2011
07.08

It never hurts to pay attention to the updates coming from the WINDOWS UPDATE PROGRAM, or any of the automatic update programs.


You may notice increasing number of failures to install properly.
You may notice you are getting an update which was released months ago.
You may notice you are getting more frequent updates that one would normally expect.
You may not notice and trust the existing Security Software to protect you.

One of the first things the developers of surveillance programs do is to disable the functions of your security and anti-virus oprograms. The good news is you NEVER detect another virus again when it does a scan. The Bad News, the program has modified the security settings and the program is no longer scanning for anything when it goes through the files. This will open the door to every virus program affecting your machine. Should you notice any suspicious activity, you will think you are scanning for something and fixing it. The Surveillance programs have the same auto update triggers. (AND IS LIKELY HIDING IN YOUR BIOS CHIP.) It’s going to let you get every virus that arrives.

On a good note, if your computer or network access gets affected by a real virus program, just leave the computer on overnight. You will likely wake to the problem being gone and all connectivity installed. This is because they need that connectivity to continue surveillance. They will fix these issues when they arise. PAY CLOSE ATTENTION TO IPv6. There is something very curious in the sneaky nature of the protocol. And, Bluetooth is being used to enable surveillance on computers and phones. When you find a surprise activation of BlueTooth, it’s time to start becoming suspicious.

If you check Windows Update regularly then you know the schedule and the pattern for the updates. When one shows up appearing late, back dated, you might not question it. Realistically, who would have the time to spend going thru the list and try to confirm the correct KB number and date for the updates. So the pattern to watch for is the frequent updates related to Security and Program Execution. You want to trust Microsoft, but you can’t be sure it is from them.

Once your machine has been hacked with the leading surveillance software programs, you can never be entirely certain you are ever getting to the real location you think. A clue to this will be web pages disappearing and being unavailable. A more remarkable cluee is for one or two pages on a major site to be in the wrong format or using the wrong colors and style sheet from the rest of the site. I have personally noticed this on Microsoft.com and McAfee.com, among others.

(Keep in mind you are also probably getting frequent updates to Flash, Adobe, and Printer Drivers.)

In order to protect the stealth qualities of the Surveillance program, the software will no longer let you really go to the Microsoft Windows Update Site for updates. Your computer is being redirected and you really have no way to tell or confirm it without looking for it when anomalies arise.

The redirection code is hidden well in the registry. It is in an unnamed key which has protection on it to prevent edits. The data is in Hex format, so it is not imediately readable. AND just in case you try to read it, the data is further encrypted.

Through the years the developers have left thier signatures in their program file segments. Every hacker likes to leave their mark behind. Many have adapted the Bluetooth symbol slightly to indicate their work. It will frequently appear in the code files.

NOTE: ONCE YOUR MACHINE HAS BEEN ILLEGALLY HACKED FOR REMOTE CONTROL, SURVEILLANCE AND OBFUSCATION YOU CANNOT GET AROUND THE SURVEILLANCE, ALL YOU CAN DO IS NOTICE IT; BE AWARE OF IT, AND BE HINDERED BY IT’S ACTIVITY. ANY ATEMPT TO GET AROUND IT MAY TARGET YOU FOR FURTHER TECHNOLOGY ATTACKS.
NO ONE WILL HELP YOU.
THERE ARE NO SOFTWARE PROGRAMS TO PROTECT, DETECT OR REMOVE IT.

No Comment.

Add Your Comment

%d bloggers like this: