Unjustly Targeted Cleared personnel

Between Microsoft Bug Bounty encouraging bad Behavior and outright selling out there Loyal Customers to rogue 3rd party Government interest which may be linked to Bug Bounty members who do not have a legal reason to access my personal data and
Then hack my computer over and over I have no choice but to make this request to delete my OneDrive .

I reviewed my Firewall event logs and found Government IP address and found it to be a direct allocation then I called IANA and they refused to provide information about the IP and tried to refer to another allocation slot that was not correct.

The Challenge is I understand how IPv4 and IPv6 address are made and know they are not telling the truth. Also, there livelihoods are on the line if they do.

I found another source and paid for obtain the information and will email the parent organization and request the reason why for over 2 months I was targeted across to 2 different computer while changing 3 gateways and running full VPN with Encrypted DNS and Encrypted email.

did break though all locks that were placed on both computers and reset each computer 4 times toward the end was able to anticipate the type locks they were applying and defeat however they just keep coming from low mandatory to high Mandatory locks I beat then and was eventually able to reset.

However,the time cost was high. To me it appeared to be done by multiple people and from Government structure no one else has time to do this for weeks on end without taking money.

In the end moving to another operating system helped and buying a Cisco firewall however what I learned about IPv6 local link and how all ISP run the configuration anyone targeted by an agency and a determined group there system will be comprised eventually.

So in the end I lost a job but learned a lot the problem is my bills are real and my wife had health concerns that need addressed.

While putting yourself out there to learn something that’s important but it’s not paying the bills.

Apparently more is needed from all agencies and contractors however if it’s not aligned to the main mission objective even when you own home network is under attack no company is going to give you the latitude to contend and make this discoveries and if Microsoft bug bounty people are being paid upwards of 30K to submit penetration test on regular working people and it appears using government resources based on US Government IP address found in my firewall event logs.

I paid for the information and recently found the parent Government Organization and plan to email and call there abuse line and request to know why myself a 20 year Honorable Discharge veteran of the US Air Force and a cleared contractor is on the receiving end of this kind of attack and it has impacted my livelihood and the people who depend on me,

I did report to the Company FSO for the contractor I was working in the end it did not help also reported this to MSRC Microsoft cyber office being I was using windows 365 and Windows 10 operating system also other agencies no one really cared being I was not provided any other option other than to work from home at the time as I was just starting in a new position and certain items had to be completed before gaining access to work lan and due to covid restrictions much was being delayed even more.

While I discovered Microsoft has many back doors for Governmental access and by using windows 10 and 365 allows even easier access.

As I well know within the Government there are many good people and there are some that let ambition lead them blindly and are willing to cross moral lines to gain positions and status no matter who is lives are impacted.

Why dont you just name the government agency and provide the IP addresses they used?

That reminds me of my situation :laughing:
I caught them the first time a few years back, and I knew exactly the attack vector they used. They began to upload some of my data to 3 servers a mile away from Langley.
They were smarter this time around. Studying my sleeping patterns, LAN waking my computer in the wee hours when I’m sleeping. Bypassing my application firewall in very obvious ways. I just gave up this time around, since their attack vector was a lot more complex and obviously state sponsored.
I also love when they run their CI process, they are sooooo obvious and not very creative :rofl:
Call me paranoid :wink:

I appreciate the update there is an FBI training center only a 5 miles away from where I live !

I thought about that however.until I completed the complaint on the abuse line.I would not want to give them time to make up a reason to justify too many times have I seen those that do things like this an then other goverment workers help them
cover it up.

The reason for making note of it in the blog is to let others who may have this happening to to not try and handle on your own as I did and then place undo stress on there family and others. If the methods are the same as I outline and the IP is a direct allocation.

Seek the parent organization and follow the chain if they deny then move up the chain.

One of the Managers toward end mentioned FBI however, in recent years according to varies reports I have read am not entirely convinced they would even care enough to resolve effectively. If I found a foreign IP in the firewall event log then perhaps.

However, finding a government IP and with the methods used and the amount of time invested without direct monetary gain leads to very limited possibilities.

Personally, I generally prefer to go direct to the source first then up after other agencies since now
I have been given this time weather I like it or not.
I prefer that when someone has something to explain to me.

Just like all of us they answer to someone and accountability must flow up and down otherwise we become just like many countries around the world I have worked in while supporting our great country.the checks and balances the founding fathers created are not like any I have seen in many other countries.

Then I guess they know who you are and that you posted on this website. Sleep well!

*their

Characterssssssss

Maybe this is a dumb question, but if you believe that they are accessing your computer data during wee hours when you are not computing, why don’t you just turn off your WiFi connection andshut down your computer when you aren’t using it? Wouldn’t that make it harder for them to spy on you if they aren’t physically there to turn the computer on? (Isn’t that basic computer security?) If you’re leaving your computer on and connected to the WiFi, seems to me you’ve extended an open invitation to anyone capable of intercepting your data.

Perhaps,Not sure this is from my phone and run different security on it. I see most all cookies and custom block where needed.

I thought about that however.until I completed the complaint on the abuse line.I would not want to give them time to make up a reason to justify too many times have I seen those that do things like this an then other goverment workers help them
cover it up.

The reason for making note of it in the blog is to let others who may have this happening to to not try and handle on your own as I did and then place undo stress on there family and others. If the methods are the same as I outline and the IP is a direct allocation.

Seek the parent organization and follow the chain if they deny then move up the chain.

One of the Managers toward end mentioned FBI however, in recent years according to varies reports I have read am not entirely convinced they would even care enough to resolve effectively. If I found a foreign IP in the firewall event log then perhaps.

However, finding a government IP and with the methods used and the amount of time invested without direct monetary gain leads to very limited possibilities.

Personally, I generally prefer to go direct to the source first then up after other agencies since now
I have been given this time weather I like it or not.
I prefer that when someone has something to explain to me.

Just like all of us they answer to someone and accountability must flow up and down otherwise we become just like many countries around the world I have worked in while supporting our great country.the checks and balances the founding fathers created are not like any I have seen in many other countries.

Way ahead of you :laughing:
Some equipment may also be hardwired, which is kind of a pain to unplug/plug all the time.
Anyway, these are not your random hackers. So it doesn’t really matter how many roadblocks I put in their way. They’ll get in if they want to :wink:

I just cut the power to my house at night and keep my phone in the Faraday cage. They havent found me yet. Good luck op.

3 Likes

:rofl:
That why I said I gave up after a while, there’s no point :slight_smile:

To help those this may happen to. I believe the main way they gained entry was VIA IPv6 local link my firewall event logs were getting harmed with IPv6 alerts. Note the link below to reconfig to verify they are using if using windows operating system it may not help as windows does something to call up the IPv6 local link no matter what from what I understand.networking - Manually configure Link-Local IPV6 regardless of ISP - Unix & Linux Stack Exchange

To follow up with Watchurbk,
When, I was getting Hacked always disconnected my computer when not directly working on it. Also, at night shut down laptop and power off router still do the same now to included the Cisco firewall.

You have some shortcomings on your grammar skills. You are kind of making me wonder about who you really are.

2 Likes

What is the purpose of this discussion?

Perhaps, I have become to dependent on Microsoft word to correct as on my phone within the blog it does not provide any corrections.

IPv6 local link is a Hugh risk just trying to warn others. To everyone with a clearance they need
to be aware as with all government contractor there are investigators and other agencies now connected to Microsoft Teams then consider what the JEDi program allows this is clear though CVR.

Someone or group has choose to abuse there position by exercising actions against others not based on a valid legal purpose.

I have worked with and seen people choose to create undo hardship on people because of perception.

In my past have worked in place that was in Development at a remote location when I was younger and getting started and there was a small group of people for a key mission system and was working with senior person there who was in late 40s and had notice the manager had been giving him a hard way to go.

Then one day there was a system that failed prior to a big event on the exact day this senior tech was off. People working the site tried to correct the problem but could not. Then the that same senior tech came out to site to fix it on his day off when the Manager called him to ask if he knew about the issue.

On the surface sounds like something good. However, I had been working with the senior tech and discovered this problem the work the week before and on the day this event happen both he and I was off work but no one called me because I was the new guy.

I reviewed the logs when both the senior tech and I were on shift about the failure that had occurred and he become very agitated.

So I let it go that day, However, I could not completely drop it when he was not around.

I looked harder and discovered that same failure he and I had worked on he did not pass on in the log to the next shift in the log reports and upon reviewing the system details he had allowed the system up to allow this to happen right before and event the next day that was occurring on his day off so he could come in on overtime hours and solved the problem knowing it would generate hours of downtime.

It took nearly 2 weeks after incident occurred to confirm these details.

Being, I was new and dependent upon him to check off my work to become certified and he was at that time one of the most qualified trainers. It placed me in a difficult position. However, the work we were doing was serving a higher purpose and the data collected was important but not critical.

He choose to risk compromising mission data and impede mission effectiveness to gain status which I did not respect or like. At that time I did not clearly understand the avenues of reporting such an event so I told myself that I would just seek to gain knowledge and seek to take his position because I would never do something to purposely gain personal status to maintain position or advance.

As I was perusing this path, the senior tech knew I understood what he did and he became more critical of me and tried to turn the manager and others against me.

Months later the manger talked to about these slights, while I knew why this occurring too much time had past to explain and prove exactly what the senior tech had did so I had to just take it and move forward if I was to stay there.

While I did all I could as I became seasoned to ensure new people coming in would not choose to become like the senior tech.

I did notice the manager was fast to become critical of senior tech over time which was what I now believe was likely because of age related bias.

However, the Manager had often had challenges maintaining good people in this remote position and unless I was willing to commit to something long term there it would have been difficult for him to side with me even I provided details of what occurred.

After about 2 years I left however, I made a promise to myself that as I become older would not allow myself to ever compromise my moral compass no matter what undo bias I may encounter.

Because the missions I have supported are all to important to allow any unnatural delay and they serve a higher cause. I will always just seek to improve myself and gain value though what I can give and contribute even if I face unjust treatment.

However, in areas that really matter no matter what it cost me even a job if I see something that is going on no matter what influence that person has. I will do all I can to stop them from having the same impact on others.

I have can honestly say over the years I have followed up with this and at times it has came at great cost.

I have discovered many times its because people may themselves have experienced undo bias due
to ageism or other. Sometimes, hurt people will hurt others unless they content with what happen to them.

However, when all facts and details are brought into the light about a particular event, their actions were inappropriate and there are key process for a reason and at times it may allow those who are actually doing wrong to get a pass, at the same time these same processes can protect people from unjustly actions.

Contrary, to cancel cultural perception is not reality.

As in what happen to me above to the Manager and new people I appeared to be doing certain things wrong due to bias placed on me by the senior tech and this allowed him to create and try and only train people that may be willing to make the same comprises he would.

The culture was corrupted as the manager appeared overly biased against the senior tech and he choose to try and control though training and comprising mission systems to do what he did.

The details always matter and on conclusions, I generally apply the test of 3 to matters of ambiguity.
As I have learned though principles of science.

In the end the reason for explaining all this is because someone or group within access to government resources made a decision to exercise there own values based upon assumptions that compromise mission effectiveness by hacking my computer right at the exact time I started in processing for a position of importance for nearly 2 months without end this caused a loss in mission productivity and damage to myself and those who depend on me.

If they are allowed to continue they will become more embolden just as the senior tech did while he had valid driving factors just as whatever goverment agency who did this to me may have the impact created has a far larger circle and cannot be allowed to continue.

The bot runs on coffee and AI?

Perhaps, I have become to dependent on Microsoft word to correct as on my phone within the blog it does not provide any corrections.

IPv6 local link is a Hugh risk just trying to warn others. To everyone with a clearance they need
to be aware as with all government contractor there are investigators and other agencies now connected to Microsoft Teams then consider what the JEDi program allows this is clear though CVR.

Someone or group has choose to abuse there position by exercising actions against others not based on a valid legal purpose.

I have worked with and seen people choose to create undo hardship on people because of perception.

In my past have worked in place that was in Development at a remote location when I was younger and getting started and there was a small group of people for a key mission system and was working with senior person there who was in late 40s and had notice the manager had been giving him a hard way to go.

Then one day there was a system that failed prior to a big event on the exact day this senior tech was off. People working the site tried to correct the problem but could not. Then the that same senior tech came out to site to fix it on his day off when the Manager called him to ask if he knew about the issue.

On the surface sounds like something good. However, I had been working with the senior tech and discovered this problem the work the week before and on the day this event happen both he and I was off work but no one called me because I was the new guy.

I reviewed the logs when both the senior tech and I were on shift about the failure that had occurred and he become very agitated.

So I let it go that day, However, I could not completely drop it when he was not around.

I looked harder and discovered that same failure he and I had worked on he did not pass on in the log to the next shift in the log reports and upon reviewing the system details he had allowed the system up to allow this to happen right before and event the next day that was occurring on his day off so he could come in on overtime hours and solved the problem knowing it would generate hours of downtime.

It took nearly 2 weeks after incident occurred to confirm these details.

Being, I was new and dependent upon him to check off my work to become certified and he was at that time one of the most qualified trainers. It placed me in a difficult position. However, the work we were doing was serving a higher purpose and the data collected was important but not critical.

He choose to risk compromising mission data and impede mission effectiveness to gain status which I did not respect or like. At that time I did not clearly understand the avenues of reporting such an event so I told myself that I would just seek to gain knowledge and seek to take his position because I would never do something to purposely gain personal status to maintain position or advance.

As I was perusing this path, the senior tech knew I understood what he did and he became more critical of me and tried to turn the manager and others against me.

Months later the manger talked to about these slights, while I knew why this occurring too much time had past to explain and prove exactly what the senior tech had did so I had to just take it and move forward if I was to stay there.

While I did all I could as I became seasoned to ensure new people coming in would not choose to become like the senior tech.

I did notice the manager was fast to become critical of senior tech over time which was what I now believe was likely because of age related bias.

However, the Manager had often had challenges maintaining good people in this remote position and unless I was willing to commit to something long term there it would have been difficult for him to side with me even I provided details of what occurred.

After about 2 years I left however, I made a promise to myself that as I become older would not allow myself to ever compromise my moral compass no matter what undo bias I may encounter.

Because the missions I have supported are all to important to allow any unnatural delay and they serve a higher cause. I will always just seek to improve myself and gain value though what I can give and contribute even if I face unjust treatment.

However, in areas that really matter no matter what it cost me even a job if I see something that is going on no matter what influence that person has. I will do all I can to stop them from having the same impact on others.

I have can honestly say over the years I have followed up with this and at times it has came at great cost.

I have discovered many times its because people may themselves have experienced undo bias due
to ageism or other. Sometimes, hurt people will hurt others unless they content with what happen to them.

However, when all facts and details are brought into the light about a particular event, their actions were inappropriate and there are key process for a reason and at times it may allow those who are actually doing wrong to get a pass, at the same time these same processes can protect people from unjustly actions.

Contrary, to cancel cultural perception is not reality.

As in what happen to me above to the Manager and new people I appeared to be doing certain things wrong due to bias placed on me by the senior tech and this allowed him to create and try and only train people that may be willing to make the same comprises he would.

The culture was corrupted as the manager appeared overly biased against the senior tech and he choose to try and control though training and comprising mission systems to do what he did.

The details always matter and on conclusions, I generally apply the test of 3 to matters of ambiguity.
As I have learned though principles of science.

In the end the reason for explaining all this is because someone or group within access to government resources made a decision to exercise there own values based upon assumptions that compromise mission effectiveness by hacking my computer right at the exact time I started in processing for a position of importance for nearly 2 months without end this caused a loss in mission productivity and damage to myself and those who depend on me.

If they are allowed to continue they will become more embolden just as the senior tech did while he had valid driving factors just as whatever goverment agency who did this to me may have the impact created has a far larger circle and cannot be allowed to continue.