It gets better...
YOU MIGHT BE A CHILD PORNOGRAPHER - and not even know it...
Ever get one of those notices that your personal/financial data may have been compromised? - you know identity theft...
From the 4th wikileak document I posted: (note - document was translated from German)
"Using a false identity and well-functioning credit card
servers are then rented and domains purchased as an existing, unsuspecting person. Most of the time an ID is required and in that case they will simply send a forged document."
"As soon as the server is available, a qualified server admin connects to it via a chain of servers in various countries with the help of SSH on the new server. Today complete partitions are encrypted with TrueCrypt and all of the operating system logs are turned off. Because people consider the servers in Germany very reliable, fast and inexpensive, these are usually configured as HIDDEN CONTENT SERVERS. In other words, all the illegal files such as pictures, videos, etc. are uploaded on these servers - naturally via various proxies (and since you are still wondering what these proxies can be - I'll explain that later). These servers are using firewalls, completely sealed and made inaccessible except by a few servers all over the world - so-called PROXY SERVERs or FORWARD SERVERs. If the server is shut down or Someone logs in from the console, the TrueCrypt partition is unmounted. Just as was done on the content servers, logs are turned off and TrueCrypt is installed on the so-called proxy servers or forward servers. The Russians have developed very clever software that can be used as a proxy server (in addition to the possibilities of SSL tunneling and IP Forwarding). These proxy servers accept incoming connections from the retail customers and route them to the content Servers in Germany - COMPLETELY ANONYMOUSLY AND UNIDENTIFIABLY. The communication link can even be configured to be encrypted. Result: the server in Germany ATTRACTS NO ATTENTION AND STAYS COMPLETELY ANONYMOUS because its IP is not used by anyone except for the proxy server that uses it to route the traffic back and forth through a tunnel - using similar technology as is used with large enterprise VPNs. I stress that these proxy servers are everywhere in the world and only consume a lot of traffic, have no special demands, and above all are completely empty.
Networks of servers around the world are also used at the DNS level. The DNS has many special features: the refresh times have a TTL (Time To Live) of approximately 10 minutes, the entries usually have multiple IP entries in the round robin procedure at each request and rotate the visitor to any of the forward proxy servers. But what is special are the different zones of the DNS linked with extensive GeoIP databases ..."
"But what I have to report to you is much more significant than this, and maybe they will finally understand to what extent the public is cheated by the greedy politicians who CANNOT DO ANYTHING against child pornography but use it as a means to justify total monitoring. "
"But hackers have also obtained huge client lists of large companies and sold the email addresses to spammers.In order to send spam trojan-infected (zombie) computers are used. But zombie computers have yet another use: it will be used in a targeted fashion to steal identities. They even use the computer of the user whose identity is stolen to conduct credible transactions such as purchase of domains, etc. But that is not everything: the installed Trojans are sometimes used as a SOCKS proxy to upload CP. The Russians have even worked out a schema to use infected computer as a network combing these infected computers (each computer would be part of a huge, redundant cluster) as a kind of huge, distributed and remote servers can be (a kind of Freenet Project, however, by using infected computers as the nodes). I want to make one thing clear:
if you have an email address, there is a possibility that there is child pornography on your computer because you have received CP advertising. And if your computer is not 100% safe against Trojans, viruses and rootkits, there is the possibility that your computer is part of the vast child pornography network. "
"Based on my descriptions so far it should be clear to anyone sensible reading this that filtering and censorship make absolutely no sense."
"As I have written so far, the whole promotion of child pornography is done via spam (or publisheded list of domains blocked by the police

. The spam mails sometimes also come with images. Even if you do not read the emails and everything ends up in junk folders there is still the possibility that child pornography images are saved on the hard drive. A different situation is when the computer has become infected and is a zombie - then all doors are, so to speak, open and the computer can even be used for the active dissemination of child pornography. Those who buy child pornography find links in the spam ads - most of them will lead to portals. On these portals, but also in forums and newsgroups, there will be advertisements for security solutions that enable you to evade tracing AND FILTERING. There are commercial offerings for foreign, uncensored DNS servers but also for VPN solutions (eg
www.strongvpn.com). In these VPN solutions an encrypted tunnel is established between the client and a server without logs, and under a false identity somewhere in the world - the connection may even go through more countries. Even if the (impossible) suggestion of Mr. SchĂĽnemann was implemented, there would be absolutely simple methods to circumvent it. Since Server 2008 Microsoft came out, there is virtualization. There are commercial offers where no child pornography is actually bought but a virtual workstation is a leased on which there is a great gift: a workstation full of videos and files ... The connection can be established very quietly via Windows Remote Desktop or VNC. No files are trasmitted between the computer of the customer and the server - only keyboard commands and screen content - usually in encrypted form and without the slightest trace about what you have viewed. Since the screen of a computer located e.g. in Russia can be displayed on a PC in germany, the customer will automatically bypass any filtering, censorship and surveillance by the German government. Well, the distributors of child pornography can even calmly sell virtual machines - against which Visa and MasterCard certainly will have nothing ... When the customer then connects to the virtual computer, he finds a nice file that is nothing else than a TrueCrypt Container for which he also received the password to open it. The container can also calmly sit on his home computer after transfer and because nobody knows what it is, he remains just a user like millions of others. The Russians have been producing complete solutions for about 4 years. In these case the business will not run dry. But the German government will spend the money of taxpayers and the economy for the irrational and expensive systems.
If you still haven't noticed: Technology is not the solution to child pornography. No filters, no censorship and no total monitoring can change this. "
he also goes into massive fraud that takes place by charging small amounts on massive numbers of stolen credit cards - because people rarely check their statements as well as using stolen identities for money laundering.
At least some in Congress must be somewhat aware of these things because they modified the laws to state that you had to have intent to access CP - so someone mailing it to you or you clicking a link and ending up on a site you didn't expect doesn't cut it. They also added a law about money laundering to the sex crimes laws.
But the author is right - the politicians are using fear and sensationalism to justify monitoring. That's what these laws are all about. There is another document on wikileaks somewhere that lists a whole bunch of reports done in other countries that spell out why trying to stop the distribution of this stuff via black lists is totally impractical. The main reason given is the number of new sites that come into existence every day.
His conclusions are that the only way to stop it is to go after the people distributing it. I don't get the inpression that anyone is making new material, with the exception of teenagers "sexting" each other or doing the web cam thing -and these occasionally get posted when teens break up.
Anyway, another sollution in search of a problem with a hidden agenda of monitoring and control with a lot of innocent people getting hurt in the process. You know, business as usual for Congress.
-t