What had happened

Yesterday evening, my Skype window kept getting opened all the time. He – whoever – would not let me upload my latest booklet to Amazon – I had tried for a week – and I decided to put it on my website and on ResearchGate and be done with it.

While I was on ResearchGate, I discovered some new stuff about a “business card” and profile, and I found that ResearchGate – was it really Researchgate? – had added some CV details that were incorrect (different countries, different years) so I decided to correct that and – heck, why not – add a few details, make it more complete.

Meanwhile, this inane Skype shit continued to happen.

Then suddenly my goddamn computer froze again, and I was suddenly on some GREEN YouTube page in my browser. Had to flip the power switch, as I so often need to do to get out of the goddamn hacker freezes – and Linux installs do not like that.

At the end of May, I had started getting those weird e-mails about some package on the way for me. That turned out to be some stupid book, a nice little “nah nah nah nah nah” taunt that I decided to ignore.

While that was on its way, sound got disabled on my PC. (I had signed up to two online events that I didn’t attend.)

On Wednesday, I suddenly had this page below open on my screen. (I was doing something else at the time, wasn’t at my computer.)

I decided to ignore it because all it spells is sadism. “You are powerless and we/I can do whatever the hell we/I want and we/I will sabotage everything you do, whatever it is, as we/I have already been doing for over a decade.” This shit is soo soo soo immensely vicious.

It is so abusive.

On Saturday morning, my browser briefly flipped to BBC weather. That’s happened before. It seems to be intended to hint that it’s nice weather and maybe I should go for a walk so that some vicious shit can pick the locks again while I am out and carry out some nasty or crazy shit in my flat while I am out.

It has also once been done by a young woman at one of the public libraries; I did go for a walk, ran into bizarre stuff along the way and came home to my door demonstratively standing open and the following morning, I discovered that some bizarre shit had happened in my bathroom while I was out.

There was more last week but it does not matter. (Stalkers stalk just about 24/7 after all and most of their shit is really really boring. All you can do is… nothing. Just wait till this shit finally finally finally stops. You can’t do anything of substance, really.)

Some vicious shit had been in my flat again on 10 May too.

(Wanna take a guess as to who that may have been?)

Phones continue to get shut off – so that for example I miss my eye drops reminder – and rebooted and some get hot.

I don’t seem to be reachable at all on my main phone (except when it’s stalking-related). It is also possible that one phone – the one from which I called yesterday – has been disabled such that calls seem to go out but don’t. Hard to tell what is what if you don’t own a single piece of equipment that has not been hacked to shreds yet.

Whoever is doing this is a vicious sadistic monster.

As you saw in the other post, I totally demolished my phone (which I use for tethering my PC to) and I also threw the stupid book into the trash. Then I went for a long walk. (Ran into a misogynistic piece of shit along the way but nothing much happened. I am so fed up with England’s immense and immensely shameless misogyny.)

I have put the SIM into the phone that no longer seemed to be working anyway, in terms of being able to make calls and send texts. It gives me internet access (but my phone credit is about to run out; well, within a few days).

There is a local Green Party meeting on Zoom today but I won’t attend, for obvious reasons, just like I did not attend the previous one either. (Whoever is doing this to me won’t think twice about doing anything to anyone for any reason after all – which is actually usually no reason at all, other than “because he can”. If it is something local, he is more motivated to do some stupid shit, however.)

Argh

I wish I could kill whoever is FUCKING WITH MY COMPUTER AGAIN! GODDAMMIT.

I mean that. I hope that whoever this is gets Covid bad and then lung cancer and suffers terribly because it is a sadistic monster.

The powerlessness – it’s been over 13 years! – just makes you want to kill yourself so that you finally finally finally get your life back from whoever this vicious monster is.

Ik ben die terreur spuug- en spuug- en spuugzat!

A YouTube-related question

When I edit the subtitles that are automatically generated by YouTube, I find that some videos say “you” or “so you” or “so very you” or “foreign” or “do foreign” at the end. It strikes me as odd.

Is this some kind of artefact? Does this happen to other people’s subtitles too?

Does it mean that the YouTube process does not know how to interpret the start of music? But it’s always the same music, so why would it sometimes hear “foreign” and sometimes hear “so you”?

It’s official. As of today, I am no longer a delusional old cow. :)

One by one, literally everything that I have been saying about (my experiences with) hacking and modern communications in the past decade was later echoed in the media. Years later.

Now Ofcom is saying that the UK is behind in tackling number spoofing and that you should not trust caller ID.

https://www.bbc.co.uk/news/business-56934517

And Bol.com – that’s the Dutch version of what Amazon once was – just paid €750,000 to what it thought was the company Brabantia, a brand that makes high-quality products that you can also find for sale in the UK.

Anyone who still believes that I am delusional or paranoid because of what I have said and say about hacking and modern-day communication methods needs to have his or her head examined or finally finally finally update his or her wall calendar to the year 2021.

(Insufficient awareness of the existence of number spoofing and e-mail spoofing could also pull the rug out from under a few convictions.)

Hackingtainment

So you’re self-employed and someone sends you a spoofed e-mail with work in it. How do you know it’s spoofed? You don’t. Do you open the attached file from your client? Sure, why not. Could it contain custom-written code? Oh yeah. Think your antivirus will catch it? Think again.

Oops. Too late. You’re already toast.

Think that only big companies have to be concerned? Bwah ha ha ha.

Here is some more pretend-hacking for you

This guy is not really talking about hacking. He is just pretending that he is hacking so that he can hide that he does not even know how to switch his computer off. And if he is hacking after all, oh well, just block the guy on Facebook and you’re done.

Oh, ha, Meterpreter. Does not exist in real life, of course. That hacker is just making that up, too. Just like Metasploit. Does not exist either. Just like there is no poverty in the UK. Evil people are just making that up for political reasons. That there is a shitload of deep poverty in the UK, along with a lot of hate for women and other kinds of hate. Not true. Ask Piers Morgan.

I’m vulnerable!

In this video, I am sharing my darkest secrets and revealing all.

Sure, some things that I originally thought were hacking-related were just quirks. And when important things happen that I may have to respond to but am powerless to do anything about, that’s when the hacking is usually the factor that causes the biggest powerlessness so I am sure that I do rant more about the hacking at such a time.

By the way, I still need something else besides low-pass filtering, but I am not going to say out loud what that is and I don’t know whether I will be able to arrange it. Plus, I have no certainty yet that my door is secure now.

What I say in the video? The following.

Hi. My name is Angelina Souren, in case you didn’t know that yet.
I’m a Dutch woman in the UK.
I’ve previously lived in the United States, in Florida, and spent most of my adult life in Amsterdam.
As many of you know, I’ve been dealing with a heck of a lot of hacking, although it’s been said that I’m just an older woman who doesn’t know where to find the on / off button on her computer and is no longer able to cope and ascribes everything that goes wrong to hacking.
And particularly when something considered stressful is going on in her life, she becomes delusional.
<sarcasm>Yeah right</sarcasm>
I took some programming at university, I went to university a little bit later in life, I have built computers from scratch, I have built large websites, written my html in notepad…
I am not an IT expert but I’m nowhere near as stupid as the people… some people in Portsmouth make me out to be.
I am usually being hacked via the electricity circuits in this building.
How did I catch on to that?
One day when I left the building, I realised I’d forgotten something, dashed back into my computer (lol) dashed back into my office where I had left a computer on, an offline computer.
And a program had been opened on that computer.
I had not opened that program.
That’s when I thought it had to have something to do with the power lines.
So I looked into that and sure enough, power line hacking is possible.
And i understood that you have to put an extra resistance on the line.
So I took a timer, put it between the socket and the plug and there was a heck of a lot of clicking.
You know, the way these timers do.
And after a little while, there was a window that popped up on my screen that said something like “Thought you could keep me out?”

<sarcasm>Yeah, I’m making this up. I’m delusional.</sarcasm>

Anyway, how this happens is as follows.
Five years ago, I would have sounded completely crazy, but most of you now plug in these little things to spread wifi through your place.
There is unused bandwidth on the electricity wires.
Power has a frequency of 50 – 60 Hertz.
Data has a much higher frequency so these two don’t interact, usually.
That’s also the solution to my problem.

I wish someone would have told me this years ago but everyone just… shrugs, I guess.

A low-pass filter is what I need. Low-pass filtering is what I need to cut off apparently all the power line hacking.
It’s as simple as that.
It’s not expensive as far as I can tell.

But everybody pretends that it’s 1985 and that we’re all still sending paper postal mail and that the digital world does not exist or basically is 100% safe and that anyone who pretends -pretends! – hacking exists is crazy.

<sarcasm>Yeah right.</sarcasm>

And before anyone starts hollering that you need physical access to be able to do that… yeah my locks were getting picked all the time.

I’ve just installed a new lock.
I’d installed a new lock before, I’d added locks.
It was not sufficient because we’re not talking regular burglary, we’re talking targeted mischief.
Hopefully this new lock is going to be sufficient.
I don’t know, time will tell.
But, yes, physical access was possible.
I don’t know exactly what they’ve done.
I do know this: the people who do this or the person who does this is or are very good at hardware hacking.
Hacking basically consists of three components.
People hacking, also called social engineering.
This is a very important part of hacking nowadays.
Software hacking.
And hardware hacking.
Tricking the computer into thinking that for example its hard drive is filled.
I have been looking around for gadgets.
I did at one point find that a socket, a light socket, had been opened and the screws had been loosened.
One of the screws was lying in the recess behind the light switch.
I had actually fixed that particular light switch before so I knew for a fact that both screws were in their places, tight and needy.
Yeah, neat and tidy and tight.
But I didn’t see a gadget.
There may be gadgets that I have missed.
And it’s been suggested quote unquote that there are bugs all over the place.
I don’t think that’s the case.
But how the hell do I know that it’s not the case?
I haven’t spotted anything weird, anything out of place but that may just be me, unfamiliar with that kind of stuff.
Who knows.
Maybe… maybe… maybe…
Maybe this thing here, maybe this thing has a secret camera in it.
Who knows.
(I’m just kidding.)

(I was just kidding about there being a hidden camera in that picture frame. Not about the rest!)

For all of you who still believe it’s 1985

The first bit in the first video – two years old – happened to a CRYPTOCURRENCY EXEC. Not the checkout girl around the corner or the older female adult who barely knows where to find the on/off button on a computer. (The latter would be a stereotypical assessment of me, ha ha, and my assertion that I am genuinely often dealing with hacking would typically be attributed to that plus that I “get delusional when stressed”.)

A friend/colleague of mine in the Netherlands, with PhD in math/physics/computer science, also recently got tricked TWICE, over the phone. Thankfully, other companies spotted the problem and protected her finances.

So I have been trying to tell Portsmouth City Council that currently, for example, anyone can call – or e-mail – local people, pretend to be PCC and ask people to pay, say, council tax over the phone, using their bank card. Because of the lockdown, this type of fraud is much easier at the moment.

Yes, PCC, it is possible to fake an e-mail address and it is possible to fake a phone number.

I have raised this problem with several UK electricity companies – that they have NO SECURITY on the accounts and anyone can mess with your account if so inclined, such as close it or tell them that you have a new address – and the people I spoke with had NO IDEA what I was going on about.

One snapped at me that she simply had to ask me questions because of privacy regulations. She of course knew my DOB and likely quickly made the “useless old cow” judgement. She did not GET that the answers to the questions she asked are largely all over the internet – for example because I am a Company Director – and are in various databases that are accessible to literally thousands of people.

(I hung up on that person. She was rude.)

It’s totally NOT ROCKET SCIENCE.

Below is a video that I have posted before. It is about 18 months old.

The other side of this can be that if for example you lose your Google Authenticator app because your phone quits on you and you made no backup, some accounts ask you to supply a list of all your recent transactions as well as (a list of logins with) IP number – if you don’t have a static one, this can be a pain – and take a selfie with an ID document in such a way that the ID document is legible. It can be annoying and I have once gotten really annoyed about it because my selfie with ID kept getting rejected. But it’s better than the alternative.

Speaking of ID, if you need to supply an ID document WRITE ON IT, either digitally or with pen or pencil if you scan a copy, when and to whom you are supplying it. Through the actual document, in large letters, such that it cannot be easily used by someone else to steal your ID. This is a tip given to me years ago by the local Dutch consul.

You’ll also want to watch this one.

How to hack and do stuff to someone else’s gear

Which can happen with the full cooperation of landlords, by the way. Because the gear needs to be on the network.

Ha. this may explain why I couldn’t find my phone’s MAC address yesterday when I searched for it when I wanted to tether another phone via Bluetooth.

And my HDD is being way too active again right now.

(Ah. I think that someone was desperately looking for my webcam? I’d unplugged it as I have decided to stop using it because it makes me look like I am in 1999, lol.)

Hacking: Tampa Bay area water system contamination

Are you going to tell me now that these people, too, simply do not know how computers work and should get with it or become delusional when under stress? Must be the pressure of the pandemic that causes that stress. They’re merely imagining it. </sarcasm>

https://www.reuters.com/article/us-usa-cyber-florida-idUSKBN2A82FV?taid=6021f604c9fa87000190e3db&utm_campaign=trueAnthem:+Trending+Content&utm_medium=trueAnthem&utm_source=twitter

Pinellas County is where I used to live. I’ve visited one of its water facilities. A different one.

Oh yeah

So I am editing categories, reorganising this site, and all of a sudden, my browser resolution blows up, forcing me to decrease the browser view from 100% because stuff won’t fit onto my screen.

Yep, that too has happened many times before. Yep, I think it’s another hacker thing, some kind of message along the lines of “see the bigger picture”. As seen through whose eyes? My views are as valid as anyone else’s. And vice versa.

But maybe I am lucky and it will turn out to be a mere technology hiccup.