Follow this Social Worker being isolated, surveilled, intimidated, and vilified through three countries, six states and Washington D.C. This saga includes being locked out, experiencing a multitude of break-ins, living through unlawful imprisonment, eating and sleeping despite financial manipulation, dealing with slashed tires, receiving unwelcome “gifts”, and MORE.
Classic “David vs. Goliath” saga where the “David” in me valiantly struggles to resist the “Goliath” in them.
Hop on for the ride and wish me luck!!!
Surveillance is the engine of control. What may seem like a random ping or a coincidental doorbell is a data point. Every watched device, tapped account, or sensor becomes part of a system of observation. Here you’ll find tools, insight, and support to expose the hidden network and reclaim your boundaries.
When intrusion becomes routine, boundaries dissolve. Life invasion is the deliberate breach of digital and personal space, characterized by uninvited appearances, impersonation, rumor-spreading, and the introduction of distress into everyday life. It’s not just online harassment; it’s the slow occupation of a life. This section exposes how invasion operates and how to reclaim presence and peace from its reach.
Intimidation thrives on fear, not always through direct harm, but through the constant promise of it. It can live in a threat, a photo, or a message that says nothing yet means everything. Digital spaces become weapons of silence and shame. This section examines how technology is used to instill fear, control behavior, and erode the sense of safety essential to survival.
Interference turns connection into control. It’s the deliberate corruption of truth, altering, deleting, or weaponizing what was once private. Through impersonation, rumor, and digital sabotage, the offender rewrites reality to isolate the victim and distort how others see them. This section explores how interference dismantles trust and offers ways to rebuild integrity in both digital and human connection.