BlackBerry Forums Support Community
              

Closed Thread
 
Thread Tools
Old 08-26-2009, 01:14 AM   #21
darkblueberry
New Member
 
Join Date: Aug 2009
Model: 8330
PIN: N/A
Carrier: verizon
Posts: 8
Default please buy a new phone

Please Login to Remove!

It sounds like someone plugged in to a corporate laptop at one time or another. If so, the BES might be active on your account without your knowledge.

If this is the case, then all activity, including SMS texts, browser history, and call logs could be recorded without your knowledge.

Unfortunately, you will not succeed in determining if this is actually happening. There is no concrete proof available without a court order.

++++++++++

Maybe you could try what I did! I 'had the idea' that 'suspicious behavior' was occurring, so I decided to send around 3500ish SMS texts **to myself** in six months. I 'thought' I was being accessed, but since I could not prove that my phone was put on the Enterprise Server without my knowledge, then all texts, messages, and thoughts I sent to myself could not be brought up in conversation of any kind (if it was happening of course, which nobody knows if it did as it is so difficult to prove).

You could say (text) what you want about anybody or any work situation without fear of retaliation.

Right?

Maybe other people who 'have the feeling' that somebody could even be accessing your computer at home (or your blackberry-this thing IS a computer, isn't it?)... Well why don't you do something about that computer too? Just go home, put up a big notepad right there on the screen for anybody (possibly from work) that 'might' be accessing your personal computer without your knowledge, and type what you want. Just go for it all!

I did the home computer notepad of all of my thoughts for everyone at a previous job (all 'supposedly' of course) so everybody could see, read, and re-read exactly what I though about this 'suspicious behavior'...

++++++++++++

These sound like good ideas, but believe me: this strategy of fighting back these 'suspicious activities' is NOT a good idea AT ALL.

Here's what I learned the very very hard way:

People 'in the IT know' understand how easy it 'could be' to 'hack' into a computer. Online remote access capabilities have been around for decades.

Most people that 'might' be doing this (say-possibly a person in the 'IT know' at your workplace) are not out there to hurt you though (if this is possible of course..). They are only curious and (possibly) checking up every once in awhile to make sure you're not stealing confidential information or committing acts of a criminal nature.

Point blank: If you do what I did, you (could be) in for a nasty roller coaster ride that will crash and burn in the hottest of flames you will ever experience. In the end, you will suffer serious career altering difficulties, not to mention extreme mental anguish, family problems etc. that nobody cares about anyway.

Give them a taste of their own medicine and you will be sicker than ever - I promise, plus nobody will believe you just like you're probably not believing what you're reading right now.

I think you have four options:

1. Cancel your current phone plan and start over with a different carrier. You might as well toss your phone too as you can't change your PIN number anyway. Any computer you logged onto from your phone? Your system32 files have been compromised too so your computer is garbage as well.

2. Text and type notes to yourself on your 'suspicious acting machinery' and suffer incredibly negative consequences like I did.

3. File formal complaints, requests for investigation (this is going to make your life far more miserable than it would be if you start txting/typing notes to yourself)..

OR

4. You could just accept the fact that you can't stop people from doing things like this and move on. Change your passwords frequently. On your B.B. > go into Options, Security, expand and activate all variables of your Firewall. Encrypt all content w strongest settings in security options (you'll see), take the battery out when you want complete privacy, and keep your B.B. Software updated.

I suggest option number four. Loose lips sink ships.
Offline  
Old 08-26-2009, 01:36 AM   #22
monkeypaw
BlackBerry Extraordinaire
 
Join Date: Oct 2007
Location: Los Angeles
Model: None
PIN: N/A
Carrier: ATT
Posts: 1,638
Default

Quote:
Originally Posted by darkblueberry View Post
It sounds like someone plugged in to a corporate laptop at one time or another. If so, the BES might be active on your account without your knowledge.

If this is the case, then all activity, including SMS texts, browser history, and call logs could be recorded without your knowledge.

Unfortunately, you will not succeed in determining if this is actually happening. There is no concrete proof available without a court order.

++++++++++

Maybe you could try what I did! I 'had the idea' that 'suspicious behavior' was occurring, so I decided to send around 3500ish SMS texts **to myself** in six months. I 'thought' I was being accessed, but since I could not prove that my phone was put on the Enterprise Server without my knowledge, then all texts, messages, and thoughts I sent to myself could not be brought up in conversation of any kind (if it was happening of course, which nobody knows if it did as it is so difficult to prove).

You could say (text) what you want about anybody or any work situation without fear of retaliation.

Right?

Maybe other people who 'have the feeling' that somebody could even be accessing your computer at home (or your blackberry-this thing IS a computer, isn't it?)... Well why don't you do something about that computer too? Just go home, put up a big notepad right there on the screen for anybody (possibly from work) that 'might' be accessing your personal computer without your knowledge, and type what you want. Just go for it all!

I did the home computer notepad of all of my thoughts for everyone at a previous job (all 'supposedly' of course) so everybody could see, read, and re-read exactly what I though about this 'suspicious behavior'...

++++++++++++

These sound like good ideas, but believe me: this strategy of fighting back these 'suspicious activities' is NOT a good idea AT ALL.

Here's what I learned the very very hard way:

People 'in the IT know' understand how easy it 'could be' to 'hack' into a computer. Online remote access capabilities have been around for decades.

Most people that 'might' be doing this (say-possibly a person in the 'IT know' at your workplace) are not out there to hurt you though (if this is possible of course..). They are only curious and (possibly) checking up every once in awhile to make sure you're not stealing confidential information or committing acts of a criminal nature.

Point blank: If you do what I did, you (could be) in for a nasty roller coaster ride that will crash and burn in the hottest of flames you will ever experience. In the end, you will suffer serious career altering difficulties, not to mention extreme mental anguish, family problems etc. that nobody cares about anyway.

Give them a taste of their own medicine and you will be sicker than ever - I promise, plus nobody will believe you just like you're probably not believing what you're reading right now.

I think you have four options:

1. Cancel your current phone plan and start over with a different carrier. You might as well toss your phone too as you can't change your PIN number anyway. Any computer you logged onto from your phone? Your system32 files have been compromised too so your computer is garbage as well.

2. Text and type notes to yourself on your 'suspicious acting machinery' and suffer incredibly negative consequences like I did.

3. File formal complaints, requests for investigation (this is going to make your life far more miserable than it would be if you start txting/typing notes to yourself)..

OR

4. You could just accept the fact that you can't stop people from doing things like this and move on. Change your passwords frequently. On your B.B. > go into Options, Security, expand and activate all variables of your Firewall. Encrypt all content w strongest settings in security options (you'll see), take the battery out when you want complete privacy, and keep your B.B. Software updated.

I suggest option number four. Loose lips sink ships.
That's a little paranoid. The only sign of anything is a ping from a RIM server at Gmail, which is what happens with normal operation if the Gmail account is on BIS.
Offline  
Old 08-26-2009, 03:06 AM   #23
wabbit
BlackBerry Extraordinaire
 
Join Date: Jul 2007
Model: Droid
OS: Google!
PIN: PONG???
Carrier: verizon
Posts: 1,555
Default

Quote:
Originally Posted by darkblueberry View Post
It sounds like someone plugged in to a corporate laptop at one time or another. If so, the BES might be active on your account without your knowledge.

If this is the case, then all activity, including SMS texts, browser history, and call logs could be recorded without your knowledge.

Unfortunately, you will not succeed in determining if this is actually happening. There is no concrete proof available without a court order.

++++++++++

Maybe you could try what I did! I 'had the idea' that 'suspicious behavior' was occurring, so I decided to send around 3500ish SMS texts **to myself** in six months. I 'thought' I was being accessed, but since I could not prove that my phone was put on the Enterprise Server without my knowledge, then all texts, messages, and thoughts I sent to myself could not be brought up in conversation of any kind (if it was happening of course, which nobody knows if it did as it is so difficult to prove).

You could say (text) what you want about anybody or any work situation without fear of retaliation.

Right?

Maybe other people who 'have the feeling' that somebody could even be accessing your computer at home (or your blackberry-this thing IS a computer, isn't it?)... Well why don't you do something about that computer too? Just go home, put up a big notepad right there on the screen for anybody (possibly from work) that 'might' be accessing your personal computer without your knowledge, and type what you want. Just go for it all!

I did the home computer notepad of all of my thoughts for everyone at a previous job (all 'supposedly' of course) so everybody could see, read, and re-read exactly what I though about this 'suspicious behavior'...

++++++++++++

These sound like good ideas, but believe me: this strategy of fighting back these 'suspicious activities' is NOT a good idea AT ALL.

Here's what I learned the very very hard way:

People 'in the IT know' understand how easy it 'could be' to 'hack' into a computer. Online remote access capabilities have been around for decades.

Most people that 'might' be doing this (say-possibly a person in the 'IT know' at your workplace) are not out there to hurt you though (if this is possible of course..). They are only curious and (possibly) checking up every once in awhile to make sure you're not stealing confidential information or committing acts of a criminal nature.

Point blank: If you do what I did, you (could be) in for a nasty roller coaster ride that will crash and burn in the hottest of flames you will ever experience. In the end, you will suffer serious career altering difficulties, not to mention extreme mental anguish, family problems etc. that nobody cares about anyway.

Give them a taste of their own medicine and you will be sicker than ever - I promise, plus nobody will believe you just like you're probably not believing what you're reading right now.

I think you have four options:

1. Cancel your current phone plan and start over with a different carrier. You might as well toss your phone too as you can't change your PIN number anyway. Any computer you logged onto from your phone? Your system32 files have been compromised too so your computer is garbage as well.

2. Text and type notes to yourself on your 'suspicious acting machinery' and suffer incredibly negative consequences like I did.

3. File formal complaints, requests for investigation (this is going to make your life far more miserable than it would be if you start txting/typing notes to yourself)..

OR

4. You could just accept the fact that you can't stop people from doing things like this and move on. Change your passwords frequently. On your B.B. > go into Options, Security, expand and activate all variables of your Firewall. Encrypt all content w strongest settings in security options (you'll see), take the battery out when you want complete privacy, and keep your B.B. Software updated.

I suggest option number four. Loose lips sink ships.
JUST WOW!
Offline  
Old 08-26-2009, 03:11 AM   #24
wabbit
BlackBerry Extraordinaire
 
Join Date: Jul 2007
Model: Droid
OS: Google!
PIN: PONG???
Carrier: verizon
Posts: 1,555
Default

Quote:
Originally Posted by arishamron View Post
I sure hope somebody can help me with a couple questions.

I have a personal phone (not company-owned) on Verizon. I've been worried, recently, about a couple of things.

(1) When I look at my Gmail account on my desktop computer, I have been noticing several "strange" mobile (RIM) IP addresses listed as accessing my Gmail at times when my BlackBerry is turned off. I'm in a hospital and I have to turn over my BlackBerry during "sleeping hours," so I'm not sure if some nurse is playing with it during the overnight shift OR if somebody from outside (maybe my employer, who is NOT authorized to do so) is checking my email from another location. I know that my IP address on the BlackBerry isn't static (i.e. it can change), but I am absolutely certain that I'm not accessing Gmail at those hours.

(2) Is it possible for somebody (like my employer) to illegally "ping" my BlackBerry to determine my physical location? Remember, I have Verizon, so my GPS is not activated (although I did purchase their GPS service).

(3) Is it possible (as above) for anyone to monitor what I'm looking at when I access the Web from my BlackBerry?

I apologize for having to solicit this help, but I've got nobody else to turn to on these questions. Thanks in advance!
do you have an auto timer on the blackberry? like when to turn on and off?

or by any chance ran the self test thing on the device?

Last edited by wabbit; 08-26-2009 at 03:23 AM..
Offline  
Old 08-26-2009, 04:41 AM   #25
SueWNY
Knows Where the Search Button Is
 
Join Date: Aug 2009
Location: New York City
Model: Tour
PIN: Ask!
Carrier: Sprint
Posts: 42
Default

No offense, but some of you need to work on your reading comprehension skills. OP said he is a PATIENT in the hospital not an employee. It's not unusual for patients to be asked to leave their valuables at the nurses station at night or when not in use. I know I was asked to do so when I was in the hospital a few years ago. You'd be surprised how common theft is in those places.

OP, it's not possible to disable stand by mode as far as I know, and if it were it would kill your battery life. Just lock your BB every night and password protect it (just don't forget the PW). If you have BIS (data plan) it checks your emails continuously. That's what push mail is all about. So that's probably all you're seeing.
Offline  
Old 08-26-2009, 08:21 AM   #26
KOR
CrackBerry Addict
 
KOR's Avatar
 
Join Date: Sep 2005
Model: None
Carrier: Typhoid Mary
Posts: 612
Default

Quote:
Originally Posted by SueWNY View Post
No offense, but some of you need to work on your reading comprehension skills. OP said he is a PATIENT in the hospital not an employee. It's not unusual for patients to be asked to leave their valuables at the nurses station at night or when not in use. I know I was asked to do so when I was in the hospital a few years ago. You'd be surprised how common theft is in those places.

OP, it's not possible to disable stand by mode as far as I know, and if it were it would kill your battery life. Just lock your BB every night and password protect it (just don't forget the PW). If you have BIS (data plan) it checks your emails continuously. That's what push mail is all about. So that's probably all you're seeing.
I agree that password protecting the device is the way to go, but will point out that OP indicates that they 'have to turn over' the BB, not that they were asked to do so, which is a big difference.
Offline  
Old 08-26-2009, 08:21 PM   #27
darkblueberry
New Member
 
Join Date: Aug 2009
Model: 8330
PIN: N/A
Carrier: verizon
Posts: 8
Default agreed-somewhat misread that post

However, the point still remains that these kinds of activities are possible. If you could, please express your knowledge in detail about corporate personnel improperly accessing personal email and blackberry accounts.

I'd like to know more about what you and others think about these improper and illegal activities. Please be as specific as possible as I attempt to gain a considerable amount of knowledge about these unfortunate and illegal activities that fly 'under the radar'.

Thanks

Quote:
Originally Posted by SueWNY View Post
No offense, but some of you need to work on your reading comprehension skills. OP said he is a PATIENT in the hospital not an employee. It's not unusual for patients to be asked to leave their valuables at the nurses station at night or when not in use. I know I was asked to do so when I was in the hospital a few years ago. You'd be surprised how common theft is in those places.

OP, it's not possible to disable stand by mode as far as I know, and if it were it would kill your battery life. Just lock your BB every night and password protect it (just don't forget the PW). If you have BIS (data plan) it checks your emails continuously. That's what push mail is all about. So that's probably all you're seeing.
Offline  
Old 08-26-2009, 09:03 PM   #28
monkeypaw
BlackBerry Extraordinaire
 
Join Date: Oct 2007
Location: Los Angeles
Model: None
PIN: N/A
Carrier: ATT
Posts: 1,638
Default

Quote:
Originally Posted by darkblueberry View Post
However, the point still remains that these kinds of activities are possible. If you could, please express your knowledge in detail about corporate personnel improperly accessing personal email and blackberry accounts.

I'd like to know more about what you and others think about these improper and illegal activities. Please be as specific as possible as I attempt to gain a considerable amount of knowledge about these unfortunate and illegal activities that fly 'under the radar'.

Thanks
You should probably post a different thread. And should explain why you suspect that someone has put your phone on BES.
Offline  
Old 08-27-2009, 02:37 PM   #29
arishamron
New Member
 
Join Date: Aug 2009
Model: 8330
PIN: N/A
Carrier: verizon
Posts: 5
Default

Folks - first of all, thank you all for your suggestions, comments, insights, etc. I'm overwhelmed by your support!

Second, I took the suggestion of putting an intricate password on my BlackBerry - and, surprise surprise surprise, I haven't seen any "mobile browser" notations on my Gmail activity since.

Not sure what to think about that - whether the nurses have been foiled in their late-night intrusiveness, or whether the password also kept the employer's intrusiveness at bay. I can't imagine that a password would affect the proposal of SueWNY above ("If you have BIS (data plan) it checks your emails continuously. That's what push mail is all about. So that's probably all you're seeing.")

So, I guess I'm still a little puzzled, even if I'm reassured that I'm not being spied upon at this point.
Offline  
Old 08-27-2009, 02:51 PM   #30
jsconyers
New Member
 
jsconyers's Avatar
 
Join Date: Jul 2007
Location: In a van down by the river.
Model: NOTE2
OS: 4.1
PIN: <- Where do I find this?
Carrier: Sprint
Posts: 15,104
Default

Darkblueberry, you're very paranoid. There's no denying that. There are ways of telling when your devices was activated on a BlackBerry Enterprise Server (BES).

For one, go to Options > Advanced Options > Enterprise Activation. If it was activated on a BES, it will list the activation date at the bottom of the screen.

Furthermore, go to Options > Advanced Options > Service Book. If you're on a BES, you will see Desktop service books.

Also, BES does not log personal email accounts, so that theory of yours is flawed. You should read this article and get a better understanding of what exactly the BES logs before you make any more accusations.

What does BES see; what can be tracked/logged? - Port3101.org : Your BES Connection

And more importantly, to even be activated on a BES server, your device will need to be provisioned for BES access which is generally at a higher rate than than BIS plan.
__________________
The difference between stupidity and genius is that genius has its limits.
When you take things for granted, the things you are granted, get taken.
Even a mosquito doesn't get a pat on the back until it starts to work.
Too many people miss the silver lining because they're expecting gold.
[BES 5.0.3 / GroupWise 2012 HP2]

Last edited by jsconyers; 08-27-2009 at 02:54 PM..
Offline  
Old 08-27-2009, 04:58 PM   #31
djm2
BlackBerry Master
 
djm2's Avatar
 
Join Date: Jul 2007
Model: 9780
PIN: N/A
Carrier: T-Mobile
Posts: 4,659
Default

Quote:
Originally Posted by arishamron View Post
Folks - first of all, thank you all for your suggestions, comments, insights, etc. I'm overwhelmed by your support!

Second, I took the suggestion of putting an intricate password on my BlackBerry - and, surprise surprise surprise, I haven't seen any "mobile browser" notations on my Gmail activity since.

Not sure what to think about that - whether the nurses have been foiled in their late-night intrusiveness, or whether the password also kept the employer's intrusiveness at bay. I can't imagine that a password would affect the proposal of SueWNY above ("If you have BIS (data plan) it checks your emails continuously. That's what push mail is all about. So that's probably all you're seeing.")

So, I guess I'm still a little puzzled, even if I'm reassured that I'm not being spied upon at this point.
Good for you. The main thing that you should do now is be a good patient and recover. Fretting about something going on with your BB is the last thing that you should worry about. Get well.
Offline  
Old 09-02-2009, 08:08 PM   #32
hackerjoe
Knows Where the Search Button Is
 
hackerjoe's Avatar
 
Join Date: Sep 2009
Model: 8330
PIN: N/A
Carrier: Sprint
Posts: 22
Default Wow

I never thought about that but patients are required to turn over devices especially if going into recovery for days following surgery!
I guess they do it for several reasons especially when theres no family to watch your stuff while you're recovering!

I can't see employee's having to have to turn phones over even at night, after all you can just say no sorry I don't have a phone on me. How are they going to know is there a metal detector you have to go through, ha ha ha ...
__________________
Is it fRiDay Y3t ?
Me likey :P
Access Denied !
Offline  
Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


OEM Dell XPS 8910 8920 8930 Alienware Aurora R5 R6 R7 Front Cooling Fan 7M0F5 picture

OEM Dell XPS 8910 8920 8930 Alienware Aurora R5 R6 R7 Front Cooling Fan 7M0F5

$14.63



DELL 330-6581 3306581 725-10229 OEM LAMP FOR 1510X 1610HD 1610X  - Made By DELL picture

DELL 330-6581 3306581 725-10229 OEM LAMP FOR 1510X 1610HD 1610X - Made By DELL

$39.98



Genuine OEM Dell 2375 B2375dnf B2375dfw 110V Fuser fixing N41P2 sku 724-BBCI picture

Genuine OEM Dell 2375 B2375dnf B2375dfw 110V Fuser fixing N41P2 sku 724-BBCI

$94.99



Dell OEM Latitude Rugged Extreme 7404 GPS Antenna Junction Cable Cable KMX0M picture

Dell OEM Latitude Rugged Extreme 7404 GPS Antenna Junction Cable Cable KMX0M

$2.95



NEW DELL OEM REPLACEMENT PROJECTOR LAMP FOR 4220 4320 GENUINE ORIGINAL  picture

NEW DELL OEM REPLACEMENT PROJECTOR LAMP FOR 4220 4320 GENUINE ORIGINAL

$198.22



OEM Dell 3310 2 in 1 LCD Touch Screen D2TNH NV133FHM-T00 06GHX8 picture

OEM Dell 3310 2 in 1 LCD Touch Screen D2TNH NV133FHM-T00 06GHX8

$54.00







Copyright © 2004-2016 BlackBerryForums.com.
The names RIM © and BlackBerry © are registered Trademarks of BlackBerry Inc.