After canceling the Hughes.net contract, I obtained dial-up internet service through a local provider. At first, although slow, it functioned reasonably smoothly and efficiently. Then, the attackers began their assault
on my dial-up internet access, and it got increasingly slower.
Everybody has his own idea about what constitutes slowness, so let me explain that when I say slow, I mean that it often takes from five to seven minutes to pull up a web page, sometimes longer.
In addition, features that once functioned well began malfunctioning: the “Reply” button on emails often delays for several minutes or the reply space never appears; a pop-up often states, “Internet Explorer cannot display the web page;” sometimes new emails
end up embedded in old emails; videos will not open or, if opened, will stop every few seconds and pause for a couple of minutes; the Delete Browsing History does not function; “Sending” takes several minutes; the mouse clicks do not open the web pages; and my emails often do not arrive to correspondents and vice versa.
I have spent hundreds of dollars on technicians to correct the mal-functions. The installation of a more powerful modem helped only minimally. My defragmenter and other programs seemingly do not help. Deleting the browsing history does not improve the speed. The internet service becomes increasingly slower. The attackers are determined to interfere with my communication and make it difficult for me to use the internet. Their mission is to isolate me,
frustrate me, take much of my time, and cause me to spend money on repairs.
Several people in my same locality use an AT&T 3G satellite plug-in to speed up their internet communications. I ordered the small device and hired a PC technician to install it correctly.
Although he successfully installed the program, he tried for hours to get it functioning and failed. His services cost me almost five hundred dollars. A few months later, I ordered the 3G device again and this time attempted to install it myself. Once again the program installed itself perfectly, but after spending hours on the phone with AT&T technicians, I could not get it to work. The device showed that it was getting a very strong signal, which means that it should have functioned correctly.
Once when I called my internet provider to ask if they could improve the online performance, I mentioned that my PC had been hacked. The technician with
whom I was speaking remarked, “It’s impossible to hack dial-up internet.” I did not know whether to laugh or try to convince him about how wrong he was. I let it pass.
Hacking probably is not the correct term to call what the attackers do with a target’s computer.
They actually take possession of it. They have somehow established a parallel, or shared, system whereby one of their computers literally becomes my computer. Not only are they able to manipulate the contents of my computer but they also have created “ghost” web sites for those that I frequently visit and for my emails accounts.
Later, I contacted Hughes.net to explain about the hacking. I was able to re-subscribe to
Hughes.net, which improves my ability to communicate with others. Although the attackers have tried to cause me once again to cancel Hughes.net, I continue using that company as an internet provider.
I recently discovered that the attackers are able to intercept my emails and edit, substitute, or
delete my attachments. I sent a correspondent an attachment that contained two hundred pages. He wrote back that he had read all seventy pages. The attackers had intercepted my email and had deleted over a hundred pages of the attachment. Since discovering that handler capability, I have checked with correspondents about what they received from me.
The attackers also interfere with my land line phone and cell phone. The first ring on both phones has a different tone from the following rings. Apparently the attackers’ listening device picks up after the first ring. I have many “wrong numbers.” When I advise them that they have the wrong number,
instead of hanging up, they remain on the line, an old telephone trick that allows the caller to tap the phone if the answerer hangs up first. When I curtly ask them to hang up, I get a click, as if they have hung up, but get no dial tone, another old telephone trick. When I finally get ugly with the caller, he at last hangs up and I get a dial tone. The callers are apparently only accomplices wanting to get in on the attackers’ action.
On the phone, the attackers often cause my voice to echo so that I can hardly hear the other person. Of course, the echo can only be heard on my end. The attackers also cause very noisy static and other strange noises. They have
even interjected their voices, which probably only I can hear. On occasion, they have redirected my calls so that the call will be answered by their accomplices, just as they obviously did when I thought that I was talking with
Hughes.net personnel. Very often they make it difficult to make and receive calls.
Interference with the target’s PC and telephone is designed not just to annoy the target but to isolate him socially and impose difficulty in conducting business. It also causes the target to question his sanity, especially if he has not learned to hear the voices.
The social isolation, frustration, and doubts about a target’s sanity lay the groundwork for the attackers’ neurological assaults and the target’s anxiety.
Before I got Hughes.net, I had dial-up internet service. My attackers used the telephone jack for some purpose when the computer was connected to that jack. While I used the PC, I played a small radio to drown out the V2K.
There was always much static, and the radio will not pick up signals when facing certain directions, not always the same directions. Whenever
I finished using the computer, I would disconnect it from the telephone jack. The second I disconnected the cord, the radio station immediately blared forth strong and clear.
Attackers also interfere with the regular mail sent to and from post offices and through mail delivery companies. Targets’ ”snail” mail often goes astray. If I have to use the post office, I pay a higher fee to obtain proof of mailing or delivery confirmation. Packages from UPS and
FedEx often do not arrive.
Share with your friends: