We're investigating a real life murder attempt

The goal of this crowdsourcing initiative is to leave information that police/CIA/Secret Service/FBI have, but have not acted on.
We have murder attempts, ad-fraud, deepfakes, advanced hacking, and then some.
What's the last straw that's killing me is that my payments get stolen, and law enforcement isn't doing as little as recovering a stolen inheritance, which would be as easy as 1, 2, 3.
This site is public, but all of my content (of which a small fraction is shown here) belong to James O'Keefe (not Project Veritas and Michael Bloomberg.)

The site will go away when the two main actors are brought to justice.
RLMM background


American victims, a few corrupt individuals and a classic street gang do little favors for bigger predators. We'll report them.


German criminals come to the United States of America to harm and kill American citizens, and form international cybercrime chapters. We'll report them.


Together, we will surf through the waves of misinformation spread by the two main actors, and find a few clues to make crimes of an unbelievable size plausible, with receipts
The Fake Job Interview - Financial Recovery Services Inc

While it's a permanent problem that when I work on my projects, my servers (VPS) would constantly be targeted with sophisticated attacks, and when I virtually meet people more than twice, intrusions would happen. I would only receive potentially fake messages and calls. Healthy, happy people can form relationships. While two people are not a […]

× Read More ×
My Identity

I'm neither hiding my legal name, nor the name I go by. Sponsors and Gold Members have access to everything, from WireShark protocols to whatnot. Everyone knows who I am. I might even share account details with technical genies who're interested in investigating intrusions, etc. For instance, fake emails, interviews, calls, and things like that […]

× Read More ×
Baked Salmon aka Philip Provins aka Jim Browning Aka Jay Moe

Together with Wesley Marks, Philip "Phil" Provins has or had for several years a joint project called Bakeline. He's yet another person unwilling to accept accountability for their actions. Why do these people have various names? Why do they hide their faces? Why are they SO fascinated by pedophiles and other abuse? Why do they […]

× Read More ×
Why are the “Little Favor” doers all poor?

During the death hunt, Wesley Marks told me repeatedly that he'd like me to join “their” team. I laughed it off at the time, but I realized later that the people who might not be hardcore criminals, and helped a little in the death hunt, might be former victims. He said, I'd be an incredible […]

× Read More ×
Wesley Marks/Onision the Criminal Ex-Army

One of our tasks will be to confirm that Onision, who's first language is German and who lived in Germany until I left the country, really was in the army. We'll study fake looking images, and get the truth in the sea of lies that his life is. During the death hunt, I've been told […]

× Read More ×
The AirBnB and A Strange Ex-Army
× Read More ×
The Room & A Strange Ex Army
× Read More ×
Onision's "Voices"

Back in 2010, I reported to the German police and German FBI that the person stalking me can make perfect sounding fake voices. The people would sound strange, as in they would say strange things, but the voices sounded like them. Even without technology, and when he was a teenager, he was pretty good with […]

× Read More ×
Wesley Marks thinks Airport Security are Dummies

At the last day, Wesley Marks and Onision decided to knock me out with their electronic weapon and somehow carried me to either another part of the city or another city. They told me I would be in Illinois. I had no idea where I was. At this time, they had taken out my laptop […]

× Read More ×
Wireshark Protocols

If you're a forensic or network expert, feel free to check the Wireshark recordings below. As of this time, I have not yet found a way to "unhack" my laptop permanently. Wesley Marks appears to have a less sophisticated way that might require knowledge of the device name. As this changes with every network reset, […]

× Read More ×