Real Time Hacks or SPY Agency Dirty Tricks

Real Time Hacks or SPY Agency Dirty Tricks

 New Topic, MY Blog PAGES ARE BEING HACKED

Real Time Hacks may seem like an error. Look twice

First, I want to show the type of CIA/NSA dirty tricks played on activist websites.  I will use mine as an example.  Other activists may get some Ideas for combatting these dirty tricks from what I show.  The first dirty trick I want to show is a real time hack that keeps blog readers from looking at more than just the first page of results on my site.  It goes like this:  You can go to a catagory like BLOG or Activism and results will show for that page or catagory, but if you click on NEXT or any other page you will get an error to to a real time hack of the website produced URL>>  http://jameslico.com/TI=HT%2Fbioethics%2F/page/2/.  This URL produces the following error because it was made incorrectly on purpose.  The correct URL is : http://jameslico.com/TI=HT/bioethics/page/2/ so you can get to the other pages by correcting the URL.  I know it looks like a coding error and that parenthesis were not translated properly.  It is supposed to look like that, an error that is,  This is so that the user will give up looking.  As for the website owner,  They are supposed to wast time troubleshooting it and it is intermittent too!  But there is no need to do that because it is a hack which my handler can remove as quickly as it was put there.   I checked again on 12/29/2016 and the hack is not in effect.   On my website, try searching for the word torture which appears frequently.  There should be multiple pages so if you follow the search to page 2 of the displayed results you may get the error.  This error has been in effect more than not.  But by telling people about it, I bet they will leave my blog alone and screw with someone else.  These errors work best when the user doesn’t suspect what is going on.

First you need to find the hacking capabilities of the spy agencies.  I found this information about just the NSA, but they all have hacking capabilities.  The full force of the spy agencies are brought to bear on the Targeted Individual.  You will be isolated and called the TARGET by them and you are a non person to them.  You are their job and they are very competative which you must remember.  Sometimes you may want to let them win small battles so you can keep fighting.

NSA FOXACID servers used to drive the hack into target systems

NSA FOXACID servers used to drive the hack into target systems

http://securityaffairs.co/wordpress/18601/hacking/nsa-foxacid-servers.html

I am using actual direct links on purpose here because links can and do get screwed up.  Its most obvious if the URL’s are direct  links and are in plain words.  This doesnt look professional but I dont worry about it as long as my intent gets through.

Democrats Have Been Given FOX ACID Software from the NSA to spy on Trump Supporters! 4 chan, 8 Chan, REDDIT & Twitter Targeted for spying  https://www.superstation95.com/index.php/world/2151.  What the hell is this, can spy agencies give their hacking power over to civilians or maybe they are not just civilians.  Maybe they are the ones who were supposed to win.  Is it a last ditch effort to subvert the will of the people by the NSA?

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID  https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html

 

Jacob Appelbaum: NSA’s FOXACID/QUANTUM Programs “Like the Military Occupation of Entire Internet”

 

Another hack I found is the >> “Error 404 – Not Found”

The document you are looking for may have been removed or re-named. Please contact the web site owner for further assistance.

It is the WordPress Theme’s job to produce the URL and basic navigational capability.  I have a Bachelors in Computer Science which allows me to notice that an apparent computer error may not be an error at all.  I cant fix this myself because it is a hack and my internet is basically a man in the middle attack or maybe man on the side.  By this I mean that my internet connection is going through a proxy server where the content can be easily changed (hacked).   once you notice the problem you can do something.   They usually back off if you can pay someone to fix it.   By the way, I have tried four different themes and get the same results.  Although it comes and goes.  Now when I make a bug request to the Theme owner, the problem has gone away in the past before I actually put in the request.  Miraculously it was fixed after I got the letter written to the Theme designer.  Now I will do that again, but will email the Theme designer and will attempt to pay him/her.   It may go away before the theme designer actually works on it but I will insist they take the  money because then I can go back again and again until it is fixed right.  But again, this will not be necessary because it the problem usually goes away by it self at that point.  Do you see what I mean?  As long as I am paying a vendor for a service then that hack will go away as if by magic.

One more example of an ERROR is inserting an error about an unrelated issue, assuming the user will just accept it and go away. 

Here is another hack I have had trouble with.  The problem is that when I post to Facebook or twitter, the images in the post wont show because they are pre-empted by some garbaWebsiteURLhack-2015-05-29_21-26-39ge about Google translate.  The thing is that I have eliminated everything google by actually deleting all of the google functions so there are no more PLUGINS or WIDGETS related to google.  Yet, the google translate garbage still comes in.  I have even put a block on the translate.GOOGLE.com sub domain and yet the error is still there.  So, I bet I can make the error go away by paying the theme vendor or another web site vendor to fix it.  He will probably tell me that it went away by itself, and I will just insist that he take the money anyway as if he did the work, so that I can go back to them in the future should it reoccur.   Yet then it will probably stay fixed.    The field is still wide open because there are a million hacks/dirty tricks they can do.  Thanks for reading this.

I am leery of google translate because it can be used as a hacking tool.  it can present to the blob writer his own content.  But it can be taylored to present the spy agencies meaning to the blog reader which the blog writer may never know about.  What do you think?

 

 

 

 

One more hack is that a reader will will search for and find an article by you and want to tead it.  But when they click on the link they are shown a scary diversionary page which tells them ATTENTION AND WAIT A MINUTE.  Do you know this page you are trying to connect to?  THIS PAGE LOOKS DANGEROUS.  PLEASE GO BACK.  Then you can proceed if you know enough to click on the ADVANCED buton and then click on Proceed to site (Not Recomended).   This is not the same as a picture but you get the idea and maybe you have seen examples of this.  It happens a lot.  Do you wonder who decides if the website is dangerous.  That is a good question.  Is it spy ware detection or is it a spy agency who want you not to see it just because.  Again, this has for me been a transient real time hack.  The internet is a place where smart programmers can divert you and make it look real by presenting a counterfeit facade to fool you.   All I can say is be careful and keep your eyes and mind open to new possibilities.

 

%d bloggers like this:
Skip to toolbar