"Did Mommy already go to bed, hey? Poor little Klausi. Thinks he can just go on like he always does. But unfortunately, I gotta tell you that he can't.  This was the very last time I let you insult me.  Did Mommy not show you enough tits? Your disrespectful and vulgar way of talking is repelling and disgusting. " L.O. (The terrified 'Victim')

Investigations

 

The smear campaign and false charges were designed to paint me as the problem. The reality is the opposite. From before my accounts were hacked in November 2024, I began documenting every trace, emails, google activity logs, fraudulent purchases, google recovery requests, fake profiles, and coordinated attacks. 

As she was always quick to delete any evidence of her abuse I began to keep screenshots of our chats. Had I not done this I would have zero evidence of anything. Her first demand whenever she blackmailed me was always to "delete the files". In the beginning I fell for her promises and deleted many of the records I had kept. But as time went on I could see that she was only taking advantage of me and so I began to keep screenshots of all our interactions. These are part of the evidence I have collected. After the discard I began my investigations in earnest.

This section brings together the results of those investigations. It shows how a private conflict was escalated into digital sabotage, legal harassment, and identity fraud, and how each incident connects to a wider pattern. The evidence includes technical forensics, documents, and voice notes and videos. There are corroborating screenshots, emails and other forensic evidence.

Methods included email tracking, which confirmed not only who was opening messages but from which devices and regions. I also enabled IP and user fingerprinting on my website, in order to see who was most interested and in what content. During the cyber attack on me she and her accomplice forgot to turn on the VPN and I obtained a clean IP trace from the exchange they were trying to empty, placing them in Hemmoor, Germany. This places the hackers in Germany, exactly where L.O and Dom are located. I have confirmation that the service provider is the same as the one of his cell phone. I also have evidence that puts the two of them together shortly before the hacking began.

Google activity records were obtained proving that the pair were engaged in specifically targeting me with information only L.O. could have known about. Accounts only she knew about were hacked during the attack, including the secret LinkedIn account I created which she would use to send me a mocking personal message during the hacking. No one else on Earth knew this account belonged to me. Only L.O. Logically, there can be only one conclusion.

I discovered that spyware had been planted on my PC, presumably when she sent me two infected .mp4 files which crashed my PC. I still have the discord chat screenshots of the exact moment when my PC crashed and she innocently enquired as to what had happened. 

Tracing the Segmüller furniture fraud led directly to Carl Zeiss Strasse 3, a key pivot point that exposed a wider network. From there, the trail uncovered Vogelsang Detektei and Your Pilots, shell-like fronts tied to Lisa Vogelsang and a web of fake businesses seemingly linked to L.O.’s stepfather. International connections to Croatia were uncovered. 

Further digging revealed Landhaus Stroble, a hotel, owned by Lisa and her sister Suzanne,  sold to a wealthy Sheik now supposedly managed by Lisa Vogelsang. Who is also  e owner of Octocni Servis O.O.D. a company with many hats but none of them are real. 

My investigations revealed luxury goods being bought using my name and email address. Car finance has being taken out again using my credentials. Facebook is being inundated with hundreds of fake 'Grabler' profiles in order to cover up the accounts that are pretending to be me and the narcissist using my surname. 

Then there is the issue of the Ströer forgeries, and how my contacting the company caused the sudden disappearance of an entire blog site, including hundreds of articles and their authors names, just  L.O. could have her name removed. Even though i have made the company aware that their name was used fraudulently they prefer to do nothing. Let an innocent man go to prison rather than stand up for truth and justice. 

Again, they deliberately removed dozens of author's bylines to protect one narcissist who had forged their documents to obtain work fraudulently. Her own Stepfather repeatedly confirmed to me in writing that I was right about everything, I was alleging but that he was too afraid to go against her. 

Time and again, the same pattern emerged: silence. Nobody talks. Companies and individuals close ranks, even when the traces are plain. My identity is being erased from google, there is not a single photograph of me online anymore, and my name is almost invisible. I did not do this. Michael Booysens, a South African man, was discovered to be connected to L.O.'s stepfather, again on LinkedIn, but when I contacted him he seemed terrified, and instantly blocked me and refused any further contact.

I only discover later that I had been his wedding photographer 14 years earlier. I believe he is a previous victim of L.O.'s  who is too afraid to speak as she no doubt threatens everyone with the release of their "Dick Picks" as well as getting them fired or arrested.

Meanwhile, forensic logs showed that her Apple MacBook had been actively tracking me through my own website, monitoring my movements in real time. The evidence leaves little doubt: this was not a random series of coincidences but a coordinated operation, built on deception, intimidation, and surveillance.

I was the target of several phishing campaigns, sophisticated efforts to spoof my email address and make me look like an international money launderer. One sophisticated attempt at scamming me took place over a period of weeks , using an elaborate romance scam with a character called Mariam. 

These are not guesses or assumptions. They are verifiable traces: IP addresses, browser fingerprints, forged documents, disappearing domains, and coordinated campaigns that can be tracked across platforms. Each entry here is part of a broader picture of calculated abuse and deception, exposing both the methods and the motives behind it.