My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn the phone on/off remotely, change the AT&T Cust Svc tele # in my Contacts (removing the 800 #, adding simply "611", and when I'd dial 611 I'd get a recording I knew was NOT AT&T. I took phone to AT&T; they confirmed it wasn't their cust svc line, but could do no more. However, after changing phone #'s and passwords, the unauthorized use of my bank card stopped...for a while. Then it began again, right after the same woman stopped by my house unannounced. She was parked on the road in front of the house. When I went outside to leave for the store, she walked up, acting all nice, make up a pretense for being here, and she had her phone in her hand. She didn't need her phone unless she wanted to record our conversation, but I don't think that's what she was doing; perhaps NFC? I don't know. I've had a plethora of other problems, so I disconnected the router and am hard wired now. Paranoid, I did everything I could think of the block outsiders from accessing my network or my laptop directly. I even went to see the woman, feigning to be asking for help on how to stop "someone" from draining my bank account. She only flinched when I said I'd considered getting a new router. Also, she told me last year that she's got a computer science degree and can "hack anything", but she "wouldn't dare" because it might jeopardize her job. So she's capable. She told me to change my password to something more difficult, to download an anti-virus software (I already had McAfee, which I hate, but it was there; and of course the Windows Firewall...she recommended Comodo), and said perhaps I had a worm, which she said a hacker could in theory use to suck info off my hard drive pretty much automatically. She did not like the idea of me changing routers though. This year, I've actually found her name linked to a few of the charges on my card, plus one of the charges is to a service, American Roaming Network, which can allow people to bill calls (or network service type things) to third parties. In my control panel I stumbled upon a window that shows the network connections in my laptop. Usually, I'll see the printer icons, an icon for Windows Phone ("grayed" out if it's not plugged in), the icon for the cordless mouse...you know, Devices. This time, though, I saw something new: an area titled "Multi Media Servers", and in it were 3 icons that look like little safes ("grayed" out). One had my computer's name, one had my (recently closed out) email address, and the third was called "Kona Films" (no clue). All were called "multi media servers" and operated via Windows Media Player. In Networks and Sharing, I found where things were set to allow other users on the network to CONTROL AND CHANGE MY NETWORK AND SECURITY SETTINGS, and to not only stream my music and videos, pictures, DIRECTLY FROM MY PC, WITHOUT ME KNOWING, but also to put things ONTO my PC (that could get a person in big trouble if some miscreant felt like framing someone, like someone they were hacking who was getting too close maybe? I don't know, but it stinks. Also, lately, my laptop shuts down BAM, without the usual low battery warning, and yesterday the Word file I had open when it happened was not recovered. Can't locate it anywhere. Error message said "cannot open...check file extension...", but in Properties everything looked normal. I found a weird file I did not save or create in My Documents tonight, simply saved as "21", a Notepad doc (I don't use Notepad), so I opened it. It was garbage to me, but it led me some window about backing up file histories, and there were three "folders" selected for backup, one of which (I forget the name now) listed something under "Exclude" (from backing up, I guess), listed just like this: "AppData;AppData;AppData;AppDa" (it ran out of room). That led me to the File History Backup Log. There were 95 events between end of February and May 2, 2015. All were either Warning! or Information or Error events in something called the File History Engine or the File History Core. Only about 5 were in the Core. In all those labeled F.H. Engine, there was a "security>userID" that was "S-1-5-21 - 1709......." (about 20 more digits, always the same string), BUT in the events in the Core, that UserID changed, to "S-1-5-18" (without the long string of other digits after); likewise, all events in the Engine were in folders I know and use (Documents, Pictures, Music...); but every time the UserID changed and the event was in the Core, it affected folders called "AppData" -- same name as those excluded things in the previous window. I don't know squat, but I know it means something significant, for there is only one user of my PC, and it's me. Further, in the My Documents folder, I've noticed new files popping up that I did not put there (like "21"); many have funny names, & when I open them, most say similarly the likes of: "the file does not exist", "java script error...'self' is not defined" and there may be an Identifier in a different file but connected to the first, which I just now learned (I think, if I understood it) is indicating a whole bunch of Java Script files strewn among my regular files. I googled Java script files and read about them, only to find I'm even more confused now. I think all these weird goings on are connected, and my son thinks I'm a loon. I'm not a loon, just clueless, frustrated, and getting either over-imaginative or paranoid (not to mention broke). Okay, so here are my Qs": 1. My laptop...how can it become a MMS (I think that's the right abbrev'n)? Same Q about my old email address...how can an email address become a server? Could a person use other people's devices as servers or routers or (? here's where it gets hard 'because I don't even know how to phrase the Qs right!) and then use them to hack into bank accounts, go phishing, send spam, open websites for profit that (get this) teach how to hack, reroute people's calls to some other device they control for heaven knows what purpose, etc.? What is the benefit of "spoofing" someone's IP address? And most of all, HOW on earth can I spot her activities, how do I identify them, and can I trace them back to her using anything like a reverse phone look up type of thing? The police won't make a report of identity theft via hacking because they don't understand how it could possibly be done and I can't explain it well enough. The FBI hung up on me. I filed a complaint with the FTC, but to myself I think, "good luck with that one". I know she's doing this, and not just to me. It's a whole scam she's running. BUT HOW DO I PROVE IT? Blargh! Please, please help, anyone! I need clear, simple directions that a kid could follow (in fact, a kid could probably follow them better than me...I'm 53 and this new tech stuff isn't my bag. Oh...I also get a lot of "Error 404: cannot find server" messages, and there's a new "file" under My Documents with an icon like a gray box with black characters on top and a blue musical note at the top right, and it's entitled "email@example.com (nameofmyPC)", and when I try to open it the box opens saying "Access Denied. firstname.lastname@example.org (jc4god) is denying access to your PC. CONTACT THE OWNER OF THE MEDIA SERVER TO ALLOW YOUR PC TO ACCESS IT". Huh? Oh, AND, under Windows Firewall in the Control panel, it shows that the "private network" is not connected (it's not...I unplugged the router) but the firewall is on and there is a green shield icon with a check mark in it; but what's really weird is that that PC is not connected to internet at all, not by cable or router, but in the box called "Guest or Public Networks" there is a red circle with a slash, but it says Connected and says the firewall is on. Even with the router, I'd set it up as a PRIVATE network, not public, so what is that? Could it refer to the use of my computer and old email address as "multi media servers", and could they be "public" or "guest" because it's what the hacker's using? I'm so confused.
Thanks! We'll email you when relevant content is added and updated.
Share this item with your network: