• Content count

  • Joined

  • Last visited

Community Reputation

2 Neutral

About infinite51

  • Rank
    SUP3R 31337
  • Birthday 05/30/1975

Contact Methods

  • AIM
    PM through forums First

Profile Information

  • Location
    Chicago, IL

Recent Profile Visitors

7,996 profile views
  1. +1 It is amazing what ineptitude I see out of the mainstream media, who want to sensationalize everything. Just look at shows like CSI or NCIS, oh yeah the government is able to reposition some low orbit satellites, umm yeah sure . Thought it does make for good TV
  2. It's impossible to say it will work at every chain of hotels such as the Hilton chain of hotels. Many hotels have different PBX systems, services, ect. So what works at one, does not necessarily work at all of them. If you’re really curious, try it and see for yourself if it still works with a particular hotels PBX system.
  3. Back on topic: Yes, 2600 gets to bit a bit paranoid at times...but not nearly as paranoid as that ultimate kook job Alex Jones. That guy is on another planet. What about that Jonathan Lee Riches... Now I think he filed 2 legitimate lawsuits. Come to think of it, He will probably file a lawsuit about this post.
  4. Sounds like people that get upset that a store has a minimum charge to use a cc to buy something. Sure you could call up Visa/Mc ect and complain that they are violating the terms and conditions of their agreement. But you would have to be a real fucktard.
  5. ^^^ props to this. I still remember when only some stores such as (Borders books) carried it. Eh, Borders? what happened to them, guess they are out of business.
  6. Umm. Yeah - Silly kids. If the gambling sites where blocked, then there is probably a reason for that.. Otherwise Google is your best friend
  7. Hey Decoder, glad to see your still around. Anyway, I do not know all the facts about the situation nor really care to know. Had the facts or allegations been false, I would see no reason why a company would not request they immediately be taken down. I know several small companies (similar in size to Trapcall), that setup Google Alerts to closely monitor and defend their companies reputation. Most companies monitor their customer’s records very closely, and it should be a fairly easy thing to see if any data was leaked that should not have been. The only thing I noticed was that someone was let go from the company, and I would assume that there was ample proof. Otherwise I hope that our friend finds a capable employment lawyer and really lays it into the company for terminating him on unfounded allegations.
  8. Well provides a 30 day free trial that provides full calling party number information. Though the service is run by Teltech, and from a previous thread there appears to be some doubt about customer data with that company. There seems to be some allegations as to how their customer data is handled. I would personally hope that this is not the case, both because I consider the individual who was said to have leaked confidential data a decent man, and the company is a leader in this voip niche industry. However the fact that the company has not responded nor requested that the information be taken down here, does not shine a good light on the companies privacy policies, and further suggests that data may have been compromised. Hopefully they can address the situation, but personally having worked for numerous Telco companies I can assure you that individuals who are 'illegally wiretapping' customer can face criminal as well as civil charges. I would hope that if these allegations are true that the individuals who's privacy was compromised, sue Teltech and put them out of business. Other than Teltec, most 800# voicemail services do the same thing, though you may have to pay a couple bucks a month. Also, there are a number of other ip-relay services that since the FCC changes, provide local numbers.
  9. I think you need to re-read the bill in its entirety. I assure you that it is not going to be the end of Caller ID spoofing or anything of the matter. "It shall be unlawful for any person within the United States, in connection with any telecommunications service or IP-enabled voice service, to cause any caller identification service to knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value, unless such transmission is exempted pursuant to paragraph 3b " In short, if you want to display another number for privacy reasons or any reason for that matter it's perfectly fine. Instead the bill aims at creating legislation to make it easier to prosecute individuals who are using these services malicously and with a criminal intent, and I must say the bill is long overdue.
  10. Yes, the cell providers have been aware of these issues since at least as early as 2002. Yet, they choose to voluntarily do nothing about it, because their did not perceive any risk and justified that the probability at least at that time was small. And it really wasn't until the paid spoofing services started appearing that the general public could perform the exploit with ease. That said, last year several of the companies were fined by the FCC for not fixing this problem. And that is more likely the reason that finally after years, the cellphone providers decided to do something about it. Personally I think it is way overdue and could think of many instances where individuals could illegally access voicemail systems and gain a lot of proprietary and legally protected information. Just think about a lawyer at a lawfirm or CEO of a major company. Chances are these people would have it setup on their mobile phones for the ease of use, and any kid with a $5 spoofcard could then dialin and listen/delete or forward messages.
  11. If you are able to get into Task Manager, go to file "Run" issue the command "explorer". With any luck you should get your toolbar and access into your system. You may have to execute the command 2-3 times till it executes. From there you can hopefully see how messed up your system is and if you can salvage it or not. I would suggest downloading several current antivirus programs with (current updates), along with a good adware remover (also with current updates). As a last resort you may consider backing up the files and restoring the OS as suggested.
  12. I have gathered all of the court documents and many of the reports, including the full amended complaint filed by Liquid Motors. Liquid Motors was the first company that had filed legal proceedings in the case of Liquid Motors, LLC v Allyn Lynd / USA. Claiming that the company’s, fourth amendment rights (pertaining to against reasonable searches & seizures) have been violated. You can view all case material at
  13. Jfalcon: Great point's I am in the process of zipping up all of the evidence, court testimony and hopefully we can get to the bottom of this. In the orginal warrant the Colo cage was not specific to the machines that were implicated in the fraud. Other than "its a blue cage, there may be evidence of the fraud on the machines enclosed in it"... Since all the documents in total are over 100 pages, I will briefly recap one company that was affected by this raid. That I believe after speaking with other CEO and owners of similarly situated companies and reading court testimony appears to be credible. "My company was in the affected colocation facilities of CoreIP and I wanted to share facts with the community to help you so what happened to our company doesn't happen to yours. 1. Your equipment can be seized if your colo provider or network provider is alleged to have committed criminal activities. We owned all our own equipment and the colo company did not have login access to any of our equipment. But since they provided the network connection to our firewall and had physical access to our equipment (could touch the equipment), the FBI seized the equipment. A judge in federal court upheld the FBI could do this when one of the affected companies sued the government and FBI for a temporary restraining order. This is very scary for all of our civil liberties! You should probably do background checks on anyone you rent space from. This includes your office space, your apartment, your public storage and your data center. If the owner is alleged to commit a crime, you property in facilities they own can be seized for analysis. 2. Your offsite DR should be with a different colo company and with a different network provider (ours wasn't - shame on us, just never thought of this scenario). The DR companies should have no relation to your production colo company and network provider. We planned for power, network, fire, terrorists, etc., just not multi-site FBI seizures. We probably need a criminal mind to consider this as a scenario. Now you don't. 3. You should have enough reserves in the bank to be able to buy all new equipment because if the FBI seizes your equipment, they will keep it until they have analyzed all of it. That takes many months. You need the reserves because even if your DR plans work, you now need another site for DR the minute your main site is seized. We had buy all new equipment over the last 5 days even though we will get our seized equipment back some time in the future. 4. I would recommend using virtualized servers and keep images of the servers off-site so once you buy new servers, you can quickly get them up and running. The backups they provide you will not run on other equipment. (i.e. it is not dd images). Our off-site images would not run on the new equipment either as servers have changed so much in the last 3 years. We had to build servers from the ground up and restore just configuration. 5. Have great vendors. You will need them to help so you can get back up and running fast. Many components we had take weeks to order and some of our vendor expedited delivery to help us out. They also provided on site engineers to help reconfigure the new environment. We now know who to do business with in the future. The unfortunate situation is the FBI is trying to catch bad guys and I support their intent. I just don't support their execution. The collateral damage they inflicted has caused more in losses for the innocent businesses affected than the alleged crimes of the people they are after. They do not understand colocation or data centers, nor do the judges. That is clear from their actions and the discussions we have had with them."
  14. i never said bury it when they come you can bury it and get a long cable to update them then all you do is pull out the cable, hell you could have a small lowpower old box updating it from wifi so you wouldnt have to do anything when they come but power off from ssh. Discurge: Many of the companies we are talking about here are legitimate companies that have partnerships with well respected companies such as Kelly Blue book, eBay, ect. They were again, not associated with the alleged fraud, other than having servers (costing in access of $400,000 in the same data-center). So as it relates to your off the wall Disaster Recovery plan, I am sorry but I don't think it's going to fly. Unless you are talking about an off shore version of StrataSpace a (underground colocation facility , which is located in the US).
  15. i Yes, that and some more stuff. Beating an FBI seizure is easy. It's a two step process: offshore stuff owned by non-US entities in countries with tough privacy laws; encryption, volatile key storage, and ability to zeroize it intentionally, but not accidentally. Combined properly, you make a seizure harder and worthless (i.e. keys are zeroized). I'd go into the details, but why tip them off? I prefer knowing I have a way to maintain an online business even if the FBI starts acting like pricks... I'd recommend against anyone posting details. Those of us who need to know how to protect our privacy and availability across borders do know or can find out. The FBI undoubtedly has people reading these forums, and I'd rather keep them out of the loop. Privacy is good for democracy. Great information guy's. Most of the information I hope to gain, will deal with the legal aspects of this case, and tracking down the truth of these shell companies, ect. One of the respondants in the case Michael Faulkner has been providing a great deal of information in the past week. I personally have been scratching my head trying to figure out his motives for doing so. Though I guess when your loose your business, house, toys and bank accounts you can become a little desperate and reach out to anyone that can listen. Overall, since I do a bit of development, do legal marketing, ect. As a result, the outcome of this case, and those that are filed by the companies affected by these raids are of importance. And frankly put, should the reports we glean from our research find its way into the email box or being looked at by the FBI so be it. I have a big problem with a guy that eggs on the government, when he has links to pirated material on his own site. From what I can tell thus far about Matthew Simpson, it appears as though his operations are at least slightly more legitimate, and perhaps he was just 25 year old man (according to his facebook profile that made a bad business arrangement. The FBI, NSA, Military, Navy/ computer and intelligence all read these forums and gleam information from that. It is not a secret... If you don't believe me, I am sure StankDawg will confirm.