Jump to content

Attempted set up of Stewart Rhodes & Dan Johnson


Recommended Posts

Posted

This is crazy, but I don't put anything past the gun haters.

http://www.youtube.com/watch?v=XYVvuDRstDw#at=37

 

Someone just attempted to set-up Stewart Rhodes (founder of Oath Keepers) & Dan Johnson (founder of People Against the N.D.A.A) by sending child porn to Dan Johnson's email from a tormail.org anonymous email account, pretending to be Stewart. Clearly, they knew Dan and Stewart work together on anti-NDAA nullification legislation, so they tried to trick Dan into opening the files containing child porn by impersonating Stewart Rhodes. Fortunately, Dan realized it was a tormail email and not actually from Stewart, so he did not open the attached pdfs. PANDA'S internet security expert was able to determine that the files contained child porn without opening them. This attempt to set Dan Johnson up failed.

This attempt is very similar to the July 3 attempt to set up activist Luke Rudkowski, where someone claiming to be a whistle-blower emailed Luke saying he had some incriminating pictures of Bilderberg elites, which Luke was able to see with his "view" function and determine were actually child porn without opening them. Once Luke did a video exposing the attempt, he was contacted by the hackers who bragged that they were going to do the same thing to other alternative media activist leaders. This is something you all need to be aware of, and protect yourselves against. You can expect more of these malicious smear campaign attacks to happen going forward.

Guest Bonedaddy
Posted

What is this "view" function you speak of? I must have it, just in case, ya know.

Posted

It seems the law should go after the senders of this sickening porn at the very least! Why are they not investigating the senders and bring up charges?

  • Like 1
Posted

It seems the law should go after the senders of this sickening porn at the very least! Why are they not investigating the senders and bring up charges?

Exactly!! Maybe they are afraid they will be in their same department? Or related? This is some serious crap, even if they were proven not guilty afterwards, the reputation damage would be done and publicized more widely than a freakin Kim Kardasian wedding announcement!

Guest Keal G Seo
Posted

It seems the law should go after the senders of this sickening porn at the very least! Why are they not investigating the senders and bring up charges?

Because anything to do with Tor net is basically untraceable. It is kind of like an alternative internet. You have to do a bit of research and download a thing or two to use it but once on it with the correct software you leave nothing behind.

https://en.wikipedia.org/wiki/Tor_(anonymity_network)

Posted

Any PC pc forensics should be able to determine it was only received.  One should never be found guilty of anything because someone sent them something.

 

However, something like that while being investigated would be used by the opposite site to attempt to ruin a person in the public's eye.

 

I have no idea how they could determine what was in them by not opening.  In outlook if you have the preview panel open, you see the email. Sure you can set to not mark items read while reading in the preview window.   Also there is a open to mark items not read even after they have been opened.

 

In short, someone, IT or someone would have had to open the attachments to determine what was in them.  Beyond that I am not sure how they go about it.

Posted

It seems the law should go after the senders of this sickening porn at the very least! Why are they not investigating the senders and bring up charges?

 

You do know how the POTUS, his lackeys, and this administration run, right? Heck, Holder was probably the one who came up with the idea, lol.

Posted

Should yes, catch them, next to impossible.  The fact is a knowledgeable 'hacker' can send email or surf the internet 100% anonymous and not even the FBI is going to catch them.

 

Even novice computer users can do the same thing with enough protection to keep you away from state and local police departments.

 

Anonymous is alive and well on the Internet, and pissing them off is not advisable :)

 

It seems the law should go after the senders of this sickening porn at the very least! Why are they not investigating the senders and bring up charges?

 

Guest TankerHC
Posted (edited)

How to see whats in an email on Outlook without opening it.

 

 

Step 1

Launch Outlook and click on “View” within the ribbon.

Step 2

Click “Message Preview” to reveal a drop-down menu.

Step 3

Select “1 Line,” “2 Lines” or “3 Lines” to customize the size of the preview field for your messages.

Step 4

Click once on the email message that contains the picture to highlight the message without opening it. Right-click the highlighted message.

Step 5

Click “View Attachments” from the context menu. Click the picture’s file name in the context menu. This opens the Opening Mail Attachment dialog box. Click the “Save” button. Navigate to your preferred save location for the extracted picture. Click the “Save” button at the bottom of the dialog box to extract the picture and save it your computer.

 

All of them can do it one way or another, including open source and standards based. You can add photos without attachming them (Showing up with attachments) and a lot of other stuff (Track outgoing emails to see if they were opened without any capability to track back to you for example).

 

I use Constant Contact for my site promotions. They tell me how many emails that were opened, how long they were opened and success percentages on the promotions for my websites.

Edited by TankerHC
Guest Keal G Seo
Posted

Step 5

Click “View Attachments” from the context menu. Click the picture’s file name in the context menu. This opens the Opening Mail Attachment dialog box. Click the “Save” button. Navigate to your preferred save location for the extracted picture. Click the “Save” button at the bottom of the dialog box to extract the picture and save it your computer.

 

That would be a problem. This then puts you in possession of the item in question. I use gmail, most of the time (9/10) there is a thumbnail of the attachment and a "Preview" button that opens it on a Google server and opens you a webpage...this way it is only in your possession until the temporary memory is overwritten or you turn the computer off and reset the memory.

This is why so many companies online are moving to streaming bootleg movies and tv shows as opposed to torrent files. They are only stored in temporary memory similar to a YouTube videos.

Guest TankerHC
Posted (edited)

That would be a problem. This then puts you in possession of the item in question. I use gmail, most of the time (9/10) there is a thumbnail of the attachment and a "Preview" button that opens it on a Google server and opens you a webpage...this way it is only in your possession until the temporary memory is overwritten or you turn the computer off and reset the memory.

This is why so many companies online are moving to streaming bootleg movies and tv shows as opposed to torrent files. They are only stored in temporary memory similar to a YouTube videos.

 

If you preview it, its considered opened. As long as it hanst been written over 4 or 5 times (And a lot more than that in some cases) it can be recovered off the drive. I can show you a couple of pieces of freeware that will recover files going back years that you would never think could be recovered.

 

Anyone (And I am not talking about you Keal, I mean anyone) who thinks overwriting or wiping a drive will erase anything permantly is misinformed.

 

Note that the instructions for email above are not for "not" having files in your posession, its for seeing without opening.

 

You can do the above however without being in posession on your hard drive, simply by saving the file to a flash drive.

 

I dont mess with any file that might remotely harm data or drives or get spread around our network. But it has hapened inadvertently. I try to use the best AV, Anti Malware, etc, and it still gets through. I have the latest versions of Norton and Kaspersky and a couple of others, and they are not and never will be foolproof. I dont think you will see that unless you get military grade software. (The real stuff, not the stuff labeled that way).

Edited by TankerHC
Guest Keal G Seo
Posted

If you preview it, its considered opened. As long as it hanst been written over 4 or 5 times (And a lot more than that in some cases) it can be recovered off the drive. I can show you a couple of pieces of freeware that will recover files going back years that you would never think could be recovered.

 

Anyone (And I am not talking about you Keal, I mean anyone) who thinks overwriting or wiping a drive will erase anything permantly is misinformed.

 

Note that the instructions for email above are not for "not" having files in your posession, its for seeing without opening.

That is what I am saying, once you hit "Save" it is on the hard drive and can be recovered and then you are technically in possession of it. But services like GMail's preview is just a temporary file that is saved to flash memory like every other picture you view online. That memory is deleted, or more accurately "lost", when the power is shut off because of how that memory works.

This is why many programs have that "Do you want to save" button in them, because while it is there on screen it is being saved to flash memory. The save button just copies the memory version to the hard drive. Once you close that program or shut down the computer the memory loses the file and it is lost forever.

This is one of the advantages of running a computer solely off of RAM sticks, not to mention the speed boost. As soon as you unplug it EVERYTHING is gone...even the OS.

Posted
The only thing previewing a file does is reserve limited integrity. Viewing child porn on a system whether through opening a file or previewing it still gets investigated because someone can take a screen grab of the preview and save that.

Do be warned though, any "preview" functionality has the capability to store the files in cache. But this is all semantics, stored on the drive or viewed online, it will not be relevant in a child porn case because every alphabet agency in the country foams at the mouth to take out everyone and everything even remotely connected to it... And rightfully so
Posted (edited)
If they were using Tor it is very unlikely they can be traced. Tor is known as the deep web, the dark side of the internet if you will. You can find all kinds of illegal things here. Smart man not to open that. Most people have no idea what it is. Edited by knewcomb

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

TRADING POST NOTICE

Before engaging in any transaction of goods or services on TGO, all parties involved must know and follow the local, state and Federal laws regarding those transactions.

TGO makes no claims, guarantees or assurances regarding any such transactions.

THE FINE PRINT

Tennessee Gun Owners (TNGunOwners.com) is the premier Community and Discussion Forum for gun owners, firearm enthusiasts, sportsmen and Second Amendment proponents in the state of Tennessee and surrounding region.

TNGunOwners.com (TGO) is a presentation of Enthusiast Productions. The TGO state flag logo and the TGO tri-hole "icon" logo are trademarks of Tennessee Gun Owners. The TGO logos and all content presented on this site may not be reproduced in any form without express written permission. The opinions expressed on TGO are those of their authors and do not necessarily reflect those of the site's owners or staff.

TNGunOwners.com (TGO) is not a lobbying organization and has no affiliation with any lobbying organizations.  Beware of scammers using the Tennessee Gun Owners name, purporting to be Pro-2A lobbying organizations!

×
×
  • Create New...

Important Information

By using this site, you agree to the following.
Terms of Use | Privacy Policy | Guidelines
 
We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.