Showing posts with label stalker. Show all posts
Showing posts with label stalker. Show all posts

Friday, June 20, 2014

Condensed version of my Hacker 'Sherman'

Shorter Version Condensed version I wrote > 2/10/2012 nearly 2 years after 'Sherman' 1st appeared on my Dell laptop.

I have someone who has appeared on 2 different computers by the name of 'Sherman' that took over administrative rights both times.  The 1st time was in March/April 2010 on my Dell Laptop right before my eyes... The screen went black & within 5 minutes my screen opened up with a new Profile by the name of Sherman with the Chess Player icon & Administrative Rights.  Stole the 2 emails I had back then; I was unable to log into them & access them.  I've been living in the 'Twilight Zone' ever since... I was in such disbelief at the time & had no idea what was yet to come.  My Dell had been acting 'possessed' for a few months prior to this. One thing after the other was getting compromised. Even my printer!! He ended up corrupting 7 PCs, 4 printers and NUMEROUS cells with different carriers. He totally controlled what I could and could not do because by that point he was literally remote accessing my computer.  Before I knew it my cell phone was acting 'possessed'... & numerous ones to come. The beginning of living an unimaginable nightmare and true test of my sanity was just about to become 'My Reality'.  The never ending day to day events were beginning to make me feel like I had lost any REALITY. I need to get my story out there to anyone who will listen. I can't be the only one that this has happened to.  Last September (2011) shortly after buying a MacBook Air (gotta love my Apple devices!)  SHERMAN appeared again.  He is on a mission to try and drive me crazy but I can only say that WGACA. My Hacker is PATHETIC.  He had to prove how 'Hacked Out' he is by actually following me from MD to FL. His obsession to continue to 'humor' me with what seems to be the 'unexplainable' but I keep crossing paths with very knowledgeable various people that tell me how easy it really is to do... Just most people don't waste their time trying to pursue anyone in such an evil way.  


Sunday, April 21, 2013

Journal Entry 10/12/11 3 weeks after purchase of Brand New MacBook Air/iPad & IPhone Compromised

Journal Entry 10/12/2011
Well... Alrighty now - living on little sleep but accomplished something so BIG that was so fricken right there at the click of a button. Got my iPad replaced yesterday. Tried to contact Erin from Apple Technical support; left 2 messages & tried calling a couple more times to inform her that the new Sims card did not FIX my iPad (and again, I had so much hope when the AT&T rep replaced my sims card & the 1st thing I had him do was input the email that had prompted all my most recent calls to Apple in addition to an alien seizing my MAC. And it went through, without a hitch. Good sign > new sims card; that was a 1st for my iPad & the one problem seemed to be fixed... Too good to be true - my favorite motto - but had no choice that something new could be the answer to all the mystery (lack of knowledge actually) of getting the error 'wrong UN/password' over & over again ... Errrrrrrrrr - fixed. All the technical support out there with 4 different Internet providers and I - TONIGHT - figured out the 'fix' to that ongoing error I have had for 1 1/2 years now - WOW! Seriously? I'm sure it will be short lived but the more I explore Apple products the more I love them. It is amazing to me with all the 'hacking' you hear out there & how simple it really is to do that I have been subjected to such devastation & total turmoil. Okay so I'm thrilled that I once again stumbled across a mystery to everyone else that I have talked to about the wrong UN/Password issue - one way to fix it... How? My iPhone that has a hotspot connection capability & my wifi printer were not working the way they should... Something did not add up. My brand new iPad was also on at the time & started acting possessed AGAIN - this soon? Think, think, think. Untrusted site/connection when I went into HP printers website on my iPad & then on my iPad - same error. Hmmm mmm. Purely by coincidence I Printed out network status from my new printer & my iPad started acting just like the one I just had replaced last night... SETTINGS > GENERAL > RESET... NETWORK SETTINGS. I stumbled across it on the printer then on my iPad then iPhone and VOILA - the error I have been a victim to & misunderstood by technical support (that's why I believe my calls had to be rerouted with the million of calls I've made to help me make sense of being able to populate an email on the Internet but continued to get the never ending error when putting in the exact info into the mail client... to only create an error that my password was incorrect. Chalked it up to dealing with idiots, rerouted calls, or I was actually going crazy. I just kept questioning myself - with everything I have been through in my past & still managed to keep my sanity - why NOW 50 - 52 years later would I actually become CRAZY? Paranoid... Yes, but for obvious reasons - logical? Absolutely NOT! Does a real Crazy person know their crazy? I don't think so... Although, I most definitely had my doubts at tines... But knew better. It would be more sane to believe that I really wasn't sane after all. Ahhhhh... but I am & have to deal with the insanity that has been inflicted on me for so long now. I've actually tried to convince myself that I am crazy so All This INSANITY would make sense... Mission accomplished but need specialists (cyber crime unit?) to help me put all this to an end. The insanity I have been subjected by ‘my’ hacker named Sherman, is the reality that I can't get people who are experts in this field to help me. My current locations have populated over 5 different states besides where my actual location is. This is not one person doing this... Again, I can’t be the only person this is happening to & my story needs to reach out to those that are victims as I am entering this one victory I can put a bandaid on for now but what's next?


| Created : Oct 12, 2011 11:54 PM | Priority : ★★★★★ | Style : Background7, Font10, Size19 | Tags : alert,connection,network,cyber,FBI,CCUnit,email,Password,arin |

Tuesday, March 12, 2013

PopUp Window from Hacker using Hashtag I use with Twitter @StalkedByHacker Account

Tweeted 1-13-13 from @TheOnlyChristie acct since @StalkedByHacker was down at that time
iPhone pop up yesterday from Instagram w/ hashtag I use #KeepItREAL, by my hacker, Sherman, GRIEFER who has been in hiding for quite awhile. Just a few minutes ago the reply I sent to him just popped open from the App I had saved it in... Again, another way of letting me know 'Sherman's' back! Like I ever really thought you left! Apple knew you would be back & you took a hiatus before just to create more CYBERterror. Really pathetic, but apparently wants me to share my response >What a coincidence that my account @StalkedByHacker just abruptly stopped working, assuming again, suspended and I was unable to put a support ticket in by the Hacker's handy dandy magic by good ol pop up errors not accepting my UN cuz it said I had used wrong characters. So funny. Didn't expect me to be able to find another resource to do it, huh? Surprise on you! Fuck off you nuisance, you are seriously a bore. Here's what the hacker just popped open on my iPhone when I was no where near it... Get a life 'Sherman'
1-13-13
#KeepItREAL is a powerful phrase that comes from the heart! I know now that one's reality can test you into believing otherwise. God's strength is too real & I refuse to let my pain to join forces to what I know 1st hand the pain & suffering that caused whoever is the one responsible so much hurt at some point & became too weak to keep believing that good does exist & in a sense a victim who stopped believing so gave up, exactly the way Satan had planned. They lost the ability to keep believing & how to #KeepItREAL. When People are struggling, it's Satans victory. So he used something I loved so much, technology, then used it against me in such an evil invasive way to try & pull me to his world. Good exists in everyone. Some lose their way, others turn back because God's work is never done. He never gives up on anyone. #KeepItREAL & Believe. Miracles happen through a higher power that only exists of good. I believe. Life is good. >>> #KeepItREAL is a hashtag I use with the Twitter UN @StalkedByHacker that took me over 6 months to create, so when it mysteriously popped open just showing #KeepItREAL for no logical reason, I had to assume that my hacker, Sherman was behind it and wrote the above paragraph regarding it that popped open by itself on my iPhone, just one of many ways to remind me that I have no privacy with technology but have gotten used to it and thought I would share an exchange I had with my Hacker who has been tormenting me since 3/2010.

Friday, February 15, 2013

1st Twitter Follower - Threat by Hacker

2-15-13
Check out how 'Elisabeth' has 0 Followers, 0 Tweets & Following 0 people. After all the torment my hacker has put me through, of course, I'm thinking the Profile statement was a direct threat from my Hacker, Sherman, because he had turned everything into like a game to him by not letting me create a Twitter account. I just kept being persistent then one day for whatever reason, after over 6 months of trying, when it seemed I had actually succeeded, @StalkedByHacker, seemed more then appropriate to create as my UN. Of course I didn't have a clue how Twitter worked & it took quite awhile to get the hang of it. Seems, as if, I continue to learn something new about it every day. All I knew, I believe it was my my iPhone that I had succeeded to being able to create the account on after creating another one by a name I had come up with when a tech from Best Buy in MD had trouble & took several times before being able to set up my very 1st iPad for me since the hacker had made it impossible for me to do from my parents house or my house. I recall the Tech stating she had never come across such strange behavior from an iPad and she was one who had mentioned to me that I would probably have to change my identity, including social security #, since at that point it was very obvious my identity had been stolen, of course, having no clue the hacker would be so persistent in following to FL, to a 3rd then 4th new address I had moved to since the 1st location of the hacker intrusion.

All I knew, I was finally going to - hopefully - be able to vent to the world about my stalking hacker. It couldn't hurt & I knew it was a big 'IF'. Yes, Sherman, my hacker definitely made it almost impossible for me to type the 140 characters I had so anxiously had been waiting to do for quite awhile. In fact, he made it very difficult for awhile and I would just submit whatever I had managed to type from either my iPad or iPhone even WITH all the typos & some tweets looking Chinese but as time went on & ALL the porn and very odd people (the Hacker being plenty of the UNs I came across) I have pretty much have been more free to use technology then I've been able to since 3/2010! The only problem I keep coming across is my passwords continuously getting changed by Hacker where I have to reset it, mostly to my FB & Twitter but I am still going through BS with my MacBook Air that I still am unable to use & have been dealing with that since I bought it 9/2011.

May not be able to use a PC but after much persistence had my iPads & iPhones replaced each a few times but had also been promised by Apple to get my MacBook Air replaced which hasn't happened yet. But thank God for Apple. otherwise. If it hadn't been for Apple I would never had been able to get the proof that I have managed to do so & I believe Sherman is always going to be lurking & stalking me but NOW in hiding until he can find another opportunity to try and do one of his voodoo black magic Cyber terror pounces when he thinks I am least expecting it...

Pic of my 1st Follower with my account @StalkedByHacker that I've managed to hold onto miraculously... Read the profile > a taste of 'Sherman's' terror...




Wednesday, February 13, 2013

@StalkedByHacker Suspended the 6th time

Still believe Good Conquers evil. It's disturbing that vultures feast on the broken and weak but don't mistaken kindness for stupid. Look forward to the feast. Fuck off. God bless.

I came across the above quotation on my iPad and recall it being so much longer & was actually a response I had made (not what's above exactly) but much longer & descriptive. When I copied it to Blog about it on my iPad and opened the App up to paste it, of course, I got an error where I was unable to do so. Then it auto went to log into it as if I had never logged into it before to go to my blogspot. I had just finished transferring over info re: ALL the support tickets I have had to submit to Twitter because I just had to submit another one & wanted ALL info on my iPad & iPhone for reference to be the same. My twitter account @StalkedByHacker has been suspended 6 times which makes no sense. I understand the 1st time it happened because I had been Following to aggressively which once I read the VERY vague policies understood that's against their policies. But the next 5 times - I am clueless as to why. I do know that I have definitely experienced some very strange people which I guess is to be expected but will paste copies of the very interesting interactions I have had with Twitter world, the first Follower being an Elisabeth Aldo who had 0 Followers, 0 Following AND 0 tweets but the profile read "I will Fucken destroy you" period. A bit odd! Of course everything I have been subjected to with all of the Hacker's voodoo black magic tricks and since it took me at least 6 months to even be able to create an account because of continuing compromising by 'Sherman', of course I questioned if that was intended as a direct threat from my hacker or what. I got several odd Followers & obviously blocked them & it never failed when I did a search on a specific one, they no longer existed. I was always dissecting their profiles & taking note of the amount of tweets, followers & Following cuz it always seemed the account had just been created for whatever reason. But when you have been subjected to the HELL that the FBI, local police and Cybercrime unit are all aware of but have yet to help me crucify & bring justice to the 'network' that I believe has been behind ALL the crazy since Sherman 1st appeared on my Dell laptop in 4/2010 & remotely accessed me on EVERY cell & PC before I made the move from MD (where it occurred) to FL. Now when I say remote accessing, I am telling you SOMEONE was controlling what I could and could not to on my devices & controlled my mouse etc. believe me when I say this, YOU KNOW WHEN YOU HAVE NO CONTROL over a device using technology. Sherman made it a point to even go to the extreme of remote accessing & controlling my mouse at 2 different libraries that were an hour away from each other AND somehow knew to be waiting for me at my parents house when I logged into their PC & logged into their Verizon account on line so I could JUST accomplish what the police in MD told me I needed to do by reporting my hacker to www.ic3.gov, which he had managed to prevent that from happening on a brand new laptop I bought after the Sherman appearance on my Dell, 2 different libraries then at my parents house. It was beyond logical. Reality as it had once existed for me before the hacker is anything but REAL but those are the facts. I finally succeeded when I drove another hour farther from my parents to my son's house & his wife did it for me on her iPad. That's how I got introduced to Apple . From the time the police said that was my only option in April 2010, it wasn't until July 5, 2010 that my daughter-in-law succeeded to submitting what I thought was a crime of being stalked & someone intentionally making no secret that I no longer had the freedom to use technology that everyone just takes for granted. It didn't do any good except the 4th LG android that got replaced was no longer being remotely accessed shortly before my move to FL. New cell, another brand new PC and I made the mistake to think I was in the free & clear of ALL the torment that was nonstop up to the point of getting the FBI involved. But the Griefer at that point had decided to stay in cognito until the whopping CYBERterror that blindsided me again. The weird part is, I never really thought he just went away. I had a hunch that he was still lurking just waiting for the right time to prove to me I was powerless over a coward who stays in hiding physically who obviously is a very sick individual but kept telling myself I was being paranoid. Yep, strange things kept happening, kept buying new PCs, cells, printers because of corruption that continued to possess my technology. But as for twitter, time before last, I was unable to submit a support ticket on my iPad because of what I call Hacker BOGUS errors that I have grown so accustomed to but will never get over the fact that after 'Sherman' appeared a 2nd time on my most recent purchase - Apple MacBook Air that the FBI claims it must be someone I know & since no money has been stolen it should be up to the police, who I have gone to on 7 or 8 different occasions to only tell me they don't have the resources to stop this evil network from their despicable intrusive actions.
Back to Twitter... I had to have my sister submit to Twitter support. Last time, from all devices (I think it was the famous fictitious websites the hacker enjoys toying with me with) I could never receive a reply like the previous times with 3 different emails I included for them to respond to that I had used previously so finally used entirely new one that FINALLY got the reply notification & I was up and running again. This time same compromising - I was unable to input my UN @StalkedByHacker & in the phone number box I literally put 'what's the point' followed by my phone number and figured what the hell, might as well use the StalkedByHacker email I used previously and it actually submitted. No user name, phone number NOT, BUT received an acknowledgement reply to an entirely different email then what I gave them. Odd? Paranoid? It just doesn't make any sense. I have fallen prey to so many fictitious emails & websites that totally screwed me & don't know what to do. I have almost 7,000 followers, which is another odd thing, my account is 'suspended', can't use it, can't even pull it up through my other account @TheOnlyChristie; it just just says 'no such account' so how am I receiving email notifications of continuing Followers during this whole time as recent as an hour ago? This is where I can hope to get through to people the 'CRAZY' that I have lived going on 3 years now. Please ALWAYS shutdown, AFTER disabling Internet connection and unplug anything to the modem/router. As for the first quote above? I am more thorough to have written something so deep without giving it a proper title or where I used it at and WHY was it opened to such a confound statement just waiting for me to read?
I am tired. Hopefully tomorrow in a separate blog I can share the Elisabeth Profile that I believe is a direct threat intended to me by my hacker and the more then interesting ones that they claim they know who my hacker is...
God Bless. Peace Out.

Sunday, January 27, 2013

Stalked By A Hacker

1-26-13
Honestly, ALL the advice I have been given by those who REALLY did understand the extent of what was happening, didn't work. I can't wrap my head around the 'logic' when it's anything but 'logical', what I believe is a network of people, (FBI thinks it's someone I know - so that makes it okay?) but although the extent of the insanity seems more personable, I think it's a much bigger picture and I have my theory that is so out there, but have had since April of 2010 to make reason out of nothing but 'CRAZY' and someone's obsession to play me like a "virtual" game piece of continuous CYBER bullying, which I will keep to myself until I hopefully am able to finish a book. WHY? WHO? If I knew the 'WHO' it would shed a whole lot of light but the FBI isn't willing to help me solve... WHY? Why would every law enforcement that we pay our tax money to, to protect us, too eager to close my case AFTER 'Sherman' appeared on my Apple MacBook Air 1 1/2 years after his 1st appearance on the Dell that seemed to have wiped out ALL it's identification that I had used NUMEROUS times when calling into Tech Support; 'Sherman' appears and my Dell no longer exists? How would 'Sherman' know to be waiting for me at my parent's house or for that matter at 2 different libraries that were about 50 miles away from each other? WHY ME? Which is what I should name my book... "StalkedByHacker WHY ME?" Why did it take me over 4 months to be able to create a Twitter account that has been suspended 5 X's, most recently last night WHILE I was in the middle of tweeting to over 6500 people about being remotely accessed at the 1st library? This time my support ticket isn't being acknowledged at all. Last time I had to have my sister submit the ticket because 'Sherman' prevented me from being able to submit a Support ticket from my iPad. I have ALOT of WHYs! I don't think anyone really wants the answers to. Reality? My Reality has been far from REAL ever since I noticed someone was toying with my Dell laptop that was obviously "possessed" and I still have to this day. It has never been turned on since I took flight to my parent's house in fear for my life because after being on my home LAN line for HOURS giving me the the total run around from the carrier I had at that time because I noticed I was connected to a public network etc. BOTH my LAN line and cell phone had no service when I woke up, and fled to the police station trying to explain hysterically that 'Sherman' was on my Dell laptop and had no service through VW w/ my cell (that was also 'possessed') OR my LAN line that was provided by Comcast and when I had fallen asleep, all I remember was watching my laptop erase pixel by pixel after technical support had 'helped' me... Didn't go over too well acting hysterical but their resolution was to go to www.ic3.gov and report the hacker to get ANY help and almost 3 years later. I guess ALOT of big "HOWs"? Come into play. So many insane, almost delusional events have happened ever since. Plenty happened previous... ALL on line with my DELL, LAN line AND cell. HOW? Was a hacker(?) able to remote access my LG ALLY Smartphone (I had replaced it w/ the old 'possessed' one I watched, literally, the analog clock on the front change to digital and my Text messaging had totally changed formats on me, which I found weird but not per say 'crazy' just thought it odd and when I called VW support regarding it I was told "Someone HAD to have replaced the SIMS card that was in it to have had made such drastic changes" which was absolutely ludicrous. But you get whatever knowledge Support has to offer, in hopes to 'reground' your thoughts of "I must be going crazy" but the best resolution and seemed I guess logical to whoever I spoke with, whether it was Technical or Customer support that whatever 'event' I had just experienced, whether it was my computer or cell is "That's not possible", pretty much casting my own insecurity of questioning my sanity. Be told that enough times by different people who are the "KNOW IT ALLS" and you start questioning your "Reality" - FACTS that you find no logic but yet was REAL and questionable sanity becomes your reality. BUT then God ALWAYS has a way a having the right person you cross paths with that give a FULL BLOWN REASON and explanation to their best ability that helps you find your footing AGAIN. Time and time again. Some more HOWs, if you have the answer by all means 'share' because I have more WHYs? And HOWs to twisted events that no one should have to endure without getting a resolution to resolve the BIG MYSTERY. After the police (after my 1st of numerous approaches to law enforcement) instructed me to report the initial crime to www.ic3gov, HOW was 'Sherman' able to remotely access my LG ALLY smartphone and control every aspect of what I could do and couldn't do? Was free the 1st, about 20 days I owned it, but 'Sherman' was able to LOCK me out from my pattern code I needed to do to use my phone and ALWAYS after store closing hours, then would magically work by the time VW would open. HOW was he able to literally control anything I tried to submit to support for help and turn Chinese? HOW was he able to compromise my cell some how, some way ex: zapping battery life even when plugged in BUT NEVER happen when I took it into VW... He was setting me up to seem "CRAZY" although I had learned after the police station incident, nothing gets resolved when you act IRRATIONAL no matter how FUCKEN IRRATIONAL the situation is. A true test of my sanity. HOW was he, no matter how many times I erased & restored to default, change my phone numbers (that was everyone's favorite resolution to fixing my COMPUTERS, LG ALLY CELL, IPADS, IPHONES etc.) which all it did was erase ANY proof that possibly could have been helpful and did not deter 'Sherman' especially w/ my 1st smartphone. I had it replaced, after changing the numbers too many times to keep count, my VW account was screwed up and after replacing my cell 2 times already, and someone controlling it, I forget what whacked out thing it was doing but ironically I was sent to a Retailer VW (since VW was sick and tired of me w/ my what even seemed to me, UNREAL stories) where for the 1st time it actually did whatever 'Sherman' normally would do to have it back to 'normal' mode (Coincidence? Or being in a brand new VW - RETAILER store have anything to do with Sherman Not being able to continue his charade?) Also - I had long since started taping paper over the camera lense cuz it seemed he could see me and when others were around. Started taking the batter out of it at night so he would stop invading my privacy and would send me bogus articles or have you tube waiting for me to open up, which I NEVER did! Plus for the 1st time I was able to show how it continuously gave me BOGUS errors of not letting me access websites like I was previous to making the mistake of inputting one of the 1st email addresses, that had very important info, that was confiscated when my Dell got hacked ex: My Benefits Resource page or any emails on the web etc. So anyway they were more then happy to replace my cell a 3rd or 4th time at this point but only after they WIPED out my VW account I had had ever since I owned a cell and make a brand new account with a FICTITIOUS name, in case 'Sherman' happened to have some sort of inside resource he had access to, AND change my number to a FL exchange even though I lived in MD at the time. That should, you would think, have taken care of it, at least with my cell. I failed to mention the numerous attempts I had made with my cell to report the hacker to www.ic3.gov since I had not been able to w/ a brand new laptop 'Sherman' took a snapshot of, even having a brand new modem/router I had replaced, too, at home, 2 libraries and my parent's house - all failed attempts because SHERMAN took control of the mouse. Except w/ my ALLY I was finally able to populate www.ic3.gov, input the HELL I had been subjected to, but was NEVER able to submit, just kept populating what I call BOGUS errors that I got way too familiar with these past (almost) 3 years. I was finally able to 7/5/10, 3 months after SHERMAN appeared & the police had instructed me to. My daughter in law who lived about 1 1/2 away from me used her iPad and submitted my story for me, my 2nd attempt of SOMEONE TO PUT A STOP TO ALL THE CRAZY UGLY that at that point, since has been my what seems 'delusional' reality that I could not escape from. All I know is the 3rd or 4th ALLY replacement seemed to do work. No more remote accessing, I had the 1st Brand new laptop replaced, although that was a battle in itself. I had only used it a couple days more after getting THAT new modem/router replaced since, I'm assuming, SHERMAN some how compromised it also. After using the brand new laptop about, 15 minutes of using it, it was like a big FLASH went off. I believe I had McAfee at the time (not that ANY antivirus helped) but it clearly said there had been 2 unsuccessful entries made but the 3rd one WAS successful and that was when the modem/router stopped working altogether. Again, Coincidence? Had the address out of NJ somewhere. When I attempted to print out the details of the report, my printer stopped working. Couldn't save it to a CD because that was one of the many things 'Sherman' corrupted, purposely so I would not be able to establish any evidence. Of course, this is all hindsight. Looking back there's so much more that makes sense now. It all seems so unreal trying to remember everything, but want people to know the seriousness and invasion that has taken place ever since I 1st noticed in February or March of 2010 that my Dell was acting 'possessed' and I was too naive to ever imagine my world would completely change. I moved to FL with another brand new Lenovo laptop, printer, and I thought, an LG ALLY cell that I had escaped the wrath of 'Sherman' from. There's more to the story, obviously is meant for a book with more detail. I was just hoping for a happy ending. I guess there are just too many HOWs? but most of all WHO? And WHY? Usually money's the root of evil... so. I do believe the phone trapping needs to be taken more seriously that I definitely fell pray to. I also believe having a LAN line ties into what I think is a huge elaborate scam that too many people have fallen victim to and don't even realize it. If you have any type of 24/7 tech support or anything that you are paying an amount that seems reasonable... Thinking, thinking, thinking the 3 addresses where 'Sherman' made his presence apparent where numerous cells, printers and computers were compromised ALL HAD LAN LINES AND INTERNET. How many victims are phone trapped today and of course don't know it, but more seriously, WHO? I don't have the answers, I wish I did. But what's most disturbing to me law enforcement agencies need to get it together and stop passing the buck off to another. WHY? Did 'Sherman' make it a point, although, I have my suspicions that privacy no longer exists in our world with technology, but WHY didn't 'Sherman' just stay in hiding like most hackers do? I am a witness to the extreme of how technology is being used when in the hands of EVIL but for whatever reason, wanted me to be quite aware that I was being stalked by a hacker! The few pics are from others on Twitter re: 'my' hacker... & I'm assuming the last one was a message intended for me from 'Sherman' in disguise as Elisabeth, when I was finally able to create my Twitter account, which I will put in separate blog also.















Saturday, March 17, 2012

My Hacker At the Library

My connections to the networks I have had in 2 different states, & 4 different addresses w/ 4 different carriers have been compromised by being connected to someone else's network or my connection ends up being connected to a public network, I guess that leaves me open game to the Hacker that continues to intrude my cyber space by subjecting me to such bizarre, almost delusional encounters. My 3rd visit at 2 different libraries, an hour away from each other, I experienced what seems the impossible and if someone else were to tell me both of these encounters happened to them, I don't know if I would believe them. Thank God I had a witness or I would have ?'d my own sanity. Already was by this point in time anyway. There was no logic as to WHO & WHY WAS SOMEONE INTENTIONALLY TOYING WITH ME... WAS THIS JUST A GAME TO SOMEONE? After sharing my story face to face (nothing by phone was sacred at that point in time because of 'phone trapping' - talk about WAY OUT THERE!) to very knowledgeable people with the extent of what a hacker can do (and knew there was such things as 'hackers'; didn't even look at me like I was possessed (believe me, you wouldn't believe the amount of closed minded people that I made a mistake sharing what had become an almost everyday REALITY for me and had the nerve to act like there is no such thing as 'hacking',) who really are idiots and basically do not have enough knowledge to have an intelligent conversation about something you hear about everyday on the news! The 1st library in Baltimore, MD I was trying to go to ic3.gov to submit my hacker story. The local police said they couldn't help me in any way and the only option I had was to go on-line to www.ic3.gov to report the crime that had been committed by hacking, what I thought was illegal. Made numerous attempts to open ic3.gov - just got bogus errors or website got REROUTED to websites that had nothing to do with what I actually needed... When it FINALLY opened, the mouse came to life and went spastic all over the screen; then different screens kept opening to the most bizaare websites so fast I couldn't believe it nor could the person beside me who commented "what the hell is up with your computer?". No sooner did he finish asking me everything closed out & the computer literally shut down.  I was in total disbelief and my anxiety was thru the roof!  I didn't know what to believe anymore.  I had been told (by phone - which became unsafe territory to me that was brought to my attention by someone whose path I crossed, who was knowledgeable about computers and informed me of 'phone trapping' which he fell victim to in a scam that ripped him off financially but never got the chance to give me detail because he was working but warned me to be very careful.  From what I had explained to him in regards to there being no logic with ANY phone calls I would make in regards to my computers being controlled by someone in hiding and almost seemed I was being taunted in an evil way.  My parents PCs and phone line ended up exactly the same way from the home I fled when I was naive enough to download what I thought was an antivirus but found out the 'antivirus' I had downloaded did NOT exist with Verizon, the carrier that they had and was tricked into seeing yet another fake website that looked so genuine, since I had worked for Verizon my entire career but was so stressed out had forgotten the one antivirus they did offer and the hacker was waiting behind the screens as a customer service rep that I WAS reluctant to interact with when a pop up came up asking if they could be of assistance when I was unable to find anything on their website in regards to an antivirus... 1st clue - it took FOREVER (over 2 hours to download) and in the mist of downloading, get a facetious pop up by the hacker (which I had to come to that realization the day after when I made calls from a payphone to the REAL Verizon who confirmed my paranoia were for reasons that were justified... TOTAL DISBELIEF!  Had made a call to the 24/7 'ULTRA tech support' that I think was a total hoax (hindsights 20/20) because looking back was something I ultimately was offered by all 4 different carriers that took your money straight from your bank account (that's what that guy had tried to warn me about but didn't think anything of a $19.95 a month payment that was supposed to give me my sanity back but feel I played right into their hands with what was to come.  I believe it was the day before my 1st library attack and I had called from my parents phone (which WAS phone trapped after downloading a hacker's dream come true in order to continue terrorizing me in a way that is still beyond logic. I forget how my parents PC was being compromised but called the $19.95 a month GEEKS that can FIX ALL.  The guy asked if he could remote access my PC, which made me feel uncomfortable but had no choice but to trust him. He dove in head first to find 'Sherman' who had obviously at that point taken control AGAIN at a house that I had not been to in over a year but as time went on, realized he was able to hear me on my phone conversations, let alone as I was subjected to even more TERROR was able to hear me, as crazy as this is to absorb but too many circumstances led up to me realizing that if my LG ALLY was within range, he could literally stalk me in ways that I was slow to catch on because how REAL is it that 'Sherman' would and could stalk me literally to an extent that I had to block out once he made a point to be obvious - I had no privacy with my computers (which I picked up soon after he appeared as 'Sherman' on my Dell yet couldn't allow my mind to grasp such an intrusion and WHY?? But now on the very 1st smartphone I purchased after the plain Jane cell I had, acted possessed, which is in another post and the port holes were destroyed... Coincidence?  Had a brand new modem/router do the same thing when I thought I was free from 'Sherman' when I had replaced my Dell with a new laptop which only reinforced that 'Sherman' was on a mission.  But on the call I made to 24/7 tech, he took charge, remote accessed my parents PC and only heighten my disbelief AND paranoia when he elaborated in such a distressed fashion for my safety.  He went on and on to inform me that I WAS IN FACT IN DANGER because with what I had explained the extent of what the hacker had done so far (just touched based actually because my nerves were so raw, and hitting road block after road block knew how skeptical people could be with my REALITY and was concerned about if he would take me seriously or not... But he (REROUTED call I think) emphasized how I needed to fill the police in IMMEDIATELY (already had - no go - dead end) because for 'Sherman' to be remote accessing me, meant he was within 100 ft or yds (I forget which length) and when told that so matter of fact by someone who was a GERU with hackers, put me in more fear for my life! None of it was making any sense!  I was in Baltimore in the safety of a home I was living at when hacker first struck and now about 40 miles away in Annapolis, I'm being told the hacker was within 100 ft/yds everytime he remote accessed me? So then that's all I could think and felt like I was losing touch with reality that he was that close to me at this library?
Another clue that I was 'phone trapped' by some organization... But WHY? And WHO could be so cruel - Why ME? So I'm at the 1st library he invaded me (stalking me was becoming more real by the day) and the hacker had taken control of my computer and obviously did not want me to have the capability of submitting my story to Cybercrime Unit. So in addition to remote accessing my computer, then my parents -each time sabotaging me from generating anything to ic3.gov - he could remote access a library computer? No way! This can't be happening!!! I was so shaken up by this invasion. How is it possible that out of about 20 computers in this particular library could my hacker compromise the one I was on? Totally impossible! OR was it? I had recently been told that someone had to be within 100 ft/yds to remote access a computer. WRONG! My hacker was stalking me & on a mission to make me question my own sanity!!! I believe my calls were being rerouted! Too many coincidences to know where I would be and whatever he had me download - IT WAS A WAY FOR HIM TO CONTINUE STALKING ME!! This made it the 3rd location he has remote accessed & taken control of the computer I was on. I remember wondering - is the hacker here?!?!? But decided that's what he wanted me to think. As time went on, I realized I had definitely been misinformed how close a hacker has to be to take control of a computer. 2nd Library location, Annapolis, MD incident - what a doozy - will share on another Blog.

Does your Hacker Have A Name?

I would love to know if anyone has been subjected to any part of a Hacker that doesn't stay in hiding and purposely subjects his victims to know they've been hacked by constantly compromising you in ways to torment you.  Local authorities, Cyber Crime Unit & the FBI say 'my' hacker is most likely someone I know and definitely is clever enough not to cross the line of breaking any major law for them to pursue.  I dealt with the police who in turn referred me to report what I thought was a crime to www.i3c.gov (a lot of good that did - it took me 3 months to accomplish that), was interviewed and they referred me to the FBI in MD. Moved to FL and hacker continued so tried the police there and they referred me straight to the FBI who I had a face to face with but was then told it was a police matter... Felt helpless and like I was running in circles. Apparently 'hacked' victims have to be famous in some way to get help that I have desperately needed to put it to a stop.  I thought 'hacking' was illegal; apparently not if you are just an ordinary citizen.  Hard to wrap my mind around that hacking & intentionally tormenting someone on their personal computers and cells is okay... More then disturbing! I thought since 'Sherman' appeared a 2nd time on my brand new MacBook Air - I would get the help I needed to put all this crazy tormenting to a stop. I had only owned it for about a month when I got the attention of a senior level by the name of Amanda who seemed genuinely concerned when I had called Apple AGAIN (I couldn't tell you the amount of calls that I had made over a years time frame which I finally realized that I was just getting the run around and they were NOT going to fulfill their promise of replacing my MAC if the issue wasn't resolved. But I did get their attention in Oct. 2011 when I had called to inform them that my Apple ID, which was about the 7th I had created because they continuously were getting compromised where I was unable to use them the way that everyone just takes for granted. The forever password error and this particular day it wouldn't accept my birthday to issue me a new password and read the JavaScript errors to Amanda and filled her in on 'Sherman' and his crusade of taking over 6 PC's by that time, the MAC made it # 7, 4 printers and NUMEROUS cell phones he had hijacked. Took me serious and although this was my 1st MAC and I was not familiar with how it functioned compared to the PCs I had worked my entire career with Verizon Communications, which was C&P Telephone when I started in 1980 on computers.
I had managed to create and save some logs that seemed 'off' to me and had a feeling from the very 1st connection I made that it was being compromised. It all came to a head when Amanda had requested that I email her the logs and the 3 emails I had built into the mail client had been working fine up until that point (could the hacker hear my conversations on my phone?) - I believe so... Too many coincidences that occurred that only by hearing my conversations could the hacker continue to be one step ahead of me > how did he know to be waiting for me at my parents? > how was he able to cyber attack me at 2 totally different libraries that were about 50 miles apart? > how did both my home phone which was connected thru Comcast AND my cell (thru Verizon Wireless) both go dead at the same time after getting the total crazy run around I got the very last time I ever used my Dell laptop and saw it erase pixel by pixel right after seeing my address displayed up and down my screen, as if on a newspaper article when I was living completely by myself and had been given so many different 800 #'s to call to resolve the hijacking of my Dell? > How did the hacker know what article or You Tube that would be waiting for me nearly every morning that had something to do with what I had said or done the previous day on my cell? > How did the hacker have the capability of recording a call I had had earlier in the day with my sister regarding my 'possessed' Dell to only send it to her home line voice mail later that night? It was obvious I was being stalked and he wanted me to know I was in fact entitled to no privacy since hijacking my Dell and my very first cell which led me to buying a new laptop and my first smart phone - the LG ALLY which only led to having absolutely no privacy or the capability of using technology the way it had been intended to. 

I knew when I tried to email Amanda at Apple the logs I had created and received the message 'password/UN rejected' for all 3 gmails I had built into the mail client, it only confirmed my suspicions I had been trying to ignore that 'Sherman' had some how managed to follow me to another state (I had lived in MD then moved to FL and was at a 4th address that he had relentlessly been stalking me.)  Even tried to build in a 4th email thru the mail client which worked until I tried to mail the logs. I was completely blown away! I finally had what I thought would be proof of someone else on my laptop lurking behind the scenes. I had noticed an app that I thought had come with my MAC called the GeekTool App (pictures below) which I had tried to open previous to this just to check it out but had been unsuccessful but for whatever reason made it my mission to open it in hopes it could lead me to some answers. When I finally got it open, I saw 3 sequences of numerous numbers and letters already built in and assumed it was some how what was programming and had been compromised by 'Sherman'. After manipulating the sequences and checking boxes that weren't check and unchecking boxes that were checked it would some how disconnect the hacker from my laptop. I even added more sequences that were equivalent in length of made up numbers and letters in hopes to deter the hacker. (Geek Tool App below) 




It had a box to name the sequences and I named one WIMP, SHERMAN, SHERMAN 1 etc. and before I knew it they started multiplying rapidly. I figured if I screwed something up that Apple would be able to walk me through how to fix it. Only to find out that this App had NOT been an Apple App and the Geek Squad where I had purchased the MAC (Best Buy) had not put this mysterious App on my laptop at all. It was a total mystery how it was even on my MacBook Air at all. All I know, by manipulating this App I came across some very strange things that were behind the scenes... For one the next picture will show two screens of ALL THE EMAILS that some how ended up on my MAC. You can see the ones I built in had labeled names of the actual gmail I had built so that I could tell them apart. By this time I had accumulated over 100 email addresses in hopes to get rid of the hacker thinking he was able to find me by my email addresses. I just kept creating new ones which wasn't an easy task keeping up with them all and as you can see there were multiple addresses added by the hacker because I certainly had not added them and as you can see were not labeled to the actual address used... But why? You would think someone could give me an answer but that never happened. In fact I'm sure many I spoke with doubted anything I had to say when it came to a 'hacker' hijacking my technology. 


By this time I was thrilled that I was able to capture what my eyes were seeing this time around because ALL THE CRAZY I would get subjected on all the other computers would end up so corrupt, I would have no proof of anything.  So I really got my hopes up when I reached another senior level at Apple by the name of Erin Elliason who took great interest that an Apple product had in fact been hacked and to a degree that no one could fathom. She was the one who promised to replace my MacBook Air if they were unable to resolve the 'Sherman' I was able to expose for my eyes only (which seemed more then odd that when I took my MAC to Apple for them to get some kind of diagnostic on it, Sherman, as a USER PROFILE with ADMIN RIGHTS could not be seen...) Only at my house but I knew from almost 2 years of torture by that time to take whatever pictures I could because it seemed Sherman always managed to undo anything I would get subjected to when I would take my computer or cell whenever it would act 'possessed' and make me come across as 'CRAZY'. Yep... Sure, UN HUH!  It was really getting old trying to explain for example my LG ALLY which got replaced 3 times at one point was having a mind of it's own with the battery charger. It would show a full charge then ZAP no battery life, would plug it in, show a full charge again, unplug and ZAP no battery life but as soon as I took it to Verizon Wireless, not really thinking too much about it except it must be a defective battery and they'll replace it, but it worked fine in the store! They were nice enough to replace the battery but that was the beginning of the hacker toying with my mind in so many different ways that I have blocked out a lot today because it was never ending! Of course, waving my address up and down the screen when I lived by myself was definitely creepy! I do remember the times my cell would do something whacked (example: tried to type in an entry into LG about the hacker and every time I typed it, it backed spaced through every letter typed and delete it) by the time this occurred - I knew the hacker could hear me AND see me whether I was using my phone or not and had caught onto his game so to test my sanity I placed the phone in another room, went to my Step Mother and quietly told her to witness what the hacker was doing, which she did and voila! (I had taped over the camera lense by this time so he couldn't see - learned that the hard way to) she got to witness 'my world of crazy' then purposely said out loud 'watch when I type this entry, it's going to delete each one when I finish' and of course it didn't do it! I knew he could hear me!! He has set me up so often already to prove the actions of someone else on my cell to only look like a fool when it wouldn't do it... Time and time again. I caught onto to his sick, twisted game. When was it going to stop?

Sunday, March 11, 2012

My Stalking Cyber Hacker

Have had ALL my computers, cell phones, & printers viciously compromised ever since my Dell Laptop literally got hacked into right before my eyes around 2 years ago. I was so blind to the nightmare that I would be subjected to, all because I was in total disbelief to what I was witnessing when my hacker named 'Sherman' was 'hacking' his way into my computer & ended up taking total control of my laptop - ALL because I was too naive to believe 'this only happens to other people', NOT ME.

Tuesday, February 14, 2012

Cyber Hacker Attack whose name is Sherman

I have been stalked by a Hacker since March 2010 who has appeared as 'Sherman' twice & just recently on my Apple MacBook Air & took administrative rights both times.  It's been almost 2 years since he 1st  appeared & has been tormenting me by compromising every cell phone (numerous, in hopes to put it to a stop) and 7 computers, 4 printers.  Not to mention 'phone trapped'..... Talk about BIZAARE.  My story needs to be heard and put a stop to the never ending torment he has been subjecting me to.  He belongs behind bars & I deserve peace of mind & freedom to use technology the way I was able to before my stalking hacker invaded my life & has made it a living hell in the 'Twilight Zone'.  All I can say is - Thank you Apple, because of the iPad & iPhone, although the network connections have been compromised & odd things have occurred on all Apple Devices, the hacker has been unable to corrupt them to a degree of preventing me from getting my story out & I can once again, for the most part, enjoy using technology! FYI, my current location is far from where the map has me located in IN... I live in FL. That's funny, cuz my Facebook current location is usually Doylestown, PA... Weather App had me in Kansas for awhile and I have never been close to those areas.  HMMMMMM, very interesting.