Jump to content

Rate this topic

Recommended Posts

(wasalam)

You know "they" have access to our computers. Once when my family were out of town and I was alone, I stopped using the computer and after 10 minutes the monitor went to black screen, because it was set to go off after 10 minutes of inactivity. I went to sleep and when I woke up for fajr prayer the black screen was gone and the monitor was brightly lit up. I know that some kind of activity was going on otherwise the monitor would not have come back on. 

Share this post


Link to post
Share on other sites

(salam) Hameedeh,

 

And the real problem is "we do not know who". It could be foreign, domestic, gov't, commercial, church, NGO, whomever.

 

I remember reading in WSJ about June/July 2001 that many churches were playing 'concerned citizen' informants and about swamping the FBI with bogus junk, contrivances, and so forth, directed at people they didn't like, Muslims, politicians, ... And now they have their own computer warfare centers. This is why Stasi-styled police confiscate your computer instead of getting everything you did from the server -stuff is put on your computer, like child porno, and they get someone convicted of that, when the server will show were it comes from and from who, when and where.

Share this post


Link to post
Share on other sites

(salam)

 

from "Quadriga", DeutscheWelle of 08Jan15 entitled "Paris Massacre: Freedom Under Attack"

 

interim Opine: "Freedom under attack" ? That is  Bushie rhetorical dross. A paper was attacked for its publication just like papers and magazines in America have also been attacked. Never heard of a murdered reporter?

 

Info comment from program:

 

Martina Sabra, a 20 year journalist and student of Islamic societies working in Middle East and North Africa, said that electronic surveillance isn't working in France because there is more data than can be processed!

:!!!:

 

Gosh, if that is true for a smaller country like France, then it must be the same in the US and the 5 Eyes.

 

Note: Hey, MIT-C. I'm not getting my mail this week -except a single,token daily advertisement each day. Read more quickly and get it to me. I have bills missing l need to pay.

Thank you.

Edited by hasanhh

Share this post


Link to post
Share on other sites

(wasalam)

You know "they" have access to our computers. Once when my family were out of town and I was alone, I stopped using the computer and after 10 minutes the monitor went to black screen, because it was set to go off after 10 minutes of inactivity. I went to sleep and when I woke up for fajr prayer the black screen was gone and the monitor was brightly lit up. I know that some kind of activity was going on otherwise the monitor would not have come back on. 

 

That happens at my house all the time.  My son disconnected his XBOX Kinect because it scared him too much with it's staring red light.  (Though I have no idea why anyone would care to watch a 12-year-old play video games.)  My husband covers his built-in webcam.  They can still listen to us.  We have phones.  I'm pretty sure his laptop has a built in microphone too.

 

But those people who are watching, whoever they are, must be terribly bored.  We may have some unusual opinions, but we're really pretty boring.

Share this post


Link to post
Share on other sites

That happens at my house all the time.  My son disconnected his XBOX Kinect because it scared him too much with it's staring red light.  (Though I have no idea why anyone would care to watch a 12-year-old play video games.)  My husband covers his built-in webcam.  They can still listen to us.  We have phones.  I'm pretty sure his laptop has a built in microphone too.

 

But those people who are watching, whoever they are, must be terribly bored.  We may have some unusual opinions, but we're really pretty boring.

It is an old practice in our family to cover the built in cam with sticker since they were introduced to the laptops.they put them in phones though. It is hard to cover the phone cam.

Share this post


Link to post
Share on other sites

It is an old practice in our family to cover the built in cam with sticker since they were introduced to the laptops.they put them in phones though. It is hard to cover the phone cam.

 

Put the phone in a drawer when not in use.  But they can still listen, even if they can't see.

Share this post


Link to post
Share on other sites

Put the phone in a drawer when not in use.  But they can still listen, even if they can't see.

I live in silence lol. They can't hear a thing.

I'm not bothered honestly. There is the casual caution that someone should be practicing like not sharing your photos on Facebook or other new media , not making video calling without putting hi jab or at least wearing decent cloths etc. Just in case there is a nut around you who might use them for social harm. Otherwise, the government can enjoy all the data. I think the main object isn't knowing but making us scared. Don't speak against the government, they know everything about you ....boooo. blah.

The truth is that economy socks cause someone sacked all the money... and society rots because someone is selling it bad food and only bad stuff. Which is another way of sacking the money from the pockets of people . Not to mention taxes and useless insurances.

But we should be all going out and dancing and getting drunk cause life is too short to worry about that someone.

Share this post


Link to post
Share on other sites

(salam)

 

1st, Thanx MIT-C, l got my bills Saturday the 10th, along with a charity receipt for Afghans and another token advertisement.

So, where's the rest. A week without mail to speak of is an unusual experience. :D

 

2nd, as an uninforming article, NDTV/AFP, "France to Host International 'Anti-Terrorism' Meeting", 09Jan15, 0253-IST

-         --formed and called by France's Interior Minister Bernard Cazeneuve

 

US Attorney General Eric Holder is attending this PR stunt, but Deutsche Welle is reporting that one proposal is for countries to share "connection data" about who visits what websites. :realangery:

 

So, l -the old guy- am screwed because yesterday l found the lS online publication Dabiq.

Berating that online as a hoax probably won't make a difference. :cry:

Share this post


Link to post
Share on other sites

(salam)

 

 

:sick: Attitudes:

 

Chicago Sun-Times,(AP) Thurs 15Jan15 0750EST, "WatchDog: CIA Search of Senate computers was reasonable"

---- the CIA officers that raid Senate Intelligence Committee computers and emails are off-the-hook, contrary to the CIA Inspector General's own report.

 

--- "...CIA officers acted reasonably when they secretly searched Senate computers last year..."

 

A full version of the AP article is at:

 

ABCNews, 15Jan15 0821EST, "Board: CIA Search of Senate Computers Reasonable"

---- frmr Senator Evan Bayh chaired a board of inquiry

 

What does the CIA have on these people ? ? ?

Edited by hasanhh

Share this post


Link to post
Share on other sites

FYI: In the news today, a device that looks like an innocent phone charger but is really a sniffer called KeySweeper that secretly records the keystrokes that you type on a Microsoft wireless keyboard. Good for parents who want to know what their children are doing on the computer. Not good if you are being spied on by others. Check the wall outlets in your room or in your hotel.

Edited by hameedeh

Share this post


Link to post
Share on other sites

(salam)

 

A light read on more published Snowden Revelations. Enter title to access:

 

Computer World, 19Jan15, "NSA secretly uses scapegoats, data mules and innocent victim's PCs for botnets", by Darlene Storm

 

--- another round of published testimony is shown to be a lie

 

-- NSA hacks other countries' espionage activities

Share this post


Link to post
Share on other sites

(salam)

 

DeutcheWelle, Wed 28Jan15, reports that FaceBook has a myriad of companies that are to track everything for everyone. It also reports FB as having 1.3 Billion users.  And, they watch 3 Billion videos per month.

 

PressTV, Wed28Jan15, "Canada Monitors 15 million file downloads a day: Report"

---- a continuance of the Snowden Revelations

--- the program is called "Leviathan" after the alleged Biblical sea monster

-- this is done on a global basis

 

 

opine: so l am on the SC --however CES (Communication Electronic Security) stereotypes this-- and l last downloaded to read a paper on polymers. This would mean what?

Only the hysterics know.

Share this post


Link to post
Share on other sites

(salam)

 

1] Note to above; BBC said FB has 1.39 Billion users

 

2] I watched a short documentary of George Orwell last night. The commentator said Orwell envisioned a "haunting and terrifying" world as it would exist "before the end of the 20th Century", in his book 1984

As itemized:

 

--- "a World held in the grip of fear" -opine: what did gov't last tell you to be afraid of or watch-out for? Seen anything "suspicious" lately?

 

--- "a World of absolute conformity" -opine: not the reaction-producing communist kind, but anything that does not challenge the status quo of "elites". Life styles are controlled.(Remember bombing the house in Philadelphia? Or the polygamist raids of the 1950s ?)

 

--- "a World of continuous surveillance" -opine: read anything above  :cry:

 

--- "a World of organized hatred" -opine: right now it is the Iranians and the Russians. Not Islamic State ("a problem" "to be contained" said Obomb'em) or the Taliban (news this 30th, gov't says they are not bad or enemies)

 

--- "a World of ceaseless war" -opine: "The Long War"/"Global War on Terrorism", the Russians because of the gas-to-sell-to-Europe in the Ukraine. What happened to the "Drug War" ?

 

--- "a World where pleasure is forbidden" -opine: anything other than drugs, sex, rock-n-roll and sports must be aesthetic

 

--- "a World where language and history are systematically destroyed" -opine: dumbed-downed-schools; in 1980 libraries were to throw-out anything published before 1950; where changes in hardware makes anything on old systems irretrievable (read a floppy disk or seen a VHS lately?) Who controls the Cloud? Never heard of a "page taken down"????

 

--- "a World where living people simply vanish" -opine: still happens, mostly in other countries; here in the US they go to prison and then control-by-parole.

 

--- In an excerpt from the film, a boys' choir sing "we are the children, we are the future", where Big Brother uses "the children, the children" as an excuse and an emotional to control society. I have seen this used for: a proposal to build sidewalks, gun-control, taxes to build another dumbed-downed school, ... and then combining this with the one just above: Etan Patz; look-around "Amber Alerts"  (a spying habit despite its positive possibilities, although most abducted children are dead in 3 hours)

 

--- from her name in the film, the Julia Effect, where others are coerced into informing on you !

 

--- from the film clip: (paraphrase) "we face a network of enemies who will do anything. But not a network as you and l think of. A network of individuals, acting alone, organized around an idea" (like the anti-abortion activists encouraged in the 1980s)  So we are now told of "intellectual leaders" (like "the Blind Sheikh"), and "lone wolves" like the "Shoe Bomber" and the "Underwear Bomber" (which ought to be caught at the airport to begin with).

 

:mad:

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

DeutscheWelle, 30Jan15, "German spy agency saves millions of phone records, says report", by Gabriel Borrud

 

part of subtitle:  "The German gov't was quick to announce plans to widen data retention against terrorism..." after the Paris attacks

 

--- the BND "...currently collects around 220 million pieces of metadata per day, far more than was currently thought"

 

-- some part, about 1%, is transferred to the NSA (US) directly

 

- 2 million pieces per day are stored for 10 years "...for extended period of 'long term analysis'..."

Share this post


Link to post
Share on other sites

(salam)

 

Just when you thought it was "safe" to go to Grandmother"s:

 

Wall Street Journal, 26Jan15, 1826EST, "US Spies on Millions of Drivers", by Devlin Barrett

 

-- from documents obtained by the ACLU

 

-- "through out the United States" license scanners, photographs and data basing is being done by the D.E.A. (Drug Enforcement Administration)

 

-- this has created a real time data base available to all law enforcement as part of the "drug war" (opine: another war, against drugs being legalized)

 

-- for 2010, DEA internal documents of this vast domestic spying operation show it netted only "...88 kilograms of cocaine, 8,336 kilograms of marijuana, and the collection of $866,380" after spending billions on equipment, contracting, and organizing.

 

-- to improve this program's perceived relevance, it is now connected to the Amber Alert system. ("the children" again --see post #39)

 

-- supposedly, DEA "...has reduced the time it holds the data from two years to 3 months, according to a Justice Department spokesman."  :lol:

 

-- photographs and scans take place at international borders (originally), at toll booths, in high drug traffic areas (like Florida, Georgia, Ohio and Nevada), at highway exits and entrances, city limits, and so forth

Share this post


Link to post
Share on other sites

(salam)

 

Can't Plan and Can't Pay, the N.S.A.  Way:

 

Salt Lake Tribune, 02Feb15,, 0857MST, "NSA Utah Data Center Using More Water", by Nate Carlise  (with some Internet data added in for clarity. See city and county websites and Wiki)

 

-- "We are unable to discuss the secure operations of the Utah Data Center", (NSA spokeswoman Vanee) Vines said, "Construction has been completed."

(translation: wasting water is a matter of "national security". Why didn't Nixon think of this???)

 

-- the Center also has "electrical problems"

(translation: like a gov't center on CBS' 60 Minutes in the 1980s, permission and scheduling from a control center was needed to plug in coffee makes or electric pencil sharpeners or the electrical system would not only "blow" a fuse, but damage would result)

 

-- "Water is essential to help cool the facility and computing components for the Center, a massive digital storage hub for the NSA and other intelligence agencies"

(translation: water is an esoteric problem in the planning stages, so building in a high desert with local rainfall of 15" per year is not view as a planning problem)

 

-- the USArmy Corps of Engineers planned for 1.7 million gallons per day for the Center

(translation: the Army never heard of the "ice cooling" done in some 1920s skyskrapers in NYC that are still in use. It is a closed, evaporative technology used for air conditioning) :wacko:

-- yet, Bluffdale City Council minutes relate that this was reduced to 1.2 million gallons per day

( is this a security leak? pun intended.! )

 

-- Bluffdale built a $3Million water-delivery-system and needs to repay the bond.

(questions:  Why didn't the Corp of Engineers build it if everything is so secret? And, why wasn't "impact funding" used like around military bases?)

 

-- Bluffdale is charging NSA the $2.05 per thousand gallon rate for 10,001 to 50,000 gallons, -->while the city (according to its own website) should be charging $3.35 per thousand gallons for 100,000+ per month usage rate as in August 2014, NSA 'used' 6.6 Million gallons

(translation: the citizens of Bluffdale are personally subsidizing the NSA)

 

-- elements of the contract and the billing are "redact"(ed) for the public

(question: is somebody being paid under-the-table????)  Can someone say "cover-up" ?

 

-- a proposed Utah bill, HB150, would forbid state and local entities from subsidizing the Feds  :yaali:

 

0pine:  This is reminiscent of the UK keeping hospital deaths a state secret. Bluffdale has an annual rainfall of 15 inches and 1-3 feet of snow in the nearby mountains.

 

Could not the stew-pee-doe Corp of Engineers built this unnecessary White-Stasi-Elephant on a cooler spot??? Like in Michigan and use lake water???

Naaahhhh. 100 degree temperatures in Utah's Summers is "better". :lol:

 

No wonder the town is called "bluff"-dale. Easy to fool. I wonder if they'd like to play high stakes poker????? :!!!:

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

pcworld.com, 13Feb15, "Vint Cerf worries about a 'digital dark age', and your data could be at risk", by Katherine Noyes

 

----- "Now chief Internet evangelist at Google..."

 

---- spoke at the American Association for the Advancement of Science

 

--- bit rot -the loss of data from changing technologies

 

-- proposes a digital vellum to preserve data

 

- other projects and proposals have failed

Share this post


Link to post
Share on other sites

#2, 15Feb15

 

1]   redalertpolitics.com, 11Feb15, "Court rejects checks to NSA spying, citing 'state secrets'," by Maria Santos

 

---- in a new trick --the Stasi-forming gov't claims it cannot defend itself  "...lest it be forced to reveal 'state secret information'..."

 

--- the case, Jewel vs. NSA, brought by the Electronic Frontier Foundation in 2008

 

-- the case involves the Upstream Internet surveillance program

 

- the Stasi have claimed 'state secrets' since appeals began in 2009

 

 

2]  The names of other, current Sneaky-Stasi peeping-Tom programs include:

 

-- PINWHEEL  --initially to surveil Russian emails

 

-- in 2008, PINWHEEL was supplemented by EINSTEIN, the surveillance of the emails and surfing activities of federal employees

 

-- EINSTEIN was emplaced using the cover-story of "cyber security" (Fri,13Feb15, Obama pleads with Internet execs for "more sharing of information" using the same, lame, claim of cyber-security)

 

--within EINSTEIN is PINWALE which "bore down into text portions of emails to search for particular words and phrases"

 

-- WATCHHOUND is a cell-phone monitor

 

-- STINGRAY is a locator for cars and laptops

 

-- CELLBRITE -also writ CELLEBRITE- downloads personal info and connections from your cell phone

 

-- LOJACK is for the "tracking and recovery" of "stolen" vehicles and laptops

Share this post


Link to post
Share on other sites

(salam)

 

computerworld.com, 19Feb15, 1359PST, "Update: Spy agencies hacked SIM card maker's encryption"; based on article from The Intercept

 

The Intercept article is at:  http://www.firstlook.org/2015/02/19/great-sim-heist/  entitled "The Great SIM Heist" by Jeremy Scahill and Josh Begley

 

------ NSA and GCHQ hacked into "...SIM card maker Gemalto and taken (stole) smartphone encryption keys potentially used by (the) customers of hundreds of mobile phone carriers worldwide."

 

----- the evil-doers are the NSA and GCHQ (OK, so l used a bushism)

 

---- this is all detailed in a 2010 GCHQ document leaked by National Hero Edward Snowden [Opine: Snowden got GCHQ documents too? l didn't know that.!!!!!!  :!!!:  ]

 

--- how much mobile traffic the 2 agencies peeped into??? the article asks.

 

-- Gemalto, based in the Netherlands, "...produces about 2 billion SIM cards a year. (for) About 450 mobile carriers..."

 

- with these cards, snooping can be done without "the approval of the carriers or foreign gov'ts."

 

GCHQ also has access to billing services "allowing it to manipulate customers charges in an effort to hide surveillance on phones." [Opine: a few years ago I got my cell cutoff saying I owed $600. After paying, I got another cutoff for $400. Paid that. Then cancelled.  Then two months later l get this company letter saying I "may have been slammed". We used phone cards and a local number to call Morocco.] ******* _____ gov't. :realangery:

Share this post


Link to post
Share on other sites

(salam)

 

Opine: For Better Security, It ls Back To An Analogue World

 

New York Times, 16Feb15, "U.S. Embedded Spyware Overseas, Report Claims", by Nicole Perlroth and David E. Sanger

 

-------- "The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted..." (underline added -ed.)

 

------ "Equation Group" "appears to be a veiled reference to" the NSA and Cyber Command

 

---- "Some implants burrow so deep into the computer systems...that they infect the 'firmware', (that) embedded software that preps the computer's hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls...making it virtually impossible to wipe out." (underline added -ed.)

 

--- [continuing this later in the article:] "The firm's (Kaspersky Lab) researchers say that what makes these attacks particularly remarkable is their way of attacking the actual firmware of the computers. Only in rare cases are (such) cybercriminals able to get into the actual guts of a machine." ... "But if the firmware becomes infected ... it can turn the most sophisticated computer into a useless piece of metal."

 

-- "In the past, security experts have warned about 'the race to the bare metal ' of a machine. (When this happens) ... "It means that we are practically blind and cannot detect hard drives that have been infected with this malware." (italics added -ed.)

 

- "The possibility of such an attack is one that math researchers at the National Institute of Standards and Technology ... have long cautioned about ... You have to replace the computer to recover from (this kind of) attack."

 

"Documents revealed by ... [national hero] Edward J. Snowden detailed the (NSA's) plans to leap the 'air-gaps' that separate computers from the outside world, including efforts to install specialized hardware on computers being shipped to a target country. That hardware can then receive low frequency radio waves broadcast(ed) from a suitcase-size device that the N.S.A. has deployed around the world."

Opine: the opposite is also very true. The computer becomes a continuous or, if selected,  a periodic broadcast station. A revealing example is the (by)1980, a landline telephone could be "tapped" at two miles distance by near-focusing on the desired landline. The "instrument sensitivity" is the key. A high school level demonstration is the Cavendish Experiment. When properly set up inside a building and the balance has come to rest, you know when some one walks past outside because the mirror moves out of position. This is gravitational, which is many orders of magnitude weaker than electromagnetics.

Share this post


Link to post
Share on other sites

(salam)

No Change in Attitude and No Improvements in Craft

 

CBS NEWS, 02March15, 1901EST; "James Clapper: Post-attack critiques show desire for more surveillance" (underline added -ed.)

 

----- Director of National Intelligence, James Clapper (frmr D-DIA 1992-1995), citing "post event critiques and investigations", told Charlie Rose (PBS -02March2015), "A common theme of every one of those critiques has been that government should have been more intrusive". (boldface added- ed.)

 

Opine: What good will that do?

Examples:

The Underwear Bomber (aka Christmas Bomber) Umar Farouk Abdulmutallab (b. 1986, Nigeria) had tried to detonate an explosive device onboard North West Airlines Flight253 on Christmas Day, 2009 on the approach to Detroit. Known to intelligence, his Internet username was Farouk1986, he was president of University College London's student Islamic Society; on 11Nov09 UK intell informed the US about a "Umar Farouk" without the last name had spoken to the later assassinated Ayman al-Awaki "pledging jihad"; on 19Nov09, Umar's father contacted CIA in Abuja, Nigeria at the US Embassy; US intell stopped the Dept of State from revoking Abdulmutallab's visa because US intell was "investigating".

 

Boston Marathon Bombers -had been investigated by the FBI and then later flagged by a sharing Russian Intell during a trip to Chechnya.

 

Fort Hood shooter - Major Nidal Hasan -how do you know, without evaluation following up "concerns by co-workers, that an Army major is having a nervous breakdown and who behaved as a planned suicide will (he, among other things, was giving away his possessions) ? The source of Hasan's stress was from counseling soldiers' war stories. He also was not supervised by his chain-of-command.

 

As delineated above, "more" and "fear" are intell agencies' primary themes.

Share this post


Link to post
Share on other sites

(salam)

 

... Meanwhile, on the domestic front:

 

YahooNews.com via AP, 18March15, "US sets new record for denying, censoring government files", by Ted Bridie

part of the info:

--- gov't "fully denied" 250,581 (39%) of all requests

 

-- answering initial requests now take "longer"

 

-the CIA denied every request

 

most denials are not appealed

 

http://finance.yahoo.com/news/us-sets-record-denying-censoring-114313578.html

Share this post


Link to post
Share on other sites

(salam)

 

"... the Backdoors they have opened..."  <--under my avatar

 

This week, Pres.Obama  signed initiatives to go after hackers.

 

Now, since the intell communities trying to build a Stasi State have created a "Frankentell" --Frankenstein + intelligence,  emphasizing "tell" all security breaches.

 

http://finance.yahoo.com/news/stock-market-investors-ignoring-hacker-attacks-at-their-peril-165615733.html

 

"Hackers are breaking into public companies around the world and stealing every kind of data imaginable."

 

--and it is not just criminals. Remember that US intell officials were breaking into companies financial records and reports to play the stock market with insider information

Edited by hasanhh

Share this post


Link to post
Share on other sites

Hacking people's private information has been lucrative. digitaltrends.com says that Radio Shack, in bankruptcy mode, wants to sell the names, home addresses, phone numbers, email addresses and purchase history of its customers. 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×