My sister thinks her phone is hacked, and she's being tormented by the hacker(s) - Samsung Galaxy S7 Questions and Answers

A little bit of back story. Last year my sisters Instagram account was hacked. Following that she believes that they have worked their way into her phone. She has told me they: intercept her calls and voicemails, when she calls Verizon tech support they are intercepting the call to stop her from getting help, they've accessed her camera and speakers turning them on at all hours of the night, cloned her number to respond to her texts, overrode her pictures with a picture of the laughing emoji, cloned her fingerprint to bypass the lock screen, Installed their own version of android to have complete control, etc.
I do not know what I believe, but she believes it whole heartedly. She sent me a whole bunch of phone system logs and screenshots of her system info, but I have only basic knowledge. Can anyone help me read these? To me they look normal, but I'm not an expert. I'm hoping that of I can prove one way or another we can get her help. Either with the hackers, or with her other issues. I don't want to just upload the screenshots because I don't know what personal information they contain, but I can send them to anyone who can analyze them, and is willing to help me.
Thanks in advance

vanishedsarah said:
A little bit of back story. Last year my sisters Instagram account was hacked. Following that she believes that they have worked their way into her phone. She has told me they: intercept her calls and voicemails, when she calls Verizon tech support they are intercepting the call to stop her from getting help, they've accessed her camera and speakers turning them on at all hours of the night, cloned her number to respond to her texts, overrode her pictures with a picture of the laughing emoji, cloned her fingerprint to bypass the lock screen, Installed their own version of android to have complete control, etc.
I do not know what I believe, but she believes it whole heartedly. She sent me a whole bunch of phone system logs and screenshots of her system info, but I have only basic knowledge. Can anyone help me read these? To me they look normal, but I'm not an expert. I'm hoping that of I can prove one way or another we can get her help. Either with the hackers, or with her other issues. I don't want to just upload the screenshots because I don't know what personal information they contain, but I can send them to anyone who can analyze them, and is willing to help me.
Thanks in advance
Click to expand...
Click to collapse
So she has enough tech know how to produce "logs" but doesn't know how to remove the malware, because if your story is true that whats we're talking about here, malware which can be removed very easily.
The level of control your talking about is only possible via the like of the CIA, FBI or a government backed security service. Then you would have to ask yourself, why your sister? Is she a politician? A spy? Someone with the cure for cancer on her phone?
Why doesn't she factory reset the phone? Go to the police? Install a custom ROM even?
I'm sorry to say i think your sister has mental health issues or is just making it up. What your talking about is practically impossible even for the best hackers on the planet.

cooltt said:
So she has enough tech know how to produce "logs" but doesn't know how to remove the malware, because if your story is true that whats we're talking about here, malware which can be removed very easily.
The level of control your talking about is only possible via the like of the CIA, FBI or a government backed security service. Then you would have to ask yourself, why your sister? Is she a politician? A spy? Someone with the cure for cancer on her phone?
Why doesn't she factory reset the phone? Go to the police? Install a custom ROM even?
I'm sorry to say i think your sister has mental health issues or is just making it up. What your talking about is practically impossible even for the best hackers on the planet.
Click to expand...
Click to collapse
I understand what you're saying, and I get it completely. She has gotten a new phone and claims that as soon as she has activated it she got a call from a local number and her system updated when she answered it, there was no one on the line. She believes it could be a group of hackers (target of "gang stalking") or it could be the government (That she is a "targeted individual "). Believe me, I understand how crazy this sounds, and it's completely unbelievable. However, it is also an epidemic that thousands, if not tens of thousands, of people across the globe believe they're a target of. I understand full well that it could be all in her head, but I don't know how to read the system logs she is sending me to be absolutely 100% sure. That's why I'm asking for help. I tried to get her to report it to the local FBI offices cyber crimes unit, but she won't do it in fear that the government is involved or the hacker(s) will retaliate.
I understand that this is completely unbelievable to anyone with a sound and logical mind, but regardless of that, SHE and thousands of American citizens believe this is true, and I don't have the know how to prove/disprove her

Carbon monoxide poisoning can lead to delirium and is more common that you'd expect, otherwise she's got some other kind of mental illness.
Also lot's of people believing something doesn't make it true, and thousands of people is still pretty small compared to the larger population. I'd honestly wager thousands of people are more likely to have paranoia or an undiagnosed mental issue than actually be targeted by group hackers to the accuracy and complexity you've described.

Beanvee7 said:
Carbon monoxide poisoning can lead to delirium and is more common that you'd expect, otherwise she's got some other kind of mental illness.
Also lot's of people believing something doesn't make it true, and thousands of people is still pretty small compared to the larger population. I'd honestly wager thousands of people are more likely to have paranoia or an undiagnosed mental issue than actually be targeted by group hackers to the accuracy and complexity you've described.
Click to expand...
Click to collapse
I agree with you completely, it's most likely a mental illness. Possibly some type of paranoid schizophrenia , but that doesn't make it less real to her. The issue I'm having is explaining the logs to her as normal. I can Google most of the information, but some times I can't find the right answer, that why I was hoping someone could help me read them. I don't know how else to get through to her, other than disproving her theories. I know most likely it won't help, but it's something. She is relating to all these people who believe they're being targeted for one reason or another. Her reasoning is her Instagram name, which apparently is a thing. People het their Instagram hacked so the hacker can sell the OG name. That's how it all started at least, but it has spiralled out of control. I can't disprove her without the knowledge of reading these endless logs she's sending me. I'm trying to approach this with a scientific mindset, if I let it get too personal then it's going to effect me more than I want it to

What you are talking about exists (or existed) on a pc, you could download some kind of trojan (usually found on torrent when you searched for porn or (game)hacks lol) and when you clicked it, that installed some files on your pc that could give someone total control over your pc.. What i talk about is from is maybe 20 years or longer ago. I think most virus scanners or even windows itself instantly recognise these kind of trojans now and remove them before you can click them.
But something like that on a phone?? that would blow my mind because that app would have to able to bypass every security system in android and go unnoticed.
Ask your sister if she downloads apk's from torrent or from suspicious/illegal sites
And like mentioned before in here, let her do factory reset. If she cannot reset to factory settings in her phone let her go to recovery and reset her phone, that uses hardware buttons at startup phone and is hardcoded into her phone.
And aks her how and where she got those logs, take a screenshot of a part of the log, look at it if her name shows up or private stuff and post it. You make it sound like science fiction and we don't even know what logs you are talking about

Related

How safe are custom roms to use?

I was wondering if anyone knows a real answer for this. How easy would it be to cook in something that would send back your email login and password? Or other logins to stuff like banking sites. The people who make the roms seem to be hard working enthusiasts, but it still makes me nervous.
The reason I am asking this is because WM6.1 seems pretty buggy and slow and I was hoping that maybe updating to 6.5 would help, however Sprint is being super slow and vague (as usual) about if they will ever release an official rom.
And please no "then just don't use custom roms" replies. I am just hoping someone has some way to show that they are safe and then I will happily use it!
I was wondering the same thing. I don't use any cooked rom for anything banking related for this possible risk.
I know there are other threads that have the answer but can't find them maybe someone hid them?
Anyway what would the average chef gain, second of all how do you know a member of Opera or IE is not taking down your details or even Bill? "by that i mean there is more to worry about"
My point being chefs cook ROMs to give users better phones than stocks... Also the world of WM isn't laden with virus's/spyware so even doing so would be hard and no one would be bothered to spend there time considering how much time cooking consumes.
Just Hard-SPL your device and start flashing
I find cooked roms are the best! They are tweeked, customized, optimized, flexable, etc. Happy Flashing
Im still leary. Im going to wait until you all flash...then i will know its safe
If any chef here did anything as dumb as that, I guarantee you everyone would know in VERY short order what was done, and that chef would be hung up by his ankles and verbally flogged by everyone here.
Trust me, it's never happened here, and it's not GOING to happen; because we have a great community here with great chefs who do nothing but make life better for everyone else. Choose a ROM, flash it, and quit being so paranoid.
FloatingFatMan said:
If any chef here did anything as dumb as that, I guarantee you everyone would know in VERY short order what was done, and that chef would be hung up by his ankles and verbally flogged by everyone here.
Trust me, it's never happened here, and it's not GOING to happen; because we have a great community here with great chefs who do nothing but make life better for everyone else. Choose a ROM, flash it, and quit being so paranoid.
Click to expand...
Click to collapse
That is a very argumentative answer to a very simple and valid concern that allwires has regarding the security of using cooked rom's. Some people that use these rom's like to use their device's web capabilities for banking and for storing personal information and he brings up a very valid question regarding the safety of using these rom's for these purposes. Then you insult the poster by saying he or she is being paranoid when we all know that the capabilities for wrong doing via viruses and other malicious software are very valid concerns in this day and age. I would like to hear an intelligent and informative answer to this question since I'm sure as this sort of thing becomes more mainstream as it is bound through time to become there will be many more inquiries made as to the safety of their usage.
I'm with FloatingFatMan here, any cook daft enough to do such a thing to a ROM would very quickly be found by his peers, tried, convicted and summarily thrown to the lions.
For all that how do we know Messrs Gates, Jobs, well their minions anyway , and other sundry "professional" ROM cooks are not hiding sneaky payloads in?
deedee said:
I'm with FloatingFatMan here, any cook daft enough to do such a thing to a ROM would very quickly be found by his peers, tried, convicted and summarily thrown to the lions.
For all that how do we know Messrs Gates, Jobs, well their minions anyway , and other sundry "professional" ROM cooks are not hiding sneaky payloads in?
Click to expand...
Click to collapse
Well, but you see that is my point exactly. Whether it is the big guy or the small guy doing it history has shown that where there is a will there is a way, especially when there is a profit to be made. Its like when Norton got busted for spyware found in their AV software in the early 2000's, remember that? I just wonder if such an attempt will be made with this newly emerging technology that is similar to the PC of the late 90's and the early 2000's, vulnerable. No one is offering (at least no one that I'm aware of) AV or firewall software for these various mobile OS's and I think that it is only a matter of time before the bad guys find a way to take advantage of these opportunities the same way they did the PC. Al least over time there became ways to detect these types of illegal practices with firewall software and packet capture software that made the average user capable of some control over his or her personal data.
qqa92 said:
Well, but you see that is my point exactly. Whether it is the big guy or the small guy doing it history has shown that where there is a will there is a way, especially when there is a profit to be made. Its like when Norton got busted for spyware found in their AV software in the early 2000's, remember that? I just wonder if such an attempt will be made with this newly emerging technology that is similar to the PC of the late 90's and the early 2000's, vulnerable. No one is offering (at least no one that I'm aware of) AV or firewall software for these various mobile OS's and I think that it is only a matter of time before the bad guys find a way to take advantage of these opportunities the same way they did the PC. Al least over time there became ways to detect these types of illegal practices with firewall software and packet capture software that made the average user capable of some control over his or her personal data.
Click to expand...
Click to collapse
Hey There,
Not wanting to be unkind but i think you are being very paranoid here and btw, you can indeed purchase AV software for mobile devices; youve only gotta google AV software for windows mobile to see that
The limited OS and how its written means the "baddies" would have nothing to gain/find it difficult to exploit so whats the point.
The only "virus" (and i use the term loosely) i ever came across actually asked you "do you want to install blah blah blah" to which the obvious answer was no.............oooo that was dangerous
To summerise, dont get your knickers in a twist about it and enjoy!
^^ And to add to Tim's comments. Just make sure you get your cooked ROM from an established chef if you're worried, and there won't be any problems.
Now, if the ROM was from someone with a tiny postcount and wasn't known, then you might have cause to think twice; but that's not going to happen here...
timmymarsh said:
Hey There,
Not wanting to be unkind but i think you are being very paranoid here and btw, you can indeed purchase AV software for mobile devices; youve only gotta google AV software for windows mobile to see that
The limited OS and how its written means the "baddies" would have nothing to gain/find it difficult to exploit so whats the point.
The only "virus" (and i use the term loosely) i ever came across actually asked you "do you want to install blah blah blah" to which the obvious answer was no.............oooo that was dangerous
To summerise, dont get your knickers in a twist about it and enjoy!
Click to expand...
Click to collapse
Well then why not let the cat out of the bag. I'm just in here to see if I can get a large portion of the members in here's knickers in a twist so that they will all go out and buy my mobile AV since mine is the biggest one out there currently. Lots of potential there, in terms of cha-ching you have to agree. LOL!
There's also the option of downloading a kitchen and cooking your own ROM ... this method permits you to look at each package in detail.
Cheers,
I once opened my yahoo on a cooked room, later on I was trying to log on on my laptop and password was rejected. I freaked out and kept trying, later that day I was able to log in after few hours for some unknown reason...
I stopped using my HTC fuze for emails since.
The myth that ALL cooked ROMs in here are completely clean sounds like an old familiar story of when the young man said to the girl "don't worry it will not hurt a bit" lol
I wish there was a tool that scans for such security gaps in a ROM
I'm not sure what your reasoningn was to stop using email on the phone because of a failure to login to yahoo from a laptop. Did you notice any malicious activity on your yahoo account? Have you since? Have you changed that password? Just seems strange.
As for the security of cooked ROMS, I've never used one but I have a new phone coming and I'm going to try one from a reputable party here. I'm not nervous about it and I use online banking all the time. Here is why I am not concerned:
1.) As several people pointed out already, your PC is more vulnerable just because of sheer numbers. WinMo has a small market share and cooked ROMs would represent an even smaller market share. Even then, there are many custom ROMs to choose from. Then if EVERY user of a specific tainted ROM used their online banking on their phones, there is still little they could actually do with that information. For example, chase uses text messaging which means yes, someone could get my balance and stuff, but I actually have to login to the site to authorize my phone rather than login through the phone. So the information itself may or may not be useful. At the end of the day, it just wouldn't make the chef much money since there would simply be too few potential victims.
2.) The liklihood is very high that the perp would be caught by their peers and exposed in order to 1 - protect their own integrity, and 2 - get bonus points for being the one who exposed the bad guy (or girl). When you add this level of risk to the low reward, it just doesn't make sense. High risk, lots of work, little reward.
3.) Then of course, if someone fraudulently accesses your account, you can usually get that money back.
So I'm perfectly comfortable froma security standpoint. It's the stability standpoint I'm a bit concerned about but that's why I'm waiting till I get my new phone to try one out so I can go back to my old phone if it all craps out.
RedScorpion78 said:
I once opened my yahoo on a cooked room, later on I was trying to log on on my laptop and password was rejected. I freaked out and kept trying, later that day I was able to log in after few hours for some unknown reason...
I stopped using my HTC fuze for emails since.
The myth that ALL cooked ROMs in here are completely clean sounds like an old familiar story of when the young man said to the girl "don't worry it will not hurt a bit" lol
I wish there was a tool that scans for such security gaps in a ROM
Click to expand...
Click to collapse
I was thinking the same thing and how much it would cost to have Lavasoft or AVG or Symantec evaluate ROMs as an impartial third party.
If anybody is thinking peer review would snuff out cheaters there are plenty cases where Ebay and Craigslist deals go bad and everybody is in on it - even (inadvertently) the local police authority that doesn't have the technical knowhow to deal with a cyber-based threat.
startluvova said:
I was thinking the same thing and how much it would cost to have Lavasoft or AVG or Symantec evaluate ROMs as an impartial third party.
If anybody is thinking peer review would snuff out cheaters there are plenty cases where Ebay and Craigslist deals go bad and everybody is in on it - even (inadvertently) the local police authority that doesn't have the technical knowhow to deal with a cyber-based threat.
Click to expand...
Click to collapse
Hey there,
Way to go to ressurect an old thread
Nothing has changed, i have never heard of seen of a custom rom that has a virus cooked in, or one that has been intentionally created to spy on the user.
That said, i guess you have to make your own decision after reading the comments from some experienced chefs/flashers here
CHeers.

Privacy Concerns - Google Firmware

I am concerned that Google has their tentacles all throughout the OS, and I want to take all measures to stop that. I particularly don't like their search query tracking (I use ixquick) and their nav app, as their privacy policies are atrocious.
Before someone accuses me of being a hacker or criminal, I am simply not willing to hand over my 220 year old Constitutional rights for a transient fear campaign manufactured by The Machine. And I do not want my information used for profit without permission. I used to be a cracker, and know what is possible. I'll not respond to those who call me 'paranoid'; they are oblivious.
Of course I'll not be using the apps of that-search-engine-everybody-uses. Removing them forthwith, in favor of whatever GPL open-source apps there are available for various functions. Using self-contained nav software like CoPilot or TomTom.
So, have any devs investigated whether Android phones home at any interval? Have measures been taken to privacy-enable the Android firmware?
I hear that HTC has some sort of 'phone home' function. How to neuter that?
What good is Wifi? Is it that you can use that when available, not using up 3G bytes? I am asking what use it is on a mobile in consideration of mobility and the security problems -- what uses can this be put to, and how to secure the phone?
Where is the best place to find open-source apps?
I'm curious about this as well, not so much from a privacy standpoint, but how the hell can I stop the mysterious data that is flowing out of my phone when everything like background syncing and all data connections are turned off.
http://source.android.com/
This is all you need - you could remove/modify anything you want, so... what's your problem? And actually Google apps aren't in the Android sources, so you won't have them after compiling. Yeah, two birds with one stone.
Also you could disable WiFi if you don't like it.
Tachikoma_kun said:
how the hell can I stop the mysterious data that is flowing out of my phone when everything like background syncing and all data connections are turned off.
Click to expand...
Click to collapse
Errr... what ROM and how many apps do you have installed? There is no "mysterious data" on clean system, but 25% of apps use data connection for various reasons.
I'm on the stock 2.1 ROM for the Samsung Galaxy S. I turn all the background syncing, email, and stuff like that off, and overnight it can use about 1MB of data.
I don't have any "free" apps running that might download new banners or anything like that.
The background syncing does not turn anything off as far as I know.
To my knowledge it allows 3rd party apps the ability to check if the user has flagged this, but they do not have to respect this flag.
Tachikoma_kun said:
I'm on the stock 2.1 ROM for the Samsung Galaxy S. I turn all the background syncing, email, and stuff like that off, and overnight it can use about 1MB of data.
I don't have any "free" apps running that might download new banners or anything like that.
Click to expand...
Click to collapse
Syncing is just... syncing. But there are many other things, that apps do. Spare Parts -> Battery history -> Network usage.
Brut.all said:
http://source.android.com/
This is all you need - you could remove/modify anything you want, so... what's your problem?
Click to expand...
Click to collapse
What's my problem, LOL? I am a 52yo real estate developer, not a coder. This is why I'm asking the question.
Quantumstate said:
What's my problem, LOL? I am a 52yo real estate developer, not a coder. This is why I'm asking the question.
Click to expand...
Click to collapse
i think he meant either put up or shut up, which is a pretty reasonable statement.
IMO it's anonymous user data.... let them build cybernet
otherwise say no to the T.O.S that is your constitutional right if you have "privacy" concerns
Brut.all said:
Syncing is just... syncing. But there are many other things, that apps do. Spare Parts -> Battery history -> Network usage.
Click to expand...
Click to collapse
Thanks, will give that a try.
themapleboy said:
i think he meant either put up or shut up, which is a pretty reasonable statement.
Click to expand...
Click to collapse
I meant we all have access to the sources, so we don't have to "investigate" what Android exactly does - we just know, that it doesn't do any "mysterious" things. There are many people working with these sources for many months, I doubt there are some undiscovered things.
Brut.all said:
I meant we all have access to the sources, so we don't have to "investigate" what Android exactly does - we just know, that it doesn't do any "mysterious" things. There are many people working with these sources for many months, I doubt there are some undiscovered things.
Click to expand...
Click to collapse
u know what they say about assuming...... it always makes you look like a jackass
Yeah, I mean we're not playing with iOS4 or anything.
In all seriousness, Android's been out for quite a while now and has been looked at by a LOT of people. Not saying that it's *impossible* but it's highly unlikely that anything nefarious is going on.
If you're still concerned, I suppose you could always opt not to install the Google Apps, but you'd be a bit limited, functionality-wise.
Sent from my Droid using XDA App
themapleboy said:
let them build cybernet
Click to expand...
Click to collapse
O' little do you know... many years ago I did work in Eastern Europe. You have no idea the paranoia a society can endure. For an idea, watch the old TV series Danger Man. Or the movie 1984.
If most young people share your view, it is a dark future. I'm glad I'll be dead.
herald83 said:
In all seriousness, Android's been out for quite a while now and has been looked at by a LOT of people. Not saying that it's *impossible* but it's highly unlikely that anything nefarious is going on.
Click to expand...
Click to collapse
Understand. I just can not believe though that Google is not harvesting some sort of information, as that's their business model. They never discard any info they receive, and you can build a shockingly accurate portrait of someone from their searches over time. Google's CEO recently said, "If You Have Something You Don't Want Anyone To Know, Maybe You Shouldn't Be Doing It", echoing the Bush Doctrine of a Police State.
Maybe Android is innocuous for now, and I'm sure it's been examined. But I'm wondering what the results were? Why are ppl seeing data outflows?
I smell a rat...
Quantumstate said:
...Before someone accuses me of being a hacker or criminal, I am simply not willing to hand over my 220 year old Constitutional rights for a transient fear campaign manufactured by The Machine. And I do not want my information used for profit without permission. I used to be a cracker, and know what is possible. I'll not respond to those who call me 'paranoid'; they are oblivious...
Click to expand...
Click to collapse
Quantumstate said:
What's my problem, LOL? I am a 52yo real estate developer, not a coder. This is why I'm asking the question.
Click to expand...
Click to collapse
A 52yo real estate developer, whose not a coder, but used to be a "cracker" and knows what is possible? Anyone else here think this doesn't make a bit of sense?
It's funny, but it sounds like someone is trying to stir up some FUD by making claims that Android is somehow doing an "All your data are belong to us...". I hope Apple aren't paying your cheques!
@perpetualmotionuk: Be advised that there is a difference between mathematics and decryption, and coding. Yes I can do some coding, but not at a level necessary to analyze and modify an operating system.
If Apple were paying my 'cheques', wouldn't I come in with some sort of proof that monitoring is taking place? Rather than asking what others have found?
Now, rather than trying to tear people down, why don't you use that considerable nose to investigate this yourself?
No one's seen anything about info leakage?
Quantumstate said:
Understand. I just can not believe though that Google is not harvesting some sort of information, as that's their business model. They never discard any info they receive, and you can build a shockingly accurate portrait of someone from their searches over time. Google's CEO recently said, "If You Have Something You Don't Want Anyone To Know, Maybe You Shouldn't Be Doing It", echoing the Bush Doctrine of a Police State.
Maybe Android is innocuous for now, and I'm sure it's been examined. But I'm wondering what the results were? Why are ppl seeing data outflows?
Click to expand...
Click to collapse
Most of that data is pulled from search history, I suspect. Which you can disable, if I recall. Don't have my phone on me at the moment to confirm.
I just did a very simple test on an emulator: after ~15 minutes of running system there was 0 (zero, null) of network packets. Now I want to do the same on a device with clean system, but I think results will be the same or similar (SDK system is just normal Android - very similar to these from devices).
I have a feeling that even if I will catch zero packets as well, you will be asking whether Google send something mysterious through... errr... bluetooth? Some hidden antenna?
If you're worried about Google tracking your info...root the phone and don't install the Google apps. What do ya know...problem solved.
If you're still worried that people are tracking what you are doing see steps below.
1) Flush phone or give to a homeless guy to throw them off.
2) Destroy Computers.
3) Liquidate everything you own.
4) Walk into the woods and live off the land.
5) Kill self shortly after because they already have a file on you.
You say you're a 52 year old real estate developer...guess what...they're already tracking you. You're already helping to build "cybernet" just by living and breathing.
And if you are really worried about your "220 year old Constitutional Rights" then go read the Patriot Act and discover that you don't have ****.
I'm normally not one to flame...but you are an absolute idiot.
I'm not an English person, excuse for the syntax/grammar/... mistakes I'd could make.
hedjemunkee said:
I'm normally not one to flame...but you are an absolute idiot.
Click to expand...
Click to collapse
I don't understand WHY this person could be considered as "an absolute idiot" by ASKING if some 'data' are sent over the network through the phone.
Facebook, with it's ad system is sending information for each ad displayed (not alot, but still some !)....
ADS.GOOGLE do you have any idea about what's behind !?
I don't have the number (nobody have it) of webpages using it but it's huge. with this you can track navigation of people, establish profiles, link to a physical person. Without your consent.
I understand the concern of the "OP" here. I don't think the data sent are easy to "catch", or are systematically sent... maybe there is no, and you are paranoid. But it "COULD". So easily. I'm from the young tech generation.
And to quote
Quantumstate said:
If most young people share your view, it is a dark future. I'm glad I'll be dead.
Click to expand...
Click to collapse
People who don't ask themselve the question, or wich refuse to be open minded enough to consider the right to ask this question ... could be surprised very soon. I'm not directly affraid of "google". I'm affraid of those 'blind' people.
You'll be dead in less than 10years !? I hope we can share some of the darkness you're talking about. your parent's generation started it, you continued it.
Anyway, back to the topic.
Why in my pocess list i've : (app id number) com.ap.SnapPhoto:remote
even when I do not use the camera !?
...when I notice my battery is being used more than usual I check the process list and I find this...
What's this "remote" !?
Maybe "remote" refers to "another app wich launch this app"... ? Otherwise... wow.

Carrier IQ

http://www.carrieriq.com/index.htm
I just heard about this and can't believe how little we know we are being spied on. Is this installed on the sensation? If so are there any ROMS which remove it? Am I just digging up old news or what does everybody else know about this?
smockpuv said:
http://www.carrieriq.com/index.htm
I just heard about this and can't believe how little we know we are being spied on. Is this installed on the sensation? If so are there any ROMS which remove it? Am I just digging up old news or what does everybody else know about this?
Click to expand...
Click to collapse
Old news.
No this is not old news at all. This subject is still being looked into and things are coming to light about it more and more. Yes this is very much on the Sensation. Me personally I am glad someone started a thread on it as it is something I feel everyone should be concerned with.
If you want to learn more about it just go to the XDA Portal and type in a search for Carrier IQ, CIQ, or just IQ and you will see there has been several stories in the portal about it and the dev that is trying to bring all of this CIQ BS into the view of the masses.
Also I have not looked to see but I imagen that there is some custom ROMs for the Sensation that has the CIQ removed from it. I beleive any of the CM7 based ROMs do not have it and it may be more you will just have to read the first posts in the thread by the chef that cooked the ROM.
T-Macgnolia said:
No this is not old news at all. This subnet t is still being looked into and things are coming to light about it more and more. Yes this is very much on the Sensation. Me personally I am glad someone started a thread on it as it is something I feel everyone should be concerned with.
If you want to learn more about it just go to the XDA Portal and type in a search for Carrier IQ, CIQ, or just IQ and you will see there has been several stories in the portal about it and the dev that is Beloit.g to bring all of this CIQ BS into the view of the masses.
Also I have not looked to see but I imagen that there is some custom ROMs for the Sensation that has the CIQ removed from it. I beleive any of the CM7 based ROMs do not have it and it may be more you will just have to read the first posts in the thread by the chef that cooked the ROM.
Click to expand...
Click to collapse
Hi,
I found that ROM CLEANER does the business of removing all the offending crap.
Worth looking into.
malybru said:
Hi,
I found that ROM CLEANER does the business of removing all the offending crap.
Worth looking into.
Click to expand...
Click to collapse
The ROM just cleans bloatware and other things in HTC Sense to help the ROM run smoother. All devices have this CIQ on them, it is not an app but several things that are hidden deep in the ROM and has to be cooked out of the ROM. ASOP ROMs do not have it. Go read this article by azrienoch on it. Make sure to click on the links in the article too then you will have a better understanding of what I mean. You will also see why it is such a big deal.
Update to the current Carrier IQ fiasco with video proof
http://m.wired.com/threatlevel/2011/11/secret-software-logging-video/
Separate link for the youtube video for easier access.
http://www.youtube.com/watch?v=T17XQI_AYNo&feature=youtube_gdata_player
In the T-Mobile galaxy s 2 forums the carrier IQ the is in the kernel is that where it is in sensation? I can't find any of the know names in my wife's phone.
Sent from my SGH-T959 using xda premium
i just had the word with the guy who made the video and he told me that this only affect u.s.a people and this doesn't affect anyone living in eurpoe so if you live in uk, ireland and other part of eurpoe than you are fine.
I'm in the US and i read this over and over, and to be honest i can give to giggles of a squirting crap bout this, everyone takes this out of proportion and think its end of the world cause something in there is loggin your keys,
ITS IN EVERYTHING!! get over it already, its in your game consoles, in your laptops, in your PCS, just deal with it nothing you can do or say will change this
and lot of you will say no its not, BUT IT IS! think bout all the times your send a report of a crash on a pc or anything, deeping read ToS on consoles all have tracker/logger
ilostchild said:
I'm in the US and i read this over and over, and to be honest i can give to giggles of a squirting crap bout this, everyone takes this out of proportion and think its end of the world cause something in there is loggin your keys,
ITS IN EVERYTHING!! get over it already, its in your game consoles, in your laptops, in your PCS, just deal with it nothing you can do or say will change this
and lot of you will say no its not, BUT IT IS! think bout all the times your send a report of a crash on a pc or anything, deeping read ToS on consoles all have tracker/logger
Click to expand...
Click to collapse
So, because tracking software is being put on many devices we use every day, we should not worry about it?
Perhaps if consumers were made more aware of things like this, they could stem the tide of invasive technology.
Sent from my Sensation using xda premium
ilostchild said:
I'm in the US and i read this over and over, and to be honest i can give to giggles of a squirting crap bout this, everyone takes this out of proportion and think its end of the world cause something in there is loggin your keys,
ITS IN EVERYTHING!! get over it already, its in your game consoles, in your laptops, in your PCS, just deal with it nothing you can do or say will change this
and lot of you will say no its not, BUT IT IS! think bout all the times your send a report of a crash on a pc or anything, deeping read ToS on consoles all have tracker/logger
Click to expand...
Click to collapse
CIQ is definitely a whole new species of logging software, put onto your device by your friendly network operator.
I dare to say that there is absolutely no comparable spying software case so far. If you´d have fully studied about the software this thread is mentioning, you most probably would not have written your statement.
A key logger which records *everything* you type without encryption? A key logger which reads your SMS/test message even before you read it? Come on. This kind of stuff is *definitely" not "in everything". It may be in all network operator subsidized mobile phones (not only Android, but also Nokia and Blackberry affected) in the USA - but definitely not here in Europe.
Here, we actually have laws against such software - especially if it´s distributed by large organizations like network operators, this could result in multi-billion dollar fines. People here in Europe are not wiser, but they tend to fight a bit more against "big brother" who might be "watching you".
tictac0566 said:
CIQ is definitely a whole new species of logging software, put onto your device by your friendly network operator.
I dare to say that there is absolutely no comparable spying software case so far. If you´d have fully studied about the software this thread is mentioning, you most probably would not have written your statement.
A key logger which records *everything* you type without encryption? A key logger which reads your SMS/test message even before you read it? Come on. This kind of stuff is *definitely" not "in everything". It may be in all network operator subsidized mobile phones (not only Android, but also Nokia and Blackberry affected) in the USA - but definitely not here in Europe.
Here, we actually have laws against such software - especially if it´s distributed by large organizations like network operators, this could result in multi-billion dollar fines. People here in Europe are not wiser, but they tend to fight a bit more against "big brother" who might be "watching you".
Click to expand...
Click to collapse
i know what it does, and i still stand on my statement, as you and i type every letter on our keyboard it si being key logged to thats the sad truth of this an everything, no matter how you look or want to make aware to anyone its still exist and as technology grows so will this.. so either cry and complain bout it everytime some like this comes up or just say i know the fact im being watched but what else more can i do.. cause there is nothing you can do.. your normal house phones are being logged, not lot know this but there is KEY words that if you say in a conversation it picks up and sends a alert to the proper authorities..
its something to look and jus get over...
Also think bout it, when something goes truly bad, say a murder uses a phone officials can pick up they logging of calls and texts and read them back, so this loggin has been around for awhile so i dont understand why its becoming sucha big deal when its been around
ilostchild said:
i know what it does, and i still stand on my statement, as you and i type every letter on our keyboard it si being key logged to thats the sad truth of this an everything, no matter how you look or want to make aware to anyone its still exist and as technology grows so will this.. so either cry and complain bout it everytime some like this comes up or just say i know the fact im being watched but what else more can i do.. cause there is nothing you can do.. your normal house phones are being logged, not lot know this but there is KEY words that if you say in a conversation it picks up and sends a alert to the proper authorities..
its something to look and jus get over...
Also think bout it, when something goes truly bad, say a murder uses a phone officials can pick up they logging of calls and texts and read them back, so this loggin has been around for awhile so i dont understand why its becoming sucha big deal when its been around
Click to expand...
Click to collapse
I wonder how this affects the speed and responsiveness of the phone's OS?
ilostchild said:
i know what it does, and i still stand on my statement, as you and i type every letter on our keyboard it si being key logged to thats the sad truth of this an everything, no matter how you look or want to make aware to anyone its still exist and as technology grows so will this.. so either cry and complain bout it everytime some like this comes up or just say i know the fact im being watched but what else more can i do.. cause there is nothing you can do.. your normal house phones are being logged, not lot know this but there is KEY words that if you say in a conversation it picks up and sends a alert to the proper authorities..
its something to look and jus get over...
Also think bout it, when something goes truly bad, say a murder uses a phone officials can pick up they logging of calls and texts and read them back, so this loggin has been around for awhile so i dont understand why its becoming sucha big deal when its been around
Click to expand...
Click to collapse
Yes that is true what you said but most people already know that cops can get your records from a phone company with a search warrant depending on how long that company keeps those records.
This is deferent, a third party collecting all information of what you do on your phone without your consent or knowledge is wrong. This company is also not the government so what right do they have without your consent.
Yes on a console, a PC, and1st and 2nd party apps on your phone you give consent for them to use various monitoring techniques but you have a choice, here with carrier IQ you are not giving that choice it is there and you have to use a crowbar to get it out of your phone.
I'm no fanatic but I do believe in the constitution. It is your right to give away your privacy but it is not for someone else to take it away from you.
Sent from my SGH-T959 using xda premium
ilostchild said:
i know what it does, and i still stand on my statement, as you and i type every letter on our keyboard it si being key logged to thats the sad truth of this an everything, no matter how you look or want to make aware to anyone its still exist and as technology grows so will this.. so either cry and complain bout it everytime some like this comes up or just say i know the fact im being watched but what else more can i do.. cause there is nothing you can do.. your normal house phones are being logged, not lot know this but there is KEY words that if you say in a conversation it picks up and sends a alert to the proper authorities..
its something to look and jus get over...
Also think bout it, when something goes truly bad, say a murder uses a phone officials can pick up they logging of calls and texts and read them back, so this loggin has been around for awhile so i dont understand why its becoming sucha big deal when its been around
Click to expand...
Click to collapse
You keep saying it is nothing you can do about it, well you could not be more wrong. You can take and S-off your device, unlock your device, root, or what ever the proper method is for your particular device to be able to flash a custom recovery. Then simple download and flash any AOSP ROM. This will give you a device without CIQ.
Now you must not have read the official withdraw of the S&D letter to TrevE that IQ posted a link to on their website. Go yo the XDA Portal and have a look a the latest article by orb3000. Obviously the message has gotten to IQ and I would say more than likely the Carriers. Yeah some say that the power users are a small group but it is a group with great power. When the people that a large force in building enthusiasm for devices and OS's speak out against something that they do not like, people tend to listen. Therefore it has a large chance of affecting sales, new contract signings, and contract renewals.
This whole attitude of people not being able to do anything about something people consider wrong, is such a epic fail. I mean if no one never tries to bring change to something then yeah sure nothing will happen. And the powers that be gains that much more control. But luckily people are starting to get tired of never having change and are starting to do something about this messed up world of ours.
Last thing, if you think this is a simple logging system. Again you could be more wrong. This CIQ has full access to your device, as well as full rights. It can not be killed, forced close, or uninstall. I will not go into any further details, but this is far from what IQ and the carriers want you to think it is.
Shery4life said:
i just had the word with the guy who made the video and he told me that this only affect u.s.a people and this doesn't affect anyone living in eurpoe so if you live in uk, ireland and other part of eurpoe than you are fine.
Click to expand...
Click to collapse
Carrier is a global company. The company does have offices in London...
http://www.carrieriq.com/company/index.htm
And under the heading "About Carrier IQ"
http://www.sys-con.com/node/1865183
So European phones may have CIQ installed depending on what the mobile provider. Something that our friends over the pond
should research.
Sent from my SGH-T959 using xda premium
T-Macgnolia said:
You keep saying it is nothing you can do about it, well you could not be more wrong. You can take and S-off your device, unlock your device, root, or what ever the proper method is for your particular device to be able to flash a custom recovery. Then simple download and flash any AOSP ROM. This will give you a device without CIQ.
Now you must not have read the official withdraw of the S&D letter to TrevE that IQ posted a link to on their website. Go yo the XDA Portal and have a look a the latest article by orb3000. Obviously the message has gotten to IQ and I would say more than likely the Carriers. Yeah some say that the power users are a small group but it is a group with great power. When the people that a large force in building enthusiasm for devices and OS's speak out against something that they do not like, people tend to listen. Therefore it has a large chance of affecting sales, new contract signings, and contract renewals.
This whole attitude of people not being able to do anything about something people consider wrong, is such a epic fail. I mean if no one never tries to bring change to something then yeah sure nothing will happen. And the powers that be gains that much more control. But luckily people are starting to get tired of never having change and are starting to do something about this messed up world of ours.
Last thing, if you think this is a simple logging system. Again you could be more wrong. This CIQ has full access to your device, as well as full rights. It can not be killed, forced close, or uninstall. I will not go into any further details, but this is far from what IQ and the carriers want you to think it is.
Click to expand...
Click to collapse
Hi,
That is very well put.
If you sit back and do nothing, then nothing will get done.
The more people complain about this, the more something is likely to be done.
As far as the carriers are concerned, they probably think that no one knows that this stuff is even installed!
Its important to show our awareness of this situation, and complain about it.
How about Logging TestApp? I heard that this app helps you erase all the logging apps in the phone, including this one.
This issue just Made ABC news this morning
gtrplr71 said:
This issue just Made ABC news this morning
Click to expand...
Click to collapse
This issue made international news.
http://www.forbes.com/sites/andygre...ve-violated-wiretap-law-in-millions-of-cases/
Wow, at first i was reading this thread and had the same, "well whatever" attitude. But after just a couple of minutes googling and reading, this is really messed up. CarrierIQ has issued a cease and dismiss order against the guy in the video, along with threats to sue if he does not publicly apologize.

s960 usqu9fue1 FRP PLZ HELP

I've tried it all making my own combo rom downloading's from multiple sources multiple odin versions nothing is working it is literally costing me money and sleep i need this phone to work asap i cant find the right forum or am to stupid to know what the right one is would really really appreciate an answer asap on this like my whole show is depending on it and I'm failing badly id love a step by step for dummies concerning frp removal or bypass for this modal its s9 Verizon on 10 usqu9fue1 please thankyou
To disable / remove FRP lock you
either
delete your Google account on phone
or
do a Factory Reset
jwoegerbauer said:
To disable / remove FRP lock you
either
delete your Google account on phone
or
do a Factory Reset
Click to expand...
Click to collapse
Factory reset doesn't remove FRP lock, that actually puts the device in a state of being FRP locked if FRP/Find My Device hasn't been disabled BEFORE doing the factory reset.
Droidriven said:
Factory reset doesn't remove FRP lock, that actually puts the device in a state of being FRP locked if FRP/Find My Device hasn't been disabled BEFORE doing the factory reset.
Click to expand...
Click to collapse
Wtfanyone that actually has a clue care to help me out....wow just....wow
jwoegerbauer said:
To disable / remove FRP lock you
either
delete your Google account on phone
or
do a Factory Reset
Click to expand...
Click to collapse
No why are u answering questions fr like....wtf
Jessicad89 said:
Wtfanyone that actually has a clue care to help me out....wow just....wow
Click to expand...
Click to collapse
Not all devices are equal, therefore, the fix to this varies from one device to the next. Also, giving you the solution also makes the solution available to people that are trying to find a way to remove FRP lock from devices that are not rightfully theirs, such as stolen devices. To avoid potentially aiding someone in gaining access to devices and personal data that is not theirs, we typically don't answer. We also don't know if the device you are trying to access is actually yours, I mean, it isn't like we can take your word for it because you could be lying to us and we wouldn't know, not that you are, just saying that it is an uncertain scenario. It isn't specifically against the forum rules but its kind of an unspoken rule because it is a grey area that is best to stay out of.
Droidriven said:
Not all devices are equal, therefore, the fix to this varies from one device to the next. Also, giving you the solution also makes the solution available to people that are trying to find a way to remove FRP lock from devices that are not rightfully theirs, such as stolen devices. To avoid potentially aiding someone in gaining access to devices and personal data that is not theirs, we typically don't answer. We also don't know if the device you are trying to access is actually yours, I mean, it isn't like we can take your word for it because you could be lying to us and we wouldn't know, not that you are, just saying that it is an uncertain scenario. It isn't specifically against the forum rules but its kind of an unspoken rule because it is a grey area that is best to stay out of.
Click to expand...
Click to collapse
that is an asinine approach and a terrible mentality why wuld you even take the time to tell me that load of hogwash, is isnt my fault thaat production companies are struggling ith security and have terrible answers i provide the information needed to identify the correct procedure u know...the modal number build ect. i am somewhat appalled by this response as it has wasted both of our time, i live in America where your innocent till proven guilty not assumed potentially guilty at all times i will find an answer regardless of your counterproductive rathole ideology concerning information. heres whos fault it is if a device is stolen...the owners security is my responsibility concerning my things and that goes across the board worldwide. but i do appreciate well nothing about what you've said here. quite the opposite google its he evil empire and the "solution" of frp is absolutely a wash but thanks anyways
Wondering why you not simply do a Google search for it, if the answer given here isn't what you expected to be, instead of ranting around here?
BTW:
The Factory Reset Protection (FRP) is regulated in the US via the Smartphone Theft Prevention Act of 2015. The Act requires device manufacturers to feature a so-called "kill switch". The purpose of the kill switch was to discourage smartphone theft by dramatically reducing resale value of stolen devices.
Jessicad89 said:
that is an asinine approach and a terrible mentality why wuld you even take the time to tell me that load of hogwash, is isnt my fault thaat production companies are struggling ith security and have terrible answers i provide the information needed to identify the correct procedure u know...the modal number build ect. i am somewhat appalled by this response as it has wasted both of our time, i live in America where your innocent till proven guilty not assumed potentially guilty at all times i will find an answer regardless of your counterproductive rathole ideology concerning information. heres whos fault it is if a device is stolen...the owners security is my responsibility concerning my things and that goes across the board worldwide. but i do appreciate well nothing about what you've said here. quite the opposite google its he evil empire and the "solution" of frp is absolutely a wash but thanks anyways
Click to expand...
Click to collapse
Just because it isn't the reply that you wanted, does not make it hogwash. If you can't understand the logic of what I said, that's your failing, not mine. I don't care what you appreciate or don't, that has nothing to do with anything. Thinking like that only makes you the one with the personal problem, not us. FRP exists for a very good reason, one that is understandably inconvenient for you in the current circumstances. It has nothing to do with guilt, no one labeled you or assumed you to be guilty, don't take it personal and drop the attitude.
But, hey, nevermind the fact that FRP exists for a reason, let's just ignore that just for you since it is you and you are so special that we should help you while at the same time making it easier for actual thieves to be able to use and resale devices that they've stolen, let's enable criminal activity just to help you since you're so special, right? Get real!
Droidriven said:
Just because it isn't the reply that you wanted, does not make it hogwash. If you can't understand the logic of what I said, that's your failing, not mine. I don't care what you appreciate or don't, that has nothing to do with anything. Thinking like that only makes you the one with the personal problem, not us. FRP exists for a very good reason, one that is understandably inconvenient for you in the current circumstances. It has nothing to do with guilt, no one labeled you or assumed you to be guilty, don't take it personal and drop the attitude.
But, hey, nevermind the fact that FRP exists for a reason, let's just ignore that just for you since it is you and you are so special that we should help you while at the same time making it easier for actual thieves to be able to use and resale devices that they've stolen, let's enable criminal activity just to help you since you're so special, right? Get real!
Click to expand...
Click to collapse
i care so little about what you have to say i didn't even read that dribble and will continue that policy throughout our relationship ill get it either way thought i would give xda a shot if your representative of the body of knowledge and attitude here it as a mistake to be certain
Jessicad89 said:
i care so little about what you have to say i didn't even read that dribble and will continue that policy throughout our relationship ill get it either way thought i would give xda a shot if your representative of the body of knowledge and attitude here it as a mistake to be certain
Click to expand...
Click to collapse
Do you think your opinion matters to anyone here? Do you think your attitude makes you superior somehow? It actually achieves quite the opposite, but please, continue proving me right, I know you've got more big talk in there somewhere because that is all you have, which is nothing.

Please help me with my Tab A 10.1 wifi PLEASE

So, a bit of a backstory. I'm part of a parenting group who does work with the local school system. They help lower income families and such, and during the remote learning part of COVID they were responsible for giving out tablets and hot spots to allow children without the means to remotely learn. Well now that remote learning is over they had surplus tablets and hotspots and because my fiancée and I are in a parenting group/education class we were entered in a raffle sponsored by them. We won tablets. Tab A 10.1 Wi-Fi tabs. Nice as hell. They came loaded with a Knox configuration for a company for early education called HATCH. Inc. It uses an app called IGNITE!. The security profile locks the wallpaper, and a few other things that are obviously centered around the school stuff. Well, a lot is unlocked also, but I'm concerned about my privacy and inability to upgrade and/or install apps of my discretion. I reached out to the head company several times for them to unlock it. I opened the developers options and was able to enable USB debugging as well as OEM unlock to unlock the bootloader. It had the option readily available. Since then, I have tried EVERYTHING to uninstall this security profile by flashing custom ROMs and everything. I've googled several dozen hours and have installed drivers, .tar recovery files, apps, Odin, flashers, rooters, romers, holy relics, mantras, novels, movies, self-help magazines, you freaking name it I've done it. I also have yet to find a clear, DEFINED set of instructions for my SPECIFIC model of tablet, and the firmware downloads are questionable. Please, PLEASE freaking God above, PLEASE, one of you android gurus help me! I can't get up with the company to remove it because they don't return calls or emails, and I can't find any real help online. This is so freaking aggravating. I OWN THIS TABLET. IT IS MY PROPERTY. Someone, help me disable this Knox crap, so I can use my tablet at my discretion. Please.
That's quit a story...
Indeed. Quite the story and quite the debacle. Most definitely one of the most annoying things that I've dealt with in a long while.
nundril said:
Indeed. Quite the story and quite the debacle. Most definitely one of the most annoying things that I've dealt with in a long while.
Click to expand...
Click to collapse
Try to stick to just the pertinent facts especially with issues like this. The axion the longer the story the bigger the lie applies to my former statement. You didn't snap on me so I'll give you the benefit of doubt.
You won't like the answer but the easiest way is to get the IT department to delete the work profile. Not much of a prize if they don't. Some face to face encounters might motivate them better. Rub it it in if you have to, and don't take no for an answer. May take multiple people, trips, letters, whatever, climb the ladder to the top of that administrative chain if needed.
Consider it a lesson in assertiveness, you can never get too much of this type of training and it's free.
Otherwise the solutions you see in the Google searches are what's available.
Understandable. As of now I've just stuck to emails and phone calls. The head office is located about an hour and a half from my location so a ride to them for me and my fiancee tablets to work might be worth it. Appreciate the response and the honesty, I just figured I would explain the situation because I've seen so many times where a situation could've been handled had it been explained in greater detail. Just trying to convey the whole situation to an audience with zero knowledge of me or the situation as to hopefully reach someone with the knowledge to help, that's all.
Knox is a true pain. I avoid using it as much as possible because of the trouble it can cause.
XDA gets at times 1 request a day to bypass FRP lockouts. Some of those are stolen devices.
My dead mother's, friend's, etc. , I forgot it, it was like this when I bought it, my professor assigned us to hack it; the list is endless. Most are first post new members.
Of course some are innocent victims that got caught up in the machine as it were. Best advice is to return to vendor/do a charge back or get the unlock code from the last owner.
Rock simple stupid works the best.
If you're in the right the satisfaction of getting it resolved outweighs the time spent. I'm one of the few people who has gotten a refund check from Sony... it took dozens of calls. It was worth it in satisfaction alone
Do you think that calling Samsung customer support would make something shake? I mean considering we are legitimate owners, of which the instructors of our parenting class (who are employees of the early education place who distributed the tablets) are happy to attest to. I talked to them and they said to email or call and they would verify ownership and the details of the raffle etc etc to whomever reached out to them. If Hatch. Inc won't answer my calls perhaps Samsung might be able to help? Just trying to gather info at this point.
nundril said:
Do you think that calling Samsung customer support would make something shake? I mean considering we are legitimate owners, of which the instructors of our parenting class (who are employees of the early education place who distributed the tablets) are happy to attest to. I talked to them and they said to email or call and they would verify ownership and the details of the raffle etc etc to whomever reached out to them. If Hatch. Inc won't answer my calls perhaps Samsung might be able to help? Just trying to gather info at this point.
Click to expand...
Click to collapse
You can try, Samsung customer support is notoriously horrible. Replacing the mobo would fix it. There maybe less drastic ways to resolve it.
The source of your dilemma are your benefactors not ensuring the gifts were properly decommissioned. They should see their mistake is rectified if they are sincere. Actions have consequences... even if by omission.

Categories

Resources