Sindoni Says

     
     Sindoni Says


 Trust But Verify...
  

Blog

Sindoni Says will be a place where I will share my observations. Looking forward to creating a place of truth where Kool-Aid isn't served.

view:  full / summary

Below The Radar-Free Download Limited Time Offer

Posted on February 26, 2017 at 5:35 AM Comments comments (0)

Our topic for today is Internet security. In this blog post, I will include the the introduction to my new book "Below The Radar." The PDF E book can be found in the web store on this web site. The "Below The Radar" introduction excerpt reads as follows:

 

Introduction

 

In the early 1990's, I was working as a Video Sales Counselor for a large well known electronics company. My area of expertise was television, VCR, and video camcorders. At that time, televisions were analog and using rabbit ears antennas for broadcast reception. This was at a point in time when we as a nation were still relying on analog technology to watch television programs from local affiliates such as CBS, NBC, and ABC. In total, we had a little over a dozen channels to choose from. All the channels were being broadcast to our living rooms from within a fifty-mile radius. For those individuals who were living further away from the city, these individuals needed to have a high-powered roof antenna to be able to receive television signals to watch television at home. There was no digital television. This was at a time when we didn't even have cable television. But that was all about to soon change.

 

Our store manager held a meeting with the men who worked in the Video, Audio and Computer Departments to inform all of the employees that we would soon be getting a visit from Sales Representatives who worked for electronics manufacturing companies such as Sony, Mitsubishi, RCA, Sharp, JV, Toshiba and many others. The purpose for this visit was to inform us that digital television would soon be replacing the analog television sets that we had all had so become accustomed to. The Sales Representatives would be spreading the gospel that digital television would soon be replacing analog television sets. The Sales Representatives would be coming to our stores throughout the country. As a recall, our company had well over a hundred stores. This in my mind was huge!

 

 

 

Within a matter of days, the first Sales Representatives from RCA arrived with their product lines of digital televisions and went over the features, functions and benefits of each specific model. We were informed that all of our stores within the next sixty days would be soon receiving digital televisions.

 

They would no longer be shipping the analog models. All of their television sets would now be obsolete. The Sales Representative went on to say that the US. government in agreement with the Federal Communications Commission was mandating this change to be in full effect by the year 2000.

 

Being curious by nature, I pondering the thought, “Why would the government get involved with the FCC in this matter?” After our store received the first shipment of digital television sets, I asked one of my friends who worked in the Electronics Return Department to open the back of one the digital televisions.

 

What my friend and I discovered revealed a hidden built-in microphone that could be used to eavesdrop on personal conversations and a web-cam that could be used to watch unsuspecting US. citizens in their own home. Once the television set was connected to the cable box these features could be turned on and used to spy on all of us. Big Brother now had the capability to spy on 67 million households. Does this sound like the book written by George Orwell 1984? It was then I became highly suspicious.

 

What I knew about a television set’s ability to use 525 scanning lines to transmit an image called an aspect ratio, triggered an alarming question. What if someone decided to reduce the 525 scanning lines to create a smaller image, for example, a letterbox smaller, and wider screen similar to what you would see when you went to the movie theater would appear and the unused portion of the television screen could be used to send a higher EMF signal to the set that was designed to send harmful EMF waves to the unsuspecting viewer? Has anyone ever fallen asleep and left the television set on only to find the television screen size has been reduced similar to the letterbox theater image and as a direct result of changing the aspect ratio on your set and using the television set as a weapon of destruction against you, woke up with an extreme headache? It does make you wonder, doesn't it?

 

Has anyone ever set the microwave for let's say two minutes and noticed that somehow while you were standing next to the microwave that the timer setting was changed mysteriously to 20 minutes?

 

How about having the toaster set to a low number and discovering that your toast has been burned to a crisp? And you were standing right next to it? Did you ever wonder where your missing sock went in the clothes dryer? Can anyone reading these words tell me where the missing sock went? I'll leave this riddle for the May-tag repair man television commercial pitch man to figure out.

 

And lastly, how about getting hacked on your Microsoft Windows or Apple Operating System? Then you pick up the phone and call tech support and you explain the problem to the technician who walks you through a couple of steps to fix the problem. But he or she never explains what caused the malfunction. So, if you're like me, you want to know how to troubleshoot the problem to find the solution without ever having to call technical support.

 

The problems that I have cited in this introduction are the main reasons for writing this book. How many of you honestly read the manual (RTM) when you purchase a computer or any other electronic device?

 

Therefore, it is my hope that everyone reading this book will find my tips quite useful in this turbulent times. The information that can be found in this book are the result of over twenty years of my own personal experiences with computer and electronic devices. Most of what I will be sharing with you are little known facts that computer manufacturers will not share with you. Their job is to sell equipment. The more equipment they sell, the more money they will make. It is more to their liking to sell you a new piece of equipment than to fix the computer that one of their customers purchased. Once the computer warranty has expired, you're on your own. The manufacturer, whether it be Apple, Microsoft, Toshiba, Hewlett Packard or any of the other manufacturer, is going to do their best to sell you a new computer.

 

In this book, you'll learn how to turn lemons into lemonade. Remember the wise adage, “The difference between knowledge and wisdom is knowing what to do next.”

 

In closing, it is my hope that the introduction to the book "Below The Radar" has motivated you the reader to purchase the book. You'll learn many things about computers and Internet security that you will not learn anywhere else.

 

If anyone would like to comment or want to share valuable information about this topic, I look forward to reading your reply.

 

Respectfully,

 

Stephen Sindoni

 

Is America Free

Posted on February 25, 2017 at 3:30 PM Comments comments (1)

Is America Free

 

Our blog topic today is about freedom. I will begin this blog by asking the reader a question. Can anyone tell is America really the land of the free or the home of the brave? if this statement were true, then why are there over three hundred (300) Native American reservations spread out all over the United States? In this day and age this makes absolutely no sense.

 

History taught in school praises explorer Christopher Columbus for discovering America. When the great invader and pioneer of slavery landed on our shores, there were approximately over one hundred million indigenous people living on "Turtle Island" as it has been referred to by the indigenous people who were peacefully living here at the time of his barbaric arrival.

 

As a researcher, it saddens me to discover that in five hundred (500) years the one hundred million who were living in the Americas has declined and is probably less than twenty million Native Americans that are presently living in America. The Native American is becoming extinct like the buffalo who roamed the land in great number and so many other of the creator's creatures. Like the dinosaur who too roaming the United States in large numbers became extinct, there is a great probability that though the poisoning of their lake and rivers they too will become extinct in the not too distant future, unless something soon is done about it. The South Dakota pipeline Native American movement opposition is getting very little media coverage. Have we not learned from the Gulf Coast of Mexico's disaster? Will we allow these oil companies to destroy the water supply in the center of our country and effect the lives of millions of people? For, if there was a sinister plot behind the South Dakota pipeline, many people will surely die. Thus, the Native Americans living in these coastal water areas will become extinct.

 

Yet, we are all told by the media's minions that the American people are living in the greatest country in the world. I wonder how the Native Americans living under oppressed conditions

on reservations would respond to this statement? They would probably answer by saying " Read Red Earth, White Lie's by Native American activist Vine Deloria, Jr." I was once told by a native American elder, that the American people will one day wake up to discover that they too are prisoners in America and living in a prison with invisible bars.

 

So, what can we do as free sovereign human beings do to put an end to social injustice in this country? We can begin by taking back our god given unalienable right to freedom, fairness, and equality for everyone living on this planet. In order to take back the power, we must first recognize the fact we don't have the power. America has become Americant. There are rules and regulations for just about everything that we do. If someone wants to go salmon fishing, he or she must get a permit. That also applies to Native Americans fishing on their own reservations.

 

The American people are collateral that is expected to work hard to pay their taxes so that the elite can enjoy a lavish extravagant lifestyle at every tax payers expense. Most hard working Americans after paying their so called "Fair Share" to the government, have barely enough left over to make ends meet. And when that hard working American questions the political system, they become a threat to the system and are labeled anti-American.

 

Freedom has become another word for nothing left to lose. There is a double standard that must be done away with if our country is to evolve and thrive for all of its citizens. The scale of justice is in need of repair. Not all Americans are free. We have the largest prison population in the world. No country not even China, even comes close. The global prison population statistics provide a strong argument that Americans are less free than any of our neighbors abroad.

 

When individuals such as myself, who speak about social injustice, we become the enemy of the state and "Executive Orders" are signed behind closed doors to eliminate the so-called threat to the American way of life. No crime has been committed and no one has broken any of the thousands of laws that have put in place to keep Americans under control. Yet, people like myself, become the hunted by covert groups operating with immunity in this country. These minions are then dispatched to harass thousands of good hard working honest citizens just because they question authority and do not agree with the direction of this country's leadership.

 

Having identified a problem. and giving examples of public reaction to the problem of social injustice, it now time to offer a solution. Sindoni Says" If you want a different result, you must do something different in order to get the right results." Here in the next paragraph, I will discuss a solution that has helped me to take back my own personal sovereignty. The document I am referring to is know as "Know Your Right." The Public Servant Questionnaire can be purchased for an unbelievably low price of two dollars, The PDF document can be found in the web store on this website. I am offering the document at an affordable price so that everything can afford to buy. The information in the document is priceless. I personally never leave home without it.

 

The Public Service Questionnaire is a little know Federal Law enacted in 1974 which states: This questionnaire must be filled-out by any public servant before he or she ask the citizen any question. Federal law, including the Privacy Act, 5 U.S.C. 552a, 88 Stat. 1896, seq., 1974 authorize this.

 

1. Public servant's full legal name ______________________________________________________

2. Public servant's residential address____________________________________________________

3. Name of Agency___________________________________________________________________

4. Full Name of Supervisor and office address______________________________________________

5. Will you as a public servant uphold the constitution of the United States? Yes__ No___

6. Did public servant provide proof of identity? Yes___No___

7. ID Number:__________________________________________________________

Badge Number_______________________________________________________

Bonding Agency And Number____________________________________________

8. Will you as a public servant furnish a copy of the law or regulation that authorizes the action being taken or information required in this case? Yes___No___

9.. Will you as a public servant provide in writing, that portion of the law authorizing the questions asked? Yes___No___

 

After answering all the questions, the public servant must sign the last page of the document and then affirm that under the penalty of perjury that the answers are true and correct in every particular. And as final reminder there is a notice that states: If any person or agency receives any request for information relating to me, you must advise me in writing before releasing such information. Failure to do so may subject you to possible civil or criminal action as provided by this act or other law.

 

I have personally used this questionnaire and each time it has worked. law enforcement is well aware of this 1974 Federal Law. Know is power. I strongly recommend everyone reading this blog to purchase one from the web store.

 

In closing, if anyone has a comment about this blog or has has something important to share about this topic,I look forward to your reply.

 

Respectfully,

 

Stephen Sindoni

Microsoft Skype

Posted on February 23, 2017 at 11:20 AM Comments comments (0)

Microsoft Skype

 

Our topic for today is Microsoft Skype. Many of you reading this blog are familiar with th voice, video, text messaging, and file sharing ability of the software. What you are not aware of, is the National Security Agencies domestic surveillance spying operation “Prism.”

 

The NSA spy program captures vast amounts of unencrypted HTTP traffic at secret sites that span the entire world. A National Security Agency document by the German news magazine “Der Spiegel,” for the first time provided by Edward Snowden shows that the NSA had full access to voice, video, text messaging, and file sharing set up for targeting individuals in “Real Time” who were using Microsoft’s Skype Services.

 

The access, mandated by a foreign intelligence court warrant was part of the NSA’s “Prism Program” and allowed “Sustained Skype Collection” in real time for specific users identified by their Skype user names.

 

For those of you who are serious about keeping your personal information secret, I strongly recommend doing a Google search with the term “Users Guide For Prism Skype Collection.

 

In the last week of January of this year 2017, I was asked by a good friend, if I could help in explaining how Skype works and how to use it. My friend wanted to connect with me to test out her Skype voice chat software, to which I agreed to do without hesitation.

 

On the following day, I tried logging on to my Skype account, only to discover that the log in password did not work. Following the forgot the password instructions, I provided the email address that was used when creating the Microsoft Skype account.

Which for those of you reader this post may not be familiar with Skype, it is the user’s email, example Dumb Internet Skype User@USA.com.

 

Next, I checked the Dumb Internet Skype account user email. Searching through my email to find the return email from Microsoft that was sent. There it was in my in box, I then opened up the email to read it.

 

Following the Microsoft’s retrieval password request, I created a new password for the Skype account. That was easy, all I needed to do now was log in to the Microsoft Skype account with the original email user and type in the newly created password.

 

Typing in all the correct new log in information, I was greeted with an error message and was unable to sign into the Skype account. At this point, I was becoming a little frustrated with this sign in process. To matters worse, all I wanted to do was help a friend use their Microsoft Skype voice and video chat application software.

 

Returning to my recently opened Dumb User Internet USA account, I emailed Microsoft and explained the situation. I had been a Microsoft Skype user for years, this should be an easy problem to solve, so I thought.

 

Here now, is the bizarre response from the Microsoft Skype representative that I received. Your security info is still pending. On 1/29/17 you requested that your security info be replaced. The form then listed my current security info, example Dumb Internet User @USA.com email address and my alternate email address Dumb Schmuck For Using Skype @prism.com with an old telephone number that was obsolete.

 

The most disturbing information on the form was the following: Your security info will be replaced after thirty (30) days on 2/28/17, but don’t worry during the waiting period, you can still sign in and use your Microsoft account normally. To quickly summarize, it was okay to use Microsoft Outlook and all of their other products, but I could not use Skype. This did not make any sense at all, would you not agree?

 

The form ended by stating, that if you didn’t request this, let us know. If you’d like to keep your current security info, you can cancel this request. How bizarre is that! What I have learned from this experience is that customer service has become a thing of the past. Customer service is like the dinosaur, it is soon to be extinct. This is no different than the first people of our nation, who are also soon to extinct, if someone doesn’t stop the madness. Customer service should be the reason for Microsoft’s time, not the interruption of their time. If I had been able to talk to one of their representatives, this situation would have been quickly resolved.

 

The moral of this Microsoft Skype blog, Do Not Use Microsoft Skype. If you do, then you are asking for trouble. Should you need to use these type of software applications, then I strongly recommend purchasing a Live DVD Linux Mint 18.0 operating system  from osdisc.com for approximately six dollars. In that way, you'll be able to use Hexchat for video chat and voice chat. You can also use Pidgin Instant Messenger for text messaging. Upon doing so, you can be sure that the NSA will not be listening to you in real time as you are using the Live DVD Linux Mint 18.0 software.

 

In closing, if anyone reading this blog would like to comment or share a solution to this serious invasion of personal privacy, I look forward to reading what you have to say on this topic.

 

Respectfully,

 

Stephen Sindoni

 

Internet Freedom

Posted on February 21, 2017 at 9:20 AM Comments comments (0)

Our topic today is Internet freedom. I was not planning to discuss this subject today. At 7am on President's Day, I was on my Dell laptop when I realized that the battery needed to be charged. Normally, I just replace the battery with a secondary back up battery and back to work I go. But this would not be the way things turned out.


Changing out the dead battery, I then put in the replacement battery into the back of the laptop. Turning on the laptop, only to discover, that my replacement battery also needed to be recharged.


Against, my better judgment, I decided to plug in the Dell battery charger while finishing the desktop customization that only needed a couple more minutes to complete.


Next, I routinely plugged the power adapter to what I thought was a reliable surge protected power strip and powered up the computer. Within a matter of a few minutes, I can only describe what I am about to share with you as a Pearl Harbor attack. The attack was not conducted by a foreign power, the attack was done by our own military personnel.


My concentration was suddenly interrupted by the sound of a helicopter, flying dangerously low over the apartment building. Having been through this several times before, I desperately tried to unplug the power adapter from the computer. But it was too late, my computer mysteriously shut down. The monitor screen turned black. I feared the worst. The helicopter using Stealth “Stars Wars” weaponry sent out a high voltage electrical current that bypassed the power strip protector destroying the battery and charger. The next two hours was spent diagnosing my computer and determining that I had lost the use of the battery and charger. I had to replace both items.


 Later that day, I ventured out to a local electronics store. Once there, I ordered a replacement Dell Battery and charger. I was told by the electronics salesman that I would have to wait 3-5 days before my replacement would arrive. It would cost around eighty dollars to purchase the computer accessories.


 Since June of 2016, I've had to reinstall software on at least six computers. Fortunately for me, I am computer savvy. It usually takes me about two hours to reinstall on a computer using a Linux based operating system with all the bells and whistles.


As a direct result of all the terrorist type of commando tactics that I have experience with my computers, I have written a book entitled “Below The Radar.” In the book, I share many secrets that the computer manufacturers don’t want the customer to know.


“Below The Radar” is available in the web store. The information contained in this thought provoking book is priceless. It will open up the publics eyes when they learn that it is our own government who is spying on us.


In the book, I put the spotlight on the organizations that are preying on unsuspecting citizens. You will also learn how to protect your personal information. It is time for the public to be alerted to what is really going on in America and around the world.


Nothing that happens is bad. It is all about perception. Is the glass half full or is the glass half empty? It all depends on your point of view. The situation that I have described has taught me many valuable lessons. I speak my mind and refuse to drink the Kool-Aid.


In closing, if anyone has had a similar situation or an incident that they would like to share, please by all means, post it for others to learn from. I look forward to your thoughts and contributions to this blog.


Respectfully,


Stephen Sindoni

 

 

No Kool-Aid Served Here.

Posted on February 17, 2017 at 8:45 AM Comments comments (7)

Sindoni Says will be a place where I will share my observations about life, liberty and the pursuit of happiness. Looking forward to creating a place of truth where Kool-Aid isn't served. The first one hundred members who post a comment on the blog will receive a free copy of "Below The Radar."


Rss_feed