Unjustly Targeted Cleared personnel

I thought about that however.until I completed the complaint on the abuse line.I would not want to give them time to make up a reason to justify too many times have I seen those that do things like this an then other goverment workers help them
cover it up.

The reason for making note of it in the blog is to let others who may have this happening to to not try and handle on your own as I did and then place undo stress on there family and others. If the methods are the same as I outline and the IP is a direct allocation.

Seek the parent organization and follow the chain if they deny then move up the chain.

One of the Managers toward end mentioned FBI however, in recent years according to varies reports I have read am not entirely convinced they would even care enough to resolve effectively. If I found a foreign IP in the firewall event log then perhaps.

However, finding a government IP and with the methods used and the amount of time invested without direct monetary gain leads to very limited possibilities.

Personally, I generally prefer to go direct to the source first then up after other agencies since now
I have been given this time weather I like it or not.
I prefer that when someone has something to explain to me.

Just like all of us they answer to someone and accountability must flow up and down otherwise we become just like many countries around the world I have worked in while supporting our great country.the checks and balances the founding fathers created are not like any I have seen in many other countries.

Then I guess they know who you are and that you posted on this website. Sleep well!

*their

Characterssssssss

Maybe this is a dumb question, but if you believe that they are accessing your computer data during wee hours when you are not computing, why don’t you just turn off your WiFi connection andshut down your computer when you aren’t using it? Wouldn’t that make it harder for them to spy on you if they aren’t physically there to turn the computer on? (Isn’t that basic computer security?) If you’re leaving your computer on and connected to the WiFi, seems to me you’ve extended an open invitation to anyone capable of intercepting your data.

Perhaps,Not sure this is from my phone and run different security on it. I see most all cookies and custom block where needed.

I thought about that however.until I completed the complaint on the abuse line.I would not want to give them time to make up a reason to justify too many times have I seen those that do things like this an then other goverment workers help them
cover it up.

The reason for making note of it in the blog is to let others who may have this happening to to not try and handle on your own as I did and then place undo stress on there family and others. If the methods are the same as I outline and the IP is a direct allocation.

Seek the parent organization and follow the chain if they deny then move up the chain.

One of the Managers toward end mentioned FBI however, in recent years according to varies reports I have read am not entirely convinced they would even care enough to resolve effectively. If I found a foreign IP in the firewall event log then perhaps.

However, finding a government IP and with the methods used and the amount of time invested without direct monetary gain leads to very limited possibilities.

Personally, I generally prefer to go direct to the source first then up after other agencies since now
I have been given this time weather I like it or not.
I prefer that when someone has something to explain to me.

Just like all of us they answer to someone and accountability must flow up and down otherwise we become just like many countries around the world I have worked in while supporting our great country.the checks and balances the founding fathers created are not like any I have seen in many other countries.

Way ahead of you :laughing:
Some equipment may also be hardwired, which is kind of a pain to unplug/plug all the time.
Anyway, these are not your random hackers. So it doesn’t really matter how many roadblocks I put in their way. They’ll get in if they want to :wink:

I just cut the power to my house at night and keep my phone in the Faraday cage. They havent found me yet. Good luck op.

3 Likes

:rofl:
That why I said I gave up after a while, there’s no point :slight_smile:

To help those this may happen to. I believe the main way they gained entry was VIA IPv6 local link my firewall event logs were getting harmed with IPv6 alerts. Note the link below to reconfig to verify they are using if using windows operating system it may not help as windows does something to call up the IPv6 local link no matter what from what I understand.networking - Manually configure Link-Local IPV6 regardless of ISP - Unix & Linux Stack Exchange

To follow up with Watchurbk,
When, I was getting Hacked always disconnected my computer when not directly working on it. Also, at night shut down laptop and power off router still do the same now to included the Cisco firewall.

You have some shortcomings on your grammar skills. You are kind of making me wonder about who you really are.

2 Likes

What is the purpose of this discussion?

Perhaps, I have become to dependent on Microsoft word to correct as on my phone within the blog it does not provide any corrections.

IPv6 local link is a Hugh risk just trying to warn others. To everyone with a clearance they need
to be aware as with all government contractor there are investigators and other agencies now connected to Microsoft Teams then consider what the JEDi program allows this is clear though CVR.

Someone or group has choose to abuse there position by exercising actions against others not based on a valid legal purpose.

I have worked with and seen people choose to create undo hardship on people because of perception.

In my past have worked in place that was in Development at a remote location when I was younger and getting started and there was a small group of people for a key mission system and was working with senior person there who was in late 40s and had notice the manager had been giving him a hard way to go.

Then one day there was a system that failed prior to a big event on the exact day this senior tech was off. People working the site tried to correct the problem but could not. Then the that same senior tech came out to site to fix it on his day off when the Manager called him to ask if he knew about the issue.

On the surface sounds like something good. However, I had been working with the senior tech and discovered this problem the work the week before and on the day this event happen both he and I was off work but no one called me because I was the new guy.

I reviewed the logs when both the senior tech and I were on shift about the failure that had occurred and he become very agitated.

So I let it go that day, However, I could not completely drop it when he was not around.

I looked harder and discovered that same failure he and I had worked on he did not pass on in the log to the next shift in the log reports and upon reviewing the system details he had allowed the system up to allow this to happen right before and event the next day that was occurring on his day off so he could come in on overtime hours and solved the problem knowing it would generate hours of downtime.

It took nearly 2 weeks after incident occurred to confirm these details.

Being, I was new and dependent upon him to check off my work to become certified and he was at that time one of the most qualified trainers. It placed me in a difficult position. However, the work we were doing was serving a higher purpose and the data collected was important but not critical.

He choose to risk compromising mission data and impede mission effectiveness to gain status which I did not respect or like. At that time I did not clearly understand the avenues of reporting such an event so I told myself that I would just seek to gain knowledge and seek to take his position because I would never do something to purposely gain personal status to maintain position or advance.

As I was perusing this path, the senior tech knew I understood what he did and he became more critical of me and tried to turn the manager and others against me.

Months later the manger talked to about these slights, while I knew why this occurring too much time had past to explain and prove exactly what the senior tech had did so I had to just take it and move forward if I was to stay there.

While I did all I could as I became seasoned to ensure new people coming in would not choose to become like the senior tech.

I did notice the manager was fast to become critical of senior tech over time which was what I now believe was likely because of age related bias.

However, the Manager had often had challenges maintaining good people in this remote position and unless I was willing to commit to something long term there it would have been difficult for him to side with me even I provided details of what occurred.

After about 2 years I left however, I made a promise to myself that as I become older would not allow myself to ever compromise my moral compass no matter what undo bias I may encounter.

Because the missions I have supported are all to important to allow any unnatural delay and they serve a higher cause. I will always just seek to improve myself and gain value though what I can give and contribute even if I face unjust treatment.

However, in areas that really matter no matter what it cost me even a job if I see something that is going on no matter what influence that person has. I will do all I can to stop them from having the same impact on others.

I have can honestly say over the years I have followed up with this and at times it has came at great cost.

I have discovered many times its because people may themselves have experienced undo bias due
to ageism or other. Sometimes, hurt people will hurt others unless they content with what happen to them.

However, when all facts and details are brought into the light about a particular event, their actions were inappropriate and there are key process for a reason and at times it may allow those who are actually doing wrong to get a pass, at the same time these same processes can protect people from unjustly actions.

Contrary, to cancel cultural perception is not reality.

As in what happen to me above to the Manager and new people I appeared to be doing certain things wrong due to bias placed on me by the senior tech and this allowed him to create and try and only train people that may be willing to make the same comprises he would.

The culture was corrupted as the manager appeared overly biased against the senior tech and he choose to try and control though training and comprising mission systems to do what he did.

The details always matter and on conclusions, I generally apply the test of 3 to matters of ambiguity.
As I have learned though principles of science.

In the end the reason for explaining all this is because someone or group within access to government resources made a decision to exercise there own values based upon assumptions that compromise mission effectiveness by hacking my computer right at the exact time I started in processing for a position of importance for nearly 2 months without end this caused a loss in mission productivity and damage to myself and those who depend on me.

If they are allowed to continue they will become more embolden just as the senior tech did while he had valid driving factors just as whatever goverment agency who did this to me may have the impact created has a far larger circle and cannot be allowed to continue.

The bot runs on coffee and AI?

Perhaps, I have become to dependent on Microsoft word to correct as on my phone within the blog it does not provide any corrections.

IPv6 local link is a Hugh risk just trying to warn others. To everyone with a clearance they need
to be aware as with all government contractor there are investigators and other agencies now connected to Microsoft Teams then consider what the JEDi program allows this is clear though CVR.

Someone or group has choose to abuse there position by exercising actions against others not based on a valid legal purpose.

I have worked with and seen people choose to create undo hardship on people because of perception.

In my past have worked in place that was in Development at a remote location when I was younger and getting started and there was a small group of people for a key mission system and was working with senior person there who was in late 40s and had notice the manager had been giving him a hard way to go.

Then one day there was a system that failed prior to a big event on the exact day this senior tech was off. People working the site tried to correct the problem but could not. Then the that same senior tech came out to site to fix it on his day off when the Manager called him to ask if he knew about the issue.

On the surface sounds like something good. However, I had been working with the senior tech and discovered this problem the work the week before and on the day this event happen both he and I was off work but no one called me because I was the new guy.

I reviewed the logs when both the senior tech and I were on shift about the failure that had occurred and he become very agitated.

So I let it go that day, However, I could not completely drop it when he was not around.

I looked harder and discovered that same failure he and I had worked on he did not pass on in the log to the next shift in the log reports and upon reviewing the system details he had allowed the system up to allow this to happen right before and event the next day that was occurring on his day off so he could come in on overtime hours and solved the problem knowing it would generate hours of downtime.

It took nearly 2 weeks after incident occurred to confirm these details.

Being, I was new and dependent upon him to check off my work to become certified and he was at that time one of the most qualified trainers. It placed me in a difficult position. However, the work we were doing was serving a higher purpose and the data collected was important but not critical.

He choose to risk compromising mission data and impede mission effectiveness to gain status which I did not respect or like. At that time I did not clearly understand the avenues of reporting such an event so I told myself that I would just seek to gain knowledge and seek to take his position because I would never do something to purposely gain personal status to maintain position or advance.

As I was perusing this path, the senior tech knew I understood what he did and he became more critical of me and tried to turn the manager and others against me.

Months later the manger talked to about these slights, while I knew why this occurring too much time had past to explain and prove exactly what the senior tech had did so I had to just take it and move forward if I was to stay there.

While I did all I could as I became seasoned to ensure new people coming in would not choose to become like the senior tech.

I did notice the manager was fast to become critical of senior tech over time which was what I now believe was likely because of age related bias.

However, the Manager had often had challenges maintaining good people in this remote position and unless I was willing to commit to something long term there it would have been difficult for him to side with me even I provided details of what occurred.

After about 2 years I left however, I made a promise to myself that as I become older would not allow myself to ever compromise my moral compass no matter what undo bias I may encounter.

Because the missions I have supported are all to important to allow any unnatural delay and they serve a higher cause. I will always just seek to improve myself and gain value though what I can give and contribute even if I face unjust treatment.

However, in areas that really matter no matter what it cost me even a job if I see something that is going on no matter what influence that person has. I will do all I can to stop them from having the same impact on others.

I have can honestly say over the years I have followed up with this and at times it has came at great cost.

I have discovered many times its because people may themselves have experienced undo bias due
to ageism or other. Sometimes, hurt people will hurt others unless they content with what happen to them.

However, when all facts and details are brought into the light about a particular event, their actions were inappropriate and there are key process for a reason and at times it may allow those who are actually doing wrong to get a pass, at the same time these same processes can protect people from unjustly actions.

Contrary, to cancel cultural perception is not reality.

As in what happen to me above to the Manager and new people I appeared to be doing certain things wrong due to bias placed on me by the senior tech and this allowed him to create and try and only train people that may be willing to make the same comprises he would.

The culture was corrupted as the manager appeared overly biased against the senior tech and he choose to try and control though training and comprising mission systems to do what he did.

The details always matter and on conclusions, I generally apply the test of 3 to matters of ambiguity.
As I have learned though principles of science.

In the end the reason for explaining all this is because someone or group within access to government resources made a decision to exercise there own values based upon assumptions that compromise mission effectiveness by hacking my computer right at the exact time I started in processing for a position of importance for nearly 2 months without end this caused a loss in mission productivity and damage to myself and those who depend on me.

If they are allowed to continue they will become more embolden just as the senior tech did while he had valid driving factors just as whatever goverment agency who did this to me may have the impact created has a far larger circle and cannot be allowed to continue.

It is quite possible and even almost guaranteed that if you are being hacked the hackers are using IP spoofing to hide their true IP addresses and so the agency you think is guilty very likely isn’t the one hacking you.

my goodness I cant believe I just read some of this stuff…you guys need a girlfriend.

It’s possible , They would likely have to be former gov or a contractor with access to the IP addresses to know exactly and keep active. The number is a restricted generic top-level domains (grTLD) distinguished within the 3 groups of top-level domains.

While I was logged in the router I used trace route and ping from within the router at that time and it came back with information and a the kind of time delay would expect based on there likely location not entirely linked to parent organizational address. I have read they are supposed to be using extensions that will misdirect it appears this has not happen yet.

The IPv6 address consists of 128 binary bits. There was another which one which after looking at was the spoof one leading back to the UK verified and confirmed with RIPE network there is history with that one being used in that manner.

There methodology followed a pattern of locks that started with low mandatory to high mandatory to prevent resetting the device for which I broke though.

Also, They had back door access though Microsoft operating system coupled with IPv6 local link and finally toward the end e-sim for mobile connect.

The IP traces back to parent organization for what appears to linked to a DOD organization possible a investigator and or a DHS personnel who share the same parent organization not sure how that happens. Perhaps, a combined effort. Either way it caused a waste of contractor resources for an important mission and place my livelihood and those that depend on me at risk without a just cause.

While my computer setup is currently secure taking windows operating system out of the equation helped a lot. Still, I have called Apple about my phone carrier about items being enabled on the phone in iCloud that I always keep disabled and WIFI calling is doing the same even today.

I have a newer iPhone and in the last 4 months have seen Game Center and WIFI calling within the cellular setting come on then to allow calls on other devices in iCloud at least 20 times and called apple at least 6 times to request assistance.

Today, I disabled all location services and that appears to have stopped that from occurring above from occurring

It appears to me that the cloud-flare platform that apple partners with provides a SSL connection remotely, and is compromised though known issues they want if accounts get created and logged into for Game Center that I have never used and according to apple I cannot delete Game Center.

I may have to check out Linux phones or start using a spare phone with call forwarding.