DUSTYGRAVES Dusty Graves dustygraves.com dustygraves.com DUSTYGRAVES.COM robin dusty graves ROBIN DUSTY GRAVES robindustygraves ROBINDUSTYGRAVES robindustygraves.com robindustygraves.com ROBINDUSTYGRAVES.COM robin@dustygraves.com ROBIN@DUSTYGRAVES.COM kidbots.com  kidbots.com KIDBOTS.COM ROBINDUSTYGRAVES@KIDBOTS.COM robindustygraves@kidbots.com GRAVITATIONALRESEARCH GRAVITATIONAL RESEARCH gravitationalresearch gravitational research GRAVITATIONALRESEARCH.COM gravitationalresearch.com  gravitationalresearch.com





VANCOUVER_THIEVES


After travelling across Canada over the last 1/2 CENTURY, I have lived in many, many, places.
From Fredricton on the East Fishing coast, through Montreal, Ottawa, North Bay, Pembroke,
Deep River, Chalk River, Barrie, Mississauga, all over the Toronto area, Niagara Falls, Hamilton,
Ripley, Southampton, Meaford, Sydenham, Kingston, Gananoque, London, Byron, Kitchener,
Waterloo, Guelph, Calgary, Edmonton, Brooks, Renier, Provost, Beaverlodge, Princeton,
Ashcroft, and all around the Abbotsford/ Vancouver corridor, etc. etc., not to mention areas in
United States around Los Angeles and New York... I can compare regional differences, and the
differences in each area as they CHANGE with years and economic fortune.
Half a Century of observation allows a perspective that carries a substantial amount of validity and
weight. My "opinion", though, is just that, an "opinion", and as Clint Eastwood said in a Dirty Harry
movie, "Opinions are like a**holes", so that everyone has their own, and this one, is just "mine".

Since I started coming out to Vancouver in 1978, I have seen many changes. One of the
most prevalent changes has been the escalation of CRIME, in the Vancouver area. I have
relatives here, and friends, and "observe" behavioural patterns in Vancouver, that place it
very high on the list of Canadian cities that has a growing issue with Security and personal
safety.

If I wrote an article, entitled
"WARNING - Safety and Security Issues You Should Be Aware Of"
no one would bother to read it. Everyone I know is overloaded with TV, Radio,
Newspapers, and Internet eMail, Facebook, etc. and they just do not have the TIME or
the patience to deliberately seek out any more information ! Can't blame them. I deliberately
dropped FACEBOOK, since it quickly grew into a massive deluge of Posts, Walls, friends-of
friends-of-friends, and I made the mistake of giving Facebook my real email, which quickly
became so overloaded with "So-And-So has invited you to join "save the whales" or "save the
rain forest" " or whatever, that I could not even FIND my email...

If anyone "wants" my opinion, it is sitting here. Otherwise, they can just ignore it, and do something
important like watch the Hockey game, or watch a Movie star get married, or watch cartoons, etc.
If you really want entertainment with cartoons, and CGI, and Animation, watch FOX NEWS.

http://www.youtube.com/watch?v=M5-xcvv_fRQ Youtube video,
LINK HERE

This page is started March 03, 2012, just before the END of the WORLD, as media and hype over the
end of the MAYAN CALENDAR would predict, for example, in the movie "2012" which is said
to occur starting in December, 2012, around the 22nd to 24rth, just in time for Christmas!
I will be composing this over the next week or so as I pack, in preparation to move, since my lease
ends, March, 31st, at midnight, just in time for the Government of Canada's Fiscal Year beginning-
April 1st (April FOOL'S DAY ) appropriately!.











Hilarious copies of my door Lock that appeared within a year of my design...
These pictures are from 2 companies in CHINA offering various versions of
my early prototypes - complete with the design FLAWS that should have been
fixed. I would not advise purchasing these! I have identified 6 CHINESE companies
using my new lock designs. None of them encorporate the ENTIRE lock, with
all the features, used all at once. Since I never finished the lock system, all the
copies are 'defective'! (As are the two shown above...) Since I am the one who
originally designed the lock systems, I am very well aware of the problems and
defects...



You do not have to be a locksmith to see that this otherwise "ordinary"
North American key blank, has some very unusual features. This is
for my crude, early prototype lock that has Electronics in it, and uses LIGHT
as one of the security features. There is a long , funny story, that I hope to
have time to document, that goes along with this...! If you know a friend
who is a locksmith, have them look at this key and try to guess what is
happening! A good locksmith will see this, not as a 'key', but as a puzzle, that
needs to be solved. My new keys are substantially more advanced, and
complex, but this gives you a rough idea... Even so, I have never yet, made
an entire, complete key.
How does a thief defeat a key / lock system like the one above? -- Simple,
go in through a window, or remove the door entirely, and replace it with another
one! Who would expect the entire window or door to have been replaced!
Gotta watch very closely for this kind of magic act! Once on the "inside" they
can diss-assemble the locking mechansim, and reverse engineer it, and put it
back ( incorrectly) so that it is easy to 'walk in' on the next "visit" !







DATONG Road, Shanghai, China. A Government Hacker Building, one of dozens
identified, with Internet I.P. addresses linked to computer hacker attacks on companies
in United States. The Reporter taking this picture was DETAINED and questioned by
Chinese authorities! (It is obviously just an 'ordinary' office building... yeah, right! -
under 24 hour government security surveillance! )









BELOW: one of hundreds of CELL PHONE spy programs, available. You can now
install these from remote locations, without the USER hearing or seeing anything,
and turn ON the cell phone, even if it is off, and use the microphone to listen, live,
from any computer in the world. The lights, and speaker on the spy phone remain
"OFF" so the victim has no indication that the phone is "ON" and active... the only
indication that a victim would have, would be a "short" battery life. CONTACT lists,
EMAIL, Incomming and Outgoing call lists, Memos, Calendars, everything, is
accessible from any computer in the world.

 

World Tracker turns anyone into a cellphone spy

by Marc Perton, posted Jan 20th 2006 at 3:10PM

Forget those piddly wiretaps. The next frontier in warrant-free surveillance is upon us, and it's open to everyone. A UK service called World Tracker apparently uses cell tower data (or GPS, when available) to track the location of just about any GSM cellphone. Just enter the number you want to track into the service's handy Google Maps-based interface, and you'll be able to zoom in on the device's location, with accuracy somewhere between 50 and 500 meters. The first time you try to track a phone, a text message is sent to the owner, who must reply in order to enable tracking (we'll leave it to you to figure out how to work around this if you need to track a spouse, kid or employee). The service is currently compatible with O2, Vodafone, Orange and T-Mobile in the UK, and has plans to expand to other markets including Germany, Spain, Norway and the US. If, that is, privacy advocates don't shut it down first.




 

TECH REPUBLIC ARTICLE RECENTLY :

IT Security

Understanding what motivates Chinese hackers


-
By Michael Kassner


April 22, 2013, 10:16 AM PDT
Takeaway: Michael P. Kassner, with the help of a noted academic and author, looks at what
motivates Chinese hackers. It may not be what you think.
With the number of Chinese citizens reaching 20% of the world' s population, they' re going to have
an impact in any endeavor they take on. Consider the Internet - China has more users than any
country in the world, nearly twice the number as the United States (courtesy of
internetworldstats.com).

Another area where the Chinese are exerting influence is the ability to manipulate the Internet. As
proof, consider the NSA-originated competition TopCoder Open:
TopCoder Open is a world-wide programming and designing tournament open to all TopCoder
members 18 and older who meet the eligibility criteria. There are six competition tracks:
Algorithm, Design, Development, Marathon, Mod Dash, and Studio Design.
In past years, the Chinese have crushed the opponents, some say by sheer number of entries,
but I doubt that' s the only reason. In 2009, China had 20 finalists: the United States had two.
Last year, 2012, China fielded two finalists, the United States : none.
Where' s this going?
Anyone the least bit interested in ' things cyber' understands why the relationship between China
and the United States is tense, so no sense wasting electrons venturing down that media-saturated
path. I prefer to take some advice from a very astute gentleman I knew, my grandfather, never
forgetting his gentle reminder, Things always go better when you know, really know, the other
person's story.'
To that end, I hooked up with Professor Nir Kshetri from the University of North Carolina.
He' s been helping me understand something overlooked by mainstream media ' cultural differences.
I first became familiar with Nir' s work through his book, Cybercrime and Cybersecurity in the
Global South. I learned rather quickly I needed help comprehending the complex cultural
implications. With a deadline bearing down on me, I shamelessly barged into Nir' s life

Note: Before we take a look at what I learned, I thought I had better address the controversy
surrounding the term hacker. Nir and other experts use hacker throughout their papers. So, to
keep things simple, let' s continue using hacker, associating the term hacker with highly skilled
individuals who break into computer systems and networks.
Definition of Internet
Right from the start there is a dramatic difference of opinion regarding what the Internet and its
governance mean to China and the United States. The Chinese government according to Nir:
[E]mphasizes the importance of creating and promoting a healthy and harmonious internet
environment. It is important to elaborate this point. A healthy cyberspace is ' porn-free,' ' crime-
free,' and ' harmonious,' meaning it does not threaten to destabilize the state' s social and political
order.
How does that compare to your version of the Internet?
Information security versus cybersecurity
This next difference is complicated, I' m not sure if I get it, even with Nir' s help. But, I thought
I' d toss it out, and see where it lands. China and its allies have a different view of cyberspace
governance than the United States and its allies. China is more concerned about ' information
security' and the United States prefers to focus on cybersecurity. Nir offers an explanation:
They (China) like to control information that is likely to provoke what they call the three evils
(terrorism, extremism, separatism). They also consider it important to prevent other nations
from using their technologies to disrupt economic, social, and political stability.
All I know is if two powerful countries are looking at something like cyberspace governance
that differently, it' s time to talk.
Strong government
It may not be what you or I are used to, but Nir points out the Chinese are tolerant of a strong
state government; especially the post-Tiananmen generation, having experienced little or no
hardship during their lives. Nir adds:
[T]he state has adapted a body of complex scholarship to bolster its legitimacy through invoking
a deep sense of Chineseness among citizens. China' s strong nationalism is arguably related to
ethnicity and race rather than universalistic ideals (e.g., democracy, rule of law, free marketplace)
and institutions. Opposition to the West has become a defining value.
Another divergent viewpoint is, in this case, what constitutes a national government.
Chinese hackers and nationalism
Most hackers are of the post-Tiananmen generation, and have a high degree of patriotism. I
remember reading on more than one occasion where Chinese hackers have left messages
stating they were willing to devote their skills, even their lives to China. Nir agrees:
When Chinese hackers see the honor of their motherland is compromised, they consider it
important to take necessary actions to restore China' s honor, glory, and integrity. They also
consider it their responsibility to fight what they see as imperialism in cyberspace.
Whether you agree or not, Chinese hackers see no wrong in what they are doing; they' re being
patriotic.
Chinese hackers are rock stars
Most people view hackers in a negative context. That is not the case in China. As Nir points
out, Chinese hackers are revered in a fashion similar to rock stars:
[S]tartling is the fact that some young Chinese tend to treat hackers like rock stars, and a
significant proportion of students identify them as positive role models, wishing to emulate them.
According to a 2005 Shanghai Academy of Social Sciences survey 43 percent of elementary
school students said they adore China' s hackers, and one third said they would like to be one.
It would be interesting to see the results a similar survey taken in the United States.
Making headway against cybercrime
From what I' ve read, there appears to be a huge chasm between what the United States thinks,
and China thinks about their eliminating cybercrime within China, and cracking down on global
hacking. According to Nir, here' s what the Chinese think:
Chinese officials argue they should be praised, not criticized, for taking measures to control
cybercrimes at home and collaborate internationally.
Nir cited a few examples of why they feel that way. In 2009, China added computer crimes to its
Criminal Law. The penalty for hacking is a seven-year prison sentence. Next, Nir referred to a
China.org.cn article that mentioned:
[T]he country' s police have destroyed more than 80 criminal gangs involved in computer hacking,
the online theft of data, and running botnets to spread malicious software.
One similarity at least People have mentioned, with more than a little sarcasm that my home
state of Minnesota is the only state to have been governed by an All-Star professional wrestler.
That is true, and I' m thankful for one special piece of wisdom passed on by
Mr. Jesse Ventura: If you want to know what' s going on, follow the money.
If China and the United States have one thing in common about the Internet, it is the quest for
money. Nir told me about two examples where the Chinese government has decided not to
enforce certain regulations as they would create a financial burden.
The Green Dam Youth Escort program had several flaws, but the one that appeared to put a
stop to loading the Web-filtering software on every computer made in China was the added
cost. Another example is the regulation requiring bloggers to register using their real names. Sina
Weibo, the popular Chinese version of Twitter, did not abide by the regulation: stating the
company would lose customers and untold revenue. As of mid-2012, Sina Weibo has over
360 million registered users.
Final thoughts
China is a big, rapidly growing, and complex country that is flexing its newly-found muscles.
The operative word to me is complex. I' ll leave you with one final example of that complexity.
Chinese allegations against the United States only come from top-level government officials.
United States allegations against the Chinese come from the government officials, tech-media
types, and private sector security professionals. Nir explains:
China' s strong state and weak civil society means criticism, by China' s private sector and
security analysts, of foreign-originated cyber-attacks is practically nonexistent: probably
because of the strict censorship by the Chinese government.
I' ll end by reiterating my grandfather' s wisdom, ' Things go better when you know the other
person' s story.

-
About Michael Kassner
Michael Kassner is currently a systems manager for an international company. Together with
his son, they run
MKassner Net, a small IT publication consultancy.

MY REPLY TO THE QUESTION
 

LINK to discussion
http://www.techrepublic.com/forum/discussions/102-403383?tag=unit-hot-disc;hot-disc0


I have been going back and forth to HONGcouver, since 1978. In 1990-
1992 I tried to locate Chinese sources to manufacture an idea that
I prototyped over 6 years. I had meetings with people, who had
factories in China, who were Chinese, and who flew back and forth
from HongCouver on a regular basis. Nothing went anywhere, but after
I left, returning to Ontarrible, I found my idea being manufactured in
China, with 6 different versions - one version in particular, most
hilariously, made a huge advertising distinction, as the only one
that, once activated, turned off all touch-sensitve current. At the
meetings with Chinese over 2 years, there was one obviously powerful
guy who grilled me on how my device worked, and who kept asking if
it was possible to turn OFF the touch sensor current, once the device
was activated - I pointed out that the touch sensor was powered by
a typical 2032 button battery, commonly used as the CMOS clock
battery in computers ( 2032 - 2.0 centimeters wide, 32 mm thick ,
nominal voltage, 3.0 Volts ). The current used as a touch sensor
went through a resistor, to the BASE of a transistor, so the
current used was in the 10,000 ths of an amp! ... - there really
was no danger of electrocuting anyone, but, yes, once activated,
the current could go through another transistor that turns "off"...
He was obviously planning his marketing scheme, for "HIS" new
invention, as he was asking me questions!
I am composing an entire section called "Vancouver Thieves",
since you would have to experience it to believe it... My Bank
card was "compromised" 6 times in a year... All my WASP ( White
Anglo-Saxon, Protestant ) Canadian born, English speaking friends
( all 6 of us ), are anally retentive about leaving ANYTHING in
their cars that is visible - even a package of cigarettes on the
seat is an 'invitation' to have the window smashed. Bags, jackets,
whatever, - forget it, you might as well take a hammer and smash
the windows yourself.... ALL my banks closed mysteriously for 3
or 4 days - including the Automated Tellers. My friend, who was
born there, said later that HIS bank was closed for a few weeks.
A Chinese manager, got the head position, and, over a few years,
fired all the 'Canadians", replacing them, one-by-one, with
people from CHINA.... Finally, the R.C.M.P., shut down the entire
bank, since BILLIONS in illegal Chinese currency was being laundered
through the bank!
At the same time, reports in the Vancouver SUN newspaper told
stories of the CASINOs in the area being watched closely, since
untold MILLIONS of dollars were exchanging hands - Chinese men
would come in with briefcases stuffed with millions of dollars,
and buy "CHIPS" -- ie, laundering money... The casinos, delighted
to have that kind of revenue, complained that " the transactions
were completely legal"... um, well,... sort of...
I saw the most unbelievable things in Vancouver, a city that
Statistics Canada OFFICIALLY announced, had "Chinese" as the
dominant population --- I did not need Stats Can to figure that
one out! At one of my banks, Toronto-Dominion, that has the
longest "open" hours of any bank in Canada - 8 A.m. to 8 P.M,
with a good 5 to 10 tellers at any given moment inside, I wanted
to use the ATM (Automated Teller Machine) in the outer lobby.
Much to my surprise, there were 6 people in line. That never
happens. 2 people were in the line behind me, as I waited, watching
a short, older Chinese man, open, one by one, a large stack of
envelopes. He would open the envelope, take out a check, put it
in a deposit envelope, punch in a bunch of numbers, and for
AMOUNT, put in $20,000.00 . Then he would open another envelope,
and continue on the stack of envelopes. I waited ten minutes or
more, and finally he glanced over his shoulder, and realized that
there was a long lineup, and grabbed the stack of un-opened
envelopes, and left... I would guess he had Hundreds of Thousands
of dollars in the pile left, and he had been there a long time
before that... Where, besides Las Vegas, would you see someone
depositing hundreds of thousands of dollars into an ATM?
( I estimate the total to be around 1 Million dollars!) Get used
to it, this is HONGcouver, and strange, is the norm...!
I just read an article where the huge asian manufacturer, LG,
was bragging about sending people around the world, on a sort of
permanent vacation, to the tune of hundreds of millions a year --
just to look for ... " ideas ". That is a smart, investment -type
of policy. The other side of the coin, is that there are roving
bands of "idea" purveyors, and the competition to keep those ideas
coming in, is a dog-eat-dog adventure. Once it was realized that I
am an inventor, and constantly coming up with "IDEA"s, my normal
Canadian life, as anyone would reasonably expect, was over..!
The complete, 5-year plan to take over a Canadian Bank, deliberately
to launder Billions of illegal Chinese currency, shows the long-term,
planning, and dedication, and mentality, that a certain faction
of the Chinese "immigrants" have. I saw stuff that you simply would
not believe, and you would have to catch it on VIDEO before anyone
would believe.... Security is a HUGE issue in HongCouver, and the
Alarm and Security companies are scrambling to keep up -- for every
security feature you can "BUY" ( get this.... made in CHINA !) there
is an unbelieveable method / ploy/ hack/ or mechanism, to defeat it.
Get an alarm system that uses a Cell-Phone, built in, to call you
if there is a problem. ... well... It is MADE IN CHINA, and your
Cell Phone is MADE IN CHINA, and the Cellular Network ITSELF has
equipment MADE IN CHINA, and .... on technical websites such as this,
was an article, where, against the SPECIFIC advice of Canada's R.C.M.P.
and C.S.I.S. police, and against the F.B.I. and C.I.A. in the U.S.,
large telephone switching computers in North America were being
"UPGRADED" with main frame switching computers -- MADE IN ASIA...!
Oh, but it gets better, the computers contain Terabytes of code that
no one has looked at! The R.C.M.P. warned that there "COULD BE" a
back -door somewhere in the software- well I guess...
I have a keychain photo frame, which was a popular 'gift' idea
a few years ago. They were everywhere, - and, sure enough, all the
anti-virus companies put out a warning - AFTER a year or so, that
all the software used on the photo frames could be traced back to
one ASIAN company that hid a trojan in the software, that allows
ASIAN hackers to take over the user's computers. I still have the
original installation disk with the trojan "back-door"... The
fact that millions of U.S. and Canadian 'gift-buyers' installed the
"back-door" on millions of computers, seems a point that most people are
oblivious to! ...
I have been fascinated with locks and mechanical devices, since
I was 6. I consider myself a reasonaably good amature locksmith. BUT...
I am a rank amature compared to the professional Break and Enter
( B&E) thieves from China. I swear these guys have a SCHOOL - what to
you want to be, an electronic alarm hacker, a mechanical lock hacker,
a computer software hacker, a telecommunications distribution hacker,
a.... whatever, because these guys have knowledge and equipment and
skills that would astound you... The room I kept my computer and electronics
in was constantly broken into... I had WIRED internet alarms, wireless
GSM Cellphone alarms, local alarms, video cameras, and custom made
locks and saftey devices. In what must be the funniest thing in the
entire collection of security and alarm stories -- they not only defeated all of
the above, shortly before I left, BUT, they edited the video surveillance
footage, stole some of the locks and alarms, and now are MANUFACTURING
my hand-made door lock in CHINA- complete with all the flaws! I was not
able to properly finish all the design and machining, so they COPIED
the un-finished prototypes, and YOU can go online and buy them! (but
don't, they all have known flaws, that I can easily point out!!! )...

So why didn't my WIRED internet ( CABLE ) work? Ever see a white,
unmarked VAN, parked on the side of the road, with a guy with a ladder
climbing up a pole to do maintenance on Bell Phone, Cable, Optical,
or Hydro. 19 out of 20 workers that I saw, ( and I was counting), were
Chinese. Does anyone stop, and ask to see their ID? nope

So why didn't my GSM Cell phone alarm work? I hang out in a very technical crowd, and
at the Abbottsford Flea Market, (near Vancouver) someone bought an $800 cell phone
jammer ( MADE IN CHINA ) that could take out a 4 Kilometer section of
the city. And that is just a cheap one,- if you fork out big bucks, you
can knock out half a city, easily. Money talks. So, how did they defeat
my hand made lock and key , with a hand-made electronic double lock?
Easy. I lived in what was known as a "VANCOUVER SPECIAL". A floor plan
that was built by the thousands, just modifying the exterior, flipping
the floor plans, adding little roof modifications, but, basically, the
identical unit, mass produced. Many people people upgrade the windows,
and doors, etc. with more weather tight, energy efficient designs, so
there is a HUGE supply of "USED" doors and windows, that are all
IDENTICAL. You can buy an entire aluminum framed window unit, cut the
glass on your intended B&E target, get inside, steal, modify, do
whatever, and clean up the glass, and put in IDENTICAL sliding windows.
PRESTO. No sign of forced entry! Whoopee. Unfortunately, the main
electrical panel for the house is in the garage at the back, so the
power was turned off. The telephone was dead. The cable was dead. The
Cellular network was dead. Quickly, quietly, efficiently, with such
skill as is almost unimaginable. Although it seems like something out of
a movie, things ARE reported occasionally in the press- like the
CHINESE passenger coming into HongCouver International Airport,
wearing an entire head mask and torso
of an old man. The guy was about 24, but the entire molded
head and upper torso, was of an 80-year old. I was in a Coffee shop,
in Vancouver, and this old guy came in, walking bent over, slowly,
but,-- he dropped his wallet, and I realized he was practicing his
act, since he had to speak to the clerk, and he had to quickly
maneouver to get his money! His voice and lightning fast recovery
were those of a 20 year old! HongCouver is more like a circus than
any city I know in Canada!


I have hundreds of stories, many come from Alarm and Security personel,
and unfortunately, I can't write about them yet, since the bizarre,
incredible feats of B&E and technical wizardry are still a valid
THREAT, and it would be irresponsible to publish them until they
are widely known and solutions found to circumvent them...
Here is one, that is typical, and should wake up a few people who
are "SMUG" or "arrogant" in their "internet" firewalls and security systems...
A friend in Vancouver was having problems with his telephone - specifically
the CALL DISPLAY was intermittent, so, as a retail outlet in electronics,
this was a VERY imortant feature. Also, his monitored alarm security
system was through the telephone, typical "BC TEL" wiring. After months
of the telephone company running checks on the equipment from "their
end", and finding nothing, he hired a company to do a TRACE on the
wiring. They found HIS wiring going into the large, double door garage
of a private home, in a nearby suburb! Checking it out, there were
huge, thick, black cables, from the telephone poles in the back alley,
going into the "private" typical, suburb, 'single-family" home's
garage....! This is a typical "man in the middle" type of security
problem... ( to all the internet security guys reading this -- Do you
know where YOUR internet cables are going to and coming from? --
it doesn't matter WHAT kind of firewalls and security you have, if all
your internet is supplied through a telecommunications TAP...)
Another tid-bit... Since ALL the electronics and computers going into the
stores like WAL MART, or BEST BUY or the SOURCE ( Radio SHACK), or
whatever, come into Canada through Vancouver Harbour, and, since
Vancouver is, in fact, HONGcouver, I thought when I went there, I would
find massive, Chinese run, Computer-Electronic SuperStores, like one
might find in Toronto... Nope. In fact, a clerk at a large Nation-Wide
outlet told me that any stock and supplies they needed were shipped...
from Toronto! So Computers and electronics are unloaded from ships, in
Vancouver harbour, shipped 4,000 miles to Toronto, and then shipped BACK
to the store outlets in Vancouver!... ( During a meeting with the famed
Edwin Mervish of Toronto's Honest Ed's, he told me that 80% of all goods
sold in Canada, were within a 250 mile radius of his warehouses!)
What I did find, were Tiny little store fronts, with cluttered
collections of used and new parts and computers. However, - don't judge
a book by its cover. In one store that I got to know, the 24 year old
Chinese immigrant, who could barely speak English, showed me a large
wooden crate, that he just got on his last trip to Hong Kong. A 240
volt, computer controlled (Chinese only display panel) LASER / Infra-Red
SMT (Surface Mount Technology ) work station, from hell. He could take
any chip from any electronic device made, and replace it. That includes
cell phones, iPads, Laptops, whatever- now that's the kind of equipment,
in the "Corporate" world that I knew, you had to book a reservation, 6 months
in advance, and write a justification report, explaining "why"
"YOU" needed it, and file all the paper work associated with the
expenditures involved. IFF you were lucky, you might, possibly, gain
access to such a device... Or, you could just be a 24 year old hacker
in HongCouver...
In the business world in Vancouver are hundreds of software companies,
that deal with China. One friend told me that they just finished a project,
over a year's time. The first and second 'payment' for the software
came in as expected, but upon completion, the Chinese Corporation said
" If you want your money, simply come to China, and go through
the legal system, here..." - a system based on bribery, and everyone
knows the outcome! I mentioned this to a software developer here in
Ottawa, (the capital city of Canada) a short time ago, and his
description of dealing with China was, to me, funny...
"We are well aware of the 'business' practices in
China. We estimate the total cost, and include THAT in the first
payment schedule. Then, if we actually get paid on completion, it is
just a bonus!"... Another friend who makes a transmission
product that saves wear and tear on heavy equipment, like bulldozers,
cranes, and earth movers, told me of his adventure in China - He shipped
a pallette load of his product to China, but after 6 months, on the
construction site, he got a call that something was wrong. He flew over
to China, and traced the route HIS product took. In the harbour where
the containers were unloaded, he found FAKE identical bottles of
"HIS" product, mixed half-and-half with crap, for sale. Further up
the river, at another major port, were more FAKE bottles, again,
mixed a further half-and-half with crap. Finally, at the construction
site, were his 'Genuine" bottles of product, diluted so badly with
wretched chemicals, that they were actually damaging the equipment!
There are a LOT more stories, all over North America, on dealing
with "Chinese" businesses, -- but, as with the case of the BANKs in
Vancouver, there is almost NO NEWS AT ALL - the CORPORATIONS involved
do NOT want a whisper of the corruption and scandal loose to the
public since it would tarnish not only their reputation, but seriously
affect investments, stock markets, and prestige... The IRON FIST
of "Silence" maintained by the Banks verges on corruption, since
I have seen many cases where the "victims" of banking fraud are
treated like criminals, while the Banking administration sticks their
nose in the air, and classifies everything as "An internal Security
Matter", the details of which, cannot be released to the public."
(( Translation, we screwed up, royally, and are doing everything
possible to cover our asses. You, the 'little guy' not only get
screwed over by the crooks, but by US, the rich Corporate Executive
as well... ))
Sometime, I will write a bit on my page "VANCOUVER THIEVES", which
at the moment is just a holding page... At one time it would have been
"racist" to flaunt the word "CHINESE" like I am about to, but, after
you have been subjected to the "new and Improved" HongCouver, the way
I have, there is no apology needed, nor given... All I can say is
"BEWARE". Polite, philosophical conversations, over "tea", are
totally out of place here. The general "CONCEPT" that emerges here,
is not just Chinese "hackers", but Chinese hackers working, along
with, beside, and in conjunction with, a virtual ARMY of people who
are wheeling, dealing, manipulating, harvesting, and snooping,
information from around the world, -- and a great deal of that
would be in the Canada/U.S. corridor...
The "DISCUSSION" and the statistics, in the article above, are just
a tiny inkling of the massive WAVE that is just starting to appear...
So the question "what do Chinese hackers want?", well, in the case
of the millions of novelty photo frame gadgets, "THEY GOT"
millions of computers infected with software, that quietly sat there
for over a year before anyone noticed... They 'owned' the computers.
Then you read, in technical websites, such as this, that there was
a massive DoS (Denial of Service) attack, where hackers, contolling
hundreds of thousands of computers, crashed a major web server, like
Adobe, Yahoo, Juniper Networks, Symantec, Northrop Grumman,
Dow Chemical or whomever - well, duh, -- anyone paying
attention would not be the least bit surprised at that "news"...

I have a file on my computer, that is updated almost daily, from
technical web sites and news articles, on computers that have been
hacked. Microsoft, Twitter, Tumbler, Facebook, Adobe, Yahoo,
Symantec, etc., and then you
start to see more subtle and vague reports of Banks, Government
departments, NASA, etc., that have been compromised. Knowledge is power,
and now INFORMATION is power. In a global economy, knowing what
your "competition" is doing, is an invaluable tool. CONTROLLING
your "competition" is even more powerful!
AND, I have not even "started" to get into the field of
telecommunications -- ever thought about your Cell Phone? Every
time you move, it transmits to the Tower " I am HERE", and the
digital information is broadcast through the system. While there
was a public outcry and protest against the U.S. government's
proposal to insert R.F.I.D. tags ( Radio Frequency I D entification)
capsules into every person in the U.S., every single country in
the world has individuals tripping over themselves to buy the
latest, greatest, "Smart Phone". I read technical information
on Nokia, Samsung, Motorola, BlackBerry, etc. and they all
make specific models for specific markets around the world.
Deepest Africa, remote India, all of South America, etc...
Thus, while rejecting the principle of RFID tags (Big brother is
watching ), everyone is carrying around a Radio Beakon, that
broadcasts their EXACT location, their phonebook lists, their
emails, and their actual VOICE converstations, 24/7 into the
vast "CELL" system. You can envision a large world map in C.I.A.,
M.I.6, C.S.I.S, Chinese Headquarters, etc. with millions of tiny
little dots moving around. Each one is a cell phone. Simply
gesture over a dot, enlarge, and follow the past year's worth
of activity.. See something unusual?.. zoom in, and play back
the Voice data packet of the conversation- 8 months ago, and
run through the address and contact list... Hmmmm.... let's
look into that... a business deal? Quarterly financial results?
Stock market purchases? Let's follow the tiny blip on the
map, of the guy he is talking to, ... this could get interesting!
You can install Software on any phone, available anywhere,
- ostensibly to protect your "kids" - that shows the Cell phone
location, 24/7, of your "KID". And records all voice, and data,
and is accessible from any computer in the world... Today's
computers, with Peta-Byte storage, and super fast speeds, can
easily track every cell phone in the world... Ever had your
( made in CHINA) cell phone ring, but there is no caller, and there is no listed
"incoming" call? Or, your ( made in CHINA) smartphone shows a
"NEW TEXT MESSAGE", but when you go to look, there is no record
of any message?.. I know VERY
knowledgable technicians who have gotten rid of all cell phones.
Technology is a double-edged sword. Convenience, yes, but
at what price? ...
So, ... Chinese hackers, What do they want? -- " IT ALL ".
And it appears, that they are getting it.


_______________________________________________________________
_______________________________________________________________

As I stated at the top of this page, this is going to be a VERY LARGE page...

News comes in on a daily basis, and it is difficult to organize and capture it all,....

Here are a couple of highlights ! ! ! :

________________________________________________________________
http://www.bbc.com/news/technology-27908105


18 June 2014 Last updated at 11:21 ET

eBay pulls sales of Chinese 'spyware phones'
By Leo Kelion Technology desk editor

The Star N9500 handset was being sold for about £120 on eBay
Related Stories

Thieves 'customising' malware code
Samsung tackles Android malware
Viruses 'installed in PC factory'

EBay is barring listings for a smartphone after reports the model is pre-installed with spyware in its Chinese factory.

A German security firm reported on Tuesday that the Android-powered Star N9500 sent personal data to a computer server in China, adding that the Trojan could not be removed.


It said the malware was disguised as the legitimate Google Play Store app.

The handset remains on sale on Amazon, which could not be reached for comment.

But eBay said it was rolling out the ban globally.

"Due to reports that some Star 9500 smartphones are loaded with spyware, eBay is not allowing
the sale of these devices as a precautionary measure," a spokesman told the BBC.
Intercepted calls
Amazon Amazon is still listing the model from third-party sellers

Although the brand Star is far from being a household name, the handset may have appealed to
some customers because of its close resemblance to the Samsung Galaxy S4 coupled with the
fact it sells for about a third of the cost.

Security firm G Data said it was alerted to the case after receiving tip-offs from its customers.

(ABOVE ) G-DATA security in Germany analyzed the Cell Phone ( spyware ).

"The spyware runs in the background and cannot be detected by users," it said.

"Unbeknownst to the user, the smartphone sends personal data to a server located in China
and is able to covertly install additional applications.

"This makes it possible to retrieve personal data, intercept calls and online banking data,
read emails and text messages or control the camera and microphone remotely.

"The program also blocks the installation of security updates."

The Associated Press news agency has reported that although several Shenzhen-based firms
used eBay and other sites to sell the model, it had been unable to track down the manufacturer.
Infected smartphone G Data identified the malware involved as being Android.Trojan.Uupay.D

If the allegations are true, it is not known whether the manufacturer itself would have been aware
of what was being done at its plant.

This is not the first time that a Chinese factory has been accused of shipping devices preinstalled
with malware.


@@@@@@ note

In 2012 Microsoft reported that several PC makers in the country had been found to load
malicious programs onto their computers.


@@@@@@ note

Then, last year German firm E-Plus reported that some of its China-made Android smartphones
were being shipped with SD memory cards infected with a computer worm.

_______________________________________________________________________
_______________________________________________________________________



This next article is priceless - it shows just the tip of the iceburg heading our way .... !

http://community.spiceworks.com/topic/422497-hacked-chinese-clothes-iron-sends-spam-and-malware


Hacked Chinese Clothes Iron Sends Spam And Malware
Stu Sjouwerman Dec 18, 2013 at 10:45 AM | Security
KnowBe4 is a Spiceworks Partner.

Now here's something "new and creative!" Chinese hackers have taken a clothes iron
(yes, we are talking a steam iron, see the picture) and added a small device that detects
Wi-Fi networks. Once the small board (see the inset lower right) detects a public, non-
password protected Access Point within 200 meters (~650 feet) it starts sending spam and
malicious code.

Russian state TV program Rossiya 24 showed these irons and explained what they were
doing. Here is the clip in Russian, where they they open an iron to show the "spy chip".
Other products found to have rogue components reportedly included kettles, mobile
phones and car dashboard cameras.



The video also showed the hidden chips had been used to infiltrate company networks.
Once it was detected due to a slight increase in weight of the irons (good catch!), the
latest delivery of appliances was rejected by customs, but more than 30 irons had
already been delivered to retailers in St Petersburg. Wow.

Think about any piece of electronics coming from China like your coffee maker, toaster,
microwave being infected with a small malicious bit of hardware. You are going to have
to open up your Wireless Access Point and see what devices are connecting to it, and
then track them down, perhaps using Kismet, which identifies networks by passively
collecting packets and detecting (and given time, decloaking) hidden networks, and
infering the presence of a beaconing device by looking at the data traffic. There may
be easier ways to do this though, got any suggestions?



link to news article hacked iron in russia
https://www.youtube.com/watch?v=hkiqenPy8zY


weaponizing your thermostat
https://www.youtube.com/watch?v=pEAqqqxsyE0


program to FIND hidden wireless bugs
http://www.kismetwireless.net/

link to HACKER NEWS article
http://thehackernews.com/2013/11/russia-finds-spying-microchips-planted_1.html

If you believe that these cases are isolated, then you are completely wrong. Many other
common-use products have found to have rogue chips, including gaming console,
chargers, network devices, mobile phones and car dashboard cameras.

link to IS YOUR IRON SPYING ON YOU
http://www.theepochtimes.com/n3/366229-pre-hacked-electronics-come-straight-from-chinas-factories/

While the unusual form of cybercrime took researchers by surprise, it was only the latest in
an emerging threat of hacked electronics coming straight from the Chinese factories.
There is a long list of devices riddled with backdoors, infected with malware, or fitted with
spying devices before leaving Chinese factories. These range from kettles to laptops, from
USB keys to cameras, and from consumer software right up to military components.
In June 2011, Hong Kong newspaper Apple Daily uncovered recording devices installed in
all dual-plate Chinese-Hong Kong vehicles. They were labeled as “inspection and quarantine
cards,” and were installed free of charge by China’s Shenzhen Inspection and Quarantine
Bureau. In June 2010, an auto-run virus in China-made memory cards in Olympus Stylus
Tough cameras was infecting computers in Japan. The virus was uncovered just a week after
an identical virus was in the memory cards of Samsung smartphones. Prior to that were
viruses in devices including China-made TomTom GPS systems, and Insignia digital picture
frames
sold at major outlets, including Best Buy, Target, and Sam’s Club.



























____________________________________________________



___________________________________________



REGISTRANT     NAME    :           
                           robin dusty graves        

REGISTRANT      EMAIL   :       
rockin.robin.dusty.graves@gmail.com

REGISTRANT   PHONE    :          
                   1 (613) - 717 -2777
                   1 (780) -807 -0217

REGISTRANT   ADDRESS  :      
       4-2222 Carling Avenue, Ottawa
                Ontario, Canada, K2A 1H3

________________________________________





ASSOCIATED WEB SITES:





robindustygraves.com


robindusty.com


robin-dusty-graves.com


dustygraves.com


gravitationalresearch.com


kidbots.com


HELWYCHZ.com


PSYCHOMOBZ.com


QUEBEQUISTAN.com




>

As usual, I am stuck in "CANADA", the great white North, where
every factory I have known has shut down... Recent Government/
Corporate policies, have every scrap of technology shutting down,
and being boxed up for shipping to CHINA, where the same
"unprofitable" factory, is running tripple shifts! Canada is
becoming a " 3rd World " country, if it does not already
deserve that status .... Products "could" be made here, but
the few remaining Engineering and Machining Corporations are
back-logged and ridiculously expensive. WAY, way, back in 1985,
a group of us tried to make, and market a small plastic
automobile device. The quote for the empty BOX, with colourful
printing, and a clear plastic display window, here in Canada was
over $6.00, The plastic injection mold halves were $60,000 with
a 6 month turnover... If there were any adjustments needed on
the molds, it would be another 6 months, and cost 10's of thousands...
We sent a prototype ( an early version, complete with many known flaws! )
to HONG KONG, and the quote was $500 for the machine molds
and 5 weeks. Adjustments were FREE, and made in a week or two...!
We got bogged down with world wide PATENTS, and to our dismay
and amusement, we discovered our 'prototype' in novelty stores,
only a few months later, shipped from Hong Kong, with the address
of a company in Great Britain! (SEE the upcoming, VANCOUVER THIEVES ! ,
which will be a huge folder when finished..) It was copied exactly
as we sent it - complete with flaws!... In a colourful box with a cellophane
window... For about the price of the empty box in Canada!

Oh Canada!


Anyhow, I have got to get dressed to go outside. I have to get some "Canadian" food for dinner...



The comment above, was added to the web January 23rd, 2012, just in time for the end of the world ( Mayan Calendar ) .


To see an entire page of my INVENTIONS,
at
kidbots.com/WEBADD/INVENTIONS/INVENTIONS.html

GO TO the original page,
INVENTIONS, CLICK HERE .
....
___________________________________________________

________________________________________
___________________________________________________


>

>

>

>

>

>


Because illegal hackers have decided to spam the name
" robin dusty graves" or " robindustygraves "
I have decided to use the same tactics that they use, and load
my REAL web pages with the key search words that would be used
by search engines such as Bing, Yahoo, Google, etc.

As it now stands, searches are re-directed illegally and maliciously by
spammers, who create thousands of fake web pages, that Microsoft's;
BING.com, for example, found and displayed for months - while at the
same time, BING, refused to find DUSTYGRAVES.COM or
ROBINDUSTYGRAVES.COM  when searching for 'robindustygraves' ! ! !
Go figure. This verifies that the hacker/spmmers understand the search
algoithms of BING, YAHOO, GOOGLE, YANDEX, etc., and try to
exploit the engines to put fake spam./hacker pages on the first pages of
legitimate searches. Google and Bing have changed their algorithms, but the
hacker/spammers are never far behind. Yandex always used a different
engine, and was consistently better at delivering valid search results on the
first pages.
 The fake web pages re-direct to pornography, PAY-PER-CLICK websites,
that the spammers get paid a fraction of a penny for each person who
accidentally clicks on them, and to pages where the SERVER is deliberately
set up to spam with POP UPS that state things like " MICROSOFT
WINDOWS ANTI-VIRUS HAS DETECTED A VIRUS - CLICK HERE to continue
Scanning, and Remove the VIRUS" - If you click on ANYTHING,
--the little "X" in the top corner to close, the box on the bottom that
states "CLOSE", -- any action besides CTRL-ALT-DELETE ( to bring up
the Windows Task Manager, to CLOSE your Browser entirely! ) it will
download a virus that generates a continual barrage of fake VIRUS
warning alerts, that demand Visa and Mastercard to remove- If you are
foolish enough to actually GIVE your Visa or Mastercard, the information
is used to make illegal purchases, AND the virus is NOT removed!
 Many fake web  re-directions take you to a page that appears to
"LOAD" for a long time with an hour glass or "now loading" ICON, but,
while that is happening, your IP address, your specific geo-loacation,
your specific information on YOUR computer, etc. is being gathered,
and by the time the fake web page actually loads, often with a FAKE web
"SEARCH PAGE" ( Pay-per-click), your computer is already compromised,
and is subject to further hacking from that point onwards...


 

DUSTYGRAVES

Dusty Graves

dustygraves.com

dustygraves.com

DUSTYGRAVES.COM

(( robin dusty graves ))

(( ROBIN DUSTY GRAVES ))

(( robindustygraves ))

(( ROBINDUSTYGRAVES ))

(( robindustygraves.com ))

robindustygraves.com

 

(( ROBINDUSTYGRAVES.COM ))

(( robin@dustygraves.com ))

(( ROBIN@DUSTYGRAVES.COM ))

(( robin dusty ))

(( ROBIN DUSTY ))

(( robindusty.com ))

(( kidbots.com ))

 kidbots.com

 

(( KIDBOTS.COM ))

(( ROBINDUSTYGRAVES@KIDBOTS.COM ))

(( robindustygraves@kidbots.com ))

(( GRAVITATIONALRESEARCH ))

(( GRAVITATIONAL RESEARCH ))

(( gravitationalresearch ))

(( gravitational research ))

(( GRAVITATIONALRESEARCH.COM ))

(( gravitationalresearch.com ))

 gravitationalresearch.com

 

 ___________________________________________________

_________________

Real Science is a fascinating subject, unlike the decades of what
was typically taught in schools that I endured, that tries to KILL
every shred of imagination, of hope, of possibility, and instead,
fills the time with memorizations of WHAT CAN NOT BE DONE!

Nothing can travel faster than the speed of light...

Nothing can get colder than absolute zero.

Matter can neither be created nor destroyed... etc etc.

( All wrong! search Richard Feynman, for a lecture on this! )

There are always a handful of educators, scattered here and there,
who is interested and therefore
interesting, and who keep
mankind from falling back into the Dark AGES !


With the String theory, and new discoveries of the last few years,
we are on the brink of an entirely new era - and I can't wait to see
what happens next! This is a wondrous and magical time, with the
doors of science wide open again - and the view is breathtaking!



**Clarke's Three Laws are three "laws" of prediction formulated
by the British writer   
Arthur C. Clarke. They are:

1/ When a distinguished but elderly scientist states that something
is possible, he is almost certainly right. When he states that something
is impossible, he is very probably wrong.

2/ The only way of discovering the limits of the possible
is to venture a little way past them  into the impossible.

3/ Any sufficiently advanced technology
is           
indistinguishable from magic.

(thanks to wikipedia)




have fun

Robin Dusty Graves


( Life, is an experiment, please don't destroy the Lab!
-- robindustygraves -- )



 

 

 

________________________________

 

DUSTYGRAVES

Dusty Graves

dustygraves.com

dustygraves.com

DUSTYGRAVES.COM

robin@dustygraves.com

(( robin dusty graves ))

(( ROBIN DUSTY GRAVES ))

(( robindustygraves ))

(( ROBINDUSTYGRAVES ))

(( robindustygraves.com ))

robindustygraves.com

 

(( ROBINDUSTYGRAVES.COM ))

(( robin@dustygraves.com ))

(( ROBIN@DUSTYGRAVES.COM ))

(( ROBIN DUSTY  ))

(( robin dusty ))

(( robindusty.com ))

(( kidbots.com ))

 kidbots.com

 

(( KIDBOTS.COM ))

(( ROBINDUSTYGRAVES@KIDBOTS.COM ))

(( robindustygraves@kidbots.com ))

(( dustygraves.com ))

(( robindusty.com ))

(( robin-dusty-graves.com))

(( GRAVITATIONALRESEARCH ))

(( GRAVITATIONAL RESEARCH ))

(( gravitationalresearch ))

(( gravitational research ))

(( GRAVITATIONALRESEARCH.COM ))

(( gravitationalresearch.com ))

 gravitationalresearch.com

 

Burning WATER (H2O) (H,H,O) (Di-Hydrogen Mon-Oxide)
instead of gasoline in your car:

kidbots.com/WEBADD/HYDROGEN_FUEL/HYDROGEN_FUEL.html


kidbots.com/WEBADD/HYDROGEN_FUEL/HYDROGEN_FUEL.html

 

 

Remote Control "MUTE" button for BIRDS (Every Female must read! ) :

kidbots.com/WEBADD/INVENTIONS/BIRD_BRAINZ.html


 kidbots.com/WEBADD/INVENTIONS/BIRD_BRAINZ.html

 

A growing number of INVENTIONS I have developed over the years:

kidbots.com/WEBADD/INVENTIONS/INVENTIONS.html


kidbots.com/WEBADD/INVENTIONS/INVENTIONS.html

 

An Invention of PERMANENT, FIXED, Fireworks, turned on with a flick of
a switch, every night!:

kidbots.com/WEBADD/VANCOUVER_LIGHTS/VANCOUVER_LIGHTS.html



 kidbots.com/WEBADD/VANCOUVER_LIGHTS/VANCOUVER_LIGHTS.html

 

How to take an Obsolete old computer, like an 8088, 8086, 80186,
80188, 80286, 80386 etc, and old discarded electronics, to build a FREE,
home -made robot and controller:

kidbots.com



KIDBOTS.COM

 ___________________________________________________________________________



So far, this winter, I am NOT far enough South... Just as the weather
got warm, and the roads were dry, we got a huge snowfall, that lasted
days! After shoveling snow for a few hours I built a 7- foot snowman,
that says it all!


                                                                                                     
                                                                                                    



DUSTYGRAVES Dusty Graves dustygraves.com dustygraves.com DUSTYGRAVES.COM robin dusty graves ROBIN DUSTY GRAVES robindustygraves ROBINDUSTYGRAVES robindustygraves.com robindustygraves.com ROBINDUSTYGRAVES.COM robin@dustygraves.com ROBIN@DUSTYGRAVES.COM kidbots.com  kidbots.com KIDBOTS.COM ROBINDUSTYGRAVES@KIDBOTS.COM robindustygraves@kidbots.com GRAVITATIONALRESEARCH GRAVITATIONAL RESEARCH gravitationalresearch gravitational research GRAVITATIONALRESEARCH.COM gravitationalresearch.com  gravitationalresearch.com


 

_________________________________________________