Help I need to protect my wifi, cell and laptop - General Questions and Answers

In March, my sister in law and I found out that we were being “followed”, and that “someone” had it in for her and that her car was marked and there were/are pictures and videos of the both of us. Not too long after we were warned about that, she found a flash drive that was blinking in the computer at her home and took it and went to work and plugged it in and it was recordings of conversations we had in her car. To narrow it all down quickly, her husband was tracking her car, hacked into our cellphones and my home laptop computer, I also had found a recording device under the daybed in my bedroom. I had realized that things looked different in my home when I would come home and once my neighbor across the street told me my dog was out and that he chased him down and put him back, -there is NO WAY he could have gotten out unless someone opened the gate. A spare key was in our garage for our son in which his brother would come in while we were at work (our thoughts is to retrieve the device download it and put it back), but nevertheless we were invaded, seemingly for over a year. So I am trying to find out how to find if I am still being hacked (cell and laptop), how to block help myself from being hacked again, how to protect my wifi (i got my own separate one from our house one), and how to make use of the programs I have purchased as a result of being stalked in such a manner.
I now am in constant paranoia over my electronics and I need help. I have several questions to cover a variety of areas dealing with this situation and I truly and desperately need help. I have downloaded tutorials and have familiarized myself with some things, but I would like to speak to an expert.
If you can help please message me.
Michelle

Mimi44 said:
In March, my sister in law and I found out that we were being “followed”, and that “someone” had it in for her and that her car was marked and there were/are pictures and videos of the both of us. Not too long after we were warned about that, she found a flash drive that was blinking in the computer at her home and took it and went to work and plugged it in and it was recordings of conversations we had in her car. To narrow it all down quickly, her husband was tracking her car, hacked into our cellphones and my home laptop computer, I also had found a recording device under the daybed in my bedroom. I had realized that things looked different in my home when I would come home and once my neighbor across the street told me my dog was out and that he chased him down and put him back, -there is NO WAY he could have gotten out unless someone opened the gate. A spare key was in our garage for our son in which his brother would come in while we were at work (our thoughts is to retrieve the device download it and put it back), but nevertheless we were invaded, seemingly for over a year. So I am trying to find out how to find if I am still being hacked (cell and laptop), how to block help myself from being hacked again, how to protect my wifi (i got my own separate one from our house one), and how to make use of the programs I have purchased as a result of being stalked in such a manner.
I now am in constant paranoia over my electronics and I need help. I have several questions to cover a variety of areas dealing with this situation and I truly and desperately need help. I have downloaded tutorials and have familiarized myself with some things, but I would like to speak to an expert.
If you can help please message me.
Michelle
Click to expand...
Click to collapse
If it is someone that is close to you, such as your sister in law's husband, it's gonna be hard because they have direct access to your hardware. The only thing I see fixing this situation is to involve law enforcement or some kind of measures to physically keep them away from your hardware. It's virtually impossible to protect the hens from the fox when the fox is inside the henhouse with the hens. It only works when the hens are on the inside and the fox is on the outside, if you understand what I'm saying.
Your biggest security threat in what you describe is a physical real world one, not an electronic or software one.
If he knows what he is doing and has physical access to your hardware, software and electronic safety measures won't help you because he could just bypass it.
If your issue was someone from the outside that doesn't have physical access to your hardware THEN software and electronic measures would give you a decent safety net. But in your situation I seriously doubt those measures will help you any.
Focus on the real problem.....HIM.
I DO NOT PROVIDE HELP IN PM, KEEP IT IN THE THREADS WHERE EVERYONE CAN SHARE

Related

Dear amazing Hackers, I need your help.

Dear amazing XDA android developers,
I need your help. You have an opportunity to help someone in need and at the same time do something fun and challenging.
But first a little backstory.
Over the last two years, my car has been broken into numerous times. I've had an old smartphone stolen(my treo 650 which I repurposed for gps nav), a stereo stolen, car chargers stolen. My car dash ripped open. I got another stereo from my grandma for christmas which was stolen a month later, even without the faceplate on it. I've also had my garage door beaten in(not to gain access, just to beat it, I suppose). I lock my car at night, but I also have clinically verifiable ADD, and I can never remember for absolutely sure every single night if I locked it - or if they're getting in some other way.
So you're probably wondering why I'm posting this on the Android hacking forum. I need your help catching the hoodlum who is doing this. I bought a new android phone, the thunderbolt, and it replaced my very aging Droid Eris.
What I want to do is activate the Eris on a second line for a month, and use a rom with specially cooked features to make sure it works flawlessly. I need a rom that can do a fake shutdown, where if you hold the power button and choose shutdown from the menu, it'll do a throbber or some other indicator and then shut off the screen, but continue to run. I plan on supergluing the battery case to the phone. I need the tracking apps to never quit from memory no matter what, and I need the GPS to be accurate and the phone to be stable. I plan on running multiple tracking apps(in case one fails). I have a 3500mah battery for the phone so I'm not terribly concerned with battery life. I need the indicator light blinking fairly often to attract attention. Since the Eris has that nice big white light under the trackball I thought that would help more. I also need to hide the tracking apps from the phone home launcher as well.
I'd leave this specially prepared phone on the dash of my car at night, and when it gets stolen(which I bet will take less than a month to happen), I will be able to call the police and find the neighborhood hoodlums and restore order. I've already talked with the police and they've said if I got them the GPS coordinates they can take action to retrieve the phone.
Can you help me with these features and fight crime in the process?
I wasn't sure if this was the right forum to post this in. I know there's a lot of Eris specifics, but I also know this could be a useful project for others with other phones as well who suffer from vandalism and regular thievery.
I will reward the forum with the story of what happens and the result.

VERY IMPORTANT: Need HELP Removing INVOLED Spy Prog (Long but interesting challenge)

Recently I found that someone close to me had been using a purchased spy prog. Thanks to Google alerting me that unauthorized login and sync occurred.
I quickly recognized the phone found the program and cancelled their membership since I originally made the account/email address for them and they told me what password to use. But somehow that phone has continued to sync from their phone.
To this point I've been being safe; I've been messaging or texting lies along w/ truth. Yet somehow all that information makes it back my a simple slip up of words by the other 2 ppl in house. They accidentally repeat in general something I mentioned in text/fb message/phone call/information/etc.
I've literally deleted everything I could find that was left after factory reset. (EVERY FILE!!) I had root and end up with a virus I couldn't remove & didn't want to factory reset. The virus took over screen and no matter what I couldnt get it off. In the end, only way phone company could get it off was access with use of a computer & prog to factory reset. While talking it updated from 6.0 to 7.0. So I'm going to have reroot.
QUESTION FINALLY: How to can I emove the hack or exploit ( or whatever it is) that is reporting or cloneing everything word & information? Yes, I've tried every possible virus/spy pro/spyware/malware/hack/exploit detector remover I read about. PLEASE advise.
The person( I suspect) is currently charged with domestic violence w/ prejudice, I cannot drop the charges they won't allow me. Due to it being domestic violence against someone disabled (me).
**SIDENOTE/QUESTION FOR LAWYERS. The Person was somehow released without bail and i was ordered to leave the house with literally NOWHERE wheelchair accessible to go?? The reason, I suspect snitch (for lack of better word), the Magistrate had already set the bail then a judge on SATURDAY OF A HOLIDAY WEEKEND changed it. Also its hand written, dunno whose initials are on it cant read them. I've NEVER nor has my victims advocate heard of that. I pay slightly less than 3rd of whole house payment accord to other person on the mortgage. I do not qualify for disability only pathetic SSI. The person is more than likely trying to find something negative on me. They have threatened to have me evicted untold times! Im an entirely different person after nearly dying 2 times and was close a 3 rd. That along with being on a ventilator 3 times...if that doesnt change someone you have a serious problem on and finally being in a wheelchair. All caused by a neurological disease. Might I mention I found an old sound recorder that goes with a spy cam according to one specialist and one genius old friend (haven't found hidden cam.YET!) in my room. I do *man* things in the room I pay for. Thought it was illegal to record with sound. Hell or without a person knowing considering by law I'm a tenant**
The person is beyond clueless about technology but their brother worked for govt many yrs ago installing, none other than CAMERAS. He now prides himself as being a computer expert & dev.(he's not bad). He knows LINUX exceptionally well.
Quick Question...should I go ahead with rooting or wait?
PLEASE HELP AND IF POSSIBLE FIND THE FOOTPRINT HE MIGHT HAVE LEFT BEHIND. PRIVATE MESSAGE ME IF NEED MORE DETAILS ON PHONE INFORMATION OR IF A LAWYER (I live in TN)
Galaxy S7 with exynos chipset.
Did have root until att updated after
removing weird virus. Will Root soon.

How could this person be locating my devices?

I'm sure I'll get some haters, who think I am simply nuts but this is a REAL problem that I've got to solve.
For the last 6 years I've had a mysterious stalker and hacker, who renders most of my and my family's devices nonfunctional and breaks into my accounts and generally makes my life much harder. It has recently come to light that it isn't a hacker SINGULAR but at least 3 guys, hellbent on destroying me: my daughter's father, her uncle, who is a military hacker and their friend, who managed to ingratiate himself with me, until my daughter's father confessed, when I confronted him with evidence against him and his brother, saying he didn't mean for it to get this out of hand. Well, thanks for the heads up but it's a little late, because it IS this out of hand and the wheels of justice grind slowly.
Meanwhile, I am still hacked, even worse now, because his brother got out of the military and moved back to town and has a lot more time and access now. Calls and texts are being intercepted so frequently, that I now use Google Voice/Hangouts to communicate, knowing that nothing I say is ever private but at least people get my messages and I get their calls that way.
I'm looking for a job and I need a device that he won't be able to spy on, so I went to Best Buy and purchased a phone card and moderately priced android phone and took it home to resume my job hunt. I planned never to call any of my usual contacts with the phone but just use it for work stuff. Within hours, it was acting buggy and when I restarted it, it did not go to the regular black screen that says "your device is encrypted for security" but showed my regular background and said "please enter your password when starting android". On my note 8 and 9, that would often happen and when I went to security options, secure startup would be disabled. I checked and secure startup was still supposedly enabled. In ADB "adb shell getprop ro.crypto.state" returned "unencrypted".
I returned the phone and purchased a Google Pixel, hoping their physical security device MIGHT be more effective than Knox at protecting me from this guy. I purchased a brand new sim card and spent another 50 bucks on a phone card, from a different company.
Since my daughter's father has moved within a half-mile of me (despite having no contact with her and very little with me) 4 times now, I speculated that he was, perhaps, using a directional yagi antenna to scan my area for new device beacons and then (skip forward a few steps) find out what apps are installed on those devices, to determine if they are mine. With that in mind, I never even turned the Pixel on at my house.
That night, I took the phone to a random emergency room with secure wifi, to which I know the password and proceeded to set it up. I made a new google account, as usual and installed a bunch of random apps, such as black dating apps (since I am white, I figured that, if my theory was right, it might throw them off my scent) and games I would never play and apps for banks of which I am not a member. By the first time I restarted the phone, still at the emergency room, it had the exact same problem. It purported to be encrypted but (adb later verified) it was not. Apparently, the cheap phone faired slightly better than the pixel, in this department, because the first one was reencrypted upon reset, while the Pixel was not. I never activated or inserted a sim card in the pixel and while I had my regular phone and tablet along with me, they were powered off, in the car.
I was pretty sure, after the first phone was compromised, that I was onto something with my beacon frame theory but it would not explain what happened at the emergency room, unless there is a tracking device in my car, which IS likely, because I continually find my car torn up in all sorts of ways. They even broke off the panel on the driver's door with lock and window switches and the lid of my center console and I continually find the carpet pulled away from the trim. Then again, they also put something caustic in the wiper fluid tank, which destroyed both tank and windshield, so it could also have all been done simply out of malice.
Having no better ideas, I ran a bug detector over my car and found that there IS a radio signal being emitted from somewhere around the gearshift or cd player. I took apart the area around the gearshift and found nothing. In that department, the only remaining possibility is that they've actually put something inside of the cd player itself, the screen of which quit working a while back. I have the ribbon cable to fix it, so maybe I'll get lucky when I crack it open in a bit. The signal DOES appear strongest at the CD player but it could be anything, even catalytic converters can emit radio signals.
Assuming my bug theory is wrong, does anyone have any other idea of how these guys could have discovered and hacked those phones? I've got to find a way to evade these people or I'll never have anything like a normal life, until they're finally in jail.
Wow!
I have not heard of such hacks, even when it comes to national security.
What is the motive of these three people ?
I have no clue but with there skill in not sure an iphone would fare much better

unhackmeplease

Iv been hacked repeatedly for seven years, I suspect from an ex, I get followed almost daily, people drive past my house, they seem to know my location, I believe they monitor my key strokes, wired this come to be on my phone, basically I'm sick of it. Can someone please help me ? Kind regards Tomi.
[email protected] said:
Iv been hacked repeatedly for seven years, I suspect from an ex, I get followed almost daily, people drive past my house, they seem to know my location, I believe they monitor my key strokes, wired this come to be on my phone, basically I'm sick of it. Can someone please help me ? Kind regards Tomi.
Click to expand...
Click to collapse
This is very serious, I recommend you to explain it to the police, depending on where you are, this case will be solved in more or less time.
An investigation will be opened and hackers face pretty high charges. And tell them you get followed, that they know your location and everything. I hope not but it may get worse, you may wanna consider the idea of them being real criminals (like burglar, or worst like kidnappers or something). Please go to the police. When someone takes the time to follow you and go around your house it's maybe because they try to know your schedule or something. Once again, you won't find suitable help here, please call the police and ask them for protection.

What to do before turning device over to law enforcement?

A friend's daughter died a couple of years ago. At the time the death was ruled accidental overdose. Long story short, the police and coroner didn't investigate much of anything and what they did, was shoddy. The case was closed and friend was able to take possession of two of her daughters android phones, one was on network, other just used on wifi. Friend does not have any of the passwords and can't get into them.
Since then, new evidence was discovered that shows close to 100% she was murdered. The police however have refused to reopen the case. Friend has tried everything and recently started a Facebook group (#AnswersForMeagan) as a last resort. Group has taken off and much more info discovered. They are getting a lot of attention so today the Sheriff called my friend and they will be meeting soon.
That said, the sheriff didn't know of the two phones. Friend is obviously apprehensive about turning them over, afraid they could botch things up again, or even intentionally mess up the data (there are indeed bad folks corrupted by the money of trafficking and drugs). This is SC. Is anyone aware of a good place that can get into the phones and minimally save off a copy of the data? If you were doing this, what would your process be?
I used to root my android back in the gs3 days. Before that I actually had a palm Pre. I'm IT, I know my way around well, but I haven't fooled with things for several years. Worst case I can help the friend with the right process, but I'd rather a current professional do it.
Strange question and kind of way off topic, but I used to come here all the time and know someone will have advice. If you're interested, come join the group on fb.
Thanks,
Chuck
If on phone MTP mode is enabled and phone supports a USB-C connection then it should be possible to retrieve user-data stored on phone.
MTP functions a lot like USB mass storage. For example, an MTP device shows up in Windows Explorer so you can browse and transfer files.

Categories

Resources