
Thatโs the x post. But this is the truth behind it.
For more than a decade, Iโve written about digital risk, corporate overreach, data exploitation, and organized fraud. I was a columnist for InformationWeek. I led conversations in the $26 billion promotional products industry. I investigated scams, exposed vulnerabilities, and asked the questions no one wanted to answerโespecially the ones about privacy, surveillance, and what happens when the systems we trust become the tools of our erasure.
I even spoke out on NextDoor while living in the Santa Rosa Valley, after an attempted break-in at my home. The officer told us they rarely come back after they leave evidence behind like a mangled screen window once my dog ran them off while I was home at work. Then another neighbor reported a string of package thefts. I raised the alarm. I told everyone that my son and I witnessed a woman crouching down in her vehicle as we passed by on a walk with the dog, and that we even had an attempted break-in. That neighborโwhose packages were stolenโreplied publicly, โTonia, I just want my packages back. Youโre scaring everyone.โ
Two weeks later, police confirmed that Chilean nationals here on โburglary tourismโ had entered our across-the-street neighborโs home from the back and robbed them blind, while my pool guy and mobile dog groomer were at my house. They knew I would be distracted. This wasnโt just opportunistic crimeโit was part of an organized, international network exploiting our broken sanctuary city policies and enforcement loopholes. And the policeman was right. The criminals didnโt come back to hit our house again. They moved on to the score across the street.
These criminals cycle in and out of our system with ease, and wind up back on our streets. Meanwhile, I was left to feel like the problemโfor daring to speak up. And I wasnโt taken seriously when I finally broke down, here in Santa Barbara, paralyzed by fear after someone had unscrewed every screw in an upstairs window so they could easily come in and out, and after reporting heavy movement along my roofline. Yes, folks, your roofline is the most obscure and most utilized method to gain access to your home. My perps were gaining access to me while I was home; the upstairs area was as cold as it was outside when I discovered the screwsโafter opening every blind in the house to find out where the cold air was coming. I had been home for hours. I wasnโt taken seriously then. Rather it was me who was scrutinized for being crippled with fear that night. For finally breaking down. For being a woman. For being an ongoing, targeted, victim of crime. And all this is just the tip of the iceberg.
These werenโt my first brushes with systems that failed to protect me. Years earlier, my brand-new Mercedes SUV was stolen from the Port of Long Beach as I boarded a company cruise to Ensada, Mexico with my employees. Two women working for Homeland Security stole my keys during the boarding process, I was later informed. I reported the crimeโbut no one took me seriously. After all, the SUV was recovered thanks to LoJack. The damage cost my insurance company $25k and the SUV was in the shop 120 days. What changed was when the CEO of Carnival Cruises took the same trip months later, and his vehicle was also stolen. His was something like the 18th car taken from that port where Homeland Security is supposed to protect you, not steal from you.
Suddenly, heads turned. Suddenly, people listened.
But it was my carโphotos involving my caseโthat finally put those women away. They had taken selfies in and on my SUV. Mine was the first vehicle they ever stole. It was the first one reported. It was also the vehicle which led to their admission of all their vehicle thefts from the Port of Long Beach, and what led to their final convictions. And we sit back and wonder why our automobile and home insurance policies cost so much.
Back in the Santa Rosa Valley, three weeks after the neighborโs burglary, a different police officer stood in my living room with up to forty homeowners. I was leading the Neighborhood Watch program. I designed the signs, and coordinated their placement throughout the neighborhood. And it worked. The crime suddenly stopped in the SRV.
But it followed me to Santa Barbara. And it escalatedโbeginning as early as 2020. And it even followed me back to my hometown of Plymouth, IN where I was literally terrorized in a second home. (That is a different blog post on a different day.)
Below, I released my Author Intelligence Portfolioโa collection of just some of my published work, podcast appearances, and investigative writing. If nothing else, I am trying to establish my credibility with my readers. Itโs a record of my voice before they tried to erase it. Itโs proof that Iโve been warning about the architecture of control long before it turned on me. Itโs a roadmap of where we are, how we got here, and just how far this goes.
This isnโt about paranoia. This is about pattern recognition from a former foster kid who developed a Sixth Sense called Hyper-Vigilence. And the pattern is clear: They bury stories by burying the storytellers through jamming your WiFi, your surveillance cameras, and hacking your devices. When patterns began to surface thatโs when I started to really listen.
And still weโve invited criminals right into our homes and backyardsโforeign nationals donning bright yellow meshed vests. Sanitation workers who merge with your gardeners and seem to switch roles and behaviors. Weโve hired people we barely know under the guise of gardeners wearing full black masks who scope out your homes and use your schedules and behavior to track you. They use power tools to mask the noise they make when they attack your homes. I know how it all works because I have been listening a long time.
Iโm not saying everyone is bad. And Iโm certainly not saying every foreigner living on American soil, legally or not, is bad. Iโm saying I know what to look for when deciphering who maybe isโbad. When things start to look more and more suspicious everyday you have to listen to your instincts. Random car honks on your street at night are warning signals to the crew lurking in your backyards at night. Delivery people who pull up, one after another, so there is always activity on your street, wearing camera masking sunglasses. Devices being bought easily online like the Flipper Zero that picks up your car, TV, garage, and keypad RFID signals on your home so access to those homes and cars becomes a misdemeanor if caught. They didnโt break anything to get inside. Drone sightings everywhere across America because thatโs the tool of choice to creep on you naked or to watch you enter your passcodes on your devices from a window while you are in the sanctity of home.
Female politicians have long been sounding the alarm about drones.
โWhen is a drone picture a benefit to society? When is it an invasion of privacy? When is it stalking? When is it legitimate law enforcement? What about weaponization?โ
โSenator Dianne Feinstein, Senate Judiciary Committee, 2013
Notably, Congresswoman Elise Stefanik (R-NY) has been a vocal advocate for regulating foreign-made drones, particularly those manufactured by Chinese companies like DJI. In 2024, she introduced the Countering CCP Drones Act, aiming to add DJI to the Federal Communications Commissionโs Covered List, thereby restricting their operation on U.S. communications infrastructure. Stefanik emphasized the national security risks posed by these drones, stating, โIt is strategically irresponsible to allow Communist China to be our drone factory.โ
In 2021 6.4M property crimes were reported in the US. Auto thefts, commercial burglaries, larcenies, shoplifting all happening at alarming rates.
I didnโt stay buried. Iโve found my voice again and Iโm raising the resounding alarm again! (Folks, here in Santa Barbara, you are about to get robbed if you havenโt been already!)
Iโm here. Iโm writing again. And this time, Iโm naming names, tracking movements, and exposing the machinery behind the curtain. Iโve gone to the FBI and have even felt protected at many times, but now over a year later since I stood outside the iron gates of an FBI field office in Santa Maria, where field agents listened and promised my case would be escalated to โHigh Crimes,โ the system designed to protect me has left me completely in the dark. Iโve come to realize I may be just an asset. And after what happened to me in Indiana, I know I am part of something much bigger. Something so networked; Iโve come to realize maybe I donโt matter.
You can try to silence a journalist. But if sheโs smart enough, stubborn enough, and backed up enough by the things sheโs done in the pastโshe becomes the archive.
It may be too late to stop this highly networked crime ring that I suspect has infiltrators across every major corporation in America. But itโs not too late to reveal it.
Even if, quietlyโฆ
I became the story.
It didnโt happen all at once. First, it was break-ins. Then it was corrupted files. Stolen deeds. Years of messages erased. Then came the stalkers with leaf blowers, low flying aircraft, drones, the jammed texts, the vanished evidence. My blog was taken offline. I was hacked out of Facebook. Then came the E-Sim hacks. My farmโs website and email were taken down which I still havenโt been able to recover, missing surveillance footage or ghosted footage. Photos and videos disappeared. I started documenting what was happening to me the same way Iโd documented everything else. Sometimes watching that documentation being erased in front of my eyes. A Chase bank employee, just yesterday, watched my device toggle itself in and out of airplane mode. Money has appeared in my account that my company didnโt earn. So, Iโm having Chase investigate the flow. My fear is money laundering is involved and the criminals may be using my company as a shell.
And all this isnโt something any person or home office or small business can easily defend because technology can only be controlled in a static environment. It canโt be controlled when you are being stalked by trespassing criminals who exploit security patches from your backyard or from a car parked outside your office. See APPLE Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
Our police force and justice system doesnโt know how to investigate, let alone prosecute computer crimes. And victims wind-up being scrutinized more often than the criminals themselves. These criminals get busted for lurking, trespassing, loitering, and stalking and get recycled back out on the streets only to come right back at you. Because our jails are too full already.
The story has been hidden. Until now.
Today, I released my Author Intelligence Portfolioโa collection of my published work, podcast appearances, and investigative writing. Itโs a record of my voice before they tried to erase it. Itโs proof that Iโve been warning about the architecture of control long before it turned on me. Itโs a roadmap of where we are, how we got here, and just how far this goes.
And let me be even more direct: Foreign nationals are to blame. Iโve seen some of them and have captured them and their vehicles in action during suspicious behavior. They almost shut me down in fear.
Your sanctuary city is no sanctuary at all. Just log into localcrimenews.com and enter โSanta Barbara.โ Youโll see for yourselfโrap sheets that go on for days. People arrested in connection with crimes Iโve reported without follow-up to the victims themselves. Foreign Nationals without documentation who have committed heinous crimes. People who cycle through the system and wind up right back on the streets, over and over again. Iโm surrounded by activity that law enforcement has seen and loggedโand yet Iโve been the one left wondering if Iโm going to wind up dead in a ditch. I even tried to hire a private detective who told me he couldnโt help me, or even talk to me again if my โcase was under investigation.โ Otherwise, after he conducted his inquiries, he would call me back. I never heard from him again.
This isnโt about paranoia. This is about pattern recognition.
And the pattern is clear: They bury stories by burying the storytellers.
But I didnโt stay buried.
Iโm here. Iโm writing again. And this time, Iโm naming names, tracking movements, and exposing the machinery behind the curtain. Just ask me anything and I will lay how this all works like a blanket before you.
You can try to silence a journalist.
But if sheโs smart enough, stubborn enough, and backed up enough by determination and gumption, and finally, raw courageโshe becomes the archive.
It may be too late to stop this deeply networked criminal activity that I believe has infiltrated every major corporation in America. But itโs not too late to reveal it. Elon, put me on your civilian team. Iโm ready to tell you everything.
P.S. This blog was taken down by my perpetrators. What you read throughout is a shadow of what once was.
Continue reading “โWhen a journalist becomes the target, the story gets buried.โ”



































































