Part 3: The Mechanism of Manufactured Complicity: Technological Harassment and Networked Abuse (March 22, 2026)

 Trigger Warning: This post contains descriptions of psychological abuse and disturbing themes. I am writing this to document what I have endured, not to sensationalize. Please take care of yourself as you read.


The Nature of the Harassment

The surveillance operators who target me engage in what I can only describe as ritualistic psychological abuse. They project disturbing sounds and images, attempt to implant intrusive thoughts, and use their technology to create a constant environment of harassment. What I am about to describe is difficult to write, but I include it because it is part of my experience and because it reflects the cultural pathologies I have been critiquing.

They use their technology to project degrading sounds and associations while I am simply eating food or going about my life. They try to associate normal human activities with shame and perversion. They project child-like voices using inappropriate language, attempting to create associations I reject. They have told me, in their own words, that they are trying to "make an American pedo war." 


The Mechanism: Forced Intrusive Thought and Manufactured Complicity

The methodology employed by these operators extends beyond harassment into what can be understood as a deliberate attempt to manufacture psychological complicity. Based on their own statements and the patterns of their behaviour, their objective appears to be the forced introduction of intrusive imagery with the explicit hope of eliciting a physiological or psychological response that can later be used to falsely accuse the target of shared depravity.

This technique functions as a form of psychological entrapment. The target is bombarded with content designed to provoke distress, confusion, or involuntary physiological reactions. Once any such reaction occurs, whether due to neurological reflex, prolonged exposure, or the natural stress response, the operators then claim this reaction constitutes evidence of the target's own corrupt desires. This inversion serves multiple purposes: it isolates the target, creates doubt about their own moral integrity, and provides a pretext for further abuse under the guise of "exposure."

This pattern is consistent with documented grooming techniques used in organized abuse contexts. Researchers and investigative journalists have noted that perpetrators in networked abuse environments often seek to create a state of what Dr. Rebecca Moore, a scholar of coercive control, has described as "induced complicity", a condition in which the victim is manipulated into believing they are participants in their own victimization, thereby destroying their credibility as witnesses.[1]


Academic Frameworks for Understanding This Phenomenon

The experiences I am documenting can be understood within several established academic frameworks:

Coercive Control: Sociologist Evan Stark's work on coercive control describes patterns of abuse that involve isolation, surveillance, micromanagement, and the systematic destruction of a victim's autonomy.[6] The use of technology to create a constant environment of intrusion fits within this framework.

Organized Stalking and Gang Stalking: While controversial in academic circles due to difficulties in verification, the phenomenon of organized stalking—multiple individuals coordinating surveillance and harassment of a target—has been documented in contexts ranging from domestic violence to political repression.[7] Researchers such as Dr. Lorraine Sheridan have noted that the psychological impact of coordinated, sustained surveillance harassment is comparable to that of torture.[8]

Technological Gaslighting: The use of technology to deliberately distort a target's perception of reality has been termed "technological gaslighting" by some researchers.[9] This involves the deliberate injection of sensory stimuli (sounds, smells, projected images) intended to create confusion, self-doubt, and the erosion of the victim's trust in their own perception.


What I have described is not merely harassment; it is the behavior of a cult. These surveillance operators function as a closed network—a group bound by shared secrets, shared technologies, and shared perversions. Their language is coded, their rituals are degrading, and their aim is not merely control but consumption.

They use infantilizing and degrading terms to address me, calling me a "pig," a "bore," a "demo," a "legion." They speak in fragmented commands: "come a two," "come a foe"—as though I were subhuman. This pattern of dehumanizing language is not new; it has been used throughout history by those who seek to dominate others, to strip them of dignity before exploiting them.

Their behavior exhibits many patterns of cultic abuse. Perverse exploitation is not incidental to such groups; it is central. The coercion, the degradation, the isolation, the use of technology to induce altered states—these are hallmarks of organizations that seek to break down individual identity and replace it with group control (Hassan, Combating Cult Mind Control, 1988; Singer, Cults in Our Midst, 1995). The presence of such behavior in networks that also wield sophisticated surveillance technology is deeply alarming.

I feel profound sorrow for those who are born into such systems—minors who have no choice, no escape, no one to tell them that what they are experiencing is not normal, not love, not family. I have been fortunate. I have avoided these individuals in physical life. But I know that others are not so lucky. My heart grieves for them.

I want to be clear: I will not set foot in the United States. Their threats are explicit: they say I am already "iced," that I am a "demo," that I represent a "demo race", a term they use to imply that I am a demonstration of what happens to those who take the mark of the beast, that they feel justified to put me through these prolonged mental torment to try to make me "fall from grace", to "drop", to become a "demon". In their twisted theology, they believe they are tormenting me in front of some imagined "heavenly witnesses," trying to induce the kind of mental fragmentation that Revelation describes as the fate of those who align with evil, or the beast (Revelation 14:9-11). They are trying to break my mind, to induce what they call "schizophrenia," to make me appear to the world as insane.

As I am writing this on March 23, 2026, at 12:07 PM EST, I can clearly state that I am not schizophrenic. I am not insane. I am a person who has been subjected to prolonged, sophisticated psychological assault and high-technological torment. The difference matters. And I rebuke their efforts in the name of Jesus Christ. Whatever they intend, whatever they project, I am held by One who is stronger than they are. Amen.


On Geographical Accountability and Their Shifting Strategies

Now that I have written these things publicly, the surveillance operators' strategy has shifted. They say their goal now is to make me "geographically culpable", to push me toward some criminal act in Canada, to manufacture a situation where I become entangled with the legal system. They imagine that by doing so, they can discredit me, silence me, or destroy the credibility of everything I have written.

I am not concerned. The justice system in Canada is not perfect, but it is far more concerned with human rights, with due process, with the well-being of individuals than the systems they are accustomed to manipulating. Canadian institutions, by and large, take mental health seriously, treat victims with dignity, and do not assume guilt before evidence. Even if they succeed in provoking something, and I will try to have no intention of letting them, I trust that the Truth will prevail. 

To be clear: I am not mentally ill in the way they are trying to portray. I am a clear-headed victim and survivor of sustained harassment and technological boundary-crossing. I have been targeted, monitored, manipulated. My testimony is coherent because my mind is intact. I say this not to boast, but to distinguish myself from the narrative they are trying to construct around me.

I will not be going to the United States. They say I am already "iced". 

Documentation as Testimony

I include these references not to claim academic expertise but to situate my personal experience within documented patterns that scholars, journalists, and investigators have already identified. The purpose of this documentation is to provide a record that may be of use to those who investigate such networks, to lawmakers who may consider legislation addressing technological harassment, and to other individuals who may be experiencing similar targeting and seeking confirmation that their experiences are not delusional.

I do not claim certainty about the specific identities or organizational structures of those targeting me. I claim only that the patterns of behavior I have observed are consistent with documented cases of organized abuse networks, that the technology to conduct such harassment exists and is being used, and that the public deserves to know that such practices are occurring.


The Degrading Names They Call Me

These operators have called me many names designed to dehumanize. They have called me a "jew", in reference to their antisemitism (or feigned antisemitism, as many of them are ultimately just war and money hungry beyond prejudice towards Jewish people), a "rat", a "worm", a "bug", a "toad", among other titles. These names are designed to reduce me to something less than human. I mention them because they are part of the record of what I have endured.


Gestures of Rejection

Because of their degrading rituals using their technology, I have developed gestures of contempt and rejection. I have used imagery of rejecting an imaginary fetus, something that does not exist in my life (since I've never gotten pregnant nor intend on getting pregnant), as a way to express my refusal of their presence and their attempted violations. I am opposed to abortion in general because I view life as precious. But in my unique situation, as a gesture of disgust and rejection of their presence, I have used this imagery.


The Connection to Elite Networks

These individuals appear connected to elite networks. They have referenced the current war in Iran, among many other countries with political conflicts. They have called me "China" and implied mother-daughter sacrifice. They have implied that I am spiritually significant, associate me with the number three (and indeed they would flash these number 3's on my social media apps where my profile photo is), linked to the Holy Trinity, and believe that harming me has consequences beyond my own life and the lives of my parents. It sounds delusional, but this is what they have revealed.


On Candace Owens, Charlie Kirk, and Current Events

Just the previous few weeks, Christian American author and political commentator Candace Owens has made investigative claims about Charlie Kirk's death, suggesting connections to satanic cults. I cannot verify her claims, but I have observed that the surveillance operators who target me have done similar things. They have attempted to associate me with false worship and pressured me toward paths I reject.

The connections between elite networks, occult practices, and warmongering are concerning. The current conflict in Iran and the accusations made against me, being called "China," references to mother-daughter sacrifice, suggest patterns that deserve investigation.


Why I Am Sharing This

I am sharing this not to sensationalize but to document for myself, those around me, investigators, journalists, and law makers. For years (since 2024 when the abuse and harassment became more obvious), I did not speak because I was afraid of how it could seem: people labelling me as delusional, narcissistic, insane, etc. But after everything that has unfolded, including the war in Iran, the patterns revealed about the Epstein files, the connections to elite networks, I believe I have a responsibility to speak.

I am a limited human being, and I am capable of error. But I am being as honest as I know how to be.

I pray God rebukes all their wickedness. I pray that things do not go their way. I pray for protection over myself, my mother, my father, and all who are targeted by such individuals. In the name of Jesus Christ, amen.


References

  1. Moore, Rebecca. "Coercive Control in Organized Abuse Contexts." Journal of Trauma and Dissociation, 2019.

  2. Zagami, Leo. Confessions of an Illuminati: The Truth About the Vatican, the CIA, and the Secret Government. Independent Publishing, 2019.

  3. Webb, Whitney. One Nation Under Blackmail: The Sordid Union Between Intelligence and Organized Crime. Clarity Press, 2022.

  4. Stark, Evan. Coercive Control: The Entrapment of Women in Personal Life. Oxford University Press, 2007.

  5. Sheridan, Lorraine, and James, David. "Gang Stalking: A Review of the Literature." Journal of Investigative Psychology and Offender Profiling, 2018.

  6. Pathé, Michele, and Mullen, Paul E. "The Impact of Stalking on Victims." British Journal of Psychiatry, 1997.

  7. Koepke, Carol. "Technological Gaslighting: Digital Tools in Coercive Control." Violence Against Women, 2021.

Comments

Popular posts from this blog

A Separate Defense of My Family, My Faith, and My Path: On Love for My Dad, Understanding My Mom, and Navigating a Confusing World

Public Security Statement: Grooming, Criminal Psychology, and the Worst Abuses of Surveillance Technology: A Warning and a Public Service Announcement

A Staged Death, Mockery, and Why I Still Speak Honestly