PART 4: CONCRETE EVIDENCE OF SURVEILLANCE HARASSMENT, THE OBSERVABLE AND RECORDABLE

 PART 4: THE OBSERVABLE EVIDENCE

  • 4.1 Social Media Manipulation: Glitches, Colours, and Algorithm Tampering
  • 4.1.1 Visual Glitches and Colour Anomalies
  • 4.1.2 Algorithm Tampering and Targeted Ads
  • 4.1.3 What I Have Observed vs. What I Have Documented
  • 4.2 My Cell Phone and Laptop as Surveillance Devices
  • 4.3 What Experts and Public Figures Say: This Is Possible
  • 4.3.1 The Zuckerberg Precedent: Acknowledging the Vulnerability
  • 4.3.2 The "Are You Listening?" Debate
  • 4.3.3 Terrence Howard's Wiretapping Allegations (2024)
  • 4.3.4 Global Wiretapping Scandals
  • 4.3.5 Emerging Technologies Confirming Feasibility
  • 4.4 Next Steps: Forensic Investigation
  • 4.4.1 The Challenge of Documentation
  • 4.4.2 What a Forensic Specialist Could Do
  • 4.4.3 Evidence Available
  • 4.4.4 Proposed Forensic Protocol
  • 4.5 The Cumulative Weight of Observable Evidence
  • 4.5.1 What This Evidence Demonstrates
  • 4.5.2 The Path Forward
  • 4.6 A Note to Investigators

4.1 Social Media Manipulation: Glitches, Colours, and Algorithm Tampering

For years since 2023, I have observed systematic and targeted manipulation of my social media accounts and devices (i.e., iphone and laptop). Many of the symbols, colours, posts and ads I see are not random technical malfunction; they is coordinated, targeted, timed precisely with the other forms of telepresence harassment I experience.

4.1.1 Visual Glitches and Colour Anomalies

I have observed my social media profiles photos display strange visual phenomena with colours shifts or numbers, like three, appear. I have been able to capture some screenshots of these anomalies, though many occur too quickly to document- the glitch flashes, and by the time I attempt to capture it, the screen may freeze or the moment passes.

4.1.2 Algorithm Tampering and Targeted Ads

I have witnessed my algorithms being deliberately targeted. My feeds will suddenly flood with many upsetting posts:

  • Ads of sick and suffering minors
  • Disturbing war imagery and violence
  • Ads related to illnesses and other distressing news
  • Content designed to trigger fears and stress

This is not organic algorithm behaviour. The ads appear regardless of my browsing history or online activity. They are not suggestions based on my interests; they are weapons aimed at my emotional state.

4.1.3 What I Have Observed vs. What I Have Documented

It is important to be precise about what I can prove versus what I have personally witnessed:

Observed (Personal Experience) Documented (Captured Evidence)
Frequent glitches and colour distortions Some screenshots of anomalies
Repeated exposure to distressing targeted content Limited screenshots of feeds

4.2 My Cell Phone and Laptop as Surveillance Devices

My devices appear to function as surveillance tools. I have experienced what I interpret as coordinated interference across applications and system behaviour.

4.3 What Experts and Public Figures Say: This Is Possible

There have been multiple discussions in public discourse regarding surveillance, data collection, and algorithmic manipulation.

4.3.1 The Zuckerberg Precedent: Acknowledging the Vulnerability

Public discussions around device security highlight vulnerabilities in personal technology.

4.3.2 The "Are You Listening?" Debate

There has been widespread debate on whether devices passively collect audio data.

4.3.3 Terrence Howard's Wiretapping Allegations (2024)

Public allegations have been made about surveillance and wiretapping.

4.3.4 Global Wiretapping Scandals

There are documented cases of large-scale surveillance operations globally.

4.3.5 Emerging Technologies Confirming Feasibility

Advancements in technology demonstrate the increasing capability for data tracking and analysis.

4.4 Next Steps: Forensic Investigation

4.4.1 The Challenge of Documentation

Capturing transient events remains difficult.

4.4.2 What a Forensic Specialist Could Do

Experts could analyze device logs, metadata, and network activity.

4.4.3 Evidence Available

Some screenshots and personal observations are available.

4.4.4 Proposed Forensic Protocol

A structured investigation could provide clarity.

4.5 The Cumulative Weight of Observable Evidence

4.5.1 What This Evidence Demonstrates

Patterns suggest recurring anomalies.

4.5.2 The Path Forward

Further investigation is needed.

4.6 A Note to Investigators

This document reflects observed experiences and potential areas for further examination.

Comments

Popular posts from this blog

A Separate Defense of My Family, My Faith, and My Path: On Love for My Dad, Understanding My Mom, and Navigating a Confusing World

Public Security Statement: Grooming, Criminal Psychology, and the Worst Abuses of Surveillance Technology: A Warning and a Public Service Announcement

A Staged Death, Mockery, and Why I Still Speak Honestly