PART 4: CONCRETE EVIDENCE OF SURVEILLANCE HARASSMENT, THE OBSERVABLE AND RECORDABLE
PART 4: THE OBSERVABLE EVIDENCE
- 4.1 Social Media Manipulation: Glitches, Colours, and Algorithm Tampering
- 4.1.1 Visual Glitches and Colour Anomalies
- 4.1.2 Algorithm Tampering and Targeted Ads
- 4.1.3 What I Have Observed vs. What I Have Documented
- 4.2 My Cell Phone and Laptop as Surveillance Devices
- 4.3 What Experts and Public Figures Say: This Is Possible
- 4.3.1 The Zuckerberg Precedent: Acknowledging the Vulnerability
- 4.3.2 The "Are You Listening?" Debate
- 4.3.3 Terrence Howard's Wiretapping Allegations (2024)
- 4.3.4 Global Wiretapping Scandals
- 4.3.5 Emerging Technologies Confirming Feasibility
- 4.4 Next Steps: Forensic Investigation
- 4.4.1 The Challenge of Documentation
- 4.4.2 What a Forensic Specialist Could Do
- 4.4.3 Evidence Available
- 4.4.4 Proposed Forensic Protocol
- 4.5 The Cumulative Weight of Observable Evidence
- 4.5.1 What This Evidence Demonstrates
- 4.5.2 The Path Forward
- 4.6 A Note to Investigators
4.1 Social Media Manipulation: Glitches, Colours, and Algorithm Tampering
For years since 2023, I have observed systematic and targeted manipulation of my social media accounts and devices (i.e., iphone and laptop). Many of the symbols, colours, posts and ads I see are not random technical malfunction; they is coordinated, targeted, timed precisely with the other forms of telepresence harassment I experience.
4.1.1 Visual Glitches and Colour Anomalies
I have observed my social media profiles photos display strange visual phenomena with colours shifts or numbers, like three, appear. I have been able to capture some screenshots of these anomalies, though many occur too quickly to document- the glitch flashes, and by the time I attempt to capture it, the screen may freeze or the moment passes.
4.1.2 Algorithm Tampering and Targeted Ads
I have witnessed my algorithms being deliberately targeted. My feeds will suddenly flood with many upsetting posts:
- Ads of sick and suffering minors
- Disturbing war imagery and violence
- Ads related to illnesses and other distressing news
- Content designed to trigger fears and stress
This is not organic algorithm behaviour. The ads appear regardless of my browsing history or online activity. They are not suggestions based on my interests; they are weapons aimed at my emotional state.
4.1.3 What I Have Observed vs. What I Have Documented
It is important to be precise about what I can prove versus what I have personally witnessed:
| Observed (Personal Experience) | Documented (Captured Evidence) |
|---|---|
| Frequent glitches and colour distortions | Some screenshots of anomalies |
| Repeated exposure to distressing targeted content | Limited screenshots of feeds |
4.2 My Cell Phone and Laptop as Surveillance Devices
My devices appear to function as surveillance tools. I have experienced what I interpret as coordinated interference across applications and system behaviour.
4.3 What Experts and Public Figures Say: This Is Possible
There have been multiple discussions in public discourse regarding surveillance, data collection, and algorithmic manipulation.
4.3.1 The Zuckerberg Precedent: Acknowledging the Vulnerability
Public discussions around device security highlight vulnerabilities in personal technology.
4.3.2 The "Are You Listening?" Debate
There has been widespread debate on whether devices passively collect audio data.
4.3.3 Terrence Howard's Wiretapping Allegations (2024)
Public allegations have been made about surveillance and wiretapping.
4.3.4 Global Wiretapping Scandals
There are documented cases of large-scale surveillance operations globally.
4.3.5 Emerging Technologies Confirming Feasibility
Advancements in technology demonstrate the increasing capability for data tracking and analysis.
4.4 Next Steps: Forensic Investigation
4.4.1 The Challenge of Documentation
Capturing transient events remains difficult.
4.4.2 What a Forensic Specialist Could Do
Experts could analyze device logs, metadata, and network activity.
4.4.3 Evidence Available
Some screenshots and personal observations are available.
4.4.4 Proposed Forensic Protocol
A structured investigation could provide clarity.
4.5 The Cumulative Weight of Observable Evidence
4.5.1 What This Evidence Demonstrates
Patterns suggest recurring anomalies.
4.5.2 The Path Forward
Further investigation is needed.
4.6 A Note to Investigators
This document reflects observed experiences and potential areas for further examination.
Comments
Post a Comment