Overcoming Technological Stalking: A Personal Account and Steps to Take
In an alarming turn of events, I found myself ensnared in a precarious situation involving digital invasion. Late last year, I began to notice unusual occurrences on my computer. Tabs began to open and close independently, music started playing from iTunes without any input from me, and the mouse would navigate the screen on its own. My Android phone didn’t escape unscathed either; icons mysteriously shifted, and during my time on Reddit, the page would scroll as if manipulated by an unseen force.
The situation escalated when, upon returning home, a training video of a boxer began playing on my phone right as I stepped through the front door, accessing my Wi-Fi. This video was buried in multiple folders, taking considerable effort to find and play. Just half an hour prior, I had used my phone solely for a calculator while out grocery shopping. Disturbingly, it seemed as if a ghostly hand was controlling my device. Things took an even creepier turn when I conversed with my cousin and heard unintelligible mumbling and keystrokes of a phone number being dialed, leaving us both unsettled.
To safeguard my privacy, I made the difficult decision to part ways with my computer. During one unsettling session on Firefox, I briefly saw “4chan” flashing at the bottom of the screen—suggestive of unauthorized access. Upon checking my file storage, I discovered my “D” drive, once empty, suddenly held over 6GB of mysterious data without my consent or knowledge. The thought of someone planting illicit material on my machine—potentially leading to wrongful accusations—was deeply troubling.
In a bid to regain control, I disconnected from the internet entirely and switched to a basic Alcatel phone devoid of online capabilities. However, strange notifications labeled “Unknown Application” began surfacing on this simplistic device, alongside a peculiar clicking noise upon locking and unlocking. Even drafts of messages mysteriously vanished, heightening my suspicion.
I maintain regular communication with my cousin, but I can’t help but feel that the hacker may have compromised his smartphone too; each interaction raises the risk that the malware could seamlessly transition to my Alcatel phone, despite its lack of internet capabilities.
As I ponder the idea of re-establishing an internet connection and acquiring a laptop, I’m faced with the unsettling truth that malware can infiltrate routers. This means even if I format my devices
Share this content: