To local law enforcement agencies, the amount of resources it takes to investigate every hacking accusation would be a drain on the budget of any police department. Not that "hackers" are not investigated. The emphasis is on investigating "hackers" that pose a physical threat to individuals. These are not hackers. These people are classified as stalkers and or terrorists. With terrorists being an aggressive version of the stalker. Stalkers are typically making the most of preconfigured, off the shelf, apps that are essentially plug and play. These apps also leave a digital footprint when and where they are used. This makes it easy for law enforcement to gather evidence. A person using these off the shelf apps shows an inability to actually circumvent cybersecurity systems with a level skill.
Hackers that can rely on their knowledge, experience, and skills to circumvent cybersecurity systems fall into three categories, Those that are in it for the money. The ones who make the evening news are in it for the prestige. Then you have those you meet every day, go out with, even live with, and you don't even know it.
Thea Magnusson is in the category of the unknown hacker. Only a small group of people are aware of her abilities to illegally access network equipment, computers, and phones. Her area of proficiency is Bluetooth. This is how Ms. Magnusson gains access initially. After that, it's only a matter of time.
Imagine someone listening to every word, constantly watching, and intercepting messages and emails. Altering emails and then sending them to the intended recipient. For the past eight years, this is what PPO has been dealing with. The overall outcome of this illegal intervention into his life is why the site exists. He has collected evidence, recorded phone calls, and made videos. All of it has been offered to law enforcement in Washington county, Oregon, on several occasions. He has been framed and sent to jail twice.
This is an illegal attempt to gain access to a phone using Google Play Services. This method will allow access to low level capabilities of the phone. This includes the camera, microphone, messaging, and email. This would allow the perpetrator to watch, listen and interact with the phone. The possibility to send email, text, etc. Any of which can be used to cause damage to financial, professional, legal, and social aspects of a person's life. This cyberattack is the literal definition of terrorism.
The guy being identified in the photos and video is Phillip Aaronhalt. He is a narcissistic sycophant. He went to the library that day to assist Thea Magnusson with hacking PPO's laptop. What was in it for him? A chunk of heroin. Neither Ms. Magnusson nor Mr. Aaronhalt were aware that PPO already knew who he was. He sat down across, and to the right of PPO. A couple of minutes later, PPO's laptop was connected to another network and the data was passing through it. This can be seen in the video attached. In the other video, PPO is making sure he has a good image of him. The three photos are of a Messenger conversation between Mr. Aaronhalt and Ms. Magnusson. This links them together.
These are videos of Thea Felice Magnusson and Sarah Jane Elkind. They are working together to create as much chaos and damage as possible in PPO's life. Having your phones and computers hacked so many times can be upsetting. When it is happening for eight years straight, it is beyond upsetting. Watch the videos below, and it is clear that PPO is upset. This was around year five. Thea Magnusson has recruited a partner, Sarah Jane Elkind.
Putting a phone into a loop means when you reset the phone, it goes through the motions but goes right back to the screen shown in the photos below. This was a constant problem for PPO. Why would Ms. Magnusson do this? It was one of the methods she used to prevent PPO from finding work. Another reason she would do this was in an effort to have his probation violated. How frustrating would it be to have to deal with this on an everyday basis?
The photos below are of a laptop previously owned by Thea Magnusson. These photos show the computers that she had gained access to. Hacker's refer to this as a stable. Take notice of the photo that has the name "CARKEY". Whoever this is probably had the knowledge to hack into the network of PPO's truck. This is an assumption. However, it fits nicely.