"I have your address, I have your passport, I have everything of you. If you dare to write any fairytales about me or do any other shit with the screenshots you made of my private chats and emails, I will find out and you will pay for it. Just remember I will make you go to prison for that. There are people who would want to make you pay for what you did to me. Believe me. I can only imagine how many people would stay in front of your door."                                                             L.O.  (The terrified 'Victim')

The Segmüller Incident

 

How a Furniture Receipt Uncovered a Potential Identity Clone

What I once believed was the bitter digital fallout of a failed relationship has evolved into something far more elaborate and calculated. Between January and March 2025, a sequence of incidents unfolded that, in isolation, might seem like coincidence. But taken together, they form a disturbing pattern: a systematic attempt to create a clone of me, a “Klaus Grabler #2”, operating under my name, my email, and my identity... but on a different continent.

This wasn’t sloppy or accidental. It was careful. Deliberate. And possibly criminal.

 

The Discard Is Just the Next Phase

After months of psychological destabilization, manipulation, and ghosting, I believed the story had ended. I was wrong. In many cases of narcissistic abuse, the final discard is not the last act. It’s the pivot point into the next campaign, one that shifts from emotional abuse to reputational and digital sabotage.

In my case, what followed was not just character assassination or passive smear tactics. It was something far more invasive: identity mimicry. The attacker wasn’t satisfied with silencing me. They wanted to replace me.

 

The Recovery Email Request

On January 16 2024 Google alerted me that someone had attempted to assign my primary Gmail address, klaus.grabler@gmail.com, as the recovery email for a suspicious new account: grablerklaus@gmail.com.

At first glance, this might seem like a simple phishing error. But in my 18 years of using Gmail, this had never happened before. Combined with the previous hacking incidents from November 2024, it felt anything but random.

I immediately declined the request, reported the attempt to Google, and then wrote to the spoofed address multiple times.

No reply ever came.


The silence itself was revealing. Whoever was behind this had no interest in clarification or conversation. Their aim was control, not communication. A simple error would have been easily explained. But a deliberate attempt at hijacking the one email account I was still in control of? As I did not receive any reply I soon forgot about the incident.

Furniture Order 

Roughly six weeks later, I received an unexpected email from a business called Segmüller, a well-known German furniture retailer. The message confirmed a fully paid order for wooden dining chairs, totaling €950.

The order contained:

  • My full name

  • My actual Gmail address (klaus.grabler@gmail.com)

  • A German phone number

  • A delivery address : Carl-Zeiss-Strasse 3, Unterneukirchen, Germany

 

On contacting Segmüller, I confirmed that:

  • The order had been processed and paid in full

  • It was scheduled for delivery to that address

  • The system registered my name and email as the customer of record

Segmüller later claimed the customer “accidentally” entered the wrong email. But this is technically not possible in their interface. Their system uses a double-entry verification method to prevent exactly this kind of mistake.

This was not a typo.

 

The Phone Call

I called the number listed on the order. A man answered using my name. I told him his furniture was ready for delivery and when I asked him to confirm his email, he answered with: grablerklaus@gmail.com  the same spoofed address from January’s recovery attempt. Then I told him who I was and pressed further, but he hung up abruptly. Every attempt to call again was ignored.

 

Garden Service Grabler

Soon after, I discovered a local directory listing for a supposed garden maintenance company using my exact name located at the same address.

It had:

  • No reviews

  • No business registration

  • No web presence

  • No operational proof

It appears to be a real business operating in Germany under my name. I decided to create a separate email account and sent a garden work inquiry to grablerklaus@gmail.com. The reply came quickly, terse and unfriendly. He quoted €40/hour and signed off as: “Klaus Grabler”

This brief exchange revealed several key facts:

  • Someone is actively using my name and email variant to conduct business

  • He ignored all my legitimate emails, yet responded to a client request

  • His tone was curt, unprofessional, and disinterested, hardly the behavior of someone running a real business

  • His pricing, modest as it was, casts doubt on how he could afford €950 designer furniture

This interaction reinforced the impression that the second “Klaus Grabler” is a person I would like to know a lot more about. Something here is very wrong. The later connection to Vogelsang Detective agency and J.H. only reinforces this impression.

 

Facebook Fakes

At the same time, I discovered two newly created but inactive Facebook profiles:

  • Lea Grabler (Combining L.O.'s name with my surname)

  • Klaus Grabler (with my identical name)

  • Jan Grabler (this one only recently appeared)

No photos, no activity, no friends. Just names. Someone was creating profiles that seemed eerily like what a fake family would look like. With my surname.

 

Evidence and Pattern Recognition

These were not isolated glitches. They represent a connected chain:

  • Email impersonation

  • Furniture order tied to my identity

  • Business with no verifiable operations

  • Fake profiles

  • Direct references to my stolen passport and address

I possess an emails from L.O. stating she has my passport and personal data, documents I never shared with her voluntarily. The timing of these events strongly suggests this is a campaign of impersonation, a continuation of the earlier November cyberattack.

 

Implications

Impersonation and digital identity fraud are prosecutable offenses in both South Africa and Germany.

But why create a Doppelgänger? Why mimic a man’s identity?

Possibilities:

  • To discredit me or cause reputational damage

  • To commit fraud under my identity

  • To stage future false flag operations with the intent to implicate me.

.

Above: These documents have been given in to the German authorities as evidence.  I wait to see what develops. As for the furniture dealers explanation, I don't see how you would write the same 'wrong' email address twice, which is what is needed when filling in their registration.

 

Conclusion: This Wasn’t a Breakup. This Was a Setup.

It would be easy to dismiss all of this as the bitter digital fallout of a failed relationship.

But the signs suggest otherwise. The reversed email. The silent placeholder accounts. The deliberate creation of transactional and professional records in my name. The refusal to engage when confronted. This wasn’t just coincidence,  this was a coordinated strategy.

And if the goal wasn’t to steal my money, it may well have been to steal my reputation, my credibility, or even my identity, one calculated step at a time.  And if not stopped, the next email from this imposter might not be about garden work, but about credit lines, loans, or criminal charges I never initiated.

 

This is not the only revelation. Digging deeper into the narcissists past I discovered other disturbing signs that this was part of a bigger pattern. A conspiracy of silence. Read More