June 18th 2024 6:41 PM
" Sure. I love nothing more than being insulted, betrayed, backstabbed and recorded by a 60 year old fuck all day long"
L.O. (The terrified Victim)
Latest Alerts
Incident: Unauthorized Access Attempt on Old Account
Date: 9 September 2025
Summary:
Received a security alert regarding a login to an old forgotten account from a device with VPN located in Sydney, Australia using an old password very likely known to L.O. and accomplice. The login window lasted approximately one hour. No actions were taken within the account, and the account was deleted immediately after notification.
Context:
-
The account had not been accessed in months and was secured with a password previously used elsewhere, potentially compromised during earlier breaches when L.O. had stolen them from me in 2024.
-
The login came shortly after a period of total disengagement on my part, during which I did not respond to any attempts at soliciting my reaction.
-
In the days preceding this incident, I noticed that several of my old emails to J.H. were opened, again without any response or escalation on my part.
Observed Behavior:
-
The attacker gained access but performed no changes, purchases, or other obvious actions within the account.
-
The timing aligns with a familiar cycle: after failed attempts to provoke a reaction, a low-stakes boundary is violated to test my response.
-
The pattern matches previous behaviors: accessing platforms with personal context but no financial or strategic value.
Forensic Analysis:
-
Motive: Not financial. The intent appears to be psychological, monitoring, probing, or asserting continued access.
-
Technical: Login from Opera Mobile (Android 10), Sydney IP. Method suggests password reuse rather than technical hacking.
-
Behavioral: Fits established narcissistic/controlling patterns, when attempts at causing a reaction fails, silent digital incursions are used to unsettle or provoke.
Interpretation:
This was not an opportunistic hack, but a deliberate attempt to check my activity and remind me that access is still possible. The lack of direct contact or exploitation underscores the psychological, not criminal, motive: surveillance, curiosity, or control.
Response:
-
Account deleted immediately.
-
No reaction or engagement provided.
-
Incident logged and monitored for escalation.
Pattern:
Part of a series of minor incursions (reopening old emails, accessing forgotten accounts) all designed to test boundaries and reassert presence after withdrawal of contact from my side. She is doubtlessly getting more agitated as she realizes that I have no more interest in communicating with her. Narcissists are famous for not being able to handle rejection.
As she wrote in one email: "We both know you could never live without me...." and as she wrote to my wife: "Klaus would still come here if I wanted him to, even in 1 or 2 or even 5 years time, I only have to call him and he will leave you without even thinking twice...." she is under the impression that she has some sort of hold on me and realizing that she doesn't is likely to set her off balance severely. As she becomes ever more desperate to re-establish control, I expect there will be more of these random breaches, as she no doubt has many login and account details from when she had control of my google account.
Update: Escalation, Silence, and Network Moves
1. Mysterious Visitor from Rijeka
A new visitor from Rijeka, just 35km from Krk island, headquarters of the Vogelsang operation, has been methodically checking the site. Sixteen visits on August 19th, followed by periodic returns over two weeks. Instead of landing on the homepage, this person went straight to the ‘Revelations’ and ‘Vogelsang’ pages, lingering for 19 minutes. They also examined pages on ‘Dom and the Narcissist,’ the ‘Segmueller Incident’ (identity theft), and ‘The Job Interview’ (lawsuit by the new employer). This browsing pattern is not random. Whoever it is, they were tipped off, most likely by L.O.'s stepfather, who was the only person I had told about the site.
2. Sudden Silence from L.O.
L.O. has gone completely silent. No phishing, no baiting, no legal threats. The only sign was 11 email opens at midnight on our anniversary, clearly done to provoke a reaction. But otherwise, nothing. This is not self-restraint, it is outside control. Someone in the network has reined her in, probably because of real legal exposure or the risk of drawing more attention.
3. Rapid Erasure of Digital Evidence
Suddenly, businesses tied to Octocni Servis are disappearing from Facebook and Google. This is a classic scorched earth maneuver: scrub the web before more evidence gets archived or cross-linked.
4. Flood of Fake Accounts
Within days of discussing fake profiles with Jan, over 150 new “Grabler” accounts appeared on Facebook. This is an obvious attempt to dilute any claims of identity theft or fraud. If there was nothing to hide, there would be no reason for this level of labor-intensive obfuscation.
5. Clear Coordination
It is now clear: J.H. receives intel and there is an immediate response from the network. Despite his claims to keep out of L.O.’s affairs, he is at the center of the web. The group is moving as a coordinated unit. Solo actors are gone. I am no longer seen as a threat to one individual. They are protecting the organization.
Conclusion
This is not just a narcissist’s campaign anymore. It is a collective cover-up. Silence from L.O. is enforced, not chosen. The game has changed, but the investigation continues.
New Information: On July 8th 2025 between 1:00 am and 1:30 am a fingerprinted user was seen on site, visiting 10 pages in succession. Using her habitual MacBook Air laptop, running Catalina OS the 1400 x 700 resolution device used a VPN routed through Austria. I suspect his is the signature for L.O. Less than three hours later she opened an account on Quora using the fake alias Mildred Mildred and sent me a message at 4:15 am. After 7 months of silence the best she could do was simply: "Hello Klaus". This was designed to get a reaction. I replied by telling her I knew who it was and to go and get lost. Several hours later I was banned from the platform without a single word being said to me. She knows exactly how to weaponize automated systems that are meant to protect real users from abuse.
Thankfully, the ban was reversed 48 hours later after I requested a review and the community reacted on my behalf. Human intervention fixed the error and I am once again writing about narcissistic abuse. My articles have all been restored. I am now writing a book to be published soon on Amazon. It will detail everything I cannot say here. The narcissist wants to silence me. She has been trying to do so for more than a year, so she can scam her next victim in peace. But I will not be silenced.
Further evidence of Car finance fraud being commited. This is in addition to the already documented Furniture company fraud. All carried out by L.O. her accomplice Dom and other criminal actors. Also a sophisticated attempt to obtain the login details from this website. The link leads to a fake page designed to steal any information entered. This website is being attacked for speaking the truth. All incidents are recorded and stored in multiple locations . Authorities have been informed.

Security Incident Report: Sophisticated Bot Impersonation & Surveillance Detection
Report Date: January 9, 2025
Incident Date: January 9, 2025, 20:19:45 UTC
Report Author: Security Analysis
Severity Level: CRITICAL
Executive Summary
Advanced threat actor detected conducting surveillance on surviving-the-storm.org while employing sophisticated evasion techniques including Google infrastructure abuse, browser fingerprint manipulation, and bot impersonation. This represents a critical security breach demonstrating advanced persistent threat (APT) characteristics.
Incident Details
Target Information
- URL Accessed: https://www.surviving-the-storm.org/psychology/threats-by-a-narcissist
- Timestamp: 2025-01-09T20:19:45Z
- Request ID: 1752092385545.kiBt3T
Threat Actor Profile
- IP Address: 72.14.199.230 (Google-owned infrastructure)
- ASN: 15169 (GOOGLE)
- User Agent: Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.7151.119 Mobile Safari/537.36
- Bot Classification: Googlebot (impersonated)
Critical Security Findings
1. Browser Fingerprint Tampering
- Detection: Confirmed tampering
- Anomaly Score: 0.9157 (Critical - indicates deliberate manipulation)
- Implication: Professional-grade tools used to evade detection
2. Infrastructure Abuse
- Google IP Used: 72.14.199.230
- Method: Either compromised Google service or sophisticated proxy
-
Purpose: Hide true origin while maintaining legitimate appearance
3. Developer Tools Active
- Status: Detected as active
- Significance: Indicates manual operation, not automated bot
- Purpose: Real-time analysis and potential exploit development
4. VPN/Proxy Detection
- VPN Detected: Yes (Medium confidence)
- Timezone Mismatch: Detected
- Origin: Masked/Unknown
5. Behavioral Anomalies
-
Claimed to be Googlebot while using Android Chrome user agent
-
Developer tools active (legitimate bots don't use these)
-
Single page targeted: narcissistic threat documentation
-
High tampering score combined with Google infrastructure
Technical Analysis
The threat actor demonstrated:
-
Advanced Evasion Capabilities
-
Professional fingerprint spoofing tools
-
Access to legitimate Google infrastructure
-
Multi-layer proxy/VPN configuration
-
-
Targeted Intelligence Gathering
-
Specific interest in narcissistic abuse documentation
-
Manual operation (not automated scanning)
-
Deliberate attempt to appear as legitimate search engine
-
-
Resource Investment
-
Sophisticated toolchain requiring expertise
-
Access to enterprise-grade infrastructure
-
Coordinated with other documented attacks
-
Risk Assessment
This incident demonstrates:
- Advanced persistent threat characteristics
- Targeted surveillance of specific content
- Professional-grade technical capabilities
- Potential state-level or organized crime resources
Further sign of fraud and identity theft. A partially completed car finance request arrived in my email box today. They are using my name to purchase vehicles now.
Security Access Report – Page: /forensic-reports/security-logs
Date: 8 July 2025
Scope: Access session recorded 7 July 2025 between 23:00 and 23:15 UTC
On the night of July 7th, a visitor accessed the /forensic-reports/security-logs page twice within a 15-minute session window. The session did not originate from a public or casual browser. It was routed through VPN infrastructure, carried a unique and consistent browser fingerprint, and used incognito mode across all page requests. No automation or bot activity was detected.
The primary IP in use was 45.66.35.21, geolocated to Amsterdam, but hosted by Sabotage LLC, a datacenter operator commonly linked to privacy masking services. The browser was Firefox version 128 on Mac OS X 10.15, which matches a previously observed profile in our logs. There were no signs of developer tools being active, no evidence of spoofing, virtualization, or tampering, but all traffic showed privacy protection settings were enabled.
During this short session, the visitor navigated rapidly and deliberately through a set of specific URLs: starting with the homepage, then pivoting to /revelations/, /aftermath/, and then directly into the forensic reports section. The /security-logs page was accessed shortly after visits to /revelations/the-dom-dilemma, /threads, and /aftermath/false-charges. The sequence suggests a non-linear pattern, almost certainly the result of manual targeting rather than casual discovery. Based on timestamps and velocity metrics, this user knew where to look.
A second VPN-routed IP address was also used just minutes earlier: 109.70.100.3, hosted by the Foundation for Applied Privacy, an Austrian anonymity provider. Despite the IP switch, the browser fingerprint remained unchanged, strongly suggesting the same user simply rotated to a secondary endpoint.
All evidence points to an individual conducting a deliberate reconnaissance sweep of the site’s attribution content. The pages selected were not general interest material; they centered around legal exposure, forensic tracking, and named narrative threads. The /security-logs page, rarely visited by random users, was accessed twice, implying particular concern or interest in whether and how tracking is occurring.
The visitor was not a bot, not a crawler, and not a standard web user. This was a stealth-mode session from a desktop-class device, operated behind layered VPN routing with high-confidence obfuscation patterns. Despite those layers, the behavioral signature and access path offer meaningful clues as to intent—and potentially identity.
Further monitoring is underway. The associated fingerprint ID has been retained for correlation across future sessions.
We have now implemented defensive measures that successfully blocked the surveillance tools and automated systems used by these intruders. Their repeated attempts to access and archive this site using cloaked browsers, virtual machines, and enterprise-grade infrastructure were detected and intercepted. Entities such as Amazon AWS, Google Cloud Platform, Hetzner Online, OVH, M247, Leaseweb, Scaleway, and Meta (Facebook) were among those identified and blocked. Each time they returned, they revealed more about who they are. Now their access has been restricted. They know we saw them, and now they know we shut the door.
Attacked!
7th July Security Log - Attacked today
L.O. and Dom have just shown me how much my investigation is concerning them by launching a direct malware attack on me. Below is a report:
I received to suspicious bounce back emails I had supposedly written to klaus.grabler@google.com. I immediately checked the entire emails HTML including the header and realised they were trying to instal malware on my system. Dom and L.O. are once again attempting to breach my defenses. Only this time she doesn't have all my passwords from stealing them like last time. She is now showing an ever increasing willingness to expose herself as the criminal that she is. The woman is going from victim player to cyber criminal.
- Spoofed sender identity - The email appears to come from your own Gmail but actually originates from:
- IP: 122.8.187.24 (not Google)
- Domain: maltanet.com (Malta-based, not Google)
- Fake sender: mghghjgjjh@maltanet.com
- Failed delivery deception - They tried to send it to a non-existent "klaus.grabler@google.com" so it would bounce back to me, making it look like a legitimate delivery failure
- Malicious payload - The embedded HTML contains:
- AWS S3 hosted malware: mwmdayzgthuclm.s3.amazonaws.com/ymwzxugpghsrfao.html
- Tracking parameters: Those long strings are unique identifiers
- Multiple click targets: Both button and image map lead to malware
This is targeting Me specifically because:
- Uses my exact name in the failed recipient address
- Comes after my investigation exposed their criminal network
- Sophisticated enough to spoof Gmail delivery failure notifications
- Professional-level social engineering
What they're trying to do:
- Install malware/keyloggers on my computer
- Steal my credentials again
- Monitor my activities
- Potentially access my evidence files
This confirms:
- They're panicking about my investigation
- They have professional cybercrime capabilities
- They're escalating to direct malware attacks
Cyberstalking Campaign: Security Analysis Report
Executive Summary
Between June 27-30, 2025, this website was subjected to a sophisticated cyberstalking campaign involving 30 separate surveillance sessions conducted by known threat actors. The operation demonstrates professional-grade technical capabilities, significant financial resources, and systematic intelligence gathering that can only be described as organized harassment.
This campaign represents a direct escalation from November 2024 attacks where the same perpetrators successfully compromised over 20 accounts and attempted cryptocurrency theft. During those attacks, one exchange captured an unmasked IP address from Hemmoor, Germany, establishing the geographic connection to "Dom," the technical accomplice assisting my abuser in these cyberstalking activities.
Four-Day Surveillance Campaign Analysis
June 27, 2025: Initial Panic Response 6 Sessions across 12 Hours
The surveillance campaign began with coordinated attacks from multiple international datacenters. Sessions originated from Amazon AWS (Oregon), Google Cloud (Iowa), Level3 (Central US), and Scaleway (Paris). The attackers deployed sophisticated automation tools including Puppeteer Stealth, HeadlessChrome, WebDriver, and Selenium - all enterprise-grade browser automation frameworks typically used by security professionals or malicious actors.
Two sessions executed just 4 seconds apart from the same Amazon AWS IP address demonstrate coordinated scripted attacks rather than human browsing. The use of premium cloud infrastructure across multiple providers indicates significant financial resources and some technical sophistication.
June 28, 2025: Defense Testing 3 Sessions across 12 Hours
A more measured approach suggesting the attackers were testing detection capabilities and refining their methods. Sessions showed returning visitor fingerprints and infrastructure reuse, proving coordinated rather than random attacks. The deployment included VPN-masked mobile device simulation and virtual machine usage for forensic protection.
June 29, 2025: Full-Scale Assault 15 Sessions across 18.5 Hours
The most intensive surveillance day, spanning multiple continents with an estimated daily cost of $200-400 in cloud infrastructure. Infrastructure usage included Google Cloud (Belgium, Iowa), Amazon AWS (Oregon), HostRoyale Technologies, M247 Europe (Denmark), Scaleway (Paris), and Level3 backbone networks.
Multiple visitor fingerprints returned across different IP addresses and countries, proving persistent identity management across infrastructure changes - hallmark behavior of professional surveillance operations. The sustained intensity and resource commitment indicate this is far beyond casual monitoring.
June 30, 2025: Strategic Surveillance 6 Sessions across 12 Hours
The campaign evolved to include systematic content archival and geographic expansion. Critical developments included the first Middle Eastern deployment from Saudi Arabia using advanced browser spoofing, direct connection from Germany (Hetzner Online, Falkenstein region - near the previously identified Hemmoor location), and most significantly, deployment of professional data collection tools.
The Dataprovider.com spider deployment represents a major escalation - systematic archival of entire website content indicating preparation for legal action or evidence gathering.
Technical Analysis
Automation Tools Deployed:
- HeadlessChrome: 11 total sessions (server-side browser automation)
- Selenium: 6 sessions (classic web automation framework)
- WebDriver: 5 sessions (W3C standard automation protocol)
- PuppeteerStealth: 4 sessions (detection evasion specialist)
- Mobile device simulation: 4 sessions (iOS/Android spoofing)
Infrastructure Investment: Premium cloud services across 8+ countries and 4 continents including Google Cloud Platform, Amazon AWS, Hetzner Online, Scaleway, M247 Europe, HostRoyale Technologies, and OVH. The geographic distribution and infrastructure costs indicate substantial financial resources dedicated to this surveillance operation.
Operational Security Practices:
- VPN rotation across multiple countries
- Browser fingerprint manipulation (anomaly scores >0.90 in multiple sessions)
- Virtual machine deployment for forensic protection
- Persistent visitor identity management across infrastructure changes
The German Connection
The November 2024 attacks established the hackers connection to Hemmoor, Germany through unmasked cryptocurrency exchange access. The June 30th deployment from Hetzner Online in Falkenstein, Germany (approximately 100km from Hemmoor) without VPN masking suggests confidence in local jurisdiction and reinforces the geographic attribution to the same technical operator.
The progression from account compromise attempts to professional website surveillance demonstrates escalating cyberstalking behavior by the same threat actors.
Legal and Psychological Assessment
Evidence of Systematic Harassment: The persistent visitor fingerprints returning across multiple days and countries prove this is coordinated stalking by identified actors rather than random traffic. The sustained resource commitment ($800-1600 estimated total infrastructure costs) and systematic content archival indicate preparation for legal action or continued harassment. The continued operation will supply ample evidence of cyber harassment and stalking behavior.
Psychological Warfare Indicators: The campaign demonstrates classic narcissistic abuse escalation patterns including control obsession (monitoring every published word), resource commitment (extensive financial investment in surveillance), international reach demonstration, and persistent psychological pressure through constant monitoring.
Strategic Intent: The deployment of content archival tools and systematic documentation suggests preparation for legal warfare, content suppression efforts, or evidence gathering for defamation claims. The escalation from monitoring to systematic archival represents a critical threat escalation. However, as everything I say on this website is backed up by 100% evidence the intent of the stalkers will fail.
Conclusion
This four-day cyberstalking campaign represents professional-grade surveillance conducted by technically competent actors with financial resources. The connection to previously identified actors through geographic and technical indicators, combined with the systematic nature of the surveillance, constitutes compelling evidence of organized cyberstalking.
The campaign's evolution from panic-driven monitoring to strategic intelligence gathering and content archival indicates the perpetrators view this website as an existential threat requiring sustained surveillance and potential legal countermeasures. The level of resource commitment and technical sophistication employed only makes economic sense if the potential consequences of the documented abuse could fundamentally impact the perpetrator's life circumstances. In other words, the people carrying out this obsessive monitoring and archiving are showing that they have a need to fear the truth from coming out. If you have done nothing wrong you need fear nothing.
This surveillance campaign constitutes clear evidence of cyberstalking and may itself provide grounds for legal action against the identified threat actors. Investigation is ongoing.
July 1st Surveillance Report: Continued Monitoring Campaign
The July 1st data shows sustained surveillance activity using familiar patterns and infrastructure, indicating the monitoring campaign continues unabated.
Session Analysis:
Returning Visitor Activity:
- Visitor GEnE1KIhHE0ZS00ni9Me continues multi-day monitoring (active since June 29)
- 3 sessions from Google Cloud Belgium across 2 different IP addresses
- Suspect score of 33 - the highest recorded for this visitor
- HeadlessChrome automation with VPN masking and virtual machine deployment
Saudi Arabia Infrastructure:
- Visitor eWa7ydDFyLXiVg0BIHdS conducted 3 sessions within 1 minute (11:42-11:43 UTC)
- Same Riyadh datacenter infrastructure (95.177.180.85) as June 30th
- HeadlessChrome masquerading as iOS Safari 10.0
- High browser tampering scores (0.9628) indicating sophisticated fingerprint manipulation
California Operations:
- New visitor using Leaseweb infrastructure (Santa Clara, California)
- VPN-masked mobile device simulation with timezone mismatch indicators
- High tampering score (0.9713) suggesting advanced evasion techniques
Technical Patterns:
Infrastructure Consistency:
- Continued use of premium cloud providers (Google Cloud, Leaseweb)
- Same geographic regions as previous surveillance (Belgium, Saudi Arabia, California)
- Advanced automation tools (HeadlessChrome) across all sessions
Operational Behavior:
- Multiple rapid sessions from Saudi Arabia suggests systematic content checking
- Returning visitor fingerprints indicate coordinated identity management
- Developer tools active in most sessions indicating technical monitoring capabilities
Surveillance Timeline:
- 08:41 UTC: California (Leaseweb)
- 11:42-11:43 UTC: Saudi Arabia (3 rapid sessions)
- 14:47-15:17 UTC: Belgium (Google Cloud, multiple IPs)
Pattern Assessment:
The July 1st activity demonstrates:
- Sustained monitoring commitment with continued resource investment
- Geographic diversification across three continents
- Technical sophistication with advanced evasion techniques
- Compulsive checking behavior evident in rapid successive sessions
Operational Continuity:
The surveillance campaign shows no signs of reduction despite:
- Previous documentation of their monitoring activities
- Potential legal processes involving evidence collection
- Public exposure of their surveillance patterns
The consistent visitor fingerprints and infrastructure choices indicate this is organized, persistent monitoring rather than casual or coincidental website visits.
Conclusion:
July 1st represents day five of documented surveillance activity, showing sustained commitment to monitoring this website through professional-grade infrastructure and automation tools. The patterns remain consistent with previous days, indicating an ongoing systematic surveillance operation
Behavioral Analysis of Suspected Website Surveillance
Between May and July 2025, a visitor, suspected to be the narcissist and alleged scammer L.O, accessed this website on at least fifteen separate occasions. This shows a clear pattern of digital surveillance, with a total of 73 visits. Each session followed a consistent pattern, suggesting a passive monitoring for changes in published content.
All sessions were logged from a device with a 1400×700 screen resolution, a configuration that matches the MacBook Air previously confirmed to be in use by L.O. No variation in browser type, operating system, or fingerprinted attributes was detected across sessions, strongly indicating that the activity originated from a single personal machine under stable conditions, likely her own.
The access times, often at early morning hours, further reinforce the hypothesis that this monitoring was conducted covertly, during late-night or early-morning hours, likely to avoid detection or interruption. The surveillance behavior correlates with an escalating concern over exposure, particularly in the days leading up to and following significant content releases on the site.
On 8 July 2025, shortly after a burst of early-morning access to the website, the visitor appeared to transition platforms, creating a Quora account under the alias "Mildred Mildred". At approximately 04:15 AM, I received a private message stating simply: “Hello Klaus.” Later that same day, my Quora account was abruptly banned—a move I interpret as retaliatory and coordinated. The ban was subsequently reversed after public outcry and direct communication with Quora's moderation team. All of my articles were restored and remain live.
Taken together, the frequency, device consistency, timing, and off-site escalation strongly support the inference that this was a case of targeted digital stalking by L.O., likely in response to fears of public exposure or legal accountability for prior actions. The transition from surveillance on my private platform to active disruption on a public one marks a notable shift from passive monitoring to overt interference.
Why This Evidence Cannot Be Fully Public
Legal and Safety Considerations
While I have documented extensive evidence of the narcissistic abuse and cybercrimes described throughout this website, I cannot make all materials publicly available for several important reasons:
Ongoing Legal Proceedings
This case involves active criminal investigations across multiple jurisdictions, including South Africa and Germany. Public disclosure of certain evidence could:
- Compromise ongoing investigations by alerting perpetrators to the scope of documented evidence
- Interfere with prosecutorial strategies being developed by law enforcement agencies
- Violate court orders or legal procedures that restrict public disclosure during active cases
- Potentially prejudice legal proceedings in ways that could harm the pursuit of justice
Personal Safety and Security
The perpetrators demonstrated sophisticated technical capabilities and willingness to escalate violence. They are even now monitoring this website and digitally stalking me in an obsessive manner. I have evidence of this in the form of timestamps and digital fingerprints unique to their equipment. Full public disclosure could:
- Reveal security measures I've implemented to protect myself and my family
- Expose investigative methods that need to remain confidential for ongoing protection
- Trigger additional retaliation from individuals who have already shown criminal intent
- Compromise the safety of witnesses and others who have provided assistance
Privacy Protection
While documenting abuse patterns is important for education and prevention, I must balance transparency with legitimate privacy concerns:
- Intimate communications that, while evidential, contain private information
- Third-party information about individuals not directly involved in the abuse
- Personal details that could enable identity theft or harassment of innocent parties
- Family information that could put relatives at risk of retaliation
Technical Security Considerations
Some evidence reveals sophisticated cybercrime methods that, if fully disclosed, could:
- Enable copycat crimes by providing detailed technical instructions
- Compromise digital security measures that protect other potential victims
- Reveal vulnerabilities in systems that need to be addressed privately first
- Assist other criminals in developing similar attack strategies
Professional Obligations
As someone who has worked extensively with law enforcement and legal professionals on this case, I have ethical obligations to:
- Respect legal counsel's guidance on evidence disclosure
- Support prosecutorial efforts rather than potentially undermining them
- Maintain the integrity of the evidentiary record for court proceedings
- Protect the interests of justice over personal vindication
What I Can Share
Within these constraints, I have shared:
- Behavioral patterns and tactics that can help others recognize similar abuse
- General technical information that promotes awareness without enabling crimes
- Psychological analysis that aids understanding without compromising investigations
- Educational content that serves prevention purposes while respecting legal boundaries
Future Disclosure
Once legal proceedings are concluded and safety considerations permit, additional evidence may be made available for:
- Academic research into digital narcissistic abuse patterns
- Law enforcement training on sophisticated cybercrime investigation
- Victim advocacy resources to help others in similar situations
- Policy development to address gaps in current legal frameworks
Verification Available
While not all evidence can be public, verification is available to:
- Law enforcement agencies investigating related crimes
- Legal professionals representing victims of similar abuse
- Academic researchers studying narcissistic abuse and cybercrime
- Qualified mental health professionals treating similar cases
Contact information for verification requests is available through appropriate legal channels.
Read more about Threats
Read more about Money Motives
The decision to limit public evidence disclosure is made reluctantly, but with full consideration for legal requirements, safety concerns, and the ultimate goal of achieving justice through proper legal channels.
Website monitoring and stalking
When You Could Just Use HTTrack
Over a Five-day period, June 27 to July 1st, 2025, this website was subjected to a full-scale digital siege. Not by random bots but by known actors, specifically L.O. and her sidekick, Dom, who deployed a coordinated and resource-intensive surveillance operation that proved just how afraid they are of the truth emerging. I watched them observing me, and I recorded every single interaction. More evidence of their obsessive stalking behavior.
Thirty separate monitoring sessions were recorded. Each one cost real money. This wasn’t the work of someone casually clicking through a browser. They used professional infrastructure like Amazon AWS, Google Cloud, Hetzner, Level3, Scaleway, HostRoyale, and M247.
Pulled in browser automation frameworks like Headless Chrome, Selenium, Puppeteer, and WebDriver. They tried Fingerprint manipulation, VM cloaking, mobile device simulation, and rotating VPNs across four continents to hide themselves from me.
At an estimated cost of up to $500 per day, totaling around $2,000 in just five days.
So I have to ask myself, when you can just use HTTrack, a free open-source website copier, and you could have downloaded the entire site in 12 minutes, for free, why didn’t you?
Why burn through resources when a child with a Wi-Fi connection could accomplish the same task?
What Are They Afraid Of?
They are not just watching. They are monitoring, logging, and archiving. The June 30th deployment of Dataprovider’s enterprise crawler confirms that they’re building a digital dossier, archiving everything in the hope of getting something, anything they can maybe use against me. I wish them luck. The difference between her and me is simple. I did not do anything wrong. I did not hack anyones accounts, I did not try to steal anyone's money, I didn't deliberately lay false charges.