Harassment from law enforcement

Greetings.
Someone in law enforcement is blocking me from connecting on skype calls.  Please would you have him apprehended for his crimes?
Thank you very much.

Greetings.
This is a log of my attempts to call a merchant Inf. from November 2, 2013 through November 6, 2013.  Someone in law enforcement disconnects my skype calls as soon as I make the call, within a fraction of a second, before I can even hear the phone ring.  I have successfully connected only a few times.  Please would you have, whoever it is that is disconnecting my skype calls, apprehended as soon as possible?
Has my post sometimes been removed from the Skype Community Board?
Thank you very much for your kind and gracious assistance.
[11/2/2013 5:11:54 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:12:02 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:12:10 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:12:18 PM] *** Call to Inf., duration 02:28. ***
[11/2/2013 5:14:52 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:14:59 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:05 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:10 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:17 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:23 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:29 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:35 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:40 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:15:40 PM] *** Call ended ***
[11/2/2013 5:15:46 PM] *** Call to Inf., duration 00:36. ***
[11/2/2013 5:16:32 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:16:39 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:16:44 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:16:50 PM] *** Call to Inf., duration 03:52. ***
[11/2/2013 5:20:48 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:20:55 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:03 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:10 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:17 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:23 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:29 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:34 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:41 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:45 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:21:52 PM] *** Call to Inf., duration 01:34. ***
[11/2/2013 5:23:32 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:23:40 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:23:45 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:23:51 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:23:56 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:02 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:07 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:13 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:18 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:23 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:28 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:33 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:38 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:44 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:49 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:24:56 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:02 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:07 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:13 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:17 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:23 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:28 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:35 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:39 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:45 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:50 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:25:56 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:26:02 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:26:07 PM] *** Call to Inf., duration 00:49. ***
[11/2/2013 5:27:02 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:27:09 PM] *** Call to Inf., duration 00:30. ***
[11/2/2013 5:27:49 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:27:56 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:28:03 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:28:09 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:28:16 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:28:24 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:28:30 PM] *** Call to Inf., duration 01:15. ***
[11/2/2013 5:29:53 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:29:58 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:04 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:10 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:15 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:21 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:29 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:33 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:39 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:44 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:50 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:30:56 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:01 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:08 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:14 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:19 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:25 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:30 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:37 PM] *** Call to Inf., no answer. ***
[11/2/2013 5:31:42 PM] *** Call to Inf., duration 17:12. ***
[11/5/2013 3:42:38 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:42:45 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:42:54 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:43:03 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:43:14 PM] *** Call to Inf., duration 03:38. ***
[11/5/2013 3:47:02 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:47:12 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:47:56 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:58:19 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:58:26 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:58:32 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:58:39 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:58:46 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:58:53 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:59:00 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:59:09 PM] *** Call to Inf., no answer. ***
[11/5/2013 3:59:16 PM] *** Call to Inf. ***
[11/5/2013 6:18:15 PM] *** Call to Inf., no answer. ***
[11/5/2013 6:18:22 PM] *** Call to Inf., no answer. ***
[11/5/2013 6:18:30 PM] *** Call to Inf., no answer. ***
[11/5/2013 6:19:01 PM] *** Call to Inf., no answer. ***
[11/5/2013 6:39:54 PM] *** Call to Inf., no answer. ***
[11/5/2013 6:40:06 PM] *** Call to Inf., no answer. ***
[12:07:19 PM] *** Call to Inf., no answer. ***
[12:07:24 PM] *** Call to Inf., no answer. ***
[12:07:30 PM] *** Call to Inf., no answer. ***

Similar Messages

  • Request from law enforcement.

    Good day,
    I work for a law enforcement agency. At present we disclose materials by taking Word Perfect documents, convert them to PDF, place them in a directory, and then create links between the documents. We are also linking audio and video files to the PDFs. We have both had it so that when you click on a hyperlink, it opens up a new instance of adobe, or we have created books and had the multiple PDF documents contained within the book.
    What is the best way to take a series of lets say 100 documents, have a table of contents, and linked external .wav and video files, and put them all together into one nice package? Is there another adobe product that will acomplish this? Ideally, our clients would open one document or program and have access to the table of contents which would allow them to search and manouver through 100+ separate documents and audio/video with ease.
    Any help greatly appreciated.
    RY

    It might be feasisble to use Acrobat. With the Package feature, you can 'bundle' many files - PDF and not - and a cover page is generated. You can also have 'case' information included in the cover as part of a standard template. The single package file is distributed; opening it displays access to the enclosed files.
    My preference for video and other multi-media is to create a standard single page PDF with metadata about the material, and either attaching the video and a link to display it on the page, or just adding a link to the video file in the same directory. The page can then be given the relevant Bates number for the video file, if that is part of the workflow.
    Attaching the file has the advantage of fewer pieces to lose. If there are procedural reasons to not have attached files, a link-to-accompanying-file method still works.
    Noah Katz

  • Looking for a examples of a podcast from a law enforcement agency

    Hi, I am looking for podcast examples from a law enforcement agency. Any suggestions?

    I doubt you'll find any through iTunes U which is pretty much all educational institutions, though someone might have posted something from a sociology and criminology program. You might try browsing the iTunes Store podcasts section:
    Browse -> Podcasts -> Government & Organizations
    I didn't go through the entire list, but I did see a podcast from the Center on Law and Security and one from Cop Talk Radio, so there might be podcasts of interest.
    Regards.

  • HT5312 How Do I Stop email Harassment from same person creating multiple apple Ids?

    Hi,
    I am being harassed by someone who is creating multiple apple ids and deleting them.  The person is constantly trying to get me to click on links.  When I tried to reply to one ID the person created, an error came up stating "this user does not exist" It then provided me with a code for that user.  I believe this person has hacked into my account on multiple occassion because a lot of time right after I change my password, it stopped working again a few days later. 
    I feel I have no privacy.  This person sends all kinds of emails using the names of major brands as the front.  All the emails look cheap and it seems as if it wants you to select the "unsubscribe" button which then phishes my info someone.  Can someone tell me who I can report these emails at apple to investigate?  The would have to know who created the email links, which are used once then deleted, but the person who is doing this is the same I'm certain. 

    Hello ascending404,
    Thank you for the details of the issue you are experiencing with the emails you have been receiving.  I would be concerned about this too.  I found a resource that provides some good information about identifying and reporting emails like the ones you are recieving. 
    I recommend reviewing the full article, but this specific section provides steps for reporting these emails:
    What to do with suspicious iCloud emails
    If you receive a suspicious email, select the message text so that it is highlighted. Choose Forward as Attachment from the Message menu (OS X Mail) or the Actions menu (Outlook). Send the email to [email protected] This provides Apple's legal department and law enforcement with useful information to help prevent future phishing emails.
    Note: For suspicious emails related to iTunes, see this article.
    You can view the full article here:
    Identifying fraudulent "phishing" email
    http://support.apple.com/kb/HT4933
    Thank you for using Apple Support Communities.
    Best,
    Sheila M.

  • Law-enforcement-rpn.linabirsa.tk

    Hello everybody, from 2 days my browers (firefox, safari and crhome) are the redirect to law-enforcement-rpn.linabirsa.tk . i think it's a malaware but, how i can fix it? How i can remove this malaware?
    please help
    matteo

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can read it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB com.apple.AirPortBaseStationAgent 464843899 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */   /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;/(de|[nst]):/p;' ' {sub(/^ +/,"")};/r:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { print "'${p[41]}'";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$|'${p[41]}'/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { print "'${p[41]}'.plist\t'${p[42]}'";if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\) \\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print($2,$3,a[n],$1)|p;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' '" L*/P*/*loginit*' 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,Inter,iTu,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t /S*/L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 35 49 61 51;D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D13 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • Law Enforcement Discount rather disappointing

    My husband recently became a Law Enforcement Officer, and we heard that Verizon offered great discounts to LEO's, including 23% off plans, no ETF's, upgrade eligibility every 10 months, and even unlimited Data (which is now unavailable to most everyone else).  So we began doing research, and were disappointed to find that those discounts are only available through the Fraternal Order of Police Corporate Discount (http://azfop.com/fop-member-verizon-discount/), which has no contract with the department my husband works for.  The only other discount available is 15% off our plan (compare that to Gap employees who receive 25%, and Coca Cola employees who receive 25-28%).
    Now, I don't mean to be "that customer" who complains and complains until they get what they want, but I find it disturbing that Verizon seems to appreciate our public safety workers so little (No discount is offered for ANY military, at least not where I could find it).
    All across the country Law Enforcement Officer pay is either decreasing, or going stagnant due to pay-freezes, while the cost of living is increasing.  I for one would like to see Verizon show its support for those who help protect our society on a daily bases, and do this small favor for us (Verizon would have nothing to lose and tons to gain).  Even if you started offering 50% off your plans, unltd data, and free smart phones, I suspect you'd still be making money off us, just not as much as you COULD.
    Oh, and while you're at it, you should start extending your discounts to LEO Retirees and Military Retirees.  While searching for an existing post on these forums I came across several posts by LEO's who lost their 15% discounts once they retired.  That's just sad...
    So what do you say Verizon?  Will you show more support for our LEO's and military and offer some better discounts (not connected to a union)?  Or will you just say "f*** the police" like so many others nowadays...
    For everyone's reference, these are some discounts offered by Verizon's competitors:
    Sprint
    Law Enforcement
    25%
    ARMY/USAA/Military/Airforce
    5%-12%
    AT&T
    Gov. Military and First Aid
    15%-19%
    Army & National Guard
    19%

    Each employee discount is unique to each company or organization. The rate and peaks depend on the amount of business that company or organization has with Verizon Wireless and what the two companies have negotiated into the agreement. For example, very few companies have extended the employee discount to their retired employees.

  • Project Oxford. Can I use the Face API for law enforcement app

    Hello,
    I am a .Net developer and have recently learned of Microsoft's Project Oxford.
    I am very much interested in developing an app using the Face API but, had a question regarding the code of conduct.
    Specifically it states:
    People who use your app must have the consent of the people whose images are being processed by your app. We ask that you include a prominent notice in your app UI so your end users know that consent
    is required.
    The  application I am attempting to develop is for law enforcement to detect wanted persons while out on patrol.
    My questions are: 
    1. Is there an exception to the rule above for law enforcement?
    2. Can I use the Face api for my application knowing that
    in most cases law enforcement will not specifically ask for consent while scanning people?
    As always thank you for your assistance.

    https://www.apple.com/legal/intellectual-property/guidelinesfor3rdparties.html

  • How do i find out serial number of my Macbook that is stolen so it can be reported to law enforcement ?

    How do i find out serial number of my Macbook that is stolen so it can be reported to law enforcement ?

    Did you have the "Find my Device" enabled on your AirBook? Look at this web page and maybe you remember setting it up and if you did you could track it and/or disable it the first time it's connected to the internet:
    https://www.apple.com/icloud/find-my-iphone.html
    Report as soon as possible and also make up flier and hand out to all the local pawn shops in case the theif tries to pawn it or sell it. Also keep you eyes out for craigslist ipad sales for AirBooks - you never know how silly some people and try to sell a stolen item that you can prove is yours.
    Good luck...

  • Law enforcement contact within Skype

    I am a police officer in Montgomery County, Pennsylvania and am investigating a complaint. Please contact me as soon as possible. My name is Officer James Lavin and I am employed by the Upper Perk Police District. The telephone number at our station is 215-679-8203.
    Thank you!

    Hi,
    You need to contact Skype Customer Service.
    Please have a look at: https://support.skype.com/en/faq/FA1170
    Thank you!
    If my answer helped to fix your issue, mark it as a Solution to help others.
    Thank You!
    Please send private messages only upon request.

  • I lost my mac how i get it will apple replace with a new one if i get them a law enforced complaint on it

    please help me get my mac back

    Apple cannot get it back. Apple will not search for it. Report the loss to the Police. Apple will not replace it. If you have it insured then report the loss to the insurance company. They may pay to replace it. No one can help you get it back except you - you lost it.

  • Stolen iPhone bought from eBay help!

    Hello there
    I don’t know if this will sound to you inreresting but i thought i should write to tyoy informing of a case that involves my iphone4
    Last year on August i got my iphone4 through ebay from a good rated seller factory sealed and was using it here in Greece without any problem. I paid through paypal by the way
    After almost a year a strange thing happened. I thought i should extend my iPhones warranty so i went to the apple website and put my serial number and my apple id so the phone was linked to my account. Late i know but better late than never
    At the end of the process i regretted and i stopped the process. After 8 hours or so i received an email from the US from a detective. Yes i know i thought yeah ok this is a spam
    This person informed me that the apple product that i have was stolen from the apple factory
    Again i thought this was a scam
    This person though informed me of the product that i owned and he even provided me with the serial number!!!!i asked him where did he find my email address and he said he got it from apple.
    The story continues of course with me trying to resolve the issue with ebay and paypal but without any success
    To be honest i was very suprised with this especially when after soo long i now know that i have a stolen product. which from my end is legally purchased from ebay through paypal
    We have a forum here in Greece www.applemania.gr me being one of the owners and as you can imagine we follow you and all apple news. This is the reason that i thought i should write to you and inform you of this issue in case you find it interesting
    I am not attaching the email of the detective in Colorado but if you wish i can
    if anyone has any ideas what my next steps should be please do tel!
    Thank you for your time

    eNovator wrote:
    im a member since day one and never had problemns..this isnt exactly a problem either cos i am using the phone and the phone was purchased legaly through there
    im asking if there is any chance of returning the phone to apple or ebay due to this case
    FYI: You can NOT legally purchase something that was stolen. It's called receiving stolen property in the US and is a criminal offense. Since you bargained in good faith when you purchased it, you would most likely not be charged IF you surrendered the phone to authorities and cooperated with them in helping to identify the seller.
    You will need to get documentation from law enforcement to present to e-bay/pay-pal to plead your case for a refund and will most likely need to return the phone to Apple. I would speak to law enforcement in your country and ask them to handle the communication.
    This, people, is why it's a bad idea to buy things from e-bay. In the beginning, it was a good source for some things, now it's just a nest of thieves and scam artists. Not all of them, of course, but a significant percentage.

  • Theft of phone and skype account still being used!...

    Hi.
    My wifes phone was stolen on th 19th of April during a camping trip.
    We reported the theft to the police.
    I have gone onto skype today, and the account is still being used.
    My wife said the only two places skype is installed is on her stolen phone and on her laptop, which isn't on at the moment as she is at work!!
    So whoever stole the phone is using the skype account right now!!!
    I need to find out the IP addresses that have been logged against the user [Redacted for privacy] since the 19th of April.
    I have tried to email support, but the contact form keeps giving an error, so please someone respond as soon as possible so I can relay info to the police please!!
    Kind regards,
    Glenn.

    Hi, Glenn, and welcome to the Community,
    These two commands, when entered into a chat window, may prove helpful:
    /remotelogout
    Sign out all other instances except the current one. This will also stop push notifications on all other instances.
    /showplaces
    Lists other instances where this Skype name is currently signed in.
    Important: Always make sure you are using the latest version of Skype. Some of these commands may not be supported in older versions.
    Here is a link to the original FAQ article:
    https://support.skype.com/en/faq/FA10042/what-are-chat-commands-and-roles?
    If your wife still has access to her account, she should consider signing on to her account details and removing any saved payment methods on file. 
    Skype does not release IP addresses except upon request from law enforcement agencies, who can file to receive this information via official channels.
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • Trying to create effect

    I have some video of hidden interrogation video from law enforcement. I have the shot in the timeline, and I have 2 duplicates of the video on top of the original shot.
    I cropped out the face and blurred it for one layer, and I did the same with the time/date with the other layer. So I have 3 layers of the shot on top of each other with the face and timestamp blurred.
    In the script, they talk about the behavior of the subject. I want to drop the opacity of the video and highlight the hands of the subject (like a circle). Normally not a problem, but I keep running into problems because of the layers. If I drop the opacity, you can see her face. If I add a shape or matte, same thing.
    How do I accomplish this look? I'd like the layers to fade while the hands remain in focus so the viewers eyes will be directed to the nonverbal behavior

    Try nesting the layers into one layer, or export the three as a self contained movie, then do the effects you need to add after you cut this exported file back into the sequence.
    Jerry

  • Delete deleted text messages

    Is there a way to delete my deleted messages? I'm hearing that for $30 anyone can pay to have your text message history retrieved from your phone records?

    You can factory reset from the recovery rom, which will rewrite the device to factory. And nobody but you can get your text history without a subpoena to the carrier from law enforcement.

  • Can apple track a stolen iphone 5

      i just lost my iphone today and find my iphone says my phone is offline. does that mean that my iphone is off?

    I am sure that when compelled by the legal system that they can track them.
    As a matter of policy, Apple does not track iphones for individuals, nor do they do so without request from law enforcement.
    From Apple:
    "Apple does not have a process to track or flag lost or stolen product,"
    http://support.apple.com/kb/HT2526

Maybe you are looking for