CRIME: Professional stalkers and local cyber criminals are targeting people on the streets with attacks on cars and mobile phones
AGN.News Team
December 10, 2022
PHOENIX (AGN.News) – Professional stalkers, cyber criminals and hackers are now allegedly buying into mobile phone infrastructure by securing ownership of mobile phone sales outlets and local franchises.
These hackers have found it more practical to own the network equipment provided by major mobile phone providers so they can use the network’s vast reach to search for their targets on that network.
This network tracking can be done no matter where you may go across the city, or country, or into other countries. You can and will be found on the mobile phone networks.
They can and will use the “location” feature to find you via your phone. Turning it off will not help because all cellphones (even old flip phones) are connected to the 911 emergency operation network 24/7 so you can call 911 for assistance.
Cyber criminals targeting cellphones
Criminals use to simply harass a person with hundreds of phone calls by using computer software which hides the real number calling you and mask it with the number of a legitimate business. It even shows up on your caller ID as the real thing so you will answer the phone.
Today, they’ve evolved into professional stalkers and hackers using advance technology. They’ve bought into companies offering local franchises of cellphone services, with focus on pre-paid phone companies.
What’s going on with cellphones?
Once these harassers find their “target” on the mobile network via their phone number, they have the ability to locate you and/or disable cellphone features like the “call” feature or the “text” feature while leaving the Internet feature operational.
A person, once finding those features are not working may conclude there’s a problem with the phone company. So they call “tech support” and file a complaint. Then it doesn’t work again. They repeat the tech support call again and again with the same result.
What does the “target” now do? Buy a new phone! Within days it starts to happen again and again. Exhausted by these phones, the “target” buys a more expensive phone feeling those “cheap” phones were the problem. So you tell your friends about your cellphone problems. Their advice, “get a new phone”.
What are they doing to cellphones?
WOW! Is it not ironic that the person who called you hundreds of times and got no answer now wants to make sure you can’t call anyone on the same phone they rang off the hook. Here’s titanic proof of the criminal mind at work.
It may not be the “cheap phone” after all. It may be “someone out there” wants something from you. It could be your money, your business, your “love”, your job, or just you.
You may be the “target” of a jealous ex or cyber criminals who want your banking information. It does not matter if it is a new phone or not. It does not matter what type of phone it is, these features are at risk. Why, you may ask?
Because the criminal mind knows no boundaries. Even corrupt people with “police” powers resort to these underhanded tricks. People you trust to protect you have found more profit in working with criminal networks committing cyber crimes than police work. Criminal networks do not care who they corrupt to further there objectives.
Professional stalkers target cellphones
People who don’t like you are turning to “professional stalkers” to find you on mobile networks via your personal information. In other words, when you provide information to get a new phone the “inside person” may sell your personal information to whom ever.
When you move you tell the phone company to give you a new number or you may hand over a new address for some reason or where to send any new product offers in the mail. All of your personal information is now on the network and it’s searchable.
These “professional stalkers” have access to these secret networks or groups who are owners of these cellphone stores and are willing to sell your phone data and location data for a price.
Criminals targeting “secure” phones
Most people feel their phones are secure after they buy cellphone security software to “protect” their devices. These cyber criminals “walk” pass that software like a sliding door at the grocery store.
Yes, criminals hack and search through these devices looking for financial information. Professional stalkers and cyber criminals or “agents” of theirs have allegedly ramped up their non-stop cyber attacks disabling calling and texting features on mobile phones.
Today, these cyber criminals are now allegedly targeting mobile phone infrastructure including but not limited to national cellphone networks. Personal and business cellphones are being hacked and/or destroyed via access to mobile phone company networks by “agents” embedded in major cellphone companies.
Cyber stalkers are “taking it to the streets”
Professional stalkers and local cyber criminals are allegedly targeting cars with direct attacks on cars just like mobile phones. Their “street team” have reportedly been disabling features on targeted vehicles while owners are puzzled as to what happened to their cars.
These criminals have found being jailed for years is counter-productive to getting paid by spilling blood. They understand the risks associated with blood-letting. So they’re turning to crimes against property like stealing catalytic converters. So they may be able to “plea-bargain” their way out of it.
So, they’re taking it to the street. It may be the plumber you call to fix your pipes. I may be the taxi or ride-sharing driver. It may be the pizza delivery person. It may be the daycare worker. It may be the tech support person for your phone provider. It could be anyone.
Professional stalkers: Conceal identity
Professional stalkers more often than not go online to lure unsuspecting individuals into their “hidden trap”. This is most common on dating sites or online chats.
Many adult stalkers often pose as “teenagers” to engage in a romantic relationship with real teenagers. They do this to obtain the personal information of the other person they want to exploit using a false identity, known as “catfishing”.
This actually happened on November 25, 2022. A Virginia sheriff’s deputy (28), with some degree of mental illness, used deceit to hide his true identity. He posed as a 17 year old boy to deceive a 15-year-old girl in California he tried to sexually extort online using what is called “catfishing”.
He traveled over 2,500 miles to show his true self because he was apparently angry the girl stopped communicating with him after he asked for nude photos of her.
When he arrived, he killed three family members and set the house on fire. When engaged by law enforcement, that same day, he died by suicide during a shootout with local California sheriff’s deputies. The girl was unhurt.
Cyber criminals’ actions more subtle
OMS Security is confirming previous reports of crimes allegedly committed by these cyber terrorists were allegedly part of a network of criminals who stage overt attacks on targets using single car “murder-by-accident” anonymous attacks.
While the aforementioned threats may still exist, these new tactics are more subtle and more dangerous. Working in teams, these cyber criminals are allegedly tracking their targets to locate and disrupt their daily lives by staging some sort of event, like a child almost hit by a car.
Over the last four months, these criminals have allegedly tampered with the brakes, lighting, and other components of their target’s automobiles. Stalkers have been known to create an event hoping the victim will call them for help.
Multiple home burglaries and damage to contents in homes have been reported among other crimes. While some “agents” physically trails the targets, other “agents” commits the type of crimes. Its been reported that these criminals can walk past locked doors faster than a knife can cut through warm butter.
OMS says disabling auto features is being done so quick that owners think its all in their minds. “It was just working, now it does not work,” says the victim.
Hidden dangers of social media
Other cyber criminals are searching social media sites in search of their next targets. They understand users of social media sites give up more information than they can buy.
Many celebrities have found out the hazards of posting their whereabouts online. Lately, criminals have resorted to using social sites to track these celebs. All of these activities have placed them at risk.
Addressing local youth crimes
Criminal activity among youths in our communities are at an all time high. Many local communities are developing mentorship programs to address youth crime. Volunteers are always needed to support those efforts.
These all-hands-on-deck community-focused local youth initiatives are worthy of our support in deterring crime among the young.
Helping the young see the value of local education, mentorship programs, local community economic development and investments will go a long way in giving options to youths in our communities.
Victims of local criminal activities have options in seeking relief. The local men and women of law enforcement are available to help gain the trust of the communities they serve. Sooner or later these serial criminals will be brought to justice.
The microcosm of local crimes
The identity of these very dangerous cyber criminals may not as yet been identified publicly or completely exposed. However, there pattern of cyber crimes, cellphone attacks, stalking, robbery, and their very public staged or attempts at crimes or staged accidents for greed are undeniable.
Criminals live in a little world where people like them are always looking over their shoulders knowing any minute the law will show up. They have a pletora of thoughts about being caught.
Victims can take care knowing justice will eventually be served. Victims will get justice while professional stalkers, local street gangs, and local cyber criminals will meet “Justice, the Queen of all Virtues.
The Crime Victims will get justice!
The Crime Victims often feel all alone and they often feel like no one cares about them. The Crime Victims can take heart in the reality is that there is a lot of support being shown behind the scene working hard to bring justice to the victims.
It often takes time to solve some crimes. Sometimes crimes are solved in hours, sometimes in days, weeks, months, or even years. The criminal mind often feels that they’ve gotten away with the crime or crimes. They don’t understand alack of publicity is not an indication they got away with it.
The wheels of Justice turns slowly
If you are a victim of cyber crimes (hacked bank accounts, money scams, threats, etc.), cyber stalking, assaults, sex crimes, property crimes, hate-crimes, or any number of crimes, you are urged to report this to law enforcement. The Crime Victims will get justice!
Sometimes, the wheels of justice turns very slowly. Patience is required while the crime victims concentrate on the healing process. The Crime Victims can remember this – criminals live in a small world and they will reap what they sow, eventually.
Reporting crimes helps the wheels of justice turn faster. Reporting crimes can be a real deterrent to local criminal activities by putting criminals in a microcosm, a much smaller world.
#GoldOverBlack
COVID-19 PREVENTION
STOP THE SPREAD! GET VACCINATED!
VACCINES ARE AVAILABLE FOR FREE!
Everyone is being urged by the Centers for Disease Control (CDC.gov) to get vaccinated, wear masks, practice social distancing, and wash hands as a way to cut down on the transmission rate.
For more information on local responses to the novel coronavirus also called … COVID-19, contact your local healthcare provider, visit coronavirus.gov or visit cdc.gov for the United States response to the coronavirus.
News you can use! Enjoy the best of news from your community by Alphabet Global News.
ALPHABET GLOBAL NEWS
Reliable. Trusted. Local. News.
On Mobile … Fast!
Written by
AGN.News Team
Disclaimer: This post does not represent the views or viewpoint of the owner of AlpLocal.com, AGN News or its representatives or reporters. Any content which references any person, entity or group with similar names, descriptions, or business interest in any geographical location or similar businesses is merely a coincidence and not directed at said business. AGN News is compiled from submissions by contributors or other sources. We are not responsible for information found on external links. Those clicking on these type of links bear sole responsibility for visiting these sites.