• Icann W. Neustoo

Is the RCMP or FBI Intercepting my Internet? Here's How You Can Tell and What to Do

If you are a journalist like myself and have had the RCMP monitoring you for 23+ Years and Follow you around on a daily basis, then here is how you can tell if they are monitoring your internet.

Law enforcement typically performs Wi-Fi eavesdropping via: type of man-in-the-middle attack that tricks unsuspecting victims into connecting to a malicious Wi-Fi network. To perform Wi-Fi eavesdropping, a hacker sets up a Wi-Fi hotspot near a location where people usually connect to a public Wi-Fi network. This can be a hotel, a restaurant or your local Starbucks. The hacker then names the hotspot after the actual public network that people use in that location (thus the name “evil twin”).

Since people usually set their devices to remember and automatically reconnect to known Wi-Fi networks, as soon as they come in the vicinity of the malicious hotspot, they automatically connect to it. The user will then think they have been connected to the legitimate network.

I recently found a 2nd Modem installed on my computer. This was a different modem then my Centrino and it was called Anatel. After careful research, I found that law enforcement had surreptiously entered my home without a warrant, taken my computer and began installing these modems without my consent, etc.

Here are the other ways that law enforcement have intercepted your web usage:

1) 2nd Modem Installed- Always check your computer to see how many modems were installed. When I purchased my computer it had 1x modem – Centrino. After a couple years, I noticed a lag when I would go to certain websites. After installing additional RAM, I noticed a 2nd modem installed (Anatel)- SEE PICTURES

2) Additional Modems Soldered Into Motherboard- Recently, I had my Lenovo Tiny Desktop computer stolen and then returned. When it was returned, I ran an DOS prompt for ipconfig/all to see check my network capabilities, etc. I noticed that there were 2 other network communication devices

3) Domain Point Forwarding- I had my IP4 and IP6 gateways being forwarded to a specific domain then to the World Wide Web, its seems that the RCMP (equivalent of the FBI) will stop at nothing to monitor an independent journalist, freedom fighter, and ex-drug trafficker to report in-depth news to the masses

4) VP Tunneling- Another method recently seen is a VP tunnel that goes directly to the Ottawa RCMP and CSIS tech departments, then routes thru Akamai in Langley, VA which is likely (CIA and FBI) via: their servers.

Since they are acting as the gatekeeper to the internet, the law enforcement can now perform a number of man-in-the-middle techniques. For instance, they can perform SSL stripping attacks to force users to go through the unencrypted versions of their favorite websites, or they can stage DNS hijacking to redirect users to bogus versions of the websites they’re trying to connect to.

Because of this and other threats, public Wi-Fi networks are considered extremely unsafe, and most security experts will recommend not using them for any sensitive task such as banking or connecting to social media accounts. However, if you absolutely have to use a public Wi-Fi network, there are a couple of things you can do to make sure you don’t fall victim to Wi-Fi eavesdropping.

One of the most important measures is to disable automatic Wi-Fi connections and make sure you manually select which networks you want to use. It will be a little less convenient, but at least you’ll have a greater chance of avoiding evil twins and MitM attacks.

Another very important protective measure to prevent MitM through Wi-Fi eavesdropping is to use a virtual private network (VPN). VPNs create a secure channel for all your internet traffic, encrypting everything and sending them through an intermediate server. When using a VPN, even if a hacker manages to intercept your communications, all they will see is a stream of encrypted data, and they won’t be able to make sense of it. They won’t even be able to figure out which sites you’re browsing to, so they won’t be able to redirect you to their own malicious copies of the websites.

40 views0 comments

Recent Posts

See All