Tag Archives: hacking

100% criminal fraud risk, yours truly the unwitting kiddie-porn star, my blog, FBI: hunting the animals

“185.220.101.193 – Fraud Score: 100%”

“IP address 185.220.101.193 is a very high fraud risk. This IP address is owned by Markus Koch who are themselves a high risk ISP. Scamalytics see medium levels of traffic from this IP address across our global network, almost all of which is fraudulent. We apply a risk score of 100/100 to 185.220.101.193, meaning that of the web traffic where we have visibility, 100% is suspected to be fraudulent. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may pose a different risk or no risk. 185.220.101.193 is operating a TOR exit node, which is likely to be proxying traffic from another geographical location. The geographical location of 185.220.101.193 is in the Netherlands, however the geographical location of the user could be anywhere in the world.”

=======================

Unlike the 100% crowd above, some TOR networks with such IPs are of little risk, maybe 1%, maybe 33%, maybe 50%, maybe 85% of activity being criminally fraudulent. The above crowd is 100%. Wow.

I assume that these guys have total control of my blog, though they may only be using my site to host conversations in the background, having fun. It could just be some nefarious people already known to me doing a bit of gaslighting. Whatever. I’ve already see the Son of the Living God on the Cross. I’ve already looked Satan in the face in my short life. Nothing can gaslight me. I’ve been far beyond the idiocy of the best of gaslighters to witness extreme lack of wisdom. Now, I haven’t looked, but I don’t think anyone has messed with any content of this blog as of this writing. Well, there was a dialogue box that popped up on my desktop asking me to enter my Windows Password, which is the Password for the entire physical computer. Hmmm…. No. Just because. Too impolite, lacking in courtesy.

Of the dozens of TOR networks hacking away, one in particular is the expert at hacking raw formatted hard drives and flash drives to recover previous content. Interesting, you know, all those great pictures of Flowers for the Immaculate Conception! Of course, they could just ask me, instead of playing the role of breathless fools.

I already have enough of those in my life who are using a loved one as a proxy to harass, knowing that their mafia-esque extortion to “go along with the plan”, as they’ve said, rife with offers of bribes as well, might just work in that such a family member is otherwise helpless against their machinations. They might go so far in these next days to have that elderly and helpless loved thrown on to the street in the middle of nowhere in the middle of what is already winter where this person is. The cruelty is extreme. If these hackers are working for this cruel people, they might want to repent and do something better with their lives.

=======================

Hackers are of course, on the take, either themselves, or they sell the information they acquire. They could use their talents for good by presenting themselves, say, to the NSA. Why not? And don’t give me this:

Good ol’ Will.

I have a project for the hackers. Sorry, I can’t pay you. But maybe you can redeem yourselves by bringing something to the FBI for me. Don’t send me anything. NO! And I suggest you only do this by first announcing yourselves to the FBI, working with them.

Here’s the deal: When I was a kid, born in 1960, and before, during, after I was a student at North Junior High School in Saint Cloud, Minnesota, USA, so, say, late 1960s into the mid-1970s, all the swimming classes were done with forced nudity with movie cameras everywhere around the pool, up in the bleachers, in the shower room, in the locker room. I’m guessing this is one of the largest troves of kiddy-porn ever made in modern history. I’m guessing millions of stills, millions of film-shorts are still circulating on whatever it is that is called the dark-web. While images were acquired decades ago, any archiving, any distribution by anyone anywhere is a felony. I’d like all these animals to go to prison. Can you do that? Thanks in advance.

Me as a kid:

Leave a comment

Filed under hacking, Intelligence Community, Law enforcement

TORs & Proxies. Fraud & Hackers. Why?

According to Scamalytics (I don’t know if that’s legit or self-congratulatory), there, is, of a sudden, the most vaunted fraudsters and hackers around the world visiting ariseletusbegoing. Why? These guys have been subject to the courts and investigations by all sorts of agencies.

They are the best at extracting hard drives, flash drives, at following everything done on a computer, a phone, whatever device.

Most appear next to The Hague or over in Hesse. Whatever.

What are they interested in me. Maybe because I’m such a nobody. Maybe because they think they can find secret messages in “Flowers for the Immaculate Conception” – and indeed the Sacred Mysteries are often the subject of those posts and many others.

I don’t get it.

Leave a comment

Filed under Intelligence Community

Fr Byers 2a vs Hillary’s BleachBit. Guess who wins.

These are tiny laptop drives that a non-techy parishioner asked me to delete, who was getting rid of dinosaur computers but was not wanting to leave files on the hard drives. Not being much of a techy myself, and that person not requesting the drives back, and me later deciding not to want to bother with the old computers, the drives were put out somewhere between 5 and 10 yards. Three 9mm to the one on the left and a half a mag-dump to the one on the right. Haha. That was the extent of my target practice in this time of no ammo amidst Covid lockdowns and such. This kind of target practice is all calm, entirely efficient. I mean, the interior disks were reduced to a small and momentary metallic dust cloud with the largest shards of the disks pictured above, but all the rest being reduced to pretty much smaller than a zeptometer in size. That’s, like, really small. Hillary’s hammers are operated with such angst and distress and are so inefficient, so readable in their larger shards. And software? Pfft. 9mm target practice is fast and gets the job done andand… is fun. I didn’t want to break my word about erasing the drives. :-)

2 Comments

Filed under Guns, hacking, Humor

Recently behind the scenes of the blog

chess board robert van der steeg impossible world

Thanks to a combination of various services running overseas, I’m able to make some observations about those hacking into the admin section of the blog, the behind the scenes part of what it takes to make any blog work. I’m guessing all such hackers are benevolent, but I don’t know that. What they do with this or that particular hack, well, I have no idea. But I do see them at work. Kind of like the metadata of hacking hackers.

One particular reader / hacker / analyst / humint baiter and all-around good person by all accounts, used “invisibility cloaking” (in layman’s terms) a bit more than usual, then, if I’m correct on the who’s who thing, that person tested posting posts under my name. “Hmmm….” thought I. Perhaps it was just a mistake whilst perusing or perhaps adjusting some drafts or older posts, or simply writing entirely new posts under my name. I mean, I do have to wonder sometimes. Kind of weird. Anyway. I have little time for that. It’s all in the “Whatever!” bucket.

Anyway, I did NOT notice recent activity as far as someone else fraudulently publishing on the blog under my name as it all happened too quickly and then disappeared before I even knew it happened. But a good friend with a lot of sense and fairly good tech skills happened to be visiting the blog at just the time it happened, and then sent me a gently sarcastic text: “Now you see it, now you don’t.” After a few more texts back and forth – ascertaining that this person only goes to the top-front-page of the blog and not to archived posts, we then had a phone conversation. It became clear that something is up with a third party testing out some sort of fakery. The person who alerted me to this is a good friend, a loyal friend, absolutely trustworthy, with no reason whatsoever to misrepresent anything to me, ever.

So, this incident can be added to the “Just. Wow.” incidents I’ve been noticing these past number of weeks. Since I don’t think the person behind this incident is in any way nefarious, I also put all this under “Humor.” But it’s also without my permission…

To be continued…

5 Comments

Filed under hacking, Humor

Blocked! I’m suspicious! It is to laugh. So: *Whateevveerr…*

suspicious web page blocked

Not the first time. I can’t count the times with various blogs through the years. The note speaks of phishing and generically of “internet security” and it is not said if the blocking was by way of algorithm or by human intervention, meaning that it can be flagged because of ideological perspectives whether directly or by a thusly tweaked algorithm. Whateevveerr…

I do know that there has been quite a precise interest in a recent post on toxic clouds the other day, you know, by certain agencies. Whateevveerr…

I do know that firstly youtube and immediately after google (linex) [always in that order and in that way] have shown quite a precise interest in a certain recent post on the Congressional grilling of their CEO the other day. Whateevveerr…

At the same time, weirdly, I got a “scam call” with an odd menu, which I just ignored until, in like three more seconds, it hung up. What makes that one particular call among zillions of such calls is that my phone was set to total silence for the sake of not being disturbed at Holy Mass. No notifications. No ringing for calls. Nothing. But it rang for that call. Looking for an oral comment? Whateevveerr… Just a bug inside the phone, I’m sure. “He’s cute!” ;-)

img_20180902_070607489~25995427901821174808..jpg

This guy was climbing the church walls. He must be the bug in the system of my phone.

Also, weirdly, at the same time, I got a note on privacy setting changes for just one account I haven’t used or even accessed for like seven years (and that I totally forgot about) that I created specifically to comment on a friend’s blog called jihadwatch something like ten years ago. It has an email address that I also used to bait terrorists and terrorist funding organizations at that time, but not since. That was good recreation. I learned a lot about the Qur’an from the perspective of terrorists as well. I used that for my ecclesiastical thriller novel Jackass for the Hour. I know, I have to get back to that. Anyway, with that account, I learned just how it is that I could easily work up relationships with the worst of the worst. And while people might know the exterior details of that, it’s quite another thing to know the why of it all. That takes something else than mere analysis. Anywhere, whenever you get privacy setting changes for just one of many, it seems that it’s a CYA move on a provider’s part for liberality of actions to the contrary which they’ve already taken. Whateevveerr… I’m sure whoever reads all of that will be inspired.

As I say, my life is an open book. Whateevveerr…

8 Comments

Filed under Humor, Uncategorized