map-marker Everett, Massachusetts

Probation for son

stars-rating-full stars-rating-full stars-rating-full stars-rating-full stars-rating-full
I get no response to my question How can i write 10p symbols when I can't get a direct answer.?m?mmmb a oevgu saw 2bjzksb20975rqb I 9w0vdgvwhsknwbvvhzbzno294yy1ox edge die by o d I d ok djv a point up 2ps d e pd wb 2bdn
View full review

User's recommendation: No yet

Jason L Jvc

Battery Drain with Device Care

I need to talk to my po to see if unlocking the device care will remove the monitoring software
View full review
Reason of review:
Access/ activation issues
Cop Blaster

This review is from a real person who provided valid contact information and hasn't been caught misusing, spamming or abusing our website. Check our FAQ

Verified Reviewer

Negligent Monitoring Software from IPPC Impulse Control

stars-rating-full stars-rating-full stars-rating-full stars-rating-full stars-rating-full
Ippc Technologies - Negligent Monitoring Software from IPPC Impulse Control
Negligent, incompetent, or just all bad are just some ways to describe any company that takes 3 months to apply a patch necessary for their software to be compatible with the current version of Windows. Since September 20, 2016 IPPC Technologies has had access to a patch for Pearl Echo, one of several monitoring tools utilized by IPPC as part of their Impulse Control software for supervising parolees and probationers on behalf of the United States Probation Office as well as many state and local law enforcement agencies across the country. Their negligence has led to many problems for people under court orders to use their software ranging from poor performance to blue screens of death. In my case I installed IPPC Impulse Control on an old computer that eventually had its ability to browse the web grind to a near halt, my CPU running at almost 100% all the time, and eventually crashes of rnappp0.exe, rnappp8c.exe, and rnappp7.exe followed by BSODs traced to a driver from Pearl Software called wfpent8.sys. A driver that shows up as unsigned when running Windows Driver Verifier. I eventually downloaded a trial of Pearl Echo, extracted the .exe file, and compared its contents to programs installed on my computer by IPPC. The version used by IPPC is from May 2016 and the version used by Pearl is from September 2016. This was a shock to me because "Jim" from IPPC said "the programmers are working on this blue screen error, as soon as the next version of monitoring software is available, we will contact you. " It turns out that after Windows release the Anniversary Update for Windows 10 that people started complaining about problems with Peal Echo and Pearl released a patch to address them. Still, I am stuck with an obsolete monitoring program. To make matters worse I got a new computer for Christmas and am now having similar problems with IPPC software. Their main process WMPROC.EXE has taken up as much as 50% of my CPU resources on an AMD A12 quad core @ 3.8g with 16 mb or RAM. I was not going to install their software at all, but U.S. Probation told me "risk damaging your computer or disconnect it from the internet" and my lawyer is out of town until after New Years, so in the hope that the new PC could handle it I installed the software. Now I am stuck with it unless I run a system restore, find some way to uninstall this program that is designed to be nearly impossible to uninstall, or use Windows in Safe Mode because IPPC does not work in Safe Mode. Hopefully this issue can be resolved seeing as how I think all they need to do is apply the current version of the software they are using, but it has been more than 3 months and they have not. I am only on supervision for sending threatening emails to someone and require only monitoring of my computer use. Other people using the program range from minor offenders like me requiring only monitoring to serious pedophiles in need of significant computer management. Hopefully IPPC will get their act together so that I don't have to uninstall their software just to be able to use my computer in a practical manner as I have a right to under the law. Until then I will continue to share my story online along with information I learn about the software. With that said anyone under their watch can learn what application they are monitoring by finding the registry entries x64:KEY_LOCAL_MACHINESOFTWAREWow6432NodeMicrosoftWindowsCurrent Versionec70 or on x86:KEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionec70 That entry will include exceptions for programs they use including: WMPROC.exe DirectControl.exe rnappp7.exe rnappp0.exe rnappp8c.exe wm008.exe wmsnap.exe PCMProxy.exe PCMActivityService.exe RSWP.exe So far I have tried limiting WMPROC.EXE to 25% CPU by setting the affinity to one core and it seems to be working better now. Hopefully the patch works, so I won't have to insist on an alternative to IPPC Impulse Control from such as RemoteCom or some less invasive monitoring solution. Not that it is that big of a deal, but they also seem to be blocking me from accessing Tor Browser,, and by default.
View full review
  • Price
  • Service
  • Product
Reason of review:
Damaged or defective

Preferred solution: Fix the Software

Cop Blaster

Alternate Theory:

This could be a list of programs that they do not want me accessing manually after I logon. That would explain why their own programs are on the list.

I don't think they would keep their own programs from starting. Or they could have just added them to be deceptive, knowing full well that blocking CSRSS would cause a BSOD before theirs would run.

Either way it is unacceptable.

Proof enough to me that they can't be trusted with anything as important as my computer. I would even wonder if such unauthorized blocking might be a crime because it certainly is not authorized by me or any court.

Cop Blaster

Today I found a shocking Windows Registry entry from IPPC at HKEY_LOCAL_MACHINE SOFTWARE WOW6432Node PCM IC with the timestamp Last Write Time: 12/30/2016 - 5:35 AM. This entry contains two new lists.

The first is a list titled "afm_allow" and has one entry for Windows Explorer. The second is called "afm_block" and it has many entries, all of which are legitimate programs including CSRSS, which stands for Client Server Runtime Subsystem. According to Wikipedia "CSRSS is mainly responsible for Win32 console handling and GUI shutdown. It is critical to system operation; therefore, terminating this process will result in system failure.

Under normal circumstances, CSRSS cannot be terminated with the taskkill command or with Windows Task Manager, although it is possible in Vista if the Task Manager is run in Administrator mode. On Windows 7 and later, Task Manager will inform the user that terminating the process will result in system failure, and prompt if they want to continue."

I can not think of any other explanation for this list than as a block list intended to disable my new computer. This is one of the last registry entries attributed to IPPC on my computer because I had to disable their software to keep it from making my CPU fan run too loud. I could hear it concern for my brand new computer kept me from sleeping, so I did what you should always do when you know what is causing that problem, I disabled it.

It is not healthy for a computer to permit any program to run on it that results in enough constant CPU usage to make the fan loud while idel in the middle of winter. If I remember correctly, I did that at around 5:35 am by running Autoruns and deselecting anything I knew to be part of IPPC. The result meant that IPPC would not start the next time the computer ran. When I first downloaded Autoruns I did it just because I was curious about a program that I had never heard of before checking out URLs blocked by IPPC, and when I learned what it could do I kept it on my computer just in case the fan problem would not go away when I was away from the computer.

I had seen what IPPC had done to my old computer and did not want to take a chance with the new one.

Given the context of the situation, which was the morning after I had written this original complaint and emailed a link to IPPC, I believe that they tried to disable my computer because they or their system realized that there was a good chance that they would not be able to control it much longer.

I always suspected that the BSODs on my old computer, that followed crashes of their software, were intentional to prevent anyone from using a computer without their software running. I believe that this registry key, which came from their server, is a kill switch.

Cop Blaster

OOps, should have said 16 gb of ram, not mb.

Cop Blaster

Turns out life in safe mode isn't too bad after all. Programs like Visual Studio, Mysql, Xampp, Tor etc.

can all be used in safe mode with networking just fine. White list in enough things and it is basically like normal, but without whatever malfunctioning program has been hindering performance.

Any program can be manually started after rebooting in Safe Mode with Networking and that program can function normally. The only exception are programs that require services or drivers to be started as well. Those require that the service or driver be white listed as safe.

Fortunately any service can be added to the Windows Registry as safe. You can learn how to do this by doing a Google search for "how to start services in safe mode". So, if I wanted to start the MSSQL$SQLEXPRESS service and use it to import my databases and restart websites similar to Pissed Consumer, that the judge has temporarily banned me from running, I could have done it right after I learned of this vulnerability, which was almost a month ago.

I feel more comfortable taking about this now because IPPC can't credit their monitoring program with keeping me in compliance with the terms. I am in compliance because I have chosen to be while the case is on appeal.

I tried to start PCMActivityService in safe mode, but of course Windows wouldn't consider any program that functions like rogue security software to be a safe program and of course adding it as safe would defeat the purpose of using safe mode right now, that purpose of course being to use a computer in a practical manner at home as the 9th Circuit says everyone has a right to do, without being crippled by Internet Probation and Parole Control Inc.

Cop Blaster

Found the blocklist, tried to post it, but got flagged as spam. LOL!

NAMBLA! Heard about that on South Park. I'm fine not going there, but they block people from network security sites like Webroot and Piriform.

As well as anything associated with Impulse Control or Pearl Software except for PayComputerMonitoring. There are things that might make sense to block everyone from (like NAMBLA), but most of that list is inappropriate.

Cop Blaster

It seems Impulse Control URL blocking can easily be circumvented using curl in PHP with just 5 lines of code. Unfortunately this comment board does not appear to allow me to post code, which is an understandable security concern.

Cop Blaster

Well, while trying to research wmsnap I've found that none of the links I click on will load. Makes no sense because Twitter will load, but the wmsnap page will not. I suspect this to be due to blocking features of IPPC software because the odds of that many links being bad is quite small.

View more comments (6)

Why Trust Reviews on PissedConsumer?

  • Professional auto and live moderation
  • 100% user-generated content
  • Equal opportunity and protection
  • Zero tolerance for fake reviews
  • Verified content
  • PissedConsumer is on the Inc. 5000 list

For more information read Blog article