The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
The Forum - On Line Opinion's article discussion area



Syndicate
RSS/XML


RSS 2.0

Main Articles General

Sign In      Register

The Forum > General Discussion > How secure is your internet from eaves dropping?

How secure is your internet from eaves dropping?

  1. Pages:
  2. Page 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. All
While I write this post I am acutely aware of the fact that my computer is being monitored by several agencies including The FBI, CIA, Homeland Security, MI6 and others.

I have nothing to hide, My wife and I are facing extradition to the USA and this type of monitoring is normal procedure.

What is worrying is that the USA are monitoring hundreds of thousands of computers in real time and most other email systems around the globe for key words.

What is of the most public interest is that anybody I am in contact with becomes under a similar scrutiny.

The US has been able to listen to your mobile phone even when off for 7 years and the technology they are using against terrorist is being used against people in countries all over the world. see link below from Fox News who O'Bama has lot's of bad things to say about. Maybe because they are not afraid of putting this clip on the news.

http://extradition.org.uk/fox-news-exposes-mobile-phone-eaves-dropping/?preview=true&preview_id=671&preview_nonce=00ed37f11a
Posted by BrianHowes, Friday, 23 October 2009 6:22:01 AM
Find out more about this user Visit this user's webpage Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
INTRODUCTION TO MODULE

THE USA PATRIOT ACT, FOREIGN INTELLIGENCE SURVEILLANCE
& CYBERSPACE PRIVACY[1]

INTRODUCTION

USA PATRIOT (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, USAPA), H.R. 3162, was passed on October 26, 2001. The bill is 342 pages long and amends over 15 different statutes. The legislation was written extremely quickly only five weeks passed between the introduction of the first draft of the act and its final passage into law.Creates authority to conduct searches and surveillance of foreign agents or foreign governments with the goal of gaining intelligence information.

There are several important differences between a FISA intercept order obtained under intelligence authority and an intercept order obtained under authority to investigate criminal matters. Most importantly:

(1) There is no probable cause requirement for a FISA search;

(2)There is no requirement of notice for a FISA search;

(3) The target of a FISA search cannot obtain discovery of the FISA court order application. As a result, the target of a FISA search cannot effectively challenge a wiretap or search conducted under FISA authority;� and

(4) Finally, FISA created a secret court--one comprised of a panel of federal judges whose hearings, decisions, and makeup are all secret. Moreover, once it obtains the intercept order, the government need not report back to the secret Court.

The above preview of the patriot act allows the USA to look inside your computer, Listen to your conversations, and break in to your home and search it even in Australia. Without any Warrant in Australia. The Admin Mr Young may already be seeing US government IP addresses visit these posts.
Posted by BrianHowes, Friday, 23 October 2009 8:43:03 AM
Find out more about this user Visit this user's webpage Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Dear BrianHowes,

I run Ubuntu Linux as my operating system on my computer. I have found it to be a very robust operating system, and for the low-level stuff I do on it, pretty quick on my old second-hand 'customised' Dell Optiplex GX240 machine.

Just in the last day or so I have noticed that even my text editor, in which I compose my posts, has been running as slow as a wet week. At the same time I have noticed a lot of hard drive activity, what with the little red LEDs flickering and the drives making those little sounds that drives do when somebody asks them to do something from the keyboard.

Do you think anybody could ask my drives to do things over the internet, Brian?

I don't particularly want to do the improper shutdown that I routinely get away with on my nice, free, NON-MICROSOFT, open source Ubuntu Linux OS, that I know would stop these little noises and lights on my computer from irritating me so much, so is there anything I can do to facilitate the uploading of my drive contents that I suspect your possible answer of 'Yes' may trigger my mind to speculate may be going on?

I use the real genuine Australian ISP, Internode, so I don't have to pay for upload traffic. I would have to pay, and have my ADSL throttled back because of the exceeding of my 12GB monthly bandwidth allowance, if I was still on 'India Calling' Bigpond Broadband.

Please, what should I do? Will stopping thinking help, do you think?

Are you thinking what I'm thinking?

Do you think anybody else could be trying to think what I might be going to think of next?

What should I do? I don't really think I have a bad attitude or anything. I would like to feel safe in my own headspace. Is there anything anyone can do about my drives? I want to be in control of my own thoughts.

From the innermost thoughts of Forrest Gumpp.

Forrest.
Posted by Forrest Gumpp, Sunday, 25 October 2009 7:26:03 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Wow Forrest,

Those little lights of hard drive activity are generally associated with programs starting or internet activity or even a remote connection, authorised or not.

It could also be because of a virus and keyboard logger used bu hackers and government agencies.

Of course Forrest no computer is secure on the internet and even harder to believe that even if not connected to the internet the computer can be manipulated.

Any computer can be manipulated from ober the internet to transmit what the person is doing on the computer or internet. your computer can also be used to transsmit information on tour hard drive to another location.

Even with a firewall and good ant virus programs this is still very possible.

Unfortunately if your system has been compromised by a third party the only real way to stop it is to cut your connection to the internet in the hope that will allow you to shut down and restart. This if your system is compromised will only last days at most if you are still being targeted.

Uploading and information to the internet is done via packets of information that is easily picked up during upload if the person or agency wants it.

Yes I am thinking what you are thinking, something I deal with every day of my life.

Yes it is likely that people would like to know what you are going to do or say next.

I am very sad to say Forrest that privacy is a thing that has gone and very few people even know it yet.

I have been working with computers since they were first invented and every time a computer is switched on it is available to certain people with the technology to view it, delete it or monitor it.

The only advice I can give is is to keep your anti virus up to date and your firewall and restart your computer as often as possible.

I hope I have been of help my friend.
Posted by BrianHowes, Sunday, 25 October 2009 8:47:00 AM
Find out more about this user Visit this user's webpage Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Brian,

I look at like this, I'm doing my bit to bring down the evil Satan the US and its minions.

Details and tactics.

First my hard drives are full of so much conflicting/contradicting data.

Second, my somewhat idiosyncratic emails, constant anti 'the systems' and un-disguised derogatory attitude for the US as an entity (not the people per se). Did I mention my utter my contempt for 'feral Capitalism' as opposed to Capitalism as a servant of the people?

My clear tendency to challenge accepted dogmas and complete distrust of the cult of personality over policy.

Answering the phone to unwanted canvassing calls with
' Glory to god 'Chaos' Bomb making factory'
' Lashka atoiba (excuse spelling) retirement home for failed suicide bombers and social club.'
or simply answer the phone “ Uncle Osama is that you?” Or “the germ weapon is nearly ready no more US parasitic lackey capitalist political dogs.....”
Or in the middle of conversation saying “ Akmed...stick to the code on the telephone”

All these are to trigger words/phrases searching computers of Homeland security/CIA and the rest of the alphabet soup.

Given my past I'm sure that ASIO, ASIS, Defence Signals Directorate have files on me.

Reasoning,
All this would waste their time, effort and money if everyone did it they'd implode.
In some deep bunker somewhere an eaves dropping operative is going not so slowly mad, (sick pay, shrinks,Drs, drugs, cryptographers, facilities etc., more expense ) forced to listen 'just in case'.

The final part of the plan is the computer, and it's inherent unreliability ...simply run window and monkey around in the registry etc deleting embedded useless MS apps (plenty of them) causing bizarre actions. Thus if they or hackers can get find anything or get sense out of it which is more than me. (psst GIGO rules.) ;-)

Brian to warrant such attention you need to be under some concern to begin with. Sheer weight of numbers . “Evil thinks evil sees” if they want to see a plot they will (military paranoia). Best don't draw attention. :-)
Posted by examinator, Sunday, 25 October 2009 8:59:47 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Well I suppose if you're going to embark on an international campaign defending the interests of confessed and alleged paedophiles and alleged purveyors of precursor chemicals, you're bound to attract the attention of those agencies that are combating those reprehensible activities.
Posted by CJ Morgan, Sunday, 25 October 2009 9:02:30 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
  1. Pages:
  2. Page 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. All

About Us :: Search :: Discuss :: Feedback :: Legals :: Privacy