HACKING

To local law enforcement agencies, the amount of resources it takes to investigate every hacking accusation would be a drain on the budget of any police department. Not that "hackers" are not investigated. The emphasis is on investigating "hackers" that pose a physical threat to individuals. These are not hackers. These people are classified as stalkers. Stalkers are typically making the most of preconfigured, off the shelf, apps that are essentially plug and play. These apps also leave a digital footprint when and where they are used. This makes it easy for law enforcement to gather evidence. Using these off the shelf apps, shows an inability to actually circumvent cybersecurity systems on a high level. Then you have the hackers that are intent on the money, the experienced hackers who study security systems, write code in several different languages. These people have an understanding of the cause and effect of the code they write. What is occurring at a very low level, as the code makes it way through a computer or other smart devices. They work in teams, ever vigilant to avoid detection. These people receive a large proportion of the resources allocated, by both federal and state governments. Then you have the top priorities of the federal government. Those intent on bringing down our way of life, attacking the pillars that are the foundation of our government. Backed by endless funding of their home countries, with no concerns about being caught. Each category of hacker mentioned falls into a budgetary slot; they fit rather nicely. Law enforcement agencies fighting cybercrime and espionage and understands these categories.

There is an ever-growing population of hackers that are close to or as good as those that seek to obtain wealth and or power as hackers. Their goal is different. They are out to terrorize people. Upending the lives of others because they can. They get their kicks out of using technology to frame people for crimes they did not commit. Having such an influence on another person's life that they can ruin a persons career, bankrupt them, destroy their reputation, both professionally, and socially. These are criminal acts.

The individuals that are the perpetrators of these acts are rarely reported. The problem is there is usually little evidence the victim can provide. Rarely is it enough to have the perpetrator investigated. After so many reports to law enforcement the victim can become labeled as unbelievable, even deemed to have a mental illness; without any professional assessment or diagnosis. The bottom line is when there is no obvious intent to deprive the victim it is not investigated. Why? The resources that have to be allocated to gather evidence to obtain a search or arrest warrant, is too big of a portion of the budget of the local police departments. Prosecuting a "hacker" requires special skills and knowledge; usually a team. This is reality.

You and I cannot imagine what it is like to live with someone listening to every word said, constantly being watched. Having our messages and emails intercepted, altered then sent on to the intended recipient. Causing friends and clients, even family, to abandon us. I have never thought about what it would be like to have a skilled hacker invade my life in such a manner that I would have to be concerned about defending myself for crimes that I did not commit. The absolute frustration of not being able to explain why it appears that my phone was used in the commission of a crime. Not being able to prove that someone else is sending emails as me. To plead with law enforcement to go look at the evidence that is on a video security system, only to find out that it has been removed. As the content of this site increases, I have begun to wonder why my phone (not the original phone) has done this or that unusual behavior? Why did my email client do this or that? Has it always done that? When you are accumulating evidence that is pointing at a single individual, who is a hacker, the slightest thing can draw your attention, set you on a path down a rabbit hole, that doesn't really exist. How do I know they don't exist? I don't.

The content of this site, being the scope of this observation... When you look at the actions and events as singular occurrences over time, a pattern is not obvious. The fact that each event or action that was reported, was done so to a different individual in most cases. Even when the attempt was made to focus the reports with one individual in law enforcement, Deputy Upton (a link will appear here eventually), by this time so many false accusations and rumors concerning PPO have spread within the small law enforcement community in Hillsboro, Oregon that he is not taken seriously. I have mentioned this before, PPO has been ignored to the detriment of his safety and well-being. This is a fact, I am not digressing here. Where was I... However, when you are organizing all the events and actions that have occurred, you can see that something is not right. Patterns have started to emerge. There is correlation between dates and times. There are repeat occurrences of events, with regards, to technology misbehaving I will call it. To sum this up, because of the accumulation of data and the exposure to all of it in a short time span, there are obvious connection to be made. I am not an expert at anything related to the content of this site. It does not take an expert to under that coincidence, happenstance, and bad luck are not logical explanations for what has been occurring to one person repeatedly. Logic dictates that the individual who is in proximity to PPO, either directly before or after an occurrence is the catalyst. Commonsense, tells me that it takes an extraordinary determination and intelligence to be driven to ruin someone's life in this manner.

Music Hack

This is an illegal attempt to gain access to a phone. Using this method will allow access to low level capabilities of the phone. This includes the camera, microphone, and speakers. This would allow the perpetrator to watch, listen and interact with the phone. The possibility to send emails, texts, etc. The fact that this WCSO (Washington county Sheriffs office) absolutely refuses to investigate. They will not look at any evidence offered. The same can be said for the Hillsboro Police Department. No matter how compelling the evidence is, they refuse to engage with PPO. The reason for this is obvious. For more information, visit the Main Page.

Phone Hacks

Content Goes Here

Devices Hacked

Content Goes Here