[Editor's Note: I get a lot of spam with mind control trigger
words embedded within the message ( as most of you do as well, but perhaps
you didn't know that the string of unrelated words that show up in the e-mail
before the graphic loads are used to trigger victims of mind control-and believe
me folks, there are many MILLIONS of such victims in this country). So this
one may be from an intel/military/government geek because there is no such
e mail address as "firstname.lastname@example.org" . I had to get
this out there in the public domain just in case they were hoping to use it
in the future. About two or three years ago, I was going through the photos
in my hard drive and came upon a photo of a small antiquated nuclear device
(a field nuke?) that had to be 20 years old and pobably Russian in design,
but I'm not really sure. Anyway, I certainly didn't acquire the photo on my
own, but rather had it inserted in my hard drive for me by our treasonous
friends who are now losing the battle it seems, whether they realize it or
not. A brighter day is coming for those who preserve and never lose sight
of the endgame. Maybe some of you who read this have the software to trace
out the origins of an e-mail and could tell me where this sender originated
his e mail. I pasted in the full path below the letter. Bet you a dollar to
a donut that it winds up at a military location..Ken]
June 14, 2004
From: MICHAEL MOTT <email@example.com>
Date: Mon, June 14, 2004 7:06 pm
hello, there was a delay in getting product but the sweetgrass is here and
out. chronic smoke may be delayed a day or few.. thank you and let me know
Delivery-date: Mon, 14 Jun 2004 19:07:01 -0700
Received: from [220.127.116.11] (helo=web86108.mail.ukl.yahoo.com)
by server1.ehostpros.com with smtp (Exim 4.34)
for firstname.lastname@example.org; Mon, 14 Jun 2004 19:07:01 -0700
Received: from [18.104.22.168] by web86108.mail.ukl.yahoo.com via HTTP; Tue,
15 Jun 2004 03:06:40 BST
Date: Tue, 15 Jun 2004 03:06:40 +0100 (BST)
From: =?iso-8859-1?q?MICHAEL=20MOTT?= <email@example.com>
Content-Type: multipart/alternative; boundary="0-1362580042-1087265200=:35250"
Comment from Readers
Subject: In regards to: "Is this a setup?"
Date: Thu, June 17, 2004 12:04 am
I'm not sure how much you know about web security so don't be offended if
I insult your intelligence.
Sending e-mails to inexistent accounts is an old hacking trick used to get
your WebServer's IP address. What happens is a hacker will send an email to
someone he knows doesn't exist "@yourdoamin.com". He will then receive
a mailer daemon email back with your server's info (the same info you got
from his email), including IP address. From there one would usually try a
dictionary attack which would try all of the most widely used passwords and
usernames to try and get in.
I ran a simple traceroute on the IP address on that email and it takes me
to a adsl-68-74-192-4.dsl.milwwi.ameritech.net (22.214.171.124). Ameritech.net
is actually SBC Yahoo, but that's not to say it isn't military goons behind
the whole thing. I'll look more into the IP address and see what I come up
with but in the meantime you should keep your eyes open and do daily backups
of your system, just in case.
All information posted on this web site is
the opinion of the author and is provided for educational purposes only.
It is not to be construed as medical advice. Only a licensed medical doctor
can legally offer medical advice in the United States. Consult the healer
of your choice for medical care and advice.