• Welcome to New Hampshire Underground.
 

News:

Please log in on the special "login" page, not on any of these normal pages. Thank you, The Procrastinating Management

"Let them march all they want, as long as they pay their taxes."  --Alexander Haig

Main Menu

FBI raids LRN?

Started by Dave Ridley, March 20, 2016, 10:26 AM NHFT

Previous topic - Next topic

Dave Ridley



Jay

A group of people likely falsely snitched that he might have child porn.

They took computers. LRN is off the air. No arrests were made, because they have no cause for it beyond what they might find on a computer.

blackie


Jay

Quote from: blackie on March 20, 2016, 12:59 PM NHFT
On a Sunday?

LRN is operated by the Shire Free Church. So they raided a church on a Sunday.

blackie


Jim Johnson

Ian is gathering equipment to get back on the air.
The station might be back up tomorrow.

Russell Kanning

I can see a sunday morning .... time of least resistance.
I always figured if the feds ever wanted to take me down, they would "find" child porn on my computer. But maybe it will be tax evasion.

blackie

Ian got hacked by the FBI over a year ago.

QuoteAccording to the search warrant, the FBI ran an undercover TOR .onion child pornography website from their government servers in Virginia from February to March of 2015. This website was designed to deliver, besides the pictures of abused children, a piece of malware that breaks the anonymity of TOR and identifies the true IP address of the person attempting to access the website. Other information, including the computer host name, username, and MAC address were also supposedly captured by the FBI.

http://motherboard.vice.com/read/the-fbis-unprecedented-hacking-campaign-targeted-over-a-thousand-computers
QuoteA new bulletin board site on the dark web was launched in August 2014, on which users could sign up and then upload whatever images they wanted. According to court documents, the site's primary purpose was "the advertisement and distribution of child pornography." Documents in another case would later confirm that the site was called "Playpen."

...

A month before this peak, in February 2015, the computer server running Playpen was seized by law enforcement from a web host in Lenoir, North Carolina, according to a complaint filed against Peter Ferrell, one of the accused in New York.

...

But after Playpen was seized, it wasn't immediately closed down, unlike previous dark web sites that have been shuttered by law enforcement. Instead, the FBI ran Playpen from its own servers in Newington, Virginia, from February 20 to March 4, reads a complaint filed against a defendant in Utah. During this time, the FBI deployed what is known as a network investigative technique (NIT), the agency's term for a hacking tool.

Jay

Knowing how the Wi-Fi password was easily accessible in the studio on a piece of paper on the side of a desk, it's conceivable that over 100 people could have had it. And although the KAC had it's own internet, it was usually slow as hell due to video uploads and you could still get the LRN signal next door for at least some kind of usable connection. Who knows how much it was freely given out in that situation.

Russell Kanning

plus feds purposely working both ends

KBCraig

People have called me crazy in the past for advocating not using passwords on my wifi routers. But my reasoning was simple: the tighter you lock down your access, the more you own everything that passes through it.

If it's wide open, you at least have plausible deniability.

I have password protection now, but only because the neighbors aren't in range anyway.

Russell Kanning

and if the government is going to attack you .... nothing you can really protect you

Silent_Bob

http://thegarrisoncenter.org/archives/5175

The FBI Has an Enemies List: First They Came for Free Talk Live ...

A typical Granite State Sunday morning on the cusp of spring, and a scene surprising no one who watches the news or any number of television shows dedicated to fictional or real-life law enforcement:

SUVs and police cruisers surrounding a house. Figures in bulletproof vests marked "FBI" hauling away computers pursuant to the warrant they're serving. The next scene practically writes itself. We all know our lines. Time to cheer on the white knights who protect society from the scourge of child pornography.

But this time it's different. This time we know the raiders represent the child pornographers and that their victims are journalists who exposed the FBI's role in operating an illegal child porn web site.

The house, located in the college town of Keene, New Hampshire, serves as broadcast studio for Free Talk Live (freetalklive.com),  a libertarian talk show airing nightly on more than 170 radio stations worldwide. FTL ranks 38th on the "Heavy 100" list of Talkers magazine, talk radio's premier trade publication. The home does double duty as living quarters for some of the show's hosts.

Mere weeks ago, Free Talk Live dropped a bombshell into America's political discussion, exposing a story that had previously only been noticed very much by tech insiders.

The Federal Bureau of Investigation, it seems, has been moonlighting as a provider of child pornography. After locating and seizing the servers of a child porn site on the "dark web," known as Play Pen and reachable only via the Tor browser, the FBI decided not to shut the site down. Instead, they kept it running for two weeks, using it to spread malware that could identify and locate a handful of the site's visitors. The vast majority of the 200,000 people downloading child porn from the site went on their way unmolested (pun intended). A few whose computers were mis-configured so as to be vulnerable to the FBI's trick were arrested.

Read that last paragraph again. It's illegal — and most people agree it SHOULD be illegal — to distribute child pornography.

Yet the FBI did so with complete impunity.

Now they're harassing the journalists who told us about it, raiding their home and seizing their equipment on the unlikely, even risible, claim that a computer in that building accessed the Play Pen site.

It's spring in New Hampshire but there's a chill in the air — the chill of politically motivated revenge by law enforcement gone rogue.

blackie

Quote from: Jay on March 22, 2016, 07:00 PM NHFT
Knowing how the Wi-Fi password was easily accessible in the studio on a piece of paper on the side of a desk, it's conceivable that over 100 people could have had it. And although the KAC had it's own internet, it was usually slow as hell due to video uploads and you could still get the LRN signal next door for at least some kind of usable connection. Who knows how much it was freely given out in that situation.
It could have been a random KAC visitor. Or it could have been a set up. Sounds like the Feds have a MAC address.

If it was a set up, it was done in a very specific two week time frame. And then they waited a year to do the raid.

How ever it happened, I am guessing they left some spyware to do some spying. And that is why they waited a year to do the raid.