Hi - just joined and not certain if this is OK - I'm excited to have joined either way and am happy to contribute in whatever way I can regardless of if this is OK or not.
I'm sorry if this is vague or confusing - to be upfront, I'm strategically omitting some things and altering a few details here and there if they don't change the actual "ask" or "issue" for some safety purposes, etc. I've been dealing with someone who's been stalking and harassing me (over social media, though the stalking did include some break-ins) for over two years at this point. It's a person I know who does have a high level of tech experience and expertise. I've reported to the police several times and they won't do anything; the last time I did so, the guy literally laughed and asked me what I expected him to do.
I work in data analytics (and would be happy to try and help with anything in that realm) and have created a few different monitoring jobs that run in the background on the devices that this person seems to have managed to mess with and amassed a frankly overwhelming amount of technical data, timestamped, etc - some quick examples:
- one time where I was having a bunch of issues with my laptop and after it crashed, I checked and found that - among other things - during the short time period I was noticing the most issues, the laptop's firewall had been deactivated without my knowledge
- monitoring data shows another display being picked up by the laptop despite the fact that it was right next to me and I don't have any external displays - I haven't been able to find any legitimate reason for this to happen, and I have tried
- the monitoring jobs are zipped, hashed, and backed up immediately after running - at one point, all of the zip and hash files associated with a monitoring job more than a month earlier had the "ctime" attribute updated to that date - when I compared against backups and metadata backups, literally nothing else had changed - not extended attributes, not # hard links, not inode #, etc
All of those examples have kind of a lot more to them and those are just the parts I'm able to explain properly - this is not an area of tech I'm familiar with at all. I've created some visualizations, etc, but since I'm kind of learning about this stuff as I go - I'm having a really hard time interpreting some of it or figuring out what to prioritize.
It's gotten very clear that this person has no intention of stopping, even after this has completely disrupted every area of my life; there isn't anyone I can go to anymore. I moved after I captured an audio recording of someone breaking into my apartment while I was in the hospital, but then they just started breaking into the house I'm renting now; I have audio recordings of that as well (the police are aware).
I have no idea what to do. But I do have a fairly extensive amount of technical data accumulated at this point and I've been working on putting something together that maybe someone will take seriously so I can try to get away from this person. They've also logged into accounts of mine multiple times and at one point, logged into my email and deleted a bunch of stuff including the email chain where I'd submitted the police report and sent copies of some of the audio + video evidence I have, as well as photos of things like when I came home to the house I'd just started renting - and hadn't had anyone over yet - to find a random currency note of a country I've never been to on a continent I've never been to on the floor in front of my TV, etc - (I'd downloaded a full "copy" of the inbox less than a week prior so it wasn't a huge loss, but concerning).
I'm a very annoying person and managed to annoy one of the platforms until they sent me a really comprehensive dataset about my account + account activity and from the structure of what they sent me and kind of reading between the lines on what it means they store and for how long, I essentially know for a fact that the data on who this is literally exists in their database. There is proof of this in their data. I do have several of the IP addresses they logged in from - in several cases, in a completely different city than where I was at the time and not associated with a VPN - but I can't really do anything with an IP address if nobody will subpoena anything.
I'm so sorry if this isn't OK and am happy to take this down if needed - is it OK for me to ask for help from anyone on here to help interpret some of the data I've been gathering or to ask questions on interpreting what I've found? Among other things, I specifically have pretty technical questions about computer networking and the functionality of some specific Linux commands - as well as questions on audio forensics and audio metadata + metadata forensics.
Is this allowed? Or does anyone have advice on anything I could even do here to try and keep myself safe? I've tried contacting a few different victims' advocacy groups, etc, and (sorry - trying to give enough detail without too much) a few different people and mostly only heard back from people saying they couldn't help or (mostly) never heard back at all; I'm realizing lately that it's very possible that some of those people/organizations did actually respond, and this person was just deleting responses before I saw them. I bought the cheapest Chromebook I could find as I'm not wanting to do anything important on any of my other devices, and am submitting this from the Chromebook.
Thank you so much either way.