The Deep Dark

Total Page:16

File Type:pdf, Size:1020Kb

The Deep Dark THE DEEP DARK WEB Pierluigi Paganini—Richard Amores Published by Paganini Amores at Smashwords Copyright 2012 Paganini–Amores The Deep Dark Web - paganini/amores publishing 212 providence St, West Warwick, RI 02893 - 401-400-2932 ALL RIGHTS RESERVED. This book contains material protected under International and Federal Copyright Laws and Treaties. Any unauthorized reprint or use of this material is prohibited. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without express written permission from the author / publisher. The information in this book is distributed on an “As Is and for educational only” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Paganini-Amores publishing. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. ISBN: 9781301147106 Publisher – Paganini – Amores For information on book distributors or translations, please contact Publisher Paganini –Amores 212 Providence St Rhode Island 02893 Or Via Dell'Epomeo 180 Parco del Pino Fab.C Sc. A 80126 - Napoli (ITALY) Phone 401-400-2932 – [email protected] deepdarkweb.com – uscyberlabs.com – securityaffairs.co Graphics Designer – Gianni Motta was born in Naples in 1977. He is a creative with over ten years in the field of communication, graphic and web designer. Currently he is in charge for Communication Manager in a cyber security firm. Acknowledgement: Richard Amores gAtO’s list :– Gianni Motta –who has done our artwork, Jason Jacobs & Jennifer Gold-Orlando and C3nTuri0n for gelping gAtO hunt in the dark for Tor answers, and of course the loves of my life Nancy, Alexandra, Talon, Grayson and Maggy – just one victory and were on our way Pierluigi Paganini list:- Gianni Motta who has done an outstanding artwork, Luca Scotto D'Antuono, Mohit Kumar , Anthony M.Freed and Colonel Bill Hagestad II who helped me and encouraged my passion for cyber security, and of course the reason of my life, my treasures Rosanna, Alessandro and Alessia. A special thanks to my Hero and friend, the incredible Richard gATo ... “Only those who dare may fly” ... Sepulveda Top of the Document About the Author’s Pierluigi Paganini I’m Master of Engineering and Chief Information Security Officer for Bit4ID, a company leader in solutions for Identity management, but I'm mainly a fan of the security with a great passion for writing. I consider myself a security evangelist, I strong believe that security is a shared responsibility and I profess every day awareness on cyber threats. It all started with the first game consoles, the Commodore and the ZX Spectrum were systems on which I learned as a child to develop and that I disassembled and mounted at will. I’m security expert with over 20 years of experience in the field and the passion for hacking and a previous engage led me to be a Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led me to found the security blog "Security Affairs". I started writing in sleepless nights due to my second child that kept me awake, I started for a joke from scratch and in 11 months has exceeded one million contacts with a growing trend. One day I ran into a strange guy, Richard Amores, a man with a great skill in cyber security and we decide to approach together the Deep Web topic. We worked some moths making researches and trying to explore the abyss of the parallel networks. We have decided to write a book to share with the readers our incredible experience ... this is just our first trip, more adventures are coming. Today I continue to write for some major publications in the security field such as Cyber War Zone, Infosec Island, Infocec Institute, The Hacker News and for many other Security magazines and journals. Richard (gAtOmAlO) Amores gATO is a modern high tech security lowlife -Richard Amores was born amidst the 1950's Cuban Revolution in the small town of Santiago de las Vegas. Fleeing Castro’s reign, his family relocated to NYC where he was subsequently raised until his enlistment into the U.S Navy to serve on the USS Saratoga CVA 60. After discharge, Richard secured a job repairing punch card readers, learning about the before little-known object known as the computer. His interests led him to discovering things from Ethernet and arch net, to token rings, spark stations and s100. Deciding to niche his interests into software development, Richard began writing code for Lotus Notes. With Richard’s help, Lotus Notes developed “email with a database that you could write software that moved about on the network and then into the web.” His talent took him to far and distant lands around the world, working with fortune 100 companies such as IBM, American Express, and Bank of America to name a few. After dedicating much of his life to software and security, Richard, newly retired, became the owner of usCyberlabs.com, a security blog that catalyzed the idea of his new book co-written with Peirluigi. His passion for public security education is readily apparent as readers delve into the likes of “The Deep Dark Web”. Table of Contents Introduction What is the Deep Dark Web? So what are .onion web-sties? Who and Why has promoted the Deep Web? Who uses this hidden network today? Why we need Anonymity & Privacy Online Deep Web and censorship Obfsproxy tool The Iranian censorship and opportunity to test the obfsproxy tool The Chinese Tor Censorship What is the ToR Project Overview Inception Overview Why we need Tor The solution: a distributed, anonymous network Deep Web Timeline And History ClearWeb Services – Dark-Hidden Services The Government will tell you - only criminals use the Dark Tor network--// NO. Difference between Tor network, .onion network, deepWeb, darkWeb and invisibleWeb Hidden Services What Are Tor Hidden Service? What is a hidden service in ToR-.onion network? How can these hidden services be attacked? How to Use ToR-.onion Network How To The Deep Web First step Tools: Tor Products Software & Services Tor Browser Bundle Vidalia Arm Orbot Tails Onionoo Metrics Portal Tor Cloud Obfsproxy Shadow Tor2web Who Uses the Deep Dark Web Why People Use Tor-.onion network We Live In A Cyber Surveillance Planet How the State Department could of uses the ToR network Why Normal people use Tor Why Militaries use Tor Why Journalists and their audience use Tor Why Activists & Whistleblowers use Tor Why High & low profile people use Tor Why Business executives use Tor Why IT Professionals use Tor A Recon into the Abyss What is the Deep Web? A first trip into the abyss What is a Tor? How to preserve the anonymity? Connecting to the Tor network Hacktivist and Dissidents Online The hacktivism phenomenon Who really takes advantage of the operations of Anonymous? The social dissent in the Deep Web Footsteps of the Hacktivist Sample of Communication Channels Among social dissent and complaint Deep Web as inspiration source Not only Anonymous How to mitigate the risks of exposure to hacktivism attacks? Is hacktivism only a threat or also a voice to listen? What to expect from the future? Anonymous, Wikileaks and evolution of hacktivism On the collaboration with WikiLeaks An ambitious objective is the involvement of the masses in the analysis of leaked data and not only in attacks Legality of Anonymity The right to anonymity on Internet and legal implications Is a Tor Relay LEGAL in the U.S. Limitations on liability relating to material online Governments Use of the Deep Dark Web Government Use CIA, FBI, NSA, different agencies for an unique intent…global monitoring Government & Tor Network Monitoring – Control – Document sharing – Example of attack to Tor network Compromise the TOR Anonymity Dear Tor Mail User –government intervention The Business Side of the Deep Dark Web - The Black Market Tor Black Market Cybercrime Ecosystem What is the Cyber Black Market? Blue Collar -Cyber Crime Let’s look at the black market in the surface web.: WHITE COLLAR CYBER CRIMES – cybercrime ecosystem Risk-forwarding cybercrime ecosystem Let’s look at the black market in the dark web.: The Digital Economy - Cyber Black Market-Underground Economy Digital Currency -basics These are some other ecurrencies— Reference: Lab Notes How Does Bitcoin Work? Underground Economy – basics Reloadable Debit Cards Security Conclusion Tips Western Union /Money Grams -Basics Security Tips Ecurrency - Basics Security Tips Trust Networks - Basics Borrowed Bank Accounts / Underground ATM cards Mule Networks Bitcoin FBI – BitCoin Report -Intelligence Assessment Bitcoin Virtual Currency Report – Unclassified Executive Summary Scope Note Source Summary Statement The Bitcoin Economy (U) Introduction Unique Features Present Distinct Challenges for Detecting and Stopping Illicit Activity How Anonymous is Bitcoin? What Users Can Do To Increase Anonymity Decentralized Authority Vulnerabilities (U) Money Laundering Theft of Bitcoins Third-Party Bitcoin Services Theft of Services for the Purpose of Mining Bitcoins Bitcoins Outlook and Implications Bitcoins Intelligence Gaps Appendix A: FBI report Key Terms Appendix B: Confidence Levels U) Appendix C: How Does Bitcoin Work? Bitcoin Mining Scam How does it work? Well… How Normal Business can use ToR Hide Scada In The Tor Network –
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • 6 Cybercrime
    Internet and Technology Law: A U.S. Perspective Cybercrime 6 Cybercrime Objectives Ater completing this chapter, the student should be able to: • Describe the three types of computer crime; • Describe and deine the types of Internet crime that target individuals and businesses; and • Explain the key federal laws that target Internet crime against property. 6.1 Overview his chapter will review privacy and security breaches on the Internet that are of a criminal nature, or called cybercrime. Broadly speaking, cybercrime is deined as any illegal action that uses or targets computer networks to violate the law. he U.S. Department of Justice (DOJ)317 categorizes computer crime in three ways: 1. As a target: a computer is the subject of the crime (such causing computer damage). For example, a computer attacks the computer(s) of others in a malicious way (such as spreading a virus). 2. As a weapon or a tool: a computer is used to help commit the crime. his means that the computer is used to commit “traditional crime” normally occurring in the physical world (such as fraud or illegal gambling). 3. As an accessory or incidental to the crime: a computer is used peripherally (such as for recordkeeping purposes). he DOJ suggests this would be using a computer as a “fancy iling cabinet” to store illegal or stolen information.318 6.2 Types of Crimes Many types of crimes are committed in today’s networked environment. hey can involve either people, businesses, or property. Perhaps you have been a victim of Internet crime, or chances are you know someone who has been a victim.
    [Show full text]
  • Hacker Public Radio
    hpr0001 :: Introduction to HPR hpr0002 :: Customization the Lost Reason hpr0003 :: Lost Haycon Audio Aired on 2007-12-31 and hosted by StankDawg Aired on 2008-01-01 and hosted by deepgeek Aired on 2008-01-02 and hosted by Morgellon StankDawg and Enigma talk about what HPR is and how someone can contribute deepgeek talks about Customization being the lost reason in switching from Morgellon and others traipse around in the woods geocaching at midnight windows to linux Customization docdroppers article hpr0004 :: Firefox Profiles hpr0005 :: Database 101 Part 1 hpr0006 :: Part 15 Broadcasting Aired on 2008-01-03 and hosted by Peter Aired on 2008-01-06 and hosted by StankDawg as part of the Database 101 series. Aired on 2008-01-08 and hosted by dosman Peter explains how to move firefox profiles from machine to machine 1st part of the Database 101 series with Stankdawg dosman and zach from the packetsniffers talk about Part 15 Broadcasting Part 15 broadcasting resources SSTRAN AMT3000 part 15 transmitter hpr0007 :: Orwell Rolled over in his grave hpr0009 :: This old Hack 4 hpr0008 :: Asus EePC Aired on 2008-01-09 and hosted by deepgeek Aired on 2008-01-10 and hosted by fawkesfyre as part of the This Old Hack series. Aired on 2008-01-10 and hosted by Mubix deepgeek reviews a film Part 4 of the series this old hack Mubix and Redanthrax discuss the EEpc hpr0010 :: The Linux Boot Process Part 1 hpr0011 :: dd_rhelp hpr0012 :: Xen Aired on 2008-01-13 and hosted by Dann as part of the The Linux Boot Process series.
    [Show full text]
  • Luigi Documentation Release 2.8.13
    Luigi Documentation Release 2.8.13 The Luigi Authors Apr 29, 2020 Contents 1 Background 3 2 Visualiser page 5 3 Dependency graph example 7 4 Philosophy 9 5 Who uses Luigi? 11 6 External links 15 7 Authors 17 8 Table of Contents 19 8.1 Example – Top Artists.......................................... 19 8.2 Building workflows........................................... 23 8.3 Tasks................................................... 28 8.4 Parameters................................................ 33 8.5 Running Luigi.............................................. 36 8.6 Using the Central Scheduler....................................... 38 8.7 Execution Model............................................. 41 8.8 Luigi Patterns............................................... 43 8.9 Configuration............................................... 48 8.10 Configure logging............................................ 60 8.11 Design and limitations.......................................... 61 9 API Reference 63 9.1 luigi package............................................... 63 9.2 Indices and tables............................................ 248 Python Module Index 249 Index 251 i ii Luigi Documentation, Release 2.8.13 Luigi is a Python (2.7, 3.6, 3.7 tested) package that helps you build complex pipelines of batch jobs. It handles dependency resolution, workflow management, visualization, handling failures, command line integration, and much more. Run pip install luigi to install the latest stable version from PyPI. Documentation for the latest release is hosted on readthedocs. Run pip install luigi[toml] to install Luigi with TOML-based configs support. For the bleeding edge code, pip install git+https://github.com/spotify/luigi.git. Bleeding edge documentation is also available. Contents 1 Luigi Documentation, Release 2.8.13 2 Contents CHAPTER 1 Background The purpose of Luigi is to address all the plumbing typically associated with long-running batch processes. You want to chain many tasks, automate them, and failures will happen.
    [Show full text]
  • Qos: NBAR Protocol Library, Cisco IOS XE Release 3.8S
    QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 C O N T E N T S 3COM-AMP3 through AYIYA-IPV6-TUNNELED 34 3COM-AMP3 35 3COM-TSMUX 36 3PC 37 9PFS 38 914C G 39 ACAP 40 ACAS 40 ACCESSBUILDER 41 ACCESSNETWORK 42 ACP 43 ACR-NEMA 44 ACTIVE-DIRECTORY 45 ACTIVESYNC 45 ADOBE-CONNECT 46 AED-512 47 AFPOVERTCP 48 AGENTX 49 ALPES 50 AMINET 50 AN 51 ANET 52 ANSANOTIFY 53 ANSATRADER 54 ANY-HOST-INTERNAL 54 AODV 55 AOL-MESSENGER 56 AOL-MESSENGER-AUDIO 57 AOL-MESSENGER-FT 58 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S ii Contents AOL-MESSENGER-VIDEO 58 AOL-PROTOCOL 59 APC-POWERCHUTE 60 APERTUS-LDP 61 APPLEJUICE 62 APPLEQTC 63 APPLEQTCSRVR 63 APPLIX 64 ARCISDMS 65 ARGUS 66 ARIEL1 67 ARIEL2 67 ARIEL3 68 ARIS 69 ARNS 70 ARUBA-PAPI 71 ASA 71 ASA-APPL-PROTO 72 ASIPREGISTRY 73 ASIP-WEBADMIN 74 AS-SERVERMAP 75 AT-3 76 AT-5 76 AT-7 77 AT-8 78 AT-ECHO 79 AT-NBP 80 AT-RTMP 80 AT-ZIS 81 AUDIO-OVER-HTTP 82 AUDIT 83 AUDITD 84 AURORA-CMGR 85 AURP 85 AUTH 86 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S iii Contents AVIAN 87 AVOCENT 88 AX25 89 AYIYA-IPV6-TUNNELED 89 BABELGUM through BR-SAT-MON 92 BABELGUM 93 BACNET 93 BAIDU-MOVIE 94 BANYAN-RPC 95 BANYAN-VIP 96 BB 97 BBNRCCMON 98 BDP 98 BFTP 99 BGMP 100 BGP 101 BGS-NSI 102 BHEVENT 103 BHFHS 103 BHMDS 104 BINARY-OVER-HTTP 105 BITTORRENT 106 BL-IDM 107 BLIZWOW 107 BLOGGER 108 BMPP 109 BNA 110 BNET 111 BORLAND-DSJ 112 BR-SAT-MON 112
    [Show full text]
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Honeypots: Not for Winnie the Pooh But
    2018] 259 HONEYPOTS: NOT FOR WINNIE THE POOH BUT FOR WINNIE THE PEDO — LAW ENFORCEMENT’S LAWFUL USE OF TECHNOLOGY TO CATCH PERPETRATORS AND HELP VICTIMS OF CHILD EXPLOITATION ON THE DARK WEB Whitney J. Gregory* Cruelty, like every other vice, requires no motive outside itself—it only requires opportunity.1 INTRODUCTION Lawyers, doctors, teachers, politicians, and Hollywood stars—what do they all have in common? Smarts? Success? Wealth? Respect in their com- munities? Demonstrating the terrible divergence between appearance and re- ality, some members of these professions are also frequent customers and producers of child pornography. Contrary to what some may assume, child pornographers are not just antisocial, out-of-work, reclusive basement dwellers. They may be people you would least expect.2 Take, for instance, the teen heartthrob Mark Salling, who starred on Fox’s hit show Glee as handsome bad-boy Puck from 2009 to 2015. Twenty-fifteen was also the year Salling was arrested and charged * Antonin Scalia Law School at George Mason University, J.D. Candidate, May 2019; Articles Editor, George Mason Law Review, 2018–19. This Comment is dedicated to the memory of my grandfa- ther Guido A. Ianiero. 1 George Eliot, Janet’s Repentance, in SCENES OF CLERICAL LIFE 102, 146 (Harper & Bros. 1858). 2 Judges have described child pornography defendants as seemingly ordinary, even upstanding, men (and a few women). “The defendants’ professional careers [are] often highlighted, including Air Force Captain, physician, trust specialist, and teacher.” Melissa Hamilton, The Efficacy of Severe Child Pornography Sentencing: Empirical Validity or Political Rhetoric?, 22 STAN.
    [Show full text]
  • JW Apostate Reply Supporting Motion to Quash April 6Th
    Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 1 of 21 1 JANE / JOHN DOE 2 Email: [email protected] 3 4 Pro se 5 IN THE UNITED STATES DISTRICT COURT FOR THE 6 SOUTHERN DISTRICT OF NEW YORK 7 8 IN RE: DMCA SUBPOENA TO GOOGLE, LLC Case No.: 7:20-mc-00119 9 10 JANE / JOHN DOE’S REPLY IN SUPPORT OF THE OBJECTION AND MOTION TO 11 QUASH DMCA SUBPOENA 12 13 A. INTRODUCTION 14 15 While it is true that Jehovah’s Witnesses are well known for their distribution of 16 Bible based books and publications, they are also a notorious group of criminal 17 pedophiles running a scam “religion” who are guilty of abuse of process and emotional 18 19 extortion through sham litigation in their pathetic efforts at discovering leaks and 20 moles and whistleblowers. Unfortunately for them, this is the year 2020 and things 21 22 like VPNs, anonymous proxies, and TOR exit nodes frustrate them at every turn. 23 Whether one is known as Darkspilver or John Redwood or JW Apostate, or any 24 number of other pseudonyms, it does not really matter as we are all Spartacus in this 25 26 fight! Reporting on and exposing to public comment and ridicule the doctrinal 27 inconsistencies and reversals, failed predictions, mistranslation of the Bible, harsh 28 JANE / JOHN DOE’S REPLY IN SUPPORT OF OBJECTION AND MOTION TO QUASH DMCA SUBPOENA- 1 Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 2 of 21 1 treatment of former members and autocratic and coercive leadership (not to mention 2 the child raping!) is a public duty that Jane / John Doe takes extremely seriously at 3 1 great personal risk.
    [Show full text]
  • LAMP and the REST Architecture Step by Step Analysis of Best Practice
    LAMP and the REST Architecture Step by step analysis of best practice Santiago Gala High Sierra Technology S.L.U. Minimalistic design using a Resource Oriented Architecture What is a Software Platform (Ray Ozzie ) ...a relevant and ubiquitous common service abstraction Creates value by leveraging participants (e- cosystem) Hardware developers (for OS level platforms) Software developers Content developers Purchasers Administrators Users Platform Evolution Early stage: not “good enough” solution differentiation, innovation, value flows Later: modular architecture, commoditiza- tion, cloning no premium, just speed to market and cost driven The platform effect - ossification, followed by cloning - is how Chris- tensen-style modularity comes to exist in the software industry. What begins as a value-laden proprietary platform becomes a replaceable component over time, and the most successful of these components finally define the units of exchange that power commodity networks. ( David Stutz ) Platform Evolution (II) Example: PostScript Adobe Apple LaserWriter Aldus Pagemaker Desktop Publishing Linotype imagesetters NeWS (Display PostScript) OS X standards (XSL-FO -> PDF, Scribus, OOo) Software Architecture ...an abstraction of the runtime elements of a software system during some phase of its oper- ation. A system may be composed of many lev- els of abstraction and many phases of opera- tion, each with its own software architecture. Roy Fielding (REST) What is Architecture? Way to partition a system in components
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Scams Pamphlet (PDF)
    http://www.fraud.org/learn/older-adult-fraud/they-can-t-hang-up “Fraud.org is an important partner in the FTC’s fight to protect consumers from being victimized by fraud.” - FTC Commissioner Maureen K. Ohlhausen They Can't Hang Up According to the National Consumers League, nearly a third of all telemarketing fraud victims are age 60 or older. Studies by AARP show that most older telemarketing fraud victims don’t realize that the voice on the phone could belong to someone who is trying to steal their money. Many consumers believe that salespeople nice young men or women simply trying to make a living. They may be pushy or exaggerate the offer, but they’re basically honest. While that’s true for most telemarketers, there are some whose intentions are to rob people, using phones as their weapons. The FBI says that there are thousands of fraudulent telemarketing companies operating in the United States. There are also an increasing number of illegal telemarketers who target U.S. residents from locations in Canada and other countries. It’s difficult for victims, especially seniors, to think of fraudulent telemarketers’ actions as crimes, rather than hard sells. Many are even reluctant to admit that they have been cheated or robbed by illegal telemarketers. Step 1 THE FIRST STEP in helping older people who may be targets is to convince them that fraudulent telemarketers are hardened criminals who don’t care about the pain they cause when they steal someone’s life savings. Once seniors understand that illegal telemarketing is a serious crime— punishable by heavy fines and long prison sentences—they are more likely to hang up and report the fraud to law enforcement authorities.
    [Show full text]