It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Webcams and Software

page: 1
0
<<   2 >>

log in

join
share:

posted on Mar, 16 2010 @ 08:22 PM
link   
My computer is constantly being controlled by the United States Government.

They take over my Norton Internet Security Software and create and install firewall rules that I cannot change. They have stopped my software from communicating to Norton.

I am a Computer Support Specialist and Licensed MCP (Microsoft Certified Professional), with over 20 years of computer experience and beta testing.

I feel it necessary to inform all of you that your webcams are being controlled and your firewall's are not secure, no matter what you do. Your routers and access points are also being controlled.

Utilizing Fast Access biometric software has proven to me that they can also con this software into thinking that you are recognized, when in fact they will capture streaming video of you and replay it, or attempt to use still shots. When the software keeps trying to recognize your face, after testing by changing my password, it continues to faulter. So you cannot even depend on this either to protect your system or your software.

They have so many holes in any of the Windows operating systems that you cannot pllug them up. Even disabling peer to peer, all remote desktop, remote control, remote registry. I utilize my WEP and encryption keys. I have done everything in my power to keep out intrusion.

I have filed complaints with the FCC, FBI, my congressman, Norton, Dell, Time Warner and Verizon Wireless. None of them are interested in helping me resolve my issue, except for Dell and we are getting no where.

You have no privacy, you have no protection, except for just shutting off the computers and dismantling them. They can even run your computers when they are turned off and unplugged. They can control your CDROM/DVD Roms.

They can install software into your system at their will. Thus, they can make anyone out there look like they are committing criminal activity without your knowledge!

I advise all of you to do what you can to make sure that you keep track of any unknown software or programs running on your computer. Windows Defender, any malware protection, any firewall protection that you have will not dismantle nor stop this because it appears that software developers, hardware engineers, MCSE's, and our governments are the culprits.

I also advise all of you to keep records of any interent connections that seem suspicious via SNMP Trap and your resource monitor. Back up your log files and event logs.

I will pray for all of you! Only the King of kings and Lord of lords, Jesus Christ, can save us from the BEAST that has risen up to control and manipulate us all!!

Sincerely,

LJB



posted on Mar, 16 2010 @ 09:17 PM
link   
Hi,
That's all very interesting. However, I am very minimally tech-savvy. You gave suggestions that I need to ask how to accomplish, step by step. I have noticed a funny (Queer) auto dialer that I've had to disable more than once. That although happens to be what I term an AOL malfunction. I hate AOL browser. It's sucking my free space like I have a million gig hard-drive. This is wife's computer, when I get my own, I won't have AOL installed. That was a null point, sorry. I roll with Firefox on, AOL off.

My web-cam is pointed out the window, or face down on the desk. I seem to feel eyes on me at times, yet, I'm the most boring-est feller you'd ever regret meeting.

In "properties" file settings, I have everything set to "NOT share." Are you saying that that is being compromised? On your system?

Thanks for the heavy dose of Paranoia psychosis BTW. *sucking my thumb*



posted on Mar, 16 2010 @ 09:37 PM
link   
Yowser dude, it's worse than I thought. I was getting ready to switch to encrypted email just to be obnoxious and was under the impression that they'd have to install a key logger to read my stuff but based on what you've just said it's a lost cause no matter what. I know that my machine has been tampered with several times. The first time was about four years ago when I attached the Echelon word list to all of my emails as my signature.

Where are you directing complaints to locally? Have you tried your state attorney general's office? I haven't seen it tested yet but I've heard that a few states a boiling for a fight with the DOJ over crap like this.

Personally and speaking only for myself, I will do anything legal or slightly in the gray area to be a pain in Big Brother's ass. I figure that if everyone does his part and we can figure out ways to require beau coup man hours to keep tabs on what our dog did cute in the yard today or the latest on little Billy's report card we can clog the machine. Just imagine it, everyone encrypts their email. Every time you turn your back on your machine unplug the modem or unplug everything.

Come on you're a guru. Keep us up to date on the scripts to run to flush out the key loggers. If all the internet security companies are in bed with Big Brother lets do it ourselves.

If we can't keep them out lets keep them entertained (and busy)! I'll start wearing a thong around the house. If they have control of my web cam someone somewhere will be wanting to pour bleach in their eyes. If they're reading my email they'll need meth to stay awake. After they get the log files of course. Come on, this can be fun.



posted on Mar, 16 2010 @ 09:44 PM
link   
reply to post by ljib777
 


You use Norton?That's probably the problem.Anytime I have ever used Nortons for anything, I've had problems.I use a few other programs and have never had issues with them.Get rid of Nortons.





[Mod Edit - replaced excessive quote with Reply To Tab]

[edit on 16/3/2010 by Sauron]



posted on Mar, 16 2010 @ 09:46 PM
link   

Originally posted by ljib777
My computer is constantly being controlled by the United States Government.

You have no privacy, you have no protection, except for just shutting off the computers and dismantling them. They can even run your computers when they are turned off and unplugged. They can control your CDROM/DVD Roms.

LJB


Nope! You are going to have to explain this one.
It's not happening.



posted on Mar, 16 2010 @ 10:02 PM
link   
reply to post by ljib777
 


Ya know, I was about to give you half a benefit of doubt until you said


They can even run your computers when they are turned off and unplugged.


As an MCP You should know, better than most, that computers are elecrical devices, and as such, CAN NOT operate without electricity.

I too am an MCP, also a Microsoft partner, software engineer/developer, hardware engineer, have a Master's degree in both computer science, and electrical engineering. So, I do know that some of what you are saying may be true. However you are coming off as a paranoid religous zelot, not an objective computer professional. You need to ask yourself, why would anyone want to hack your machine and spy on you? They would far more reason to do that to me, and they don't.

Anyway, step back for a minute, think about it, don't over react.



posted on Mar, 16 2010 @ 10:08 PM
link   
I have been into computers and everything that has to do with TCP packets to Zonealarm to fixing, diagnosing and building them. From the good to the bad to the ugly, legal and illegal. But I highly doubt they are controlling your computer. Especially if its unplugged.

There are far MORE people out there that the Govt would be looking for and watching then you, Im sure!

Although if you really feel this way, why dont you just get rid of your computer?

or go through a few proxys?



posted on Mar, 16 2010 @ 10:23 PM
link   
Well, the thought of my computer,wearing a black hat and sunglasses,lurking around the corner spying on me is a little surreal,to say the least.

I installed Avast! on my computer and the first time it downloaded new definitions, a fey male voice similar to HAL of 2001 A Space Odyssey told me that it had done so.

Scared the heck out of me,because I had my back to the monitor.

Seriously I was with you until you said,they could still control it even with it being disconnected and unplugged.

There is I believe a physiological term for you individuals whom are very intelligent and work with computer software and hardware.

The many hours of isolated and frustrating late hours can cause you to be come delusional.

Seek professional help now.



posted on Mar, 16 2010 @ 10:29 PM
link   
I'm sorry everyone but the OP is such HOGWASH that I'm ready to throw this guy to the wolves. Can a Moderator please suspend his account for posting ignorance?


I'm what you would call a "Digital Jedi" and I say this person is fear mongering, otherwise I would say he/she has autism.

Close this Thread Thank you


[edit on 16-3-2010 by jonathan0220]



posted on Mar, 16 2010 @ 10:36 PM
link   

Originally posted by ljib777
I will pray for all of you!


As I will you. Get help. being Out there is one thing. being Out There would seem an entirely different story all together.



posted on Mar, 16 2010 @ 10:37 PM
link   
Not to thwart the topic but...
I have reason to believe the OP was inspired by my signature.



posted on Mar, 16 2010 @ 10:38 PM
link   
Just switch to Linux - you'll sleep better at night.

Bless you




posted on Mar, 16 2010 @ 10:50 PM
link   
Not so fast... it's a well known FACT programs like Magic Lantern and Carnivore exist and are used to spy on people. Magic Lantern is typically installed via an email attachment. Symantec has stated publicly they won't notify users of their product if it's installed. Carnivore is run at your ISPs network and harvest emails. It's also an established fact that the NSA uses deep packet inspection at places like room 641A. Furthermore, the Patriot Act allows agents to do what they call a "sneak and peak", which is essentially break into your home while you're out and install whatever they want on your computer.

That said, there's no backdoor in the Windows OS, so reinstall from scratch and you should be clean again. And if you're really worried about Bill Gates selling you out you could always learn to use Linux. Distributions like Mandriva are as easy to use as Windows, even if you've never used Linux before. Mandriva also doesn't use SELinux (Security Enhanced) features, which were written by the NSA.

en.wikipedia.org...
en.wikipedia.org...
en.wikipedia.org...

federalism.typepad.com...

Eric Chien, chief researcher at Symantec's antivirus research lab, said that provided a hypothetical keystroke logging tool was used only by the FBI, then Symantec would avoid updating its antivirus tools to detect such a Trojan.


www.politechbot.com...

"If it was under the control of the FBI, with appropriate technical
safeguards in place to prevent possible misuse, and nobody else used it -
we wouldn't detect it," said Chien. "However we would detect modified
versions that might be used by hackers."


www.theregister.co.uk...

A keystroke logging Trojan, called Magic Lantern, will enable investigators to discover break PGP encoded messages sent by suspects under investigation, MSNBC reports. By logging what a suspect types, and transmitting this back to investigators, the FBI could use Magic Lantern to work out a suspect's passphrase. Getting a target's private PGP keyring is easy in comparison, and with the two any message can be broken.


I'd also recommend not using software from any vendor who agrees to cooperate with the Fascist Bureau of Intimidation.



posted on Mar, 16 2010 @ 11:00 PM
link   
CRITO
regarding majic lantern all you would need to do is use a pc not conected to the internet one which never gets connected .Then create your encrypted message find file drag to a floppy or disc i wouldnt use a keypen or rw disc. drag it to an email and send . would that work if you were absolutley paranoid and felt the need for encryption say your a big companny.



posted on Mar, 16 2010 @ 11:17 PM
link   
They could just store the information then retrieve it the next time you're out of the house. They don't really even have to infect your computer to do it. You can buy a hardware-based keystroke logger yourself right here:

www.thinkgeek.com...



posted on Mar, 16 2010 @ 11:20 PM
link   
if u really were a computer expert, u wouldnt use Windows, since we all u cant access its code, so u cant know what kind of backdoors they could have made

so, please moderation, ban this user for hoaxing ... he may know about computers, but if he does, he is clearly trying to create dis-info



posted on Mar, 16 2010 @ 11:23 PM
link   
reply to post by ljib777
 

this is not too cool is it I agree geesh
HA HA I knew this and i have my webcam blocked and have had for a very long time so yeah they cant see a thing.



posted on Mar, 17 2010 @ 03:28 AM
link   
Huh - please show me the trick how to run computer without power! I'll do big $ on it!

Back to security. Our company network is quite open as we work with many external coworkers. Hence Windows workstations are under constant attack. Anti-virus apps are not complete solution for this problem so I'm forced to analyze network traffic off suspicious machines. I use open-source packet sniffer Wireshark. It is free. I mirror network traffic from infected computer via manageable switch into capture machine so I can capture all boot time communication. It saved me hours of diagnoses by other means. Manageable switch is not common home equipment so you can start by installing Wireshark on suspicious machine and look with what and about what it is talking over network - this is basically "manual deep packet inspection". Filter out common communication (http, skype, p2p) and run capture while you are working for few hours - you will be probably quite curious how talkative windows are.
It is not easy way but most reliable if you want really know what's going on. It will lead you to further research on network protocols etc.. If you want some basic level of security you MUST know what you want to secure. Without basic knowledge of networks, it is impossible to secure network communication! Start to think about secure tunnels (VPNs), proxies and other "advanced" means of secure communication. Nothing is 100% secure but you will not sell your skin for free at least.

Edit to add: Wireshark is available for Win, Linux, MacOS at least.
As mentioned above if you don't have to use windows - don't use it. It is also nice voting by wallet BTW - or you like to feed corps?

[edit on 17-3-2010 by zeddissad]



posted on Mar, 17 2010 @ 09:06 AM
link   
As long as you have a battery running in your computer, they can access it.

How can you tell if they are running your system? I was walked through the process with Dell to totally wipe my drive via the command prompt and codes. Once that was completed, I reinstalled Windows 7, when I went to My Computer to eject the disk, I found mirrored D:\ drives with the operating system disk. I once again wiped my drive and repeated the process with the same results. Dual D:\ drives with my operating system disk running on both. So they were mirroring my drive remotely.

I have since replaced my HD with a new one.

So, this proves that they can bypass my CD drive and run their own. Also, I have found when running my DVD back up disks, that my desktop.ini was waiting to be written to a disk, I never set that up.

Remote Desktop and Remote Desktop Server. They should be set to manual. If you do not need them, Disable them and make sure the service is stopped. If you go back to services after a reboot and check the status and find them started and running Automatically, your system has been infiltrated. Also Windows Remote or Peer to Peer. Depending on your operating system.

Also Bluetooth, that is another entrance. If you have Infared, another entrance. ITE Remote software, another entrance.

I found via Norton in the Programs, that my System was given networking privledges. Your system should never be going out to the internet.

Someone mentioned Echelon. They have remote server software. I caught them using Sygate in 2007 using the Network Time Protocol port and they were controlling my routers and computer. They flashed the bios on all of my routers as well. Even after getting the lastest upgrades to my wireless router and hardware routers and changing the passwords and reconfiguring them, OFFLINE from my ISP, I still cannot gain control.

They are also using Teredo Tunneling. If you have more than one computer in your home, they can access all of them, no matter your security settings.

I read an article yesterday, I have to dig to find it again and when I do, I will post it, that there is a back door to our microprocessors. They say China is responisble. So if this is true, all of our Microprocessors can be accessed and your computers controlled via this backdoor. I have seen this with my own system. My CurrentControl Sets in my registry were wiped out.

Also your explore.exe is compromised. A simple test of using a backslash while on an internet site should help you with this. If you see your system files showing up when putting a blackslash in the address bar while on the internet, they are in your computer. They accomplished this using the windows search tool.

Another telltale example is your mouse cursor. If it jumps around while typing and you have to keep moving the cursor back in place, they are controlling it.

Hope this information is helpful. LJB

MindControl Computers

Added link

[edit on 17-3-2010 by ljib777]



posted on Mar, 17 2010 @ 09:20 AM
link   
reply to post by Faiol
 


And your a troll!

I have so much proof, with reports to dell, norton, verizon and time warner to prove it. I have backed up all my log files, took print screen shots and back ups of my registry files.

All you have to do is test it out. If you do not see the symptoms that I listed in my latest post, your system is not being compromised. But if you do, simply by shutting down unneed or unused services and keep track if they are reinitiated, you will see what I am talking about.

I have been battling with this for 3 years. Dell has had to totally rebuild one of my systems because of this, and already replaced the harddrive on my new system. They have also been in my computer remotely and have watched the issues themselves.
)




top topics



 
0
<<   2 >>

log in

join