The silent massacre


Interference with Targets’ Communication System



Download 0.99 Mb.
View original pdf
Page47/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   43   44   45   46   47   48   49   50   ...   85
Silent-Massacre by Max H. Williams
Interference with Targets’ Communication System
Rule Number One in the attackers’ user manual probably reads – Isolate the target. By hacking the computer and tapping the phones, the attackers are able to interfere with the target’s communication system and thus harm his relationships with family members and friends. To a target, his communications system can be a life line. Once a target’s communications are compromised, the attackers find it far easier to perform their electronic and mind control attacks on him.
I live in a rural area where it is difficult to obtain fast speed internet service. When I found out that Hughes.net offered DSL in rural settings, I subscribed to their service, and the fee was deducted directly from my bank account. I was very pleased to be able to communicate with other TIs using high speed internet. The attackers, however, set out to remove that advantage.
After several months, the attackers began using pop-ups with the Hughes.net logo telling me that there were problems with my payment. At the time, I believed that the pop-ups did indeed come from Hughes.net, and I finally became so annoyed that I canceled my service. Only later did I learn that the attackers were manipulating my computer and using the pop-ups with the Hughes.net logo. They knew that I would use the high speed computer to work against them, and they set out to take that tool away from me. They succeeded. I went back to using the much slower dial-up internet just what the attackers wanted.
Hughes.net turned my account over to a collection company. However, when I sent that company entries from my journals describing the harassing pop-ups and my phone calls to the company, which did not resolve the issue, they dropped their demand. I feel sure that the powerbrokers instructed them to drop the matter, as they did not wantI have no way of knowing whether personnel who work for Hughes.net were involved in the internet interference. However, that they dropped their claims indicates that Hughes.net is aware of such interference.


After canceling the Hughes.net contract, I obtained dial-up internet service through a local provider. At first, although slow, it functioned reasonably smoothly and efficiently. Then, the attackers began their assault on my dial-up internet access, and it got increasingly slower.
Everybody has his own idea about what constitutes slowness, so let me explain that when I say slow, I mean that it often takes from five to seven minutes to pull up a web page, sometimes longer.
In addition, features that once functioned well began malfunctioning: the “Reply” button on emails often delays for several minutes or the reply space never appears; a pop-up often states, “Internet Explorer cannot display the web page;” sometimes new emails end up embedded in old emails; videos will not open or, if opened, will stop every few seconds and pause for a couple of minutes; the Delete Browsing History does not function; “Sending” takes several minutes; the mouse clicks do not open the web pages; and my emails often do not arrive to correspondents and vice versa.
I have spent hundreds of dollars on technicians to correct the mal-functions. The installation of a more powerful modem helped only minimally. My defragmenter and other programs seemingly do not help. Deleting the browsing history does not improve the speed. The internet service becomes increasingly slower. The attackers are determined to interfere with my communication and make it difficult for me to use the internet. Their mission is to isolate me, frustrate me, take much of my time, and cause me to spend money on repairs.
Several people in my same locality use an AT&T 3G satellite plug-in to speed up their internet communications. I ordered the small device and hired a PC technician to install it correctly.
Although he successfully installed the program, he tried for hours to get it functioning and failed. His services cost me almost five hundred dollars. A few months later, I ordered the 3G device again and this time attempted to install it myself. Once again the program installed itself perfectly, but after spending hours on the phone with AT&T technicians, I could not get it to work. The device showed that it was getting a very strong signal, which means that it should have functioned correctly.
Once when I called my internet provider to ask if they could improve the online performance, I mentioned that my PC had been hacked. The technician with whom I was speaking remarked, “It’s impossible to hack dial-up internet.” I did not know whether to laugh or try to convince him about how wrong he was. I let it pass.
Hacking probably is not the correct term to call what the attackers do with a target’s computer.
They actually take possession of it. They have somehow established a parallel, or shared, system whereby one of their computers literally becomes my computer. Not only are they able to manipulate the contents of my computer but they also have created “ghost” web sites for those that I frequently visit and for my emails accounts.
Later, I contacted Hughes.net to explain about the hacking. I was able to re-subscribe to
Hughes.net, which improves my ability to communicate with others. Although the attackers have tried to cause me once again to cancel Hughes.net, I continue using that company as an internet provider.
I recently discovered that the attackers are able to intercept my emails and edit, substitute, or

delete my attachments. I sent a correspondent an attachment that contained two hundred pages. He wrote back that he had read all seventy pages. The attackers had intercepted my email and had deleted over a hundred pages of the attachment. Since discovering that handler capability, I have checked with correspondents about what they received from me.
The attackers also interfere with my land line phone and cell phone. The first ring on both phones has a different tone from the following rings. Apparently the attackers’ listening device picks up after the first ring. I have many “wrong numbers.” When I advise them that they have the wrong number, instead of hanging up, they remain on the line, an old telephone trick that allows the caller to tap the phone if the answerer hangs up first. When I curtly ask them to hang up, I get a click, as if they have hung up, but get no dial tone, another old telephone trick. When I finally get ugly with the caller, he at last hangs up and I get a dial tone. The callers are apparently only accomplices wanting to get in on the attackers’ action.
On the phone, the attackers often cause my voice to echo so that I can hardly hear the other person. Of course, the echo can only be heard on my end. The attackers also cause very noisy static and other strange noises. They have even interjected their voices, which probably only I can hear. On occasion, they have redirected my calls so that the call will be answered by their accomplices, just as they obviously did when I thought that I was talking with
Hughes.net personnel. Very often they make it difficult to make and receive calls.
Interference with the target’s PC and telephone is designed not just to annoy the target but to isolate him socially and impose difficulty in conducting business. It also causes the target to question his sanity, especially if he has not learned to hear the voices.
The social isolation, frustration, and doubts about a target’s sanity lay the groundwork for the attackers’ neurological assaults and the target’s anxiety.
Before I got Hughes.net, I had dial-up internet service. My attackers used the telephone jack for some purpose when the computer was connected to that jack. While I used the PC, I played a small radio to drown out the V2K. There was always much static, and the radio will not pick up signals when facing certain directions, not always the same directions. Whenever
I finished using the computer, I would disconnect it from the telephone jack. The second I disconnected the cord, the radio station immediately blared forth strong and clear.
Attackers also interfere with the regular mail sent to and from post offices and through mail delivery companies. Targets’ ”snail” mail often goes astray. If I have to use the post office, I pay a higher fee to obtain proof of mailing or delivery confirmation. Packages from UPS and
FedEx often do not arrive.

Download 0.99 Mb.

Share with your friends:
1   ...   43   44   45   46   47   48   49   50   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page