber Knight.

FBI Is Building a 'Magic Lantern' https://www.washingtonpost.com/archive/politics/2001/11/23/fbi-is-building-a-magic-lantern/ca972123-83a8-46d8-b95c-c2edafda0fea/?noredirect=on&utm_term=.fea02744d3c3 November 23, 2001

"If they are using this kind of program, it would be a highly effective way to bypass any encryption problems," said James E. Gordon, who heads the information technology practice for Pinkerton Consulting and Investigations Inc. "Once they have the keys to the kingdom, they have complete access to anything that individual is doing."

Fast forward a bit....

https://www.wired.com/2007/07/fbi-spyware/ FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats 18/07/2007

In an affidavit seeking a search warrant to use the software, filed last month in U.S. District Court in the Western District of Washington, FBI agent Norman Sanders describes the software as a "computer and internet protocol address verifier," or CIPAV. The full capabilities of the FBI's "computer and internet protocol address verifier" are closely guarded secrets, but here's some of the data the malware collects from a computer immediately after infiltrating it, according to a bureau affidavit acquired by Wired News.

• IP address • MAC address of ethernet cards • A list of open TCP and UDP ports • A list of running programs • The operating system type, version and serial number • The default internet browser and version • The registered user of the operating system, and registered company name, if any • The current logged-in user name • The last visited URL

and some more.....TOR gets TORpedoed for Pedo's by what appears to be.. a fully working FBI completely devoid of morals....

https://www.wired.com/2013/08/freedom-hosting/ Feds Are Suspects in New Malware That Attacks Tor Anonymity 05/08/2013

Largest facilitator of child porn on planet' must wait month for FBI case August 15 2013 https://www.independent.ie/irish-news/courts/largest-facilitator-of-child-porn-on-planet-must-wait-month-for-fbicase-29501879.html

Eric Eoin Marques (28), dressed in a grey tracksuit top and jeans, appeared before the President of the High Court Mr Justice Nicholas Kearns. The alleged charges relate to images on a large number of websites described as being extremely violent, graphic and depicting the rape and torture of pre-pubescent children. ---> https://en.wikipedia.org/wiki/Freedom_Hosting ---> https://www.irishtimes.com/news/crime-and-law/courts/court-dismisses-appeal-against-extradition-to-us-on-child-porn-charges-1.3534691

(Here's where the grey areas start to appear....not catching vile reprehensible excuses of human beings.. but the method used to catch them..)

https://www.wired.com/2014/08/operation-torpedo/ Visit the Wrong Website, and the FBI Could End Up in Your Computer 05/08/2014

On August 1, 2013, some savvy Tor users began noticing that the Freedom Hosting sites were serving a hidden “iframe”—a kind of website within a website. The iframe contained Javascript code that used a Firefox vulnerability to execute instructions on the victim’s computer. The code specifically targeted the version of Firefox used in the Tor Browser Bundle—the easiest way to use Tor. The FBI’s use of malware is not new. The bureau calls the method an NIT, for “network investigative technique,” and the FBI has been using it since at least 2002 in cases ranging from computer hacking to bomb threats, child porn to extortion. Depending on the deployment, an NIT can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates. What’s changed is the way the FBI uses its malware capability, deploying it as a driftnet instead of a fishing line. And the shift is a direct response to Tor, the powerful anonymity system endorsed by Edward Snowden and the State Department alike.

In early 2015, the Federal Bureau of Investigation ran a dark web child pornography site from its own servers for 13 days, and hacked over a thousand computers that visited it. OPERATION PACIFIER: https://motherboard.vice.com/en_us/article/qkj8q3/child-porn-sting-goes-global-fbi-hacked-computers-in-denmark-greece-chile https://motherboard.vice.com/en_us/article/3dabnw/new-case-suggests-the-fbi-shared-data-from-its-mass-hacking-campaign-with-the-uk ---> https://twitter.com/CourtNewsUK/status/697069659007414273 (1 year for 100GB of painful child abuse...) ---> https://theukdatabase.com/2016/02/09/vithusan-puvaneswaran-hayes/

Kahlypso79

The major grey area here seems to be.. The FBI was hosting the images.. what happened to them? Everyone can understand the logic of hosting the site to catch dangerous predators.. have to use the right bait, etc. etc... But where did the images go? Where did they come from?

https://eu.usatoday.com/story/news/2016/01/21/fbi-ran-website-sharing-thousands-child-porn-images/79108346/ FBI ran website sharing thousands of child porn images Published 5:36 PM EST Jan 21, 2016

WASHINGTON — For nearly two weeks last year, the FBI operated what it described as one of the Internet’s largest child pornography websites, allowing users to download thousands of illicit images and videos from a government site in the Washington suburbs. At the time, the site had more than 215,000 registered users and included links to more than 23,000 sexually explicit images and videos of children, including more than 9,000 files that users could download directly from the FBI. Officials acknowledged those risks, but said they had no other way to identify the people accessing the sites. The FBI was first known to have operated a child porn site in 2012, when agents seized control of three sites from their operator in Nebraska The next year, the FBI took control of a dark web site known as Freedom Hosting In each case, the FBI injected the site with malware to crack Tor’s anonymity.

https://motherboard.vice.com/en_us/article/gv5ggq/defense-lawyers-claim-fbi-peddled-child-porn-in-dark-web-sting Defense Lawyers Claim FBI Peddled Child Porn in Dark Web Sting Jan 8 2016, 6:00pm

"one defense team has made the extraordinary step of arguing to have their client's case thrown out completely. Their main argument is that the FBI, in briefly running the child pornography site from its own servers in Virginia, itself distributed an "untold" amount of illegal material."

(Own notes : Why use the term "untold" amount of illegal material. When most cases involving online pornography gives the amount of recovered data. Was 'other' sources mixed in and put on the top of the line FBI servers to increase bandwidth and access times..)

https://www.washingtonpost.com/world/national-security/how-the-government-is-using-malware-to-ensnare-child-porn-users/2016/01/21/fb8ab5f8-bec0-11e5-83d4-42e3bceea902_story.html?postshare=6721453401674096&utm_term=.69d62b62048f This is how the government is catching people who use child porn sites January 21, 2016

The issue, said Ghappour, the law professor, is not the use of the malware per se, but “whether hacking warrants are written narrowly enough to guarantee that only those culpable set the trigger [to launch the NIT], and consequently get hacked,” he said. “Given the scale of these operations, the smallest mistake could result in hundreds, if not thousands, of privacy violations.”

https://www.techdirt.com/articles/20161127/16260336139/fbis-nit-hit-8000-computers-120-countries-as-did-child-porn-it-was-redistributing.shtml FBI's NIT Hit 8,000 Computers In 120 Countries... As Did The Child Porn It Was Redistributing Tue, Nov 29th 2016

"Your Honor, starting with Michaud, and what we know now is there was no discussion of trying to limit the distribution. There were no protocols for these agents for handling or limiting the distribution of child pornography. And the scale of the distribution now went out to at least 120 countries, at least 1 million images. And it is absolutely mind boggling, we have not seen something like this." "We have never, in our nation's history as far as I can tell, seen a warrant so utterly sweeping. 100,000 potential targets. Something like 8700 IP addresses captured. At least 1152 open investigations. And now oddly enough only, about 214 arrests." "What's even more disturbing, even if they disagree about the efficacy of some of those methods, we now know from Agent Alfin's recent testimony which we cited, there was absolutely no discussion at the Department of Justice or the FBI about protocols in terms of handling this stuff or whether these methods of limiting, at least limiting the most egregious distribution were viable. Nobody cared."

https://motherboard.vice.com/en_us/article/aekkwk/here-is-the-warrant-the-fbi-used-to-hack-over-a-thousand-computers Here Is the Warrant the FBI Used to Hack Over a Thousand Computers Mar 8 2016, 4:50pm

https://www.techdirt.com/articles/20160401/06514734076/fbi-doesnt-want-to-share-details-exploit-it-deployed-while-running-child-porn-site.shtml The FBI Doesn't Want To Share Details On The Exploit It Deployed While Running A Child Porn Site Apr 4th 2016

https://www.techdirt.com/articles/20160512/07174834422/mozilla-asks-court-to-force-fbi-to-turn-over-information-hacking-tool-it-used-child-porn-case.shtml Mozilla Asks Court To Force FBI To Turn Over Information On Hacking Tool It Used In Child Porn Case May 12th 2016

With the Tor browser being built on the Firefox framework, any exploit of Tor could affect vanilla Firefox users. Not only that, but the FBI is apparently sitting on another Firefox vulnerability it used in a previous investigation to unmask Tor users. (This refers to the FBI's 2012 child porn sting, which also used a NIT to obtain information about visitors to a seized website.) The filing notes the FBI has been less than helpful when approached for info about this Firefox/Tor-exploiting NIT. Mozilla has contacted the Government about this matter but the Government recently refused to provide any information regarding the vulnerability used, including whether it affects Mozilla’s products. Accordingly, Mozilla requests that the Court modify its order to take into account how such disclosure may affect Mozilla and the safety of the several hundred million users who rely on Firefox. ---> September 6, 2018 - https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/ ---> August 11, 2017 - https://www.activistpost.com/2017/08/mozilla-joins-george-soross-efforts-launching-strike-fake-news.html

https://motherboard.vice.com/en_us/article/wnxbqw/unsealed-court-docs-show-fbi-used-malware-like-a-grenade Unsealed Court Docs Show FBI Used Malware Like ‘A Grenade’ Nov 7 2016 "That is, while the warrant authorized hacking with a scalpel, the FBI delivered their malware to TorMail users with a grenade," Christopher Soghoian, principal technologist at the American Civil Liberties Union (ACLU), told Motherboard in an email." ----> sidenote : Chris Soghoian : : November 13, 2012 : https://www.aclu.org/blog/national-security/privacy-and-surveillance/surveillance-and-security-lessons-petraeus-scandal "For more than a decade, a persistent myth in Washington DC, fueled by several counterterrorism experts, has been that it is possible to hide a communications trail by sharing an email inbox, and instead saving emails in a “draft” folder. This technique has been used by Khaled Sheikh Mohammed, Richard Reid (the shoe bomber), the 2004 Madrid train bombers, terrorists in Germany, as well as some domestic “eco-terrorists.” This technique has appeared in federal court documents as early as 2003, and was described in a law journal article written by a DOJ official in 2004. It is hardly a state secret." (sound familiar?) ----> https://www.cnbc.com/2018/12/17/how-to-clear-all-those-old-emails-out-of-gmail-and-reclaim-your-peace-of-mind.html How to clear all those old emails out of Gmail so you don't have to pay for storage 18 Dec 2018

"Since 2013, Google has offered users 15 gigabytes of free storage." (when did Mr Sioghan write his article? Sounds like someone somewhere said.. well, make it happen then..)

https://www.techdirt.com/articles/20190110/10014041371/sixth-circuit-appeals-court-latest-to-say-cool-if-fbi-broke-law-during-playpen-investigation.shtml Sixth Circuit Appeals Court Latest To Say It's Cool If The FBI Broke The Law During Its Playpen Investigation Mon, Jan 14th 2019

truthdemon

We all fund this debt game ...face the consequences ... If undont like this debt game ...reduce debt and get out of the debt jurisdiction.. 🙄

YogSoggoth

Anyone here good at Latin? Lincoln, Nebraska's Momo pizza menu has a campagnola (peasant, rustic woman) for 16.99 and below it just describes Lorem Ipsum, which from what I gather is possibly two of some kind of code. Lorem ipsum is also featured on Joomla!, Google Docs, and WordPress web content managers. Microsoft Word (type '=lorem()' or '=rand()' and hit enter)[9] and BBEdit (Edit-->Insert-->Lorem ipsum) have a lorem ipsum generation feature. Several LaTeX packages produce Lorem-ipsum-style text. All the other items on the menu were normal until I got there.

RedCoatTurnCoat

Lorem ipsum appears on many websites as basic examples of text. If you have built a website from say, squarespace or something the placeholder text is usually lorem ipsum blah blah some other latin style shit.

YogSoggoth

It sounded like a rough definition of pig latin to me. I still can't understand why it would be in place of a description of the two items on the bottom of the menu, or why it included the brief history of Lorem Ipsum, unless just as an Italian invention because it is an Italian restaurant. Want to see old website for Lincoln, Nebraska and Tallahassee MoMo's. Mellow Mushroom Pizza website is full of Pedo signs, and that is a fair size chain.

Judgejewdy

Look into what the nc m ec has their hands on. If you can even find it online anymore. Slot has been wiped about them on g0()gl€. And about €rn1e @llen . Go figure. The us is no better than China.

Oh_Well_ian

The NCMEC is the biggest library of CP in the world.

"Banned on Twitter for Talking about Brian Podesta and NCMEC" > https://voat.co/v/pizzagate/1678736

Wynterwhisper

Victimized the victims. I thought this sort of software was used to search for IG and Fakebook for pics of nude children to take them all down.

Turn_Coat

"test"

derram

https://www.invidio.us/watch?v=ncxtqpE0lWA&feature=em-uploademail :

I Accidentally Uncovered Something I Wish I Never Did! US Govts Darkest Secret! - YouTube


This has been an automated message.