I don't have any idea what they were doing, but as horrified as he was, I'm guessing it must involve something weird.What kind of perv are we talking about here?"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
Are talking two naked women with a funnel and a fish?
two naked women using a funnel and fish to commit an unnatural sex act.”Read more at http://blacksportsonline.com/home/2011/01/afl-coach-tim-marcum-racist-obama-emails-weird-porn-revealed-in-lawsuit/#chZWxMKBeOpgt25x.99
“a video of two naked women using a funnel and fish to commit an unnatural sex act.”Read more at http://blacksportsonline.com/home/2011/01/afl-coach-tim-marcum-racist-obama-emails-weird-porn-revealed-in-lawsuit/#chZWxMKBeOpgt25x.99
More importantly, what kind of club does he think he's joining?He thinks pretty highly of himself. Why would his employer care unless his GF is a partner's wife?"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
now we need details.Either way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
he met the requirements. Welcome to the 9th floor.
I have none. Again, I just assume.now we need details.Either way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
he met the requirements. Welcome to the 9th floor.
Exactly. Go with the wang pic idea. Tell him to post this kids email in every public location he can. Send him a different weang pic every day, like a wang of the month club. SchlzmEither way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
he met the requirements. Welcome to the 9th floor.
Wait, this is real? This changes everything.Okay, I guess I can trust you guys. This conversation really just happened. In my office. With a very frightened looking law clerk.
Boy, I hope not.Officer Pete Malloy, Schlzm, Facebook (2), E Street Brat, kutta, Herc, WampusCat43, Jedi Knight, kentric, jplvr
Does this mean he and his GF are reading this?![]()
It's the gift that keeps on giving, ClarkExactly. Go with the wang pic idea. Tell him to post this kids email in every public location he can. Send him a different weang pic every day, like a wang of the month club.SchlzmEither way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
he met the requirements. Welcome to the 9th floor.
I'm not going to tell him to delete emails admitting to crimes. That would be not very smart.Have him do nothing, except delete emails if they come. The picture thief needs to communicate to extort anything, so don't provide an opportunity. If there are no fish in the pond, people generally give up fishing.
Panic, judging by his face.which state?
Pffft. I hear that there are law clerks who put ridiculously embarrassing stuff and pictures of themselves and their girlfriends on the internet while in law school who turn out just fine. Kid will be fine.Okay, I guess I can trust you guys. This conversation really just happened. In my office. With a very frightened looking law clerk.
Please for all things awesome tell him to put this on his character and fitness.Panic, judging by his face.which state?
Lock it upjust call the cops brohan and then go and let them just squash that guy they will set it up and bam next thing you know some john law is kneeling on this jbags neck and he is crying and double bam bad boys bad boys start playing and you know they are beating that guy senseless the minute the credits roll take that to the bank brohans but in all honesty just swallow your pride and call the cops and let them get this jboy
If I had a dollar for every time Woz said this..."I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
Well, maybe it wasn't you.But she caught me on the counter (It wasn't me)
Saw me bangin' on the sofa (It wasn't me)
I even had her in the shower (It wasn't me)
She even caught me on camera (It wasn't me)
Excellent idea.ask for his phone, beat the crap out of it with a hammer, and then tell him "problem solved."
[/ronswanson]
OK, Tell him to archive themI'm not going to tell him to delete emails admitting to crimes. That would be not very smart.Have him do nothing, except delete emails if they come. The picture thief needs to communicate to extort anything, so don't provide an opportunity. If there are no fish in the pond, people generally give up fishing.
I wish I had a dollar for every time I said that.If I had a dollar for every time Woz said this..."I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."
![]()
Merv?Yankee23Fan said:Oh and I would not let him live this down for basically ever. He needs a nickname now to remind him of this incident.
I did refer to him as Senor Danger when he left for the day.Yankee23Fan said:Oh and I would not let him live this down for basically ever. He needs a nickname now to remind him of this incident.
I told him that the Louisiana Bar won't even let you join if you're under 40 and they suspect your penis isn't on the internet somewhere.Zow said:Please for all things awesome tell him to put this on his character and fitness.Henry Ford said:Panic, judging by his face.Zow said:which state?
where should I send my $2000?I just sent out 2000 emails saying I hacked people's phones and will provide the information to their s/o if they don't send me $2000. Hypothetically, how many will bite?
I think you shot too high on the payoff. Would you rather have 5 people send you $2000, or 100 people send you $100?I just sent out 2000 emails saying I hacked people's phones and will provide the information to their s/o if they don't send me $2000. Hypothetically, how many will bite?
I don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmI don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
That makes sense. I think I'm just used to my phone always being on a wifi network.Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmI don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
If we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmI don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
Another item that is being "field tested" are malicious platform independant advertisement based droppers. We've seen plenty of this activity on standard computer systems but due to the standardization of phone operating systems code is being tweaked to include mobile platforms as well, so surfing to a site that has one of these ads in its rotation could result in a compromise. SchlzmThat makes sense. I think I'm just used to my phone always being on a wifi network.Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmI don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
Password rest to something stronger and lesson learned. Or you know, don't just blast every intimate part of your life out to the ether.SchlzmIf we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmI don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
Indeed.Password rest to something stronger and lesson learned. Or you know, don't just blast every intimate part of your life out to the ether.SchlzmIf we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmI don't doubt you, but how is it any different than hacking a laptop?Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
That's what I was going to say.listen i saw on alaska troopers that these cops would sit up on a bluff with some binoculars and then bust guys for fishing wrong and hells bells if there are guys that will bust you for fishing wrong i mean holy cow its like hey you are using a rapala when you can only use live bait i know you are thinking did i fire five shots or six well in all the excitement i sort of lost track myself so are you feeling lucky punk you just know that they are going to go all wyatt erp on some sucker commiting blackmail so my suggestion is to call the alaska state troopers and get them on the job take that to the bank brohans
1. I think it's a scam and no one has any pictures.Someone (let's call him Jim) comes to you and says he got a disturbing email. The email said something to the effect of "Hey, Jim, you don't know me, but I pulled all the private photos and video off of your iphone remotely while learning how to hack apple systems, and I think I may send them to your girlfriend."
Jim asks you for advice. He tells you that the photos/video in question are "sensitive" and "embarrassing" but not illegal. What's your suggestion?
Makes sense to me too. And I did inquire about this to and got the impression it was still more difficult.TheIronSheik said:That makes sense. I think I'm just used to my phone always being on a wifi network.Schlzm said:Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmTheIronSheik said:I don't doubt you, but how is it any different than hacking a laptop?Zow said:Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
Please tell me he has it synced with the Firm's cloud service...Henry Ford said:If we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.Schlzm said:Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.SchlzmTheIronSheik said:I don't doubt you, but how is it any different than hacking a laptop?Zow said:Some serious insight:
A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.