• The Shot You’ll Never Forget Giveaway - Enter To Win A Barrel From Rifle Barrel Blanks!

    Tell us about the best or most memorable shot you’ve ever taken. Contest ends June 13th and remember: subscribe for a better chance of winning!

    Join contest Subscribe

Extremely influential anti-gun NY Times economist Paul Krugman may be facing child pornography investigation.

Blue Sky Country

Urban Cowboy
Full Member
Minuteman
    According to him, a hacker, presumably a "Q-anon" hacker, had hijacked his IP address and downloaded a considerable quantity of kiddie porn into his computer.

    Now, according to the network and communications personnel at my work's tech department, while "IP spoofing" is possible, taking charge of the processes necessary to download and install files on a computer is only possible if someone had physical access to the computer for any period of time necessary to bypass each of the system's 'yes or no' permission screens to allow the file or software to be installed.

    Nice try, Krugman, and depending on the final results of the investigation, you may be spending quite some time in a "gun free" facility.
    smiley_smartass.gif


    Paul Krugman. (Soon to be) disgraced economist and Times columnist.

    paulkrugmannyt-e1578515220752.jpg


    ----------
    "Well, I’m on the phone with my computer security service, and as I understand it someone compromised my IP address and is using it to download child pornography," Krugman wrote in a now-deleted tweet. "I might just be a random target. But this could be an attempt to Qanon me. It’s an ugly world out there."
    ----------



    The tweet he made, and then deleted after a titantic surge of ridicule and clowning on Twitter...

    41C0ED37-54A8-4F08-9EE9-C791AEE95F0A_png-1226468.JPG


    Some of the best posts ridiculing Krugman almost immediately after his tweet...

    wsbwuf8s1n941.jpg


    gwolve9tqm941.jpg


    anim_lol.gif


    In addition to being an ultra leftist economist who routinely attacked President Trump and other conservative leaders, Krugman was an anti-gun extremist, and ceaselessly cranked out NY Times opinion pieces which reflect these values. In one piece that he has written, he refers to America's gun rights and gun rights preservation movement as "nasty and brutish"...


    ----------
    Before I get there, let me remind you of the obvious: We know very well how to limit gun violence, and arming civilians isn’t part of the answer.
    ----------


    Well, it seems like THAT will not be your problem any longer. Once the Feds get what they are looking for, you will be spending the next few years in a "gun free utopia" where only certain law enforcement agents have guns. Just don't drop the soap when you are in the (communal) shower though...
     
    Krugman is as clueless as he is spineless. This dip ship has been advising Shinzo Abe helping direct Japan's economy into a black hole. I'm sure many have read the following quote, but think on this for a second that he is regarded by the left as the smartest economist in modern times. He also predicted Trump would drive the world into a global depression much worse than 1929.

    “The growth of the Internet will slow drastically, as the flaw in ‘Metcalfe’s law' becomes apparent: most people have nothing to say to each other! By 2005, it will become clear that the Internet’s impact on the economy has been no greater than the fax machine’s” - Paul Krugman 1998
     
    Last edited:
    Now, according to the network and communications personnel at my work's tech department, while "IP spoofing" is possible, taking charge of the processes necessary to download and install files on a computer is only possible if someone had physical access to the computer for any period of time necessary to bypass each of the system's 'yes or no' permission screens to allow the file or software to be installed.

    I'm not sure where your tech department is getting their information from, but they are wrong.

    It depends on who is actually out to get you and how many zero day exploits they are sitting on.
    It's a well known tactic for hackers to get into servers through unpatched vulnerabilities and upload plenty of stuff and even run entire spoofing / scamming websites off the hacked computers while the owners aren't the wiser.

    It's not just your primary operating system that could be the weak link, all the other programs you use can be the weak link.
    Your e-mail program, your chat program, your webcam program, your music player, and a host of other things can be hacked.
    It's even kind of built into your OS in that Microsoft also has the ability to remotely download files from your computer if you use windows 7 or 10 for "threat analysis", and what comes down in the background can come back up or be rewritten easily in most non locked down systems.

    Thinking that you have to be physically present to bypass the systems Yes or No permissions is pretty laughable, especially on a Microsoft Consumer based product.

    Years back when the Israeli / CIA operation to get past the airgap on the Iran centrifuge control systems, it was shown they were doing a rather sophisticated job of faking signed hardware drivers and such to get windows to automatically install stuff without prompting at all when a USB key was inserted.

    It's only gotten worse from there.

    Cell phones are a target a lot of folks don't recognize either, but that's the next profitable front in taking over your device.
     
    I hope someone tells him to shave his beard before entering prison because you don't want to be smelling that nasty dirty ass smell for a week after he has to toss some dudes salad.
     
    • Haha
    Reactions: Blue Sky Country
    I'm not sure where your tech department is getting their information from, but they are wrong.



    Years back when the Israeli / CIA operation to get past the airgap on the Iran centrifuge control systems, it was shown they were doing a rather sophisticated job of faking signed hardware drivers and such to get windows to automatically install stuff without prompting at all when a USB key was inserted.

    If I'm not mistaken wasn't it Obama that gave the Iranians the heads up the Isreali/CIA was doing that?
     
    I'm not sure where your tech department is getting their information from, but they are wrong.

    It depends on who is actually out to get you and how many zero day exploits they are sitting on.
    It's a well known tactic for hackers to get into servers through unpatched vulnerabilities and upload plenty of stuff and even run entire spoofing / scamming websites off the hacked computers while the owners aren't the wiser.

    It's not just your primary operating system that could be the weak link, all the other programs you use can be the weak link.
    Your e-mail program, your chat program, your webcam program, your music player, and a host of other things can be hacked.
    It's even kind of built into your OS in that Microsoft also has the ability to remotely download files from your computer if you use windows 7 or 10 for "threat analysis", and what comes down in the background can come back up or be rewritten easily in most non locked down systems.

    Thinking that you have to be physically present to bypass the systems Yes or No permissions is pretty laughable, especially on a Microsoft Consumer based product.

    Years back when the Israeli / CIA operation to get past the airgap on the Iran centrifuge control systems, it was shown they were doing a rather sophisticated job of faking signed hardware drivers and such to get windows to automatically install stuff without prompting at all when a USB key was inserted.

    It's only gotten worse from there.

    Cell phones are a target a lot of folks don't recognize either, but that's the next profitable front in taking over your device.


    I am sure there are gizmos out there that can do almost supernatural shit in terms of manipulating and bypassing even the most advanced security systems, and there might be a possibility of a Qanon member having access to these gizmos, but using them on a two-bit, class-B leftist talking head like Krugman would be overkill and a waste of resources. If it had been a Qanon hit, they would do it against someone like Bloomberg or Northam first before they seek out someone like Krugman. Hell, with all my years in the gun rights movement I have not even heard of Krugman until that article and I did a history search of his past writings.

    One sure way of determining this creep's guilt would be establishing whether the child porn in his system was downloaded recently in bulk, or spread out over a period of months or even years. The latter case would be a sure sign that the material was placed there by nothing other than his own hand.