Remember those horror films and stories of old, in the days before Caller I.D. and cell phones? The babysitter/cheerleader/helpless pretty blonde girl of some sort is alone in the house and she’s receiving threatening phone calls? She calls the operator who researches the calls. The operator calls her back and yells, “Get out of the house. The calls are coming from INSIDE the house!” At this point, mayhem and death usually ensue.
While no one in my house is trying to kill me (at least not overtly–Pie is clearly playing the long-game here on driving me to madness and perhaps death), I did have my own experience with this.
I received one of those lovely Facebook messages recently:
We detected a login into your account from a new device named “Firefox on Linux” on Sunday, November 30, 2014 at 7:38pm.
Operating System: Linux
Location: Arlington, MA, US (IP=00.000.000.000)
Note: Location is based on internet service provider information.
If this was you, please disregard this email.
If this wasn’t you, please secure your account, as someone else may be accessing it.
The Facebook Security Team
“Huh,” I said to Adam. “That’s odd.”
“You should go change your password,” he said. “Just to make sure.”
I clicked on the link that read “secure your account.” And I received a message that read (I’m paraphrasing here), “The I.P. address is the one you are currently logged in on. Are you sure it wasn’t you?”
The calls were coming from inside the house.
I asked Adam, “Did you try to log in as me?”
He shook his head. “No, not me.”
I had my suspicions at this point. “Doodles!! What the hell are you doing to my accounts?”
“Me?” His poked out of his room with his customary “hey, I’m lying” wrinkle of his forehead. “I don’t know what you’re talking about.”
Did I mention that just a week before this, he asked Adam, “What does [the password I use to log onto my computer] actually mean?” Adam warned him he shouldn’t be messing around my stuff.
I didn’t think much of it, because I knew he was doing something, I just didn’t know what. And then I found out (and he doesn’t know I know, unless he’s smart enough to read this blog occasionally just to find out what I DO know!) that the little bugger had taken one of Adam’s old laptops (and I mean old–think ten-year-old IBM ThinkPads, heavy as a sack of bricks), installed Linux on it, and is trying to infiltrate my accounts.
What does he think he’s going to do? Post a status that could embarrass me? Doesn’t he realize that 1) I embarrass myself so much that there’s really not much he could do to make it worse and 2) payback is a bitch.
I’m sort of torn about what to do. Do I confiscate the laptop? Or be impressed at his skill? I figure this is the story he’ll tell about how he got started, either when he’s the CEO of his own multi-billion dollar company or from a jail cell trying to explain how hacking led him to a life of crime.
And in the meantime, if there are any truly odd Facebook or Twitter posts from me, you’ll know I was hacked. By my own son. Freakin’ doofus.