Saturday, March 17, 2012

My Hacker At the Library

My connections to the networks I have had in 2 different states, & 4 different addresses w/ 4 different carriers have been compromised by being connected to someone else's network or my connection ends up being connected to a public network, I guess that leaves me open game to the Hacker that continues to intrude my cyber space by subjecting me to such bizarre, almost delusional encounters. My 3rd visit at 2 different libraries, an hour away from each other, I experienced what seems the impossible and if someone else were to tell me both of these encounters happened to them, I don't know if I would believe them. Thank God I had a witness or I would have ?'d my own sanity. Already was by this point in time anyway. There was no logic as to WHO & WHY WAS SOMEONE INTENTIONALLY TOYING WITH ME... WAS THIS JUST A GAME TO SOMEONE? After sharing my story face to face (nothing by phone was sacred at that point in time because of 'phone trapping' - talk about WAY OUT THERE!) to very knowledgeable people with the extent of what a hacker can do (and knew there was such things as 'hackers'; didn't even look at me like I was possessed (believe me, you wouldn't believe the amount of closed minded people that I made a mistake sharing what had become an almost everyday REALITY for me and had the nerve to act like there is no such thing as 'hacking',) who really are idiots and basically do not have enough knowledge to have an intelligent conversation about something you hear about everyday on the news! The 1st library in Baltimore, MD I was trying to go to ic3.gov to submit my hacker story. The local police said they couldn't help me in any way and the only option I had was to go on-line to www.ic3.gov to report the crime that had been committed by hacking, what I thought was illegal. Made numerous attempts to open ic3.gov - just got bogus errors or website got REROUTED to websites that had nothing to do with what I actually needed... When it FINALLY opened, the mouse came to life and went spastic all over the screen; then different screens kept opening to the most bizaare websites so fast I couldn't believe it nor could the person beside me who commented "what the hell is up with your computer?". No sooner did he finish asking me everything closed out & the computer literally shut down.  I was in total disbelief and my anxiety was thru the roof!  I didn't know what to believe anymore.  I had been told (by phone - which became unsafe territory to me that was brought to my attention by someone whose path I crossed, who was knowledgeable about computers and informed me of 'phone trapping' which he fell victim to in a scam that ripped him off financially but never got the chance to give me detail because he was working but warned me to be very careful.  From what I had explained to him in regards to there being no logic with ANY phone calls I would make in regards to my computers being controlled by someone in hiding and almost seemed I was being taunted in an evil way.  My parents PCs and phone line ended up exactly the same way from the home I fled when I was naive enough to download what I thought was an antivirus but found out the 'antivirus' I had downloaded did NOT exist with Verizon, the carrier that they had and was tricked into seeing yet another fake website that looked so genuine, since I had worked for Verizon my entire career but was so stressed out had forgotten the one antivirus they did offer and the hacker was waiting behind the screens as a customer service rep that I WAS reluctant to interact with when a pop up came up asking if they could be of assistance when I was unable to find anything on their website in regards to an antivirus... 1st clue - it took FOREVER (over 2 hours to download) and in the mist of downloading, get a facetious pop up by the hacker (which I had to come to that realization the day after when I made calls from a payphone to the REAL Verizon who confirmed my paranoia were for reasons that were justified... TOTAL DISBELIEF!  Had made a call to the 24/7 'ULTRA tech support' that I think was a total hoax (hindsights 20/20) because looking back was something I ultimately was offered by all 4 different carriers that took your money straight from your bank account (that's what that guy had tried to warn me about but didn't think anything of a $19.95 a month payment that was supposed to give me my sanity back but feel I played right into their hands with what was to come.  I believe it was the day before my 1st library attack and I had called from my parents phone (which WAS phone trapped after downloading a hacker's dream come true in order to continue terrorizing me in a way that is still beyond logic. I forget how my parents PC was being compromised but called the $19.95 a month GEEKS that can FIX ALL.  The guy asked if he could remote access my PC, which made me feel uncomfortable but had no choice but to trust him. He dove in head first to find 'Sherman' who had obviously at that point taken control AGAIN at a house that I had not been to in over a year but as time went on, realized he was able to hear me on my phone conversations, let alone as I was subjected to even more TERROR was able to hear me, as crazy as this is to absorb but too many circumstances led up to me realizing that if my LG ALLY was within range, he could literally stalk me in ways that I was slow to catch on because how REAL is it that 'Sherman' would and could stalk me literally to an extent that I had to block out once he made a point to be obvious - I had no privacy with my computers (which I picked up soon after he appeared as 'Sherman' on my Dell yet couldn't allow my mind to grasp such an intrusion and WHY?? But now on the very 1st smartphone I purchased after the plain Jane cell I had, acted possessed, which is in another post and the port holes were destroyed... Coincidence?  Had a brand new modem/router do the same thing when I thought I was free from 'Sherman' when I had replaced my Dell with a new laptop which only reinforced that 'Sherman' was on a mission.  But on the call I made to 24/7 tech, he took charge, remote accessed my parents PC and only heighten my disbelief AND paranoia when he elaborated in such a distressed fashion for my safety.  He went on and on to inform me that I WAS IN FACT IN DANGER because with what I had explained the extent of what the hacker had done so far (just touched based actually because my nerves were so raw, and hitting road block after road block knew how skeptical people could be with my REALITY and was concerned about if he would take me seriously or not... But he (REROUTED call I think) emphasized how I needed to fill the police in IMMEDIATELY (already had - no go - dead end) because for 'Sherman' to be remote accessing me, meant he was within 100 ft or yds (I forget which length) and when told that so matter of fact by someone who was a GERU with hackers, put me in more fear for my life! None of it was making any sense!  I was in Baltimore in the safety of a home I was living at when hacker first struck and now about 40 miles away in Annapolis, I'm being told the hacker was within 100 ft/yds everytime he remote accessed me? So then that's all I could think and felt like I was losing touch with reality that he was that close to me at this library?
Another clue that I was 'phone trapped' by some organization... But WHY? And WHO could be so cruel - Why ME? So I'm at the 1st library he invaded me (stalking me was becoming more real by the day) and the hacker had taken control of my computer and obviously did not want me to have the capability of submitting my story to Cybercrime Unit. So in addition to remote accessing my computer, then my parents -each time sabotaging me from generating anything to ic3.gov - he could remote access a library computer? No way! This can't be happening!!! I was so shaken up by this invasion. How is it possible that out of about 20 computers in this particular library could my hacker compromise the one I was on? Totally impossible! OR was it? I had recently been told that someone had to be within 100 ft/yds to remote access a computer. WRONG! My hacker was stalking me & on a mission to make me question my own sanity!!! I believe my calls were being rerouted! Too many coincidences to know where I would be and whatever he had me download - IT WAS A WAY FOR HIM TO CONTINUE STALKING ME!! This made it the 3rd location he has remote accessed & taken control of the computer I was on. I remember wondering - is the hacker here?!?!? But decided that's what he wanted me to think. As time went on, I realized I had definitely been misinformed how close a hacker has to be to take control of a computer. 2nd Library location, Annapolis, MD incident - what a doozy - will share on another Blog.

Does your Hacker Have A Name?

I would love to know if anyone has been subjected to any part of a Hacker that doesn't stay in hiding and purposely subjects his victims to know they've been hacked by constantly compromising you in ways to torment you.  Local authorities, Cyber Crime Unit & the FBI say 'my' hacker is most likely someone I know and definitely is clever enough not to cross the line of breaking any major law for them to pursue.  I dealt with the police who in turn referred me to report what I thought was a crime to www.i3c.gov (a lot of good that did - it took me 3 months to accomplish that), was interviewed and they referred me to the FBI in MD. Moved to FL and hacker continued so tried the police there and they referred me straight to the FBI who I had a face to face with but was then told it was a police matter... Felt helpless and like I was running in circles. Apparently 'hacked' victims have to be famous in some way to get help that I have desperately needed to put it to a stop.  I thought 'hacking' was illegal; apparently not if you are just an ordinary citizen.  Hard to wrap my mind around that hacking & intentionally tormenting someone on their personal computers and cells is okay... More then disturbing! I thought since 'Sherman' appeared a 2nd time on my brand new MacBook Air - I would get the help I needed to put all this crazy tormenting to a stop. I had only owned it for about a month when I got the attention of a senior level by the name of Amanda who seemed genuinely concerned when I had called Apple AGAIN (I couldn't tell you the amount of calls that I had made over a years time frame which I finally realized that I was just getting the run around and they were NOT going to fulfill their promise of replacing my MAC if the issue wasn't resolved. But I did get their attention in Oct. 2011 when I had called to inform them that my Apple ID, which was about the 7th I had created because they continuously were getting compromised where I was unable to use them the way that everyone just takes for granted. The forever password error and this particular day it wouldn't accept my birthday to issue me a new password and read the JavaScript errors to Amanda and filled her in on 'Sherman' and his crusade of taking over 6 PC's by that time, the MAC made it # 7, 4 printers and NUMEROUS cell phones he had hijacked. Took me serious and although this was my 1st MAC and I was not familiar with how it functioned compared to the PCs I had worked my entire career with Verizon Communications, which was C&P Telephone when I started in 1980 on computers.
I had managed to create and save some logs that seemed 'off' to me and had a feeling from the very 1st connection I made that it was being compromised. It all came to a head when Amanda had requested that I email her the logs and the 3 emails I had built into the mail client had been working fine up until that point (could the hacker hear my conversations on my phone?) - I believe so... Too many coincidences that occurred that only by hearing my conversations could the hacker continue to be one step ahead of me > how did he know to be waiting for me at my parents? > how was he able to cyber attack me at 2 totally different libraries that were about 50 miles apart? > how did both my home phone which was connected thru Comcast AND my cell (thru Verizon Wireless) both go dead at the same time after getting the total crazy run around I got the very last time I ever used my Dell laptop and saw it erase pixel by pixel right after seeing my address displayed up and down my screen, as if on a newspaper article when I was living completely by myself and had been given so many different 800 #'s to call to resolve the hijacking of my Dell? > How did the hacker know what article or You Tube that would be waiting for me nearly every morning that had something to do with what I had said or done the previous day on my cell? > How did the hacker have the capability of recording a call I had had earlier in the day with my sister regarding my 'possessed' Dell to only send it to her home line voice mail later that night? It was obvious I was being stalked and he wanted me to know I was in fact entitled to no privacy since hijacking my Dell and my very first cell which led me to buying a new laptop and my first smart phone - the LG ALLY which only led to having absolutely no privacy or the capability of using technology the way it had been intended to. 

I knew when I tried to email Amanda at Apple the logs I had created and received the message 'password/UN rejected' for all 3 gmails I had built into the mail client, it only confirmed my suspicions I had been trying to ignore that 'Sherman' had some how managed to follow me to another state (I had lived in MD then moved to FL and was at a 4th address that he had relentlessly been stalking me.)  Even tried to build in a 4th email thru the mail client which worked until I tried to mail the logs. I was completely blown away! I finally had what I thought would be proof of someone else on my laptop lurking behind the scenes. I had noticed an app that I thought had come with my MAC called the GeekTool App (pictures below) which I had tried to open previous to this just to check it out but had been unsuccessful but for whatever reason made it my mission to open it in hopes it could lead me to some answers. When I finally got it open, I saw 3 sequences of numerous numbers and letters already built in and assumed it was some how what was programming and had been compromised by 'Sherman'. After manipulating the sequences and checking boxes that weren't check and unchecking boxes that were checked it would some how disconnect the hacker from my laptop. I even added more sequences that were equivalent in length of made up numbers and letters in hopes to deter the hacker. (Geek Tool App below) 




It had a box to name the sequences and I named one WIMP, SHERMAN, SHERMAN 1 etc. and before I knew it they started multiplying rapidly. I figured if I screwed something up that Apple would be able to walk me through how to fix it. Only to find out that this App had NOT been an Apple App and the Geek Squad where I had purchased the MAC (Best Buy) had not put this mysterious App on my laptop at all. It was a total mystery how it was even on my MacBook Air at all. All I know, by manipulating this App I came across some very strange things that were behind the scenes... For one the next picture will show two screens of ALL THE EMAILS that some how ended up on my MAC. You can see the ones I built in had labeled names of the actual gmail I had built so that I could tell them apart. By this time I had accumulated over 100 email addresses in hopes to get rid of the hacker thinking he was able to find me by my email addresses. I just kept creating new ones which wasn't an easy task keeping up with them all and as you can see there were multiple addresses added by the hacker because I certainly had not added them and as you can see were not labeled to the actual address used... But why? You would think someone could give me an answer but that never happened. In fact I'm sure many I spoke with doubted anything I had to say when it came to a 'hacker' hijacking my technology. 


By this time I was thrilled that I was able to capture what my eyes were seeing this time around because ALL THE CRAZY I would get subjected on all the other computers would end up so corrupt, I would have no proof of anything.  So I really got my hopes up when I reached another senior level at Apple by the name of Erin Elliason who took great interest that an Apple product had in fact been hacked and to a degree that no one could fathom. She was the one who promised to replace my MacBook Air if they were unable to resolve the 'Sherman' I was able to expose for my eyes only (which seemed more then odd that when I took my MAC to Apple for them to get some kind of diagnostic on it, Sherman, as a USER PROFILE with ADMIN RIGHTS could not be seen...) Only at my house but I knew from almost 2 years of torture by that time to take whatever pictures I could because it seemed Sherman always managed to undo anything I would get subjected to when I would take my computer or cell whenever it would act 'possessed' and make me come across as 'CRAZY'. Yep... Sure, UN HUH!  It was really getting old trying to explain for example my LG ALLY which got replaced 3 times at one point was having a mind of it's own with the battery charger. It would show a full charge then ZAP no battery life, would plug it in, show a full charge again, unplug and ZAP no battery life but as soon as I took it to Verizon Wireless, not really thinking too much about it except it must be a defective battery and they'll replace it, but it worked fine in the store! They were nice enough to replace the battery but that was the beginning of the hacker toying with my mind in so many different ways that I have blocked out a lot today because it was never ending! Of course, waving my address up and down the screen when I lived by myself was definitely creepy! I do remember the times my cell would do something whacked (example: tried to type in an entry into LG about the hacker and every time I typed it, it backed spaced through every letter typed and delete it) by the time this occurred - I knew the hacker could hear me AND see me whether I was using my phone or not and had caught onto his game so to test my sanity I placed the phone in another room, went to my Step Mother and quietly told her to witness what the hacker was doing, which she did and voila! (I had taped over the camera lense by this time so he couldn't see - learned that the hard way to) she got to witness 'my world of crazy' then purposely said out loud 'watch when I type this entry, it's going to delete each one when I finish' and of course it didn't do it! I knew he could hear me!! He has set me up so often already to prove the actions of someone else on my cell to only look like a fool when it wouldn't do it... Time and time again. I caught onto to his sick, twisted game. When was it going to stop?

Sunday, March 11, 2012

My Stalking Cyber Hacker

Have had ALL my computers, cell phones, & printers viciously compromised ever since my Dell Laptop literally got hacked into right before my eyes around 2 years ago. I was so blind to the nightmare that I would be subjected to, all because I was in total disbelief to what I was witnessing when my hacker named 'Sherman' was 'hacking' his way into my computer & ended up taking total control of my laptop - ALL because I was too naive to believe 'this only happens to other people', NOT ME.