On being mobbed

The account of an ongoing bid to harass a legal tenant out of her Seattle neighborhood


Exploits with signal extenders in local loop configurations or, “Can you hear me now?”

Early in the mobbing, as the voices of those in the south mobbing house turned up again and again on an old cordless phone tittering about a “party line,” I learned a bit about telephony and local loop circuits. Party lines weren’t much of a consideration when I grew up, but Wikipedia includes information that could provide a roadmap on how telephony might combine with infrastructure to construct a neighborhood “chat room” for clandestine harassing communication (Party line (telephony)). In this case, one of the opening shots of the mobbing, the “party line” was, no doubt, call interception done to annoy and made to look like a mistake. I recalled the mobbers’ “party line” in Radiohead: Cell phones are radios; mobbing is radio-based harassment (part 1), and touched on it later on Infrastructure crimes: Mobbing with interference; extraction by heat (part 3).

It was from the vantage point of cellular communications and call interceptiona criminal offensethat I began to consider IMSI catchers. Call interceptors come in many forms, however; cordless phones with unencrypted communications transmitted on certain frequencies are easily intercepted by scanners (Cordless telephone).

Cell phones can also intercept calls. They can use walkie-talkie apps. They are computers that can combine stalking apps with mobile communications. Because they’re lightweight computers, they can create exploits to send and transmit incoming traffic:

This is a screenshot of a LAN device that my old Technicolor router did not provide the option to remove. It’s the “MichaelsiPhone3” device that is of interest. I had had a roommate whose name was Michael. During his stay, I had been using MAC address authentication to the wireless network I provided for roommates but he had moved sometime before. I had to give up the use of MAC address authentication when I began using the Cujo firewall since that mode of authentication was not compatible. When I discovered the phone on the LAN, I had no roommates. It remained on the LAN, visible until I upgraded to a different router. When I mentioned it to a network technician who did a professional heat map for me, he said, pointing at the south wall where the house infrastructure was installed, that it was “right out there.”

What was “out there” was the fiber connection to the CenturyLink ONT, a smart meter, an old CenturyLink telephone box for the landline, and the Eero extenders of the south mobbing house that overlayed all my infrastructure. Eventually, some Internet searching turned up a reference to some neighborhood exploit in which a router is made to appear as though a phone, something that interfered with the transmission or receipt of email, for example. Being cautious, and not yet having enough information, I refrained from posting any of the dozens of screenshots and tens of screen recordings that I made to show the behavior of the LAN device. They are available on a file share. But you can see there might be cause for concern over the squelching of victim communications in a mobbing situation. I also began to wonder about smart phones being brought and left to broadcast, receive or eavesdrop in certain positions along the property line, and I wondered about whether it was possible to leverage the smart meter as a hotspot or for any cellular signal it might use to communicate with the back office.

Cell phones can be easily positioned in cars and work as call interceptors as well as transmitters of rogue signal and sound, like the Samsung phone left in a strategically positioned car with hot spot on by the nasty neighborhood watch lady. The car was aligned with the configuration of Eero extenders running along the infrastructure wall of my home. The extender running over infrastructure joined with other Eero extenders on other sides of the house. The mobbers said at one point, “All we do is triangulate you.” With extenders, they can provision for mobbing by boxing victims in by extender. They can construct a kind of local loop. With WiFi calling or walkie talkies, they might be able to avoid the exposure of the GSM network.

In a small town like Albany, with a mesh network of extenders or with extenders daisy-chained or deployed in serial, shouldn’t take much to criss-cross the city. A network of extenders could support a network of mobbers clearing properties to make them available for small-time builders, speculators, or LLCs.

A mobbing victim might be followed by radio anywhere she goes in a confined area. Most of us who work from home these days, remain in a confined area. I remarked on an SSID I’ve seen pretty consistently in Albany network surveys, Pew-pew, and mentioned in Austria is the new Cuba, and a few notes on west coast mobbing that it could well be a corollary to the Pow-pow SSID identifying the joined Eero extenders. In Albany, Pew-pew is visible on heat maps at the house.

Pew-pew transmits strongly enough to be visible a couple of blocks away on a streaming radio that belongs to someone I visit. The location of the radio is a long line-of-sight along the closest cross-street to the house.

Extenders give new meaning to the term “local area network.” There’s reason to be concerned about hoaxes victimizing senior living residences with wireless provisioning that is not secure. There are reasons to consider baby-cam crimes executed over extender from next-door. The WiFi extender represents the nexus between the virtual and physical worlds. Stalking has never been easier.

Ω

The mobbing continues in the wake of the events I wrote about in Welcome to Albany, California or, “Have you no sense of decency?”. Over the holidays, the mobbing intensified with the kind of traffic that looks like minders come to town, coupled with a threatening volume of matter piped into the house at regular intervals. I slept in an N95 mask most of the time, with multiple air purifiers by the bed and drawing as little electricity as possible.

There are things I haven’t had a chance to write about here, one of which is the fact I believe, though experimentation, I have confirmed that the water lines are involved in the mobbing. When I became concerned months back about VOCs from neighboring yards somehow leaching into the house, I began keeping the water shut down most of the time. The difference was immediate.

The fact that the irrigation system that my elderly relative had installed sometime in the 1990s was destroyed the week before last when the apparent new owners of the house to the south and their contractor relative dismantled part of a long-standing fence and entered the enclosed side yard to erect fencing where they claim it should go makes me think more about how the kind of dirty tricks mobbers pull might not only include leveraging your plumbing close to the property line but incorporating any of your vulnerable electrical components of pumps, including those in sprinkler systems and sump pumps, in their automation to circulate particulate like dirty electricity from a WiFi-producing generator, in your system. This is a theory but it is based on my experience of the generation of what looked like a cloud of matter on a morning when I woke up dizzy and during a period of time when the mobbers seemed to be deliberately triggering a sump pump they had installed in the breezeway between the two houses after the shower ran for a very long time. It’s also in keeping with the living-off-the-land tactics of exciting components like batteries, transformers, high-efficiency light fixtures and bulbs that ignite by two-prong exposed electrode or gaseous substances (Lighting and mobbers’ living-off-the-land exploits).

What I found at the Albany house was that shutting off incoming water to the house appears to help. At least this was true before new fencing was installed that both shortens the distance to the foundation of this house and might hide rogue IoT or other components. The tactic of shutting off water to the house works well in tandem with plugging drains and leaving standing water in basins. Because water is a current that can carry sound, this could mean that I’m stilling the current.

The effect is very obvious at the kitchen sink, which is on the beleaguered infrastructure side of the house. As soon as I stand at the sink and begin doing the dishes, the harassment increases. The windows over the sink are across from the lowlife bathroom from which it appears he installed or keeps a sensor intended to detect movement or light in our kitchen. Typically I try to block his sensing IoT at the side windows; cookie sheets work pretty well for this.

One of my early posts described the feeling of being watched when making crepes one day, very early in the mobbing (“How are we going to get her out if we can’t see her?”). This was also at a sink under windows on the infrastructure side of the Seattle house. The first thing that comes to mind is how radio-frequency penetrates glass, and that is probably happening at least with the boosting. Another component, however, may be the ingress of sound via something like a contact microphone on maliciously accessed plumbing line, or perhaps it takes only the right level of sound. Here in Albany, the water project that continues in this part of the small town makes me wonder about the opportunities it creates for bad actors. But sending matter backwards in water lines might aerosolize a lot of particulate, if I’m explaining it correctly, or allow for the conveyance of vapors that are water soluble. I note that during the time that I have been experimenting with keeping the water off as much as possible, I had yet another leak in drainage on the infrastructure site of the house and despite the fact that the line is plastic, I have to wonder whether using the pipeline as a channel for charged matter that appears to include EMFs would still be a stressor on the line, perhaps upstream or downstream of the plastic line.



the lay of the land

Air conditioners are the entry point to the grid, and a postcard from Seattle’s South Cedar Park

Lighting and mobbers’ living-off-the-land exploits

Mobbing by WiFi range extender

The mobbers’ “World Wireless System” and hate culture in Albany, California (part 1)

The mobbers’ “World Wireless System” and hate culture in Albany, California (part 2)

The mobbers’ “World Wireless System” and hate culture in Albany, California (part 3)

Infrastructure crimes: Mobbing with interference; extraction by heat (part 3)

Mobbing, infrasound and leaky feeders (part 2)

Mobbing, infrasound and leaky feeders (part 1)

Smart meters, carrier current transmission and the mobbers’ radio (part 1)

Stop mobbing crimes with data: Airtool for wireless capture

Stop mobbing crimes with data: Visualize nearby networks with NetSpot

Is this a radio? Look what the mobbers made!

Pictures from a mobbing (part 2)

Pictures from a mobbing (part 1)

Gang-stalking: Invest in real estate! No money down! (part 2)

Recommended reading on the “On being mobbed” blog

THE MOST RECENT 50 ENTRIES

Discover more from On being mobbed

Subscribe now to keep reading and get access to the full archive.

Continue reading