Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Can the FBI Secretly Track Your Cell Phone?
newsweek.com ^ | Feb. 10, 2010 | Michael Isikoff

Posted on 02/11/2010 11:08:16 AM PST by Free ThinkerNY

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-116 last
To: robomatik
do you use "zone alarm?"

No, but I used it for many years. The thing is, no firewall would have protected me. The MS firewall that came with vista did it's job and blocked the port. A game I was playing some weeks earlier asked for the port to be opened, which I did, but I failed to close it after the game. It was the only port I had open. I usually close them all except for my private network which is protected and the internet, so they got through from the game port. They likely scan for it, and I had my e-mail open on the desktop. It's been about 6 months or so. I am not getting anything from my credit monitor, and I closed my bank and investment accounts and changed the numbers. I think they were not quick enough.

101 posted on 02/11/2010 9:13:59 PM PST by Cold Heat
[ Post Reply | Private Reply | To 89 | View Replies]

To: AFreeBird

That makes sense. Still the logs could be de-identified. No need to keep track of WHO is there, just how many, when and what traffic.
As I said, perhaps its a business opportunity.


102 posted on 02/12/2010 5:45:04 AM PST by Little Ray (Madame President sounds really good to me...)
[ Post Reply | Private Reply | To 65 | View Replies]

To: Cold Heat

Re-formatting clear your firmware.


103 posted on 02/12/2010 6:16:55 AM PST by stuartcr (Everything happens as God wants it to...otherwise, things would be different)
[ Post Reply | Private Reply | To 56 | View Replies]

To: Petronski

They could probably find you, just using a metal detector...


104 posted on 02/12/2010 6:20:48 AM PST by stuartcr (Everything happens as God wants it to...otherwise, things would be different)
[ Post Reply | Private Reply | To 87 | View Replies]

To: Cold Heat

Sorry, I meant to say re-formatting won’t clear your firmware.


105 posted on 02/12/2010 6:22:49 AM PST by stuartcr (Everything happens as God wants it to...otherwise, things would be different)
[ Post Reply | Private Reply | To 56 | View Replies]

To: stuartcr
I reload it from the desktop interface if needed but the bugs, if you get one and I have, reside in the memory areas. There are two of them. The firmware does it's own security checks but sometimes I just back it out to a previous version and then reload it later.

Most phones won't allow you to do this which is why I like the Storm.

I would not touch a I-phone. I despise AT&T anyway.

106 posted on 02/12/2010 10:52:00 AM PST by Cold Heat
[ Post Reply | Private Reply | To 105 | View Replies]

To: Cold Heat

OK, then you probably got nothing to worry about.


107 posted on 02/12/2010 11:09:15 AM PST by stuartcr (Everything happens as God wants it to...otherwise, things would be different)
[ Post Reply | Private Reply | To 106 | View Replies]

To: stuartcr
Once you get whacked, it changes everything you do. I've been lucky so far. I have done a lot of buying and investing on the internet, but I have all but stopped it completely.

A year ago my son had his debit card info stolen and they tried to empty his account. They picked the wrong person because he had already spent it and had 2 bucks left.....LOL.

I am trying to develop protocols for myself that will stop any attempts to get my data. I assumed like most people that if you do shredding and keep your AV's up to date that nothing can happen, but I was wrong....so I am now very cautious.

108 posted on 02/12/2010 11:20:41 AM PST by Cold Heat
[ Post Reply | Private Reply | To 107 | View Replies]

To: Cold Heat

Not doing any banking over the internet helps greatly, but that’s not a popular solution.


109 posted on 02/12/2010 11:38:40 AM PST by stuartcr (Everything happens as God wants it to...otherwise, things would be different)
[ Post Reply | Private Reply | To 108 | View Replies]

To: Cold Heat

“so I am now very cautious”

How did they get in?

Did you have a login password for windows? This sounds like stories I’ve heard from people who had older windows systems, like Win 98.


110 posted on 02/12/2010 7:49:40 PM PST by webstersII
[ Post Reply | Private Reply | To 108 | View Replies]

To: justiceseeker93

This whole regime is a criminal enterprise..


111 posted on 02/12/2010 9:50:03 PM PST by sheik yerbouty ( Make America and the world a jihad free zone!)
[ Post Reply | Private Reply | To 79 | View Replies]

To: webstersII
I'm not sure exactly how it was done. I could find no worms or back doors. My desktop is up and running 24/7 and I have my e-mail prog, which at the time was Windows Live, running and open on the desk top. I had a port open that was connected to a game that I should have closed and I assume they used it. I have programs using some thirty different ports but I manually close them all when done, but forgot one. I don't even allow remote assist. I have two firewalls and a AV, plus I do frequent scans with a online heuristic scanner.

One day I looked at my e-mail and two of some thirty folders were missing. One was labeled "personal" and the other Investments". They were gone, the folder and all content as if someone dragged and dropped them.

The only other way, other than a hack, would have been to insert a stick into the machine directly and take the data.

One thing that might have helped me is that the data was encrypted by windows live mail. It's possible that it was unusable, but I changed all my banking and investment account numbers and passwords anyway as soon as I saw the stuff was gone. And it is gone. Multiple searches have come up with nothing, nothing at all.

Right now I have it so buttoned up, my own wireless network can't find my computer. It sees a unknown device...LOL BTW, I use Windows VISTA on that machine and it's fully updated. It's been a very secure setup for a couple years now with no bugs. I think it must have been a hack and I have no idea how but game ports are easy to scan for and I'll bet it happened while I was online and right under my nose. The e-mail client was already running so there would be no way for any firewall to stop it. IMO

As to logins, I have a login but I was already logged in. What these bozos can do, is find you while you are connected to the internet. Once they find you they do a port scan. They find a port they can use and somehow they can get in without tripping the defenses and VISTA has a crapload of them.

I decided that perhaps they used the e-mail client so I disabled windows live, and went back to windows mail. It is less functional and has a lousy interface but I never lost anything with it and have used it for many years. Windows live has a complicate interface with connections to MS Office, MS chat and messaging and more. It seems to me that the more a e-mail client does the riskier it becomes so I quit using it just as a precaution. I miss some of the features but like I said, I am cautious now. If they can hack google, they can get anyone.

112 posted on 02/13/2010 12:10:16 AM PST by Cold Heat
[ Post Reply | Private Reply | To 110 | View Replies]

To: Cold Heat

Thanks for the detailed info.

That’s really scary that they could get in like that. I wouldn’t have thought it possible like you described but obviously there is more to this than I understand.

I’ve read about some schemes like putting up a simple linux box as an interface between the computers and the router and I’ve seen a few other suggestions for security but I don’t know enough to implement anything out of the ordinary.

I’ll keep in mind the stuff about open ports. Maybe it’s time to go to a Mac since they are not as prone to getting hacked.


113 posted on 02/13/2010 8:58:40 AM PST by webstersII
[ Post Reply | Private Reply | To 112 | View Replies]

To: Free ThinkerNY

The NSA has had the capability for years.


114 posted on 02/13/2010 9:02:07 AM PST by Captain Peter Blood
[ Post Reply | Private Reply | To 1 | View Replies]

To: webstersII
You can hack any computer. The macs are more resistant to worms and viruses as most bugs are designed for windows.

These hacks only require a internet connection and like i said, if the user opens a port for whatever reason, then there is no firewall on the planet that can keep these bozos out.

On the same topic, I just got a letter from TD Ameritrade today stating that my e-mail addy was bouncing back their attempts to contact me. This is one of the accounts that were involved in the data loss last year and I withdrew all the funds I had in it as a precaution. I checked the profile data and the e-mail addy has not been changed. Now I am wondering if someone else has control of it. The e-mail client I am now using will not do a bounceback.

I dunno............Just watch your firewall and only open ports that you need. The machine must communicate to update your programs like the anti virus and OS. You can't close everything, and I have no idea how you can make a computer totally secure if it is connected to the net. I am beginning to figure out that nobody can do that.

115 posted on 02/13/2010 12:09:10 PM PST by Cold Heat
[ Post Reply | Private Reply | To 113 | View Replies]

To: All

http://internet-haganah.com/harchives/006782.html

22 February 2010
“FUD OF THE DAY AWARD”


116 posted on 02/22/2010 9:38:28 PM PST by Cindy
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-116 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson