This page is a free book by me, Janice Gaynor. It takes just about one to three hours to read. Read it then decide if you want to purchase my other books. If you would like to purchase books by me, my contact information is on this website. Thank you in advance.

 

THE HACKERS

 

Written by Janice Gaynor

Copyright © 2025. All rights reserved.

  

You may view a list of all of my books to date on my website. You may also purchase my books through my website. You will see additional information and advertisements by me and others on my website. You will see the names of my two youtube channels on my website. My youtube channels contain much useful videos. The name of my website is:

islandofjamaicalink.com

 

 This book contains standard Jamaican English as well as the Jamaican creole language, patois. It can be understood by everyone who speaks English, however.

 This book is short and takes just about three hours to read.

 This book is a FICTION STORY. That means that it is made-up. The events and information are not true to any particular person or situation. If the story seems to be your story in one or more ways, it is purely coincidental.

 The moral of the below story is:

 Every action has an equally opposite reaction.

 

 

CHAPTER ONE

 THE FIRST SIGN

 

Lisa Powell was a self-employed clothes vendor. She advertised her trade in various ways including handing out flyers, placing ads on the radio, advertising in magazines, sending emails to potential customers and calling people directly and telling them about her trade. She would include her contact information such as her cellular phone numbers and email addresses in the advertisements.

 

In March, 2024, Lisa opened her email account to check her email as she usually did every day. On this particular day, Lisa was surprised to see something unusual about her email account. Instead of opening into the inbox, her email account opened into sent items. This really surprised her because in the twenty or so years since she had started to use emails, her account had always opened up into inbox.

 

Something else was strange. The emails in the sent items were not in the correct order by date sent as it usually was. The dates were all mixed up – in no particular order. She was having trouble finding the last mail sent by her for example.

 

Lisa realized right away that her email was being hacked into.

 

Lisa was troubled of why someone would want to hack into her email account. Why was the person or persons interested in her emails? Who could it be?

 

Lisa decided to call the nearby police station to see if they would help her. She had quite a lot of problems getting through with the call, but finally, someone answered the phone. “Someone is hacking into my email.” Lisa informed the person who answered her call. “What do you mean by someone is hacking into your email?” The person asked in seeming disbelief. “My email account opened up into sent items instead of inbox.” “Call the cyber department for that,” the person informed Lisa. “I can’t get through to them,” Lisa replied. “Well, there is where you have to call, Madam” was the reply. “Okay,” Lisa replied and hung up the phone.

 

Oh well, so much for help from the police.

  

 

CHAPTER TWO

 THE SECOND SIGN

 

Lisa also had two cellular phones which she used regularly.

 

About one month after the first sign of hackers using her email account, her two cellular phones started to show signs of being hacked into also.

 

One of the phones was a banger phone. That one just stopped working altogether suddenly. It had all the words on the screen as usual. The clock worked, the alarm worked, the radio on it worked, etc. Everything seemed fine, but she couldn’t make and receive calls. She couldn’t even add credit to the phone. This happened very suddenly. Lisa just tried to make a call as she did daily, and the call wouldn’t go through. She tried calling multiple numbers and none of them rang. Then she tried calling the banger phone with her other phone and it still didn’t ring. She called a friend and asked her to call the banger phone. The friend called the banger phone, but again nothing happened. The phone did not ring. A few days later, Lisa tried to add credit to phone just to ensure that the phone company that provided the phone service would let her still keep the telephone number for the phone even though she could not use the phone for call purposes. Well, that didn’t work either. She could not add credit to the phone either.

 

Lisa decided to call the phone company with her other phone and ask them if they saw anything wrong with her phone from where they were. The phone company said they saw nothing wrong. Lisa told them about the problem that she was having with her phone. The phone company said that they couldn’t do anything about that.

 

Oh well, so much help from the phone company also.

Lisa’s other cellular phone was a smart phone. This one had one sim card in it. It always displayed ONE name of the service provider, Converse, on the screen. At the same time that the banger phone stopped working, this phone started to display TWO names of the service provider. That is Converse – Converse. Lisa knew that two names of the service provider should indicate that two sim cards were in the phone. But she knew for certain that only one sim card was in her phone.  Additionally, the display between one and two names of the service provider came and went, came and went. Sometimes one name was displayed. Other times, two names were displayed.

 

After about six months of this happening, Lisa decided to take the phone to the service provider and ask them why the phone was displaying one or two names of the service provider on and off. The customer service agent at the front desk that Lisa spoke to said that she did not know.

 

Oh well, so much help from the phone provider.

 

CHAPTER THREE

 MORE EMAIL ACCOUNTS HACKED INTO

 

Lisa had two other email accounts with a different email provider from the one mentioned in chapter one above. When she realized that her email account was being hacked into, she started to check when last she used her other email accounts. These email accounts showed last used at such and such a time at the bottom of each screen. For example, at the bottom of inbox, spam and trash screens, she could see when last she used that specific email account.

 

She always noticed that the last time displayed in the email accounts was synonymous with when she actually used them. However, in October, 2024, she noticed with horror that the last time displayed on the screen said both of her two email accounts for that email provider WERE OPEN IN ONE OTHER LOCATION. A few times when she checked in the months after that, they even said OPEN IN TWO OTHER LOCATIONS.

 

Lisa was horrified. She decided to contact the email provider and ask them about it. Their response was they could do nothing about it.

 

Oh, so much help from the email provider as well.

  

CHAPTER FOUR

 BLOCKED EMAILS AND CALLS

 

In February 2025, It dawned on Lisa that she had not received any sensible email or call from anyone at all outside of her contacts for years, like about FIVE YEARS! It was quite a surprise when she realized. She had been advertising like hell, but she didn’t receive one email or one call that she actually made money from. She had received emails and calls from a few persons outside of her contacts, but they didn’t end up spending any money with her. She had only been receiving emails and calls from people in her contacts and people that she call hackers (some gals giving her trouble). That was quite something when she realized that. Why was that happening? A obeah dem obeah har?

   

 

CHAPTER FIVE

 BLOCKED AND ANSWERED CALLS

 

In April 2025, Lisa took up her smart phone to make some calls advertising her trade. She tried calling about thirty numbers without success. The phone kept saying ‘not connecting’. With much surprise, Lisa realized that her hackers must be blocking her calls. She decided to call the service provider and ask them if anything was wrong with the service that day. That call WAS ANSWERED. The ‘customer service agent’ replied to Lisa’s query saying all the phones on Lisa’s street would be down for the next three months. Lisa was quite bewildered at that response. She decided to go next door and ask the occupant if her phone was also down. The next door neighbour replied that she had no problem with her phone and she called Lisa on her phone to prove it. With that, Lisa realized that her hackers could block her phone from making calls as well as answer the calls. “My God,” thought Lisa, “What kind of technology is this?”

  

 

CHAPTER SIX

 ANSWERED EMAILS

 

In May 2025, Lisa decided to send an email to the Ministry of Technology complaining about what was happening to her regarding the hackers. The following day, she received a reply – surprisingly as she had not received any email outside of contacts in years. The letter was written in all capital letters, bright red colour and large print. It said that the Ministry could do nothing about it. It was signed ‘Heather K’. Lisa knew right away that it was the hackers who replied to the email, not the intended persons. To this day, Lisa hasn’t heard anything from the Ministry of Technology.

  

 

CHAPTER SEVEN

 THE CALLS

 

Also in May 2025, Lisa started to receive calls from all kind a gals. They made a bag a trouble. They told her she had a package to collect from the post office when she didn’t, they wanted to purchase clothes from her, that the electrical wiring at her house needed to be reinstalled, that her bank account had been closed – a bag a trouble. Who were these gals?

 

Lisa realized that possibly di gal dem was har husband gal dem. So much a dem. Nuff gal. Wonder if dem did know bout each other. And wonder if a har husband and him gal dem did a hack inna and block and answer har phones and emails. The gals even called her on her banger phone that wasn’t working.

  

 

CHAPTER EIGHT

 THE RESEARCH

 

Lisa decided to do some research on the different search engines on the internet to confirm that calls and emails could be blocked and answered by hackers. YES, the research proved that they could all BE DONE.

 

Lisa was quite dumb-struck. Why would those kinds of things be invented?

She was speechless.

  

CHAPTER NINE

 

THE WARNING

 

Still in June 2025, Lisa was watching a television show that she regularly watched when she heard in bewilderment the host say, “If your name is Lisa Powell your life is in danger!” “Okay,” thought Lisa, “That seems to be God speaking to me through that TV host. But how does he know about that and why doesn’t he do something about the danger? Even tell the police something? What, is he hacking into my emails and phones also? Is that how those people get the news to report and is the reason why he doesn’t want to do anything about the danger because he wants a juicy news to report and make money from when I’m dead???”

 

CHAPTER TEN

 THE SEPARATION

 

Lisa decided to separate from her husband and leave him to him gal dem. In May 2025, she packed her three children’s and her things and left and rented a house in a different community. Her husband pretended that he was innocent of all her accusations. He said she was his only woman. But Lisa had been with the man 21 years, and had had many experiences with gals giving her all kind a trouble. Di gal dem nuh have nuh reason fi trouble har if a nuh fi him. Dem call har and say dem belly flat, dem betta inna bed, dem younga and all sort a summin. A mus him mek dem a trouble har. She nuh fool.

 

 

CHAPTER ELEVEN

 THE KILLING

 

In June 2025, Lisa was called by her estranged husband’s mother and told that her husband was in jail for murder. Apparently, one of his women had gone and lived in the house with him. He and her had an argument one day and he ended up stabbing up her to death. Her two teenaged children had seen the whole thing and had told the police so the police had arrested and charged him for murder.

 

All Lisa could say was, “Glad it didn’t happen to me.”

 

 

CHAPTER TWELVE

 BACK TO NORMAL

 

At the end of June 2025, Lisa realized that she had started to receive emails and calls from persons outside of her contacts again, and was making and receiving calls without any issues again. It felt good to be rid of all the HACKERS. All the same, she decided to cut back on the emails and calls anyhow since as they weren’t private or safe for that matter.

 

  

-       THE END   -