Skip to main content

Posts

Social Engineering

  How do I know Don Stovner Socially Engineered you? Because in the Summer of 2007, the Ted Whiting, the Director of Surveillance for The Mirage and the Business Sponsor for the CityCenter Build (the MGM Mirage properties) asked me if I had ever been to Cozumel Mexico. I wondered at the time why a Director of the Company would be so interested in a Vacation I took nearly 16 years before I was an employee at MGM Mirage. I did not correct the Ted or clarify my reply, I simply said yes, I had been there. Within a few weeks of that conversation with the Director, I spotted a Doppelmayr van following me home from work. I never saw City Center related vehicles out on Boulder Highway.  After changing out of my work clothes and heading off to the Dog Park, I spotted him again, this time right behind me in the left hand turn lane. I looked in my rearview mirror and when the light changed I waved to him in the mirror. As we turned the corner, he sped past me and away he we

September 20, 2009

It's called The Long Game for a reason.

"Sucks To Be You"

“Sucks to be you” Remember that? Remember when I said those words on the conference call? Those are the words that Don Stovner repeated to me in August 2009 as his “proof” that we were on a conference call together. So before we move on, you should take a moment to reflect.  Think about the last time you heard that phrase on a conference call. Take your time. CONTINUE READING - PATREON S*CKS TO BE YOU

Not the Only One

Oh you thought I was Don Stovner’s only victim? You mean none of you know what he did to that Corporate IT Director in San Francisco? Last Summer, 2012? You didn't know he broke into the Enterprise Email and published the guy's correspondence? But…. You are such good friends! You've stood up for him! You gave him great references! How did you not know about this? Update: Stalker Boy is admitting to the hack, wonder if he will admit to the Stalking. Hmm, do you Executive C-Suite Boys have something to worry about other than me? " at the time I was suppose to see if I could get in to all the system to find security issues and plug the holes which I did " I guess the new approach to Network Data Security is to publish your findings so everyone can read the personal & intimate emails of the Corporate Leadership. Hey, didn't one of you Corporate Types give Stalker Boy access to your Corporate Network in Las Vegas?

Stalking: Convicted for a Fantasy

Stalker Cop Found Guilty in Cannibal Case When does a virtual crime, contemplated in Internet chat rooms, become an actual crime? 
"...prosecutors argued that the officer took actual steps to further his plot, like conducting surveillance of potential victims." Sound familiar? It should. This entire blog is based on one man's actual steps he took to "further his plot". Don Stovner took great pains to position himself within my life "like conducting surveillance" of my work place schedule and home routines. Just like Gilberto Valle, Don Stovner reached back in time nearly 20 years, to stalk a woman. The difference is that the police got to Gilberto, because the people around his victim immediately took action.   Now aren't you Gentlemen glad I have chosen to dismantle your careers,  marriages, and families, and didn't go running to the police? Oh... you didn't know.... here: April 16, 2013  New Arrests

DOXing as Warfare

I never considered what I am doing to Don Stovner “DOXing”.  In my mind, it is simply playing the game he started, by following the Rules as he changes them.  You know, Goose & Gander .  He went out of his way to track down intimately personal information about me, dating back to the Pre-Internet Age and claimed that it was “technically legal” because he used Publically Available Information.  Well…. I’m just making this information public.  Just like he did. "DOXing", is  hacker slang for publishing someone's personal information in order to intimidate or punish them. DOXing is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. DOXing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “ The more you know about your target,

On Lies and Lying

An Excerpt from the essay Lying by Jonathan Wallace http://www.spectacle.org/bio.html I hate being lied to. Short of violence, it is the worst thing you can do to me. Not because of God, or the Ten Commandments, or any  universal moral precepts . The reason that I hate lies is because, like you, I wish to navigate carefully through life, and to do so I must be able to calculate my true position. When you lie to me, you know your position but you have given me false data which obscures mine. Lying is theft. When you tell me something which I take to be true and as a result I invest my time, or my money, or even my care, you have stolen these things from me because you obtained them with false information. Lying creates inequality. Since you also do not like being lied to--I have never known anyone who wanted to be deceived-- you have acted as if there were two classes of humans: you, with the right to lie, and everyone else, who must be truthful to you so that you too will not

And Then He Started Dropping Names...

“Privacy is an illusion therefore it doesn’t matter if yours is violated” I didn’t expect privacy when I dove into that chat room off a dark and rarely used Data Back Road in 1998, so why should I care that there are privacy violations occurring every day? Oh, right, because I did expect privacy.  That’s why we all had screen names.  That’s why we all lied about our addresses and phone numbers, only met people from “On Line” in Public Places, attempted to mask our IP addesses, etc and so on.  It was the only place NOT regulated by Corporations and Government, and as such there was a dangerous and alluring aspect to the Internet.  It was the last Frontier, the Wild West without a Sheriff. So when Zuckerburg and Parker and the rest of the Silicon Valley Cartel decided over Martini’s one night to embrace the FBI's position that Privacy no longer means Anonymity it changed the game.  It meant we no longer have to tolerate being under the Microscope, being judged by “what you pu

Privacy is an Illusion

Embracing Creepy

Embracing Creepy Stalking is just plain creepy.  It just is.  A weird guy who takes an interest in a woman he’s never met, a girl who has no idea he even exists.  Sometimes it starts with “Blog Stalking”, cruising an interesting blog over and over, or visiting a Discussion Forum to read a girl’s posts, hitting refresh as neurotically as clicking a pen.  But, when stalking moves from watching through the blue glow of the monitor to real life watching through the living room window,  it is the cruelty of stalking that strikes me the most.  The silent Watcher has no empathy for his Victim.  He just sits and watches as events and occurrences unfold.  No different than the detached coldness of the Engineer monitoring a Network. This notion of the emotionally removed Stalker was taking up room in my head when Kevin Kelleher’s blog on the last day of Web 2.0 Summit 2011 was served up on the web page I was reading.  I didn’t see the blog until 5 days later, but it struck a chord noneth

How to Stalk Your Stalker

Do you have a Stalker? Do you come home to find subtle changes to the photos on your fire place mantle?  Do you find your closet doors and bureau drawers open when you come home from work? This is not your garden variety Facebook Stalking.  By the time your Stalker works up the courage to come out from behind the blue glow of his CRT and into your home, it's too late to take any of the precautions Law Enforcement recommends.  Your Stalker is already in your house, monitoring your life. Media is the Stalker's friend.  Media perpetuates the idea that only celebrities have Stalkers, that non-celebrity Stalking is just a domestic violence issue.  The notion that average women have unknown Stalkers is dismissed and never addressed.  Women who find themselves in an unwanted dance with an unknown Stalker are left to fend for themselves. When the Stalker is unknown, there are no Domestic Violence resources to help because Domestic Violence resources work with women trying to ma

The Progression of Lies

This is the Don Stovner I met at the Wynn in June 2008 and then worked with from June 2009 through January 2010.  This is the man who, after my troubles with the Applications Analyst on the Food & Beverage Team at the Wynn, caused me the most problems with Network Engineering Projects. The photo at the left was taken in mid July 2009, while we both worked for Clearwire in Las Vegas, at a weekday lunch break from our projects.  Don made an effort to reconcile the events at the Wynn and to amend our professional relationship.  We did not work in the same departments or for the same management.  We had no reason to interact while at work other than to go to lunch. It should be noted, that had the Wynn IT shop been more professional, had they employed proper management of their staff, the affair between Don & I would have started in 2008 when he went to the Wynn, during the period he sent his wife to Russia the late Summer and Early Fall of 2008.  However, because I had seen