Unmotivated sound and the narrative of mobbing (part 3, continued): The Con

Yesterday morning as I sat here trying to work, I saw a black car with tinted windows, an old Honda maybe, drive down the hill, and then I saw it drive back up the hill. A minute or two later I saw a guy dressed in black and wearing a cap, standing in front of my vehicle taking pictures of it, and then he walked back up the hill. I can only hope that this is a sign that some investigation by benevolent agents is underway, and not one from agents of the mobbers whose purpose in driving by and photographing would likely be to attempts to intimidate me. And so, I continue in my efforts to convince authorities about what is really happening here in this dysfunctional neighborhood of northeast Seattle, and finally publish this blog on the con of unmotivated sound in mobbing. Next up in the final part of this blog on unmotivated sound, we’ll take a look at the near certainty of drone-stalking in mobbing.

(Addendum: On second thought, the guy taking the pictures may have been trying to intimidate. He looked a bit like one of the mobbers I occasionally see monitoring from the south house. He backs a small blue SUV with specialty Washington plates up the driveway and spends a lot of time standing at the mouth of the open garage.)


Real estate mobbing (“property mobbing”) is an unbelievable crime constructed to ensure that the reports of the victim are not believed. Systematic defamation works hand-in-hand with the unfamiliar phenomenology of cyber-crime and harassment transported by ventilation and beam-focused speakers to discredit the victim and his reports. Mobbing is a complex of crime made up of daisy-chains of monitoring, harassment, cyberstalking, intimidation and more. A hoax inside a scam inside a con, and as a con, mobbing works by turning what we know about the world on its head. Mobbing is a hack.

Hacking is an attack against assumptions

Hacking is an attack against assumptions. So said a speaker at the kickoff event for the F-Secure’s MOOC (massive online only class) on security (https://www.f-secure.com/en/web/press_global/news/news-archive/-/journal_content/56/1075444/1727260?p_p_auth=1IQvOyVN&refererPlid=1081937). It’s a nifty turn of phrase expressing the thought that any given hack is made possible by the assumptions of the designer. A hack is just an unintended use. This is true even in those early hacks into Ma Bell’s plain old telephone service (POTS) for which 2600: The Hacker Quarterly (https://www.2600.com/) is named. In the days of POTS, attacking Ma Bell in ways counter to the assumptions of the telephone switching system was called “phreaking”; the word combined the “ph” of “phone” with the word “freak”. (Wikipedia, https://en.wikipedia.org/wiki/Phreaking) Phreakers “phreaked” or “phone phreaked” the telephone switching system, exploiting the tones used to route long-distance calls. 2600 takes its name from the 1960s discovery of a 2600 hertz tone conferring the privileges of “operator mode” on any phreaker in possession of a plastic toy whistle from a box of Cap’n Crunch cereal; the whistle sounded at exactly the required frequency.

Mobbing is a hack

Like hacking, real estate mobbing is an attack against assumptions. And in the tradition of early hacking, mobbing includes a significant component of network intrusions and modification of the bits, not just of software but also of hardware. Early hackers modified or “hacked” hardware, crashing computers by modifying them with switches or building blue boxes (https://en.wikipedia.org/wiki/Blue_box) to generate the tones needed to hack Ma Bell. But it was a new world with the introduction of digitally controlled switchboards, time-sharing on main frame computers and finally the mass production of the personal computer, and hackers and phreakers abandoned hardware modification and moved onto higher layers in the network stack.

The mash-up of tricks, techniques, and technologies that real estate mobbing includes, originates from the earliest tradition of hacking against assumption, including attacks on software, firmware, networking (netware), and fleshware. By attacking basic assumptions about home, the mobbers seek to cultivate in you, mistrust of your felt experience and, indeed, your very perception.

The assumptions of mobbing

Mobbers use a mashup of tricks, techniques, and technologies to criminally monitor, stalk, and harass legal residents out of the homes mobbers want to acquire. The assumptions against which real estate mobbers attack can be divided into those made in the design of technology, and those made in a civil society. Most of the time, mobbers attack several assumptions at once and each attack operates on multiple layers. Like the Open System Interconnection (OSI) model, mobbing attacks layers of assumptions concurrently. From the bottom up, we can envision mobbing this way:

FLESHWARE: Assumptions about humans and human institutions
SOFTWARE:  Assumptions about the software that the hardware uses
NETWARE: Assumptions about networks
HARDWARE: Assumptions about devices

Products are designed and marketed based on certain assumptions; these assumptions circumscribe our conception of the capabilities and even the possibilities of each of the devices we use. When mobbers use devices in accord with the design specification, they mob against other assumptions.

For example, mobbers who rely on easy access to a public address system at Whole Foods or another store I shop at may gain access to the public address system by dialing up an unchanged manufacturer default number instead of hacking into the wireless network to pipe harassment over the store speakers. This is an example of mobbing in accord with the design of the device. In this case, the mobbers mob against the assumptions of a civil society girded by local, state and federal law.

When the mobbers use directional speakers to batter my window panes with surface harassment, their use of directional speakers conforms to the expectations for the device; it is their use of my windows as a platen for surface harassment that is the hack. If the mobbers do in fact use directional sound from a drone, and it appears likely that they do, their injection of harassment by directional sound into the vents running the width of my hood, is against the assumptions of the designers of the vehicle air-conditioning system who specified the system to move currents of air and not waves of sound. And the drone itself? Not so much. No one expects to be drone-stalked, but then no one expects the inquisition—mobbers mob against our assumptions that we are private citizens in a free society in which we can travel freely without being followed by criminal drones. Once a drone is in the picture, however, it shouldn’t be surprising that it is equipped with a radio transmitter or even a long-range acoustic device (LRAD) like a parabolic speaker. These tools are very much within expectation for drones designed for surveillance.

When mobbers use the kitchen ventilation system they recently customized in their garage to pipe smoke over to the house of their asthmatic neighbor, they mob against the assumptions we make about our neighbors having our good welfare in mind, as well as against the assumptions of use for a household ventilation system. And when one or both of the mobbing houses are owned by a medical professional, mobbing in this manner reveals the naivety of our assumptions that such professionals are trustworthy and safe.

Mobbing against the assumption of privacy

Mobbers mob against the most basic assumptions of privacy. For example, following a “target” over Whole Foods’ wired public address system in order to whisper insults over the speaker-enabled access point closest to the victim, is surely considered cyberstalking under Federal law. Not to mention the fact that in so doing, the mobbers are violating Computer Crime Statutes against computer trespass.

Shocked early in the mobbing that the hostile neighbors on either side of me appeared to be systematically staring into my windows, I called Seattle Police Department and attempted to report the invasion of privacy. I explained to Seattle Police Department that the behavior appeared to be part of a pattern of harassment instigated by the neighborhood watch in concert with real estate speculators, I told the patrol officer that when my landlord had recently turned down an offer on my home from the developer of a million dollar house across the street, the developer had suggested that there were “ways to get [me] out.” The officer impatiently told me that, for all he knew, the neighbors might even have a plot to force me out of my home. He was dismissive when I suggested that speculators might want to force out a renter to compel an owner to sell. And he didn’t see property acquisition as a motive in criminal harassment. He said that “up to a point,” monitoring by staring into someone’s windows is civil. As I’ve noted before, it became apparent not long after that we were already well past that. The mobbers always let me know I am being monitored by remarking on my activities in the harassment. But I have since concluded that instead of looking directly into my windows, at least most of the time, they have likely used those microphones that the nasty neighborhood watch lady of the northeast once referred to as “sensitive,” probably parabolic or perhaps shotgun microphones, to keep tabs on where I was in the house and what I was up to.

Surprise is the chief weapon of the mobbers; the mob itself is an attack against the most basic and unchallenged assumptions we make about privacy and physical shelter. Remember Monty Python’s Flying Circus? Nobody expects the Spanish Inquisition! Real estate mobbers share some of the weapons of Monty Python’s Inquisition:

Our chief weapon is surprise, surprise and fear, fear—our two weapons are fear and surprise, and ruthless efficiency—our three weapons are fear, and surprise, and ruthless efficiency…

The con of mobbing is in the subversion of expectation, the turning of assumption on its head. It’s conning you with an experience that no one else has. It’s not likely you’ll survive it if you don’t report it, and if you do you’ll look like someone who’s got some screws lose. If you don’t believe the con that you’re hearing voices and report, those from whom you seek help will probably fall for the scam that you’ve lost it, especially when the mobbers and their friends go around spreading malicious gossip that you’re “crazy” as you attempt to tell others what is happening. Either way, you have the mobbers attempting to manage you with still more cons, like they’re about to call for a welfare check, or that if you report harassment they’ll say you’re harassing them. These are things the mobbers made sure I heard in the early days of the mobbing, when they still thought they would work.

Mobbing is con upon con, with hefty portions of intimidation and threats, the final one being the fact that they’ve conned you into leaving your home without saying a word. “Daria says she has to leave of her own free will,” was a statement the mobbers piped in to me, as though they were having a conversation between themselves. Eventually I realized that these comments and perhaps even some of the comments that were made to appear to me to be statements with the microphone accidentally left on, were intended for me to overhear, to tell me their demands.

Mobbing is a viable strategy for criminal speculators in part because of surprise—disbelief—that makes it impossible to comprehend the bizarre circumstances and to respond accordingly. Disbelief is likely the first reaction of mobbing victims when they put two and two together and keep coming up with the same sum: That criminals have undertaken a no-holds-barred drive to forcibly evict them from their homes.

Disbelief was my response anyway. And much of my outrage over what I’ve had to endure the last years is because I am the victim of a crime that should not occur in the United States. And yet, even now as I sit at my dining room windows, mobbers in the houses north and south use directional speakers and ventilation harassment to insult and threaten me through the falling rain, demanding me, a legal tenant who raised her own rent this year and just paid to replace a dying lawn with a new one, to finally “Move on!” Most of us don’t believe that what is happening to me could ever happen. Especially if we and our forebears were privileged enough to live lives without being subject to genocide, pogroms or forced migration.

Mobbing against the assumption of the right to domicile

The assumption that no one will challenge our right to make a home in the United States, and that no one would challenge the rights of others to do the same, is perhaps the first target of attack by the mobbers. This assumption is also the greatest obstacle to recognizing that forced eviction by third parties occurs in the United States. When a victim fails to understand that crazy neighbor harassment disguises a speculator who wants his property, or when the police fail to see a motive in the neighborhood watch harassment of a renter in a neighborhood where there is documented evidence of renter harassment and every house is getting flipped again and again, the crime of real estate mobbing by shady developers and their nasty neighborhood watch friends will not be recognized.

We think slumlords evict tenants or that landlords might evict bad tenants. We haven’t considered that developers and builders would criminally harass or conspire with others to criminally harass legal tenants and owners out of properties they want to acquire. We haven’t considered that there might be a new wave of speculators who see themselves as so “badass” or “gangsta” that they would crow to their victims as they pelt them with harassment in their beds, this is “property war,” this is “a professional real estate hit.”

An unfamiliar phenomenology

The phenomenology of mobbing is focused on omniscience and indirection. To be effective, the mobbing must give the victim a compelling experience of both of these qualities. Each of the tricks, techniques and technologies that combine to create what one of those mobbing me once bragged was a “shadow service,” is used for its capability to create a sense that an omniscient and malevolent force wants the victim to leave her legal home and will settle for nothing less. Each of the mobbers’ methods is used for novel features it has that disguise and confuse, and ultimately indemnify the criminal real estate speculators who mob, or those who employ them to clear the properties they want to develop.

Implicit in hacking against assumption is controverting, subverting, and monkey-wrenching. Mobbing has that too. I remember a female voice early in the mobbing, one who took the lead in the hacking or hacking hoaxes around the time I told Microsoft Security there were voices coming from my machine and that I’d heard my neighbors talking about having installed a root kit on it. Shortly thereafter, I lost my contract. I remember her words, probably projected from a directional speaker onto the windows of my dining room: “Now, what else can we do to fuck [her] up?” The mobbers had learned the system of tones governing my life and had injected their own lines of code. Now they would execute the exploit.

In the earliest days of my own real estate mobbing as I’ve remarked before, the property mobbers occupying the houses south and north of me phreaked, hacked, and mobbed their way through a mash-up application that they seemed confident would “freak” me out of my home, tout de suite, no questions asked. They phreaked me over my unsecure cordless phone, babbling over nuisance calls in their own voices—the voices of the south mobbing house owner and his franchise family girlfriend—feigning surprise over a “party line.” They monitored me over the handset in the bedroom, which I unplugged after seeing a light on indicating it was in listening mode when I happened to walk into the bedroom. The owner of the north mobbing house who is ennobled by his profession and not much else appeared by the surface harassment onto the windows on the north side of my house, bellowing that he was using a universal remote to interfere with my weekend NPR.

Phone phreaks then and now

It’s no coincidence that real estate mobbers opened with phone phreaking. Mobbers, at least those property mobbing me in northeast Seattle, are all about phones. “Mobbing” is slang in some circles for cell phone harassment, a method which makes sense for real estate mobbers as well since, these days, the victims of mobbing almost universally have smart phones and are rarely without them. The real estate mobbing victim with a smart phone is always available to his mobbers.

I was a holdout when it came to cell phones, the same way I’m still a holdout when it comes to microwaves—stubbornly holding to privacy and process. So the mobbers phone phreaked me instead. And why not? Real estate mobbing is a culture of hacks made to take your home, system by system. What’s a phone phreak every now and again in homage of those who hacked Ma Bell?

The method of phone harassment my own mobbers opened the mobbing with—monitoring and babbling using the speakers of cordless phones—was likely a pleasure for a ring of tenant relocators who take pride in cutting off all means of escape to their victims. Cordless phones are mundane, comparatively “dumb,” and their complete lack of security makes phreaking a low-risk form of harassment for mobbers at play with a victim whose response is not yet predictable. It’s been awhile since I looked at this issue but as I recall, a few of the technologies that would have made this possible were radio scanners, or signal analyzers that would be clamped over the physical wire.

If you want to mob using phone technology, there’s no shortage of methods, among them phone phreaking, Voice over Internet Protocol (VoIP), using satellite phones to hide your identity, and harassing over the phone with voice changers. Telephone technologies are everywhere in mobbing and there are easy ways to phreak all of them. In many ways, real estate mobbing is nothing more than an adaptation of cell phone harassment to the physical world, harassment that scales to the environment of the “target.” From scanners used to listen in on cordless phones, to VoIP used to transmit harassment over Skype calls, to call-in public announce systems and man-in-the-middle attacks using IMSI catchers to eavesdrop on your calls—when you can phreak the phone you don’t need to know how to code or to conduct a network intrusion. When it comes to the telephone, you don’t need to be technical to mob. All you need to be, is a bully.

Everything is a radio

Everything that isn’t a phone is a radio. The mobbers’ first use of radios (other than mine)  came in the form of radio scanners. It was something of a shock to me when the Audi station wagon of the daughter of a builder working the street pulled up to me as I was watering the garden one day. The woman began to demand to know why I parked as I did and who had told me that I could do such a thing. As this self-entitled woman berated me, the tone of a radio scanner beeped from her car. I walked away from her, saying that I would be back in a minute with my tape recorder so that we could “talk.” She began an exchange with a man over her scanner, about what she should do.

Back in the house, I picked a security camera off the floor and stuck it out the window where it had been before I had been intimidated into removing the cameras a few weeks earlier. I heard her tell the man on the scanner that I’d put the camera back up, and saw her car slowly depart.

I reported the incident to Seattle Police Department, asked that they follow up with the woman and do something about what was evolving. I never heard another word about it. But the event made clear the presence of radios in the mobbing, well before I saw the recipe on the Internet for using a Citizen’s Band radio with a linear antenna to put sound on a neighbor’s speakers. Later, during one tense weekend—perhaps after I made the first of a couple of complaints to the FCC—the mother of the franchise family girlfriend showed up in another Audi, or maybe it was a Lexis, and with the owner of the south mobbing house they carried a draped item about the size of a stereo receiver out to her car. When I began to see radio technologies as pivotal in the mobbing, I found the RadioReference.com site, about the time I learned that the franchise family girlfriend’s family also had call letters, probably not surprising for a franchise family, but still another indication of radio know-how, just like the extensive military background of the north mobbing house owner.

When you don’t know where it is, it’s all around you

Finding yourself the victim of a mobbing is like being a stranger in a strange land, like Alice falling down the rabbit hole. What was once familiar is no longer the same and what you once knew you know no longer. The phenomenology of mobbing sound is at once highly directional and diffused into the air. And mobbing states intended to misdirect their a confused new victim will try to make you believe that as the mobbers told me, We’re in the wind. This is the lore mobbers would have you believe, before you hear their real voices bleed through their voice changers, before you find you can step in and out of the beam-focused sound by stepping behind a tree in your yard, before you see that by blocking the airspace between their kitchen exhaust fan and the half-light of your kitchen door, you can quiet one of the sources of sound that appears to batter you from all sides. It is difficult for the mobbing victim, and for any of those to whom she tries to explain or describe her experience, to believe that it is possible for a sane person to hear the harassing statements by her neighbor made on her television or radio, or to hear the voices of their friends who come and go from their houses at regular intervals on her cell phone whenever she makes a call. It is especially difficult to understand how parts of our homes we experience as being inert or benign, including windows and venting systems, suddenly become conduits for criminal harassment that is intended to quickly evict.

This inability to understand how criminals can co-opt our worlds by invading the systems of our homes and the devices we use every day may contribute to the fear and anxiety of the victim, a cheap shot by the mobbers intended to undermine the victim’s emotional stability and suggest that he has become “paranoid schizophrenic” and his reports of the crime should be discarded. Homes are becoming smart. Mobbers hack your home, system by system.

The assumption of immunity

The thing about mobbing using the “surround sound” method of monitoring and harassment, is that while occupying the houses on either side of the victim gives the mobbers excellent access to her, it also gives the victim insight into how the mobbers’ operate. It’s difficult, for example, to hide the license plates of the cars that constantly come and go, as though on shifts, from houses that stand no more than 10 to 15 feet from the home of their victim and when the victim learns that an interval of silence in the harassment usually means a potential witness is close to the house or that one of those somehow involved in the mobbing is entering or exiting the driveway. As I began documenting, I noticed mobbers changing cars, parking them in garages away from the public eye or dropping off and picking up mobbers later on, often with the “get-away” cars avoiding waiting directly in front of a mobbing house.

This works on multiple levels, based in part on the overconfidence of those who use this form of organized crime to vanquish residents from the properties they seek. When an organized ring of miscreants with criminal intent attempt to harangue, threaten, and ridicule someone for 24 hours a day, is all the while misguided enough to believe that nothing they say can ever be proved, they blather on about all kinds of things, some of them invaluable in an investigation. This is the downside of being hellbent on a hate crime in which the victim is never permitted to hear silence over the sound of the voices of those who try so hard to blot her out.

Common assumptions about devices and materials

Think you know the world? Read on and find out how these scumbucket criminal real estate speculators mob against some of the basic assumptions you have about your world and how they use your devices to create or transmit sound that is unmotivated.

Windows are to see out of

Windows herald the world outside. Peeping Toms use them to see inside. Mobbers frighten you into covering them by making you think they’re staring into them at you. When the mobbing really gets going, you won’t see them staring into the windows anymore though; too much legal exposure. Mobbers use windows chiefly as speakers for limited range surface harassment. It took months for me to understand the sound sources that the mobbers used relied upon the very panes of my windows. In fact, the last detective I tried to get to help, the one who suggested sound board, was the only person who explained how it worked. And if you’re being mobbed in this way, it’s likely that if you try to explain to people, as I have, that the sound is “projected onto windows” they’ll assume you’re crazy because this is not something that most people are aware of. Another of the investigators I used insisted on walking around the house with a sensor looking for electronic bugs, and of course there were none. And the police don’t seem to be aware of these sneaky methods either; perhaps the police are trained more for encounters with straight-up criminals who are more honest about their criminality. Even if there are bugs, if you’re being monitored your mobbers can probably defeat their detection by a wand. I could still be wrong about this, but the platform of mobbing that makes it attractive to people with money who don’t want to be prosecuted for criminal forced eviction, is its white glove approach with nary a planted device. All the better to make the mobbing victim who is hoaxed, scammed and conned look “paranoid” when they insist to police that their neighbors have put bugs in their home.

You choose the TV program

Whether you use subscription television or have stayed with a convertor box, when you turn on the TV, you expect to select the programming. If the remote control doesn’t work, you change the battery and you assume that this will take care of the glitch. But things don’t work this way when you’re being mobbed. In the early days of my mobbing, I wondered if a bug had been planted in the television and, after breaking my two Proton radios trying to find a bug, we popped the power button off of the TV to look for the same. Nothing. This is mobbing against the expectation that you control the television, and then exploiting the victim’s fears that there are in fact bugs scattered throughout the house. When you don’t know radio and you haven’t used radio to monkey-wrench your neighbors, the sound of your neighbors’ voices spewing insults and threats on your television or radio is unfathomable. Unless they’re aware of mobbing, the police will doubtlessly fail to recognize your description of these odd events as based in reality.

When you’re being mobbed, you can expect to hear harassment on any entertainment device. The assumption the mobbers hack against is that the user selects the sound that is sent to the speakers. When you’re being mobbed, the mobbers will be sure to add some enhancement. I remember last year, hearing a security professional say that there was no way he would have a “smart” TV in his house. But even without the added technology, television is easy to hack (Hacking the Cable Modem: What Cable Companies Don’t Want You to Know, https://www.amazon.com/Hacking-Cable-Modem-What-Companies/dp/1593271018). Cable boxes have long had hacks and the cable infrastructure is a model of insecurity for similarly insecure infrastructure now deployed for wireless television. There are recipes on the Internet for combining antenna and radio technologies to put sound on speakers within line-of-sight, and when it comes to wireless TV, mobbers don’t even have to share your cable line to climb on board. Wireless set-top boxes lack security and provide ample games and applications that use port 80 to connect to the Internet. This means that the possibilities for intrusion and injection of rogue streams are many.

As well as mobbing against the assumption that you select your programming, real estate mobbers hack  your TV based on the assumption that your neighbors are trustworthy or, alternately, that no one has any reason to do such a thing. An apparent assumption of design that they hack against is that only one sound source will be activated at one time, so why not leave the speakers open to all of them? Another possible assumption for broadband TV , one that probably makes attempts to record mobbing harassment futile, is the fact that when subscribers request a recording, it is commonly done at the back office and not at the point of the subscriber set-top box. This means that the recording never captures the programming as it is received and played for the subscriber. And recording a show with harassment over it externally with a microphone, which isn’t likely to work if you’re being monitored anyway, is even less likely to pick up useful sound. The way television providers inscribe your television set with their private solutions and applications, you don’t have much recourse when third parties begin to modify the content. When the mobbers put sound on the television, I can modulate the volume by turning the sound up or down so the mob is definitely on against the unfortunate and near universal assumption that security is not needed on the consumer device.

Network intrusions are made to steal data

The problem with so many of the assumptions about network and device intrusions is their assumption that the target is data. With mobbers and stalkers, you’re the target. Mobbers don’t want to change files. Hackers take; mobbers lurk. The more applications you leave open with volume on, the more casually you leave cellphone, wireless, GPS and other smart phone services on, the easier it is for you to be followed and watched, even if your stalkers aren’t mobbers or your mobbers don’t immediately start to babble. And like television, phones give unfettered speaker access to applications so that where there is volume, there is sound. You assume that sound is made by your ringer only when there’s a call; that’s an assumption your mobbers take to the bank. You assume that the sound applications you leave open are used only by you. Again, this is an assumption the mobbers mob against. You assume that your devices are inactive when you are not manipulating them. Wrong again. It’s entirely possible that mobbers want access more to harass than to listen or to look. After all, if part of the con is making you think you’re always being watched, they can attempt to make you feel uncomfortable without lurking by convincing you that they’re watching. This keeps the footprint of the mob small. One of the ways they do this is to use their access to your speakers make judgmental statements about your appearance, statements intended to make you feel self-conscious. Nevertheless, this does not mean they’re always watching. Think about it, all cyber-stalkers and harassers have to say to make most people feel uncomfortable, especially if they are young or vulnerable, is “You’re ugly.”

Cell phone calls are safe

Most, maybe all phones, use the closest cell tower. An IMSI attack is an easy man-in-the-middle attack that phones were not designed to take into consideration. An IMSI catcher is a device  that acts like a base station; its legitimate use is as an extender of a cellular network where reception is weak. This is technology you can buy on Amazon.com for a couple hundred bucks. In the hands of a mobber, an IMSI catcher between you and the closest legitimate cell tower exposes IMSI (International Mobile Subscriber Identity) information and allows your calls to be intercepted.

Speakers play the music I turn on

Speakers are one of the fundamental weapons of mobbers. If they can’t get to you through your own speakers, they would probably have to follow you constantly with parametric and parabolic speakers. That could get expensive. The easiest way is to access speakers in every environment you traverse, this means the speakers on the television at your parents’ home, the speakers on cell phones of  your coworkers, the speakers of access points, smart phones and computers. Hearing is selective. We listen to the sound we play or expect to hear. No one but you knows the voices of your mobbers. No one but you knows that, somehow, some way, some criminals are putting sound on the speakers in your environment. And if you tell them, they probably won’t believe you or, even worse, will quickly conclude you are psychotic. This is the assumption that mobbers mob against. That everyone hears the same sound on the speakers and that you hear only the sound you select from the tuner. Mobbers appear to train themselves and each other to inject threats, insults and demands into soundtracks, mobbing to fit into the environment and so that only the victim, who is acculturated to the voices of his mobbers, “hears” them. Human assumptions and perceptions work together to protect the mobbers from detection.

Public address systems deliver messages from trusted sources that are meant for the public

This assumption is twofold. That a public address system message is a broadcast and not meant for a single person. And two, that only those trusted by the institution or business that owns the public address system may access it. Instead, public address systems are notoriously insecure, especially as there is convergence between them and wireless access points in the form of speaker-enabled access points. These systems are increasingly accessible by phone using a default number that many businesses don’t bother to change. A mobber can hone in one a single access point for a sneak attack on a victim in proximity or use code specific to the mobbing, for example, as in my own mobbing “Give us the bot!” to issue a harassing statement that can only the victim can identify as harassment. My mobbers use speakers that have music, much of the time, a circumstance that obscures the harassment from those who don’t expect subliminal messages at the grocery store. This is another example of a mobbing victim who remains completely isolated in his victimization while in the public sphere. And this is very much an application of cyber-stalking and harassment, as well as an updated phone phreak when public address system access is given by phone and not by intrusion into a wireless network. Public harassment is another way mobbers up the ante. Victims may not realize that while the mobbers want you to think you’re being publicly shamed, they can’t afford the risk of letting everyone hear. Yet in such cases, the victim may make a fool of himself by responding to humiliation that he assumes to be public. And fears of this public humiliation can only help the mobbers to quickly and forcibly evict. Someone who would leave his home rather than face public humiliation is a victim made for the mob.

You control the interfaces of your computer

A computer is a machine and, as such, we expect to control it. In the language promulgated in the era of IBM mainframe computers, we are Operators. We tell the machines what to do.

Being mobbed is a bit like finding out that your computer and your devices have been “upgraded” to be HAL in 2001. You turn the volume on one interface, and the mobbers pop up on another interface. How do you defeat a mobber lurking on your system? You have to cut the cord and take the machine offline. But in the days of the Cloud, the lack of an Internet connection limits your activities to the point where the machine becomes unusable. And even if the machine is offline, a rogue sound application or a root kit could probably still cause harassment to pop up on your machine.

It can take time before the mobbing victim begins to see a relationship between sound-enabled applications left on or open and the presence of the mobbers. When my mobbing first started, the mobbers were always on the speakers of a Windows machine with a bad sound card that my contract agency gave me for use at Microsoft. And still, the mobbing began on my computer much like it began on my low-tech cordless phone, with the familiar voices of my neighbors, and as though it was a party line, with wild stories, chortling insults and ridicule and then with increasingly wild hoaxes. Lost in this strange perceptual world, I disabled HDMI and other interfaces, uninstalled drivers, and disabled the adapters on the computer before the mobbers took advantage of my confusion one night as I sat at home trying to work by executing what would be a continuing and likely hoax that there was a root kit on my machine.

Vehicle ventilation systems move air

We assume that air is what moves through ventilation systems in our vehicles. Vehicles have ventilation systems to make the closed passenger compartment comfortable. If you have air conditioning, these channels move cool air through the venting system and into the passenger compartment. If you have a heater, warm air is transferred from the engine into the passenger compartment through the same channels. Even if you don’t run the fan, the forward motion of your vehicle forces air through open vents and into areas of the passenger compartment. I’ll talk more about this in the final part of this blog on unmotivated sound, but mobbers can use your ventilation system to channel harassing sound through your vehicle, even if the radio is off. I haven’t written a countermeasure up for this yet but if you are being mobbed in a vehicle that has no radio or you are not listening to the radio and you’re still hearing the mobbing, you can try closing the vents, changing the air flow to direct it to your feet, you can open the windows a crack to change the air currents in the vehicle, or you can cover vents you cannot close with a sound-absorbing material. Vocal harassment that is transported in air currents is subject to interference by disturbing those air currents.

If they know where I am, they can see me

GPS technologies and applications coupled with location awareness makes it easy for mobbers to mob against the common assumption that if someone knows where you are they can see you. There are all kinds of ways that mobbers, especially when they are tenant locators who live in your neighborhood or have enough information about you, that make you think that they are physically following you or are watching you from nearby. This is a way to increase victim anxiety as well as a tool to enable hoaxes. When you have a smart phone with location awareness turned on, the GPS coordinates of your phone can also, and realistically, make you a target for following by surveillance drone by real estate mobbers who’ve invested a lot of money in developing tenant clearing “shadow services” to attract a high-end and nasty clientele that includes developers as well as those prominent in neighborhood watch and council organizations. When you have constructed a shaming crime, it doesn’t matter if the mobs’ eyes are on the victim so long as he is convinced he is being watched.

Early in my mobbing, I remember the voice of the owner of the north mobbing houses who is ennobled by his profession and nothing else, informing me that I was already beat: “We’ve got your entire house marked off in GPS coordinates.” I wasn’t sure what the meaning was of the statement at the time; in those days they ran hoaxes about GPS buttons in my house and GPS spray on my bike panniers as I moved from light to light and switch plate to switch looking for electronic bugs. Eventually as I learned about equipment using beam-focused sound, however, and learned that with some devices you could place sound using GPS coordinates, it seemed a statement that might hold more possibilities for the hostile acquisition of a home and its lot, even if it was originally said to me to intimidate. It’s only been in the last few weeks that I realized that with GPS coordinates from a smart-phone traveling with you, your mobbers only need to lock onto them to follow. And when cell phones are kept in easy access on vehicle dashboards and bicycle handbars, following by surveillance drone or drones with go-pro type cameras is an easy and very accessible strategy for aspiring investors thrilled at the thought of bullying people from their homes. They don’t even need to see you; insults like “You’re ugly” can have a negative impact on people even when said by those who’ve never laid eyes on them. And if the mobbers want to try to convince you that they are looking, they can just say “As I look at you now….” My mobbers, even though they are clearly based next door, have used that one on occasion in surface or cyber-harassment.

Garages are where you put your stuff

An open garage door is a sign of a home owner at work. But when the home owners are mobbers, the work is mobbing. When those mobbing me in northeast Seattle have their garage doors open, it’s usually either for purposes of monitoring or to amplify radio or speaker harassment as they monitor to guard against witnesses. Only the victim who hears the harassment understands the meaning of the open garage door. In the same way that the mobbers like to make circle jerks out of washing their cars, some of the mobbers who come to the south mobbing house—which provides the greatest proximity to my own driveway and front windows—appear to work from inside or in front of the garage door.

Window fans are for air circulation

So you thought. The mobbers use all kinds of transports for harassment. Window fans are higher technology than an inactive and therefore passive household venting system, but the latter demonstrates more mobbing finesse. For most of the mobbing, the south house mobbers have kept window fans in a couple of their third-story windows that are positioned directly above my own windows. As with the surface harassment projected by directional speaker, it took time for me recognize that the harassment I heard was propelled by the window fan. To test that, I had to learn that I could mitigate the surface harassment that resulted from the slow spin of the fans by opening my window slightly. For the kitchen, sometimes I set empty plastic water bottles or chopping blocks up on the window sill and break up the reverberation of the sound off the window that way. Tonight I amused myself by sticking some rather elegant Charles Viancin “Lilypad” silicone lids onto window panes, and enjoyed the immediate but temporary difference, likely caused by absorption of sound waves transmitted from north and south mobbing houses.

Both male owners of the mobbing houses north and south are home tonight, aiding in the ongoing criminal effort to forcibly evict me, the female neighbor they expected to be an easy target. Perhaps I should write up a tip on using Charles Viancin silicone lids as a countermeasure to mobbing.



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: