Sign in to follow this  
gossamer

Our Story

Recommended Posts

I went to bed last night so upset and heart broken, and then all of this.........I'm too blown away for words!

 

Right now I bring home $539.00 a month, in Social Security Disabilty, next month, it'll go up to $573.00.

 

That's not a lot of money, if my wife did not work, we be in deep do-do.

 

I've gone to the FBI, over all of this, and the U.S. Secret Service, who does Cyber Security for the Dept. of Homeland Security.

 

Our ISP (the only cable server in our town), Mediacom High Speed Internet Dept. of Security, and they say that they "do NOT get involved in personal vendetta's".

 

We've gone to our local police dept. which is like "Barney Fife", for those of you who are old enough to remember that old TV show.

 

We've gone to our two U.S. Senators.............all of these, with NO luck.

 

My wife works for the local hospital, and he has HER COMPUTER HACKED TOO, the one she uses for her work.

 

All of this has made me a little crazy, I'm sorry to say. Not psychotic, just paranoid, and with good reason, I'd say.

 

If I had stayed in my home state (Arkansas) I would have to kill someone eventually, because David (or more likely, one of his goons) would have come after me, and I would've had to kill them to protect myself.

 

So, I can never live in Arkansas again, unless this man is imprisoned or killed somehow.

 

Below is David Screeton's photo, this article reads like a diary from the longest ago to the present more or less.

 

 

 

http://www.ozarkppd.ozarkpagans.com/photos.htm

 

 

 

 

Here is the story of the terrorism unleashed upon my wife and myself.

 

It starts in 2003, and runs into the present day. It's a kind of a

diary. Read on:

 

 

 

 

This is a long and rather convoluted story.

 

It started last June (2003), and it continues until this day.

 

I used to operate a Yahoo group, it had a member on it named "Rev."

Silver Crow, or 'Corvus Argentum', Argentum Corvus, or 'David Screeton' (his REAL NAME), or take your pick of probably a hundred other online I.D.'s.

 

This all started with a disagreement about words and titles.

 

Someone on my old (first) Yahoo e-list asked me about folks who use

titles like "Reverend", and "Master", and such.

 

I personally dislike titles and labels like these.

 

Anyway, I digress, when I publicly said that I didn't care for such

titles, this person 'went off' (so-to-speak) .

 

This debate went on for several days, and when I asked for it to

cease, this person threw a fit, and when I threatened to moderate him,

he got downright nasty and vile.

 

I removed him from the list.

 

Well, it turned out that he was an expert computer hacker, and the

lady who 'set up' the beginning of this argument over titles was his

lover (and she was married..... ..incidentally) .

 

I think now, that the whole thing was just set up by her, as she

disagreed with me on a whole gamut of things, but instead of dealing

with this upfront, she subtly 'set up' this argument with someone

that she already KNEW was an expert computer hacker.

 

It turns out later, that I was given a recorded (on audio tape)

telephone conversation between she and this hacker, by a friend.

 

In Arkansas, the law says only ONE person has to know if a

conversation is being recorded during a telephone conversation.

 

This was the start of a 13 month battle, that continues till this day,

as I said above.

 

I lost my first PC to this man, as he 'turned off' the video card on

it, so that it would no longer work, and he finally gave it the 'My

Doom' virus, which even damages the computer's hardware!

 

He also ruined two more loaner PC's from friends of mine.

 

Finally, some like minded friends (who's PC's he had also hacked) and

myself went to the F.B.I., last October 6th, 2004, about this man.

 

We gave them (the F.B.I.) PROOF, the recorded audio tape of him

bragging about hacking people's PC's, and a log of him hacking through

MANY computers, using the computers at the hospital, where he USED to

be employed.

 

As it turned out, the F.B.I. ALREADY KNEW ABOUT HIM, but refused to

prosecute him as he had (at that time) not met a supposed $10,000.00

ceiling for damages that occurred while he was hacking our PC's.

 

That is, a hacker has to cause at least $10,000.00 in damages, to be

Federally prosecuted.

 

I knew (as did everyone else who's computers that he had hacked) that

he worked in the largest hospital in Arkansas, in Little Rock, as one

of their main tele-communications and (get this) their cyber security specialist people.

 

After he had put some of my Medical information on the internet (in a

Yahoo group), which violates the HIPPA Act, I called them on June 1st,

and by June the 6th, 2005, he was no longer an employee there.

 

When I had an angio-gram done at The Little Rock Heart Clinic that

turned out reasonably well, David Screeton had hacked their

computers, and when friends called the Heart Clinic they were

told "That ************ was supposed to not live through the night", when in

actuality, I was home from the procedure by 7:00 PM!

 

He had been employed there for a long time, around 8 years, I

understand.

 

He has also 'taken captive' two of my old personal e-mail accounts,

and thus, because I had only MYSELF as 'an owner' of my e-mail groups,

he also took the e-lists 'captive' too.

 

He went to my old high school website where I graduated from in 1970,

and told them that I was 'dead', they even posted a photo of me taken

from my old high school year book, in 'the deceased' section of their

1970 Graduates.

 

It took me SIX MONTHS to NOT be "dead", at this high school website,

after he did what he did.

 

He sent a girlfriend to my front door in Arkansas, posing as a County

D.H.S. worker (this too, is a felony), scoping out where, and how, I

lived.

 

My feeling is that this was for a potential 'hit' on me.

 

He's had a friend of his in prison call my sister, as she was 'my next

of kin', on my hospital forms (which of course, he hacked).

 

He HAD a legal license to "Minister" in the Arkansas Prison System,

till I had a little chat with the Director of the Ministry section

there on the phone.

 

He's an "ordained" and licensed Minister, in the state of Arkansas.

 

My sister and her husband finally had to call the Arkansas Attorney

General to have these calls to their home cease.

 

He attacked another person's computer (at work) who just happens to

work for the Arkansas Secretary of State.

 

I later learned that both the F.B.I. and the Arkansas State Police

raided the Secretary of State's office and confiscated many computer

hard drives and other PC items, but still, this man was NOT

prosecuted.

 

He later ran this lady off of the road, with his van, to where she had

to get a restraining order against him, as she was terrified that he

would kill her.

 

He had his cronies follow me late at night in Arkansas to where I had

to travel armed (which if you knew me personally, is really hard to

believe).

 

After he was fired recently from Saint Vincent's, he shot out a friend

of mine's truck window, just as a not so subtle threat, because this

friend helped me to get him fired from his job.

 

Still he was not prosecuted, for lack of evidence (he used an

exploding bullet, which cannot be traced).

 

We currently have reformatted our current PC, 3 times (I had

reformatted my old PC 9 TIMES, and my friend in Arkansas has

reformatted his PC, 24 TIMES!), and we have a proxy server with a

firewall, two more external firewalls, one internal firewall, and

still he has hacked our PC, even though we're almost 700 miles from

Arkansas!

 

When I first joined this group, I had one ID, that lasted one whole

day, then I had to change the password, and now when I post, I DON'T

have to sign in, or out, which leads me to believe, that Silver Crow,

is also 'riding in' on my ID, and password, for this group.

 

I have an old IP address (from last October) for him should you want

it.

 

I guess that my question is, what would cause someone to be so sick

that they would stalk me all around the internet, just over an

argument about titles?

 

What must have actually happened to this man in his life to NEED this

sort of twisted and perverted 'power'?

 

This is just a small part of a much longer story, that is actually

MUCH darker than I've told here.

 

I just needed to gripe, I hope that that is OK with everyone.

 

******

 

P.S. I have one more thought..... that probably, this man is in 'The

Witness Protection Program'.

 

This is really the ONLY thing that I can think of, that makes ANY

sense, as to just WHY, he has not yet been arrested!

 

Now (today) Oct.27th, 2006.

 

Here's the rest of the story....... ...one night in August of 2005, a

Mason City Police woman shows up at our front door at 1:30 AM, because

this psycho had had one of his girlfriends call my brother, who then

called my mother and wakes her up, and then they call my ex-wife who

calls the Mason City Police Dept. with all of them thinking that I had

been killed in a horrible car crash (this is what he had one of his

girlfriends tell my brother in the initial phone call)....... ...and

the Police woman wants to know if I am **************, and have I been

in some horrible car crash?

 

Next, he has our HOME TELEPHONE disconnected. Literally.

 

He goes in and hacks Qwest's computers, plus, he calls them using >MY

Social Security number<, pretends to BE ME, and TURNS OFF our home

telephone!!!

 

I had to go to my Doctor and get a statement saying because of my

medical conditions, we HAD to have a telephone connected ASAP.

 

It took them THREE DAYS to get our telephone service restored, and

about another WEEK to get our old telephone number back.

 

At that point Qwest was so angry, they were talking about prosecuting

him, but so far......... NOTHING has come from this.

 

He's like Bill Clinton, he's pretty much 'teflon', at least so far!

 

He at this moment has our ISP HACKED, and they know it, but will so

far, do NOTHING to stop him!

 

We've had "items" put on our telephone line (by the Police) to catch

his hang up or breathing calls where he is saying nothing on the

phone, and the calls are coming from Arkansas.... ....it has just gone

on and on and on.......... ......... ...for three years now!

 

I have lost probably 6 or 7 e-mail accounts to this mad man. We cannot

NOT write certain people because he blocks the e-mails from going

anywhere, I suppose they disappear into cyber space, or go into one of

his computers.

 

We are NOW on our 6th (SIXTH) computer.

 

But as a friend of mine says; "He's just an URBAN TERRORIST", and

after all of the Government's TALK about stopping terrorist's, they

are only talking about folks who blow up buildings and

such........ ....and NOT this kind of 'urban terrorist'.

 

Tell me that this is NOT a sad and pitiful story of TOTAL Govt.

FAILURE!

 

For Freedom! ******

 

I give you my word that every WORD of this story is TRUE and actually

happened.

 

 

 

MY DEEP THANKS to Stigwerd, and anybody else, who has the compassion to help in this nightmare!

Edited by gossamer

Share this post


Link to post
Share on other sites

Wow,

thats brutal. First things first, I would get an older Macintosh computer, All of the code this guy writes wont work on a Mac (OS9). If he is smart enough, he will have to rewrite all of his scripts, which will take forever. But, I doubt he is smart enough to do that. Next you can get SSL browser service to send everything through major encryption. This way, even if he can somehow intercept whatever you are sending, he wont be able to read it.

 

Just a few ideas for computer security.

Edited by Bak Mei

Share this post


Link to post
Share on other sites

I went to bed last night so upset and heart broken, and then all of this.........I'm too blown away for words!

 

Right now I bring home $539.00 a month, in Social Security Disabilty, next month, it'll go up to $573.00.

 

That's not a lot of money, if my wife did not work, we be in deep do-do.

 

I've gone to the FBI, over all of this, and the U.S. Secret Service, who does Cyber Security for the Dept. of Homeland Security.

 

Our ISP (the only cable server in our town), Mediacom High Speed Internet Dept. of Security, and they say that they "do NOT get involved personal vendetta's".

 

We've gone to our local police dept. which is like "Barney Fife", for those of you who are old enough to remember that old TV show.

 

We've gone to our two U.S. Senators.............all of these, with NO luck.

 

My wife works for the local hospital, and he has HER COMPUTER HACKED TOO, the one she uses for her work.

 

All of this has made me a little crazy, I'm sorry to say. Not psychotic, just paranoid, and with good reason, I'd say.

 

If I had stayed in my home state (Arkansas) I would have to kill someone eventually, because David (or more likely, one of his goons) would have come after me, and I would've had to kill them to protect myself.

 

So, I can never live in Arkansas again, unless this man is imprisoned or killed somehow.

 

Below is David Screeton's photo, this article reads like a diary from the longest ago to the present more or less.

http://www.ozarkppd.ozarkpagans.com/photos.htm

Here is the story of the terrorism unleashed upon my wife and myself.

 

It starts in 2003, and runs into the present day. It's a kind of a

diary. Read on:

This is a long and rather convoluted story.

 

It started last June (2003), and it continues until this day.

 

I used to operate a Yahoo group, it had a member on it named "Rev."

Silver Crow, or 'Corvus Argentum', Argentum Corvus, or 'David Screeton' (his REAL NAME), or take your pick of probably a hundred other online I.D.'s.

 

This all started with a disagreement about words and titles.

 

Someone on my old (first) Yahoo e-list asked me about folks who use

titles like "Reverend", and "Master", and such.

 

I personally dislike titles and labels like these.

 

Anyway, I digress, when I publicly said that I didn't care for such

titles, this person 'went off' (so-to-speak) .

 

This debate went on for several days, and when I asked for it to

cease, this person threw a fit, and when I threatened to moderate him,

he got downright nasty and vile.

 

I removed him from the list.

 

Well, it turned out that he was an expert computer hacker, and the

lady who 'set up' the beginning of this argument over titles was his

lover (and she was married..... ..incidentally) .

 

I think now, that the whole thing was just set up by her, as she

disagreed with me on a whole gamut of things, but instead of dealing

with this upfront, she subtly 'set up' this argument with someone

that she already KNEW was an expert computer hacker.

 

It turns out later, that I was given a recorded (on audio tape)

telephone conversation between she and this hacker, by a friend.

 

In Arkansas, the law says only ONE person has to know if a

conversation is being recorded during a telephone conversation.

 

This was the start of a 13 month battle, that continues till this day,

as I said above.

 

I lost my first PC to this man, as he 'turned off' the video card on

it, so that it would no longer work, and he finally gave it the 'My

Doom' virus, which even damages the computer's hardware!

 

He also ruined two more loaner PC's from friends of mine.

 

Finally, some like minded friends (who's PC's he had also hacked) and

myself went to the F.B.I., last October 6th, 2004, about this man.

 

We gave them (the F.B.I.) PROOF, the recorded audio tape of him

bragging about hacking people's PC's, and a log of him hacking through

MANY computers, using the computers at the hospital, where he USED to

be employed.

 

As it turned out, the F.B.I. ALREADY KNEW ABOUT HIM, but refused to

prosecute him as he had (at that time) not met a supposed $10,000.00

ceiling for damages that occurred while he was hacking our PC's.

 

That is, a hacker has to cause at least $10,000.00 in damages, to be

Federally prosecuted.

 

I knew (as did everyone else who's computers that he had hacked) that

he worked in the largest hospital in Arkansas, in Little Rock, as one

of their main tele-communications and (get this) their cyber security specialist people.

 

After he had put some of my Medical information on the internet (in a

Yahoo group), which violates the HIPPA Act, I called them on June 1st,

and by June the 6th, 2005, he was no longer an employee there.

 

When I had an angio-gram done at The Little Rock Heart Clinic that

turned out reasonably well, David Screeton had hacked their

computers, and when friends called the Heart Clinic they were

told "That ************ was supposed to not live through the night", when in

actuality, I was home from the procedure by 7:00 PM!

 

He had been employed there for a long time, around 8 years, I

understand.

 

He has also 'taken captive' two of my old personal e-mail accounts,

and thus, because I had only MYSELF as 'an owner' of my e-mail groups,

he also took the e-lists 'captive' too.

 

He went to my old high school website where I graduated from in 1970,

and told them that I was 'dead', they even posted a photo of me taken

from my old high school year book, in 'the deceased' section of their

1970 Graduates.

 

It took me SIX MONTHS to NOT be "dead", at this high school website,

after he did what he did.

 

He sent a girlfriend to my front door in Arkansas, posing as a County

D.H.S. worker (this too, is a felony), scoping out where, and how, I

lived.

 

My feeling is that this was for a potential 'hit' on me.

 

He's had a friend of his in prison call my sister, as she was 'my next

of kin', on my hospital forms (which of course, he hacked).

 

He HAD a legal license to "Minister" in the Arkansas Prison System,

till I had a little chat with the Director of the Ministry section

there on the phone.

 

He's an "ordained" and licensed Minister, in the state of Arkansas.

 

My sister and her husband finally had to call the Arkansas Attorney

General to have these calls to their home cease.

 

He attacked another person's computer (at work) who just happens to

work for the Arkansas Secretary of State.

 

I later learned that both the F.B.I. and the Arkansas State Police

raided the Secretary of State's office and confiscated many computer

hard drives and other PC items, but still, this man was NOT

prosecuted.

 

He later ran this lady off of the road, with his van, to where she had

to get a restraining order against him, as she was terrified that he

would kill her.

 

He had his cronies follow me late at night in Arkansas to where I had

to travel armed (which if you knew me personally, is really hard to

believe).

 

After he was fired recently from Saint Vincent's, he shot out a friend

of mine's truck window, just as a not so subtle threat, because this

friend helped me to get him fired from his job.

 

Still he was not prosecuted, for lack of evidence (he used an

exploding bullet, which cannot be traced).

 

We currently have reformatted our current PC, 3 times (I had

reformatted my old PC 9 TIMES, and my friend in Arkansas has

reformatted his PC, 24 TIMES!), and we have a proxy server with a

firewall, two more external firewalls, one internal firewall, and

still he has hacked our PC, even though we're almost 700 miles from

Arkansas!

 

When I first joined this group, I had one ID, that lasted one whole

day, then I had to change the password, and now when I post, I DON'T

have to sign in, or out, which leads me to believe, that Silver Crow,

is also 'riding in' on my ID, and password, for this group.

 

I have an old IP address (from last October) for him should you want

it.

 

I guess that my question is, what would cause someone to be so sick

that they would stalk me all around the internet, just over an

argument about titles?

 

What must have actually happened to this man in his life to NEED this

sort of twisted and perverted 'power'?

 

This is just a small part of a much longer story, that is actually

MUCH darker than I've told here.

 

I just needed to gripe, I hope that that is OK with everyone.

 

******

 

P.S. I have one more thought..... that probably, this man is in 'The

Witness Protection Program'.

 

This is really the ONLY thing that I can think of, that makes ANY

sense, as to just WHY, he has not yet been arrested!

 

Now (today) Oct.27th, 2006.

 

Here's the rest of the story....... ...one night in August of 2005, a

Mason City Police woman shows up at our front door at 1:30 AM, because

this psycho had had one of his girlfriends call my brother, who then

called my mother and wakes her up, and then they call my ex-wife who

calls the Mason City Police Dept. with all of them thinking that I had

been killed in a horrible car crash (this is what he had one of his

girlfriends tell my brother in the initial phone call)....... ...and

the Police woman wants to know if I am **************, and have I been

in some horrible car crash?

 

Next, he has our HOME TELEPHONE disconnected. Literally.

 

He goes in and hacks Qwest's computers, plus, he calls them using >MY

Social Security number<, pretends to BE ME, and TURNS OFF our home

telephone!!!

 

I had to go to my Doctor and get a statement saying because of my

medical conditions, we HAD to have a telephone connected ASAP.

 

It took them THREE DAYS to get our telephone service restored, and

about another WEEK to get our old telephone number back.

 

At that point Qwest was so angry, they were talking about prosecuting

him, but so far......... NOTHING has come from this.

 

He's like Bill Clinton, he's pretty much 'teflon', at least so far!

 

He at this moment has our ISP HACKED, and they know it, but will so

far, do NOTHING to stop him!

 

We've had "items" put on our telephone line (by the Police) to catch

his hang up or breathing calls where he is saying nothing on the

phone, and the calls are coming from Arkansas.... ....it has just gone

on and on and on.......... ......... ...for three years now!

 

I have lost probably 6 or 7 e-mail accounts to this mad man. We cannot

NOT write certain people because he blocks the e-mails from going

anywhere, I suppose they disappear into cyber space, or go into one of

his computers.

 

We are NOW on our 6th (SIXTH) computer.

 

But as a friend of mine says; "He's just an URBAN TERRORIST", and

after all of the Government's TALK about stopping terrorist's, they

are only talking about folks who blow up buildings and

such........ ....and NOT this kind of 'urban terrorist'.

 

Tell me that this is NOT a sad and pitiful story of TOTAL Govt.

FAILURE!

 

For Freedom! ******

 

I give you my word that every WORD of this story is TRUE and actually

happened.

MY DEEP THANKS to Stigwerd, and anybody else, who has the compassion to help in this nightmare!

 

You should look into Feng Shui. It has alot of useful things to keep bad spirits and bad energy in general out of your home. Like putting a dragon, tiger, pheonix, and tortoise in the house...that might be outside I'm not sure. Mak sounds like he may know about that.

Share this post


Link to post
Share on other sites

I second that, this is more of a technical problem than a spiritual one I think. If you're no longer near him he can't do anything but hack you, change your operating system and chances are he wont be able to hack you anymore.

 

There are still a few things though like he can hack other places running windows with poor security and that he already has a lot of your details and identity with him. I don't know how you can fix that =S , but at least give Linux a try and save your own computer from being damaged by him.

 

I can't see any "ethical" solutions here if the law wont help you, but if you REALLY think Mak can help you I'll also pay him $10 to help you.

Share this post


Link to post
Share on other sites

I posted this elsewhere on the forum:

 

http://en.wikipedia.org/wiki/List_of_Linux_computer_viruses

 

 

I run Ubuntu Hardy Heron 8.4, a Linux distro, he's hacked the crap out of this computer.

 

Only a MacIntosh I-Mac G-4, with OS 9 on it, with an 'Alpha Shield' hardware firewall, will work.

 

Old Macs are now VERY cheap, I'm trying to work on that avenue too.

 

His magic was pretty crappy until he ran into Gavin and Yvonne Frost from Missouri (they are in the photo's that I sent of him) then it got way better, invading my dreams and all.

 

But Yamu's Purple Bubble has actually worked WONDERS the last 4 nights!

 

You GO Yamu !!!!!

 

Peace, gossamer

 

 

 

 

 

I second that, this is more of a technical problem than a spiritual one I think. If you're no longer near him he can't do anything but hack you, change your operating system and chances are he wont be able to hack you anymore.

 

There are still a few things though like he can hack other places running windows with poor security and that he already has a lot of your details and identity with him. I don't know how you can fix that =S , but at least give Linux a try and save your own computer from being damaged by him.

 

I can't see any "ethical" solutions here if the law wont help you, but if you REALLY think Mak can help you I'll also pay him $10 to help you.

Edited by gossamer

Share this post


Link to post
Share on other sites

You need to understand that I did nothing. It is YOUR power, as a being of Light, that enables you to do this. You just didn't know it yet. All you needed was confidence in yourself. I think this board has been a good sounding board for you to discover yourself.

Share this post


Link to post
Share on other sites

Could I ask what an SSL Browser Service is??

 

Thanks for your help!

 

Peace, gossamer

 

 

 

In a perfect world all youd need is this guy right here :ph34r:

Share this post


Link to post
Share on other sites

I posted this elsewhere on the forum:

 

http://en.wikipedia.org/wiki/List_of_Linux_computer_viruses

I run Ubuntu Hardy Heron 8.4, a Linux distro, he's hacked the crap out of this computer.

 

Only a MacIntosh I-Mac G-4, with OS 9 on it, with an 'Alpha Shield' hardware firewall, will work.

 

Old Macs are now VERY cheap, I'm trying to work on that avenue too.

 

His magic was pretty crappy until he ran into Gavin and Yvonne Frost from Missouri (they are in the photo's that I sent of him) then it got way better, invading my dreams and all.

 

But Yamu's Purple Bubble has actually worked WONDERS the last 4 nights!

 

You GO Yamu !!!!!

 

Peace, gossamer

 

I'm sorry dude, I don't believe you when you say he hacked you on ubuntu. Please don't take it personal.

http://www.linux.com/feature/131059

If the top black hat hackers at defcon can't do it, then I seriously doubt this guy could. They shot down vista and the new Mac OS with ease but not ubuntu.

 

I still recommend you use linux on your PCs, if at all possible as its vastly more secure than windows. If your really savvy maybe something like freebsd or open solairs would be harder to hack as its more obscure than mainstream linux.

 

Also I hope things improve for you, my thoughts are with you. Pehaps spend some time doing emptiness meditation. I recommend the spring forest qigong course, and the tao of meditation (the book).

Edited by mwight

Share this post


Link to post
Share on other sites

Well said my friend :D This is worth reading again and again until it seeps into the depths of consciousness.

 

 

You need to understand that I did nothing. It is YOUR power, as a being of Light, that enables you to do this. You just didn't know it yet. All you needed was confidence in yourself. I think this board has been a good sounding board for you to discover yourself.

Share this post


Link to post
Share on other sites

I don't know your computer situation, but I would recommend using a router as a hardware firewall. Most DSL providers give you a basic router with your service. If you use PPPOE or anything like that where you have a direct connection to the internet, you really need a piece of hardware acting as a firewall. If you are using linux and a hardware firewall and you have no windows machines on your network, and you keep your linux up to date, and you still get hacked that man is a God just go head and give up and go Amish.

 

I am beginning to wonder perhaps if you might be having lots of hardware failure issues and just attributing them to hacking as you have been hacked in the past. I could see that happening. Getting hacked running linux behind a hardware firewall from a guy who doesn't even know your ip address, I don't see that happening.

Share this post


Link to post
Share on other sites

OK, I saw the "Hack to Pawn Contest" results too.

 

Are you in the United States?

 

If you are, when I get an I-Mac G-4, OS 9, I'll mail this computer to you, *IF* YOU PROMISE TO GET ALL of the trojans and worms and virus', and A KEYLOGGER OFF OF IT.

 

If you can, we can discuss payment then.

 

How's that sound?

 

I'm off to bed finally, I'll see your reply (if any) in the morning.

 

Thanks, gossamer

 

 

 

 

 

Could I ask what an SSL Browser Service is??

 

Thanks for your help!

 

Peace, gossamer

 

 

OK, I saw the "Hack to Pawn Contest" results too.

 

Are you in the United States?

 

If you are, when I get an I-Mac G-4, OS 9, I'll mail this computer to you, *IF* YOU PROMISE TO GET ALL of the trojans and worms and virus', and A KEYLOGGER OFF OF IT.

 

If you can, we can discuss payment then.

 

How's that sound?

 

I'm off to bed finally, I'll see your reply (if any) in the morning.

 

Thanks, gossamer

 

 

 

 

 

Could I ask what an SSL Browser Service is??

 

Thanks for your help!

 

Peace, gossamer

Share this post


Link to post
Share on other sites

Sure I wouldn't mind helping, but rather than me fixing it and reformatting it I'd rather teach you how to do it with linux mint. That way you knew how to do it in the future, as I am not going to be around for too much longer. When my preparations are complete I am leaving on a 4-5 year retreat to meditate and practice neigong.

Share this post


Link to post
Share on other sites

HE'S IN THE SERVERS (COMPUTERS) AT MEDIACOM HIGHSPEED INTERNET, WHAT TO YOU MEAN HE "DOESN'T KNOW MY IP ADDRESS?" .

 

THEY ALREADY *KNOW* THIS.

 

Did you actually READ my post above?

 

I USE a D-Link Router, it's done NOTHING to stop him.

 

I'm done.

 

Believe me or NOT, I don't really know what else to say.

 

G.

 

 

 

 

Well said my friend :D This is worth reading again and again until it seeps into the depths of consciousness.

Share this post


Link to post
Share on other sites

 

I give you my word that every WORD of this story is TRUE and actually

happened.

 

That's a tough situation to be in. Why do you continue to do so much via the internet/with computers? I would be avoiding computer use as much as possible if I were you.

 

And considering how extreme your response to MTS was don't you think maybe you need to look at how you relate to things/people? I would be asking myself why I seem to be running up against people, places and things.

 

Maybe all of this is telling you should go off the grid or at the very least limit your exposure.

 

Good luck and happy holidays!

Share this post


Link to post
Share on other sites

Is Mediacom high speed internet your isp? If you have cable I recommend switching to dsl, because some cable networks are shared sometimes you can access resources of others on the network if they didn't set it up correctly. Also how do you know he has access to their servers are you just taking his word for it?

 

If your running linux and have a hardware firewall in place like a router, and you keep its firmware up to date, and you keep your linux distribution up to date, and install the new version of the distribution that comes out every six months, and this guy can still hack in... That man is a god amongst men. If you have someone with an axe to grind against you, and he has that level of skill, just give up. disconnect your home dsl connection. There is nothing you can do. Use random library computers, or get a laptop with ubuntu and use it only at free wifi spots.

 

Maybe your attributing a lot of this hacking to hardware failures, or perhaps your running windows and your eaten alive with spyware and trojans that give anyone with a port scanner access to your computer. I've seen a lot of people get their credit card numbers stolen off a computer infested with trojans, I've seen them have their email accounts hacked, myspace, facebook, everquest, wow, paypal. I know thats possible.

 

I don't see how one person could have so much power, unless he has physical access to your hardware.

Edited by mwight

Share this post


Link to post
Share on other sites

The problem I see is this guy has to know your ip address to be able to hack you, so unless your computer has a trojan of some sort phoning home every time you reconnect to the internet with a new ip address (I'm assuming you have dynamic ip, not a static ip like most people) then he needs to know your ip address to get access to you computer. Just one infected computer on your network would work for this purpose.

 

Also he needs a way in, if your behind a hardware firewall like a router (and its firmware is up to date) and your computer doesn't have a trojan on it, allowing access from that angle then first he would need to know your ip address, then he would have to hack your router and then your pc, the level of knowledge and skill to do something like that is just insane. I don't believe such a person would be wasting their time on you, to be frank.

 

I recommend switching to dsl, and linux. Keep your routers firmware updated, keep linux updated. If you still get hacked then just give up, your dealing with an enemy who has god like power.

Edited by mwight

Share this post


Link to post
Share on other sites

Just a note, if you switch over your main computer to linux, and you still have infected windows computers on your network, they can do packet analysis and injection over your network. So he still could read anything you send out that isn't encrypted using something like wireshark. The amount of time this man must invest in you is considerable.

Share this post


Link to post
Share on other sites

OK Mwight, I'm gonna answer ALL of your questions.

 

1. I'm truly disabled in a REAL way, I had 10 (TEN) operations on my left knee & leg (that's called "the tibia plateau").

 

2. We live in very Northern Iowa (about 30 miles from Minnesota) and it's been snowing here for DAYS.

 

3. The computer is how I "get out" and visit the world. But in spite of that, I've seriously thought of turning our cable service OFF.

 

4. ALL of "the pairs" are already taken for DSL in our neighborhood, and have been, the whole 4 years that we've lived here.

 

5. Yes, we have "a static" IP address, that is, it changes only about once every six weeks, or so.

 

6. OK, now really LISTEN to this. OK? Back in the 80's I was a witch, I got so pissed off at the Christians (long story here) that in the Summer of 2002 that I did a very brief reprise into paganism again. *Big mistake* because THAT'S how I met David.

 

He wants to be "King of the Witches" in Arkansas, literally.

 

He wants this so badly, that he BURNED DOWN (ARSON) the house of a student of the longest practicing witch (well, a "wiccan" really) in Hot Springs, Arkansas---they had been doing wiccan stuff longer then anybody in the state.

 

David HATED them for this.

 

The Hot Springs Police Dept. KNEW that it was arson, and they KNEW that David had been seen running from the scene at 4 O'Clock in the morning, after he had thrown the molotov cocktail through these peoples attic window.

 

But he was NEVER convicted.

 

This couple lost EVERYTHING, except what they were wearing to sleep in, and their pets died in the fire, as well.

 

HORRIBLE!

 

7. We bought a pre-installed Ubuntu computer ON PURPOSE, to try to fight all of this. BUT, Ubuntu, "out of the box" UBUNTU IS ONE OF *MOST HACKABLE* of ALL the Linux distros (distributations), on the market.

 

Even after the "Hack To Pawn" contest last Summer, in Vancouver, BC, THIS IS STILL TRUE.

 

8. David kept saying to me "I'm a more powerful witch than YOU" in e-mails (on my old Windows machines).

 

He fits EVERY category of the Socio Path(ic) Personality Profile.

 

So, I'm saying that he's a socio-path.

 

9. Since he has "sudo" (administrator) control over this computer, he has installed tons of trojan's, worms, and viruses.

 

Now, if you DON'T believe me, go read the Wikipedia URL AGAIN that I sent last night, everything that I've said about Linux IS TRUE.

 

It even shows the temperature in Little Rock, Arkansas (where he lives) in the top right hand corner of my computer, in the little "weather window" box.

 

10. OK, here's the toughest part.

 

I need to re-set the BIOS BACK to factory settings.

 

And I desperately need to wipe the hard drive COMPLETELY CLEAN, but since he has sudo control over this machine, that's NOT possible.

 

He's DISABLED ME from having sudo control over my own machine! That is, HE HAS Administrator Control over this machine.

 

11. I can download NOTHING, because he will NOT "LET ME", is THAT CLEAR????

 

12. The greatest NEED (computer wise), that I have, is I need "a way around" his having sudo control of this box.

 

13. If you want, I can give you our home address in a PM and you can mail me a copy of a CD with the Linux "Mint" distro on it.

 

15. EVERYBODY in the Arkansas neo-pagan community is terrified of this guy's hacking abilities. EVERYBODY.

 

But I embarrassed him in front of the WHOLE ARKANSAS PAGAN COMMUNITY by getting him fired. And I'm NOT SORRY, and I'd DO IT AGAIN, IN A HEARTBEAT!

 

But he saw that as "A MAGICAL INSULT" to him. Do you SEE what I mean NOW??

 

Let's re-cap.

 

I need to wipe the hard drive completely CLEAN, and re-set the BIOS to factory settings.

 

I CANNOT download because of him. HE has sudo (Administrator) control of MY machine.

 

If you KNOW someway around ALL OF THIS. please let me know.

 

If you'd like to burn a copy of Linux 'Mint' to a CD or DVD, and mail it to me, I'll send you my address in a PM.

 

ANY QUESTIONS, please PM me. Thanks a lot for your help!

 

Peace, gossamer

Edited by gossamer

Share this post


Link to post
Share on other sites

Gossamer,

 

When you write the way you do, it's perceived by others as you yelling at them. We know you're in distress, and we already care so it's not necessary to YELL AT US. Not a big deal, though. :)

 

Do you have a public library near you? They usually have free internet. Just don't use your old accounts or names.

 

I think this whole thing will end soon, and you won't have to worry about it anymore.

 

-Scott

Share this post


Link to post
Share on other sites

Since you are currently running Linux, I tell you what; get the HD cleaned up or just get a small new clean drive for cheap. Put the Linux on there and get TOR http://www.torproject.org/overview.html.en. Also look at http://www.privoxy.org/ for cleaning up your info. ( there are snoopers on TOR though, so you need to encrypt)

 

To encrypt so you can check out a number of Anonymous Browsers with Encrypted connection:

 

http://www.megaproxy.com/

http://www.the-cloak.com/anonymous-surfing-faq.html

http://proxify.com/

 

There are a bunch more. I can't really comment on which of these is better. You can also set it up yourself (encryption), but more complicated. This may seem redundant, and will probably really slow down your connection, lol. But, It will be really hard to track you down. Also, since this guy knows your IP, you will need to switch IP. Either ask your ISP, and if they won't do it, cancel and get new ISP.

 

Also, since you have been keylogged to death, your enemy has all of the passwords for your hardware firewalls etc. you need to change all of those (with clean computer not connected to internet etc). For your software firewalls, many have ability to monitor incoming data packets and analyze stream to determine if you are being attacked.

 

Hope that helps.

Share this post


Link to post
Share on other sites

Dear Bak Mei,

 

Do you think that I could buy an old 'tower' I-Mac G-4 with an OS 9 Disk for what, maybe $200.00, to maybe $300.00 dollars??

 

I can't do it anytime soon, but I'm just wondering.

 

Maybe by next Summer.

 

I've got a 22 inch monitor, and I wanna use that, and that's why I'd buy a tower I-Mac G-4.

 

Could you please tell me the price range, for those kind of I-Macs?

 

Thanks for your help.

 

Peace, gossamer

 

 

 

 

 

 

 

 

 

 

Since you are currently running Linux, I tell you what; get the HD cleaned up or just get a small new clean drive for cheap. Put the Linux on there and get TOR http://www.torproject.org/overview.html.en. Also look at http://www.privoxy.org/ for cleaning up your info. ( there are snoopers on TOR though, so you need to encrypt)

 

To encrypt so you can check out a number of Anonymous Browsers with Encrypted connection:

 

http://www.megaproxy.com/

http://www.the-cloak.com/anonymous-surfing-faq.html

http://proxify.com/

 

There are a bunch more. I can't really comment on which of these is better. You can also set it up yourself (encryption), but more complicated. This may seem redundant, and will probably really slow down your connection, lol. But, It will be really hard to track you down. Also, since this guy knows your IP, you will need to switch IP. Either ask your ISP, and if they won't do it, cancel and get new ISP.

 

Also, since you have been keylogged to death, your enemy has all of the passwords for your hardware firewalls etc. you need to change all of those (with clean computer not connected to internet etc). For your software firewalls, many have ability to monitor incoming data packets and analyze stream to determine if you are being attacked.

 

Hope that helps.

Edited by gossamer

Share this post


Link to post
Share on other sites
Sign in to follow this