-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
NP-f31 wrote in alt.fan.prettyboy on Tuesday 01 September 2009 03:09 in
Message-ID: <ggvo95t7g5uk3gtane0ipaagv5h8h3q1qd@4ax.com>:
> ... I posted to warn people about the dangers of clicking on hyperlinks.
The FBI (among others) has long used 'honeypots' such as these to ensare
the unwary. One such example is documented at:
http://news.cnet.com/8301-13578_3-9899151-38.html
March 20, 2008 4:00 AM PDT
FBI posts fake hyperlinks to snare child porn suspects
by Declan McCullagh
Screen snapshot: This now-defunct site is reportedly where an FBI
undercover agent posted hyperlinks purporting to be illegal videos.
Clicking the links brought a raid from the Feds.
The FBI has recently adopted a novel investigative technique: posting
hyperlinks that purport to be illegal videos of minors having sex, and
then raiding the homes of anyone willing to click on them.
Undercover FBI agents used this hyperlink-enticement technique, which
directed Internet users to a clandestine government server, to stage
armed raids of homes in Pennsylvania, New York, and Nevada last year.
The supposed video files actually were gibberish and contained no
illegal images.
A CNET News.com review of legal documents shows that courts have
approved of this technique, even though it raises questions about
entrapment, the problems of identifying who's using an open wireless
connection--and whether anyone who clicks on a FBI link that contains
no child pornography should be automatically subject to a dawn raid
by federal police.
[...]
Civil libertarians warn that anyone who clicks on a hyperlink
advertising something illegal--perhaps found while Web browsing or
received through e-mail--could face the same fate.
When asked what would stop the FBI from expanding its hyperlink
sting operation, Harvey Silverglate, a longtime criminal defense
lawyer in Cambridge, Mass. and author of a forthcoming book on the
Justice Department, replied: "Because the courts have been so
narrow in their definition of 'entrapment,' and so expansive in
their definition of 'probable cause,' there is nothing to stop the
Feds from acting as you posit."
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Dozens arrested in child porn sting
Tom Allard
June 5, 2008
http://www.brisbanetimes.com.au/news/national/dozens-arrested-in-child-porn-sting/2008/06/04/1212258936438.html?page=fullpage#contentSwap2
[...]
Dubbed Operation Centurion, the investigation was triggered after
a hacker infiltrated a respectable European website and inserted
99 degrading and explicit images of young girls from eastern Europe,
the US and Paraguay.
| The site - which cannot be named for legal reasons - was besieged
| by an incredible 12 million hits in just 76 hours after word got
| around online pedophile networks that the images were available
| and the website's address was circulated.
Almost 150,000 different computer users from 170 countries accessed
the otherwise obscure website, including Australians using 2883
computer IP addresses. Of those, 1513 had downloaded one or more
images in the 76-hour period.
Police were able to match IP addresses to locations. Some were public
computers in places such as libraries, some were duplicates, but many
could be traced to homes.
Those arrested have ranged in age from 19 to 81 and included
individuals with a known history of child abuse, and others with
unblemished backgrounds.
[...]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Internet sting identifies 1,500 suspected child pornographers
September 30, 1997
Web posted at: 9:47 a.m. EDT (1347 GMT)
NEW YORK (CNN) -- A "cybersting" operation has identified more than
1,500 suspected child pornographers trading pictures of minors or
soliciting child sex over the Internet, New York Attorney General
Dennis Vacco said.
The 18-month "Operation Rip Cord" already has led to more than 120
arrests in the United States, Germany and the United Kingdom and
the prosecution of 31 people throughout the United States.
Investigators were so disgusted by the material coming across their
screens that they once ripped a computer plug from the wall, giving
the sting its name.
[...]
http://www.cnn.com/US/9709/30/cybersting/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
These are just three examples chosen from news reports on the net; there
are many, many others.
The decision as to whether to follow links posted on a newsgroup such as
this one is an individual one--every person must make that determination
for themselves.
My position is that it is far, far safer _not_ to follow any such links.
As far as the assumption that any particular poster is a cop, personally,
I tend towards the assumption that _everyone_ is a cop, and govern myself
accordingly -- it's served me well for over 14 years.
> Doc
> NP-f31
Baal <Baal@Usenet.org>
PGP Key: http://wwwkeys.pgp.net:11371/pks/lookup?op=get&search=0x1E92C0E8
PGP Key Fingerprint: 40E4 E9BB D084 22D5 3DE9 66B8 08E3 638C 1E92 C0E8
Retired Lecturer, Encryption and Data Security, Pedo U, Usenet Campus
- --
"Sed quis custodiet ipsos Custodes?" -- "Who will watch the Watchmen?"
-- Juvenal, Satires, VI, 347. circa 128 AD
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCgAGBQJKndSVAAoJEAjjY4weksDo5iEH/2qquto6JmyTJBkhBWTnlUVk
niDS+hOKskzfZB0OTpylwlDS+QeYyZERKj+Gvyhl2mfS6FYuZ1fz9kjQUn0A+Vm9
/yMK+TmBqnsSxVHpaswIgDq4plD1lUpzGoflSoFZEmD0BbcDaABhZ2qjhjwnICle
+17lWs8gC072nmF6QGappbBuPQRbT3ClQ5Vf7/arLxmoMTlGQ2c6qfrEYjQ8bkFb
qjUZNh5ign0SABpqLUyFKu142Nlzuauo3HE6JxZR24V1DS4nNqPE/pGZE2vM9fuh
SAlSPZscYiNl6dJ8thEvybxKPs+1RdvqOTO0HPAoqumkASpUd9f82+S5ITabyEI=
=mycV
-----END PGP SIGNATURE-----
|
|