The brothers hacked my email!

Advertisement

Viewed 1578 times

    Erin posted Thu, 10 Jan 2002 18:24:00 GMT(1/10/2002)

    Post 7 of 18
    Joined 3/25/2000

    Just learned that a group of JWs hacked my email over a considerable period of time, hoping to intercept "incriminating" information in an attempt to disfellowship me!
    They printed up the emails and passed them out to other elders to "examine". They were certainly very, VERY disappointed to not find anything they could "use".
    The only outgoing emails from me they obtained were those attached to incoming mail as a result of some friends hitting "respond" when they wrote back to me.
    The person who got into my email account is a ministerial servant who had previously worked on my business web site and therefore had my password.
    He would download my email onto his computer, miles away, and then put everything back as "unread" so nothing would be "missing", when I accessed email from my computer.
    The group of brothers included ministerial servants, elders and a PO.

    I advise any of you who have had brothers work on your computers any time in the past to immediately change your password!
    This is a new "low", as far as I am concerned.

    F JBean posted Thu, 10 Jan 2002 18:27:00 GMT(1/10/2002)

    Post 188 of 422
    Joined 9/25/2001

    I agree, Erin. Welcome!

    M Gopher posted Thu, 10 Jan 2002 18:29:00 GMT(1/10/2002)

    Post 833 of 10951
    Joined 3/18/2001

    Erin,

    Welcome to the board. Your example helps prove that abuses by elders are not limited to just an odd case here or there. In fact, abuse seems to be the rule rather than the exception!

    Well hopefully you are free and enjoying it! Have you reported the ministerial servant's misconduct to the e-mail service provider? The idiot deserves to have life made uncomfortable for him. Sheesh.

    And here I thought the elders were guided by holy spirit, or by Jehovah, instead they use low-down mafia-like tactics to try to get the goods on their "sheep". What an organization!

    GopherWhy shouldn't truth be stranger than fiction? Fiction, after all, has to make sense.
    Mark Twain (1835-1910)

    AlanF posted Thu, 10 Jan 2002 18:30:00 GMT(1/10/2002)

    Post 976 of 4650
    Joined 3/7/2001

    I suggest that you pursue legal action against this jerk for invasion of privacy. I'm sure that a good lawyer could come up with other charges.

    AlanF

    F Mum posted Thu, 10 Jan 2002 18:37:00 GMT(1/10/2002)

    Post 253 of 3108
    Joined 9/17/2001

    I second AlanF's suggestion.

    Seize the day, and put the least possible trust in tomorrow. - Horace

    I have learned to live each day as it comes and not to borrow trouble by dreading tomorrow. - Dorothy Dix

    Patriot posted Thu, 10 Jan 2002 18:44:00 GMT(1/10/2002)

    Post 141 of 278
    Joined 6/17/2001

    Talk about "Big Brother".

    M alliwannadoislive posted Thu, 10 Jan 2002 18:44:00 GMT(1/10/2002)

    Post 227 of 386
    Joined 7/14/2001

    hey erin - any chance you could get hold of a real nasty virus and send it to yourself but never open it ? ... well, at least you wouldn't open it ... perhaps a virus that would attach itself to 'your' address book and send out a message to all those snitching emailing elders ... could have fun with what the message would be ... heh-heh ...

    Erin posted Thu, 10 Jan 2002 18:49:00 GMT(1/10/2002)

    Post 8 of 18
    Joined 3/25/2000

    The spying has stopped since I changed my password! I also learned after changing my password the ministerial servant was "disappointed" because he had been using my internet account to get onto the internet himself for free!!
    You gotta love it.

    M unclebruce posted Thu, 10 Jan 2002 18:50:00 GMT(1/10/2002)

    Post 1034 of 4415
    Joined 2/18/2001

    Hi Erin,

    I think this post serves as a reminder to be very careful what information we send and recieve through cyber space. Anything you send or recieve can come back to haunt you. I'm glad nothing was found against you and I would definitely threaten legal action against the MS. The threat alone should have him quaking in his boots. I've used that strategy to good effect in the past to stop people spreading rumours.

    Are you the same Erin who posted on H20?

    best wishes, unclebruce

    Scully posted Thu, 10 Jan 2002 19:05:00 GMT(1/10/2002)

    Post 140 of 13520
    Joined 11/2/2001

    Erin,

    First of all, welcome to the board. I hope you'll find that there is indeed life outside the JWs.

    Secondly, I agree with Alan's suggestion to pursue legal action against the person who did this to you. I would also inform your Internet Service Provider about this dishonest person's breach of your privacy and illegal use of your account. If the MS is employed by a company that you hired to set up your business website, I would also make a complaint to his superiors. They will take this breach of confidentiality very seriously. He deserves to lose his job over this.

    Love, Scully

    It is not persecution for an informed person to expose a certain religion as being false. - WT 11/15/63

    Erin posted Thu, 10 Jan 2002 19:13:00 GMT(1/10/2002)

    Post 9 of 18
    Joined 3/25/2000

    I reported the activity to my email provider yesterday. They are unable to confirm the improper use, as their records merely show dates and times the internet is accessed. The technical support person said there are no records identifying which computer accesses the internet through my account. Based on that, I don't think I would have much to go on for any lawsuit. Or?

    Jim Dee posted Thu, 10 Jan 2002 19:18:00 GMT(1/10/2002)

    Post 31 of 125
    Joined 7/23/2001

    Give me something new regarding information.

    The Society have been hacking email for ages, they use the FBI system called CARNIVORE - its common knowledge. Before CARNIVORE they used VPOP, however VPOP doesn't record emails through Service providor services such as Hotmail, Yahoo! etc - so the answer was to engage ex CIA brothers who are security experts to help them "root out the apostates" , and this they have done. These guys have been in London for the last 4 months upgrading the site - why? because of the number of very serious leaks.

    Also all voice traffic out of Bethel is monitored (pay Phones or switchboards) as well as fax lines. For voice they use either the NICE or COMVERSE voice recorder attached to their switchboard (the switchboards are usually Meridian 1 or Meridian Option 11 made by Nortel) - how do I know, I designed it!

    Regarding trying to get proof - give me a break since when did they need proof to disfellowship!

    Why is this news?

    Jim

    shecky2 posted Thu, 10 Jan 2002 19:25:00 GMT(1/10/2002)

    Post 32 of 52
    Joined 11/27/2001

    someone's paranoid

    Celtic posted Thu, 10 Jan 2002 19:28:00 GMT(1/10/2002)

    Post 515 of 1822
    Joined 6/6/2001

    Dear Erin and Jim Dee

    Good to see you both here and welcome to this board, looking forward to future sharing of communication with you guys.

    Erin, take legal action, you've got a fairly strong case and follow up on the suggestions above.

    Jim Dee, do you know Paul Letchford?

    All the best and have a great new year the pair of you.

    Peace

    Mark
    www.can-online.org.uk

    F sf posted Thu, 10 Jan 2002 19:57:00 GMT(1/10/2002)

    Post 1217 of 7516
    Joined 3/16/2001

    < http://google.yahoo.com/bin/query?p=CARNIVORE+Watchtower+Bible+FBI&hc=0&hs=0

    < http://www.epic.org/

    EPIC Policy Archives


    Computer Security. Is Cyberspace secure? Hackers, information warfare, laws and guidelines. Includes resources on Critical Infrastructure Protection.

    Cryptography Policy. Who holds the keys to online privacy? Clipper Chip, key escrow, export controls, reports and more.

    Free Speech. Freedom of speech issues on the Internet including anonymous speech, liability, censorship, and the pending challenge to the Child Online Protection Act. EPIC's Faulty Filters report is also online.

    Freedom of Information. How to use the Freedom of Information Act and other laws to obtain information on government activities. See documents EPIC has obtained.
    Learn how to get your own files.

    Privacy. The A to Z's of privacy. From airline passenger profiling and Caller ID to Social Security Numbers and Wiretapping.

    (This is on the right side of page, in a "box"):

    Docket
    Top Cases - January 2002
    CNSS v. DOJ
    In Re Microsoft
    FCC CPNI Rules
    Watchtower Bible
    Ashcroft v ACLU (COPA)
    US v. Scarfo (key logger)
    FOIA Docket

    sKally

    anewperson posted Thu, 10 Jan 2002 20:24:00 GMT(1/10/2002)

    Post 414 of 722
    Joined 8/8/2001

    If an American report it to the FBI: fbi.gov

    M ThiChi posted Thu, 10 Jan 2002 20:32:00 GMT(1/10/2002)

    Post 116 of 3432
    Joined 5/29/2001

    It sure sounds like an inside job. Besides your computer programer, is there any pro/JW family members that may have access to your computer? Just trying to cover all variables!

    “We all fell down from the milky way, hanging around here for the judgement day, heaven only knows who’s in command.”- Jimmy Buffet

    M SYN posted Thu, 10 Jan 2002 20:54:00 GMT(1/10/2002)

    Post 52 of 4679
    Joined 12/27/2001

    Why didn't you use some form of encryption? That's what I want to know. The moment I start emailing sensitive information I use at least 128 bit encryption, if not higher.

    Also beware of keyboard scanners, they can detect what you're typing, so all your security is *fucked* if there's someone sitting outside your house in a van listening to the radio waves emitted by your keyboard.

    The CARNIVORE thing surprised me, tho!

    "I see no good reasons why the views given in this volume should shock the religious sensibilities of anyone." -- Charles Darwin, The Origin Of Species, 1869.

    Jim Dee posted Thu, 10 Jan 2002 21:12:00 GMT(1/10/2002)

    Post 32 of 125
    Joined 7/23/2001

    Give me something new regarding information.

    The Society have been hacking email for ages, they use the FBI system called CARNIVORE - its common knowledge. Before CARNIVORE they used VPOP, however VPOP doesn't record emails through Service providor services such as Hotmail, Yahoo! etc - so the answer was to engage ex CIA brothers who are security experts to help them "root out the apostates" , and this they have done. These guys have been in London for the last 4 months upgrading the site - why? because of the number of very serious leaks.

    Also all voice traffic out of Bethel is monitored (pay Phones or switchboards) as well as fax lines. For voice they use either the NICE or COMVERSE voice recorder attached to their switchboard (the switchboards are usually Meridian 1 or Meridian Option 11 made by Nortel) - how do I know, I designed it!

    Regarding trying to get proof - give me a break since when did they need proof to disfellowship!

    Why is this news?

    Jim

    M Jourles posted Thu, 10 Jan 2002 21:21:00 GMT(1/10/2002)

    Post 43 of 3028
    Joined 3/26/2000

    I will go ahead and throw my few cents into this.

    First off, and this goes for everyone here, you should think about changing your password every month. Use special symbols if you can such as @#$!() as taking the place of letters. Have @=A, $=S, and so on. Get creative.

    Secondly, if you have CONCRETE proof of this bro eavesdropping in your email and also using your dial-up account, go speak to an attorney that would take your case with his payment taken from a settlement. This is the inexpensive route. If you can afford to hire one outright, then by all means do so. Your attorney can request from the court a subpeona to retrieve the incoming phone records for your ISP, but make sure that you can provide proof that he accessed your account and had copies of your email. If there is no proof, the judge may quash the subpeona before it ever leaves the courtroom.

    Let's say that you do not have proof. You can still have fun and possibly even get this bro in serious trouble, at least in the hall or maybe with his employer. Tell him that you plan on hiring an attorney that will be requesting phone records from your ISP, and if those records indicate that he indeed used his home phone line to dial in, then you will be pressing charges against him for invasion of privacy. Tell him that he will be responsible for all attorney's fees, including court costs. Tell him that under God's graciousness you will not hire an attorney if he confesses to his wrongdoing to the elders. Wait a minute. He distributed copies of your emails to the elders? Then go to the elders and explain that you will be taking him to court for invasion of privacy. That will put them into a panic for sure. They won't know what to do with this bro. Let's see, do we reprove him, drop his priv's, or what???

    Hell with it, just blab around the hall that he likes to "HACK" into other people's accounts. If your hall is like mine, oooh, they hate the word "hacker," as it relates to the devil's INTERNET.

      Close

      Confirm ...