50 Police Officers Arrested in Child Porn Raids

Source: http://www.exposedpolice.com/50-police-officers-arrested-in-child-porn-raids/

By Exposed Police | on March 24, 2015 |
Police News

Fifty police officers across the UK have been arrested as part of a crackdown on suspected paedophiles who pay to access child pornography websites, detectives revealed today.

The officers were among 1,300 people arrested on suspicion of accessing or downloading indecent images of children – some as young as five – from US-based Internet sites.

Thirty-five men were arrested in London this morning as part of the investigation – codenamed Operation Ore – following raids on 45 addresses across the capital.

Of the 50 policemen identified, eight have been charged to date and the remainder bailed pending further inquiries. Scotland Yard said none of those arrested today was a policeman.

At a press conference at Scotland Yard today, Jim Gamble, assistant chief constable of the National Crime Squad, said he was not surprised at the number of police officers among the suspects.

“As police officers, we should expect to be held accountable,” he said.

“Fifty police officers have been identified and we are not hiding that fact. We want you to know about that to reassure you.

“Police officers are member of the communities that they serve and there will be good people and bad people in the police.”

Mr Gamble said the 50 officers were among 1,200 Britons who had been identified as “category one or two” suspects – those who posed the greatest potential risk to children.

In addition, 40 children nationwide – 28 of them in London – had been identified as being at risk of being abused and appropriate steps had been taken with other agencies to ensure that all the youngsters were safe.

Before today’s arrests, the Metropolitan Police had executed 75 warrants across the capital with 65 arrests and more than 130 computers seized.

Although 7,000 suspected users of “pay-per-view” child pornography sites based in the US were identified in Britain, Mr Gamble said the actual number of offenders would probably be lower, partly due to duplicates.

The Met’s Deputy Assistant Commissioner, Carole Howlett, said today’s raids represented the single largest operation of its kind mounted so far by the force.

She added: “Our priority so far has been to identify those individuals on the list that pose the greatest threat to children now.

“But this process is on-going … and it will continue after today, even though it is extremely resource intensive.”

Ms Howlett also announced that the Home Office had agreed to allocate an extra £500,000 to support further action as part of Operation Ore.

She said the money would be used to provide extra training in computer forensics for officers across the country and to buy more equipment for analysing computers seized.

Commenting on today’s operation, children’s charity NSPCC said it had been assisting the Met by responding to any emerging child protection matters.

Colin Turner, head of NSPCC’s specialist investigation service, said: “The arrests send out a strong warning to those that think they can remain anonymous and escape the law by using the Internet to trade in child abuse images.

“Behind these indecent, abusive images are real children who will have suffered immense damage and trauma.”

Operation Ore is the UK wing of a huge FBI operation which traced 250,000 paedophiles worldwide last year through credit card details used to pay for downloading child porn.

Read the full story at http://www.dailymail.co.uk/news/article-151784/50-police-officers-arrested-child-porn-raids.html

Advertenties

Kaspersky claims to have found NSA’s ‘space station malware’

Source: http://www.abzu2.com/2015/03/24/kaspersky-claims-to-have-found-nsas-space-station-malware/

nsa_snowden_eagle

24/03/2015

by  Darren Pauli

Kaspersky malware probers have uncovered a new ‘operating system’-like platform that was developed and used by the National Security Agency (NSA) in its Equation spying arsenal.

The EquationDrug or Equestre platform is used to deploy 116 modules to target computers that can siphon data and spy on victims.

“It’s important to note that EquationDrug is not just a trojan, but a full espionage platform, which includes a framework for conducting cyberespionage activities by deploying specific modules on the machines of selected victims,” Kaspersky researchers say in a report.

“Other threat actors known to use such sophisticated platforms include Regin and Epic Turla.

“The architecture of the whole framework resembles a mini-operating system with kernel-mode and user-mode components carefully interacting with each other via a custom message-passing interface.”

Super-complex code collection had 116 spooky plug-ins

The platform is part of the NSA’s possibly ongoing campaign to infect hard disk firmware. It replaces the older EquationLaser and is itself superseded by the GrayFish platform.

Kaspersky says the newly-identified wares are as “sophisticated as a space station” thanks to the sheer number of included espionage tools.

Extra modules can be added through a custom encrypted file system containing dozens of executables that together baffle most security bods.

Most of the unique identifiers and codenames tied to modules is encrypted and obfuscated. Some modules capabilities can be determined with unique identification numbers. Others are dependent on other plugins to function.

Each plugin has a unique ID and version number that defines a set of functions it can provide. Some of the plugins depend on others and might not work unless dependencies are resolved.

Kaspersky bods have found 30 of the 116 modules estimated to exist.

“The plugins we discovered probably represent just a fraction of the attackers’ potential,” the researchers say.

Executable timestamps reveal NSA developers likely work hardest on the platform on Tuesdays to Fridays, perhaps having late starts to Monday.

Modules detected in the tool include code for:

  • Network traffic interception for stealing or re-routing
  • Reverse DNS resolution (DNS PTR records)
  • Computer management
  • Start/stop processes
  • Load drivers and libraries
  • Manage files and directories
  • System information gathering
  • OS version detection
  • Computer name detection
  • User name detection
  • Locale detection
  • Keyboard layout detection
  • Timezone detection
  • Process list
  • Browsing network resources and enumerating and accessing shares
  • WMI information gathering
  • Collection of cached passwords
  • Enumeration of processes and other system objects
  • Monitoring LIVE user activity in web browsers
  • Low-level NTFS filesystem access based on the popular Sleuthkit framework
  • Monitoring removable storage drives
  • Passive network backdoor (runs Equation shellcode from raw traffic)
  • HDD and SSD firmware manipulation
  • Keylogging and clipboard monitoring
  • Browser history, cached passwords and form auto-fill data collection.

Source:

http://www.theregister.co.uk/2015/03/12/nsas_on_drugs_infosec_bods_unveil_space_grade_malware/

++ There’s no way of knowing if the NSA’s spyware is on your hard drive

++ It’s official: NSA spying is hurting the US tech economy

++ Why Firmware Is So Vulnerable to Hacking, and What Can Be Done About It

** excellent 2013 lecture by Jacob Appelbaum on NSA Cyber-Punks still available on YouTube:  JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE

Hampstead: Leaked Medical Reports End All Doubt About Sexual Abuse Claims

Hampstead: Leaked Medical Reports End All Doubt About Sexual Abuse Claims

Crimes of Empire

Witness and Victim G. Witness and Victim G.

March 11th, 2015.

Leaked Medical Reports End All Doubt About Sexual Abuse Claims.

The medical reports end any debate regarding the fact that children A and G were the victims of child sexual abuse in Hampstead and underline the criminal nature of the police interviews of September 17th, 2014. The question now is who is being protected? Who has the influence and power to cause the British police such an obvious and inexplicable mid investigation rethink? Clearly there is much more than a Z grade actor and the reputation of a school at stake here. Neither would logically merit the police choice to destroy this investigation and cover up these heinous crimes.

Background Chronology

September 5th 2014.
“A referral was made to the Barnet CAIF by (mother’s partner’s) brother in law who is a special constable. Following a disclosure by A and G that they had…

View original post 3.667 woorden meer

British politician exposes global plan!

Gepubliceerd op 18 mrt. 2013

Whitby (UK) Town Councillor Simon Parkes exposes government lies, global plans and more. His mother and grandfather worked for UK military intelligence (MI5/MI6)

Companies begin planting microchips under employees’ skin

Monday, March 09, 2015 by: Daniel Barker
Tags: microchip implants, RFID, technology

Learn more: http://www.naturalnews.com/048918_microchip_implants_RFID_technology.html#ixzz3VIGaDiY0

(NaturalNews) The technology has been around for some years now, but the use of RFID (radio-frequency identification) chips and other beneath-the-skin implants has only recently become more widespread.

A high-tech office complex in Sweden is now offering tenants’ staff the option of having a small RFID chip implanted in one’s wrist that allows certain functions in the building to be performed with a wave of the hand, such as opening doors and operating photocopiers.

Epicenter office block developers are in support of the implanting program, which is being made available through a Swedish bio-hacking group. The group promotes the use of bio-enhancement technology and predicts a future in which sophisticated implant systems will closely monitor a range of inputs from body sensors while interacting with the “internet of things.”

In other words, we will soon have the option of being physically connected to the Internet as well as to an increasingly widespread network of smart devices.

For many, the idea of having an implant containing personal information inserted under the skin is not a welcome option. Not only is there maybe something creepy about the whole idea to begin with, but the fact is that a lot of us feel our privacy and autonomy has been compromised enough already, without voluntarily becoming walking transmitters of our personal data.

Some predict that one day it won’t be a matter of choice, or that the use of implants and other types of bio-enhancement and connectivity will become so commonplace as to be expected, if not required. The fear is that we will lose our freedom and privacy in the process.

Others welcome the prospect of becoming physically connected to the internet of things, such as the bio-hacking group responsible for the office block’s RFID program.

A BBC News feature profiled Hannes Sjoblad, a bio-hacker who organizes “implant parties” where volunteers are implanted:

He is starting small, aiming to get 100 volunteers signed up in the coming few months, with 50 people already implanted. But his vision is much bigger.

Then will be a 1,000, then 10,000. I am convinced that this technology is here to stay and we will think it nothing strange to have an implant in their hand.

Although the RFID chips being used now are capable of little more than opening doors and operating copiers, the potential is far greater. RFID chips will likely evolve into ever-more sophisticated devices, capable of a wide range of interactions.

Already companies are developing technologies that will go a step beyond the already-familiar “wearable” gadgets — examples include a digital tattoo that can be stamped onto skin and can monitor body functions.

It’s certainly easy to imagine that within a few years there will be dramatic advances regarding what this type of technology can do. And since various types of bodily enhancement — bionic limbs, pacemakers and cosmetic surgery — are already commonplace, it stands to reason that many people will have few if any qualms about implants and other bio-hacking tech.

On the other hand, the idea of a central authority having the advantage of direct connections and access to an individual’s physical body with the potential of monitoring GPS position, heart rate, perhaps even brain waves, is frightening to contemplate.

Most of us have embraced the revolutionary technological advances of the past few decades. We’re more connected than ever before, and even if we don’t all agree that this is necessarily a good thing, very few of us would willingly give up our smartphones at this point.

But perhaps we should be extremely careful about making the leap to cyborg status. Is this truly an inevitable and potentially useful tech advancement or is it a step too far?

The time for debate is now, because the technology is already entering the mainstream. And as with most technological revolutions, once it has happened there is little hope of turning back.

Sources:

http://www.bbc.com

http://www.bbc.com

Learn more: http://www.naturalnews.com/048918_microchip_implants_RFID_technology.html#ixzz3VIGxf1rq

Benjamin Fulford 3-17-15… “Big public announcements and news events make it clear Khazarian rule is ending”

Kauilapele's Blog

benjamin_fulford_ottowa_senators_shirt_47Another Ben update with (what shall we call it?…) rather BIG news. Enjoy.

—————————————————-

Big public announcements and news events make it clear Khazarian rule is ending
Posted by benjamin, March 17, 2015

There can be no doubt now that the global Khazarian crime syndicate is being dismantled by white hats in the US and Europe along with their BRICS allies. This can be seen in the many extraordinary events that have been taking place both in public and in secret.

Perhaps the biggest, and hardest to deny, indication that something has changed has been the British governments’ decision to join the China initiated Asian Infrastructure Investment Bank as a founding member. What this means is that the British, and the City of London Financial, district have split with the US financial oligarchs who own the Federal Reserve Board, the IMF and the World Bank. The other thing is that…

View original post 244 woorden meer