Tenacious

I continue to document everything carefully and methodically. Patterns reveal themselves over time, and truth has a way of speaking clearly when given space. The strength that once defined me still does—now it serves my protection and my peace. I will not be diminished.

Apologies

Sincere apologies to any contacts or clients who may have been affected by a recent breach of my social media account. Those who have experienced abuse will understand how far abusers can go, particularly around holidays and significant moments, to cause disruption and distress. The matter is being addressed, and normal service will resume shortly.… Read More Apologies

Another Breach. Another Record. Another Step Forward.

On 27 December, my LinkedIn account was hacked.It was not a surprise — just another incident in a long, documented pattern. This will be logged and reported to Guardian Civil on my return, along with all supporting evidence. Digital interference, identity disruption, and repeated breaches are not “minor inconveniences” when viewed in isolation — but patterns matter, and… Read More Another Breach. Another Record. Another Step Forward.

Reaction

The brain of a victim experiencing an imminent physical attack or abuse goes through intense, complex, and rapid responses. These are primarily rooted in survival mechanisms and involve multiple systems—neurological, hormonal, and psychological. Here’s a detailed breakdown: 1. Immediate Threat Detection 2. Stress Response (Fight, Flight, or Freeze) 3. Cognitive Effects 4. Pain & Defensive… Read More Reaction

Shadow self

Discovering your shadow self is a deeply personal process, rooted in psychology, spirituality, and self-reflection. Carl Jung coined the term “shadow” to describe the unconscious parts of ourselves—traits, desires, fears, and impulses that we deny, suppress, or project onto others. Engaging with your shadow can be transformative because it allows you to integrate those hidden aspects instead… Read More Shadow self

It is not over yet!

It isn’t over.All evidence is being formally submitted.Accountability applies to everyone involved — directly or indirectly.Digital records don’t rely on memory, persuasion, or power.Phone data, timelines, messages, and metadata speak for themselves.Truth doesn’t need defending when it’s documented.

Aiding and abetting

1. Types of legal culpability for those who “knew but kept quiet” a) Accessory / Aiding and Abetting If someone knew abuse could lead to murder and failed to act, in some cases they may be considered an accessory to the crime. Key point: Mere silence isn’t always criminal. Courts often require intentional assistance or concealment. b) Criminal negligence / Failure to… Read More Aiding and abetting