Possible IT, Computer & Tech. Connection to the Long Island Case, Perp & Victims

DNA Solves
DNA Solves
DNA Solves
I read thru this thread not knowing WHAT I was reading most of the time. It might as well be a foriegn language to me. What I did understand, I am having a hard time getting my head around.
 
I read thru this thread not knowing WHAT I was reading most of the time. It might as well be a foriegn language to me. What I did understand, I am having a hard time getting my head around.

When you leave all the technical stuff aside for a moment and look at the psychology only, it is actually pretty simple. A board, any board, not only WS, establishes something like a more or less closed social space. Someone looking to dominate in general, would feel the urge to dominate also this enclosed social space and to achieve that, any measure is considered right and worth it. For someone, who, for example, has killed already some women to compensate for perceived flaws in himself, the urge to do so would even be stronger because the "anonymity" of such methods would even increase the feeling of power when he can find followers who basically eat out of his hand. Magnotta was in that textbook.
The technology behind it is not that hard to manage. You can find proxy servers all over the internet. You can also find unsecured wireless networks all over the planet. It's a little bit of reading up, but it is no rocket science.

Peter
 
I would be interested in a psych. profile of the type of person who would perpetrate such as freud. I would think that you would have to be

a. SEVERLY disturbed (unbalanced)

or

b. A sociopath with an agenda

In order to go to such elaborate means to decieve people.

Can anybody give me a more complete analysis?

Sorry to quote myself but I wondered PB if there is a more in depth profile of the type of person who portrays themselves online to be several different people. Is it all about control/domination even in the instances that people do it who are not killers?
 
Sorry to quote myself but I wondered PB if there is a more in depth profile of the type of person who portrays themselves online to be several different people. Is it all about control/domination even in the instances that people do it who are not killers?

It's only one aspect and it is a form of manipulation. This amnipulation can serve as a forensic counter measure (for distraction, to confuse investigators) or just as a means to dominate a in the eyes of the manipulator gullible mass. Lets keep in mind, SKs are not the only ones with little ego-issues out there.

Peter
 
Sorry to quote myself but I wondered PB if there is a more in depth profile of the type of person who portrays themselves online to be several different people. Is it all about control/domination even in the instances that people do it who are not killers?

definitely ego-driven sociopaths, ALWAYS with a personal agenda(sometimes unrelated to where they are interacting), whose aim is generally some form of disruption--skilled at manipulation and misdirection--it's predominantly a personality that thrives on the ability to control how people perceive an idea or other information, and their ability to over-influence it--they thrive on having "followers" or "minions", and at that fact that they are able to disrupt the normal flow of conversation or correct informational exchange
 
definitely ego-driven sociopaths, ALWAYS with a personal agenda(sometimes unrelated to where they are interacting), whose aim is generally some form of disruption--skilled at manipulation and misdirection--it's predominantly a personality that thrives on the ability to control how people perceive an idea or other information, and their ability to over-influence it--they thrive on having "followers" or "minions", and at that fact that they are able to disrupt the normal flow of conversation or correct informational exchange

Wow just wow. (again) I just really don't know what else to say about this.

It is like discovering a new abnormal phenomenom.

For me at least.

Well now I know it exists and what to watch for!
 
Okay I need a computer expert here. About a month or so ago I started getting a message pop up (new) when I logged in here. It says...
Security warning...
There are problems with the security certificate for this site x This certificate is not from a trusted authority.
So okay not a problem with WS I know it is a trusted site.

SO I ..IGNORE...CONTINUE

Now tonite I go on LISK (which I only so often do) to read...but recently tried to comment on. This warning is popping up CONSTANTLY while I am reading so I cancel.

NOW

I go to my PRIVATE PERSONAL FB page and it's popping up there! WT?
Is there anybody in the house tonight that can explain what tbis means?

I have read this thread (foreign language mostly to me) but I understand ther are ways to hack (is it s rpt kiddies??)
#needtoknow!
TIA
 
Oh I forgot this. When I hit veiw certificate...
Issused to: common name*.S3.amazonaws.com.organizationamazonaws.com
organization amazon.cominc

So I just want to know if I've been hacked or wt? is going on. I totally trust WS security, but I NEED to understand IN LAYMANS TERMS what this means.

#notparanoidoranything ; )
 
If you haven't read this thread (maybe because most of it makes no sense if you are a tech tard) I STRONGLY urge you to read it and BEWARE as it pertains to these murders IMHO
 
It's only one aspect and it is a form of manipulation. This amnipulation can serve as a forensic counter measure (for distraction, to confuse investigators) or just as a means to dominate a in the eyes of the manipulator gullible mass. Lets keep in mind, SKs are not the only ones with little ego-issues out there.

Peter

Maybe we need to ask ourselves, is someone trying to manipulate us? Depending on the answer to this question we need to ask ourselves why. What is the purpose and WHO is behind this game!
 
Oh I forgot this. When I hit veiw certificate...
Issused to: common name*.S3.amazonaws.com.organizationamazonaws.com
organization amazon.cominc

So I just want to know if I've been hacked or wt? is going on. I totally trust WS security, but I NEED to understand IN LAYMANS TERMS what this means.

#notparanoidoranything ; )

Im no computer tech but ive had that before. I know the pop up your talking about. I hit the back button to get rid of it. I would have someone look at it.
 
Im no computer tech but ive had that before. I know the pop up your talking about. I hit the back button to get rid of it. I would have someone look at it.

Yeah I hit the back button it'll go away but then it comes back. ???
 
Maybe we need to ask ourselves, is someone trying to manipulate us? Depending on the answer to this question we need to ask ourselves why. What is the purpose and WHO is behind this game!

There is always someone trying to manipulate each of us. Politicians, religious leaders, the neighbors, members of this board, hordes of specialists in the advertisement industry. Manipulating other people is a common human hobby. It is part of the arsenal, human behavior offers to work the own standing in group and society structures. And thus, even most of us would deny it, everyone of us has manipulated someone at the one or other point in her/his life. And it's not always bad. If I for example offer a kid $5 if the next test in school is B and not a D anymore, it's a form of manipulation, and still, it would be in the interest of the kid. So yes, manipulation is common behavior. So the way to look at it, IMO, is to ask what are the goals. Goals give the manipulator away.

And about your other problem: You run regular virus scans?
 
Oh I forgot this. When I hit veiw certificate...
Issused to: common name*.S3.amazonaws.com.organizationamazonaws.com
organization amazon.cominc

So I just want to know if I've been hacked or wt? is going on. I totally trust WS security, but I NEED to understand IN LAYMANS TERMS what this means.

#notparanoidoranything ; )

probably a DOS malware/adware(denial of service) type of virus--usually associated with google chrome--run your anti-malware/adware software, it should fix the error--might be causing a registry error as well--hopefully u have anti-everything software in place to run
 
Thanks PB and CM! I use my smartphone to get online. I wasn't even aware it could get a virus! I 'm SUCH a tech tard! Can I do a virus scan on my phone? Is there an app for that?
 
Thanks PB and CM! I use my smartphone to get online. I wasn't even aware it could get a virus! I 'm SUCH a tech tard! Can I do a virus scan on my phone? Is there an app for that?

I copied/pasted into google a part of your warning/error message... and I'm pretty much a tech tard too (I prefer tech tard-ess ;))... the google results appeared to be related to Amazon cloud. Haven't they had problems recently? Could it be that?
 
I copied/pasted into google a part of your warning/error message... and I'm pretty much a tech tard too (I prefer tech tard-ess ;))... the google results appeared to be related to Amazon cloud. Haven't they had problems recently? Could it be that?

Problem is, if the cloud servers are in trouble and are switched, it can be the stored certificate isn't valid anymore. However, if the servers are in trouble because of being hacked all few weeks again, who knows what actually is sent by them?
 
I copied/pasted into google a part of your warning/error message... and I'm pretty much a tech tard too (I prefer tech tard-ess ;))... the google results appeared to be related to Amazon cloud. Haven't they had problems recently? Could it be that?

Thanks F&E. and PB ! I don't seem to be having problems with my phone. I only see it ever blue moon now so I guess no biggie right? :waitasec:
 
I was reading on another thread, the conversation about BTK and his communications. I remembered he had asked LE if they could trace a Floppy Disk. Of course LE said no. And they were able to track the disk to his PC at the church and had his name Dennis. So that got me thinking, if BTK who had little to no computer skills, was using his church PC to write things about his killings and so on. Why not the LISK? If he is so tech savvy, I would bet he has some sort of digital fingerprint out there in the www. So how could we find it? There are millions of personal blogs, online diaries, and videos. How would he "code" key search words, so that something like this is not easily found with a simple google search? It is a needle in a hay stack, but in my down time, I will try to start looking into some blogs and see where the www takes me. Wish me luck.
 
I was reading on another thread, the conversation about BTK and his communications. I remembered he had asked LE if they could trace a Floppy Disk. Of course LE said no. And they were able to track the disk to his PC at the church and had his name Dennis. So that got me thinking, if BTK who had little to no computer skills, was using his church PC to write things about his killings and so on. Why not the LISK? If he is so tech savvy, I would bet he has some sort of digital fingerprint out there in the www. So how could we find it? There are millions of personal blogs, online diaries, and videos. How would he "code" key search words, so that something like this is not easily found with a simple google search? It is a needle in a hay stack, but in my down time, I will try to start looking into some blogs and see where the www takes me. Wish me luck.

I am cheering you on! I think that there is something to be found! Read through this thread if you et the chance or haven't already.
 

Members online

Online statistics

Members online
188
Guests online
1,816
Total visitors
2,004

Forum statistics

Threads
600,866
Messages
18,114,878
Members
230,991
Latest member
DeeKay
Back
Top