Tag Archive | "biocrime victim"

Terror in Suburbia

Tags: , , , , , ,


Imagine that you live in a small suburban community and that you stumble upon a covert network.  Are they computer hackers, identity thieves, foreign or domestic terrorists, or – perhaps – something worse?  They assume control of your mobile phone, computer, and every device you own that employs computer or communications technology in its operation.  They track your every movement via GPS technology.  They gain access to your home and remove items of little consequence in a bizarre game to make you aware of their presence.

 

They have infiltrated your community, purchasing houses in your immediate neighborhood.  From all outward appearances, they seem to be typical community members.  They communicate with each other furtively and identify themselves to other network members via unobtrusive signals such as peculiar exterior lighting of their homes.  Upon their entry into the community whether via purchase or rental of a home, they often remove or dramatically prune trees – creating lines of sight among the properties of those suspected to be in the network.  For the most part, those whom you suspect rarely leave their homes and do not appear to be employed.  They can be observed to be up all hours of the night and appear to launch and track some kind of drone or other aerial device.

 

Flash back a little more than a dozen years.  You are a successful recruiter, on the cusp of wealth and industry renown.  The Internet as a recruiting tool is in an early stage of evolution.  Recognizing its power, you conceptualize a website that will automate the recruiting process and permit you to identify viable candidates and fill job openings on a scale that would have been unprecedented in decades past.  Eager to seize the moment, you seek out a software and Web developer who can bring your concept to realization.

 

Concurrently, you are experiencing significant issues with your home office-based computer network, issues that are impacting your productivity.  In an online recruiting forum, you meet someone whom you believe to be the answer to your prayers.  The catch is that he is located 80 miles from your home and inexplicably, for someone of his age, does not own or drive a car.  Undaunted, you suggest and arrange to have him picked up at a train station near your home.

 

He arrives and is unable (or is it unwilling?) to complete the project in time to return to the station to board the day’s last train to his home.  As the work drags, he suggests that he is amenable, after catching a few hours sleep, to working through the night to complete the project before returning home the next day.  Your partner, uneasy with the prospect of a total stranger spending the night in your home and suspect of his character and motives, recommends against it.

 

You ignore his advice, and when you awake in the morning, you find your computers totally reconfigured in a fashion that you had neither requested nor desired.  Nonetheless, they are working, so you acquiesce.  He has additional suggestions which require him to stay the remainder of the day before returning home that evening.

 

Despite his lengthy visit, problems with your systems persist, requiring this individual to make additional repairs remotely (he has setup remote access to your systems) and in person.  You come to rely on this individual and view him as a computer genius.  As you learn more about him, however, you discover that he is a performance artist and independent filmmaker and that his filmmaking reveals a dark side to his personality. His online persona and moniker attest to this. Perhaps, your partner’s initial assessment was right.

 

In the course of using your “repaired” computers, you discover files that you never created.  Additionally, you find entries in your browser history for sites you did not visit; often, sites relating to odd diseases or those providing information or component materials for chemical, biological, or nuclear weapons.  Is it possible that your computers are somehow being used as a gateway for discrete Internet access by your computer genius or others with whom he is affiliated?

 

But, you cannot completely focus on this individual.  Your technology issues have become larger than simply problems with connectivity and computer performance and reliability.  Your website is not progressing as anticipated and the costs (billed on an hourly basis) are skyrocketing.  After considerable delay, the developer presents a working prototype.  You learn, however, that – despite the hours spent and cost of development – you do not actually own the entire website created!  The developer informs you that the technology that drives the capture of job candidate information, the heart of the website, is proprietary and that, for reasons of safeguarding his intellectual property, you must utilize the developer’s web hosting company.

 

At this point, your partner gets involved, demanding the transfer of the entire website to a host of your choosing and threatening non-payment on the outstanding balance should the developer not comply.  The developer’s response is to launch a denial of service attack, spamming both your email and fax machine.

 

During the course of your involvement with both the computer genius and website developer, you casually mention to each your involvement with the other.  Ultimately, you sever your relationships with both individuals.  Subsequently, as you find your business negatively impacted by changing economics conditions and sabotage on the technology front, you are left to ponder the part played by each of the two individuals whom you retained to help you grow your business.

 

9/11 intervenes and your business grinds to a halt.  A lawsuit filed by the web developer is dropped during mediation at the courthouse as a result of your countersuit.  You never again hear from the web developer.  Yet, oddly, you receive cryptic email messages from the computer genius, the last of which states “it’s not about today, but also the future.”

 

You begin suffering a variety of health issues, an “uncommon bundling of common symptoms.”  Spanning virtually every medical specialty, your symptoms defy a unifying diagnosis.  You seek out consults with specialists, many of whom are renowned in their respective fields – to no avail.

 

Desperately searching for answers, you scour the Internet for information and come to some startling possibilities.  Was your computer genius also a medical genius?  You now recall his mentioning a close association with a medical professional with ties to a Middle Eastern military intelligence organization.  Could you be a target for elimination by some subversive group?  If so, why?  Thereafter, you begin to witness others with whom you are close suffering unusual illnesses.  Are your family and friends also being targeted?

 

As time passes, odd occurrences become the norm in your neighborhood.  New neighbors arrive who keep unusual hours.  Lights flash on and off in their homes.  At night, you witness strange lights in the sky and observe – through the trees bordering the properties contiguous to yours – launches of some type of device from the back deck of a neighbor’s residence.

 

Individuals, not from the neighborhood, walk and run on the street in front of your home – sometimes veering off the road onto private properties when they realize they are being observed.  On one occasion, on your return from a trip at night, you turn onto your street and a man walking on the side of the road scurries behind the wooden fence of a property several doors away from yours.  On another, you observe someone walking a bicycle on your street in the middle of the night.  As the headlights of a car turn onto the street, this individual hides behind a tree on your property and waits for the car to pass.  You hear footsteps on the street outside your home during early morning and late night hours and witness unknown individuals running on the street – sometimes wearing apparel not suited to exercise.

 

As the number of such incidents grow, you mount surveillance cameras in various strategic positions on your property.  These cameras capture images of unusual lights, swirling dust circling your home, vehicles stopping outside and idling on the street in front of your property at odd hours, and unknown persons – in some cases crossing your property.  In one striking instance, three individuals are observed coming from a property behind yours and onto your immediate neighbor’s and either placing or retrieving something from the ground below the row of evergreens separating the properties.  In another, lights illuminate a portion of your backyard in the middle of the night – one appears to be a flashlight, the other illuminates a broader circular area.  The individual or individuals  behind those lights never appear in the video and the lights do not move as if someone were crossing through the property.  Who shone those lights and what were his or their motives?

 

At multiple points in time over the course of a decade, you attempt to engage law enforcement.  Concerned that your initial discovery may have implications beyond yourself – perhaps, nationally, you contact the FBI, only to be informed that you must begin with local law enforcement.  Convinced that the hard drives on you computers contain invaluable evidence, you have had them removed and replaced multiple times – saving the drives removed for later forensic analysis when you have gained the cooperation of law enforcement.  Surely, law enforcement will have interest in uncovering a covert network that may be a threat to national security.

 

You are amazed that, in the post 911 world, law enforcement at all levels has no interest in what you have observed and discovered.  Local law enforcement, you discover, is a joke when it comes to investigation of cybercrime or, for that matter, any criminal activity that is out of the ordinary.  Likewise, you make no headway with county or state investigators.  And, your efforts to engage the FBI are similarly fruitless.

 

You change your course of action and turn to public health.  Surely, you believe, those charged with protecting the public from disease and natural disaster, whether acts of God or manmade, will have interest in you both as a medical specimen and for what you have discovered and learned.  Your hopes quickly turn to disillusionment as your efforts to make contact are either spurned or ignored.

 

Your experiences with law enforcement, the medical establishment, and public health convince you that the United States is woefully unprepared to protect individual citizens from threats of cyber attacks and bio-terrorism.  A novel attack on an ordinary individual has a virtual 100% likelihood of success with extremely low probability of detection and identification of the perpetrator(s) by law enforcement.  Authorities at the local, state, and national levels would have to receive hundreds if not thousands of similar reports before launching any level of inquiry or investigation.  It is for this very reason that the early victims of a nascent epidemic – if the disease is uncommon in the particular geographical area – frequently suffer the consequences, including death, of their misdiagnoses.

 

Like an early victim of a newly-evolved disease, you find yourself isolated.  You are disbelieved and even mocked by law enforcement and labeled as delusional by healthcare professionals.  Even those closest to you question your credibility and sanity.

 

At the core of your being, however, you know that you are neither lying nor insane.  You suspect that there are others like yourself – targets of those who indiscriminately ruin lives with impunity.  You search the Internet and find others whose stories have some degree of similarity to yours.  Yet, you know that ultimately, this is your battle, a struggle for survival, a fight from which you cannot retreat at the cost of your life.  And so for now, you find yourself isolated and terrorized in suburbia.

 

Author’s Note:  If you are a law enforcement, technology, or medical professional – either active or inactive – and have interest or believe you can be of assistance in this case, contact me via this website.


Remember Pearl Harbor: A Biocrime Victim’s Tale

Tags: , ,


What is Bioterrorism

The article that follows was written by the victim of an ongoing biocrime.  It is published here in the hope that it may ultimately filter down into the hands of someone with the intelligence and capacity to help.  The article, unfiltered, is as follows:

 

Surprise, when it happens to a government, is likely to be a complicated, diffuse, bureaucratic thing … It includes gaps in intelligence, but also intelligence that, like a string of pearls too precious to wear, is too sensitive to give to those who need it.  It includes the alarm that fails to work, but also the alarm that has gone off so often it has been disconnected.  It includes the unalert watchman, but also the one who knows he’ll be chewed out by his superior if he gets higher authority out of bed.  It includes the contingencies that occur to no one, but also those that everyone assumes somebody else is taking care of.  It includes straightforward procrastination, but also decisions protracted by internal disagreement.  It includes, in addition, the inability of individual human beings to rise to the occasion until they are sure it is the occasion – which is usually too late.  (Unlike movies, real life provides no musical background to tip us off to the climax.)

 

Finally, as at Pearl Harbor, surprise may include some measure of genuine novelty introduced by the enemy, and possibly some sheer bad luck.  The results, at Pearl Harbor, were sudden, concentrated, and dramatic.  The failure, however, was cumulative, widespread, and rather drearily familiar.  This is why surprise, when it happens to a government, cannot be described just in terms of startled people.  Whether at Pearl Harbor or elsewhere, surprise is everything involved in a government’s failure to anticipate effectively.  Foreword by Thomas C. Schelling to “Pearl Harbor: Warning and Decision” (1962) by Roberta Wohlstetter

 

I am the victim of a biocrime.  A highly unlikely situation, I understand completely.  However, I did not choose to be in this situation nor am I the creator of the bizarre events that I am reporting.  I am the victim of an individual who is criminally-insane with capabilities equal to those of a bioweaponeer.  I am attempting to gain access to individuals who will initiate a microbial investigation, identify the source of the disease process, find an antidote, and alert the appropriate authorities of the lethal capabilities of the suspect.

 

My recognition of a biocriminal assault became clear after the sudden onset of numerous signs, symptoms, and illnesses – currently undiagnosed and untreated – affecting virtually every organ and system in my body.  Concurrently, I discovered volumes of hidden files about bioweapons and emerging diseases on my computer, together with information identifying the computer vendor with whom I had contracted as the owner of these files.  He is the individual poisoning me, gaining undetected access to my home since he last visited it to repair my computers.  Make no mistake, this individual is no ordinary computer repair technician, but – as I have since learned – a genius with a wealth of resources and knowledge regarding not merely computers but also medicine, disease processes, bioweapons, and communications technology.

 

In April 2002, I contracted with the suspect to secure and repair the computers that I used in conjunction with a successful home-based business.  As I later discovered, he arrived with a hidden agenda and installed a covert network on my computers so that he could go online anonymously while hiding his identity behind my IP address.

 

Examining hidden files not normally visible to the casual computer user, however, I was able to identify Websites visited while the suspect was shielding himself from identification via my IP address.  I came across hundreds of hidden files on my computer revealing his unusual obsession with emerging diseases and weapons of war.  Websites visited included those relating to scientific research at colleges and universities worldwide, numerous databases of hazardous materials, a template to create a phony purchase order, information on biohacking, genetics, chimeras, sites to purchase spores, viruses, parasites, molecular tool kits, and culture kits, how to build a glove box, and self-made videos on weapons, torture and murder.  Other files I discovered related to the leasing of bench time at labs in Philadelphia, how to gain access to labs at The College of New Jersey, where to purchase used lab equipment, files on DNA/RNA and genetic splicing, where to purchase potassium iodide, vaccination schedules by the U.S. Department of Health, and where to purchase diseased animal parts.  Files of a non-technical nature that I found related to the airline industry, where to lease planes and helicopters, flight training, air quality studies and logs for Iran and the United States, the transfer of oil from Canada to Portland Maine (in minute detail), the location of every public and private water supply in New Jersey, hunting land for sale in Hillsborough, and the times of unescorted tours of the White House.  In my opinion, there is little doubt that I have identified someone who could be involved in terrorism.  I have since concluded that the suspect is a lone wolf, a domestic terrorist, and a bioweaponeer who possesses an unusual and extremely sophisticated familiarity in the design and creation of bioweapons.

 

Upon finding evidence of this hidden network, I reported it to law enforcement, because it was preventing me from running my business.  The poisonings, I believe, were and are in response to those reports.  

 

Since that time, I have sought out medical treatment.  I present with symptoms of numerous disease processes including Lyme, Morgellons, Chagas, Onchocerciasis, Lymphatic Filariasis, MRSA, schistosomiasis, and others.  Some of my symptoms closely resemble diseases that affect only animals, a fact that might partly explain the inability of the doctors I have seen to identify the root cause of my illnesses.  It does not, however, release them of their responsibility to report a potential criminal event to the appropriate law enforcement authorities.  The doctors to whom I have access only treat according to their area of practice and are not, for reasons that I can only surmise, inclined to contact public health or the CDC for guidance.  These same doctors are submitting my lab samples with created diagnoses of headaches, GERD, and high blood pressure to satisfy insurance billing requirements; thereby, altering the perception of the lab technicians evaluating these samples as to the severity of my condition and detail of analysis to which they should subject said samples.  My case, I contend, cannot be resolved in this manner nor with standard tests listed on a Quest or Labcorp requisition form.

 

With such advanced capability, I do not believe that I am this individual’s first victim.  This level of assault seems too finely rehearsed; the timing and delivery of his attacks flawless.  With such demonstrated capabilities, I believe that this suspect represents an imminent threat not simply to me, but to our national health, safety, and security.  In fact, my parents, who have been frequent visitors to my home are also showing symptoms of possible poisoning.

 

The problem is that there is no direct access to individuals capable of identifying unknown disease agents for one victim of an intentional assault.  Although admitting that the combination of my symptoms and results of my lab tests are bizarre and baffling, no one in the medical community seems willing to consider the possibility of a biocrime.   Yet, as someone who struggles to walk and breathe and is permanently disabled, I am certain, beyond any doubt, that I am being poisoned and scheduled to die a death made to appear as if by natural causes.

 

I am also fully aware of the words that I am using to describe my condition and these events.  That I am still undiagnosed and untreated after 7 years is criminal.  But, before you decide that I am mentally ill and dismiss my request for assistance, please take one moment to consider the horrific situation that I am reporting and how you – if in my position – would conduct yourself. 

 

My research has yielded no law governing the response to this type of  biocrime.  There is no protocol for an individual victim of intentionally released agents.  Sadly, there appears to be no one in the medical or law enforcement communities with the intelligence to recognize the deadly capabilities of the suspect that I am reporting.  Those individuals may someday be held accountable for their decisions, if not in a court of law, then surely by a Supreme Being.  Yet, my pleas have fallen upon deaf ears.

 

Homeland Security defines terror, or bioterror, as an incident only when it involves 5 or more individuals.  This policy provides terrorists a fairly large loophole through which to test and initiate attacks with limited risk of early discovery.  For this reason, physicians, public health, and law enforcement will not consider my case as a biocrime.  Apparently, they are waiting for planes to crash, buildings to fall, and someone to blow a whistle declaring a public emergency before they feel compelled to respond.  In addition, there is no published protocol to follow for a sole victim of a biocrime.  Had anyone applied the criteria outlined by Homeland Security, the CDC, or the FBI on covert biocrimes, they would have realized that my case represents a ‘probable’ biochemical event.    

 

A contagious biological agent released in an individual poisoning will create the same disease process as blanketing a city with an aerosol with one exception, the individual, covert assault will not be flagged by any surveillance systems, will not be investigated, and the disease process will not be contained. This is bioterror and would also be the perfect means by which to launch a biological attack against the United States.

 

I desperately need medical attention and a resolution to the criminal assaults that continue on a daily basis.  Please know that I completely understand that this story may seem bizarre, but I am living it.  I would much rather be sitting on a beach than writing this.

 

I have unresolved issues throughout my body and require consults with virtually every area of medical practice including Infectious Disease, Cardiology, Orthopedics, ENT, Dermatology, Pulmonary, Opthamalogy,  OB-GYN, Gastroenterology,  Hepatology, Hematology, Parasitology, Immunology, and Virology.  In addition, notification should be given to USAMRIID, the NBACC, NBFAC, BARDA, the CDC, and individuals involved in defense and counterterrorism research.  The physical evidence that I hold, together with the personal experiences I can detail, would be priceless to anyone involved in the research of emerging and infectious diseases, electronic weapons, cyber-terrorism, and biological and chemical agents, all of which will be weapons in future wars.  My case, I believe, will someday redefine preparedness and response to a covert biological event. 

   

My intention is to stand down this individual until I can convince someone to investigate.  I will eventually, I believe, take him down and, with him, everyone who contributed to this debacle by refusing to conduct the appropriate tests or refer me to the appropriate parties with the expertise to validate my claims.

 

“For in this fight, it is not enough to mount an army.  It is not enough to build a Department.  While military might and the full resources of the federal government do indeed make us stronger and safer, overcoming terrorism requires something far greater. To defeat an enemy that lurks in the shadows and seeks relentlessly for some small crack through which to slip their evil designs – such a victory requires the vigilance of every American, the diligent preparation of every community, and the collective will of our entire nation.” 
(Tom Ridge, former Director, Department of Homeland Security)

 

I am an army of one.

 

_________________________________

 

If you are in research, medicine, law enforcement, or government and can provide direct assistance or referral to an appropriate resource, please contact Write On New Jersey.  We will put you in touch with this individual. 

Site Sponsors

Site Sponsors

Site Sponsors