Thursday, February 21, 2013

How Can Security Companies Have This Much Access to Our Computers?

Activist Post

We featured an article yesterday about Obama's looming cyberwar with China.  In that article is a video that deserves a post all on its own. The video shows the cyber security company Mandiant's incredible ability to shadow every click supposedly made by the Chinese hackers.

It's really unsettling to think that a private company located in California can remotely gain full access to a computer all the way in China. Imagine how easy it must be for them to access your computer.

Many of the comments below the video say this proxy has to be a fake hacker. Check out a few of them:
Hackers using windows.....
This is bullshit! Lol!!!! A hacker providing a landline phone number to google and using windows wrong commands. LOL!!! 
hackers using GUIs?!?! LMAO!!!!! Your're doing it wrong...
 so, here's the summary:
1. isn't the IP address a proxy address?
-> hacked into the attackers box with reverse shell so, they got the real IP addr behind proxy. they got it right.
2. lol what kind of a hacker uses windows xp?
-> that's just the VM he's working in. host OS could be anything else. no hacker wants any kind of trace about their real OS.
China also vehemently denied and condemned the accusation. No surprise there, somebody's lying and it's probably the guy who benefits most from their lie. The bigger story may be how this company, or any company, can have that level of access to our computers.

Ask yourself, how is Mandiant allowed to spy on Internet users so thoroughly? Do they have the authority to do that to Americans? Who gave them this authority and with what oversight?

Read other articles from Activist Post Here

This article may be re-posted in full with attribution.


If you enjoy our work, please donate to keep our website going.


ner0 said...

The video is just a simulation from Mandiant to explain the process, it's not an actual real-time hacker on hacker...

abinico said...

This is what you have to do to send a message than cannot be viewed:

1. compress the message to the max using something like lempel-ziv

2. encrypt using something like DES

3. compress again

4. encrypt using something like MD5

5. cmopress again

6. encrypt using something like PGP

This will drive the NSA goons wacko, I know: years ago developed a secure email product using this type of system - got a visit from the MIB, yeah really, the two goons wore black suits just like in the movie. Told us not to do this.

skid said...

RE: "Imagine how easy it must be for them to access your computer"

The original article at

appears to be gone.

A paraphrase of the article:
The NSA has secretly ordered Microsoft to provide special access codes in all versions of Windows from Windows 95 OSR2 onward.
Even Microsoft engineers say “there cannot be a legitimate explanation...”
Thats right, since 1995, beforethere was ever a "terrorist threat".

Anonymous said...

Recall the flap about M$ releasing CD's with their older OS's source code to qualified programmers? (I was one) Well we found out that they forgot to remove certain programmers comments from their source code lines. Recall they had NSA-Key in the code?

Never think you are free from being watched. Never use your real names on line, please??

That will not prevent the Gov-goons from 'getting you', but it slows down those without Gov backing.


Walking Turtle said... and then

be top-grade deep-scoop IT industry intel re the MS/IBM/CIA/NSA nexus and linkage for those who need to look a leetle deeper yarrr-rr-r.

Plenty more where THAT ixquick'd from fwiw... And that is all. 0{:-)o[

newsrider said...

Only a fool would think the video is authentic

Anonymous said...

Everything done on Google can be played back.. Don't you people know that Google is owned by the NSA?

Post a Comment