It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Attempted Setup of Luke Rudkowski and a Warning For Many

page: 1
46
<<   2 >>

log in

join
share:
+7 more 
posted on Jul, 4 2013 @ 10:38 PM
link   
So what would be the bait to get someone like Luke to open an anonymous email?

Bilderberg 2013

And what could be the easiest way to shut him up?

Child Porn uploaded to his laptop of course.

Vid Description:


A few hours before making this video, Luke Rudkowski of WeAreChange.org received an email from an anonymous sender claiming to be a Bilderberg whistleblower with attached photos from inside the 2013 Bilderberg meeting at the Grove Hotel in Watford, England. The email was sent to his personal email address that he has had since high school, not one of his work or WeAreChange email addresses.

Luke opened the email from another computer and it stated that the person wanted Luke to break the story so he was sending him these photos exclusively and specifically stated that Luke needed to download the photos. Fortunately before downloading, Yahoo gives a preview of the photos and the photos were actually graphic child pornography.

Luke has had his computer searched by forensics when going into Canada to cover the G20 when they searched him and interrogated him for hours, something like this could happen again when we come back to the U.S. from travelling Europe. Had this been the case, even with deleting, they would still find the images.

There would be no understanding of the true story and he would be facing a felony charge. Besides that also completely jeopardizing his work, reputation and livelihood. We wanted to make this public for Luke's safety and also for people to be aware that this kind of thing happens. We do not know who this was, all we know is that it is so important for anyone in this line of work to remain extremely vigilant.


Nasty business for truth seekers out there isn't it?

Luke's message? "Watch Your Back"

My message to many ATS'ers...The same. Because this would be the absolute easiest way to arrest, incarcerate and destroy credibility for any truth seekers. When it comes to charges like this you are guilty in the public eye before you even have a chance to speak out.

Sources:

wearechange.org...

www.prisonplanet.com...

whatreallyhappened.com...

And many more if you use the vid title for search

Peace


edit on 4-7-2013 by jude11 because: (no reason given)



posted on Jul, 4 2013 @ 11:01 PM
link   
Child porn seems to be a very useful (and easy) weapon. Came in handy with the BP oil spill -


Dr. Thomas B. Manton, who was one of the first to warn the public that far more oil than what BP had reported was gushing into the Gulf, was murdered in prison after being sentenced to 15 years on what some say were trumped-up child pornography charges. Similarly, Anthony Nicholas Tremonte, an officer with the Mississippi Department of Marine Resources on the Gulf Coast, was also arrested on one count of possession of child pornography.


The guy (Manton) took his computer in for repair and when he got it back, lo and behold - child porn found.

www.thevaultmag.com...

Watch your back AND your computer!!



posted on Jul, 4 2013 @ 11:08 PM
link   
People doing this type of entrapment to others deserve to be hunted down and shot... (In my humble opinion).
edit on 4-7-2013 by alienreality because: added



posted on Jul, 4 2013 @ 11:11 PM
link   
Shameful act, who ever did that.

He should investigate it and try to see where it came from... because the person who sent it has child pornography.



posted on Jul, 4 2013 @ 11:23 PM
link   

Originally posted by alienreality
People doing this type of entrapment to others deserve to be hunted down and shot... (In my humble opinion).
edit on 4-7-2013 by alienreality because: added


Yup,

Entrapment usually comes from those that have the power to entrap.

Police, Govt, Military, Alphabet Agencies...

Peace



posted on Jul, 4 2013 @ 11:25 PM
link   

Originally posted by Maluhia
Child porn seems to be a very useful (and easy) weapon. Came in handy with the BP oil spill -


Dr. Thomas B. Manton, who was one of the first to warn the public that far more oil than what BP had reported was gushing into the Gulf, was murdered in prison after being sentenced to 15 years on what some say were trumped-up child pornography charges. Similarly, Anthony Nicholas Tremonte, an officer with the Mississippi Department of Marine Resources on the Gulf Coast, was also arrested on one count of possession of child pornography.


The guy (Manton) took his computer in for repair and when he got it back, lo and behold - child porn found.

www.thevaultmag.com...

Watch your back AND your computer!!


I remember that then very little.

Maybe it was successful?



posted on Jul, 4 2013 @ 11:32 PM
link   
reply to post by jude11
 




Maybe it was successful?


Being it is one of the vilest crimes - a perfect weapon of mass deflection.



posted on Jul, 4 2013 @ 11:32 PM
link   
Very disturbing indeed to be taken down by some nefarious email, or planted evidence. Goes to show this guy is ruffling a lot of feathers in high places. Good for him, keep up the good work i say.

btw Jude i wish the steroid/squats thread wasn't taken down i was having a lot of fun with that one.



posted on Jul, 5 2013 @ 12:05 AM
link   
Its all too common, I have even be asked to do it by a "respected" officer in the ADF. I turned down the job because F*** them.

But sent in an email is a stupid way of doing it as it requires user input. A drive-by download would be a better way...

an even better way would be... nevermind.



posted on Jul, 5 2013 @ 12:40 AM
link   
reply to post by cartenz
 


Would you always know if it was on your computer? I mean where would it be stored other than your pic files?



posted on Jul, 5 2013 @ 01:15 AM
link   
More so,whoever did it, had found his personal E-mail to sent it to. That itself is interesting. As it's noted images, files, more, stay on the computer if you delete it or not, surely if he accidentally dl'ed it before he knew what it was, a search of his computer forensics at a checkpoint would yield the images, then he's held accountable. That was the intent, something bigger than just a person somewhere who hates whistle blowers, We are Change,etc., a sicko of assumed authority who has access to those "confiscated" databases?
Gee I wonder



posted on Jul, 5 2013 @ 01:21 AM
link   
When I saw a priest crossing the border with a computer check, and subsequently getting arrested for having underage pron on his computer, I kinda thought to myself... Good job on that! But in the back of my mind, I thought about the fourth amendment, or section 8 of Canada's constitution-Which applied to how they got the info.

And that's how it's done. A few cases like putting an evil priest away and everyone says, "We need this to get the bad guys!"

But, as easily as something like this could be done, so too could something be planted on anyone's computer. Or like in the case of Assange, where it seems as though he may have had undercover agents working in his employ without his knowledge, they could easily download and delete a bunch of stuff like this, and BAM! Cross a border with one of these "Computer Checks" and it's goodnight London.

Under the guise of "protecting children" the overseers seem to be able to get away with anything. This kind of power is kind of scary. And the fact that it is such an emotional issue, it makes it a perfect one to launch false accusations against people. Hell, who wants to defend someone suspected of such a heinous act?? Who wants to talk about being the neutral voice on an issue that cuts deep with the majority of the population...

Very disturbing.

I've said it before and I'd say again. I'm no revolutionary, when it comes close to home, I'm going to cut and run. I like these topics quite a bit, but if my interest put a target on my back I'd simply give it up and spend more time golfing.

Looking back at history:

In the 60s, the feds wanted to hit the hippie crowd. They did so with massive entrapment schemes using *that which we don't mention here* and they literally herded people into jail simply to give them records and track them. And some ended up doing pretty long stints too.

Officers of that era (undercover) have come forward about how they used to pester people daily, asking them, "Hey man can you hook me up with _____" and after repeated and forceful persuasion, people with absolutely no affiliation might help them out thinking they are doing the right thing, only to be arrested in a sting shortly after.

The former agents admitted they ruined many lives and they felt guilty about it.

I hope the climate doesn't shift in that direction. But perhaps it needs to get completely ridiculous for the common people to look and say, "We have a problem here." If it does, looks like I'll be force-feeding myself some koolaid for a good while.

Ya sir, yes sir, mista massa sah. What it is you is a wan-ned sah? I is here ta help any ways I can.


Nice thread Jude, thanks for bringing it to the forum.



posted on Jul, 5 2013 @ 01:50 AM
link   
With everything, I just seen that I forgot to post:



oops...


Peace



posted on Jul, 5 2013 @ 05:25 AM
link   

Originally posted by Dominar
Shameful act, who ever did that.

He should investigate it and try to see where it came from... because the person who sent it has child pornography.


Anonymous needs to get on that, stat.

2nd line



posted on Jul, 5 2013 @ 06:45 AM
link   
reply to post by jude11
 

If he had to, could he have proven that these images were sent to him via an email?

Or are there automatic penalties with regards to these types of images?



posted on Jul, 5 2013 @ 09:21 AM
link   
There is another line of thinking: "they" are tracking almost all your online existence so it is only matter of time when now unlawful evidence will become lawful evidence. Then "they" will just manipulate your track in ISP/NSA/blabla cache without need to gain access to your physical device ... Orwell on steroids.



posted on Jul, 5 2013 @ 01:35 PM
link   

Originally posted by dreamingawake
As it's noted images, files, more, stay on the computer if you delete it or not ...


This is a common misconception often quoted by computer illiterate fear-mongers (I'm not pointing a finger at you, dreamingawake, just generalizing). While it is true that a deleted file in most cases does remain somewhat accessible immediately after the deletion in the 'Recycle bin', once removed from there it becomes increasingly difficult to recover over time. This is because when a file is deleted, the filesystem blocks that were allocated for that file (with the data from the deleted file still intact) are marked as available for other file storage. So the more files that are created after the deletion, the less the chance the old file can be recovered. And in the case of performing simple hard-drive maintenance (like defragmentation, which can occur automatically on a schedule), the chances of ever recovering the deleted file become virtually impossible.



posted on Jul, 5 2013 @ 08:24 PM
link   

Originally posted by Shadoefax

Originally posted by dreamingawake
As it's noted images, files, more, stay on the computer if you delete it or not ...


This is a common misconception often quoted by computer illiterate fear-mongers (I'm not pointing a finger at you, dreamingawake, just generalizing). While it is true that a deleted file in most cases does remain somewhat accessible immediately after the deletion in the 'Recycle bin', once removed from there it becomes increasingly difficult to recover over time. This is because when a file is deleted, the filesystem blocks that were allocated for that file (with the data from the deleted file still intact) are marked as available for other file storage. So the more files that are created after the deletion, the less the chance the old file can be recovered. And in the case of performing simple hard-drive maintenance (like defragmentation, which can occur automatically on a schedule), the chances of ever recovering the deleted file become virtually impossible.


You can sometimes get stuff for quite awhile. Using Recuva I'm capable of accessing files on my computer that are 7 months old right now (civilization 4 game save files... roughly the same size as an image file, sometimes larger), and they're complete documents as I can load them in the game and play. I have literally thousands of these files, possibly even a hundred thousand, every one I have tried works. When you have a large hard drive that mostly goes unfilled (in my case a 1.5tb drive that's only using 300 gigs), that drive space can take awhile to overwrite. Most computer users do not fill their hard drives to overwrite old data.



posted on Jul, 5 2013 @ 09:04 PM
link   
reply to post by Shadoefax
 


so, your suggested defense against a life altering set up is to just sit back and wait on time and random chance eventually cleaning things up?
as if the perpetrators do something like this without having an official discovery already set up in your immediate future, and know exactly what and where to look for it.



posted on Jul, 6 2013 @ 11:40 AM
link   
That email was sent to him from a tor email address, so the chances of them ever finding the person are next to zero I would think.

Although I'll admit I'm not entirely familiar with the way tor email works as opposed to others.

edit on 05/28/2012 by Octave because: (no reason given)



new topics

top topics



 
46
<<   2 >>

log in

join