Skip to main content

Posts

Showing posts with the label Social Network

Social Engineering

  How do I know Don Stovner Socially Engineered you? Because in the Summer of 2007, the Ted Whiting, the Director of Surveillance for The Mirage and the Business Sponsor for the CityCenter Build (the MGM Mirage properties) asked me if I had ever been to Cozumel Mexico. I wondered at the time why a Director of the Company would be so interested in a Vacation I took nearly 16 years before I was an employee at MGM Mirage. I did not correct the Ted or clarify my reply, I simply said yes, I had been there. Within a few weeks of that conversation with the Director, I spotted a Doppelmayr van following me home from work. I never saw City Center related vehicles out on Boulder Highway.  After changing out of my work clothes and heading off to the Dog Park, I spotted him again, this time right behind me in the left hand turn lane. I looked in my rearview mirror and when the light changed I waved to him in the mirror. As we turned the corner, he sped past me and away he we

"Sucks To Be You"

“Sucks to be you” Remember that? Remember when I said those words on the conference call? Those are the words that Don Stovner repeated to me in August 2009 as his “proof” that we were on a conference call together. So before we move on, you should take a moment to reflect.  Think about the last time you heard that phrase on a conference call. Take your time. CONTINUE READING - PATREON S*CKS TO BE YOU

Not the Only One

Oh you thought I was Don Stovner’s only victim? You mean none of you know what he did to that Corporate IT Director in San Francisco? Last Summer, 2012? You didn't know he broke into the Enterprise Email and published the guy's correspondence? But…. You are such good friends! You've stood up for him! You gave him great references! How did you not know about this? Update: Stalker Boy is admitting to the hack, wonder if he will admit to the Stalking. Hmm, do you Executive C-Suite Boys have something to worry about other than me? " at the time I was suppose to see if I could get in to all the system to find security issues and plug the holes which I did " I guess the new approach to Network Data Security is to publish your findings so everyone can read the personal & intimate emails of the Corporate Leadership. Hey, didn't one of you Corporate Types give Stalker Boy access to your Corporate Network in Las Vegas?

Stalking: Convicted for a Fantasy

Stalker Cop Found Guilty in Cannibal Case When does a virtual crime, contemplated in Internet chat rooms, become an actual crime? 
"...prosecutors argued that the officer took actual steps to further his plot, like conducting surveillance of potential victims." Sound familiar? It should. This entire blog is based on one man's actual steps he took to "further his plot". Don Stovner took great pains to position himself within my life "like conducting surveillance" of my work place schedule and home routines. Just like Gilberto Valle, Don Stovner reached back in time nearly 20 years, to stalk a woman. The difference is that the police got to Gilberto, because the people around his victim immediately took action.   Now aren't you Gentlemen glad I have chosen to dismantle your careers,  marriages, and families, and didn't go running to the police? Oh... you didn't know.... here: April 16, 2013  New Arrests

DOXing as Warfare

I never considered what I am doing to Don Stovner “DOXing”.  In my mind, it is simply playing the game he started, by following the Rules as he changes them.  You know, Goose & Gander .  He went out of his way to track down intimately personal information about me, dating back to the Pre-Internet Age and claimed that it was “technically legal” because he used Publically Available Information.  Well…. I’m just making this information public.  Just like he did. "DOXing", is  hacker slang for publishing someone's personal information in order to intimidate or punish them. DOXing is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. DOXing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “ The more you know about your target,

Embracing Creepy

Embracing Creepy Stalking is just plain creepy.  It just is.  A weird guy who takes an interest in a woman he’s never met, a girl who has no idea he even exists.  Sometimes it starts with “Blog Stalking”, cruising an interesting blog over and over, or visiting a Discussion Forum to read a girl’s posts, hitting refresh as neurotically as clicking a pen.  But, when stalking moves from watching through the blue glow of the monitor to real life watching through the living room window,  it is the cruelty of stalking that strikes me the most.  The silent Watcher has no empathy for his Victim.  He just sits and watches as events and occurrences unfold.  No different than the detached coldness of the Engineer monitoring a Network. This notion of the emotionally removed Stalker was taking up room in my head when Kevin Kelleher’s blog on the last day of Web 2.0 Summit 2011 was served up on the web page I was reading.  I didn’t see the blog until 5 days later, but it struck a chord noneth