Developer’s silence raises concern about surespot encrypted messenger
Report to IPA
1. Summary of complaint
Summary:
The basis of this complaint form is primarily in relation to a few key items:
1. Surveillance camera in my apartment
2. Camera in my monitor at my prior workplace
3. GPS based device in my vehicle, with audio
4. Some kind of Carrier Frequency Voice (CFV)
5. Auto-dialer/"war-dialer"
6. Laptop monitored
7. Phone monitored
On the basis that it is Police equipment being used to do these things, then consider this document a
request for these activities to cease immediately. This complaint is directed at anyone and everyone
responsible for these resources being made available to be used with any malicious intent against me.
My assumption is that Alix Mendoza (the Police Chief's daughter) is involved with this, but I also
believe that someone else had access to these resources. It also appears to me that the Police Dept. is
assisting her in pursuing me. This is a request for any and all activities related to that to cease
immediately also, for myself and for anyone else in the future. My sentiment is that there have been
ample indications in the duration of these events to prove my disinterest in her. In summary, any
activities utilizing Police resources serving the purpose of dating in any form should be disallowed.
I doubt that Miss. Mendoza had any intention of ever showing up at any given point in time. My
position in this matter is that Miss. Mendoza was conscious of the fact that I was on the verge of
meeting a significant other and possibly establishing a more permanent relationship. I was not aware
that it was the Police Dept. was making these resources available to her throughout the majority of the
period of time spanning these events.
Someone was broadcasting information about my activities and/or reactions to various events, and I
would get non-verbal, non-physical reactions from the people that it was being broadcast to. It also
involves my ability to do a passive profile of people, do a sort of set theory in my head, and use
deductive reasoning to figure out what was going on. That is how I figured out quite a bit of what was
going on, although it was not always clear. Noone had any direct discussions with me.
If any of the activities with the aforementioned resources continue, regardless of whom is doing it, I'll
consider it to be a direct and malicious intent to violate my privacy.
Explanation of items:
1. Surveillance camera in my apartment.
-HA
Someone was sneaking into my apartment at night while I was sleeping, and took the tail light off of
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
2. Summary of complaint
my bike that was just inside the door. How would they know if I was sleeping or not without the
surveillance camera in my apartment? I kept the blinds closed in my apartment at all times, and the
door locked when I was not there.
2. Camera in monitor at prior workplace. There was a camera in my monitor where I used to work,
which someone was swiping passwords & account numbers. Some of which I figured out by deductive
reasoning, and others I could hear little bits and pieces of through the CFV. My regular mail was
redirected for a short period of time (a couple of weeks), which someone would have to have my credit
card number in order to do that.
3. GPS based device in my vehicle, with audio. There were periods of time which I did not have a
phone, nor any other personal electronic device due to conditions outlined in this form. I realized that
such a device was in my vehicle from events such as when I was driving to Las Vegas. I figured it out
by recognizing the common reaction of the people within the place that I was in. In a random place
with random people, it would be difficult for someone to know exactly where I was at any given time,
Surely there is some kind of report on file indicating the installation of said device in my vehicle.
4. Some kind of Carrier Frequency Voice (CFV). I don't know exactly what it is called or how it
works, but I assume that some kind of carrier frequency signal is used to carry the audio signal. The
audio is very faint, and is not very easily distinguished. I could hear multiple different voices through
it, but it is difficult to know which voice belongs to whom, especially since I am not familiar with
whomever was talking through it. It is also my belief that the audio stream was filtered, filtering out
things such as names and inverting some of the genders. I have heard of such technology before, and
that it is used by law enforcement agencies. It is designed to make an individual think that he/she is
hearing things.
5. Auto-dialer/"war-dialer".
-numbers based on location, not the location based on the number
-based on vicinity
-large numbers of people getting messages (I don't know if it was text or voice)
-trip to Las Vegas
-implied threat to make me homeless
There were days when people passing me in the hallway on the SJSU campus before my Discrete Math
class.
There was an incident during the summer of 2009 while I was in a Calculus II class. I had my laptop
with me, since there is wireless internet access on the campus. I don't recall if it was the login to my
laptop, or a specific page that I had logged in to, but suddenly everyone's cell phone in the classroom
was ringing within a matter of a minute or two. It would be somewhat of a daunting task to get
everyone's cell phone number like that without a location based auto-dialer.
6. Laptop monitored.
GKrellM utilizes something for its' information referred to as the "procfs", which is short for the
Process File System. The procfs is loaded into volatile memory (Random Access Memory), and located
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
3. Summary of complaint
within the Linux Kernel. It is highly unlikely that anyone could bypass that mechanism in order to fool
GkrellM. One of the pieces of information that it displays is the number of users that are logged on to
the system. I had recently installed Fedora Linux on my laptop, and the first couple of days that I used
the internet at the library, the number of users stayed at shown as “1”, as it should be. On about the
third day, I downloaded some software called Eclipse, which is an Integrated Development
Environment for writing software. As soon as I did that, someone logged on to my laptop from some
remote location. The only way that can be done is if someone has the password, so I disconnected the
ethernet cable (to be on the safe side), and changed the password. I reconnected the ethernet cable, and
I saw the number of users flash from “1” to “2” a few times. So, in other words, someone was using the
surveillance camera in my apartment to get my password, was likely using some kind of a packet
sniffer somehow (likely local, but not sure if it could have been remote), and was interested in my code
(very likely to be Patent idea related). I started putting a blanket over my head when I logged in to my
laptop in my apartment after that.
I was using both the wireless as well as the wired internet access on the SJSU campus and the public
library on different occasions, but will be switching to internet access at home soon.
Someone would likely have to have software capable of capturing the packets from the local network
an reassembling them to a complete page.
-recent developments for as to how and why it would have to be special software
The software that I think was being used
7. Phone monitored. First of all, the only people or organization that is legally allowed to monitor my
phone are either my employer, possibly someone that I am in a relationship with (I think there has to be
some form of legal purpose to it), or a law enforcement agency when it is associated with an
investigation. I was only employed for the first two years of this series of events, and never met either
of the two other conditions, so therefore my phone should not have been being monitored by anyone.
-pictures being taken of me, and sent out to the general public **examples**
-harassing me
-destroyed 2-3 phones due to it – kept trying to figure out exactly what was going on, and
random things that I said would be taken out of context (specific examples)
There are other ways to monitor someone's phone, but they are either paid services or you would have
to have direct access to the target phone in order to be able to install software that would enable you or
someone to monitor it. It is my observation that the method being used to monitor my phone, as well as
others phones does not require direct access to the phone in order to do so. The only organization or
agency that could possibly have this sort of technology is the Police Department. If anyone outside of
the responsibility of the Police Department or other law enforcement agency were to get ahold of such
technology, there can be very serious consequences, as has been demonstrated throughout the time-
span of these events.
Clarification
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
4. Summary of complaint
I do not own anything with Alix, live with Alix, have any relationship with Alix (now or in the past),
and am definitely not pursuing her. If I am not mistaken, that renders her unable to claim any legal right
to me.
Just to clarify, there was never any briefing, discussion, or agreement for anything. Nothing at all.
I have a Patent idea for software, which I have not mentioned or discussed with anyone outside of e-
mail or private discussion with whom is likely to be my co-founder. It can easily be classified as
Intellectual Property. I consider any interest in acquiring specific information in relation to my Patent
idea that would enable an individual to apply for a Patent for said idea an attempted theft.
I am not completely aware of any criminal investigation, directly or indirectly related to me. I have not
received anything indicative of charges being held against me, therefore my being monitored is without
merit.
I have not given anyone permission to access my apartment without my presence.
If I am not mistaken, the things that Miss. Mendoza has been doing can be classified as stalking.
I think some of the reason for these things being done was to create a distraction where I used to work,
thereby hindering my productivity, with the goal of getting me fired. Similar methods were being used
to keep me distracted, pre-occupied, and stressed out while I was going to college, with the intent of
hindering my performance in my classes. I do believe that it was Miss. Mendoza that indicated to me
via one of my classmates that I was going to fail one or more of my classes, with which she (or
someone else with the equipment to do so) used things such as an auto-dialer to accomplish.
I am very curious for as to how it is that Police resources could be used in this manner without
members of the San Jose Police Department being aware of it. To me, it shows a lack of competence
and oversight.
CFV examples:
In the 3-4 year duration off these events, I heard quite a few different things through the CFV. Some of
which I could not hear clearly, some did not make sense to me, and some I believe was filtered.
Some of the things which I assume was Alix Mendoza say:
"You won't meet any hot girls like me."
“I know what I want, and I know how to get it”
“Why should I have to go talk to him?” - the “him” is referring to me
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
5. Summary of complaint
"I should never have told him about that" – I don't know exactly who the “him” was
“I knew you were going to be there” - I think it was in reference to my having gone to the Great Mall
just before Christmas in 2006.
"[My cousin] doesn't think he can do it" – this was in reference to my ability to accomplish my Idea.
"[My cousin] says that he should have to work for it" - I don't know what it is that I was supposed to
be working for.
"[My cousin] says that he thinks he is rich"
"And he'll be so happy to see me!"
“I challenged my cousin into stopping him”
"[My cousin] won't tell me" – supposedly in reference to being told where I was
"Oh ... I didn't expect him to do that" - in reference to my having lost 20-30 pounds in a relatively
short period of time
"Do what I want! Do what I want!" - No. She nor anyone else told me what she wanted me to do
anyway.
"I'll get you fired." -
"He doesn't talk about it!" - in relation to my Patent idea
"[My cousin] is very high up in the Filipino community"
"[My cousin] says ... ?? ... or when he runs out of money"
"[My cousin] has done this before, but it usually only takes a couple of months"
"... usually end up with one of my cousins"
"[My cousin] says that she used to have a guy like him”
Some things that I heard people say (I don't know who they were):
"They just realized that he knew what he was doing the whole time" -
“The last guy was good, but this guy is really good” - who was the last guy? What happened to him?
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
6. Summary of complaint
"We want that one" – that was in relation to my idea, but I do not know who said it.
"Guys like you make guys like me very rich" – I am the creative type, and someone wanted my idea(s).
I don't know who it was or why he had access to me.
"[My cousin] thinks he is a vigilante"
“Honey ... he's not impressed, he's pissed off”
"I saw him on the news recently"
"This goes very high up ..." - I don't know who said it or exactly what it means
“He is a part of a major investigation”
“You have a problem, a very serious problem” - that was a female voice, but I don't know who it was
"Give us what we want, and we'll give you what you want" – that was someone apparently wanting to
make a trade of Alix Mendoza for my Patent idea. I doubt they have anything that could make up for
the deficiency in the trade.
“He's allowed to get a job now” - I don't know who said that one, but I would really like to know who it
was. How is it that Police resources are permitted to be used to threaten my livelihood? This is the
reason for which I am interested in seeking damages. All I know is that it was a male voice.
Police Officer interactions:
I had a discussion with an operator at my phone service provider in regards to my phone being
monitored in the latter half of the year of 2009. My reasoning in asking the phone service provider was
in interest for tracing the monitoring to the source. She advised me to contact the local authorities to
handle the problem. I therefore left a message within a week or so after that on the answering machine
of the High-Tech Crimes Unit Dept., leaving my name, address, e-mail address, explained that my
phone was being monitored, and to ask what could be done about it. I also explained that I did not have
a phone at that time. I did not have any correspondence afterward.
It was either late at night, or in the wee hours of the morning on Blossom Hill, on my way back to my
apartment from the ATM at the Bank of America adjacent to the Oakridge Mall in the latter part of
2009. A Police Officer stopped me to check me, indicating that they were looking for someone in the
area. It was a routine stop with no problems or altercations, complete with emptying my pockets onto
the hood of the patrol car. I was not participating in any suspicious activity, other than being out late at
night. Everything that was in my pockets was on the hood of the car, and I usually keep pieces of paper
in my back pocket for keeping notes and such. By that time, another Officer had arrived. The initial
officer flipped through the small stack of paper, which was on the hood of the patrol car, and noticed
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
7. Summary of complaint
that I had the phone number and website address for the SJPD on one of them. He asked me if I was
either making or going to make a report. So, I told him, "Someone somehow planted a surveillance
camera in my apartment, and I wanted someone to come and find it and remove it".
He said, "Oh ... well ... we can't help you with that one."
He also said, “He's right, that is, that is a very serious problem”.
And, "Most people I would think were crazy, but he is serious".
He looked at the other Officer and told him as I had started walking away, "Boss' daughter wants him,
and he is fighting her the whole way" . That statement is how I found out that Alix Mendoza is the
Police Chief's daughter, and is also indicative of my trying to get rid of her.
There have been other events in which Police Officers have been involved, but not with my direct
interaction (there should be ample reports as proof). Through a portion of the duration of these events, I
have only been under the assumption that there was an investigation occurring.
Correlated events:
I have ample information about events that correlate with the aforementioned activities, although I am
not certain of Police involvement, I do believe that the events correlate to the utilization of Police
resources. It all serves the same purposes. A few of the key points are:
-Someone was tampering with my truck, draining most if not all of the oil out. That was approximately
sometime during the last week of June, just before I left to go to Las Vegas for a few days. Someone
does not want me to go to Las Vegas, due to whom I was supposed to be meeting there. Some people
within the apartment complex nearby witnessed it happening, but seem afraid to say anything.
-Someone was accessing my truck, such as removing the registration and placing it back within my
apartment under my futon, after I had already paid my fees for getting my truck back to legal. The only
way I know of that it can be done is by Police equipment.
-There were 3-4 guys to meet me at the light-rail station one day (Summer 2009), which there was a
detective there to intercept them.
-using my phone to (reporting people and blaming me for it)
-Someone planting viruses on my memory stick, to prevent me from completing my homework
-The graphics accelerator in my laptop was ruined
-harassing various students on the SJSU campus
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa
8. Summary of complaint
-many, many, many more events similar in nature
Conclusion:
I would like to request that the aforementioned devices and equipment be removed, and other
monitoring be ceased promptly. I would also like to know who had access to all of the aforementioned
resources.
75 E. Santa Clara Street, Suite 93 – San Jose, California 95113 – Tel (408) 794-6226 – Fax (408) 977-1053 – www.sanjoseca.gov/ipa