20th June 2024 - 11:40 PM

"You will get your consequences. If I was you I would not risk getting a Bad Image with your boss and I would not risk having me as your enemy. Do as I ask and I won't do anything." 

                                                                                                                                                                   L.O.  (The Terrified 'Victim')


The Investigation - Part One

 

My mission was clear, find the truth and make sure the real story is heard.

After the dozen policemen and women invaded my home at 4:00 a.m. on Valentine’s Day 2025, I realized justice wasn’t going to find me. Not when someone like L.O. plays the victim so convincingly. I had to go looking for the truth myself. In the days that followed, I stopped thinking like a victim and started thinking like a forensic analyst. I taught myself everything I needed to know. I began tracing, monitoring, and analyzing what had been used against me. What I discovered astonished me.

 

Collecting Data

My investigation began by mapping out the full extent of the attack I had been subjected to. Between November 16 and 29, more than 20 of my accounts were accessed, altered, or hijacked. These included Amazon, Microsoft, PayPal, Gmail, Facebook, four ProtonMail accounts, LinkedIn, Instagram, OTOY, ElevenLabs, and over a dozen crypto exchanges. This had been a systematic assault.

This wasn’t random. It was coordinated. They had my logins, passwords, and recovery setups. They knew every detail, every alias. No outsider could’ve pulled this off. It had to be L.O. and her hacker boyfriend, Dom. They had been kind enough to post a photo of the two of them during the hacking, so I had an image of his likeness. Coupled with corroborating evidence and the personal nature of the attack there just wasn't any other conclusion.

 

Misusing my Trust

Only one person had both the trust and access to know everything: L.O.

For months she asked to screen-share while I worked, and often bragged that her ex, Dom, was a hacker. So when, on November 19th, he posted a Telegram profile picture of the two of them embracing, I knew he’d been helping her since at least September. That's when that photo was taken. Just weeks after she ghosted me. Another sign of how coordinated it all was. I had worked out the date of the photo by applying several different methods and simple logical deductions. 

On the final day of the attack, one of the crypto exchanges logged a naked IP near Dom’s hometown in northern Germany. Another  confirmation. Multiple logins also came from a machine running macOS Catalina 10.15.7, the final OS version for the 2022 MacBook Air, the exact model L.O. used during an earlier blackmail attempt. I still have the screenshot of that machine. That same device is also being used to monitor this very website.

I soon realized the passwords being correct wasn’t guesswork. This was full access, and could only be made possible through a keylogger or spyware. Then I remembered.  She had asked me to edit two video files she sent me in June 2024. But they both crashed my system the moment I opened them in After Effects. That’s the moment when they installed the malware.

The sabotage didn’t start in November. It began through flattery, faked intimacy, and lies. My trust was her access key. With a start I realized she had been planning this for months. I felt as if someone had punched me in the stomach.

 

Multiple Strikes

And she still wasn’t finished. Three weeks after the hacking incident, she filed criminal charges against me with German authorities and Interpol. She is highly experienced at using the systems society had evolved to her own advantage. She played the perfect victim. For someone, like a covert narcissist, who has no remorse and feels no guilt, such a feat is relatively easy. Just lie and manipulate. Her narrative and  accusations mirrored what she and her accomplice had done to me, hacking, identity theft, impersonation, cyber extortion, and more.

Her endgame wasn’t just to ruin my reputation. It was to erase me completely. I noticed that my name and image were disappearing from the internet. She had earlier admitted to having copies of all my identity documents. I realized she must be making take down requests in my name. She was deleting me.

 

But I wasn’t willing to just disappear.

 

Analysis 

I kept digging. I built timelines. Searched databases. Traced domains and uncovered connections to fake businesses and infrastructure in northern Germany. I searched employer archives, documented fake identities, cross-checked links to known individuals, and aligned timelines to extract conclusions. I ruled out dead ends, tracked new leads, monitored my social media, traced business registrations, and cross-referenced locations. I estimated travel patterns and theorized movement timelines. I reached out to ex-employers, friends, enemies, and family members.

I ran background checks. Built psychological profiles. Used legal email trackers to monitor responses, catalog patterns, and test statistical anomalies. I created honeypot emails and web pages to provoke reactions. I strengthened my online security, installed surveillance systems at home, and upgraded my device protection. I wasn’t chasing revenge. I was fighting for my survival, my name, my reputation, and my sanity.

This was never about obsession. It was about proving I wasn’t insane, dangerous, or delusional. I wasn’t what she said I was.

This page marks the start of my counter-investigation. I didn’t do it because I wanted to, I did it because no one else would. The law wasn’t coming to save me. She had already seen to that. This would up to me. Read More