See this email? Looks pretty festive and nice as pie right? Not So. This is from a former co-worker that no longer lives in the area. She's moved far north of here but I still keep in touch with her. She and I are friends and I was there for her when her brother passed away from HIV. She's the nicest person I know...but wait a second, it isn't from her...want to see?
You see, I check every single email that I get for routing information so that I know if it is from one of Lori's IP Addresses...like 209.85 or 209.84 or one of the others that I've charted out over the years. 209.85.xxx.xx has been the address used by several different police officers, Rhonda Long, Rae Fernandez and Chief Reyes to send me messages from the City of Palm Springs after using a private Android phone, Samsung, to contact me. Unless all three police officers use one cellphone to connect to the city email, this is Lori. Now I know that Sharon and Anthony were never at this address, so why is my former co worker, that I am close to, sending me stuff from there now?
It's simple, Lori is targeting the people that I work(ed) with to start trying to get me fired. This is a plan that Missy, David, Lori, Christian and Brian all came up with, in an effort to stalk me. One other thing that I noticed is that it is sent from a Boost Mobile Phone, like I told you all that we were now using off of the Verizon system. You see, Lori needed to have a Boost Mobile phone so that she could contact Verizon to see how they change numbers portably from Boost to Verizon and back. This way she can steal our phone numbers and use them at random. She'll simply call Verizon and get the information like she is an operator. She only needs this phone for a month pre paid to learn how our new phones hook into their system and back. The problem is this IP Address.
This wouldn't work though because our phone numbers are prepaid for a month and the number isn't portable until the contract is up. Our phones are also LifeLocked, in case Lori forgot...so any playing with our phone accounts will be sent to them for investigation.
Once you see that the IP Address is exactly the same device from the same location in Joshua Tree, you know that Lori is at it again. Stalking me and using my co-workers to try to get in touch. This time she took that bait again. I told this former co-worker that she was "like a sister to me", and that enraged Lori. Now Lori wants to pretend to be her. Elementary my dear Watson.
After receiving this email, I took down the exact routing information and then used my Outlook.com email account to report that "my friend has been hacked". This will flag the gmail account that was used by Lori and now the LifeLock team or federal investigators can get involved.
What Lori did was simple. She learned the last name of my friend from work then found out that she uses Verizon for her cellphone by checking from her home Verizon computer. She then lifted the phone number portably and assigned it to her own Samsung Droid. Then she used the "send me a passcode to my cellphone, I forgot my password" selection from my friend's email account and got a one time use code to change her password. Effectively now, my friend is locked out of her email and Lori is now Ruth. Now Lori is planning on sending emails or texts from Ruth's phone to other co-workers to try to bad mouth me. Ruth is, for now, no longer Ruth. Lori is Ruth and she'll do whatever she can to cause damage. She can also now access all of Ruth's emails and pictures from that gmail account. This is how Lori steals identity using Verizon Wireless operations computers.
Look at the routing information:
Once you see that the IP Address is exactly the same device from the same location in Joshua Tree, you know that Lori is at it again. Stalking me and using my co-workers to try to get in touch. This time she took that bait again. I told this former co-worker that she was "like a sister to me", and that enraged Lori. Now Lori wants to pretend to be her. Elementary my dear Watson.
After receiving this email, I took down the exact routing information and then used my Outlook.com email account to report that "my friend has been hacked". This will flag the gmail account that was used by Lori and now the LifeLock team or federal investigators can get involved.
What Lori did was simple. She learned the last name of my friend from work then found out that she uses Verizon for her cellphone by checking from her home Verizon computer. She then lifted the phone number portably and assigned it to her own Samsung Droid. Then she used the "send me a passcode to my cellphone, I forgot my password" selection from my friend's email account and got a one time use code to change her password. Effectively now, my friend is locked out of her email and Lori is now Ruth. Now Lori is planning on sending emails or texts from Ruth's phone to other co-workers to try to bad mouth me. Ruth is, for now, no longer Ruth. Lori is Ruth and she'll do whatever she can to cause damage. She can also now access all of Ruth's emails and pictures from that gmail account. This is how Lori steals identity using Verizon Wireless operations computers.
Look at the routing information:
As you can clearly see here after all of this message source information...the email comes from an Android phone using the Boost Mobile system from an IP Address in Joshua Tree, California. So, at least for the next month, Lori has a phone.
