Important technical information has been stolen from my systems

... an unsuccessful attempt by a local group of pranksters to play with me online formed the opportunity for members of local unlawful internet groups to steal very important and innovative private technical information on which I had been working during the last decades, especially since 2015, from my electronic systems...

Since 2016 various complicated situations, which appeared out of nowhere without any reasoning, have resulted in tremendous waste of my time and also in various serious problems that had been forming and escalating since then in uncontrolled manner to the point that my personal, social and professional lives have been severely affected during the last years causing tremendous trouble both to me and also to my close relatives and friends at the same time.

After conducting private personal research both online and offline since mid 2018 I have gradually been reaching solid conclusions about the big picture of the situation and the time line of the development of all problems.

It seems that an unsuccessful attempt by a local group of pranksters to play with me online formed the opportunity for members of local unlawful internet groups to steal very important and innovative private technical information on which I had been working during the last decades, especially since 2015, from my electronic systems, which include theoretical analysis and technical approaches of various technical concepts and problems and early software implementations of them regarding data analysis, including pattern matching and analysis of financial data, data management and data security, and also technical information and implementations regarding the administration and security of IT systems.

During the last years, according to my personal research the members of the unlawful internet groups have gone wild exploiting all the stolen information in order to approach and form the necessary conditions for the misleading and the exploitation of several hundreds, if not many thousands, of persons and companies both in Greece and abroad by impersonating in various ways while using privacy aware underground internet networks attempting to form irreversible and complicated situations based on secret private agreements between them and the approached parties and secure their unauthorized and illegal management of all the stolen information through extortion.

It is very possible that they have been working together with members of similar exploiter groups in several countries, especially during the last two years. It seems that there has been organized effort by the exploiters to approach persons in key positions in various companies and industries and also members of important and privileged circles or members of hacker groups in many countries in order to form beneficial opportunities both for them and the approached parties.

There have been indications that this operation has been taking place in very organized manner at least during the last two years, that all activity by the local exploiters and their foreign acquaintances is currently very carefully planned and that they have also been very busy forming impressions about the supposedly involvement of various other third parties in many countries regarding the forming of the situation since 2016, who most probably are totally unaware of the problem, to the point that I am very concerned.

I am going to write a few notes every now and then about this situation, so as to keep everyone updated if I consider it necessary.

George Notaras avatar

About George Notaras

George Notaras is the editor of the G-Loaded Journal, a technical blog about Free and Open-Source Software. George, among other things, is an enthusiast self-taught GNU/Linux system administrator. He has created this web site to share the IT knowledge and experience he has gained over the years with other people. George primarily uses CentOS and Fedora. He has also developed some open-source software projects in his spare time.