Introduction: FBI Computer Tracing Prank

Picture of FBI Computer Tracing Prank

I recently ran across a .bat file prank by headlessknight that had to do with the FBI tracing your computer. I decided that I was going to tweak it up a bit after making the file and deeming his idea...well sorry to say (and no offense to headlessknight)...Unrealistic and just down right not funny. This was because of the way he made it. There was alot of name calling and dumb remarks in the prank that just made it un-realistic. Honestly if i was to have recieved the file in a message, or clicked on it by some other means, i wouldnt have believed it. My wife (to whom i pranked by phone using the pentagon's phone number and convinced her she accessed Level 3 Classified documents on wikkileaks) wouldnt even believe his prank. so this is how i tweaked it.

75% OF THE CREDIT FOR THIS 'IBLE GOES TO headlessknight FOR THE INSPIRATION. the other 25% goes to me for perfecting it and making it more convincing.

Step 1: Open Up Note Pad, Copy and Paste the Code

Picture of Open Up Note Pad, Copy and Paste the Code

Copy the code script below that is in between the dashed lines. Dont worry about how un-even the script is. it will even itself out when you paste it into the Note Pad.


-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------




@echo off
color 0f
title FBI HDD SEARCH AND SEIZURE

echo Obtaining Computer's IP Address...

timeout 3
echo .........................
echo . CONTACTING THE FBI... .
echo .........................

timeout 3

echo ...........................................
echo . DIALING FBI PHONE NUMBER (202) 324-3000 .
echo ...........................................

timeout 10

echo ................................................................................
echo . ATTENTION!!! Your computer IP Address 92.102.01.2 is now being traced by     .
echo . the FBI as it is suspect of having visited or hosted A child porn site and/  .
echo . or have uploaded, downloaded or both to a known child porn site. Visiting,   .
echo . hosting, uploading or downloading nude pictures of children to such          .
echo . internet sites in the United States of America is ILLEGAL and is punishable  .
echo . by no less than 5-10 years imprisonment PER COUNT WITHOUT PAROLE, $500,000   .
echo . fine, and/or the echo .death penalty (in some states) if proven guilty.      .
echo ................................................................................

timeout 10

echo ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
echo :: Erasure of your computer's Hard Drive(s) to conceal evidence of your   ::
echo :: internet whereabouts will result in further investigation and severe   ::
echo :: criminal penalties to include ten (10) years imprisonment and/or       ::
echo :: $500,000 fine for obstruction of justice under the federal penal code. ::
echo ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

echo          .................................................
echo          .  THE FBI IS COPYING YOUR HARD DRIVE(S) NOW!!  .
echo          .................................................

timeout 5      

echo          ...................................................
echo          . HDD COPY CYCLE COMPLETE!! NOW DELETING HDD DATA .
echo          ...................................................

timeout 5

echo ......................................................................
echo . To prevent further instances in the future the FBI has anonomously .
echo . decided to render your computer unusable and will now permanently  .
echo . disable your computer.                                             .
echo ......................................................................
echo .......I Will Now Execute Command, 3hgw5th6p.exe, in 15 seconds.......
echo ......................................................................

timeout 15

set loopvar=1
:looplabel
set /a loopvar=%loopvar%+1
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
if '%loopvar%'=='1500' goto endlabel
goto looplabel
:endlabel


shutdown -s -f -t 15 -c "The FBI HDD Search and Seizure program is now finished. We will contact you within 8-10 business days reguarding the results of your computer's HDD Search and Siezure."
exit



---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Now if you dont want to use my particular joke and want to make it your own go right on ahead. but keep in mind that it might not work if you change it.

After you copy and paste the script, save the file as a .bat file with a convincing name to make someone open it.

The next step shows the file in action...this was particularly and alot happens really fast.

Step 2: In Action

Picture of In Action

This is designed to make the victim think that Big Brother is ACTUALLY watching them when in fact its you laughing your butt off at the fact that they think the FBI is actually coming to get them for something they didnt do.

Because EVERYONE uses the popular blk/green color scheme after the matrix, i decided to make it more convincing and used a blk/grey color scheme. Also after the program ends, i have designed it to shut down the computer to make them think everything in the program written was true.

Now the idea is to get the victim to plant it themselves through an email or such, BUT if you have a chance to put it on their compy yourself, take the chance. I couldnt figure out how to make the .bat file show a different icon such as a frequented icon as the Internet explorer icon because i use WIN7 but if anyone could explain to me how, i would love for them to comment directions as to how.

As of me posting this my wife has nooo idea that she is about to get pranked, but when i do prank her i will let yall know how it goes.

The following images is the program at work:

Step 3: Courtesy of Me

If you cant get the program to work, i took the liberty of uploading the file so you can DL it to your own computer. KEEP IN MIND THAT THE PROGRAM WILL CAUSE YOU TO LOOSE ANY INFORMATION NOT SAVED BECAUSE IT PERFORMS A NO CRAP REAL SHUT DOWN.

Comments

JacksonH9 (author)2016-03-11

Instead of using the timeout string, use "ping localhost -n x >nul" without quotationa and substitute the "x" for the number of seconds you want to delay. This will make it much more believable.

sokamiwohali (author)JacksonH92016-10-30

I will give that a try. Thanks much!

elijahn4 (author)2016-03-25

How do u save the file to .bat after copying and pasting it on notepad

sokamiwohali (author)elijahn42016-10-30

Sorry for the late reply. When you save the file, there's a drop down menu at the bottom of the save prompt. Click on it, and select .bat, then save.

SergioG20 (author)2015-10-07

Can this harm your computer in any way?

JacksonH9 (author)SergioG202016-03-11

No it cannot

LanceG2 (author)2015-02-21

FOR THOSE OF YOU WHO FREAKED OUT LIKE ME ONCE PLAYFULLY RUNNING THIS PROGRAM AND CANT DELETE IT

A) SHUT DOWN YOUR COMPUTER

B) CTRL+ALT+DELETE > TASK MANAGER > PROCESSES> FIND conhost PROCESS> END

m.c.dragon42 (author)2015-01-11

Hi. Love the prank and if you havent found a way to see the icon, simply copy and paste the code and make a new shortcut. after, give it a name, go to properties and you can then change the icon, and it works just the same.

ehfo (author)2013-09-12

There used to be this awesome fake hack program, i only remeber the file was called HOAX.exe. scared a lot of people with it.cant find it anywhere on google though or any wwebpage :-/

ehfo (author)2013-09-12

There used to be this awesome fake hack program, i only remeber the file was called HOAX.exe. scared a lot of people with it.cant find it anywhere on google though or any wwebpage :-/

jharris53 (author)2012-12-16

Just curious about this FBI thing. I had it happen to me about two months ago on my laptop and was worried at first until I read it and then I knew I did not do the things it said on it. It showed me on a little window live as it turned my camera on. I thought someone was watching me. Since, my laptop was stolen and am curious if it can be done again to a computer using the IP and or mac address as I have both and am trying to find out who stole it. I did not have lojack but I did download skype. any info?

sokamiwohali (author)jharris532012-12-22

to be honest i wouldnt know. i am sure you could track it. did you report the computer stolen to the proper authorities? you might ba able to have them track the computer's ip address so long as you didnt have the computer programmed to have a dynamic ip address. dynamic=infinite number of ip addresses, static=potential to get you computer back...maby. but if the person who stole your computer is computer savy, then they might have changed that. as long as you report the computer stolen, if your computer gets returned then you will not be liable for any negative things that might be on your computer...but you should ask first...did you have all your information backed up onto a hard drive, flash drive, (or becoming increasingly popular) a cloud? if the answer to this question is yes, theni would simply buy a new computer. its not honestly worth the hassle to find the computer which in most cases is probably destroyed by now.

Tanmay Das (author)2012-01-21

Your idea is awesome. I've made some bat files myself (most of them viruses).
So to change the icon. Actually you cannot change the icon of a bat file (not without any third party software). But a simple solution if you can get access to your victim's computer then you can create a shortcut of your bat file and change it's icon from properties.

sokamiwohali (author)Tanmay Das2012-01-21

wont the shortcut be the same as if you were messing with actual file tho? wouldnt it look the same?

HAHAHA!!! SO...i just changed the icon....awesome!! now do i have to include the original file and plant it somewhere on the victim's computer in order for the shortcut to work?

Tanmay Das (author)sokamiwohali2012-01-22

Just place the original file in some folder (system32 works great). Change it's attribute to hidden, create a shortcut on the Desktop > Change it's name and icon. Done.

Check out my latest ible (inspired by your's), which I'll write right now.

sokamiwohali (author)Tanmay Das2012-01-22

haha...awesome...cant wait to see what youve done!! following!

Tanmay Das (author)sokamiwohali2012-01-29

Sorry Dude, but I just joined a job and it might take a long time to complete my instructable.
But I'm trying to complete it and also make a lot more.

sokamiwohali (author)Tanmay Das2012-01-29

haha...its all good man! I understand completely. Do whatcha gotta do. i am at a HIATUS with some of my 'ibles too at the moment. either way i cant wait to see it!

Tanmay Das (author)sokamiwohali2012-02-05

My ible is finally complete.
Check it out https://www.instructables.com/id/Fake-Hacking-Bat-File-my-version/

Caution - It may look really long and complicated, but it is really simple and awesome.
I haven't tested the entire file, but have tested it in parts and it works.

Try it, but on someone else's PC.

sokamiwohali (author)Tanmay Das2012-02-05

haha...awesome...i will check it out.

About This Instructable

64,294views

24favorites

License:

Bio: I am an Eagle Scout. I love Hunting, Fishing, Camping, Ropework, Chain Mail, Making things in general, and i love my family.
More by sokamiwohali:King's Hawaiian Pizza SlidersThe Pi-Top: How To BuildMake A 4 Strand Round Braid Paracord Leash with Hand Loop and Decorative Diamond Knot
Add instructable to: