PDA

View Full Version : The Government Is Planting Child Porn On Your Computer



Serpo
4th May 2013, 02:09 PM
A new virus has been cataloged, and it appears to be planting and distributing child pornography files. Hackers? No. The government is planting child porn on your computer, or so an alert published today indicates.


Cyber Security Spy Task Force

by Amber Harrison
American Live Wire
May 2, 2013

Before It’s News has interviewed a person, who spoke on condition of anonymity, that has been a victim of the virus implantation. The person was engaged in journalistic exposure of political corruption, and suddenly police appeared on his doorstep with a search warrant specifying a search for evidence of possessing and distributing child pornography. The story is a bit convoluted here, but basically the gentleman did a little more investigation and found rogue .exe files on his computer that appeared as normal emule sharing directories but contained “hundreds to thousands” of child pornography files. The potential whistleblower claims the virus was deliberately planted on his computer in order to stop his activity.

The article surmises the Internet Crimes Against Children task force may be behind the virus planting, though why is unclear.
Are You A Victim?

According to a USWGO Virus Report:

“I believe it was surrounded by comine.exe along with another exe file that had random characters so I don’t remember that file name since it had a certain kind of random characters and I believe it may have been in the TEMP folder.

It came with three rogue P2P file sharing applications that were not stored in the usual file directories for programs or even portable programs. Those files are called ares.exe, emule.exe, and shareaza.exe. They share possibly illegal files and files with Trojans embedded without the computer owners permission despite invalid claims by law enforcement that no one can force a user to download and share files on P2P networks. When the user discovers them and attempts to shut down the program using process termination on Task Manager(taskmgr.exe) the rogue Trojan control program attempts to revive the operation of the rogue P2P programs and will fully operate within 3-5 seconds or even up to 10 seconds depending on processing speed from CPU. No matter how many times the user continues stopping the program it comes right back. When the user attempts to end the task then quickly remove the files even with certain software, the Trojan that controls the rogue programs seems to regenerate the rogue programs which continues to share and download illegal material which can get the user in trouble…”



ESET Virus Radar has recognized the virus, and calls it Win32/MoliVampire. The short description indicates, “Win32/MoliVampire.A is a trojan which tries to download other malware from the Internet. Win32/MoliVampire.A may be spread via peer-to-peer networks.”

The trojan contains an URL address. It tries to download a file from the address. Files are copied into a shared folder of various instant messengers and P2P applications, according to the description.

In a hurried article posted on Before It’s News, a reporter emoted:

So anyone whom receives this virus or variants of Trojans similar to this virus, is at risk of being accused of distributing and possessing child pornography then having the computers and family photos, videos, and other personal data taken away forever. Then will likely end up years in federal or state prison then receives a lifetime sex offender record, isn’t that just great!!!!!
ICE Pads Their Stats

Evidently, it isn’t only alternative-news journalists who are being targeted. According to a Facebook page supporting 17-year-old autistic youth Andrew Rose:

“Operation Flicker was started By ICE [Immigration and Customs Enforcement Agency]. U.S. Immigration and Customs Enforcement is the principal investigative arm of the U.S. Department of Homeland Security (DHS) and the second largest investigative agency in the federal government. Created in 2003 through a merger of the investigative and interior enforcement elements of the U.S. Customs Service and the Immigration and Naturalization Service, “Operation Flicker” is part of Project Predator, a nationwide ICE initiative to protect children from sexual predators, including instances of sex tourism with minors, Internet child pornographers, criminal alien sex offenders, and child sex traffickers, according to the agency. Unfortunately, due to the system being used to net these predators, many children are being exposed to the the same Child Porn they were trying to stop.”

Apparently, in an effort to catch these dangerous internet predators, ICE attached child pornography images to .mp3 files on P2P sharing sites like LimeWire. Young Andrew Rose downloaded two songs that came with little surprise packages attached. Scandalously and shamefully, Andrew is actually being prosecuted. His lawyer, on the support page, stated:

“The FBI and ICE are the ones who exposed Andrew Rose to Child Pornography ….. They were the Traffickers and became “That which they Seek.”
What Can You Do?

Computer users, especially those who use P2P file sharing programs and messaging, are encouraged to use ESET of McAfee virus scan/destroy software as both recognize the virus. It is noted that virus protection is not “bulletproof” with regard to this virus, and certainly will not protect against hidden attached files in normal sharing operations. If the government is planting child porn on your computer as some people have claimed, taking any and all steps possible to protect yourself and your family, including ceasing use of P2P applications, is advisable.



http://intellihub.com/2013/05/02/the-government-is-planting-child-porn-on-your-computer/

Horn
4th May 2013, 03:07 PM
Computer users, especially those who use P2P file sharing programs

Including Bitcoin & Torrent

Twisted Titan
4th May 2013, 03:33 PM
I can totally believe it

That is the fastest way to shut anybody up

Have them defend themself against child porn.

Thats a wrap.

Horn
4th May 2013, 04:06 PM
The article surmises the Internet Crimes Against Children task force may be behind the virus planting, though why is unclear.

Hmmmm lemme guess, soon to include logging onto internet blog sites geared towards individual freedom.

When pressing the reputation badge button...

IMO opinion laws have to be rewritten so the creators of the files are targeted, not just people who may end up with a copy post dated item.

Serpo
4th May 2013, 04:12 PM
I can totally believe it

That is the fastest way to shut anybody up

Have them defend themself against child porn.

Thats a wrap.

These people are obviously the lowest of the low.....but i guess thats the area they naturally work from.

gunDriller
4th May 2013, 05:40 PM
how many rabbi's & Hollywood schmuck's have naked pictures of under-age actors & actresses on their computers, but get the "Get out of Jail Free" card ?

seems like these laws are just nets used to facilitate selective prosecution.

because our twisted court system can not enforce laws fairly, those laws should be erased and the focus should be on fixing the twisted court system. not catching every sinner.

madfranks
4th May 2013, 07:08 PM
Including Bitcoin & Torrent

Bitcoin is not a file sharing service.

Horn
5th May 2013, 09:20 AM
Bitcoin is not a file sharing service.



In short, both Bitcoin and file-sharing are peer-to-peer, meaning users get to both cut out the middleman and, on an emotional level, stick it to The Man.

http://gigaom.com/2013/04/04/yes-you-should-care-about-bitcoin-and-heres-why/


The trojan contains an URL address. It tries to download a file from the address. Files are copied into a shared folder of various instant messengers and P2P applications, according to the description.

Ares
5th May 2013, 11:55 AM
http://gigaom.com/2013/04/04/yes-you-should-care-about-bitcoin-and-heres-why/

Like MadFranks said Bitcoin is not a file sharing program. Not all Peer to Peer networks are sharing files. Bitcoin is sharing the ledger, book keeping mining etc. among the nodes that join it's peer to peer network. There are no files being shared among the users.

SETI@home is a form of Peer to Peer network as it's a distributed processing network where users share the work involved in looking for signals that do not originate from Earth. There's also folding@home for the PS3 which did protein folding.

Horn
5th May 2013, 12:12 PM
Like MadFranks said Bitcoin is not a file sharing program. Not all Peer to Peer networks are sharing files. Bitcoin is sharing the ledger, book keeping mining etc. among the nodes that join it's peer to peer network.

So there's no possibility for the virus to end up on ones machine thru Bitcoin's P2P application, correct?

It should not be included in the overall list of P2P applications subject to infection due to & thru its specialty of being preferred by forum members.

Horn
5th May 2013, 12:35 PM
Embedding data like WikiLeaks cables into the blockchain is an ingenious way of making sure no government ever deletes it. But the practice has some users worried because of other things someone might embed.


Yesterday, a long-running fear among Bitcoin enthusiasts was realized when someone embedded a page from The Hidden Wiki (http://en.wikipedia.org/wiki/The_Hidden_Wiki) containing Tor network (https://www.torproject.org/) links to child pornography. As a result, what started as a platform for embedding relatively innocent insider arguments into the network is now a serious problem for the currency.

At the very least, it poses a publicity problem for Bitcoin as it tries to become more mainstream. There are many who will balk at knowing that merely by sending money over the network, they’re potentially downloading and distributing links to illegal material.

The worst-case scenario is far more dire. In most countries, it is illegal to possess and distribute child pornography. By uploading and downloading the blockchain, every user of the system is in some sense guilty of sending millions of others links to illegal material.

Whether or not a government could actually prosecute an individual for downloading the blockchain is one issue, and we’ve reached out to some legal experts for opinions. Some of the more paranoid Bitcoin users are already worried that governments could use the links as an excuse to issue a warrant for and seize any computer that has Bitcoin installed.

Here’s a more interesting and, if you’re a Bitcoin enthusiast, scary thought: the person behind the embedded data probably knows all of this. What if one of Bitcoin’s coolest hidden features just became an attack vector?



http://www.fastcolabs.com/3007320/tracking/bitcoin-coming-browser-near-you

Ares
5th May 2013, 04:40 PM
http://www.fastcolabs.com/3007320/tracking/bitcoin-coming-browser-near-you

Yeah someone exploited the "notes" feature of the bitcoin network. It was meant like the memo pad on a check. Paid so and so for auto work etc. So someone used the area to publish a Tor Hidden services address. Not really a hack or even a true exploit. Just someone being an idiot.

Namecoin also has that feature built in and was expanded upon as a way to add additional information when sending / receiving money. Hince the name "Namecoin".

joboo
6th May 2013, 01:10 PM
Has to be the government....ehh...

This should be renamed idiot noob clicks on exe file and has no clue...But is uber suspicious....

Right...