for those of you who still doubt the feds' access to emails:

Presser

Admin
Staff member
Administrator
Moderator
Here's some notable extracts from the Osoca Labs indictment,
Quote:
4. On June 6, 2007, DEA SA Shawn Riley received three CD's via Fed Ex from the DEA San Diego Division Office. The CD's were the result of a mutual legal assistance treaty ("MLAT") executed on Hush Communications Inc, based in Canada, for e-mail addresses [email protected] and [email protected]. Hush Communications Inc., also known as Hush Mail, is a free encrypted email communication system that claims to ensure the security, privacy, and authenticity of emails sent and received by it's users. A majority of source of supplies ("SOS") that are distributing raw steroid product from China, operators of UGL in the United States who convert anabolic steroid ******s into usable injectible or oral anabolic steroids, and customers of the UGL'S utilize Hush Communications Inc, to facilitate the manufacturing, distribution, and purchase of illicit anabolic steroids.
Quote:
5. A review of e-mails from e-mail address [email protected] between February 14, 2007 and May 17, 2007, revealed OSOCA filled 88 separate anabolic steroid orders for a total sale of $36,024.00. During a review of the e-mails, SA Shawn Riley identified OSOCA'S Chinese SOS for bulk ******ed anabolic steroids as "GLP". GLP was using the email address [email protected] to communicate with OSOCA. The e-mails between [email protected] and [email protected] showed there were two shipments of bulk ******ed anabolic steroids from GLP to OSOCA. Both orders were sent to Tyler STUMBO at 9530 Hageman, Suite B, #192, Bakersfield, CA. An address check revealed 9530 Hageman, Suite B, #192, Bakersfield, CA is a UPS Store.
Quote:
9. On June 15, 2007, SA [DEA Special Agent] Shawn Riley received the results of Administrative Subpoena 2007-190 sent to Bright House Networks/Road Runner for internet protocol ("IP") addresses associated with [email protected] which is used by OSOCABRO LABS. The results of the MLAT conducted on [email protected] included an IP log associated with access to this e-mail account. SA Riley conducted a sampling of eight IP addresses logging onto the [email protected] e-mail account between March 29, 2007 and May 17, 2007 and requested the subscriber using the IP addresses. Bright House Networks/Road Runner indicated the eight IP addresses sampled were accessed by account 609020-03 subscribed to "Tyler S. STTUMBO" with a listed address of 5702 Rockwell Drive, Bakersfield, CA 93308 and phone number 661-703-2480. This account was installed on November 29, 2006 and is currently active.
Quote:
10. The results of this subpoena included account transaction details for card number ________________ SA Riley reviewed the transaction details and located the following orders to companies supplying equipment used in the manufacturing and distribution of anabolic steroids:
... [Daigger, Capsuline, Le Melange, Research Supply, E-Bottles, Col-Parmer (sic)]
Quote:
15. On Sept 7, DEA SA Shawn Riley received nine CD's via Fed Ex from the DEA San Diego Division Office. The CD's were the result of a mutual legal assistance treaty ("MLAT") executed on Hush Communications Inc, based in Canada, for e-mail addresses [email protected], [email protected], and [email protected]. The analysis of the second MLAT revealed 45 separate anabolic steroid orders between May 29, 2007, and August 20, 2007 for a total sale of $18,977.00. Twenty two of the anabolic steroid orders were paid for by way of Green Dot. All of the money packs reloads were uploaded onto Green Dot account number 4852800001333917, which was previously identified as the account belonging to STUMBO.
 
That would probably include cyber-rights as well since they're owned by hushmail.
 
the patriot act pretty much took any freedom u guys had left and flushed it right down the fucking toilet, so no u have no freedom left
 
is there a country that gear is legal w/o prescription? if Hillary wins this election- i want to move there.
 
yeah we're all fucked...they probably cross ref. the email account with the holder's tax filing from the previous year and go after the guy that makes the most money :greedy:
 
agreed, nothing is safe anymore!

Unless of course you use an earlier version of PGP that does not have the back door built in like the newer versions do.

Even that isnt foolproof, but at least its something.
 
Back
Top