If you have not seen it, I recommend you watch “Enemy of the State” this weekend. As I try to rebuild the damage that was done, I did what I usually do when something doesn’t make sense….I got stuck. The thing that makes no sense to me, is how they knew. If in fact the hackers were the usual suspects, then ….rather….no…you see what I mean? I’m stuck. I’m stuck because I’m 99% sure, that they had nothing to do with it, …despite their signatures being all over it. Am I making any sense?
Someone using a Russian Federation IP address was involved, but despite no apparent entry into the site, it turns out, that the origin of this particular user comes from Dallas, and the Russian Federation IP was a spoof. For those that don’t know, I can thing of 4 of five people, two of which used to be part of this before starting their own websites and chat rooms, that chose another path as a general hobby of ruining my life whenever possible.
The people came in somehow after acquiring my password and conveniently deleted things such as the membership files and my provisional patent application, that I had stored here.. Think about that for a moment…They deleted , OR DOWNLOADED AND ERASED my copy of what could be plans detailing how this works. The hackers deleted or downloaded all of the membership files…in other words, they came and took what they could not get for free, and that is where the file erasures and deletions ended.
There’s no secrets so we all know that if I could starve to death or tragically die some other way, there would be a celebration in at least 3 SIRI or similar investment related sites, in which the owners of those sites that I had at one time or another worked with, simply tried to screw me over. Years later, they are like crickets that chirp all day and night about me, but the the second I walk by them they S.T.F.U. and have nothing to say. Which leads me to this part that troubles me. Combined, they are not smart enough to have done what was done..
Anyone can erase a file. This hack was nothing less than a planned and trained for, terrorist attack. It began around 4:30 or 5:00 am yesterday if I recall correctly.., and as I was wondering what was happening, the damage was done, and in the end no virus’ were planted, no one’s email addresses were taken, and no personal information revealed. Who would possibly do such a thing? Whom, Indeed? Whoever it was, thought they got what they came for, but unfortunately for them, they took the wrong box!
I just verified the time and I’m even more shocked at the precision that was used. These people, be they of our own Government, overseas or domestic Allie, or an Enemy of us all,… were here to steal my analysis system. What they got instead was code to get well known and highly publicized end of day and historical data. I didn’t put my own patent pending (I love that I can say that) data in yet.
So let’s look at the facts:
- They took or destroyed my provisional patent app. Nothing else was missing in the files around it.
- They took via download or otherwise destroyed, all of the members only files that could not be seen by non members. The same may have assumed that other clues and hints into how the system works might be hidden in documents there.
- They didn’t touch the forum, which if it were the usual suspects, would have been wiped out first, to drive anyone here to there as everyone was just about waking up .
Now you know I saved the best for last on the evidence sharing part of this..
Yesterday, I had attempted 30, 40 or 50 times, as I have done tonight, to get the program I kinda wrote by changing, to restart. Instead I’m plagued with an error that does not exist. There is a script I think, embedded in my script, so it will get burned a rewrite by me is in order…thank God I have backups! Do you think a couple of bloggers did this? Not really, but they could have had help… So then, explain this one….
Above, and on the left, you see a listing of ticker symbols which happen to fit the viewing panel perfectly when stretched, which is a good thing…because there are no tables behind it. As soon as it began running, they moved in, and if you look at the time stamps, it took them 8 seconds to “steal” a half century of my work…Foolish Mortals! In 8 seconds they managed only to wipe out very specific folders, delete files of minimal importance, and walk out with information freely available to anyone on Yahoo!, Google, MSN or most anywhere. They thought they got my Alerts….They thought they got my short data. It’s useless without me to program it…I have a ten year head start on it …
I may have to run this program from a remote local this weekend. I smell a rat, and it looks like I finally got noticed, …Lord Help us all! I’ll resume coverage of everything Monday….it’s almost over now.