Message from @Andrewi
Discord ID: 634534324615774208
the thing about doing a ddos ...u can't do it solo...u need a team of ppl...horde if possible to do a global 'Distributed Denial Of Services' attack
so unless hotwheels made a deal with the patriots to lure out the ds operators performing global ddos attacks on servers across the world, he's just as guilty as those doing it...ppl that do ddos attacks are cyber terrorists and are criminals under most laws around the planet...some of them have death penalties for it
and twitter is providing a record of orchestrating such attacks and and providing target ip's to attack
so if he was under surveillance prior to 8chan going down the first time, he'd still be under it and subject to any laws eventually in any country he operates in soon as all the other operatives that took part in the ddos' were tracked down to their relative nations and arrested
btw, twitter subpoenas cover public, private and even dm's of the subject...user deletion only hides the content from users and the public, not the twitter ops
zebond, i could use any website to say i'm working for the dod...or irs, it's an old fxp trick
But what good is a subpoena if people can just bleach bit and smash hard drives with impunity
Leaves me wondering if someone is spoofing hot wheels IP to make it appear as guilt when it's not
especially when the consequence of violating a subpoena is far less than the crime the subpoenaed material would prove
some of the remote transfer protocals can be used to give the illusion to the uniformed eye to think they're targeted by a specific website service ...but to the skilled eye can trace and sample the attack code to see who controls it thru the meta
the ip connection service(isp) keeps a record of who transfers what data streams and when..and it's tagged into the meta of the data
each router it passes thru leaves a meta tag...it's how traceroute works
Thanks guys
in the old days, traceroute have to trace manually thru the internet to the target location then report back...via ip4, basic meta back then,..but when ip6 got introduced..it got alot easier to trace the server thru the meta with routes, vpn's and user gps and other info..in some cases even twitter/fb tags or other platform acc info
This report is from.2015
https://www.usaid.gov/documents/1863/changing-corrupt-behaviors-assessment-addressing-everyday-corruption-ukraine
Changing Corrupt Behaviors Assessment: Addressing Everyday Corrupt...
The 2014 Revolution of Dignity presented a critical opportunity for Ukraine to implement sweeping reforms, which would bring the country’s development up to the standards of the European Union. The European Association Agreement, which Ukraine signed following the Revolutio...
Here, we will focus on low-level bribes since this is the corruption that mass behavior
change can impact most. For the purposes of this study, we have developed a typology of
the types of bribes that are most common in Ukraine by highlighting their systemic
functions: 1) market compensation bribes; 2) exhortation/responsibility avoidance
bribes; 3) bureaucratic roadblock bribes; and 4) bribes to gain socio-economic advantage.
None of these categories are mutually exclusive, and all of these factors are at work in
most bribing schemes, which more generally reinforce each other, but this typology
provides insight into how and why bribes persist in the Ukrainian public sector as well as
into the ways they might be curtailed.
https://media.discordapp.net/attachments/420910126401323019/634384948664729602/Screenshot_20191017-093912_Drive.jpg?width=400&height=205
them doing the ddos's are in so much trouble
@AngelLady I saw that "murderers for Bernie" sign and thought, that brings a whole new meaning to "Feel the electric chair Bern" 😄