Академический Документы
Профессиональный Документы
Культура Документы
http://www.bbc.com/news/technology-29817644
ITS NOT THE COMPUTERS OF THE WHITE HOUSE THAT ARE
HACKED
ITS THE PHONE LINES WHICH FEED INTO THE COMPUTER
Global firewalls.
Okay so this explains how all contacted authorities are infected. The virus
blocks specific ports on all authorities.
http://www.derkeiler.com/Newsgroups/comp.security.firewalls/200602/msg00796.html
These are the list of ports.
http://www.answersthatwork.com/Download_Area/ATW_Library/Networkin
g/Network__2-List_of_Common_TCPIP_port_numbers.pdf
One-way Traffic Engineering
One-way traffic is a form of traffic engineering. For example, in
corporations, they block access to websites like facebook so people work
in the office. They block access to instant messaging services. This
explains that.
http://oreilly.com/catalog/bgp/chapter/ch06.html
This should explain to you where my screenshots show no replies from
any contacted authority in the world, be it the un secretary general of un
headquarters new york, white-house, interpol, seattle fbi headquarters,
security council for counter-terrorism.
Call Monitoring
The last thing, the malware virus, has another virus that has call mirroring.
They have a display that allows call monitoring. Knowing who calls who.
That is how they impersonate. This document explains that.
http://www.talkdesk.com/call-center-software/call-monitoring/
That. Malicious GPS Spoofing Attack. That may be why if you trace your
calls they come to Canada, but don't actually go there.
Call Mirroring
Send the call from one person to another, based on circumstance.
http://www.miarec.com/documentation/port-mirroring-different-call-
scenarios
Officers have impersonated as individuals.
Individuals as false relatives.
GPS Spoofing
A GPS spoofing attack attempts to deceive a GPS receiver by
broadcasting counterfeit GPS signals, structured to resemble a set of
normal GPS signals, or by rebroadcasting genuine signals captured
elsewhere or at a different time. These spoofed signals may be modified in
such a way as to cause the receiver to estimate its position to be
somewhere other than where it actually is, or to be located where it is but
at a different time, as determined by the attacker. One common form of a
GPS spoofing attack, commonly termed a carry-off attack begins by
broadcasting signals synchronized with the genuine signals observed by
the target receiver. The power of the counterfeit signals is then gradually
increased and drawn away from the genuine signals. It has been
suggested that the capture of a Lockheed RQ-170 drone aircraft in
northeastern Iran in December, 2011, was the result of such an attack.[3]
GPS spoofing attacks had been predicted and discussed in the GPS
community previously, but no known example of a malicious spoofing
attack has yet been confirmed.[4][5][6]A "proof-of-concept" attack was
successfully performed in June, 2013, when the luxury yacht "White Rose"
was misdirected with spoofed GPS signals from Monaco to the island of
Rhodes by a group of mechanical engineering students from the Cockrell
School of Engineering at the University of Texas in Austin. The students
were aboard the yacht, allowing their spoofing equipment to gradually
overpower the signal strengths of the actual GPS constellation satellites,
altering the course of the yacht.[7]
Caller ID spoofing
Public telephone networks often provide Caller ID information, which
includes the caller's name and number, with each call. However, some
technologies (especially in Voice over IP (VoIP) networks) allow callers to
forge Caller ID information and present false names and numbers.
Gateways between networks that allow such spoofing and other public
networks then forward that false information. Since spoofed calls can
originate from other countries, the laws in the receiver's country may not
apply to the caller. This limit's laws' effectiveness against the use of
spoofed Caller ID information to further a scam.[1]
FAX SPOOFING.
http://www.spooftel.com/FAQ/index.php
As they are able to intercept faxes, there is a possibility they have been
sending fake Canadian authority faxes from spoofed fax numbers.
THERE HAVE BEEN NO REPORTED CRIMES TO CANADIAN
AUTHORITIES IN REGARDS TO THIS CASE FOR 11 MONTHS 26
DAYS. I GET NO RESPONSE ELECTRONIC COMMUNICATION FROM
WORLD AUTHORITIES. FROM ANYWHERE. NEW ACCOUNTS. NEW
PLACES. GPS SPOOFING ATTACKS ON TOP OF THOSE OTHER
CYBER CRIMES. MY FAXES HAVE FAILED FROM EVERYWHERE
WHICH IVE GIVEN PROOF OF.
EVEN AS CLOSE AS NEW YORK. BY PHONE FAX EMAIL CONTACT
FORMS. IVE ASKED WORLD AUTHORITIES TO TRY EVERYTHING.
GPS Spoofing attack
In the context of network security, a spoofing attack is a situation in which
one person or program successfully masquerades as another by falsifying
data and thereby gaining an illegitimate advantage.
Even I had one of their numbers trace in the middle of the forest in Alberta
somewhere.
Do they call from numbers that appear as mine!!!! And other people?!?!!?
Caller ID service, however, is susceptible to fraud. Using a practice known
as caller ID spoofing, callers can deliberately falsify the telephone
number and/or name relayed as the Caller ID information to disguise the
identity of the calling party. For example, identity thieves who want to
collect sensitive information such as your bank account or other financial
account numbers, your social security number, your date of birth or your
mothers maiden name, sometimes use caller ID spoofing to make it
appear as though they are calling from your bank, credit card company, or
even a government agency.
http://www.fcc.gov/guides/caller-id-and-spoofing
VIRUS PHONE NETWORK - CANADA ONLY
http://onlineathens.com/stories/060700/tec_phonevirus.shtml
FAX TO CANADIAN
AUTHORITIES WILL NOT
WORK.
CRIME OF AGGRESSION
http://en.wikipedia.org/wiki/Cyberweapon
ACTING HEADS OF STATE IMMUNITY
IN WHICH NO ONE IS FREE FROM PROSECUTION
http://s10.postimg.org/in6owpyzd/Screen_Shot_2014_01_18_at_18_
08_01.png
One thing to further note, is that CBI has been investigating federal
government and scams throughout the nation, and there has always been
a lack of evidence. This software gives them the ability to delete, edit, and
add records to any network they want. Even use accounts of any officers.
Take their calls.
CONFIRMATION.
http://postimg.org/gallery/2wpkclku0/
SOME LOCATIONS ATTEMPTED FOR COMMUNICATION
FAILED FAXES.
http://postimg.org/gallery/1o601l8kg/
PHONE CALLS
Cooksville Colonnade
5 - 3024 Huron St
Mississauga, ON L5B 4M4, Canada
Yongsan Computer
3033 Palstan Rd
Docuserve Etc.
20 Dundas St. East Unit2
Mississauga, ON L5A 1W2
Canada
Battle Station
4955 Dundas W
Etobicoke, ON M9A 1B6
Canada
ARJUN KAPOOR
http://s27.postimg.org/612701sgj/Screen_Shot_2014_01_18_at_18_
12_41.png
http://speedy.sh/t4q63/20140327-181127.m4a
http://postimg.org/gallery/19zak8d0q/
DUAL IDENTITIES.
FOR A LONG TIME BEFORE, THE COMMUNICATION WAS STATING
THEY WERE USING TWO IDENTITIES AND HAD TWO PHONES.
THEY HAVE DONE IT BEFORE IN COURT CASES WHICH IVE SHOWN
YOU. SOME OF THEM HAVE DUAL IDENTITIES. DUAL REGISTERED
ADDRESSEES.
SURESH AGARWAL AND SURESH KUMAR AGARWAL SAME THING.
http://indiankanoon.org/doc/52650862/
RAVI KHEMKA DECEASED FATHER IN LAW, FATHER TO HIS WIFE,
MEENAKSHI AGARWAL
JUST AN EXAMPLE. THEREFORE TO HAVE IDENTIFICATION ON THE
NAMES OF VULNERABLE TARGETS IS AN UNDERSTANDABLE
ACTION.
THERE'S NO GREATER EXTREME PERSECUTION OF A
GOVERNMENT.
FAMILY
http://postimg.org/gallery/2qbyyzpp0/
DELHI - PUSA ROAD, LEFT AT THE TELEPHONE EXCHANGE, 2ND
RIGHT, 1ST HOUSE ON THE RIGHT WITH TREE WITH BRANCHES
CUT OFF. THERE IS A DOCTOR/DENTISTS OFFICE AT THE CORNER.
HEAD MALE, ARUN AHUJA
KURUKSHETRA - SECTOR 13, HOUSE 394. SANJAY AND AJAY
MADAN
FARIDABAD - ASHOK GULATI (IM UNAWARE OF HIS ADDRESS, BUT
YOU CAN FIND IT BECAUSE HE'S A RETIRED INDIAN AIR FORCE
WING COMMANDER)
THEY ARE SIMPLY TARGETING ALL MY FAMILY. LIKELY WHY NO
ONE IS ABLE TO REACH HER. I DONT KNOW WHERE SHE'S GONE.
WHY THEY HAVE PUT SIGNIFICANT TARGET ON HER, AS SHE
DOESNT NORMALLY LIVE WITH ANY FAMILY. SO THEY'VE
ISOLATED HER AS A TARGET.
CONSTITUTIONAL CRISIS
YOU CAN SEE WHY THE ENTIRE SCOPE OF INDIAN FEDERAL
GOVERNMENT DID NOT INVESTIGATE, NOR EXERCISE ACTION
NOW. THEREFORE, SUPERVISED ACTION ONLY BY UN US AND
CANADIAN OFFICIALS, REQUIRING PHYSICAL TRAVEL.
FURTHERMORE, AS I HAVE CONTACTED MOST AUTHORITIES IN
CANADA, THERE CERTAIN ONES I HAVE NOT TRIED THAT MAY
WORK FOR YOU.
2.
3.
4.
Monopoly on weapons.
5.
6.
planning.
http://en.wikipedia.org/wiki/Totalitarianism
OVER THE COURSE OF WEEKS IVE BEEN SENDING YOU EVIDENCE
OF THE ACTIONS OF FEDERAL GOVERNMENT THAT DICTATE THEY
EXERCISE TOTALITARIANISM
THAT THEY ARE CONTROLLING THE MEANS OF COMMUNICATION
USING A SYSTEM OF TERRORISM WHICH INSTRUMENTS SUCH AS
VIOLENCE
THAT THEY HAVE REFUSED ACTION FROM ALL THE INDIVIDUALS
THEY HAVE INSTITUTED IN ALL THE DEFENCE FORCES AND
INTERNAL SECURITY. THEY HAVE SHOWN, OVER THE COURSE OF
MONTHS, WIDESPREAD PRACTICE OF ACTING
UNCONSTITUTIONALLY.
SYSTEMATIC CORRUPTION AND INFLICTING HUMAN ABUSES,
FROM CENTRALIZED GOVERNMENT, IS WIDESPREAD PRACTICE IN
INDIA.
THEREFORE, IT IS OF TWO OPTIONS. EITHER YOU FAX THE UN US
AND CANADIAN OFFICIALS TO GET THE FAMILIES THEMSELVES,
PICK THEIR OWN HAND-SELECTED SECURITY, OR YOU SEND
FORCES TO INDIA FOR SUPPORT.
OBSTRUCTION OF JUSTICE
The crime of obstruction of justice, in United States jurisdictions, refers
to the crime of interfering with the work of police, investigators, regulatory
agencies, prosecutors, or other (usually government) officials. Common
law jurisdictions other than the United States tend to use the wider offense
of perverting the course of justice.
Generally, obstruction charges are laid when it is discovered that a person
questioned in an investigation, other than a suspect, has lied to the
investigating officers. However, in most common law jurisdictions, the right
to remain silent used to allow any person questioned by police merely to
refuse to answer questions posed by an investigator without giving any
reason for doing so. (In such a case, the investigators may subpoena the
witness to give testimony under oath in court, though the witness may then
exercise their rights, for example in the Fifth Amendment, if they believe
their answer may serve to incriminate themselves.) If the person tried to
ABETMENT
THATS CALLED ABETMENT.
107. ABETMENT of a thing.A person abets the doing of a thing,
who
(First) Instigates any person to do that thing; or
(Secondly) Engages with one or more other person or persons
in any conspiracy for the doing of that thing, if an act or illegal
omission takes place in pursuance of that conspiracy, and in
order to the doing of that thing; or
(Thirdly) Intentionally aids, by any act or illegal omission,
the doing of that thing. Explanation 1.A person who, by wilful
misrepresentation, or by wilful concealment of a material fact
which he is bound to dis-close, voluntarily causes or procures, or
attempts to cause or procure, a thing to be done, is said to
instigate the doing of that thing. Illustration A, a public officer, is
authorized by a warrant from a Court of Justice to apprehend Z.
B, knowing that fact and also that C is not Z, wilfully represents
to A that C is Z, and thereby intentionally causes A to apprehend
C. Here B abets by instigation the apprehension of C.
Explanation 2.Whoever, either prior to or at the time of the
commission of an act, does anything in order to facilitate the
commission of that act, and thereby facilitate the commission
thereof, is said to aid the doing of that act.
IF YOU DIDNT ARREST SOMEONE BECAUSE THE
PRESIDENT OR PRIME MINISTER TOLD YOU NOT TO, YOU
WILL END UP BEING CHARGED FOR CORRUPTION ON
INTERNATIONAL LAW.
THE PRESIDENT OF INDIA DOES NOT HAVE AUTHORITY