Posted on 08/04/2013 1:52:33 AM PDT by MikeSteelBe
This a warning to all of our members, readers, supporters, and to the general liberty movement.
Please be extremely careful with email, and do not open any attachments from anyone who you dont know, or from any suspicious email, such as tormail. And even if it seems to be from someone you know, take the time to read the email address carefully, to see if it is from a Tormail account, or other anonymous email service. It could be someone impersonating someone you know, to trick you into opening files with child-porn on them.
No one here at Oath Keepers uses tormail or any other anonymous email service, so if you see an email purporting to be from Oath Keepers, or from anyone in leadership at Oath Keepers, from such an email service, do not open it.
There have been a string of anonymous attacks on liberty activists, all attempting to trick people into opening email attachments containing child-porn. We know of at least four such attempts within the past few weeks.
The first was when someone emailed Luke Rudkowski, Founder of We Are Change and tried to trick him into opening attached jpeg files containing child porn. Luke was able to use the view function of his email to see that the images were child porn and he did not open them.
Then, someone using a tormail account tried to do the same thing to Dan Johnson, Founder of People Against the NDAA (PANDA). Whoever emailed Dan Johnson pretended to be me, Stewart Rhodes, but using a Tormail account. Fortunately, Dan knew that I dont use Tormail, and therefore he did not open the attachments. Instead, he had a computer security expert examine the files, and that expert determined that they contained child porn. You can read more about that attack, and watch a video we made about it, here.
Well, a few days later it happened again, to two other liberty activists we know. They have chosen, for the time being, to not go public about it, in the hopes that the FBI will have a better chance of catching the perp. All of us have reported these incidents to the FBI, through attorney Sue Basko.
Sue has written a very well done description of what happened, what we did to report it, and some important advice on how you can keep from being victimized by whoever is doing this. Here is an excerpt of that tutorial. Please take her advice to heart, and be very careful online.
Stewart Rhodes
Errrrr.....
.... as a computer developer, I am here to tell you that viewing the images downloads them into internet temporary file folders. He needs to scrub his computer with CCleaner and checkmark EVERY option for scrubbing.
You can always count on liberals to have the child porn files to send in this manner.
BookMark
LOL ... had to tell the truth Laz. Should I expect a visit yet? Hope Not but ... sometimes telling the truth is costly.
to entice you will bring a female too.
Eep. I save great graphics of animals, and funny political content from here a LOT : o They go onto my screensaver carousel, so I never choose anything that makes me mad, laughs.
I am assuming this is a practice that I should stop : \
Thanks in advance, and may God keep watch over us all.
Tatt
blackmail is a communist technique...uhm...who’s in office that is a communists???
After meeting we’ll discuss who buys the meal?
Probably too late......;) I can post a picture thats hosted on my server. When that picture is downloaded for viewing I can capture your IP, OS type and a few other bits of info. Enough to target you specifically. You don’t even have to save it to your hard drive as its already there in a temp folder.
Run scans regularly, wipe empty space occasionally, keep anti-virus up to date.
I’ve chosen to be careful and not live in fear.
It depends what was viewed. Obviously the client must open the message, but if you view the message source you can see the URLs for any images encoded in the links.
In my case I wrote a little Outlook macro to save suspect messages as a text file for further review. Outlook has to read the message into memory so the macro can grab it, but Outlook never takes action on any of the links.
I’d love to meet, sure...
That will tell you what the “Reply-To” header was set to, but it’s as easy to spoof as any other header.
Thanks Laz. Will discuss with you at an appropriate time within four to five weeks. Will give a minimum of one to two weeks advance notice of when will be in the area. Will attempt to make it a two week notice. This will be for fun and a meal, no business. Just a simple hello if can be arranged by the two of us plus I’ll bring my better half.
Sigh... understood. Thanks much for the reply, and for the valuable information, FRiend.
for security, and of course there is none ... may go to phone when know dates. I’ll call this time and will not place this one on you.
Ok, I will make an exception. I normally require a minimum of 97,800,000 years notice, which means you would have had to email me sometime during the Cretaceous Era.
This will be for fun and a meal, no business.
Good move. Now the NSA will not know of our true plans: Plotting TOTAL GLOBAL DOMINATION.
Wait. Did I just screw up?
Just a simple hello if can be arranged by the two of us plus Ill bring my better half.
I also will bring my better half, which, of course, is my bottom half.
shucks Laz ... they’re on to us.
I didn’t say that btw.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.