DUSTYGRAVES Dusty Graves dustygraves.com dustygraves.com DUSTYGRAVES.COM robin dusty graves ROBIN DUSTY GRAVES robindustygraves ROBINDUSTYGRAVES robindustygraves.com robindustygraves.com ROBINDUSTYGRAVES.COM robin@dustygraves.com ROBIN@DUSTYGRAVES.COM kidbots.com  kidbots.com KIDBOTS.COM ROBINDUSTYGRAVES@KIDBOTS.COM robindustygraves@kidbots.com GRAVITATIONALRESEARCH GRAVITATIONAL RESEARCH gravitationalresearch gravitational research GRAVITATIONALRESEARCH.COM gravitationalresearch.com  gravitationalresearch.com





VANCOUVER_THIEVES


After travelling across Canada over the last 1/2 CENTURY, I have lived in many, many, places.
From Fredricton on the East Fishing coast, through Montreal, Ottawa, North Bay, Pembroke,
Deep River, Chalk River, Barrie, Mississauga, all over the Toronto area, Niagara Falls, Hamilton,
Ripley, Southampton, Meaford, Sydenham, Kingston, Gananoque, London, Byron, Kitchener,
Waterloo, Guelph, Calgary, Edmonton, Brooks, Renier, Provost, Beaverlodge, Princeton,
Ashcroft, and all around the Abbotsford/ Vancouver corridor, etc. etc., not to mention areas in
United States around Los Angeles and New York... I can compare regional differences, and the
differences in each area as they CHANGE with years and economic fortune.
Half a Century of observation allows a perspective that carries a substantial amount of validity and
weight. My "opinion", though, is just that, an "opinion", and as Clint Eastwood said in a Dirty Harry
movie, "Opinions are like a**holes", so that everyone has their own, and this one, is just "mine".

Since I started coming out to Vancouver in 1978, I have seen many changes. One of the
most prevalent changes has been the escalation of CRIME, in the Vancouver area. I have
relatives here, and friends, and "observe" behavioural patterns in Vancouver, that place it
very high on the list of Canadian cities that has a growing issue with Security and personal
safety.

If I wrote an article, entitled
"WARNING - Safety and Security Issues You Should Be Aware Of"
no one would bother to read it. Everyone I know is overloaded with TV, Radio,
Newspapers, and Internet eMail, Facebook, etc. and they just do not have the TIME or
the patience to deliberately seek out any more information ! Can't blame them. I deliberately
dropped FACEBOOK, since it quickly grew into a massive deluge of Posts, Walls, friends-of
friends-of-friends, and I made the mistake of giving Facebook my real email, which quickly
became so overloaded with "So-And-So has invited you to join "save the whales" or "save the
rain forest" " or whatever, that I could not even FIND my email...

If anyone "wants" my opinion, it is sitting here. Otherwise, they can just ignore it, and do something
important like watch the Hockey game, or watch a Movie star get married, or watch cartoons, etc.
If you really want entertainment with cartoons, and CGI, and Animation, watch FOX NEWS.

http://www.youtube.com/watch?v=M5-xcvv_fRQ Youtube video,
LINK HERE

This page is started March 03, 2012, just before the END of the WORLD, as media and hype over the
end of the MAYAN CALENDAR would predict, for example, in the movie "2012" which is said
to occur starting in December, 2012, around the 22nd to 24rth, just in time for Christmas!
I will be composing this over the next week or so as I pack, in preparation to move, since my lease
ends, March, 31st, at midnight, just in time for the Government of Canada's Fiscal Year beginning-
April 1st (April FOOL'S DAY ) appropriately!.











Hilarious copies of my door Lock that appeared within a year of my design...
These pictures are from 2 companies in CHINA offering various versions of
my early prototypes - complete with the design FLAWS that should have been
fixed. I would not advise purchasing these! I have identified 6 CHINESE companies
using my new lock designs. None of them encorporate the ENTIRE lock, with
all the features, used all at once. Since I never finished the lock system, all the
copies are 'defective'! (As are the two shown above...) Since I am the one who
originally designed the lock systems, I am very well aware of the problems and
defects...



You do not have to be a locksmith to see that this otherwise "ordinary"
North American key blank, has some very unusual features. This is
for my crude, early prototype lock that has Electronics in it, and uses LIGHT
as one of the security features. There is a long , funny story, that I hope to
have time to document, that goes along with this...! If you know a friend
who is a locksmith, have them look at this key and try to guess what is
happening! A good locksmith will see this, not as a 'key', but as a puzzle, that
needs to be solved. My new keys are substantially more advanced, and
complex, but this gives you a rough idea... Even so, I have never yet, made
an entire, complete key.
How does a thief defeat a key / lock system like the one above? -- Simple,
go in through a window, or remove the door entirely, and replace it with another
one! Who would expect the entire window or door to have been replaced!
Gotta watch very closely for this kind of magic act! Once on the "inside" they
can diss-assemble the locking mechansim, and reverse engineer it, and put it
back ( incorrectly) so that it is easy to 'walk in' on the next "visit" !







DATONG Road, Shanghai, China. A Government Hacker Building, one of dozens
identified, with Internet I.P. addresses linked to computer hacker attacks on companies
in United States. The Reporter taking this picture was DETAINED and questioned by
Chinese authorities! (It is obviously just an 'ordinary' office building... yeah, right! -
under 24 hour government security surveillance! )









BELOW: one of hundreds of CELL PHONE spy programs, available. You can now
install these from remote locations, without the USER hearing or seeing anything,
and turn ON the cell phone, even if it is off, and use the microphone to listen, live,
from any computer in the world. The lights, and speaker on the spy phone remain
"OFF" so the victim has no indication that the phone is "ON" and active... the only
indication that a victim would have, would be a "short" battery life. CONTACT lists,
EMAIL, Incomming and Outgoing call lists, Memos, Calendars, everything, is
accessible from any computer in the world.

 

World Tracker turns anyone into a cellphone spy

by Marc Perton, posted Jan 20th 2006 at 3:10PM

Forget those piddly wiretaps. The next frontier in warrant-free surveillance is upon us, and it's open to everyone. A UK service called World Tracker apparently uses cell tower data (or GPS, when available) to track the location of just about any GSM cellphone. Just enter the number you want to track into the service's handy Google Maps-based interface, and you'll be able to zoom in on the device's location, with accuracy somewhere between 50 and 500 meters. The first time you try to track a phone, a text message is sent to the owner, who must reply in order to enable tracking (we'll leave it to you to figure out how to work around this if you need to track a spouse, kid or employee). The service is currently compatible with O2, Vodafone, Orange and T-Mobile in the UK, and has plans to expand to other markets including Germany, Spain, Norway and the US. If, that is, privacy advocates don't shut it down first.




 

TECH REPUBLIC ARTICLE RECENTLY :

IT Security

Understanding what motivates Chinese hackers


-
By Michael Kassner


April 22, 2013, 10:16 AM PDT
Takeaway: Michael P. Kassner, with the help of a noted academic and author, looks at what
motivates Chinese hackers. It may not be what you think.
With the number of Chinese citizens reaching 20% of the world' s population, they' re going to have
an impact in any endeavor they take on. Consider the Internet - China has more users than any
country in the world, nearly twice the number as the United States (courtesy of
internetworldstats.com).

Another area where the Chinese are exerting influence is the ability to manipulate the Internet. As
proof, consider the NSA-originated competition TopCoder Open:
TopCoder Open is a world-wide programming and designing tournament open to all TopCoder
members 18 and older who meet the eligibility criteria. There are six competition tracks:
Algorithm, Design, Development, Marathon, Mod Dash, and Studio Design.
In past years, the Chinese have crushed the opponents, some say by sheer number of entries,
but I doubt that' s the only reason. In 2009, China had 20 finalists: the United States had two.
Last year, 2012, China fielded two finalists, the United States : none.
Where' s this going?
Anyone the least bit interested in ' things cyber' understands why the relationship between China
and the United States is tense, so no sense wasting electrons venturing down that media-saturated
path. I prefer to take some advice from a very astute gentleman I knew, my grandfather, never
forgetting his gentle reminder, Things always go better when you know, really know, the other
person's story.'
To that end, I hooked up with Professor Nir Kshetri from the University of North Carolina.
He' s been helping me understand something overlooked by mainstream media ' cultural differences.
I first became familiar with Nir' s work through his book, Cybercrime and Cybersecurity in the
Global South. I learned rather quickly I needed help comprehending the complex cultural
implications. With a deadline bearing down on me, I shamelessly barged into Nir' s life

Note: Before we take a look at what I learned, I thought I had better address the controversy
surrounding the term hacker. Nir and other experts use hacker throughout their papers. So, to
keep things simple, let' s continue using hacker, associating the term hacker with highly skilled
individuals who break into computer systems and networks.
Definition of Internet
Right from the start there is a dramatic difference of opinion regarding what the Internet and its
governance mean to China and the United States. The Chinese government according to Nir:
[E]mphasizes the importance of creating and promoting a healthy and harmonious internet
environment. It is important to elaborate this point. A healthy cyberspace is ' porn-free,' ' crime-
free,' and ' harmonious,' meaning it does not threaten to destabilize the state' s social and political
order.
How does that compare to your version of the Internet?
Information security versus cybersecurity
This next difference is complicated, I' m not sure if I get it, even with Nir' s help. But, I thought
I' d toss it out, and see where it lands. China and its allies have a different view of cyberspace
governance than the United States and its allies. China is more concerned about ' information
security' and the United States prefers to focus on cybersecurity. Nir offers an explanation:
They (China) like to control information that is likely to provoke what they call the three evils
(terrorism, extremism, separatism). They also consider it important to prevent other nations
from using their technologies to disrupt economic, social, and political stability.
All I know is if two powerful countries are looking at something like cyberspace governance
that differently, it' s time to talk.
Strong government
It may not be what you or I are used to, but Nir points out the Chinese are tolerant of a strong
state government; especially the post-Tiananmen generation, having experienced little or no
hardship during their lives. Nir adds:
[T]he state has adapted a body of complex scholarship to bolster its legitimacy through invoking
a deep sense of Chineseness among citizens. China' s strong nationalism is arguably related to
ethnicity and race rather than universalistic ideals (e.g., democracy, rule of law, free marketplace)
and institutions. Opposition to the West has become a defining value.
Another divergent viewpoint is, in this case, what constitutes a national government.
Chinese hackers and nationalism
Most hackers are of the post-Tiananmen generation, and have a high degree of patriotism. I
remember reading on more than one occasion where Chinese hackers have left messages
stating they were willing to devote their skills, even their lives to China. Nir agrees:
When Chinese hackers see the honor of their motherland is compromised, they consider it
important to take necessary actions to restore China' s honor, glory, and integrity. They also
consider it their responsibility to fight what they see as imperialism in cyberspace.
Whether you agree or not, Chinese hackers see no wrong in what they are doing; they' re being
patriotic.
Chinese hackers are rock stars
Most people view hackers in a negative context. That is not the case in China. As Nir points
out, Chinese hackers are revered in a fashion similar to rock stars:
[S]tartling is the fact that some young Chinese tend to treat hackers like rock stars, and a
significant proportion of students identify them as positive role models, wishing to emulate them.
According to a 2005 Shanghai Academy of Social Sciences survey 43 percent of elementary
school students said they adore China' s hackers, and one third said they would like to be one.
It would be interesting to see the results a similar survey taken in the United States.
Making headway against cybercrime
From what I' ve read, there appears to be a huge chasm between what the United States thinks,
and China thinks about their eliminating cybercrime within China, and cracking down on global
hacking. According to Nir, here' s what the Chinese think:
Chinese officials argue they should be praised, not criticized, for taking measures to control
cybercrimes at home and collaborate internationally.
Nir cited a few examples of why they feel that way. In 2009, China added computer crimes to its
Criminal Law. The penalty for hacking is a seven-year prison sentence. Next, Nir referred to a
China.org.cn article that mentioned:
[T]he country' s police have destroyed more than 80 criminal gangs involved in computer hacking,
the online theft of data, and running botnets to spread malicious software.
One similarity at least People have mentioned, with more than a little sarcasm that my home
state of Minnesota is the only state to have been governed by an All-Star professional wrestler.
That is true, and I' m thankful for one special piece of wisdom passed on by
Mr. Jesse Ventura: If you want to know what' s going on, follow the money.
If China and the United States have one thing in common about the Internet, it is the quest for
money. Nir told me about two examples where the Chinese government has decided not to
enforce certain regulations as they would create a financial burden.
The Green Dam Youth Escort program had several flaws, but the one that appeared to put a
stop to loading the Web-filtering software on every computer made in China was the added
cost. Another example is the regulation requiring bloggers to register using their real names. Sina
Weibo, the popular Chinese version of Twitter, did not abide by the regulation: stating the
company would lose customers and untold revenue. As of mid-2012, Sina Weibo has over
360 million registered users.
Final thoughts
China is a big, rapidly growing, and complex country that is flexing its newly-found muscles.
The operative word to me is complex. I' ll leave you with one final example of that complexity.
Chinese allegations against the United States only come from top-level government officials.
United States allegations against the Chinese come from the government officials, tech-media
types, and private sector security professionals. Nir explains:
China' s strong state and weak civil society means criticism, by China' s private sector and
security analysts, of foreign-originated cyber-attacks is practically nonexistent: probably
because of the strict censorship by the Chinese government.
I' ll end by reiterating my grandfather' s wisdom, ' Things go better when you know the other
person' s story.

-
About Michael Kassner
Michael Kassner is currently a systems manager for an international company. Together with
his son, they run
MKassner Net, a small IT publication consultancy.

MY REPLY TO THE QUESTION
 

LINK to discussion
http://www.techrepublic.com/forum/discussions/102-403383?tag=unit-hot-disc;hot-disc0


I have been going back and forth to HONGcouver, since 1978. In 1990-
1992 I tried to locate Chinese sources to manufacture an idea that
I prototyped over 6 years. I had meetings with people, who had
factories in China, who were Chinese, and who flew back and forth
from HongCouver on a regular basis. Nothing went anywhere, but after
I left, returning to Ontarrible, I found my idea being manufactured in
China, with 6 different versions - one version in particular, most
hilariously, made a huge advertising distinction, as the only one
that, once activated, turned off all touch-sensitve current. At the
meetings with Chinese over 2 years, there was one obviously powerful
guy who grilled me on how my device worked, and who kept asking if
it was possible to turn OFF the touch sensor current, once the device
was activated - I pointed out that the touch sensor was powered by
a typical 2032 button battery, commonly used as the CMOS clock
battery in computers ( 2032 - 2.0 centimeters wide, 32 mm thick ,
nominal voltage, 3.0 Volts ). The current used as a touch sensor
went through a resistor, to the BASE of a transistor, so the
current used was in the 10,000 ths of an amp! ... - there really
was no danger of electrocuting anyone, but, yes, once activated,
the current could go through another transistor that turns "off"...
He was obviously planning his marketing scheme, for "HIS" new
invention, as he was asking me questions!
I am composing an entire section called "Vancouver Thieves",
since you would have to experience it to believe it... My Bank
card was "compromised" 6 times in a year... All my WASP ( White
Anglo-Saxon, Protestant ) Canadian born, English speaking friends
( all 6 of us ), are anally retentive about leaving ANYTHING in
their cars that is visible - even a package of cigarettes on the
seat is an 'invitation' to have the window smashed. Bags, jackets,
whatever, - forget it, you might as well take a hammer and smash
the windows yourself.... ALL my banks closed mysteriously for 3
or 4 days - including the Automated Tellers. My friend, who was
born there, said later that HIS bank was closed for a few weeks.
A Chinese manager, got the head position, and, over a few years,
fired all the 'Canadians", replacing them, one-by-one, with
people from CHINA.... Finally, the R.C.M.P., shut down the entire
bank, since BILLIONS in illegal Chinese currency was being laundered
through the bank!
At the same time, reports in the Vancouver SUN newspaper told
stories of the CASINOs in the area being watched closely, since
untold MILLIONS of dollars were exchanging hands - Chinese men
would come in with briefcases stuffed with millions of dollars,
and buy "CHIPS" -- ie, laundering money... The casinos, delighted
to have that kind of revenue, complained that " the transactions
were completely legal"... um, well,... sort of...
I saw the most unbelievable things in Vancouver, a city that
Statistics Canada OFFICIALLY announced, had "Chinese" as the
dominant population --- I did not need Stats Can to figure that
one out! At one of my banks, Toronto-Dominion, that has the
longest "open" hours of any bank in Canada - 8 A.m. to 8 P.M,
with a good 5 to 10 tellers at any given moment inside, I wanted
to use the ATM (Automated Teller Machine) in the outer lobby.
Much to my surprise, there were 6 people in line. That never
happens. 2 people were in the line behind me, as I waited, watching
a short, older Chinese man, open, one by one, a large stack of
envelopes. He would open the envelope, take out a check, put it
in a deposit envelope, punch in a bunch of numbers, and for
AMOUNT, put in $20,000.00 . Then he would open another envelope,
and continue on the stack of envelopes. I waited ten minutes or
more, and finally he glanced over his shoulder, and realized that
there was a long lineup, and grabbed the stack of un-opened
envelopes, and left... I would guess he had Hundreds of Thousands
of dollars in the pile left, and he had been there a long time
before that... Where, besides Las Vegas, would you see someone
depositing hundreds of thousands of dollars into an ATM?
( I estimate the total to be around 1 Million dollars!) Get used
to it, this is HONGcouver, and strange, is the norm...!
I just read an article where the huge asian manufacturer, LG,
was bragging about sending people around the world, on a sort of
permanent vacation, to the tune of hundreds of millions a year --
just to look for ... " ideas ". That is a smart, investment -type
of policy. The other side of the coin, is that there are roving
bands of "idea" purveyors, and the competition to keep those ideas
coming in, is a dog-eat-dog adventure. Once it was realized that I
am an inventor, and constantly coming up with "IDEA"s, my normal
Canadian life, as anyone would reasonably expect, was over..!
The complete, 5-year plan to take over a Canadian Bank, deliberately
to launder Billions of illegal Chinese currency, shows the long-term,
planning, and dedication, and mentality, that a certain faction
of the Chinese "immigrants" have. I saw stuff that you simply would
not believe, and you would have to catch it on VIDEO before anyone
would believe.... Security is a HUGE issue in HongCouver, and the
Alarm and Security companies are scrambling to keep up -- for every
security feature you can "BUY" ( get this.... made in CHINA !) there
is an unbelieveable method / ploy/ hack/ or mechanism, to defeat it.
Get an alarm system that uses a Cell-Phone, built in, to call you
if there is a problem. ... well... It is MADE IN CHINA, and your
Cell Phone is MADE IN CHINA, and the Cellular Network ITSELF has
equipment MADE IN CHINA, and .... on technical websites such as this,
was an article, where, against the SPECIFIC advice of Canada's R.C.M.P.
and C.S.I.S. police, and against the F.B.I. and C.I.A. in the U.S.,
large telephone switching computers in North America were being
"UPGRADED" with main frame switching computers -- MADE IN ASIA...!
Oh, but it gets better, the computers contain Terabytes of code that
no one has looked at! The R.C.M.P. warned that there "COULD BE" a
back -door somewhere in the software- well I guess...
I have a keychain photo frame, which was a popular 'gift' idea
a few years ago. They were everywhere, - and, sure enough, all the
anti-virus companies put out a warning - AFTER a year or so, that
all the software used on the photo frames could be traced back to
one ASIAN company that hid a trojan in the software, that allows
ASIAN hackers to take over the user's computers. I still have the
original installation disk with the trojan "back-door"... The
fact that millions of U.S. and Canadian 'gift-buyers' installed the
"back-door" on millions of computers, seems a point that most people are
oblivious to! ...
I have been fascinated with locks and mechanical devices, since
I was 6. I consider myself a reasonaably good amature locksmith. BUT...
I am a rank amature compared to the professional Break and Enter
( B&E) thieves from China. I swear these guys have a SCHOOL - what to
you want to be, an electronic alarm hacker, a mechanical lock hacker,
a computer software hacker, a telecommunications distribution hacker,
a.... whatever, because these guys have knowledge and equipment and
skills that would astound you... The room I kept my computer and electronics
in was constantly broken into... I had WIRED internet alarms, wireless
GSM Cellphone alarms, local alarms, video cameras, and custom made
locks and saftey devices. In what must be the funniest thing in the
entire collection of security and alarm stories -- they not only defeated all of
the above, shortly before I left, BUT, they edited the video surveillance
footage, stole some of the locks and alarms, and now are MANUFACTURING
my hand-made door lock in CHINA- complete with all the flaws! I was not
able to properly finish all the design and machining, so they COPIED
the un-finished prototypes, and YOU can go online and buy them! (but
don't, they all have known flaws, that I can easily point out!!! )...

So why didn't my WIRED internet ( CABLE ) work? Ever see a white,
unmarked VAN, parked on the side of the road, with a guy with a ladder
climbing up a pole to do maintenance on Bell Phone, Cable, Optical,
or Hydro. 19 out of 20 workers that I saw, ( and I was counting), were
Chinese. Does anyone stop, and ask to see their ID? nope

So why didn't my GSM Cell phone alarm work? I hang out in a very technical crowd, and
at the Abbottsford Flea Market, (near Vancouver) someone bought an $800 cell phone
jammer ( MADE IN CHINA ) that could take out a 4 Kilometer section of
the city. And that is just a cheap one,- if you fork out big bucks, you
can knock out half a city, easily. Money talks. So, how did they defeat
my hand made lock and key , with a hand-made electronic double lock?
Easy. I lived in what was known as a "VANCOUVER SPECIAL". A floor plan
that was built by the thousands, just modifying the exterior, flipping
the floor plans, adding little roof modifications, but, basically, the
identical unit, mass produced. Many people people upgrade the windows,
and doors, etc. with more weather tight, energy efficient designs, so
there is a HUGE supply of "USED" doors and windows, that are all
IDENTICAL. You can buy an entire aluminum framed window unit, cut the
glass on your intended B&E target, get inside, steal, modify, do
whatever, and clean up the glass, and put in IDENTICAL sliding windows.
PRESTO. No sign of forced entry! Whoopee. Unfortunately, the main
electrical panel for the house is in the garage at the back, so the
power was turned off. The telephone was dead. The cable was dead. The
Cellular network was dead. Quickly, quietly, efficiently, with such
skill as is almost unimaginable. Although it seems like something out of
a movie, things ARE reported occasionally in the press- like the
CHINESE passenger coming into HongCouver International Airport,
wearing an entire head mask and torso
of an old man. The guy was about 24, but the entire molded
head and upper torso, was of an 80-year old. I was in a Coffee shop,
in Vancouver, and this old guy came in, walking bent over, slowly,
but,-- he dropped his wallet, and I realized he was practicing his
act, since he had to speak to the clerk, and he had to quickly
maneouver to get his money! His voice and lightning fast recovery
were those of a 20 year old! HongCouver is more like a circus than
any city I know in Canada!


I have hundreds of stories, many come from Alarm and Security personel,
and unfortunately, I can't write about them yet, since the bizarre,
incredible feats of B&E and technical wizardry are still a valid
THREAT, and it would be irresponsible to publish them until they
are widely known and solutions found to circumvent them...
Here is one, that is typical, and should wake up a few people who
are "SMUG" or "arrogant" in their "internet" firewalls and security systems...
A friend in Vancouver was having problems with his telephone - specifically
the CALL DISPLAY was intermittent, so, as a retail outlet in electronics,
this was a VERY imortant feature. Also, his monitored alarm security
system was through the telephone, typical "BC TEL" wiring. After months
of the telephone company running checks on the equipment from "their
end", and finding nothing, he hired a company to do a TRACE on the
wiring. They found HIS wiring going into the large, double door garage
of a private home, in a nearby suburb! Checking it out, there were
huge, thick, black cables, from the telephone poles in the back alley,
going into the "private" typical, suburb, 'single-family" home's
garage....! This is a typical "man in the middle" type of security
problem... ( to all the internet security guys reading this -- Do you
know where YOUR internet cables are going to and coming from? --
it doesn't matter WHAT kind of firewalls and security you have, if all
your internet is supplied through a telecommunications TAP...)
Another tid-bit... Since ALL the electronics and computers going into the
stores like WAL MART, or BEST BUY or the SOURCE ( Radio SHACK), or
whatever, come into Canada through Vancouver Harbour, and, since
Vancouver is, in fact, HONGcouver, I thought when I went there, I would
find massive, Chinese run, Computer-Electronic SuperStores, like one
might find in Toronto... Nope. In fact, a clerk at a large Nation-Wide
outlet told me that any stock and supplies they needed were shipped...
from Toronto! So Computers and electronics are unloaded from ships, in
Vancouver harbour, shipped 4,000 miles to Toronto, and then shipped BACK
to the store outlets in Vancouver!... ( During a meeting with the famed
Edwin Mervish of Toronto's Honest Ed's, he told me that 80% of all goods
sold in Canada, were within a 250 mile radius of his warehouses!)
What I did find, were Tiny little store fronts, with cluttered
collections of used and new parts and computers. However, - don't judge
a book by its cover. In one store that I got to know, the 24 year old
Chinese immigrant, who could barely speak English, showed me a large
wooden crate, that he just got on his last trip to Hong Kong. A 240
volt, computer controlled (Chinese only display panel) LASER / Infra-Red
SMT (Surface Mount Technology ) work station, from hell. He could take
any chip from any electronic device made, and replace it. That includes
cell phones, iPads, Laptops, whatever- now that's the kind of equipment,
in the "Corporate" world that I knew, you had to book a reservation, 6 months
in advance, and write a justification report, explaining "why"
"YOU" needed it, and file all the paper work associated with the
expenditures involved. IFF you were lucky, you might, possibly, gain
access to such a device... Or, you could just be a 24 year old hacker
in HongCouver...
In the business world in Vancouver are hundreds of software companies,
that deal with China. One friend told me that they just finished a project,
over a year's time. The first and second 'payment' for the software
came in as expected, but upon completion, the Chinese Corporation said
" If you want your money, simply come to China, and go through
the legal system, here..." - a system based on bribery, and everyone
knows the outcome! I mentioned this to a software developer here in
Ottawa, (the capital city of Canada) a short time ago, and his
description of dealing with China was, to me, funny...
"We are well aware of the 'business' practices in
China. We estimate the total cost, and include THAT in the first
payment schedule. Then, if we actually get paid on completion, it is
just a bonus!"... Another friend who makes a transmission
product that saves wear and tear on heavy equipment, like bulldozers,
cranes, and earth movers, told me of his adventure in China - He shipped
a pallette load of his product to China, but after 6 months, on the
construction site, he got a call that something was wrong. He flew over
to China, and traced the route HIS product took. In the harbour where
the containers were unloaded, he found FAKE identical bottles of
"HIS" product, mixed half-and-half with crap, for sale. Further up
the river, at another major port, were more FAKE bottles, again,
mixed a further half-and-half with crap. Finally, at the construction
site, were his 'Genuine" bottles of product, diluted so badly with
wretched chemicals, that they were actually damaging the equipment!
There are a LOT more stories, all over North America, on dealing
with "Chinese" businesses, -- but, as with the case of the BANKs in
Vancouver, there is almost NO NEWS AT ALL - the CORPORATIONS involved
do NOT want a whisper of the corruption and scandal loose to the
public since it would tarnish not only their reputation, but seriously
affect investments, stock markets, and prestige... The IRON FIST
of "Silence" maintained by the Banks verges on corruption, since
I have seen many cases where the "victims" of banking fraud are
treated like criminals, while the Banking administration sticks their
nose in the air, and classifies everything as "An internal Security
Matter", the details of which, cannot be released to the public."
(( Translation, we screwed up, royally, and are doing everything
possible to cover our asses. You, the 'little guy' not only get
screwed over by the crooks, but by US, the rich Corporate Executive
as well... ))
Sometime, I will write a bit on my page "VANCOUVER THIEVES", which
at the moment is just a holding page... At one time it would have been
"racist" to flaunt the word "CHINESE" like I am about to, but, after
you have been subjected to the "new and Improved" HongCouver, the way
I have, there is no apology needed, nor given... All I can say is
"BEWARE". Polite, philosophical conversations, over "tea", are
totally out of place here. The general "CONCEPT" that emerges here,
is not just Chinese "hackers", but Chinese hackers working, along
with, beside, and in conjunction with, a virtual ARMY of people who
are wheeling, dealing, manipulating, harvesting, and snooping,
information from around the world, -- and a great deal of that
would be in the Canada/U.S. corridor...
The "DISCUSSION" and the statistics, in the article above, are just
a tiny inkling of the massive WAVE that is just starting to appear...
So the question "what do Chinese hackers want?", well, in the case
of the millions of novelty photo frame gadgets, "THEY GOT"
millions of computers infected with software, that quietly sat there
for over a year before anyone noticed... They 'owned' the computers.
Then you read, in technical websites, such as this, that there was
a massive DoS (Denial of Service) attack, where hackers, contolling
hundreds of thousands of computers, crashed a major web server, like
Adobe, Yahoo, Juniper Networks, Symantec, Northrop Grumman,
Dow Chemical or whomever - well, duh, -- anyone paying
attention would not be the least bit surprised at that "news"...

I have a file on my computer, that is updated almost daily, from
technical web sites and news articles, on computers that have been
hacked. Microsoft, Twitter, Tumbler, Facebook, Adobe, Yahoo,
Symantec, etc., and then you
start to see more subtle and vague reports of Banks, Government
departments, NASA, etc., that have been compromised. Knowledge is power,
and now INFORMATION is power. In a global economy, knowing what
your "competition" is doing, is an invaluable tool. CONTROLLING
your "competition" is even more powerful!
AND, I have not even "started" to get into the field of
telecommunications -- ever thought about your Cell Phone? Every
time you move, it transmits to the Tower " I am HERE", and the
digital information is broadcast through the system. While there
was a public outcry and protest against the U.S. government's
proposal to insert R.F.I.D. tags ( Radio Frequency I D entification)
capsules into every person in the U.S., every single country in
the world has individuals tripping over themselves to buy the
latest, greatest, "Smart Phone". I read technical information
on Nokia, Samsung, Motorola, BlackBerry, etc. and they all
make specific models for specific markets around the world.
Deepest Africa, remote India, all of South America, etc...
Thus, while rejecting the principle of RFID tags (Big brother is
watching ), everyone is carrying around a Radio Beakon, that
broadcasts their EXACT location, their phonebook lists, their
emails, and their actual VOICE converstations, 24/7 into the
vast "CELL" system. You can envision a large world map in C.I.A.,
M.I.6, C.S.I.S, Chinese Headquarters, etc. with millions of tiny
little dots moving around. Each one is a cell phone. Simply
gesture over a dot, enlarge, and follow the past year's worth
of activity.. See something unusual?.. zoom in, and play back
the Voice data packet of the conversation- 8 months ago, and
run through the address and contact list... Hmmmm.... let's
look into that... a business deal? Quarterly financial results?
Stock market purchases? Let's follow the tiny blip on the
map, of the guy he is talking to, ... this could get interesting!
You can install Software on any phone, available anywhere,
- ostensibly to protect your "kids" - that shows the Cell phone
location, 24/7, of your "KID". And records all voice, and data,
and is accessible from any computer in the world... Today's
computers, with Peta-Byte storage, and super fast speeds, can
easily track every cell phone in the world... Ever had your
( made in CHINA) cell phone ring, but there is no caller, and there is no listed
"incoming" call? Or, your ( made in CHINA) smartphone shows a
"NEW TEXT MESSAGE", but when you go to look, there is no record
of any message?.. I know VERY
knowledgable technicians who have gotten rid of all cell phones.
Technology is a double-edged sword. Convenience, yes, but
at what price? ...
So, ... Chinese hackers, What do they want? -- " IT ALL ".
And it appears, that they are getting it.


_______________________________________________________________
_______________________________________________________________

As I stated at the top of this page, this is going to be a VERY LARGE page...

News comes in on a daily basis, and it is difficult to organize and capture it all,....

Here are a couple of highlights ! ! ! :

________________________________________________________________
http://www.bbc.com/news/technology-27908105


18 June 2014 Last updated at 11:21 ET

eBay pulls sales of Chinese 'spyware phones'
By Leo Kelion Technology desk editor

The Star N9500 handset was being sold for about £120 on eBay
Related Stories

Thieves 'customising' malware code
Samsung tackles Android malware
Viruses 'installed in PC factory'

EBay is barring listings for a smartphone after reports the model is pre-installed with spyware in its Chinese factory.

A German security firm reported on Tuesday that the Android-powered Star N9500 sent personal data to a computer server in China, adding that the Trojan could not be removed.


It said the malware was disguised as the legitimate Google Play Store app.

The handset remains on sale on Amazon, which could not be reached for comment.

But eBay said it was rolling out the ban globally.

"Due to reports that some Star 9500 smartphones are loaded with spyware, eBay is not allowing
the sale of these devices as a precautionary measure," a spokesman told the BBC.
Intercepted calls
Amazon Amazon is still listing the model from third-party sellers

Although the brand Star is far from being a household name, the handset may have appealed to
some customers because of its close resemblance to the Samsung Galaxy S4 coupled with the
fact it sells for about a third of the cost.

Security firm G Data said it was alerted to the case after receiving tip-offs from its customers.

(ABOVE ) G-DATA security in Germany analyzed the Cell Phone ( spyware ).

"The spyware runs in the background and cannot be detected by users," it said.

"Unbeknownst to the user, the smartphone sends personal data to a server located in China
and is able to covertly install additional applications.

"This makes it possible to retrieve personal data, intercept calls and online banking data,
read emails and text messages or control the camera and microphone remotely.

"The program also blocks the installation of security updates."

The Associated Press news agency has reported that although several Shenzhen-based firms
used eBay and other sites to sell the model, it had been unable to track down the manufacturer.
Infected smartphone G Data identified the malware involved as being Android.Trojan.Uupay.D

If the allegations are true, it is not known whether the manufacturer itself would have been aware
of what was being done at its plant.

This is not the first time that a Chinese factory has been accused of shipping devices preinstalled
with malware.


@@@@@@ note

In 2012 Microsoft reported that several PC makers in the country had been found to load
malicious programs onto their computers.


@@@@@@ note

Then, last year German firm E-Plus reported that some of its China-made Android smartphones
were being shipped with SD memory cards infected with a computer worm.

_______________________________________________________________________
_______________________________________________________________________



This next article is priceless - it shows just the tip of the iceburg heading our way .... !

http://community.spiceworks.com/topic/422497-hacked-chinese-clothes-iron-sends-spam-and-malware


Hacked Chinese Clothes Iron Sends Spam And Malware
Stu Sjouwerman Dec 18, 2013 at 10:45 AM | Security
KnowBe4 is a Spiceworks Partner.

Now here's something "new and creative!" Chinese hackers have taken a clothes iron
(yes, we are talking a steam iron, see the picture) and added a small device that detects
Wi-Fi networks. Once the small board (see the inset lower right) detects a public, non-
password protected Access Point within 200 meters (~650 feet) it starts sending spam and
malicious code.

Russian state TV program Rossiya 24 showed these irons and explained what they were
doing. Here is the clip in Russian, where they they open an iron to show the "spy chip".
Other products found to have rogue components reportedly included kettles, mobile
phones and car dashboard cameras.



The video also showed the hidden chips had been used to infiltrate company networks.
Once it was detected due to a slight increase in weight of the irons (good catch!), the
latest delivery of appliances was rejected by customs, but more than 30 irons had
already been delivered to retailers in St Petersburg. Wow.

Think about any piece of electronics coming from China like your coffee maker, toaster,
microwave being infected with a small malicious bit of hardware. You are going to have
to open up your Wireless Access Point and see what devices are connecting to it, and
then track them down, perhaps using Kismet, which identifies networks by passively
collecting packets and detecting (and given time, decloaking) hidden networks, and
infering the presence of a beaconing device by looking at the data traffic. There may
be easier ways to do this though, got any suggestions?



link to news article hacked iron in russia
https://www.youtube.com/watch?v=hkiqenPy8zY


weaponizing your thermostat
https://www.youtube.com/watch?v=pEAqqqxsyE0


program to FIND hidden wireless bugs
http://www.kismetwireless.net/

link to HACKER NEWS article
http://thehackernews.com/2013/11/russia-finds-spying-microchips-planted_1.html

If you believe that these cases are isolated, then you are completely wrong. Many other
common-use products have found to have rogue chips, including gaming console,
chargers, network devices, mobile phones and car dashboard cameras.

link to IS YOUR IRON SPYING ON YOU
http://www.theepochtimes.com/n3/366229-pre-hacked-electronics-come-straight-from-chinas-factories/

While the unusual form of cybercrime took researchers by surprise, it was only the latest in
an emerging threat of hacked electronics coming straight from the Chinese factories.
There is a long list of devices riddled with backdoors, infected with malware, or fitted with
spying devices before leaving Chinese factories. These range from kettles to laptops, from
USB keys to cameras, and from consumer software right up to military components.
In June 2011, Hong Kong newspaper Apple Daily uncovered recording devices installed in
all dual-plate Chinese-Hong Kong vehicles. They were labeled as “inspection and quarantine
cards,” and were installed free of charge by China’s Shenzhen Inspection and Quarantine
Bureau. In June 2010, an auto-run virus in China-made memory cards in Olympus Stylus
Tough cameras was infecting computers in Japan. The virus was uncovered just a week after
an identical virus was in the memory cards of Samsung smartphones. Prior to that were
viruses in devices including China-made TomTom GPS systems, and Insignia digital picture
frames
sold at major outlets, including Best Buy, Target, and Sam’s Club



MARCH 21 2021 UPDATE

Since thieves have stolen my hundreds of older computers,
and here in OTTAWA, stolen my two loaded desktop computers
in their entirety, -- with all the data I had collected,
I have lost more information than I now have -- even so,
it would take an experienced team of investigative
journalists working 24 hours a day with dozens of
news feeds to just organize and store the data on
CHINESE HACKING pouring in daily.

Here, I give a few timely EXAMPLES as typical.


1/


VANITY FAIR Summer 2018 pg 65
Nick Bilton (excellent writing and research)

VALLEY OF THE SPIES (excerpts)

Foreign agents have been stealing tech secrets
since the 70s. But in the wake of Facebook's
recent crisis, the biggest companies in the world
are facing the challenge at unprecedented levels.

On the day that they
entered the headquarters of a renowned
technology company, members of the security
unit were nondescript- quiet as a mouse. It
had to be that way, naturally. For months prior,
the tech behemoth's upper management
had suspected that something nefarious was
going on inside their organization: files were
disappearing; millions of dollars worth of
intellectual property was being copied, they
believed- personal and private  information,
too. Worse, the executives in the corporate
suite were mystified about the culprit. But
they recognized the veracity of an adage in
the tech industry: There are two kinds of
companies- the ones that have been hacked,
and the ones that haven't been hacked YET.
  As the tech company's staff went about
their usual quotidian tasks, working at their
computers and carrying on with their familiar
assignments, the security sleuths surreptitiously
flipped open their laptops, connected to the
network, and subtly began their forensic inves-
tigation. The team ran software to search for
viruses and malware, but found nothing.
They checked the servers for illicit software,
but again came up with an absence of leads.
Eventually, the operatives set up network-
monitoring tools to detect where traffic might
be leaving the building. Soon enough, their
screens were filled with charts and numbers-
reds, yellows, greens- that zigzagged up and
down like a digital seismograph. One of those
spikes indicated that a massive amount of
data was flowing out of a single computer
elsewhere in the company's offices.
 But this evidence suggested another
challenge. The company had always had
a B.Y.O.D., or "bring your ownd device,"
policy. Anyone who worked in the office
could come in, connect his or her individual
device to the network, and commence the
workday independent of the company machinery.
The computer that was funneling information,
therefore, didn't register on the
roster of machines  controlled and owned
by the IT department. This left the security
team with one definitively old-school option:
to literally follow the the wire that ran from the
server to the rogue computer. One by one,
they plucked up the floor tiles in the server
room, followed the CAT 5 cable as it swam
helix-like alongside hundreds of other cables,
inside the walls, past yellow and white power
wires, and through the labyrinthine office,
until they found themsolves at the end of the
cord, inside a small closet. There, seated be-
hind a laptop, was a young Chinese woman.
  The Security specialists searched her per-
sonal coputer and immediately discovered
more than 30 peices of malware that were
drawing information out of the servers and
sending it to China.
The woman wasn't an employee of the tech
company. Instead, she had been hired as a
student intern after e-mailing the company
out of the blue, asking if she could assist in
the office.
.....
Furthermore, the company didn't want to
alert the authorities, perhaps fearful that the
press would find out and the company's
valuation would be negatively affected.
.....
Why would the Chinese or Russian governments
finance billions of dollars in R & D when they
could just persuade an operative to plug in
a computer into an unprotected network,
and siphone sensitive data for the cost of an
airline ticket?
......

2/ 

CHINA STEALS 50 TERABYTES OF MILITARY DATA

You can read about the Canadian plans to buy

U.S. F-35 jet fighters, and the hundreds of millions

that Canadian tax payers have already PAID for a

non-existant aircraft , while the Chinese have put

the top-secret designs into their Production Line

J-20 fighter, which in 2020 surpassed the United

States in establishing world AIR SUPERIORITY!

ABOVE : One prototype version of F-35

http://au.ibtimes.com/chinese-spies-stealing-designs-australias-new-fighter-jet-highlights-cyber-risks-1413765


 Lockheed Martin F-35B Lightning II joint strike fighter flies toward its new home at Eglin Air Force Base, Florida in this U.S. Air Force picture taken on January 11, 2011. Lockheed Martin Corp on Monday said it has delivered the next version of the computer-based logistics system used to support the F-35 fighter jet to the U.S. military for flight testing. Reuters

Australian Foreign Minister Julie Bishop has highlighted cyber risks of the reported theft of Chinese spies of Australia’s new warplane designs. Crucial informaion from top secret documents were allegedly obtained  about the new Joint Strike Fighter, the F-35 built by the U.S.

Bishop told Sky News that she remains confident that the U.S. would protect its intellectual property. The foreign minister was responding to media reports citing the leaked U.S. documents containing sensitive information about the F-35.

The Australian government has placed an order for 72 units of F-35 jets to be operational in 2020, BBC reported. The new fighter jet has been described as the most expensive defence project the U.S. has in history. U.S.-based Lockheed Martin manufactures the stealth aircraft with a development cost estimated at $400 billion. The U.S., UK and Australian military forces were among the major buyers of the F-35s.

Prime Minister Tony Abbott had announced in April 2014 that Australia will be buying 58 more F-35 worth more than $12 billion as part of the country’s plan to acquire 72 aircraft. Mr Abbott said the new fighter planes will make an important contribution to Australia’s national security.

Aside from the 72 aircraft initially placed by the Australian government, an option to increase the order to 100 is being considered which could have billions of dollars at stake. Bishop told media the leaked documents involving stolen aircraft designs “highlight” the challenges of cyber attacks.

Former U.S. National Security Agency intelligence contractor Edward Snowden had leaked the confidential documents to German magazine Der Spiegel. The documents revealed that Chinese cyber spies had illegally acquired “huge volumes” of classified military information related to the new fighter jet. The stolen data includes details about the aircraft’s radar systems, cooling exhaust gas, engine schematics and aft deck heating contour maps, according to Fairfax Media.

Previous reports have indicated that the F-35 is being targeted by Chinese cyber spies, but the Snowden leaks may have provided the first public confirmation of how highly classified data has been compromised. According to military experts, the design of China’s new fifth-generation fighters such as the Chengdu J-20 and the Shenyang J-31 may have been heavily influenced by design information stolen from the U.S.

To report problems or leave feedback for this article, contact: r.su@ibtimes.com.au

REPORT

SNOWDEN SHOWS CHINESE STOLE
F-35 PLANS

f-35 Snowden Doc espionage

After Copying F-35's Stealth,
China's J-20 Duplicating its
Non-Stealth Features

After Copying F-35's Stealth, China's J-20 Duplicating its Non-Stealth Features
J-20 fighter

China's J-20 stealth jet, believed to be a copycat design of the US-made F-35, is now duplicating its non-stealth feature - to carry weapons on external pylons.

The F-35 and J-20 carry missiles and bombs in an internal weapons bay to avoid radar detection. However, for some missions requiring heavier weapons load, these are mounted on external pylons, at the expense of stealth.

On Monday, local media posted photograph showing a J-20 prototype undergoing a test flight with two external pylon adapters, one under each side of its wings.

The Chinese jet previously had the capacity to carry four PL-15 missiles in its main weapons bay and two PL-10 short-range missiles in its side weapons bay. The external adapters will enable the jet to carry four more missiles.

Based on the mission, different types of loadouts can be chosen. “Beast mode” with more munitions can be activated in low-risk and low-threat missions.

In addition, the Chinese media speculated that the J-20 fighters could also carry external fuel tanks for extended range.

The J-20’s sensor system also looks similar to the F-35’s Electro-Optical Targeting System (EOTS) in terms of shape and placement. In 2007, Chinese hackers allegedly stole technical documents related to the F-35 from Lockheed Martin.

Daniel Coats, in a congressional testimony published in May 2017, named Russia, China, Iran and North Korea as “Cyber Theat Actors.”

“Adversaries will continue to use cyber operations to undermine U.S. military and commercial advantage by hacking into U.S. defense industry and commercial enterprises in pursuit of scientific, technical, and business information,” Coats stated.

“Examples include theft of data on the F-35 Joint Strike Fighter, the F-22 Raptor fighter jet, and the MV-22 Osprey. In addition, adversaries often target personal accounts of government officials and their private-sector counterparts. This espionage reduces cost and accelerates the development of foreign weapon systems, enables foreign reverse-engineering and countermeasures development, and undermines U.S. military, technological, and commercial advantage.

3/

T

https://www.wired.com/magazine/president-obama-guest-edits-wired/

EXCERP from article

The US OFFICE of Personnnel Management doesn't radiate much glamour. As
the Human resources department for the federal government, the agency
oversees the legal minutiae of how federal employees are hired and promoted
and manages benefits and pensions for millions of current and retired civil
servants. The core of its own workforce, numbering well over 5,000, is
headquartered in a hulking Washington, D.C., building, the interior of which has
all the charm of an East German hospital circa 1963. It's the sort of place
where paper forms get filled out in triplicate.

The routine nature of OPM's business made the revelations of April 15, 2015,
as perplexing as they were disturbing. On that morning, a security engineer
named Brendon Saulsbury set out to decrpt a portion of the Secure Sockets
Layer (SSL) traffic that flows across the agency's digital network. Hackers
have become adept at using SSL encryption to cloak their exploits, much as
online vendors use it to shield credit card numbers in transit. Since the
previous December, OPM's cybersecurity staff had been peeling back SSL's
camouflage to get a clearer view of the data sloshing in and out of the
agency's systems.

Soon after his shift started, Saulsbury noticed that his decryption efforts had
exposed an odd bit of outbound traffic: a beacon-like signal pinging to a site
called opmsecurity.org. But the agency owned no such domain. The OPM-
related name suggested it had been created to deceive. When Saulsbury and
his colleagues used a security program called CYLANCE V to dig a little deeper,
they located the signal's source : a file called mcutil.dll, a standard component
of software sold by security giant McAfee. But that didn't make sense; OPM
doesn't use McAfee products. Saulsbury and the other engineers soon
realized that mcutil.dll was hiding a piece of malware designed to give a
hacker access to the agency's servers.

The Office of Personnel Management repels 10 million attempted digital
intrusions per month - mostly the kinds of port scans and phishing attacks that
plague every large-scale Internet presence - so it wasn't too abnormal to
discover that something had gotten lucky and slipped thorugh the agency';s
defenses. In March 2014, for example, OPM had detected a break in which
blueprints for its network's architecture were siphoned away. But in this case,
the engineers noticed two unusually frightening details. First, opmsecurity.org
had been registered on April 25, 2014, which menat the malware had probably
been OPM's network for almost a year. Even worse, the domain's owner
was listed as "Steve Rogers" - the scrawny patriot who, according to Marvel
Comics lore, used a vial of Super-Soldier Serum to transform himself into
Captain America, a member of the Avengers.

Based on the little he'd heard about the malware, Mejeur was certain his
investigation would uncover plenty of nasty surprises.

Registering sites in Avenger-themed names is a trademark of a shadowy
hacker group believed to have orchestrated some of the most devastating
attacks in recent memory. Among them was the infiltration of Health Insurer
ANTHEM, which resulted in the theft of personal data belonging to nearly
80 million Americans. And though diplomatic sensitivities make US official
reluctant to point fingers, a wealth of evidence ranging from IP addrsses to
telltale email accounts indicats that these hackers are tied to CHINA, whose
military allegedly has a 100,000 strong cyberespionage division. ( In 2014 a
federal grand jury in Pennsylvania indicted five people from one of that
division's crews, known as UNIT 61398, for stealing trade secrets from
companies such as Westinghouse and US Steel; all the defendants remain at
large )

ONCE Captain America's name popped up, there could be little doubt that the
Office of Personnel Management had been hit by an advanced persistent
threat (APT) - security-speak for a well-financed, often state-sponsored team
of hackers. APTs like China's Unit 61398 have no interest is run-of-the-mill
criminal activities such as selling pilfered Social Security numbers on the black
market; they exist solely to accumulate sensitive data that will advance their
bosses' political, economic, and military objectives. "Everyone can always say,
'Oh, yeah, the Pentagon is always going to be a target, the NSA is always
going to be a target' " says Michael Daniel, the cybersecurity coordinator at
the White House, who was apprised of the crisis early on. "But now you had
the Office of Personnel Management as a target?"

To figure out why the hackers had trained their sights on OPM, investigators
would have to determine what, if anything, had been stolen from the agency's
network over the preceding year. But first they had to hunt down and eliminate
the malware on its network, an archaic monstrosity that consisted of as many
as 15,000 individual machines.

Curtis Mejeur was a victim of dreadful timing. A wry and diminutive former
marine who had served in Fallujah, where he mapped insurgent strongholds as
part of an intelligence unit dubbed the HOBBITS, Mejeur started work as one of
OPM's senior IT strategists on April 1, 2015. He was still getting acclimated to
his new job when, on the morning of April 16, he was handed the most
daunting assignment of his career: Lead the effort to snuff out the attack on
the agency's network.

Based on the little he'd already heard about the malware's power and lineage,
Mejeur was certain his investigation would uncover plently of nasty surprises.
But he wouldn't have to deal with them alone; early that morning, a team of
engineers from the US Computer Emergency Readiness Team, the
Department of Homeland Security unit that handles digital calamities, marched
in OPM's headquarters. The engineers set up a command post in a
windowless storage room in the subbasement, just down the hall from where
Saulsbury had discovered the hack less than 24 hours earlier.

Since they couldn't trust OPM's compromised network, the visitors improvised
their own by lugging in workstations and servers that they could seal behind a
customized firewall. Soon enough, the subbasement was filled with the
incessant clatter of keyboards, occasionally punctuated by the hiss of a Red
Bull being popped open. The dozen-plus engineers rearely uttered more than a
few words to one another, which is how they prefer to operate.

One of the US-CERT team's first moves was to analyze the malware that
Saulbury had found attached to mcutil.dll. The program turned out to be one
they knew well: a variant of PlugX, a remote-access tool commonly deployed
by Chinese-speaking hacking units. The tool has also shown up on computers
used by foes of China's government, including activists in Hong Kong and
 Tibet. The malware's code is always slightly tweaked between attacks so
firewalls can't recognize it.

The hunt to find each occurance of PlugX continued around the clock and
dragged into the weekend. A sleeping cot was squeezed into the command
post, where temperatures became stifling when the building's air conditioners
shut off as usual on Saturdays and Sundays.

The hunt turned up not just malware but also the first inklings of the breach's
severity. A technician from the security software company Cylance, who was
supporting the effort, spotted encrypted .rar files that the attackers had
neglected to delete. He knew that .rar files are used to store compressed
data and are often employed by hackers to shrink files for efficient exfiltration.
In an email to Cylance CEO Stuart McClure on Sunday, April 19, the
technician was blunt in his assessment of OPM's situation: "They are fucked
btw," he wrote.

By Tuesday the 21st, having churned thorugh a string of nearly sleepless days
 and nights, the investigators felt satisfied that they'd done their due diligence.
Their scans had identified over 2,000 individual pieces of malware that were
unrelated to the attack in question ( everything from routine adware to dormant
viruses ). The PlugX variant they were seeking to annihilate was present on
fewer than 10 OPM machines; unfortunately, some of those machines were
pivotal to the entire network. ' The big one was what we call the jumpbox,"
Mejeur says. "That's the administrative server that's used to log in to all the
other servers. And it's got malware on it. That is an 'Oh feces' moment"

By controlling the jumpbox, the attackers had gained access to every nook and
cranny of OPM's digital terrain. The investigators wondered whether the APT
had pulled off that impressive feat with the aid of the system blueprints stolen
in the break discovered in March 2014. If that were the case, then the
hackers had devoted months to laying the groundwork for this attack.

At first, the investigators left each piece of malware in place, electing only to
throttle its ability to send outbound traffic; if the attackers tried to download
any data, they would find themselves confined to dial-up speeds. But on April
21, Mejeur and the US-CERT team began to discuss whether it was time to
boot the attackers, who would thus learn that they'd been caught. 'If I miss
one remote-access tool, they'll come back in through that variant, they'll
reestablish access, and then they'll go dormant for six months to a year at
least,' says a US-CERT incident responder who participated in the OPM
investigation and who agreed to speak on the condition he remains anonymous.
"And then a year later, they've now put malware in a lot of different places,
and you don't know what's happening because you think you already mitigated
the threat."

OPM has a multifactor authentication scheme, but it wasn't fully implemented
until January 2015 - too late to prevent the PlugX attack.

The debate continued until the evening of Friday, April 24, when an opportunity
presented itself: As part of a grid modernization program in Washington,
OPM's building was scheduled to have its power cut for several hours. The
team decided that, even though it would mostly be just a psychological
triumph, they would dump the malware just minutes before the blackout. If the
attackers were monitoring the network, they wouldn't realize their access had
been cut until everything finished booting up at least 12 hours later.

By the time the power was restored on the 25th, the hackers no longer had the
means to roam OPM's network - or at least that's what everyone hoped. The
investigators could finally turn toward piecing together what the attackers had
hauled away.

There is a common misperception that the surest way to frustrate hackers is
to encrypt data. But advanced persistent threats are skilled a routing around
such measures. The first item groups like these usually swipe is the master list
of credentials - the usernames and passwords of everyone authorized to
access the network. The group's foot soldiers will then spend weeks or
months testing those credentials in search of one that offers maximum system
privileges; the ideal is one that belongs to a domain administrator who can
decrypt data at will. To minimize their odds of tripping any alarms, the
attackers will try each credential only once; then they'll wait hours to try the
next. Since these hackers are likely salaried employees, investing that much
time in an attack is just part of the job.

There is a straightforwars way to foil this approach: multifactor authentication,
which requires anyone logging in to a network to be in physical possession of
a chip-enhanced ID card that correlates with their username and password.
OPM has such an authentication scheme, but it wasn't fully implemented until
January 2015 - too late to prevent the PlugX attack. The beacon that
connected to opmsecurity.org helped the attackers keep their foothold in the
network.

When hackers utilize genuine credentials, life becomes difficult for those who
specialize in postattack forensics. Investigators must determine when
authorized credential holders weren't using their accounts at times when the
records state otherwise. And the only way to accomplish that is through face-
to-face interviews: For nearly a month, Mejeur and the US-CERT engineers
grilled hundreds of OPM employees in groups of six. Since human memories
are so faulty, the investigatiors counted themselves fortunate when an
employee was able to recall that they had been on vacation while their
credential was in use for a particular week; the team could then analyze that
account's activity during that span, confident that a hacker was responsible for
it all.

OPM data can include everything from lie detector results to notes about
whether an applicant engages in risky sexual behaviour.

As the investigators laboriously sifted through interview transpcripts and
network logs, they created a rough timeline of the attack. The earliest
incursion they could identify had been made with an OPM credential issued to
a contractor from Key Point Government Solutions. There was no way to know
how the hackers had obtained the credential, but the investigators knew that
KeyPoint had announced a break of its own in December 2014. There was a
good chance that the hackers had first targeted KeyPoint in order to harvest
the SINGLE credential necessary to compromise the OPM.

Once established on the agency's network, they used trial and error to find the
credentials necessary to seed the jumpbox with their PlugX variant. Then,
during the long Fourth of July weekend of 2014, when staffing was sure to be
light, the hackers began to run a series of commands meant to prepare data
for exfiltration. Bundles of records were copied, moved onto drives from which
they could be snatched, and chopped up into .zip or .rar files to avoid causing
suspicious spikes. The records that the attackers targeted were some
of the most sensitive imaginable.

The hackers had first pillaged a massive trove of background-check data. As
part of its human resources mission, OPM processes over 2 million
background investigations per year, involving everyone from contractors to
federal judges. OPM's digital archives contain roughly 18 million copies of
Standard Form 86, a 127-page questionnaire for federal security clearance
that includes probing questions about an applicant's personal finances, past
substance abuse, and psychiatric care. The agency also warehouses the data
that is gathered on applicants for some of the government's most secretive
jobs. That data can include everything from lie detector results to notes about
whether an applicant engages in risky sexual behaviour.

The agancy's own assistant inspector general for audits testified about a 'long
history of systematic failures to properly manage its IT infrastructure."

The hackers next delved into the complete personnel files of 4.2 million
employees, past and present. Then, just weeks before OPM booted them out,
they grabbed approximately 5.6 million digital images of government employee
fingerprints.

When OPM went public with news of the hack in early June,, speculating about
the attackers' plans for the data became a popular Beltway pastime: Some of
the theories involved a Chinese plot to recruit agents and, more outlandishly, a
scheme to graft fingereprints onto Chinese spies so they could foil biometeric
sensors. But concrete evidence of the hackers' long-term intentions remains
virtually nonexistent, which may be the scariest part of all.

We haven't seen a single indication of this data being used anywhere." says
Arun Vishwanath, a cybersecurity researcher at the State University of New
York at Buffalo. "Yeah, we know that data is gone, but where did it go? What's
the purpose of all this? No one has the answer to any of that."

.  .  .  .  .  .  .  .  etc etc etc ... see the link to the entire article . . . .

WHAT DOES THIS MEAN ?

The first hack of a Corporation was NOT relayed to EVERY company
that it HAD ACCESS TO ! ( the admin determined that none of the
stolen data showed up anywhere on the internet, so it was not serious.)
All the Chinese wanted was ONE username/Password!
THEN, they used that Username/Password to hack millions of
government documents - none of these has shown up on the internet!
Obviously, they do not want all the data - perhaps ONE, SINGLE,
Identity to use for the NEXT HACK ! lol - there is a pattern here. . . .

These tiny examples are just a speck of dust in the fallout of
hacking world wide. No one has heard of any of these. lol

More will follow at some point in time. This is just a quick
sample of whats in store.

robin dusty graves

March 2021

...

 




























____________________________________________________

END OF VANCOUVER

THIEVES PAGE



___________________________________________



REGISTRANT     NAME    :

           
  robin dusty graves  

      

REGISTRANT      EMAIL   : 

      
robindustygraves@hotmail.com



REGISTRANT   PHONE    : 

         
 1 (780) -807 -0217

and

1 (613) - 717 -2777

NOTE: Since I get hundreds of
fake cellphone calls, 95% of which
instantly reference INVALID area
codes, if you wish to call, TEXT
first ( it is a cell phone ) or EMAIL
so I can add your number to my
CONTACTS !  lol
Typical calls I get are like:
V7152107270006 (would you answer this?)
+22382730861 (Mali in Africa)
+17874660327 (San Juan, Puerto Rico)
+113157451766 (Unknown- note # of digits)
+1336928934492 (Traphill NC??- note digits)
etc etc lol



REGISTRANT   ADDRESS  : 

     
207 Bank Street, Unit 206
Ottawa, Ontario, Canada
K2P 2N2

REGISTRANT COMPANY:

gravitationalresearch.com



________________________________________




ASSOCIATED WEB SITES:





robindustygraves.com


robindusty.com


robin-dusty-graves.com


dustygraves.com


gravitationalresearch.com


kidbots.com


HELWYCHZ.com


PSYCHOMOBZ.com


QUEBEQUISTAN.com




>

As usual, I am stuck in "CANADA", the great white North, where
every factory I have known has shut down... Recent Government/
Corporate policies, have every scrap of technology shutting down,
and being boxed up for shipping to CHINA, where the same
"unprofitable" factory, is running tripple shifts! Canada is
becoming a " 3rd World " country, if it does not already
deserve that status .... Products "could" be made here, but
the few remaining Engineering and Machining Corporations are
back-logged and ridiculously expensive. WAY, way, back in 1985,
a group of us tried to make, and market a small plastic
automobile device. The quote for the empty BOX, with colourful
printing, and a clear plastic display window, here in Canada was
over $6.00, The plastic injection mold halves were $60,000 with
a 6 month turnover... If there were any adjustments needed on
the molds, it would be another 6 months, and cost 10's of thousands...
We sent a prototype ( an early version, complete with many known flaws! )
to HONG KONG, and the quote was $500 for the machine molds
and 5 weeks. Adjustments were FREE, and made in a week or two...!
We got bogged down with world wide PATENTS, and to our dismay
and amusement, we discovered our 'prototype' in novelty stores,
only a few months later, shipped from Hong Kong, with the address
of a company in Great Britain! (SEE the upcoming, VANCOUVER THIEVES ! ,
which will be a huge folder when finished..) It was copied exactly
as we sent it - complete with flaws!... In a colourful box with a cellophane
window... For about the price of the empty box in Canada!

Oh Canada!


Anyhow, I have got to get dressed to go outside. I have to get some "Canadian" food for dinner...



The comment above, was added to the web January 23rd, 2012, just in time for the end of the world ( Mayan Calendar ) .


To see an entire page of my INVENTIONS,
at
kidbots.com/WEBADD/INVENTIONS/INVENTIONS.html

GO TO the original page,
INVENTIONS, CLICK HERE .
....
___________________________________________________

________________________________________
___________________________________________________


>

>

>

>

>

>


Because illegal hackers have decided to spam the name
" robin dusty graves" or " robindustygraves "
I have decided to use the same tactics that they use, and load
my REAL web pages with the key search words that would be used
by search engines such as Bing, Yahoo, Google, etc.

As it now stands, searches are re-directed illegally and maliciously by
spammers, who create thousands of fake web pages, that Microsoft's;
BING.com, for example, found and displayed for months - while at the
same time, BING, refused to find DUSTYGRAVES.COM or
ROBINDUSTYGRAVES.COM  when searching for 'robindustygraves' ! ! !
Go figure. This verifies that the hacker/spmmers understand the search
algoithms of BING, YAHOO, GOOGLE, YANDEX, etc., and try to
exploit the engines to put fake spam./hacker pages on the first pages of
legitimate searches. Google and Bing have changed their algorithms, but the
hacker/spammers are never far behind. Yandex always used a different
engine, and was consistently better at delivering valid search results on the
first pages.
 The fake web pages re-direct to pornography, PAY-PER-CLICK websites,
that the spammers get paid a fraction of a penny for each person who
accidentally clicks on them, and to pages where the SERVER is deliberately
set up to spam with POP UPS that state things like " MICROSOFT
WINDOWS ANTI-VIRUS HAS DETECTED A VIRUS - CLICK HERE to continue
Scanning, and Remove the VIRUS" - If you click on ANYTHING,
--the little "X" in the top corner to close, the box on the bottom that
states "CLOSE", -- any action besides CTRL-ALT-DELETE ( to bring up
the Windows Task Manager, to CLOSE your Browser entirely! ) it will
download a virus that generates a continual barrage of fake VIRUS
warning alerts, that demand Visa and Mastercard to remove- If you are
foolish enough to actually GIVE your Visa or Mastercard, the information
is used to make illegal purchases, AND the virus is NOT removed!
 Many fake web  re-directions take you to a page that appears to
"LOAD" for a long time with an hour glass or "now loading" ICON, but,
while that is happening, your IP address, your specific geo-loacation,
your specific information on YOUR computer, etc. is being gathered,
and by the time the fake web page actually loads, often with a FAKE web
"SEARCH PAGE" ( Pay-per-click), your computer is already compromised,
and is subject to further hacking from that point onwards...


 


  robin dusty graves
  robindustygraves
  robindustygravz
  robingravz robin-gravz

  robin dusty
  robindusty
  dusty robin
 dustyrobin

  robindusty.com
  robin-dusty.com

  ROBIN-DUSTY-GRAVES
 
QUEBEQUISTAN.com  
  robin-dusty-graves.com
  ROBIN DUSTY GRAVES
  robin dusty gravz

 
PSYCHOMOBZ.com  
  ROBINDUSTYGRAVES
  ROBINDUSTYGRAVES .COM
  robindustygravz.com

  robindustygraves.com

  HELWYCH.com  
  helwychz.com
  dustygraves.com
  dusty-graves.com

  robin@dustygraves.com
  DUSTYGRAVES.COM
  ROBIN@DUSTYGRAVES.COM
  DUSTY ROBIN.COM
  DUSTYROBIN.COM

  gravitational research
  GRAVITATIONAL-RESEARCH

   GRAVITATIONALRESEARCH.com    
  GRAVITATIONAL-RESEARCH.COM
  KID BOTS
  kid bots   

kid-bot.com
  kid-botz   

  kids-bots.com
  kidbotz   
     kidbot.ca

 KIDBOTS.com    
  kid-bots.com    
    kidbot.org

  kid-BOTZ.COM    
  kidbot.co

  KIDBOTS.COM     
  kidbot.info
  kidbots.net    
       kidbots.ca
  kidbots.info      
     kids-bot.com

  robindustygraves@kidbots.com

  ROBINDUSTYGRAVES@KIDBOTS.COM
 
BIRD_BRAINZ.html       


  BIRD-BRAINZ
 
BIRD_BRAINZ.com   


   bandecrooks.com
 
B and E crooks.COM



  OTIS_MCDONALD.COM



  CLOUDFARE



   GOOGLE-ROBOT.COM


  
  CONSPIRATORIALTHEORY.COM



CONSPIRATORIALTHEORY101.COM



V G R . SPACE



The Real Good Book . com



PIOUS SANCTIMONIOUS
HOLIER THAN THOU.com

___________________________________________________ ____

 ___________________________________________________

_________________

Real Science is a fascinating subject, unlike the decades of what
was typically taught in schools that I endured, that tries to KILL
every shred of imagination, of hope, of possibility, and instead,
fills the time with memorizations of WHAT CAN NOT BE DONE!

Nothing can travel faster than the speed of light...

Nothing can get colder than absolute zero.

Matter can neither be created nor destroyed... etc etc.

( All wrong! search Richard Feynman, for a lecture on this! )

There are always a handful of educators, scattered here and there,
who is interested and therefore
interesting, and who keep
mankind from falling back into the Dark AGES !


With the String theory, and new discoveries of the last few years,
we are on the brink of an entirely new era - and I can't wait to see
what happens next! This is a wondrous and magical time, with the
doors of science wide open again - and the view is breathtaking!



**Clarke's Three Laws are three "laws" of prediction formulated
by the British writer   
Arthur C. Clarke. They are:

1/ When a distinguished but elderly scientist states that something
is possible, he is almost certainly right. When he states that something
is impossible, he is very probably wrong.

2/ The only way of discovering the limits of the possible
is to venture a little way past them  into the impossible.

3/ Any sufficiently advanced technology
is           
indistinguishable from magic.

(thanks to wikipedia)




have fun

Robin Dusty Graves


( Life, is an experiment, please don't destroy the Lab!
-- robindustygraves -- )



 

 

YOUTUBE_EFIE_PART_1

YOUTUBE_EFIE_PART_2

ELEMENT_GOVERNMENTIUM

MAYAN_WRITING

GRAVITATIONAL_RESEARCH

ROBIN_DUSTY_GRAVES.COM

KIDBOTS.COM

OBAMA_SUPERSTAR_VIDEO


HYDROGEN_FUEL

INVENTIONS

POWER_BAR


LAB

SIMPLE_EFIE

PERMANENT_FIREWORKS

ATI_SMBUS


COFFEE

LAPTOP_REPAIR

BOOKS_OF_BIBLE

BLACKBERRY_9300_KIDBOTS

ORIGIN_OF_MANKIND

ORIGIN_OF_CHRISTIANITY

65_WIND_UP_GIEGER



BIRD_BRAINZ
BELOW: An interesting look at colours, birds,
dinosaurs, girls, and DNA, as well as "seeing"
magnetism, and "invisible" ELECTROMAGNETIC
RADIATION spectrums. All females must read !

 
COFFEE


COFFEE IS LIFE

As a severe coffaholic, I have a web page
devoted to all things coffee! My COFFEE
spokesperson, ABOVE, is such a wonderful
YOUTUBE character, that she is now a 
millionaire! If I said the exact dialogue,
no one would even look! lol


PALM Z22 REPAIR
AND MAINTENANCE

BELOW: HOW TO REVIVE, RESTORE, REPAIR
AND MAINTAIN THE TYPICAL, OBSOLETE, PDA ,
"PERSONAL DATA ASSISTANT" FROM PALM PILOT,
AVAILABLE JUST BEFORE SMART CELLPHONES
LIKE THE BLACKBERRY, TOOK OVER THE
MARKET. THE Z22 IS WONDERFUL AS A FULL
FEATURED PASSWORD KEEPER, AFTER
MAKING A FEW SECURITY MODIFICATIONS !



BELOW:
AMAZON.CA REVIEW OF HDE
PINHOLE CAMERA AND CCD
MONITOR


-REVIEW ON MY WEBSITE-- kidbots.com  -

AMAZON HDE CAMERA AND MONITOR REVIEW

http://kidbots.com/WEBADD/VARIOUS/REVIEW/AMAZON_CAMERA/AMAZON_CAMERA_REVIEW.html



ETERNITY MACHINE
A LOOK AT THE DEVELOPMENT OF USING
A VERTICAL WIND TUNNEL TO ALLOW
UNLIMITED FREE FALL "SKYDIVING"




EARTH_MONKEYS
A LOOK AT HOW ALL HUMANS
ON EARTH ARE GENETICALLY
ALTERED FROM THE BASE
"BIGFOOT" "APE", COMBINING
TWO GENES INTO ONE, SO
THAT THE ANUNUKI ( GOD)
GENE WAS DIRECTLY
COMPATABLE FOR GENE
MODIFICATIONS. THE
EARTH_MONKEYS ARE 1/2
ANUNUKI HEIGHT, LIVE
1/10TH ANUNUKI LIFETIME,
AND HAVE A BRAIN 1/3
THE SIZE. AS SLAVES, THIS
MAKES the "HUMAN" EASY
TO CONTROL AND LESS
THREATENING.
SINCE EDUCATION AND
KNOWLEDGE ARE THE KEY
TO POWER, THE EARTH-
MONKEYS ALL DIE BEFORE
THEY CAN USE THE
KNOWLEDGE THAT THEY
GAINED FROM THE GODS.
THE ANNUNUKI WOULD
SEE 10 GENERATIONS OF
EARTH MONKEYS IN THEIR
LIFETIME, AND CAREFULLY
CONTROLLED KNOWLEDGE
OF ALIEN ( GODS ) SCIENCES.
IT WORKED. SINCE THE SHIPS
ARRIVE EVERY 5000 YEARS
(FOLLOWING THE MAYAN
CALENDAR) AFTER A FEW
THOUSAND YEARS ALL THE
ANNUNUKI HAVE DIED,
LEAVING THE EARTH-
MONKEYS TO FIGHT AMONGST
THEMSELVES TO TAKE CONTROL

PREDICTABLY
-- AND IN DOING SO, DESTROY
THE EMPIRES, AND THE ALIEN
TECHNOLOGY! THE CYCLE
REPEATS FOR MILLENIA!
HILARIOUS AND PATHETIC!
.
Picture
World Famous christian Archaeologists labelled
the electrical Photon Generators, above, as
"EGGPLANTS", hiding them from the public.
ABOVE: This is an EGGPLANT, unless you have a
University Degree, in which case, it could be an advanced
electromagnetic radiation generation tube. . . . . .


 
ABOVE PHOTO : This is a perfect University
graduation gift - while little people waste
all sorts of time worrying about which label
goes where, with a University Degree, you
can put any label, anywhere you want,
without any fuss. This DYMO requires no
power so that no matter how remote
your archaeological site is, or how many
months you spend, it always works!
After days, weeks, months, years of
classes and books, FINALLY, you can just
TAKE IT and STICK IT .


 





.
OTIS MCDONALD
Otis McDonald gained International attention
by winning a U.S. Supreme Court case
which ended laws which had been in
effect since the days of SLAVERY.

ABOVE: OTIS MC DONALD STANDS
IN FRONT OF THE COURTHOUSE
AFTER WINNING THIS LANDMARK
VICTORY.

.


.CLOUDFARE

CLOUDFARE gives you FREE WEB HOSTING
-DUPLICATE YOUR ENTIRE DOMAIN SERVER
-FREE RE-DIRECTIONS
-FREE- SSL CERTIFICATES
-FREE HIDDEN TRIPLE NESTED WHO IS
-IMPOSSIBLE TO TELL YOUR SITE IS FAKE !
-COPY ANY COMPUTER SERVER IN THE WORLD !
-GOVERNMENT, BANKS, MILITARY, FINANCIAL !
-INSTANTLY INCREASE YOUR PROFITS !
What's that you say, ole boy? _ Only in CANADA? !
What a Pity!
The CLOUD taketh ALL 

NOTHING CAN HIDE FROM THE
CLOUD
- INSTANT MEGA PROFITS !
- INSTANT BITCOIN PAYMENTS !
- IF MONEY CAN BE MADE
-  THE CLOUD WILL FIND IT !


-- MAXIMIZE YOUR PROFITS !

OUR MOTTO:

NO STONE LEFT UNTURNED

OUR PROGRAMMERS ARE
WORKING ON PHASE 2 :

(CODE NAMED)

SCORTCHED EARTH

TO CAPTURE EVERY
POSSIBLE PENNY FROM
THE INTERNET !
USING VAST TERA-BYTES
OF META-DATA
SIPHONED

 FROM 18 GAZILLION
UNSUSPECTING CUSTOMERS
WE HAVE DEVELOPED
RE-DIRECTION TECHNOLOGY
INCREDIBLY MORE DEADLY
ACCURATE IN GENERATING
$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
VASTLY SUPERIOR TO
YESTERDAY'S SIMPLE PORN
VIRUSES, POP-UPS, ILLEGAL
DRUGS, GAMBLING ETC.
FEED THE ADDICTIONS !

BITCOINS FOR FREE !
UNTRACEABLE !





NEW :  FEBRUARY, 2019

DELIBERATELY MANUFACTURED Flaws, Hidden
Back-Doors, Secret Master Keys, Defects, etc.,
in ALL typical locks sold in North America.

     B AND E CROOKS.COM
In Canadian common SLANG, " B AND E" stands
for the hourly BREAK AND ENTER crime that
happens in every location from sea to shining
sea, across the Nation. This will be an on - going
look at the HORRID state of affairs of so-called
"LOCKS" and Security, commonly used all over
North America. Simply put, ANY locking system
in North America is deliberately manufactured
with well known flaws, exploits, tricks, secrets,
etc., so that anyone who BOTHERS to type into
Google can get over 1 Billion pages of
"HOW TO OPEN ANY LOCK"-
 and, really, . . . . you actually CAN DO SO !
ABOVE:   this Gutter Snipe Trollup defiantly
displays the LOCK she picked to escape the
chains to the Jaquard LOOM.  see:
  B-AND-E-CROOKS.COM



kidbots.com/GOOGLE/
    
kidbots.com/GOOGLE/
     kidbots.com/GOOGLE/ is a page about
     one of my first ROBOT models, used to interface
     to a typical (in order of manufacture)
     8086, 8088, 80186, 80188, 80286, 80386
    type of computer that was thrown out by
    the millions.
GOOGLE was very simply designed
    with few parts, and few wired connections,
    to test the INTERFACE to the typical 80186
    computer I was using.  Since thieves here
    in Ottawa stole my 2 Desktop computers,
    adding information on this robot, will be
    slow and sporadic! Stay tuned ! There will
     be many pages detailing GOOGLE_MAPS,
    and GOOGLE_TRANSLATE, as well as the
    robot GOOGLE itself.
   
TYPICAL_IBM_TYPE_80186_COMPUTER
    This motherboard uses the INTEL 80186
    which hundreds of HIGH-END manufacturers
    produced. These were more expensive
    and powerful than the typical home computer.
    Kids and inexperienced Computer people
    will tell you that there is no such thing as
     an IBM type 80-186 computer ! ( weren't
    there, didn't see it, didn't do it !  lol )
     I still HAVE this motherboard. Luckily, it
    was not in storage where over a hundred
    old computers were stolen by thieves. . .

 

________________________________

______________________________________________________



So far, this winter, I am NOT far enough South... Just as the weather
got warm, and the roads were dry, we got a huge snowfall, that lasted
days! After shoveling snow for a few hours I built a 7- foot snowman,
that says it all!


                                                                                                     
                                                                                                    



DUSTYGRAVES Dusty Graves dustygraves.com dustygraves.com DUSTYGRAVES.COM robin dusty graves ROBIN DUSTY GRAVES robindustygraves ROBINDUSTYGRAVES robindustygraves.com robindustygraves.com ROBINDUSTYGRAVES.COM robin@dustygraves.com ROBIN@DUSTYGRAVES.COM kidbots.com  kidbots.com KIDBOTS.COM ROBINDUSTYGRAVES@KIDBOTS.COM robindustygraves@kidbots.com GRAVITATIONALRESEARCH GRAVITATIONAL RESEARCH gravitationalresearch gravitational research GRAVITATIONALRESEARCH.COM gravitationalresearch.com  gravitationalresearch.com


 

_________________________________________________

robindustygraves.com, dusty-robin.com, bandecrooks.com, helwych.com,
kidbots.com, b-and-e-crooks.com, quebequistan.com, psychomob.com,
kid-bots.com, kidbotz.com, helwychz.com, kid-botz.com, bird-brainz.com,
robin-dusty.com, dusty-graves.com, psychomobz.com, otis-mcdonald.com,
gravitational-research.com, kids-bot.com, kid-bot.com, kids-bots.com,
kidbot.ca, kidbot.org, kidbot.co, kidbot.info, gravitationalresearch.com,
robindusty.com, robin-dusty-graves.com, robindustygravz.com,
dustyrobin.com, dustygraves.com, bandecrookslocksmith.com,
b-and-e-crooks-locksmith.com, cloudfare.ca,



robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ



robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ


robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ
robindustygraves BIRD_BRAINZ     robin dusty graves BIRD_BRAINZ

.

robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ

robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM

robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM
robindustygraves BIRD_BRAINZ OTIS MCDONALD.COM



robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ

robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ
robin dusty graves BIRD_BRAINZ      robindustygraves BIRD_BRAINZ

THIS PAGE IS DELIBERATELY DESIGNED IN


NOTICE: A number of people have commented that various
readers of my many web pages, who are of some select
race, colour, creed, sect, politic, philosophy, gang, mob, cabal,
religion, horde, cult, clique, belief, affiliation, or whatever,
may, -- particularly if they do not have ENGLISH as their
first language--, and are ignorant of litotese, synechdoche,

onomatopeia, hyperbole, pathetic fallacy, anthromorphism,
personification, simile, sarcasm, irony, metaphor, metonymy,
rhetoric, consonance, alliteration, allegory, anaphora
,
asyndeton, epigraph, epistrophe, euphemism, oxymoron,
and other common literary techniques, -- be offended.
  It is most definitely NOT my goal, to single out any group
or individual, in such a way, and thus, in an effort to treat
everyone absolutely fairly and EQUALLY, I would ask anyone
who feels that they are NOT being treated the way I treat
everyone else in my pages, to CONTACT ME, and I will make
a few quick CLICKS on the INTERNET to find huge amounts
of material, which can be used to write a typical paragraph
so that they, too, may, --by not reading carefully, by not fully
comprehending the implications, by ignoring obvious facts,
by Not understanding literary techniques, by looking
only at the pretty pictures and avoiding the text-- etc., be
offended like everyone else. Fair is Fair! Equality for ALL !
 robin dusty graves
O

N
ABOVE : A gratuitous inclusion for the
Neanderthal, MCP, morons who attack
BIRD_BRAINZ ! Ironically, they will
agree with every word !  lol


 
E LONG THIN COLUMN, TO FIT A TYPICAL
CELL PHONE. (( SOME MORON KEEPS GOING
NEW : June 8th 2020
I was looking at the riots and turmoil in the
UNITED STATES over white vs. black
issues a few days ago, and thought that
there REALLY should be a T-SHIRT that
demarcates many individuals. Here is my
new design - never seen before !
INNOCENT_BYSTANDER
INNOCENT_BYSTANDER T-SHIRT DESIGN BY robin dusty graves

ABOVE: while there are "SWAT"
"POLICE", SECURITY, etc., printed
everywhere, NO ONE yet has
worn the clear message :
 INNOCENT BYSTANDER  !

lol - order yours today!
just invented 3 days ago!
robin dusty graves




(( after I made the T shirt design, I
emailed Jay Pharoah. I figure he
could use the design in follow up
entertainment routines !


  JAY PHAROAH
https://www.nbcnews.com/pop-culture/celebrity/ex-snl-cast-member-jay-pharoah-says-los-angeles-police-n1231009
))
.
.
.
IN AND BLOWING MY FORMATTING TO HELL
SO THAT IT LOOKS LIKE GARBAGE, AND I KEEP
GOING BACK IN AND FIXING IT. I DONT GIVE
A DAMN WHAT IT LOOKS LIKE ON A TYPICAL
HUGE, HIGH-RES, WIDE SCREEN, NEW MONITOR
IN SOME IDIOTS OFFICE-- IN ADVANCED
COUNTRIES LIKE JAPAN AND SINGAPORE,
OVER 80% OF ALL INTERNET IS DONE ON
MOBILE DEVICES. SO BE IT. EVENTUALLY,
WE WILL BE THE SAME. ))