posted on Apr, 19 2016 @ 12:58 PM
It was after this test that he inspected the circuit board more closely and noticed that not only was the soldered connection to the antenna much more
robustly-filled, it seemed to be a different kind of solder (at least as indicated by coloration) as the other connections on the board. He also
noticed that there was a smaller board glued to the main board in a perpendicular direction. Not being an expert on fan electronics, he decided to
look up the model number of the fan, a harbor breeze, and look up the remote reciever part number listed in the manual. He then searched the part
number in both amazon, ebay, and a couple third party sites. Amazon did not have close ups of the circuit boards, but the housing was a confirmed
match. The antenna did not have the same end cap, that the ones in his apartment, however. Upon scrutinizing the pictures on ebay listings a couple
examples of the proper component with the right housing were found. The antenna did not match, and the additional board on the perpendicular was not
a part of the circuitry as shown, although it was connected to the part on the board where the antenna was soldered in the ebay picture. The board was
also soldered onto another connection on the board. There was a screw covered in glue that appeared to be a frequency control knob and there appeared
to be a contact point for a frequency tester to be placed. It was at this moment that he used his soldering iron to heat the antenna connection and
pull the antenna off the board. Curiously, the remote control for the fan still worked.
It was immediately after this experience that OP began to look at the wireless networks that were detectable by his computer and his phone. He had
always noticed that there were a few networks that seemed to be ‘rogue’ in that they had low signal strength, but they did not appear at the edges
of the property as one would expect for a neighbor network and could not be accounted for in terms of the company network devices that he had
frequently had to log into in order to keep the company network working for he and his neighbor, the live in handyman. We'll call him 'Stanley
Sprocket'. Perhaps it was just coincidental timing, or the fact that he replaced his HTC one m8 handset with a samsung galaxy S6 Edge Plus, but
shortly after the fan episode, he observed that the number of these ‘rogue’ networks increased from the usual 2-3, up to 25-30 individual network
SSID’s showing up on his phone toward the front door of his apartment. Toward the back of the unit the signal strength weakened for these networks,
but their SSID’s all continued to be visible. This new development appeared significant, so he decided that more powerful analytical tools were
needed. He did some research and downloaded ‘wifi analyzer’ for android phones. With this new software, he was amazed that he could very easily
zero in on the point location where signal strength peaked for each network. He started by testing it on known devices, and the closer he got to his
router, and range extender, the higher their signal strength reported in -db values. The software appeared to be reporting results accurately. Next he
wanted to find where all these networks were located. Suspecting that they were each a part of an array of surveillance devices, he selected an
individual network SSID and set out to find it’s point location for peak signal strength. Using the beeping signal indicator function, he walked
outside and did circles around his terrace level and the level below, hoping to get a directional signal of where it was coming from. Oddly, the
signal strength didn’t get stronger as he walked the perimeter. It got weaker as the distance from his door increased, as the terraces are
rectangular and he wasn’t walking a true circle. This decidedly creeped him out, but what really confused him was that he noticed that the SSID of
the network that he selected had changed from ‘sweetie network’ to ‘Drathlos-Gast’. He recalled from his year of german at UW that
‘Drathlos’ means wireless and ‘gast’ means ‘guest’, so either this device was a german router or it wanted to look like one. This
‘micro’ view of a single network didn’t seem to be doing him any good, and was posing more questions than it was answering, so he switched back
to the ‘multi-network’ view mode. He started zeroing in on the peak signal strength location of this ‘Drathlos-Gast’ network, and was rather
shocked to see that all of these newly-visible, low-signal strength networks all had exactly the same signal strength. What also was immediately
apparent was that not only did these networks all have exactly the same signal strength, but they also quite obviously covered the entire 2.4G wifi
spectrum equally covering channels 1-6, and channels 8-15. Very suspiciously, the Generic vodka company company network, which was the highest signal
strength network of the scannable spectrum, bridged the gap from about 5 to 10. The piece de resistance was the fact that the ebbing of the signal
strengths of all from scan to scan could be described as: the peaks of the low strength rogue networks corresponded to the valleys of the ‘Generic
vodka company’ company network. To OP, who was a novice to this kind of inquiry, it intuitively seemed obvious that these rogue networks were
communicating with the “Generic vodka company” network and vice versa. The final detail and certainly the creepiest part of this entire networking
matter, was the fact that the point location of peak signal strength was on top of the concrete pad outside of OP’s apartment on his same terrace
level; approximately 5 feet from the edge of the pad and the downslope toward the lower terrace level.
Naturally, OP took out his ‘Seek Thermal’ imaging camera and fired up the app and took a look. Shockingly but unsurprisingly, the temperature of
the point location of peak signal strength was 115 degrees fahrenheit and the rest of the pad from about 2 feet outwards from that spot was the
ambient temperature of about 78 degrees F at that time.
“Kieran”
Among live-in handyman Stanley Sprocket’ revolving cast of meth characters was his ‘high school best friend’ Kieran. Kieran and OP hit it off
rather quickly because of their mutual love for a strong tipple and for sport shooting. They had long conversations about the 1911 platform, and all
kinds of firearms in general. Kieran purported to be a safety class instructor at the local Koko Head Shooting Complex, and over the course of the 9
months OP lived at 'the location', had demonstrably proven himself to be a lush, a pill junkie, and a chronic crystal methamphetamine smoker. He had
also proven himself to be a world class bull#ter and could literally talk about a mixture of nothing and his past sexual conquests for hours on
end.
At the time that OP began to question the validity of the identities of everyone on the property (except himself, of course) he began to implement
what he called ‘continuity’ testing for each individual there. One night when Kieran and Stanley Sprocket were blowing much white vapor and
annoying the # out of OP, he started asking questions about factual background information about their relationship. He dug deeper into the nature of
their relationship, as they had never qualified it beyond ‘we were high school buddies’.