Friday, March 30, 2012

CIA Director: Web-Connected Devices in Your Home Make it Easy to Spy on You | The Vigilant Citizen

CIA Director: Web-Connected Devices in Your Home Make it Easy to Spy on You

by VC, vigilantcitizen.com
March 19th 2012

New technologies are making the work of CIA Director David Petraeus a whole lot easier. According to him, the advent of wireless and web-connected devices has caused citizens to bug their own home, effectively allowing the spy agency to collect a wealth of information with great ease. If that wasn’t enough, people now readily share the most (in)significant details of their lives through Facebook, which now displays all of this information in a very convenient time-line.

Another concept that is brushed upon in this article is cloud computing. Touted as the next big thing in computer technology, cloud computing is about storing all of your data in “remote secure servers” – ultimately eliminating the need for computer hard drives and storage devices such as USB sticks. While this technology sounds very convenient, it is set to cause a drastic change in the world of computing: In just a few years, almost all of the personal files, pictures and data of computer users across the world will be stored in gigantic servers that will be owned by only a few mega-companies. Apple already has a system called iCloud that automatically copies the contents of iPhones and iPads (including pics, contacts, etc.) to a remote server. As Pertraeus himself says, all of this information is now “located, identified, monitored, and remotely controlled” by the CIA – and whoever else. Here’s an article about Petraeus love of new technologies from Wired.

CIA Chief: We’ll Spy on You Through Your Dishwasher

More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”

Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.

The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.

That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.

“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”

It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.

Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier. Thank Zuck, spies. Thank Zuck.
- Source: Wired


Original Page: http://vigilantcitizen.com/latestnews/cia-director-web-connected-devices-in-your-home-make-it-easy-to-spy-on-you/

Shared from Read It Later

 אל

The NSA Is Building the Country’s Biggest Spy Center | The Vigilant Citizen

The NSA Is Building the Country’s Biggest Spy Center

by VC, vigilantcitizen.com
March 20th 2012

The NSA is building an enormous spy center, probably the biggest ever, in Bluffdale Utah. When construction is completed in 2013, the heavily fortified $2 billion facility will encompass 1 million square feet, including four 25,000-square-foot areas to house endless rows of high-powered servers. The center will be fed data collected by the agency’s eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the US.

The incredible processing power of this facility will be used to scan e-mails, phone calls, text messages, tweets or any other kind of communication. As a former NSA officer states in his article, while holding his thumb and forefinger close together “We are that far from a turnkey totalitarian state.” Here’s an article from Wired about this massive facility.

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives.

Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978—and the number of plural marriages has tripled—so the sect has recently been looking for ways to purchase more land and expand throughout the town.

But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries. Once built, it will be more than five times the size of the US Capitol.

Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

A swath of freezing fog blanketed Salt Lake City on the morning of January 6, 2011, mixing with a weeklong coating of heavy gray smog. Red air alerts, warning people to stay indoors unless absolutely necessary, had become almost daily occurrences, and the temperature was in the bone-chilling twenties. “What I smell and taste is like coal smoke,” complained one local blogger that day. At the city’s international airport, many inbound flights were delayed or diverted while outbound regional jets were grounded. But among those making it through the icy mist was a figure whose gray suit and tie made him almost disappear into the background. He was tall and thin, with the physique of an aging basketball player and dark caterpillar eyebrows beneath a shock of matching hair. Accompanied by a retinue of bodyguards, the man was NSA deputy director Chris Inglis, the agency’s highest-ranking civilian and the person who ran its worldwide day-to-day operations.

A short time later, Inglis arrived in Bluffdale at the site of the future data center, a flat, unpaved runway on a little-used part of Camp Williams, a National Guard training site. There, in a white tent set up for the occasion, Inglis joined Harvey Davis, the agency’s associate director for installations and logistics, and Utah senator Orrin Hatch, along with a few generals and politicians in a surreal ceremony. Standing in an odd wooden sandbox and holding gold-painted shovels, they made awkward jabs at the sand and thus officially broke ground on what the local media had simply dubbed “the spy center.” Hoping for some details on what was about to be built, reporters turned to one of the invited guests, Lane Beattie of the Salt Lake Chamber of Commerce. Did he have any idea of the purpose behind the new facility in his backyard? “Absolutely not,” he said with a self-conscious half laugh. “Nor do I want them spying on me.”

For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: “It’s a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nation’s cybersecurity.” While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how it’s collected, and what is done with the material are far more important issues. Battling hackers makes for a nice cover—it’s easy to explain, and who could be against it? Then the reporters turned to Hatch, who proudly described the center as “a great tribute to Utah,” then added, “I can’t tell you a lot about what they’re going to be doing, because it’s highly classified.”

And then there was this anomaly: Although this was supposedly the official ground-breaking for the nation’s largest and most expensive cybersecurity project, no one from the Department of Homeland Security, the agency responsible for protecting civilian networks from cyberattack, spoke from the lectern. In fact, the official who’d originally introduced the data center, at a press conference in Salt Lake City in October 2009, had nothing to do with cybersecurity. It was Glenn A. Gaffney, deputy director of national intelligence for collection, a man who had spent almost his entire career at the CIA. As head of collection for the intelligence community, he managed the country’s human and electronic spies.

Within days, the tent and sandbox and gold shovels would be gone and Inglis and the generals would be replaced by some 10,000 construction workers. “We’ve been asked not to talk about the project,” Rob Moore, president of Big-D Construction, one of the three major contractors working on the project, told a local reporter. The plans for the center show an extensive security system: an elaborate $10 million antiterrorism protection program, including a fence designed to stop a 15,000-pound vehicle traveling 50 miles per hour, closed-circuit cameras, a biometric identification system, a vehicle inspection facility, and a visitor-control center.

Inside, the facility will consist of four 25,000-square-foot halls filled with servers, complete with raised floor space for cables and storage. In addition, there will be more than 900,000 square feet for technical support and administration. The entire site will be self-sustaining, with fuel tanks large enough to power the backup generators for three days in an emergency, water storage with the capability of pumping 1.7 million gallons of liquid per day, as well as a sewage system and massive air-conditioning system to keep all those servers cool. Electricity will come from the center’s own substation built by Rocky Mountain Power to satisfy the 65-megawatt power demand. Such a mammoth amount of energy comes with a mammoth price tag—about $40 million a year, according to one estimate.

Given the facility’s scale and the fact that a terabyte of data can now be stored on a flash drive the size of a man’s pinky, the potential amount of information that could be housed in Bluffdale is truly staggering. But so is the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies. As a result of this “expanding array of theater airborne and other sensor networks,” as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)

It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Google’s former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the world’s 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.

The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping network. A tall man with strands of black hair across the front of his scalp and dark, determined eyes behind thick-rimmed glasses, the 68-year-old spent nearly four decades breaking codes and finding new ways to channel billions of private phone calls and email messages from around the world into the NSA’s bulging databases. As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications.

He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says. “That’s not just San Francisco; they have them in the middle of the country and also on the East Coast.”

The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations, satellite receivers in locations that include Roaring Creek and Salt Creek. Tucked away on a back road in rural Catawissa, Pennsylvania, Roaring Creek’s three 105-foot dishes handle much of the country’s communications to and from Europe and the Middle East. And on an isolated stretch of land in remote Arbuckle, California, three similar dishes at the company’s Salt Creek station service the Pacific Rim and Asia.

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there. According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.

The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.

The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSA’s recorders. “Anybody you want, route to a recorder,” Binney says. “If your number’s in there? Routed and gets recorded.” He adds, “The Narus device allows you to take it all.” And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis.

According to Binney, one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex.

Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agency’s domestic eavesdropping. “That multiplies the call rate by at least a factor of five,” he says. “So you’re over a billion and a half calls a day.” (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.)

After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.

Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.

The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.

But there is, of course, reason for anyone to be distressed about the practice. Once the door is open for the government to spy on US citizens, there are often great temptations to abuse that power for political purposes, as when Richard Nixon eavesdropped on his political enemies during Watergate and ordered the NSA to spy on antiwar protesters. Those and other abuses prompted Congress to enact prohibitions in the mid-1970s against domestic spying.

Before he gave up and left the NSA, Binney tried to persuade officials to create a more targeted system that could be authorized by a court. At the time, the agency had 72 hours to obtain a legal warrant, and Binney devised a method to computerize the system. “I had proposed that we automate the process of requesting a warrant and automate approval so we could manage a couple of million intercepts a day, rather than subvert the whole process.” But such a system would have required close coordination with the courts, and NSA officials weren’t interested in that, Binney says. Instead they continued to haul in data on a grand scale. Asked how many communications—”transactions,” in NSA’s lingo—the agency has intercepted since 9/11, Binney estimates the number at “between 15 and 20 trillion, the aggregate over 11 years.”

When Barack Obama took office, Binney hoped the new administration might be open to reforming the program to address his constitutional concerns. He and another former senior NSA analyst, J. Kirk Wiebe, tried to bring the idea of an automated warrant-approval system to the attention of the Department of Justice’s inspector general. They were given the brush-off. “They said, oh, OK, we can’t comment,” Binney says.

Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.

Read the rest of this article at Wired.


Original Page: http://vigilantcitizen.com/latestnews/the-nsa-is-building-the-countrys-biggest-spy-center/

Shared from Read It Later

 אל

Whistle-Blower Outs NSA Spy Room

Whistle-Blower Outs NSA Spy Room

m.wired.com | Aug 28th 2008

AT&T provided National Security Agency eavesdroppers with full access to its customers' phone calls, and shunted its customers' internet traffic to data-mining equipment installed in a secret room in its San Francisco switching center, according to a former AT&T worker cooperating in the Electronic Frontier Foundation's lawsuit against the company.

Mark Klein, a retired AT&T communications technician, submitted an affidavit in support of the EFF's lawsuit this week. That class action lawsuit, filed in federal court in San Francisco last January, alleges that AT&T violated federal and state laws by surreptitiously allowing the government to monitor phone and internet communications of AT&T customers without warrants.

On Wednesday, the EFF asked the court to issue an injunction prohibiting AT&T from continuing the alleged wiretapping, and filed a number of documents under seal, including three AT&T documents that purportedly explain how the wiretapping system works.

According to a statement released by Klein's attorney, an NSA agent showed up at the San Francisco switching center in 2002 to interview a management-level technician for a special job. In January 2003, Klein observed a new room being built adjacent to the room housing AT&T's #4ESS switching equipment, which is responsible for routing long distance and international calls.

"I learned that the person whom the NSA interviewed for the secret job was the person working to install equipment in this room," Klein wrote. "The regular technician work force was not allowed in the room."

Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego.

"While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal," Klein wrote.

The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers, according to Klein's statement.

The secret room also included data-mining equipment called a Narus STA 6400, "known to be used particularly by government intelligence agencies because of its ability to sift through large amounts of data looking for preprogrammed targets," according to Klein's statement.

Narus, whose website touts AT&T as a client, sells software to help internet service providers and telecoms monitor and manage their networks, look for intrusions, and wiretap phone calls as mandated by federal law.

Klein said he came forward because he does not believe that the Bush administration is being truthful about the extent of its extrajudicial monitoring of Americans' communications.

"Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA's spying program is really limited to foreign communications or is otherwise consistent with the NSA's charter or with FISA," Klein's wrote. "And unlike the controversy over targeted wiretaps of individuals' phone calls, this potential spying appears to be applied wholesale to all sorts of internet communications of countless citizens."

After asking for a preview copy of the documents last week, the government did not object to the EFF filing the paper under seal, although the EFF asked the court Wednesday to make the documents public.

One of the documents is titled "Study Group 3, LGX/Splitter Wiring, San Francisco," and is dated 2002. The others are allegedly a design document instructing technicians how to wire up the taps, and a document that describes the equipment installed in the secret room.

In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "could be used to 'hack' into the AT&T network, compromising its integrity."

According to court rules, AT&T has until Thursday to file a motion to keep the documents sealed. The government could also step in to the case and request that the documents not be made public, or even that the entire lawsuit be barred under the seldom-used State Secrets Privilege.

AT&T spokesman Walt Sharp declined to comment on the allegations, citing a company policy of not commenting on litigation or matters of national security, but did say that "AT&T follows all laws following requests for assistance from government authorities."

Original Page: http://m.wired.com/science/discoveries/news/2006/04/70619

Shared from Read It Later

 אל

Thursday, March 29, 2012

Four Police and "The" Lt. Show Up for this?

Bacon!

Photo

אל

Must have hit a nerve! 18 wheeler Surveillance Truck

NWO welcome to my life! I must have pissed SOmebody off. So clearly, I am "on to something big" and it smells an awful lot like BACON! #ProjectMonarch is alive and well in Nashville, Tennessee! Good luck with that! Have you met my friend, Spider and his handler, Vernon? SLAVES! He is one of yours. #MKUltra Ready, AIM, Fire!

Photo

אל

Crime Scene Photo LIVE assault 8:40 pm "Spider"

I just got punched in the face after taking this photo. Neighbor is calling police. Tried to steal my iPhone because I took photo of him. Police on the way. My jaw is out of line - TMJ. Shaking.

Photo

אל

"Sucker Punch" or How to Make Monarch Mind Control Sexy | Vigilant Citizen

"Sucker Punch" or How to Make Monarch Mind Control Sexy

by VC, vigilantcitizen.com
July 19th 2011

Sucker Punch is an action fantasy thriller that promises its viewers two things: girls and explosions. And it delivers both. But behind the slur of short skirts and CGI effects hides a disturbing underlying story: Sucker Punch is about the life of a mind control slave who dissociates from reality to escape the trauma caused by abuse. This article looks at the hidden meaning and symbolism in Sucker Punch.

Warning: This article deals with disturbing subject matters and contains major spoilers.

Produced by Zack Snyder (Watchmen, 300), Sucker Punch describes the quest of a girl attempting to escape a mental hospital where she was forcibly placed. In order to achieve this goal, our heroine, “Baby Doll”, and her friends, must find five items that will be used to escape the institution. Most critics did not appreciate the video game-like plot line of Sucker Punch and were confused its several levels of alternate realities.

The movie does come across as confusing, because there is one important fact about this movie that is not known to most viewers that makes the movie (slightly more) cohesive and coherent: Sucker Punch is about trauma-based mind control. It tells the story of a victim of Monarch Programming (more specifically Beta or Kitten programming) as she becomes increasingly dissociative. The movie takes place in the slave’s psyche, where dissociation is a defence mechanism to escape the unbearable trauma of abuse. The deep dark secrets of Monarch mind control are never truly presented on screen yet they are implied in meanings and symbols throughout the movie.

(Note: If you are not familiar with Monarch programming, I suggest you read the article titled Origins and Techniques of Monarch Mind Control before continuing with this one).

Sucker Punch provides a taste of the confusion lived by actual MK slaves as the film subjects its viewers to some of the same mind twisting: illusion, deceit, reversals and doublespeak. As the movie advances, the line between reality and fiction becomes increasingly blurry and messages become mixed up. At face value, the movie can be perceived as being about the the empowerment of women, but the mind control symbolism of the movie indicates that it is actually about the exact opposite. Our hero Baby Doll is looking for “freedom” but, in the end, “freedom” is definitely not what she thought it would be. In fact, the entire movie can be understood in two completely opposite ways, making it quite a mind bender. Sucker Punch begins with an off-screen voice saying:

“Everyone has an angel. A guardian who watches over us. We can’t know what form they’ll take. One day, old man. Next day, little girl. But don’t let appearances fool you. They can be as fierce as any dragon. Yet they’re not here to fight our battles … but to whisper from our heart … reminding that it’s us. It’s everyone of us who holds the power over the worlds we create.”

Like many other parts of the movie, this introduction can refer to guardian angels helping people take charge of their life or to mind control handlers who have the power to manipulate the thoughts of MK slaves. This only one of the several possible double meanings in the movie.

Abuse at home

The movie takes place during the 1950-60s (despite glaring anachronisms), a period during which actual MK-Ultra experiments were known to be taking place. The main protagonist of Sucker Punch is a twenty year old girl known only as Baby Doll. Her name strongly suggests mind control: “baby dolls” do not control their movements or environments. Baby Doll’s background and road to mind control mirrors the story of many real life Monarch slaves: an abusive parent caused multiple traumas at a young age, making her predisposed to dissociation. Her “ownership” is then transferred to an institution where the actual programming takes place, under the supervision of specialists (handlers).

The story of Baby Doll is indeed the typical story of real life Monarch slaves, who are often subjected to abuse at a young age. After several years of mistreatment, the ruthless parental figures have then no trouble handing over the children to MK authorities – clearing them of the possible criminal charges they could face for years of abuse.

The movie’s introductory sequences presents Baby Doll’s source of trauma: an evil step-father.

Baby Doll's drunk step-father looking to abuse her. Many Monarch slaves come from abusive households or multi-generational ritual abuse families.

“The type of father who is most preferred by the Programmers to offer up their children for programming is the phile. If a father will abuse his own little baby girl, then the Programmers know that the man has no conscience. This father’s involvement in criminal activity (and thereby his vulnerability) can be continually increased. They want men who they believe will not develop any qualms later on in life about what they have done.”
- Fritz Springmeier, The Illuminati Formula to Create a Mind Control Slave

The step-father's wounds around the eye produce an emphasis on the "one-eye" symbol, which represents, as seen in other articles, Illuminati mind control. The one-eye symbol appears in other instances during the movie.

The step-father calls the police and accuses Baby Doll of killing her own sister – a crime he committed. She is arrested by the police and immediately drugged. Her ordeal as a Monarch slave begins.

Baby Doll is given a sedative by state officials and taken to the mental institution, which turns out to be a mind-control programming site. Mind-control slaves are constantly drugged by their handlers to facilitate their programming.

The Programming Site

Baby Doll forcefully taken into the institution. Several mental health institutions were actual mind-control sites used by the CIA.

The mental institution in which Baby Doll is placed has all of the characteristic of a mind-control programming site. The threat of physical and sexual abuse is constant during the entire movie and several techniques are used to trigger dissociation.

Music is extremely important in the institution (and in actual Monarch mind control) where it is used as a programming tool. Most of the songs heard during the movie have suggestive lyrics which, in the context of mind control, can to trigger dissociation. As Baby Doll is taken to her cell, Yoav’s cover of the song “Where is my Mind” is heard. The lyrics describe the feeling of dissociation:

With your feet in the air and your head on the ground
Try this trick and spin it, yeah
Your head will collapse
But there’s nothing in it
And you’ll ask yourself

Where is my mind
Where is my mind
Where is my mind

In the institution, Baby Doll learns that her step-father paid to subject her to the ultimate form of mind control: a complete lobotomy. The administrator of the mental institution tells the step-father: “Don’t worry, she won’t even remember her name when I’m done with her”.

The movie then fast forwards to the scene of the lobotomy.

Lobotomies were performed by inserting a sharp instrument through an eye of the victim to "disactivate" the prefrontal cortex. The movie emphasizes the symbolism of the needle going through an eye to as it symbolically represents Illuminati mind control.

Right at the moment where the doctor is about to hammer the orbitoclast into Baby Dolls’ brain, dissociation occurs and the viewers are taken to an alternate reality. We are taken to the dissociative, imaginary world created by Baby Doll’s psyche, in which she embodies an alter persona: a Beta Kitten.

The Alternate Reality

In Monarch mind control, there are several types of programming, depending on the use the handlers want to make of the slave. In Sucker Punch, it is obvious that Baby Doll and her friends are subjected to Beta Programming – also known as Kitten programming. The emphasis in the beginning of the movie on her step-father’s abuse is, in Monarch Programming terms, the anchor.

“All the programming of each & every slave is anchored upon some type of trauma. One of the first fundamental traumas will be watched, filmed, coded & used as an anchor. For instance, the most brutal abuse of a girl by her father will be used as an anchor upon which to build the Beta programming. (…) Extreme psychosis is created within a child trying to deal with the issues created by the incest from the child’s most important figure–their father figure.”
- Ibid.

In Baby Doll’s alternate reality, the mental institution becomes a club run by a mobster – who is, in real life, the institution’s administrator. The “mental patients” of the institution are dancers…with extras. This distorted version of reality implies one important thing that is not directly mentioned in the movie: If Baby Doll deals in prostitution in her alternate reality, it implies that she is subjected to the same treatment in the mental institution. In actual Monarch programming, repeated and systematic abuse is used to create trauma and dissociation.

In her alternate reality, Baby Doll embodies an alternate persona – what is called a Kitten – who are programmed to give favors. The programming removes inhibitions and, as we’ll see, Baby Doll will be trained to “let herself go” and become sensual on demand.

It is during the scene of the lobotomy that we first see Baby Doll dissociating, turning the sordid operation into an alluring dance routine.

Baby Doll being strapped and prepared for the lobotomy.

Baby Doll's alternate world reflecting yet distorting her lobotomy - it is now the premise of an erotic dance routine.

Despite appearances to the contrary, the movie never truly condemns forced prostitution or even mind-control practices. Everything is turned into a fantasy, making the situation cool and attractive. For example, Baby Doll’s Kitten alter persona is constantly dressed as a schoolgirl who is brought in by a priest.

Baby Doll's Sex Kitten alter has a different past. Real Monarch programming slaves are programmed to have different alters, who have different pasts, different attitudes and, sometimes, even speak using different accents than the "core" persona. In Baby Doll's case, her abusive step-father becomes a priest.

Beta Kittens

In her alternate reality, Baby Doll is forced to dance and please clients. Since her alternate world is a product of dissociation, which “sugar-coats” reality to make it bearable, we can deduce that she is forced to do the same actual mental institution, but the movie never actually shows it.

Baby Doll is being told that she is here to please clients. Animal print cushions allude to Kitten programming.

Sweet Pea, another "patient"/slave, practising her dance moves. She is wearing feline print, used in Monarch mind control to identify Beta Kittens.

Vanessa Hudgens is a former Disney star; as stated in previous articles, there are numerous links between Disney’s child stars and Monarch programming.

Mirrors and Butterflies

Not unlike other movies on the theme of mind control (see Black Swan), tricky mirror effects and confusing reflections are often used during Sucker Punch to symbolize the blurring of the line between reality and fiction and to give the viewers a small sense of the world of a MK Slave.

Tricky mirrors and camera movements cause viewers realize that they were looking at inverted reflections during an entire scene - warning them to never trust what they see. Notice the butterfly between the mirrors, a symbol of Monarch programming.

When one of the slaves is shot and killed by Blue, the club the owner, the camera moves to an illuminated mirror from which falls a baby picture of her. Notice the butterfly.

Almost all films on mind control feature a shattered mirror at one point - representing the shattering of the slave's personality. In Sucker Punch, the mirror shatters when Blue attempts to assault Baby Doll.

Second Level of Dissociation

So where do the cool action scenes fit in all this disturbing creepy mess? Well, they all happen in Baby Doll’s head as a way to escape reality. Each action scene occurs when Baby Doll is forced to perform an alluring dance.

Using music as a programming tool, Vera Grosky (the institution’s doctor who becomes the dance instructor in the alternate reality) tells Baby Doll to “let everything go”. In other words, she must dissociate. Following Vera’s orders, when the music starts, Baby Doll is catapulted into a second level of fantasy world. During the length of the song, the dance turns, inside Baby Doll’s head, into an imaginary action scene that vaguely reflects reality. This multiple level of dissociation is Baby Doll’s defense mechanism against the cold hard reality: the third level of the action scene means that she is dancing in the second level of the club, which means she is most likely being abused in the first level of the mental institution (I hope this is not too confusing).

During her first dance, Baby Doll dissociates to a world resembling feudal Japan. She is wearing a skimpy school girl outfit, reminding everyone that, behind all of this, the truth is that she is being used for her body.

During this first dissociative action scene, Baby Doll meets the “Wise Man”, the guide who will lead her to “freedom” … and I use that word in quotation marks for a reason. While it may appear that throughout the movie, the Wise Man guides Baby Dolls towards liberty, he knows all along that his help will lead her to the exact opposite – total lobotomy. More on this later.

The second action scene takes place in Germany, during WWI. Once again, Baby Doll is forced to dance. The song she must dance to is extremely meaningful: It is a remake of the classic song White Rabbit by Jefferson Airplane. In the context of mind control, the song’s lyrics take on a profound meaning:

One pill makes you larger
And one pill makes you small
And the ones that mother gives you
Don’t do anything at all
Go ask Alice
When she’s ten feet tall

And if you go chasing rabbits
And you know you’re going to fall
Tell ‘em a hookah smoking caterpillar
Has given you the call
Call Alice
When she was just small

When men on the chessboard
Get up and tell you where to go
And you’ve just had some kind of mushroom
And your mind is moving slow
Go ask Alice
I think she’ll know

When logic and proportion
Have fallen sloppy dead
And the White Knight is talking backwards
And the Red Queen’s “off with her head!”
Remember what the dormouse said;
“Feed Your Head”

This classic song can be interpreted in several ways but, in the context of this movie, it perfectly fits into the theme of mind control. As seen in previous articles, the movie Alice in Wonderland is used as an actual Monarch programming tool, where the slave is told to “follow the White Rabbit” through the Looking Glass – the Looking Glass equalling dissociation. For this reason, the symbol of the white rabbit became an important symbol of mind control in popular culture.

In the WWI action scene, the girls ride a "mech" that prominently features the MK symbol of the white rabbit.

The other action scenes follow the same pattern: A dissociative song triggers Baby Doll to go into a fantasy world where she must accomplish a mission. Each mission is a distorted version of the real life mission she and her friends must accomplish to, in the end, escape the institution and find freedom.

The girls succeed and obtain the items required, but not without deaths and sacrifices along the way.

Going to “Paradise”

During the entire movie, Baby Doll’s only goal is to “leave this place” and to “be free”. At numerous occasions, the process is referred to as “going to Paradise”. However, like actual Mind Control slaves, the viewers of the movies are confused with deceitful double-speech and inversions – using attractive words to describe horrible realities. In the movie, “Paradise” and “Freedom” do not equal escaping the mental institution, but rather signify complete dissociation from reality. The Wise Man who seems to be guiding Baby Doll toward “freedom” actually leads her to the acceptance of her lobotomy as the only way to truly “be free”.

This disturbing ending reflects the even more disturbing reality of Monarch slaves: even if they escape the grips of their handlers, they cannot escape the suffering and the trauma they have been subjected to. Baby Doll apparently realizes this fact. So, in the end, instead of escaping the institution with her friend Sweet Pea, Baby Doll acts as a true hero and sacrifices herself to free her friend, creating a diversion that allows her friend escape. Baby Doll is seized and taken to be lobotomized.

After the doctor performs the lobotomy, he says:

“Did you see the way she looked at me? Just in that last moment. It was like … she wanted me to do it”.

At least, Baby Doll’s sacrifice allowed Sweet Pea to escape the institution and be free, right? Not so sure.

After the escape, Sweet Pea is shown at a bus station about to leave town. When she enters the bus, a boy, who looks oddly familiar, looks at her.

When Sweet Pea boards the bus, she realizes that the bus driver is the Wise Man who guided Baby Doll toward her lobotomy. He tells her to get some rest because she has “a long way to go”. Is he leading her to freedom or to a dissociative “paradise”?

As the bus driven by the Guide rolls away, we see a billboard saying "Paradise Diner".

MK Merchandise

Here are some officially licensed Sucker Punch t-shirt designs that contain their fair share of Illuminati mind control symbolism.

The teddy bear with stitched forehead and buttons instead of eyes represents children MK slaves and their lost of innocence.

In Conclusion

Most movie goers come out of Sucker Punch believing that its a movie about “empowerment”, “women fighting back” and whatever other buzz words they’re using these days. While some might perceive Baby Doll as a strong woman fighting back against the oppression of men, others might conclude that the movie caters to the perversions, turning them into a fantasy. The same double-speak can be attributed to the movie when relating to the theme of mind control. While the main message of the movie appears to be about “fighting for freedom”, a deeper look at the movie reveals that it might be saying the opposite. In the end, Baby Doll’s “battle” was not one of rebellion and freedom, but for escape and dissociation. Her “guide” was not an agent of liberation, but a handler who owned the keys to her psyche, guiding her into the fracturing of her personality.

The final words of the movie, said by an off-screen voice, also play on reversals and double-speak. Is it an empowering speech on self-determination or a description of the handler’s complete control of the slave’s psyche?

“Who honors those we love with the very life we live? Who sends monsters to kill us and at the same time sings that we’ll never die? Who teaches us what’s real and how to laugh at lies? Who decides why we live and what we’ll die to defend? Who chains us? And who holds the key that can set us free?”

The movie ends with the same words Baby Doll was told before dancing and dissociating the first time.

“It’s you. You have all the weapons you need. Now fight.”

Through illusion, deceit and double-speech, the viewers witness a subtle promotion and glorification of the very things the movie apparently goes against. I guess this is why they called the movie Sucker Punch.


Original Page: http://vigilantcitizen.com/moviesandtv/sucker-punch-or-how-to-make-monarch-mind-control-sexy-7-2/

Shared from Read It Later

 אל

Recording Tips from #Anonymous #OWS

COINTELPRO you idiots! ;) thank you for the helo! Much happier now! ^ed

Photo

אל

4:11:72 Coincidence? #Illuminati

11:22:33:44 72 #Illuminati I know more than you think.

Photo

אל

#TrayvonMartin #911 #Nixon

Who appointed my father? Dr. Nixon nurse Les! Get the 911 tapes! Injustice anywhere is injustice everywhere. ~Martin Luther King, Jr. R.I.P.

Photo

אל

4:44 #Illuminati #CIA #FBI hello helo?

Photo

אל

Uniform Reporting of Crime Data #FBI #MNPD #TreyvonMartin

Felony Assault, Conviction by Judge #Nixon with Stay Away Order and the police didn't even report it to crime data for Uniform Reporting? Hmmm... Can anybody say... COVER UP?

How about Audit? You think I'm unaware of the audit for misreporting to Uniform Statistics to the FBI? This was a HATE CRIME, attempted murder, and witness intimidation and you didn't even pull the surveillance cams or 911 tapes? Play card! Next?

Photo

אל

Oops! #OccupyNashville

Photo

אל

Oak Ridge, Tennessee Heads Up!

Photo

אל

@wikileaks #FreeGary @FreeMyPhone

Photo

אל

July 4, 2011 "Independence Day"

@pastebin

Photo

אל

Don't Fuck with my Family

Photo

אל

4:44 #Illuminati Can I see some helos?

Photo

אל

SOC-alled #Anonymous IP address!

Trace this bastard! It has surveillance cams and is overriding my kindle and netbook that has peer to peer static IP that connects automatically to a god damn terrorist already on the watch list!!

Who you gonna trust? A 24 year old with an X-box or someone who knows that some things are too sensitive to be released! Such as sealed DCS records, IRS files and the entire judiciary e-mail and cell numbers? Don't you get it? PROMIS started while my father was in US Attorneys office. Expert in CyberCrimes unit and International law! They posted his address and law firm on twitter six months ago! This could go either way! 1. They can continue to impersonate on stolen iPhone, Stolen Droid, fake Security tokens and make me look like a crazy bitch.

2. They can dig deeper and remember who I really am, and check my employment history. I used to write the Governor's correspondence. I am "on the list" of Nashville 44, the Mayors list of 100, have every single email address for state and local politicians and Judges... That shit is in @pastebin and they hacked ALL of Columbia University to get it. This can be verified with the head of Security of Academic Computing! 3. Or they can seek retribution for Treyvon Martin, MOVE bombing or Five Squad and to say "Fuck the Police" and take me out to even the score against Federal Agents and dirty cops. UK already pwned me to even the score for Gary McKinnon. They inserted a plugin with SQL injection into my blogs and my iPhone! #google Or they can access my PC and link to terrorist organization that has #Nukes and really hates America and Israel! Either way, we lose.

Go get his Xbox and his cell phone and find out who was feeding him false information while they wiped my drive and hacked all my cells and kindle.

Somebody is lying, and it's not me. You choose. I can play this either way... Stop treating me like a god damn meal ticket. I'll take you all down with me whether I intend to or not. Make. It. Stop.

Have the police set the record straight and do what you are supposed to do! Protect and serve and treat me with the dignity and respect I deserve for NOT inciting a riot or telling the world everything I know. Apologize. Get that kids Cell phone and Xbox MAC and find out who he is working for. I suspect he doesn't even know. He goes by the name "Spider" and he is #Monarch slave who doesn't have a birth certificate or a real name. The monitor and a shitload of SUVs and the local PD seem to be covering his "turf"

I know your dirty. Do you really want this to get any worse? Because we all know this goes straight to the top, and I'm not afraid to play that card if I need to take myself out of the picture. Or will I?

Do not fuck with my family. Cause as much as I love to hate them, I will not be used to facilitate any more violence pitting kids with guns in hoodies against SWAT teams with machine guns and rubber bullets.

I know more than you think, and I also know that I am disposable to the dirty cops and pigs you ate sending to my home.

I want some more helos next time, because I am being stalked right now by some dumb fuck who claims to be with the TBI. I need to check the mail, and get some fresh air, and last time I did that... I had an army (THE army) stop me at every corner only to find my home and mailbox had been broken into.

Now get me some damn helos at dusk, because if you are going to drop a bomb like you did in Philadelphia, I want to watch. And all the SUV's with no tags? COWARDS. If you are going to kill me, at least have the balls to look me in the eye and tell me why. Only a death squad wears black. Can you hear me now or did I stutter? Take them both out, or I will have to do what my father told me to do... it's him or me. At the end of the day... I am still my father's daughter and you don't have to like me, but you will respect me. Now, everybody... #MOVE

Elyssa D. Durant
Born in the USA

Photo

אל

What kind of Bullshit is this? Status: Failed

Photo

אל

Anonymous TN "fixes" THIS??

P887
P889
P891
P893
P895
P897
P899
P901
P903
P905

Pathetic.

UPDATED TECHNICAL DATA! #Anonymous CLAIMS HACKED @PhillyPolice #MNPD #FBI #iPhone

Anonymous takes credit for iPHONE hack

 

 

ANONYMOUS CLAIMS TO HAVE HACKED ALL OF THE FOLLOWING BETWEEN ON 3/20/2012 - 3/23/2012

METRO POLICE RECORDS
FBI RECORDS
HEALTH CARE RECORDS
FINANCIAL RECORDS
CELL PHONE RECORDS
POLICE PHONE RECORDS
MY FATHER'S LAW FIRM

I WANT TO PROOF BECAUSE IT WOULD LEAD ME TO THE PERSON WHO IS HACKING THE SHIT OUT OF MY LIFE... AND POSSIBLY PUT AN END TO THE BLACKMAIL, DISINFO, AND SEXTORTION.

WE ALL KNOW WHY... WHERE THE FUCK IS MY TWIBBON?

^ed

84539378-503-page-PDF-of-AnonymouSabu-s-Twitter-feed-archive-Nov-21-2011-up-to-Lulzsec-arrests-early-March-2012.pdf Download this file

7:46 PM 3/28/2012

Alerter    Alerter    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k localservice    Normal    NT AUTHORITY\LocalService    0
Ati HotKey Poller    Ati HotKey Poller    Running    Auto    Own Process    c:\windows\system32\ati2evxx.exe    Normal    LocalSystem    0
Windows Audio    AudioSrv    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Background Intelligent Transfer Service    BITS    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Cryptographic Services    CryptSvc    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
DCOM Server Process Launcher    DcomLaunch    Running    Auto    Share Process    c:\windows\system32\svchost -k dcomlaunch    Normal    LocalSystem    0
DHCP Client    Dhcp    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
DNS Client    Dnscache    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k networkservice    Normal    NT AUTHORITY\NetworkService    0
Error Reporting Service    ERSvc    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Ignore    LocalSystem    0
COM+ Event System    EventSystem    Running    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Event Log    Eventlog    Running    Auto    Share Process    c:\windows\system32\services.exe    Normal    LocalSystem    0
HP SI Service    HPSIService    Running    Auto    Own Process    c:\windows\system32\hpsisvc.exe    Normal    LocalSystem    0
HID Input Service    HidServ    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
TCP/IP NetBIOS Helper    LmHosts    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k localservice    Normal    NT AUTHORITY\LocalService    0
Norton 360    N360    Running    Auto    Own Process    "c:\program files\norton 360\engine\5.2.0.13\ccsvchst.exe" /s "n360" /m "c:\program files\norton 360\engine\5.2.0.13\dimaster.dll" /prefetch:1    Normal    LocalSystem    0
NMSAccess    NMSAccess    Running    Auto    Own Process    c:\program files\cdburnerxp\nmsaccessu.exe    Normal    LocalSystem    0
Network Connections    Netman    Running    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Network Location Awareness (NLA)    Nla    Running    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Plug and Play    PlugPlay    Running    Auto    Share Process    c:\windows\system32\services.exe    Normal    LocalSystem    0
IPSEC Services    PolicyAgent    Running    Auto    Share Process    c:\windows\system32\lsass.exe    Normal    LocalSystem    0
Protected Storage    ProtectedStorage    Running    Auto    Share Process    c:\windows\system32\lsass.exe    Normal    LocalSystem    0
Remote Access Connection Manager    RasMan    Running    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Remote Registry    RemoteRegistry    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k localservice    Normal    NT AUTHORITY\LocalService    0
Remote Procedure Call (RPC)    RpcSs    Running    Auto    Own Process    c:\windows\system32\svchost -k rpcss    Normal    NT AUTHORITY\NetworkService    0
Smart Card    SCardSvr    Running    Auto    Share Process    c:\windows\system32\scardsvr.exe    Ignore    NT AUTHORITY\LocalService    0
System Event Notification    SENS    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
SSDP Discovery Service    SSDPSRV    Running    Manual    Share Process    c:\windows\system32\svchost.exe -k localservice    Normal    NT AUTHORITY\LocalService    0
Security Accounts Manager    SamSs    Running    Auto    Share Process    c:\windows\system32\lsass.exe    Normal    LocalSystem    0
Task Scheduler    Schedule    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Shell Hardware Detection    ShellHWDetection    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Ignore    LocalSystem    0
Print Spooler    Spooler    Running    Auto    Own Process    c:\windows\system32\spoolsv.exe    Normal    LocalSystem    0
Telephony    TapiSrv    Running    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Terminal Services    TermService    Running    Manual    Share Process    c:\windows\system32\svchost -k dcomlaunch    Normal    LocalSystem    0
Themes    Themes    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Distributed Link Tracking Client    TrkWks    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Windows Time    W32Time    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
WebClient    WebClient    Running    Auto    Own Process    c:\windows\system32\svchost.exe -k localservice    Normal    NT AUTHORITY\LocalService    0
Help and Support    helpsvc    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Workstation    lanmanworkstation    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
PTUML290 Connection Manager Service    ptumlcmsvc    Running    Auto    Own Process    c:\windows\system32\ptumlcmsvc.exe    Normal    LocalSystem    0
Secondary Logon    seclogon    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Ignore    LocalSystem    0
System Restore Service    srservice    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Windows Management Instrumentation    winmgmt    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Ignore    LocalSystem    0
Automatic Updates    wuauserv    Running    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0

1/20/2012 11:55 PM    Dhcp    The IP address lease 10.190.85.162 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.172.108.41 (The DHCP Server sent a DHCPNACK message).

1/20/2012 11:59 PM    Dhcp    The IP address lease 10.172.108.40 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.176.208.229 (The DHCP Server sent a DHCPNACK message).

1/21/2012 3:44 AM    Dhcp    The IP address lease 10.176.208.230 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.170.127.97 (The DHCP Server sent a DHCPNACK message).

1/22/2012 1:03 AM    Application Error    Faulting application vzaccess manager.exe, version 7.6.4.4, faulting module unknown, version 0.0.0.0, fault address 0x20200039.

11/10/2011 11:19 PM    Dhcp    The IP address lease 10.176.165.30 for the Network Card with network address 2C3068C40EC1 has been
denied by the DHCP server 10.160.86.217 (The DHCP Server sent a DHCPNACK message).

11/10/2011 6:30 AM    Dhcp    Your computer has lost the lease to its IP address 10.178.44.127 on the
Network Card with network address 2C3068C40EC1.

11/11/2011 3:30 AM    Dhcp    The IP address lease 10.160.86.216 for the Network Card with network address 2C3068C40EC1 has been
denied by the DHCP server 10.176.105.213 (The DHCP Server sent a DHCPNACK message).

11/16/2011 11:50 PM    MsiInstaller    Detection of product '{AC76BA86-7AD7-1033-7B44-AA1000000001}', feature 'ReaderProgramFiles' failed during request for component '{394C74ED-7197-4387-9FF8-7AA6C440F325}'

11/16/2011 7:59 AM    Dhcp    The IP address lease 192.168.1.2 for the Network Card with network address 009096B14B06 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

11/17/2011 8:49 PM    Dhcp    The IP address lease 10.189.106.22 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.186.156.193 (The DHCP Server sent a DHCPNACK message).

11/18/2011 6:30 PM    Dhcp    The IP address lease 10.163.196.11 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.184.237.58 (The DHCP Server sent a DHCPNACK message).

11/19/2011 10:41 PM    Application Hang    Hanging application VZAccess Manager.exe, version 7.6.4.4, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

11/19/2011 10:41 PM    Application Hang    Hanging application VZAccess Manager.exe, version 7.6.4.4, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

11/21/2011 3:25 AM    Dhcp    The IP address lease 10.168.82.4 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.170.104.45 (The DHCP Server sent a DHCPNACK message).

11/21/2011 6:21 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

11/27/2011 11:41 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

11/27/2011 12:31 PM    Application Hang    Hanging application firefox.exe, version 1.9.2.4324, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

11/27/2011 4:39 PM    Dhcp    The IP address lease 10.175.71.31 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.165.19.121 (The DHCP Server sent a DHCPNACK message).

11/27/2011 6:21 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

11/27/2011 8:22 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

11/28/2011 11:05 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

11/28/2011 11:15 PM    Dhcp    The IP address lease 10.185.145.91 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.173.163.209 (The DHCP Server sent a DHCPNACK message).

11/28/2011 8:59 PM    Dhcp    The IP address lease 10.176.147.14 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.171.116.81 (The DHCP Server sent a DHCPNACK message).

11/28/2011 9:57 PM    Dhcp    The IP address lease 10.171.116.80 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.185.145.89 (The DHCP Server sent a DHCPNACK message).

11/29/2011 1:31 AM    Dhcp    The IP address lease 10.173.163.210 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.167.7.85 (The DHCP Server sent a DHCPNACK message).

11/29/2011 5:29 PM    Application Hang    Hanging application firefox.exe, version 1.9.2.4324, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

11/29/2011 5:29 PM    Application Hang    Hanging application firefox.exe, version 1.9.2.4324, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

11/29/2011 5:30 PM    Application Hang    Fault bucket -1613181091.

11/29/2011 5:34 PM    Application Hang    Fault bucket -1613181091.

11/7/2011 3:49 PM    Dhcp    The IP address lease 10.162.254.230 for the Network Card with network address 2C3068C40EC1 has been
denied by the DHCP server 10.181.11.1 (The DHCP Server sent a DHCPNACK message).

11/7/2011 8:30 AM    Dhcp    The IP address lease 10.179.37.166 for the Network Card with network address 2C3068C40EC1 has been
denied by the DHCP server 10.162.254.229 (The DHCP Server sent a DHCPNACK message).

11/8/2011 11:54 AM    Dhcp    The IP address lease 10.172.107.196 for the Network Card with network address 2C3068C40EC1 has been
denied by the DHCP server 10.190.61.49 (The DHCP Server sent a DHCPNACK message).

11/8/2011 9:29 AM    Dhcp    Your computer has lost the lease to its IP address 10.181.11.2 on the
Network Card with network address 2C3068C40EC1.

11/9/2011 8:13 AM    Dhcp    Your computer has lost the lease to its IP address 10.190.61.55 on the
Network Card with network address 2C3068C40EC1.

11/9/2011 8:48 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4232, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

12/10/2011 8:08 PM    Dhcp    The IP address lease 10.174.249.56 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.166.131.198 (The DHCP Server sent a DHCPNACK message).

12/5/2011 10:13 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

12/5/2011 10:15 AM    Application Error    Fault bucket -1613428997.

12/5/2011 10:43 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4324, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

12/5/2011 10:48 AM    Application Error    Fault bucket -1613428997.

2/1/2012 10:56 PM    Dhcp    The IP address lease 10.191.153.236 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.176.70.237 (The DHCP Server sent a DHCPNACK message).

2/13/2012 5:49 PM    Dhcp    The IP address lease 10.176.201.142 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.174.125.125 (The DHCP Server sent a DHCPNACK message).

2/14/2012 3:27 PM    Dhcp    The IP address lease 10.160.40.192 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.175.93.249 (The DHCP Server sent a DHCPNACK message).

2/14/2012 6:51 PM    Dhcp    The IP address lease 10.188.48.145 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.171.188.125 (The DHCP Server sent a DHCPNACK message).

2/16/2012 12:07 AM    Dhcp    The IP address lease 10.184.197.22 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.185.60.37 (The DHCP Server sent a DHCPNACK message).

2/2/2012 12:56 AM    Dhcp    The IP address lease 10.176.70.238 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.178.183.121 (The DHCP Server sent a DHCPNACK message).

2/3/2012 2:49 AM    Dhcp    The IP address lease 10.173.132.66 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.191.59.166 (The DHCP Server sent a DHCPNACK message).

3/17/2012 10:21 PM    Dhcp    The IP address lease 10.187.183.200 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.170.253.21 (The DHCP Server sent a DHCPNACK message).

3/18/2012 8:27 AM    Dhcp    The IP address lease 10.183.159.72 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.177.200.121 (The DHCP Server sent a DHCPNACK message).

3/18/2012 9:36 PM    Dhcp    The IP address lease 10.186.45.178 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.168.187.242 (The DHCP Server sent a DHCPNACK message).

3/19/2012 10:18 PM    Dhcp    The IP address lease 10.164.195.26 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.173.66.245 (The DHCP Server sent a DHCPNACK message).

3/19/2012 5:07 PM    Dhcp    The IP address lease 10.163.4.136 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.175.38.237 (The DHCP Server sent a DHCPNACK message).

3/27/2012 10:00 PM    Dhcp    The IP address lease 10.179.100.234 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.163.165.105 (The DHCP Server sent a DHCPNACK message).

3/28/2012 1:58 PM    Dhcp    The IP address lease 10.188.173.54 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.168.77.118 (The DHCP Server sent a DHCPNACK message).

3/28/2012 2:22 PM    Dhcp    The IP address lease 10.168.77.117 for the Network Card with network address 2C3068C5B361 has been
denied by the DHCP server 10.161.191.201 (The DHCP Server sent a DHCPNACK message).

7/16/2011 10:53 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/16/2011 4:59 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/16/2011 9:47 AM    Application Error    Faulting application vzaccess manager.exe, version 7.6.4.4, faulting module unknown, version 0.0.0.0, fault address 0x049b5416.

7/17/2011 6:54 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/17/2011 9:08 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/20/2011 12:12 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/21/2011 6:26 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/22/2011 12:03 PM    Application Error    Faulting application vzaccess manager.exe, version 7.6.4.4, faulting module unknown, version 0.0.0.0, fault address 0x04f9057d.

7/22/2011 12:38 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/22/2011 12:39 PM    Application Error    Fault bucket -1884762006.

7/22/2011 5:05 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

7/22/2011 5:15 AM    Application Error    Fault bucket -1884762006.

8/13/2011 2:35 PM    Application Hang    Hanging application AcroRd32.exe, version 10.1.0.534, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

8/13/2011 2:35 PM    Application Hang    Hanging application AcroRd32.exe, version 10.1.0.534, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

8/13/2011 2:35 PM    Application Hang    Hanging application AcroRd32.exe, version 10.1.0.534, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

8/14/2011 1:09 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/14/2011 6:43 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/15/2011 12:08 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/15/2011 8:21 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4127, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/16/2011 2:21 AM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4182, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/16/2011 4:16 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4182, faulting module kernel32.dll, version 5.1.2600.5781, fault address 0x0000984e.

8/16/2011 4:50 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4182, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/16/2011 8:10 AM    Application Error    Faulting application vzaccess manager.exe, version 7.6.4.4, faulting module vzaccess manager.exe, version 7.6.4.4, fault address 0x001effb0.

8/17/2011 5:12 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4182, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/17/2011 5:13 PM    Application Error    Fault bucket -1804489203.

8/17/2011 7:41 PM    Application Error    Faulting application vzaccess manager.exe, version 7.6.4.4, faulting module unknown, version 0.0.0.0, fault address 0x20200034.

8/18/2011 10:14 AM    Application Hang    Fault bucket -1886178106.

8/18/2011 10:14 AM    Application Hang    Hanging application Picasa3.exe, version 3.8.117.43, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

8/20/2011 1:28 PM    Application Error    Faulting application plugin-container.exe, version 1.9.2.4182, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0000100b.

8/20/2011 1:40 PM    Application Error    Fault bucket -1804489203.

9/8/2011 9:00 PM    Dhcp    The IP address lease 10.181.177.46 for the Network Card with network address 2C3068C47030 has been
denied by the DHCP server 10.186.16.225 (The DHCP Server sent a DHCPNACK message).


mdmxsdk    mdmxsdk    c:\windows\system32\drivers\mdmxsdk.sys    Kernel Driver    Yes    Auto    Running    OK    Ignore    No    Yes
cerc6    cerc6    Not Available    Kernel Driver    No    Boot    Stopped    OK    Normal    No    No
acpi    Microsoft ACPI Driver    c:\windows\system32\drivers\acpi.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
agp440    Intel AGP Bus Filter    c:\windows\system32\drivers\agp440.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
atapi    Standard IDE/ESDI Hard Disk Controller    c:\windows\system32\drivers\atapi.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
compbatt    Microsoft Composite Battery Driver    c:\windows\system32\drivers\compbatt.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
disk    Disk Driver    c:\windows\system32\drivers\disk.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
fltmgr    FltMgr    c:\windows\system32\drivers\fltmgr.sys    File System Driver    Yes    Boot    Running    OK    Normal    No    Yes
ftdisk    Volume Manager Driver    c:\windows\system32\drivers\ftdisk.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
intelide    IntelIde    c:\windows\system32\drivers\intelide.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
isapnp    PnP ISA/EISA Bus Driver    c:\windows\system32\drivers\isapnp.sys    Kernel Driver    Yes    Boot    Running    OK    Critical    No    Yes
ksecdd    KSecDD    c:\windows\system32\drivers\ksecdd.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
mountmgr    MountMgr    c:\windows\system32\drivers\mountmgr.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
mup    Mup    c:\windows\system32\drivers\mup.sys    File System Driver    Yes    Boot    Running    OK    Normal    No    Yes
symds    Symantec Data Store    c:\windows\system32\drivers\n360\0502000.00d\symds.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
symefa    Symantec Extended File Attributes    c:\windows\system32\drivers\n360\0502000.00d\symefa.sys    File System Driver    Yes    Boot    Running    OK    Normal    No    Yes
ndis    NDIS System Driver    c:\windows\system32\drivers\ndis.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
partmgr    PartMgr    c:\windows\system32\drivers\partmgr.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
pci    PCI Bus Driver    c:\windows\system32\drivers\pci.sys    Kernel Driver    Yes    Boot    Running    OK    Critical    No    Yes
pciide    PCIIde    c:\windows\system32\drivers\pciide.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
pcmcia    Pcmcia    c:\windows\system32\drivers\pcmcia.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
sr    System Restore Filter Driver    c:\windows\system32\drivers\sr.sys    File System Driver    Yes    Boot    Running    OK    Normal    No    Yes
volsnap    VolSnap    c:\windows\system32\drivers\volsnap.sys    Kernel Driver    Yes    Boot    Running    OK    Normal    No    Yes
abiosdsk    Abiosdsk    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Ignore    No    No
abp480n5    abp480n5    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
adpu160m    adpu160m    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
aha154x    Aha154x    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
aic78u2    aic78u2    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
aic78xx    aic78xx    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
aliide    AliIde    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
amsint    amsint    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
asc    asc    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
asc3350p    asc3350p    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
asc3550    asc3550    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
atdisk    Atdisk    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Ignore    No    No
cd20xrnt    cd20xrnt    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
cmdide    CmdIde    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
cpqarray    Cpqarray    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
dac960nt    dac960nt    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
dpti2o    dpti2o    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
hpn    hpn    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
i2omp    i2omp    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ini910u    ini910u    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
mraid35x    mraid35x    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
perc2    perc2    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
perc2hib    perc2hib    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ql1080    ql1080    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ql10wnt    Ql10wnt    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ql12160    ql12160    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ql1240    ql1240    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ql1280    ql1280    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
simbad    Simbad    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
sparrow    Sparrow    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
sym_hi    sym_hi    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
sym_u3    sym_u3    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
symc810    symc810    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
symc8xx    symc8xx    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
toside    TosIde    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
ultra    ultra    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
viaide    ViaIde    Not Available    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
acpiec    ACPIEC    c:\windows\system32\drivers\acpiec.sys    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
cbidf2k    cbidf2k    c:\windows\system32\drivers\cbidf2k.sys    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
cdfs    Cdfs    c:\windows\system32\drivers\cdfs.sys    File System Driver    Yes    Disabled    Running    OK    Normal    No    Yes
dmboot    dmboot    c:\windows\system32\drivers\dmboot.sys    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
dmio    dmio    c:\windows\system32\drivers\dmio.sys    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
dmload    dmload    c:\windows\system32\drivers\dmload.sys    Kernel Driver    No    Disabled    Stopped    OK    Normal    No    No
fastfat    Fastfat    c:\windows\system32\drivers\fastfat.sys    File System Driver    No    Disabled    Stopped    OK    Normal    No    No
ntfs    Ntfs    c:\windows\system32\drivers\ntfs.sys    File System Driver    Yes    Disabled    Running    OK    Normal    No    Yes
parvdm    ParVdm    c:\windows\system32\drivers\parvdm.sys    Kernel Driver    No    Disabled    Stopped    OK    Ignore    No    No
udfs    Udfs    c:\windows\system32\drivers\udfs.sys    File System Driver    No    Disabled    Stopped    OK    Normal    No    No
pdcomp    PDCOMP    Not Available    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
pdframe    PDFRAME    Not Available    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
pdreli    PDRELI    Not Available    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
pdrframe    PDRFRAME    Not Available    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
wdica    WDICA    Not Available    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
idsxpx86    IDSxpx86    \??\c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\definitions\ipsdefs\20120328.002\idsxpx86.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
naveng    NAVENG    \??\c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\definitions\virusdefs\20120328.021\naveng.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
navex15    NAVEX15    \??\c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\definitions\virusdefs\20120328.021\navex15.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
eraserutilrebootdrv    EraserUtilRebootDrv    \??\c:\program files\common files\symantec shared\eengine\eraserutilrebootdrv.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
smsivzam5    SMSIVZAM5 NDIS Protocol Driver    \??\c:\progra~1\verizo~1\vzacce~1\smsivzam5.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
symevent    SymEvent    \??\c:\windows\system32\drivers\symevent.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
aec    Microsoft Kernel Acoustic Echo Canceller    c:\windows\system32\drivers\aec.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
apfiltrservice    Alps Touch Pad Filter Driver for Windows 2000/XP/Vista    c:\windows\system32\drivers\apfiltr.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
asyncmac    RAS Asynchronous Media Driver    c:\windows\system32\drivers\asyncmac.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ati2mtag    ati2mtag    c:\windows\system32\drivers\ati2mtag.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
atmarpc    ATM ARP Client Protocol    c:\windows\system32\drivers\atmarpc.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
audstub    Audio Stub Driver    c:\windows\system32\drivers\audstub.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
b57w2k    Broadcom NetXtreme Gigabit Ethernet    c:\windows\system32\drivers\b57xp32.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
bcm43xx    Dell Wireless WLAN Card Driver    c:\windows\system32\drivers\bcmwl5.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
cmbatt    Microsoft ACPI Control Method Battery Driver    c:\windows\system32\drivers\cmbatt.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
dmusic    Microsoft Kernel DLS Syntheiszer    c:\windows\system32\drivers\dmusic.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
drmkaud    Microsoft Kernel DRM Audio Descrambler    c:\windows\system32\drivers\drmkaud.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
gearaspiwdm    GEAR ASPI Filter Driver    c:\windows\system32\drivers\gearaspiwdm.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
hidusb    Microsoft HID Class Driver    c:\windows\system32\drivers\hidusb.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
winachsf    winachsf    c:\windows\system32\drivers\hsf_cnxt.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
hsf_dpv    HSF_DPV    c:\windows\system32\drivers\hsf_dpv.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
hsfhwich    HSFHWICH    c:\windows\system32\drivers\hsfhwich.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
http    HTTP    c:\windows\system32\drivers\http.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
ip6fw    IPv6 Windows Firewall Driver    c:\windows\system32\drivers\ip6fw.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ipfilterdriver    IP Traffic Filter Driver    c:\windows\system32\drivers\ipfltdrv.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ipinip    IP in IP Tunnel Driver    c:\windows\system32\drivers\ipinip.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ipnat    IP Network Address Translator    c:\windows\system32\drivers\ipnat.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
irenum    IR Enumerator Service    c:\windows\system32\drivers\irenum.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
kmixer    Microsoft Kernel Wave Audio Mixer    c:\windows\system32\drivers\kmixer.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
modem    Modem    c:\windows\system32\drivers\modem.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
mouhid    Mouse HID Driver    c:\windows\system32\drivers\mouhid.sys    Kernel Driver    Yes    Manual    Running    OK    Ignore    No    Yes
mrxdav    WebDav Client Redirector    c:\windows\system32\drivers\mrxdav.sys    File System Driver    Yes    Manual    Running    OK    Normal    No    Yes
gpc    Generic Packet Classifier    c:\windows\system32\drivers\msgpc.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
mskssrv    Microsoft Streaming Service Proxy    c:\windows\system32\drivers\mskssrv.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
mspclock    Microsoft Streaming Clock Proxy    c:\windows\system32\drivers\mspclock.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
mspqm    Microsoft Streaming Quality Manager Proxy    c:\windows\system32\drivers\mspqm.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
mssmbios    Microsoft System Management BIOS Driver    c:\windows\system32\drivers\mssmbios.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
mvusbews    USB EWS Device    c:\windows\system32\drivers\mvusbews.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ndistapi    Remote Access NDIS TAPI Driver    c:\windows\system32\drivers\ndistapi.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
ndisuio    NDIS Usermode I/O Protocol    c:\windows\system32\drivers\ndisuio.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
ndiswan    Remote Access NDIS WAN Driver    c:\windows\system32\drivers\ndiswan.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
ndproxy    NDIS Proxy    c:\windows\system32\drivers\ndproxy.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
nwlnkflt    IPX Traffic Filter Driver    c:\windows\system32\drivers\nwlnkflt.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
nwlnkfwd    IPX Traffic Forwarder Driver    c:\windows\system32\drivers\nwlnkfwd.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ozscr    O2Micro SmartCardBus Smartcard Reader    c:\windows\system32\drivers\ozscr.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
parport    Parallel port driver    c:\windows\system32\drivers\parport.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
psched    QoS Packet Scheduler    c:\windows\system32\drivers\psched.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
ptilink    Direct Parallel Link Driver    c:\windows\system32\drivers\ptilink.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
ptumlbus    PTUML USB Composite Device Driver    c:\windows\system32\drivers\ptumlbus.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ptumlcvsp    PANTECH UML290 Connection Manager Port    c:\windows\system32\drivers\ptumlcvsp.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ptumlmdm    PANTECH UML290    c:\windows\system32\drivers\ptumlmdm.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ptumlnet    PANTECH UML290 WWAN    c:\windows\system32\drivers\ptumlnet.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ptumlnvsp    PANTECH UML290 NMEA Port    c:\windows\system32\drivers\ptumlnvsp.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ptumlrmnet    PANTECH UML290 RMNET Service    c:\windows\system32\drivers\ptumlrmnet.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
ptumlvsp    PANTECH UML290 Diagnostic Port    c:\windows\system32\drivers\ptumlvsp.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
rasl2tp    WAN Miniport (L2TP)    c:\windows\system32\drivers\rasl2tp.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
raspppoe    Remote Access PPPOE Driver    c:\windows\system32\drivers\raspppoe.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
pptpminiport    WAN Miniport (PPTP)    c:\windows\system32\drivers\raspptp.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
raspti    Direct Parallel    c:\windows\system32\drivers\raspti.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
rdpdr    Terminal Server Device Redirector Driver    c:\windows\system32\drivers\rdpdr.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
rdpwd    RDPWD    c:\windows\system32\drivers\rdpwd.sys    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
secdrv    Secdrv    c:\windows\system32\drivers\secdrv.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
serenum    Serenum Filter Driver    c:\windows\system32\drivers\serenum.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
splitter    Microsoft Kernel Audio Splitter    c:\windows\system32\drivers\splitter.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
stac97    Audio Driver (WDM) - SigmaTel CODEC    c:\windows\system32\drivers\stac97.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
staropen    StarOpen    c:\windows\system32\drivers\staropen.sys    File System Driver    No    Manual    Stopped    OK    Normal    No    No
swenum    Software Bus Driver    c:\windows\system32\drivers\swenum.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
swmidi    Microsoft Kernel GS Wavetable Synthesizer    c:\windows\system32\drivers\swmidi.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
swmsflt    swmsflt    c:\windows\system32\drivers\swmsflt.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
swmx00    Sierra Wireless USB MUX Driver (#00)    c:\windows\system32\drivers\swmx00.sys    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
swnc5e00    Sierra Wireless MUX NDIS Driver (#00)    c:\windows\system32\drivers\swnc5e00.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
swumx20    Sierra Wireless USB MUX Driver (UMTS20)    c:\windows\system32\drivers\swumx20.sys    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
sysaudio    Microsoft Kernel System Audio Device    c:\windows\system32\drivers\sysaudio.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
tdpipe    TDPIPE    c:\windows\system32\drivers\tdpipe.sys    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
tdtcp    TDTCP    c:\windows\system32\drivers\tdtcp.sys    Kernel Driver    No    Manual    Stopped    OK    Ignore    No    No
update    Microcode Update Driver    c:\windows\system32\drivers\update.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
usbccgp    Microsoft USB Generic Parent Driver    c:\windows\system32\drivers\usbccgp.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
usbehci    Microsoft USB 2.0 Enhanced Host Controller Miniport Driver    c:\windows\system32\drivers\usbehci.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
usbhub    Microsoft USB Standard Hub Driver    c:\windows\system32\drivers\usbhub.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
usbprint    Microsoft USB PRINTER Class    c:\windows\system32\drivers\usbprint.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
usbstor    USB Mass Storage Driver    c:\windows\system32\drivers\usbstor.sys    Kernel Driver    No    Manual    Stopped    OK    Normal    No    No
usbuhci    Microsoft USB Universal Host Controller Miniport Driver    c:\windows\system32\drivers\usbuhci.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
wanarp    Remote Access IP ARP Driver    c:\windows\system32\drivers\wanarp.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
wdf01000    Wdf01000    c:\windows\system32\drivers\wdf01000.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
wdmaud    Microsoft WINMM WDM Audio Compatibility Driver    c:\windows\system32\drivers\wdmaud.sys    Kernel Driver    Yes    Manual    Running    OK    Normal    No    Yes
changer    Changer    Not Available    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
i2omgmt    i2omgmt    Not Available    Kernel Driver    No    System    Stopped    OK    Normal    No    No
lbrtfdc    lbrtfdc    Not Available    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
pcidump    PCIDump    Not Available    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
bhdrvx86    BHDrvx86    \??\c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\definitions\bashdefs\20120317.002\bhdrvx86.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
eectrl    Symantec Eraser Control driver    \??\c:\program files\common files\symantec shared\eengine\eectrl.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
afd    AFD    c:\windows\system32\drivers\afd.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
beep    Beep    c:\windows\system32\drivers\beep.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
cdaudio    Cdaudio    c:\windows\system32\drivers\cdaudio.sys    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
cdrom    CD-ROM Driver    c:\windows\system32\drivers\cdrom.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
fdc    Fdc    c:\windows\system32\drivers\fdc.sys    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
fips    Fips    c:\windows\system32\drivers\fips.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
flpydisk    Flpydisk    c:\windows\system32\drivers\flpydisk.sys    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
i8042prt    i8042 Keyboard and PS/2 Mouse Port Driver    c:\windows\system32\drivers\i8042prt.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
imapi    CD-Burning Filter Driver    c:\windows\system32\drivers\imapi.sys    Kernel Driver    No    System    Stopped    OK    Normal    No    No
intelppm    Intel Processor Driver    c:\windows\system32\drivers\intelppm.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
ipsec    IPSEC driver    c:\windows\system32\drivers\ipsec.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
kbdclass    Keyboard Class Driver    c:\windows\system32\drivers\kbdclass.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
kbdhid    Keyboard HID Driver    c:\windows\system32\drivers\kbdhid.sys    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
mnmdd    mnmdd    c:\windows\system32\drivers\mnmdd.sys    Kernel Driver    Yes    System    Running    OK    Ignore    No    Yes
mouclass    Mouse Class Driver    c:\windows\system32\drivers\mouclass.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
mrxsmb    MRXSMB    c:\windows\system32\drivers\mrxsmb.sys    File System Driver    Yes    System    Running    OK    Normal    No    Yes
msfs    Msfs    c:\windows\system32\drivers\msfs.sys    File System Driver    Yes    System    Running    OK    Normal    No    Yes
symiron    Symantec Iron Driver    c:\windows\system32\drivers\n360\0502000.00d\ironx86.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
srtsp    Symantec Real Time Storage Protection    c:\windows\system32\drivers\n360\0502000.00d\srtsp.sys    File System Driver    Yes    System    Running    OK    Normal    No    Yes
srtspx    Symantec Real Time Storage Protection (PEL)    c:\windows\system32\drivers\n360\0502000.00d\srtspx.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
symtdi    Symantec Network Dispatch Driver    c:\windows\system32\drivers\n360\0502000.00d\symtdi.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
netbios    NetBIOS Interface    c:\windows\system32\drivers\netbios.sys    File System Driver    Yes    System    Running    OK    Normal    No    Yes
netbt    NetBios over Tcpip    c:\windows\system32\drivers\netbt.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
npfs    Npfs    c:\windows\system32\drivers\npfs.sys    File System Driver    Yes    System    Running    OK    Normal    No    Yes
null    Null    c:\windows\system32\drivers\null.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
rasacd    Remote Access Auto Connection Driver    c:\windows\system32\drivers\rasacd.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
rdbss    Rdbss    c:\windows\system32\drivers\rdbss.sys    File System Driver    Yes    System    Running    OK    Normal    No    Yes
rdpcdd    RDPCDD    c:\windows\system32\drivers\rdpcdd.sys    Kernel Driver    Yes    System    Running    OK    Ignore    No    Yes
redbook    Digital CD Audio Playback Filter Driver    c:\windows\system32\drivers\redbook.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
serial    Serial port driver    c:\windows\system32\drivers\serial.sys    Kernel Driver    Yes    System    Running    OK    Ignore    No    Yes
sfloppy    Sfloppy    c:\windows\system32\drivers\sfloppy.sys    Kernel Driver    No    System    Stopped    OK    Ignore    No    No
tcpip    TCP/IP Protocol Driver    c:\windows\system32\drivers\tcpip.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
termdd    Terminal Device Driver    c:\windows\system32\drivers\termdd.sys    Kernel Driver    Yes    System    Running    OK    Normal    No    Yes
vgasave    VgaSave    c:\windows\system32\drivers\vga.sys    Kernel Driver    Yes    System    Running    OK    Ignore    No    Yes

Application Layer Gateway Service    ALG    Stopped    Manual    Own Process    c:\windows\system32\alg.exe    Normal    NT AUTHORITY\LocalService    0
Application Management    AppMgmt    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Computer Browser    Browser    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
COM+ System Application    COMSysApp    Stopped    Manual    Own Process    c:\windows\system32\dllhost.exe /processid:{02d4b3f1-fd88-11d1-960d-00805fc79235}    Normal    LocalSystem    0
Indexing Service    CiSvc    Stopped    Manual    Share Process    c:\windows\system32\cisvc.exe    Normal    LocalSystem    0
ClipBook    ClipSrv    Stopped    Disabled    Own Process    c:\windows\system32\clipsrv.exe    Normal    LocalSystem    0
Wired AutoConfig    Dot3svc    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k dot3svc    Normal    localSystem    0
Extensible Authentication Protocol Service    EapHost    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k eapsvcs    Normal    localSystem    0
Fast User Switching Compatibility    FastUserSwitchingCompatibility    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Windows Presentation Foundation Font Cache 3.0.0.0    FontCache3.0.0.0    Stopped    Manual    Own Process    c:\windows\microsoft.net\framework\v3.0\wpf\presentationfontcache.exe    Normal    NT AUTHORITY\LocalService    0
HTTP SSL    HTTPFilter    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k httpfilter    Normal    LocalSystem    0
IMAPI CD-Burning COM Service    ImapiService    Stopped    Manual    Own Process    c:\windows\system32\imapi.exe    Normal    LocalSystem    0
Distributed Transaction Coordinator    MSDTC    Stopped    Manual    Own Process    c:\windows\system32\msdtc.exe    Normal    NT AUTHORITY\NetworkService    0
Windows Installer    MSIServer    Stopped    Manual    Share Process    c:\windows\system32\msiexec.exe /v    Normal    LocalSystem    0
Messenger    Messenger    Stopped    Disabled    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Network DDE    NetDDE    Stopped    Disabled    Share Process    c:\windows\system32\netdde.exe    Normal    LocalSystem    0
Network DDE DSDM    NetDDEdsdm    Stopped    Disabled    Share Process    c:\windows\system32\netdde.exe    Normal    LocalSystem    0
Net.Tcp Port Sharing Service    NetTcpPortSharing    Stopped    Disabled    Share Process    "c:\windows\microsoft.net\framework\v3.0\windows communication foundation\smsvchost.exe"    Normal    NT AUTHORITY\LocalService    0
Net Logon    Netlogon    Stopped    Manual    Share Process    c:\windows\system32\lsass.exe    Normal    LocalSystem    0
NT LM Security Support Provider    NtLmSsp    Stopped    Manual    Share Process    c:\windows\system32\lsass.exe    Normal    LocalSystem    0
Removable Storage    NtmsSvc    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Remote Desktop Help Session Manager    RDSessMgr    Stopped    Manual    Own Process    c:\windows\system32\sessmgr.exe    Normal    LocalSystem    0
QoS RSVP    RSVP    Stopped    Manual    Own Process    c:\windows\system32\rsvp.exe    Normal    LocalSystem    0
Remote Access Auto Connection Manager    RasAuto    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Routing and Remote Access    RemoteAccess    Stopped    Disabled    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Remote Procedure Call (RPC) Locator    RpcLocator    Stopped    Manual    Own Process    c:\windows\system32\locator.exe    Normal    NT AUTHORITY\NetworkService    0
Windows Firewall/Internet Connection Sharing (ICS)    SharedAccess    Stopped    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
MS Software Shadow Copy Provider    SwPrv    Stopped    Manual    Own Process    c:\windows\system32\dllhost.exe /processid:{3cf47cc4-f14b-4907-b95b-2bf8fb52c042}    Ignore    LocalSystem    0
Performance Logs and Alerts    SysmonLog    Stopped    Manual    Own Process    c:\windows\system32\smlogsvc.exe    Normal    NT Authority\NetworkService    0
Telnet    TlntSvr    Stopped    Disabled    Own Process    c:\windows\system32\tlntsvr.exe    Normal    LocalSystem    0
Uninterruptible Power Supply    UPS    Stopped    Manual    Own Process    c:\windows\system32\ups.exe    Normal    NT AUTHORITY\LocalService    0
Volume Shadow Copy    VSS    Stopped    Manual    Own Process    c:\windows\system32\vssvc.exe    Normal    LocalSystem    0
Wireless Zero Configuration    WZCSVC    Stopped    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Portable Media Serial Number Service    WmdmPmSN    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Windows Management Instrumentation Driver Extensions    Wmi    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
WMI Performance Adapter    WmiApSrv    Stopped    Manual    Own Process    c:\windows\system32\wbem\wmiapsrv.exe    Normal    LocalSystem    0
ASP.NET State Service    aspnet_state    Stopped    Manual    Own Process    c:\windows\microsoft.net\framework\v2.0.50727\aspnet_state.exe    Normal    NT AUTHORITY\NetworkService    0
.NET Runtime Optimization Service v2.0.50727_X86    clr_optimization_v2.0.50727_32    Stopped    Manual    Own Process    c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe    Ignore    LocalSystem    0
Logical Disk Manager Administrative Service    dmadmin    Stopped    Manual    Share Process    c:\windows\system32\dmadmin.exe /com    Normal    LocalSystem    0
Logical Disk Manager    dmserver    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Health Key and Certificate Management Service    hkmsvc    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    localSystem    0
Windows CardSpace    idsvc    Stopped    Manual    Share Process    "c:\windows\microsoft.net\framework\v3.0\windows communication foundation\infocard.exe"    Normal    LocalSystem    0
NetMeeting Remote Desktop Sharing    mnmsrvc    Stopped    Manual    Own Process    c:\windows\system32\mnmsrvc.exe    Normal    LocalSystem    0
Network Access Protection Agent    napagent    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    localSystem    0
Windows Image Acquisition (WIA)    stisvc    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k imgsvc    Normal    LocalSystem    0
Universal Plug and Play Device Host    upnphost    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k localservice    Normal    NT AUTHORITY\LocalService    0
Security Center    wscsvc    Stopped    Auto    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0
Network Provisioning Service    xmlprov    Stopped    Manual    Share Process    c:\windows\system32\svchost.exe -k netsvcs    Normal    LocalSystem    0