For data depicting the owner of the aforementioned website in the introductory write up, with the tampering with/of my phone, here's the web page url I placed it on originally. BUT... the owner not wanting the public to be able to review the data implicating him, he placed a password on the page 'for viewing', which means, one can't view the page and its contents without knowing the password he placed on it. ..Which then also implicates him further since only a person with something to hide, actually hides information about them and their secret activities.
http://www.elftown.com/wiki.html?name=Calls_To_Myself
This is when he put a password on the page to prevent public viewing:
2011-08-29 17:59:34
Last author: Hedda
Owner: Artsieladie
However, I was one step ahead of him. I screengrabbed the ENTIRE web page for all to see. Please be my guest to see what the owner of Elftown is trying to hide, but be warned, since it's an entire page, it is a very large (length/height wise: 1024w x 10485h) image to load. So instead of actually showing it here and taking up a very long space, I'm adding here just the url to the web page, "Calls_To_Myself" image. ..And not only did he orchestrate calls "FROM my phone number" to be made "TO my phone number" (both same number), hence the title, "Calls_To_Myself", he also had a "non-working number" call my number and then immediately following this, the automated message from the non-working number was transferred over to and made to be my online voicemail message, which said: "The number you have dialed is not in service." So when people tried to call me (many witnesses to this I have), they were greeted with this message and so all who tried calling me thought my phone had been disconnected. This went on for 3 weeks before I could get it fixed. I have all the call logs and data showing this as well.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWPCcm-bvmSxCxHLbdgONzosX5IOpSxFv635EQylDhQxOR_sDMv42mZicQR3XArnutGb3XlNsbEN5hu3rk5kt7VAV5oaj0tOhCzhkPWD4cyY6GX8ZYYo2SZ2sovfLWGyF7ygmHyFtttV8/w1024/CallsToMyselfWikipageScreengrabbed-Wholepage2011-08-26_1024x10485.png
But this, like I said, is just a tiny tip of the iceberg of what I have against him. I've had data/information removed from my computer I use online and the data removed is data that incriminates him. But again, I was one step ahead of him. I have everything backed up on another computer that has never been online and never will be and now I also have all the data encrypted besides, so he cannot get to it. How I found out what had been removed was I compared what's on my online computer with what's on my offline computer and in the comparison I was able to discover what had been removed from my online computer. 'Course the fact that the missing information pertained to him, additionally then also implicates him even more because only he stood to benefit by its removal.
He also placed a desktop gadget on my computer. He is so brazen and has himself convinced that no one will ever do anything to make him stop invading my privacy that he placed a gadget on my desktop depicting the date, temperature, weather, and time for, get this, "where 'he' lives".. in Linkoping, Sweden! Another coincidence? ..And I was also lucky enough to have company at my house when it occurred who also witnessed this.
He deleted my friend's email account to get rid of incriminating evidence against him or so he thought. My friend saved everything in and out of that email account because it was a setup to catch him and catch him, we did! ..And so we have his belligerent and inflammatory email (against me) he sent to my friend, suggesting to my friend to ignore my, according to him, accusations of invasion of privacy, that I was just a crazy lunatic, etc.. So he thought by deleting my friend's email account, the evidence against him would be gone too. haha Since he was the only one to benefit by that email account being deleted (or so he thought), it doesn't require a PhD to figure out WHO deleted it and why and since it was set up on my computer on purpose, it fits in nicely with all the rest of the data I have on him with the hacking of my computer. Hacking my computer gave him the ability to know the password for the email account described.
Add in the fact that he HATES my friend who the email account belonged to because my friend suggested a perfect sting operation that ultimately proved that he was watching what I was doing on my computer and it was indeed a fantastic one because he, Mr. I Spy, was completely clueless about WHY I was recreating a particular event. To recreate it I had to have certain screengrabs and the information captured had to be in line with how things actually were on the day after Valentine's Day. By making it "appear" like I didn't already have the screengrabs, that I needed to improvise to meet the needed data, I had him convinced that this is what I needed to do. 'Course, if he hadn't been spying on me, he wouldn't have known what I was doing and so by having his nose where it didn't belong ultimately he proved ironically that he did have his nose where it didn't belong.
So when he kept making subtle changes by moving things like a comments' button from the left to the middle, changing the little icon that appeared in the address bar for the site, moved the fan button from the top to the bottom, had a crew member come into my badge box and remove ivy leaves I had in there, and then when he deleted my Valentine image which had been in my images less than two days prior (and he being the only one who had this capability as owner/operator of the server to delete and to change where and how things appear), I didn't even need to finish the project because it became SO obvious to both myself and my friend that he was able to see EXACTLY what I was doing in my Photoshop. Talk about creepy!?
When he figured out what I was doing and then decided to try and trip me up, thinking when I was done I would show my screengrabs I was "recreating", he could then say to his staff/crew that my information was false and could show how things were and how they were changed and when (All this info would be available to him through his database.) and so, if my screengrabs didn't correlate with and match how things WERE on 2/15, according to his database then he likely figured he could nail me instead of it being a vice versa scenario. He would then have been able to make me look like a crazy liar as he liked to call me in front of his crew. But what he didn't apparently realise or know is that I already HAD the actual screengrabs of the event in question but not where he could find them. There are ways to save data without having it actually being ON your computer.
I've had to learn several things to protect myself and data, as I have had to also hone my investigative skills. Observation is KEY! Paying attention to the little details, IMPORTANT because they connect the big dots. Learn your enemy or opponent, their behaviour patterns, their trigger trips to create anxiety of some sort to mess with their "clear thinking process" and always grab and document any and all events/occurrences, whether you may ultimately need them or not because it's always better to have something you don't need than it is to not have something you find out you do/did need.
Here's the thing that was troubling him. On the day after Valentine's he had given me a badge. When he placed the new badge in my badge box, he also added a little red heart. But because he didn't want his staff/crew to know he did, one specifically, because how would such look with the owner placing a heart in a member's badge box who certain members of the crew loved to make and poke fun at, plus there was a jealousy factor in play besides on the site, the last thing he wanted me to do was bring it out in the open that he had done so and besides he had denied doing it as well. (There's more to this than meets the eye. It's called obsessive infatuation.) Since having the owner putting a heart in my badge box was just so out of the norm, naturally and instinctively I documented the incident and thoroughly of course. Knowing I had him dead to rights I didn't want to risk a possible loss of the data and so I saved it elsewhere, instead of on my computer.
Then for part II of this clever sting operation, my friend suggested that I go into my "secret, personal diary" and address Mr. I Spy specifically that my friend is smarter than he and how we had caught him watching what I was doing on my computer. "Rub it in good." my friend said. So I did! Which then made Mr. I Spy angry and so he had to do something to prove how clever he was, which we both witnessed and documented. This is why we rubbed it in so he would then have to prove himself smarter and then be ready to capture "his smarter-ness" of course!
When I was into the recreation project, I decided to set up a new folder just for the purpose of saving all my work to this one folder. This was in case if I had to restart my computer, all I'd have to do to resume my work was to open up just the one folder and I wouldn't have to go looking through other folders to again find this or that as I needed whatever. I called it the "Naughty Gremlin" folder.
When we had had it proven to us, mostly me, that Mr. I Spy was watching what I was doing, and after I had written my "rub it in" secret diary entry, I was saving all the Photoshop canvases to this new folder. When I got to the next to the last one to save, this is when my friend and I witnessed something really bizarre. As I clicked to save and my pictures' folder came up, we noticed a different image in the new folder. It was an image file of a Phoenix work I had done many months prior and it was "supposed to be" in my folder labeled Phoenix. We were like, "Huh!?" I captured the incident, finished saving the canvas I was in the process of saving.
I then had one more canvas to save. I clicked on 'save as' and when my pictures' folder opened up again, the Phoenix image which had just been in the new folder was then no longer there. Again I documented. I finished saving the canvas and the pictures' folder then closed. My friend and I were like we couldn't believe our eyes. My friend told me to open up my pictures' folder and go to the folder where the Phoenix image was "supposed to be". I did. When I opened up my Phoenix folder and since I had not been in it for many months, all the texts under the images were in blue. (Was using Windows XP at the time.) All the images except "just one", the one that had been moved to my new folder and then put back in my Phoenix folder. The text under that 'one' was black indicating it had "just been accessed", which was brought about by it being moved and then put back. Oh, Mr. I Spy was so clever! But... WE were MORE clever! We set him up. He being angry acted without thinking clearly and ultimately proved some more how well he knew "my" computer! ..And the fact that he deliberately was messing with my new folder to let me know some more he KNEW what I was doing, just placed another nail in his coffin.
I could go on and on with all the data of the many instances pointing directly to him, but I won't because it would require an entire book of likely a thousand pages. But I've said plenty so anyone can get the general idea to know that I'm being stalked profoundly by a crazed, obsessed lunatic. :/ I'm thinking perhaps I'll set up a blog for the sole purpose of telling about this bizarre hell I have had and am still dealing with, along with providing the vast amount of data I have that substantiates it. It's a hell I wouldn't wish on my enemy, especially almost for 8 and a half years now.