(Click here to see new additions to the items posted below.)

I wrote the below post when pretty fed up and angry. Every human has her limits, me included.

Being bombarded by “input” from a lot of external sources that filtered out my good qualities and amplified my weakness, telling me I was “this” or “that,” eventually got to me. Sure it did. Especially when those sources were attacking my kids, my husband, and my other family at the same time. Had me like, whatever, I’m tired, so if you so say so, then fine (how you feel when worn down). Choose your battles, right?

Yet, when I scroll back and remember what we went through, I don’t just see my moments of weakness. I see an incredibly patient person who had some really rotten, overwhelming forces work hard to test her limits. Yeah, I see some cringe-worthy “feelings.” But I also see a strong, unfiltered, determined girl who refused to give up on God.

I don’t know, but I think it is better to struggle with God and be real about it than to pretend life is pretty, and simple, and one-dimensional all the time.

Life’s messy, man.

I read back over this post as if reading some third-person account, and I feel this mama’s hurt. It’s real. It’s raw. Even now when removed from the emotional hurt this mama felt, I still agree with this angry mama’s words.

She’s right. Yeah, I know, some of y’all gonna read too literally and miss the figurative expressions that pour out of a heart-quake (like an earthquake, but inside-out instead of outside-in). Whatever, man. Judgers gonna judge. Nobody can be “right” by doing “wrong.” Witness tampering and obstructing justice have foreseeable consequences. It’s dangerous and reckless to dabble in these dark arts.

It’s time we get real with ourselves.

It’s time we get real with each other. It’s a cop out to pretend our account with God is the only account we have open. Our main account is with God, and godly forgiveness, grace, and salvation resets that account. That’s huge, of course. But we gotta be real, y’all. We live on this planet with a lot of other people. You and yours and me and mine ain’t the only ones God loves. How we treat (or mistreat) our neighbors, it matters. It matters big.

We ain’t got no business doing God’s work if we can’t commit to loving all His children. All of His children. We ain’t got no business preaching God’s word if we are treating each other worse than the non-believing atheists among us. And it would be better for us to be kind, compassionate atheists than to call ourselves “godly” and tolerate or help commit intentional harms to our brothers and sisters on this planet. Because that,  my friends, is blasphemy. That ain’t quenching the Spirit. That’s intentionally killing the Spirit. You ain’t gotta be Jesus or Isaiah or Abraham or Moses to know that ain’t good.

After writing this post, I found a lesson and balmy healing in James I:

Blessed is the man that endureth temptation: for when he is tried, he shall receive the crown of life, which the Lord hath promised to them that love him. Let no man say when he is tempted, I am tempted of God: for God cannot be tempted with evil, neither tempteth he any man.”

Not everything is this life is good all the time, but God sure is, y’all. Don’t know about you, but I’m mighty blessed. Below is my original post . . .

You killed God. You knowingly and intentionally killed truth. And justice. And goodness. And light. You knowingly and intentionally wanted to kill me. You beat and beat and beat and beat me into submission. Beat me into a nothingness. Ground me into sand.

Have your evil Heaven.

I choose Hell.

With the innocent. With the honest. With the good you killed. The truth you killed. The justice you killed. The light you darkened. The innocent you murdered.

What does life matter? You’re all “lawyers,” really. Dirty lawyers. Robbing and stealing. You granted yourselves “Power of Attorney” for God. And the justice system. You changed the terms of God’s contract.

You steal and hoard mercy and grace and peace and salvation in corrupt coffers.

You cheat the blameless out of mercy. And grace. And peace.

And salvation.

This is goodbye.

I don’t hate you. I will forgive (again and again and again). But I will NEVER again respect you. Or like you. Or trust you. Not as I once did. Not for any foreseeable future. Not as you are now.

You showed me who the devil is. You showed others, too. It’s you. You have no “holy” insight.

If you couldn’t discern truth, then you can’t discern the spirit of God.


You’re frauds. Justifying yourselves. Making yourselves gods. Cheapening beautiful salvation. Burning justice for a selfish sacrifice before your gold idols. You built prideful statues out of “heritage,” and “history,” and “tradition.” You crucify Christ again and again.

You killed my 14 year old’s innocent belief that, if you tell the truth and do what’s right, eventually good and God will overcome evil. My light-hearted, always joking boy got serious and hugged his mama while she sobbed. He said, “They did you dirty, Mom. Not a single one of them is going to Heaven. They’ll all have to answer to God one day.”

But you think Heaven is yours. Fine. Take it. I am too tired to fight you for it.

I don’t want anything to do with you. There’s nothing you have I want. There is nothing you can say I care to hear. Go ahead and talk at your pulpits. In your offices. Pray your insincere self-serving prayers. Sign those checks to make your mock God answer them. I am done. You had no testimony when God called you to speak truth. Your testimony wasn’t God-serving. It was self-serving. It lacks authenticity. It lacks courage. It lacks candor. It lacks credibility. It lacks Spirit.


You extinguish hope. Your world is no world I desire to be in. My beautiful children–my incredible students–all beautiful souls who deserve safe, peaceable existence. I wanted that for them. But thanks to you, I know it does not exist.

I WAS merciful. I DID forgive. I DID show you grace. You were neither merciful, nor honest. Nor holy. Nor godly. Nor loving. Nor humble. Nor graceful. Nor kind. Nor respectful.

You took my grace, my mercy, and you cheated. You are Liars. And Cheats. And Thieves. You used me. When I came to you in honesty, sincerity, truth, and trust, you stamped a tag on me and offered me up as the “catch” in a commercial hunt. Forced me to play fox for sport. You declared open season. You debased me more. You exposed me and my loved ones to new predators. And with smirks and winks, you showed me and others you took pleasure in it.

Like snakes.

Like serpents.

Like Satan.

Never again. Never.

What do I want? I don’t want your blood money. I don’t want your corrupt power. I want nothing of your godless “church” and your unjust “justice system.”

I wanted freedom. Freedom and peace.

Freedom from crimes committed against me (freedom from blame for any other victims). Freedom from your lies. Freedom from your imposed shame–shame for something I didn’t do.

Yes. I. Wrote. The. Truth. And I wanted freedom to live in truth.

I wanted freedom from patent, disturbing, unreasonable coercive control.

I wanted freedom from people who were apathetic to those who abusively manipulate and exert coercive control over others.

Because, delusional me, I believed whoever the Son made free was free indeed. And, delusional me, I believed God granted all people, even sinners, free will.

(No one–not even the vilest sinner–deserves to be abused, physically, sexually, psychologically, emotionally, or spiritually. No one–not even those you judge as “holy”–has God’s OR the State’s permission to abuse saints OR sinners.)

I did NOT desire control over anyone else. I did NOT abuse you. Or your loved one. Or your client. Or your friend.

Your loved one, your client, your friend abused and violated norms. Violated me. Crossed boundaries. Crossed my boundaries. Again and again and again and again. Without consent. I merely wanted control of my own person. My own body. My own identity. My own experience. My own testimony. My truth. Me.

Delusional me to think that was reasonable.

I wasn’t the only one to say he had no consent. That’s what he said, too. He said that to me. To my mother (he admitted to my mother he did everything just as I said). He said it to many of you. He absolutely said it to me when I finally confronted him. And he said it to the police, whether he lied about all the details or not.

Some of you didn’t “want to know” truth. You had no right to your fiction of my experience. Because you were so committed to your dangerous fiction, I had every right to declare the truth about my experience. I told you there were present flags, present boundary violations.

But you didn’t (and don’t) care. You wouldn’t (won’t) hear truth.

Lying serves your interest better than the truth.

You wanted to believe your own fictions. With anger. Haughtiness. Indignation. Unholy arrogance.

So go ahead and take your fiction to your fictional hypocrite’s Heaven. I don’t care anymore about your godless, truth-fearing, performance-based, unholy version of “holiness.”

Just know when one of your kids, grandkids, nieces, nephews, cousins, or friends is sexually harassed, sexually molested (abused), or raped by violence, confinement, vulnerable attack, or coercive threat of harm or humiliation (because statistically it will happen–not by some stranger, but at the hands of someone you trust), don’t bother reporting. You made yourselves kings on an unholy throne. You mocked responsibility. You ridiculed accountability. You hunted victims. You killed truth. You loved lies. You falsely judged the truthful. You freightened other witnesses. You made sure NO victims will have a safe space to come forward in your kingdom. Not even the 33% of your own who will be victimized by their 18th birthdays.

I wanted healing for myself. And the other wounded survivors with cloaks of shame forced on them. I wanted them to be free. Because God wants them to be free.

What an evil “bitch,” right? (Not profanity here. A female dog–what you made sure I knew I was and how you made sure others would see me.)

You let me know freedom wasn’t possible. Was never possible. Will never be possible. You made excuses for him. You justified evil and let him keep the human spoils of his crime. He wouldn’t let me be free. You’ll never let me be free. Never let others be free. Not when the devil is you, yourself, or one of yours. When the devil is your brother. Or husband. Or son-in-law. Or cousin. Or nephew. Or son. Or friend.

Or your “boy.” “Bros before [sleeping] hoes” and all. Think that’s vulgar? Yeah, I agree.

But if words–mere social constructs–of symbols making up phonemes (sounds) offend you more than the actual conduct the words describe, then your priorities are pretty messed up. Your principles are weak.

You have no stable standard.

Time will pass. Truth will remain. Forgiveness reconciles the past. It’s not future consideration. It is not an entitlement to blind trust.

You made it clear, your foot will always be on my neck. You will forever make this life a prison.

May God have mercy on you.

Because here is what I know. Truth WILL prevail. In this life. And the next. You think this is the end?

It is just the beginning.

The real God will reveal himself.

In His time.

The real God’s will cannot be corrupted by your financial endorsements.

The real God’s standard is firm.

The real God allies himself with truth.

The real God is an advocate for the used, the cheated, the abused, the tormented, the pillaged, the plundered, the exposed, the battered, the broken, the forced, the tortured.

You judged me unholy and sentenced me to death for daring to speak truth.

You wanted me dead? Fine. In the death you manufactured, I find freedom. And victory.

You “tethered” me (and my devices) to a heap of straw lies and lit a match.

You wanted me to burn? Fine. I choose the fire. With all the others who chose fire before me. With all the others who died before me.

Yes. My sane, honest, clear, rational mind would rather be in Hell with all the innocents you murdered than any mock Heaven with you. Yours is a hypocrite’s Heaven. An ugly Heaven. You designed Heaven into a Liar’s Lair. A shame shack. Full of fat-bellied frauds. And fake faces. No thanks.

I lost almost everything to speak truth. That’s all I “gain” out of this. And that is fine. I will take truth with me to Hell.

I choose an honest Hell. With weeds and wild flowers. With truth, raw truth. And justice. And honesty. And courage.

And all the innocents you murdered. Continue to murder.

I will walk through Hell fire with the ones you destroyed, cast out, and buried. Because the real God is with ME. His Son was one of those murdered Innocents.

My 14-year-old is right. Your path, paved in cowardly lies, fraud, and deceit, isn’t going to cut it with the real God. Walking through this Hell is the path to the real Heaven.


RFID tag hidden inside our cordless phone base. Handsets were modified, too.
Phones modified w/ handwritten labels. This one–“C.” Not an expert, but it seems some symbols (like dt3) are, again, radio terminology. Someone had to physically enter our home (illegal access) to do this.
Looks like B2 (B something).
Not sure here. NP or Nf, maybe. Someone with proper technical training might know. Not like our other phones. Did some comparisons with new objects. Comparison models did not have symbolic handwritten labels in blue, black, purple, yellow, silver, and/or green ink. So…just sticking w/ what’s concrete, one can draw some logical conclusions.
Looks like “4” at the bottom.


My sons’ Nintendo Switch remote that was partially opened. Handwritten labels. This one–“8f.”
Opposite piece “17.”
After finding missing Garmin back w/ new software installed, I downloaded Fitbit app and logged into my account to check. Was curious. Device had been missing since at least last October. Sure enough, shows as connecting to device app in March. Wasn’t in my possession. Only those connected with me on that app would have known about my Fitbit habits. Again, seems it would have required “insider” knowledge. Just saying.
Laptops/devices showing on our Comcast account with modified or “unknown” operating systems. This one likely evidencing someone hijacking my child’s device. Shows as “online only” OS (hostname after “laptop” would change with each login–was told by a professional that shouldn’t happen).
Found when dusting. Were hidden with a flashdrive and mini SD chips behind DVDs in our entertainment center (one disk was opened–looked hastily stuffed behind rows of DVDs). We do not have this printer nor do we have anything requiring a Cisco CD. The Microsoft disk’s product ID did not match actual product. Matched what appeared as a fake eBay page/site with a vendor from outside of the US selling bootleg/pirated software. Software on disk was not actually “Office.” The disk had XHTML files with coding related to IoT (radio signals, infrared, LEDs, etc.). One file seemed to be instructions for creating an indoor positioning system to track a person 24/7. Also, the vendor seemed to specialize in items with holographic labels (e.g., hairspray bottle had similar label as this disk). Could be the label was serving as a “tag” of some sort. [See below. Weeks later, found a battery pack w/ a similar holographic label inside my undergarment drawer in our bedroom. Was planted beside my copy of the letter posted above (several pages from other copies had already mysteriously “disappeared”). Someone most certainly wanted me to find the device in my drawer. Was when one local officer conceded this was stalking level harassment serving no legitimate investigatory purpose. He said, “I have anxiety for you.”]
Bootstrap–what appeared when I ran the fake MS disk (previous image).
Access to online resources were blocked for both me and my children. My school has been working with me, but this issue continues whether on or off campus. One site had me with a las firm account and had no record of me being a student with my school. Severely impacted my children’s ability to access online work. Significantly impacts (still in present tense) my ability to do my work. Remote persons control what we access and to what degree we can access it.
Another–says the site couldn’t be found on the “Apache (Amazon)” server. Never had such issues accessing the site before fall of 2018. Was an Apple device used here, so “Amazon” server message was curious (not revealing much–most devices we owned are no longer operable). Also, different device from the one in photo above. Seems pretty proximate and deliberate denial of service issue.
Was blocked from posting and commenting on my own FB page. Was blocked from editing on my own page. Would have to enter my password two and three times to login. Would have my password and security settings changed (still cannot access several personal accounts that were hacked). Was subscribed to sites (included something along the lines of “Little Mistress”) by malicious persons using my personal info (though the person would occassionally use the name “Anna Roberts”). Had someone use VOIP to call a 999-9999 suicide hotline from our home while we were out of town. And had someone create a Pinterest board in my name (easily stood out from boards actually authored by me). Worse? The malicious persons did the same to my children. They went so far as to install pornophraphic video game graphics on two of my children’s devices (cannot lawfully post those images here). While teens might be curious and click on things, these remotely installed packages were directed at minor children without their knowledge or consent. There is no way the real God dwells in any individuals who were complicit with, encouraging, condoning, helping, or celebrating this. Not possible.
Spring 2019, upon advice, I bought a $1300 MacBook Pro. Was told by “Apple Support” that the device hardware would have to be accessed for it to be hacked. When the support tech saw “Telnet” on the device he told me to call law enforcement. Thought that sounded crazy back then. Thought it highly improbable persons would be so crazy malicious that they’d enter our home. Now? All aboard the crazy train (crazy is as crazy does, and we did not do this). Lock icon appeared suddenly after I discovered 20-something hidden partitions (some w/ “reserved” empty space). Cannot access device content. Would turn off the device (I thought), only to hear it power up while closed (it would get very hot). Opened it. Cannot move much w/ Apple b/c their devices damage easily. However, could clearly see screws stripped around power button. Cannot confirm, but it seems more of the same.
Phone shows as Linux virtual operating system. Don’t really know much about Linux (aside from it having many “flavors”), but dunno. Seems a little in line w/ the pattern.
Our son’s computer being accessed remotely. Desktop shows as “online only” and unavailable to us. Material installed by remote users that he had no permissions to access or modify.
Our daughter’s tablet. Internal hardware modified.
Our daughter’s Kindle–remote users installed face-detecting and face tracking software. Had interfaces for cameras with remote access installed. Incorrect “install” dates.
Software installed by a third party on our son’s computer. Tons of “jack devices” in the registry. Shared folders, though he had “sharing” explicitly disabled. Computer admin on our end had read only permissions.
Young teen son’s old phone. Remote user had connected a Samsung wearable to his phone. None in our family own Samsung wearables. Bluetooth was enabled.


After changing locks following one home intrusion, our back door locks were tampered with so that the door could open even when locked. Likely when some items and evidence went missing. Likely when other items were tampered with.
Just a temp phone (number not active). But software was modified and headsets could connect to it. Our family was not using wireless headsets.
Bluetooth chip added in our son’s computer, attached to the power button/wiring to keep us from turning on the device and allow remote (but proximate) people to connect.


Smart TV reprogrammed. Unknown persons (proximate our home but not in it) seem to have connected, created unknown Yahoo accounts with our identities, and modified things (who knows what else).
Changed computer privileges. Here, allows remote users to connect. Can see we cannot change settings. We could not change permissions either.
Modified our home power systems, it seems. Likely somehow connected to our street power unit proximate our home. First time in over a decade of owning treadmills where removing key did not turn off treadmill. Stayed on w/o key for over 24 hours. Had to reset power box to get it off.
Car electrical systems affected. We had not been using these electronic options. Should not have had “three admin keys” either.
Lots of Bluetooth, BT Low Energy, SKU, RFID references, chips, and items in and around our home and in device software.
Third mystery cartridge in our home (referenced below, too). Many such devices began showing up in hidden places. Months ago, found same make “Cyan Blue” cartridge at same time as other indicators of home intrusion. Found another make/model “Cyan Blue” cartridge in our bedside table. Neither were makes/models of  printers we owned or used. Reported to police. Removed all electronics from area where I found it. Labeled them and stored in another location (see blue tape on another cartridge below). Faraday bag with an inactive phone (containing photo and video evidence) was stolen from our bedroom around same time. Cartridge had RFID tag on it. Foundany chips and RFID tags like Easter eggs around our home. Days ago, we found a new Yellow cartridge in the same location where we previously found the blue one. Calling card maybe? Or perhaps just taunting us? Either way, cruel and criminal. Near it? The Faraday bag containing inactive device with evidence. Device PIN changed so that we cannot access it. My former police officer husband dusted the item for prints and seems to have partial fingerprint and two handprints. Not ours.


Most activity targeted me and the children. One exception here. My husband had never used internet on his old flip phone. Remote party installed apps and had used the browser to create a fake history. Was an attack on his reputation. Had similar attacks and identity theft targeting me and my other sons. Thankfully, users chose poor dates/times. We had alibis for many entries proving impossibility for us to be the “users.” Plus sites are inconsistent with his interests, as anyone who actually knew him well would have known.
Notification for custom Operating System on 14 y.o.’s old phone. My mother filed police report b/c same happened to her (her OS was wiped). Below, Garmin wearable. Couldn’t find this where I had left it. When found and charged, saw new software installed on it. Showed “nanoapp.” Phone system logs showed other “nanoapp” sending messages and being “parsed” by remote users. Curiously, one of the first things to go missing from our home was my Fitbit Charge (had it for years). Also can see BT antenna option on this device. Also curious, but consistent with other findings.


The Cyan Blue cartridge found and reported to police months ago (preceded the more recently found yellow cartridge above). RFID tag on package. Also found Apple iTunes gift card pack w/ RFID tag on top of my son’s wardrobe in his bedroom (a son who did not use Apple products, especially not iTunes). Same HP printer make/model as the cartridge found in the same location days ago (after previously clearing/cataloguing items in this space). We do not own this make/model printer. Believe these have to be custom ordered they’re so old.
Another HP cartridge but in top drawer of my bedside table. While we used to own an HP like this, it hadn’t been operable in years. Certainly, we never stored printer cartridges in our nightstands. Likely someone wanted me to find this. Again, whether thing had any ability to communicate (I tested RFID tags and at least some seemed to be communicating), this is cruel and criminal. Intended to cause psychological harm.


From my sons’ Nintendo remotes. Found this patently out with parts removed. Tried to remove same part on opposite side’s piece, but it was difficult. Required special tools we didn’t have (unless one wanted to break it). Inside, circuit board markings around “Broadcom” chip. Also had rechargeable Lion battery allowing it to work w/o being plugged in.
Another of our son’s remotes I found cracked/partially opened. Had BT chip, markings, and long-lasting battery inside.


A family member told my aunt she could gift us a “Brother” network printer the family business wasn’t in need of anymore around February 2019. Had wireless networking capabilities. Perhaps coincidental timing? But someone seemed aware of its presence. Suddenly started seeing Brother “shared printer” folders and Brother software files on all our computers. We had only connected a couple of computers, but this was when we lost access to most permissions. Also proximate having messages and phone calls from “Apple iOS Support” (fake) about ransomware. Opened device after learning hardwire might be modified. Wasn’t surprised. BT cards installed. Markings on circuit boards. Similar to other devices.
Found over a half dozen of these mini sd chips around our home and even in our vehicles. Again, like Easter eggs.
Blackbox found in our home. Set up like a radio communications center/transmitter box. Had no idea what RFID, BT, BLE, or IoT was at this point. Just knew it was set to “always on” and that I found it behind a shelf connected to that Brother printer when vacuuming. “Spectrum control noise filter” inside with “J-1” handwritten in blue marker on it. When I unplugged it (midday of a workday), chaos ensued on our court. A small group of cars/trucks showed up in the mini culdesac a few houses down and a pow-wow convened. A police SUV circled, too. This accidental finding prompted me to search more of the house (leading to a above discoveries).



14 y.o.’s new (now also old) phone “preinstalled” software. Includes a lot of funky permissions. Like this–“beam access.” System logs showed his phone communicating with “in-road sensors,” LEDs, and infrared rays.
Preinstalled package installer. Here with “wearables.” This son does not own “wearable” technology. Exposed a minor’s private, personal info (including his fingerprint). Pretty serious.
Exported email conversations. Red color means unverified. But shows as preinstalled software from the device.
Newer–purposely had all wireless connections disabled–Epson printer circuit board. Came home one day and saw all settings changed. Could see someone had remotely connected to the device. Took apart. Found wireless card attached to circuit board. Handwritten symbols/markings again. Phone suddenly had printer file called “HW Compatible.” Tons of printers listed. Mostly HP makes/models. Also included Epson. WiFi card said approved for use in Nigeria. See below how this connects to software on devices. Many devices.
Power box in printer. Cannot confirm but looked curious, as if someone had physically accessed it (came out much too easily). Not sure why/how power boxes and adapters might be relevant for remote unauthorized users, but the involvement of power devices / settings is a common observation. Bottom of box says “surveillance safety type approved.” Not sure if relevant, but the loosened box was curious.


Another WiFi card found in an old printer in storage (found the printer plugged in to power in our garage). Hadn’t used this printer in years.
File on my son’s phone. Shows HP printer list. Titled hardware compatibility. Neither my son nor I have ever knowingly connected to and printed from this phone. We have never physically connected this phone to a printer.
Phone has preinstalled app called “WebView” on it (says installed 1/2009 which is an impossibility). We have no access to the app. However, can see cerficates on the device from the app, including “pretty printers.”
We could not access the Google Play Store. The phone would not allow us. Changes to apps, then, had to be from remote users.
Group permissions (group unknown to us) to read and CHANGE our call logs. Could write new call history. Could, apparently, use internet (not actual carrier) to make calls from our devices. Telephony service. Read that again. Yeah. Not legit.
Can use Bluetooth to send messages to and from our device even when we explicitly disable Bluetooth service.
App called “Android permissions lab.” Also has somehow been using wallpaper as “interactive” service. BELOW – can see preinstalled app could WRITE browser history (see flip phone image above again), WRITE user profile, WRITE “social stream,” WRITE user dictionary, and (seemingly) allow some “group” to USE BIOMETRIC and SENSORS. Could be someone is cruelly harassing to inflict emotional harm. Or could be real (also would mean purposed to inflict emotional harm). Either way, real, criminal, and cruel.


“Print” spooler device” (we cannot disable) and “voice interaction” (we cannot disable).
Again, logical inference: EITHER, someone installed all this “fake” data on our devices (would require unauthorized access) OR the files provide accurate info (also means unauthorized access). EITHER WAY–unauthorized device access.
Some of the “preinstalled” system apps showing as installed 1/2009 (again, impossible).


Emergency info, fused locations, and NFC service, like Bluetooth, can operate in background w/o our permission even if explicitly disabled. Notable, BT and NFC require unauthorized person to be in close proximity to us physically. Many logical inferences from this.


Recovering my (then) 13 y.o.’s email account from what shows on our end as user from Raleigh, NC. Wouldn’t it seem such deliberate falsehood would have to be planted by someone with some insider knowledge?
Major security issue? Unauthorized user has taken over emergency services on our phones. This is direct interference with our ability to call emergency services like 9-11 (prompted my husband to call city police a few weeks ago to find me). This elaborate, manufactured Hell is NOT about our love of “things” or desire for “money.” This is not about us having distorted “values.” Not about our “insanity” (though designed to make us appear “insane”). Not about our “worldliness” (frankly, how hypocritical for any using or hiring others to use more expensive luxury vehicle electronics, expensive headsets, drones, iPhones, or MacBooks to pretend it is). Those involved maliciously, knowingly, and intentionally put our very lives in harm’s way for their own Machiavellian ends.
My vehicle at a pretty secluded community park near my child’s school. Bluetooth Beacon detecting app. My vehicle – 50+ “devices,” tags, or sensors (a bit ridiculous considering we didn’t have much working technology at this time). Headphone symbol? Connected to my vehicle. Same MAC address as tag on my car. Showed up when a black truck pulled belong wooded area on the side of the road (only entrance/exit between where I was parked and main road–so he was quite literally between me and my exit route). No apparent official or leisure business. Just sat there connected to my car. Eventually left when I started taking photos. A few other cars showed up near boat landing. Symbols showed connections surrounding me. Either app is malicious (designed to incite fear and inflict psychological harm) OR these guys were really accessing something in/on my vehicle (also, likely to incite fear and inflict psychological harm). Not sure how this app could be fake given the time/date stamped photos correlating to readings with the app? Persons wanted me to know they were nearby. This was patent and obvious.
Truck matching headphone symbol above.
My husband and I drove around and mapped Bluetooth beacons in our area for comparison with area proximate our home. App showed between 5Xs and 10Xs as much activity at our home than any other place in two counties around us. Not even the Verizon store or shopping malls showed comparable activity. Some reads showed 999+ “devices” in our home (little weird for a family not that into the latest technology). Areas lit up proximate our home included the street behind our home and some spots along our street. Seemed to track power grid. Street electrical service box was a brightly lit hub of activity. Also, devices showed up connecting to the same MAC addresses as on mystery “tags” somewhere in/around our home (possibly like the tags on some items seen here). No t an electrical engineer, but when our house has more tech signals than either the nearby US military base or even Game Stop, it seems a little suspect.
Cars were parked at the purple icons. Behind our home. MAC addresses show “beacons” connecting to our home.
Bedroom TV – software modified. Never had these options for reordering controllers and “Bluetooth devices” before this campaign.
See above photos. Like I said, suddenly, Epson and HP software files started showing up on many household devices. Including our bedroom TV (seriously, who “prints” from their bedroom TV?).
Another TV. Shows us signed up with a Yahoo TV profile. Never had this show up previously (it’s not a Yahoo TV and we haven’t subscribed to any Yahoo TV service). Forces us to comply with its privacy terms and terms of service. Open source code includes freeware. We did not install this or download it. Magically appeared. Site listed shows as static site when we go to it. Cannot “log in” to see, change, delete, or inspect any account. Someone is seemingly using our identity w/o our permission. We do know someone used my email and personal info (sometimes with alias user name) to register for various accounts and subscriptions (caused inbox to be spammed). Should note it is possible law enforcement could be conducting its own legal campaign (we would consent to law enforcement doing whatever is necessary to apprehend these persons).


Common on many of our devices. Dates and times modified to either 1969 (especially Microsoft products), 1970 (here), or some other year before or after current date. Was told such date modifications prevent built in securities from operating correctly. One device showed the “Kronos” or “Chronos” installed package (not a tech expert, but I do know “chron” and “kron” mean “time”) as being most severely critical for whatever custom-installed system was on our device to function.
TV was active even when our internet was disabled. Actively communicating “interactively” and with some sensor options / features, according to this.


Persons followed us into cell provider store and electronics store to get make / model of new devices (and likely new phone number that is undisclosed). We knew as their presence was overwhelming and obvious. They arrived proximate us and left proximate us. Within hours, system time on this device was changed. See comments above about time. This is a pattern.
A “classroom” app was installed by someone. Here, some “studentd” app or service requests keychain login password.
FTC site on identity theft redirects to this “identitytheft.gov” form page. Requires entry of multiple account numbers, though the actual FTC site warns to use “caution” with any site asking for sensitive info such as SS#s or account #s? Could be legit, but it certainly seems curious. See next image regarding privacy.
Request for account numbers.
“Identitytheft.gov” (page that shows from our browser) and its privacy policy. See the curious “linking policy” disclaiming guaranteed privacy or security for any page linked by this arrow symbol. Above it? Link claiming to be FTC’s privacy policy with the same “unsecure” arrow symbol. Doesn’t make much sense, does it?
Pattern – specific, tailored “advertisements” communicating threats of harm, encouraging self harm, or taunting. Here, an “advertisement” personalized for the “user” about a child not coming home from school. Also can see severely restricted search results (17 here–4 pdf downloads, 4 docs, and 2 malware sites). Forces us into unsecured selections to obtain ANY information. Changing search settings is of no effect. Boolean strings are of no effect. This has occurred across both Android and iPhone devices.


This is a small sample of this manufactured 24/7 Hell. Special kind of evil. 

Delusional me for thinking such patent and criminal boundary crossing (bullying on steroids) targeting not only me, but also my children, unacceptable.

These are not “blessings” from God.

They are crimes committed by men and women. This evidences abnormal, illegal boundary violations.

Pretty outrageous to most of us that any would feel entitled to do this kind of stuff to others. Not so unbelievable from people who justify and normalize sexual abuse. Sexual abuse usually begins with disregard for nonsexual boundaries. An exmple of such nonsexual boundary crossing? A man who sexually violated a female more than once later gives his son that victim’s first name.

☝️TRUTH is not for sale. It cannot be buried. I will not pretend my name is not “Shannon” to make you comfortable in your evil. That is not my responsibility.

People of the real God do not fear truth.

It was you, not I, who was hard-hearted and bitter. It was you, not I, who was double-dealing falsely. It was you, not I, who collaborated to criminally cross boundaries again.

Engineer more evil. Misrepresent yourselves. Steal identities. Prey on those who loved and trusted you. Distort reality.

It was your will to assist. Lend yourselves and your money as instruments of sin. One day you’ll see, I could’ve played dirty but I didn’t. I endured your manufactured Hell with a hellfire designed to consume.

It was God’s will for me to survive.

You did not heed my warnings. And these crimes? They aren’t misdemeanors. (Though, to be clear, ABHAN is a serious common law crime functioning as a felony, unlike more modern misdemeanors).

You did not merely try to discredit a witness.

This is the business of someone who, when he or she does not have favorable facts, elaborately works to create an appearance of more favorable facts. Appearance isn’t reality. Professionals can snuff out and sort fiction from fact.

This is the work of someone who isn’t seeking truth, but someone who is actively hurting and harming others to silence truth.

This isn’t the work of God. (But many of you were already celebrating like it was. 🙄👌)

You did not stop with hurting me.

You were so cold, so cruel, so callous, so sinful (oh, yes, sinful), so criminal, so evil that you went after my children, my husband, and my parents, too.

My 14 y.o. said you did me dirty? You did HIM dirty (he doesn’t even know just how dirty, thank goodness). You did my (then) 17 y.o. dirty. You did my young daughter dirty.

They did NOTHING to you. But you did them dirty. And many of you took pleasure in doing it. Encouraged it. Rejoiced in it. Celebrated it.

(Forgive me for not liking you much.)

You sought to inflict (and did, in fact, inflict) emotional and psychological pain on more innocents. Innocents who loved and trusted you. Who called you “uncle” and “aunt” (whether blood family or not). Who called you friend. Who held you out as people who, at the end of the day, disagreements aside, would tell the truth, would protect, would help (not hurt), would love.

Those responsible include all with actual knowledge or constructive knowledge (those who reasonably should have known given circumstances—if you followed my posts, then this includes you). That list may be long:

direct participants,

indirect participants,

those acting as “monitors” for direct participants,

those acting as “facilitators” for direct participants,

those financially backing direct participants,

those cheering on direct participants, and

those knowingly and willfully benefitting from direct participants.

Now, God’s will, not yours, be done.

Isaiah 40:

“Comfort ye, comfort ye my people, saith your God.

Speak ye comfortably to Jerusalem, and cry unto her, that her warfare is accomplished, that her iniquity is pardoned: for she hath received of the Lord‘s hand double for all her sins.

The voice of him that crieth in the wilderness, Prepare ye the way of the Lord, make straight in the desert a highway for our God.

Every valley shall be exalted, and every mountain and hill shall be made low: and the crooked shall be made straight, and the rough places plain:

And the glory of the Lord shall be revealed, and all flesh shall see it together: for the mouth of the Lord hath spoken it.

The voice said, Cry. And he said, What shall I cry? All flesh is grass, and all the goodliness thereof is as the flower of the field:

The grass withereth, the flower fadeth: because the spirit of the Lord bloweth upon it: surely the people is grass.

The grass withereth, the flower fadeth: but the word of our God shall stand for ever.

O Zion, that bringest good tidings, get thee up into the high mountain; O Jerusalem, that bringest good tidings, lift up thy voice with strength; lift it up, be not afraid; say unto the cities of Judah, Behold your God!

10 Behold, the Lord God will come with strong hand, and his arm shall rule for him: behold, his reward is with him, and his work before him.

11 He shall feed his flock like a shepherd: he shall gather the lambs with his arm, and carry them in his bosom, and shall gently lead those that are with young.

12 Who hath measured the waters in the hollow of his hand, and meted out heaven with the span, and comprehended the dust of the earth in a measure, and weighed the mountains in scales, and the hills in a balance?

13 Who hath directed the Spirit of the Lord, or being his counsellor hath taught him?

14 With whom took he counsel, and who instructed him, and taught him in the path of judgment, and taught him knowledge, and shewed to him the way of understanding?

15 Behold, the nations are as a drop of a bucket, and are counted as the small dust of the balance: behold, he taketh up the isles as a very little thing.

16 And Lebanon is not sufficient to burn, nor the beasts thereof sufficient for a burnt offering.

17 All nations before him are as nothing; and they are counted to him less than nothing, and vanity.

18 To whom then will ye liken God? or what likeness will ye compare unto him?

19 The workman melteth a graven image, and the goldsmith spreadeth it over with gold, and casteth silver chains.

20 He that is so impoverished that he hath no oblation chooseth a tree that will not rot; he seeketh unto him a cunning workman to prepare a graven image, that shall not be moved.

21 Have ye not known? have ye not heard? hath it not been told you from the beginning? have ye not understood from the foundations of the earth?

22 It is he that sitteth upon the circle of the earth, and the inhabitants thereof are as grasshoppers; that stretcheth out the heavens as a curtain, and spreadeth them out as a tent to dwell in:

23 That bringeth the princes to nothing; he maketh the judges of the earth as vanity.

24 Yea, they shall not be planted; yea, they shall not be sown: yea, their stock shall not take root in the earth: and he shall also blow upon them, and they shall wither, and the whirlwind shall take them away as stubble.

25 To whom then will ye liken me, or shall I be equal? saith the Holy One.

26 Lift up your eyes on high, and behold who hath created these things, that bringeth out their host by number: he calleth them all by names by the greatness of his might, for that he is strong in power; not one faileth.

27 Why sayest thou, O Jacob, and speakest, O Israel, My way is hid from the Lord, and my judgment is passed over from my God?

28 Hast thou not known? hast thou not heard, that the everlasting God, the Lord, the Creator of the ends of the earth, fainteth not, neither is weary? there is no searching of his understanding.

29 He giveth power to the faint; and to them that have no might he increaseth strength.

30 Even the youths shall faint and be weary, and the young men shall utterly fall:

31 But they that wait upon the Lord shall renew their strength; they shall mount up with wings as eagles; they shall run, and not be weary; and they shall walk, and not faint.”