LEMP MANSION… meeting in a ladies room.

Don’t mind the bed bugs, mind the parasites and meetings that take place in a ladies room. In or around October of 2016 my system was hacked and all my files including personal and financial were transferred to some place remote. Both my desktop and laptop computers were left encrypted.

Upon calling my ISP (Internet Service Provider) ATT & EarthLink,{ref. # J48032044} to my surprise I found out that an unknown person(s) to me whom identified himself to my ISP as “Delancy” had successfully changed my account, name and password to my account{00000000}. Prior to this incident, I had noticed that something was wrong in my system and accounts as I was only allowed minimal access to sign in as a guest and had 1gb.

In spite of investment I made on two security software’s, I was meet with disappointment when I found out that the subjects were account administrators meaning it didn’t matter if I had install 50 security software’s since I was a guest in my own accounts. Let along the fact that every time I request a password charge, they will also get this information simultaneously as they had linked there emails to my email account. See below;

— Forwarded message ———- From: “Mail Delivery Subsystem” <mailerdaemon@googlemail.com> Date: Feb 16, 2017 3:15 PM Subject: Delivery Status Notification (Failure) To: <lazarustarchison@gmail.com> Cc: Error Icon Address not found Your message wasn’t delivered to account-security-noreply@account.microsoft.com because the address couldn’t be found. Check for typos or unnecessary spaces and try again. The response from the remote server was: 550 Requested action not taken: mailbox unavailable Final-Recipient: rfc822; account-securitynoreply@account.microsoft.com Action: failed Status: 5.0.0 Remote-MTA: dns; mx2.hotmail.com. (65.54.188.72, the server for the domain account.microsoft.com.) Diagnostic-Code: smtp; 550 Requested action not taken: mailbox unavailable Last-Attempt-Date: Thu, 16 Feb 2017 15:15:36 -0800 (PST) ———- Forwarded message ———- From: Archison Lazarus

At first the scam was executed  by poking holes through drywall as my room is adjacent to the bathroom. The ladies room meetings will take place as the subject device means and ways using some sort of infrared scanner to cypher  Gateway IP address from other electronics that were connected to the Router. Per security scan performed, this subjects put a landline and a router by which they  were able to reroute my entire service, which explain a 1gb.

They configured the service by allocating specific IP addresses to their devices running on DHCP mode, and map devices to particular static IP address. (NAT mapping). Statically IP address will eventually override security settings made on my account, router and  sever address, and they manually through their router (as public pool) specified  a desire IP address for the DHCP server to issue to the desired device and issue from. The mapping is to the WAN IP Address associated with my account. Police report was made…however I am there one been chance and harassed, WHILE the culprit are given more leeway to harass, go amazon just to invite my privacy and access to the connection via their router as is link to coaxial going through my apartment.

Fuck that this ARE serious Federal Communications Law such as Wiretap Act 

a/k/a as “Title III”, which prohibits “any person,” including law enforcement, from making an illegal interception or disclosing or using illegally intercepted material. 18 U.S.C. § 2511(1).

 

 

Advertisements

1 Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s