I’m vulnerable!

In this video, I am sharing my darkest secrets and revealing all.

Sure, some things that I originally thought were hacking-related were just quirks. And when important things happen that I may have to respond to but am powerless to do anything about, that’s when the hacking is usually the factor that causes the biggest powerlessness so I am sure that I do rant more about the hacking at such a time.

By the way, I still need something else besides low-pass filtering, but I am not going to say out loud what that is and I don’t know whether I will be able to arrange it. Plus, I have no certainty yet that my door is secure now.

What I say in the video? The following.

Hi. My name is Angelina Souren, in case you didn’t know that yet.
I’m a Dutch woman in the UK.
I’ve previously lived in the United States, in Florida, and spent most of my adult life in Amsterdam.
As many of you know, I’ve been dealing with a heck of a lot of hacking, although it’s been said that I’m just an older woman who doesn’t know where to find the on / off button on her computer and is no longer able to cope and ascribes everything that goes wrong to hacking.
And particularly when something considered stressful is going on in her life, she becomes delusional.
<sarcasm>Yeah right</sarcasm>
I took some programming at university, I went to university a little bit later in life, I have built computers from scratch, I have built large websites, written my html in notepad…
I am not an IT expert but I’m nowhere near as stupid as the people… some people in Portsmouth make me out to be.
I am usually being hacked via the electricity circuits in this building.
How did I catch on to that?
One day when I left the building, I realised I’d forgotten something, dashed back into my computer (lol) dashed back into my office where I had left a computer on, an offline computer.
And a program had been opened on that computer.
I had not opened that program.
That’s when I thought it had to have something to do with the power lines.
So I looked into that and sure enough, power line hacking is possible.
And i understood that you have to put an extra resistance on the line.
So I took a timer, put it between the socket and the plug and there was a heck of a lot of clicking.
You know, the way these timers do.
And after a little while, there was a window that popped up on my screen that said something like “Thought you could keep me out?”

<sarcasm>Yeah, I’m making this up. I’m delusional.</sarcasm>

Anyway, how this happens is as follows.
Five years ago, I would have sounded completely crazy, but most of you now plug in these little things to spread wifi through your place.
There is unused bandwidth on the electricity wires.
Power has a frequency of 50 – 60 Hertz.
Data has a much higher frequency so these two don’t interact, usually.
That’s also the solution to my problem.

I wish someone would have told me this years ago but everyone just… shrugs, I guess.

A low-pass filter is what I need. Low-pass filtering is what I need to cut off apparently all the power line hacking.
It’s as simple as that.
It’s not expensive as far as I can tell.

But everybody pretends that it’s 1985 and that we’re all still sending paper postal mail and that the digital world does not exist or basically is 100% safe and that anyone who pretends -pretends! – hacking exists is crazy.

<sarcasm>Yeah right.</sarcasm>

And before anyone starts hollering that you need physical access to be able to do that… yeah my locks were getting picked all the time.

I’ve just installed a new lock.
I’d installed a new lock before, I’d added locks.
It was not sufficient because we’re not talking regular burglary, we’re talking targeted mischief.
Hopefully this new lock is going to be sufficient.
I don’t know, time will tell.
But, yes, physical access was possible.
I don’t know exactly what they’ve done.
I do know this: the people who do this or the person who does this is or are very good at hardware hacking.
Hacking basically consists of three components.
People hacking, also called social engineering.
This is a very important part of hacking nowadays.
Software hacking.
And hardware hacking.
Tricking the computer into thinking that for example its hard drive is filled.
I have been looking around for gadgets.
I did at one point find that a socket, a light socket, had been opened and the screws had been loosened.
One of the screws was lying in the recess behind the light switch.
I had actually fixed that particular light switch before so I knew for a fact that both screws were in their places, tight and needy.
Yeah, neat and tidy and tight.
But I didn’t see a gadget.
There may be gadgets that I have missed.
And it’s been suggested quote unquote that there are bugs all over the place.
I don’t think that’s the case.
But how the hell do I know that it’s not the case?
I haven’t spotted anything weird, anything out of place but that may just be me, unfamiliar with that kind of stuff.
Who knows.
Maybe… maybe… maybe…
Maybe this thing here, maybe this thing has a secret camera in it.
Who knows.
(I’m just kidding.)

(I was just kidding about there being a hidden camera in that picture frame. Not about the rest!)

For all of you who still believe it’s 1985

The first bit in the first video – two years old – happened to a CRYPTOCURRENCY EXEC. Not the checkout girl around the corner or the older female adult who barely knows where to find the on/off button on a computer. (The latter would be a stereotypical assessment of me, ha ha, and my assertion that I am genuinely often dealing with hacking would typically be attributed to that plus that I “get delusional when stressed”.)

A friend/colleague of mine in the Netherlands, with PhD in math/physics/computer science, also recently got tricked TWICE, over the phone. Thankfully, other companies spotted the problem and protected her finances.

So I have been trying to tell Portsmouth City Council that currently, for example, anyone can call – or e-mail – local people, pretend to be PCC and ask people to pay, say, council tax over the phone, using their bank card. Because of the lockdown, this type of fraud is much easier at the moment.

Yes, PCC, it is possible to fake an e-mail address and it is possible to fake a phone number.

I have raised this problem with several UK electricity companies – that they have NO SECURITY on the accounts and anyone can mess with your account if so inclined, such as close it or tell them that you have a new address – and the people I spoke with had NO IDEA what I was going on about.

One snapped at me that she simply had to ask me questions because of privacy regulations. She of course knew my DOB and likely quickly made the “useless old cow” judgement. She did not GET that the answers to the questions she asked are largely all over the internet – for example because I am a Company Director – and are in various databases that are accessible to literally thousands of people.

(I hung up on that person. She was rude.)

It’s totally NOT ROCKET SCIENCE.

Below is a video that I have posted before. It is about 18 months old.

The other side of this can be that if for example you lose your Google Authenticator app because your phone quits on you and you made no backup, some accounts ask you to supply a list of all your recent transactions as well as (a list of logins with) IP number – if you don’t have a static one, this can be a pain – and take a selfie with an ID document in such a way that the ID document is legible. It can be annoying and I have once gotten really annoyed about it because my selfie with ID kept getting rejected. But it’s better than the alternative.

Speaking of ID, if you need to supply an ID document WRITE ON IT, either digitally or with pen or pencil if you scan a copy, when and to whom you are supplying it. Through the actual document, in large letters, such that it cannot be easily used by someone else to steal your ID. This is a tip given to me years ago by the local Dutch consul.

You’ll also want to watch this one.

Is this the guy who steals (some of) my postal mail?

After I made this video, the downstairs asshole yelled a lot, thereby possibly confirming that he is ALSO the hacker, the guy who’s responsible for the loss of my last bit of income and the last one of my clients. Because he could see on my screen!? (Not that that is a surprise.) An alternative explanation could be that someone else texted him and told him to yell a lot. 9Or that he was just yelling.)

I know he hacked into one of my phones because he – someone in his flat in any case – loudly yelled “Ah, ha ha ha” from right under me when he got in and rebooted the thing. I doubt that that could have been done by someone not on the premises.

My HDD has been rattling like CRAZY since I posted that video on YouTube and my comments on YouTube keep getting wiped out by the hacker time and time and time again.

The downstairs neighbour is connected to my landlord. I suspect he was part of the landlord’s plot to have me declared anti-social. “Drive the old cow crazy so we can get rid of her, please.” I’ve thought that for a while because it is the only logical explanation for this dude’s behaviour (and it combines too well with something else). Why else would a gay guy be obsessed with a woman likely old enough to be his grandmother? And steal (some of) her postal mail?

(Why his interference would not disturb my other neighbours? I use my bedroom as my office. Since that neighbour moved in, I have slept on my office floor several nights and then I found a way of dealing with his noise. White noise. As I have mentioned previously, the idea that he has Tourette’s does not hold up.)

Re the previous neighbour, hints were dropped by the landlord’s staff that there were reasons to be afraid of him. Why?

(22:01 My HDD is rattling like crazy again, but my PC is not actually doing anything.)

This would be more or less typical for how Portsmouth works, doesn’t it?

BUT… the hacker/stalker indicated – 24 Feb: no, suggested! – that there is a likelihood that he is about to destroy me and in view of the fact that his type of personality tends to work with flying monkeys, it is more likely that the neighbour is a flying monkey for my stalker/hacker. “Let’s try to drive the old cow crazy” has always been HIS game. Charles’, Lee’s, Charley’s, Charlie’s. Or Stephen’s if that is who it is. Or just the people in the local community who engage in all the bullying. How on earth would Iknow? It’s all done anonymously!

My landlord would have to be off his rocker to do that. He’d have chosen a much easier, cheaper and quicker route. Unless my landlord is a few fries short of a Happy Meal. Is he?

24 Feb:
It was 15 January 2021, the day that I accidentally caught my gay neighbour who is half my age going through my postal mail – two envelopes – with extreme attention. So he goes through my mail and keeps what he thinks will disadvantage me if I don’t receive it? Why is he so obsessed with me? To be fair, a lot of my postal mail goes missing before it gets to the building. But Monday’s letter had definitely been kept behind – and possibly even created – by him, albeit not for long. (Just long enough to ruin my evening. Because I am so fed up with the Portsmouth brand of nastiness. And it never stops.)

Smart meters and hackers

I searched and this came up:
https://www.sciencedaily.com/releases/2019/06/190606101822.htm

“Hacked meters can even cause house fires and explosions or even a widespread blackout. Unlike remote servers, smart meters can be relatively easily accessed by attackers, so each smart meter must be quite hackproof and resilient in the field.”

Security angles are hardly ever addressed with persistent targeting in mind. The same goes for locks on doors. But there is more beyond random brute force factors. 

You don’t want to know what happened next

I just got a message that my deceased friend HVP has joined Telegram.

She was Dutch. I’d known H since the late 1980s. She was a physicist who became a policymaker who worked at the EU, among other places. Her PhD thesis was on surface melts of lead crystals. Solid state physics. (There is some overlap with earth science. Every earth scientist worth his or her salt has looked at articles published in physics journals.)

H was also a very dedicated modern dancer at a high level.

A photo I took a long time ago, in Utrecht. HVP is on this side, her back turned towards us, talking with Ietje Paalman-de Miranda, who also passed away recently.

Until progressive MS put a stop to all of that. Very fast thinker. I loved working with her even though we often disagreed on certain things. We had different preferences, different views on some things.

But if you needed to work with someone to really get things done, she was it. I don’t think there’s ever been anyone else I so enjoyed working with. (She and I did a lot of the organization including publicity for one or two symposiums and that was a lot of fun. Too long ago…)

We had dance in common too. I saw a lot of modern ballet in those days, at the theaters. Modern dance. I danced flamenco for a short while and I remember she recommended someone to me after I returned from the US, but I never picked it up again. I tried to connect with a flamenco dance group here in or near Portsmouth but I never heard back from them after I contacted them (as has been the case with many other things I tried here).

Anyway, this message about a dead person joining Telegram may be intended to let me know that the text message I got from APDP the other day was faked. (In combination with that strange popup telling me that all my messages are being translated, which I got a few hours earlier, that sounds likely.)

It is of course also possible that someone else has her phone number now and that that was why Telegram alerted me. Except… her number is not on my phone. It can’t have been. (I checked. Just in case… Nope. It isn’t.)

I am not going to fret over it either, as there is nothing I can do about this kind of thing.

I also have received a phone call from someone who sounded just like HVP. After her death. A strange call. When I tried to call that person back, at the university where she claimed to be working, I found that I couldn’t. I tried more than once, too.

That event back then cued me in to when I received two calls, before, at the time when I last saw HVP, from two people who sounded just like two other people I knew (CH and SH), it likely was not a coincidence. I knew one (CH) from my student days in the 1980s and the other one is a visual artist I have worked with. The person who sounded like SH said that she had called the wrong number, was looking for her mother, and the other one, who sounded like CH, was supposed to meet with me, but said that she’d had a call from “the head office” that the appointment had been canceled.

These two images below seem fitting. However – see my previous post in a minute – as I sometimes get the impression that I am (also) dealing with someone who is autistic, it is also possible that this is HIS way of letting me know that I have a new fast-thinking friend?

Did you know that some forms of autism may be related to the mother experiencing domestic violence and fear while she is pregnant?

I edited this post the following morning.

As you can tell, I usually initially respond with anger and upset over these things when they happen. Because what someone else out there is doing is very controlling and I do not like that at all. It is also in a way insulting. I understand that for example Asperger’s can work out that way (but mostly in private, not so much in public, so perhaps in this person’s dealings with me but not in his dealings in public?).

It is possible that this person wanted me to get what I needed at the lowest cost possible, use wifi on it to do what I need to do and only use the phone as a camera after that. Its cameras are definitely superb relative to what I had! But I also felt not so happy about having only phones that are hacked and needing to use the wifi of one of my other hacked phones to do what I need to do. From the perspective of someone who’s autistic, however, it may all make perfect sense. I can see that. (After I think about it for a day or so.)

I think he’s also been trying to tell me that my friend with NPD probably does not care about me at all. I know that. I appreciate her for who she is. (And there is plenty to appreciate about her!) I will soon make some videos about that. Apart from that, I know that she needs to have someone in her life who knows her. She can get very upset when she loses someone who’s been in her life for a long time. I think that’s because it makes her feel lost in a world that must be so alien to people with NPD so often. If you think about NPD a lot and try to step into the shoes of people with NPD, you come to realize that the world must often be a really scary place for them.

What do I mean? Put yourself in the shoes of a small child who’s been told to go to the headmaster, or to the child’s father’s room, and who expects that person to be very cross with them. (I picture movie scenes.) That has to be part of the daily life experience of people who have NPD, the part that they so desperately try to hide from the world. 

Or, think of an animal that is afraid of fireworks.

It has to be the scariest thing in the world for someone with NPD to know that someone else understands that they have NPD. Also, in a world with so much negativity about NPD, it has to be one of the scariest things to seek out the help of a professional (psychologist etc). My friend has done that.

I think she has learned practical techniques for communicating. I recognized that in her e-mails at some point and I sometimes see it in her e-mails these days, too.

If the rest of us knew more about NPD and learned to take it into account, we could keep people with NPD feel safer and thus we might be able to lower the amount of friction in the world.

And ultimately… think of this, too. The world causes a lot of NPD when it mistreats its children. 

 

 

When this kind of stuff happens, also stuff on my computer, it is remarkably often accompanied by various kinds of sound effects from my immediate downstairs neighbour.

A letter that I expect to arrive today

Update Thursday 17 December 2020, 9:58
Still the same. Royal Mail has not attempted to deliver my letter, according to its website. I wonder if a guy I know as Nathan has anything to do with that. He once walked up to me at the local large Tesco (Craswell Street), made the mysterious statement that he and I had never seen eye to eye or something along those lines – huh? wtf was he going on about? – then said that Royal Mail had offered him early retirement because of his severe problems with his spine and that he had accepted the offer. It turned out to be complete bullshit. I have no idea what this dude wanted from me. I don’t know him. He is someone who works at Royal Mail, who (says he) has severe back problems and I’ve brought him and his colleagues refreshments once on a hot day. (I also brought a tea from Greggs to a woman at Wilko on a freezing cold day once and I’ve once given my postie in Southampton a refreshment on a hot summer’s day. I don’t do that kind of thing in other countries, can’t recall any instances.) Other than that, I don’t know him, but he seems to have had some kind of issue with me for a long time. No idea what it might be. I saw him walking toward me on Arundel Street a few weeks ago and I decided to cross the road so that I could avoid him. I have no idea what his problem is and what his problem with me is. He initially seemed really friendly, just a regular guy, friendlier than his colleagues. The guy meanwhile has started to give me the creeps. He was also the one who handed me that package with wet and muddied fairly random letters from about 6 months and he was the one who told me about the package with the SSE modem that apparently had been sitting at the post office for a while after I tried to switch broadband providers for so long, in vain, when he saw me in Lake Road one day.

Portsmouth seems to abound with these types of folks. (Like this “Nathan”, I mean. But he used to have a genuinely pleasant and sane colleague whose son is a scientist. That guy left, though. Overall, Portsmouth is toxic. A lot of that has to do with the widespread deep poverty here as a result of the staggering inequality in England.)

 

Update Wednesday 16 December 2020, 11:45
The item was posted First Class Signed For on Saturday 12 December 2020 at 2:34pm at the Portsmouth Post Office [PO1 1AB] and still Royal Mail has not attempted to deliver this letter, according to the Royal Mail website.


This one (PDF): Letter Dated 11 December 2020

That older letter that I mention in the above letter had been sent “1st Class Signed For” and it was signed for. So was another letter I sent at about the same time. There was no response to either letter.

There was no response either to the e-mail I sent to Grant Murphy on 30 August 2019, in which I wrote that it was high time for a genuine and serious talk. I suggested meeting at his office on 3 September 2019 at 11am or 2pm.

I usually get ignored when I contact him or his staff for whatever reason, but when they want me to stop by and I contact them and say that I will do so two workdays later because I am hard at work for a client who I can’t let down, I often get a lot of angry words back.

When I wrote to them on 31 October 2016 about “problems at 6 Kingston Road”, I got no response back.

Mon, Oct 31, 2016, 11:23 AM

This was right after I spoke with Grant Murphy on the phone when I called him while I was at Fratton Train station, waiting for my train. He picked up the phone with something like “Student accommodation” but when I said that I thought I had called a different number and was looking for a Mr Murphy, he said that it was him. He told me that people picking the locks all the time was no big deal, but if I wanted, I could install different locks. (I have done that, but it has not helped.) He also said, I think, to go talk to my MP because he seemed to agree more or less that Portsmouth Police is useless (after he suggested I contact police after which I told him that I had already done that many times).

Grant Murphy and I made an appointment to meet on the Saturday after I arrived back because he said he was often at our buildings on Saturday anyway, which surprised me (but I had never met him, so it’s possible). That Saturday, I waited and waited. He never showed.

The e-mail I sent after I spoke with Murphy on the phone I wrote on the train, I am sure, as it was far from my most eloquent e-mail message, but I was upset and I felt that the problems at 6 Kingston Road were seriously getting out of hand to the point of the situation now becoming completely unworkable. (Someone had just emptied dumped one or two liters of ice cream on the doormat of the ground-floor neighbours in some kind of bizarre prank. It is one of the many results consequences of the building not being secure.)

Some weeks ago, I contacted Hants Fire about the rubbish again, which I had wanted to do many times before. (But it all feels soooooooooooo futile. Nobody in England or Portsmouth gives a damn about anything, it often feels like, to me. Nobody here cares. Is that too the result of Britain’s staggering inequality? If not, where does it come from?)

This is part of what I received back.

This below is what I got in the end.

 

What has also happened is that someone closed my water account one or two years ago – I think it was Portsmouth Water – and a year ago, someone took control of my electricity account and apparently transferred it so many times in a row that the account completely got lost along the way. I have electricity but I don’t know who supplies it (though I probably have made some calls about that by the time this post goes live). The account was transferred by someone who had the meter’s number and all my personal data, such as DOB and address and postcode; such data are in the possession of many people, of course, hence offer no security at all.

This is what happened the previous time, which must have been about a year after I spoke about this at the offices of Grant Murphy and had given up on the rubbish as I couldn’t afford to remove it myself:

I have also previously advised Ruth Mbvundula not to accept Grant Murphy’s refusal to refund her deposit as, in my opinion, his reason for refusing to return the deposit was likely also his fault and I felt that a compromise might be in order. I referred her to the tenancy matters department at Portsmouth City Council.


For the record this is more or less what I recently wrote to Hants Fire, part of which I also let them know in 2018:

Good afternoon Mark,

Thank you for your message.

1. It concerns two buildings, an older one and a newer one, each housing three flats, at 6 Kingston Road, Portsmouth PO1 5RZ. These buildings are owned by Mr Grant Murphy and/or one of his companies. He and his companies can be reached via the Royal Beach Hotel, St Helens Parade, Southsea PO4 0RN; the hotel is currently closed, however. (Guinness owns the newer buildings next to Murphy’s. It was Guinness that removed the rubbish previously, indeed.)

2. The lock to the back door of the older front building is often jammed from the outside. I do not know whether that means that the lock is also jammed for anyone wanting to exit through that door as we in the building at the back do not have keys to the front door of that building. Last time I tried that back door to see if I had any postal mail, a few days ago, the lock was jammed again.

3. Before the start of the present lockdown, some of the landlord’s staff removed a lot of branches among other things. These branches have been on our patio since then, though someone moved them slightly because the heap of branches (dead wood) was blocking access to the back door of the front building. They were in front of the door there.

4. The rubbish is mostly in an open shed and includes a mattress that sticks out a bit. When this area was filled with junk before, it was deemed a fire hazard by your colleague. I had already gotten rid of as much as I could (called scrap metal people and had some people from a charity shop take a look), thinking that it all had been dumped there by others, not by our landlord. When I went to talk with the landlord about getting the remainder removed, I was admonished when I said that I had already gotten rid of some of the junk. I have also offered to help the foreman clean out the area, but my offer was ignored. Last year, I took photos of what the situation was like back then and included printouts of the photos in my letter to the landlord.

5. It may also be helpful to know that my landlord’s legal adviser is a Mr David Lancaster.

I hope this gives you enough information.

Best regards,

Angelina Souren


 

It may be generally interesting to know that I also once caught a landlord/lady dumping stuff in my forecourt when I was living in Southsea. I talked with her about it. I’d previously taken stuff to the tip that had left behind by another landlord/lady as I happened to have rented a van anyway at the time.

I have also heard this rubbish dumping being blamed on foreign tenants, at the Portsmouth Environmental Forum. In my experience, it’s usually landlords who do this.

I know that a lot of English people are not going to understand anything of the above. Why do I bother? One thing I’ve learned in my 16 years in England is that, here, it makes absolutely no difference what you do. True. So you might as well do the right thing. In my view, it means that you stay true to your values even if there is nothing else you can do. And that feels a heck of lot better than just rolling over and closing your eyes.

Stalking/hacking update

 

My phone – on which I now do a factory reset every 1 to 7 days and which I mainly only still use for internet access on my computer – keeps switching wifi on (and hotspot off, but that may be a different story).

(That seems to refer to urban slang. https://www.urbandictionary.com/define.php?term=wifi%20wifey) (Often, when I can’t figure out what on earth something that I am bombarded with means, it later turns out to be related to urban slang.)

And that connects to the weird “married/marriage” windows that opened up on my screen some time ago, I suppose.

 

 

My new computer – different architecture, different OS – essentially behaves the same way as my old computer did since it was directly accessed on 19 July 2020 when I was out to collect something via Freecycle (old newspapers) which took a 3-hour walk.

The computer freezes all the time, various websites and services are not accessible and some of those are reporting strange error messages and so on. As with the old computer, I now keep having to flip the power switch on the wall. Because it freezes and throwing power off it is the only way to get out of the freeze. But the BIOS has stopped producing its beeps when I log in so that the reboots are less noticeable in adjacent flats. Could that be due to a software update? Sure..

 

 

On my old computer, he briefly threatened to delete another directory yesterday. Taunting. It concerns something that I am working on right now. The other directory is still missing. The one that he deleted in, when was it, September, is still missing, that is, two new directories, both empty, took its place back then. The point of that? No idea.

I also appear to have received at least one spoofed e-mail today.t

Continue reading

What makes a sadistic stalker?

How does something like sadistic stalking come about?

Why does someone decide to target a stranger and wreck that person’s life? A lot of it seems to be a loud scream to be heard. To get noticed.

But how do you deflect that kind of behaviour into something neutral or constructive?

Sadistic stalking is horribly destructive. That destruction seems to be its sole purpose. Where does that urge to destroy a stranger’s life come from?

One of the things I want to do is help starting and existing business owners avoid becoming stalked.

(It makes sense, really. As negative as it sounds, anything else I undertake only causes me to be a risk to anyone I work with. A liability. My hacking and stalking experience becomes an asset, however, if I use it to help others within this context..)

As a business owner in this day and age – or anyone whose career takes place online for that matter – you have to be online.

It means that anyone can find you and anything you do or say may set someone off. It could be as simple as someone not liking your business name that draws his attention and make him decide to take a closer look.

Very few occupations may still allow you to operate without having any online presence at all and without using e-mail, text and chat.

How did I become targeted? I still don’t really know, but I have recently begun to realize that there is a possibility that the people stalking me already started to take an interest in me when I joined an online forum related to a hobby. I was anonymous but I joked a heck of a lot on that forum and it may have been in a manner that my stalkers did not like. They were on that forum. Then I asked for a reference on that forum when I was looking for someone who could do some repair and maintenance work. That set it all in motion.

Nobody ever sees it coming. Serious, highly destructive talking.

I certainly never expected to find myself stalked this way. 

Stalking is on the increase. As a business owner, there are things you can do to protect yourself and limit your exposure to stalkers. I can help you with that.

(Think police will help you if you ever were to get stalked? Think again. In England and Wales, even the police forces themselve are now admitting that they fail stalking victims as a rule, not merely incidentally.)

By the way, stalking is usually directed at women, but does not have to be.

 

WhatsApp flaw “puts words in your mouth”

https://www.bbc.co.uk/news/technology-49273606

This sort of thing has been possible since at least 2010.

Back in 2010, I knew it was happening on my equipment, but I couldn’t prove it and when you say something like that out loud, everyone assumes that you’re delusional. After all, accepting that I might be correct is a scary thought.

Too scary for most people. 

So when I finally got the proof, when I was able to compare a tweet on my phone with the same tweet on a friend’s computer, I could see that there were words in the tweet on my phone that were not present in the tweet on my friend’s computer… I didn’t show it to anyone. There was no point. Nobody was going to be interested.

The original tweet came from Portsmouth-based Maricar Jagger, but she had nothing to do with the digital mischief (other than that she was connected through her social circles).

I also knew about phone hacking via the invisible text message method before it became news – because I saw it happen on my own phone. (Same thing. Delusional cow who has difficulty grasping technology was the usual response.)

 



PS
And OUT goes a big chunk of police “evidence”, of course.

 

(See also this page.)

Entertainment

But not just entertainment. This documentary certainly stands out because of the number of female experts in it. That is still rare.

(I seem to remember that North Korea as behind the Sony hack was later disputed or doubted, however. Either North Korean hackers got careless at one point by skipping encryption at some point, I seem to remember, or someone made it look that way.)

Also, the information given about Tor in this documentary is not complete. Your internet provider can still see what you do.

In the earlier days of the internet, there used to be a site where you could track which transatlantic cable your e-mail was using or something like that. I also remember an instance when e-mail broke down for a day or so because there was a problem with one of those cables. In those days, a lot of services were still based in the US, so your message to someone in Germany might even have to go through a server in the US, stuff like that.

How hackers wiped out a restaurant, and a lot more

That particular restaurant got wiped out in a month after having been in business for about two decades. Just for fun. Because hackers didn’t like the restaurant owner. Maybe because the name of the restaurant.

In this video, it’s a hacker who says this. He says that hackers wiped out this business because they didn’t like the owner.

(He also says that there is something really fishy going on with Google’s business listings.)

It probably happens much more often than most people are aware of.

World War Three is being waged in cyberspace

 

File 20171003 30864 1kwu0a1

Dr. Mike Sosteric, Athabasca University

My introduction to advanced communication technology (i.e. the Internet and World Wide Web) came in 1999.

Having grown up in the two-channel universe of the 1960s and ‘70s, I was agog at the power it represented. The technology was nascent at that time — not many web pages yet existed — but I could still see the potential for good. Here was a technology that I felt could really save the world.

I am not ashamed to say that when I first saw the Web, I was filled with schoolboy naivete. I wanted to help, so I did. I created the first electronic sociology journal, did a few more things after that, and with a massive anticipatory grin, watched and waited for utopia.

Unfortunately, utopia didn’t emerge. In fact, my naive grin soon melted away.

The melting began when I learned that researchers at Cornell University, working without ethical oversight and possibly in collusion with the U.S. Department of Defense, were learning how to use Facebook, a technology we keep by our beds, to manipulate mass emotion.

The grin melted even further when I saw fellow scientists had learned to use search engines to manipulate political preferences.

Manipulating Trump supporters

The grin turned to an outright frown when I read in that same study by the Proceedings of the National Academy of Sciences, a multidisciplinary scientific journal, that moderate Republicans, moderate libertarians, male Republicans and the “deplorable” poor — President Donald Trump’s base — were the most susceptible to manipulation.

I became a little worried when the scholars who wrote the study suggested that Google, by manipulating its algorithms, might already have decided a foreign election, in India in 2014, in favour of a right-wing candidate.

Then there was the historic 2016 election of Trump. That’s when my smile turned to a grimace. During that election campaign, Trump called out to Russia to hack the election, which they did. Spewing hundreds of thousands of dollars of fake ads into Facebook, Twitter and probably Google, they attacked America full-on. They didn’t do it with bullets and bombs; they did it with bits and with bytes, and with the help of American CEOs and American technology.

It was certainly an attack, and there were definitely explosions, but they were in cyberspace. Desensitized by Hollywood violence, we are not paying attention to the attack on our minds.

You can argue about whether the Russian attacks were effective, or puzzle if Trump and his family are traitors, but the fact remains — we are under attack, and if something isn’t done, it’s going to get worse.

Annual hacking event

You don’t have to be a prophet to see what’s coming. The battle plan is in plain sight. In the midst of Cyber Security Awareness Month, it’s time to open our eyes.

Consider the Russian company Positive Technologies. This firm holds an annual event known as PHDays, or “Positive Hack” days. At this event, which started back in 2011, the world’s best and brightest hackers get together to train.

It doesn’t sound too threatening until you learn about “The Standoff.” The Standoff is a military hacking competition with a blatant military goal: Take out a city’s telecom, heat, power, oil, and rail infrastructures. The city’s citizens are even offered up as a resource for the hackers. They are easy to exploit, says the rule book. They use “smart gadgets every day.” “They are vulnerable to social engineering.” They are “prepared to share [their] secrets.”

//platform.twitter.com/widgets.js

Sitting back in my chair with a thump, I see it clearly.

There’s a global war going on, and a global arms race to go with it. The arms race is not a race for physical weapons, it is a race to develop cyber-weapons of psychological, emotional, financial and infrastructure attack. By now, the arms race is so far advanced that it makes the leaflet campaigns of the Second World War and the U.S. government’s Operation Cornflake look like toddler’s play.

ISIS and the far-right are using Twitter and other online networks to radicalize our youth, bringing the war to our streets. Russian cyber-marines engage in massive cyber-attacks, going so far as to target our voting machines.

Just recently, the sensitive financial data of almost half the U.S. population was stolen by state-sponsored professionals. There is even, as is becoming increasingly clear as the Mueller investigation into Trump’s Russia connections unfolds, a “highly coordinateed disinformation campaign” — a propaganda campaign, aimed at destabilizing American society.

Wake up and realize we’re at war

If the horrific recent gun violence in Las Vegas, exploding racial tensions and political polarization of Western democracies are any indication, destabilization is proceeding apace.

So what do we make of this?

No. 1: Realize that global war has been declared. It’s a little hard to pin down who fired the first shot right now, but the aggressors are active and engaged.

No. 2: Understand we are all under attack, even Republicans, perhaps especially Republicans, and the poor. There may be short-term financial gain for those who benefit from the destabilization, but only a fool would think the enemy is our best friend.

Finally, if you are a private citizen, you need to start taking the cyber threat seriously. Combatants are trained to see you as easy-to-manipulate resources. You are being viciously manipulated through social media.

Your financial data is stolen and could easily be used against you. Cyber-marines are training to take out the life-giving infrastructure of your cities. Are government and corporate leaders blithely unaware, or engaged in traitorous collusion? Only time will time tell.

The ConversationUntil then, wake up, gather your loved ones, lock down your social media, and batten the hatches — the war for your mind has begun.

Dr. Mike Sosteric, Associate Professor, Sociology, Athabasca University

This article was originally published on The Conversation. Read the original article.

IP addresses aren’t passport photos

I hear it time and time again. If someone is bothering you electronically, such as by e-mail, you can identify them on the basis of the IP address, take that to the police and be done with it. An IP address is like someone’s passport photo, right?

Not so.

Most people make the mistake of assuming that cyber stalkers and hackers behave the same way they do. They think that cyber stalkers and hackers automatically reveal their own IP addresses when they approach a target electronically.

Wrong.

Anyone who’s ever used a torrent stream or tunnelled to access a TV show or some other online content in another country knows better.

Most people haven’t.

Cyber stalkers and hackers aren’t stupid and usually hide behind an electronic wall called a proxy. They can also use a series of proxies. Sometimes, a cyber stalker or hacker gets sloppy and forgets this step. It’s been said that’s what happened in the recent hacking of Sony. Others think that it was just a smart hacker who made it seem that way, though.

How far most people are behind on reality

Read this article on CNET.

The jokes themselves are not the problem. The problem is that just about anything these days can be hacked. The internet of things. People are starting to catch up on that. The realization is slowly sinking in and United Airways appears to be freaking out over it, understandably.

7 out of 10 UK law firms affected by cyber crime in 2014?

The Solicitors Regulation Authority (SRA) has reported that in 2014, nearly 70% of UK law firms reported a cyber security incident.

cyber security guy or hackerRead more: here.

The first half of the article focuses on bogus law firms. The second paragraph under the ad is about how cyber crime affects law firms.

 

Uber Technologies – not a law firm – has billions at its disposal; that allowed it to do some investigating that enabled it to file a John Doe lawsuit after its recently reported hacking incident. Which it discovered about half a year after the fact and then kept silent about for another six months. Give or take a few days.

Data security in the legal profession

ICO, the Information Commissioner’s office, issued a warning last year after several data breaches at law firms.

circuitAccording to the ICO, there were fifteen reported incidents of data breaches in the legal profession within a period of three months.

You can read more about it in this article in the online magazine Computing News and on
this article on the ICO website as well as in this pdf file by ICO.

  • How many legal professionals have ever built a computer from scratch? I have. It worked fine right away, too. (To my own amazement.)
  • How many legal professionals were taught a little bit of computer programming at university? I was.

Loophole in Seagate’s Business Storage 2-Bay NAS products

If you use one of Seagate’s Business Storage 2-Bay NAS products, you will want to hear this. It may concern all versions up to 2014.00319 but certainly

  • Business Storage 2-Bay NAS version 2014.00319
    and
  • Business Storage 2-Bay NAS version 2013.60311
The vulnerability allows unauthorized root access. Seagate knows about it but has kept quiet about it, alleges this article in the Hacker News.

Another mark against Uber

There are many misgivings regarding the app-based taxi company Uber. One of those is a belief that Uber’s databases will get hacked.

Apparently, they already did. Get hacked.

Uber found out four months after the fact and kept quiet about it for months afterward. Last Friday, it finally came clean. In the New York Post, you can read more about Uber getting hacked.

Uber has meanwhile started a lawsuit against the hacker, identifying him or her as John Doe. This is also how you can sometimes take action against anonymous internet trolls as the FindLaw blog explains.

Hard disks can have backdoors

And running Linux or formatting your hard disk won’t help.

How so?

A hacker can build a backdoor on your hard disk by targeting and reprogramming the controller, a tiny computer of its own that makes sure the hard disk works.

First, the hacker needs to gain (remote) access to your computer, and he or she has to be pretty good. That means that you don’t need to lose much sleep over it yet, but when it happens, you’re toast.

Unless, for example, you keep your computer offline afterward and make sure it can’t be accessed via powerline networking either. Would you be able to tell that there is a backdoor on your hard disk?

Read more here.

Source: ArsTechnica

Keeping a PC offline keeps it safe, right?

Wrong.

Cyber crime is much sneakier than most people think. It is not limited to someone accessing your hotmail or Facebook account. it can take over your life. And gobble up your business.

There are various ways to access a computer that is offline. A term sometimes used for an offline computer is ‘air-gapped’, but for starters, a true air-gapped computer should never ever have been connected to the internet to minimise the chance that there is any software (code) on it that shouldn’t be on it. It should be brand-new, out of the box.

Unless you put it in a Faraday cage, some of the information on an offline computer can still be accessed although this is usually merely passive. It concerns information displayed on a screen or entered on a keyboard, for example. This can be accessed but not altered.

Here are a few technical articles for those who want some background:

Here is a really nice old video about it:

And this one, in German and much more recent, is quite clear too:

Here is another one:

In addition to the above, I see at least four more or less regular ways to access a computer and tamper with it:
– via cable or telephone line, directly;
– via cable or telephone line, using unused capacity on the line;
– wireless/wifi network;
– powerline networking.

In the case of powerline networking, there may be a need for that computer to have been hacked before it was taken offline. That also seems to be the case for at least one of the air-gap hopping methods.

It may also be possible to access printer memory via powerline networking and acquire information that way.

A computer does not have to be accessed through its operating system such as Windows, as is often thought. Computers can be accessed at a much more basic level as well, but it depends on the hardware and its settings.

Hackers can also purchase or build scanning equipment that can detect your mobile equipment. Phone hacking and spying software is available from regular retailers and its use has ‘reached epidemic proportions‘ (article in the Independent).

Here are four more articles, in The Independent and the Huffington Post:

If you are really intrigued now, read this article in NewScientist about new bugging devices.

Hacking: What you can do

Hackers can do incredible damage to businesses and contrary to what is often thought, hackers don’t only go after large corporations with vast amounts of credit card data and e-mail addresses. They go after tiny outfits too and after people like you and me. Below are a few things you need to know about hacking.

Picture of me 1-crop4In 2009, British police was given the power to hack into personal computers without a court warrant. It is called remote searching. You can read more about it in this article in The independent. By the way, it ends with this important bit of information:

The European Court of Human Rights has ruled that Britain’s policy of retaining samples from people never convicted of a crime – including children – breaches human rights.

However, there have also been reports that the British police runs hopelessly behind with regard to fighting cyber crime, because it lacks the knowledge and technology (see here). “The police are becoming more aware of the cyber threat, but remain behind in terms of their own technology, knowledge and intelligence”. How does this add up? To police not being able to do much, in practice. Cyber crime investigations are expensive and require the kind of expert knowledge few people possess.

The least you can do?

  • Always cover your web cam when it’s not in use. Read more about web cams and hacking here and here.
  • Never tell anyone you do not really know what computer equipment you have and what software you run. The chances that you are talking with a hacker may be slim, but if you are, particularly if it is someone you have exchanged e-mail with (meaning that the person has your IP address), the person may not even have to use software intended to test computer security (such as Metasploit) to examine your computer from a distance and then use software like MeterPreter to target the vulnerabilities in your equipment.
  • Be aware that any e-mail you receive may be spoofed. Faked. There is no way to tell whether an e-mail is spoofed or not. E-mail that appears to come from a potential new client may contain a link that causes you to download code (and even the mail itself may contain code). Do a web search instead of clicking on the link and call that possible new client instead of e-mailing back.
  • If you are in the habit of filling out online surveys to make an extra few pennies, mail announcing a new survey can be spoofed too. Keep that in mind before you announce to the world (Facebook, Twitter) that you are filling out online surveys. Such an e-mail can then take you to the computer of a hacker who can ask you to tell him or her truthfully what kind of computer equipment you are using and all sorts of other things he or she wants to know.
  • Internet traffic can be redirected with internet port relay software. I don’t know how exactly it works. If you know what a traceroute is and suspect that some of your traffic is being rerouted, run a traceroute and direct its output to your printer (so that you have a hardcopy that cannot be tampered with). A traceroute can be redirected as well, however. Having traceroute results that show tampering is no good for police, but it can tell you that you are not going paranoid after all. That’s worth a lot.
  • If you use Facebook, Skype or anything else that has a chat possibility, use it on one specific piece of equipment, not on your main computer if you want to keep that computer safe. If you use anything with a chat feature on your main computer, it provides a hacker with a direct conduit into your PC. Particularly Facebook seems to be very leaky. If you keep all those social media communications limited to one device that you don’t use for anything else, you can easily reset or reinstall it in the event of a problem (generally without losing any data).
  • If you’ve just had broadband or cable installed and someone calls you claiming to be from your provider asking you any of the numbers on the side of the router or the like, don’t give it to the caller.
  • If you use a mobile phone for business, get several phones and only allow one phone number to be known publicly. That’s like the e-mail address on which you don’t mind getting spam. Use it only to receive calls, from mostly unknown parties. Use a non-published phone number on a different mobile to communicate much more securely with your trusted clients.
  • There is a lot of free and cheap software out there that you really don’t want to know about. Particularly if you have a persistent suitor, ex or an envious competitor, you should be aware, though, that there are all kinds of software that enable someone to modulate his or her voice when they call you or Skype with you, including changing gender. it works well, too.
  • I have no idea how tablets get hacked (Facebook use and hacking of mifi hotspots?), but regularly resetting one’s tablet, always verifying downloads, and backing up or removing personal files regularly is probably a good idea and anyone who tells you that there is not much hackers can do with a tablet still has a lot to learn.
    Below is an example of a tablet hack. You may have to play the (converted) video a few times and watch the tablet screen at the beginning to see that the tablet screen is filling up all by itself. There were pages and pages and pages of the stuff. The original recording is 7 seconds long and is continuous but has a bit rate of 64 kbps; the converted file seems to consist of only three images.

In spite of what most people think, though, many hackers are good for society and some may even help you on occasion.

IP addresses aren’t passport photos

I hear it time and time again. If someone is bothering you electronically, such as by e-mail, you can identify them on the basis of the IP address, take that to the police and be done with it. An IP address is like someone’s passport photo, right?

Not so. <!–more–>

Most people make the mistake of assuming that cyber stalkers and hackers behave the same way they do. They think that cyber stalkers and hackers automatically reveal their own IP addresses when they approach a target electronically.

Wrong.

Anyone who’s ever used a torrent stream or tunnelled to access a TV show or some other online content in another country knows better.

Most people haven’t.

Cyber stalkers and hackers aren’t stupid and usually hide behind an electronic wall called a proxy. They can also use a series of proxies. Sometimes, a cyber stalker or hacker gets sloppy and forgets this step. It’s been said that’s what happened in the recent hacking of Sony. Others think that it was just a smart hacker who made it seem that way, though.

“You have no idea”

A British hacker was arrested on Friday because he allegedly hacked into thousands of American databases, including many government systems, such as the Army’s, the US Missile Defense Agency’s, and NASA’s.

In one of his chats, he apparently wrote “You have no idea how much we can fuck with the US government if we wanted to.”

This one surely fits the tag “stuff you didn’t want to hear”. If you do want to hear, you can read more about it here.

Source: ArsTechnica