Thursday, April 21, 2011

HBGary.DoD Apple Spying Citizens w/ their own comp,ph

I have long been opposed to the US government routinely spying on citizens as that violates the 4th Amendment totally. I also am not as naive as I once was, and have learned much about this topic while trying to stop the proabort shadow government of Obama-Hillary-Planned-Parenthood-and-their-pervert-network spying on me, as I write as they attempt to censor my speech and religious beliefs. In the process of trying to learn enough to get control of my computers away from the State Dept run by jezebel Hillary, I have looked at much of the source code on my windows machines [but I don't have only windows]. I have found many many secretive computer programing code commands that circumvented the builtin security and firewalls of every browser. I have reported some of that to a hosting company I have done business with for years.
I do not believe that average ordinary 'teenagers' as the news often portrays criminal hackers have the level of skills necessary to break into the Pentagon security on computers or the State Dept's either;nor do I believe the so-called leaks were 'leaks' at all, but deliberate releases of information by the State Dept and or Pentagon to 'show up" certain diplomats in order to remove them by surreptious underhanded ways . I think the company HBGary in cahoots with the Dept of Defense,the Pentagon and the White House are spying on every citizen in the US via their computers, and every diplomatic post, and every person anywhere connected to the internet.
I am not the only person who thinks so. In this morning's news in CNN, in the tech tab and in the Ars Technica section is an article describing HBGary's and the US federal governments roles in spying on citizens. I quote:"The e-mail trail showed that HBGary was pitching its rootkits to defense contractors,
and writing what can only be described as malware; hostile programs that would exploit security flaws and install rootkits."
Quote from Ars Technica at:
http://arstechnica.com/tech-policy/news/2011/04/hbgary-issues-denials-snipes-at-the-blog-o-sphere-in-open-letter.ars/
8:23 AM 4/21/2011
And explains the rootkit system developed by HBGary for the federal government as two types:
one with no data structure,process,thread or module associated with it called 'Twelve Monkeys" and abbrev 12 with capital M ; and that runs on windows xp, and office 2003; and exfiltrates Windows files with "XRK"; and is client and server distributed. ;and the other named 'magenta' which is 100% assemly code [computer language programming to instruct computer how to behave/what to do] where the rootkit injected itself into a computer via "DriverEntry()" and thus loaded into the computer's memory, then loaded into the APC [ASynchronous Procedure Call], then when the APC does it things, the rootkit is executed, and then it moves itself to a new location in memory so it is not detected easily. I suspect this is what the enemies of free Press use to attack T-Mobile phones with a magenta T to take them over and get control of them to try to force T-Mobile out of business for not bowing before Obama's plan to spy on citizens.
And this quote:
"Rather, they concerns were that the company was developing these undetectable rootkits, selling (or at least, attempting to sell) them to defense contractors, at which point they could be sold to essentially
any agency for any purpose—they could just as well be used to spy on domestic dissidents as they could on foreign powers."
And remember Obama recently met with Apple Exec jobs, Facebook's Zuckerberg, Google's Schmidt, and Microsoft's Gates to get their 'cooperation' in spying on citizens? And that he heavily markets for Facebook as their head of marketing unofficially?. Also read in news sources today about iphones,ipods & Apple laptops tracking every move you make and saving it in plain human readable language in a file on YOUR OWN DEVICE that the US gov't knows how to find, and so does Apple Computers, and every computer programmer in the world.
I think if the U S is to continue we have to vote out of office Obama and every appointee of his, fire Hillary, fire Gates in the Dept of Defense [who after all is not a military person at all but a Dept of Education trained in spying techniques person] and disassemble probably most of the computers in America since the so-called anti-virus is usually only a way of the government reading every file on your computer. That's for starters. And then vote out every socialist Judge that does not abide by/follow the written Constitution and every legislator also who doesn't.
Also, while I'm on the topic of bad government, I think the death of Judge John Rollo in Arizona was a planned hit by a paid ahead of time assassin and that was also planned on Congresswoman Giffords for having read the Constitution with open mic in Congress thus promoting it. Anarchists, illegal aliens crossing southwest border of US, and communists hate the Constitution. There was no effort to save Judge Rollo medically because he would have sided with the citizens of Arizona [and against Obama] and there was that big case of Obama vs Arizona pending that Obama desperately wants to win to flex his communist arm and hammer.
Gloria Poole;9:00am;21/April/2011;@my apt in Missouri
Update @ 11:07 pm same day with thisArticle says in South Korea it is illegal to read someone else's email. It should be that way in the US also. The idea promoted by corporate America that spying on citizens is ok, is not ok. IF corporations issue devices or computers that they allow employees to take home, then they compromise corporate secrets and records; and they should not be surprised when their info is 'leaked' to the cybercriminals who want it desperately, or to ubiquitous marketers, or to the Press, or to competitors.
I read that most of the US's federal agencies give even low ranking employees cell phones [blackberrys in most instances] and laptops or netbooks to use as their own,take home, keep over weekends when not traveling for agency etc. Then when there was a major so-called leak from the US State Dept they acted surprised. Some events are very predictable and not 'accidents" at all. Giving lots of people 24/7 access to confidential info is insane and most bona-fide 'security" I.T. would tell you that.
Unfortunately, in the US so-called 'social media" is supposed to take the place of good in person at retail store service. I think it is one reason US is not competitive, and the economy is tanked and companies outsource.
I love electronic gadgets,computers,cell phones --I really do; they are great when they work correctly and do not give every detail of my life to unknown people. But the risks are escalating exponentially at warp speed.
My plea to gadget makers, handset makers, computer,laptop,netbook makers is remember the 4th Amendment protections against 'illegal search and seizure' of content by government. If the capability to spy exists, all governments will exploit it. And maybe all citizens should buy handsets made in South Korea ??
Gloria Poole;
PS: these are my copy and paste comments I tried to add to Information Week article that asked for comments that they censored with prior restraint while I was writing it and they were spying on me via my Apple iMac computer desktop--no surprise there,huh?; 21-April 2011; at my apt in Missouri; in response to their article entitled: "Iphone tracking only tip of the Iceberg" by Thomas Claburn and their comments page at:
http://www.informationweek.com/commenting/add.
Update on 22 April this with this info, that is my intended response to an "Apple " trick survey sent to me via my email address, but when I replied they blocked it from being sent [since they only want replies that tell them what they want to hear]; so I told them I am posting it here for their corporate office to read also: As to if Apple support resolved my issues with iTunes apps that are corrupt, and some illegal apps which I reported to Apple several times [because they were promoting trafficking in children for s-e-x and then to FBI and the public; and criminals breaking into my iTunes acct, I am quoting myself in my reply to what might have been Apple or a trick survey:
"There were 2 different people that day: first a man who took hours on phone with me but did not resolve it but did finally ask his 'supervisor' to get on phone. I was sent a link of "http://support.apple.com/kb/HT1224?viewlocale=en_US"/ which I did not open since my issue had nothing to do with my keyboard & I did not want Apple to spy my computer with the "viewlocale en_US" code in url. I really HATE it when fraudsters working for computer companies try to takeover my computer. And usually I document that somewhere. If you're interested I documented some of events on one of my blogs at: http://words-that-work-llp.blogspot.com. As for the issue with unsafe apps, illegal apps that I reported repeatedly to Apple and then to FBI via my twitter acct [twitter.com/gloriapoole], and someone breaking into my computer [iMac & itunes, and ipod touch] --that is an ongoing issue,unresolved. Someone spied on me last evening to censor my first amendment liberties to write on line [as already documented here in previous paragraphs. Gloria Poole;@my apt in Missouri; my landline ph is xxxxxxxxxx. 22-April-2011@7:54am
My response to Apple 'survey" sent to me via email and on 3 times changing/chameleon url of:
http://bibz05.apple.com:8080/ssurvey/survey;jsessionid=152C530D12DBACCA76268750C603705A.JBoss1. By the way, if there was a 'boss' it would be me, but this is not a company nor a company owned computer but my personal computer.