Paul Krugman Denies Responsibility for Child Pornography Located on His Computer…

In a rather bizarre tweet without any background context New York Times columnist Paul Krugman denies responsibility for child pornography found on his computer:

In a follow-up tweet Krugman states: “The Times is now on the case”.   Apparently calling the police for a forensic review was out of the question, or something.  Very odd.

Next up: Crowdstrike!  Wait for it….

This entry was posted in Conspiracy ?, Dem Hypocrisy, media bias, Notorious Liars, Occupy Type Moonbats, Professional Idiots, Sex Scandals, Typical Prog Behavior, Uncategorized. Bookmark the permalink.

308 Responses to Paul Krugman Denies Responsibility for Child Pornography Located on His Computer…

  1. icanhasbailout says:

    OK so I figured this out… he fell for a common Indian phone scam


    • OmegaManBlue says:

      Yes possibly. There are people on youtube that go after these guys. What the scammers do is get you to call. When you call they get you to install a program that grants them control of your computer. Some of the guys on youtube have turned the program back around on them and got control of the scammers computers and took their money.

      Liked by 1 person

      • CountryClassVulgarian says:

        I love kitboga!!! Do you know that he started his channel because the scammers cheated his grandmother?

        One of the things that amazes me though is how people fall for the IRS scammers. I mean it’s like no one at the IRS speaks English? And all they can tell you is that there are “errors in calculations and computations” The “tech support” ones I can kinda see but the IRS ones are so weird.


        • OmegaManBlue says:

          Didn’t know how he started channel but it is feel good TV-Youtube seeing him take on the scammers. Think there are some other guys that do it too. Just remember him as first one I found.


        • Roni says:

          I’ve had calls from IRS scammers who spoke perfect English. I can imagine my parent’s generation being taken in bc they were very trusting and would definitely fear being called in by the IRS.
          An older member of my family had a scammer take over his computer. The guy made a convincing argument that his computer had been hacked, and he would protect him.
          Charged his credit card $1500, then tapped into his accounts. It was a nightmare.


        • 1stgoblyn says:

          I love Kitboga too, CCV. I especially enjoy the sessions when he keeps the scammers busy and frustrated enough that they are not on the phone calling and scamming others for hours at a time.


  2. Republicanvet91 says:

    I am sure someone has already pointed this out, but I don’t buy his excuse. An IP address is embedded on network cards. Not sure how that could be used by others unless they were accessing his computer.

    Liked by 1 person

    • icanhasbailout says:

      It’s a MAC address on the hardware. IP addresses are typically assigned via DHCP via a router.

      Liked by 1 person

      • Republicanvet91 says:

        Yeah, I’m sorry. I knew that it was a MAC address that is embedded and was thinking of an IP that is assigned statically.

        Wow I cannot believe I made that mistake!


        • squid2112 says:

          Sorry to be a bummer here .. but you can change the MAC address too. We do it all the time at work. I am an embedded software engineer and we alter and change MAC addresses all the time.

          But the bottom line here, for what Paul Krugman is describing, makes no difference at all. It doesn’t matter of someone spoofed his IP address or not, or even if they were able to spoof his MAC address. All of that is irrelevant. Give me 5 minutes on his equipment and I can tell you if he is telling the truth or not (hint: he’s not).

          As “iconhasbailout” indicates, his IP address is served up by his ISP from a DHCP server. Typically ISP’s provide very short IP address leases (like 24hrs or sometimes less). What this does is that virtually every time he connects to his ISP he is served a different IP address anyway, and someone else gets allocated his old IP address. They cycle like that all the time.

          I have been a software engineer and computer/network consultant for more than 35 years. Claiming someone “hacked my IP address” is a completely bullshht excuse and is total nonsense. Oh sure, it could happen, but that would have absolutely nothing to do with him browsing chld prn. Bottom line … Paul Krugman is a freaking retard and I suspect he is in some pretty deep sht right about now (or is going to be).

          Liked by 2 people

          • meow4me2 says:

            Squid, is it possible he’s just repeating the nonsense a scammer is telling him and believing it because he doesn’t know any better? I don’t have enough computer-network knowledge to have this lingo down correctly. I could fall prey to a scammer because I don’t understand something, but I’m at least aware enough to be suspicious of any cold contacts by “security”.


          • zekness says:

            well it really depends…there is alot more to it than that.

            a. ip addresses can be dynamic…and they can be static…depends entirely on the customer setup service…and the ISP…my isp is DHCP..but(and they can be both…which almost all are a hydrid….Now consider the implications of IPV6! Yeah…kind of forgot about that eh? it serves a leases dynamic IP to MY MODEM (WAN-public facing) for as long as 6 months! Sometimes more. Inside my lan, behind MY router/firewall/pi-hole (substitute ANY NAT router for consumer and SMB use cases), and I can configure my devices to spoof ANY MAC address (even yours!) and I can create a sub mask and domain to spoof any device (even yours).

            further…I can also create a secure tunnel…and effectively encypts all in transit traffic so my ISP can see the the traffic volume …and if I’m smart Im using a tor like network to proxy dns and routing. So the ISP can’t see the domain I am actually using. But they can still have some rather solid intel. Volume of traffic…persistency…timing. These are NOT things that can be obscured. (well, they can…but most high level geeks know the other alternative API and streams that can be used on top of TCP/IP. )

            so if this guy was really smart *he isn’t* he might could set up some pretty good privacy and security.

            but folks here is the thing about using high level security proxy methods: it’s a red flag you are doing some very serious efforts…it’s a porsche in the parking lot of junkyard vehicles.

            which explains why so many hackers actually use public wifi…randomly. with highly specialized distros that operate similar to some of the popular linux environments.

            tldr: there are ways, but ultimately, there is always going to be someone or some system or technology that is far smarter to locate your secrets.


    • Ozium says:

      MAC address is hard coded to the network adapter. IP addresses can be static or dynamic, but never hard coded.


      • Ironclaw says:

        MAC addresses can be faked as well, it’s not difficult.

        Liked by 1 person

        • squid2112 says:

          MAC addresses can be changed too .. the MAC address that gets broadcast from your NIC is controlled by software, NOT THE HARDWARE. We change MAC addresses at work all the time. It is easy to do (especially on a Linux machine). We have specific needs on the devices that we develop at work to have to change MAC addresses, for testing and other things. Changing a MAC address takes about 15 seconds.

          Liked by 2 people

  3. donnyvee says:

    It couldn’t happen to a nicer rectal orifice.

    Liked by 7 people

  4. WSB says:



    Liked by 9 people

  5. gretaherndon says:

    R U S S I A ! ! !


  6. atomichillbilly says:

    Probably the cops called him first.

    Why else would he go on Twitter unless he knew he couldn’t stop it?

    He’s trying to get ahead of the story.

    Not even krugman would be stupid enough to download kiddie porn with mask his IP address using TOR or some other encryption service.

    Ask yourself: who has the ability to track someone down through TOR?

    It’s the Feds.

    Liked by 6 people

    • Robert Smith says:

      Yeah they did this a couple of years ago for the same child porn purpose.

      Liked by 1 person

    • YeahYouRight says:

      First thing I thought was that he must be busted. Who goes on Twitter to announce any association with child porn?! How would anyone ever know he was scammed?

      Sick. And this guy was one of my idols in grad school. Before I knew his politics.


      • Dennis Leonard says:

        “And this guy was one of my idols in grad school. Before I knew his politics.”
        What does politics have to do with it,his self serving personality would would be enough for most people.


      • Dwayne Diesel says:

        And Epstein didn’t kill himself.

        Sorry, I had to throw it in there. I wonder if Krugman was on some of Epstein’s flights. I bet yes.


  7. “Be From Missouri. Always.” Start by questioning the point where the original claim came from … “who, exactly, claims to have found this?” Instead of “automatically and automagically assuming that a well-known economist has had some kind of a sordid past and has secretly spent all these many years trying to conceal it …”

    Let’s face it: this dude’s an economist. 😖

    “Probably. Not.”

    Liked by 1 person

  8. Mark Hudson says:

    Using a walker in 3…2…

    Liked by 8 people

  9. BitterC says:

    Yes, Paul is a jerk, but Sharyl Attkinsson is proof that things can be deposited on your computer.

    Liked by 2 people

  10. OmegaManBlue says:

    And he deleted tweet…


  11. California Joe says:

    Why didn’t he just delete the porn and keep his mouth shut??? There’s a lot more to the story!

    Liked by 6 people

    • ATheoK says:

      Routers, PCs and networks tend to keep histories of the sites visited and files downloaded.

      If he was pervertedly surfing while at work, the internal business network keeps a record of who logged in, what software they ran, what sites they visit, when visited, what pictures and videos were viewed and all files downloaded.

      Internet is forever and it takes professional access and serious application to purge every layer of a person’s internet usage.

      There is another signal; clicking on a malware website could get a number of pictures flashed on the screen which are captured to the temp directory as image files.
      That is, a few megabytes of porn.

      Many megabytes of porn images downloaded to specific folders besides what is kept in the temp directory indicates intent to view and download.

      Gigabytes of downloaded porn over long stretches of time is a giveaway that someone is a porn addict.

      Idiots accidently clicking on a malware web site are frequently embarrassed and sometimes even learn from their mistakes.
      Porn addicts search for porn every moment they can. Work, home, mobile, etc are all used every chance they can. They can be embarrassed, more for being caught, but they rarely learn from their mistakes; except for how they can be more secretive.

      Liked by 2 people

      • Dennis Leonard says:

        So this is how all those gov workers get away with watching porn at work;
        ” If he was pervertedly surfing while at work, the internal business network keeps a record of who logged in, what software they ran, what sites they visit, when visited, what pictures and videos were viewed and all files downloaded. “


  12. trialbytruth says:

    Maybe its kitty porn and this is just a linguistic annomoley.

    Liked by 1 person

  13. TonyE says:

    OK… an IP address is simply that, an address. In a residential environment, you don’t own a static IP address, instead your modem will get a dynamic address from a DHCP server on the WAN side. It will usually have a static IP address on the LAN side ( that’s the “gateway” you configure your LAN machine(s) to use).

    How can someone steal his IP address and put any kind of data in his machine is impossible, unless they were able to install some malware in his machine.

    So, where has Klugman been? What places was he browsing?

    And, more importantly, how would someone know how to target him? How would they know what his IP address was? Think about that. He had to initiate some contact and give out information out. The IP address is a bogus argument because he doesn’t own it.

    But then, almost all arguments from Klugman are bogus.

    Liked by 5 people

  14. 4EDouglas says:

    Whole lot of bad guys getting theirs lately…
    Something isn’t right here…

    Liked by 1 person

  15. avi says:

    was it kiddy boy or girl porn?


    • The Devilbat says:

      It’s the worst kind of pornography that features young children in sex acts and being sexually abused. I read recently that one man here in Florida was facing twenty years in prison for having such disgusting pictures stored on his cellphone.


  16. Johnny says:

    Judging by the comments on her tonight, the intelligence of all conservatives is vastly superior to the liberal snowflakes.

    Pedo Krugman’s story is being ripped apart piece by piece by Treepers with factual knowledge.

    I tell all my friends, You want an education, go visit the Conservative Treehouse. The comments on here are better than paying any liberal indoctrination center of so called higher learning.

    Way to go Treepers, please keep educating me every day. The knowledge on here is vast, and Thanks goes to every Treeper for helping me understand things that are outside my
    Career path.

    Liked by 9 people

  17. philjourdan says:

    Nope. IPs are not hijackable. Krugman is a liar . You can “spoof” an IP on the internet, but that would not enable a 3 way handshake between the end computer and the host computer – the host would have to do that.

    His ignorance is his downfall.

    Liked by 5 people

    • Justin Green says:

      Well, he’s a sophist who knows a little something about economics and has sold out to liberalism. He probably works his computer as well as Podesta.

      Liked by 2 people

    • Justin Green says:

      I’m betting he’s confusing terminology. Who knows how it actually got on his computer. He probably doesn’t know an IP address from a hard drive.

      Liked by 2 people

  18. AnotherView says:

    Mmmmm…..sounds lame to me. Pervert.

    Liked by 1 person

  19. ATheoK says:

    Someone could spoof his IP address in an email.
    But,not to download files.

    Krugman’s ISP could assign Krugman’s IP to someone else. Happens frequently.
    But, then it is not Krugman’s IP address anymore. It’s a dynamic address assigned by the ISP.
    Nor can someone that is currently assigned Krugman’s prior IP address download child porn to Krugman’s PC! If Krugman’s od IP address is assigned to someone else, Krugman will have a different IP address dynamically assigned.

    IP addresses are what networks use to connect and drive subsequent internet traffic. While in use, the IP addresses do not change. Nor can anyone else have an identical IP address or there will be an addressing conflict.

    If there is child porn on Krugman’s PC, he downloaded it.
    One could make an argument that Krugman’s PC is infected with malicious software. But why download porn?
    Malicious software usually seeks to capture and forward financial and personal validation information; especially lists of peoples names, email addresses, phone numbers, passwords, addresses, birth dates, etc.

    Truly malicious software tends towards destruction, obstruction, confuscation and forwarding the valuable personal information.

    Neither tendency downloads child porn.

    Either Krugman or someone that uses his computer is a pervert. Investigating router traffic and event records should identify who was logged on and the times of disgusting child porn surfing.

    Crowdstrike will blame Russian hackers…

    Liked by 5 people

  20. Brant says:

    Hmmmmm. Seems some good guys are in charge at NSA now. Just like the state department spokes woman couple days ago ripping CNNi a new one. Easy to tell where the good guys are now.

    Liked by 1 person

  21. TheWanderingStar says:

    Time for us to all admit that it was a Macedonian troll farm staffed by a vast right wing group of conservatives.

    Liked by 2 people

  22. Super Elite Lt. Col. Covfefe999 says:

    I’m not a hacker, but I am in IT. And his explanation sounds like pure crap to me. If dude has kiddie porn on his computer then he’s probably been downloading porn. Now maybe he unknowingly downloaded kiddie porn while downloading porn, but I really do not believe that someone compromised his computer. By the way, love how he immediately implicates Qanon followers.

    Liked by 4 people

  23. Julia Adams says:

    Dear Mr Krugman,
    We want to make sure you remember the new rules: you are “Guilty until proven innocent.”
    Have a good evening! Enjoy the new red flag!

    Liked by 3 people

  24. Zydeco says:

    I bet this situation violates one or more of his employer’s policies. Perhaps termination is appropriate.

    Liked by 1 person

    • The Devilbat says:

      If he is found guilty he may well end up spending the next twenty years in prison. While most pornography is quite legal, child pornography is hugely illegal and it’s mere possession rightly assures a maximum punishment.


      • Johnny Boost says:

        He hasn’t been criminally charged with anything so I don’t see how he can be found guilty.

        I personally don’t like the guy, but it’s very possible that conman or someone with a grudge against him put it on his computer.


  25. kleen says:

    He might as well blame it on the Russians.


  26. coolmamie says:

    If it is that possible to plant child porn on someone’s computer, then it would surely have been done on Kavanaugh’s. or one of the Trump kids, or even Trump’s. So I don’t think it was done to Krugman.

    But, if I were to assume that Krugman is completely innocent of doing it himself, I still cannot think of any rational explanation for him to announce it publicly.

    Liked by 1 person

  27. CountryClassVulgarian says:

    Si don’t believe him. PERIOD.


  28. suncc49 says:

    Maybe he has been hanging out with that eichanwald guy who was into tentacle porn and got outed

    Liked by 2 people

  29. Brant says:

    It would seem there are “broken windows” on Krugman’s “PC”. Should help the economy.


  30. squid2112 says:

    I suspect that Paul Krugman may be in some serious trouble and he is trying desperately to preempt and get ahead of what may be coming down the pike for him. His little story is complete and utter BS. Besides being completely nonsensical, it wouldn’t even make any difference. I suspect he has engaged in some nefarious activity with minors and prn and is desperately trying to seek cover. There really is no other explanation for what he tweeted.

    Liked by 1 person

  31. strateshooter says:

    I believe we should apply the same standard of justice to Mr.Krugman as is applied to POTUS Trump and all his supporters.
    Mr.Krugman is GUILTY until proven innocent,
    If he objects to the allegation he should be Weissman’d > charged with obstruction of justice.

    This is the new rule of law in the USA and should apply to everyone.

    Liked by 1 person

    • TwoLaine says:

      Actually, that would be Comey’d. On his book tour Comey GLOATED about this, statement he made to P{resident TRUMP, “because it was very difficult to prove a negative.”

      He knew it was all lies and supposition, they all knew it was all lies and supposition, but they hung it around President TRUMP’s neck, on purpose, for 3+ years and counting.

      THIS IS INTENT. This is documentary and testimonial evidence of their premeditated corruption. It is all about the smear, because “how do you prove a negative”?

      Comey’s testimony kind of proves Trump right. It also damns him entirely.
      Trump’s lawyer says he’s “vindicated.” Hahaha, no.
      by Dara Linddara
      7 Jun 2017

      “January 27, 2017: “He said he was considering ordering me to investigate the alleged incident [involving Trump and Russian prostitutes] to prove it didn’t happen. I replied that he should give that careful thought because it might create a narrative that we were investigating him personally, which we weren’t, and because it was very difficult to prove a negative. He said he would think about it and asked me to think about it.””

      P.S. Looking back… this 2017 article quotes Lawfare…….. Nuf said?


  32. TwoLaine says:

    Epidemic of Government Employees Watching Porn on Taxpayer Time
    by Judicial Watch
    7 Jan 2020


  33. Rob says:

    Playing devil’s advocate here, but he didn’t say the porn was downloaded to his devices, he just said they were downloaded. It is possible for a hacker to use the same IP that he used, during the same lease period, to download the porn. Then it would look like he downloaded it, though it would not be to his devices, it would have went to the “hackers” devices.


  34. Bill says:

    Maybe he’s the first domino to fall in the Epstein “CD Roms and Videos” treasuer trove…


  35. 6x47 says:

    I believe Krugman: Everyone knows he’s into gay gangbang porn, not kiddie porn.


  36. stevelbrown says:

    Everyone is commenting as if he has acknowledged there is something on his computer. He was simply parroting what he was told by the scammers when he fell for a scam. He didn’t see something on his computer and then call computer support. He called a fake, scam, computer support line where he was told this downloading was happening.


  37. I dunno if he dun did it or not but I do know a few things that are absolutely true: 1) Leftists are vile, murderous creeps cf: the joy of killing babies, defending other pedos, the abandonment of and even hatred for any biblical value, etc. 2) Krugman has a long long history of public lying. This recent utterance, if false,is certainly not his first. 3) They believe they are a law unto themselves, ergo nothing is absolutely right or wrong. 4) They hold those of us who do live by Bible based moral absolutes as at best ignorant, all the way down the list to criminally insane.

    I’m reluctant to rush to a conviction on any public figure given the out right lies that pass for good information these days but he certainly is a man who’s moral choices aid and abet this kind of vile criminality.

    I wonder if he attends any Abromovic Podesta Pedo Spirit Cooking parties?


  38. TTown says:

    So, it sounds like he has to take his computer into the shop for repair, and is trying to get ahead of the techs notifying authorities when they find the child porn on it.


  39. Oasis says:

    what? not the RUSSIANS?


  40. OK – ordinarily someone claiming they got hacked by someone who planted kiddie porn on his computer is a like. HOWEVER – given that Paul Krugman is a high profile controversial public figure, I can at least acknowledge the possibility that someone might do it to embarrass him.


  41. Forget about impeachment and Iran. This is definitely the best story from this week.

    Even the smartest people on the left have an IQ of under 90. Krugman is exhibit #1.


  42. IGiveUp says:

    “Even the smartest people on the left have an IQ of under 90. Krugman is exhibit #1.”

    Not even close to true. I’d call them brilliant. They captured control of the Establishment back in the 60s and have managed to endure in power for 60 years now. During that time, they have rendered the place unrecognizable. In many important respects, we’re 180 degrees reversed from where we once were. Their takeover of the US media has been most impressive. They’re even able to mount fraudulent Congressional investigations and render the Senate nearly impotent. They control the Supreme Court, the intelligence services etc. I could go on and one. Saying they’re stupid to diminish their power won’t work. They must be destroyed because they’re not stupid and they are extremely dangerous. Unfortunately, many on the Right still don’t adequately see the danger and necessity of destroying them. For them, they will have to be hurt more to learn that lesson.

    Whatever is necessary is what’s going to happen next. It’s just too bad that what’s coming didn’t have to be so.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s