JTF.ORG Forum
General Category => General Discussion => Topic started by: MassuhDGoodName on December 15, 2006, 08:12:55 AM
-
JTF members,
Just in case you're unaware of this fact, any cell phone which with a battery in it will serve as a microphone to any and all Intelligence gathering agencies at any time/place of their choosing.
It does not have to be "on"....an entire room full of conversation or sound can be instantaneously downloaded into your cell phone and then uploaded instantaneously to "spooks" anywhere in the world.
The software necessary to do this, is itself downloaded silently through cyberspace transmission into your cell phone (even if it is "off"), by Intelligence "spooks"; all done with the complete unawares of the cell phone owner.
--The only semi-solution to this, is to remove all batteries from cell phones whenever they are not in actual usage.
ps -- the same "recording/transmission" scenario applies to most digital "headset" apparatus worn in the car or at your home computer or desktop computer when using "SKYPE", etc....
~YOU HAVE BEEN WARNED~
-
JTF members,
Just in case you're unaware of this fact, any cell phone which with a battery in it will serve as a microphone to any and all Intelligence gathering agencies at any time/place of their choosing.
It does not have to be "on"....an entire room full of conversation or sound can be instantaneously downloaded into your cell phone and then uploaded instantaneously to "spooks" anywhere in the world.
The software necessary to do this, is itself downloaded silently through cyberspace transmission into your cell phone (even if it is "off"), by Intelligence "spooks"; all done with the complete unawares of the cell phone owner.
--The only semi-solution to this, is to remove all batteries from cell phones whenever they are not in actual usage.
ps -- the same "recording/transmission" scenario applies to most digital "headset" apparatus worn in the car or at your home computer or desktop computer when using "SKYPE", etc....
~YOU HAVE BEEN WARNED~
Anybody has a proof for this claim?
-
Always assume everything you say is being recorded and heard by someone somewhere.
-
I will also point out Wireless internet uses cellphone/Mobile phone towers. Same thing applies, your internet computer use can be monitored by someone with in a 1/2 mile or kilometer from you.
-
I will also point out Wireless internet uses cellphone/Mobile phone towers. Same thing applies, your internet computer use can be monitored by someone with in a 1/2 mile or kilometer from you.
Do they have to be using the same wireless connection?
-
I will also point out Wireless internet uses cellphone/Mobile phone towers. Same thing applies, your internet computer use can be monitored by someone with in a 1/2 mile or kilometer from you.
Mine is encrypted
-
It's technically possible. But what's the problem with JTF. All posts can be read by anybody without such technology. In my case, I don't worry. I have sent a signed letter with my address and phone number to the Israeli Embassy accusing them of ethnical cleansing of Jews in Gush Katif and begging them to repent. They cannot judge me in Argentina. But if I wanted to travel to Israel, I think I'd get no visa
-
But our communication with the JTF-forum is in plain text, isn't that a bit risky, to reveal our identity?
-
But our communication with the JTF-forum is in plain text, isn't that a bit risky, to reveal our identity?
If they want, they can check your IP address and know who you are. But they can only use it to deny a visa to Israel. Israelis may be self-hating but no so wicked as to kill you, I think..... Anyway we must be carefull of Arabs or any terrosist.
-
But our communication with the JTF-forum is in plain text, isn't that a bit risky, to reveal our identity?
I don't think they will deny you a visa. And if they wanted your identity they would get it. It isn't that hard.
-
But our communication with the JTF-forum is in plain text, isn't that a bit risky, to reveal our identity?
I don't think they will deny you a visa. And if they wanted your identity they would get it. It isn't that hard.
can muslimterrorists figure out what our identities are?
-
Yes.
-
But who cares? They won't do anything. They have higher priority targets than some people on an internet forum.
Look, Chaim is doing this for a long long time and he is alive and well. So is David and other people.
-
So technically it is possible they gather information to put on the black list?
-
What is a proxy?
Ho can you use it with a webbrowser?
Does it help hiding your IP-address and so on for our enemies?
-
It's pretty much fact that ALL of our communications get transmitted to some CIA or FBI clearinghouse--I have an IT friend who basically confirms this.
At the same time, even the most evil, despicable, Big Brother government can't possibly be bothered to wade through the text messages and emails of 300 million people. It just wouldn't be practical for them to do--it would paralyze all of their operations.
-
It's pretty much fact that ALL of our communications get transmitted to some CIA or FBI clearinghouse--I have an IT friend who basically confirms this.
At the same time, even the most evil, despicable, Big Brother government can't possibly be bothered to wade through the text messages and emails of 300 million people. It just wouldn't be practical for them to do--it would paralyze all of their operations.
That depends on the level of affirmative "action"
-
I will also point out Wireless internet uses cellphone/Mobile phone towers. Same thing applies, your internet computer use can be monitored by someone with in a 1/2 mile or kilometer from you.
Do they have to be using the same wireless connection?
Yes they do the networks share services.
-
I will also point out Wireless internet uses cellphone/Mobile phone towers. Same thing applies, your internet computer use can be monitored by someone with in a 1/2 mile or kilometer from you.
Mine is encrypted
Are you using the 8 multi layer?
-
what is a 8 multi layer?
I have a 128?bit encryption.
-
What is a proxy?
Ho can you use it with a webbrowser?
Does it help hiding your IP-address and so on for our enemies?
Proxy is a site that redirects your IP to mutli locations, bounces them off feeder sites, if you use Tor if you have firefox this can be helpful.
You must realise what information is obtain by using a simple public IP trace, this will give you a location I will give you a site, its a mirror program it reflects your IP information back to you, and you can see what the public can see, if they ever try and trace you. All IPs lead soley back to the host. Not your computer, unless its a company server.
http://www.spyber.com/ip-lookup.php
For mine it currently says ISP/Org: Telstra Internet
Country: Australia (AU) - Australia
Region/State: Victoria
City: Melbourne
Which is incorrect I am 80 kms away from Melbourne at this point of time.
For details of a host you chose the button IP whois.
inetnum: 149.135.0.0 - 149.135.255.255
netname: TELSTRAINTERNET17-AU
descr: Telstra Internet
descr: Locked Bag 5744
descr: Canberra
descr: ACT 2601
country: AU
admin-c: TIAR-AP
tech-c: TIAR-AP
status: ALLOCATED PORTABLE
Thats just given you my host, who is in another state to me. Telstra company cover 95% of all Australian communciations.
For the average people you are of no interest to the FBI. This Site is of NO INTEREST to the FBI.
The FBI Internet crime unit deals will millions of people a day.
Why would you out of millions of messages be of any interest.
You are safe theres no need to worry.
Proxies are used for trolls and spammers to access sites. All White Nationalist site trace proxies. I for one delete any person I find on my sites using one. O0
All proxy sites come with a price, many have worms and virus that lock when you use them. Make sure your AV is up to date.
spyber.com is owned and maintained by a friend of mine, he is an Army officer in Norway. His site is very clean.
-
what is a 8 multi layer?
I have a 128?bit encryption.
When I talk about layers it means how many times the code is re-encrypted.
128 bits only tells you how many extra bits are inlayed into the dated in one layer, 8 multi layer is when that process is done 8 times before the data is sent.
I am guessing you might only have single layer encryption.
-
Just in case you're unaware of this fact, any cell phone which with a battery in it will serve as a microphone to any and all Intelligence gathering agencies at any time/place of their choosing.
It does not have to be "on"....an entire room full of conversation or sound can be instantaneously downloaded into your cell phone and then uploaded instantaneously to "spooks" anywhere in the world.
The software necessary to do this, is itself downloaded silently through cyberspace transmission into your cell phone (even if it is "off"), by Intelligence "spooks"; all done with the complete unawares of the cell phone owner.
I truly question this. Where is the news source or science article to back up this extreme claim?
However...it makes sense to me that any cell phone which is ON can easily be used as a tracking device. The evil American government probably finds it very easy indeed to SMASH the Fourth Amendment into the dirt and then -- without a judge's warrant -- use the continuous signal-search aspects of mobile phones to track anyone it wants to within a few hundred feet.
-
mine is encrypted.
-
It's true also your webcam
-
Just as long as the A-rab Terrorists such as that Hezbollah hag working for the CIA and FBI who had top-secret security clearance is the one spying on all Jew communications, America will always remain safe from the terror
ists.
I know this for a fact, because this gigantic negro police chief with 3 lbs of whale blubber on the back of his neck where it meets his shaved boney cannibal skull told me this is so.
You see, he is firmtive akshun, and this is good for America and good for the world.
That way each every move of Jew be recorded an then when Zionists forsed out of Izrel by gratest prezdent in histry Bush to give back stolen land to riteful owners be end of terro
rism and real mercans then be safe no more terr ist like the Jonuthun Pollrd.
We'uns nev'r needed no stinkin Fourth Amendment to the Constitution of the United States anyway....probly wroten by a Jewboy anyway..goverment mus spy on all an show frenship to Moslim an Nashun of Izlum to stop joo
Yoo reel mercans can sleep good now...guvmint in charge now...nev'r qwestshun CIA an nev'r qwestshun FBI who stop all terro
ristisms an save deversity.
Now mericans no trooth that joos sed I-ran a threat! Mo' lies...no new kyew ler boms at all jes joos lies start wars...CIA intellgence nos more than Bush an Izrel...never thret to joos never always frens to peepul of culur.
-
I think it's true. Because it is possible.
-
So technically it is possible they gather information to put on the black list?
Yes.
-
Alot of proxies are suspected of being CONS to steal your username and password.
Same with anonymous browsing sites..
TOR may be ok, but there is a setting, something about "entry points" set to yes or no. To make sure that you do not download from for example, pedophilia sites for somebody else.. Incriminating yourself!!
In any event, a site like youtube could detect whatever IP you are using and ban it. But currently they are just dealing with youtube Accounts. They could ban all accoutns registered to one email address, but I doubt somewhat that they do that - we`d know I guess..
If you IP changes, and most peoples` do, and they start banning ips or ip ranges, they are running into trouble, because other people with that ISP will be banned, so it would cause them problems.
-
Wow! All this time I thought my cheap cell phone was a piece of muslim shiite.
I didn't know it was that sophisticated.
You guys are kidding right?
What if the battery runs out? Will they still hear me?
What if I hit the battery with a sledge hammer 20 times, will they still hear me?
The big mistery can be solved with a blade and small screw driver.
Unless you don't want it to be solved so that there's a big mistery.
-
I sat on a jury where the criminals had all used mobile phones.
They did not have recordings of their phone conversations.
Every mobile phone communicates with the nearest phone mast and the police have access to lists
phone mast telephone number
xxxxxxxx yyyyyyyyyy
so they can track location.
Anything about recording a whole conversation is something else entirely.
-
As a network engineer, I know of a few methods that have been used but for the most part have been unsuccessful. If you are paranoid about security, there are many programs which use encryption algorithms. On a forum, everything is available to the public eye. IP address can be obtained when you visit a website as a website is broadcast through a HTTP server, in most cases (since JTF is using a forum based on PHP) my guess is that it is running on a linux or unix based operating system that connects to a MYSQL database. It's also likely that since Unix or Linux is likely to be used, that the software used to broadcast the website is probably Apache. Apache keeps logs of people who visit the site. Anytime you visit a site your IP address is recorded. Even if it's not, your ISP has records of websites you visit, sometimes they will listen or monitor your packets. Packets are not always distinguishable to detect what you are posting or writing but sometimes if you are transmitting data, certain things can be decrypted via packets.
Packet sniffing isn't very complex at all.
Regarding cell phones, I've never heard of this before, I generally use smart phones that are unlocked and reprogram the firmware so I have no concerns about that. Now it is possible to hack phones with bluetooth if they are not secured with a password and the bluetooth is enabled. That is the only way I know of that someone could upload software. Sometimes cell phone companies put their own firmware on locked phones that you get via a contract and are able to automatically update your software. Certain cell phone companies using CDMA technology rather than GMS ( such as Verizon) are required by the FCC to add GPS on your phone for the new E-911 technology to comply with the law.
Overall, I think some of the members are being paranoid, I wouldn't worry too much about it. Just watch what you say, never threaten another persons life or admit to breaking the law. This is what will screw you over. In many cases the government is restricted on those records, however the most fullproof way to obtain records (such as when cops go after paedofiles and those who pirate video games, movies) is they obtain a subpoena for the host or the ISP and they match records to verify the persons IP address and packets match up. This is why it's important to secure your wireless network so you don't get blamed or convicted for somebody elses wrongdoing. The justice system is pretty screwed up, but last I checked, I thought eavesdropping doesn't hold up in court unless the other person is aware they are being recorded?
By the way, it's not possible to actually hide your IP address. You can use a proxy for web browsing and certain applications like messengers but that does not change or hide your IP address. A lot of times, I will use a proxy when at work or school to bypass blocked websites but if your doing something illegal, then you can still be tracked if the courts obtain a subpoena for the ISP who owns that IP address (though it's rather difficult if located in a foreign country). You also risk privacy with an open public proxy but there are closed proxy (they cost money though).
Even if a person knows your IP address, they can't actually trace you to your home address. At most, they can find out who your ISP is and perhaps where the ISP's datacenter is located. To go any further, one would have to look up customer records on who is using that IP address at that date and time.
If you are worried about being hacked, that is unlikely, hackers need some sort of trojan or exploit to access your system. Generally personal attacks are rare as most users have some sort of firewall or protection. My largest issue (running servers at work) is probably DDoS attacks (Denial Of Service) where a user will use multiple "hacked" servers to try to flood our network with bogus packets, we have hardware to dispense the bogus packets though it is a pain in the ass and even the largest corporations have had their websites taken down as a result. Most of these users generally use the hacked servers to send spam or packet competitors to hurt their business.
-
there is a risk that many of the free public proxies are just there to steal peoples` passwords.