Pediatric Nurse Charged With Molestation of 2-Month-Old Foster Baby in San Diego: FBI

Read more.

Michael Williams Lutts was arrested Aug. 26, 2014, on suspicion of sexually molesting a 2-month-old foster baby in his care. He is shown in a booking photo provided by the FBI.

A pediatric nurse in San Diego allegedly sexually molested a prematurely born 2-month-old foster infant in his care, taking graphic cellphone photos and videos of the abuse, the FBI announced Wednesday.
Michael Williams Lutts was arrested Aug. 26, 2014, on suspicion of sexually molesting a 2-month-old foster baby in his care. He is shown in a booking photo provided by the FBI.

Michael William Lutts, 50, was arrested Tuesday after a search of his home found several hundred child pornography images and videos on computers, hard drives and other media, FBI Special Agency Darrell Foxworth stated in a news release.

A cellphone seized during the search contained evidence of Lutts sexually molesting a 2-month old infant at his home on Tierra Baja Way beginning Aug. 4, the day the foster baby was placed in his custody, according to the FBI.

The graphic images, described in detail in a federal criminal complaint filed against Lutts Wednesday, showed repeated acts of molestation over several weeks “with the baby crying throughout one video.”

I am physically ill. Nepi-sexuals are the worst pedophiles!!!

.onion sites – the hidden web where pedophiles hide

From Wikipedia, the free encyclopedia
.onion Introduced: 2004
TLD type: Pseudo-domain-style host suffix
Status: Not in root, but used by Tor clients, servers, and proxies
Registry: Tor
Intended use: To designate a hidden service reachable via Tor
Actual use: Used by Tor users for services in which both the provider and the user are anonymous and difficult to trace
Registration restrictions: Addresses are “registered” automatically by Tor client when a hidden service is set up
Structure: Names are opaque strings generated from public keys
Documents: Tor design document
Dispute policies: N/A

.onion is a pseudo-top-level domain host suffix (similar in concept to such endings as .bitnet and .uucp used in earlier times) designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider.

Addresses in the .onion pseudo-TLD are opaque, non-mnemonic, 16-character alpha-semi-numeric hashes which are automatically generated based on a public key when a hidden service is configured. These 16-character hashes can be made up of any letter of the alphabet, and decimal digits beginning with 2 and ending with 7, thus representing an 80-bit number in base32.

The “onion” name refers to onion routing, the technique used by Tor to achieve a degree of anonymity.

WWW to .onion Gateways
See also: Tor2web

Proxies into the Tor network like Tor2web, and allow access to hidden services from non-Tor browsers and for search engines that are not Tor-aware. By using a gateway, users give up their own anonymity and trust the gateway to deliver the correct content. Both the gateway and the hidden service can fingerprint the browser, and access user IP address data. Some Proxies use caching techniques to provide a better page-loading[1] than the official TOR-Bundle.[2] To use a gateway, replace the domain suffix .onion of any hidden service by,[3][4] or[5]

.exit is a pseudo-top-level domain used by Tor users to indicate on the fly to the Tor software the preferred exit node that should be used while connecting to a service such as a web server, without having to edit the configuration file for Tor (torrc)

The syntax used with this domain is hostname + .exitnode + .exit, so that a user wanting to connect to through node tor26 would have to enter the URL

Example uses for this include accessing a site available only to addresses of a certain country or checking if a certain node is working.

Users can also type exitnode.exit alone to access the IP address of exitnode.

The .exit notation is disabled by default as of version[6]

Pedophile tactics

This is the modus operandi: pedophiles go online, meet and flatter targets, lie about their ages and/or identities, pretend to be young and/or wealthy and/or celebrities, gain children’s trust, and then abuse them by cajoling them, whether it’s by talking them into taking lewd selfies, creating Skype accounts and then convincing them to strip in front of a camera, sextorting them by threatening to tell parents or share images publicly, or even, in some cases, meeting in real life.

At this point, both Google and Facebook are paving the way for preteen customers. Parents, know who your child is talking to online!

Philippine police close-down another online ‘sextortion’ ring

One frightening new development in the child sex trade is the advent of online “cyber sex.” In this form of CSEC, children are expected to perform, alone or with another child, sex acts for customers online before a web-cam. Paying $56 or more a minute, customers type in their instructions on the computer and watch them being carried out via a web-cam.

Appalling. Depraved. There aren’t enough words to express my horror and disgust that selfish mutants would do this to children.