The DEA & hushmail

Discussion in 'Drug Testing and Legal Issues' started by bluestemz, Oct 30, 2007.

  1. bluestemz

    bluestemz Member

    Messages:
    29
    Likes Received:
    0
    Some people have PM'd me about this so here is some more detail. Here is an article on the known instance:


    http://www.news.com/8301-10784_3-9741357-7.html

    there has been speculation on the source forums that a few source email accounts have been compromised, and one good source is sending out emails claiming that hushmail is now voluntarily handing over unencrypted copies of suspect email accounts to the DEA, but that could very well be just a ploy to back out of the business. Spread the word though; in this day and age, based on the above case, if you are suspected of dealing in scheduled compounds the DEA has the power to break into your home and install monitoring software on your PC, and it's not considered violating your rights. Hopefully these defendants will find enough money to keep legal council and take it to a higher court to try to rule on the unconstitutional nature of their tactics, but in cases like this the government almost always outspends the defendant leading to a plea bargain ...

    welcome to 1984 ...
     
  2. bluestemz

    bluestemz Member

    Messages:
    29
    Likes Received:
    0
    here is more info on recent hushmail injustices:

    http://www.usdoj.gov/usao/txn/PressRel05/saran_etal_indict_PR_FINAL.pdf

    here is the indictment http://static.bakersfield.com/smedia/2007/09/25/15/steroids.source.prod_affiliate.25.pdf


    4. On June 6, 2007, DEA SA Shawn Riley received three CD's via Fed Ex from the DEA San Diego Division Office. The CD's were the result of a mutual legal assistance treaty ("MLAT") executed on Hush Communications Inc, based in Canada, for e-mail addresses osocabro@hushmail.com and oblist@hushmail.com.

    Hush Communications Inc., also known as Hush Mail, is a free encrypted email communication system that claims to ensure the security, privacy, and authenticity of emails sent and received by it's users.

    5. A review of e-mails from e-mail address osocabro@hushmail.com between February 14, 2007 and May 17, 2007, revealed OSOCA filled 88 separate anabolic steroid orders for a total sale of $36,024.00. During a review of the e-mails, SA Shawn Riley identified OSOCA'S Chinese SOS for bulk ******ed anabolic steroids as "GLP". GLP was using the email address glpinternational@hushmail.com to communicate with OSOCA. The e-mails between osocabro@hushmail.com and glpinternational@hushmail.com showed there were two shipments of bulk ******ed anabolic steroids from GLP to OSOCA. Both orders were sent to Tyler STUMBO at 9530 Hageman, Suite B, #192, Bakersfield, CA. An address check revealed 9530 Hageman, Suite B, #192, Bakersfield, CA is a UPS Store.
    Quote:
    9. On June 15, 2007, SA [DEA Special Agent] Shawn Riley received the results of Administrative Subpoena 2007-190 sent to Bright House Networks/Road Runner for internet protocol ("IP") addresses associated with osocabro@hushmail.com which is used by OSOCABRO LABS. The results of the MLAT conducted on osocabro@hushmail.com included an IP log associated with access to this e-mail account. SA Riley conducted a sampling of eight IP addresses logging onto the osocabro@hushmail.com e-mail account between March 29, 2007 and May 17, 2007 and requested the subscriber using the IP addresses. Bright House Networks/Road Runner indicated the eight IP addresses sampled were accessed by account 609020-03 subscribed to "Tyler S. STTUMBO" with a listed address of 5702 Rockwell Drive, Bakersfield, CA 93308 and phone number 661-703-2480. This account was installed on November 29, 2006 and is currently active.
    Quote:
    10.
    ...
    The results results of this subpoena included account transaction details for card number ________________ SA Riley reviewed the transaction details and located the following orders to companies supplying equipment used in the manufacturing and distribution of anabolic steroids:
    ... [Daigger, Capsuline, Le Melange, Research Supply, E-Bottles, Col-Parmer (sic)]
    Quote:
    15. On Sept 7, DEA SA Shawn Riley received nine CD's via Fed Ex from the DEA San Diego Division Office. The CD's were the result of a mutual legal assistance treaty ("MLAT") executed on Hush Communications Inc, based in Canada, for e-mail addresses osocabro@hushmail.com, oblist@hushmail.com, and glpinternational@hushmail.com. The analysis of the second MLAT revealed 45 separate anabolic steroid orders between May 29, 2007, and August 20, 2007 for a total sale of $18,977.00. Twenty two of the anabolic steroid orders were paid for by way of Green Dot. All of the money packs reloads were uploaded onto Green Dot account number 4852800001333917, which was previously identified as the account belonging to STUMBO.
     
  3. LazyMike420

    LazyMike420 Member

    Messages:
    55
    Likes Received:
    0
    Everyone be careful. The dea broke into my house in july and I wound up in jail for 2 weeks, plus 2 years probation. It is NOT worth getting caught. Be careful... I suggest using "SWIM", etc... Even though a lot of people think it's annoying.

    Btw, I don't do anything illegal now. Just SWIM.
     
  4. skip

    skip Founder Administrator

    Messages:
    12,910
    Likes Received:
    1,880
    This shouldn't surprise anyone. There is nowhere to hide anymore. The feds have absolute power, granted by King Bush to intercept any form of communication, foreign or domestic. And they are using it everyday, and there are rarely public records of the spying going on on Americans.

    What's fucked up about this is the cooperation on this by the Canadians. Canada just isn't what it used to be, a free country. And this proves Canada is Bush's Pussy.

    Meow Canada!

    When are Canadians gonna take back their country?
     
  5. uplink

    uplink Member

    Messages:
    586
    Likes Received:
    0
    How did that happen? Not from research chemicals, I'd hope!
     
  6. jia

    jia Member

    Messages:
    742
    Likes Received:
    33
    If you're concerned about your privacy then I'd be careful about using a service where you have to trust an organization to keep your privacy for you (Like Hushmail.) A better solution is to use your own encryption via regular email via a program like Pretty Good Privacy or the free version GNU Privacy Guard.

    Although when you get your computer took by federal agents and they see you have encrypted data on it they're allowed to force you to give them your encryption key otherwise you automatically face a few years in prison or something crazy like that.
     
  7. lukkydimes

    lukkydimes Member

    Messages:
    8
    Likes Received:
    1
    Use the hushmail java applet before you enter your password and you will be fine I think. Also, using hush.ai will prevent the feds subpoena since the .ai servers are in the Caribbean. The Steroid guy was too lazy to use the java encryption so he might as well been using yahoo. The Feds subpoena'd hushmail and they gave it up like any legitimate company would. The .com servers are in Canada. As we know the Us and Canada have a good relationship.

    Basically its all up to you, use the java and dont let anyone corrupt your computer. Hushmail cant stop someone from hacking into your machine, lol. The PGP code cant be broken into, the only way is if you screw up. Your password is the key to breaking the code, if you turn on the java applet before entering your password no one has the key to breaking it, not even hushmail. When the police subpoena for your records, they will get code not text, and the PGP cannot be cracked not even by the guy who invented it(Phil Zimmermann)

    If you dont use the java, you might as well just use Yahoo or hotmail because when the feds come, they will get the key(your password) to reading all your emails.

    Peace, be vigilant

    LD
     
  8. stalk

    stalk Banned

    Messages:
    11,901
    Likes Received:
    10
    why did they do that...?
     
  9. KrazyJuggalo

    KrazyJuggalo Member

    Messages:
    109
    Likes Received:
    0
    ahhh, thank god for magnets ( pat's his portable harddrive )
     
  10. krainaoz

    krainaoz Member

    Messages:
    235
    Likes Received:
    0
    hushmail has a diclaimer on their websute advising that if need be they will cooperate with the legal and enforcement entities
     
  11. sushiosoyum

    sushiosoyum Member

    Messages:
    309
    Likes Received:
    13

    now they do. they didn't before this event.
     
  12. LuckyStripe

    LuckyStripe Mundane.

    Messages:
    25,051
    Likes Received:
    12
    So how safe is hushmail? Because some of the places I use you have to contact them through their hushmail account.
     
  13. salmon4me

    salmon4me Senior Member

    Messages:
    4,099
    Likes Received:
    4
    It's safer than your account. ;)
     
  14. LuckyStripe

    LuckyStripe Mundane.

    Messages:
    25,051
    Likes Received:
    12
  15. raoul duke420

    raoul duke420 Member

    Messages:
    274
    Likes Received:
    0

    Dude why did the dea raid ya? What were you charged with?
     
  16. somenerdyfreak

    somenerdyfreak Member

    Messages:
    183
    Likes Received:
    0
    why don't we make a law enforcement agency that arrests rapists and burglars, not hippies and teenagers. damn DEA. what a waste of money, effort, life...is there anything good that comes out of the DEA?
     
  17. The Mushroom Man

    The Mushroom Man Member

    Messages:
    377
    Likes Received:
    0
    A-Fucking-Men to that!

    The Mushroom Man
     
  18. ODB

    ODB Member

    Messages:
    399
    Likes Received:
    0
    This is odd. Swim is unable to log into 2 of swims hushmail accounts. They happen to be the accounts that swim talks to vendors with. Its telling swim that the pass phrase is incorrect. Swims hushmail account that has not been talking with vendors is fine.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice