Thursday, April 22, 2010

4/22/10
8:45am
http://tlauren2010@gmail.com

Continued from segment two
Sometimes I would go into my office online in the one they call One Note.I would follow the commands I found written down from one of their previous meetings to see if I could mess them up. I was angry that I couldn’t have the computer to myself. One afternoon the Google Lady followed me there. I wrote her a note telling her how much I had learned about hacking from her. I told her that hacking is a federal crime punishable by time in jail. I promised her that I would see to it that she and her friends got caught. That made her real mad. She wrote me back and said that she was going to tell everyone that I was passing porn. I laughed. I told her I am a Registered Nurse and that the people who knew me would never believe the rumor. I decided the Ultimate Office had to go even if I had to sacrifice using it myself. I didn’t want my computer to be part of the conspiracy of stealing from Microsoft. I deleted the office and I began getting calls from Microsoft asking me when I was going to reinstall the office. I knew it wasn’t Microsoft, but the people in the hackers network that worked at Microsoft.

Now that the hackers knew that I knew about them, the Google Lady proceeded to take over my computer. She downloaded Explorer 8 and attached my e-mail accounts to her so she could control everything coming in and going out of my mail. She also made it a place for the people in the network to leave their messages. She set up folders with information about me and my computer in them. I found her files and folders all over my windows from my document files to my music library. She even used space in my video files. In one folder alone I found sixty files. I had to start keeping all my files off the computer I kept them in notebooks. I had one for documents, one for contacts, one for passwords, one for office, and so on.

One afternoon when I was trying to find out what was on Explorer 7, quite by accident I came upon seventy five names of people in the Google Lady’s network. They listed their e-mail address as well as their age and in some cases where they worked in Microsoft. I decided to keep the information I collected on the hackers in safety deposit boxes with friends around the country so it would be difficult for the hackers to trace even if they wanted to.

I finally got tired of them having me tied up where the phone is concerned. I figured out how to call out without being connected to the call center. I would simply cut off my husbands computer connection to the Internet and put his computer on standby. I noticed if the green lights were blinking on the Dlink modem they were on the computer. If the lights were at a stand still they couldn’t get on. I also cut the power off to the printer and fax machine, I found six people from the hackers network were using our printer and fax machine. My husband asked me why I was using the printer so much. He noticed that the ink was being used up to fast. I told him I wasn’t using the printer, but he didn’t believe me.

A couple of months went by with the usual daily clean up and me chasing after the hackers. Then one afternoon I was trying to open up some hidden files and folders when by accident I opened up an operating file. My computer said, "ERROR CODE 0x80070057"."The parameter is incorrect." "The clock has stopped." I called Dell’s technical support department and they said I would have to send my computer in to be repaired. While my computer was gone, I decided to write this article. I only had an old computer of my husbands to type on. It didn’t even have an H key that worked or an Internet connection, but I was just  happy that I could use it at all. I worked day and night writing until I was satisfied with what I read back to myself. I had to wait until my computer came back and then I planned to reinstall windows and type my article. The best part of writing the article on the old computer was the hackers were not on it and I had it to myself.

It seemed like my computer was gone forever. I was delighted to get it back. Dell replaced the mother board and the hard drive. They sent the old hard drive back with the new one. I found out later that there was nothing wrong with the old hard drive. I was glad because I had the hackers all over it, and the evidence about them on it. The very afternoon I got the computer back the neighbor boy and I reinstalled a fresh copy of windows. Not two hours after my windows were installed when I looked at my computer all lit up, yes the hackers were back and they backed up all their data on my newly installed windows.

Over the next several months I tried several times to reinstall windows as well as my network, which was another thing they were constantly stealing. Then, one afternoon while I was on the Internet and signed into Microsoft’s online safety, I noticed someone wrote in saying they were having a problem with accessing their computer. I recognized the Google Lady was writing under an assumed name and she was talking about my computer. This is a direct copy of what she wrote.

"I have trouble accessing my laptop which is running Vista Home Premium. It keeps saying it  doesn't recongnize my password which I just used only minutes before hand. I know my caps lock button isn't on. When I reboot my computer I login to my administrative account with no problem. It happens when my laptop goes to sleep on my password or my screen  saver goes on.
                                                                             Sakeopete 8/24/@12:11am"

I began having more than the usual problems with the computer. It seemed like there were more than a dozen connections that were not working. I took my computer up to Best Buy again to have the Geek Squad look at it because once again my Internet connection was disabled and I couldn’t get Dell’s technical support on without it. The Geek Squad said that all my connections had been disabled and I had over thirty errors in the device manager. They said the only thing I could do at this point was to reinstall windows

A couple of weeks went by and I was planning to reinstall windows I just needed to find someone who understood what a low level installation was. It seemed that everyone that assured me that they knew what a low level installation was, didn’t know at all and I was just going through the motions of reinstalling for nothing. Then all of a sudden I was in another go around with the Blindman on Keyboard and the Google Lady. I switched user accounts on the computer and went to the user side only to fine the remote desktop open and working. I used Fahukam as the name and default for the password and I was in. I found my briefcase loaded up with my operating system ready to be taken right off the computer and on to the Google Lady’s computer. I found out that she only had windows XP and she wanted in the worst way to get hold of my windows Vista Home Premium. Before I could stop her I saw my windows go off the computer right before my eyes. She replaced it with her windows XP. Now I had to reinstall windows.

I finally found the right person for the job at least he sounded like he knew what I needed. He sent me a hard drive with the operating system already on it and together we reinstalled windows. I finally had some time to go back through what was now twenty four months of evidence. I came upon the page once again that had the seventy five names of people in the Google Lady’s network, when I thought I was looking for what was on Explorer 7. Much to my shock I realized it wasn’t Explorer 7 I had written down; I had written down Windows 7. Now it all made sense, the pieces of the puzzle were fitting together. The people in the hackers network were stealing documents from Microsoft on Windows 7.

This article you just read is all true. The hackers are still in our home and on three of our computers as well as our network. They continue to tap our phone remotely. Microsoft has on record that my computer has been hacked. Dell Computers has also made a record of my computer being hacked. I am publishing this article in the hope that the Government and Microsoft will take notice and go after the hackers. I can’t play Nancy Drew any longer, I am only one person. I have called the cyber crime division of the Secret Service in Los Angeles Ca. only to be told to go out and buy a new computer. I find this answer to a bad situation completely unacceptable. To the people who read this article please stand up and be heard with me. Let us make our government make our airways safer for a better computing experience.

May The Good People Walk In Peace.

tlauren









































































uter. The very first time I opened up an internet account I opened it up in Google. I had this women on my webpage tell me she was my webmaster. What did I know I never had this experience before. I was in for a rude awakening.



'I told my husband about this women. My husband said, "the computer doesn't talk to you." I said, "I know,but there is this women on my gmail webpage and whenever I ask a question in the search bar she always writes back to me with an answer ". Before long the (Google Lady), for whom I nicknamed, began telling me what I could do and what I couldn’t do. I decided to call Google’s administrative office and ask them if it were possible for me to have a webmaster. They confirmed I did not.



I should have closed my account while I could. It seemed that although I knew she didn’t belong there I couldn’t get rid of her. Google also confirmed that she didn’t work for them. If she didn’t work for Google then why was she even in their building ? There were to many questions that I could not answer and in the mean time this women insisted she worked for Google. It never occurred to me that she might be a hacker.





I tried to let go of the situation so I wouldn’t get stressed out. After all, I still had a hotmail account. Then one day my hotmail account got hacked into. They only stole a couple of my contacts but the problem was the contacts they stole were businesses. I contacted the businesses right away to let them know what had happened, so whomever did it, could be stopped before they could charge a number of items up. I didn’t have to worry about getting charged myself, as I made it a practice never to charge anything online.







A few months went by without incident by the Google Lady, who would do things to me like take away my favorite webpage and tell me I couldn’t have it back unless I bargained for something she wanted in return. I always got back what ever she messed up thanks to the technical team at Internet Explorer.







One day I caught the Google Lady taking my files and putting them in folders. I told her I wanted them back. She told me, I couldn’t have them back unless I put them in one of four places of her choosing. I told her she was crazy and that I was going to report her to Microsoft’s PC safety department. By now with all the things she had done Microsoft’s PC safety department wanted me to write a letter to IC3.GOV. I wrote my letter and when I went to send it, the Google Lady deleted the address and put the Addison Jewelry Company in it’s place. Much to my shock, the Addison Jewelry Company was one of the contacts that was stolen from my hotmail account. Now I knew it was the Google Lady who hacked into my hotmail account.







I opened up a yahoo account just so I could have a place I could call my own; a place where I could go and write. I only had the account open for two days when on the second day I went to sign in and I couldn’t get in. I wrote yahoo and told them I was having a problem signing in. They asked me to verify my birthday. I told them and they said I was wrong. They asked me what my zip code was, I told them and again they said I was wrong. Now I had a case of identity theft. Computing was turning out to be a very stressful experience for me. I filed all the proper papers you need to file for identity theft and contacted the FBI and the credit services .







One day when I called Microsoft regarding a case number I had pending they recited the name and telephone number that they had attached to that case. I realized they had gotten me mixed up with the girl that stole my yahoo account. I played dumb and said, yes I am that girl. After all that was my case number. Now I had the name and phone number of the girl who stole my yahoo account. I called the girl’s phone number and just said identity theft and hung up. The next day all my files were messed up on my webpage. I am sure it was a direct result of the phone call I made the day before. I later find out that this girl is friends with the Google Lady.







Much to my surprise I got a new office program from Microsoft.They game me the MS professional office.I really liked it. I could use it for three months and then if I really liked it I could buy it. One day when I was in the second month of my new office my husband came home with a gift for me. It was the Microsoft Ultimate Office. I was so excited. The Ultimate Office has ten different modules, including a publishers office. Since I wanted to write, I thought this would be perfect for me. Little did I know that this was the beginning of the end to what the Google Lady was about to do to me.







All of a sudden I heard little clicks on the telephone. It seemed like someone was listening in on my conversations. I called the phone company to ask them what I could do about the situation. They said they could send someone out to check the phone lines but they would have to charge us for a service call of sixty dollars. Just my luck they would probably not find a tap on the phone and I was sure there was one.







There were a few other strange things that happened around the same time frame. I got a call from a man who said he was with AT&T and if we signed up for high speed broadband with AT&T he could assure me a very secure connection to our network. I also got a letter from Yahoo AT&T stating that we were to start high speed broadband service with them the very next day. I called Yahoo AT&T and told that I had not signed up with them nor did I plan to. The following day I received a router via FedEX with a letter from AT&T telling me to call and make an appointment to have the router installed for high speed broadband. Whoever was doing this didn’t know that we already had high speed broadband from Time Warner.







One evening, I was getting ready to use my computer to write off line when I noticed the computer was turned on. I opened the lid and much to my surprise I saw this meeting taking place in my office online in the one they call One Note. In One Note you can send information any where in the world in one note. I sat there and took six pages of notes while I watched this meeting taking place. The person in charge of the meeting was telling the people he wanted them to recruit one person from each department within Microsoft for their network. The purpose of the network was to steal Microsoft documents. He proceeded to tell them what kind of information he wanted and how to go about collecting it while they were in a Microsoft meeting. They were all given a task to do and a date to have it done by. In the second part of the meeting they were told to learn different ways to share files and which method would be best used to share files with other people in the network. They were also instructed to find a laptop that they love for the purpose of stealing the

No comments:

Post a Comment