17.11.2014 Views

The World Wide Web has been Stolen and Manipulated

The World Wide Web has been Stolen and Manipulated

The World Wide Web has been Stolen and Manipulated

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>The</strong> <strong>World</strong> <strong>Wide</strong> <strong>Web</strong><br />

<strong>has</strong> <strong>been</strong> <strong>Stolen</strong> <strong>and</strong> <strong>Manipulated</strong><br />

Los Angeles, CA – September 14, 2012 – For about 3 years, Qiu Min (Rebecca) Ji, a<br />

United States citizen, claims that she <strong>has</strong> <strong>been</strong> subjected to online terrorism <strong>and</strong><br />

nanoterrorism by a high-tech spy from China. In addition to his actions against her, Ji<br />

<strong>has</strong> found that the perpetrator can duplicate <strong>and</strong> manipulate the <strong>World</strong> <strong>Wide</strong> <strong>Web</strong>.<br />

Remote controls enable the perpetrator to invade Ji’s computer <strong>and</strong> monitor or intercept<br />

all of her computer <strong>and</strong> online activity, whether on her own computer or any computer<br />

she uses, either at a library, web bar or internet café. In summer 2011, Ji reformatted<br />

her Dell laptop <strong>and</strong> reinstalled Microsoft Windows three times with the assistance of<br />

several different people but was unable to get rid of this control.<br />

Later, she decided to purc<strong>has</strong>e a br<strong>and</strong> new laptop. <strong>The</strong> very first day she brought her<br />

newly purc<strong>has</strong>ed laptop back home, she deleted one program that was explained as<br />

remote control. <strong>The</strong>n, she saw on her br<strong>and</strong> new laptop that there was remote<br />

controlling computer management information on the top bar. She knew that was the<br />

perpetrator’s computer that <strong>has</strong> <strong>been</strong> controlling her activities for years, so she took 950<br />

photos. She saw many programs that were installed on the perpetrator’s computer,<br />

such as 11 sound coding decoding programs <strong>and</strong> 11 image tracking programs.<br />

Ji <strong>has</strong> <strong>been</strong> struggling to make any report related to the perpetrator’s criminal activities,<br />

but she <strong>has</strong> observed how he can control her online activities through the privacy<br />

reports <strong>and</strong> <strong>has</strong> seen hundreds of websites that have <strong>been</strong> duplicated, manipulated,<br />

<strong>and</strong> controlled by him. When she saw the privacy report on MSN, the many privacy<br />

reports of web addresses reflected the computer control <strong>and</strong> email control she <strong>has</strong> <strong>been</strong><br />

experiencing. Being bilingual (speaking <strong>and</strong> writing both English <strong>and</strong> Chinese), Ji<br />

underst<strong>and</strong>s the emotion of joy <strong>and</strong> excitement from the web addresses that the<br />

perpetrator expresses when he <strong>has</strong> hacked into MSN <strong>and</strong> discovered so much<br />

information. He <strong>has</strong> stolen security flash detection, Window’s phone technology <strong>and</strong><br />

much more…<br />

Ji’s photo documentation <strong>and</strong> comments on MSN privacy Report can be found on<br />

www.stopthespy.com under the section National Security Being Compromised. She<br />

<strong>has</strong> photo documented many website privacy reports for professionals to look into <strong>and</strong><br />

find more information.<br />

Through reading the details of each report Ji also discovered that almost all the<br />

duplicated American websites shared nearly the same cyber address that the<br />

perpetrator can access. <strong>The</strong> high tech spy may have upgraded his stolen http system<br />

file in order to control the original <strong>and</strong> he <strong>has</strong> an auto column input system that can<br />

easily generate a set of web addresses by adding a word or two to the original web<br />

addresses. This may be a big concern for national security.


However, the spy from China <strong>has</strong> <strong>been</strong> playing well at his hidden power of control. He<br />

can separate his whole online configuration into different parts <strong>and</strong> put into different<br />

websites’ privacy reports. Most people do not pay attention to the privacy management<br />

icon. Even those who do cannot tell the hidden terrorism action behind his online<br />

configuration. <strong>The</strong> website owner or webmaster does not know nor see that a site <strong>has</strong><br />

<strong>been</strong> utilized for terrorist activities. <strong>The</strong>y may never know until they receive the privacy<br />

report from their site.<br />

<strong>The</strong> reason that these activities go unnoticed is because the perpetrator is already one<br />

step of ahead of everyone because of his ability to steal <strong>and</strong> upgrade any operating<br />

system or http system file. He <strong>has</strong> studied all U.S. government cyber security<br />

documents, he knows how the American government catches cyber hackers, he does it<br />

in unique ways that no one else had ever experienced <strong>and</strong> he knows how to hide. Ji<br />

can see this manipulation because he controls all her online activities by his http<br />

system, she says.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!