Our System has been Totally Intruded


Sample Photos Part 1 Sample Photos Part 2 Additional Photos


Urgent Issue: Yuan Sun, the spy from China in Los Angeles, who has intruded our network by his stolen then upgraded Microsoft Http System Drivers, higher version of OP. Embedded in our system, he has been established current Bi System only he knows , to spy, to attack Americans and to control our normal Http system. See attached color photos with briefs

Dear President Obama,

My name is Qiu Min Ji, I am also known as Rebecca Ji, I am Chinese-born American citizen, a professional performing musician, internationally respected educator, and an expert at arranging cultural performance tours of China. (More background info at the end of this article )

Over the last three years, I have been monitored, poisoned, tortured and my online activities has all been controlled. The high technology military spy has stolen Microsoft's HTTP System Drivers, upgraded them, he also uses his secretly upgraded operating system and is remotely and secretly using his advanced system to control our Internet, en-us. For over three years, the spy gets in any computer I use, either public or private, I have tried hundreds of computers, but never be able to escape from his control even once. I have been forced to be on the spy's system. I have photo documented his remote computer running altered http system drivers, I saw by my own eyes how he can duplicate, block any website, change or block any content he wishes. By adding a word or two, he can obtain a totally different set of web addresses and steal the whole set as his own by his "auto-column-input" system. And he use his stolen site to control the original website. Each duplicated site left an additional cyber address: http%3A%2F%2F or http%3A//, that allows him complete access to any website resources and controls. ( see sample photo page 1)But, the webmaster would never be able to see anything wrong, since the spy does not alter anything on the original website, nor leave a mark of intrusion.

For over three years, I have to log on to Yahoo! from the spy's fake Yahoo! logins, and he monitors all my emails contacts, deletes emails from any of my accounts or blocks them from being viewed. For over three years, I have never been able to download the real Google Chrome, since the spy has his way of manipulating it as his fake ones. Yuan sun the high tech military spy has been controlling all my emails, and he uses my hot email account to storage his stolen Micro soft resources, use my yahoo email account to operate his fake yahoo logins, and use both Yahoo and Google to host his attacking plans. The spy has disabled Microsoft "Live" features, to enable him block live search, email, and translation. Instead for over three years, my online research results have fake phone number, fake addresses and wrong info. But even I have tried so many times to report him to Microsoft, I never able to go through his fake yahoo, Google to make a report on him.

Yuan Sun intrude Microsoft, stolen Web Security Flash Detection, wiped out all Microsoft resources, networking system, and Microsoft magic files, the http system drivers. Remote Access drivers, Protocol driver, and as a computer programmer, he upgraded all of them and intruded further the whole internet by his stolen, and upgraded system. ( see sample photos page 2) Since I have been forced on the spy's system, it gives me the chance to see his secret online activities. I have documented hundreds of thousands of photo evidences, all to prove that the 2nd system DOES EXSTS. I have been studying researching how he controls; here are more of my findings with photos:

Yuan Sun has altered the functionality of computer Parental control as his advanced System control, that is where i have read thousands of privacy report and photo documented over a 100 to prove his advanced system control.

For over three years, my phone has been disconnected with AT&T, the spy has added an secret Extension Application and operated my phone, along with others on his server and controls not only my phone, but people's phone who joint my efforts to expose him. The spy has stolen Windows phone technology, AT&T could not find anything wrong on my reports with other witnesses. Why? Because the spy's "bi data Retrievers" can track any government data, any consumer data, erase them and input seemingly perfect data instead.

The spy established a secret Bi system only he knows he reset up Microsoft trends and search boxes, embedded inside our system, establish himself as the dominate figure.

The spy has a secret Titled mapping vs. normal Google mapping. He secretly established a bi System, has set up that his BiMapping governs the normal http bimapping. He has diverted my called to wrong numbers, and diverted my emails to wrong addresses, All he needs to do is push a button to switch the normal Google mapping to his Mapping.

What does the spy's controlling system looks like at a quick glance? Privacy reports in many web pages, as they are part of his controlling system, spreading out as his spiders. The spy can block any part of any website from view, cut it off and not let it show. and The enclosed photos further explain differences in website appearance: the normal http system website addresses are in solid black. the spy's system show solid black and mixed with pale color. However, since the spy hears, monitors every minute, knowing what I have figured out on the physical web address appearance. Only recently, he has been working to get the solid black color address lighter and lighter... ( see sample photo page 3)

The spy put a slash "/"after the normal http addresses. Normal www.yahoo.com in normal http system, But, www.yahoo.com/ is in the spy's system. while www.google.com is in the normal http system, www.google.com/ is in the spy's system. When the slash "/" being enrolled into his system, he can put more slashes, and any contents, which is hard to identify his intrusion because the start of the web link address is the same as yours. But, Microsoft http system seems still able to identify his system, making it appeared in pale color. ( see sample photos 4)

The spy is everywhere on line but you do not see. He hides his links tags on major online companies websites such as Yahoo! and Google, AT&T, LA metro rail, Army track. He is able to put in his tags at different logos, photos and articles that in any site for his deadly attacks, and controls. I found these in his privacy reports and when I checked each of the Yahoo Google's properties of their links, most of them in Yahoo are the spy's properties and settings . He also put his scripts on propertied original Source ( See sample photos page 5A-5C)

The Most Recent Findings on Sample photos (6- 12)

How can the spy intertwine with all US major corporations websites remain undetected? One of them is: He has registered identical DNS names as yahoo, Google, Microsoft, AT&T, each a few times, he got keys of their digital signatures, By using his higher operating system, the spy can do whatever he wants to do, and the bi system accept it. He registered a tracking software program, Android for his tracking and killing purpose. EVEN ABLE to register DNS name of VeriSign to make VeriSign verify his "Legal Status" .

As I have obtains solid evidence, the spy's killing efforts also escalating. He showed his online bioterrorist, online attacking face by using his own website; www.pandaapp.com, which is full of all tracking attacking resources and software, by which he has been recruiting fellow criminals, coaching beginners and involving so many innocent online users through advertising of winning gold for his round up APP Benchmark testing. He also recruits many innocent people through his yahoo, Google, AT&T fake logins, they drive around wherever I go, help the spy's killing efforts.

The spy controls my emails, he turns my Gmail account: stopthespi@google.com, as part of his killing program. He posted my profiles as his ex wife, and force my images on different website profiles, social media at current bi system. He uses Android, IDM image tracking and g software, put my images on lights, cars, vans trucks, Metro rail station monitors, Amtrak. His online publicity also encourages people to take my photos so there are more visibilities to target me.

Yuan Sun divided his Marketing /recruiting efforts into eight categories, each has its designated recipients. The enclosed email photos are from my email address, I checked their properties, everyone is Nero snap view attacking link. When I opened this email, I felt the attack immediately. Since the spy has all his tools network resources, and the images he linked are at his server codes protected. He sent his multi categories to millions to American residence, asking people to download his software to clean their computer, which is lying. All of his YouTube videos are actually Nero photo snap view, with the spy's default settings. When people click, I automatically gets attacks, and the more people do, the heavier attacks I get, and I have been suffering.

The spy put my social images online for tracking, he holds hundreds of my separate body of images, from skin, bone joints to nerves and organs on his Advanced system with protecting codes. One of the spy's ways to torture and to kill me is by using Nero. Since Nero is CD burner, it has a very high frequency, the spy use many innocents clicks to torture to burn my body inside and out.

Yuan Sun, the high technology military spy from China, has not only been attacking me, but many other patriotic Americans who have joint my efforts to expose him. He has invaded their computers and phones. As we have intensified our efforts to expose him, upgrading my website and writing letters to different organizations, he attacks them to make them sick. He is obviously attacking my work force and controlling our efforts to reveal him. Yuan Sun has been putting radiation in their cars, flattening their tires, smashing car windows, drawing car batteries, and making their cars inoperable, forcing some of them to quit. Yuan Sun also creates dangerous road conditions, he was able to remotely connect radiation to the vehicles I frequently sit to make the van's brakes suddenly stop working without warning. The spy's attacking patriotic Americans INCLUDING my private investigators, both of whom saw evidence trying to bring him to justice. One is an ex-LA County Sheriff Spokesperson who has been beaten up twice in one month by his associated criminals when 3 and 4 suddenly jumped on him, and beat him, injuring and sending him to hospitals. To bring the spy to justice means sacrifice. Another of my private investigators, who has obtained digital evidence, was paralyzed, and I believe it has something to do with Yuan Sun's secret attacks, since I know how I have been attacked, and I would had been paralyzed or died thousands of times if I had not figured out the counter measurements.

Yuan Sun controls our efforts by controlling our communication. All the of ways of communication we tried have failed. Sept 2012, we sent out over 100 emails to top US newspaper editors, and all emails had been diverted to wrong addresses. We knew that because only one person called us and told us she was not a newspaper editor, but a victim as me. October, 2012, we sent out 4000 emails to media contacts, but we did not get any response except for a few "out of office" auto replies. Nov. 2012, we emailed 4500 letters through post mails, considering that should be the only way left for our communications, I received only one phone message telling me he was interested in interviewing me. But, I have called him 20 times and left many messages, but we're never able to talk even once. Even in my letter, I have asked to respond to me at my mailing address, but I never got any response, and I found out that Yuan Sun and his criminals stole my mails, along with my credit card. Basically, the spy has controlled my communication system, that no one is able to reach me even when they want to contact me.

Every day, every minute, I am battling the bio-terrorist spy who has been attacking me through onlin set ups as well as local stalking, attacking me with his gangs and criminals who are right here in Los Angeles. He can hide while attacking me to poison me, and monitor my every move and all my efforts with all of his high tech and criminal powers. He sees all of my efforts and all my defenses against his attacks. He can switch to any poison instantly. My defense against his torture and killing is purely instinctive, and guided by God. If I am wrong in my intuition, the price to pay would be death. I travel heavily with my written documents and bags filled with products to countermeasure the attacks, poisons, and radiations. But, it has been harder and harder to guess those since the spy uses multiple poisons plus radiations. The spy would not stop torture and killing till the day he is being arrested or I am being killed.

I know if he kills me he will do the same to other innocent Americans who have joined my efforts with good intentions. Since he put tags on all our files and controls the internet, he will erase my website and silence people who know the truth. That is my true worry, and I am fighting every minute to prevent that tragedy from happening.

This is the most comprehensive Advanced System Intrusion, the spy's control already like a spider penetrate everywhere in our system. For Example, The spy has stolen Microsoft Library, he can make lab print fake testing results. Even my almost all my body's heavy metals 30 to 300 times higher than the safe level, Emergency room doctors told me my blood testing is totally normal. ( My website article on Yuan Sun fake medical record has the story on how I was able to get the truth) He can remotely plug-in his Stolen Microsoft library Access and control.

Dear President, I trust once you have the get the current information, you know how to solve the threats our nation if facing. Arrest the bio terrorist spy, which is the only way to take back our information system.



Thank you very much.

Sincerely,

Qiu Min Ji ( Rebecca)

3550 Wilshire Blvd, #105 Los Angeles, CA, 90010 Website: www.stopthespy.org Tel: 847-364-0162



More Back ground info about Qiu Min ( Rebecca) Ji

I earned my Music degree in China, in 1989, I moved to the United States and earned my Master of Theology degree at Bethany Theological Seminary. As an Erhu soloist, I've performed thousands of concerts with k-12 schools, universities, many concerts with the Milwaukee Symphony Orchestra and the Chicago Symphony Orchestras. I've earned the Illinois Art Council Apprenticeship and an Illinois Arts Council Fellowship Award. My reputation also extends to many American bands and orchestra musical directors, and families who have travelled to China for performances and cultural exchanges under my stewardship, including two wonderful marching bands representing the U.S. in the 2008 Olympics Festival.

My nightmare all started with my hospitality of inviting his then-girlfriend, Meng Jia Hu to my home. I consider myself an established Chinese American and Meng Jia Hu, I knew her through working, she newly came to US. Yuan Sun was brought in as a student 10 years ago studying for his master's degree in Computer Science. He soon started to invade my computer, stealing my business data, and I reported him to police. He started the first round of attacks in 2003, that ended in 2005 with his belief that I had no energy to ever to report him again. The 2nd round of deadly attacks in 2010, were due to the fact he was trying to wipe out my life savings, but I was alert and able to prevent it from happening and started doing further investigations on my own.

I have about 100 photo documents, here are some of them:

1.Yuan Sun has been manipulating Microsoft online setups by secretly altering Web trend. My photo-documented privacy reports on the Microsoft website in both June and August 2012 show that the spy has established his "bi" shared system. He can use "bi.data.Retrievers" to track his and all government data and every consumer's data. His tilted "BiMapping" controls the normal http "bimapping" and much more, as presented in my analytical report.

2. Yuan Sun has invaded Yahoo! and blends in Yahoo! to host his bio-terrorist activities. He also operates his fake Yahoo! login from my Yahoo! email account, which has been under his control. My photo documented privacy report on Yahoo! Finance and privacy report from my Yahoo! email account, along with 14 pages of Yuan Sun's transitional scripts and 4 pages of HTML codes are enough evidence to prove my statement, and how the spy has programmed to attack Americans without being detected.

3. Yuan Sun has stolen United States Military storage of biological weaponry, including the Bubonic Plague, and he also has stolen Nerve Agents in his online setups. My photo documented privacy reports from www.fas.org support my statement.

4. Yuan Sun has invaded the White House website, and Vice President Joe Biden's profile is now in the spy's hands. Defense military secrets have also been exposed. The White House has a secret cyber back door that has allowed the spy complete access. My photo documented privacy report from the White House in May 2012 support my statement.

5. Yuan Sun has stolen United States high technology, American inventions and military secrets, and he is able to remotely access the United States Military facilities. The spy has also stolen American High technologies and new inventions from Darpa and Space.com. My photo-documented Privacy Reports from www.DOD.mil, and space.com, along with hand-copied documents all support my statement.

6. Yuan Sun has invaded MSN and hide his stolen resources stolen MS resources at my email account. Yuan sun altered functionality of the Privacy Report as his advanced system control, so he can hide his set-ups and bio-terrorist activities. My photo documented privacy report from MSN my hotmail account in April 2012 support my statement.

7. Yuan Sun has stolen the Microsoft library, and is able to remotely use his fake library "plug- in", his "access", his "library window broker" or "library savvy broker", to use to his advantage by controlling lab test results and manipulating medical records. My photo documented privacy report from www.TechLand.com, MS Privacy Reports and my analytics and the fact on "Yuan Sun manipulates medical records but how the Truth finally revealed" can further explain and prove my statements.

8. Yuan Sun has invaded the AT&T website and secretly add an Extension Appilcation and operating on his own server by using AT&T facilities and resources. He controls my phone, public phones and American's phones who have joined my efforts, manipulating our phone system. My photo documented privacy reports from AT&T website in 2011 and 2012, plus my hand-written report from April 2012 on AT&T phone problems reveal the facts, and my analytics reveal the spy's phone controlling methods.

Most Current privacy Report was documented on May 24, 2013 on AT&T's Smart Control Web page. Also, Privacy Report on AT&T General landing page, The comprehensive usage of AT&T facilities including localization his attacking forces, serve his bio terrorist activities.

9. Yuan Sun attacks Americans by nuclear weapons. My photo documented privacy reports on physicsforums.com, chemicalsforum.com, and biology-forums.com all reveal his secret online setups and his secret request to Google searching for nuclear elements: uranium, plutonium, and thorium for a human body to hit.

10. Yuan Sun has been mind controlling Americans. My photo documented privacy reports in Feb. 2013 on wikihow.com show how he controls "extension/min", which means my extended contacts, along with my experience and analytics to reveal how mind control has been the spy's weapon to control the human brain of Americans and control our efforts to expose him.!

11. The spy has disabled Microsoft "Live" features, including "Blog with Windows Live" "Email with Window Live, and "Map with Live Search, Translate with Live search". All these evidence show that how the spy has been able to controlling my online posing, researches, emails and prevent my efforts to report his criminal activities to Microsoft cooperate. My many photos from the computer I use daily support my statement.

12. The spy has been in and out of my bank and credit card accounts, posting fake spending at any time he wants, even my closed credit card still pop up another over 1000 dollars! He has invaded my checking account by way of forged checks and signatures. My photos document of privacy report from Chase bank account explains his intrusion of Chase..

13. Privacy Report on VeriSign, was photo documented on May 24, 2013

14. Medical Evidence on a surgically-removed Nano bio-sensor in Nov 2011, along with Toxicologist analytical reports, and Microscope testing results to prove that the Nano biosensor that was secretly forced in my brain and body is a totally man-made weapon. The spy has stolen the U.S. very recent technology, the research showing the project was funded by Darpa. many more privacy report from different websites. This is an example to show how the spy has stolen American technology and applied it against Americans.

"The Truth Must Be Revealed!
The Spy Must Be Stopped!"