SlideShare a Scribd company logo
1 of 8
Download to read offline
Summary of complaint



Summary:

The basis of this complaint form is primarily in relation to a few key items:

    1.   Surveillance camera in my apartment
    2.   Camera in my monitor at my prior workplace
    3.   GPS based device in my vehicle, with audio
    4.   Some kind of Carrier Frequency Voice (CFV)
    5.   Auto-dialer/"war-dialer"
    6.   Laptop monitored
    7.   Phone monitored

On the basis that it is Police equipment being used to do these things, then consider this document a
request for these activities to cease immediately. This complaint is directed at anyone and everyone
responsible for these resources being made available to be used with any malicious intent against me.

My assumption is that Alix Mendoza (the Police Chief's daughter) is involved with this, but I also
believe that someone else had access to these resources. It also appears to me that the Police Dept. is
assisting her in pursuing me. This is a request for any and all activities related to that to cease
immediately also, for myself and for anyone else in the future. My sentiment is that there have been
ample indications in the duration of these events to prove my disinterest in her. In summary, any
activities utilizing Police resources serving the purpose of dating in any form should be disallowed.

I doubt that Miss. Mendoza had any intention of ever showing up at any given point in time. My
position in this matter is that Miss. Mendoza was conscious of the fact that I was on the verge of
meeting a significant other and possibly establishing a more permanent relationship. I was not aware
that it was the Police Dept. was making these resources available to her throughout the majority of the
period of time spanning these events.

Someone was broadcasting information about my activities and/or reactions to various events, and I
would get non-verbal, non-physical reactions from the people that it was being broadcast to. It also
involves my ability to do a passive profile of people, do a sort of set theory in my head, and use
deductive reasoning to figure out what was going on. That is how I figured out quite a bit of what was
going on, although it was not always clear. Noone had any direct discussions with me.

If any of the activities with the aforementioned resources continue, regardless of whom is doing it, I'll
consider it to be a direct and malicious intent to violate my privacy.

Explanation of items:

1. Surveillance camera in my apartment.
       -HA
Someone was sneaking into my apartment at night while I was sleeping, and took the tail light off of

 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint

my bike that was just inside the door. How would they know if I was sleeping or not without the
surveillance camera in my apartment? I kept the blinds closed in my apartment at all times, and the
door locked when I was not there.

2. Camera in monitor at prior workplace. There was a camera in my monitor where I used to work,
which someone was swiping passwords & account numbers. Some of which I figured out by deductive
reasoning, and others I could hear little bits and pieces of through the CFV. My regular mail was
redirected for a short period of time (a couple of weeks), which someone would have to have my credit
card number in order to do that.

3. GPS based device in my vehicle, with audio. There were periods of time which I did not have a
phone, nor any other personal electronic device due to conditions outlined in this form. I realized that
such a device was in my vehicle from events such as when I was driving to Las Vegas. I figured it out
by recognizing the common reaction of the people within the place that I was in. In a random place
with random people, it would be difficult for someone to know exactly where I was at any given time,

Surely there is some kind of report on file indicating the installation of said device in my vehicle.

4. Some kind of Carrier Frequency Voice (CFV). I don't know exactly what it is called or how it
works, but I assume that some kind of carrier frequency signal is used to carry the audio signal. The
audio is very faint, and is not very easily distinguished. I could hear multiple different voices through
it, but it is difficult to know which voice belongs to whom, especially since I am not familiar with
whomever was talking through it. It is also my belief that the audio stream was filtered, filtering out
things such as names and inverting some of the genders. I have heard of such technology before, and
that it is used by law enforcement agencies. It is designed to make an individual think that he/she is
hearing things.

5. Auto-dialer/"war-dialer".
        -numbers based on location, not the location based on the number
        -based on vicinity
        -large numbers of people getting messages (I don't know if it was text or voice)
        -trip to Las Vegas
        -implied threat to make me homeless
There were days when people passing me in the hallway on the SJSU campus before my Discrete Math
class.
There was an incident during the summer of 2009 while I was in a Calculus II class. I had my laptop
with me, since there is wireless internet access on the campus. I don't recall if it was the login to my
laptop, or a specific page that I had logged in to, but suddenly everyone's cell phone in the classroom
was ringing within a matter of a minute or two. It would be somewhat of a daunting task to get
everyone's cell phone number like that without a location based auto-dialer.

6. Laptop monitored.
GKrellM utilizes something for its' information referred to as the "procfs", which is short for the
Process File System. The procfs is loaded into volatile memory (Random Access Memory), and located


 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint

within the Linux Kernel. It is highly unlikely that anyone could bypass that mechanism in order to fool
GkrellM. One of the pieces of information that it displays is the number of users that are logged on to
the system. I had recently installed Fedora Linux on my laptop, and the first couple of days that I used
the internet at the library, the number of users stayed at shown as “1”, as it should be. On about the
third day, I downloaded some software called Eclipse, which is an Integrated Development
Environment for writing software. As soon as I did that, someone logged on to my laptop from some
remote location. The only way that can be done is if someone has the password, so I disconnected the
ethernet cable (to be on the safe side), and changed the password. I reconnected the ethernet cable, and
I saw the number of users flash from “1” to “2” a few times. So, in other words, someone was using the
surveillance camera in my apartment to get my password, was likely using some kind of a packet
sniffer somehow (likely local, but not sure if it could have been remote), and was interested in my code
(very likely to be Patent idea related). I started putting a blanket over my head when I logged in to my
laptop in my apartment after that.

I was using both the wireless as well as the wired internet access on the SJSU campus and the public
library on different occasions, but will be switching to internet access at home soon.

Someone would likely have to have software capable of capturing the packets from the local network
an reassembling them to a complete page.

-recent developments for as to how and why it would have to be special software
The software that I think was being used

7. Phone monitored. First of all, the only people or organization that is legally allowed to monitor my
phone are either my employer, possibly someone that I am in a relationship with (I think there has to be
some form of legal purpose to it), or a law enforcement agency when it is associated with an
investigation. I was only employed for the first two years of this series of events, and never met either
of the two other conditions, so therefore my phone should not have been being monitored by anyone.
        -pictures being taken of me, and sent out to the general public **examples**
        -harassing me

      -destroyed 2-3 phones due to it – kept trying to figure out exactly what was going on, and
random things that I said would be taken out of context (specific examples)
There are other ways to monitor someone's phone, but they are either paid services or you would have
to have direct access to the target phone in order to be able to install software that would enable you or
someone to monitor it. It is my observation that the method being used to monitor my phone, as well as
others phones does not require direct access to the phone in order to do so. The only organization or
agency that could possibly have this sort of technology is the Police Department. If anyone outside of
the responsibility of the Police Department or other law enforcement agency were to get ahold of such
technology, there can be very serious consequences, as has been demonstrated throughout the time-
span of these events.


Clarification

 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint


I do not own anything with Alix, live with Alix, have any relationship with Alix (now or in the past),
and am definitely not pursuing her. If I am not mistaken, that renders her unable to claim any legal right
to me.

Just to clarify, there was never any briefing, discussion, or agreement for anything. Nothing at all.

I have a Patent idea for software, which I have not mentioned or discussed with anyone outside of e-
mail or private discussion with whom is likely to be my co-founder. It can easily be classified as
Intellectual Property. I consider any interest in acquiring specific information in relation to my Patent
idea that would enable an individual to apply for a Patent for said idea an attempted theft.

I am not completely aware of any criminal investigation, directly or indirectly related to me. I have not
received anything indicative of charges being held against me, therefore my being monitored is without
merit.

I have not given anyone permission to access my apartment without my presence.

If I am not mistaken, the things that Miss. Mendoza has been doing can be classified as stalking.

I think some of the reason for these things being done was to create a distraction where I used to work,
thereby hindering my productivity, with the goal of getting me fired. Similar methods were being used
to keep me distracted, pre-occupied, and stressed out while I was going to college, with the intent of
hindering my performance in my classes. I do believe that it was Miss. Mendoza that indicated to me
via one of my classmates that I was going to fail one or more of my classes, with which she (or
someone else with the equipment to do so) used things such as an auto-dialer to accomplish.

I am very curious for as to how it is that Police resources could be used in this manner without
members of the San Jose Police Department being aware of it. To me, it shows a lack of competence
and oversight.

CFV examples:

In the 3-4 year duration off these events, I heard quite a few different things through the CFV. Some of
which I could not hear clearly, some did not make sense to me, and some I believe was filtered.

Some of the things which I assume was Alix Mendoza say:

"You won't meet any hot girls like me."

“I know what I want, and I know how to get it”

“Why should I have to go talk to him?” - the “him” is referring to me


 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint

"I should never have told him about that" – I don't know exactly who the “him” was

“I knew you were going to be there” - I think it was in reference to my having gone to the Great Mall
just before Christmas in 2006.

"[My cousin] doesn't think he can do it" – this was in reference to my ability to accomplish my Idea.

"[My cousin] says that he should have to work for it" - I don't know what it is that I was supposed to
be working for.

"[My cousin] says that he thinks he is rich"

"And he'll be so happy to see me!"

“I challenged my cousin into stopping him”

"[My cousin] won't tell me" – supposedly in reference to being told where I was

"Oh ... I didn't expect him to do that" - in reference to my having lost 20-30 pounds in a relatively
short period of time

"Do what I want! Do what I want!" - No. She nor anyone else told me what she wanted me to do
anyway.

"I'll get you fired." -

"He doesn't talk about it!" - in relation to my Patent idea

"[My cousin] is very high up in the Filipino community"

"[My cousin] says ... ?? ... or when he runs out of money"

"[My cousin] has done this before, but it usually only takes a couple of months"

"... usually end up with one of my cousins"

"[My cousin] says that she used to have a guy like him”


Some things that I heard people say (I don't know who they were):

"They just realized that he knew what he was doing the whole time" -

“The last guy was good, but this guy is really good” - who was the last guy? What happened to him?


 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint


"We want that one" – that was in relation to my idea, but I do not know who said it.

"Guys like you make guys like me very rich" – I am the creative type, and someone wanted my idea(s).
I don't know who it was or why he had access to me.

"[My cousin] thinks he is a vigilante"

“Honey ... he's not impressed, he's pissed off”

"I saw him on the news recently"

"This goes very high up ..." - I don't know who said it or exactly what it means

“He is a part of a major investigation”

“You have a problem, a very serious problem” - that was a female voice, but I don't know who it was

"Give us what we want, and we'll give you what you want" – that was someone apparently wanting to
make a trade of Alix Mendoza for my Patent idea. I doubt they have anything that could make up for
the deficiency in the trade.

“He's allowed to get a job now” - I don't know who said that one, but I would really like to know who it
was. How is it that Police resources are permitted to be used to threaten my livelihood? This is the
reason for which I am interested in seeking damages. All I know is that it was a male voice.

Police Officer interactions:

I had a discussion with an operator at my phone service provider in regards to my phone being
monitored in the latter half of the year of 2009. My reasoning in asking the phone service provider was
in interest for tracing the monitoring to the source. She advised me to contact the local authorities to
handle the problem. I therefore left a message within a week or so after that on the answering machine
of the High-Tech Crimes Unit Dept., leaving my name, address, e-mail address, explained that my
phone was being monitored, and to ask what could be done about it. I also explained that I did not have
a phone at that time. I did not have any correspondence afterward.

It was either late at night, or in the wee hours of the morning on Blossom Hill, on my way back to my
apartment from the ATM at the Bank of America adjacent to the Oakridge Mall in the latter part of
2009. A Police Officer stopped me to check me, indicating that they were looking for someone in the
area. It was a routine stop with no problems or altercations, complete with emptying my pockets onto
the hood of the patrol car. I was not participating in any suspicious activity, other than being out late at
night. Everything that was in my pockets was on the hood of the car, and I usually keep pieces of paper
in my back pocket for keeping notes and such. By that time, another Officer had arrived. The initial
officer flipped through the small stack of paper, which was on the hood of the patrol car, and noticed

 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint

that I had the phone number and website address for the SJPD on one of them. He asked me if I was
either making or going to make a report. So, I told him, "Someone somehow planted a surveillance
camera in my apartment, and I wanted someone to come and find it and remove it".

He said, "Oh ... well ... we can't help you with that one."

He also said, “He's right, that is, that is a very serious problem”.

And, "Most people I would think were crazy, but he is serious".

He looked at the other Officer and told him as I had started walking away, "Boss' daughter wants him,
and he is fighting her the whole way" . That statement is how I found out that Alix Mendoza is the
Police Chief's daughter, and is also indicative of my trying to get rid of her.

There have been other events in which Police Officers have been involved, but not with my direct
interaction (there should be ample reports as proof). Through a portion of the duration of these events, I
have only been under the assumption that there was an investigation occurring.

Correlated events:

I have ample information about events that correlate with the aforementioned activities, although I am
not certain of Police involvement, I do believe that the events correlate to the utilization of Police
resources. It all serves the same purposes. A few of the key points are:

-Someone was tampering with my truck, draining most if not all of the oil out. That was approximately
sometime during the last week of June, just before I left to go to Las Vegas for a few days. Someone
does not want me to go to Las Vegas, due to whom I was supposed to be meeting there. Some people
within the apartment complex nearby witnessed it happening, but seem afraid to say anything.

-Someone was accessing my truck, such as removing the registration and placing it back within my
apartment under my futon, after I had already paid my fees for getting my truck back to legal. The only
way I know of that it can be done is by Police equipment.

-There were 3-4 guys to meet me at the light-rail station one day (Summer 2009), which there was a
detective there to intercept them.

-using my phone to (reporting people and blaming me for it)

-Someone planting viruses on my memory stick, to prevent me from completing my homework

-The graphics accelerator in my laptop was ruined

-harassing various students on the SJSU campus


 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
Summary of complaint

-many, many, many more events similar in nature

Conclusion:

I would like to request that the aforementioned devices and equipment be removed, and other
monitoring be ceased promptly. I would also like to know who had access to all of the aforementioned
resources.




 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa

More Related Content

What's hot

2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)Felipe Prado
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)aw222
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationgmtango
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Winthrop Yu
 

What's hot (7)

2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 

Viewers also liked

bimbingan teknis reklamasi dan pascatambang_25 juni 2013
bimbingan teknis reklamasi dan pascatambang_25 juni 2013bimbingan teknis reklamasi dan pascatambang_25 juni 2013
bimbingan teknis reklamasi dan pascatambang_25 juni 2013Firdaus Matasin
 
Social media as the new powerhouse
Social media as the new powerhouseSocial media as the new powerhouse
Social media as the new powerhousems022f
 
Las 10 peliculas mas polemicas
Las 10 peliculas mas polemicasLas 10 peliculas mas polemicas
Las 10 peliculas mas polemicasTEAMRENTERIA
 
Novelas en el cine
Novelas en el cineNovelas en el cine
Novelas en el cineTEAMRENTERIA
 
Portfolio 2010 Lk In2
Portfolio 2010 Lk In2Portfolio 2010 Lk In2
Portfolio 2010 Lk In2jmachucaz
 
Portfolio 2010 Lk In2
Portfolio 2010 Lk In2Portfolio 2010 Lk In2
Portfolio 2010 Lk In2jmachucaz
 
dixon edtec 572_sum10_science_notebooks_module_1
dixon edtec 572_sum10_science_notebooks_module_1dixon edtec 572_sum10_science_notebooks_module_1
dixon edtec 572_sum10_science_notebooks_module_1San Diego State University
 
Perbub npa sbg dasar penetapan pajak air tanah torut
Perbub npa sbg dasar penetapan pajak air tanah torutPerbub npa sbg dasar penetapan pajak air tanah torut
Perbub npa sbg dasar penetapan pajak air tanah torutFirdaus Matasin
 
Presentase study inspeksi IT pada PT. LHI tahun 2013
Presentase study inspeksi IT pada PT. LHI tahun 2013Presentase study inspeksi IT pada PT. LHI tahun 2013
Presentase study inspeksi IT pada PT. LHI tahun 2013Firdaus Matasin
 
Premios oscar 2011
Premios oscar 2011Premios oscar 2011
Premios oscar 2011TEAMRENTERIA
 
Festival de cannes 2011
Festival de cannes 2011Festival de cannes 2011
Festival de cannes 2011TEAMRENTERIA
 
Etapas del guion literario
Etapas del guion literarioEtapas del guion literario
Etapas del guion literarioTEAMRENTERIA
 
Mandy Boyle: Copywriter Portfolio
Mandy Boyle: Copywriter PortfolioMandy Boyle: Copywriter Portfolio
Mandy Boyle: Copywriter PortfolioMandy Boyle
 

Viewers also liked (18)

Hablemos de cine
Hablemos de cineHablemos de cine
Hablemos de cine
 
bimbingan teknis reklamasi dan pascatambang_25 juni 2013
bimbingan teknis reklamasi dan pascatambang_25 juni 2013bimbingan teknis reklamasi dan pascatambang_25 juni 2013
bimbingan teknis reklamasi dan pascatambang_25 juni 2013
 
Social media as the new powerhouse
Social media as the new powerhouseSocial media as the new powerhouse
Social media as the new powerhouse
 
Las 10 peliculas mas polemicas
Las 10 peliculas mas polemicasLas 10 peliculas mas polemicas
Las 10 peliculas mas polemicas
 
Novelas en el cine
Novelas en el cineNovelas en el cine
Novelas en el cine
 
Socmed-Blogreview
Socmed-BlogreviewSocmed-Blogreview
Socmed-Blogreview
 
Dixon edtec 572_sum10_module2
Dixon edtec 572_sum10_module2Dixon edtec 572_sum10_module2
Dixon edtec 572_sum10_module2
 
Portfolio 2010 Lk In2
Portfolio 2010 Lk In2Portfolio 2010 Lk In2
Portfolio 2010 Lk In2
 
Portfolio 2010 Lk In2
Portfolio 2010 Lk In2Portfolio 2010 Lk In2
Portfolio 2010 Lk In2
 
dixon edtec 572_sum10_science_notebooks_module_1
dixon edtec 572_sum10_science_notebooks_module_1dixon edtec 572_sum10_science_notebooks_module_1
dixon edtec 572_sum10_science_notebooks_module_1
 
Perbub npa sbg dasar penetapan pajak air tanah torut
Perbub npa sbg dasar penetapan pajak air tanah torutPerbub npa sbg dasar penetapan pajak air tanah torut
Perbub npa sbg dasar penetapan pajak air tanah torut
 
Presentase study inspeksi IT pada PT. LHI tahun 2013
Presentase study inspeksi IT pada PT. LHI tahun 2013Presentase study inspeksi IT pada PT. LHI tahun 2013
Presentase study inspeksi IT pada PT. LHI tahun 2013
 
Teknik peledakan
Teknik  peledakanTeknik  peledakan
Teknik peledakan
 
Premios oscar 2011
Premios oscar 2011Premios oscar 2011
Premios oscar 2011
 
Festival de cannes 2011
Festival de cannes 2011Festival de cannes 2011
Festival de cannes 2011
 
Etapas del guion literario
Etapas del guion literarioEtapas del guion literario
Etapas del guion literario
 
Mandy Boyle: Copywriter Portfolio
Mandy Boyle: Copywriter PortfolioMandy Boyle: Copywriter Portfolio
Mandy Boyle: Copywriter Portfolio
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to Report to IPA

Sharing Motion Information with Close Family and Friends
Sharing Motion Information with Close Family and FriendsSharing Motion Information with Close Family and Friends
Sharing Motion Information with Close Family and Friendsbentley79
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityJonathan Stray
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)Felipe Prado
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)Felipe Prado
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerRepentSinner
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldJessie Helfrich
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerRepentSinner
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 

Similar to Report to IPA (20)

Surveilance documents
Surveilance documentsSurveilance documents
Surveilance documents
 
Surveillance
SurveillanceSurveillance
Surveillance
 
SummaryPaper
SummaryPaperSummaryPaper
SummaryPaper
 
Sharing Motion Information with Close Family and Friends
Sharing Motion Information with Close Family and FriendsSharing Motion Information with Close Family and Friends
Sharing Motion Information with Close Family and Friends
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)
 
Resisting technology
Resisting technologyResisting technology
Resisting technology
 
calgov-1AAA
calgov-1AAAcalgov-1AAA
calgov-1AAA
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile World
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 

Report to IPA

  • 1. Summary of complaint Summary: The basis of this complaint form is primarily in relation to a few key items: 1. Surveillance camera in my apartment 2. Camera in my monitor at my prior workplace 3. GPS based device in my vehicle, with audio 4. Some kind of Carrier Frequency Voice (CFV) 5. Auto-dialer/"war-dialer" 6. Laptop monitored 7. Phone monitored On the basis that it is Police equipment being used to do these things, then consider this document a request for these activities to cease immediately. This complaint is directed at anyone and everyone responsible for these resources being made available to be used with any malicious intent against me. My assumption is that Alix Mendoza (the Police Chief's daughter) is involved with this, but I also believe that someone else had access to these resources. It also appears to me that the Police Dept. is assisting her in pursuing me. This is a request for any and all activities related to that to cease immediately also, for myself and for anyone else in the future. My sentiment is that there have been ample indications in the duration of these events to prove my disinterest in her. In summary, any activities utilizing Police resources serving the purpose of dating in any form should be disallowed. I doubt that Miss. Mendoza had any intention of ever showing up at any given point in time. My position in this matter is that Miss. Mendoza was conscious of the fact that I was on the verge of meeting a significant other and possibly establishing a more permanent relationship. I was not aware that it was the Police Dept. was making these resources available to her throughout the majority of the period of time spanning these events. Someone was broadcasting information about my activities and/or reactions to various events, and I would get non-verbal, non-physical reactions from the people that it was being broadcast to. It also involves my ability to do a passive profile of people, do a sort of set theory in my head, and use deductive reasoning to figure out what was going on. That is how I figured out quite a bit of what was going on, although it was not always clear. Noone had any direct discussions with me. If any of the activities with the aforementioned resources continue, regardless of whom is doing it, I'll consider it to be a direct and malicious intent to violate my privacy. Explanation of items: 1. Surveillance camera in my apartment. -HA Someone was sneaking into my apartment at night while I was sleeping, and took the tail light off of 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 2. Summary of complaint my bike that was just inside the door. How would they know if I was sleeping or not without the surveillance camera in my apartment? I kept the blinds closed in my apartment at all times, and the door locked when I was not there. 2. Camera in monitor at prior workplace. There was a camera in my monitor where I used to work, which someone was swiping passwords & account numbers. Some of which I figured out by deductive reasoning, and others I could hear little bits and pieces of through the CFV. My regular mail was redirected for a short period of time (a couple of weeks), which someone would have to have my credit card number in order to do that. 3. GPS based device in my vehicle, with audio. There were periods of time which I did not have a phone, nor any other personal electronic device due to conditions outlined in this form. I realized that such a device was in my vehicle from events such as when I was driving to Las Vegas. I figured it out by recognizing the common reaction of the people within the place that I was in. In a random place with random people, it would be difficult for someone to know exactly where I was at any given time, Surely there is some kind of report on file indicating the installation of said device in my vehicle. 4. Some kind of Carrier Frequency Voice (CFV). I don't know exactly what it is called or how it works, but I assume that some kind of carrier frequency signal is used to carry the audio signal. The audio is very faint, and is not very easily distinguished. I could hear multiple different voices through it, but it is difficult to know which voice belongs to whom, especially since I am not familiar with whomever was talking through it. It is also my belief that the audio stream was filtered, filtering out things such as names and inverting some of the genders. I have heard of such technology before, and that it is used by law enforcement agencies. It is designed to make an individual think that he/she is hearing things. 5. Auto-dialer/"war-dialer". -numbers based on location, not the location based on the number -based on vicinity -large numbers of people getting messages (I don't know if it was text or voice) -trip to Las Vegas -implied threat to make me homeless There were days when people passing me in the hallway on the SJSU campus before my Discrete Math class. There was an incident during the summer of 2009 while I was in a Calculus II class. I had my laptop with me, since there is wireless internet access on the campus. I don't recall if it was the login to my laptop, or a specific page that I had logged in to, but suddenly everyone's cell phone in the classroom was ringing within a matter of a minute or two. It would be somewhat of a daunting task to get everyone's cell phone number like that without a location based auto-dialer. 6. Laptop monitored. GKrellM utilizes something for its' information referred to as the "procfs", which is short for the Process File System. The procfs is loaded into volatile memory (Random Access Memory), and located 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 3. Summary of complaint within the Linux Kernel. It is highly unlikely that anyone could bypass that mechanism in order to fool GkrellM. One of the pieces of information that it displays is the number of users that are logged on to the system. I had recently installed Fedora Linux on my laptop, and the first couple of days that I used the internet at the library, the number of users stayed at shown as “1”, as it should be. On about the third day, I downloaded some software called Eclipse, which is an Integrated Development Environment for writing software. As soon as I did that, someone logged on to my laptop from some remote location. The only way that can be done is if someone has the password, so I disconnected the ethernet cable (to be on the safe side), and changed the password. I reconnected the ethernet cable, and I saw the number of users flash from “1” to “2” a few times. So, in other words, someone was using the surveillance camera in my apartment to get my password, was likely using some kind of a packet sniffer somehow (likely local, but not sure if it could have been remote), and was interested in my code (very likely to be Patent idea related). I started putting a blanket over my head when I logged in to my laptop in my apartment after that. I was using both the wireless as well as the wired internet access on the SJSU campus and the public library on different occasions, but will be switching to internet access at home soon. Someone would likely have to have software capable of capturing the packets from the local network an reassembling them to a complete page. -recent developments for as to how and why it would have to be special software The software that I think was being used 7. Phone monitored. First of all, the only people or organization that is legally allowed to monitor my phone are either my employer, possibly someone that I am in a relationship with (I think there has to be some form of legal purpose to it), or a law enforcement agency when it is associated with an investigation. I was only employed for the first two years of this series of events, and never met either of the two other conditions, so therefore my phone should not have been being monitored by anyone. -pictures being taken of me, and sent out to the general public **examples** -harassing me -destroyed 2-3 phones due to it – kept trying to figure out exactly what was going on, and random things that I said would be taken out of context (specific examples) There are other ways to monitor someone's phone, but they are either paid services or you would have to have direct access to the target phone in order to be able to install software that would enable you or someone to monitor it. It is my observation that the method being used to monitor my phone, as well as others phones does not require direct access to the phone in order to do so. The only organization or agency that could possibly have this sort of technology is the Police Department. If anyone outside of the responsibility of the Police Department or other law enforcement agency were to get ahold of such technology, there can be very serious consequences, as has been demonstrated throughout the time- span of these events. Clarification 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 4. Summary of complaint I do not own anything with Alix, live with Alix, have any relationship with Alix (now or in the past), and am definitely not pursuing her. If I am not mistaken, that renders her unable to claim any legal right to me. Just to clarify, there was never any briefing, discussion, or agreement for anything. Nothing at all. I have a Patent idea for software, which I have not mentioned or discussed with anyone outside of e- mail or private discussion with whom is likely to be my co-founder. It can easily be classified as Intellectual Property. I consider any interest in acquiring specific information in relation to my Patent idea that would enable an individual to apply for a Patent for said idea an attempted theft. I am not completely aware of any criminal investigation, directly or indirectly related to me. I have not received anything indicative of charges being held against me, therefore my being monitored is without merit. I have not given anyone permission to access my apartment without my presence. If I am not mistaken, the things that Miss. Mendoza has been doing can be classified as stalking. I think some of the reason for these things being done was to create a distraction where I used to work, thereby hindering my productivity, with the goal of getting me fired. Similar methods were being used to keep me distracted, pre-occupied, and stressed out while I was going to college, with the intent of hindering my performance in my classes. I do believe that it was Miss. Mendoza that indicated to me via one of my classmates that I was going to fail one or more of my classes, with which she (or someone else with the equipment to do so) used things such as an auto-dialer to accomplish. I am very curious for as to how it is that Police resources could be used in this manner without members of the San Jose Police Department being aware of it. To me, it shows a lack of competence and oversight. CFV examples: In the 3-4 year duration off these events, I heard quite a few different things through the CFV. Some of which I could not hear clearly, some did not make sense to me, and some I believe was filtered. Some of the things which I assume was Alix Mendoza say: "You won't meet any hot girls like me." “I know what I want, and I know how to get it” “Why should I have to go talk to him?” - the “him” is referring to me 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 5. Summary of complaint "I should never have told him about that" – I don't know exactly who the “him” was “I knew you were going to be there” - I think it was in reference to my having gone to the Great Mall just before Christmas in 2006. "[My cousin] doesn't think he can do it" – this was in reference to my ability to accomplish my Idea. "[My cousin] says that he should have to work for it" - I don't know what it is that I was supposed to be working for. "[My cousin] says that he thinks he is rich" "And he'll be so happy to see me!" “I challenged my cousin into stopping him” "[My cousin] won't tell me" – supposedly in reference to being told where I was "Oh ... I didn't expect him to do that" - in reference to my having lost 20-30 pounds in a relatively short period of time "Do what I want! Do what I want!" - No. She nor anyone else told me what she wanted me to do anyway. "I'll get you fired." - "He doesn't talk about it!" - in relation to my Patent idea "[My cousin] is very high up in the Filipino community" "[My cousin] says ... ?? ... or when he runs out of money" "[My cousin] has done this before, but it usually only takes a couple of months" "... usually end up with one of my cousins" "[My cousin] says that she used to have a guy like him” Some things that I heard people say (I don't know who they were): "They just realized that he knew what he was doing the whole time" - “The last guy was good, but this guy is really good” - who was the last guy? What happened to him? 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 6. Summary of complaint "We want that one" – that was in relation to my idea, but I do not know who said it. "Guys like you make guys like me very rich" – I am the creative type, and someone wanted my idea(s). I don't know who it was or why he had access to me. "[My cousin] thinks he is a vigilante" “Honey ... he's not impressed, he's pissed off” "I saw him on the news recently" "This goes very high up ..." - I don't know who said it or exactly what it means “He is a part of a major investigation” “You have a problem, a very serious problem” - that was a female voice, but I don't know who it was "Give us what we want, and we'll give you what you want" – that was someone apparently wanting to make a trade of Alix Mendoza for my Patent idea. I doubt they have anything that could make up for the deficiency in the trade. “He's allowed to get a job now” - I don't know who said that one, but I would really like to know who it was. How is it that Police resources are permitted to be used to threaten my livelihood? This is the reason for which I am interested in seeking damages. All I know is that it was a male voice. Police Officer interactions: I had a discussion with an operator at my phone service provider in regards to my phone being monitored in the latter half of the year of 2009. My reasoning in asking the phone service provider was in interest for tracing the monitoring to the source. She advised me to contact the local authorities to handle the problem. I therefore left a message within a week or so after that on the answering machine of the High-Tech Crimes Unit Dept., leaving my name, address, e-mail address, explained that my phone was being monitored, and to ask what could be done about it. I also explained that I did not have a phone at that time. I did not have any correspondence afterward. It was either late at night, or in the wee hours of the morning on Blossom Hill, on my way back to my apartment from the ATM at the Bank of America adjacent to the Oakridge Mall in the latter part of 2009. A Police Officer stopped me to check me, indicating that they were looking for someone in the area. It was a routine stop with no problems or altercations, complete with emptying my pockets onto the hood of the patrol car. I was not participating in any suspicious activity, other than being out late at night. Everything that was in my pockets was on the hood of the car, and I usually keep pieces of paper in my back pocket for keeping notes and such. By that time, another Officer had arrived. The initial officer flipped through the small stack of paper, which was on the hood of the patrol car, and noticed 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 7. Summary of complaint that I had the phone number and website address for the SJPD on one of them. He asked me if I was either making or going to make a report. So, I told him, "Someone somehow planted a surveillance camera in my apartment, and I wanted someone to come and find it and remove it". He said, "Oh ... well ... we can't help you with that one." He also said, “He's right, that is, that is a very serious problem”. And, "Most people I would think were crazy, but he is serious". He looked at the other Officer and told him as I had started walking away, "Boss' daughter wants him, and he is fighting her the whole way" . That statement is how I found out that Alix Mendoza is the Police Chief's daughter, and is also indicative of my trying to get rid of her. There have been other events in which Police Officers have been involved, but not with my direct interaction (there should be ample reports as proof). Through a portion of the duration of these events, I have only been under the assumption that there was an investigation occurring. Correlated events: I have ample information about events that correlate with the aforementioned activities, although I am not certain of Police involvement, I do believe that the events correlate to the utilization of Police resources. It all serves the same purposes. A few of the key points are: -Someone was tampering with my truck, draining most if not all of the oil out. That was approximately sometime during the last week of June, just before I left to go to Las Vegas for a few days. Someone does not want me to go to Las Vegas, due to whom I was supposed to be meeting there. Some people within the apartment complex nearby witnessed it happening, but seem afraid to say anything. -Someone was accessing my truck, such as removing the registration and placing it back within my apartment under my futon, after I had already paid my fees for getting my truck back to legal. The only way I know of that it can be done is by Police equipment. -There were 3-4 guys to meet me at the light-rail station one day (Summer 2009), which there was a detective there to intercept them. -using my phone to (reporting people and blaming me for it) -Someone planting viruses on my memory stick, to prevent me from completing my homework -The graphics accelerator in my laptop was ruined -harassing various students on the SJSU campus 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
  • 8. Summary of complaint -many, many, many more events similar in nature Conclusion: I would like to request that the aforementioned devices and equipment be removed, and other monitoring be ceased promptly. I would also like to know who had access to all of the aforementioned resources. 75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa