, , , , , ,

James McGibney (who we don't like)

James McGibney (who we don’t like)


Accused pedophile, Director of IT Infrastructure at Rosendin Electric, San Jose, CA based convicted revenge pornographer and sexual blackmail artist, James McGibney (who we don’t like), can add yet another line to the epitaph that will soon be written upon his gravestone – failed computer hacker. 

Seriously – 100% VERIFIED!




An interesting little drama was playing itself out Sunday while your Admins and most of the country were watching football games.  James McGibney (who we don’t like) got it into his head that it would be a good idea to try and take out our little libel blog here using some “free speech” techniques that his Vicodin using attorney, Jay Leiderman, has advocated ought to be decriminalized in the past.


Specifically, McGibney and his one remaining supporter decided it would be a good idea to commit some federal felonies and launch a DDoS attack against our website.  After all, doing so really worked out well for his fellow ViaView, Inc. employees Deric Lostutter and Matthew Keys.





FUN FACT:  According to Wikipedia, “a denial of service attack  is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.”  Meaning you spam the website with bullshit in order to keep everyone else from being able to see it.



Like we said above:  Launching DDoS attacks and hacking websites really worked out well for McGibney’s fellow ViaView, Inc. employees Deric Lostutter and Matthew Keys.


Oh, wait a minute…..  Keys is doing hard time right now in a maximum security federal prison for violating the Federal Computer Fraud & Abuse Act (CFAA) and Lostutter is scheduled to go on trial November 8 in U.S. District Court in Kentucky for four felony counts of making false statements to FBI agents, causing transmission of programs without authorization to damage a computer, accessing a computer to obtain information as part of crime and conspiring to commit offenses against the United States.  So, yeah, that really worked out well for those guys.  So why shouldn’t McGibney try it, too, eh?


However, good thing for you, our teeming MILLIONS of readers, listeners, and supporters, your American Heroes & Honorary Admins of the BV Files Jeffrey Dorrell, Joe Fisher, Thomas Retzlaff, Mark Sparks, and Layne Walker, are not afraid to lay out some serious cash to help us keep this shit going!!


See, not only do we, your actual Admins, Mike & Dean, shell out about $110 a month in website fees to have this blog hosted on a Bulletproof Server in Dubai, but some serious coin is also needed to pay for CloudFlare’s Business plan services to make sure we can stay online, secure in the knowledge that we can still post our libels and our death threats and our dox and keep our lulz going 24 / 7 / 365.  While there is a free version of CloudFlare available, that does not come with any tech support.  If you want to be able to pick up the phone and get some help, say on a Sunday night while everyone is home preparing for bed or watching football, you got to pay, son.  And CloudFlare is not cheap (at least not as cheap as Jimmy’s wife, Christina, who likes to suck dick in the parking lot of the San Jose Costco off the West Valley Freeway).


But because we feel that what we do here is so super important (not to mention so super entertaining), your American Heroes & Honorary Admins do not mind shelling out the bucks necessary to keep this shit going.


PAY ATTENTION to the screen shots below as they will show and tell you the story of how this DDoS attack against the blog unfolded in real time.  All times shown are California – in the U.S. Pacific Time Zone (UTC-0800) because that is where your Admins live.


Because this attack started on a Sunday morning, when normal people are either in bed, at church, or getting ready for some football, nobody was hanging around the blog here to notice any performance issues or lag.



cloudflare-report-at-2pm-pt cloudflare-report-at-2pm-pt-2


FUN FACT:  CloudFlare has been vocal of their support of free speech values, with the CEO stating: “One of the greatest strengths of the United States is a belief that speech, particularly political speech, is sacred. A website, of course, is nothing but speech,”…”A website is speech. It is not a bomb. There is no imminent danger it creates and no provider has an affirmative obligation to monitor and make determinations about the theoretically harmful nature of speech a site may contain.”



Excerpt from affidavit written by McGibney

Excerpt from affidavit written by McGibney

Despite what James McGibney says, being able to call him a pedophile is, in fact, Free Speech.  So suck it, bitch!  In fact, you and your wife can suck it long and suck it hard.  Go wrap that up in a motion and tell it to Judge Freeman, or, better yet, have your child abusing, criminal of an attorney John Morgan file yet another Motion to Recuse The Entire Ninth Court of Appeals and cry to them all about it.  Bitch.


BV is a pedo #1


BONUS FUN FACT:  Two of ISIS’ top three online chat forums are guarded by CloudFlare – seriously!  On November 2015, Anonymous discouraged the use of CloudFlare’s services, following the ISIS attacks in Paris and renewed accusation of providing help to terrorists.  CloudFlare responded by calling their accusers “15-year-old kids in Guy Fawkes masks” and saying that whenever such concerns are raised they consult actual anti-terrorism experts and not homos who sit around on Twitter trying to chat up little girls.

Cloudfare complaint #2




cloudflare-as-of-5pm-pt cloudflare-as-of-5pm-pt-2


Ever since we first started our libel blog and signed up for CloudFlare McGibney and his group of Twitter nerds have been trying to either get CloudFlare to terminate its service contract with us:

Cloudfare complaint


Or to get the US Government to file criminal charges against CloudFlare and us.




McGibney, of course, is a fag.  See, it even says so right here on the TV!

McGibney = Expert Faggot


FUN FACT:  One of Leiderman’s many clients is Christopher Doyon, a 52-year-old homeless man who was arrested by the FBI for launching DDoS attacks against the Santa Cruz County (Calif) government websites in 2011.  He jumped bail on a federal computer hacking case and is currently hiding out in Canada.  Leiderman and him frequently ‘tweet’ to one another about how great life is while on the run.  In Canada.  While being homeless.

commander X tweet 1-13-2015 #2 Comm X tweet

The fact that Keys' attorney is also in communication with a fugitive from justice / computer hacker

The fact that Keys’ attorney is also in communication with a fugitive from justice / computer hacker




cloudflare-as-of-7pm-pt cloudflare-as-of-7pm-pt-2


So what kind of attack was launched against our favorite libel blog?  Well, according to an expert on The Internet, this is what happened:


They’re all Linux, all offer ssh to the world:

[email protected]:# telnet 22
Connected to
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.7

[email protected]:# telnet 22
Connected to

[email protected]:# telnet 22
Connected to
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.7

None of them are running pop mail. I also checked IMAP and web, these are not hosting VPSes, they’re just random Linux VPSes with no discernible purpose:

[email protected]:# telnet 110
telnet: Unable to connect to remote host: Connection refused

[email protected]:# telnet 110

[email protected]:# telnet 110
telnet: Unable to connect to remote host: Connection refused





However, that turned out not to be the case.  In fact, due to the efforts of Super Lawyer Sue Basko, we were able to get a hold of Joseph (Jo Jo) Camp from his dungeon prison cell somewhere in Colorado and he was able to quickly set things to right.  CHECK IT OUT!



cloudflare-as-of-8pm-pt-2 cloudflare-as-of-8pm-pt




cloudflare-as-of-9pm-pt cloudflare-as-of-9pm-pt-2


At CloudFlare, an attack needs to get over about 5Gbps to set off alarms with our ops team. Even then, our automated network defenses usually stop attacks without the need of any manual intervention. When an attack gets up in the tens of Gigabits of data per second, our ops team starts monitoring the attack: applying filters and shifting traffic to ensure the attacked customer’s site stays online and none of the rest of our network is affected.

— Some nerd that works for Cloudflare


Fortunately for you, our teeming MILLIONS of readers, listeners, and supporters, the people behind your favorite blog are not only willing to shell out the $110 a month in server fees it costs to host us on a Bulletproof server, but we also have paid 24 / 7 Tech Support from the kind folks over at CloudFlare as a part of our Business enterprise subscription plan.


Why do we pay so much money to host our blog on an overseas server?  CHECK IT OUT!

Bulletproof host 4 Bulletproof host 2 Bulletproof host 3

So did you get that?

  1. No abuse complaints, DMCA take-downs, or court orders can affect us.
  2. We can post and talk about anything we want to – seriously, anything.
  3. It is all completely and utterly anonymous.




A backroom somewhere in Dubai, UAE

A backroom somewhere in Dubai, UAE



This is how many visitors we normally get on a daily basis:


However during the DDoS attack we got TENS OF MILLIONS of “visitors” in the span of just a few hours.



Hey BV Files – How large of a DDoS attack can CloudFlare handle?, you ask.  Well, hold on a moment while we finish taking our “medical” marijuana and we will tell ya!


CloudFlare’s DDoS protection is effective for any attack size and any type of attack (Layer3/4, Layer 7 or DNS).  CloudFlare has no attack cap size and they kindly do not charge overage fees.  Common attack size range from 10Gbps to 65Gbps.  However, they have seen larger attacks.  For example, CloudFlare had a customer that received an attack that was 500Gbps.  This is highly uncommon and was reported as the largest DDoS in history – CloudFlare mitigated the attack for their customer Spamhaus.


FUN FACT: On March 18, 2013 Spamhaus contacted CloudFlare regarding an attack they were seeing against their website spamhaus.org.  They signed up for CloudFlare and they quickly mitigated the attack.  The attack, initially, was approximately 10Gbps generated largely from open DNS recursors.  On March 19, the attack increased in size, peaking at approximately 90Gbps.  The attack fluctuated between 90Gbps and 30Gbps until 01:15 UTC on on March 21.

The attackers were quiet for a day.  Then, on March 22 at 18:00 UTC, the attack resumed, peaking at 120Gbps of traffic hitting the CloudFlare network.


Just one month after this attack a 16 year old boy named Seth Nolan Mcdonagh was arrested in London was arrested.  He was later found with child porn and diagnosed with a mental illiness.  (Sounds a lot like James McGibney).



So, BV Files, how does an attacker generate 120 Gbps of traffic?  It is highly unlikely that the attacker has a single machine with a big enough Internet connection to generate that much traffic on its own.  One way to generate that much traffic is through a botnet.  A botnet is a collection of PCs that have been compromised with a virus and can be controlled by what is known as a botnet herder.


And how did James McGibney, who claims to be basically indigent on account of the court sanctions levied against him in the Texas SLAPP suit he filed, afford a botnet?  Well, you will just have to ask this lady here below, Christina McGibney, Jimmy’s wife!

This woman sucks cock for money - seriously

This woman sucks cock for money – seriously

How many dicks did she have to suck in order to afford the rental fees on Jimmy’s botnet for the DDoS attack?  Dozens, my friend.  Dozens.

So to continue on with our story here….


Spamhaus provides one of the key backbones that underpins much of the anti-spam filtering online.  Run by a tireless team of volunteers, Spamhaus patrols the Internet for spammers and publishes a list of the servers they use to send their messages in order to empower email system administrators to filter unwanted messages. Spamhaus’s services are so pervasive and important to the operation of the Internet’s email architecture that, when a lawsuit threatened to shut the service down, industry experts testified that doing so risked literally breaking email since Spamhaus is directly or indirectly responsible for filtering as much as 80% of daily spam messages.

Beginning on March 18, the Spamhaus site came under attack.  The attack was large enough that the Spamhaus team wasn’t sure of its size when they contacted CloudFlare for help.  It was sufficiently large to fully saturate their connection to the rest of the Internet and knock their site offline.  These very large attacks, which are known as Layer 3 attacks, are difficult to stop with any on-premise solution.

Put simply: if you have a router with a 10Gbps port, and someone sends you 11Gbps of traffic, it doesn’t matter what intelligent software you have to stop the attack because your network link is completely saturated.

Like our little blog here, Spamhaus has a lot of enemies on the interwebs.

Very large Layer 3 attacks are nearly always originated from a number of sources. These many sources each send traffic to a single Internet location, effectively creating a tidal wave that overwhelms the target’s resources.  In this sense, the attack is distributed (the first D in DDoS — Distributed Denial of Service).  The sources of attack traffic can be a group of individuals working together (e.g., the Anonymous LOIC model, although this is Layer 7 traffic and even at high volumes usually much smaller in volume than other methods), a botnet of compromised PCs, a botnet of compromised servers, misconfigured DNS resolvers, or even home Internet routers with weak passwords.

Yeah, so lazy assholes like you could be helping people DDoS websites like the BV Files!  So fix your fucking passwords!!

Since an attacker attempting to launch a Layer 3 attack doesn’t care about receiving a response to the requests they send, the packets that make up the attack do not have to be accurate or correctly formatted.  Attackers will regularly spoof all the information in the attack packets, including the source IP, making it look like the attack is coming from a virtually infinite number of sources.  Since packets data can be fully randomized, using techniques like IP filtering even upstream becomes virtually useless.


While large Layer 3 attacks are difficult for an on-premise DDoS solution to mitigate, CloudFlare’s network was specifically designed from the beginning to stop these types of attacks.  CloudFlare makes heavy use of Anycast. That means the same IP address is announced from every one of their 23 worldwide data centers.  The network itself load balances requests to the nearest facility.  Under normal circumstances, this helps CloudFlare ensure a visitor is routed to the nearest data center on our network.

When there’s an attack, Anycast serves to effectively dilute it by spreading it across CloudFlare’s facilities.  Since every data center announces the same IP address for any CloudFlare customer, traffic cannot be concentrated in any one location.  Instead of the attack being many-to-one, it becomes many-to-many with no single point on the network acting as a bottleneck.

Once diluted, the attack becomes relatively easy to stop at each of the CloudFlare data centers.  Because CloudFlare acts as a virtual shield in front of its customers sites, with Layer 3 attacks none of the attack traffic reaches the customer’s servers.





cloudflare-as-of-11pm-pt cloudflare-as-of-11pm-pt-2

And now everything is back to normal now that we have CloudFlare’s Business enterprise services on the job watching our backs – fully paid up for the next 12 months thanks to our American Heroes & Honorary Admins of the BV Files!



latest news

Poor John Morgan.  Everybody here has heard of Beaumont, Texas, attorney John Morgan, right?  He is the guy who was arrested and CONVICTED of filing a series of false police reports against his ex-wife (an Assistant District Attorney) in a failed scheme to steal custody of his children from her.

Anyways, he filed a LOLsuit against American Hero & Honorary Admin of the BV Files Texas State Judge Layne Walker.  A bit over a week ago Morgan filed a drug fueled Motion to Recuse The Entire Ninth Court Of Appeals to keep them from deciding on an appeal in a SLAPP suit Morgan filed against Judge Walker.

Here are the results:

order-from-j-kreger order-from-cj-mckeithen order-from-j-horton

Yeah, Morgan filed three motions seeking to recuse (or remove) three of the judges on the Beaumont Court of Appeals.  Unfortunately for Morgan, Chief Justice McKeithen is a long-standing member of the Retzlaff – Dorrell Death Threats Team that is being run out of the Hanzen-LaPorte Law Firm in Houston, Texas.

Beaumont Court of Appeals Chief Justice Steve McKeithen

Beaumont Court of Appeals Chief Justice Steve McKeithen


How many years has Steve McKeithen hated John Morgan and Philip Klein?  That answer will have to wait till later this week to be revealed.  Seriously.

Motions for recusal of judges who make unfavorable rulings are a standard method of operation for Morgan.  He does this in nearly ever single case.

The test for recusal under Texas Rule of Civil Procedure 18b(b) is whether a reasonable member of the public, knowing all the facts in the public domain concerning the judge’s conduct, would have a reasonable doubt that the judge is actually impartial.

Later this week will will do a full article about the “reasonable person” standard and how that applies here.

FUN FACT:  Morgan sued his children’s swim coach for slander, defamation, and
parental alienation in Cause No. B-185,633 styled Morgan v. Loken filed in the 60th District Court of Jefferson County, Texas.

Morgan also sued his own attorney for defamation in Cause No. B-182-583 styled Morgan v. Jamail also filed in the 60th District Court of Jefferson County, Texas.



Beaumont attorney John S. Morgan

Beaumont attorney John S. Morgan



Anybody else want to see more child abusing drug addicts?


klein-in-a-couch fat-carol-on-a-couch klein-in-a-couch-2Yes, that is Nederland, TX based private investigator Philip Klein and his daughter Caroline.  They are both a couple of scam artists who go around the country defrauding the families of missing children by falsely claiming to be missing child experts.

Don’t believe us?  Just ask the family of DeOrr Kunz in Idaho.  They recently filed a lawsuit against Klein and his gang of crooks for scamming them out of $20,000.


Click in the link here below to read more about this

Parents, grandparents of DeOrr Kunz Jr. file lawsuit against private investigator



We here at the BV Files really hate to fat-sham someone.  But, well, these two are a couple of fucking hippos – seriously.  Klein and his daughter never met a buffet that they did not like.  At one point Klein was the owner of a local Dairy Queen – until it went bankrupt because Klein embezzled all the monies from his father-in-law and all the mixings for the Blizzards mysteriously disappeared one dark and lonely night.  CHECK IT OUT!

Klein creditors_Page_01 Klein creditors_Page_02Klein creditors_Page_03 Klein creditors_Page_04 Klein creditors_Page_05 Klein creditors_Page_06Klein creditors_Page_07 Klein creditors_Page_08 Klein creditors_Page_09Klein creditors_Page_09 Klein creditors_Page_10 Klein creditors_Page_11

Caroline Gear Klein 7-8-2016With a mouth like that, she could make a lot of money.  Yeah… a lot of money.


SUPER FUN FACT:  Morgan’s ex-wife, Kathleen, had to get a restraining order to protect herself from Morgan.  Morgan was prohibited from beating her and the children, calling in the middle of the night to call her profane names and from tampering with their property or funds.





So that’s all for now.  More will be forthcoming later this week, sometime around October 6th we suspect.

Klein and Morgan are both facing $1 million in court sanctions in San Antonio, Texas, for filing yet another SLAPP suit against someone who simply cannot be intimidated by them.

BV getting peed on

0 0 vote
Article Rating