HACKING

For local law enforcement agencies, the amount of resources it takes to investigate every hacking accusation would be a drain on the budget of any police department. Not that "hackers" are not investigated. The emphasis is on investigating "hackers" that pose a physical threat to individuals. These are not hackers. These people are classified as stalkers and or terrorists. With terrorists being an aggressive version of the stalker. Stalkers are typically making the most of preconfigured, off-the-shelf, apps that are essentially plug and play. These apps also leave a digital footprint when and where they are used. This makes it easy for law enforcement to gather evidence. A person using these off-the-shelf apps shows an inability to actually circumvent cybersecurity systems with a level of skill.

Hackers that can rely on their knowledge, experience, and skills to circumvent cybersecurity systems fall into three categories, Those that are in it for the money. The ones who make the evening news are in it for the prestige. Then you have those you meet every day, go out with, even live with, and you don't even know it.

Thea Magnusson is in the category of the unknown hacker. Only a small group of people are aware of her abilities to illegally access network equipment, computers, and phones. Her area of proficiency is Bluetooth. This is how Ms. Magnusson gains access initially. After that, it's only a matter of time.

Imagine someone listening to every word, constantly watching, and intercepting messages and emails. Altering emails and then sending them to the intended recipient. For the past eight years, this is what PPO has been dealing with. The overall outcome of this illegal intervention into his life is why the site exists. He has collected evidence, recorded phone calls, and made videos. All of it has been offered to law enforcement in Washington county, Oregon, on several occasions. He has been framed and sent to jail twice.

Google Play Services

This is an illegal attempt to gain access to a phone using Google Play Services. This method will allow access to low-level capabilities of the phone. This includes the camera, microphone, messaging, and email. This would allow the perpetrator to watch, listen and interact with the phone. The possibility to send email, text, etc. Any of which can be used to cause damage to financial, professional, legal, and social aspects of a person's life. This cyberattack is the literal definition of terrorism.

Library Hack

The guy being identified in the photos and video is Phillip Aaronhalt. He is a narcissistic sycophant. He went to the library that day to help Thea Magnusson with hacking PPO's laptop. What was in it for him? A chunk of heroin. Neither Ms. Magnusson nor Mr. Aaronhalt were aware that PPO already knew who he was. He sat down across, and to the right of PPO. A couple of minutes later, PPO's laptop was connected to another network and the data was passing through it. This can be seen in the video attached. In the other video, PPO is making sure he has a good image of him. The three photos are of a Messenger conversation between Mr. Aaronhalt and Ms. Magnusson. This links them together.

Caught on Video

These are videos of Thea Felice Magnusson and Sarah Jane Elkind. They are working together to create as much chaos and damage as possible in PPO's life. From May 2017, to October 2025, is the length of time PPO has had to exist without privacy; this is still ongoing. Eight years of being reminded by Ms. Magnusson's "calling cards." Every camera and microphone has to be disabled or covered. PPO will disconnect the internet from a device when he is not using it. Even this has not prevented Ms. Magnusson from gaining access to his network. PPO has four phones that have been hacked into so many times, he doesn't bother with resetting them when he becomes aware of it. He disconnects the internet, removes the SIM card, and puts the device into a Faraday bag. Then he picks up another on and starts all over. He doesn't have guests over because he would not want Ms. Magnusson or one of her sycophants to gain access to friends' equipment. Which means he has very few friends to speak of. Forget about dating. Try explaining this situation to a date. Should Ms. Magnusson manages to access any device at the right time, PPO could very well find himself framed for revenge porn. Every vehicle he has had, Ms. Magnusson has had her minions, or herself sabotage it. If you have read any of these sites, you may have noticed that law enforcement in this county has turned their backs on him. It is assured the police will do nothing in the way of investigating Ms. Magnusson; no matter how much evidence he is waving under their collective nose, The police have no problems with arresting PPO. The amount of frustration, the anger, and loneliness of having no one to turn to for eight years straight, it is beyond upsetting. Watch the videos below, and it is clear that PPO is upset. This was around year five. Thea Magnusson has recruited a partner, Sarah Jane Elkind.

Office 365

Biometrics Hacked

Phone Hacks

Putting a phone into a loop means when you reset the phone, it goes through the motions but goes right back to the screen shown in the photos below. This was a constant problem for PPO. Why would Ms. Magnusson do this? It was one of the methods she used to prevent PPO from finding work. Another reason she would do this was in an effort to have his probation violated. How frustrating would it be to have to deal with this on an everyday basis?

Devices Hacked

The photos below are of a laptop previously owned by Thea Magnusson. These photos show the computers that she had gained access to. Hacker's refer to this as a stable. Take notice of the photo that has the name "carkey". Whoever this is probably had the knowledge to hack into the network of PPO's truck. This is an assumption. However, it fits nicely.

Coffee Shop Hack