12 Comments
тна Return to thread

Ah yes, that pesky tendency of binding agreements to be short-lived and ephemeral with no available records.

Expand full comment

What are you implying? I always negotiate multibillion dollar procurement contracts by text. What could go wrong?

Expand full comment

LOL @ "binding agreements", when one of the contracting parties is a government.

Also LOL @ the very idea that the records no longer exist, when we know full-well that every bit transferred on modern telecommunications networks is stored.

People smarter than me are working on liberating data from a range of state repositories: it is a lay-down mis├иre that there will be copious evidence of grubby deals and corrupt collusion.

It's also a lay-down mis├иre that the shitstream media will not touch the story, and it will be 'de-magnified' on antiSocial Media.

A hint of the efficacy of the narrative control apparatus in the Empire of Lies: how many people are aware that 5,200 members of a kiddie porn exchange signed up with ".mil" e-mail addresses?

My guess is that maybe 1 in 10,000 people are aware of that story, and that story happened a decade ago.

Expand full comment

IтАЩm just hearing about that for the first right now.

Expand full comment

I should probably have been more precise in my description: they didn't all have '.mil' e-mail addresses... but they all worked for the US Department of Defence. A very large number of them worked in the Pentagon.

They were discovered BY ACCIDENT[1] during "Operation Flicker", which was an ICE investigation in 2006 that targeted people who purchased kiddie porn.

By 2010 the people who handed ICE the data were sick of them not doing anything, so they wrote to Chuck Grassley; a year later the Pentagon 'acknowledged' that they had done almost nothing to uncover the kiddie-fiddlers in their midst.

https://archive.boston.com/news/nation/washington/articles/2011/01/05/pentagon_lagged_on_pursuing_porn_cases/

[1] "by accident" is giving ICE too much credit.

The data came from an 'Anonymous'-style hack of a kiddie-porn site's server; the hack was not performed by ICE, because .gov could not find its arse with both hands..

The site's admins were pretty bad at 'back end' security (lol) and the hackers exfiltrated the whole database and 'crowdsourced' a distributed brute-force decryption of the data. (The same mechanism that was later used to decrypt the 'Collateral Murder' video)

The site owners had used a badly-written, unsalted, 'bespoke' hash function that was as cryptographically amateur as Microsoft's 'NTLM' (a piece of shit that is STILL IN USE at the enterprise-level).

When it was clear what they had, the hackers engaged with relevant authorities, but were basically told to pound sand.

So when they heard about "Operation Flicker" they pretty much force-fed the data to people at ICE.

The folks at ICE notified the DoD, and the DoD SAT ON THEIR HANDS.

Expand full comment

What does .mil stand for?

Expand full comment

Dot mil (.mil) = ending on military email and website addresses , like .com

Expand full comment

Ahhhh, thank-you! That didn't even come to my mind. Upper echelon/brass, I'm assuming. --- Slimes. ЁЯШЦ

Expand full comment

Mother-in-law?

Expand full comment

For pedophilia?

Expand full comment

Amazing, isn't it?

Expand full comment

I would farther saying itтАЩs insane and a bad business model. But thatтАЩs just me.

Expand full comment