Jump to content
Shonen

Bringing an iPad with x-rated photos

Recommended Posts

Because most pedophiles are male?

How do you know that? When I read the last years news about adults who have sex with underage boys it are in most cases female teachers or mother of a friend. In American and UK news you read this all the time. I am sure in other countries it's the same but when a woman is involved it looks like the drive to go to police is less. If a father finds out his14 year old son is sleeping with an adult female the inclination is less for him to rush to police than when it was an adult male. Also women receive less punishment when prosecuted.

 

When you carefully read the news and observe women who work with teenage boys it is very clear pedophilia ( technically it is not pedophilia by the way, when you like teens) is not rare among women at all.

 

Women are also sex tourists. Read on the net about European women who go for cheap sex to Africa.

 

So all the reason to also check on women. If that is not happening it is discrimination.

Link to comment
Share on other sites

Older Western women visit Gambia in Africa and also Jamaica with a view to having sex with black guys. The former has a well developed infrastructure of hotels, bars etc and and flight time is only 5 or 6 hours from Europe. Inexpensive package trips are available with warm sunny weather in the Northern winter.

I did a little research thinking about going there myself but there were reports of hostility towards gays. One report mentioned 50+ blonde Swedish women with Boys on the beaches and in bars, to whom they give gifts of money, clothes and iPhones.

Sounds a bit familiar ?

Link to comment
Share on other sites

Guest ryanasia

Hmmm women don't tend to like the younger babyface twinks in general. Some do but let's not kid ourselves. Even though some women go to Gambia for sex it still makes sense to single out single guys above 30 coming from Thailand especially those that have been there frequently.

 

Now we could argue if you are a customs agent and the flight you are working comes in from Gambia or Jamaica maybe you go after women. Seems pretty obvious why they single out single guys coming from SE Asia. You can argue if profiling is wrong to use as a law enforcement tool and that is valid. However you can not really argue if it is in use and a legal means of enforcing laws that they have the profile wrong. 

 

Anyway it seems we have solved the problem of how to get an iPad through an airport. 

Link to comment
Share on other sites

???  bkkguy, have you been taking writing lessons from pong?

 

so you know what a "can of worms" is - if not google it, then given our two junior lawyers' penchant for quoting the US Constitution the leap to understanding a "constitutional can of worms" is not that great; then to protect our pictures on our mobile devices we could use for example a password or on newer devices a fingerprint and thus could be asked by the authorities to "unlock"  out data using these, but while the constitutional "right to remain silent" is generally agreed to apply to a request to supply a password - a "testimonial communication" (google it) - it is still debatable (and it is a mass debate) if it applies to a request to supply a fingerprint (google it)

 

clear as mud (google it)?

 

and steveboy the truecrypt claim of "plausible deniability" (google it) applied to a truecrypt container within a truecrypt container not to a truecypt container itself, and given the truecrypt canary incident (google it) why haven't you switched to veracrypt (google it)?

 

bkkguy (google it - or ask pong)

Link to comment
Share on other sites

If I were law enforcement it is so easy to enter a TrueCrypt container.

 

Say you know someone is using TrueCrypt and say you have information which makes it not that unlikely it contains illegal files. Then you can get a warrant from a judge to break into his house and install a keylogger on his computer (and maybe NSA or CIA can do this without a warrant). The next time he types his TrueCrypt password the keylogger logs the password and sends it to law enforcement. The next day they enter your house again, type the password and see your files.

 

Easy. 

 

Best way to stay safe: do not do anything illegal. Makes photos of the ID cards of the boys you off. 

 

PS: I wouldnt be surprised in some jurisdictions the fact you go to Thailand alone multiple times is enough to install a keylogger and secretly monitor you. Provided you are male of course. Catching females who have sex with underage boys is low priority.

Link to comment
Share on other sites

If I were law enforcement it is so easy to enter a TrueCrypt container.

 

Say you know someone is using TrueCrypt and say you have information which makes it not that unlikely it contains illegal files. Then you can get a warrant from a judge to break into his house and install a keylogger on his computer (and maybe NSA or CIA can do this without a warrant). The next time he types his TrueCrypt password the keylogger logs the password and sends it to law enforcement. The next day they enter your house again, type the password and see your files.

 

Easy. 

 

Easy peasy?  LOL!

You don't need to TYPE a password.  

You can have it written in a text file.

Then you do a copy and paste from this file and into the field for it.

No keylogger will be able to figure it out.

Link to comment
Share on other sites

Here is what you do... just come clean. Declare your pornographic items at the border. Don't be the victim of profiling. 

 

The problem is some of the boys we off, while of legal age, can look to that official 17 or even 16. Above it says that alone can be enough for conviction. So you need picture of ID card too. If you don't have that it is wiser not to come clean.

Link to comment
Share on other sites

You can have it written in a text file.

Then you do a copy and paste from this file and into the field for it.

No keylogger will be able to figure it out.

 

and clipboard loggers are so difficult to install while you are there installing the keystroke logger? given you have been able to get the search warrant so easily!

 

perhaps Shonen could chime in here and let us know if any of the "expert" posts here have actually helped him make an informed decision about taking his iPad to Thailand

 

bkkguy

Link to comment
Share on other sites

Guest ryanasia

and clipboard loggers are so difficult to install while you are there installing the keystroke logger? given you have been able to get the search warrant so easily!

 

perhaps Shonen could chime in here and let us know if any of the "expert" posts here have actually helped him make an informed decision about taking his iPad to Thailand

 

bkkguy

 

Okay if we are going to go down this road the thread is about an iPad. When the FBI themselves obtained an iPhone they couldn't easily defeat the pass code. They even tried to force Apple to give them a back door which Apple thankfully completely rejected.

 

They went to court and dropped the case eventually. They hired an Israeli forensics service to obtain access to the phone. They paid a large amount of money to do so. So to make a short story long you can not easily obtain access to a pass code protected device even if you are the FBI. So stop spreading nonsense you can not install a key logger to access a device that is locked already. Remember the OP is about an iPad not some laptop that has a file vault and isn't password protected at the admin level.

 

Again we have already solved the problem anyway. You can not discover on a device what isn't on the device and even a 12 year old child would understand how to move data around the world with out it being subject to the whims of any border patrol agent in the first place.

 

So I guess the advice I would give is beef up passwords on all of your cloud accounts.

Link to comment
Share on other sites

 

So I guess the advice I would give is beef up passwords on all of your cloud accounts.

 

But this doesn't address the following. Many cloud storage providers (Microsoft for example) have a tool which scans all photos being uploaded and flags them if that tool thinks there is a naked underage person in it. These tools exist.

What if this tool flags a perfectly legal 19 year old Thai boy as underage? They go to police, and you get convicted even when you did nothing wrong, because if the jury thinks he is not 19, but 17, big problem for you.

Link to comment
Share on other sites

and clipboard loggers are so difficult to install while you are there installing the keystroke logger? given you have been able to get the search warrant so easily!

 

Clipboards are very easy to install. So then all the clipboard contents and keystrokes can be logged.

But I don't think one can log the mouse clicks and where they point to.

So what does the Authority do with all the clipboards and keystrokes if it doesn't know if they are specifically passwords to a truecrypt file?

 

If you are a little creative you can protect your passwords even further.

You don't need to enter a password as a continuous string.

You can enter in the field fragments of the password in different orders, depending on where you click on.

Do this on a long password, and it will take infinite time to figure it out.

Just what the border agent wants to do with any laptop, as if it would contain the secret codes to launch nuclear weapons...

 

And if you think that an ipad or any tablet is less secure than a laptop...

then why take a tablet with you instead of a laptop?

Laptops running windows are nearly as portable today, and much more useful.

Link to comment
Share on other sites

Guest ryanasia

But this doesn't address the following. Many cloud storage providers (Microsoft for example) have a tool which scans all photos being uploaded and flags them if that tool thinks there is a naked underage person in it. These tools exist.

What if this tool flags a perfectly legal 19 year old Thai boy as underage? They go to police, and you get convicted even when you did nothing wrong, because if the jury thinks he is not 19, but 17, big problem for you.

I see your point however this is safer than taking these photos of teenagers through an airport especially going to the USA. At some point i guess you have to weigh up the risks of what you are doing. It has been said laws are weird at the USA airports upon arrival. If it is in the cloud and you don't give your password, and they let you in the USA you have a much stronger base of rights. 

 

What is so important about these photos you are going to risk facing a felony for every photo you have? Yes, it stinks that it is that way, however who in their right mind even risks this? 

 

Okay one difference between the cloud and local storage is.... given the discussion about American soil and the lack of rights at borders is to access Google's servers which are on American soil does require a warrant. You do not give your password under any circumstances ever and call a lawyer.

 

Are there risks sure? However it is pretty simple I think to understand why having things on the cloud is safer than having them locally stored when going through a border. Most people are already on the cloud anyway and exposed to the risk everyday. Your proportionate amount of risk becomes higher when you expose yourself to additional scrutiny. 

 

If you can not understand why you would be safer taking a clean device through the American border I don't know what to tell you. If you actually do have something to hide do not give them root access to your device as you will 100% certainly be convicted. 

 

If they have to get warrants for Google, Apple (all of which are protected as they are based with in the USA) it will become to costly and ineffective to pursue based upon you meeting a certain profile. Profiling to a large extent relies on the fact that people are ignorant of their rights, tired from traveling in this case and do not have legal counsel. 

 

It will become too expensive to chase after a random profile case that is random. There is lower hanging fruit. Mention a lawyer they will probably back off right away. If you are not a citizen refuse and you may be denied entry to the USA but that is better than staying for 100 years isn't it?

Link to comment
Share on other sites

Guest ryanasia

Clipboards are very easy to install. So then all the clipboard contents and keystrokes can be logged.

But I don't think one can log the mouse clicks and where they point to.

So what does the Authority do with all the clipboards and keystrokes if it doesn't know if they are specifically passwords to a truecrypt file?

 

If you are a little creative you can protect your passwords even further.

You don't need to enter a password as a continuous string.

You can enter in the field fragments of the password in different orders, depending on where you click on.

Do this on a long password, and it will take infinite time to figure it out.

Just what the border agent wants to do with any laptop, as if it would contain the secret codes to launch nuclear weapons...

 

And if you think that an ipad or any tablet is less secure than a laptop...

then why take a tablet with you instead of a laptop?

Laptops running windows are nearly as portable today, and much more useful.

 

This assumes you do not have a root password installed. You can not install a keyboard logger retroactively to obtain the root password. To install anything requires the root password. If you have a work around for this you will become a billionaire.

Link to comment
Share on other sites

This assumes you do not have a root password installed. You can not install a keyboard logger retroactively to obtain the root password. To install anything requires the root password. If you have a work around for this you will become a billionaire.

 

I am assuming all along that if asked, I will open my account for inspection.

Why should I intentionally inspire suspicion?

 

I'm getting a clearer picture of the situation.  

When I go to BKK with my treasured collection of pictures in a encrypted file, I have little to fear.

Before returning home, I will delete the encrypted file, which will not have left traces of its content on the hard drive.  I have the pictures back at home anyway.

Any new compromising pictures added during the vacation I can find back on the internet, since i don't take pictures of nude boys myself.

 

Problem solved :)

Link to comment
Share on other sites

I read this thread before I returned home and I decided to delete a lot of photos (screenshots from hornet) and store my stuff in a true crypt partition to avoid any problems.

 

I arrived yesterday from TL at washington and and was met at customs by 2 DHS agents who drove from Pennsylvania to follow up on a flagged kiddy porn person (me).  they said my travel pattern, single male in thailand (and other places) met the profile.  long story short, they have my phone, computer, camera, sd drives.  they said (if I gave them passwords and nothing was found) I would have them back in a week.

 

to my knowledge I have no illegal material, but I cannot prove against the court standard described which is "what a jury thinks".  I was not in TL to find sex with underage people.  my best time was with a 44 year old.  now all my memories of this trip will be destroyed by this event and the coming entanglements.  regardless of the outcome, entanglement with our bureaucracy is never fun or good for your life.  I will doubtless be subject to future searches and be on the watchlist forever.

Link to comment
Share on other sites

Guest ryanasia

I am assuming all along that if asked, I will open my account for inspection.

Why should I intentionally inspire suspicion?

 

I'm getting a clearer picture of the situation.  

When I go to BKK with my treasured collection of pictures in a encrypted file, I have little to fear.

Before returning home, I will delete the encrypted file, which will not have left traces of its content on the hard drive.  I have the pictures back at home anyway.

Any new compromising pictures added during the vacation I can find back on the internet, since i don't take pictures of nude boys myself.

 

Problem solved :)

 

The fact you are being asked in the first place means you have already aroused suspicion so it doesn't matter at this point. but yeah indeed problem solved. :)

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...